Assessing the relationship between cyber and traditional forms of bullying and sexual harassment: Stepping stones or displacement?

Vol.14,No.2(2020)

Abstract

The purpose of this study was to determine whether cyberbullying and cyber-sexual harassment perpetration serve as antecedents or stepping stones to traditional bullying and sexual harassment, or whether traditional bullying and sexual harassment victimization encourage displacement in the form of anonymous aggressive activities like cyberbullying and cyber-sexual harassment. This research question was evaluated in a sample of 2,039 (52% female) high school students from the Illinois Study of Bullying and Sexual Violence (ISBSV) using two waves of longitudinal data. Two hypotheses were tested in two separate analyses, using bullying and cyberbullying data in one analysis, and sexual harassment and cyber-sexual harassment data in the other analysis. The stepping-stone hypothesis predicted that children would use the anonymity of cyber-bullying/harassment as a stepping stone or learning curve toward eventual involvement in face-to-face bullying/harassment. The displacement hypothesis, by contrast, held that children victimized face-to-face with traditional forms of bullying/harassment would seek release from their victimization by engaging in the largely anonymous activities of cyberbullying and cyber-sexual harassment. In both the bullying and harassment analyses, the pathway running from traditional bullying/harassment victimization to cyber-bullying/harassment perpetration proved significant, consistent with the displacement hypothesis. The pathway running from cyber aggression to traditional aggression failed to achieve significance in both the bullying and harassment analyses, providing no support for the stepping-stone hypothesis. These results imply that anonymity plays an important role in linking traditional and cyber forms of bullying and harassment.


Keywords:
Bullying; sexual harassment; cyber-behavior
Author biographies

Glenn D. Walters

Kutztown University, Kutztown, Pennsylvania, USA

Glenn D. Walters, Ph.D., is a Professor in the Department of Criminal Justice at Kutztown University in Kutztown, Pennsylvania. His research interests include criminal thinking, mediation and moderation analysis, and the relationships between bullying victimization, bullying perpetration, and delinquency.

Dorothy L. Espelage

University of North Carolina at Chapel Hill, Chapel Hill, North Carolina, USA

Dorothy L. Espelage, Ph.D., is the William C. Friday Distinguished Professor of Education at the University of North Carolina at Chapel Hill in Chapel Hill, North Carolina. She has authored over 140 peer-reviewed journal articles, five edited books, and 30 chapters on traditional and cyber-bullying, homophobic teasing, sexual harassment, dating violence, and gang violence.

References

Akers, R. L. (1998). Social learning and social structure: A general theory of crime and deviance. Northeastern University Press.

Allison, P. D. (2012). Handling missing data by maximum likelihood. In Proceedings of SAS Global Forum 2012 (Paper 312-2012). SAS Institute. https://support.sas.com/resources/papers/proceedings12/312-2012.pdf

Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice Hall.

Barlett, C. P., & Gentile, D. A. (2012). Attacking others online: The formation of cyberbullying in late adolescence. Psychology of Popular Media Culture, 1(2), 123–135. https://doi.org/10.1037/a0028113

Barlett, C. P., & Kowalewski, D. A. (2019). Learning to cyberbully: An extension of the Barlett Gentile cyberbullying model. Psychology of Popular Media Culture, 8(4), 437–443. http://dx.doi.org/10.1037/ppm0000183

Basile, K. C., Espelage, D. L., Rivers, I., McMahon, P. M., & Simon, T. R. (2009). The theoretical and empirical links between bullying behavior and male sexual violence perpetration. Aggression and Violent Behavior, 14(5), 336–347. https://doi.org/10.1016/j.avb.2009.06.001

Baumeister, R. F., Dale, K., & Sommer, K. L. (1998). Freudian defense mechanisms and empirical findings in modern social psychology: Reaction formation, projection, displacement, undoing, isolation, sublimation, and denial. Journal of Personality, 66(6), 1081–1095. https://doi.org/10.1111/1467-6494.00043

Brochado, S., Soares, S., & Fraga, S. (2017). A scoping review on studies of cyberbullying prevalence among adolescents. Trauma, Violence, & Abuse, 18(5), 523–531.

Bryant, A. L. (1993). Hostile Hallways: The AAUW Survey on Sexual Harassment in America's Schools. Journal of School Health, 63(8), 355–357. https://doi.org/10.1111/j.1746-1561.1993.tb07153.x

Bureau of Justice Statistics. (2017). School Crime Supplement (SCS) to the National Crime Victimization Survey (NCVS). Department of Justice.

Choi, K.-S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308–333. https://www.cybercrimejournal.com/Choiijccjan2008.htm

Choi, K.-S., & Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. Computers in Human Behavior, 73, 394–402. https://doi.org/10.1016/j.chb.2017.03.061

Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589

Cole, D. A., & Maxwell, S. E. (2003). Testing mediational models with longitudinal data: Questions and tips in the use of structural equation modeling. Journal of Abnormal Psychology, 112(4), 558–577. https://doi.org/10.1037/0021-843X.112.4.558

Collins, L. M., Schafer, J. L., & Kam, C.-M. (2001). A comparison of inclusive and restrictive strategies in modern missing data procedures. Psychological Methods, 6(4), 330–351. https://doi.org/10.1037/1082-989X.6.4.330

Dabas, N. (2018). Role of computer and information technology in education system. International Journal of Engineering and Technique, 4(1), 570–574. https://doi.org/10.29126/23951303/IJET-V4I1P78

Datta, P., Cornell, D., & Huang, F. (2016). Aggressive attitudes and prevalence of bullying bystander behavior in middle school. Psychology in the Schools, 53(8), 804–816. https://doi.org/10.1002/pits.21944

Doty, J. L., Gower, A. L., Rudi, J. H., McMorris, B. J., & Borowsky, I. W. (2017). Patterns of bullying and sexual harassment: Connections with parents and teachers as direct protective factors. Journal of Youth and Adolescence, 46(11), 2289–2304. https://doi.org/10.1007/s10964-017-0698-0

Duggan, M. (2017, July 11). Online harassment 2017. Pew Research Center: Internet & Technology. https://www.pewresearch.org/internet/2017/07/11/online-harassment-2017/

Eliot, M., & Cornell, D. G. (2009). Bullying in middle school as a function of insecure attachment and aggressive attitudes. School Psychology International, 30(2), 201–214. https://doi.org/10.1177/0143034309104148

Endresen, I. M., & Olweus, D. (2001). Self-reported empathy in Norwegian adolescents: Sex differences, age trends, and relationship to bullying. In A. C. Bohart, & D. J. Stipek (Eds.), Constructive and destructive behavior: Implications for family, school, and society (pp. 147-165). American Psychological Association.

