网络欺凌的成因:三种理论解释
Causes of Cyberbullying: Three Theoretical Explanations
DOI: 10.12677/AP.2020.1012223, PDF,    科研立项经费支持
作者: 刘 言, 许渭生:西北政法大学公安学院,陕西 西安
关键词: 网络欺凌成因社会认知理论日常活动理论一般压力理论Cyberbullying Causes Social Cognitive Theory Routine Activity Theory General Strain Theory
摘要: 网络欺凌成因有三种理论解释:社会认知理论认为个体通过观察学习和强化来学会网络欺凌;日常活动理论认为网络欺凌是有动机的犯罪者(网络欺凌者)、合适的目标(网络受害者)和缺乏监护或父母监督三个要素都具备的情况下发生的;一般压力理论认为经历过压力和负性情绪的个体更有可能参与网络欺凌。以上三种理论不仅有助于预测欺凌者和受害者的行为,而且可以用来帮助指导针对网络欺凌者个体化干预的发展。
Abstract: There are three theoretical explanations for the causes of cyberbullying. Social Cognitive Theory proposes that individuals learn to cyberbully via observational learning and reinforcement. Rou-tine activity theory suggests that cyberbullying occurs as an end result of the convergence of a motivated offender (cyberbully), a suitable target (cybervictim), and a lack of guardianship or parental monitoring. General Strain Theory holds that individuals who experience strain and negative emotions are at a heightened risk for engaging in cyberbullying. These three theories not only help predict the behavior of bullies and victims, but can be used to help guide the development of individualized interventions for cyberbullies.
文章引用:刘言, 许渭生 (2020). 网络欺凌的成因:三种理论解释. 心理学进展, 10(12), 1915-1922. https://doi.org/10.12677/AP.2020.1012223

参考文献

[1] Agnew, R. (1992). Foundation for a General Strain Theory of Crime and Delinquency. Criminology, 30, 47-88.[CrossRef
[2] Agnew, R. (2006). General Strain Theory: Recent Developments and Directions for Further Research. In F. T. Cullen, J. Wright, & M. Coleman (Eds.), Advances in Criminological Theory, Taking Stock: The Status of Criminological Theory (Vol. 15, pp. 101-123). New Brunswick, NJ: Transaction Publishers.[CrossRef
[3] Allport, G. W. (1935). Attitudes. In C. Murchison (Ed.), Handbook of Social Psychology (pp. 798-844). Worcester, MA: Clark University Press.
[4] Baldry, A. C. (2003). Bullying in Schools and Exposure to Domestic Violence. Child Abuse & Neglect, 27, 713-732.[CrossRef
[5] Bandura, A. (1977). Social Learning Theory. Oxford, England: Prentice-Hall.
[6] Bandura, A. (1978). Social Learning Theory of Aggression. Journal of Communication, 28, 12-29.[CrossRef] [PubMed]
[7] Bandura, A. (1986). Social Foundations of Thought and Action: A Social Cognitive Theory. Englewood Cliffs, NJ: Prentice-Hall.
[8] Bandura, A., Ross, D., & Ross, S. A. (1961). Transmission of Aggression through Imitation of Aggressive Models. Journal of Abnormal and Social Psychology, 63, 575-583.[CrossRef] [PubMed]
[9] Boulton, M. J., Trueman, M., & Flemington, I. (2002). Associations between Secondary School Pupils’ Definitions of Bullying, Attitudes towards Bullying, and Tendencies to Engage in Bullying: Age and Sex Differences. Educational Studies, 28, 353-370.[CrossRef
[10] Bowes, L., Arseneault, L., Maughan, B., Taylor, A., Caspi, A., & Moffifitt, T. E. (2009). School, Neighborhood, and Family Factors Are Associated with Children’s Bullying Involvement: A Nationally Representative Longitudinal Study. Journal of the American Academy of Child Adolescent Psychiatry, 48, 545-553.[CrossRef
[11] Boxer, P., & Dubow, E. F. (2002). A Social-Cognitive Information-Processing Model for School-Based Aggression Reduction and Prevention Programs: Issues for Research and Practice. Applied & Preventive Psychology, 10, 177-192.[CrossRef
[12] Bussey, K., & Bandura, A. (1999). Social Cognitive Theory of Gender Development and Differentiation. Psychological Review, 106, 676-713.[CrossRef
[13] Choi, K. (2008). Computer Crime Victimization and Integrated Theory: An Empirical Assessment. International Journal of Cyber Criminology, 2, 308-333.
