{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:19:40Z","timestamp":1777936780902,"version":"3.51.4"},"reference-count":73,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2016,7,9]],"date-time":"2016-07-09T00:00:00Z","timestamp":1468022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2017,3]]},"abstract":"<jats:p>Cyberbullying can be harmful to adolescents using online technology, and one way of combating it may be to use interventions that have been successfully utilised for traditional bullying, such as encouraging peer bystander intervention. The online environment, however, differs notably from the environment in which traditional bullying takes place raising questions about the suitability of transferring traditional bullying approaches to the cyber environment. This study explored the perceptions of, and key influences on, adolescent bystanders who witness cyberbullying. In all, 24 interviews were conducted with students aged 13\u201316 years. Relationships emerged as a key theme with participants believing that a bystander\u2019s relationship with both the perpetrator and the target influenced whether they would intervene when witnessing cyberbullying. Relationships also influenced their ability to understand the context of the situation, the perceived severity of the effect of the incident on the target and therefore the need, or otherwise, to seek help from adults.<\/jats:p>","DOI":"10.1177\/1461444815606369","type":"journal-article","created":{"date-parts":[[2015,9,21]],"date-time":"2015-09-21T19:59:23Z","timestamp":1442865563000},"page":"366-383","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":43,"title":["Adolescent perceptions of bystanders\u2019 responses to cyberbullying"],"prefix":"10.1177","volume":"19","author":[{"given":"Lisa J","family":"Patterson","sequence":"first","affiliation":[]},{"given":"Alfred","family":"Allan","sequence":"additional","affiliation":[{"name":"Edith Cowan University, Australia"}]},{"given":"Donna","family":"Cross","sequence":"additional","affiliation":[{"name":"Telethon Kids Institute, The University of Western Australia, Australia; Edith Cowan University, Australia"}]}],"member":"179","published-online":{"date-parts":[[2016,7,9]]},"reference":[{"key":"bibr1-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0079"},{"key":"bibr2-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/0305724022014322"},{"key":"bibr3-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1002\/casp.2137"},{"key":"bibr4-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/13645570050178594"},{"key":"bibr5-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.10.036"},{"key":"bibr6-1461444815606369","volume-title":"Principles of Cyberbullying Research: Definitions, Measures, and Methodology","author":"Bauman S","year":"2013"},{"key":"bibr7-1461444815606369","doi-asserted-by":"publisher","DOI":"10.4324\/9780203084601"},{"key":"bibr8-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2012.04.012"},{"issue":"2","key":"bibr9-1461444815606369","first-page":"15","volume":"1","author":"Beran T","year":"2007","journal-title":"Journal of Student Wellbeing"},{"key":"bibr10-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1375\/ajgc.18.1.53"},{"key":"bibr11-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"bibr12-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0275"},{"key":"bibr13-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2014.954045"},{"key":"bibr14-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1375\/ajgc.15.1.68"},{"key":"bibr15-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1177\/0829573512450567"},{"key":"bibr16-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1375\/ajgc.19.2.196"},{"key":"bibr17-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1177\/082957359801300205"},{"key":"bibr18-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1177\/0143034300211002"},{"key":"bibr19-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1002\/9781119954484.ch14"},{"key":"bibr20-1461444815606369","unstructured":"Cross D, Monks H, Campbell M, (2011, February) School-Based Strategies to Address Cyber-Bullying (Occasional Paper 119). Melbourne: Centre for Strategic Education, pp. 1\u201310 Available at: http:\/\/ro.ecu.edu.au\/ecuworks2011\/356\/ (accessed 7 December 2014)."},{"key":"bibr21-1461444815606369","volume-title":"Australian Covert Bullying Prevalence Study","author":"Cross D","year":"2009"},{"key":"bibr22-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2013.0027"},{"key":"bibr23-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2007.05.002"},{"key":"bibr24-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsp.2008.02.001"},{"key":"bibr25-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9507.00178"},{"key":"bibr26-1461444815606369","doi-asserted-by":"publisher","DOI":"10.4135\/9781446249420"},{"key":"bibr27-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2012.706448"},{"key":"bibr28-1461444815606369","volume-title":"Handbook of Interview Research","author":"Holstein