Email updates

Keep up to date with the latest news and content from BMC Public Health and BioMed Central.

Open Access Study protocol

Online Pestkoppenstoppen: systematic and theory-based development of a web-based tailored intervention for adolescent cyberbully victims to combat and prevent cyberbullying

Niels CL Jacobs*, Trijntje Völlink, Francine Dehue and Lilian Lechner

Author Affiliations

Faculty of Psychology, Open University, Valkenburgerweg 177, 6419 AT Heerlen, The Netherlands

For all author emails, please log on.

BMC Public Health 2014, 14:396  doi:10.1186/1471-2458-14-396

The electronic version of this article is the complete one and can be found online at: http://www.biomedcentral.com/1471-2458/14/396


Received:31 March 2014
Accepted:9 April 2014
Published:24 April 2014

© 2014 Jacobs et al.; licensee BioMed Central Ltd.

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.

Abstract

Background

The purpose of this article is to give an integrative insight into the theoretical and empirical-based development of the Online Pestkoppenstoppen (Stop Bullies Online/Stop Online Bullies). This intervention aims to reduce the number of cyberbully victims and their symptoms of depression and anxiety (program goal), by teaching cyberbully victims how to cope in an adequate and effective manner with cyberbully incidents (program’s outcomes).

Method/Design

In developing the program the different steps of the Intervention Mapping protocol are systematically used. In this article we describe each step of Intervention Mapping. Sources used for the development were a literature review, a Delphi study among experts, focus group interviews with the target group, and elements from a proven effective anti-bullying program. The result is a fully automated web-based tailored intervention for cyberbully victims (12-15 years) consisting of three web-based advice sessions delivered over three months. The first advice aims to teach participants how behavior is influenced by the thoughts they have, how to recognize and dispute irrational thoughts and how to form rational thoughts. In the second advice, participants will learn about the way bullying emerges, how their behavior influences bullying and how they can use effective coping strategies in order to stop (online) bullying. In the third advice, participants receive feedback and will learn how to use the Internet and mobile phones in a safe manner. Each advice is tailored to the participant’s personal characteristics (e.g., personality, self-efficacy, coping strategies used and (ir)rational thoughts). To ensure implementation of the program after testing it for effectiveness, the intervention was pretested in the target-population and an implementation plan was designed. Finally, we will elaborate on the planned randomized controlled trial in which the intervention will be compared to a general information group and waiting list control group. This evaluation will provide insight into the intervention’s efficacy to reduce cyberbullying and its negative effects.

Discussion

Intervention Mapping is a time consuming but profound way to ensure that each step of developing an intervention is taken, and resulted in three web-based tailored pieces of advices that teach adolescents how to cope more effectively with cyberbullying experiences.

Trial registration

NTR3613, 14-09-2012

Keywords:
(Cyber) bullying; Intervention; Web-based; E-health; Computer tailoring; Behavior change; Intervention Mapping

Background

The growing popularity of social media (e.g. Facebook, Twitter) and instant messenger services (e.g. IMchat, Twitter) [1] does not always lead to positive experiences. Cyberbullying is defined as a repeated aggressive and intentional act, carried out by a group or an individual, using electronic forms of contact. This act is directed towards a victim who cannot easily defend him or herself [2]. Between 20% and 40% of the adolescents worldwide report being a cyberbully victim [3]. Research has indicated that cybervictimization is associated with serious internalizing difficulties such as depression [4,5], anxiety [6], emotional distress [5] and suicidality [7,8]. Cyberbully victims also more often have experienced drugs, alcohol, physical or sexual abuse, have displayed delinquent and aggressive behavior, have problems at school and have dropped out of school [9-16]. The more adolescents engage in cyber aggression, the more loneliness they feel, the lower their global self-worth is, the fewer mutual friendships they have and the lower their ratings of social acceptance and popularity by peers are [17]. Cyberbullies as well as cyberbully/victims (i.e. both victim and bully) have worse subjective health than those who are not involved [18], and victims of both traditional and cyberbullying are four times more likely to experience depressive symptoms and are five times more likely to attempt suicide compared to non-victims [8].

Unfortunately, intervention programs that deal specifically with cyberbullying are scarce [19]. Moreover, students perceive that methods used in traditional bullying incidents are not equally effective in cyberbullying incidents [20]. Therefore, there is an urgent need for effective cyberbullying interventions. Ideally, these interventions should: (1) do more than increase awareness of potential threats of the Internet by offering victims intensive intervention strategies on the basis of individual needs of the student [21]; (2) offer health education and teach emotional self-management competencies [22]; (3) increase victims´ knowledge of reactive (e.g. deleting, blocking and ignoring messages), preventive (e.g. increased awareness and security) [23] and effective strategies and resources that enable victims to cope with the experienced stress and negative emotions [23]; (4) aim at reducing traditional bullying as well [24], because victims are often involved in both forms of bullying [25-27]; and (5) include training in empathy, Internet etiquette, and healthy Internet behavior [28,29]. Moreover, cyberbully victims often are unwilling to talk to a parent [14], teacher [2,30] or other adults [31]. They spend a lot of time online [32], prefer to get anonymous help [33], and report a need for information and help through the Internet [34]. Therefore, the best method to deliver cyberbullying interventions is via the Internet. Furthermore, web-based interventions can be used whenever and wherever the individual prefers [35], can reach a lot of people in a relatively cheap way [36], and have the possibility to use tailoring [37], which appears to be a successful health promotion technique [38,39].

To increase the effectiveness of such an intervention, a planned, systematic and theory-based approach is needed [40]. Contrastingly, the interventions that currently exist are often based on practical beliefs or commonsense approaches, without a basis in theory or research results [21]. A theoretically sound and evidence-based intervention should provide a description of what works, under what circumstances and for whom [41], with a thorough insight in the relevant determinants of behavioral change, the theoretical methods to change these determinants and how the theoretical methods are translated into practical intervention strategies [42,43]. In order to meet the need for theoretically sound and evidence-based interventions, and based on theory and recommendations from the literature, we have developed an intervention containing three web-based and computer tailored pieces of advice for cyberbully victims: Online Pestkoppenstoppen (Stop online bullies/Stop bullies online). This paper focuses on the systematical and theory-based development of the intervention, using the Intervention Mapping (IM) protocol [44]. Effects of the intervention are described elsewhere.

Method/design

IM is a protocol consisting of six steps that can be used as an iterative process for theory and evidence-based development of health promotion interventions [44]. The six steps include: (1) conducting a needs assessment of the problem, the study population and forming a logic model of the health problem based on the PRECEDE model [45]; (2) defining what program participants have to do in terms of performance objectives, and combining these performance objectives with relevant determinants into change objectives; (3) translating change objectives into practical strategies by selecting theory-based intervention methods; (4) developing, selecting, testing, and producing intervention components in which all strategies are integrated; (5) planning for adoption and implementation of the program; and (6) anticipating on the process and effect evaluation of the program. In this paper we describe how we used each step of the IM protocol to develop the intervention, focusing on the first four steps. We refer to traditional bullying as bullying, to cyberbullying and traditional bullying as (cyber)bullying, and to cyberbully victims and bully/victims as cyberbully victims. Further distinction are provided when necessary.

Step 1: Needs assessment

The target group for this intervention are adolescents (12-15 years old) from the Continued Secondary Vocational Education who are just starting to attend secondary school, because: (1) cyberbullying appears to occur more frequently in lower levels of secondary education [46-48]; (2) in this period of development the interaction with peers is highly valued and new social networks are formed [49]; and (3) adolescents have an open mind and are eager to learn new skills which enable them to learn how to cope more effectively with problems such as the negative effects of cyberbullying [50].

According to the Transactional Model [51], coping is the cognitive and behavioral effort employed to reduce, master or tolerate internal and external demands resulting from stressful events. In traditional bullying, victims either use more emotion focused [52,53] and passive coping strategies (e.g. crying, expressing emotions) [54-56], or they use emotion focused and aggressive coping strategies (e.g. venting their anger, fighting back). Similarly, cyberbully victims report using aggressive and passive coping strategies [57] (e.g. bullying the bully, deleting messages or pretending to ignore the bullying [58]). Others react to cyberbullying by not retaliating and reacting submissively [59], acting helpless, avoiding the situation [60], doing nothing and displaying avoidant behavior [61]. Some pretend to ignore the bullying, others actually ignore the it [58]. Additionally, adolescents coping with cyberbullying are less likely to seek social support, compared to other strategies [30,53,58,62]. Individuals that are bullied in multiple ways even tend to cope less effectively [63].

