By now, you should be aware that the findings from a research study are only part of the story. As a consumer, hoping to inform practice by use of an evidence base, you want to know much more. A sound research study includes all the steps highlighted in previous weeks: reviewing existing literature, focusing a research question, choosing a qualitative or quantitative method for answering the question, designing the study including selection of data collection procedures and/or measures, procedures used, data analysis plan, and findings. In addition, the study commonly discusses how ethical concerns were addressed and acknowledges the limitations of the study. For this assignment, you review a published research study with two purposes in mind:
Submit a critique and review of the article, which includes the title page and the reference list. Follow the guidelines below:
This article appeared in a journal published by Elsevier. The attached
copy is furnished to the author for internal non-commercial research
and education use, including for instruction at the authors institution
and sharing with colleagues.
Other uses, including reproduction and distribution, or selling or
licensing copies, or posting to personal, institutional or third party
websites are prohibited.
In most cases authors are permitted to post their version of the
article (e.g. in Word or Tex form) to their personal website or
institutional repository. Authors requiring further information
regarding Elsevier’s archiving and manuscript policies are
encouraged to visit:
http://www.elsevier.com/copyright
Author's personal copy
The changing face of bullying: An empirical comparison between traditional and internet bullying and victimization
Danielle M. Law a,!, Jennifer D. Shapka a, Shelley Hymel a, Brent F. Olson a, Terry Waterhouse b a Faculty of Education, The University of British Columbia, 2125 Main Mall, Vancouver, British Columbia, Canada V6T 1Z4 b Criminology and Criminal Justice, The University of the Fraser Valley, 33844 King Road, Abbotsford, British Columbia , Canada V2S 7M8
a r t i c l e i n f o
Article history: Available online 2 October 2011
Keywords: Internet aggression Cyberbullying Bullying Aggression
a b s t r a c t
Electronic aggression, or cyberbullying, is a relatively new phenomenon. As such, consistency in how the construct is defined and operationalized has not yet been achieved, inhibiting a thorough understanding of the construct and how it relates to developmental outcomes. In a series of two studies, exploratory and confirmatory factor analyses (EFAs and CFAs respectively) were used to examine whether electronic aggression can be measured using items similar to that used for measuring traditional bullying, and whether adolescents respond to questions about electronic aggression in the same way they do for tra- ditional bullying. For Study I (n = 17 551; 49% female), adolescents in grades 8–12 were asked to what extent they had experience with physical, verbal, social, and cyberbullying as a bully and victim. EFA and CFA results revealed that adolescents distinguished between the roles they play (bully, victim) in a bullying situation but not forms of bullying (physical, verbal, social, cyber). To examine this further, Study II (n = 733; 62% female), asked adolescents between the ages of 11 and 18 to respond to questions about their experience sending (bully), receiving (victim), and/or seeing (witness) specific online aggressive acts. EFA and CFA results revealed that adolescents did not differentiate between bullies, victims, and witnesses; rather, they made distinctions among the methods used for the aggressive act (i.e. sending mean messages or posting embarrassing pictures). In general, it appears that adolescents differentiated themselves as individuals who participated in specific mode of online aggression, rather than as individ- uals who played a particular role in online aggression. This distinction is discussed in terms of policy and educational implications.
! 2011 Elsevier Ltd. All rights reserved.
1. Introduction
Despite the prevalent use of Information Communication Tech- nologies (ICTs) in the lives of adolescents, we are only beginning to understand how the internet or cell phones are influencing adoles- cents’ communication skills and social relationships. Research shows that adolescents use the internet to seek out opportunities to interact with school-based peers (Gross, Juvonen, & Gable, 2002), overcome shyness, and facilitate social relationships (Maczewski, 2002; Valkenburg, Schouten, & Peter, 2005). In con- junction with this, however, it also appears that adolescents use the internet as an arena for bullying (Li, 2007; Raskauskas & Stoltz, 2007). As cyberbullying, or internet aggression increase in promi- nence (e.g., Hinduja & Patchin, 2008; Ybarra & Mitchell, 2004), it becomes important to determine exactly what this form of aggres- sion is, as well as how and why it manifests.