[14] Cohen, L., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44, 588-608.[CrossRef
[15] Craig, W. M., & Pepler, D. (1995). Observations of Bullying in the Playground and in the Classroom. School Psychology International, 21, 22-36.[CrossRef
[16] Curtner-Smith, M. E. (2000). Mechanisms by Which Family Processes Contribute to School-Age Boy’s Bullying. Child Study Journal, 30, 169-186. https://eric.ed.gov/?id=EJ626921
[17] Dollard, J., Doob, L., Miller, N., Mowrer, O., & Sears, R. (1939). Frustration and Aggression. New Haven, CT: Yale University Press.[CrossRef
[18] Espelage, D. L., Rao, M. A., & Craven, R. (2012). Theories of Cyberbullying. In S. Bauman, D. Cross, & J. L. Walker (Eds.), Principles of Cyberbullying Research: Definitions, Measures, and Methodology (pp. 78-97). New York: Routledge.
[19] Fazio, R. H., & Olson, M. A. (2007). Attitudes: Foundations, Functions, and Consequences. In M. A. Hogg, & J. Cooper (Eds.), The Sage Handbook of Social Psychology (pp. 123-145). London, England: Sage.[CrossRef
[20] Felson, M. (2002). Crime and Everyday Life (3rd ed.). Thousand Oaks, CA: Sage.
[21] Felson, M., & Boba, R. (2010). Crime and Everyday Life (4th ed.). Los Angeles, CA: Sage Publications.[CrossRef
[22] Garofalo, J., & Clark, D. (1992). Guardianship and Residential Burglary. Justice Quarterly, 9, 443-463.[CrossRef
[23] Groff, E. (2007). Simulation for Theory Testing and Experimentation: An Example of Using Routine Activities Theory and Street Robbery. Journal of Quantitative Criminology, 23, 75-103.[CrossRef
[24] Hay, C., & Meldrum, R. (2010). Bullying Victimization and Adolescent Self-Harm: Testing Hypotheses from General Strain Theory. Journal of Youth and Adolescence, 39, 446-459.[CrossRef] [PubMed]
[25] Hay, C., Meldrum, R., & Mann, K. (2010). Traditional Bullying, Cyber Bullying, and Deviance: A General Strain Theory Approach. Journal of Contemporary Criminal Justice, 26, 130-147.[CrossRef
[26] Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization. Deviant Behavior, 29, 129-156.[CrossRef
[27] Hinduja, S., & Patchin, J. W. (2010). Cyberbullying Research Summary: Cyberbullying and Strain. Cyberbullying Research Center. http://www.cyberbullying.org/cyberbullying_and_strain_research_fact_sheet.pdf
[28] Holtfreter, K., Reisig, M., & Pratt, T. (2008). Low Self Control, Routine Activities, and Fraud Victimization. Criminology, 46, 189-220.[CrossRef
[29] Jang, H., Song, J., & Kim, R. (2014). Does the Offline Bully-Victimization Influence Cyberbullying Behavior among Youths? Application of General Strain Theory. Computers in Human Behavior, 31, 85-93.[CrossRef
[30] Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behavior Utilizing Routine Activity Theory. Deviant Behavior, 31, 381-410.[CrossRef
[31] Meier, R., & Miethe, T. (1993). Understanding Theories of Criminal Victimization. In M. Tonry (Ed.), Crime and Justice: An Annual Review of Research (pp. 459-499). Chicago, IL: University of Chicago Press.[CrossRef
[32] Merton, R. K. (1938). Social Structure and Anomie. American Sociological Review, 3, 672-682.[CrossRef
[33] Mesch, G. (2009). Parental Mediation, Online Activities, and Cyberbullying. CyberPsychology & Behavior, 12, 387-393.[CrossRef] [PubMed]
[34] Miller, N. E. (1941). The Frustration-Aggression Hypothesis. Psychological Review, 48, 337-342.[CrossRef
[35] Miller, N. E., & Dollard, J. (1941). Social Learning and Imitation. New Haven, CT: Yale University Press.
