{"title":"儿童后期传统欺凌和网络欺凌中的旁观者行为:概况、发展路径及其与心理社会适应的关系","authors":"Xin Tian , E. Scott Huebner , Lili Tian","doi":"10.1016/j.chb.2025.108791","DOIUrl":null,"url":null,"abstract":"<div><div>With the rapid advancement of digital technology, cyberbullying has emerged as a significant challenge for children worldwide, forming a complex ecosystem with traditional bullying. Although bystanders constitute the majority in bullying incidents and critically influence their dynamics, prior research has largely examined them in isolation, overlooking integrated patterns and longitudinal transitions. This study utilized a three-wave longitudinal design and random intercept latent transition analysis (RI-LTA) to identify profiles and developmental paths of bystander behavior across traditional and cyberbullying contexts during late childhood and explored their associations with psychosocial adjustment. Four profiles were identified: consistent pro-bullying, consistent low defending, cyber pro-bullying dominant, and consistent defending. The consistent defending profile showed the highest stability and was associated with favorable psychosocial adjustment, whereas the consistent pro-bullying profile was associated with the poorest psychosocial adjustment. The cyber pro-bullying dominant profile exhibited the lowest stability and the highest likelihood of transitioning into the consistent defending profile. Surprisingly, this profile reported fewer internalizing problems, more prosocial behavior, and higher well-being. Moreover, individuals transitioning from maladaptive bystander profiles to the consistent defending profile was associated with improved psychosocial adjustment, whereas those shifting in the opposite direction exhibited declines. These findings highlight late childhood as a pivotal period for bystander-focused interventions and offer empirical support for integrated bullying prevention strategies.</div></div>","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":"173 ","pages":"Article 108791"},"PeriodicalIF":8.9000,"publicationDate":"2025-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Bystander behavior in traditional and cyberbullying in late childhood: Profiles, developmental paths, and their associations with psychosocial adjustment\",\"authors\":\"Xin Tian , E. Scott Huebner , Lili Tian\",\"doi\":\"10.1016/j.chb.2025.108791\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the rapid advancement of digital technology, cyberbullying has emerged as a significant challenge for children worldwide, forming a complex ecosystem with traditional bullying. Although bystanders constitute the majority in bullying incidents and critically influence their dynamics, prior research has largely examined them in isolation, overlooking integrated patterns and longitudinal transitions. This study utilized a three-wave longitudinal design and random intercept latent transition analysis (RI-LTA) to identify profiles and developmental paths of bystander behavior across traditional and cyberbullying contexts during late childhood and explored their associations with psychosocial adjustment. Four profiles were identified: consistent pro-bullying, consistent low defending, cyber pro-bullying dominant, and consistent defending. The consistent defending profile showed the highest stability and was associated with favorable psychosocial adjustment, whereas the consistent pro-bullying profile was associated with the poorest psychosocial adjustment. The cyber pro-bullying dominant profile exhibited the lowest stability and the highest likelihood of transitioning into the consistent defending profile. Surprisingly, this profile reported fewer internalizing problems, more prosocial behavior, and higher well-being. Moreover, individuals transitioning from maladaptive bystander profiles to the consistent defending profile was associated with improved psychosocial adjustment, whereas those shifting in the opposite direction exhibited declines. These findings highlight late childhood as a pivotal period for bystander-focused interventions and offer empirical support for integrated bullying prevention strategies.</div></div>\",\"PeriodicalId\":48471,\"journal\":{\"name\":\"Computers in Human Behavior\",\"volume\":\"173 \",\"pages\":\"Article 108791\"},\"PeriodicalIF\":8.9000,\"publicationDate\":\"2025-09-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers in Human Behavior\",\"FirstCategoryId\":\"102\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0747563225002389\",\"RegionNum\":1,\"RegionCategory\":\"心理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"PSYCHOLOGY, EXPERIMENTAL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers in Human Behavior","FirstCategoryId":"102","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0747563225002389","RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PSYCHOLOGY, EXPERIMENTAL","Score":null,"Total":0}
Bystander behavior in traditional and cyberbullying in late childhood: Profiles, developmental paths, and their associations with psychosocial adjustment
With the rapid advancement of digital technology, cyberbullying has emerged as a significant challenge for children worldwide, forming a complex ecosystem with traditional bullying. Although bystanders constitute the majority in bullying incidents and critically influence their dynamics, prior research has largely examined them in isolation, overlooking integrated patterns and longitudinal transitions. This study utilized a three-wave longitudinal design and random intercept latent transition analysis (RI-LTA) to identify profiles and developmental paths of bystander behavior across traditional and cyberbullying contexts during late childhood and explored their associations with psychosocial adjustment. Four profiles were identified: consistent pro-bullying, consistent low defending, cyber pro-bullying dominant, and consistent defending. The consistent defending profile showed the highest stability and was associated with favorable psychosocial adjustment, whereas the consistent pro-bullying profile was associated with the poorest psychosocial adjustment. The cyber pro-bullying dominant profile exhibited the lowest stability and the highest likelihood of transitioning into the consistent defending profile. Surprisingly, this profile reported fewer internalizing problems, more prosocial behavior, and higher well-being. Moreover, individuals transitioning from maladaptive bystander profiles to the consistent defending profile was associated with improved psychosocial adjustment, whereas those shifting in the opposite direction exhibited declines. These findings highlight late childhood as a pivotal period for bystander-focused interventions and offer empirical support for integrated bullying prevention strategies.
期刊介绍:
Computers in Human Behavior is a scholarly journal that explores the psychological aspects of computer use. It covers original theoretical works, research reports, literature reviews, and software and book reviews. The journal examines both the use of computers in psychology, psychiatry, and related fields, and the psychological impact of computer use on individuals, groups, and society. Articles discuss topics such as professional practice, training, research, human development, learning, cognition, personality, and social interactions. It focuses on human interactions with computers, considering the computer as a medium through which human behaviors are shaped and expressed. Professionals interested in the psychological aspects of computer use will find this journal valuable, even with limited knowledge of computers.