The construct of bullying/aggression that occurs online has yet to be properly defined. The lack of a clear definition prevents a full understanding of this construct and how it relates to developmen- tal outcomes; a task that must be undertaken in order to accurately understand and address the social and emotional outcomes associ- ated with this phenomenon. Indeed, there is little consensus about what to even call it, with terms like online aggression, cyberbully- ing, internet harassment, and electronic aggression used in the literature (Dooley, Pyzalski, & Cross, 2009; Kowalski, Limber, & Agatston, 2008; Smith, 2009). One approach to this lack of clarity has been to assume that online bullying functions in a manner sim- ilar to more traditional forms of bullying – that the nature of it, in essence, is similar, but that the venue is unique (Dooley et al., 2009). This practice has led policy makers and educators to apply a ‘‘one size fits all’’ approach to reducing aggressive incidents that occur online by using the same strategies they would for tradi- tional bullying. Unfortunately, given the lack of evidence that off- line and online forms of bullying are functionally similar, the efficacy of these strategies remains questionable. The current work begins to address this gap in the literature. Specifically, in a series of two studies, we first explore the utility of traditional measures
0747-5632/$ – see front matter ! 2011 Elsevier Ltd. All rights reserved. doi:10.1016/j.chb.2011.09.004
! Corresponding author. Address: Educational and Counselling Psychology and Special Education, Faculty of Education, 2125 Main Mall, Vancouver, BC, Canada V6T 1Z4. Tel.: +1 778 327 8679; fax: +1 604 822 3302.
E-mail address: [email protected] (D.M. Law).
Computers in Human Behavior 28 (2012) 226–232
Contents lists available at SciVerse ScienceDirect
Computers in Human Behavior
journal homepage: www.elsevier.com/locate/comphumbeh
Author's personal copy
of bullying for capturing online experiences, and then use these re- sults to explore more sensitive ways of measuring it.
1.1. Offline bullying vs. cyberbullying
As noted, some researchers have supported the hypothesis that electronic media is simply another medium through which youth who already aggress offline, can now aggress online (Patterson, Dishion, & Yoerger, 2000; Werner & Crick, 2004; Werner, Bumpus, & Rock, 2010). However, burgeoning literature argues that online and offline aggression are not the same and that more research is warranted to properly examine the underlying differences (Dooley et al., 2009; Werner & Bumpus, 2010; Ybarra, Diener-West, & Leaf, 2007). Examining existing definitions of bullying (Olweus, 1991), different forms of bullying (Craig, Pepler, & Atlas, 2000; Salmivalli, Kaukiainen, & Lagerspetz, 2000; Underwood, 2003) as well as the different roles individuals play in a bullying situation (Macklem, 2003; Rigby, 2008; Salmivalli, Lagerspetz, Bjorkqvist, Osterman, & Kaukiainen, 1996) can provide some insight into where these dif- ferences might lie.
1.1.1. Definitional issues The most common definition of bullying is based on Olweus’s
(1991, 1993) definition, which states that ‘‘. . .a person is being bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons’’ (p. 9). Three characteristics are emphasized: (1) a power differential between those who bully and those who are victimized; (2) repeated harm over time; and (3) an intention to harm (Olweus, 1991, Pellegrini & Bartini, 2001; Smith & Boulton, 1990; Vaillancourt, Hymel, & McDougall, 2003), although spontaneous lay definitions of bullying by both educators (Hazler, Miller, Carney, & Green, 2001) and youth (Vaillancourt et al., 2008) do not typically recognize these components. It also remains unclear whether these characteristics are consistently present in online instances of bullying. Even if they are present, they may function in very different ways. For instance, physical bullying often involves a larger individual exerting his/her physical power over a smaller or weaker individual (Atlas & Pepler, 1998). In an online environment, however, physical size no longer holds power, as even the smallest and least physically powerful individual can engage in cyberbullying. Similar arguments have been made regarding the potential power of having high social status. Even the most unpopular, socially ostracized individuals can operate as a bully over the internet. The power differential that distin- guishes bullying from other forms of aggression is still present in online bullying situations, but that the nature of this power is different. Those who are more technologically savvy may hold the power. More generally, Dooley and colleagues (2009) contend that power in an online environment is not based on the perpetra- tor’s possession of power, but rather on the victim’s lack of power.
