Professional Documents
Culture Documents
A Mixed Methods Investigation of Cyberbullying Behaviours, Early Maladaptive Schemas, Coping Styles, and Psychological Outcomes in Emerging Adults
A Mixed Methods Investigation of Cyberbullying Behaviours, Early Maladaptive Schemas, Coping Styles, and Psychological Outcomes in Emerging Adults
Alexandra Alipan
BSocSc., PGDipPsych.
August 2020
i
Abstract
ii
an overarching category where a targeted person perceives an intent to
harm) versus a victim of cyberbullying (i.e., a subgroup of targets that not
only perceive an intent to harm but also experience harm). As such, the first
study extended on previous studies by integrating these perspectives and
proposing a multifaceted definition of cyberbullying that includes the
perspectives of perpetrators, targets (targets-only and victims), and
bystanders. The findings from this study enabled a more valid definition
from the victim’s perspective to be used in Study 3 and for targets-only to
be differentiated from, and compared to, victims when testing the theoretical
model in Study 3.
In Study 2, new schema coping scales were developed based on
stages proposed by leading authors in the area of scale development
(DeVellis, 2012; Gregory, 2011). Following the development of the new
scales, data were collected from 102 adults aged between 18 and 68 years
old. An exploratory factor analysis (EFA) was conducted and found five
unidimensional constructs, namely, surrender, avoidance, retaliation and
pleasing (as measures of overcompensation), and adaptive schema coping.
These schema coping scales were also found to be reliable and valid, and
thus suitable measures for inclusion in the structural models tested in Study
3.
Lastly, in Study 3, 271 participants aged 18 to 25 years completed a
self-report questionnaire. One hundred and ninety-four (72%) emerging
adults indicated that they had been a target of cyberbullying behaviours,
where 127 participants (47% of the sample) were identified as targets-only
and 67 participants (25% of the sample) were identified as victims. Coded
open-ended responses of participants’ cyberbullying experiences provided
further support for the findings from Study 1 where most of the targets
perceived there to be an intention to harm, whilst the majority of victims
perceived an intention to harm as well as experienced actual harm. In
addition, victims were found to score higher on the majority of EMSs (at the
iii
domain and subscale level) compared to targets-only and non-targets. All
EMSs, with the exception of the entitlement schema, were positively
associated with psychological distress for all three groups. Moreover,
structural equation modelling (SEM) was performed to test the model based
on Young et al.’s (2003) schema theory. The findings indicated that higher
levels of schema activation were associated with higher psychological
distress levels for targets-only and victims, though the coping styles of
targets-only in relation to schema activation have a different effect on
psychological distress compared with that of victims. Whereas certain
schema coping styles buffered the effect of several schema domains on
psychological distress for targets-only, pleasing had an exacerbating effect
on the relationship between the disconnection and rejection domain and
psychological distress for victims. These differences were attributed to the
level of schema activation where victims reported higher schema activation
levels compared to targets-only, though it should be noted the structure of
coping styles differed between these two groups. The findings provide some
support for Young et al.’s (2003) schema theory where it appears schema
activation and schema coping style affect the level of psychological distress
experienced by targets (targets-only and victims) of cyberbullying.
The current research makes numerous theoretical, methodological
and practical contributions. Firstly, a theoretical contribution was the
development of a new multifaceted definition of cyberbullying that included
the perspectives of perpetrators, targets, victims, and bystanders. This
definition of cyberbullying provides a more comprehensive and valid
understanding of how different people perceive and/or experience
cyberbullying, as well as highlights that there are differences between being
a target of cyberbullying and being a victim. Another unique theoretical
contribution of this thesis was that it was one of first studies to utilise
schema theory (Young et al., 2003) in a cyberbullying context. This
research found empirical support for the schema model and also extended
iv
on the model and previous research by being the first study to include all
five schema domains, all 18 schemas, all maladaptive coping styles, and a
new adaptive coping style.
This research has methodological implications for researchers. It is
imperative that mixed methods research designs where the qualitative phase
informs the quantitative phase are conducted to ensure that the definition
and measures used in research are appropriate for the target population. For
researchers using Young et al.’s (2003) schema theory, this thesis provides
insight into some of the challenges when using pre-existing schema
questionnaires (e.g., YSQ, YRAI, YCI) in a research context. Furthermore,
this thesis developed alternative measures of schema coping which means
that researchers now have a more parsimonious way of measuring the
coping styles without jeopardising reliability and validity. Lastly, given this
research found that multiple schema domains were activated and related to
psychological distress, all five schema domains or 18 EMSs should be
examined within cyberbullying research moving forward.
An important practical implication of this thesis is that it can help
psychologists become more aware of specific EMSs and how certain coping
styles (e.g., pleasing) may exacerbate the effects of EMSs for victims of
cyberbullying. As such, other treatments like schema therapy (ST) may be a
suitable intervention for some individuals. Finally, the findings from this
thesis also have implications for emerging adults, website administrators,
and both education and employment contexts that involve technology-
mediated communication. It is important for stakeholders to be aware that
cyberbullying is not a simple construct and that it can be defined differently
depending on whether the person is a perpetrator, target, victim, or
bystander.
v
Acknowledgements
vi
incredible support system to me throughout the PhD process. Thank you for
all of the memories and making me cry with laugher and happiness on so
many occasions. #phdlyf. I also want to thank the DT&T lab members
where I was also able to meet and feel supported by so many incredible
postgraduate students.
I also feel very grateful for the support I received from all of my
other friends and family throughout my PhD. You’ve all been there every
step of the way, continuously motivating me and providing a listening ear to
the challenges I faced along the way.
To parents, Maria and Tom; sister, Natasha; brother-in law, Adrian;
and grandparents, baba Cia and dedo Angelo and baba Vasa and dedo Chris
- you are the people who showed me what hard work and resilience looks
like. Thank you for all of your sacrifices, unwavering support, and
unconditional love throughout this process.
Lastly, to my soon to be husband Reuben, I am extremely lucky to
have you by my side throughout this whole process. I would not have been
able to complete this work without you cheering me on from the sidelines,
your patience, positive attitude, belief in my abilities, and reminders on why
I wanted to undertake a PhD related to cyberbullying when I needed it most.
vii
Declaration
i. contains no material which has been accepted for the aware to the
Signature: …………………………………………………………………
viii
Table of Contents
Abstract .......................................................................................................................................... ii
Acknowledgements ................................................................................................................... vi
ix
Chapter Summary ................................................................................................................ 43
Method .......................................................................................................................................... 93
Participants ........................................................................................................................... 93
Materials ................................................................................................................................. 93
Procedure ............................................................................................................................... 94
x
Recruitment procedures. .............................................................................................................. 94
Data collection procedures. ......................................................................................................... 95
Ethical considerations. .................................................................................................................. 95
Data Analysis ......................................................................................................................... 97
Thematic analysis. ........................................................................................................................... 97
Validation strategies. ...................................................................................................................... 97
xi
Conduct of the study ........................................................................................................ 148
xii
Aim of the Study ................................................................................................................ 192
Conduct of Studies ............................................................................................................ 192
xiii
Moderation Results for the Non-Target Group ....................................................... 257
Disconnection and rejection (Domain 1) ........................................................................... 259
Impaired autonomy and performance (Domain 2) ....................................................... 259
Impaired limited (Domain 3) .................................................................................................. 260
Other-directedness (Domain 4). ............................................................................................ 262
Overvigilance and inhibition (Domain 5). .......................................................................... 263
Summary of the Results .................................................................................................. 263
Appendix D: Study 1 Interview Guide and Focus Group Questions ...................... 345
xiv
Appendix G: Study 2 Consent Information Statement (CIS) .................................... 348
xv
List of Tables
xvi
Table 15. Moderation Model Results for the Non-Target Group. ........... 257
Table 16. Summary of the Main Findings ............................................... 264
Table 17. One-Factor Congeneric Models for the 18 Early Maladaptive
Schemas for the Victim Group. .................................................................. 404
Table 18. One-Factor Congeneric Models for the 18 Early Maladaptive
Schemas for the Target-Only Group. ......................................................... 408
Table 19. One-Factor Congeneric Models for the 18 Early Maladaptive
Schemas for the Non-Target Group. .......................................................... 411
xvii
List of Figures
xviii
Figure 15. Moderation model of Disconnection and Rejection x Surrender
on psychological distress for the target-only group.. ................................. 246
Figure 16. The relationship between the latent variables of disconnection
and rejection (Domain 1) and psychological distress at high and low levels
of surrender for the target-only group. ....................................................... 246
Figure 17. Moderation model of Domain 1 x Pleasing on psychological
distress for the target-only group. .............................................................. 247
Figure 18. The relationship between the latent variables of disconnection
and rejection (Domain 1) and psychological distress at high and low levels
of pleasing for the target-only group. ......................................................... 248
Figure 19. Moderation model of Disconnection and Rejection x Avoidance
on psychological distress for the target-only group.. ................................. 249
Figure 20. The relationship between the latent variables of disconnection
and rejection (Domain 1) and psychological distress at high and low levels
of avoidance for the target-only group. ...................................................... 249
Figure 21. Moderation model of Impaired Autonomy and Performance x
Avoidance on psychological distress for the target-only group.. ............... 250
Figure 22. The relationship between the latent variables of impaired
autonomy and performance (Domain 2) and psychological distress at high
and low levels of avoidance for the target-only group. .............................. 251
Figure 23. Moderation model of Self-Sacrifice x Avoidance on
psychological distress for the target-only group.. ...................................... 253
Figure 24. The relationship between the latent variables of self-sacrifice and
psychological distress at high and low levels of avoidance for the target-
only group. ................................................................................................. 254
Figure 25. Moderation model of Overvigilance and Inhibition x Avoidance
on psychological distress for the target-only group.. ................................. 255
Figure 26. The relationship between the latent variables of overvigilance
and inhibition (Domain 5) and psychological distress at high and low levels
of avoidance for the target-only group. ...................................................... 256
xix
Figure 27. Moderation model of Insufficient Self-Control x Avoidance on
psychological distress for the non-target group.. ....................................... 261
Figure 28. The relationship between the latent variables of insufficient self-
control and psychological distress at high and low levels of avoidance for
the non-target group. .................................................................................. 262
xx
List of Abbreviations
Abbreviation Explanation
ANOVA Analysis of Variance
Brief Symptom Inventory (Derogatis & Melisaratos,
BSI
1983)
CFA Confirmatory Factor Analysis
CFI Comparative Fit Index
Depression Anxiety Stress Scale (Lovibond &
DASS
Lovibond, 1995)
EFA Exploratory Factor Analysis
EMS(s) Early Maladaptive Schema
FA Factor Analysis
Florence Cyberbullying Cybervictimisation Scale
FCBCVS
(Palladino et al., 2015)
GSI General Severity Index
IM Instant Messenger
MAR Missing at Random
MCAR Missing Completely at Random
MI Multiple Indices
ML Maximum Likelihood
MR Multiple Regression
MVA Missing Values Analysis
NMAR Not Missing at Random
OUA Open Universities Australia
PA Path Analysis
REP Research Experience Program
RMSEA Root-Mean-Square Error of Approximation
SCL-90-R Symptoms Checklist-90-Revised (Derogatis, 1983)
xxi
SCSI Schema Coping Styles Inventory
SEM Structural Equation Modelling
SNS Social Network Site
SRMR Standardized Root-Mean-Square Residual
ST Schema Therapy
Swinburne University of Technology Human Research
SUHESC
Ethics Subcommittee
TLI Tucker-Lewis Index
TMSC Transactional Model of Stress Coping
WLSMV Weighted Least Squares Mean Variance
WRMR Weighted Root Mean Square Residual
YCI Young Compensatory Inventory (Young, 1998a)
Young-Rygh Avoidance Inventory (Young & Rygh,
YRAI
1994)
YSQ Young Schema Questionnaire
xxii
1
CHAPTER 1
INTRODUCTION AND THESIS OUTLINE
Overview
The overall aim of this thesis was to address the gap in the
cyberbullying literature as to why some victims of cyberbullying experience
more severe adverse reactions than others in response to cyberbullying
behaviours. To address this overall research objective, this thesis employed
a multiphase mixed methods research design which contained two phases of
research. In the first phase of the research, two studies (Study 1 and Study
2) were conducted concurrently. The aim of Study 1 was to gain a better
understanding of how emerging adults define cyberbullying and examples
of cyberbullying behaviours during this age group. The aim of Study 2 was
to develop new measures of how individuals specifically cope with early
maladaptive schema (EMSs) and test the psychometric properties (i.e.,
factor structure, reliability, and validity) of these scales. The findings from
the first phase (Study 1 and Study 2) were then integrated into the second
phase (Study 3) and informed: (1) the selection and adaption of a
cyberbullying definition and list of cyberbullying behaviours that were
consistent with emerging adults’ views; (2) the decision to conduct analyses
separately for targets-only and victims; and (3) a measure of schema coping
styles to be integrated into the structural model. To this end, the aim of
Study 3 was to answer the overall research objective by applying Young,
Klosko, and Weishaar’s (2003) schema theory to the context of
cyberbullying. This study had three specific aims. The first aim of this study
was to determine the prevalence of cyberbullying during emerging
adulthood. The second aim was to examine the relationships between EMSs
(at the domain and subscale level) and psychological distress for victims,
targets-only, and non-targets. Lastly, the third aim of this study was to
2
important to note that Young et al.’s schema coping styles only include
responses considered to be maladaptive, as they were designed to assess
individuals in clinical settings. Inclusion of adaptive schema coping styles
and responses would be valuable since there is limited research on EMSs
among non-clinical populations. This would also allow comparisons of
maladaptive versus adaptive coping style usage for individuals with
activation of particular schemas. To address the gaps in schema theory, a
schema coping style inventory that specifically assesses surrender,
avoidance, overcompensation, and adaptive coping was developed and
validated in a sample of non-clinical adults.
The purpose of the second study was to develop and test the
psychometric properties (i.e., factor structure, reliability, and validity) of an
instrument designed to measure the specific schema coping styles proposed
by Young et al. (2003) so this could be implemented into the structural
model tested in the final study (Study 3). One hundred and two adults aged
18 years and over participated in this study by completing a self-report
questionnaire. The second study was guided by the following three research
questions:
6
Significance of Thesis
An important contribution of this thesis was the development of a
new multifaceted definition of cyberbullying that included the perspectives
of perpetrators, targets, victims, and bystanders. This was informed by focus
group data where emerging adults perceived current definitions of
cyberbullying to be too simplistic and instead dependent on the point of
view adopted. Past definitions and measures of cyberbullying have intended
to outline and capture an objective account of the phenomenon, though have
7
Chapter Summary
In this chapter an overview of the thesis, focus of the thesis, purpose
of the thesis, significance of the thesis, scope of the thesis, and structure of
the thesis were presented. The following chapter presents a review of the
literature on cyberbullying among emerging adulthood.
13
CHAPTER 2
LITERATURE REVIEW OF CYBERBULLYING AMONG
EMERGING ADULTHOOD
Introduction
With the rapid growth in the development, accessibility, usage, and
functionality of digital technologies over the past decade, an extension of
traditional bullying has emerged, termed cyberbullying. Digital technologies
have many benefits and advantages, such as providing new opportunities to
meet and instantaneously communicate with people from all over the world.
However, there is also potential for individuals who use such technologies
to experience cyberbullying victimisation (Beran & Li, 2008; Foody,
Samara, & Carlbring, 2015; Lee, 2017). Cyberbullying victimisation has
been linked to various and severe negative psychological outcomes such as
anxiety, depression, and in extreme cases suicide (Mason, 2008). As a
result, cyberbullying has been subjected to an increasing level of scrutiny by
the media, governments and policy makers, workplaces, universities, and
schools on how to combat it. The negative consequences of cyberbullying
victimisation have also led to a dramatic increase in cyberbullying research
over the past 15 years, with most studies focusing on the definition,
measurement, prevalence, and correlates of cyberbullying (Cassidy,
Faucher, & Jackson, 2018). Yet in spite of a growing body of research and
urgency to develop evidence-based programs and interventions that reduce
cyberbullying and its effects on victims, there is still no unequivocal
definition of what constitutes cyberbullying (Bauman, Underwood, & Card,
2012; Grigg, 2010; Hemphill & Heerde, 2014; Langos, 2012; Menesini et
al., 2012; Olweus & Limber, 2018; Patchin & Hinduja, 2010; Vandebosch
& Van Cleemput, 2008).