JA","year":"2002"},{"key":"bibr29-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1177\/1468794109356737"},{"key":"bibr30-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0588"},{"key":"bibr31-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.89.2.308"},{"key":"bibr32-1461444815606369","volume-title":"Teens, Kindness and Cruelty on Social Network Sites: How American Teens Navigate the New World of \u2018Digital Citizenship\u2019","author":"Lenhart A","year":"2011"},{"key":"bibr33-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1111\/jcpp.12197"},{"key":"bibr34-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1207\/s15430421tip4404_6"},{"key":"bibr35-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1002\/casp.2135"},{"key":"bibr36-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2012.706449"},{"key":"bibr37-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0002"},{"key":"bibr38-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2009.05.004"},{"key":"bibr39-1461444815606369","first-page":"238","volume-title":"Principles of Cyberbullying Research: Definitions, Measures, and Methodology","author":"Mishna F","year":"2013"},{"key":"bibr40-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1177\/0143034312445242"},{"key":"bibr41-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2011.578276"},{"key":"bibr42-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1006\/jado.1999.0238"},{"key":"bibr43-1461444815606369","first-page":"9","volume-title":"Handbook of Bullying in Schools: An International Perspective","author":"Olweus D","year":"2010"},{"key":"bibr44-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2012.705086"},{"key":"bibr45-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2012.682358"},{"key":"bibr46-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/02643944.2012.688065"},{"key":"bibr47-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1177\/1541204006286288"},{"key":"bibr48-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.07.009"},{"key":"bibr49-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1375\/ajgc.21.1.1"},{"issue":"2","key":"bibr50-1461444815606369","first-page":"283","volume":"6","author":"Perren S","year":"2012","journal-title":"International Journal of Conflict and Violence"},{"key":"bibr51-1461444815606369","volume-title":"Looking Forward through the Lifespan","author":"Peterson C","year":"1989"},{"key":"bibr52-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1353\/mpq.0.0046"},{"key":"bibr53-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1177\/0165025410378068"},{"key":"bibr54-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2009.08.007"},{"key":"bibr55-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/15374416.2011.597090"},{"key":"bibr56-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/136455700294932"},{"key":"bibr57-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511551260"},{"key":"bibr58-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2007.00611.x"},{"key":"bibr59-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.024"},{"key":"bibr60-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2012.689821"},{"key":"bibr61-1461444815606369","first-page":"26","volume-title":"Principles of Cyberbullying Research: Definitions, Measures, and Methodology","author":"Smith PK","year":"2012"},{"key":"bibr62-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"bibr63-1461444815606369","first-page":"201","volume-title":"Cyberbullying through New Media: Findings from an International Network","author":"Spears B","year":"2013"},{"key":"bibr64-1461444815606369","volume-title":"Behind the Scenes: Insights into the Human Dimension of Covert Bullying","author":"Spears B","year":"2008"},{"key":"bibr65-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1108\/13522750610640530"},{"key":"bibr66-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"bibr67-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1007\/s11218-006-9009-4"},{"key":"bibr68-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1086\/651197"},{"key":"bibr69-1461444815606369","doi-asserted-by":"publisher","DOI":"10.5811\/westjem.2012.3.11792"},{"key":"bibr70-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"bibr71-1461444815606369","first-page":"473","volume-title":"Child and Adolescent Development: An Advanced Course","author":"Turiel E","year":"2008"},{"key":"bibr72-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogdev.2007.04.001"},{"key":"bibr73-1461444815606369","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2004.00328.x"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444815606369","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444815606369","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444815606369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:43:35Z","timestamp":1777693415000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444815606369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,9]]},"references-count":73,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["10.1177\/1461444815606369"],"URL":"https:\/\/doi.org\/10.1177\/1461444815606369","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,9]]}}}