{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T20:37:55Z","timestamp":1777408675257,"version":"3.51.4"},"reference-count":70,"publisher":"Hogrefe Publishing Group","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Media Psychology"],"published-print":{"date-parts":[[2018,7]]},"abstract":"<jats:p> Abstract. The study provides a quantitative synthesis of the literature on gender difference in cyber-victimization (CV). A total of 40 usable research articles were identified and used in this meta-analysis. With some articles having multiple effect sizes, a total of 150 effect sizes for gender difference in CV were obtained. Results indicated a small gender difference, with females experiencing slightly more CV than their male counterparts. However, there were considerable inconsistencies across the studies. Follow-up analyses on the study features revealed that several factors, such as response time frame and region of sampling, significantly moderated the relationship between gender and CV. Exploratory in nature, this study discusses the implications of the findings in reference to existing theories, and suggests future research directions. <\/jats:p>","DOI":"10.1027\/1864-1105\/a000185","type":"journal-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T09:02:03Z","timestamp":1472202123000},"page":"125-138","source":"Crossref","is-referenced-by-count":24,"title":["Is There a Gender Difference in Cyber-Victimization?"],"prefix":"10.1027","volume":"30","author":[{"given":"Shaojing","family":"Sun","sequence":"first","affiliation":[{"name":"School of Journalism, Fudan University, \t\t\t\t\t\tShanghai, P.R. China"}]},{"given":"Xitao","family":"Fan","sequence":"additional","affiliation":[{"name":"Faculty of Education, University of Macau, \t\t\t\t\t\tMacau, P.R. China"}]}],"member":"101","reference":[{"key":"c1","first-page":"107","volume":"38","author":"Abeele M. V.","year":"2013","journal-title":"Communications"},{"key":"c2","doi-asserted-by":"publisher","DOI":"10.1080\/02667363.2012.665356"},{"key":"c3","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0016"},{"key":"c4","doi-asserted-by":"publisher","DOI":"10.1037\/a0028113"},{"key":"c5","doi-asserted-by":"publisher","DOI":"10.1080\/13632752.2012.704228"},{"key":"c6","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2012.11.022"},{"key":"c7","doi-asserted-by":"publisher","unstructured":"*Bradshaw, C.\n\t\t\t\t\t\t\t\tP., \t\t\t\t\t\t\t\tWaasdorp, T.\n\t\t\t\t\t\t\t\tE. & \t\t\t\t\t\t\t\tO\u2019Brennan, L.\n\t\t\t\t\t\t\t\tM. (2013). \t\t\t\t\t\tA latent class approach to examining forms of peer \t\t\t\t\t\tvictimization. Journal of Educational \t\t\t\t\t\t\tPsychology. Advance online \t\t\t\t\t\tpublication. doi: 10.1037\/a0032091","DOI":"10.1037\/a0032091"},{"key":"c8","doi-asserted-by":"publisher","DOI":"10.1080\/13632752.2012.704684"},{"key":"c9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.02.014"},{"key":"c10","volume-title":"Applied meta-analysis for social science research","author":"Card N. A.","year":"2012"},{"key":"c11","doi-asserted-by":"publisher","DOI":"10.1177\/0143034313479694"},{"key":"c12","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.81.2.322"},{"key":"c13","doi-asserted-by":"publisher","DOI":"10.1007\/s00038-009-5413-9"},{"key":"c14","doi-asserted-by":"publisher","DOI":"10.1177\/0886260511431436"},{"key":"c15","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0008"},{"key":"c16","doi-asserted-by":"publisher","DOI":"10.1002\/pits.20437"},{"key":"c17","first-page":"1307","volume":"9","author":"Dilmac