Espelage, D. L., & Holt, M. K. (2001). Bullying and victimization during early adolescence. Journal of Emotional Abuse, 2(2–3), 123–142. https://doi.org/10.1300/J135v02n02_08

Espelage, D. L., Holt, M. K., & Henkel, R. R. (2003). Examination of peer-group contextual effects on aggression during early adolescence. Child Development, 74(1), 205–220. https://doi.org/10.1111/1467-8624.00531

Espelage, D. L., Low, S. K., Anderson, C., & De La Rue, L. (2014). Bullying, sexual, and dating violence trajectories from early to late adolescence (Report No. 246830). https://www.ncjrs.gov/pdffiles1/nij/grants/246830.pdf

Farrington, D. P., & Baldry, A. C. (2010). Individual risk factors for school bullying. Journal of Aggression, Conflict and Peace Research, 2(1), 4–16. https://doi.org/10.5042/jacpr.2010.0001

Gan, S. S., Zhong, C., Das, S., Gan, J. S., Willis, S., & Tully, E. (2014). The prevalence of bullying and cyberbullying in high school: A 2011 survey. International Journal of Adolescent Medicine and Health, 26(1), 27–31. https://doi.org/10.1515/ijamh-2012-0106

Hill, C., & Kearl, H. (2011). Crossing the line: Sexual harassment at school. American Association of University Women. https://www.aauw.org/app/uploads/2020/03/Crossing-the-Line-Sexual-Harassment-at-School.pdf

Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129–156. https://doi.org/10.1080/01639620701457816

Hong, J. S., & Espelage, D. L. (2012). A review of research on bullying and peer victimization in school: An ecological system analysis. Aggression and Violent Behavior, 17(4), 311–322. https://doi.org/10.1016/j.avb.2012.03.003

Kearl, H. (2018). The facts behind the #metoo movement: A national study on sexual harassment and assault. Stop Street Harassment. http://www.stopstreetharassment.org/wp-content/uploads/2018/01/Full-Report-2018-National-Study-on-Sexual-Harassment-and-Assault.pdf

Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41(6, Suppl. 1), S22–S30. https://doi.org/10.1016/j.jadohealth.2007.08.017

Kowalski, R. M., Limber, S. P., & Agatston, P. W. (2012). Cyberbullying: Bullying in the digital age (2nd ed.). Wiley-Blackwell.

Kowalski, R. M., Limber, S. P., & McCord, A. (2019). A developmental approach to cyberbullying: Prevalence and protective factors. Aggression and Violent Behavior, 45, 20–32. http://doi.org/10.1016/j.avb.2018.02.009

Leemis, R. W., Espelage, D. L., Basile, K. C., Mercer Kollar, L. M., & Davis, J. P. (2019). Traditional and cyber bullying and sexual harassment: A longitudinal assessment of risk and protective factors across the social ecology. Aggressive Behavior, 45(2), 181–192. https://doi.org/10.1002/ab.21808

Lindberg, S. M., Grabe, S., & Hyde, J. S. (2007). Gender, pubertal development, and peer sexual harassment predict objectified body consciousness in early adolescence. Journal of Research on Adolescence, 17(4), 723–742. https://doi.org/10.1111/j.1532-7795.2007.00544.x

Low, S., & Espelage, D. (2013). Differentiating cyber bullying perpetration from non-physical bullying: Commonalities across race, individual, and family predictors. Psychology of Violence, 3(1), 39–52. https://doi.org/10.1037/a0030308

McConville, D. W., & Cornell, D. G. (2003). Aggressive attitudes predict aggressive behavior in middle school students. Journal of Emotional and Behavioral Disorders, 11(3), 179–187. https://doi.org/10.1177/10634266030110030501

McMaster, L. E. (2001). The role of harassment-supporting attitudes, aggressive behaviours, and peer context in adolescent sexual harassment: A developmental-contextual approach (UMI No. NQ59148) [Doctoral Dissertation, York University]. ProQuest Dissertations and Theses database.

Muthén, L. K., & Muthén, B.O. (1998–2017). Mplus user’s guide (8th ed.). Muthén & Muthén.

Olweus, D. (1993). Bullying at school: What we know and what we can do. Blackwell.

Peyre, H., Leplège, A., & Coste, J. (2011). Missing data methods for dealing with missing items in quality of life questionnaires: A comparison by simulation of personal mean score, full information maximum likelihood, multiple imputation, and hot deck techniques applied to the SF-36 in the French 2003 decennial health survey. Quality of Life Research, 20, 287–300. http://doi.org/10.1007/s11136-010-9740-3

Schumann, L., Craig, W., & Rosu, A. (2014). Power differentials in bullying: Individuals in a community context. Journal of Interpersonal Violence, 29(5), 846–865. https://doi.org/10.1177/0886260513505708

Shadish, W. R, Cook, T. D., & Campbell, D. T. (2002). Experimental and quasi-experimental designs for generalized causal inference. Mifflin.

Tharp, A. T., DeGue, S. Valle, L. A., Brookmeyer, K. A., Massetti, G. M., & Matjasko, J. L. (2013). A systematic qualitative review of risk and protective factors for sexual violence perpetration. Trauma, Violence, & Abuse, 14(2), 133–167. https://doi.org/10.1177/1524838012470031

Vaillancourt, T., Faris, R., & Mishna, F. (2017). Cyberbullying in children and youth: Implications for health and clinical practice. Canadian Journal of Psychiatry, 62(6), 368–373. https://doi.org/10.1177/0706743716684791

Vandebosch, H., & Van Cleemput, K. (2009). Cyberbullying among youngsters: Profiles of bullies and victims. New Media & Society, 11(8), 1349–1371. https://doi.org/10.1177/1461444809341263

Walters, G. D. (2020). School-age bullying victimization and perpetration: A meta-analysis of prospective studies and research. Trauma, Violence, & Abuse. Advance online publication. https://doi.org/10.1177/1524838020906513

Walters, G. D., & Espelage, D. L. (2018a). From victim to victimizer: Hostility, anger, and depression as mediators of the bullying victimization–bullying perpetration association. Journal of School Psychology, 68, 73–83. https://doi.org/10.1016/j.jsp.2017.12.003

Walters, G. D., & Espelage, D. L. (2018b). Resurrecting the empathy–bullying relationship with a pro-bullying attitudes mediator: The Lazarus effect in mediation research. Journal of Abnormal Child Psychology, 46(6), 1229–1239. https://doi.org/10.1007/s10802-017-0355-9

Wolke, D., Lee, K., & Guy, A. (2017). Cyberbullying: A storm in a teacup? European Child & Adolescent Psychiatry, 26(8), 899–908. https://doi.org/10.1007/s00787-017-0954-6

Ybarra, M. L., Espelage, D. L., & Mitchell, K J. (2007). The co-occurrence of Internet harassment and unwanted sexual solicitation victimization and perpetration: Associations with psychosocial indicators. Journal of Adolescent Health, 41(6, Suppl. 1) S31–S41. https://doi.org/10.1016/j.jadohealth.2007.09.010

Ybarra, M., Leaf, P. J., & Diener-West, M. (2004). Sex differences in youth-reported depressive symptomatology and unwanted internet sexual solicitation. Journal of Medical internet Research, 6(1), Article e5. https://doi.org/10.2196/jmir.6.1.e5

