Volume index - Journal index - Article index - Map ---- Back


Comunicar Journal 56: Cyberbullying: the threat without a face (Vol. 26 - 2018)

'Asegúrate' Program: Effects on cyber-aggression and its risk factors

https://doi.org/10.3916/C56-2018-04

Rosario del-Rey

Joaquín-A. Mora-Merchán

José-A. Casas

Rosario Ortega-Ruiz

Paz Elipe

Abstract

Intervention against cyberbullying and other risks associated with the misuse of ITC and social networks is an important social demand. The «Asegúrate» Program tries to support teachers in this intervention. This research shows the impact of the program among those that have shown to be less sensitive to other ones: cyber-aggressors. Concretely, the impact of the program on the prevalence of aggression in cyberbullying and bullying, sexting and abusive use of the Internet and social networks are analyzed. The evaluation of the program was carried out with a sample of 479 students (54.9% girls) of Compulsory Secondary Education (age M=13.83. SD=1.40) through a quasi-experimental methodology, with two measures over time. The instruments used were the “European Cyberbullying Intervention Project Questionnaire”, the “European Bullying Intervention Project Questionnaire”, the ”Internet Related Experiences Questionnaire” and two items about sexting involvement. The results show that the involvement in cyber aggression, sexting, and intrapersonal dimension of abusive use of Internet and social network increases without intervention, whereas it diminishes when the intervention is carried out. Moreover, a significant decrease in the aggression and cyber aggression among cyber aggressors is evidenced. Thus, “Asegúrate” Program is effective for decreasing the prevalence of aggressions and cyber aggressions as well as the involvement in other phenomena considered cyberbullying risk factors.

Keywords

Cyber aggression, cyberbullying, sexting, abuse, social networks, intervention, evaluation, impact

PDF file in Spanish

PDF file in English

1. Introduction

1.1. Cyberbullying and its associated risks

Cyberbullying is an emerging phenomenon defined as repeated harm arising from the widespread and generalized use of digital media to communicate with others and engage in social life (Hinduja & Patchin, 2008). Many researchers have approached this construct by holding it up against its counterpart in the physical world (Garaigordobil, 2015), namely bullying, which has an established scientific background (Prodócimo, Cerezo, & Arense, 2014). In fact, despite their differences, primarily owing to the contexts in which they take place (Vannucci, Nocentini, Mazzoni, & Menesini, 2012), we now know that a high degree of co-involvement exists between them (Waasdorp & Bradshaw, 2015). Previous research on Spanish samples report some diverging prevalence trends. In the most recent study conducted with a representative sample of Spanish adolescents (Sastre, 2016), involvement was 10.2% (3.3% cyber aggression and 6.9% cybervictimization). This figure surpasses the 7.7% found by Cerezo, Arnaiz, Giménez, and Maquilón (2016). These data become dispersed when addressing the various forms, declining in the most serious cases (Álvarez-García, Barreiro-Collazo, & Núñez, 2017).

The efforts that go into understanding these behaviors reveal risk factors for cyber aggressions (Modecki, Barber, & Vernon, 2013). Those of particular relevance when it comes to psychoeducational interventions include the abusive use of social networks and sexting (Del Rey, Casas, & Ortega-Ruiz, 2012). Regarding abusive use, “smart­phones” have led to a general increase in time online, especially among the younger populations (Colás, González, & de-Pablos, 2013). Despite this, the actors involved in cyberbullying, particularly cyber aggressors, continue to spend significantly more time connected than their non-involved peers (Hinduja & Patchin, 2008). Sexting, under­stood as the sending and receiving of messages, images and videos of a sexually explicit nature on a technological device, especially mobile phones (Klettke, Hallford, & Mellor, 2014), deserves special attention not only for being a risk factor for cyberbullying (Livingstone & Smith, 2014), but also for the impact it has in its own right (Korenis & Billick, 2014). What is more, sexting involvement is on the rise among Spanish adolescents (Gámez-Guadix, de Santisteban, & Resett, 2017).

1.2. Interventions against cyberbullying and its associated risks

The need to intervene in cyberbullying is, beyond all doubt, a priority in the current climate given the figures and consequences related to this phenomenon (Ortega, et al., 2012). Empirical findings to date have shown that school-based anti-bullying programs are partially effective in tackling cyberbullying (Williford & al., 2013). However, there is also evidence supporting the view that specific content associated with virtual environments and social networks (Del Rey, & al., 2012) as well as sexting (Hinduja & Patchin, 2012) needs to be introduced. 