Although some authors have argued that critical, single incident events can also constitute bullying (e.g., Arora, 1996; Randall, 1996), repetition over time is another distinguishing characteristic of bullying emphasized in the literature (Olweus, 1991). As was the case with power differentials, it is also unclear how this defini- tional aspect translates to online forms of aggression. We know that young people report being victimized online rather infre- quently compared to offline bullying (Gradinger, Strohmeier, & Spiel, 2009); However, given the archival nature of the internet (i.e. content that is uploaded or posted on the internet is often available in perpetuity; Viegas, 2005), victims (and bullies) can repeatedly re-read, re-look at, or re-watch the aggravating inci- dents and ‘relive’ the experience. Moreover, with online bullying individuals are no longer restricted by time (Walther, 2007); while
offline bullying must occur in ‘‘real time’’, electronic aggression can be executed anywhere and at any time.
1.1.2. Is it just social aggression? Bullying researchers tend to distinguish among three main
forms of bullying: (1) physical bullying, (e.g. hitting, punching, kicking; Craig et al., 2000), (2) verbal bullying (e.g. yelling, cursing, name calling; Salmivalli et al., 2000), and (3) social bullying (e.g. excluding others, gossip and rumour spreading; Underwood, 2003). Initial hypothesizing about cyberbullying suggested that it was simply social bullying being expressed in a virtual way (Beran & Li, 2005; Li, 2007); However, there is evidence to suggest that the degree of visual anonymity afforded by an online environment pro- vides a sense of privacy and protection, such that individuals feel comfortable and powerful saying things they would not normally say offline (Peter, Valkenburg, & Schouten, 2005; Ward & Tracey, 2004). As such, even if the nature of social bullying is highly con- sistent with cyberbullying (e.g., gossip, public humiliation, rumour spreading, etc.), there are particular characteristics associated with the medium used for cyberbullying that nullifies our understand- ings of who the perpetrators are likely to be.
1.1.3. Bully, victim, bystander Previous work has demonstrated that individuals can play a
variety of roles in a bullying situation (Salmivalli et al., 1996). However, most studies have distinguished among three main roles: bullies, victims, and bystanders (cf., witnesses; Macklem, 2003; Rigby, 2008). Research has found that the number of bystanders observing a bullying situation can be a source of power to the perpetrator (e.g., Twemlow, Fonagy, Sacco, & Hess, 2001). For example, in a schoolyard fight, bullies often report being ‘egged on’ by the crowd that has gathered to watch (Burns, Maycock, Cross, & Brown, 2008). It is unclear whether this transfer of power from bystander to bully occurs in an online setting, given that the number of witnesses in an online environment remains largely un- known, but can range from a few individuals to hundreds or even thousands.
Moreover, there may be a blurring of roles unique to cyberbul- lying. For example, if a person decides to share or post something that was initiated by somebody else, have they now switched from bystander to bully? Similarly, does the victim who retaliates (often in a rapid-fire fashion) after being persecuted online suddenly be- come a bully as well as a victim? It is not clear whether these on- line ‘bully/victims’ are similar to the bully/victims identified by more traditional forms of bullying, who tend to score less favorably on psychosocial measures and report the highest levels of problem behaviors (e.g., Haynie et al., 2001). Given the growing body of re- search that has identified the high number of bully/victims (e.g., individuals who are both the target and the perpetrator) involved in cyberbullying situation (Authors, submitted; Kowalski & Limber, 2007; Werner & Bumpus, 2010; Ybarra & Mitchell, 2004), and the low frequency of bully/victims in traditional bullying situations (Kaukiainen et al., 2002; Pelligrini, 2001), this is something that needs to be explored further.
