17

An intervention using the Information-Motivation-Behavioral Skills Model: Tackling cyberaggression and cyberbullying in South African adolescents

Maša Popovac; Philip Fine    University of Buckingham, Buckingham, United Kingdom

Abstract

Given the ever-increasing concern about cyberaggression and cyberbullying, the Information- Motivation-Behavioral Skills (IMB) model was used to develop an exploratory intervention to increase adolescents’ online risk perception and enhance online safety. The intervention workshops were piloted with 177 females in grades 8–10 (13–16 years) in South Africa. Participants’ online risk perception was assessed either before (control group) or after the workshop (intervention group). Results showed that the intervention group had higher online risk perception, indicating the intervention’s effectiveness in increasing online risk perception, a prerequisite for behavior change. The intervention was more effective when it was tailored to participants’ online behaviors and perceptions than when it was more general. The study demonstrates the utility of the IMB model for addressing cyberaggression and cyberbullying, and the chapter includes guidance for developing and conducting such an intervention.

Keywords

Cyberbullying; Risk; Perception; Intervention; Information-motivation-behavioral skills model; Adolescents; South Africa

Name of program: Information-Motivation-Behavioral Skills

Type of program: School lessons

Suitable for ages: Adolescents

Introduction

Children and adolescents are growing up in the digital age and Information and Communication Technologies (ICTs) have become an integral part of daily life. In addition to a range of available technologies, there are also numerous online activities for social interaction, entertainment, and information seeking. Adolescents’ use of ICTs is particularly high and on the rise globally, especially in more affluent Western societies (Denissen, Neumann, & van Zalk, 2010; Eurostat, 2015). However, there has been a rapid surge in the uptake of ICT use in developing countries through mobile phones, a key entry point for internet adoption in this context (Calandro, Stork, & Gillwald, 2012). In South Africa, internet access among adolescents is particularly high, with 81% owning a mobile phone, 46% having internet access on their mobile phone, and 54% owning a computer, laptop, or tablet (Burton & Leoschut, 2012).

Although South Africa-based research is limited, a national study on school violence, which included questions on cyberbullying, found that 21% of adolescents had been victimized online (Burton & Leoschut, 2012). Further research shows that 28% of 13–15-year-olds were victims and 16% were perpetrators of cyberbullying (Pillay, 2012). A third of 13–18-year-olds reported receiving threats from others on their mobile phone (Odora & Matoti, 2015). These prevalence rates are similar to those indicated by a meta-analysis of international research (Tokunaga, 2010).

Negative online experiences, especially cyberbullying, have been linked to many psychological, emotional, and behavioral problems (Dempsey, Sulkowski, Nichols, & Storch, 2009; Hinduja & Patchin, 2007; Kim & Leventhal, 2008; Litwiller & Brausch, 2013; Van Geel, Vedder, & Tanilon, 2014) and negative school outcomes (Bauman, 2007; Patchin & Hinduja, 2006), leading to cyberbullying being described as a serious societal level health concern (Tokunaga, 2010). However, current online safety strategies in South Africa are fragmented due to a lack of formal guidelines to address cyberbullying incidents, leaving schools to their own initiative in this regard (De Lange & Von Solms, 2011), and this is not just the case in South Africa (Perren et al., 2012; Snakenborg, Van Acker, & Gable, 2011).

This chapter describes an intervention that focuses on addressing cyberaggression, including cyberbullying (and also other online risks not described in this chapter). Cyberaggression, a broader term encompassing a range of different experiences including cyberbullying, harassment, and stalking that occur online, is defined as “intentional harm delivered by the use of electronic means to a person or a group of people irrespective of their age who perceive(s) such acts as offensive, derogatory, harmful or unwanted” (Grigg, 2010, p. 152). Experiences of cyberbullying are forms of cyberaggression, but only cyberbullying shows intentionality, imbalance of power, and repetition (see Corcoran, Guckin, & Prentice, 2015; Menesini et al., 2012; Slonje & Smith, 2008). These distinctions in definitions are important for accurately measuring the behaviors in research contexts, but have little bearing for those experiencing these behaviors or those aiming to address them (Patchin & Hinduja, 2015). Thus, this intervention considers both cyberaggression and cyberbullying.

The intervention applied the Information-Motivation-Behavioral Skills (IMB) model (Fisher & Fisher, 1992) and was piloted on female adolescents in South Africa. The intervention involves addressing deficits in (1) information, (2) motivation, and (3) behavioral skills to increase individuals’ online risk perception, which is a prerequisite for eliciting positive behavioral change and increasing online safety. The intervention is delivered in groups and was implemented to test the utility of the IMB model in this context. Although targeting individuals, it forms part of a broader strategy incorporating a multilevel approach to online safety including teacher training and parental involvement. The following sections outline the (i) theoretical rationale for the intervention, (ii) description of the program, including school-level aspects needed to conduct the intervention effectively, (iii) preliminary evidence for the effectiveness of the IMB model in online safety efforts and, finally (iv) implications and evaluation of the intervention, including a link to further resources.

Theoretical rationale for the program

The Information-Motivation-Behavioral Skills model is an empirically validated and comprehensive health behavior change framework (Fisher & Fisher, 1992). Originally used as a framework to understand a range of health-related risk behaviors (e.g., Kalichman et al., 2002; Kelly, Melnyk, & Belyea, 2012; Osborn & Egede, 2010; Peltzer, Preez, Ramlagan, & Anderson, 2010) where it has proven useful in enacting positive behavior change (Chang, Choi, Kim, & Song, 2014; Gavgani, Poursharifi, & Aliasgarzadeh, 2010; Kiene et al., 2013; Mayberry & Osborn, 2014), the model is increasingly being applied more broadly to promoting prosocial behaviors (e.g., Chang, 2011; Glasford, 2008; Seacat & Northrup, 2010). Thus, it was of interest to determine whether this behavior change framework is applicable in the context of online safety.

The framework is made up of two cognitive factors (Information and Motivation) and one behavioral factor (Behavioral Skills) as shown in Fig. 17.1, argued to be fundamental to behavior change (Fisher & Fisher, 1992). The IMB model posits that information about risks alone is not sufficient to alter people’s risky behavior, but individuals also require motivation to act on the risk information they receive and the necessary behavioral skills to enact positive behavior change (Fisher, Fisher, Bryan, & Misovich, 2002).

f17-01-9780128114230
Fig. 17.1 The IMB model.

