Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

Adolescents' Cyber Victimization : The Influence of Technologies, Gender, and Gender Stereotype Traits

Abstract

The purpose of the present study was to investigate the role of gender and gender stereotype traits (masculinity, femininity) in cyber victimization behaviors (cyber relational victimization, cyber verbal victimization, hacking) through different technologies (mobile phones, gaming consoles, social networking sites). There were 456 8th graders (226 females; M age = 13.66, SD = 0.41) from two midwestern middle schools in the United States included in this study. They completed questionnaires on their endorsement of masculine and feminine traits, and self-reported cyber victimization through different technologies. The findings revealed main effects of types of cyber victimization for boys and of technology for girls. In particular, boys with feminine traits experienced the most victimization by cyber verbal aggression, cyber relational aggression, and hacking when compared to the other groups of boys. Girls with feminine traits experienced the most cyber victimization through social networking sites, gaming consoles, and mobile phones in comparison to the other groups of girls. For girls with feminine traits, they reported more cyber relational victimization and cyber verbal victimization through mobile phones and social networking sites, as well as more hacking via social networking sites. Such findings underscore the importance of considering gender stereotype traits, types of victimization, and technologies when examining cyber victimization

Similar works

Full text

thumbnail-image

Univerzitní repozitář Masarykovy univerzity

redirect
Last time updated on 20/12/2020

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.