In sum, it is clear that current research has not yet determined how online and offline bullying are related and/or distinct. One reason for this is the lack of a clear definition for cyberbullying and the absence of a well-accepted measure of the construct. The present study is a preliminary step toward exploring whether youth respond to questions about the role they play in online aggressive situations in the same way they do when it comes to traditional bullying. In a series of two studies, exploratory factor analysis (EFA) and confirmatory factor analysis (CFA) were used to explore whether cyberbullying/electronic aggression can be measured using the same types of items used for measuring tradi- tional bullying.
D.M. Law et al. / Computers in Human Behavior 28 (2012) 226–232 227
Author's personal copy
2. Study I
The primary purpose of Study I was to determine whether on- line aggression was a unique construct, or whether it functioned similarly to traditional bullying constructs for adolescents. Accord- ingly, exploratory and confirmatory factor analyses were con- ducted to determine whether adolescents differentiated cyberbullying/victimization items from physical, verbal, and social bullying/victimization items. Based on the literature review above, which calls into question assumed similarities between traditional forms of bullying and cyberbullying, it was hypothesized that cyberbullying/victimization has its own unique factor structure that cannot be interpreted or examined in the same ways as offline bullying. In addition, this work questions whether cyberbullying is simply another venue for social bullying; in this vein, it was pre- dicted that if cyberbullying is merely another arena for social bul- lying, then social and cyberbullying items would load together in the factor analyses.
2.1. Participants
Data for this study were drawn from a larger, district-wide ef- fort to evaluate the social experiences of secondary school youth. Given the data were collected by and for schools, passive consent procedures were employed. Parents were informed of the study through email and newsletters and could request their child(ren) be withdrawn from participation. The initial sample included 19,551 participants, which represented approximately 80% of an entire school district’s high school population in the Lower Main- land of British Columbia, including all students who were present on the date the survey was administered. After removing missing data using listwise deletion, the final sample included 17,551 par- ticipants (49% female) between grades 8 and 12 (ages 14–18). The participants were distributed equally across grade levels (ranging from 19.1% to 20.8%). The population was ethnically diverse, with 54% of participants being of East Asian descent, 19% being Cauca- sian, and 9% being of mixed ethnicity. The remaining students – who were of Aboriginal, African/Caribbean, South Asian, Latin American, and Middle Eastern – comprised approximately 2% each of the sample.
2.2. Measures
The ‘‘Safe Schools and Social Responsibility Survey for Second- ary Students’’ asked adolescents to report on a broad range of so- cial experiences, including school safety and belonging, adult and peer support, self-esteem, violence, drug and alcohol use, activity participation, social responsibility behavior, racial discrimination, sexual harassment, sexual orientation discrimination, and bullying. The present study examined differences in the prevalence of re- ported online vs. offline aggression, and considered only items tap- ping student reports of both bullying and victimization. Specifically, participants were asked to rate how often they had experience with ‘‘bullying and harassment’’ generally, as well as specific forms of ‘‘physical bullying’’, ‘‘verbal bullying’’, ‘‘social bul- lying’’ as a victim (i.e., ‘‘had this done to me’’) and as a bully (i.e., ‘‘took part in doing this to others’’). In addition, they were asked to rate how often they had experience with cyberbullying ‘‘at school’’ and ‘‘outside of school,’’ and ‘‘cyberbullying that caused problems at school’’ as both victim (i.e., ‘‘had this done to me’’) and bully (i.e., ‘‘took part in doing this to others’’). Following Vaillancourt and colleagues (2008), each form of bullying and victimization item was defined with examples in order to increase precision in measurement. Participants responded to all items on four-point Likert scales, ranging from ‘‘never’’ to ‘‘every week or
more’’. This measure had high internal consistency (a = .91). The majority of responses for each of the items are at the low-end (i.e. Never) of the scale. Specifically, a mean of 6% of participants took part in bullying others once a month or more, and a mean of 8% reported being victimized by some form of bullying about once a month or more.