Motivation to alter risk behaviors and engage in positive behaviors can be personal (having positive attitudes toward not being involved in the behavior) and social (considering social norms and peer acceptance toward the behavior). Others’ reactions and views influence an individual’s own behavior (Amico, Toro-Alfonso, & Fisher, 2005; Fisher et al., 2002). For example, adolescents whose peers display positive attitudes and greater acceptance toward cyberbullying were found to be more likely to cyberbully others (Heirman & Walrave, 2012). Thus, both the social context of risky behaviors and personal attitudes are important motivators for change.

The third component, behavioral skills, determines whether those who are well informed and well motivated are capable of behavior change. This relates to practical skills needed to increase online safety (e.g., adjusting privacy settings and other risk-reducing behaviors) as well as an individual’s self-confidence about their capabilities (e.g., managing online risks, knowledge of reporting mechanisms), sometimes termed self-efficacy. Behavioral skills thus determine how likely individuals are to initiate or effectively sustain risk-reducing behaviors.

Given that all three of these components are necessary to foster behavior change, the intervention focused on informing, motivating, and enhancing behavioral skills. The aim was to increase adolescents’ online risk perception, a prerequisite for behavior change (Gerrard, Gibbons, Benthin, & Hessling, 1996), as those with higher risk perception are less likely to engage in risk behaviors. Risk perception is influenced by individuals’ knowledge, personal experience, peer and societal norms, and cost- benefit appraisals of their actions (Boholm, 1998; Kasperson et al., 1988; Slovic & Peters, 2006). When an activity is viewed positively, the risks are deemed lower compared to the benefits; when viewed negatively, risks are deemed higher and benefits lower (Alhakami & Slovic, 1994; Finucane, Alhakami, Slovic, & Johnson, 2000). Thus, even though there may be consequences to the risk behaviors, individuals may still engage in them if the perceived benefits seem to outweigh the risk. Individuals also tend to perceive lower risk for themselves compared to others despite potentially engaging in the same risk behavior (Popovac, Mwaba, & Roman, 2011; Sjoberg, 2000): this is true for cyberbullying (Chapin, 2014).

Adolescents in particular tend to have higher feelings of invulnerability to risks, engage in more risk taking and experimentation, associated with their cognitive development during this period (Steinberg, 2008, 2010), and make more risky decisions than either children or adults, indicating that adolescence is a particularly vulnerable time for risk taking (Paulsen, Platt, Huettel, & Brannon, 2011). Adolescents perceive higher benefits than costs for a behavior when they engage in it themselves and tend to normalize the behavior by thinking that more people engage in it than actually do (Benthin, Slovic, & Severson, 1993). Researchers argue that adolescents, although not actively pursuing risks, do not appreciate them (Cohn, Macfarlane, Yanez, & Imai, 1995; Johnson, McCaul, & Klein, 2002; Wolburg, 2001), which makes it harder to warn them about risky behaviors (Greene et al., 2000). Thus, a multifaceted approach is needed (Johnson et al., 2002)—hence the application of the IMB model.

In the IMB model, risk perception plays a crucial role in behavior change by increasing individuals’ personal and social motivation. Low risk perception sustains risk behaviors due to lowered perception of personal vulnerability to harm. In terms of perpetration, lower risk perception and understanding of the effects of their behaviors make adolescents more likely to continue with the behavior. The intervention, therefore, focuses on increasing online risk perception by providing both information and motivation about cyberaggression and cyberbullying from the perspectives of victims, perpetrators, and witnesses. It also addresses the necessary practical skills for eliciting positive behavior change in relation to these different roles given that the same individuals can often be victims in one context and perpetrators in another (Bauman, Toomey, & Walker, 2013; Mishna, Khoury-Kassabri, Gadalla, & Daciuk, 2012; Modecki, Minchin, Harbaugh, Guerra, & Runions, 2014). The ultimate goal of the intervention is to increase online safety.

The program

The program utilizing the IMB framework is designed for adolescents. It is facilitated in a group setting, with the goal of increasing online risk perception, ultimately resulting in behavior change.

Interventions adopting the IMB model are usually tailored to individuals’ current information, motivation, and behavioral skills (Kalichman et al., 2002; Osborn & Egede, 2010). This makes the intervention particularly effective since it targets specific risk behaviors and perceptions (DiClemente, Crosby, & Kegler, 2009; Fisher & Fisher, 1992; Suls & Wallston, 2008), which are seen to be personally relevant, making it more likely that participants will internalize and reflect on the risks and adjust their risk perception. This tailoring is an important aspect to the program. Thus, an initial baseline questionnaire should be administered to the group of adolescents being targeted by the intervention in order to screen their online behaviors, perceptions, and experiences.

This questionnaire should ask adolescents about their online risk perception and various online risk behaviors. It can focus on their experience and involvement in both cyberaggression and cyberbullying as victims, perpetrators, and witnesses, but there is scope for flexibility in terms of what is included. In our pilot study, victimization and perpetration of eight cyberaggression behaviors were explored, including name calling, spreading rumors, and impersonation, according to the categories of behaviors outlined by Patchin and Hinduja (2006) and Willard (2007). Cyberbullying was assessed subjectively, by asking adolescents whether they had ever been cyberbullied, as our previous focus group data from schools in South Africa indicated that adolescents had a good understanding of what constituted cyberbullying actions. Items relating to the emotional effects of these experiences were also included to gauge the severity of these online experiences. The different sections of the baseline questionnaire and example items are shown in Table 17.1.