14
intended to harm another person, are not necessarily repetitive, and are
performed in an equal power relationship (Vandebosch & Van Cleemput,
2008). However, if cyberteasing does become repetitive, offensive or
demeaning, and there are clear signs that the target is distressed, then this
can qualify as cyberbullying (Langos, 2012; Olweus, 1994). In addition to
cyberteasing, cyberaggression can be classified after a once-off attack where
there was an intent to harm another person via technology (Livingstone &
Smith, 2014). However, it should be noted that researchers (and particularly
Western researchers) have often focused on the act of the perpetrator and
not the effect on the victim when making these distinctions.
Despite the inclusion of repetition in the definition of cyberbullying
being widely accepted, there has been increasing debate about its
operationalisation and importance as a key characteristic when applied to a
cyber context (Slonje & Smith, 2008). This is due to the permanence of
information posted or sent through different technological mediums, the fact
that this information can be widely disseminated, and that there can be
differences between the perpetrator and victim in terms of perceptions of
how many incidences occur and the potential consequences (Dooley et al.,
2009; Langos, 2012; Menesini & Nocentini, 2009). Therefore, the repetitive
behaviour that defines traditional bullying (i.e., more than once or twice)
may need to be re-conceptualised for cyberbullying. In particular, behaviour
that directly targets a person multiple times (e.g., multiple nasty emails or
text messages) clearly addresses the criterion of repetition (Langos, 2012).
On the other hand, a single nasty text message between the perpetrator and
target could be aggressive and intended to harm but not cyberbullying, even
though a victim may read and re-read these comments and be repeatedly
affected. Also, in regard to indirect or public cyberbullying, it is more
difficult to establish whether certain behaviours meet this key element of
repetition (Dooley et al., 2009; Dredge, Gleeson, & de la Piedad Garcia,
2014; Langos, 2012). A single episode of traditional aggression that would
19
participants stated that the behaviour only happened on one occasion, the
authors note that this may fit into the notion of repetition. In more recent
qualitative studies, both adolescent and emerging adult stakeholders have
also reported that a once-off act could also be classified as cyberbullying as:
(1) the victim may be able to repeatedly view the act, (2) the single
behaviour may be serious enough to result in significant and ongoing harm
for the victim, and (3) the single behaviour may become repeated by being
spread by others (Moreno, Suthamjariya, & Selkie, 2018; Tran, Nguyen,
Weiss, Nguyen, & Nguyen, 2018). Therefore, the use of repetition as a
criterion for traditional bullying may have a broader meaning in
cyberbullying, whereby a single perpetrator act may also count as
cyberbullying in some cases. Though as Moreno et al. (2018) pointed out,
this is yet to be incorporated into current definitions of cyberbullying.
The notion of repetition has also been debated among participants in
the traditional bullying literature. For instance, Guerin and Hennessy (2002)
conducted interviews examining students’ definitions of bullying and
whether they were in line with those used by researchers. It was found that
just over 50% of participants (N = 166) believed that behaviour did not have
to be repeated over time and that those that occur once or twice could
constitute as bullying. Fourteen per cent of participants reported that a
possible reason may be that an individual can still become upset even if a
behaviour occurred only once. However, it should be noted that around 28%
believed the behaviours must occur with some frequency and 8% felt that
other factors, such as the type of behaviour, were more essential in defining
bullying.
Many of the measures used to assess cyberbullying have employed
restrictions for the repetition component (e.g., “three times a month” or
more), whereby it is often assumed that the more frequent the behaviour the
more distress experienced. However, not all acts online are considered equal
in terms of victim impact. Participants have indicated in previous studies
21
that picture/video bullying have a higher impact factor (more severe and
humiliating) than other types of cyberbullying and traditional bullying
(Menesini, Nocentini, & Calussi, 2011; Naruskov, Luik, Nocentini, &
Menesini, 2012; Nocentini et al., 2010; Slonje & Smith, 2008; Smith et al.
2008). The fear of not knowing who has seen the picture/video post but
being aware that a large audience could potentially see it are common
reasons given by participants as to why these acts are considered as more
serious than other online behaviours (Naruskov et al., 2012). It has also
been argued that ongoing feelings of stress or fear about an incident may be
considered repetitive and bullying even though the act occurred only once
(Tattum, 1997). This stress and fear may have a lasting effect on the target
where he or she ruminates on previous experiences as well as anticipates
future attacks (Kowalski, Limber, & Agatston, 2008; Whittaker &
Kowalski, 2015). As such, a once-off attack could be regarded as
cyberbullying under certain circumstances.
Taken together, current definitions of cyberbullying have generally
focused on the targeting behaviour of the perpetrator when examining
cyberbullying. There has been little focus on the perceptions of the act and
the effect on a victim, despite qualitative research of participants’ views
reporting that certain behaviours online do not need to be “repetitive” to be
regarded as cyberbullying due to the potential harm inflicted on a victim
(Moreno et al., 2018; Tran et al., 2018). This suggests that there might be
victims that are being perpetrated against but whose victimisation does not
meet the current definitional criterion of repetition (Dredge et al., 2014). It
is argued here that it is important to incorporate the perceptions of victims
into definitions of cyberbullying because how a victim perceives the
behaviour and feels may be different to the person who perpetrates the act.
Repetition is not the only criterion used to distinguish between what
is and what is not cyberbullying. Intent to harm and power imbalance are
also considered key elements that help differentiate this behaviour from
22
1
The author does not intend to place labels on people but is following the
same conventions used in cyberbullying research.
25
Measurement of Cyberbullying
Due to the problems surrounding the definition of cyberbullying,
researchers have also experienced difficulties operationalising the term and
thus providing accurate estimates of the prevalence of cyberbullying
(Vandebosch & Van Cleemput, 2008; Whittaker & Kowalski, 2015).
Reported rates of cyberbullying victimisation vary from 4.5% to 85% across
different age groups (e.g., Crosslin & Crosslin, 2014; Doane, Boothe,
Pearson, & Kelley, 2016; Elipe, Mora-Merchán, Ortega-Ruiz, & Casas,
2015; Finn, 2004; Gibb & Devereux, 2016; Kowalski et al., 2012; Lindsay
28
& Krysik, 2012; MacDonald & Roberts-Pittman, 2010; Patchin & Hinduja,
2010; Schenk & Fremouw, 2012; Smith et al., 2008; Vandebosch & Van
Cleemput, 2009).
Despite researchers’ attempts to measure cyberbullying in an
objective manner, it is usually measured using two types of subjective self-
report questionnaires: (1) a single-item scale about one’s involvement in
cyberbullying which tends to be presented after a general definition of
cyberbullying has been presented (e.g., “Have you been a victim of
cyberbullying”), or (2) a multi-item scale that captures a series of
behaviours considered to be cyberbullying. Single-item scales have been
considered by some researchers as a reliable and economic measure for
generating a general prevalence rate of cyberbullying by categorising
individuals who identify as a “victim” or “bully” (or both) into different
qualitative groupings (Solberg & Olweus, 2003). On the other hand, other
researchers argue that multi-item behavioural scales are more valid and
reliable measures for estimating prevalence compared to single-item
measures as it is unlikely that a single item can fully represent a complex
theoretical construct (Menesini & Nocentini, 2009). Multi-item
cyberbullying behaviour scales often do not include the terms
cyberbullying, victim, or bully. The purpose is to avoid individual
perceptions, stigma, or bias associated with using these labels and in turn
yield more accurate responses (Bowling, 2005; Felix et al., 2011).
Moreover, not all individuals may be aware that social exclusion or other
behaviours can be considered cyberbullying. Therefore, multi-item scales
that include a wide range of behaviours representative of the phenomenon
can be useful when individuals have limited or a biased understanding of
cyberbullying (Patchin & Hinduja, 2015). In fact, past studies have found
that when single-item scales are used fewer incidents of cyberbullying tend
to be reported compared to multi-item scales that list specific behaviours
associated with cyberbullying (Vandebosch & Van Cleemput, 2009). It has
29
been suggested that this may indicate that participants are hesitant to label
themselves as bullies or as victims or unaware of the specific behaviours
that comprise cyberbullying (Dehue, 2013; Menesini & Nocentini, 2009).
However, another possible explanation is that these two types of
scales may actually be associated with different prevalence rates due to
capturing slightly different phenomena. For instance, single-item scales
have been considered a more subjective measure, while multi-item scales an
objective measure (Dehue, 2013). Yet, responses to the single-item scale, in
which cyberbullying victimisation is experienced by around 5 to 10% of
people could reflect more serious and problematic cyberbullying
experiences, whereas acts experienced by 50 to 60% of people may capture
many other interactions such as mutual conflict or friendly banter in
addition to cyberbullying (see Dehue, 2013). Therefore, multi-item scales of
cyberbullying behaviours can take away the context of what happened as
they often neglect intention to harm and power imbalance in behavioural
items which can inflate or lead to an overestimation of the prevalence rates
(Felix et al., 2011; Smith et al., 2002). It is important that researchers are
aware of the limitations associated with single-item and multi-item
cyberbullying scales and depending on which scale is used in a study will
depend on the researchers’ aims. However, rather than being used in
isolation, the use of both types of measures of cyberbullying in a single
study may be the best way to overcome the weaknesses associated with
these self-report measures, where multi-item scales can offer more specific
data on the type of behaviours experienced by individuals who self-identify
as victims of cyberbullying on a single-item scale.
Measures of cyberbullying have varied not only in terms of the
number of items included but whether a definition is provided, the term
“cyberbullying” is used and the list of behaviours specified (e.g., sent nasty
text message, prank calls, posted embarrassing photo or video etc). These
questionnaires have also differed in asking when the incident took place,
30
with time frames varying from in the “last week” to “have you ever been
cyberbullied” (e.g., Arıcak, 2009; Del Rey, Elipe, & Ortega-Ruiz, 2012;
Dilmac, 2009; Machmutow, Perren, Sticca, & Alsaker, 2012; Slonje &
Smith, 2008). The underlying assumption of these self-report questionnaires
is that victims of cyberbullying who report being victimised more frequently
are also cyberbullied more severely with many studies employing cut-offs
of “three times a month” or more as qualifiers of cyberbullying
victimisation (Menesini & Nocentini, 2009; Menesini et al., 2011).
However, it is plausible that one severe attack has more of a negative impact
than multiple mild attacks (Menesini et al., 2011; Schenk & Fremouw,
2012). This highlights the complex nature of operationalising the repetition
component in measures of cyberbullying.
Another limitation of self-report questionnaires is that they tend to
use closed-ended response formats such as dichotomous choices and Likert
scales, which means that respondents are constrained to response options
that are provided by researchers without being able to elaborate on their
experiences, views, or interpretations (Li, 2007; Menesini et al., 2011;
Smith, 2019). A multi-method approach such as including an open-ended
response in questionnaires of cyberbullying, which gives participants the
option to elaborate on their victimisation experiences, may help researchers
develop a more comprehensive understanding of a person’s involvement or
experience of cyberbullying and reduce some of the limitations associated
self-report measures of cyberbullying.
In addition, because technology is growing rapidly and changing the
nature of the cyberbullying phenomenon, self-report questionnaires such as
multi-item scales may need to be updated regularly with new technologies
and behaviours. Many of the multi-item cyberbullying behaviour
questionnaires have also been normed on adolescents (Menesini et al., 2011;
Palladino, Nocentini, & Menesini, 2015), whereas it is possible that the
behaviours experienced and language used by other age groups, differs from
31
secondary school student to emerging adult can bring on anxiety with the
perceived demands that this developmental stage brings. For instance,
individuals may receive far less individual support, such as in the case of
university students where they are expected to be more autonomous and
have less interactions with teachers. Furthermore, emerging adulthood is
where individuals start to become independent in relation to financial and
residential status and use the Internet to access government information and
services (my.gov, Centrelink, tax, visas, and passports etc.). Emerging
adults are also dealing with increased performance pressure and searching
for romantic partners and social peers who may influence one’s day-to-day
life and future goals (Arnett, 2000; Barry, Madsen, Nelson, Carroll, &
Badger, 2009).
Emerging adulthood is also where texting and social media use is a
common part of social communication, and these media are no longer being
supervised by parents or teachers. Emerging adults are known to be heavy
users of mobile phones, computers, and other networked-mobile devices as
part of their personal, academic, and professional lives (Agatston, Kowalski,
& Limber, 2007; Arıcak, 2009; Boulton, Lloyd, Down, & Marx, 2012;
Campbell, Spears, Slee, Butler, & Kift, 2012; Cassidy et al., 2018; Lee,
2017). In Australia, approximately 90% of 18 to 29 year olds have reported
accessing the Internet daily, with 75% using SNSs at least once a day. Most
emerging adults indicated using Facebook (99%), followed by Snapchat
(60%), and Instagram (58%). In regard to Facebook usage, emerging adults
have reported checking Facebook around 45 times per week (Sensis, 2016).
These high rates of technology usage can be explained by the way
individuals communicate in the workplace and at university (Hemphill &
Heerde, 2014; Oblad, 2019). For instance, emerging adults may include
university students who require computers and the Internet to complete their
studies (i.e. research, student email, online portals, and submissions), or
employees in the workforce who are required to use a computer as part of
33
Patchin, 2007; Juvonen & Gross, 2008; Kowalski & Limber, 2013; Mishna,
Saini, & Solomon, 2009; Patchin & Hinduja, 2010). For instance, Tennant
et al. (2015) reported that experiencing either cyberbullying victimisation
alone or in combination with traditional victimisation, may be a better
predictor of depression than experiencing traditional victimisation alone.
However, it is important to consider the frequency and/or the type of attack
(e.g., photo posted publicly, text message, impersonation) as this may
influence the psychological impact on the victim.
When distinguishing between the different types of cyberbullying,
some researchers have found that incidences involving pictures or video
clips were considered worse by the victims (Bauman & Newman, 2013;
Menesini et al., 2011; Smith et al., 2008). In particular, Bauman and
Newman (2013) found that sharing of naked pictures was perceived to be
the most distressing type of cyberbullying in a sample of 17 to 25-year-old
university students. The authors suggest that this may be attributed to
betrayal of trust and humiliation, especially if the photo is publicly
accessible. Similarly, Menesini et al. (2011) found that the posting of
embarrassing pictures was the worst form of cyberbullying for Italian
adolescents. Smith et al. (2008) also reported that photo/video clip bullying
was perceived as having a greater negative impact compared to traditional
forms of bullying, while other behaviours as having equal impact to
traditional bullying (e.g., text message bullying), or less of an impact (e.g.,
email bullying). Although email bullying was considered as less harmful,
this information was obtained from an adolescent sample. Emails may not
be used as much by children and adolescents in comparison to populations
that are older, who may use this form of electronic communication for
university and work. Therefore, the impact of certain types of cyberbullying
may vary across age groups.
Other factors that can escalate the severity of the impact on victims
can be attributed to the ubiquity of different technologies where those that
37
engage in cyberbullying are not restrained by time or space and can use
multiple media platforms (e.g., photos, videos) and mediums (e.g., email,
SNSs, websites) to target their victims (Li, 2007; Willard, 2007).
Technological permanency of material and constant availability of victims
can also exacerbate the negative impact on cyberbullying victims. This is
because there is potential for the act to reach larger audiences as some types
of cyberbullying (e.g., text, images and videos) can be downloaded, shared,
forwarded, and saved by many people to look at and talk about them as
much as they like (Dredge et al., 2014; Langos, 2012; Slonje & Smith,
2008; Smith et al., 2008). This means that for the victim of these behaviours
the experience can be re-lived over and over again as they too can revisit the
act, potentially contributing to a prolonged sense of victimisation. It can
also leave victims with a feeling of uncertainty as to whether the humiliating
or mean text or images are still circulating amongst other technology users
or will be reposted in the future (McGrath, 2009).