B.","year":"2009","journal-title":"Educational Sciences: Theory & Practice"},{"key":"c18","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809341260"},{"key":"c19","doi-asserted-by":"crossref","unstructured":"Fan,\n\t\t\t\t\t\t\tX. & \t\t\t\t\t\t\t\tSun,\n\t\t\t\t\t\t\tS. \t\t\t\t\t\t(2013). Item response model. In \t\t\t\t\t\tT. Timothy \t\t\t\t\t\t(Ed.), Handbook of quantitative \t\t\t\t\t\t\tmethods for educational research (pp. \t\t\t\t\t\t45\u201367). Rotterdam, The \t\t\t\t\t\tNetherlands: Sense \t\t\t\t\t\tPublisher.","DOI":"10.1007\/978-94-6209-404-8_3"},{"key":"c20","doi-asserted-by":"publisher","DOI":"10.1111\/josh.12049"},{"key":"c21","doi-asserted-by":"publisher","DOI":"10.3102\/0013189X005010003"},{"key":"c22","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2011.643171"},{"key":"c23","doi-asserted-by":"publisher","DOI":"10.1027\/0044-3409.217.4.205"},{"key":"c24","volume-title":"The development of a multi-dimensional measure of cyberbullying","author":"Griezel L.","year":"2008"},{"key":"c25","doi-asserted-by":"publisher","DOI":"10.9707\/2307-0919.1111"},{"key":"c26","unstructured":"Hedges, L.\n\t\t\t\t\t\t\tV. (1982). \t\t\t\t\t\t\tStatistical methodology in \t\t\t\t\t\tmeta-analysis. (ERIC Document Reproduction \t\t\t\t\t\tService No. ED 227\u2013133)."},{"key":"c27","doi-asserted-by":"publisher","DOI":"10.1002\/jrsm.5"},{"key":"c28","doi-asserted-by":"publisher","DOI":"10.1080\/01639620701457816"},{"key":"c29","volume-title":"Masculinity and femininity: The taboo dimension of national cultures","author":"Hofstede G.","year":"1998"},{"key":"c30","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.06.005"},{"key":"c31","doi-asserted-by":"publisher","DOI":"10.1037\/a0029482"},{"key":"c32","doi-asserted-by":"publisher","DOI":"10.1027\/1864-1105.21.1.25"},{"key":"c33","doi-asserted-by":"publisher","unstructured":"Kowalski, R.\n\t\t\t\t\t\t\tM., \t\t\t\t\t\t\tGiumetti, G.\n\t\t\t\t\t\t\t\tW., \t\t\t\t\t\t\t\tSchroeder, A.\n\t\t\t\t\t\t\t\tN. & \t\t\t\t\t\t\t\tLattanner, M.\n\t\t\t\t\t\t\t\tR. (2014). \t\t\t\t\t\tBullying in the digital age: A critical review and \t\t\t\t\t\tmeta-analysis of cyberbullying research among youth. \t\t\t\t\t\t\tPsychological Bulletin. \t\t\t\t\t\tAdvance online publication. doi: 10.1037\/a0035618","DOI":"10.1037\/a0035618"},{"key":"c34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.017"},{"key":"c35","doi-asserted-by":"publisher","DOI":"10.1177\/0143034312445244"},{"key":"c36","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.014"},{"key":"c37","doi-asserted-by":"publisher","DOI":"10.1177\/0143034306064547"},{"key":"c38","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2005.10.005"},{"key":"c39","volume-title":"Practical meta-analysis","author":"Lipsey M. W.","year":"2001"},{"key":"c40","first-page":"64","volume":"26","author":"Loftus E. F.","year":"1987","journal-title":"Michigan Quarterly Review"},{"key":"c41","doi-asserted-by":"publisher","DOI":"10.1080\/13632752.2012.704310"},{"key":"c42","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2009.0068"},{"key":"c43","doi-asserted-by":"publisher","DOI":"10.1111\/j.1939-0025.2010.01040.x"},{"key":"c44","doi-asserted-by":"publisher","DOI":"10.1177\/0143034312445242"},{"key":"c45","doi-asserted-by":"publisher","DOI":"10.1007\/s10212-012-0137-2"},{"key":"c46","doi-asserted-by":"publisher","DOI":"10.1027\/0044-3409.217.4.197"},{"key":"c47","doi-asserted-by":"publisher","DOI":"10.1186\/1753-2000-4-28"},{"key":"c48","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2013.04.002"},{"key":"c49","doi-asserted-by":"publisher","DOI":"10.1177\/0143034311401700"},{"key":"c50","doi-asserted-by":"publisher","DOI":"10.1002\/ab.20336"},{"key":"c51","first-page":"51","volume":"29","author":"Price