Table 17.1

Baseline Questionnaire sections and example items

SectionDescriptionExample items
Online Risk PerceptionFifteen items with response options ranging from Strongly Agree to Strongly Disagree

 I worry about things that can go wrong when I am on the internet

 I cannot control the things that happen to me on the internet

 I am afraid of being harassed or threatened on the internet

CybervictimizationEight items with response options ranging from Never to 6 or more times

 I have been cyberbullied

 I have been called a hurtful name or received a hurtful or rude comment, email, text or message

 I have had rumors or gossip spread about me on the internet

 I have had someone take or put up a picture of me online to embarrass me

CyberperpetrationEight items with response options ranging from Never to 6 or more times

 I have taken a private message someone sent me and forwarded it on to others or posted it online for all to see

 I have posted comments or questions to hurt or embarrass someone on the internet

 I have sent threatening emails, texts, messages or made such calls to someone

Witnessing of cyberbullyingTwo items with response options ranging from Never to Very Often

 How often do you witness someone else being cyberbullied online?

 How often has someone you know, like a friend or sibling, been cyberbullied?

Emotional ExperiencesThree items with response options ranging from Never to 6 or more times

 I have been scared or worried about something someone did or said to me on the internet

 I have been hurt or made to feel sad about something someone did or said to me on the internet

 I have not wanted to go to school on some days because of something someone did or said to me on the internet

t0010

The baseline questionnaire can be administered in a class session, and due to the highly personal and potentially sensitive information provided by students, it should be anonymous, perhaps utilizing an online survey service such as Survey Monkey (https://www.surveymonkey.com). Moreover, Survey Monkey can automatically generate simple results relating to prevalence rates that are needed to plan the intervention, without needing any complicated and time-consuming analyses by those undertaking the intervention. This can reduce the time between the baseline questionnaire and the intervention, enabling practitioners to focus their efforts on preparing the tailored activities. Although variation of online behaviors and experiences within the same class is to be expected, the focus in the intervention should be on the students’ most commonly reported behaviors and experiences. To protect students’ confidentiality and anonymity, it is best to use closed-ended questions and not ask for details about specific incidents. Practitioners should omit any details regarding specific incidents from the intervention, and be sensitive to ensuring confidentiality of what students may have reported in the baseline questionnaire.

The information in the baseline questionnaire leads to the development of a focused, targeted intervention, as the practitioner now has an understanding of the key issues. This information is used to inform the content of the program, with participants (i) receiving relevant information about cyberaggression and cyberbullying, (ii) being motivated to make a change in their behaviors, and (iii) enhancing their practical skills and self-confidence to elicit behavior change.

For the information component of the model, participants receive feedback about the prevalence rates of cyberaggression and cyberbullying in their grade and discuss the possible consequences of victimization and perpetration. The different types of behaviors that are experienced (e.g., online threats, name-calling, etc.) are also discussed in more detail. Multimedia learning is recommended (Mayer, 2005), through the use of short video clips, newspaper articles, images, and current research to guide discussions. Participants are also informed about the prevalence rates of witnessing cyberaggression and cyberbullying and reflect on their role as bystanders. During these discussions, the practitioner’s role is to present the key issues and facilitate group discussion in a multimedia environment. The practitioner could also introduce alternative perspectives in order to challenge views and correct any myths and misconceptions that might be held (e.g., victim blaming attitudes).

Understanding the short- and long-term effects of cyberaggression and cyberbullying and discussing these from multiple viewpoints (as victims, perpetrators, and witnesses) can motivate behavior change and create negative social norms relating to these behaviors. It can also increase empathy, encourage help seeking, and engage bystanders. Thus, reflecting on and discussing the issues they face is important in enhancing both personal and social motivation among adolescents. Two activities were particularly effective in this regard. Firstly, students are asked to draw cards containing various cyberaggression or cyberbullying scenarios from the perspective of victims, perpetrators, or witnesses, which were developed for the intervention (see Box 17.1 for examples). For each scenario, students discuss in pairs (i) how they would feel, and (ii) what they could do, if this happened to them. A class discussion follows. This activity encourages students to think about both consequences and strategies to address the issues. Secondly, students are asked to advise one another about an incident of cyberaggression or cyberbullying they were currently (or previously) experiencing, each of which was written anonymously on a piece of paper at the start of the workshop. Advising someone else about a real-life scenario potentially gives participants the opportunity to problem solve about issues that they might themselves encounter online in the future. It also allows participants to give one another relevant advice, promoting peer support and positive social norms in the class.

Box 17.1

Scenario Activity Examples

Task: Students randomly select a card containing a scenario relating to cyberaggression or cyberbullying and (i) reflect on how they would feel if this happened to them and (ii) what they could do if this happened to them. Scenarios were written either from the perspective of a victim, perpetrator, or witness.

Scenario Examples:

 You found out that someone had created a fake social media profile in your name and was using it to post things as if they were coming from you.

 You had an argument with a member of your class during school and in anger posted something about the incident on social media but did not mention them by name. However, people from your school worked out who the post was about and started liking your post and commenting hurtful things about the person on your profile.

 You notice that a page had been created about a member of your class and that it was being used to post altered images of the person in various settings that are not flattering and would likely cause a great deal of embarrassment to them if they found out.

Although similar, these exercises are quite distinct. The first is more general and allows students to reflect on emotions and effects of behaviors and allows them to begin thinking about possible solutions. This leads to the second exercise, which is more personal as it relates to a peer’s real experience. Both activities address personal and social motivation as well as behavioral skills through practical knowledge and by enhancing self-confidence in online contexts. It also encourages participation of all students in the intervention. If time allows, students can work in groups and think of strategies that could be useful to address the scenarios they have been given in both exercises more broadly, such as in their class and in their school. Coming up with problem-solving strategies related to cyberaggression and cyberbullying is very useful as the students’ ideas could feed into broader school strategies.

In addition to these exercises aimed at enhancing self-confidence related to online safety issues, practitioners should also discuss practical skills (e.g., privacy settings, blocking websites) and the available resources and support both within and outside the school (e.g., reporting mechanisms at school). The main aspects of the intervention program are summarized in Table 17.2. Further resources relating to the intervention (i.e., sample questionnaire, teacher guide, and activity plans) can be found at https://www.buckingham.ac.uk/cyberbullying.

Table 17.2

The IMB model components in the intervention

Information

 Discussion of positive and negative aspects of the internet

 Presentation of participants’ self-reported risk behaviors highlighting the key issues

 Information on why some behaviors are risky through examining examples in the media, current research etc.