It appears that the use of ineffective coping strategies maintains (cyber)bullying [52,54-56,63-67], and that the negative effects of cyberbullying are influenced by the coping style victims use (e.g., ineffective coping appears to yield depression- and health complaints) [68,69]. To increase knowledge about coping strategies used in cyberbullying, it is useful to look at coping strategies employed in cyberbullying and in daily life. These coping strategies appear to not differ significantly, and knowledge about traditional bullying can, to some extent, be applied to cyberbullying [60]. Furthermore, coping strategies used in response to daily stressors are good predictors for coping strategies used in response to cyberbullying [68]. To reduce victimization and its negative effects, it thus appears that adolescents need to improve their current coping strategies. They need to employ effective coping strategies that not only help them to mentally deal with (cyber)bullying, but also contribute to the prevention and discontinuation of (cyber)bullying. Therefore, the primary program goals were reducing the number of: (1) cyberbully victims; and (2) depressive and anxious victims as a consequence of cyberbullying. Secondary goals were a decrease in: (3) victims truanting from school; (4) victims with suicidal thoughts; and (5) an increase in determinants related to cyberbully victims’ behavior, such as self-esteem, self-efficacy, rational helpful beliefs, and effective coping.

Step 2: Matrices of change objectives

Next, the focus shifts from the needs assessment to the formation of a change model (Figure 1). In this step intended change in behavior is be further delineated into specific sub-behaviors: the performance objectives (POs). The POs are crossed with relevant determinants in order to create a matrix of change objectives (COs) [44].

thumbnailFigure 1. Change model Online Pestkoppenstoppen. Read figure from right to left to see which steps were taken for the development of the program. Read figure from left to right to see how the program influences behavior and determinants in order to improve health and quality of life.

Performance objectives

First, we translated the risk behavior ineffective coping into a program outcome: after the intervention, cyberbully victims will cope in an adequate and effective manner with (cyber)bullying experiences. This program outcome is a broad conceptualization of what a participant has to do in order to reach the program’s goals. Therefore, participants have to perform specific sub-behaviors, called performance objectives (POs). The POs, and accordingly the content of the intervention, were based on a literature search, focus group interviews with the target group and the linkage group (including the research team, a healthcare coordinator of a school community, a trainer who works with bullied children, and a project leader and director of a website addressing bullied children) formed for this project, a review of relevant (cyber)bullying websites, discussions in an online group about cyberbullying and cybersafety (YouthRiskOnline/Embracecivilty) and a Delphi study among 70 international experts in the field of cyberbullying and coping [70]. In total, eleven performance objectives were formed for this intervention. For an overview of all POs see the first column of Additional file 1.

Additional file 1: Table S1. Performance objectives, determinants, change objectives, theoretical methods and practical applications of Online Pestkoppenstoppen. Note. DG = Digital Guide VM = Video model YSR = Youth Self-Report (Achenbach, [121]) APS = Active, Problem-Solving coping Nvc = non-verbal communication.

Format: PDF Size: 54KB Download file

This file can be viewed with: Adobe Acrobat ReaderOpen Data

Based on discussions with the linkage group, it was decided to develop an online translation of the “Pleasure at school” training (PaS) [50]. Victims apparently have negative self-related attitudes, thoughts [71], and self-blaming attributions [72] after a bully experience. PaS is partly based on principles of Rational Emotive (Behavioral) Therapy (RE(B)T) [73,74], and uses the 5G-schema [75] (see Figure 2) to raise awareness in the relation between a thought, feeling and behavior, and to replace irrational thoughts with more rational thoughts. According to RE(B)T, evaluative thoughts mediate the view people have about events that happen and the emotional, behavioral, and inferential reactions to these events [74,76,77]. PaS has proven effective in reducing bullying behavior, anxiety and psychological problems [50] in adolescents. Similarly, RE(B)T has proven effective in the treatment of problems related to cyberbullying [59,78,79] and bullying [4,80], such as anxiety, depression and behavioral problems in adolescents [81,82]. Adolescents therefore learn how to recognize (PO 1), dispute (PO 2) and replace (PO 3) irrational thoughts with rational thoughts.

thumbnailFigure 2. The 5G-schema in Online Pestkoppenstoppen. The 5G-schema gives insight into the relation between an event (Gebeurtenis), a thought (Gedachte), a feeling (Gevoel), a behavior (Gedrag) and a consequence (Gevolg).

After thoughts, the 5G-schema focuses on emotions. Relational bullyvictims often have problems with the correct encoding and interpretation of emotions [83]. It is important for an adolescent’s social and cognitive development to correctly perceive and attribute emotions [84]. The understanding and experiencing of emotions of others seems to inhibit antisocial behavior [85], and adolescents who are able to perceive, handle, understand and express their emotions tend to experience better social relationships and are more socially accepted [86]. Furthermore, despite bullyvictims probably being afraid, their most common reactions to victimization are interest and joy [54]. Emotional displays of joy and interest can provide the bully with positive social reinforcement, leading to continued victimization. Therefore, (cyber)bullyvictims need to learn more about emotions and emotion regulation and need to receive health education and emotional self-management competencies [22] (PO 4).

The next aspect the 5G-schema focuses on is behavior. As explained before, whether an adolescent becomes a long-term victim of (cyber)bullying seems to depend on how (s)he copes with (cyber)bullying attempts. Sometimes, the coping strategies employed reduce stress, but the victim fails to confront the bully [70] leading to possible continuation of the bullying. Victims of cyberbullying therefore should become increasingly aware of the ineffectiveness of their current coping style (PO 5). They need knowledge of reactive and preventive strategies (PO 6) and should change their ineffective coping strategies into effective coping strategies (PO 7) [23]. In this paper, all effective coping strategies are named Active Problem Solving (APS) strategies. APS strategies appear to resolve the bullying situation and allows the victim to act assertively [54]. For example, cyberbully victims should try to get help from bystanders, because one quarter of cyberbullying occurs in the presence of witnesses [87]. They should also block or ignore the cyberbully [88], or seek social support [3]. Seeking social support from family is likely to help [89]. Therefore adolescents need information regarding who to ask for help, how to seek help and the benefits of seeking help [88]. Furthermore, having social skills is associated with reductions in victimization and fewer internalizing problems [90]. Cross et al. [91] for example suggested that students should develop their social skills and learn effective ways of addressing relational difficulties online and offline, in order to prevent and reduce cyberbullying. Additionally, interventions should also focus on improving peer relationships in general [88], because social acceptance [92] and integration [93] moderate the impact and consequences of different forms of cyberbullying. Moreover, victims and adolescents not involved in bullying most frequently indicated assertiveness as an intervention strategy [94]. Therefore, interventions should also teach (cyber)bullyvictims non-aggressive responses, and how to cope in an assertive and prosocial manner (PO 8 and 9).

A specific risk factor for cyberbullying is the little control exerted over personal information [27]. A lot of cyberbully victims frequently use the Internet, most of the time in a risky manner [2,78,95]. They share passwords, openly display personal information (e.g. addresses, phone numbers) and communicate with strangers [96,97]. Adolescents should therefore receive cyber safety education, learn to treat each other with respect (both online and offline), and become aware of the importance to regularly change their passwords and never sharing personal information [28] (PO 11).

Determinants

The next step in IM is an analysis of the most relevant (i.e. important, changeable) determinants [44] of each PO, by asking what factors determine whether a victim would or is able to perform each PO. The methods used to obtain these determinants were the above mentioned literature review, focus group interviews, a Delphi study on the determinants of ineffective and improved coping with cyberbullying [70], and a study of protocols of (cyber) bullying interventions. Further, several behavior-oriented theories were applied, such as social cognitive theory, theory of planned behavior, transtheoretical model and goal-setting theory. This resulted in a large list of determinants (see the second column of Additional file 1). The aims of this intervention did not include environmental levels (e.g. parents, teachers or schools). Therefore only determinants on the individual level were identified.

Change objectives

A matrix was developed to combine performance objectives and their hypothesized determinants into change objectives (COs) [44]. In total, we formed 50 COs. Examples of COs are ‘Individual describes characteristics of irrational and rational thoughts’ and ‘Individual becomes aware of current ineffective (aggressive/passive) coping style’ (see third column Additional file 1). All COs were used in the selection of theoretical methods and applications (step 3) that will change the determinants.