M.","year":"2010","journal-title":"Youth Studies Australia"},{"key":"c52","unstructured":"Savage,\n\t\t\t\t\t\t\tM. \t\t\t\t\t\t(2012). Developing a measure of cyberbullying \t\t\t\t\t\tperpetration and victimization (Doctoral dissertation). \t\t\t\t\t\tRetrieved from http:\/\/repository.asu.edu\/attachments\/94134\/content\/tmp\/package-8y6MUh\/Savage_asu_0010E_12199.pdf"},{"key":"c53","doi-asserted-by":"publisher","DOI":"10.1080\/13632752.2012.704317"},{"key":"c54","unstructured":"Shaver, J.\n\t\t\t\t\t\t\tP. (1991). \t\t\t\t\t\tQuantitative reviewing of research. In \t\t\t\t\t\tJ.\n\t\t\t\t\t\t\t\tP. Shaver \t\t\t\t\t\t(Ed.), Handbook of research on \t\t\t\t\t\t\tsocial studies teaching and learning (pp. \t\t\t\t\t\t83\u201397). New York, \t\t\t\t\t\tNY: \t\t\t\t\tMacmillan."},{"key":"c55","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2008.01.003"},{"key":"c56","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8624.00461"},{"key":"c57","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"c58","doi-asserted-by":"publisher","DOI":"10.3844\/jssp.2010.510.514"},{"key":"c59","doi-asserted-by":"publisher","DOI":"10.1002\/casp.2136"},{"key":"c60","doi-asserted-by":"crossref","unstructured":"Tanner-Smith,\n\t\t\t\t\t\t\tE. & \t\t\t\t\t\t\t\tTipton,\n\t\t\t\t\t\t\t\tE. (in \t\t\t\t\tpress). Robust variance estimation with dependent effect sizes: \t\t\t\t\t\tPractical considerations and a software tutorial in Stata and \t\t\t\t\t\tSPSS. Research Synthesis \t\t\t\t\t\tMethods, 5, \t\t\t\t\t\t13\u201330.","DOI":"10.1002\/jrsm.1091"},{"key":"c61","doi-asserted-by":"publisher","DOI":"10.1002\/jrsm.1070"},{"key":"c62","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"c63","doi-asserted-by":"publisher","DOI":"10.1177\/0165025408095553"},{"key":"c64","first-page":"628","volume":"24","author":"Wachs S.","year":"2012","journal-title":"Psicothema"},{"key":"c65","doi-asserted-by":"publisher","DOI":"10.1111\/j.1099-0860.2009.00260.x"},{"key":"c66","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2011.00606.x"},{"key":"c67","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2009.03.021"},{"key":"c68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2011.12.031"},{"key":"c69","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.09.010"},{"key":"c70","doi-asserted-by":"publisher","DOI":"10.1177\/0143034313479692"}],"container-title":["Journal of Media Psychology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/econtent.hogrefe.com\/doi\/pdf\/10.1027\/1864-1105\/a000185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T10:58:09Z","timestamp":1703156289000},"score":1,"resource":{"primary":{"URL":"https:\/\/econtent.hogrefe.com\/doi\/10.1027\/1864-1105\/a000185"}},"subtitle":["A Meta-Analysis"],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":70,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["10.1027\/1864-1105\/a000185"],"URL":"https:\/\/doi.org\/10.1027\/1864-1105\/a000185","relation":{},"ISSN":["1864-1105","2151-2388"],"issn-type":[{"value":"1864-1105","type":"print"},{"value":"2151-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}