Ybarra, M. L., & Thompson, R. E. (2018). Predicting the emergence of sexual violence in adolescence. Prevention Science, 19(4), 403–415. https://doi.org/10.1007/s11121-017-0810-4

Additional information

Editorial Record:

First submission received:
June 29, 2019

Revisions received:
January 13, 2020
March 5, 2020

Accepted for publication:
April 2, 2020

Editor in charge:
Lenka Dedkova

Full text

Introduction

The technological advances made possible by the internet and other corollaries of the cyber-revolution have produced growing opportunities for both positive and negative involvements. On the one hand, the internet has increased people’s access to information and made a number of tasks, from paying bills to finding a date, more efficient and less daunting. On the other hand, the internet has opened up new avenues for criminal and non-criminal antisocial behavior. Two forms of antisocial behavior that could be considered offshoots of the cyber-revolution are cyberbullying and cyber-sexual harassment. Bullying and sexual harassment have been around for centuries, but their prevalence may have increased in recent years (Bureau of Justice Statistics, 2017; although see Wolke et al., 2017, for an alternate view). If so, to what can we attribute this increase? Cyberbullying and cyber-sexual harassment, as antecedents of traditional (in-person) bullying and sexual harassment, respectively, are two such possibilities. Accordingly, the current investigation sought to determine whether cyberbullying and cyber-sexual harassment serve as potential antecedents or stepping stones to traditional bullying and sexual harassment and whether traditional bullying and sexual harassment victimization provide avenues to cyberbullying and sexual harassment perpetration through a process of displacement in a variable-level analysis of high school students’ responses to survey questions administered one year apart.

Traditional and Cyber Forms of Interpersonal Aggression

The prevalence of cyberbullying varies as a function of demographics (age, sex, and race), time frame (last month, last year, or lifetime) and whether a broad or narrow definition is employed (Kowalski et al., 2019). This variability has produced a wide range of prevalence rates. In a review of 159 prevalence studies, for instance, Brochado et al. (2016) observed rates of past year cyberbullying victimization that ranged from 1% to 61% and lifetime estimates that ranged from 5% to 65%. Cyberbullying perpetration, by comparison, ranged from 3% to 39% for the past year and from 1% to 44% over the lifetime. There is less information on the prevalence of cyber-sexual harassment victimization and perpetration than there is on cyberbullying, but the data that are available suggest that it too is a major health issue for young adults and juveniles. In a recent national survey of American adults, 41% of women and 22% of men reported being victimized by cyber-sexual harassment (Kearl, 2018). In an earlier survey of students in grades 7-12, 44% reported being sexually harassed face-to-face, 30% reported being sexually harassed online, 15% reported engaging in face-to-face sexual harassment, and 10% reported involvement in cyber-sexual harassment (Hill & Kearl, 2011). It would appear then that traditional and cyber forms of interpersonal aggression are quite common in children, adolescents, and adults.

Bullying (defined as behavior, often performed repeatedly and designed to harm, hurt, or humiliate another person physically or emotionally) and sexual harassment (defined as behavior of a clearly sexual nature, often performed repeatedly with the intention of harming, hurting, or humiliating another person physically or emotionally) have typically been studied separately (Espelage et al., 2003), although the two behavior have been found to overlap moderately. For instance, impulsivity, substance misuse, anger, low empathy, weak social support, and exposure to neighborhood violence have been found to correlate with both bullying and sexual harassment perpetration (Basile et al., 2009; Endresen & Olweus, 2001; Farrington & Baldry, 2010; Hong & Espelage, 2012; Low & Espelage, 2013; Tharp et al., 2013). Traditional bullying and cyberbullying also share some of the same risk factors, to include low peer support, anger, and traditional masculinity (Leemis et al., 2019; Low & Espelage, 2013). High self-esteem and exposure to pornography, on the other hand, are common risk factors for traditional and cyber sexual harassment (Leemis et al., 2019). In a latent class analysis of student reports of traditional and cyber bullying and traditional sexual harassment perpetration and victimization, Doty et al. (2017) discovered that 7% of the students scored high in all areas assessed, 6% fell into a physical bullying perpetration latent class, and 8% were assigned to a sexual harassment perpetration and victimization class. Leemis et al. (2019) performed a similar analysis on a separate group of participants and found roughly the same percentages, although their low risk group was somewhat smaller than the one identified by Doty et al. (50% vs. 62%).

Connecting the Different Forms of Traditional and Cyber Interpersonal Aggression

There are several ways in which traditional and cyber interpersonal aggression may be connected. One way is by using traditional bullying/harassment to hone one’s cyberbullying and harassment skills. Such a pattern might exist in a society where children do not have access to the internet until mid-adolescence but that is clearly no longer the case in the United States. An alternate and perhaps more defensible conceptualization is that children learn the techniques of bullying, not only from each other, as postulated by social learning theory (Akers, 1998; Bandura, 1986), but also by experimenting with bullying in a relatively safe environment. Although the internet can present dangers to a child or adult, it can also provide a relatively safe environment for bullying/harassment given the anonymity and low likelihood of detection it provides compared to traditional forms of bullying and sexual harassment. This is particularly true if the individual has been schooled in cyber technology. In recent years there has been a trend in education toward greater use of information technology, cyberlearning, and cyber-classrooms to instruct students (Dabas, 2018). It would therefore not be unusual for a child to use the internet to master a behavior, whether it be math or bullying. Accordingly, the first model tested in this study proposed that cyberbullying and harassment serve as stepping stones to traditional bullying and harassment by providing the individual with the opportunity to learn skills and techniques for bullying/harassment within the relatively safe confines of the internet.

Another possible explanation for the association between cyber and traditional bullying and sexual harassment, which like the stepping-stone explanation, capitalizes on the anonymity of cyberbullying/harassment, is a process we refer to as displacement. In this case, traditional forms of interpersonal violence precede rather than follow cyber interpersonal violence, and rather than running from perpetration to perpetration, like the stepping-stone pattern, the effect runs from victimization to perpetration. A student victimized by bullying or sexual harassment may not possess the physical strength, size, confidence, or social status to retaliate directly one-on-one. Cyberbullying and cyber-sexual harassment offer such individuals an alternative means of achieving interpersonal control in response to being victimized. Bullying has traditionally been defined as interpersonal aggression characterized by a power imbalance (Olweus, 1993; Schumann et al., 2014). Cyberbullying and cyber-sexual harassment can create a shift in power, whereby the individual goes from victim in a face-to-face bullying or harassment encounter, to perpetrator in a cyber bullying or harassment encounter where they know the victim, but the victim may not know them. The power imbalance goes from one based on physical strength or social status to one based on knowledge. The displacement referred to here is similar to the Freudian defense mechanism of the same name (Baumeister et al., 1998), except that instead of redirecting one’s anger toward a less threatening object, one selects a less threatening option or venue in which to express the anger (i.e., engaging in an episode of cyberbullying/harassment instead of a face-to-face encounter).

