Problematic mobile phone use and cyberbullying perpetration in adolescents

Woosik Shin, Hee Woong Kim

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

The phenomenon of problematic mobile phone use has become increasingly common among adolescents during the lockdowns mandated by the COVID-19 pandemic. However, research is still scarce on the impact of such use on delinquent cyberspace conduct (i.e. cyberbullying). This study applies the theoretical framework of general strain theory to examine how problematic mobile phone use affects the perpetration of cyberbullying. The results of this empirical examination of longitudinal survey data obtained from 2,161 adolescents in South Korea reveal that problematic mobile phone use is positively associated with engagement in cyberbullying. It is a type of strain that induces negative emotional states and results in the perpetration of cyberbullying. Furthermore, this study investigates the moderating roles of both traditional bullying experiences (i.e. traditional bullying and victimisation) in the association between problematic mobile phone use and the perpetration of cyberbullying. We found traditional bullying perpetration positively moderates the effects of problematic mobile phone use on cyberbullying. On the other hand, we found the moderating effect of traditional bullying victimisation of adolescents was insignificant.

Original languageEnglish
Pages (from-to)424-443
Number of pages20
JournalBehaviour and Information Technology
Volume42
Issue number4
DOIs
Publication statusPublished - 2023

Bibliographical note

Publisher Copyright:
© 2022 Informa UK Limited, trading as Taylor & Francis Group.

All Science Journal Classification (ASJC) codes

  • Developmental and Educational Psychology
  • Arts and Humanities (miscellaneous)
  • General Social Sciences
  • Human-Computer Interaction

Fingerprint

Dive into the research topics of 'Problematic mobile phone use and cyberbullying perpetration in adolescents'. Together they form a unique fingerprint.

Cite this