{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T19:00:15Z","timestamp":1705950015660},"reference-count":34,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4,1]]},"abstract":"<p>The present study examined coping strategies for cyber victimization among 270 (130 women) emerging adults, and how these strategies related to cyber aggression one year later (Time 2). The most frequently utilized coping strategies among emerging adults were telling one's friends and ignoring the aggressor. The coping strategies of telling no one, getting revenge against the aggressor, pretending it didn't happen, waiting for the aggressor to stop, and crying were related to cyber victimization one year later. Blocking the aggressor and getting revenge against the aggressor were associated with Time 2 cyber aggression perpetration. Tell my friends related negatively to their involvement in cyber aggression. This research has implications for interventions aimed at reducing these behaviors among emerging adults.<\/p>","DOI":"10.4018\/ijcbpl.2015040101","type":"journal-article","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T11:40:19Z","timestamp":1439379619000},"page":"1-14","source":"Crossref","is-referenced-by-count":3,"title":["Emerging Adults' Coping Strategies"],"prefix":"10.4018","volume":"5","author":[{"given":"Michelle F.","family":"Wright","sequence":"first","affiliation":[{"name":"Faculty of Social Studies, Masaryk University, Brno, Czech Republic"}]}],"member":"2432","reference":[{"key":"ijcbpl.2015040101-0","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0016"},{"key":"ijcbpl.2015040101-1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026460917338"},{"key":"ijcbpl.2015040101-2","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.24.2.247"},{"key":"ijcbpl.2015040101-3","doi-asserted-by":"publisher","DOI":"10.1080\/01650250143000012"},{"key":"ijcbpl.2015040101-4","author":"J.Cohen","year":"2003","journal-title":"Applied multiple regression\/correlation analysis for the behavioral sciences"},{"key":"ijcbpl.2015040101-5","doi-asserted-by":"publisher","DOI":"10.1037\/0022-006X.56.3.405"},{"key":"ijcbpl.2015040101-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcrimjus.2010.07.007"},{"key":"ijcbpl.2015040101-7","doi-asserted-by":"publisher","DOI":"10.1037\/0882-7974.11.1.127"},{"issue":"3","key":"ijcbpl.2015040101-8","first-page":"1307","article-title":"Psychological needs as a predictor of cyber bullying: A preliminary report on college students.","volume":"9","author":"B.Dilmac","year":"2009","journal-title":"Kuram ve Uygulamada E\u011fitim Bilimleri"},{"key":"ijcbpl.2015040101-9","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.58.5.844"},{"key":"ijcbpl.2015040101-10","doi-asserted-by":"publisher","DOI":"10.1177\/0886260503262083"},{"key":"ijcbpl.2015040101-11","doi-asserted-by":"publisher","DOI":"10.1002\/ab.21437"},{"key":"ijcbpl.2015040101-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2007.04.005"},{"key":"ijcbpl.2015040101-13","unstructured":"Jones, S., & Fox, S. (2009). Generations online in 2009. Retrieved from:http:\/\/www.pewinternet.org\/Reports\/2009\/Generations-Online-in-2009.aspx"},{"key":"ijcbpl.2015040101-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.017"},{"key":"ijcbpl.2015040101-15","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"ijcbpl.2015040101-16","doi-asserted-by":"publisher","DOI":"10.1080\/13632752.2012.704310"},{"key":"ijcbpl.2015040101-17","doi-asserted-by":"publisher","DOI":"10.1017\/S1360641701002647"},{"key":"ijcbpl.2015040101-18","doi-asserted-by":"publisher","DOI":"10.1177\/1948550610386388"},{"issue":"4","key":"ijcbpl.2015040101-19","first-page":"634","article-title":"Online and offline peer led models against bullying and cyberbullying.","volume":"24","author":"B. E.Palladino","year":"2012","journal-title":"Psicothema"},{"key":"ijcbpl.2015040101-20","doi-asserted-by":"publisher","DOI":"10.1002\/ab.20336"},{"key":"ijcbpl.2015040101-21","doi-asserted-by":"publisher","DOI":"10.1037\/1040-3590.6.1.41"},{"key":"ijcbpl.2015040101-22","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-005-5680-8"},{"issue":"3","key":"ijcbpl.2015040101-23","first-page":"298","article-title":"Cyberbullying in Germany \u2013 an exploration of prevalence, overlapping with real life bullying and coping strategies.","volume":"51","author":"J.Riebel","year":"2009","journal-title":"Psychology Science Quarterly"},{"key":"ijcbpl.2015040101-24","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"ijcbpl.2015040101-25","doi-asserted-by":"publisher","DOI":"10.1007\/s10802-008-9239-3"},{"key":"ijcbpl.2015040101-26","doi-asserted-by":"publisher","DOI":"10.1007\/s10802-013-9805-1"},{"key":"ijcbpl.2015040101-27","doi-asserted-by":"publisher","DOI":"10.1177\/1077801210370027"},{"key":"ijcbpl.2015040101-28","doi-asserted-by":"publisher","DOI":"10.1002\/casp.2142"},{"key":"ijcbpl.2015040101-29","doi-asserted-by":"publisher","DOI":"10.1007\/s11528-011-0481-0"},{"key":"ijcbpl.2015040101-30","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8309.1998.tb01177.x"},{"key":"ijcbpl.2015040101-31","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0061"},{"key":"ijcbpl.2015040101-32","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-012-9903-3"},{"key":"ijcbpl.2015040101-33","doi-asserted-by":"publisher","DOI":"10.1002\/ab.21470"}],"container-title":["International Journal of Cyber Behavior, Psychology and Learning"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=135312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T14:52:44Z","timestamp":1654095164000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcbpl.2015040101"}},"subtitle":["Longitudinal Linkages to their Involvement in Cyber Aggression and Cyber Victimization"],"short-title":[],"issued":{"date-parts":[[2015,4,1]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcbpl.2015040101","relation":{},"ISSN":["2155-7136","2155-7144"],"issn-type":[{"value":"2155-7136","type":"print"},{"value":"2155-7144","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,1]]}}}