Furthermore, unlike traditional bullying, perpetrators can remain
anonymous or experiment with different identities. This anonymity can lead
to disinhibition, whereby people tend to say or do hurtful acts online that
they would not usually do in person (Willard, 2005). This may be due to
feeling protected by their anonymity in cyberspace and that there will be no
negative consequences to their actions (Willard, 2005). For instance,
Raskaukas and Stoltz (2007) stated that cyberbullies were physically and
emotionally removed from their victims and therefore did not experience the
impact of their actions (i.e., disinhibition effect). This suggested that normal
behavioural restraints can become lost or disregarded when communicating
through technology. It can also mean that there is a lack of immediate verbal
and non-verbal feedback from both parties. Without this feedback empathy
is lowered and communication can be ambiguous and wrongly interpreted
(Vandebosch & Van Cleemput, 2008). A lack of feedback can also lead to
38
friends and bystanders being less aware of victimisation and as a result, less
likely to provide support or to intervene (Holfeld, 2014).
Despite a great deal of research highlighting the negative
psychological and emotional impacts associated with cyberbullying
victimisation, it is important to note that researchers have also reported that
some victims are not bothered by cyberbullying (e.g., Ortega et al., 2012;
Topcu, Erdur-Barker, & Capa-Aydin, 2008). For example, in a study by
Topcu et al. (2008) the most frequent reaction (34.6%) of victims was that
cyberbullying did not bother them as they believed it had been a joke and
24.4% said they felt nothing towards the event. Similarly, Patchin and
Hinduja (2006) reported that 44% of victims felt unaffected by their
cyberbullying experiences. Ortega et al. (2012) clustered “non affect
victims” and found that 21.9% reported not being bothered by mobile phone
bullying and 31.5% reported not feeling bothered by Internet bullying.
Qualitative data in a study conducted by Crosslin and Crosslin (2014) also
captured the views and responses of individuals who have not been
negatively affected by cyberbullying victimisation. For example, two
participants who were unaffected by a cyberbullying event said “they
couldn’t care less about what was said.” Other participants also not
impacted by a cyberbullying event mentioned that they viewed the situation
in a positive light or chose to rise above it. However, it is unclear whether
these individuals themselves consider the incident to be cyberbullying as
they were not harmed by it, or whether they consider to it be cyberbullying
but do not identify as a victim. Hence, greater focus on victims’ perceptions
of cyberbullying and the effect this may or may not have on them is needed.
There is no question that cyberbullying is a serious and growing
problem among emerging adults and can influence a victim’s psychological
adjustment. However, the reasons for the disparity amongst studies
regarding the impact of cyberbullying victimisation remain unclear. To
understand the variation in reactions in response to cyberbullying, how
39
victims cope with cyberbullying has been examined to explain why some
individuals suffer from severe adverse reactions whilst others are resilient in
the face of cyberbullying (Raskauskas & Huynh, 2015).
These coping styles are general approaches to coping with stress that
have been frequently applied to the cyberbullying literature, which is based
on the assumption that how people cope with stress in general is consistent
with how they cope with cyberbullying behaviours (e.g., Machmutow,
Perren, Sticca, & Alsaker, 2012; Völlink et al., 2013). Previous research
examining the two coping styles has found that individuals who use
problem-focused coping in response to stress tend to have more positive and
adaptive outcomes. In contrast, individuals using emotion-focused or
avoidance strategies are likely to experience poorer adjustment and
maladaptive outcomes (Carver et al., 1989; Lewis & Frydenberg, 2002).
Furthermore, past research in cyberbullying has revealed that individuals
who report using more emotion-focused coping to deal with stress also
employ these strategies to deal with cyberbullying (Machmutow et al.,
2012; Völlink et al., 2013). Similarly, cyberbullying victims who use
emotional-focused coping strategies such as self-blame or emotional
expression tend to report low wellbeing (Lodge & Frydenberg, 2007),
depressive feelings, and health complaints (Machmutow et al., 2012). This
coping style is often used when the situation is perceived as less changeable
(Lazarus & Folkman, 1984; Völlink et al., 2013). However, a common
limitation of these studies is that the focus has been on coping usage, where
other underlying processes or mechanisms that may influence the selection
of particular coping responses and the level of psychological distress
experienced have often been neglected.
Technological solutions, also known as cyber-specific coping
strategies, have been viewed as conceptually distinct from general stress and
coping strategies such as those associated with Lazarus and Folkman’s
(1984) TMSC. These cyber-specific coping strategies differ in terms of their
focus on the use of technological tools or solutions provided by
technological providers (e.g., social media, email, Internet, apps) to prevent
41
college adjustment (Cecero et al., 2008), and personality disorders (Jovev &
Jackson, 2004; Nordahl, Holthe, & Haugum, 2005). Worthy of mention is
that EMSs have been shown to be prevalent among emerging adults in the
general population, and it is this developmental period when the effects of
EMSs become most noticeable and dysfunctional (Cámara & Calvete, 2012;
Walburg, Paez, Henin, & Leroux, 2008). Surprisingly though, only one
other study has focused on EMSs in a cyberbullying context, where EMSs
were found to be a consequence of adolescent cyberbullying victimisation
and also lead to the development and exacerbation of depression symptoms
(Calvete, Orue, & Gámez-Guadix, 2016). As such, it will be argued in this
thesis that EMSs provide one mechanism for explaining the more severe
outcomes associated with cyberbullying that effect some emerging adult
victims of cyberbullying. Since research on cyberbullying has been
conducted largely in the absence of theoretical foundations (Kokkinos,
Baltzidis, & Xynogala, 2016), EMSs in the context of Young et al.’s (2003)
schema theory will be examined in the next chapter and its applications to a
cyberbullying context explained.
Chapter Summary
Currently there is a lack of consensus on a definition of
cyberbullying. Most of the research on cyberbullying has nevertheless
utilised adapted versions of the traditional bullying definition, in which
intent to harm, repetition, and power imbalance are key components. There
are, however, some important differences when applying these components
from traditional bullying to cyberbullying. Current definitions of
cyberbullying have also primarily been based on the perspectives of
researchers’ views where the key components of such definitions assume a
perpetrator’s perspective. However, past research has reported that lay
definitions of cyberbullying often differ from researchers’ definitions.
44
CHAPTER 3
LITERATURE REVIEW ON CYBERBULLYING, EARLY
MALADAPTIVE SCHEMAS, COPING STYLES, AND
PSYCHOLOGICAL OUTCOMES AMONG EMERGING
ADULTHOOD
Introduction
Chapter 3 extends on Chapter 2 by attempting to further explain why
some victims of cyberbullying experience more severe negative reactions
than others. Coping styles examined in the cyberbullying literature, namely,
general coping styles (e.g., problem-focused and emotion-focused coping)
and cyber-specific technological coping solutions, were presented in
Chapter 2 where previous research has proposed that how targets cope with
cyberbullying behaviours is one factor that can account for variations in
psychological distress. However, there has been limited research that has
examined individual differences such as early maladaptive schemas
(EMSs), which may better explain the more severe adverse reactions
experienced by some victims of cyberbullying behaviours. This chapter will
discuss the concept of EMSs associated with Young et al.’s (2003) schema
theory and highlight how this concept applies to cyberbullying. In
particular, this chapter will begin by describing the origins, definition, and
measurement of EMSs, including conceptual and empirical work conducted
on the structure of EMSs. The relationships between EMSs and
psychological distress will be discussed. This chapter will also introduce
three coping styles commonly used in response to EMS activation, which is
in contrast to the coping styles presented in Chapter 2 that focus on coping
with cyberbullying behaviours. Lastly, the structure of Young et al.’s (2003)
theoretical model will be outlined and its relevance in a cyberbullying
context highlighted. This chapter will conclude by proposing a model that
46
have a powerful influence over cognition and affect and lead to various
types of psychological distress (Beck, 1976). Notably, Aaron T. Beck
(1976) implicated cognitive schemas as a fundamental element in his theory
of emotional disorders. He views schemas as the psychological lens through
which an individual perceives his or her world and can explain why
different people interpret the same situation in different ways. Despite
cognitive schemas being central in the earliest writings of cognitive therapy,
the cognitive techniques and therapeutic approaches that later emerged
tended to address surface level cognitions, namely, automatic negative
thoughts (“I am…”) and conditional beliefs (“if…then” statements). In a
similar way, the psychotherapy protocols that developed tended to be short
term. Relatively less attention was paid to the deeper underlying processes
of schemas, which heavily influence negative automatic thoughts and
conditional beliefs (Young et al., 2003).
A number of authors have returned recently to Beck’s (1976)
original notion of cognitive schemas when examining psychopathology. For
instance, Jeffery Young, the pioneer of schema therapy (ST), built on
Beck’s model by focusing on a subset of common EMSs and on coping
styles and behaviours which develop as a response to these maladaptive
schemas (Young et al., 2003). Like Beck, Young postulated that EMSs are
pervasive, negative, cognitive patterns surrounding one’s core self-concept
and underlie psychopathology. EMSs have been heavily studied in clinical
populations where these schemas become exaggerated and extreme, though
are indeed present in non-clinical populations (Young et al., 2003).
Surprisingly there is a limited amount of research on the effects of EMSs in
victims of cyberbullying, where these schemas can potentially explain some
of the variation in psychological distress. As mentioned, there is also only
one study to date that has examined EMSs in adolescent cyberbullying
victims (Calvete et al., 2016) but none in this area among the emerging
48
despite this, there has been an absence of research that has examined EMSs
associated with Young et al.’s (2003) schema theory in the context of
cyberbullying. Therefore, this research will be the first to investigate the
presence of EMSs in a sample of emerging adult victims of cyberbullying.
that one is inept and will fail in all areas such as school and career, and is
inadequate compared to peers).
Domain 3: Impaired limits. Impaired limits, the third domain,
relates to a lack of self-discipline and incapability of controlling impulses
and setting limits or goals. This domain includes the entitlement/
grandiosity schema (a belief that they are better than others, are demanding
and dominating, feel entitled to special privileges and do not have to follow
rules, tend to have little respect for others and lack empathy) and insufficient
self-control/ self-discipline schema (become frustrated easily and lack self-
control, making it difficult to achieve personal goals or repress excessive
expression of emotions or impulses). These schemas tend to develop in
early family environments that are characterised by overindulgence,
permissiveness, and lack supervision and discipline.
Domain 4: Other-directedness. The fourth domain, other-
directedness, refers to excessive attention on trying to gain approval and
meeting the needs and desires of others at the expense of one’s own needs.
Schemas in this domain tend to develop when early childhood conditions
are based on conditional positive regard, whereby the child has to suppress
their thoughts, feelings, and own needs in order to gain love, acceptance,
and approval. The schemas in this domain are subjugation schema (one
feels forced to suppress their desires or emotional responses in order to
avoid aversive outcomes such as abuse or abandonment); self-sacrifice
schema (voluntary meeting the needs of others to gain self-esteem, avoid
guilt, or to maintain a connection); and approval-seeking/ recognition-
seeking schema (excessive preoccupation of appearance in order to gain
approval or recognition from others in the hope to gain a secure sense of
self).
Domain 5: Over-vigilance and inhibition. Lastly, individuals with
schemas in the fifth domain, over-vigilance and inhibition, usually strive to
meet rigid internal standards at the expense of playfulness, self-expression,
54
and relaxation. Schemas in this domain typically develop when early family
conditions are cold, punitive, very controlling and demanding, and lack self-
expression. The schemas in this domain include negativity/ pessimism
schema (a belief that negative things will happen to them, with little focus
on the positive aspects and tend to always worry, complain, be indecisive,
and hypervigilant); emotional inhibition schema (suppress their actions,
feelings, and communication to prevent being criticised or losing control of
their impulses and often present as flat, constricted, withdrawn, or cold);
punitiveness schema (the thought that they should be punished for making
mistakes and have trouble forgiving themselves and others for mistakes);
and unrelenting standards/ hypercriticalness schema (high internal
standards to avoid disapproval but results in feelings of constant pressure
and hypercriticalness towards oneself or others). Young et al. (2003) note
that for the last schema to be considered an EMS it must cause significant
impairment in a person’s health such as self-esteem, relationships, and
experience of pleasure.
Empirically derived models. There have been different versions of
the YSQ developed over the past 20 years, including longer ones that range
from 123 items (YSQ-L1; Young 1990) to 205 items (YSQ-L2; Young &
Brown, 1994) measuring 15 to 16 schemas respectively (a schema of social
undesirability was added to the later version), which can be grouped into
five schema domains.
In a first attempt to investigate the factor structure of the EMSs
proposed by Young (1990), Schmidt, Joiner, Young, and Telch (1995)
examined the YSQ-L2 in undergraduate student and clinical samples. The
student sample (N = 1129) was separated into two groups. Using a Principal
Components Analysis (PCA) the first student sample (n = 575) identified 15
of the hypothesised 16 schemas, with the social undesirability schema (i.e.,
perception of being unwanted or isolated due to being outwardly
unattractive to others) not emerging as a factor. Items intended to measure
55
in a reliable and valid way. According to Young et al. (2003), EMSs are
present in both clinical and non-clinical populations and play a key role in
the development and maintenance of many psychological disorders. For
instance, EMSs have been linked to depression (Calvete et al., 2016; Harris
& Curtin, 2002; Welburn et al., 2002), various anxiety disorders (Pinto-
Gouveia et al., 2006; Welburn et al., 2002), college adjustment (Cecero et
al., 2008), and personality disorders (Jovev & Jackson, 2004; Nordahl,
Holthe, & Haugum, 2005).
Various past studies examining the relationship between EMSs and
psychological distress have employed the Symptoms Checklist-90-Revised
[SCL-90-R]; Derogatis, 1983) or its shorter form Brief Symptom Inventory
(BSI-53; Derogatis & Melisaratos, 1983), in which there has been consistent
support of the factorial structure of General Severity Index (GSI) being an
optimal measure of overall psychological distress (Pereda, Forns, & Peró,
2007; Piersma, Boes, & Reaume, 1994). For instance, Glaser, Campbell,
Calhoun, Bates, and Petrocelli (2002) used SCL-90-R to assess
psychological distress as measured by GSI. All of the EMS subscales with
the exception of the entitlement schema were significantly correlated with
psychological distress. In particular, EMS subscales were found to predict
54% of the total variance in GSI scores. Similarly, Thimm (2017) found that
in a sample of university students that all EMSs and schema domains were
significantly related to psychological distress (GSI measured by the BSI-
53), though entitlement had a very weak significant correlation with
psychological distress (.16). Moreover, Kriston, Schäfer, Jacob, Härter, and
Hölze (2013) found that all 18 EMS subscales were significantly associated
with psychological distress (GSI as measured by the SCL-90-R), in which
correlations ranged from .28 (entitlement) to .65 (abandonment and
negativity/ pessimism).
Furthermore, in a sample of university students with an average age
of 19.2 years, Schmidt et al. (1995) found that vulnerability to harm and
60
ambiguous and have to be inferred. The more ambiguous the scenario, the
more a person draws on his or her cognitive schemas and biases, such as
past experiences and memories to fill in this missing information (Bergin &
Bergin, 2018). Therefore, EMSs are especially relevant to the phenomenon
of cyberbullying, where EMSs may become activated and relied on when
interpreting online behaviours and communication with others.
Only one study to date has examined the role of EMSs in the
association between cyberbullying victimisation and depressive symptoms,
in a sample of Spanish adolescents (Calvete et al., 2016). The results
revealed that cyberbullying victimisation at Time 1 predicted a worsening of
body image and defectiveness/ shame and mistrust/ abuse schemas at Time
2, and those changes in schemas predicted in turn an increase in depressive
symptoms from Time 2 to Time 3. Although this study brings attention to
the relationships between EMSs and psychological distress in victims of
cyberbullying, it should be noted that Calvete et al. (2016) only included
two of the 18 EMSs (defectiveness/ shame and mistrust/ abuse schemas).
Furthermore, the strength of the correlations for these two EMSs were only
weak to moderately correlated with distress, which could be due to the
sample being adolescents where it is said that these schemas are still
developing. Thus, to add to the body of knowledge of EMSs in a
cyberbullying context, this thesis will examine relationships between all 18
EMSs as well as the five schema domains and psychological distress among
emerging adult victims of cyberbullying.
Despite numerous past studies reporting an association between
EMSs and psychological distress, how an individual copes with an activated
EMS is said to either exacerbate or weaken the negative effects experienced.
The coping styles used in response to schema activation is considered an
important element in schema theory, yet few studies have explored the
impact certain coping styles have on this relationship.
