An Examination of the Relationship Between Self‐Control and Cyber  Victimization in Adolescents

An Examination of the Relationship Between Self‐Control and Cyber  Victimization in Adolescents

Purpose: Cyber bullying is a new phenomenon which adversely affects young people. Exposure to the cyber bullying can negatively affect the mental health. The aim of this study is to examine the predictive effect of self-control on cyber victimization in adolescents. Research Methods: The study group was composed of 353 Turkish secondary school students. The research data were collected using the Brief Self-Control Scale and Cyber Victimization Scale. To examine predictive relationships between self-control and cyber victimization, the descriptive relational model wasused. In the study, the analysis of the data was made using the Pearson Correlation Coefficient and structural equation modelling. Findings: As a result of the study, significant relationships were determined in the negative direction, at low and moderate level between the impulsivity and self-discipline sub-dimensions of the self-control scale and cyber language victimization, hidden identities and cyber forgery sub-dimensions of the cyber victimization scale. Another result of the study was that the self-control latent variable (SC) covering the impulsivity and self-discipline sub-dimensions predicted negatively the cyber victimization latent variable (CV), which relates to cyber language victimization, hidden identity and cyber forgery subdimensions. Implications for Research and Practice: As a result of the study, it was found that self-control predicted cyber victimization in a negative way. The structural modelling analysis indicated that the model related to self-control's predicting cyber victimization was acceptable and the model could account for the relationships between the observed and the latent variables sufficiently. Counselors can place students in activities to improve their selfcontrol skills.

___

  • Akbulut, Y., & Erıstı, B. (2011). Cyberbullying and victimisation among Turkish university students. Australasian Journal of Educational Technology, 27(7), 1155-1170.
  • Antoniadou, N., & Kokkinos, C.M. (2015). Cyber and school bullying: Same or different phenomena? Aggression and Violent Behavior, 25, 363-372.
  • Ates, B., & Guler, M. (2016). Ergenlerde siber zorbalığın yordayıcısı olarak algılanan sosyal yetkinlik ve toplumsal kaygı. [Perceived social competence and social anxiety as a predictor of cyberbullying in adolescents]. Erzincan Universitesi Egitim Fakultesi Dergisi, 18(1), 391-408.
  • Bauman, S., & Newman, M.L. (2013). Testing assumptions about cyberbullying: Perceived distress associated with acts of conventional and cyberbullying. Psychology of Violence, 3, 27-38.
  • Baumeister, R.F., Bratlavsky, E., Muraven, M., & Tice, D.M. (1998). Ego depletion: Is the active self a limited resource? Journal of Personality and Social Psychology, 74, 1252-1265.
  • Berson, M.J. (2000). The computer can’t see you blush. Kappa Delta Pi Record, 36(4), 158-162.
  • Brown, C.F., Demaray, M. K., & Secord, S.M. (2014). Cyber victimization in middle school and relations to social emotional outcomes. Computers in Human Behavior, 35, 12-21.
  • Bossler, A.M., & Holt, T.J. (2010). The effect of self-control on victimization in the cyber world. Journal of Criminal Justice, 38, 227-236.
  • Bossler, A.M., & Holt, T.J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3, 400-420.
  • Bonanno, R.A., & Hymel, S. (2013). Cyber bullying and internalizing difficulties: Above and beyond the impact of traditional forms of bullying. Journal of Youth and Adolescence, 42, 685-697.
  • Byrne, B.M. (2010). Structural equation modeling with AMOS: Basic concepts, applications, and programming (2nd ed.). New York: Taylor and Francis.
  • Cetın, B., Yaman, E., & Peker, A. (2011). Cyber victim and bullying scale: A Study of validity and reliability. Computer&Education, 57(4), 2261-2271.
  • DePaolis, K., & Williford, A. (2014). The nature and prevalence of cyber victimization among elementary school children. Child Youth Care Forum, 44, 377-393.
  • Dogan, U., & Tosun, N.I. (2016). Lise öğrencilerinde problemli akıllı telefon kullanımının sosyal kaygı ve sosyal ağların kullanımına aracılık etkisi. [Mediating effect of problematic smartphone use on the relationship between social anxiety and social network usage of high school students]. Adıyaman Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, 8(22), 99-128.
  • Eroglu, Y. (2016). Üniversite öğrencilerinde problemli internet kullanımı: İlişkiselkarşılıklı bağımlı benlik kurgusu ve dürtüselliğin yordama güçleri.
  • [Problematic internet use in universıty students: The predictive stenght of relational-interdependent self-construal and impulsivity]. Turkish Studies, 11(3), 1091-1114.
  • Felmlee, D., & Faris, R. (2016). Toxic ties: Networks of friendship, dating, and cyber victimization. Social Psychology Quarterly, 79(3), 243-262.
  • Forde, D.R., & Kennedy, L. W. (1997). Risky lifestyles, routine activities, and the general theory of crime. Justice Quarterly, 14, 265-294.
  • Gilboa, N. (1996). Elites, lamers, narcs and whores: Exploring the computer underground. In L. Cherny & E. R. Weise (Eds.), Wired women: Gender and new realities in cyberspace (pp. 98−113). Seattle, WA: Seal.
  • Gottfredson, M.R., & Hirsch, T.A. (1990). General theory of crime, Stanford, CA: Published by Stanford University Press, 85-123.
  • Heiman, T., Olenik-Shemesh, D., & Eden, S. (2015). Cyberbullying involvement among students with ADHD: Relation to loneliness, self-efficacy and social support. European Journal of Special Needs Education, 30(1), 15-29.
  • Herring, S.C. (1999). The rhetorical dynamics of gender harassment online. The Information Society, 15, 151-167.
  • Higgins, G.E., Fell, B.D., & Wilson, A.L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19, 3-22.
  • Higgins, G.E., & Makin, D.A. (2004). Self-control, deviant peers, and software piracy. Psychological Reports, 95, 921-931.
  • Hinduja, S., & Patchin, J.W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29, 129-156.
  • Hirschi, T., & Gottfredson, M. (1993). Commentary: Testing the general theory of crime. Journal of Research on Crime and Delinquency, 30, 47-54.
Eurasian Journal of Educational Research-Cover
  • ISSN: 1302-597X
  • Başlangıç: 2015
  • Yayıncı: Anı Yayıncılık