Steps towards addressing cyberbullying in Spain have gradually been taken. The first public interventions have involved adapting school-based anti-bullying protocols and “convivencia” projects (promoting harmonious inter­action) within the cyberbullying domain (Cerezo & Rubio, 2017). One such initiative currently underway is the 2016 Strategic Plan for School Co-existence coordinated by the Ministry of Education, Culture and Sports, which prioritizes violence prevention, teaching how to use information and communication technologies (ICT) and teacher training. On this topic, it has been shown that teachers’ feelings of competence are key to reducing bullying and cyberbullying (Casas, Ortega-Ruiz, & Del Rey, 2015; Menesini & Salmivalli, 2017).

Anti-cyberbullying interventions have also been developed and empirically tested with adolescents. These include Cyber program 2.0 (Garaigordobil & Martínez-Valderrey, 2015) and ConRed (Del Rey, & al., 2012), which have proven to be effective in reducing both cybervictimization and cyber aggression as well as bullying and other risks. The ConRed program has even demonstrated its impact on cyber aggressors (Del Rey, Casas, & Ortega, 2016). However, little is still known about their impact on the prevalence of cyber aggression, which is one of the most difficult objectives to achieve in bullying interventions (Ttofi & Farrington, 2011).

1.3. The “Asegúrate” Program

The “Asegúrate” Program was created to help teachers intervene against cyberbullying and its associated risks. It was also conceived to enhance their feelings of competence in this area. The program is structured around three main pillars:

a) The theory of normative social behavior (Rimal & Lapinski, 2015). This highlights how social behavior is significantly influenced by social norms, where we see changes in conduct that lead to adopting external conventions and patterns, in addition to avoiding dissent. It upholds the notion that our behavior is likely driven by what is perceived as socially acceptable, normal and legal (Del Rey, & al., 2012). Thus, adolescents behave with their peers on social networking sites (as well as in face-to-face interactions) according to how they perceive relationship norms in online settings, where bad relationships occur as a way of mimicking or blending in with the context guided by three normative mechanisms: group identity, expectations and recognized legal norms. Recognizing these keys and positively returning them to the students would be essential in ensuring a successful intervention. “Asegúrate” makes use of the following processes in intervention design: first, it presents positive identification models to the group, highlighting how some behaviors do not entail improved integration among peers; second, it examines students’ expectations in everyday situations and holds them up against the real effects that bad relationships and online bullying have; and third, it analyzes habitual online norms and works alongside students to assess their impact.

b) Self-regulation skills. The inclusion of reflective practice in psychoeducational programs, aimed at enhancing metacognitive skills, has been carried out successfully for some time now (Joseph, 2009). It has been found that people with lower self-regulation skills are more likely to engage in aggressive behavior and are less capable of gaug­ing the consequences their actions have on others (Ron­cero, Andreu, & Peña, 2016). In the specific case of cyberbullying, a link between low self-regulation and involvement (Vazsonyi, Machackova, Sevcikova, Smahel, & Cerna, 2012) and between less developed metacognitive skills and the use of non-productive coping strategies (Nacimiento, Rosa, & Mora-Merchán, 2017) has also been observed. Thus, it is necessary to include elements that allow and invite us to reflect on our actions, particularly during adolescence, which is a developmental period characterized by lower self-control and greater impulsivity (Casey, Jones, & Hare, 2008). These elements are especially relevant when it comes to online communication, given the perceived anonymity, limited consequences and invisibility, which can lead to less inhibitory control and, therefore, increased cyber aggression (Van-Royen, Poels, Vandebosch, & Adam, 2017).

c) The ideas/beliefs held by adolescents. Adhering to the principles of constructivist methodologies (e.g., Powell & Cody, 2009), the sequence of activities (Table 1) is based on identifying pre-existing ideas about virtual environments, in particular, social networks. This is followed by an analysis of one’s behavior in these settings. Next, the emphasis is placed on reflecting on the reasons behind these behaviors. The following step is to analyze the potential consequences of the behaviors exhibited by those at both the giving and receiving ends. The sequence concludes with an activity that seeks to generalize and transfer the achievements to other relationship contexts. All of these tasks adopt a reflective approach, which is necessary for progressively reshaping the students’ beliefs and expectations. This fixed sequence of activities across all sessions allows the teacher, who is responsible for implementing the program, to devise their units of work following a common logic, which can be adapted to the students’ characteristics.