62
adaptive coping behaviours. This is especially the case since previous scales
have been designed for a therapeutic context for individuals suffering from
personality or ongoing psychological disorders, and not for individuals who
may experience stress but are not clinically distressed. Thus, for some
individuals the experience of schema activation may be less overwhelming
and the person can respond to the activation of the schema in a healthier
manner (Young et al., 2003). Indeed, the inclusion of an adaptive scale may
also allow comparisons of maladaptive versus adaptive coping style usage
for individuals with activation of particular schemas. To this end, Study 2
will extend on Young et al.’s (2003) maladaptive schema coping styles of
avoidance, overcompensation, and surrender by also developing and
validating an adaptive schema coping measure.
In spite of the measurement issues regarding the schema coping
constructs, out of a small amount of past studies that have included the
schema coping styles proposed by Young et al. (2003), or at least other
similar coping styles, most have examined coping as a mediator of the
relationship between EMSs and psychological distress (Carlucci,
D’Ambrosio, Innamorati, Saggino, & Balsamo, 2018; Dozois, Martin, &
Faulkner, 2013; Orue et al., 2014; Rezaei, Ghazanfari, & Rezaee, 2016).
However, mediation assumes that the activated EMS determines which
coping styles or responses are enacted, and the use of those responses
accounts for the relation between EMSs and psychological distress. While
EMS activation may influence the use of maladaptive schema coping,
schemas do not cause an individual to cope in one of those three ways.
Moreover, these coping styles may not be fully responsible for the
relationship between schemas and psychological distress. Instead, Young et
al. suggested that a person may use different coping styles in response to the
same or different activated schemas and in different situations. In fact,
Young et al. hypothesised that EMS activation can be powerful and directly
related to psychological distress. However, the authors also assert that these
66
maladaptive coping responses may elaborate the core beliefs and exacerbate
the negative effects experienced. Therefore, the maladaptive coping styles
proposed by Young et al. may be viewed as moderator variables in the
relationships between EMS activation and psychological distress. To date,
there is limited, if any, research examining the three coping styles as
moderators of this relationship, despite being hypothesised to exacerbate
this relationship. It is beneficial to examine Young et al.’s theoretical model
to determine whether using higher levels or types of coping styles with a
particular schema may predict poorer outcomes than when using lower
levels of the same coping style or a different coping style. To this end, the
third study in this thesis will test Young et al.’s theoretical model, where it
will be the first to include measures of maladaptive (i.e., surrender,
avoidance, and overcompensation) and adaptive schema coping styles and
examine the moderating effect of these constructs.
Psychological
EMS Activation
Distress
Schema Coping
Style
Chapter Summary
There has been limited research within cyberbullying that has
examined individual differences such as EMS, that may explain variations
in responses, and in particular the more severe reactions experienced by
some victims of cyberbullying. The concept of EMSs associated with
Young et al.’s (2003) schema theory provides a new approach to
cyberbullying research by focusing on the psychological lens through which
an individual perceives themselves and their world. This may explain why
different people might interpret and react to being cyberbullied in different
ways and with differing levels of psychological distress.
Young et al. (2003) have identified 18 EMSs, which the YSQ is
designed to measure. These 18 schemas have conceptually been grouped
into five schema domains reflecting distinct themes related to unmet core
emotional needs. The psychometric properties of the YSQ have been
extensively analysed with research documenting consistent evidence for
EMS at the individual level, but there is mixed evidence regarding the
higher order structure of the schema domains. Despite this, there is
considerable overlap between the five higher order schema domains
proposed by Young et al. and empirically derived higher order models,
which have resulted in similar findings when both factor structures were
used in the same study to test the relationships between variables.
EMSs have been shown to be consistently associated with
psychological distress and to play a key role in the development and
maintenance of many psychological disorders. One study to date has
examined EMSs in the context of cyberbullying, in which defectiveness/
shame and mistrust/ abuse schemas were found to exacerbate depressive
symptoms over time in adolescent cyberbullying victims (Calvete et al.,
2016). However, this study is limited in that it only included two of the 18
EMSs, in which schemas within other domains also appear to be relevant to
cyberbullying victimisation.
72
Moreover, a major limitation of the research in this area has been the
lack of emphasis on coping styles associated with maladaptive schemas,
despite the fact that how well one copes with maladaptive schemas
determines to what extent he or she experiences psychological symptoms.
This may be due to a number of limitations associated with these
therapeutically-driven scales when applied to a research context. It is also
important to note that Young et al.’s (2003) schema coping styles only
include responses considered to be maladaptive, as they were designed to
assess individuals in clinical settings. Inclusion of an adaptive schema
coping style and responses would be valuable since there is limited research
on EMSs among non-clinical populations. This would also allow
comparisons of maladaptive versus adaptive coping style usage for
individuals with activation of particular schemas. To address the gaps in
schema theory, a schema coping style inventory which specifically
measures surrender, avoidance, overcompensation, and adaptive schema
coping will be developed and validated in a sample of non-clinical adults.
In spite of the issues with the measurement of schema coping, a
handful of studies have examined relationships between EMSs, certain
coping styles (not necessarily those proposed by Young et al., 2003), and
psychological distress. However, in these studies coping was modelled as a
mediator variable between EMSs and psychological distress. Rather, an
alternative model where schema coping styles are represented as moderator
variables was proposed as based on Young et al.’s (2003) schema theory
there is a direct relationship between EMSs and psychological distress but
certain schema coping styles can either exacerbate or weaken this
relationship. Moreover, while individuals may rely on certain coping styles
more than others, EMSs do not cause a person to cope in a certain way.
Instead, different coping styles can be used in response to the same or
different EMSs. As such, Young et al.’s theoretical model was presented
and its relevance outlined in the context of cyberbullying. The current
73
chapter ended by proposing a model that will examine the effects of EMSs
on psychological distress and whether coping moderates the relationships
between EMSs and psychological distress.
The next chapter will provide information about the methodology of
the thesis, including the thesis paradigm or worldview, mixed methods
framework adopted, an overview of each of the three studies, and how the
first two studies inform the third.
74
CHAPTER 4
METHODOLOGY OF THE THESIS
Introduction
This chapter provides an outline of the worldview and the
overarching methodological approach for the thesis to explore cyberbullying
victimisation, early maladaptive schemas (EMSs), schema coping styles,
and psychological distress in emerging adults. In particular, an overview of
pragmatism, how it informs the current research, and the advantages of
using pragmatism as a worldview are discussed. The selection and
definition of a multiphase mixed methods research design follows, where
the importance of this approach and the data collection methods used in this
design are described. More specific detail of the aims, method, procedure,
and design of each study are provided in Chapters 5 through to 7.
Thesis Worldview
A worldview is a philosophical term used to describe beliefs and
assumptions about knowledge that underlies a study and the methodological
approach to be adopted (e.g., quantitative, qualitative, or mixed methods;
Creswell, 2014). A number of different worldviews (also known as
paradigms, epistemologies, and ontologies) are available, however three
have typically been used to inform mixed methods research, namely, post-
positivism, constructivism, and pragmatism (Creswell, 2014). Post-
positivism is often associated with quantitative approaches and contends
that reality is singular and therefore seeks to identify knowledge or truth
based on objective measurement and observations, cause and effect,
interrelations between variables, and testing of theories (Doyle, Brady, &
Byrne, 2009). Researchers of this worldview tend to adopt a “top” down
approach, such as selecting a theory, generating hypotheses, collecting and
75
Methodological Approach
Mixed methods research has become increasingly popular over the
past few decades and is now formally considered its own stand-alone
research methodology (Hanson, Creswell, Plano Clark, Petska, & Creswell,
2005). Mixed methods research involves “The collection or analysis of both
quantitative and qualitative data in a single or multi-phase study in which
77
the data are collected concurrently and/or sequentially, are given a priority,
and involve the integration of the data at one or more stages in the process
of research” (Creswell, Plano Clark, Gutmann, & Hanson, 2003, p. 212). A
strength of mixed methods studies can be attributed to its freedom to draw
on the strengths of qualitative and quantitative research methods and
minimise the limitations of both approaches (Johnson & Onwuegbuzie,
2004).
Some of the known strengths associated with quantitative research is
that theoretical models can be empirically tested and validated, the results
are relatively independent of the researcher, relationships between variables
can be tested, and it is useful for studying larger numbers of people
(Johnson & Onwuegbuzie, 2004). A limitation of this approach is that
researchers’ definitions, items measuring a construct, and response
categories used may not reflect participants’ understandings or experiences
(Johnson & Onwuegbuzie, 2004). This specifically applies to current issues
regarding the cyberbullying definition and limited research on emerging
adults’ perceptions and experiences of cyberbullying and associated
behaviours.
In comparison, a number of strengths associated with qualitative
research include that data are based on a participant’s own perceptions and
experiences in relation to complex phenomena which can be described in
depth. The researcher can also identify contextual factors that may impact
on the phenomenon of interest, and it can also be useful in developing,
adapting or informing the appropriate measures to be used in subsequent
phases (Johnson & Onwuegbuzie, 2004). However, qualitative data
collection and analysis are often time consuming, and findings produced
may not be generalisable to the wider population and are unique to a small
number of participants. The findings can also be influenced by the
researcher’s personal biases (Johnson & Onwuegbuzie, 2004), though there
are reliability and validity strategies that can be employed to minimise this
78
concern (see Chapter 5 for the reliability and validity strategies used in
Study 1). Combining both approaches into a single or multiphase study,
provides a more complete understanding of the research problem and can
enrich the results in ways that only utilising one approach does not allow
(Creswell, 2014; Tashakkori & Teddlie, 2003). In particular, the results
from one method can help develop or inform the other method such as in the
case of developing better measurement instruments, or can be used to
complement, elaborate, and expand on results from the other method
(Hanson et al., 2005).
When combing both quantitative and qualitative data into a study,
there are a number of steps involved including: (1) the time orientation, that
is, whether the data from the two methods is collected concurrently (i.e.,
data from both methods collected at the same time) or sequentially (i.e., one
method collected first, followed by the other); (2) whether methods are
given equal or unequal priority (i.e., one method may be given more weight
than the other, such as a primarily quantitative study); and (3) the point of
interface, which relates to how the data collected from one stage of the
research is integrated with and help informs the next stage (Hanson et al.,
2005; Johnson & Onwuegbuzie, 2004; Leech & Onweugbuzie, 2009). Each
of these aspects, central to mixed methods research will be discussed in
more depth below in relation to the current study.
Time orientation. There have been several typologies of mixed
methods research designs developed which are usually embedded in two
different time orientations, namely concurrent and sequential (Creswell,
2014; Hanson et al., 2005; Leech & Onweugbuzie, 2009). Concurrent mixed
methods designs (also known as convergent parallel mixed methods design)
are when two studies are conducted at the same time with the purpose of
comparing and contrasting the findings of both studies. On the other hand,
sequential designs refer to studies that occur one after the other (Creswell,
2014; Hanson et al., 2005; Leech & Onweugbuzie, 2009). Two primary
79
Develop, select,
adapt
instruments for
use in Study 3
(theoretical
model)
Quan data Quan data Quan results
collection analysis
(scale
development)
Figure 3. Multiphase mixed methods model applied to the current study (Creswell & Plano Clark, 2007)
83
behaviours used in Study 3. As this scale was developed some years prior
and normed on an adolescent sample it is important that scales measuring
this phenomenon are frequently reviewed and updated due to advancements
in technology, and that the behaviours included and language of items are
suited to emerging adults’ views and experiences of cyberbullying
behaviours.
Phase 1: Study 2. Also during the first phase of the research, a
second study was conducted to develop and pilot test a new measure of
schema coping styles to be included in the theoretical model tested in Study
3. This study tested the factor structure and reliability and validity of each of
the scales. An alternative measure of avoidance and overcompensation was
developed and tested as the pre-existing inventories of the 40-item Young-
Rygh Avoidance Inventory (YRAI) and 48-item Young Compensatory
Inventory (YCI) were therapeutically derived for testing in clinical settings
and at face value many of the items in these scales do not appear to be
measuring the construct or are measuring different dimensions. Past studies
assessing the reliability and validity of these scales have needed to remove
many problematic items from the analyses and found different factor
structures (Karaosmanoğlu et al., 2013; Luck et al., 2005; Spranger et al.,
2001). In the current study, in addition to a new measure of avoidance,
overcompensation schema coping was separated into retaliation and
pleasing to assess two dimensions of this construct informed by previous
literature and theory (Adler, 2002; Bäckman & Dixon, 1992; Hjertass, 2006;
Young et al., 2003).
This study is also unique as a measure of surrender and adaptive
schema coping were developed. To date, no measure of surrender has been
developed despite being another main coping style (i.e., in addition to
avoidance and overcompensation coping) proposed by Young et al. (2003).
Furthermore, the specific coping styles proposed by Young et al. have
focused on coping styles considered to be maladaptive as they are
86
considered to perpetuate the schemas and they have excluded coping styles
that may lead to more adaptive outcomes, even though individuals may have
learnt to cope with his or her schemas through certain life experiences. The
results from the pilot study allowed for a theoretical model based on Young
et al.’s (2003) schema theory to be tested in the third study (Phase 2).
Pilot studies are recommended when developing new instruments as
this can act as a “trial run” before implementing the new scale into the main
study (van Teijlingen & Hundley, 2001). Some of the advantages of a pilot
study when developing a new measure are to test the adequacy of the
research instrument such as item difficulty, item discrimination, internal
consistency, and parameter estimation. Also, any issues can be addressed
with these before implementation into the theoretical model, which was
tested in Study 3 (Phase 2; Christensen, Johnson, & Turner, 2015; Johanson
& Brooks, 2010). Pilot studies are also useful to determine whether the
research protocol is realistic and workable such as the likely success of the
proposed recruitment approaches, the resources that are needed (e.g.,
finance and staff), the sampling frame and return rates, and competency
using the proposed data analysis techniques (Johanson & Brooks, 2010; van
Teijlingen & Hundley, 2001). For example, in this study, a license was
required to use the Young Schema Questionnaire-Short Form (YSQ-SF3),
Young and Rygh Avoidance Inventory (YRAI), and the Young
Compensatory Questionnaire (YCI) from the Schema Therapy Institute.
There were also restrictions surrounding the electronic use of these
questionnaires, which meant the study protocol was adapted from an
electronic survey to a lab-based study where participants could complete the
questionnaire on the university campus or via a mail questionnaire method.
The mail questionnaire method involved sending a questionnaire to
participants through the mail and asking them to return the completed
questionnaire in the reply-paid envelope provided by the university
(Christensen, Johnson, & Turner, 2015). The procedure used in the pilot
87
study provided an indication of the likely sample size and response rate for
Study 3. Research suggests that when using the mailing method the return
rates are typically 20 to 30% for the initial mailing (Nederhof, 1985).
Therefore, based on the demands of participation and the postage turn-
around time, a longer recruitment phase was required to obtain the desired
sample size and this was particularly true in Study 3 since the sample
characteristics were more stringent (i.e., emerging adults between 18-25
years of age as well as victims of cyberbullying). As such, this pilot study
provided the researcher with experience in the procedure and data analysis
as well as time to correct any problems, which helped streamline the process
and maintain constancy throughout the main study (van Teijlingen &
Hundley, 2001).
Figure 4 presents the first phase of this multiphase mixed methods
research design in more depth. In particular, it outlines the two studies in
this stage and the steps involved in each. Each of the methods and steps
involved are discussed in more detail in Chapter 5 to 7.
Phase 2: Study 3. This phase began with an instrument development
stage. This stage integrated the findings from the two studies in Phase 1 into
Study 3 (Phase 2). As previously mentioned, the findings from Study 1
(qualitative study using focus groups) informed the cyberbullying definition
implemented and whether the behaviours or language used in the FCBCVS
needed to be adapted to be in line with emerging adults’ views, opinions,
and perceptions. In addition, revisions to the schema coping style measures
developed in Study 2 were made based on the pilot study exploratory factor
analysis (EFA) results. Once the quantitative self-report questionnaires used
in this final study had been compiled and briefly piloted, the survey was
administered to emerging adults between 18 to 25 years old in the general
population. The data from this survey enabled: (1) the prevalence of
cyberbullying, (2) the relationship between EMSs (at the domain and
subscale level) and psychological distress, and (3) the moderating role of
88
schema coping styles in the relationships between EMSs (at the domain
level) and psychological distress to be tested.
