{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:20:23Z","timestamp":1777936823124,"version":"3.51.4"},"reference-count":125,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T00:00:00Z","timestamp":1457481600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2017,8]]},"abstract":"<jats:p>Cyberbullying has become a critical social issue, which severely threatens children and adolescents\u2019 physical and psychological health. The current research systematically examined the predictors of cyberbullying from the social cognitive and media effects approach. Specifically, this study identified 16 predictors of cyberbullying perpetration and victimization and examined the magnitude of the effects of these predictors by meta-analyzing 81 empirical studies, which represented a total sample of 99,741 participants and yielded 259 independent correlations. The results revealed that risky information and communications technology (ICT) use, moral disengagement, depression, social norms, and traditional bullying perpetration were the main predictors of cyberbullying perpetration, while risky ICT use and traditional bullying victimization were the major contributors of cyberbullying victimization. According to the moderator analyses, country of the sample, sampling method, age, and media platform were significant moderators of the relationships between some specific predictors and cyberbullying perpetration and victimization. Implications for future cyberbullying research were discussed.<\/jats:p>","DOI":"10.1177\/1461444816634037","type":"journal-article","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T21:23:54Z","timestamp":1457558634000},"page":"1194-1213","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":303,"title":["A meta-analysis of factors predicting cyberbullying perpetration and victimization: From the social cognitive and media effects approach"],"prefix":"10.1177","volume":"19","author":[{"given":"Liang","family":"Chen","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Shirley S","family":"Ho","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"May O","family":"Lwin","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"179","published-online":{"date-parts":[[2016,3,9]]},"reference":[{"issue":"4","key":"bibr1-1461444816634037","first-page":"192","volume":"13","author":"*Akbulut Y","year":"2010","journal-title":"Educational Technology & Society"},{"issue":"1","key":"bibr2-1461444816634037","first-page":"1","volume":"29","author":"Akbulut Y","year":"2014","journal-title":"Australian Educational Computing"},{"key":"bibr3-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1002\/9781119954484.ch11"},{"issue":"13","key":"bibr4-1461444816634037","first-page":"2619","volume":"26","author":"*Ang RP","year":"2010","journal-title":"Journal of Interpersonal Violence"},{"key":"bibr5-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/009365027600300101"},{"key":"bibr6-1461444816634037","volume-title":"Social Foundations of Thought and Action: A Social Cognitive Theory","author":"Bandura A","year":"1986"},{"key":"bibr7-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1037\/a0028113"},{"key":"bibr8-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2014.05.009"},{"key":"bibr9-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1111\/sode.12134"},{"key":"bibr10-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/0272431609350927"},{"key":"bibr11-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/00405841.2013.829727"},{"key":"bibr12-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1093\/deafed\/enq043"},{"key":"bibr13-1461444816634037","unstructured":"Belsey B (2004) Cyber-bullying: an emerging threat to the \u201calways on\u201d generation. Available at: http:\/\/www.bullying.org.html (accessed 10 March 2014)."},{"key":"bibr14-1461444816634037","unstructured":"Beyondblue (2011) Depression in Adolescents and Young Adults. Available at: https:\/\/www.nhmrc.gov.au\/_files_nhmrc\/publications\/attachments\/ext0007_cp_guideline_depression_adolescents_young_beyondblue.pdf (accessed 10 August 2015)."},{"key":"bibr15-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/0044118X11407525"},{"issue":"2","key":"bibr16-1461444816634037","first-page":"71","volume":"13","author":"Braithwaite V","year":"2009","journal-title":"International Journal of Organisational Behaviour"},{"key":"bibr17-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/17482790903233366"},{"key":"bibr18-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.073"},{"key":"bibr19-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/21711976.2015.1016754"},{"key":"bibr20-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/S0363-8111(99)80160-X"},{"key":"bibr21-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2014.954045"},{"key":"bibr22-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/0829573513491212"},{"key":"bibr23-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1007\/s00038-014-0643-x"},{"key":"bibr24-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.comppsych.2014.11.013"},{"key":"bibr25-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71799-9"},{"key":"bibr26-1461444816634037","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J","year":"1988"},{"key":"bibr27-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8721.ep10768783"},{"key":"bibr28-1461444816634037","unstructured":"Colby A, Ehrlich T (2003) Undergraduate Education and the Development of Moral and Civic Responsibility. Available at: http:\/\/www.gwu.edu\/~ccps\/Colby.html (accessed 10 August 2015)."