Step 3: Theory-based methods and practical strategies

A theoretical method is a general process that is supposed to influence change in behavioral determinants, based on theories. A practical application is a specific technique for practical use of theoretical methods, in ways that are applicable to the intervention population and context in which the intervention will be used [44]. When a method is translated into a practical application, sufficient understanding of the theory behind the method and its theoretical parameters that determine the effectiveness is needed [98]. For example, to influence determinants such as self-efficacy, modeling [99,100] can be used as a theoretical method. A practical strategy would be to use a role model demonstrating how to react assertively to a difficult situation (see Figure 3a and b). Theoretical parameters for modeling state that modeling is effective when the individual is able to identify with the model, the model demonstrates adequate skills and is reinforced for the behavior displayed [98].

thumbnailFigure 3. Example of a model demonstrating behavior. a. Noa and Linda demonstrating how to act assertively online, and explaining that cyberbullying events (in this case an email) should be saved as evidence. Female participants receive this environment and these digital guides. b. Levi and Tim demonstrating how to act assertively online, and explaining that cyberbullying events (in this case an email) should be saved as evidence. Male participants receive this environment and these digital guides.

To identify theoretical methods, parameters and practical strategies: (1) the literature was searched for behavior change techniques [44]: (2) the IM book was used to find theoretical methods that influence specific determinant; (3) existing (cyber)bullying interventions were compared; (4) the PaS training [50] was used; and (5) focus group interviews were held, asking the members of the target group what they believed were effective strategies. An overview of theoretical methods and practical applications used in the Online Pestkoppenstoppen intervention is shown in the fifth column of Additional file 1. An elucidation of the most important methods follows next.

Computer tailoring

As mentioned before, tailoring appears to be a successful health promotion technique [38,39]. Tailoring is the combination of strategies and information intended to reach one specific person by providing personalized feedback based on unique characteristics of a person. These characteristics are assessed individually and are related to the outcome of interest [101]. The use of tailored information results in more improvement in behavior over time compared to the use of generic information [38,102]. Tailored messages are better read, saved and remembered than non-tailored messages [103]. There are two types of tailoring; dynamic tailoring (DT), assessing intervention variables prior to each feedback; and static tailoring (ST), assessing intervention variables at one baseline moment. Although research indicates that DT interventions outperform ST interventions [39], this intervention mostly tailors statical, because several variables used for tailoring are also used for the measurement of effectiveness, and thus need to be assessed prior to each advice. Tailoring is a general technique used throughout the complete intervention and is also combined with the other methods used. Prior to each advice several variables are assessed to enable tailoring. The intervention is for example tailored to personality (ST) as measured by the Big 5 Questionnaire –Short form [104]. Personality may determine a participant’s behavior within a specific context, and this behavior (e.g. reactions, interpretations) can influence the reoccurrence of that event [105]. Other variables on which the intervention provides tailored feedback are for example coping strategies (ST), irrational (ST) and rational (DT) thoughts, self-efficacy (DT), (cyber)bullying experiences (ST) and progress (ST).

Consciousness raising

Consciousness raising is used to increase a participant’s awareness about: (1) the thoughts (s)he has after a (cyber)bullying event; (2) his/her own negative 5G-schemas; (3) ineffective coping styles and negative outcomes; and (4) effective coping styles and positive outcomes. Based on answers about irrational thoughts and coping styles, the participant receives tailored feedback concerning his/her irrational thoughts, 5G-schemas, and current coping responses. This feedback may increase awareness, which in turn may help the participant to see why the current way of thinking and/or coping is not helpful or effective. It is important that the participant receives information about problem solving immediately [44]. Therefore, the participant immediately receives information about how to recognize, dispute and replace thoughts after becoming aware of his/her 5G-schema, and how to change ineffective coping into effective coping after becoming aware of his/her ineffective coping.

Guided practice

Guided practice is prompting the participant to rehearse and repeat the desired behavior, discuss the experience and provide feedback [44]. This method is used to increase self-efficacy and behavioral capability. Additionally, it is used to overcome barriers. In this intervention, the participant receives either video-models demonstrating the desired skill (see Figure 4), or comics and digital guides demonstrating and explaining the desired skill, followed by opportunities to practice the skill. Several insight questions are asked in relation to performing the skills, upon which the digital guides give feedback.

thumbnailFigure 4. Video-model explaining/demonstrating skills. A Dutch actor explains how to recognize, dispute and replace irrational thoughts with rational thoughts, with the help of the 5G-schema.

Providing information

Providing information is used to increase participant’s knowledge, skills, and attitudes, using arguments and persuasive communication [44]. According to the elaboration likelihood model [106], good arguments are effective in reaching stable change in attitudes only when the message is processed through the central route. This happens when the message is personally relevant and not to discrepant from the participant’s beliefs [44]. The participant receives general (e.g. what are the dynamics of a bullying situation, what to do and not to do online) and tailored (e.g. questions that aid recognizing irrational thoughts and changing aggressive/passive coping into active and problem solving coping) information. To check whether the participant remembers the correct information, questions are asked interspersed with feedback. Additionally, to prevent the participant from paying attention to information (s)he already knows, at some points in the intervention (s)he can choose which information (s)he wants to read. Furthermore, all important information is summarized on the personal page and sent to the participant’s e-mail inbox.

Modeling

In modeling a person serves as an appropriate model for others that is reinforced for the desired behavior assuming that the behavior of the model will be imitated [107]. Modeling is included in this intervention as a method to increase participant’s self-efficacy and behavioral capability to carry out the desired behavior change, because it is proven to be an effective teaching tool [108]. For example, previous research indicated that video-counseling - in which a real human speaks and asks questions - can be a promising technique for health interventions [109]. In line with the parameters of modeling, the video-models are coping models (i.e. who previously experienced the health problem, but who learned to deal with it effectively), the participant is able to identify with the models, and the models are being reinforced for positive behavior [44]. The short videos were professionally recorded [110]. In several video-clips, models demonstrate and explain how to perform a behavior (e.g. recognizing, disputing and replacing irrational thoughts, coping behaviors).

Implementation intentions and coping plans

Research indicates that planning is a powerful self-regulatory tool in the process of behavior change [111,112]. When people plan, they mentally simulate the linking of concrete responses to future situations, replacing spontaneous reactions for pre-planned actions. There are two types of plans: action plans [113], or implementation intentions [114], and coping plans [112]. In action planning, individuals link goal-directed behavior to certain environmental cues by specifying when, where and how to act [112] in if-then statements [115]. As a result, environmental cues should activate - without conscious intent - the initiation of action [112]. In coping planning, individuals anticipate on possible risk situations beforehand by already defining suitable and effective response behavior linked to these potential barriers [112]. Implementation intentions, action and coping plans are found to be effective in translating various intentions into actions [116-118], and appear to be working synergistically in adolescents [119]. In the intervention, the participant makes a combination of implementation intentions and coping plans. A closed-ended plan setting procedure is used to prevent inadequate goals; from a predefined list, the participant chooses the context if (either difficult situations or situations in daily life) and action then (applications of learned skills, from a predefined list).

Step 4: Producing program components and materials

Taking the end products of the previous steps into account, we decided to develop one intervention containing three web-based sessions containing tailored pieces of advice addressing mostly personal and psychological determinants. A program plan including the scope, sequence and program materials was developed [44], which is described below. During the process of producing program components and materials, intended program participants and the Linkage group were consulted to determine the preferences for program design by conducting focus group interviews and short voting sessions.

Scope and sequence

Based on brainstorms and voting sessions with members of the target group, we named the intervention Online Pestkoppenstoppen with three web-based tailored pieces of advices named: (1) Think strong, feel better; (2) Stop the bully now!; and (3) You are doing great, can you do better?. Each advice is preceded by several questionnaires – measuring tailoring and effect variables - that take approximately half an hour to complete, and each advice takes approximately 45 minutes to complete. The pieces of advice are offered divided over three months, and e-mails and text messages are used to remind the participant of participation (see Figure 5). The intervention can be found and is accessed on http://www.pestkoppenstoppen.nl webcite.

thumbnailFigure 5. Flowchart of the web-based tailored advices and questionnaires. Questionnaires precede each advice, and are used to tailor the advices to the characteristics of each participant. The questionnaires are also used to do the effect evaluation. Each advice consists out of lessons aimed at teaching different skills.