Structural equation modelling (SEM) was used in the current study
to analyse the structural model, which was based on Young et al.’s (2003)
schema theory. SEM can be considered a combination of path analysis and
factor analysis as the goal is to model the relationship between measured
variables (e.g. item responses) and latent variables, as well as examine the
structural relationships between latent variables (e.g. factors; Weston &
Gore, 2006). An advantage of using SEM is that it extends on conventional
multivariate analyses, such as multiple regression (MR), factor analysis
(FA), path analysis (PA), and analysis of variance (ANOVA) by accounting
for measurement error, allowing multiple measures to be used to represent
constructs, the ability to model a number of categorical or continuous
exogenous or endogenous variables, and provides tests of goodness-of-fit. It
can be used for the moderation analysis of latent variables and is also the
preferred method for confirming a theoretical model (Wu & Zumbo, 2008).
Figure 5 presents the second phase of this multiphase mixed methods
research design in more depth. In particular, it outlines the third study and
the steps involved in each stage of this study. The method and instruments
employed in this study are discussed in more detail in Chapter 8.
89
Chapter Summary
This chapter reports the methodological framework and research
design of the thesis and rationales for using mixed methods. The worldview
paradigm adopted in this thesis is the pragmatic approach, which is
recommended when conducting mixed method research designs. This
paradigm is advantageous as it is flexible in its investigative techniques
when trying to address the research questions of a study and as a result the
strengths from both techniques can be integrated to help understand a social
phenomenon. To address the overall research objective of this thesis, a
multiphase mixed methods research design was utilised, which includes
both a concurrent and sequential design. In particular, Study 1 and Study 2
were conducted concurrently in Phase 1 of this thesis to (1) gain a better
understanding of how emerging adults define cyberbullying and examples
of cyberbullying during this age group, and (2) develop and validate a new
measure of schema coping styles so it was suitable for a research context.
The findings from both these studies were implemented into Study 3 (Phase
2) so that variations in psychological distress for victims of cyberbullying
could be examined by testing Young et al.’s (2003) schema model. A
general overview of the data collection methods and analysis was presented,
although this will be discussed in more depth in Chapter 5 to 7. The next
chapter describes in detail the method and findings specific to Study 1
(Phase 1).
92
CHAPTER 5
PHASE 1, STUDY 1: A QUALITATIVE STUDY OF
CYBERBULLYING DURING EMERGING ADULTHOOD
Introduction
This chapter describes the process of conducting the first study in
Phase 1. The chapter commences with the aims and overview of how ethical
approval was sought. Following this, participant characteristics, the
materials used in the focus groups, the study procedures, and ethical issues
anticipated in the project’s planning and undertaking are described. The
techniques used to analyse the qualitative data and the validation strategies
implemented are provided at the end of the Method section. The qualitative
results with embedded quotes from participants are then illustrated along
with thematic maps, which provide an overview of the results for each
research question. A discussion of the findings and implications are then
presented, followed by how these findings inform the definition and
measurement used in Study 3. The limitations of the study and a chapter
summary complete this chapter.
Conduct of Studies
The current study was approved by Swinburne University of
Technology Human Research Ethics Committee (Project number: 2014/023;
see Appendix A). An overview of the ethical considerations for this study
are presented in the Method section.
Method
Participants
Thirty-nine emerging adults (25 female, 14 male) aged between 18
to 25 years (M = 21.33; SD = 2.64) from the general population participated
in the study. Of the 39 participants, 36 were university students either
undertaking their undergraduate (n = 29) or postgraduate (n = 7) degree, and
three participants were employed in full-time work only. Six semi-
structured focus groups were conducted with approximately five to eight
participants allocated to each focus group, which is consistent with the
recommendations of leading qualitative researchers who specialise in focus
groups (Kruger & Casey, 2009). The only inclusion criteria for this study
was that participants were aged between 18 to 25 years and were able to
attend a focus group session on University campus in Melbourne. Previous
involvement in a cyberbullying situation as a perpetrator, victim, or
bystander was not necessary for participation in this study as only general
opinions and perceptions were needed to meet study aims and research
objectives.
Materials
A semi-structured interview guide was developed for the focus
groups. This helped to ensure that the research questions were addressed
(e.g., how emerging adults define cyberbullying and examples of
cyberbullying) but the facilitator was free to explore and ask more specific
questions if needed. Using a semi-structured interview guide also gave
94
Procedure
Recruitment procedures. Participants were recruited through a
university Research Experience Program (REP), which was conducted with
first year psychology students. Students enrolled in first year introductory
psychology units are invited to complete a minimum of three hours of the
REP. This involves participating in online and laboratory-based studies and
answering some questions about these studies. In addition, students are able
to gain up to six additional marks by completing more than the minimum
three hours required. The current study was advertised on the Sona System,
which is the system used by researchers to advertise, organise, and credit
participants who participate in the REP. An information flyer (see Appendix
B), which provided information about the study, was posted on the Sona
System to advertise to participants. First year psychology students interested
in taking part in this study were able to confidentially register their
participation by emailing the researcher. After participation in the study, the
95
participants were informed prior to focus groups that researchers would not
ask about personal experiences of cyberbullying and that participants were
to refrain from mentioning personal experiences as it may have legal
ramifications. The focus of this study was on general observations and
opinions of cyberbullying, not personal experiences of being a perpetrator
or victim of cyberbullying.
It was also possible that participants who had been involved or were
currently involved in a cyberbullying situation may have experienced
psychological distress. Again, the registered clinical and counselling
psychologist who facilitated the focus groups was able to provide immediate
assistance and support to such individuals who experienced any discomfort.
Moreover, if a participant experienced discomfort after leaving the focus
group, he or she could refer to the Consent Information Statement that listed
the details of a range of counselling and mental health services.
It was fully explained to participants on the Consent Information
Statement and at the beginning of the focus group that: (a) their
participation in the study was completely voluntary; (b) all reported data
were to be de-identified; (c) they were free to withdraw their participation at
any time; and (d) they were free to abstain from any questions they did not
wish to answer. It is important to note that no participants reported any
discomfort or distress during or after the focus groups. Researchers were
also mindful that groups should not be so large that some participants might
feel unable to share their thoughts, but not so small that uncomfortable
participants might feel pressured to speak (Doucette, 2013). Therefore, the
focus groups included five to eight participants in each group. Lastly,
participants were informed that the focus groups would be audio-recorded
for accurate transcription. Transcripts were recoded to remove any
individual identifying information and pseudonyms were used (e.g.,
‘Participant 1’).
97
Data Analysis
Thematic analysis. Prior to the analyses, data were transcribed
verbatim by the researcher. After preliminary analysis of the six focus
groups, theoretical saturation of the data was reached, meaning that there
was significant repetition of the themes emerging and no new information
coming to light (Krueger & Casey, 2009). A general qualitative framework
was utilised, as only general views and opinions on cyberbullying were
collected. That is, other qualitative frameworks (e.g., phenomenology,
ethnography, or narrative approaches) were not suited to the aims and
research objectives of the current study (see Creswell, 2012).
A thematic analysis using the coding framework outlined by Braun
and Clarke (2006) was conducted. A thematic analysis was an appropriate
data analytic technique to use given that it allowed a dual deductive-
inductive analysis to be employed, whereby pre-existing codes in the
previous literature, as well as those that came out of the data were able to be
applied to the data. The first step was to read and re-read the transcripts in
order to become familiar with the content. This was followed by writing
notes and highlighting ideas in the right margin of each transcript. Initial
descriptive coding was applied to the first transcript and these codes were
then applied to the following transcripts or new codes were developed that
came out of that group. Once 20-30 codes were developed each code was
defined to make sure it was being applied consistently across the data and
supporting evidence for each code was given. In addition, similar codes
were grouped together to develop categories and then overarching themes in
which redundant codes were excluded from the analysis. A thematic map
was drawn to see how the story fit together (see Figure 6 and 7). Each
thematic map can be seen in the section describing the qualitative results.
Validation strategies. Researchers have attempted to develop
several strategies to assess the validity and reliability of qualitative research.
The set of strategies corresponds to constructs employed by positivists,
98
though the terminology has been redefined for use in a naturalistic setting
(e.g., Creswell, 2012; Lincoln & Guba, 1985; Maxwell, 1996; Merriam,
1998). Several researchers such as Lincoln and Guba (1985) have employed
the following set of strategies to establish validity in qualitative studies: a)
credibility (in preference to internal validity); b) transferability (in
preference to external validity/generalisability); c) dependability (in
preference to reliability); and d) confirmability (in preference to
objectivity). How these strategies were used in the current study are
described below.
Credibility. Credibility refers to the trustworthiness of the findings in
reflecting participants’ experiences. Some of the strategies employed in the
current study to promote confidence that the student researcher had
accurately recorded the phenomena of interest included: negative case
analysis, peer review or debriefing, and member checks (Creswell, 2012;
Creswell & Miller, 2000; Lincoln & Guba, 1985; Miles & Huberman, 1994;
Shenton, 2004; Whittemore, Chase, & Mandle, 2001). For instance,
negative case analysis refers to refining a researcher’s working hypothesis
or expectations until it addresses all cases within the data, such as negative
or disconfirming evidence. In the current study, after preliminary themes
and categories were developed, a search for data that confirmed or
disconfirmed these was undertaken. Data that did not fit the pattern of
themes and categories, such as differing opinions on the definition of
cyberbullying, was still reported in order to provide a realistic assessment of
the phenomenon, even if it included only one participant’s viewpoint
(Creswell & Miller, 2000; Miles & Huberman, 1994).
Peer review or debriefing was also employed, which provided an
external check of the research process in a similar way to interrater
reliability in quantitative research. Doctoral students and academics who
were part of the Digital Training and Technologies Lab at Swinburne
University of Technology played the role of the “disinterested peers” (i.e.,
99
other researchers not directly involved) but also had some knowledge of the
project. This group provided a sounding board to test developing ideas and
alternative approaches. During this time, peers also probed and asked
challenging questions about the methods, meanings, and interpretations of
the research. The researcher explained the coding process and showed the
initial codes, categories, and themes coming to light, and also presented the
thematic maps once there was a clearer picture of how the information fitted
together. In addition, panel members, who were academics in Psychology
employed by the University, acted as peer reviewers in yearly progress
review presentations. The role of the panel members was to provide
feedback to the student researcher about the conduct of the study and
findings. The findings from this study have also been presented at national
and international conferences and published in peer reviewed journals (See
List of Conferences and Publications after the Appendix). The feedback and
suggestions provided throughout this process have enabled the student
researcher to develop a better understanding and explanation of the research
design, interpretations, and conclusions.
The student researcher also conducted member checks in which
seven participants from three different focus groups were asked to view the
credibility of the findings, such as specific codes or labels used to describe
these, or interpretations of the data.
Transferability. Transferability is often called external validity and
refers to the degree to which findings from qualitative research can be
transferred or generalised to other contexts, settings, or people. Thick
description was used when describing the current study results as it is
described by Lincoln and Guba (1985) as a way of achieving a type of
external validity. By using thick description, which refers to describing a
phenomenon in sufficient detail, other researchers can compare and evaluate
whether these instances relating to a case or a theme are transferable to
those emerged in their situation (Creswell & Miller, 2000). In addition to
100
thick or rich description, the Results section used many low inference
descriptors (e.g., verbatim quotes). By reading verbatim quotes emerging
adults’ perspectives regarding the definition and examples of cyberbullying
are made visible and the reader can experience the participant’s actual
language2. It can also help the reader to assess the credibility of the findings
(e.g., how data has been collated into themes) and also the transferability of
the findings to different populations, or contexts (Johnson, 1997).
Dependability. Dependability refers to the consistency of the results,
such as if the qualitative data was analysed by another researcher how
similar the findings would be. This meant that it was important that the steps
involved in the qualitative data analysis within the present study were
reported in detail to ensure that adequate research practices had been
engaged in and other researchers would be able to carry out similar work. A
detailed description of the steps involved in analysing the data can be seen
in the Method section.
Confirmability. Confirmability refers to the extent to which the
results can be confirmed or corroborated by others and is comparable to the
concern of objectivity in quantitative research (Lincoln & Guba, 1985). A
technique used to ensure the confirmability of the findings is investigator
triangulation (Denzin, 2008; Jack & Raturi, 2006). In investigator
triangulation, multiple observers, such as student supervisors of a project,
allow cross checking of observations to eliminate selective perceptions and
any blind spots in the analysis. The goal was not to seek consensus, but to
understand that there are multiple ways of viewing the data (Denzin, 2008;
Jack & Raturi, 2006). In the current research, the student researcher and
Principal Coordinating Supervisor conducted all focus groups together and
debriefed and discussed initial themes based on participants’ responses in
2
Hesitations and false starts (eg, “umms,” “ahhs,” “you knows,” and “likes”) were
deleted to improve readability.
101
each of the focus groups. Once formal data analysis was conducted the
student researcher met with both the primary and secondary supervisor
where both the supervisors reviewed the coding booklet and thematic maps.
Upon reviewing each of these documents, the supervisors provided
feedback on where codes and categories could be collapsed, or merged, or if
the labels provided were suitable.
Results
The results pertaining to each of the research questions for this study
are discussed below.
Extension of
traditional bullying
Behavior alone
intentional and
aggressive
Perpetrator’s Perspective
A number of participants interpreted the definition of cyberbullying
from a perpetrator’s perspective. Participants viewing cyberbullying from a
perpetrator’s perspective argued that the motives of the perpetrator are what
is important in classifying cyberbullying behaviour, regardless of how
successful the perpetrator is in inflicting harm. For example, two
participants stated, “from a bully’s perspective…it has a lot to do with
intent” (male, 19) or “it comes from the bully’s intent to put you down in
some way or another, if you weren’t affected by it that's great, but the bully
still has this intention of wanting to put this person down” (female, 22).
Alternatively, if a perpetrator did not intend to harm a target then the
behaviour may not be classified as cyberbullying even if the target
interpreted the act that way. For example, participants with this view
mentioned, “how can it be intent if you’re not knowing you’re doing it?”
104
example, one participant (male, 24) described, “you can sit and take time
and think how can I really get to this person.” However, participants in one
focus group said the perpetrator’s intention to harm could also be “reactive”
(Participant 1, female, 24) or “an impulsive act…still an intent, but maybe
not as well thought out compared to a premeditated thing” (Participant 2,
female, 24). These participants may be referring to the more specific role of
bully-victim, where a person may bully others in response to victimisation
experiences, though these were the only two comments on this intention.
Taken together, when interpreting cyberbullying from a perpetrator’s
perspective, intent to harm appears to be the central factor and repetition can
help establish the perpetrator’s intention. On the other hand, individuals
who defined cyberbullying from the perspective of a victim had a different
interpretation.
Victim’s Perspective
A majority of the participants in the focus groups viewed
cyberbullying from the perspective of a victim. However, it is important to
note upfront that participants identified that it means something different to
be a target of a cyberbullying behaviour versus a victim. That is, a target
was viewed more as an overarching category to describe a person who is a
target of a cyberbullying behaviour and perceives the behaviour as intending
to harm. The target becomes a victim when the behaviour is not only
perceived as intending to harm but harm is also inflicted. For example,
participants agreed that, “I think to be bullied, anyone can be bullied but
then to be a victim is another kind of side to it” (male, 19). Another
participant (female, 18) further highlighted the distinction between target
and victim by disclosing her own personal experience with cyberbullying, “I
would still consider it to be bullying but then I don't consider myself to be a
victim,” with another participant (female, 19) adding “it’s bullying without
the victim thing.” In addition to this, one participant (female, 19) described
106
3
Henceforth target will be used as an overarching category and victim as a
subgroup of this. However, there may be some instances where target and victim labels are
used interchangeably such as when using participant quotes or discussing previous research
where the distinction between target vs. victim is less clear.
107
Bystander’s Perspective
The bystander’s perspective further highlighted the multifaceted
nature of the definition of cyberbullying. There were a range of participants
in the focus groups that reported that they had been bystanders to
cyberbullying, and described their opinions and perceptions of
cyberbullying based on an observer’s perspective. However, they often
found it difficult to determine cyberbullying situations because “from a
bystander’s perspective…looking at harmful comments that someone has
written about or to someone else…it’s hard…because you don't know in
what sense or context they are making those comments” (female, 22) as it
“can look really ambiguous from the outside” (female, 24) and “…it is a
grey area if you were looking at it objectively” (female, 24). Other
participants described, “sometimes I get confused when I see something and
it’s not until you read into the comments further and that's when you realise
this isn’t even serious” (female, 20) or think “oh they’ll be right, they
probably won’t even take that to heart” (female, 18).