Current Study

Research has traditionally shown that cyberbullying increases from middle school to high school, whereas traditional bullying decreases from middle school to high school (Hinduja & Patchin, 2008; Vandebosch & Van Cleemput, 2009). On the basis of these results, it could be argued that traditional bullying is more likely to precede cyberbullying than the other way around. However, more recent surveys indicating that cyberbullying is more widespread in middle and high school students than previously thought (Gan et al., 2014; Vaillancourt et al., 2017), coupled with the results of a recent study by Barlett and Kowalewski (2019), suggest otherwise. In their study, Barlett and Kowalewski (2019), using longitudinal data divided into waves separated by three weeks, discovered that anonymity perceptions at Wave 1 predicted pro-cyberbullying attitudes at Wave 2, and that pro-cyberbullying attitudes at Wave 2 predicted cyberbullying at Wave 3. Under cover of anonymity, cyberbullying and cyber-sexual harassment may provide a child unwilling to directly bully or harass a classmate with the opportunity to do so online (Kowalski et al., 2012). In this way, cyberbullying and cyber-sexual harassment could serve as conduits through which children learn traditional forms of bullying and sexual harassment, similar to how other children learn to bully and harass from observing the interpersonally intrusive actions of their parents, siblings, or peers. This suggests that cyber bullying/harassment perpetration could lead to traditional bullying/harassment perpetration by providing the child with the opportunity to learn the types of attitudes and actions that facilitate the transition from online forms of interpersonal aggression to traditional forms of interpersonal aggression.

There is growing evidence that bullying victimization and perpetration form a reciprocal or bidirectional relationship (Walters, 2020) and there is at least one study showing that sexual harassment victimization and perpetration may do likewise (Ybarra & Thompson, 2018). In searching for a mechanism capable of explaining the victimization–perpetration nexus, Walters and Espelage (2018a) discovered that a hostile attitude toward others mediated the relationship between prior bullying victimization and future bullying perpetration. This, however, may explain the relationship, only in part. A youth who is small, weak, or low on the school social hierarchy has few opportunities to strike back at his or her tormentors. Their victim must therefore be smaller, weaker, or even lower on the social hierarchy than them. The child must therefore find an alternative means of expressing their anger and hostility. One alternate avenue by which small, weak, or socially rejected children express their hostility is through cyber forms of aggression, particularly if the child possesses above average cyber skills. This is how the child shifts the power balance without having to become larger, stronger, or more socially dominate. It’s the displacement of the means by which an individual expresses his or her hostility over being victimized that serves as a second possible explanation for the cyber bullying/harassment–traditional bullying/harassment relationship.

Two sets of analyses were computed as part of the current investigation on the association between traditional and cyber forms of interpersonal aggression. The first set of analyses were conducted on traditional and cyber bullying across two waves of data separated by a year. The first hypothesis tested in these analyses predicted that prior cyberbullying perpetration would correlate positively with a rise in traditional bullying perpetration (stepping-stone hypothesis). The second hypothesis predicted that prior traditional bullying victimization would correlate positively with a rise in cyberbullying perpetration (displacement hypothesis). These same two hypotheses were then tested in a second set of analyses using traditional and cyber sexual harassment in place of traditional bullying and cyberbullying. The same sample and design (longitudinal with one year between waves) were used in both analyses. Repeating the analyses using sexual harassment instead of bullying data was done in order to test the generalizability of the effects obtained in the bullying analyses. Given that the two hypotheses are not necessarily mutually exclusive, it was reasoned that both would receive support in the current set of analyses. Sensitivity testing was conducted on all significant relationships in an effort to determine the specificity of each effect.

Method

Participants

The sample for the current longitudinal study consisted of 2,039 high school students (47.8% male, 52.2% female) from the Illinois Study of Bullying and Sexual Violence (ISBSV: Espelage et al., 2014). This represents 85% of all eligible students enrolled in the three high schools surveyed as part of the ISBSV. The average age of participants in the sample was 15.81 years (SD = 1.04, range = 11‒19) and the racial/ethnic breakdown was 37.2% White, 43.1% African American, 7.9% Hispanic, 3.1% Asian, and 8.0% other. The disproportionate number of African American students in this sample was due, in part, to an influx of minority families in the school districts where the study took place following the closing of several public housing units in Chicago, Illinois. Each year, about 30% of families move out of the school districts where the ISBSV took place.

Waves 6 and 7 of ISBSV data were collected on students from three high schools located in two urban school districts of a mid-western state in 2012 and 2013, respectively. The principal investigator or a research assistant notified students about the research project prior to administering the survey, which took approximately 40-45 minutes to complete. The evaluation was repeated a year later. Confidentiality was guarded by seating between 25 and 40 students in a classroom a meaningful distance from one another. Students were assured that their responses were confidential, their participation was voluntary, and that they could skip any questions that made them feel uncomfortable. In addition, they were informed that they could terminate their participation in the study at any time. After completing the survey, students were instructed on how to contact the research team if they had any questions.

Ethics Approval

Parents provided passive consent for the children to participate in the ISBSV and participants provided their informed assent to complete the survey. The ISBSV was originally approved by the University of Illinois at Urbana-Champaign Institutional Review Board (IRB) and the current secondary data analysis was approved by the Kutztown University IRB.

Measures

Traditional Bullying Victimization

The University of Illinois Victimization scale assessed at Wave 6 of the ISBSV served as one of the independent variables in the bullying analyses. This measure consisted of three items (i.e., “other students picked on me;” “other students called me names;” “I got hit and pushed by other students”) rated for the past 30 days on a five-point frequency scale (0 = never, 1 = once or twice, 2 = three or four times, 3 = five or six times, 4 = seven or more times). When summed across the three items, the scale achieved a Cronbach alpha (α) coefficient of .72 in the current sample of participants. Research indicates that the University of Illinois Victimization scale correlates well with peer nominations of bullying (Espelage et al., 2003) and like the other bullying and sexual harassment scales used in this study, a total score was calculated by summing the individual ratings from each item to form a scale.

Cyberbullying Victimization

Three items from a cyberbullying victimization scale (i.e., “someone made a threatening or aggressive comment to me online;” “someone made a rude or mean comment to me online;” “someone spread rumors about me online, whether they were true or not”) administered at Wave 6 of the ISBSV were used to construct a cyberbullying victimization scale. The items were rated for the past year using the same five-point frequency scale as was used to assess traditional bullying victimization. The internal consistency of this scale, which served as an alternate independent variable in one of the bullying sensitivity analyses, rose to a moderately high level in the current sample of participants (α = .82).

Traditional Bullying Perpetration

Traditional bullying perpetration, as assessed with the Illinois Bully Scale, served as both an independent and dependent variable in the bullying analyses. As an independent variable, it was assessed at Wave 6 of the ISBSV and as a dependent variable it was assessed at Wave 7. The nine items that contribute to the traditional bullying perpetration scale (i.e., “I upset other students for the fun of it;” “I spread rumors about other students,” “I teased other students;” “I teased other students while we were in a group;” “I started arguments or conflicts;” “I helped harass other students;” “I threatened to hit or hurt another student;” “I encouraged people to fight;” “I was mean to someone when I was angry”) were rated for the past 30 days using the same five-point frequency scale as was used to assess traditional and cyberbullying victimization. The concurrent validity of this scale is well established (Espelage et al., 2003) and the scale achieved good internal consistency (α = .83–.84) and adequate construct validity (Comparative Fit Index [CFI] = .91–.93) in the current sample of participants.