2.3. Analysis and results
To evaluate the factor structure of student reports of different types of bullying, LISREL 8.54 was used to conduct an initial exploratory factor analysis (EFA) using 50% of the total sample (n = 8697) chosen at random. The EFA was applied to polychoric correlations in order to account for the ordinal nature of the data. The unweighted least squares (or MINRES in LISREL) method of extraction was used because it makes no assumption of multivar- iate normality and is recommended with the use of polychoric correlations (Joreskog & Sorbom, 1993). A Promax rotation strategy was chosen to allow for the factors to be correlated. The EFA was first run on all 14 items of the bullying and harassment portion of the survey which, as noted above, included three traditional forms of bullying (physical, verbal, social) and three cyberbullying items (in school, outside of school, outside of school but caused problems in school).
The polychoric correlations revealed that the items were highly correlated (i.e., r > .7). Three factors with eigenvalues greater than 1.0 (8.94, 1.55, and 1.26, respectively) emerged from the EFA. In addition, assessment of the reproduced correlations indicated that only 18% of the residuals were non-redundant and had absolute values greater than .05. When the observed correlations were sub- tracted from the reproduced correlations, 82% were near–zero, lending further support for the three-factor model as a good fit for the data. The three factors could be labeled as (a) cyberbully- ing/victimization, (b) traditional bullying, and (c) traditional vic- timization (see Table 1).
The rotated solution confirmed ‘very good’ to ‘excellent’ factor loadings for two of the three factors: traditional bullying and tradi- tional victimization (see Table 1), based on Comrey and Lee’s (1992) suggestion that loadings above .71 are considered excellent, .63 are very good, .55 are good, .45 are fair, and .32 are poor. The
Table 1 Unweighted least squares factor analysis pattern matrix for bullying and victimiza- tion items.
Item Factor
1 2 3
Cyberbullying and cybervictimization Cyberbullying at school to me .795 .304 Cyberbullying caused problems at school to me .782 .346 Cyberbullying outside of school to me .777 .327 Cyberbullying at school to others .675 .521 Cyberbullying caused problems at school to others .651 .517 Cyberbullying outside of school to others .642 .508
Traditional bullying Verbal bullying (name calling, teasing, threats) to others .879 .207 Bullying and harassment to others .763 .193 Physical bullying (hitting, shoving, kicking, etc.) to
others .764
Social bullying (exclusion, rumours, gossip) to others .629
Traditional victimization Verbal bullying (name calling, teasing, threats) to me .885 Bullying and harassment to me .825 Social bullying (exclusion, rumours, gossip) to me .657 Physical bullying (hitting, shoving, kicking, etc.) to me .616
Note: Only factor loadings of .32 or greater are reported here as is consistent with reporting procedures for factor analyses (Tabachnick & Fidell, 2001). Eigenvalues: Factor 1 = 8.94, factor 2 = 1.55, factor 3 = 1.26.
228 D.M. Law et al. / Computers in Human Behavior 28 (2012) 226–232
Author's personal copy
remaining factor, however, included both cyberbullying and cyber- victimization items; there did not appear to be the same distinc- tion between bullying and victimization. Most of the items loaded strongly on the first extracted factor, with loadings in the very good to excellent range (.64 and above). However, strong to relatively strong crossloadings were also observed between the cyberbullying and traditional bullying items, and between the cybervictimization and traditional victimization items, respec- tively. Nevertheless, although cyberbullying demonstrated some links to traditional bullying, and cybervictimization demonstrated some links to traditional victimization, the stronger associations were observed between the cyberbullying and cybervictimization items.