1.4. Aim and objectives

Because this represents a new program and its effectiveness is yet to be determined, particularly among those who have shown to be less sensitive to other programs, the aim of the present study was to analyze the impact of “Asegúrate” on aggression in cyberbullying and bullying, as well as on two of the associated risk factors: sexting and the abusive use of the Internet and social networks. Specifically, we sought to identify the program’s impact relating to three specific objectives: a) the prevalence of aggression in cyberbullying and bullying, sexting, and abusive use of the Internet and social network; b) the intensity of cyber-aggressive and aggressive behaviors; and c) cyber aggressors’ involvement in the risk factors under consideration: sexting and the abusive use of the Internet and social networks.

2. Material and methods

2.1. Participants

Four hundred and seventy-nine (479) students aged 12 to 18 years (54.9% girls; M=13.83, SD=1.40) from seven secondary schools in Andalucía (southern Spain) took part in this study. Among them, 292 belonged to five schools assigned to the quasi-experimental group (57.4% girls; M=13.84, SD=1.42) and 187 belonged to two schools assigned to the control group (51.1% girls; M=13.84, SD=1.35).

2.2. Instruments

The aggression subscale pertaining to the “European Cyberbullying Intervention Project Questionnaire” (ECIPQ; Del Rey & al., 2015) was used to assess cyber aggression. It comprises 11 items that assess the frequency of cyber aggression in the last two months, eliciting Likert-type responses (0=No; 1=Yes, once or twice; 2= Yes, once or twice a month; 3=Yes, around once a week; 4=Yes, more than once a week). Example: “I’ve insulted someone on social networks or WhatsApp”. Reliability of this subscale in the present study was a=.72.

The aggression subscale corresponding to the “European Bullying Intervention Project Questionnaire” (EBIPQ; Ortega-Ruiz, Del Rey, & Casas, 2016) was used to assess bullying. It comprises seven Likert-type items and evaluates the frequency of aggression using the same response options as the previous measure. Example: “I’ve insulted and said offensive things to someone”. Reliability of this subscale was a=.72.

A method applied in previous research (e.g., Ybarra & Mitchell, 2014) was used to assess sexting involvement. Students were asked to respond to two items, rating their agreement across seven Likert-type options (0=Strongly disagree to 6=Strongly agree). The statements were: “I’ve sent sexually explicit videos, images and messages to my boyfriend/girlfriend” and “I’ve received sexually explicit videos, images, and messages from my boyfriend/girlfriend”.

The “Questionnaire of experiences related to the Internet” (CERI; Casas, Ruiz-Olivares, & Ortega-Ruiz, 2013) was used to assess the abusive use of the Internet and social networks. This Internet-related experiences questionnaire comprises ten Likert-type responses with four options (1=Never; 2=Hardly ever; 3=Often; 4=A lot) measuring the intrapersonal dimension (e.g., “When you have problems, do you find that going on social networks or talking via WhatsApp helps you to escape from them?”) and interpersonal dimension of said use (e.g., “Do you find it easier or more comfortable interacting with people via a social network or WhatsApp than in person?”). The reliability in this study was a inter=.70, a intra=.79, a total=.86.

2.3. Procedure

Incidental sampling was performed. Phone calls were made to the schools to request their collaboration. The centres that agreed to sign up were contacted again in order to arrange a meeting and agree on a schedule and the classes that would take part in the study. The questionnaires were administered by young researchers, trained for this purpose, during school hours, and with the prior consent of the teaching staff. Before testing could commence, the voluntary nature of study participation, anonymity, data confidentiality and the importance of giving honest answers were emphasized.

Following initial data collection, time 1 (hereinafter T1), the program was implemented at five schools (quasi-experimental groups) and not at two schools (control groups). The quasi-experimental schools had to commit to implementing at least four of the program’s teaching modules (of their own choosing). Upon intervention completion at the five quasi-experimental centres, the questionnaires were administered again at least three months from the intervention start date – this time at all seven schools, time 2 (hereinafter T2). The schools that did not participate in the intervention were offered the opportunity to do so once the study had concluded.

The research was undertaken in accordance with APA ethical standards and was approved by the Biomedical Research Ethics Coordinating Committee of Andalucía, which follows the guidelines for Good Clinical Practice set by the International Conference on Harmonization. The project and instruments to be used were presented to the School Board as part of its Co-existence Project and School Improvement Plan, who gave informed consent to participate in the project.