Cyberbullying Perpetration

The other independent/dependent variable included in the bullying analyses was a measure of cyberbullying perpetration. The four items on this scale (i.e., “made rude or mean comments to anyone on line;” “spread rumors about someone online, whether or not they were true;” “sent a text message that said mean or rude things;” “made aggressive or threatening comments to anyone on line”) were evaluated for the past year using the same five-point frequency scale as was used with all four bullying measures included in this study. Internal consistency was adequate (α = .76‒.78) and construct validity good (CFI = .99) for these four items across Waves 6 and 7 of the ISBSV. This measure has been tested for and shown evidence of concurrent validity (Ybarra et al., 2007).

Traditional Sexual Harassment Victimization

Traditional in-school sexual harassment victimization and perpetration were assessed with items from the American Association of University Women Educational Foundation (AAUW) Sexual Harassment Survey (Bryant, 1993). Six items from the AAUW were used to assess in-school sexual harassment victimization (i.e., “physically intimidated you in a sexual way;” “spread sexual rumors about you;” “made unwelcome sexual comments, jokes, or gestures to you;” “touched you in an unwelcome sexual way;” “showed you sexy or sexual pictures that you did not want to see;” “forced you to do something sexual you did not want to do”), with each item rated on a four-point scale (0 = never, 1 = rarely, 2 = occasionally, 3 = often). The time frame for the ratings was the past year, the internal consistency was modest (α = .62), and the construct validity was fair (CFI = .88). A manifest variable was constructed by summing the individual scores for these six items for use as an independent variable in the sexual harassment analyses.

Cyber-Sexual Harassment Victimization

An alternate independent variable in the sexual harassment sensitivity analyses was constructed from three cyber-sexual harassment victimization items (i.e., “someone online asked me for sexual information about myself that I didn’t want to tell them;” “someone tried to get me to talk about sex online when I didn’t want to;” “someone asked me to do something sexual online that I did not want to do”). Each item was assessed with the five-point frequency scale used with bullying victimization and perpetration items (0 = never, 1 = once or twice, 2 = three or four times, 3 = five or six times, 4 = seven or more times). The time frame, as was the case with all of the sexual harassment measures, was the past year. The internal consistency of this three-item scale was strong (α = .87). Youth who report high scores on this scale have been found to experience above average levels of depression (Ybarra et al., 2004).

Traditional Sexual Harassment Perpetration

One of the independent/dependent variables for the second set of analyses was in-school traditional sexual harassment perpetration as measured with six items from the AAUW (i.e., “made unwelcome sexual contacts, jokes, or gestures to other students;” “spread sexual rumors about them;” “showed student sexy or sexual pictures they did not want to see;” “touched them in an unwelcome sexual way;” “physically intimidated them in a sexual way;” “forced them to do something sexual when they did not want to”). Each item was assessed for the past year on a four-point scale (0 = never, 1 = rarely, 2 = occasionally, 3 = often). Internal consistency and construct validity were acceptable across Waves 6 and 7 of the ISBSV (α = .68‒.76; CFI = .89–.96). The concurrent validity of the AAUW perpetration and victimization items is also reasonably well established (Espelage & Holt, 2001; Lindberg et al., 2007).

Cyber-Sexual Harassment Perpetration

The other independent/dependent variable for the sexual harassment analyses was cyber-sexual harassment perpetration, as assessed with a three-item scale (e.g., “asked someone to do something sexual online that they didn’t want to do;” “tried to get someone else to talk about sex online when they did not want to;” “sent a picture that was sexual in any way when that person did not want to receive it”). The items were rated using the previously mentioned five-point frequency scale to produce a total score that could range from 0 to 12. The internal consistency of this scale was excellent in the current sample of participants (α = .95).

Control Variables

The same four control variables were included in both sets of analyses as a means of controlling for the demographic diversity of the current sample of participants. These four control variables included age (in years), sex (1 = male, 2 = female), and two dummy variables for race, White (1 = White, 2 = non-White), and Black (1 = Black, 2 = non-Black).

Procedure

The current study made use of two waves of longitudinal data separated by a year. The first time period (Wave 6) encompassed the largest number of variables, to include the four control variables (age, sex, white, and black), two dummy variables representing the three schools providing participants for the study, the independent variables (Cyberbullying Perpetration-6 and Traditional Victimization-6 for the bullying analyses and Cyber-Sexual Harassment Perpetration-6 and Traditional Sexual Harassment Victimization-6 for the sexual harassment analyses), and the precursors to each dependent variable (Bullying Perpetration-6 and Cyberbullying Perpetration-6 in the bullying analyses and Sexual Harassment Perpetration-6 and Cyber-Sexual Harassment Perpetration-6 in the sexual harassment analyses). The two dependent variables in the bullying analyses were Bullying Perpetration-7 and Cyberbullying Perpetration-7 and the two dependent variables in the sexual harassment analyses were Sexual Harassment Perpetration-7 and Cyber-Sexual Harassment Perpetration-7. Cyberbullying Victimization-6 and Cyber-Sexual Harassment Victimization-6 served as alternate independent variables in the bullying and sexual harassment sensitivity analyses.

Research Design

The current study consisted of a secondary data analysis of longitudinally collected variables. Because the data were temporally ordered and there was no overlap between time periods (Waves 6 and 7 of the ISBSV) the current study qualifies as prospective in nature. Precursor measures of each dependent variable were used to establish the causal direction of variables and rule out the possibility that a dependent variable predicted an independent variable rather than the other way around (Cole & Maxwell, 2003). It was hypothesized that the stepping-stone and displacement pathways would be significant for both bullying and sexual harassment and that alternate pathways tested in a series of sensitivity analyses would be non-significant.

Data Analysis

A multiple regression path analysis composed of two regression equations (one for each dependent variable) was computed using a maximum likelihood estimator.1 This was done twice, once using bullying variables and a second time using sexual harassment variables. All bullying and sexual harassment variables were computed as manifest variables and all analyses were performed with Mplus 8.3 (Muthén & Muthén, 1998-2017). Sensitivity tests were performed to evaluate alternate models and determine the specificity of effects. The sensitivity test for the stepping-stone hypothesis involved reversing variable order (e.g., from Cyberbullying Perpetration → Traditional Bullying Perpetration to Traditional Bullying Perpetration → Cyberbullying Perpetration) to determine whether the results changed. Support for the specificity of the stepping-stone hypothesis should come in the form of a nonsignificant Traditional Bullying Perpetration → Cyberbullying Perpetration effect. Two sensitivity tests were performed on the displacement hypothesis. The first test involved replacing the independent variable (e.g., Traditional Bullying Perpetration) with an alternate independent variable (i.e., Cyberbullying Victimization) to determine whether the effect persisted when the alternate independent variable was assessed with and without the original independent variable present. The second test involved replacing the dependent variable (e.g., Cyberbullying Perpetration) with an alternate dependent variable (i.e., Traditional Bullying Perpetration) to determine whether the effect was specific to the cyberbullying/harassment perpetration outcome.