These results demonstrate there are some discrepancies be- tween online bullying/victimization and offline bullying/victimiza- tion, with the offline bullying items differentiating between bullying and victimization items, regardless of form, while online bullying and victimization items being considered similarly, as a single construct; albeit, one that is related to traditional forms of bullying and victimization (as indicated by the cross-loadings). Moreover, the finding that social aggression and cyberbullying did not load as a single factor lends support to the idea that they are two separate constructs and that cyberbullying is not simply social bullying manifested online.
To further evaluate the three factor model revealed by the EFA, confirmatory factor analysis (CFA), with traditional bullying, tradi- tional victimization, and cyberbullying/victimization as factors, was performed on the remaining 50% of the sample (n = 8854). The CFA model was specified such that each item was allowed to load only on its respective factor; no crossloadings were permitted. The selected fit indices for the CFA were CFI = .99; v2 = 6853.126, p < .001; RMSEA = .102; and SRMR = .092. Except for the CFI, these fit indices indicated rather poor fit (Browne & Cudeck, 1993).
2.4. Study I conclusions
Based on the results of Study I, it was concluded that the cros- sloadings observed in the EFA may have a strong impact on the fit of the three factor model. This demonstrates that the cybervictim- ization and cyberbullying items are not clearly distinguishable from each other, nor from the traditional bullying and victimiza- tion factors. That students clearly distinguished between bullies and victims for traditional bullying, but not for the cyberaggression items is especially noteworthy. One possible explanation for this pattern of response is that students are engaged in reciprocal ban- ter whereby each participant is both the target and the perpetrator. This is consistent with other work in this area (Kowalski & Limber, 2007; Werner & Bumpus, 2010; Ybarra & Mitchell, 2004). However, it is also possible that the questionnaire items assessing cyberbul- lying and victimization were too general (e.g. how often have you had experience with cyberbullying. . . outside of school?) such that the ‘cyber’ aspect of the items superseded any distinction between victim and bully; thus, resulting in poor model fit. Study II ad- dresses this limitation by asking more specific questions.
3. Study II
The results of Study I underscore the need to investigate elec- tronic aggression more closely, and, when it comes to online aggression, it may be important to examine the role adolescents play, rather than the form of aggression (physical, verbal, social). Using the findings from Study I, and previous work on bullying as a guide, the questionnaire administered at Study I was modified for Study II in order to focus specifically on the role (bully, victim, witness) adolescents might identify with in an online aggressive
situation. Questions about witnessing were specifically included in this questionnaire to remain consistent with previous work on bullying that has identified at least three roles an individual might play in an aggressive situation (Macklem, 2003; Rigby, 2008; Salmivalli et al., 1996). Moreover, the number of witnesses in an online environment increases exponentially as compared to traditional offline settings; as such, it becomes important to examine this more closely. Based on the results of Study I and the modification of the questionnaire to focus on the role individ- uals might play in a cyberbullying situation, it was hypothesized that items would differentiate according to three roles: bully, victim, and witness.
3.1. Participants
Following receipt of ethics approval from both the University Behavioural Research Ethics Board and four school districts in southern British Columbia, 1487 elementary and high school stu- dents between the ages of 11 and 18 were invited to participate in a study of internet use. Students who received parental consent for participation in the study and who themselves agreed to partic- ipate completed the paper and pencil questionnaire Social Respon- sibility on the Internet during class time. This questionnaire was developed specifically for the purposes of this study in consulta- tion with researchers with expertise in developmental psychology, socio-emotional learning, technology use, and measurement. The questionnaire took approximately 45 min to complete and was administered by the first author and research assistants.