Selection

Because the literature indicates that an explicit approach (e.g. ‘did you experience cyberbullying?’) systematically underestimates the problem [47,58], an implicit approach was used; the individual rates his or her experience with different cyberbullying behaviors. Individuals are included in the intervention if they had experiences with at least one of the cyberbullying behaviors at least ‘once a month’ during the last half year. Cyberbullies and adolescents who did not experience the 17 deviant cyberbehaviors are excluded from participation. Next, the individual (=participant) fills in his or her (nick)name, age, e-mail address, mobile phone number and a login code that is provided to him/her in an information letter. The e-mail address and mobile phone number will be used to remind participants of participation before the start of each advice, during the process of filling in the questionnaires, and during the process of completing each advice.

Materials

Below, we shortly describe the different materials developed for the intervention.

Personal page

After selection/logging in, the participant is redirected to the personal page, from which (s)he: (1) can proceed or continue with the questionnaires and/or pieces of advice; (2) can find for each advice pictures, video-clips, comics, summaries, formed helpful thoughts, plans and sentences to use; and (3) has access to the extra tailored social skill lessons of advice 2.

Assessing tailoring and effect measures

Before receiving each web-based tailored advice, the participant answers several questionnaires (T0, T1 and T2) to assess the effect and tailoring variables. Gender of the participant was used to tailor gender of the guides and contexts (e.g. girls will see Noa, Jessica and a girl’s bedroom, and boys will see Levi, Mike and a boy’s bedroom).

Advice 1.‘Think strong, feel better.’

After the baseline measure (T0), the participant starts with the first advice. The participant learns to: (1) work with the 5G-schema in order to recognize (PO 1), dispute (PO 2) and replace (PO 3) irrational thoughts with rational thoughts; (2) carefully examine emotions in response to certain events (PO 4); and (3) form action plans to use the 5G-schema in daily life (PO 10).

Advice 2 ‘Stop the bully now!’

A month after the start, the participant begins with the second questionnaire (T1) and advice. The participant: (1) receives knowledge about the dynamics of online and offline bullying situations; (2) receives general APS coping strategies (PO 6); (3) learns and forms implementation intentions for responding towards online and offline bullying (PO 7 and PO 10); (4) becomes aware of ineffective coping style (PO 5); (5) is offered tailored examples of and guidance in APS coping (PO 6 and 7); (6) learns about responding assertively (PO 8 and 9); (7) forms implementation intentions and coping plans regarding assertive responses (PO 10); and (8) receives information about the use and benefits of humor and bystanders (PO 6). Observing victimization on its own can have negative consequences on psychological wellbeing [120]. Therefore, the participant forms implementation intentions and coping plans regarding how to react and involve bystanders in (cyber)bullying situations (PO 10).

Additional lessons

Additional social skill lessons (PO 7 and 9) were offered to improve specific skills associated with problem behaviors that are tailored to the participant’s score on several Youth Self-Report (YSR) scales [121]. The participant can choose if, when and which extra lessons (s)he wants to complete. For several extra lessons implementation intentions and coping plans are formed (PO 10). An overview of all lessons tailored to norm scores (above the 93% clinical range on YSR subscales) can be found in Table 1.

Table 1. Social lessons based on YSR subscales with norm scores for gender

Advice 3 ‘You are doing great, can you do better?’

Two months after the start, the participant starts with the third questionnaire (T2) and follow up advice. The participant evaluates all plans made in advice 1 and 2 on usability, and if necessary adjusts the plans (PO 10). All skills of advice 1 and 2 are summarized into three steps (i.e. 1. Think; 2. Act; 3.Closure). These three steps together form the skill conflict resolution, which is associated with reductions in victimization and fewer internalizing problems [90]. Tailored on progress, the participant receives feedback (on irrational thoughts, coping responses and YSR scores) and if needed additional lessons (5G-schema, coping styles, humor, non-verbal communication and emotion regulation). Finally, the participant learns and plans how to use the Internet and mobile phone in a safe and secure manner (PO 11).

Development

The web-based tailored pieces of advice were developed using special software (Nettailor, Evident, the Netherlands), a program that has been developed specifically for web-based tailored interventions, using digital guides in the delivery of the intervention. Research indicates that the integration of an intervention into a website enhances participants’ outcomes and retention [40]. Therefore, the web-based tailored pieces of advice were integrated into a website (http://www.pestkoppenstoppen.nl webcite) (see Figure 6). On this website information about the intervention can be found. After logging in, participants can read general information and watch YouTube video clips about (cyber)bullying, follow the web-based tailored pieces of advice and/or answer the questionnaires.

thumbnailFigure 6. The website Online Pestkoppenstoppen.

Pretest of the interventions

Parts of the focus group interviews conducted for the development of this intervention were pre- and pilot tests. Members of the target group were instructed to go to the website, complete the questionnaires and follow the pieces of advice. Next, six focus group interviews were held with a total of 41 participants from 4 schools. Based on the results from the pretests, pilot tests and focus group interviews, several adjustments were made: lay-out issues were resolved, bugs were repaired and both the number of questions and the amount of content were reduced.

Step 5: Adoption and Implementation

A plan for the adoption, implementation and continuation of the web-based tailored intervention was developed. To facilitate adoption and implementation, a linkage group was formed [44]. The intervention was developed in such a way that the potential for adoption, implementation and continuation is enhanced. For example, intervention users can find, register and use the intervention online. Therefore, the implementation of the intervention does not need additional human actions. The only actions needed and costs associated with the implementation, adoption and continuation are recruiting participating schools or individuals, hosting the website, preparing the intervention for implementation after the research has been conducted, and keeping the information up-to-date. Hence, the intervention can easily reach a large number of adolescents and at very low costs.

Step 6: Planning for evaluation

The evaluation of the program - which is described below - was planned. The research on the effectiveness of the intervention Online Pestkoppenstoppen has been approved by the Medical Ethics Committee of the Atrium Hospital of Heerlen (NL39072.096.12; METC nr. 12-T-126), and is registered in the Dutch Trial Register (http://NTR3613 webcite).

Design and procedure

A three-group (experimental group, general information group and waiting list control group) randomized control trial (RCT) will be conducted to evaluate the efficacy of the intervention, with self-assessed measures at baseline (T0), before advice two (T1), before advice three (T2), a half-year post start (T3) and 1 year post start (T4) (see Figure 7). Statements about the effectiveness of the three tailored web-based pieces of advice compared to general information can be made by comparing the experimental group with the general information group. The waiting list control group allows for controlling internal validation issues such as aging. However, this group does not receive measurements at T4. After the research, both the waiting list control group and general information group will be allowed to use the intervention.

thumbnailFigure 7. Timing and distribution of the measuring moments between the three conditions.

Participants will be recruited via contacting all secondary vocational education schools in the Netherlands. When schools give their consent to participation, randomization will follow. Schools will be stratified on three categories; a) size (small, medium or large); b) location of school (urban or rural); and c) type of education (theoretical or both theoretical and vocational). Schools will be matched and randomly assigned to one of the three intervention conditions. After randomization, all participants will attend a lesson at school in which the research will be explained. Participants receive a written information letter and informed consent, which has to be signed by both the participant and his or her parent(s). Next, participants have to visit the website and complete the selection questionnaire. When a participant meets the inclusion criteria, registration will follow and the research and intervention procedure will start.

A back-up plan was created in case the above-mentioned method of recruiting did not provide a sufficient number of participants. In case of insufficient participants, adolescents are recruited by placing a message on several popular websites often visited by adolescents and/or their parents. Additionally, recruitment messages are sent via Facebook, LinkedIn and Twitter. In this message individual adolescents are recruited to participate in the research by asking them to send us an e-mail with their name, age, name of school and level of education. Next, they receive instructions (written and on video), a written information letter and informed consent for them and their parents. In case parents read the message, they are asked to let their child participate in the research. Only after the adolescent provides us with the signed informed consents from them and their parents, will a login code be sent to the participant with which (s)he can access the intervention and/or research.

Measurement instruments

To evaluate the effectiveness of the intervention, several concepts will be measured via self-reported questionnaires. The primary outcomes of this study are frequency of (cyber)bullying, psychological wellbeing, problem behavior, school performance and truancy. These will be assessed at baseline (T0), 6 (T3) and 12 months (T4) follow-up. The secondary outcomes of this study (i.e. moderators or working mechanisms (mediators) of the intervention) are irrational thoughts, self-efficacy, coping with cyberbullying and self-esteem. These will be assessed at baseline (T0), after 1 (T1), 2 (T2), 6 (T3) and 12 months (T4) follow-up. At baseline, several moderators will be measured as well (i.e. demographic characteristics such as gender, age, educational level). In addition, a process evaluation at T3 will be conducted to examine potential moderators.