Motivation

 Reflection on potential consequences and effects of cyberaggression and cyberbullying on victims, perpetrators, and witnesses

 Thinking about what one could do when facing a situation of cyberaggression or cyberbullying

 Reflection on what to do when witnessing cyberbullying and why engaging bystanders is important

 Ideas around internet etiquette (“netiquette”)

 Building social motivation and addressing peer norms through peer support

Behavioral Skills

 Taking ownership of online safety: Discussion about practical skills and online privacy

 Problem solving about negative online incidents (reflecting on solutions and strategies)

 Information about resources available to support help seeking and reporting of cyberaggression and cyberbullying within the school and external sources

t0015

This intervention, tailored to adolescents’ own behaviors and experiences, along with a focus on addressing all three components of the IMB model, encourages adolescents to take ownership of their online safety, to be mindful of their online behaviors and their potential impact on others, and to take action as bystanders through increased self- confidence and understanding of the support available to them. The steps in the program thus include (i) administering an initial questionnaire to screen adolescents’ perceptions and experiences, (ii) developing a focused intervention using the information provided by participants and addressing all three components of the IMB model, and (iii) facilitating the workshop by promoting discussion and problem solving (see Fig. 17.2). Practitioners can re-administer the baseline questionnaire (or parts thereof) periodically to assess further areas to work on, especially given the pace with which technology evolves, as well as to evaluate the effectiveness of the intervention. A tailored intervention provides practitioners with the flexibility to customize the program to the current issues being experienced by participants, ensuring that the workshop is appropriate, relevant, and comprehensively addresses the issues through the IMB framework.

f17-02-9780128114230
Fig. 17.2 Steps in the intervention.

Evidence for the intervention’s effectiveness

Participants

The study was conducted at an all-female high school in Cape Town, South Africa, due to reports of differences in online activities and risk experiences between males and females (e.g., Mitchell, Finkelhor, Jones, & Wolak, 2012; Ybarra, Alexander, & Mitchell, 2005). Extensive data about online risk behaviors and perceptions were collected for 91 grade 8 and 9 students at the end of the 2013 school year. The intervention took place 7 months later, and was conducted with the original participants, now in grades 9 and 10. The intervention was tailored for these participants. The new grade 8 students of 2014 were also included in the intervention, enabling them to benefit from it. However, since they did not complete the baseline questionnaire, their intervention was not tailored, allowing an exploratory comparison of the effectiveness of a tailored versus non-tailored intervention.

A total of 177 females between the ages of 13–16 years (M = 14.5) participated in the intervention, representing early and middle adolescence (see Table 17.3). Each participating grade (8, 9 and 10) consisted of three classes. The first author facilitated one 50-min workshop with each of the 9 classes. The intervention received the necessary ethical approval. Consent and assent for participation in the initial questionnaire and the intervention workshop was obtained from the parents and adolescents, respectively. No parent withheld consent and none of the adolescents chose not to participate in the intervention.

Table 17.3

Participants: grade, proportion, and mean age (years)

Grade% Of totalMean age
835.6% (n = 63)13.6
932.8% (n = 58)14.5
1031.6% (n = 56)15.5

Note: The intervention was delivered to 177 adolescents but 3 participants were excluded in the later analyses due to missing data.

The baseline questionnaire: Behaviors and perceptions to target in the intervention

The initial questionnaire showed that 71% of females had experienced cyberaggression, of whom 35% indicated that they had ever been cyberbullied. Most participants knew the identity of the perpetrator (87%) and were most likely to tell a friend about the experience (44%). Half also admitted that they had perpetrated cyberaggression (51%). Most (72%) had witnessed cyberbullying, with 16% witnessing it often. The majority also knew someone who had been cyberbullied (64%). Unsurprisingly, given these findings, 68% of participants believed that cyberbullying was currently a very serious issue. Further examples of cyberaggression experiences reported at baseline are shown in Table 17.4. Reliability analyses of the scale showed a Cronbach’s alpha of .82.

Table 17.4

Examples of cybervictimization and cyberperpetration (n = 91)

Cybervictimization
Been called a rude or hurtful name in an online space55.0%
Had my picture posted online to embarrass me38.0%
Had rumors or gossip spread about me online32.0%
Cyberperpetration
Called someone a rude or hurtful name29.8%
Put up a picture of someone online to embarrass them25.0%
Spread rumors or gossip about someone online8.3%

t0025

The severity of these online experiences is reflected in the emotional distress reported by some adolescents (see Table 17.5). Examples of online risk perception items are also shown in Table 17.5, showing the participants’ concerns and their perceptions of how controllable the risks are, which were addressed in the intervention through enhancing behavioral skills.

Table 17.5

Emotional experiences, concerns, and controllability of online risks (n = 91)

Emotional experiences
Been hurt or made to feel sad about something that happened online44.6%
Felt scared or worried about something that happened online32.9%
Did not want to go to school on some days due to an online experience22.0%
Concern and fear
I worry about things that can go wrong when I am on the internet52.4%
I am afraid of being harassed or threatened online34.5%
Controllability
I would not know what to do if I was faced with a dangerous situation on the internet50.0%
I do not have control over what happens to me on the internet24.1%

t0030

Assessing the intervention’s effectiveness

The intervention was evaluated using the online risk perception scale from the baseline questionnaire. This 15-item scale was developed from existing risk perception literature (e.g., Benthin et al., 1993; Boholm, 1998; Turow & Nir, 2000). Validity testing of the scale showed that the items reflected four categories of risk perception, including: (i) costs vs. benefits of the internet (e.g., “The benefits of the internet are far bigger than any dangers”); (ii) knowledge of risks (e.g., “People on the internet are usually honest about who they are”); (iii) fear and controllability of risks (e.g., “I cannot control the things that happen to me on the internet”); and (iv) desire for regulation (e.g., “It is important that adults keep a watch over teenagers’ internet behaviors”). Participants indicated their agreement or disagreement on a 5-point Likert scale, with a midpoint neutral option. The scale demonstrated adequate reliability (Cronbach’s alpha = .78).