},{"key":"bibr29-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/1541204013503889"},{"key":"bibr30-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1037\/a0020149"},{"issue":"4","key":"bibr31-1461444816634037","first-page":"608","volume":"24","author":"*Del Rey R","year":"2012","journal-title":"Psicothema"},{"key":"bibr32-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1007\/s10566-014-9292-8"},{"key":"bibr33-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-3148.2009.00520.x"},{"key":"bibr34-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0008"},{"key":"bibr35-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809341260"},{"key":"bibr36-1461444816634037","first-page":"49","volume-title":"Principles of Cyberbullying Research: Definition, Methods, and Measures","author":"Espelage DL","year":"2013"},{"key":"bibr37-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.22.1.103"},{"key":"bibr38-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2012.01442.x"},{"key":"bibr39-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2013.781514"},{"key":"bibr40-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/01650250444000333"},{"key":"bibr41-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1111\/josh.12049"},{"key":"bibr42-1461444816634037","first-page":"1","volume":"1","author":"*Foley C","year":"2014","journal-title":"Educational Policy"},{"key":"bibr43-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2013.03.030"},{"issue":"3","key":"bibr44-1461444816634037","first-page":"141","volume":"49","author":"Gifford R","year":"2014","journal-title":"International Journal of Psychology"},{"key":"bibr45-1461444816634037","doi-asserted-by":"publisher","DOI":"10.2307\/258770"},{"issue":"1","key":"bibr46-1461444816634037","volume":"7","author":"*G\u00f6rzig A","year":"2013","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"bibr47-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2012.739756"},{"key":"bibr48-1461444816634037","doi-asserted-by":"publisher","DOI":"10.2190\/EC.46.4.e"},{"key":"bibr49-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1002\/pits.21841"},{"key":"bibr50-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-057065-5.50010-5"},{"key":"bibr51-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.3.4.486"},{"issue":"2","key":"bibr52-1461444816634037","first-page":"1","volume":"2","author":"*Heirman W","year":"2008","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"bibr53-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2011.11.019"},{"key":"bibr54-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/0886260514553636"},{"key":"bibr55-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/13811118.2010.494133"},{"key":"bibr56-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/0093650207313159"},{"key":"bibr57-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/10810730.2013.811329"},{"key":"bibr58-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1002\/9781119954484.ch7"},{"key":"bibr59-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/0829573514556853"},{"key":"bibr60-1461444816634037","first-page":"1","volume":"1","author":"*Holt TJ","year":"2014","journal-title":"International Journal of Offender Therapy and Comparative Criminology"},{"issue":"1","key":"bibr61-1461444816634037","first-page":"1","volume":"8","author":"Hymel S","year":"2005","journal-title":"Journal of Social Sciences"},{"key":"bibr62-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/2167696813490159"},{"key":"bibr63-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0735-2_13"},{"key":"bibr64-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1108\/S2044-9968(2012)0000005016"},{"key":"bibr65-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1037\/a0035618"},{"key":"bibr66-1461444816634037","volume-title":"Cyberbullying: Bullying in the Digital Age","author":"Kowalski RM","year":"2008"},{"key":"bibr67-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/0143034312445244"},{"key":"bibr68-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.014"},{"key":"bibr69-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.12.015"},{"key":"bibr70-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/13632752.2012.704313"},{"key":"bibr71-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2005.10.005"},{"key":"bibr72-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1037\/a0030308"},{"key":"bibr73-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2011.06.007"},{"key":"bibr74-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2010.12.436"},{"key":"bibr75-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/01639620903004903"},{"key":"bibr76-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/07380569.2011.575753"},{"key":"bibr77-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2009.0068"},{"key":"bibr78-1461444816634037","unstructured":"Microsoft (2012) Online Bullying among Youth 8\u201317 Years Old. Available at: http:\/\/download.microsoft.com\/download\/E\/8\/4\/E84BEEAB-7B92-4CF8-B5C7-7CC20D92B4F9\/WW%20Online%20Bullying%20Survey%20%20Executive%20Summary%20-%20China_Final.pdf (accessed 10 December 2013)."