Missing Data

Approximately two-thirds of the sample had complete data on all 18 study variables (66.4%). Of the remaining participants, 2.3% were missing data on one or two variables, 0.8% were missing data on three or four variables, 28.7% were missing data on five or six variables, and 1.6% were missing data on 7 to 11 variables. The only variables with more than 5% missing data were the four Wave 7 bullying and sexual harassment outcome measures (30.6% each). Most of these missing data points can be attributed to the 30% annual mobility rate experienced by the school districts supplying participants to the study. Missing data were handled with full information maximum likelihood (FIML), a well-respected procedure that estimates model parameters and standard errors by analyzing all non-missing data and applying the results to the rest of the sample (Allison, 2012; Peyre et al., 2011).

To enhance the plausibility and precision of FIML, the regression analyses were performed with auxiliary variables (Collins et al., 2001). Auxiliary variables are used to compute FIML but are not part of the analysis. In the current study the following measures were included as auxiliary variables: anger (Waves 6 and 7), delinquency (Waves 6 and 7), depression (Waves 6 and 7), empathy (Waves 6 and 7), fighting (Waves 6 and 7), impulsivity (Waves 6 and 7), interest in pornography (Waves 6 and 7), parental knowledge (Waves 6 and 7), peer delinquency (Waves 6 and 7), pro-aggression attitudes (Wave 7), and social support (Waves 6 and 7).

Results

Bullying Analyses

Descriptive statistics and inter-correlations for the four control variables included in this study are summarized in Table 1. The next table, Table 2, provides an overview of the results of the bullying analyses. There was no evidence of a stepping-stone effect based on the fact that prior cyberbullying perpetration did not correlate with a rise in future traditional bullying perpetration (Z = 0.83, p = .41). There was, however, ample support for the displacement hypothesis in the current study as evidenced by the fact that traditional bullying victimization correlated positively with future cyberbullying perpetration, after controlling for prior levels of cyberbullying perpetration (Z = 4.95, p < .001).

Table 1. Descriptive Statistics and Correlations for the 4 Control Variables.

Variable

n

M

SD

Range

2

3

4

1. Age

2015

15.81

1.04

11–19

-.03

.01

-.04

2. Sex

2028

1.52

-

1–2

 

.05

-.05

3. White

2012

1.63

-

1–2

   

-.72

4. Black

2012

1.56

-

1–2

     

Note. Age = age in years, Sex = male (1) vs. female (2), White = White (1) vs. non-White (2), Black = Black (1) vs. non-Black (2), n = number of cases with complete data, M = mean, SD = standard deviation, Range = range of values in current sample, N = 2039.

Sensitivity testing on the displacement model produced mixed results. Contrary to predictions, Wave 6 cyberbullying victimization correlated with future cyberbullying perpetration whether (Z = 5.30, p < .001) or not (Z = 5.99, p < .001) it was accompanied by Wave 6 bullying victimization. Congruent with predictions, there was no relationship between prior traditional bullying victimization and subsequent traditional bullying perpetration (Z = 0.64, p = .52). These results imply that the effect of traditional bullying victimization on cyberbullying perpetration was moderately specific to the extent that it ran from face-to-face victimization to cyber perpetration but not from face-to-face victimization to face-to-face perpetration, though it also ran from cyber victimization to cyber perpetration, a finding inconsistent with the specificity of the effect.

Table 2. Maximum Likelihood Regression Analysis of Wave 7 Bullying and Cyberbullying Perpetration.

Predictor

b [95% CI]

β

z

p

Bullying Perp-7 (Outcome)

       
 

Dummy-1

0.749 [0.193, 1.304]

.070

2.64

.008

 

Dummy-2

-0.171 [-0.636, 0.294]

-.020

-0.72

.472

 

Age

0.124 [-0.061, 0.309]

.030

1.32

.188

 

Sex

-0.642 [-1.019, -0.264]

-.074

-3.33

<.001

 

White

-0.152 [-0.679, 0.375]

-.017

-0.57

.571

 

Black

-0.147 [-0.666, 0.373]

-.017

-0.55

.580

 

Cyberbullying Perp-6

0.040 [-0.055, 0.136]

.021

0.83

.408

 

Bullying Perp-6

0.471 [0.428, 0.514]

.525

21.55

<.001

Cyberbullying Perp-7 (Outcome)

       
 

Dummy-1

0.146 [-0.141, 0.434]

.029

1.00

.318

 

Dummy-2

-0.192 [-0.434, 0.050]

.048

-1.55

.120

 

Age

0.106 [0.009, 0.202]

.054

2.14

.032

 

Sex

-0.052 [-0.248, 0.144]

-.013

-0.52

.605

 

White

-0.146 [-0.420, 0.129]

-.035

-1.04

.298

 

Black

-0.311 [-0.581, -0.042]

-.077

-2,26

.024

 

Bullying Victim-6

0.112 [0.068, 0.156]

.124

4.95

<.001

 

Cyberbullying Perp-6

0.269 [0.222, 0.315]

.301

11.38

<.001

Cyber Perp-6 with Bully Vic-6

1.342 [1.115, 1.570]

.266

11.56

<.001

Bully Perp-7 with Cyber Perp-7

2.585 [2.205, 2.966]

.383

13.32

<.001

Note. Bullying Perp-7 (Outcome) = regression equation with traditional bullying perpetration measured at Wave 7 as the outcome variable, Cyberbullying Perp-7 (Outcome) = regression equation with cyberbullying perpetration measured at Wave 7 as the outcome variable, Age = age in years, Sex = male (1) vs. female (2), White = White (1) vs. non-White (2), Black = Black (1) vs. non-Black (2), Cyberbullying Perp-6 = cyberbullying perpetration measured at Wave 6, Bullying Perp-6 = traditional bullying perpetration measured at Wave 6, Bullying Victim-6 = traditional bullying victimization measured at Wave 6, Cyberbullying Perp-6 = cyberbullying perpetration measured at Wave 6, Cyber Perp-6 with Bully Vic-6 = covariance between cyberbullying perpetration measured at Wave 6 and traditional bullying victimization measured at Wave 6, Bully Perp-7 with Cyber Perp-7 = covariance between traditional bullying perpetration measured at Wave 7 and cyberbullying perpetration measured at Wave 7, b [95% CI] = unstandardized coefficient and the lower and upper limits of the 95% confidence interval for the unstandardized coefficient (in parentheses), β = standardized coefficient, z = Wald Z test, p = significance level of the Wald Z test, N = 2,039.