The risk perception scale was administered either before or after the intervention. One randomly selected class per grade completed the questionnaire before the intervention (control group), the other two classes completing it after the intervention (intervention group). It was not feasible in the time available for participants to complete the instrument both before and after the intervention, and participants might have recalled their responses, potentially confounding the results. Moreover, this would have reduced the time available for the intervention. Thus, independent groups with 50 participants in the control and 124 in the intervention were used to evaluate the effectiveness of the IMB Skills model as an intervention for cyberaggression and cyberbullying.

An overall online risk perception score was calculated for each participant. Negatively worded items were reverse scored and response options were assigned scores of − 2, − 1, 0, + 1, and + 2, resulting in overall scores ranging from − 30 to + 30. A higher score reflected higher risk perception (i.e., greater appreciation of risk) and a lower score reflected lower risk perception.

Two verification analyses were conducted prior to the main analysis. Firstly, online risk perception of the new grade 8 students were compared with those of the previous year (i.e., 2014 students vs. 2013 students) using independent samples t-tests. Since the new students did not complete the baseline questionnaire, it was important to ensure that they did not significantly differ from the previous grade 8’s. The results confirmed that there was no significant difference in online risk perception between the two groups (2013 grade 8’s: M = 1.42; 2014 grade 8’s: M = 1.88).

Secondly, the differences in risk perception between the (i) baseline questionnaire, (ii) control and (iii) intervention groups were compared (one-way ANOVA). There was a significant difference between the groups, F(2, 255) = 5.10, p = .007, η2 = .04. This was due to the intervention group having significantly higher risk perception scores (M = 3.52, SD = 5.69, SE = 0.51) compared to both other groups, providing initial evidence that the intervention increased online risk perception. No significant difference was found between the baseline questionnaire (M = 1.40, SD = 6.86, SE = 0.76) and the control group (M = 0.60, SD = 6.44, SE = 0.91). As both occurred prior to the intervention, this ruled out a significant maturation effect over the 7-month period between data collection and the intervention.

The control and intervention groups were then compared for each grade. Main effects were found for both group (control and intervention) and grade (8, 9, and 10). The intervention group had significantly higher risk perception than the control, as established in the verification analysis above, F(1, 174) = 11.65, p = .001, η2 = .07. Risk perception was also significantly lower with each subsequent grade for both groups combined, i.e., risk perception in grade 8 was highest (M = 3.90, SE = 1.29), followed by grade 9 (M = 1.87, SE = − 0.84) and grade 10 (M = − 0.25, SE = 0.92), F(2, 174) = 5.96, p = .003, η2 = .07. With the difference between grades 8 and 10 being significant (p = .017), this suggests that risk perception decreased with age. A significant negative correlation between grade and risk perception further demonstrates this (r = − 0.21, p = .007). This pattern has also been established in previous research: although risk taking and risky decision making generally decrease with age (Gardner & Steinberg, 2005), mid-adolescence has been identified as a period of heightened vulnerability in risky behavior (Steinberg, 2008, 2010). The current study likewise indicates that middle adolescence may also be a particularly vulnerable period for cyberaggression and cyberbullying. Although the interaction was nonsignificant, there was a larger proportional difference in risk perception scores between the control and intervention groups in the higher grades (see Fig. 17.3), possibly because they received the tailored intervention. This suggests that the intervention may be especially effective during middle adolescence when it is tailored to participants’ risk behaviors and experiences. During the intervention itself, many participants were surprised by the prevalence rates of cyberaggression and cyberbullying in their grade. A tailored intervention likely makes it more difficult to dismiss the personal relevance of the issues, which is important in enhancing risk perception. Knowing that others are encountering similar experiences may also be powerful in influencing risk perception.

f17-03-9780128114230
Fig. 17.3 Mean risk perception scores for the control and intervention groups for each grade (n = 174).

Despite the small effect sizes of these findings, preliminary analysis suggests that the intervention had some positive effect on risk perception. The individual items in the risk perception scale show this (see Table 17.6). For example, fewer adolescents in the intervention group thought that the benefits of the internet outweigh any risks. This is a positive shift as the intervention is aimed at enhancing understanding and appreciation of risks in order to make informed behavioral choices when using technology.

Table 17.6

Differences in risk perception between the control and intervention groups

ControlIntervention
The internet is very safe76%32%
The benefits of the internet are far bigger than any dangers56%29%
Adults make too much of a fuss when it comes to risks of the internet42%24%
The internet should not have an age restriction and everyone should be able to access anything they like33%17%

These results provide preliminary evidence for the IMB model as an effective framework for online safety efforts, which should form part of broader strategies (see later). It also highlights the importance of tailored interventions and targeting those at middle adolescence in particular. Further interventions with additional pre- and post-test groups are underway to clarify these links.

Implications and evaluation of the intervention

Cyberaggression and cyberbullying warrant serious attention within policy and intervention efforts, especially due to their psychological and behavioral effects and their influence on the offline world such as the school environment (Casas, Del Rey, & Ortega-Ruiz, 2013). This exploratory study was the first to apply the IMB model in the context of online behaviors. Preliminary results from an intervention conducted among 177 female adolescents in South Africa indicate that Information, Motivation, and Behavioral Skills are relevant factors in developing comprehensive interventions relating to online safety at the individual level, in conjunction with broader level efforts. The findings highlighted several important points, discussed below.

Firstly, an intervention using the IMB model did increase adolescents’ online risk perception, indicating the utility of the model for addressing cyberaggression and cyberbullying, and providing further support for the model’s use in nonhealth-related behavioral contexts. Secondly, while interventions targeting all age groups are important, the results highlight the need to target those in middle adolescence as they emerged as a particularly vulnerable group in terms of risk perception and behavior.

Thirdly, the effectiveness of the current intervention may be that it was tailored to adolescents’ reported online risk behaviors, perceptions, and experiences. Tailored interventions enhance participants’ evaluation of the information presented as being personally relevant, thereby promoting more accurate cost-benefit appraisals. The lower proportional increase in risk perception among the grade 8 students (for whom the intervention was not tailored and was presented as a general intervention) supports this, although there may be more scope for an increase in risk perception in older adolescents due to their lower baseline risk perception. One of the key challenges in current interventions is that many teachers feel ill-equipped to talk about online safety with their students at an appropriate level (e.g., De Lange & Von Solms, 2012; Eden, Heiman, & Olenik-Shemesh, 2013). Tailoring an intervention to a group not only highlights relevant issues to be addressed in an age-appropriate way, but makes the adolescents themselves key players in the intervention. This also takes some pressure off practitioners, whose role in facilitating the program is to ensure that the three core components of the IMB model are addressed.