2.4. Data analysis

To achieve the proposed objectives, the first step was to create four dichotomous variables. Two would relate to aggressive involvement in bullying and cyberbullying, following the criteria set out by the authors of the scales used (Del Rey & al., 2015): aggressors were considered to be those who confirmed having shown offensive actions once or twice a month, or more frequent displays of any of the behaviors that present themselves in bullying or cyber-bullying scenarios, respectively. As for sexting, active individuals were identified as those who responded affirmatively to at least one of the two direct items (“I’ve sent sexually explicit videos, images and messages to my boyfriend/girlfriend” and vice versa). The students’ scores were used to create the abusive use of the Internet and social networks variable. The latter was devised by taking into account three categories (low, medium and high use) based on the 33.33 and 66.66 percentiles in the T1 responses. Students exhibiting abusive use were considered to be those who gave scores in the upper third.

To analyze the program’s impact on the prevalence of aggression in cyberbullying and bullying, as well as sexting and the abusive use of the Internet and social networks, the percent variation in each of the groups (control and quasi-experimental) was calculated. This variation represents the difference between prevalence in T1 and T2 in relation to the value shown in T1. Such variation was calculated using the following formula: [(PrevalenceT2-PrevalenceT1)/ PrevalenceT1] × 100. In addition, a chi-square test, including involvement in cyber aggression, aggression, sexting and abusive use of the Internet and social networks, was used to compare the statistical significance of this variation in T1 and T2, respectively, by condition, control or experimental. The test’s significance would indicate an association in involvement between T1 and T2, that is, involvement has not substantially changed; its absence would indicate that the role has changed.

To achieve the second objective, those students identified as cyber aggressors in T1 were selected. Subsequently, two new quantitative variables for cyber aggression and aggression were calculated based on the means of the items that make up each dimension in order to analyze the variability in both phenomena. Two 2 x 2 repeated measures (2 times, T1 and T2, X 2 conditions, control and experimental) ANOVAs were used to compare changes in the intensity of cyber aggression and aggression, respectively. For the third objective, which was to analyze whether the prevalence of the studied risk factors, sexting and abusive use of the Internet and social networks, varied in the group of students self-identified as cyber aggressors in T1 by the condition, the percent variation for these factors in the aforementioned group of students was calculated.

Coding and data analysis were carried out using the SPSS program, version 21, except for the percent variation calculation which used Excel 2016.

3. Results

3.1. Impact of the “Asegúrate” Program on the prevalence of cyber aggression, sexting and the abusive use of the Internet and social networks

The results relative to the program’s impact on the prevalence of cyber aggression and aggression revealed the different percent variations in the control and experimental groups. Table 2 shows how cyber aggression involvement diminished by 17.5% in the quasi-experimental group and increased by 52% in the control group. Prevalence of bully­ing aggression diminished in both groups, but more so in the quasi-experimental group (19.6% vs. 2.9%).

The chi-square test was significant in the control group, ?2 (1, 187)=24.028, p=.001, which means that there is an association between cyber aggression in T1 and T2, whereas the test was not significant in the quasi-experimental group, ?2 (1, 289)=1.198, p=.274. The results for aggression were similar: a significant association in the control group, ?2 (1, 187)=14.026, p=.001, and a non-significant one in the quasi-experimental group, ?2 (1, 290)=0.553, p=.481. Regarding the change in prevalence of the two risk factors, sexting, and abusive use, the results of the percent variation show changes in both groups, but in a different order (Table 3). Thus, the percent variation for sexting and the intrapersonal dimension for abusive use in the control group represents an increase; however, a decrease is observed in the quasi-experimental group for both cases. In terms of the interpersonal dimension for abusive use, a decrease is observed in both the control and quasi-experimental groups; although the magnitude in both groups varied, proving greater in the quasi-experimental group.

For sexting, the chi-square test was significant in the control group, ?2 (1, 187)=41.987, p= .001, and non-significant in the quasi-experimental group, ?2 (1, 280)= 3.345, p=.067, yielding the same outcome as intrapersonal abusive use (?2 control [1, 187])=63.703, p=.001, ?2 quasi-experimental [1, 269]=0.73, p=.787). For interpersonal abusive use, the association was significant in the control group, ?2 (1, 187)=45.120, p=.001, and bordered on significance in the quasi-experimental group, ?2 (1, 269)=3.937, p=.047.

3.2. Impact on the intensity of cyber aggression and aggression in cyber aggressors

The ANOVA results for cyber aggression showed a significant intra-subject effect of time, F (1, 40)=7.108, p=.011, ?2p=.151, but not of condition, F (1, 40)=3.280, p=.078, ?2p=.076. However, these effects are qualified by the interaction between time and condition, F (1, 40)=6.959, p=.012, ?2p=.148. Regarding aggression, the results followed a similar pattern, a significant effect of time, F (1, 40)=9.034, p=.005, ?2p=.184; a lack of significance for condition, F (1, 40)=1.138, p=.292, ?2p=.028; and a significant interaction, F (1, 40)=9.990, p=.003, ?2p=.200.