In total, 733 elementary and high school students (62% female) participated in the study (49% participation rate). After removing missing data, the final sample included 675 participants (62% fe- male). Grade 8 and grade 10 students each comprised 20% of the sample, while grades 6, 7, 9, 11 and 12 students comprised a total of 53% of the sample (approximately 10% per grade). In terms of ethnicity, 45% of the participants were of East Asian descent (e.g., Cambodian, Chinese, Japanese, Korean, Taiwanese, Vietnamese, Fil- ipino), and 34% were of European descent. The remaining ethnic groups included Aboriginal, African/Caribbean, South Asian, Latin American, Middle Eastern, and mixed background; all of whom comprised approximately 2% of the sample. Student responses to a series of Yes/No questions about their access to internet and cell phone technologies indicated that the vast majority of the students (81%) had access to high speed internet, and approximately 60% of participants had their own cell phone.
3.2. Measures
In keeping with traditional bullying research and the strong cross-loadings observed for cyberbullying and cybervictimization items in Study I, the items of the revised measure were designed to have adolescents identify themselves according to role (bully, victim and/or witness). Participants were asked to respond to a ser- ies of nine questions related to the role they play in an online aggressive situation. Specifically, they were asked how often they had experience, as a victim (‘‘done to me’’), bully (‘‘took part in doing it to others’’) and witness (‘‘saw or heard about it’’) with (a) mean things, rumours, or gossip being said through the internet websites, email, or text messaging and (b) how often they had expe- rience with embarrassing pictures or video clips of yourself or people you know being sent or posted on the Internet. Participants were also asked how often they had experience (c) using the Internet or text messaging to send mean messages, spread rumours, or gossip about others?, (d) replying to mean messages about yourself using the inter- net or text messaging? and (e) receiving mean messages about some- body you know over the internet or text messaging. Items were situated on a 3-point, Likert scale ranging from Never to Every week or more.
D.M. Law et al. / Computers in Human Behavior 28 (2012) 226–232 229
Author's personal copy
3.3. Analysis and results
As in Study I, an unweighted least squares EFA on polychoric correlations with promax rotation was used in Study II to deter- mine the factor structure of the revised items. This initial EFA used 50% of the total sample (n = 339), chosen at random. Only two fac- tors emerged (rather than the hypothesized three) with eigen- values greater than one (4.75 and 1.20, respectively). The items seemed to load according to method of aggression (modality), rather than role (bully, victim, witness). Specifically, the factors could be described as (1) aggressive messaging and (2) posting embarrassing pictures online.
For both factors, the majority of items had factor loadings with- in the good to excellent range (see Table 2). However, crossloa- dings were found for two items: ‘‘had mean things posted online about me’’ and ‘‘saw mean things posted about others online’’. Upon examining these items it makes sense given that the word ‘‘post’’ is rather vague and could be interpreted as either mean messages or embarrassing pictures. In sum, the findings from the EFA indicated that student responses to inquiries about online aggression again did not load according to bully, victim, witness (role) as hypothesized, but by modality; similar to the finding from Study I, where role is less distinguishable in an online environ- ment. To test this modality model, two CFA’s were run in follow- up.
The first CFA was conducted to test the two factor modality model that
We are a professional custom writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework.
Yes. We have posted over our previous orders to display our experience. Since we have done this question before, we can also do it for you. To make sure we do it perfectly, please fill our Order Form. Filling the order form correctly will assist our team in referencing, specifications and future communication.
1. Click on the “Place order tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
2. Fill in your paper’s requirements in the "PAPER INFORMATION" section and click “PRICE CALCULATION” at the bottom to calculate your order price.
3. Fill in your paper’s academic level, deadline and the required number of pages from the drop-down menus.
4. Click “FINAL STEP” to enter your registration details and get an account with us for record keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
5. From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.
Need help with this assignment?
Order it here claim 25% discount
Discount Code: SAVE25