Finally, the intervention can be used as a long-term strategy to introduce and then continue to support issues of online safety within the school. Schools can conduct a follow-up survey of adolescent online risk perceptions and behaviors in order to determine areas that require further attention. These evaluations can also serve to inform whole-school policies and procedures, and pinpoint areas for teacher training.

While the IMB model provides a framework for interventions aimed at individuals, it is important that this is only one part of broader efforts. Upon the completion of the interventions, the first author held a feedback session with teachers to discuss the (i) behaviors targeted in the intervention, (ii) theoretical framework used, (iii) activities and discussions relating to the IMB model, and (iv) technology more broadly and the issues adolescents face. This ensured that teachers were aware of what had been conducted, and they were given ideas for how to continue to engage in this area further.

Follow-up work related to this intervention aims to include formal teacher training and longer-term engagement with schools. Although this intervention is relatively easy to implement by practitioners who are already working in this area, training of school staff will be essential in future work. More specifically, this training will include (i) a tutorial on administering the baseline questionnaire, (ii) an overview of the theoretical framework, (iii) guides and resources relating to the intervention and its activities, and (iv) ongoing support and information relating to technology and cyberaggression and cyberbullying to enhance self-efficacy of teachers and practitioners to conduct the interventions. Once this is in place, schools can continue with these efforts through conducting top-up sessions and extending the intervention to other grades. Efforts can then also be put into place to engage parents. Thus, it is envisaged that this intervention will also incorporate the two most immediate environments in adolescents’ lives, namely, the home and school contexts. Formal training and ongoing engagement also means that the intervention can become more detailed and be conducted as a series of workshops, which is likely to hold further benefits.

Although more research is in progress, the pilot study reflects a number of benefits of the intervention (see Box 17.2).

Box 17.2

Benefits of this Intervention for Educators and Practitioners

 Relatively simple implementation
The steps in the intervention involve (i) administering a survey to determine the risk perceptions and behaviors to be targeted in the intervention (sample items are shown in Table 17.1), (ii) designing the intervention with this information in mind, and (iii) facilitating the intervention as a workshop. Although further work is being done in terms of teacher training, those already working in the area will be able to implement the intervention. Further guides and resources for conducting the intervention are also available on our website https://www.buckingham.ac.uk/cyberbullying.

 Adolescents are central to the intervention
The practitioner’s role is to encourage reflection, discussion and to carry out the practical exercises in the workshop, which relate to the three core aspects of the Information-Motivation-Behavioral Skills Model. Practitioners add important points and ideas where required, but adolescents take on a key role in the intervention as coeducators.

 Potential for ongoing work
The intervention can be an excellent way of introducing the issues of cyberaggression, cyberbullying, and other online risks into the school by creating a dialog between adolescents and adults. After the intervention there is potential for ongoing work, keeping the issue of cyberaggression and cyberbullying, and online safety more generally, at the forefront. For example, further surveys can be administered to determine future areas of focus as technology evolves, and further informal discussions over time can also serve to reinforce important points and issues raised.

Overall, the findings are promising given the random allocation of classes in the same school to the control and intervention groups, which reduces the impact of contextual factors on any differences found between groups. However, there are also a number of limitations, which should be acknowledged and which future work in this area can address. Firstly, in order to further explore the generalizability of the IMB model, the intervention is being extended to other groups, including males, those in late adolescence and other schools in South Africa and elsewhere. Secondly, other relevant factors that may have impacted on changes between the control and intervention groups should be explored, such as potential social desirability bias in the intervention group. Longer-term assessment of the intervention’s effectiveness will thus be important, and should also include measures of behavior change directly (in addition to changes in risk perception). Finally, as mentioned, the importance of the whole-school approach to online safety is recognized and longer-term engagement with schools and appropriate staff training will be essential.

Conclusion

This chapter highlights the utility of the IMB model in addressing cyberaggression and cyberbullying through not only informing adolescents about risk behaviors but also providing motivation and behavioral skills to elicit behavior change. The initial evidence lends support to the model as a relevant framework within larger-scale online safety efforts. The study also suggests that tailoring interventions to participants’ own online risk behaviors and perceptions rather than engaging them more generally may be important. The findings also reflect the importance of early prevention efforts prior to and during early adolescence as well as interventions during middle adolescence, which appears to be a critical period in relation to online safety. Further research in this area is underway, and it is important to extend the intervention to other groups to evaluate its efficacy more broadly. The chapter presented key steps that can be implemented by practitioners, utilizing an effective framework for engaging adolescents and facilitating interventions in this area.

References

Alhakami A.S., Slovic P. A psychological study of the inverse relationship between perceived risk and perceived benefit. Risk Analysis. 1994;14(6):1085–1096.

Amico K.R., Toro-Alfonso J., Fisher J.D. An empirical test of the information, motivation and behavioral skills model of antiretroviral therapy adherence. AIDS Care. 2005;17(6):661–673.

Bauman S. Cyberbullying: A virtual menace. In: Paper presented at the National Coalition Against Bullying National Conference, November 2–4, Melbourne, Australia; 2007 Retrieved from http://www.ncab.org.au/Assets/Files/Bauman%20S%20Cyberbullying.pdf.

Bauman S., Toomey R.B., Walker J.L. Associations among bullying, cyberbullying, and suicide in high school students. Journal of Adolescence. 2013;36(2):341–350.

Benthin A., Slovic P., Severson H. A psychometric study of adolescent risk perception. Journal of Adolescence. 1993;16(2):153–168. doi:10.1006/jado.1993.1014.

Boholm A. Comparative studies of risk perception: A review of twenty years of research. Journal of Risk Research. 1998;1(2):135–163. doi:10.1080/136698798377231.

Burton, P. & Leoschut, L. (2012). School Violence in South Africa. Results of the 2012 National School Violence Study. Centre for Justice and Crime Prevention, CJCP. Monograph Series No. 12.