Power calculation

The power analysis is based on two important dependencies: decrease in psychosocial problems and the amount of cyberbullying victims after the intervention. The outcomes are based on the PaS training [122]. A power calculation (effect size = .3; power = .80; intracluster correlation coefficient = .1) showed that at baseline about 446 participants were needed (based on a dropout rate of 20%). Based on previous studies we suspect that 25% of the adolescents between 12 and 15 years can be classified as cyberbullying victims, and that 50% of the adolescents are willing to participate. This results in 3570 adolescents, divided over 30 schools, with each school having 4 or 5 classes.

Discussion

The aim of this paper was to provide a detailed description of the systematic development of the three web-based tailored pieces of advice for cyberbully victims that aimed at increasing psychological wellbeing, and decreasing victimization, problem behavior, school problems and truancy. In this intervention, cyberbully victims learn how to recognize, dispute and replace irrational thoughts with rational thoughts. Furthermore, their ineffective coping strategies are replaced with effective coping strategies, and they learn how to use the Internet and mobile phone in a safe and secure manner. The intervention is delivered online, via digital guides in digital environments. Digital guides provide information, ask questions, and show videos, pictures, comics and animations.

This intervention has several strengths. First, in developing, implementing and evaluating a systematic approach [44], the Intervention Mapping approach is used. In the process of developing the intervention, empirical evidence, theories, guidelines and recommendations from the cyberbullying and bullying intervention and prevention literature were used to build a solid framework. Second, the intervention aims to change multiple determinants that were found in a study done by Jacobs et al., [70]. Third, guidelines and recommendations from other, not related to (cyber)bullying, intervention studies and theories were used, combined with results from focus groups interviews with the target groups. Fourth, this intervention is tailored to the specific needs of the target group: cyberbully victims are often unwilling to tell a teacher, parent or other adult that they need help. Therefore, they may feel more comfortable to [33] find help anonymously on the Internet [31]. Furthermore, we tried to incorporate all preferences of the target group as indicated in the pre-tests and pilot tests. Fifth, web-based computer tailored interventions can be used any time [35], can reach a lot of people in a relatively cheap way [36], and allow for tailoring [37], which has the potential for a successful health promotion technique [38,39]. Sixth, the planned RCT allows several important conclusions to be drawn. Finally, a process evaluation allows us to draw conclusions about several working mechanisms.

This intervention has a number of limitations. First, it was difficult to reduce the number of questions in the questionnaires we used for evaluation purposes. In the focus group interviews, members of the target group clearly stated that too many questions will lead to drop-out, because answering many questions is experienced as boring and fatiguing. Furthermore, too many questions may cause no-saying or yes-saying and response fatigue (for a review, see [123]), leading to less reliable results. Second, the intervention may contain too much information. Based on the literature, it was decided to include the 5G-schema, coping strategies, social skills, planning and safety instructions. In focus group interviews, members of the target-group mentioned the large amount of information making it difficult to remember everything. Third, we cannot exactly check the degree of usage on the experimental and general information. This may hamper the interpretation of the results. Therefore, we have added process evaluation questions, in which we ask the participants if they have read the information.

In conclusion, the Online Pestkoppenstoppen program seems to be a promising start in solving current cyberbullying problems. The results of the evaluation studies, which will be reported in other papers, may contribute to the knowledge about how to stop online victimization and how to use tailoring and web-based interventions in this purpose. Additionally, this intervention may also affect offline victimization, because despite the differences, cyberbullying and traditional bullying also have some overlapping characteristics [24,25,27]. The results can be used as input for other web-based and computer-tailored interventions aimed at cyberbully victims. If the studies point out that the intervention is effective in its purpose, we have an intervention ready for implementation on a large scale.

Abbreviations

IM: Intervention Mapping; POs: Performance objectives; PaS: Pleasure at school; RE(B)T: Rational Emotive (Behavioral) Therapy; APS: Active Problem Solving; COs: Change Objectives DT, Dynamic Tailoring; ST: Static Tailoring; RCT: Randomized Control Trial; YSR: Youth Self-Report.

Competing interests

The authors declare that they have no competing interests.

Authors’ contributions

NJ conceived of the study, developed the online tailored advices, looked for participants, drafted the manuscript and processed all feedback from the other authors. FD and TV helped in brainstorming for- and developing the intervention, looking for participants, helped to draft the manuscript and helped in drafting the final manuscript. LL supervised the whole research and helped with drafting and writing the final manuscript. All authors read and approved the final manuscript.

Acknowledgements

This work was supported by the Dutch Ministry of Education, Culture and Science [grant number ODB10001]. We would like to thank Peter-Paul Lenssen from the Bernardinuscollege for providing the filming locations and actors, and Jetze Jansma from Kumulus Jeugdtheater for providing actors. Additionally, we would like to thank Pepijn van Halderen, Joelle Canisius, Pim Hovens, Yorn Heijnen, Melissa Vermeulen, Julie Cosemans, Vera Nijssen, Luca Meisters, Benno Geurts, Iris Voogt and Sophie Berg for doing such a great job acting in the movies. We also would like to thank Sophie Mulder, Jaron Bos, Saskia Wouters, Rick Jacobs and Janneke Duker for providing their voices, and Marcel Maassen for recording and editing the voice recordings. A big thank you goes to Sandra Daems and Annette Bouwels-Hermens for recording and editing several extra movie clips that were used in the recruitment of schools and introducing the participants with the intervention. We would also like to thank Nikki Gerits and Steffi Bekkers for conducting two focus group interviews. Finally, we would like to thank Linda Goossens (research assistant for this project), for all of her hard work and excellent planning and organizing skills.

References

  1. Gross EF: Adolescent Internet use: What we expect, what teens report.

    J Appl Dev Psychol 2004, 25(6):633-649. Publisher Full Text OpenURL

  2. Smith PK, Mahdavi J, Carvalho M, Fisher S, Russell S, Tippett N: Cyberbullying: its nature and impact in secondary school pupils.

    J Child Psychol Psychiatry 2008, 49(4):376-385. PubMed Abstract | Publisher Full Text OpenURL

  3. Tokunaga RS: Following you home from school: A critical review and synthesis of research on cyberbullying victimization.

    Comput Hum Behav 2010, 26(3):277-287. Publisher Full Text OpenURL

  4. Perren S, Dooley J, Shaw T, Cross D: Bullying in school and cyberspace: Associations with depressive symptoms in Swiss and Australian adolescents.

    Child Adolesc Psychiat Ment Health 2010, 4(1):1-10. BioMed Central Full Text OpenURL

  5. Ybarra ML, Mitchell KJ: Online aggressor/targets, aggressors, and targets: a comparison of associated youth characteristics.

    J Child Psychol Psychiatry 2004, 45(7):1308-1316. PubMed Abstract | Publisher Full Text OpenURL

  6. Campbell M, Spears B, Slee P, Butler D, Kift S: Victims’ perceptions of traditional and cyberbullying, and the psychosocial correlates of their victimisation.

    Emotional Behav Difficulties 2012, 17(3–4):389-401. OpenURL

  7. Hinduja S, Patchin JW: Bullying, cyberbullying, and suicide.

    Arch Suicide Res 2010, 14(3):206-221. PubMed Abstract | Publisher Full Text OpenURL

  8. Schneider SK, O'Donnell L, Stueve A, Coulter RWS: Cyberbullying, school bullying, and psychological distress: A regional census of high school students.

    Am J Public Health 2012, 102(1):171-177. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  9. Beran T, Li Q: The relationship between cyberbullying and school bullying.

    J Stud Wellbeing 2007, 1(2):15-33. OpenURL

  10. Katzer C, Fetchenhauer D, Belschak F: Cyberbullying: who are the victims? a comparison of victimization in internet chatrooms and victimization in school.