These data reveal a clear decline in cyber aggression and aggression associated with the intervention, as can be observed when comparing the means (Table 4).

3.3. Involvement of cyber aggressors in risk factors

Taking into account those adolescents identified as cyber aggressors in T1, the percent variation in the prevalence of sexting and abusive use of the Internet and social networks in both groups, control and quasi-experimental, was analyzed (Table 5). The results reveal that direct sexting involvement decreas­ed by almost half in the quasi-experimental group, whereas a slight increase was found in the control group. As for abusive use, an increase was observed in the control group, whereas a decrease in both the intrapersonal and interpersonal factors was found in the quasi-experimental group.

For sexting, the chi square was marginally significant in the control group and non-significant in the quasi-experimental group, ?2 control (1, 12)=3.704, p=.054; ?2 quasi-experimental (1, 29)=0.232, p=.630.

For abusive use, the associations were non-significant for group and the intrapersonal factor, ?2 control (1, 12)=1.333, p=.546; ?2 quasi-experimental (1, 28)=0.232, p=.630; and non-significant for the interpersonal factor, ?2 control (1, 12)=3.086, p=.079; ?2quasi-experimental (1, 28)=0.019, p=.891.

4. Discussion and conclusions

The majority of intervention programs tackling bullying and cyberbullying are effective at addressing victimization (Ttofi & Farrington, 2011), but they are scarcely effective at reducing aggressive behaviors. The aim of this study was to analyze the impact of the “Asegúrate” program on cyber aggression and aggression for the cited phenomena. In light of the results obtained, we can conclude that this program is effective at not only reducing the prevalence of cyber aggressions and aggressions, but it is also effective in reducing the involvement in other phenomena considered to be risk factors for cyberbullying: sexting and the abusive use of the Internet and social networks (Del Rey & al., 2016).

Specifically, the results corresponding to the first objective show that, without intervention, involvement in cyber aggression, sexting, and intrapersonal abusive use increases; however, it diminishes with intervention. This percent variation is especially notable in cyber aggression. This aspect is particularly noteworthy given that earlier studies report on how, as these phenomena hold over time, the potential harm for all those involved increases (Livingstone & Smith, 2014). Furthermore, in the case of bullying aggression and the abusive use of the Internet and social networks interpersonal factor, the analysis of the control group results shows that, unlike the previously mentioned phenomena, these tend to diminish over time. However, the comparative assessment demonstrates that the program accelerates this reduction, yielding a percent variation almost seven times greater in aggression and almost ten times greater in interpersonal abusive use in the quasi-experimental groups than in the control groups. A possible explanation for this diminishing aggression in bullying has to do with the phenomenon’s development, given that several studies have observed a decline with advancing age, continuing to fall after the second year of compulsory secondary education (Sastre, 2016). Nevertheless, the program’s impact highlights the importance of intervention to speed up this decline. The decrease found in the abusive use interpersonal factor is, to some extent, surprising, especially given that available data indicate that abusive use increases with advancing age, at least between 9 and 16 years of age (Casas, Ruiz-Olivares, & al., 2013). This aspect coincides with the increase observed in the intrapersonal factor corresponding to the control group. However, in this case, the decline observed in the interpersonal factor, coupled with the fact that intervention does not appear to alter involvement levels substantially, suggest the need for analysis into which of the program’s factors could be responsible for facilitating a more controlled and “less compulsive” use of the Internet and social networks as a way of escaping, but not as a way of interacting with others. Similarly, the fact that a trend shift is observed when the program is developed (in cyber aggression, in sexting and the abusive use intrapersonal factor) emphasizes the appropriateness of the methodology used. This demonstrates the important role that self-regulation plays as an inhibitor of aggression, as previously reported by other authors (Vazsonyi & al., 2012). Another key finding of the present study is that, although “anti-bullying” programs are used to prevent cyberbullying among students (Williford & al., 2013), certain programs geared towards preventing cyberbullying, such as those commented upon in the introduction (Del Rey, & al., 2012; Garaigordobil & Martínez-Valderrey, 2015) and “Asegúrate”, the program subject to study, are also used to prevent aggression in bullying situations.