Emoticons were said to be helpful in distinguishing between teasing
and cyberbullying, however it was stressed that a target could say they are
fine, send a “smiley,” “LOL,” or “haha” when they are actually hurt by the
behaviour, which further complicates bystanders' interpretations of the
event. Thus, bystanders expressed that “unless I was to maybe ask them…”
(female, 24) it’s hard to distinguish if the target has been hurt by the
behaviour. For example, one participant (female, 24) identified, “I might
view something online and if that was me I would be really upset but to that
group of friends it was a big joke, so I wouldn't know if that person was
108
being bullied or not.” The lack of visual and verbal cues creates great
challenges for potential bystanders as “you don't pick up tone or anything,
just words…so you’re kind of lost, are they being sarcastic or are they being
for real” (male, 22).
This ambiguity often resulted in bystanders choosing not to
intervene in behaviours that they perceive may be cyberbullying. For
example, as one participant (male, 25) stated, “we have all sat back and
went, I don't want to get into this shit storm, I don't want a notification
coming through all the time, I can’t be bothered with it.” It was pointed out
that, “a bystander in cyberbullying…have the option of turning a blind eye
and no one would know…you can just look at it and…keep going with your
life because it doesn't affect you personally” (female, 18).
Participants expressed that a concern with intervening was that it
could potentially exaggerate the situation, as the bystander may have
misinterpreted the incident or “put themselves in the limelight to potentially
become bullied” (male, 21), or become a bully. One participant expressed
this happening to her:
I’ve had bantering conversations with friends and I’ve had someone
else interject and take it completely out of context…but there was no
need because it was just friendly banter…he went from being the
bystander to the bully. I guess sometimes it can be obvious, but if you
don't know it can be dangerous to interject (female, 18).4
4
Any quotation over 40 words was displayed as a block quote.
109
participant (male, 24) described, “you can tell through a chain of comments
the reaction by the individual” or when “someone literally says this has
upset me” (female, 19). Thus, while bystanders may perceive comments or
acts online as subjective, it appears the target’s reaction to the event can
help bystanders determine whether a behaviour constitutes cyberbullying.
Empathy for the target. Furthermore, bystanders also mentioned
that by imagining the experience from a target’s point of view can help with
their interpretation of a scenario as being more clearly cyberbullying. For
example, one participant (female, 24) described, “I might view something
online and if that was me I would be really upset”. In addition, another
participant (female, 24) expressed “there is that [university] Stalkerspace
thing I only recently joined…some people comment on there thinking they
are being funny but it seems really mean... I wouldn't want to be the victim
of that.” It should be reiterated here that in Australia, and particularly in
Melbourne, many of the universities have a “Stalkerspace” Facebook page,
which has been created by students at these universities. While the purpose
of Stalkerspace is to connect students and ask university and course related
questions, there is also a number of incidents that could be classified as
cyberbullying, harassment, and stalking.
Behaviour alone intentional and aggressive. Participants
mentioned that the behaviour alone could be perceived by bystanders as
intentional and aggressive. For instance, it was suggested that intent to harm
might be established depending on the number of perpetrators involved. A
participant (female, 24) described, “if you’re trying to be all nasty online
you would include as many people as you could to make it widespread.”
Similarly, another participant (female, 18) pinpointed, “maybe it's a
numbers thing too, if someone said, ‘let’s all delete this person’ and just to
upset them 20 people delete you off Facebook all at once, I think that's a big
statement.” Acts that involved public humiliation were also said to help
establish intent and cyberbullying. Public acts were defined as posting
110
In a professional environment you see all those emails that turn into
ginormous threads from one guy posting a stupid email to some senior
people in his company and then it gets forwarded around to all the
different companies and Cc’d (male, 24).
SNSs. A pattern observed across each of the focus groups was that
participants mainly experienced cyberbullying taking place on SNSs and it
114
was agreed that “Facebook is probably the main one”. For example, as soon
as the facilitator asked about examples of cyberbullying during emerging
adulthood many participants quickly responded with “Facebook” at the
same time and laughed in agreeance. Participants then added, “Facebook’s
most common”, “it [Facebook] would be the most prominent for sure,” “I
don't use anything except for Facebook,” and “I wish I didn't even use
Facebook but I cannot physically stop.” Participants who were university
students predominately mentioned the Facebook page, StalkerSpace.
Participants agreed, “Stalkerspace…that's probably where I see it most…it
comes up on my news feed and some think they’re being funny but it seems
really mean” (female, 24). This prompted another participant to state, “I
have found on Stalkerspace, I’ve been on there since I was in first year or
second year, and I think it has got a lot worse over time and we see a lot
now of people posting photos of sometimes their tutor or lecturer” (female,
25). This illustrates that there are certain mediums that are specific to adults
at Australian universities where cyberbullying appears to occur.
In addition, Facebook can be linked to other SNSs, such as Ask.fm
and Qooh.me. For example, “my cousin’s always on my Facebook and like
Qooh.me, Qooh.me, Qooh.me” (female, 18). ASKfm and Qooh.me are
where users are given the option of being anonymous or identifiable,
however, “everybody would tick anonymous and then people would just
write awful things about you” (female, 18). One participant (female, 19)
highlighted that similar sites to ASKfm and Qooh.me are “Formspring” and
“Tumblr” as “…you can send questions but people really just use it to send
anonymous hate…”
YouTube was another website where cyberbullying was said to
frequently occur. For example, “you read some of the shit on YouTube and
it’s just vile” (male, 25) and “that's [YouTube] a huge one…Maybe one that
is not always as acknowledged and as personal as Facebook, but because
it’s not as personal people say harsher things. That's just my experience with
115
it” (male, 24). This may be because Facebook users are usually identifiable
as it is the norm to use one’s full name, whereas on YouTube users usually
go by a pseudonym.
Participants briefly mentioned that they have witnessed
cyberbullying on Twitter. For example, one participant (female, 20) stated,
“I have a friend at work who wrote something quite horrible about someone
else at work on Twitter and somehow this person found out, so I think
Twitter is one.” In addition, participants have witnessed “quite negative
comments through Instagram” (male, 24) and on Snapchat. One participant
(female, 18) described the content on Snapchat as “just disgusting” and
another (female, 19) said, “on Snapchat people take photos of other people
doing a joke between them, but once you send it out then it’s no longer is
joke between you, that's something else.”
Lastly, cyberbullying was also said to occur in chat rooms and
forums where individuals have the option to appear anonymous or under a
pseudonym. Only one participant went into detail about their experience of
cyberbullying on parenting forums, “I’ve recently become a dad and
looking up questions and stuff. You can see some parents just getting
slammed by so many people and insulted for asking questions” (male, 24).
Although the participant discussed this as an example of cyberbullying,
without more context it is unclear whether this is specifically trolling or
cyberbullying.
As such, participants have clearly pinpointed the mediums where
cyberbullying can occur during emerging adulthood and that may need
special attention in the context of research.
Types of cyberbullying. Participants in each of the focus groups
discussed different types of cyberbullying. These were coded and fall into
the seven types of cyberbullying proposed by Willard (2007), namely,
flaming, harassment, masquerading and impersonation, outing and trickery,
denigration, cyberstalking, and social exclusion. Some of the main examples
116
Table 1.
Examples of Seven Types of Cyberbullying Behaviours During Emerging Adulthood as Described by Focus Group Participants
Angry Nasty text Hacking a Facebook Creating false Publicly posting Posting nasty A group leaving
confrontational message, email, account, whereby profiles nasty comments or comments, images, or someone out of
messages on Facebook post someone logs into rumours on a videos of a person conversations on
SNSs, forums or about a person another person’s Posting person’s SNS around university SNSs
on YouTube account and posts embarrassing or campus on the
videos that are Nasty comments embarrassing unflattering Forwarding on a StalkerSpace Posting a nasty
not related to the on Ask.fm, such information about the information, private email sent Facebook page. Facebook status
content posted as “kill yourself” person without their photos, or videos by a colleague to about a person for
(could also be consent of a person other colleagues many individuals
regarded as online to witness except
harassment) Creating ‘hate the person
pages’ on themselves
Facebook about a
particular person
118
I’m very self-conscious with…I’m not even friends with these people
but they knew it would get back to me (female, 19).
Someone posted a photo of a girl in their class and then it turned into a
game that whole day. Like, people on Stalkerspace were trying to find
this random girl on campus and trying to follow her around and take
her photo and put it on Stalkerspace and I think she ended up running
out of class crying and left campus (female, 24).
122
Discussion
Overview of Discussion
The purpose of this study was to clarify and gain a deeper
understanding of what cyberbullying means to emerging adults. The
research questions were: (a) How do emerging adults define cyberbullying?
(b) What are some examples of cyberbullying from a sample of emerging
adults? This section summarises the key findings in relation to the two
research questions and discusses them in light of previous research. In
addition, implications, limitations, and suggestions for future research are
discussed. A chapter summary concludes this chapter.
participants suggested a set of criteria that they can use to try an establish
cyberbullying.
First, bystanders stated that they tend to use the target’s response as
an indicator of distress and potential cyberbullying. Similarly, Holfeld
(2014) reported that when a victim reported or responded to a cyberbullying
situation, the behaviour is perceived by bystanders as being severe if the
victim has to notify the perpetrator about it. On the other hand, less
bystander support is received when victims do not respond to the behaviour
or confront the perpetrator, as a lack of response tends to be interpreted by
bystanders as the behaviour not affecting the victim. Thus, while bystanders
may perceive comments or acts online as subjective, the current study
findings show that the target’s reaction to the event can help bystanders
determine whether a behaviour constitutes cyberbullying. Second,
bystanders mentioned that by imagining the experience from the target’s
point of view helps with their interpretation of a scenario as cyberbullying.
This is similar to the findings of Barlińska, Szuster, and Winiewski (2013)
where it was reported that taking the other person’s perspective, such as the
targets, and focusing on the potential negative consequences of
cyberbullying reduced negative bystander behaviours. Third, the behaviour
alone may be deemed as intentional and harmful by a bystander. For
example, the number of perpetrators involved in the act and whether the act
is posted publicly for others to witness was said to help the bystander
distinguish between friendly banter and cyberbullying.
Therefore, based on participants’ responses from the current research
and previous literature, the definition of cyberbullying from the bystander’s
perspective is when it is observed that a behaviour has negatively affected
another person, or that such a behaviour would be likely to negatively affect
the bystander if directed toward him or her. A bystander may also perceive
the behaviour alone as intentional and aggressive.
127
focus group data was: cyberbullying exists “across the board” (theme). Two
subthemes also emerged: cyberbullying occurs on various technological
mediums (first subtheme) and seven types of cyberbullying behaviours have
been observed by emerging adults (second subtheme).
In regard to the first subtheme, a range of different technological
mediums used to cyberbully others were reported and included: text
messaging, phones calls, IM services (e.g., Whatsapp, Messenger), emails,
and SNSs, which is similar to the different modes of cyberbullying reported
by Smith et al. (2008). Participants elaborated on the specific SNSs used to
cyberbully others. These included YouTube, anonymous question asking
sites (e.g., Ask.FM, Qhoo.me, Formspring, and Tumblr), and chat rooms
and forums, although much of the focus of this discussion was on SNSs
such as Facebook. University students, in particular, revealed that a lot of
cyberbullying behaviour occurs on university Facebook pages, called
[university name] StalkerSpace. However, cyberbullying was also observed
on Instagram, Snapchat, and Twitter. Similarly, Peluchette et al. (2015)
found that the most common medium through which cyberbullying was
experienced among emerging adults was Facebook followed by text
message, email, MySpace, Twitter, Chatrooms, Instant Messaging, and
Blogs. Francisco et al. (2015) also found that during higher education,
cyberbullying escalates through Facebook, continues occurring through
text/photo messages, and increases in Blogs, compared to primary school
and secondary school aged participants where the main technologies used
included text/photo messages, IM, and Hi5. As such, this study adds to the
previous research regarding which technological mediums cyberbullying is
most commonly experienced or observed during emerging adulthood.
The specific technological mediums mentioned by emerging adults
in the current study align with the examples provided in pre-existing multi-
item measures of cyberbullying behaviours. For instance, a more recent
version of the widely used Cyberbullying Scale (CBS) by Menesini et al.
129
Implications
This qualitative study has several notable implications. Firstly, this
study is one of the first comprehensive examinations of the definition of
cyberbullying from the perspective of emerging adults. Currently there is an
assumption that how perpetrators, targets, and/or bystanders define
cyberbullying is invariant though the findings from the current study
suggest this is not the case. It is argued here that by separating out the
definition and incorporating other perspectives researchers and practitioners
have a more comprehensive and valid understanding of how different
people perceive and/or experience cyberbullying. For instance, researchers
could include all three perspectives (such as the multifaceted cyberbullying
definition stated above) in self-report measures and adapted measures of
cyberbullying such as peer nominations and investigate the agreement (or
disagreement) between different types of involvement to obtain a more
accurate picture of the cyberbullying situation (see Wegge, Vandebosch,
Eggermont, Van Rossem, & Walrave, 2015). In addition, if researchers
were interested in examining a cyberbullying incident from a target (or
victim) perspective and the impact of the behaviour, the definition from a
target’s perspective could be the focus.
Moreover, it emerged from the focus group data that there were
differences between being a target of a behaviour (no negative effect
experienced) and being a victim (negative effect experienced). Previous
cyberbullying research has not distinguished between these two
involvement types and instead have used these terms interchangeably. It is
133
Limitations
A limitation of the present study was that while some participants
expressed that they had personally been involved in, or witnessed
cyberbullying, the facilitator did not directly ask about the personal
experiences of emerging adults. This was to protect participants from
potentially disclosing distressing experiences and to avoid legal
ramifications associated with cyberbullying. However, participants may
have been responding with how they thought the different perspectives may
interpret a situation, without actually experiencing it first-hand themselves.
It should be noted that there were a few participants in each group who did
describe their own personal experiences of cyberbullying, though this was
to provide an example or clarify a point rather than to vent about it.
Another limitation was that a majority of the participants were
university students attending the same Melbourne university with only a
136
Chapter Summary
Since there is a lack of consensus on the definition of cyberbullying
and limited research on emerging adults, it is crucial that researchers
understand what cyberbullying means to this age group. Data from the focus
groups suggested that emerging adults perceive cyberbullying to be an
extension of traditional bullying, as it comprises similar key features.
However, when attempting to operationalise the term and the key
components, this was highly subjective and dependent on the point of view
adopted. Therefore, this study extends on previous studies by integrating
emerging adult perceptions to develop a multifaceted cyberbullying
definition from the perspective of a perpetrator, target of perceived
cyberbullying behaviours, and bystanders. It also uncovered that there are
differences between being a target of cyberbullying (overarching category;
perceived intent to harm) versus a victim (subgroup of target; perceived
intent to harm but also harm inflicted), and that this distinction needs greater
focus in future studies. By breaking the definition down into the multiple
perspectives, different contexts (e.g., research, psychological) can focus on
different perspectives (e.g., target and/or victim only). This enabled a more
valid definition from the perspective of victims to be incorporated in Study
3. It informed the measurement of cyberbullying so that targets and victims
could be distinguished between so that the relationships between EMSs,
137
CHAPTER 6
PHASE 1, STUDY 2: DEVELOPMENT AND EVALUATION OF A
NEW MEASURE OF SCHEMA COPING STYLES: A PILOT STUDY
Introduction
This chapter describes the development and evaluation of a new
instrument, referred to as the Schema Coping Scale Inventory (SCSI), which
was designed to assess each of the schema coping styles. The development
of the SCSI was based on the stages proposed by leading authors in the area
of scale development (DeVellis, 2012; Gregory, 2011). The stages included:
(1) defining the test; (2) generating and constructing the items; (3) selecting
a scaling method; (4) determining scale instructions; (5) administering and
testing the items, (6) evaluating the items (factor analysis, reliability, and
validity), and (7) optimising scale length. Stages 1 to 4 are described after
the aims of the study are presented. The fifth step, administering and testing
the items, is described in detail in the Method section. This stage required
the SCSI to be administered to a pilot sample, which allowed for the
necessary data to be collected so that scale items could be evaluated (Step 6)
and scale length optimised (Step 7). These two final steps are described in
the Results section, where the factor structure of the scale was evaluated
using an exploratory factor analysis (EFA). The reliability and validity of
the scale was also determined. Following these statistical examinations,
refinements were made to the scale such as elimination of unhelpful and
redundant items in order to improve scale brevity.
the final study (Study 3). Two measures have been developed to assess
avoidance and overcompensation (i.e., YRAI and YCI, respectively),
although these scales were derived for use in therapy rather than for a
research context. While there has been limited research testing the
psychometric properties of these scales, published studies have focused on
clinical samples and reported various factor structures and issues with
reliability and validity. Surrender, one of the three coping styles proposed
by Young et al. (2003), has often been neglected from these studies as no
formal measurement tool has been developed to test this construct.