},{"key":"bibr79-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2011.08.032"},{"key":"bibr80-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2010.06.009"},{"key":"bibr81-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2007.04.015"},{"issue":"154","key":"bibr82-1461444816634037","first-page":"315","volume":"39","author":"Mouttapa M","year":"2004","journal-title":"Adolescence"},{"key":"bibr83-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/02732173.2012.628560"},{"key":"bibr84-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1007\/s10212-012-0137-2"},{"key":"bibr85-1461444816634037","unstructured":"NCH (2005) Putting U in the Picture: Mobile Bullying Survey. Available at: http:\/\/www.avaproject.org.uk\/media\/28482\/mobile_bullying_report.pdf (accessed 10 December 2013)."},{"key":"bibr86-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/0272431614556891"},{"key":"bibr87-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2013.858626"},{"issue":"2","key":"bibr88-1461444816634037","first-page":"328","volume":"45","author":"*Pabian S","year":"2015","journal-title":"An Investigation of Short-Term Longitudinal Associations between Social Anxiety and Victimization and Perpetration of Traditional Bullying and Cyberbullying"},{"key":"bibr89-1461444816634037","first-page":"1","volume":"1","author":"*Pabian S","year":"2015","journal-title":"International Journal of Behavioral Development"},{"key":"bibr90-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/1541204006286288"},{"key":"bibr91-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2010.00548.x"},{"key":"bibr92-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1207\/S15327825MCS0301_04"},{"key":"bibr93-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2011.643168"},{"key":"bibr94-1461444816634037","volume-title":"The biennial SRCD meeting","author":"*Perren S","year":"2011"},{"issue":"28","key":"bibr95-1461444816634037","first-page":"1","volume":"4","author":"Perren S","year":"2010","journal-title":"Child and Adolescent Psychiatry and Mental Health"},{"key":"bibr96-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1002\/ab.20336"},{"key":"bibr97-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1007\/s12310-013-9104-6"},{"key":"bibr98-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/13632752.2012.704319"},{"key":"bibr99-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/0735648X.2011.641816"},{"key":"bibr100-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/01463373.2013.860906"},{"key":"bibr101-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2012.762921"},{"key":"bibr102-1461444816634037","doi-asserted-by":"publisher","DOI":"10.4135\/9781412984997"},{"key":"bibr103-1461444816634037","volume-title":"How Is Parenting Style Related to Child Antisocial Behaviour? Preliminary Findings from the Helping Children Achieve Study","author":"Scott S","year":"2012"},{"key":"bibr104-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-013-9928-2"},{"key":"bibr105-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2007.00611.x"},{"key":"bibr106-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"bibr107-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/0272-7358(96)00005-0"},{"key":"bibr108-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1002\/casp.2136"},{"key":"bibr109-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"bibr110-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/10926771.2015.1049763"},{"key":"bibr111-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"issue":"2","key":"bibr112-1461444816634037","first-page":"155","volume":"13","author":"*Twyman K","year":"2010","journal-title":"Cyberpsychology, Behavior & Social Networking"},{"key":"bibr113-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12024"},{"key":"bibr114-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2011.644919"},{"key":"bibr115-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1111\/j.1099-0860.2009.00260.x"},{"issue":"1","key":"bibr116-1461444816634037","first-page":"86","volume":"31","author":"*Wegge D","year":"2015","journal-title":"The Journal of Early Adolescence"},{"key":"bibr117-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1080\/15374416.2013.787623"},{"key":"bibr118-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.019"},{"key":"bibr119-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.09.003"},{"key":"bibr120-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1002\/ab.21470"},{"key":"bibr121-1461444816634037","first-page":"1","volume":"1","author":"*Wright MF","year":"2015","journal-title":"School Psychology International"},{"issue":"1","key":"bibr122-1461444816634037","first-page":"34","volume":"8","author":"*Xiao B","year":"2013","journal-title":"International Journal of Business and Information"},{"key":"bibr123-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1097\/01.chi.0000186401.05465.2c"},{"key":"bibr124-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2004.03.007"},{"key":"bibr125-1461444816634037","doi-asserted-by":"publisher","DOI":"10.1177\/0143034313479692"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816634037","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444816634037","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816634037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:44:24Z","timestamp":1777693464000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444816634037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,9]]},"references-count":125,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["10.1177\/1461444816634037"],"URL":"https:\/\/doi.org\/10.1177\/1461444816634037","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,9]]}}}