In terms of the second objective, namely the decline in intensity of aggressive behaviors, the results once again confirm the effectiveness of the program, with significant differences between the control and quasi-experimental groups emerging. From this perspective, and given how difficult it is to change the aggressors’ conduct (Ttofi & Farrington, 2011), the results support the aforementioned effect of self-regulation whereby, not only does it reduce these behaviors in general, but also the students that exhibit them are able to reduce their intensity. What is more, the results demonstrate the transfer of this control from virtual environments (which this program primarily works in) to physical environments. A further explanation for the possible factors responsible for these results has to do with teacher involvement in program implementation. From this perspective, earlier studies show that one of the factors associated with aggression is students’ perceptions of teacher non-involvement (Casas & al., 2015). The fact that “Asegúrate” is a teacher-implemented program could change students’ perceptions in this respect.

Regarding the third and final objective, the results partially corroborate the program’s effect on risk factors in cyber-aggressors. Thus, whereas sexting involvement increases in non-intervened cyber aggressors, a decline by almost a half is observed in the quasi-experimental condition. Conversely, in the case of abusive use, the results do not allow us to confirm whether the program is responsible for the changes observed between the control and quasi-experimental groups. In any case, it is important to highlight the reduced number of students per group in this analysis as a study limitation. We can conclude that “Asegúrate”, besides being a program that reduces and occasionally prevents involvement in interpersonal aggressive behaviors, bullying, and cyberbullying, also reduces and prevents sexting involvement. This dual aspect is especially important given that previous meta-analyses on interventions aimed at reducing school-based aggressions have shown, in general terms, how these programs are effective at reducing levels of aggression when it is high, but not at preventing a potential increase in aggression (Wilson & Lipsey, 2007).

Taken together, the results endorse “Asegúrate” as a useful practice that could well be considered an evidence-based practice to reduce the cyberbullying and bullying phenomena, sexting and certain dimensions corresponding to the abusive use of the Internet and social networks. Given the evidence that the holding of these problems over time heightens their impact and effects, programs like the one presented here should be seen as essential tools in schools’ daily activities.

Lastly, it is important to note the limitations of this study and future lines of research opened up by the results. In addition to the problems inherent in the use of self-report measures, the short-term longitudinal design used represents a strength yet makes it difficult to control certain variables. Thus, there is no leveling between the quasi-experimental group and the control group in terms of the number of participants, schools, and students. Similarly, the control of outside variables, such as the schools’ participation in other activities covered in their co-existence plans, was not possible. Although this hinders the interpretation of the results, it gives them ecological validity, given that this represents the real day-to-day workings of our schools. As for the reality of the phenomena under study, the not very high number of students included in the cyber-aggression analyses, as well as their uneven distribution across the control groups (12) and the quasi-experimental groups (30), means that we should interpret these results with a degree of caution. Regarding future lines of research, we would need to determine whether a longer program would produce stronger or more longer-lasting effects, as reported in other studies. Similarly, we would need to continue investigating the matter to clearly identify which factors that help to prevent cyber aggression also help to prevent traditional aggression and vice-versa, as well as the common and differential associated risk factors, sexting and the abusive use of the Internet and social networks. From this perspective, a more detailed map of these factors would enable us to draw up intervention proposals with common features, based on different risks, and specific features, which are applicable to specific populations and in highly vulnerable developmental periods.

Funding Agency

This program was funded through the I+D project of the 2013-2016 State Plan of Excellence “Sexting, cyberbullying y riesgos emergentes en la red: claves para su comprensión y respuesta educativa (Sexting, cyberbullying and emerging online risks: keys for its understanding and an educational response)” (EDU2013-44627-P).

References

Álvarez-García, D., Barreiro-Collazo, A., & Núñez, J.C. (2017). Ciberagresiones entre adolescentes: prevalencia y diferencias de género. [Cyberaggression among adolescents: prevalence and gender differences]. Comunicar, 25(50), 89-97. https://doi.org/10.3916/C50-2017-08

Casas, J.A., Del Rey, R., & Ortega-Ruiz, R. (2013). Bullying and cyberbullying: Convergent and divergent predictor variables. Computers in Human Behavior, 29(3), 580-587. https://doi.org/10.1016/j.chb.2012.11.015

Casas, J.A., Ortega-Ruiz, R., & Del Rey, R. (2015). Bullying: The impact of teacher management and trait emotional intelligence. British Journal of Educational Psychology, 85(3), 407-423. https://doi.org/10.1111/bjep.12082

Casas, J.A., Ruiz-Olivares, R., & Ortega-Ruiz, R. (2013). Validation of the Internet and Social Networking Experiences Questionnaire in Spanish adolescents. International Journal of Clinical and Health Psychology, 13(1), 40-48. https://doi.org/10.1016/S1697-2600(13)70006-1