Furthermore, as the focus of Young et al.’s scales has been on maladaptive
responses, the aim of this study was to also develop an adaptive schema
coping style scale as individuals in non-clinical settings may have learnt
alternative ways to cope with their schemas. As such, the second study was
guided by the following three research questions:
1. What is the factor structure of the surrender, avoidance,
overcompensation, and adaptive schema coping scales?
2. Are these new schema coping scales reliable?
3. Do these new schema coping scales demonstrate construct and
criterion-related validity?
against others (e.g., dominating and controlling) and achieve status or please
others (e.g., try to appear perfect, please others, and flaunt their success), in
an effort to cover up their underlying inferiority complex. Similarly, Young
et al. (2003) stated that overcompensation is an attempt by the individual to
fight EMSs or dysfunctional core beliefs to avoid the negative emotions the
schema triggers, but as overcompensatory behaviours are usually excessive,
they end up perpetuating the schema.
Although Adler (2002) did not develop a scale measuring
overcompensation, Young (1999) developed the 48-item Young
Compensation Inventory (YCI). However, because of the limitations and
security restrictions associated with this scale, the current study developed
an alternative measure of overcompensation, which reflected the two
components: a positive construct such as pleasing/ status seeking (e.g., “I
try hard to please others,” “In order to be included I put on an act”), and a
negative construct, such as retaliation/ dominance (e.g., “I am highly
critical towards other people,” “I am controlling of the people around me,” I
make myself feel better by devaluing the person).
Moreover, there is no psychometric tool designed to measure
schema surrender. Surrender was conceptualised as coping in a passive and
compliant way, which continues to perpetuate a schema. People who
surrender to their EMSs tend to rely on others, act submissively, try to avoid
conflict, and put up with abuse (Young et al., 2003). Examples of this
coping style are: “selects abusive partners and permits abuse,” and “gives a
lot to others and asks for nothing in return” (Young et al., 2003, p. 38-39).
The development of items for this scale are based on Young et al.’s (2003)
definition and examples of surrender and will follow the same format as
avoidance and overcompensation, where a unidimensional surrender scale
was developed.
Young et al.’s (2003) schema coping styles only includes responses
considered to be maladaptive, however schema theory discusses alternative
143
over) to receive further feedback on item writing. Thus, the item pool was
thoroughly judged, modified, and trimmed by expert and population judges,
and items were then pilot tested on a larger sample from the relevant
population in Step 6.
“Not Applicable” option was employed as some coping responses may have
not been applied or applicable in that context.
1. Rate the number that shows how stressful this situation was for you.
1 2 3 4
Not at all A little Somewhat Very
148
Once again, when responding to each of the statements on the next page,
please answer them based on how you dealt with this stressful situation involving
someone else or a group of people.
Read each statement carefully and make sure you answer as honestly as
you can. Remember that there is no right or wrong answer and your answers are
anonymous. Please respond to each statement separately in your mind from all
other statements. For each of the coping styles, rate each statement from
‘Completely untrue of me’ to ‘Completely true of me’ to what extent you used it in
the situation. Don’t worry whether it worked or not, we are only interested in how
much you either used it or didn’t use it. The statements may not reflect all of your
coping style(s) accurately so there is room to add comments.
RATING SCALE: Completely untrue of me; Mostly untrue of me; Slightly
untrue of me; Slightly true of me; Not Applicable; Mostly true of me; Completely
true of me;
Please try to answer every question. Please TICK the box that best
corresponds to your answer for each question.”
Method
Participants
Approximately 500 questionnaires with 364-items were distributed
to adults aged 18 years and over, residing in Australia. Two hundred and
eighty-one questionnaires were returned, indicating a response rate of 56%,
which is consistent with other studies using paper surveys and has been
considered adequate (Nulty, 2008). After missing data was treated using
listwise deletion, the revised sample comprised of 102 adults (76.5%
female) aged between 18 to 68 years old (M = 36.93, SD = 12.29). The
majority of the sample indicated they were students (38.2% full-time
students [M age = 30.4, SD = 10.10), 45.1% part-time students [M age =
39.39, SD = 10.35), with 16.7% of adults indicating they were not studying
(M age = 45.24, SD = 14.66). Furthermore, 41.2% of adults were married,
26.5% were single, 26.5% were in a defacto relationship, 3.9% were
separated, and 2.0% were divorced. Lastly, the demographic information
revealed that majority of participants were born in Australia (79.4%).
Measures
Participants received a paper questionnaire (see Appendix I) which
included demographic questions (e.g., age, sex, marital status), the Schema
Coping Style Inventory (SCSI), Young Compensatory Questionnaire (YCI),
Young-Rygh Avoidance Inventory (YRAI), Brief COPE, Young Schema
Questionnaire (YSQ), and Depression Anxiety Stress Scale (DASS).
Schema Coping Style Inventory (SCSI). The SCSI consists of 99
statements measuring surrender, avoidance, retaliation, pleasing, and
adaptive schema coping. Consistent with previous coping measures,
150
participants are asked to think about and write down a particular stressful
situation that they have experienced involving someone else or a group of
people. They are then asked to think of how they dealt with this experience
when responding to the questions and rate items on a 6-point scale ranging
from (1) Completely untrue of me to (6) Completely true of me. Higher
scores on these scales indicate a higher level of the respective coping style.
The factor structure, reliability, and validity of this scale are examined in the
Results section.
Young Compensatory Inventory (YCI; Young, 1998a). The YCI
is a 48-item self-report questionnaire designed to measure schema
overcompensation. Participants rate each item on a 6-point scale ranging
from (1) Completely untrue of me to (6) Describes me perfectly. Higher
scores on this scale indicate a higher level of schema overcompensation.
Example items include: “I like to be the center of attention,” “I am quite
controlling of the people around me,” “I often blame others when things go
wrong.” Luck et al. (2005) examined the factor structure and psychometric
properties of the YCI and found three distinct factors social control (α = .85
for non-clinical sample), individuality (α =.80 for non-clinical sample) and
personal control (α = .72 for non-clinical sample). However,
Karaosmanoglu et al. (2013) tested the psychometric properties of the
Turkish version of YCI on clinical and non-clinical populations. An initial
reliability analysis on the scale indicated several problematic items, which
were deleted before a factor analysis was performed. According to
Karaosmanoglu et al. (2013), the results from their factor analysis on the
remaining 35 items found seven subscales reflecting: status seeking (α =
.81), control, (α = .79), rebellion (α = .79), counterdependency (α = .72),
manipulation (α = .73), intolerance to criticism (α = .60), and egocentrism
(α = .76). In the current study the YCI was used as a global measure as no
formal subscales were proposed by Young et al. (2003).
151
Hyper-
Dependence/ Insufficient criticalness/
Abandonment incompetence self-control Self-sacrifice unrelenting
standards
Defectiveness/
shame
Each of the 18 EMS subscales contains five items, where each item
is phrased as a negative belief regarding the self and one’s relationships
with others. Items are rated on a 6-point scale ranging from (1) Completely
untrue of me to (6) Describes me perfectly, where higher scores indicate a
stronger presence of the respective schema. Example items include: “If I
make a mistake, I deserve to be punished” (self-punitiveness), “I feel
alienated or cut off from other people” (social isolation/ alienation), “I feel I
cannot let my guard down in the presence of other people, or else they will
intentionally hurt me” (mistrust/ abuse). The internal consistency of an
earlier 75-item version of the YSQ-SF found coefficient alphas exceeding
.80 for all schema subscales in an Australian sample (Baranoff, Oei, Cho, &
Kwon, 2006). In addition, Mairet et al. (2014) found the 90-item YSQ-SF3
to display good reliability in an Australian sample, with coefficient alphas
ranging from .86 (emotional deprivation) to .89 (defectiveness/ shame) at
the schema level and .94 at the schema domain level. Soygüt,
Karaosmanoğlu, and Çakır (2009) reported the internal consistency of the
154
Procedure
Participants were recruited through a university Research Experience
Program (REP), which was conducted with first year psychology students
(on-campus and online students). Participants from the general population
also were recruited via Facebook and other social networking sites, on-
campus advertising, and snowball sampling.
First year on-campus REP psychology students at the university had
the ability to sign up to participate in the study via the Sona System, an
online booking system. Upon arrival, participants were immediately
provided with the Consent Information Statement (Appendix G) and a
debriefing statement (Appendix H). Consent was implied by return of the
anonymous questionnaire.
First year online REP psychology students also had the opportunity
to participate in this study through the Sona System booking system.
Students who were studying online were: (1) instructed to send an email to
the main student investigator if they were interested in participating in the
project; (2) provide their full name; and (3) their postal address. This
enabled the researcher to post a questionnaire pack to the participant,
containing the Consent Information Statement, questionnaire booklet, a
small envelope with a document enclosed where participants were to
provide their name in order to receive REP credits, the debriefing statement,
and a reply-paid envelope with the principal supervisor’s university-mailing
address. As soon as the returned questionnaire packages were received, the
completed questionnaires were separated from the sealed envelope
containing the document with participant’s name. This ensured that
participants responses were anonymous. The student researcher then granted
course credit.
156
Statistical Analyses
Data were analysed using Mplus 7.4 (Muthen & Muthen, 2015). A
Factor Analysis (FA), specifically an EFA for ordered categorical data, was
conducted first to determine whether the items form the five unidimensional
hypothesised scales. The estimation of the parameters in the factor models
were performed using Weighted Least Squares Mean and Variance adjusted
(WLSMV), the default estimator available in Mplus for ordinal data
(Muthen & Muthen, 2015). A CFA was then conducted and used to evaluate
the discriminant validity of the latent constructs. The reliability was
examined by calculating the coefficient alphas for the five constructs. The
student researcher then checked for convergent and discriminant validity of
each of the five scales to other measures (i.e., YRAI, YCI, YSQ, Brief-
COPE, and DASS) using correlations.
Exploratory factor analysis. There were a number of steps to
consider before conducting the statistical analyses. Presented below is the
rationale for using an EFA, the estimation technique for ordered non-
categorical variables, rotation method employed, and decision on number of
factors to extract.
Rationale for using Exploratory Factor Analysis. As the FA was
based on theoretical grounds, an EFA, which is associated with theory
development and usually performed in the early stages of research, was
employed rather than a PCA. A PCA is purely an empirical data reduction
technique and does not assume any underlying theory (Fabrigar, Wegener,
MacCallum, & Strahan, 1999). An EFA was also conducted initially,
instead of a CFA, to explore and uncover an optimal and parsimonious
factor structure. EFA is argued to be more appropriate for scale
development, while CFA is preferred at the advanced stages of a research
process where measurement models have a well-developed underlying
theory for hypothesised patterns of loadings (Anderson & Gerbing, 1988;
Field, 2009; Hair, Black, Babin, & Anderson, 2014; Hurley et al., 1997;
158
researchers have argued that multiple indices of overall model fit be used in
conjunction with the χ2 goodness-of-fit test.
Absolute and incremental fit indices. Fit indices can be used to
quantify the degree of fit along a continuum. These indices provide an
overall summary statistic that examines how well a particular covariance
model explains sample data (Hu & Bentler, 1998). The most commonly
reported are the SRMR and RMSEA, which are classified as absolute fit
indices, and the CFI, which is classified as an incremental fit index (Hu &
Bentler, 1998; Ullman, 2006; Weston & Gore, 2006). Absolute fit indices
refer to how well the theoretical model reproduces the sample covariance
matrix. In addition, incremental fit indices (also known as comparative fit
indices) compare the model to a nested baseline model that is a null model,
in which all variables are uncorrelated with each other (Hu & Bentler,
1998). Ideally, for a model that fits the data the χ2 would not be significant
(p > 0.05). However, if there is a significant difference between the model
and the data, then the cut off values for the absolute fit indices of a RMSEA
and SRMR value of ≤ .08 and ≤ .05, respectively, is considered indicative of
an acceptable model fit (Hu & Bentler, 1999; MacCallum, Browne, &
Sugawara, 1996). Values between .90 and .95 were considered acceptable
on the CFI and TLI, with a value of ≥ .95 considered to be representative of
good model of fit (Hu & Bentler, 1999).
In addition to inspecting the model fit statistics, the number of
indicators per factor and rotated factor loadings for each factor solution
were also investigated. Kline (2011) suggested that there should be at least
three indicators per factor as factors that have only two indicators are prone
to estimation problems, especially when the sample size is small.
Furthermore, based on Stevens (1992) recommendation, significant factor
loadings were classified as .4 and higher. A-priori theory was also used to
guide factor and item removal and retention (Conway & Huffcutt, 2003).
161
Step 6 and 7: Evaluating the items and Optimising the Scale length
The Results section below describes the results from the EFA where
the factor structure of the SCSI, as well as the reliability and validity of the
scale were evaluated (Step 6). The scale length was also optimised
throughout the evaluation analyses by eliminating problematic or redundant
items (Step 7).
162
Results
theory but the items in the first factor are conceptually distinct. Therefore,
the one-factor model was retained.
For the avoidance scale, a one-factor solution was examined based
on a priori theory. The initial model did not show a good fit to the data:
! " (90) = 207.74, p < .001, RMSEA = .113, CFI = .940, TLI = .930, SRMR
= .084. Five items were removed due to a combination of low correlations
with other items, low factor loadings, high MI values, and vague item
wording. For each item deleted there was another similar item that better
captured the construct (i.e., clearer item wording and stronger factor
loading). The final 10 items (25, 27, 28, 29, 30, 32, 33, 35, 37, 39; see Table
2) had moderate to strong factor loadings (.53 – .82). The revised model
resulted in a good fit to the data: ! " (35) = 47.45, p = .078.
A competing model was also tried based on a scree plot suggesting
that avoidance contains two factors. A two- and three-factor solution was
run, however both solutions were poor. For the two-factor solution, the
second factor contained only two items with significant factor loadings, one
of which (item 31) was extremely high (.98) and approaching a factor
loading of 1.0 (known as a Heywood case). Similarly, the three-factor
solution only had two significant factor loadings on the second factor (item
31 again was .98), and the third factor contained no significant factor
loadings. Therefore, the one-factor solution was retained.
A one-factor solution was also examined for the retaliation scale.
The initial model did not show a good fit to the data: ! " (275) = 490.21, p
< .001, RMSEA = .088, CFI = .906, TLI = .898, SRMR = .112. Fourteen
items were removed due to unclear item wording, item redundancy, low
correlations with other items (below .2), and low factor loadings (below .4).
The remaining 11 items had moderate to strong loadings (.62 – .80; see
Table 2) on the factor solution. The revised model fit for the eleven items
165
(42, 45, 50, 53, 54, 55, 56, 60, 61, 63, 64) measuring retaliation was: ! " (44)
= 58.40, p = .072, indicating a good fit to the data.
However, as the initial scree plot suggested that retaliation has two
to three factors, both solutions were also examined. For the three-factor
model, three items on the third factor had significant factor loadings with
the first two factors. For the two-factor solution, two items (items 47 and
58) were deleted due to significant cross loadings, resulting in an acceptable
model fit: ! " (208) = 332.89, p = .001, RMSEA = .077, CFI = .944, TLI =
.931, SRMR = .080. However, as the two-factor model was not interpretable
the one-factor model was retained.
For the pleasing scale, a one-factor solution was examined based on
a priori theory. The initial model did not show a good fit to the data:
! " (104) = 246.30, p < .001, RMSEA = .116, CFI = .943, TLI = .934, SRMR
= .099. Six items were deleted due to low correlations with other items
(below .3), high MI’s, item wording, item redundancy, or not fitting the
factor conceptually. The remaining 10 items had moderate to strong
loadings (.42 – .86; see Table 2). The revised model fit for the 10 items (65,
66, 72, 73, 74, 75, 76, 77, 79) measuring pleasing was: ! " (35) = 47.322, p =
.08, indicating a good fit to the data.
