Hostname: page-component-8448b6f56d-cfpbc Total loading time: 0 Render date: 2024-04-23T06:31:22.699Z Has data issue: false hasContentIssue false

Cyberbullying as an Act of Revenge?

Published online by Cambridge University Press:  23 February 2012

Andreas König*
Affiliation:
Research Unit INSIDE, Faculty of University of Luxembourg, Luxembourg. andreas.koenig@uni.lu
Mario Gollwitzer
Affiliation:
Mario Gollwitzer, Fachbereich 04 — Psychologie, Philipps-Universität Marburg, Germany.
Georges Steffgen
Affiliation:
Research Unit INSIDE, Faculty of University of Luxembourg, Luxembourg.
*
*Address for Correspondence: Andreas König, Université du Luxembourg, FLSHASE, Research Unit INSIDE, Bâtiment XII, Route de Diekirch, L-7720 Walferdange, Luxembourg.
Get access

Abstract

Despite significant overlaps between victim status in traditional forms of bullying and cyberbullying, and qualitative results about self-reported reasons for cyberbullying, the role of revenge and retaliation as a motive to engage in acts of cyberbullying has not yet been examined systematically. As a first step, this study investigates whether and to what extent traditional victims, when they become cyberbullies, actually choose their former (traditional) perpetrators as targets of their own cyberbullying behavior. Furthermore, the impact of individual differences in relevant traits, such as vengefulness and justice sensitivity, on the choice of cybervictims is examined. Data from 473 students were collected via an online survey. Of these, 149 were identified as traditional victims/cyberbullies. Results show that traditionally bullied students indeed tend to choose their former perpetrators as cybervictims, and that individual differences play a role in the choice of their victims. Implications for further research, as well as for interventions and prevention programmes, are discussed.

Type
Articles
Copyright
Copyright © Cambridge University Press 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)