Calandro, E., Stork, C. & Gillwald, A. (2012). Internet going mobile: Internet access and usage in 11 African countries. Research ICT Africa Policy Brief. No. 2.

Casas J.A., Del Rey R., Ortega-Ruiz R. Bullying and cyberbullying: Convergent and divergent predictor variables. Computers in Human Behavior. 2013;29(3):580–587.

Chang, C.-C. (2011). A study of E-waste recycling behavior-adopting from IMB model. Retrieved from http://thesis.lib.ncu.edu.tw/ETD-db/ETD-search/view_etd?URN=984203043.

Chang S.J., Choi S., Kim S.-A., Song M. Intervention strategies based on information-motivation-behavioral skills model for behavior change: A systematic review. Asian Nursing Research. 2014;8(3):172–181.

Chapin J. Adolescents and cyber bullying: The precaution adoption process model. Education and Information Technologies. 2014;1–10.

Cohn L.D., Macfarlane S., Yanez C., Imai W.K. Risk-perception: Differences between adolescents and adults. Health Psychology: Official Journal of the Division of Health Psychology, American Psychological Association. 1995;14(3):217–222.

Corcoran L., Guckin C.M., Prentice G. Cyberbullying or cyber aggression? A review of existing definitions of cyber-based peer-to-peer aggression. Societies. 2015;5(2):245–255.

De Lange M., Von Solms R. The importance of raising e-Safety awareness amongst children in South Africa. In: Proceedings of the 13th Annual Conference on World Wide Web Applications, September 13–16, Johannesburg, South Africa; 2011 Retrieved from: http://www.zaw3.co.za/index.php/ZAWWW/2011/paper/viewFile/423/131.

De Lange M., Von Solms R. An e-Safety educational framework in South Africa. In: Proceedings of the Southern Africa Telecommunications Networks and Applications Conference (SATNAC); 2012.

Dempsey A.G., Sulkowski M.L., Nichols R., Storch E.A. Differences between peer victimization in cyber and physical settings and associated psychosocial adjustment in early adolescence. Psychology in the Schools. 2009;46(10):962–972.

Denissen J.J.A., Neumann L., van Zalk M. How the internet is changing the implementation of traditional research methods, people’s daily lives, and the way in which developmental scientists conduct research. International Journal of Behavioral Development. 2010;34(6):564–575.

DiClemente R.J., Crosby R.A., Kegler M. Emerging theories in health promotion practice and research. John Wiley & Sons; 2009.

Eden S., Heiman T., Olenik-Shemesh D. Teachers’ perceptions, beliefs and concerns about cyberbullying. British Journal of Educational Technology. 2013;44(6):1036–1052.

Eurostat (2015). Being Young in Europe Today—Digital World. Available Online: http://ec.europa.eu/eurostat/statisticsexplained/index.php/Being_young_in_Europe_today_-_digital_world#Main_statistical_findings.

Finucane M.L., Alhakami A., Slovic P., Johnson S.M. The affect heuristic in judgments of risks and benefits. Journal of Behavioral Decision Making. 2000;13(1):1–17. doi:10.1002/(SICI)1099-0771(200001/03)13:1<1::AID-BDM333>3.0.CO;2-S.

Fisher J.D., Fisher W.A. Changing AIDS-risk behavior. Psychological Bulletin. 1992;111(3):455.

Fisher J.D., Fisher W.A., Bryan A.D., Misovich S.J. Information-motivation-behavioral skills model-based HIV risk behavior change intervention for inner-city high school youth. Health Psychology. 2002;21(2):177.

Gardner M., Steinberg L. Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: An experimental study. Developmental Psychology. 2005;41(4):625–635. doi:10.1037/0012-1649.41.4.625.

Gavgani R.M., Poursharifi H., Aliasgarzadeh A. Effectiveness of Information-Motivation-Behavioral Skill (IMB) model in improving self-care behaviors & Hba1c Measure in Adults with Type 2 Diabetes in Iran-Tabriz. Procedia—Social and Behavioral Sciences. 2010;5:1868–1873.

Gerrard M., Gibbons F.X., Benthin A.C., Hessling R.M. A longitudinal study on the reciprocal nature of risk behaviors and cognitions in adolescents: What you do shapes what you think, and vice versa. Health Psychology. 1996;15(5):344–354.

Glasford D.E. Predicting voting behavior of young adults: The importance of information, motivation, and behavioral skills. Journal of Applied Social Psychology. 2008;38(11):2648–2672.

Greene K., Krcmar M., Walters L.H., Rubin D.L., Jerold L., Hale. Targeting adolescent risk-taking behaviors: The contributions of egocentrism and sensation-seeking. Journal of Adolescence. 2000;23(4):439–461. doi:10.1006/jado.2000.0330.

Grigg D.W. Cyber-aggression: Definition and concept of cyberbullying. Journal of Psychologists and Counsellors in Schools. 2010;20(2):143–156.

Heirman W., Walrave M. Predicting adolescent perpetration in cyberbullying: An application of the theory of planned behavior. Psicothema. 2012;24(4):614–620.

Hinduja S., Patchin J.W. Offline consequences of online victimization: School violence and delinquency. Journal of School Violence. 2007;6(3):89–112.

Johnson R.J., McCaul K.D., Klein W.M.P. Risk involvement and risk perception among adolescents and young adults. Journal of Behavioral Medicine. 2002;25(1):67–82.

Kalichman S., Stein J.A., Malow R., Averhart C., Dévieux J., Jennings T.,… Feaster D.J. Predicting protected sexual behavior using the information-motivation-behavior skills model among adolescent substance abusers in court-ordered treatment. Psychology, Health & Medicine. 2002;7(3):327–338. doi:10.1080/13548500220139368.

Kasperson R.E., Renn O., Slovic P., Brown H.S., Emel J., Goble R.,… Ratick S. The social amplification of risk: A conceptual framework. Risk Analysis. 1988;8(2):177–187. doi:10.1111/j.1539-6924.1988.tb01168.x.

Kelly S., Melnyk B.M., Belyea M. Predicting physical activity and fruit and vegetable intake in adolescents: A test of the information, motivation, behavioral skills model. Research in Nursing & Health. 2012;35(2):146–163. doi:10.1002/nur.21462.