Sexual Harassment Analyses

A path analysis was also performed on the sexual harassment measures (see Table 3). Paralleling the results obtained in the bullying analyses, the stepping-stone hypothesis failed to garner support in the sexual harassment analysis by virtue of a nonsignificant correlation between Wave 6 cyber-sexual harassment and Wave 7 traditional sexual harassment, after Wave 6 traditional sexual harassment had been controlled (Z = 0.64, p = .53). The displacement hypothesis, on the other hand, was corroborated by a significant positive correlation between traditional sexual harassment victimization at Wave 6 and a rise in cyber-sexual harassment perpetration from Wave 6 to Wave 7 (Z = 4.06, p < .001).

Sensitivity testing of the significant displacement effect for sexual harassment produced mixed results, just as it did with the significant displacement effect for bullying. Whereas cyber-sexual harassment victimization failed to forge a meaningful connection with future cyber-sexual harassment perpetration, whether or not it was accompanied (Z = -0.17, p = .86) or unaccompanied (Z = 1.20, p = .23) by traditional sexual harassment victimization, a finding congruent with the displacement hypothesis, traditional sexual harassment victimization correlated with future traditional sexual harassment perpetration (Z = 3.24, p < .01), a finding incongruent with the specificity of the displacement effect.

Table 3. Maximum Likelihood Regression Analysis of Wave 7 Sexual Harassment and Cyber-Sexual Harassment Perpetration.

Predictor

b [95% CI]

β

z

p

SH Perp-7 (Outcome)

       
 

Dummy-1

0.000 [-0.214, 0.214]

.000

0.00

.999

 

Dummy-2

-0.002 [-0.183, 0.179]

-.001

-0.02

.983

 

Age

-0.036 [-0.109, 0.036]

-.026

-0.98

.326

 

Sex

-0.285 [-0.433, -0.136]

-.099

-3.77

<.001

 

White

0.108 [-0.098, 0.314]

.036

1.03

.305

 

Black

0.035 [-0.167, 0.238]

.012

0.34

.732

 

Cyber SH Perp-6

0.032 [-0.068, 0.133]

.021

0.64

.526

 

SH Perp-6

0.160 [0.102, 0.218]

.149

5.38

<.001

Cyber-SH Perp-7 (Outcome)

       
 

Dummy-1

0.124 [-0.246, -0.003]

-.063

-2.01

.045

 

Dummy-2

-0.045 [-0.146, 0.057]

-.028

-0.86

.392

 

Age

0.005 [-0.036, 0.046]

.007

0.24

.808

 

Sex

-0.097 [-0.180, -0.014]

-.060

-2.28

.023

 

White

0.065 [-0.052, 0.181]

.039

1.09

.276

 

Black

-0.067 [-0.181, 0.048]

-.041

-1.14

.254

 

SH Victim-6

0.041 [0.021, 0.060]

.117

4.06

<.001

 

Cyber-SH Perp-6

0.001 [-0.049, 0.051]

.001

0.03

.977

Cyber-SH Perp-6 with SH Vic-6

0.421 [0.325, 0.516]

.197

8.66

<.001

SH Perp-7 with Cyber-SH Perp-7

0.419 [0.357, 0.481]

.377

13.24

<.001

Note. SH Perp-7 (Outcome) = regression equation with traditional sexual harassment perpetration measured at Wave 7 as the outcome variable, Cyber-SH Perp-7 (Outcome) = regression equation with cyber-sexual harassment perpetration measured at Wave 7 as the outcome variable, Age = age in years, Sex = male (1) vs. female (2), White = White (1) vs. non-White (2), Black = Black (1) vs. non-Black (2), Cyber-SH Perp-6 = cyber-sexual harassment perpetration measured at Wave 6, SH Perp-6 = traditional sexual harassment perpetration measured at Wave 6, SH Victim-6 = traditional sexual harassment victimization measured at Wave 6, Cyber-SH Perp-6 = cyber-sexual harassment perpetration measured at Wave 6, Cyber-SH Perp-6 with SH Vic-6 = covariance between cyber-sexual harassment perpetration measured at Wave 6 and traditional sexual harassment victimization measured at Wave 6, SH Perp-7 with Cyber-SH Perp-7 = covariance between traditional sexual harassment perpetration measured at Wave 7 and cyber-sexual harassment perpetration measured at Wave 7, b [95% CI] = unstandardized coefficient and the lower and upper limits of the 95% confidence interval for the unstandardized coefficient (in parentheses), β = standardized coefficient, z = Wald Z test, p = significance level of the Wald Z test, N = 2,039.

Discussion

Two hypotheses were tested in this study. The first or stepping-stone hypothesis predicted that cyberbullying/harassment perpetration would correlate with later traditional bullying/harassment perpetration, controlling for prior levels of traditional bullying/harassment perpetration. Analyses conducted on the relationships between prior cyberbullying perpetration and subsequent traditional bullying perpetration and between prior cyber-sexual harassment perpetration and subsequent traditional sexual harassment perpetration failed to corroborate this hypothesis. The second or displacement hypothesis maintained that traditional bullying/harassment victimization would correlate with subsequent cyberbullying/harassment perpetration, controlling for prior levels of cyberbullying/harassment perpetration. This hypothesis found support in both the bullying and sexual harassment analyses, although sensitivity testing results were mixed. Whereas the effect was specific to cyberbullying perpetration (traditional bullying victimization did not correlate with subsequent traditional bullying perpetration), it was not specific to traditional bullying victimization (cyberbullying victimization correlated with subsequent cyberbullying perpetration when entered with or without traditional bullying victimization). The results of the sexual harassment sensitivity analyses conducted with respect to the displacement hypothesis found just the opposite: the effect was specific to traditional sexual harassment victimization but not to cyber-sexual harassment perpetration.

Theory and Practice

In all likelihood, bullying and sexual harassment are learned in many ways and through multiple channels, only two of which were tested in the current study. In a recent test of Barlett and Gentile’s (2012) cyberbullying model (BGCM), Barlett and Kowalewski (2019) discovered that anonymity played a key role in cyberbullying. According to the BGCM, continued exposure to cyberbullying stimuli, actions, and rewards creates cognitive scripts and attitudes that support and maintain the cyberbullying pattern. The current study failed to provide support for the notion that involvement in cyberbullying or cyber-sexual harassment leads to response generalization to where the individual learns and masters a new set of behaviors conducive to traditional or face-to-face bullying or sexual harassment. It bears repeating that this is only one of several paths potentially capable of stimulating traditional bullying and sexual harassment perpetration and there is no reason to believe that it is even the most common path. Research indicates that only about half of cyberbullies remain anonymous to their victims (Kowalski & Limber, 2007). The same has been found for online harassment, although individual prevalence figures for cyber-sexual harassment are generally unavailable (Duggan, 2017). Hence, the prospect of cyber-sexual harassment serving as a stepping stone to face-to-face sexual harassment through the anonymity-promoting properties of online interpersonal violence should continue to be explored, along with other potential pathways, though in the current study the stepping-stone hypothesis received no support.