    J Media Psychol 2009, 21(1):25-36. Publisher Full Text OpenURL

  11. Raskauskas J, Stoltz AD: Involvement in traditional and electronic bullying among adolescents.

    Dev Psychol 2007, 43(3):564-575. PubMed Abstract | Publisher Full Text OpenURL

  12. Ybarra ML: Linkages between depressive symptomatology and Internet harassment among young regular internet users.

    Cyber Psychol Behav 2004, 7(2):247-257. Publisher Full Text OpenURL

  13. Ybarra ML, Mitchell KJ, Wolak J, Finkelhor D: Examining characteristics and associated distress related to internet harassment: findings from the second youth internet safety survey.

    Pediatrics 2006, 118(4):e1169-e1177. PubMed Abstract | Publisher Full Text OpenURL

  14. Ybarra ML, Mitchell KJ, Wolak J, Finkelhor D: Examining characteristics and associated distress related to internet harassment: findings from the second youth internet safety survey.

    Pediatrics 2007, 118(4):1169-1177. OpenURL

  15. Beran T, Li Q: Cyber-harassment: a study of a new method for an old behavior.

    J Educ Comput Res 2005, 32(3):265-277. Publisher Full Text OpenURL

  16. Lewinsohn PM, Hops H, Roberts RE, Seeley JR, Andrews JA: Adolescent psychopathology: i prevalence and incidence of depression and other dsm-iii-r disorders in high school students.

    J Abnorm Psychol 1993, 102(1):133-144. PubMed Abstract | Publisher Full Text OpenURL

  17. Schoffstall CL, Cohen R: Cyber aggression: The relation between online offenders and offline social competence.

    Soc Dev 2011, 20(3):587-604. Publisher Full Text OpenURL

  18. Låftman SB, Modin B, Östberg V: Cyberbullying and subjective health: A large-scale study of students in Stockholm, Sweden.

    Child Youth Serv Rev 2013, 35(1):112-119. Publisher Full Text OpenURL

  19. Slonje R, Smith PK, Frisén A: The nature of cyberbullying, and strategies for prevention.

    Comput Hum Behav 2013, 29(1):26-32. Publisher Full Text OpenURL

  20. Paul S, Smith PK, Blumberg HH: Comparing student perceptions of coping strategies and school interventions in managing bullying and cyberbullying incidents.

    Pastoral Care in Educ 2012, 30(2):127-146. Publisher Full Text OpenURL

  21. Snakenborg J, Van Acker R, Gable RA: Cyberbullying: Prevention and Intervention to Protect Our Children and Youth.

    Prev Sch Fail 2011, 55(2):88-95. Publisher Full Text OpenURL

  22. Patchin JW, Hinduja S: Traditional and Nontraditional Bullying Among Youth: A Test of General Strain Theory.

    Youth Soc 2011, 43(2):727-751. Publisher Full Text OpenURL

  23. Tenenbaum LS, Varjas K, Meyers J, Parris L: Coping strategies and perceived effectiveness in fourth through eighth grade victims of bullying.

    Sch Psychol Int 2011, 32(3):263-287. Publisher Full Text OpenURL

  24. Olweus D: Invited expert discussion paper Cyberbullying: An overrated phenomenon?

    Eur J Dev Psychol 2012, 9(5):1-19. OpenURL

  25. Hinduja S, Patchin JW: Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization.

    Deviant Behav 2008, 29(2):129-156. Publisher Full Text OpenURL

  26. Hemphill SA, Kotevski A, Tollit M, Smith R, Herrenkohl TI, Toumbourou JW, Catalano RF: Longitudinal Predictors of Cyber and Traditional Bullying Perpetration in Australian Secondary School Students.

    J Adolesc Health 2012, 51(1):59-65. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  27. Casas JA, Del Rey R, Ortega-Ruiz R: Bullying and cyberbullying: Convergent and divergent predictor variables.

    Comput Hum Behav 2013, 29(3):580-587. Publisher Full Text OpenURL

  28. Ang RP, Goh DH: Cyberbullying Among Adolescents: The Role of Affective and Cognitive Empathy, and Gender.

    Child Psychiatry Hum Dev 2010, 41(4):387-397. PubMed Abstract | Publisher Full Text OpenURL

  29. Barlińska J, Szuster A, Winiewski M: Cyberbullying among adolescent bystanders: Role of communication medium, form of violence, and empathy.

    J Commun Applied Social Psychol 2013, 23:37-51. Publisher Full Text OpenURL

  30. Slonje R, Smith PK: Cyberbullying: Another main type of bullying?

    Scand J Psychol 2008, 49(2):147-154. PubMed Abstract | Publisher Full Text OpenURL

  31. Ahlfors R: Many Sources, One Theme: Analysis of Cyberbullying Prevention and Intervention Websites.

    J Soc Sci 2010, 6(4):515-522. OpenURL

  32. Lenhart A, Purcell K, Smith A, Zickuhr K: Social Media & Mobile Internet Use among Teens and Young Adults. Washington, DC: Pew Research Center, Pew Internet & American Life Project; 2010. OpenURL

  33. Webb M, Burns J, Collin P: Providing online support for young people with mental health difficulties: challenges and opportunities explored.

    Early Interv Psychiatry 2008, 2(2):108-113. PubMed Abstract | Publisher Full Text OpenURL

  34. Havas J, de Nooijer J, Crutzen R, Feron F: Adolescents' views about an internet platform for adolescents with mental health problems.

    Health Educ 2011, 111(3):164-176. Publisher Full Text OpenURL

  35. Oenema A, Brug J, Dijkstra A, Weerdt I, Vries H: Efficacy and Use of an Internet-delivered Computer-tailored Lifestyle Intervention, Targeting Saturated Fat Intake, Physical Activity and Smoking Cessation: A Randomized Controlled Trial.

    Ann Behav Med 2008, 35(2):125-135. PubMed Abstract | Publisher Full Text OpenURL

  36. Cobiac J, Vos T, Barendregt J: Cost-effectiveness of interventions to promote physical activity: a modelling study.

    PLoS Med 2009, 6(7):e1000110. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  37. De Vries H, Brug J: Computer-tailored interventions motivating people to adopt health promoting behaviours: Introduction to a new approach.

    Patient Educ Couns 1999, 36(2):99-195. PubMed Abstract | Publisher Full Text OpenURL

  38. Noar SM, Benac CN, Harris MS: Does tailoring matter? Meta-analytic review of tailored print health behavior change interventions.

    Psychol Bull 2007, 133(4):673-693. PubMed Abstract | Publisher Full Text OpenURL

  39. Krebs P, Prochaska JO, Rossi JS: A meta-analysis of computer-tailored interventions for health behavior change.

    Prev Med 2010, 51(3–4):214-221. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  40. Brug J, Oenema A, Kroeze W, Raat H: The internet and nutrition education: challenges and opportunities.

    Eur J Clin Nutr 2005, 59:S130-S139. PubMed Abstract | Publisher Full Text OpenURL

  41. Smith PK, Salmivalli C, Cowie H: Effectiveness of school-based programs to reduce bullying: a commentary.

    J Exp Criminol 2012, 8(4):433-441. Publisher Full Text OpenURL

  42. Michie S, Johnston M, Francis J, Hardeman W, Eccles M: From Theory to Intervention: Mapping Theoretically Derived Behavioural Determinants to Behaviour Change Techniques.

    Appl Psychol 2008, 57(4):660-680. Publisher Full Text OpenURL

  43. Webb TL, Joseph J, Yardley L, Michie S: Using the internet to promote health behavior change: a systematic review and meta-analysis of the impact of theoretical basis, use of behavior change techniques, and mode of delivery on efficacy.

    J Med Internet Res 2010, 12(1):e4. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  44. Bartholomew LK, Parcel GS, Kok G, Gottlieb NH, Fernández ME: Planning Health Promotion Programs: An Intervention Mapping Approach. San Francisco: Jossey-Bass; 2011. OpenURL

  45. Green LW, Kreuter MW: Health Program Planning: An Educational And Ecological Approach. New York: McGraw-Hill; 2005. OpenURL

  46. van der Vegt AL, den Blanken M, Jepma I: Nationale scholierenmonitor: meting voorjaar 2007.