Kiene S.M., Fisher W.A., Shuper P.A., Cornman D.H., Christie S., MacDonald S.,… Fisher J.D. Understanding HIV transmission risk behavior among HIV-infected South Africans receiving antiretroviral therapy: An information-motivation-behavioral skills model analysis. Health Psychology. 2013;32(8):860–868.

Kim Y.S., Leventhal B. Bullying and suicide. A review. International Journal of Adolescent Medicine and Health. 2008;20(2):133–154.

Litwiller B.J., Brausch A.M. Cyber bullying and physical bullying in adolescent suicide: The role of violent behavior and substance use. Journal of Youth and Adolescence. 2013;42(5):675–684.

Mayberry L.S., Osborn C.Y. Empirical validation of the information-motivation-behavioral skills model of diabetes medication adherence: A framework for intervention. Diabetes Care. 2014;37(5):1246–1253.

Mayer R.E., ed. The Cambridge handbook of multimedia learning. USA: Cambridge University Press; 2005.

Menesini E., Nocentini A., Palladino B.E., Frisén A., Berne S., Ortega-Ruiz R.,… Smith P.K. Cyberbullying definition among adolescents: A comparison across six European countries. Cyberpsychology, Behavior and Social Networking. 2012;15(9):455–463.

Mishna F., Khoury-Kassabri M., Gadalla T., Daciuk J. Risk factors for involvement in cyber bullying: Victims, bullies and bully–victims. Children and Youth Services Review. 2012;34(1):63–70.

Mitchell K.J., Finkelhor D., Jones L.M., Wolak J. Prevalence and characteristics of youth sexting: A national study. Pediatrics. 2012;129(1):13–20.

Modecki K.L., Minchin J., Harbaugh A.G., Guerra N.G., Runions K.C. Bullying prevalence across contexts: A meta-analysis measuring cyber and traditional bullying. Journal of Adolescent Health. 2014;55(5):602–611.

Odora R.J., Matoti S.N. The nature and prevalence of cyber bullying behaviors among South African high school learners. International Journal of Educational Sciences. 2015;10(3):399–409.

Osborn C.Y., Egede L.E. Validation of an information-motivation-behavioral skills model of diabetes self-care (IMB-DSC). Patient Education and Counseling. 2010;79(1):49–54. doi:10.1016/j.pec.2009.07.016.

Patchin J.W., Hinduja S. Bullies move beyond the schoolyard a preliminary look at cyberbullying. Youth Violence and Juvenile Justice. 2006;4(2):148–169.

Patchin, J.W. & Hinduja, S. (2015). Measuring cyberbullying: Implications for research. Aggression and Violent Behavior. Retrieved from http://www.sciencedirect.com/science/article/pii/S1359178915000750.

Paulsen D.J., Platt M.L., Huettel S.A., Brannon E.M. Decision-making under risk in children, adolescents, and young adults. Frontiers in Psychology. 2011;2:doi:10.3389/fpsyg.2011.00072.

Peltzer K., Preez N.F., Ramlagan S., Anderson J. Antiretroviral treatment adherence among HIV patients in KwaZulu-Natal, South Africa. BMC Public Health. 2010;10(1):111. doi:10.1186/1471-2458-10-111.

Perren S., Corcoran L., Cowie H., Dehue F., Garcia D., Mc Guckin C.,… Völlink T. Tackling cyberbullying: Review of empirical evidence regarding successful responses by students, parents, and schools. International Journal of Conflict and Violence. 2012;6(2):283.

Pillay, C. L. (2012). Behavioral and psychosocial factors associated with cyberbullying. University of Zululand. Unpublished Masters Thesis. Retrieved from http://196.21.83.35/handle/10530/1225.

Popovac M., Mwaba K., Roman N.V. Smoking behavior, risk perception and attitudes toward anti-smoking legislation among a sample of South African students: Physical activity and health. African Journal for Physical Health Education, Recreation and Dance. 2011;17(3):473–480.

Seacat J.D., Northrup D. An information–motivation–behavioral skills assessment of curbside recycling behavior. Journal of Environmental Psychology. 2010;30(4):393–401.

Sjoberg. Factors in risk perception. Risk Analysis: An Official Publication of the Society for Risk Analysis. 2000;20(1):1–11.

Slonje R., Smith P.K. Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology. 2008;49(2):147–154.

Slovic P., Peters E. Risk perception and affect. Current Directions in Psychological Science. 2006;15(6):322–325. doi:10.1111/j.1467-8721.2006.00461.x.

Snakenborg J., Van Acker R., Gable R.A. Cyberbullying: Prevention and intervention to protect our children and youth. Preventing School Failure: Alternative Education for Children and Youth. 2011;55(2):88–95.

Steinberg L. A social neuroscience perspective on adolescent risk-taking. Developmental Review. 2008;28(1):78–106. doi:10.1016/j.dr.2007.08.002.

Steinberg L. A dual systems model of adolescent risk-taking. Developmental Psychobiology. 2010;52(3):216–224. doi:10.1002/dev.20445.

Suls J., Wallston K.A. Social psychological foundations of health and illness. John Wiley & Sons; 2008.

Tokunaga R.S. Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior. 2010;26(3):277–287. doi:10.1016/j.chb.2009.11.014.

Turow, J., & Nir, L. (2000). The internet and the family: The view from parents, the view from kids. The Annenberg Public Policy Center of the University of Pennsylvania. Retrieved from http://www.annenbergpublicpolicycenter.org/downloads/information_and_society/20000516_internet_and_family/20000516_internet_and_family_report.pdf.

Van Geel M., Vedder P., Tanilon J. Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: A meta-analysis. JAMA Pediatrics. 2014;168(5):435–442.

Willard N.E. Cyberbullying and cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Research Press; 2007.

Wolburg J. The “risky business” of binge drinking among college students: Using risk models for PSAs and anti-drinking campaigns. Journal of Advertising. 2001;30(4):24–39.

Ybarra M.L., Alexander C., Mitchell K.J. Depressive symptomatology, youth Internet use, and online interactions: A national survey. Journal of Adolescent Health. 2005;36(1):9–18.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
44.220.184.63