The second bullying/harassment pathway proposed in this study as a potential link between traditional and cyber forms of interpersonal aggression ran from traditional victimization to cyber perpetration. Founded on the assumption that most victims are not in a position to retaliate physically or socially against their tormentors, it holds that children victimized by face-to-face bullying and sexual harassment will use participation in cyberbullying and sexual harassment to vent their anger or hostility toward their oppressors, those they associate with their oppressors, and people in general. The anonymity of cyberbullying and cyber-sexual harassment makes it possible for children to avoid the dangers associated with a face-to-face encounter. What is learned then is that the bad feelings they have about being victimized can be displaced onto the same or a different target in a venue where there is a much lower likelihood of them being personally identified. It could be argued that cyberbullying and cyber-sexual harassment do not meet standard definitions of bullying/harassment (cf. Olweus, 1993) because there is no real power imbalance between parties when a weaker or socially rejected child uses cyber-techniques against a stronger or more socially dominant child. What this argument fails to take into account, however, is that a power imbalance still exists, but rather than being based on size or social influence, it is based on knowledge and cyber-technology skill.

In an effort to understand and prevent crime, routine activities theory (Cohen & Felson, 1979) focuses on the overlap between potential offenders and victims across time and space. Three factors are instrumental in bringing about such convergence: a motivated offender, a suitable target, and the absence of capable guardians. Choi (2008) has modified routine activities theory to fit the cyber-world. The three quintessential components of this modified routine activities model are a potential offender, a potential target, and a virtual network. Prevention techniques designed to identify and discourage potential offenders, protect and harden potential targets, and improve security management operations within virtual networks continue to be proposed and studied (Choi & Lee, 2017). Recommendations for greater parental oversight of child online behavior, workshops and school assemblies that educate students and teachers about the hidden costs of bullying and sexual harassment, and counseling for those who perpetrate and are victimized by online interpersonal violence flow directly from the current results. To the extent that pro-bullying, pro-harassment, and pro-aggression attitudes are known to support bullying and sexual harassment through a mediating or intervening process (Datta et al., 2016; Eliot & Cornell, 2009; McConville & Cornell, 2003; McMaster, 2001; Tharp et al., 2013; Ybarra & Thompson, 2018), cognitive-behavioral therapy may be particularly effective in meeting the needs of those who engage in or are victimized by cyberbullying, cyber-sexual harassment, or both.

Limitations

From the standpoint of external validity, the current results are limited by the fact that this study was conducted in three schools from two school districts in a single state. In addition, only a little over a third of the sample was White. The prominence of minorities in this sample was due to the urban nature of the school districts and, as previously mentioned, a large influx of families from low income housing areas in Chicago following the closing of several public housing units. The non-normative ethnic distribution of the current sample could potentially limit the generalizability of the current results to less ethnically diverse school districts. In addition, the annual rate of attrition or mobility from the two school districts providing participants for this study was 30%. This closely approximates the dropout rate for the current study when participants were resurveyed one year later during Wave 7 of the ISBSV. On the other hand, the size, diversity, and age (mid- to late-adolescence) of the present sample could be considered strengths of this study. Thus, while attrition may have played a role in the results of the current investigation, FIML and auxiliary variables were utilized in an effort to minimize the deleterious effects of participant attrition.

Anonymity played a major role in constructing a rationale for this study. It was proposed that cyber bullying and sexual harassment perpetration would lead to traditional cyber bullying and sexual harassment perpetration and that traditional bullying and sexual harassment victimization would lead to cyber bullying and sexual harassment perpetration through the anonymity of cyber bullying/harassment. Such anonymity, it was reasoned, would encourage some individuals who might not otherwise be inclined to bully face-to-face because of their size, strength, or social reputation, to bully and sexually harass others online. Initial involvement in cyber bullying/harassment could therefore open the door to face-to-face bullying and sexual harassment by means of a stepping-stone effect or encourage children who have been subjected to traditional forms of bullying and sexual harassment to vent their anger and hostility by engaging in cyber forms of interpersonal retaliation. Unlike the Barlett and Kowalewski (2019) study, however, there was no measure of anonymity included in the current investigation. Anonymity was assumed rather than measured. Future research in this area should include a measure of perceived anonymity as a check on the motivation that drives cyber bullying and sexual harassment.

One could argue that the power imbalance central to most definitions of bullying and sexual harassment was never clearly articulated in any of the bullying or victimization items included in this study. Each of the bullying/harassment victimization and perpetration measures, however, clearly stated that the victimization was unwanted and something that had been imposed on the individual. Moreover, repeated physical victimization or perpetration as well as any form of social ostracization would seem to imply a power imbalance between the parties involved in the encounter. Even so, the power imbalance in a bullying/harassment relationship, like the anonymity of cyberbullying and sexual harassment, was assumed rather than specifically stated and so more attention needs to be paid to the power imbalance specifically in future research on cyber bullying and sexual harassment, although power differentials are difficult to measure and require multiple follow-up items to score (relative age, size, wealth, popularity, etc.: Espelage et al., 2003). A further limitation of this study is that all measures were based on self-report, leaving the results vulnerable to mono-operational bias, shared method variance, and social desirability effects (Shadish et al., 2002). Finally, the autocorrelation for cyber-sexual harassment, unlike the autocorrelations for traditional bullying, cyberbullying, and traditional sexual harassment, were nonsignificant, suggesting that the scores on this measure were variable and unstable over time. It is uncertain whether this reflects a limitation of the measures used or the instability of cyber-sexual harassment in high school students, but it is certainly an issue requiring further attention.

Conclusion

In closing, we would like to reiterate that the pathways running from cyber bullying/harassment perpetration to traditional bullying/harassment perpetration and from traditional bullying/harassment victimization to cyber bullying/harassment are but two of several avenues through which youth come to engage in face-to-face bullying/harassment and cyber bullying/harassment, respectively. What is now required is research on the mechanisms that link the various independent variables in this study to their respective dependent variables. This, of course, requires mediation analysis, something that was not possible using the ISBSV high school database because it consists of only two waves of data. In future research, investigators might want to consider general attitude toward aggression (Datta et al., 2016; Eliot & Cornell, 2009) as a possible mediator of the stepping-stone effect—which did not surface in the current study but could well surface with the addition of a mediator (Walters & Espelage, 2018b)—and anger/hostility (Walters & Espelage, 2018a) as a possible mediator of the displacement effect. We conclude on the basis of these results and prior research that there are multiple pathways to traditional (face-to-face) and cyber bullying and sexual harassment. The contribution made by the current study is that it offers preliminary data on an initial attempt to isolate two of these pathways using the anonymity of cyber forms of interpersonal aggression, the power imbalance inherent in bullying and sexual harassment, and an overarching social learning explanation for these patterns to guide the research.

Footnote

¹An attempt was made to conduct a structural equation modeling analysis with latent variables but model fit was poor. Consequently, a path analysis with manifest variables was computed instead

Metrics

4068

Views

1304

PDF views