[36] Moon, B., Hwang, H., & McCluskey, J. D. (2011). Causes of School Bullying: Empirical Test of General Theory of Crime, Differential Association, General Strain Theory. Crime & Delinquency, 57, 849-877.[CrossRef
[37] Mouttapa, M., Valente, T., Gallaher, P., Rohrbach, L. A., & Unger, J. B. (2004). Social Network Predictors of Bullying and Victimization. Adolescence, 39, 315-335. http://www.ncbi.nlm.nih.gov/pubmed/15563041
[38] Mustaine, E., & Tewksbury, R. (1999). A Routine Activity Theory Explanation for Women’s Stalking Victimizations. Violence Against Women, 5, 43-62.[CrossRef] [PubMed]
[39] Mustaine, E., & Tewksbury, R. (2002). Sexual Assault of College Women: A Feminist Interpretation of a Routine Activities Analysis. Criminal Justice Review, 27, 89-123.[CrossRef
[40] Navarro, J. N., & Jasinski, J. L. (2011). Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences. Sociological Spectrum, 32, 81-94.[CrossRef
[41] Navarro, J. N., & Jasinski, J. L. (2013). Why Girls? Using Routine Activities Theory to Predict Cyberbullying Experiences between Girls and Boys. Women & Criminal Justice, 23, 286-303.[CrossRef
[42] O’Connell, P., Pepler, D., & Craig, W. (1999). Peer Involvement in Bullying: Insights and Challenges for Intervention. Adolescence, 22, 437-452.[CrossRef] [PubMed]
[43] Orpinas, P., & Horne, A. M. (2006). Bullying Prevention: Creating a Positive School Climate and Developing Social Competence. Washington DC: American Psychological Association.[CrossRef
[44] Paez, G. R. (2016). Cyberbullying among Adolescents: A General Strain Theory Perspective. Journal of School Violence, 17, 74-85.[CrossRef
[45] Patchin, J. W., & Hinduja, S. (2011). Traditional and Nontraditional Bullying among Youth: A Test of General Strain Theory. Youth & Society, 43, 727-751.[CrossRef
[46] Perren, S., & Gutzwiller-Helfenfinger, E. (2012) Cyberbullying and Traditional Bullying in Adolescence: Differential Roles of Moral Disengagement, Moral Emotions, and Moral Values. European Journal of Developmental Psychology, 9, 195-209. [Google Scholar] [CrossRef
[47] Pino, N., & Johnson-Johns, A. (2009). College Women and the Occurrence of Unwanted Sexual Advances in Public Drinking Settings. The Social Science Journal, 46, 252-267.[CrossRef
[48] Polanin, J. R., Espelage, D. L., & Pigott, T. D. (2012). A Me-ta-Analysis of School-Based Bullying Prevention Programs’ Effects on Bystander Intervention Behavior. School Psy-chology Review, 41, 47-65.[CrossRef
[49] Poteat, V. P., Kimmel, M. S., & Wilchins, R. (2010). The Moderating Effect of Support for Violence Beliefs on Masculine Norms, Aggressions, and Homophobic Behavior during Adolescence. Journal of Research on Adolescence, 21, 434-447.[CrossRef
[50] Salmivalli, C., & Voeten, M. (2004). Connections between Attitudes, Group Norms, and Behaviour in Bullying Situations. International Journal of Behavioral Development, 28, 246-258.[CrossRef
[51] Sticca, F., Ruggieri, S., Alsaker, F., & Perren, S. (2013). Longitudinal Risk Factors for Cyberbullying in Adolescence. Journal of Community & Applied Social Psychology, 23, 52-67.[CrossRef
[52] Thorton, T. N., Craft, C. A., Dahlberg, L. L., Lynch, B. S., & Baer, K. (2000). Best Practices of Youth Violence Prevention: A Sourcebook for Community Action. Atlanta, GA: Centers for Disease Control and Prevention.[CrossRef
[53] Tokunaga, R. S. (2010). Following You Home from School: A Critical Review and Synthesis of Research on Cyberbullying Victimization. Computers in Human Behavior, 26, 277-287.[CrossRef
[54] Tseloni, A., Wittebrood, K., Farrell, G., & Pease, K. (2004). Burglary Victimization in England and Wales, the United States and the Netherlands. The British Journal of Criminology, 44, 66-91.[CrossRef
[55] Wikström, P. O. H. (2009). Routineactivity Theories. In Oxford Bibliographies. Oxford: Oxford University Press.[CrossRef
[56] Williams, K., & Guerra, N. (2007). Prevalence and Predictors of Internet Bullying. Journal of Adolescent Health, 41, S14-S21.[CrossRef] [PubMed]
[57] Wilson, R., & Backhouse, J. (2006). Opportunities for Computer Crime: Considering Systems Risk from a Criminological Perspective. European Journal for Information Systems, 15, 403-414.[CrossRef