Casey, B. J., Jones, R.M., & Hare, T.A. (2008). The Adolescent brain. Annals of the New York Academy of Sciences, 1124(1), 111-126. https://doi.org/10.1196/annals.1440.010

Cerezo, F., & Rubio, F.J. (2017). Medidas relativas al acoso escolar y ciberacoso en la normativa autonómica española. Un estudio comparativo. Revista Electrónica Interuniversitaria de Formación del Profesorado, 20(1), 113. https://doi.org/10.6018/reifop/20.1.253391

Cerezo, F., Arnaiz, P., Giménez, A.M., & Maquilón, J.J. (2016). Conductas de ciberadicción y experiencias de cyberbullying entre adolescentes. Anales de Psicología, 32(3), 761-769. https://doi.org/10.6018/analesps.32.3.217461

Colás, P., González, T., & de-Pablos, J. (2013). Juventud y redes sociales: motivaciones y usos preferentes. [Young people and social networks: Motivations and preferred uses]. Comunicar, 20(40), 15-23. https://doi.org/10.3916/C40-2013-02-01

Del Rey, R., Casas, J.A., & Ortega, R. (2016). Impact of the ConRed program on different cyberbulling roles. Aggressive Behavior, 42(2), 123-135. https://doi.org/10.1002/ab.21608

Del Rey, R., Casas, J.A., & Ortega-Ruiz, R. (2012). El programa ConRed: una práctica basada en la evidencia. [The ConRed Program, an evidence-based practice]. Comunicar, 23(45), 129-138. https://doi.org/10.3916/C39-2012-03-03

Del Rey, R., Casas, J.A., Ortega-Ruiz, R., Schultze-Krumbholz, A., Scheithauer, H., Smith, P., … Plichta, P. (2015). Structural validation and cross-cultural robustness of the European Cyberbullying Intervention Project Questionnaire. Computers in Human Behavior, 50, 141-147. https://doi.org/10.1016/j.chb.2015.03.065

Del Rey, R., Elipe, P., & Ortega-Ruiz, R. (2012). Bullying y cyberbullying: Overlapping and predictive value of the co-ocurrence. Psicothema, 24(4), 608-613.

Gámez-Guadix, M., de Santisteban, P., & Resett, S. (2017). Sexting entre adolescentes españoles: Prevalencia y asociación con variables de personalidad. Psicothema, 29(1), 29-34. https://doi.org/10.7334/psicothema2016.222

Garaigordobil, M. (2015). Ciberbullying en adolescentes y jóvenes del País Vasco: Cambios con la edad. Anales de Psicología, 31(3), 1069. https://doi.org/10.6018/analesps.31.3.179151

Garaigordobil, M., & Martínez-Valderrey, V. (2015). Efectos del Cyberprogram 2.0 en el bullying ‘cara-a-cara’, el cyberbullying y la empatía. Psicothema 27(1), 45-51. https://doi.org/10.7334/psicothema2014.78

Hinduja, S., & Patchin, J.W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129-156. https://doi.org/10.1080/01639620701457816

Hinduja, S., & Patchin, J.W. (2012). School climate 2.0: Preventing cyberbullying and sexting one classroom at a time. School climate 2.0: Preventing cyberbullying and sexting one classroom at a time. Thousand Oaks, California: Corwin Press.

Joseph, N. (2009). Metacognition Needed: Teaching middle and high school students to develop strategic learning skills. Preventing School Failure: Alternative Education for Children and Youth, 54(2), 99-103. https://doi.org/10.1080/10459880903217770

Klettke, B., Hallford, D.J., & Mellor, D.J. (2014). Sexting prevalence and correlates: A systematic literature review. Clinical Psychology Review, 34(1), 44-53. https://doi.org/10.1016/j.cpr.2013.10.007

Korenis, P., & Billick, S.B. (2014). Forensic implications: Adolescent sexting and cyberbullying. Psychiatric Quarterly, 85(1), 97-101. https://doi.org/10.1007/s11126-013-9277-z

Livingstone, S., & Smith, P.K. (2014). Annual research review: Harms experienced by child users of online and mobile technologies: The nature, prevalence and management of sexual and aggressive risks in the digital age. Journal of Child Psychology and Psychiatry and Allied Disciplines. https://doi.org/10.1111/jcpp.12197

Menesini, E., & Salmivalli, C. (2017). Bullying in schools: the state of knowledge and effective interventions. Psychology, Health & Medicine, 22(1), 240-253. https://doi.org/10.1080/13548506.2017.1279740