    Onderwijsvernieuwingenrosernl 2007.

    http://www.hetccv.nl/dossiers/geweld-op-school/landelijk---nationale-scholierenmonitor-2007 webcite

    OpenURL

  47. Walrave M, Heirman W: Cyberbullying: Predicting Victimisation and Perpetration.

    Child Soc 2011, 25(1):59-72. Publisher Full Text OpenURL

  48. Wade A, Beran T: Cyberbullying: The new era of bullying.

    Can J Sch Psychol 2011, 26(1):44-61. Publisher Full Text OpenURL

  49. Gavin LA, Furman W: Age differences in adolescents' perceptions of their peer groups.

    Dev Psychol 1989, 25(5):827. OpenURL

  50. Faber M, Verkerk G, van Aken M, Lissenburg L, Geerlings M: Plezier op school: sterker naar de brugklas.

    Kind en Adolescent Praktijk 2006, 5(1):31-39. Publisher Full Text OpenURL

  51. Lazarus RS, Folkman S: Stress, appraisal, and coping. New York: Springer; 1984. OpenURL

  52. Craig W, Pepler D, Blais J: Responding to bullying: what works.

    Sch Psychol Int 2007, 28(4):465-477. Publisher Full Text OpenURL

  53. Kowalski RM, Limber SP, Agatston PW: Cyber Bullying: Bullying in the digital age. Malden: Blackwell Publishing; 2008. OpenURL

  54. Mahady Wilton MM, Craig WM, Pepler DJ: Emotional regulation and display in classroom victims of bullying: characteristic expressions of affect, coping styles and relevant contextual factors.

    Soc Dev 2000, 9(2):226-245. OpenURL

  55. Kristensen SM, Smith PK: The use of coping strategies by Danish children classed as bullies, victims, bully/victims, and not involved, in response to different (hypothetical) types of bullying.

    Scand J Psychol 2003, 44:479-488. PubMed Abstract | Publisher Full Text OpenURL

  56. Bijttebier P, Vertommen H: Coping with peer arguments in school-age children with bully/vcitim problems.

    Br J Educ Psychol 1998, 68(3):387-394. PubMed Abstract | Publisher Full Text OpenURL

  57. Dooley JJ, Shaw T, Cross D: The association between the mental health and behavioural problems of students and their reactions to cyber-victimization.

    Eur J Dev Psychol 2012, 9(2):275-289. Publisher Full Text OpenURL

  58. Dehue F, Bolman C, Völlink T: Cyberbullying: youngsters’ experiences and parental perception.

    Cyber Psychol Behav 2008, 11(2):217-223. Publisher Full Text OpenURL

  59. Acirak OT: Psychiatric symptomatology as predictor of cyberbullying among university students.

    Eurasian J Educ Res 2009, 34:167-184. OpenURL

  60. Riebel JRSJ, Fischer UC: Cyberbullying in Germany – an exploration of prevalence, overlapping with real life bullying and coping strategies.

    Psychol Sci Q 2009, 51(3):298-314. OpenURL

  61. Perren S, Corcoran L, Cowie H, Dehue F, Garcia D, Mc Guckin C, Sevcikova A, Tsatsou P, Völlink T: Tackling cyberbullying: Review of empirical evidence regarding successful responses by students, parents, and schools.

    Int J Conflict Violence 2012, 6(2):283-292. OpenURL

  62. Parris L, Varjas K, Meyers J, Cutts H: High School Students’ Perceptions of Coping With Cyberbullying.

    Youth Soc 2012, 44(2):284-306. Publisher Full Text OpenURL

  63. Skrzypiec G, Slee P, Murray-Harvey R, Pereira B: School bullying by one or more ways: Does it matter and how students cope?

    Sch Psychol Int 2011, 32(3):288-311. Publisher Full Text OpenURL

  64. Andreou E: Bully/Victim Problems and their Association with Coping Behaviour in Conflictual Peer Interactions Among School-age Children.

    Educ Psychol 2001, 21(1):59-66. Publisher Full Text OpenURL

  65. Hunter SC, Boyle JME: Appraisal and coping strategy use in victims of school bullying.

    Br J Educ Psychol 2004, 74(1):83-107. PubMed Abstract | Publisher Full Text OpenURL

  66. Perry DG, Hodges EVE, Egan SK, Juvonen J, Graham S: Determinants of Chronic Victimization by Peers: A Review and New Model of Family Influence. In Peer Harassment in School: The Plight of the Vulnerable and Victimized. New York, NY, US: Guilford Press; 2001:73-104. OpenURL

  67. Kanetsuna T, Smith PK, Morita Y: Coping with bullying at school: children's recommended strategies and attitudes to school-based interventions in England and Japan.

    Aggress Behav 2006, 32(6):570-580. Publisher Full Text OpenURL

  68. Völlink T, Bolman CAW, Dehue F, Jacobs NCL: Coping with Cyberbullying: Differences Between Victims, Bully-victims and Children not Involved in Bullying.

    J Commun Applied Soc Psychol 2013, 23(1):7-24. Publisher Full Text OpenURL

  69. Neary A, Joseph S: Peer victimization and its relationship to self-concept and depression among school girls.

    Personal Individ Differ 1994, 16(1):183-186. Publisher Full Text OpenURL

  70. Jacobs NCL, Dehue F, Völlink T, Lechner L: Determinants of adolescents’ ineffective and improved coping with cyberbullying: a Delphi study.

    J Adolesc 2014, 37(4):373-385. PubMed Abstract | Publisher Full Text OpenURL

  71. Cook CR, Williams KR, Guerra NG, Kim TE, Sadek S: Predictors of bullying and victimization in childhood and adolescence: a meta-analytic investigation.

    Sch Psychol Q 2010, 25(2):65-83. OpenURL

  72. Bauman S: Cyberbullying in a rural intermediate school: An exploratory study.

    J Early Adolesc 2010, 30(6):803-833. Publisher Full Text OpenURL

  73. Ellis A: The essence of RET.

    J Ration Emot Cogn Behav Ther 1984, 2(1):19-25. Publisher Full Text OpenURL

  74. Ellis A: Changing Rational-emotive therapy (RET) to Rational, emotive behavior therapy (REBT).

    J Ration Emot Cogn Behav Ther 1995, 13(2):85-89. Publisher Full Text OpenURL

  75. Ringrose HJ, Nijenhuis EH: Bang zijn voor andere kinderen. Groningen: Wolters-Noordhoff; 1986. OpenURL

  76. Ellis A: Overcoming Destructive Beliefs, Feelings and Behaviors: New Directions for Rational Emotive Therapy. New York: Prometheus Books; 2001. OpenURL

  77. MacInnes D: The theories underpinning rational emotive behaviour therapy: where's the supportive evidence?

    Int J Nurs Stud 2004, 41(6):685-695. PubMed Abstract | Publisher Full Text OpenURL

  78. Erdur-Baker Ö: Cyberbullying and its correlation to traditional bullying, gender and frequent and risky usage of internet-mediated communication tools.

    New Media Soc 2010, 12(1):109-125. Publisher Full Text OpenURL

  79. Hinduja S, Patchin JW: Offline consequences of online victimization.

    J Sch Violence 2007, 6(3):89-112. Publisher Full Text OpenURL

  80. Kim YS, Leventhal BL, Koh Y, Hubbard A, Boyce WT: School Bullying and Youth Violence.

    Arch Gen Psychiatry 2006, 63:1035-1041. PubMed Abstract | Publisher Full Text OpenURL

  81. Gonzalez JE, Nelson JR, Gutkin TB, Saunders A, Galloway A, Shwery CS: Rational Emotive Therapy With Children and Adolescents: A Meta-Analysis.

    J Emot Behav Disord 2004, 12(4):222-235. Publisher Full Text OpenURL

  82. Banks T, Zionts P: REBT Used with Children and Adolescents who have Emotional and Behavioral Disorders in Educational Settings: A Review of the Literature.

    J Ration Emot Cogn Behav Ther 2009, 27(1):51-65. Publisher Full Text OpenURL

  83. Woods S, Wolke D, Nowicki S, Hall L: Emotion recognition abilities and empathy of victims of bullying.

    Child Abuse Negl 2009, 33(5):307-311. PubMed Abstract | Publisher Full Text OpenURL

  84. Nowicki S Jr, Duke MP: Individual differences in the nonverbal communication of affect: The Diagnostic Analysis of Nonverbal Accuracy Scale.

    J Nonverbal Behav 1994, 18(1):9-35. Publisher Full Text OpenURL

  85. Kokkinos C, Kipritsi E: The relationship between bullying, victimization, trait emotional intelligence, self-efficacy and empathy among preadolescents.