Modecki, K. L., Barber, B.L., & Vernon, L. (2013). Mapping developmental precursors of cyber-Aggression: Trajectories of isk predict perpetration and victimization. Journal of Youth and Adolescence, 42(5), 651-661. https://doi.org/10.1007/s10964-012-9887-z

Nacimiento, L., Rosa, I., & Mora-Merchán, J.A. (2017). Valor predictivo de las habilidades metacognitivas en el afrontamiento en situaciones de bullying y cyberbullying. Informes Psicológicos, 17(2), 135-158. https://doi.org/10.18566/infpsic.v17n2a08

Ortega, R., Elipe, P., Mora-Merchán, J.A., Genta, M.L., Brighi, A., Guarini, A., & al. (2012). The emotional impact of bullying and cyberbullying on victims: a European cross-national study. Aggress. Behav. 38, 342-356. https://doi.org/10.1002/ab.21440

Ortega-Ruiz, R., Del Rey, R., & Casas, J.A. (2016). Evaluar el bullying y el cyberbullying validación española del EBIP-Q y del ECIP-Q. Psicología Educativa, 22(1), 71-79. https://doi.org/10.1016/j.pse.2016.01.004

Powell, K.C.,& Cody, J.K. (2009). Cognitive and social constructivism: developing tools for and effective classroom. Education, 130(2), 241-250.

Prodócimo, E., Cerezo, F., & Arense, J.J. (2014). Acoso escolar: variables sociofamiliares como factores de riesgo o de protección. Behavioral Psychology, 22(2), 345-362.

Rimal, R.N., & Lapinski, M.K. (2015). A re-explication of social norms, ten years later. Communication Theory, 25(4), 393-409. https://doi.org/10.1111/comt.12080

Roncero, D., Andreu, J., & Peña, M.E. (2016). Procesos cognitivos distorsionados en la conducta agresiva y antisocial en adolescentes Distorted cognitive processes in aggressive and antisocial behavior in adolescents. Anuario de Psicología Jurídica, 26(1), 88-101. https://doi.org/10.1016/j.apj.2016.04.002

Sastre, A. (2016). Yo a eso no juego. Madrid: Save the Children. https://bit.ly/1oDaq9U

Ttofi, M.M., & Farrington, D.P. (2011). Effectiveness of school-based programs to reduce bullying: a systematic and meta-analytic review. Journal of Experimental Criminology, 7(1), 27-56. https://doi.org/10.1007/s11292-010-9109-1

Van-Royen, K., Poels, K., Vandebosch, H., & Adam, P. (2017). ‘Thinking before posting?’ Reducing cyber harassment on social networking sites through a reflective message. Computers in Human Behavior, 66, 345-352. https://doi.org/10.1016/j.chb.2016.09.040

Vannucci, M., Nocentini, A., Mazzoni, G., & Menesini, E. (2012). Recalling unpresented hostile words: False memories predictors of traditional and cyberbullying. European Journal of Developmental Psychology, 9(2), 182-194. https://doi.org/10.1080/17405629.2011.646459

Vazsonyi, A. T., Machackova, H., Sevcikova, A., Smahel, D., & Cerna, A. (2012). Cyberbullying in context: Direct and indirect effects by low self-control across 25 European countries. European Journal of Developmental Psychology, 9(2), 210-227. https://doi.org/10.1080/17405629.2011.644919

Waasdorp, T.E., & Bradshaw, C.P. (2015). The overlap between cyberbullying and traditional bullying. Journal of Adolescent Health, 56(5), 483-488. https://doi.org/10.1016/j.jadohealth.2014.12.002

Williford, A., Elledge, L.C., Boulton, A.J., DePaolis, K.J., Little, T.D., & Salmivalli, C. (2013). Effects of the KiVa Antibullying program on cyberbullying and cybervictimization frequency among Finnish youth. Journal of Clinical Child and Adolescent Psychology, 42(6), 820-833. https://doi.org/10.1080/15374416.2013.787623

Wilson, S.J., & Lipsey, M.W. (2007). School-based interventions for aggressive and disruptive behavior. American Journal of Preventive Medicine, 33(2), S130-S143. https://doi.org/10.1016/j.amepre.2007.04.011

Ybarra, M.L., & Mitchell, K.J. (2014). Sexting and its relation to sexual activity and sexual risk behavior in a national survey of adolescents. The Journal of Adolescent Health, 55(6), 757-64. https://doi.org/10.1016/j.jadohealth.2014.07.012