    Soc Psychol Educ 2011, 15(1):41-58. OpenURL

  86. Austin EJ, Saklofske DH, Egan V: Personality, well-being and health correlates of trait emotional intelligence.

    Personal Individ Differ 2005, 38(3):547-558. Publisher Full Text OpenURL

  87. Mishna F, Cook C, Gadalla T, Daciuk J, Solomon S: Cyber Bullying Behaviors Among Middle and High School Students.

    Am J Orthopsychiatry 2010, 80(3):362-374. PubMed Abstract | Publisher Full Text OpenURL

  88. Price M, Dalgleish J: Cyberbullying: experiences, impacts and coping strategies as described by Australian young people.

    Youth Stud Australia 2010, 29(2):51-59. OpenURL

  89. Fanti KA, Demetriou AG, Hawa VV: A longitudinal study of cyberbullying: Examining riskand protective factors.

    Eur J Dev Psychol 2012, 9(2):168-181. Publisher Full Text OpenURL

  90. Kochenderfer-Ladd B: Peer Victimization: The Role of Emotions in Adaptive and Maladaptive Coping.

    Soc Dev 2004, 13(3):329-349. Publisher Full Text OpenURL

  91. Cross D, Monks H, Campbell MA, Spears B, Slee P: School-based strategies to address cyber bullying.

    Centre for Strategic Education Occasional Papers 2011, 119:1-12. OpenURL

  92. Boulton MJ, Smith PK, Cowie H: Short-Term Longitudinal Relationships Between Children’s Peer Victimization/Bullying Experiences and Self-Perceptions Evidence for Reciprocity.

    Sch Psychol Int 2010, 31(3):296-311. Publisher Full Text OpenURL

  93. Jones SE, Manstead ASR, Livingstone AG: Ganging up or sticking together? Group processes and children's responses to text-message bullying.

    Br J Psychol 2011, 102(1):71-96. PubMed Abstract OpenURL

  94. Camodeca M, Goossens FA: Children's opinions on effective strategies to cope with bullying: The importance of bullying role and perspective.

    Educ Res 2005, 47(1):93-105. Publisher Full Text OpenURL

  95. Vandebosch H, van Cleemput K: Cyberbullying among youngsters: profiles for bullies and victims.

    New Media Soc 2009, 11(8):1349-1371. Publisher Full Text OpenURL

  96. Hinduja S, Patchin JW: Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying. California: Corwin press; 2009. OpenURL

  97. Valcke M, De Wever B, Van Keer H, Schellens T: Long-term study of safe Internet use of young children.

    Comput Educ 2011, 57(1):1292-1305. Publisher Full Text OpenURL

  98. Kok G, Schaalma H, Ruiter RAC, Van Empelen P, Brug J: Intervention Mapping: Protocol for Applying Health Psychology Theory to Prevention Programmes.

    J Health Psychol 2004, 9(1):85-98. PubMed Abstract | Publisher Full Text OpenURL

  99. Bandura A: Social Foundations of Thought and Action: a Social Cognitive Theory. Englewood Cliffs, NJ: Prentice Hall; 1986. OpenURL

  100. Bandura A: Perceived Self-Efficacy in Cognitive Development and Functioning.

    Educ Psychol 1993, 28(2):117-148. Publisher Full Text OpenURL

  101. Kreuter M, Farrell D, Olevitch L, Brennan L: Tailoring Health Messages: Customizing Communication with Computer Technology. Mahwah, NJ: Erlbaum; 2000. OpenURL

  102. de Vries H, Kremers SPJ, Smeets T, Brug J, Eijmael K: The Effectiveness of Tailored Feedback and Action Plans in an Intervention Addressing Multiple Health Behaviors.

    Am J Health Promot 2008, 22(6):417-425. PubMed Abstract | Publisher Full Text OpenURL

  103. Brug J, Oenema A, Campbell M: Past, present, and future of computer-tailored nutrition education.

    Am J Clin Nutri 2003, 77(4):1028S-1034S. OpenURL

  104. McManus IC, Livingston G, Katona C: The attractions of medicine: the generic motivations of medical school applicants in relation to demography, personality and achievement.

    BMC Med Educ 2006, 6:11. PubMed Abstract | BioMed Central Full Text | PubMed Central Full Text OpenURL

  105. Caspi A, Bem DJ: Personality Continuity and Change across the Life Course. In Handbook of Personality: Theory and Research. Edited by Pervin LA. New York: Guilford Press; 1990:549-575. OpenURL

  106. Petty RE, Cacioppo JT: The Elaboration Likelihood Model of Persuasion. In Communication and Persuasion. New York: Springer; 1986:1-24. OpenURL

  107. Bandura A: Self-efficacy: The exercise of control. New York: W.H. Freeman; 1997. OpenURL

  108. Woolfolk A: Educational Psychology. Boston: Allyn & Bacon; 2010. OpenURL

  109. Jackson RA, Stotland NE, Caughey AB, Gerbert B: Improving diet and exercise in pregnancy with Video Doctor counseling: a randomized trial.

    Patient Educ Couns 2011, 83(2):203-209. PubMed Abstract | Publisher Full Text OpenURL

  110. Vandelanotte C, Mummery WK: Qualitative and quantitative research into the development and feasibility of a video-tailored physical activity intervention.

    Int J Behav Nutr Phys Act 2011, 8(1):70. PubMed Abstract | BioMed Central Full Text | PubMed Central Full Text OpenURL

  111. Sniehotta FF, Scholz U, Schwarzer R: Bridging the intention–behaviour gap: Planning, self-efficacy, and action control in the adoption and maintenance of physical exercise.

    Psychol Health 2005, 20(2):143-160. Publisher Full Text OpenURL

  112. Sniehotta FF, Schwarzer R, Scholz U, Schüz B: Action planning and coping planning for long-term lifestyle change: theory and assessment.

    Eur J Soc Psychol 2005, 35(4):565-576. Publisher Full Text OpenURL

  113. Leventhal H, Singer R, Jones S: Effects of fear and specificity of recommendation upon attitudes and behavior.

    J Pers Soc Psychol 1965, 2(1):20-29. PubMed Abstract OpenURL

  114. Gollwitzer PM, Sheeran P:

    Implementation intentions: Bibliothek der Universität Konstanz. 2008. OpenURL

  115. Sheeran P, Webb TL, Gollwitzer PM: The interplay between goal intentions and implementation intentions.

    Personal Soc Psychol Bull 2005, 31(1):87-98. Publisher Full Text OpenURL

  116. Reuter T, Ziegelmann JP, Wiedemann AU, Geiser C, Lippke S, Schüz B, Schwarzer R: Changes in Intentions, Planning, and Self-efficacy Predict Changes in Behaviors: An Application of Latent True Change Modeling.

    J Health Psychol 2010, 15(6):935-947. PubMed Abstract | Publisher Full Text OpenURL

  117. van Osch L, Lechner L, Reubsaet A, Wigger S, de Vries H: Relapse prevention in a national smoking cessation contest: Effects of coping planning.

    Br J Health Psychol 2008, 13(3):525-535. PubMed Abstract | Publisher Full Text OpenURL

  118. Wiedemann AU, Lippke S, Reuter T, Ziegelmann JP, Schwarzer R: How planning facilitates behaviour change: Additive and interactive effects of a randomized controlled trial.

    Eur J Soc Psychol 2011, 41(1):42-51. Publisher Full Text OpenURL

  119. Araújo-Soares V, McIntyre T, Sniehotta FF: Predicting changes in physical activity among adolescents: the role of self-efficacy, intention, action planning and coping planning.

    Health Educ Res 2009, 24(1):128-139. PubMed Abstract | Publisher Full Text OpenURL

  120. Rivers I, Poteat PV, Noret N, Ashurst N: Observing bullying at school: The mental health implications of witness status.

    Sch Psychol Q 2009, 24(4):211. OpenURL

  121. Achenbach TM: Integrative Guide for the 1991 CBCL/4-18, YSR, and TRF Profiles: Department of Psychiatry. Burlington: Department of Psychiatry, University of Vermont Burlington; 1991. OpenURL

  122. Geerlings M, Lissenburg L: Evaluatieonderzoek naar de effectiviteit van de cursus ‘Plezier op school’. Utrecht: Universiteit Utrecht; 2005. OpenURL

  123. Choi BCK, Pak AWP: A catalog of biases in questionnaires.

    Prev Chronic Dis 2005, 2(1):A13. OpenURL

Pre-publication history

The pre-publication history for this paper can be accessed here:

http://www.biomedcentral.com/1471-2458/14/396/prepub