As suggested by a scree plot, two and three factor solutions were
examined for the pleasing construct. The three-factor model had an ultra-
Heywood case (1.035), meaning that fewer factors needed to be extracted.
The two-factor model had three significant loadings on first factor and many
on second. However, there was a large break between factor loadings on the
first factor, with two of the item factor loadings above .9 and the other .5.
The two-factor solution was also uninterpretable, suggesting that the one
factor solution is the better factor structure.
For adaptive schema coping, an initial one-factor solution resulted in
poor model fit: ! " (152) = 622.76, p < .001, RMSEA = .174, CFI = .793,
166
TLI = .767, SRMR = .149. Twelve items were deleted due to item
redundancy, item wording, not conceptually fitting the construct, low
correlations with other items, non-significant factor loadings, and high MI
values. A total of seven items were retained (items 83, 85, 87, 90, 94, 97,
98) with moderate to strong factor loadings (.45 – .92; see Table 2). The
results of the one-factor model suggested a good fit to the data, ! " (14) =
15.51, p = .34. However, a scree plot suggested around two to four factors
be retained. For the four-factor model, the last factor had no significant
factor loadings so one less factor was extracted. In the three-factor model,
six items had factor loadings above .9, however the model had a good fit:
! " (42) = 48.92, p < .22, and the three factors were interpretable: problem-
focused coping (first factor), social support-seeking (second factor), and
positive reframing (third factor). however, as the scale was specifically
developed to be a one-factor unidimensional model and to be consistent
with the other scales, the re-specified one-factor solution was retained.
167
Table 2.
SCSI Final Factor Structure with Factor Loadings for Each Item
Table 2 (Continued).
SCSI Final Factor Structure with Factor Loadings for Each Item
evaluated based on the model fit statistics (i.e., multiple fit indices) and the
estimated standardised factor-loading magnitudes. The fit statistics (i.e., χ2,
RMSEA, CFI, and TLI) outlined for the EFA, as well as, the weighted root
mean square residual (WRMR), were employed to evaluate model fit for the
CFA. A value of WRMR close to or less than 1.0 has been suggested as
indicative of adequate model fit (Yu, 2002).
A five-factor independent-cluster measurement model was
performed and included surrender, avoidance, retaliation, pleasing, and
adaptive coping. The aim of the full measurement model was to ensure that
items load uniquely on their respective latent construct and that latent
constructs were distinct from one another.
The initial model fit to the data was not acceptable, as the model was
statistically significant. While the RMSEA was appropriate, the CFI and
TLI were less than the recommended .90 threshold measure, ! " (892) =
1340.19, p < .001, RMSEA = .070, CFI = .871, TLI = .863, WRMR =
1.217. The item ADAPT90 had very high MIs with all the other scales.
Inspecting the item more closely, “I focused more on the positive things in
life,” could also be considered an avoidance (e.g., denial) or
overcompensation (e.g., pleasing) technique. The model was re-specified
eliminating ADAPT90 from the adaptive factor. The resultant model fit to
the data was still statistically significant and TLI just below the threshold
(.894). However, there was much improvement compared to the original
model as the CFI approached .90 and the RMSEA decreased to .63, χ2(850)
= 1197.48, p < .001, RMSEA = .063, CFI = .900, TLI = .894, WRMR =
1.119. Inspecting the correlations, standardised factor loadings, and
modification indices, ADAPT85 had several high MI values with the other
latent constructs. The wording of this item, “I approached the person/
people about the situation,” was considered vague and could fit in with
items on the retaliation scale (e.g., confronting a person). The model was re-
170
specified once removing this item from the adaptive schema coping
construct.
Finally, the final model consisted of five constructs indicated by 42
items (see Figure 9). While the model was statistically significant, the fit
indices were classified as appropriate, ! " (809) = 1102.34, p < .001,
RMSEA = .060, CFI = .916, TLI = .910, WRMR = 1.059. The standardised
loadings for each of the items on the respective latent construct were
statistically significant and ranged from a low of .47 to a high of .93. One
item, ADAPT87, had a factor loading of .33, however it was retained as it
may be stronger in larger samples and having a clear and conceptually
meaningful factor structure was important, rather than relying solely on
statistical indictors.
171
The CFA provided partial evidence for discriminant validity for the
latent factors (Anderson & Gerbing, 1988). Most of the correlations
between the four maladaptive schema coping factors ranged from weak to
moderate strength, with a strong correlation between surrender and
avoidance (see Table 3).
Table 3.
CFA Inter-correlations between Surrender, Avoidance, Retaliation,
Pleasing, and Adaptive Coping Styles.
Table 4.
Factor Pattern and Structure Coefficients for SCSI Factors
Reliability Analysis
Item reliability and internal consistency. Since an optimal factor
structure was determined, the reliability for each scale was examined by
calculating the coefficient alpha and item-total statistics in IBM SPSS
Statistics 23. The SCSI factors showed acceptable coefficient alpha values
(α = .72 to .89; see Table 5). Coefficient alpha values for the surrender and
pleasing scales could be increased if two items on the surrender scale and
one item on the pleasing scale were deleted. However, this would achieve
only a very small improvement (i.e., α = .83 to α = .84 for surrender and α =
.87 to α = .88 for pleasing).
As can be seen in Table 5, Table 6, and Table 7, most of the scales
included in this study had excellent coefficient alpha values. It should be
noted, the YRAI and YCI had excellent coefficient alpha values (α = .80 and
α = .90, respectively). Because of this, no items needed to be removed.
In addition, two Brief-COPE subscales, behavioural disengagement
and acceptance, had low coefficient alphas (α = .58 and α = .46,
respectively). However, these measures were retained in the study as
coefficient alpha values are quite sensitive to the number of items in the
scale, and it is common to find low coefficient alpha values (e.g., α = .5) for
short scales (i.e., Brief-COPE only has 2 items per scale). In this case,
Pallant (2011) suggested reporting the mean inter-item correlation for the
items, with an optimal range for the inter-item correlation being between .2
to .4 (Briggs & Cheek, 1986; Pallant, 2011; Tabachnick & Fidell, 2007). In
the current study, the behavioural disengagement scale had a mean inter-
item correlation of .42, and the acceptance scale had a mean inter-item
correlation is .30, both of which were within the optimal range.
Validity Analysis
As it was found that the scale: (1) conformed to its conceptual
definitions, (2) was unidimensional, (3) met the necessary levels of
176
reliability, and (4) composite scores of each scale were developed, the last
step was to verify the factor structure by establishing the construct validity
of the SCSI factors examined through IBM SPSS Statistics 23. Due to the
data having a non-normal distribution, the non-parametric test, Spearman
Rank Correlation Coefficient, was employed to examine the relationships
between the SCSI factors and YRAI, YCI, YSQ, Brief-COPE, and DASS
(Hair et al., 2014; Tabachnick & Fidell, 2007).
Convergent validity. To investigate convergent validity, avoidance
was correlated with the YRAI, and retaliation and pleasing with the YCI. A
significant moderate positive correlation between avoidance and the YRAI
was found showing satisfactory convergent validity. Moreover, retaliation
and pleasing had a significant moderate positive correlation with the YCI,
indicating satisfactory convergent validity (see Table 5).
Discriminant validity. To assess the discriminant validity of the
SCSI, the Brief-COPE was used as it is a measure of coping with stress and
not EMSs. Surrender had very weak to moderate significant positive
correlations with denial, substance abuse, emotional support, behavioural
disengagement, and self-blame. There was a non-significant relationship
between surrender and Brief-COPE subscales of instrumental support,
venting, positive reframing, planning, humour, acceptance, and religion (see
Table 5).
Avoidance had very weak to moderate significant positive
correlations with the Brief-COPE subscales of self-distraction, denial,
behavioural disengagement, substance use, and self-blame. Avoidance had a
very weak significant positive correlation with the Brief-COPE subscale of
active coping. There was a non-significant relationship between avoidance
and Brief-COPE subscales of emotional support, instrumental support,
venting, positive reframing, planning, humour, acceptance, and religion (see
Table 5).
177
Table 5.
Spearman Rank Correlation Coefficients between SCSI scales, YRAI, YCI, and Brief-COPE subscales.
Note. N = 102; r = Spearman Rank Correlation Coefficient. SURR = Surrender; AVOID = Avoidance; RET = Retaliation; PLEAS = Pleasing; ADAPT = Adaptive; YRAI
= Young-Rygh Avoidance Inventory; YCI = Young Compensatory Inventory; BC distract = Brief-COPE Self-Distraction subscale; BC active = Brief-COPE active
subscale; BC denial = Brief-COPE denial subscale; BC subuse = Brief-COPE substance use subscale; BC esupp = Brief-COPE emotional support subscale; BC insupp =
Brief-COPE instrumental support subscale; BC bedis = Brief-COPE behavioural disengagement subscale; BC vent = Brief-COPE venting subscale; BC pos ref = Brief-
COPE positive reframing subscale; BC plan = Brief-COPE planning subscale; BC hum = Brief-COPE humour subscale; BC accept = Brief-COPE acceptance subscale;
BC religion = Brief-COPE religion subscale; BC sblame = Brief-COPE self-blame subscale.
* p< .05. **p<.01.
180
Table 6.
Spearman Rank Correlation Coefficients between SCSI scales, YRAI, YCI, YSQ-SF3 schema domains, and DASS-21.
(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) (12) (13) (14) (15)
(1) SURR 1 .65** .28** .54** -.01 .25* .31** .28** .42** .27** .44** .46** .50** .40** .41**
(2) AVOID 1 .55** .63** -.006 .54** .56** .50** .50** .51** .60** .64** .63** .49** .50**
(3) RET 1 .37** .20* .37** .53** .35** .27** .42** .38** .50** .24** .07 .27**
(4) PLEAS 1 .18 .48* .47* .37** .42** .40** .54** .54** .38** .35** .47**
(5) ADAPT 1 -.03 .08 -.20 -.10 -.03 -.03 -.06 -.11 -.04 .04
(6) YRAI 1 .62** .57** .44** .56** .67** .61** .49** .44** .52**
(7) YCI 1 .53** .51** .74** .68** .62** .45** .44** .53**
(8) YSQ D1 1 .72** .49** .66**. .75** .58** .52** .47**
(9) YSQ D2 1 .50** .74** .73** .56** .59** .53**
(10) YSQ D3 1 .67** .56** 50** .43** .54**
(11) YSQ D4 1 .74** .54** .57** .53**
(12) YSQ D5 1 56** .48** .50**
(13) DASS Dep 1 .60** .69**
(14) DASS Anx 1 .60**
(15) DASS Stress 1
Factor M 2.95 2.97 2.60 2.84 4.43 3.02 2.91 2.17 1.99 2.48 2.82 2.73 .57 .46 .93
Factor SD 1.23 11.83 12.10 10.80 4.92 .51 .59 .93 .81 .76 .86 .82 .66 .57 .68
Mean Inter-Item r .45 .43 .42 .40 .35 .09 .16 .45 .37 .27 .31 .32 .63 .48 .52
Coefficient alpha .83 .88 .89 .87 .72 .80 .90 .95 .92 .79 .87 .90 .92 .87 .88
Note. N = 102; r = Spearman Rank Correlation Coefficient. SURR = Surrender; AVOID = Avoidance; RET = Retaliation; PLEAS = Pleasing; ADAPT = Adaptive; YRAI
= Young-Rygh Avoidance Inventory; YCI = Young Compensatory Inventory; YSQ D1 = Disconnection and Rejection (Domain 1); YSQ D2 = Impaired Autonomy and
Performance (Domain 2); YSQ D3 = Impaired Limits (Domain 3); YSQ D4 = Other-directedness (Domain 4); YSQ D5 = Overvigilance and Inhibition (Domain 5);
DASS Dep = Depression subscale; DASS Anx = Anxiety subscale; DASS Stress = Stress subscale.
* p< .05. **p<.01.
181
Table 7.
Spearman Rank Correlation Coefficients between SCSI scales, YRAI, YCI, and YSQ-SF3 schema subscales.
Note. N = 102; r = Spearman Rank Correlation Coefficient. SURR = Surrender; AVOID = Avoidance; RET = Retaliation; PLEAS = Pleasing; ADAPT = Adaptive; YSQ
ED = Emotional Deprivation schema; YSQ AB = Abandonment schema; YSQ MA = Mistrust and Abuse schema; YSQ SI = Social Isolation/ Alienation schema; YSQ
DS = Defective/ Shame schema; YSQ FA = Failure to Achieve schema; YSQ DEP = Dependence schema; YSQ VH = Vulnerability to Harm and Illness schema; YSQ
EM = Enmeshment schema; YSQ SUB = Subjugation schema; YSQ EI = Emotional Inhibition schema; YSQ SS = Self-Sacrifice schema; YSQ US = Hypercriticalness/
Unrelenting Standards schema; YSQ ENT = Entitlement schema; YSQ ISC = Insufficient Self-Control schema; YSQ RS = Approval Seeking/ Recognition Seeking
schema; YSQ PESS = Pessimism schema; YSQ SP = Self-punitiveness schema.
* p< .05. **p<.01.
182
Discussion
The purpose of this pilot study was to develop a new reliable and
valid scale to measure the schema coping styles proposed by Young et al.
(2003). Initial scale items assessing surrender, avoidance, retaliation,
pleasing, and adaptive schema coping styles were generated by reviewing
schema theory, previous literature, and the items on the YRAI and YCI
scales. A discussion of the results in relation to the three research questions
is presented below.
measurement model, with the exception of two items from the adaptive
scale which indicated cross loading(s) with the other factors. Model fit
statistics for the revised five-factor independent cluster measurement model
indicated a good fit and the majority of the items across the five factors
were discriminant. Despite discriminant validity being assumed, additional
data may need to be collected to determine if the overlapping items are a
result of the small sample size, being too conservative in retaining items
with weak factor loadings (e.g., below .50 or .60), or due to sampling flukes
(Bollen, 1989; Farrell, 2010).
It should also be noted that adaptive schema coping only had
significant but very weak correlations with retaliation and pleasing. This
could be explained by overcompensation being viewed as healthy to a point,
as it is attempting to fight back against the schema so long as the behaviour
is proportionate to the situation, takes into account the feelings of others,
and can reasonably be expected to lead to a desirable outcome (Young et al.,
2003). However, overcompensators usually overstep this as their behaviour
is usually extreme and they get stuck in counterattacking. Therefore, the
schema ends up being perpetuated rather than healed (Young et al., 2003).
In contrast, avoidance and surrender were not correlated with adaptive
schema coping. This indicates that these maladaptive schema coping styles
are distinct from adaptive schema coping, which focuses more on
challenging core beliefs, such as asking for help from others when needed.
Instead, surrender and avoidance are characterised by being completely
dependent or completely independent (Young et al., 2003).
values .80 can be interpreted as good, and values around .90 can be
interpreted as excellent. Based on these guidelines for interpreting
coefficient alpha values, avoidance, retaliation, and pleasing showed
excellent internal consistency reliability, followed by surrender, which
showed good internal consistency reliability. Adaptive schema coping
showed an adequate internal consistency reliability value. Previous studies
using the YRAI and YCI reported mixed reliability estimates. For instance,
poor (below. 70) to good (around .80) internal consistency reliability has
been reported for three-factors on the YCI (Luck et al., 2005; Mairet et al.,
2015; Sheffield et al., 2009), but poor internal consistency for two-factors
on the YRAI (below. 70; Luck et al., 2005; Sheffield et al., 2009).
Furthermore, Karaosmanoğlu et al. (2013) reported coefficient alphas
ranging from poor (i.e., one subscale was below .70) to good. Therefore, the
SCSI factors developed in the current study provides researchers with
reliable measures of various schema coping styles.
Implications
The current study’s findings contribute to future research and Study
3 of the thesis in a number of ways. Firstly, the current study is an important
contribution to research as a reliable and valid measure of avoidance,
retaliation, and pleasing, where the latter two measure different types of
overcompensation. Moreover, because these scales were more parsimonious
than the original YRAI and YCI, it enables the five new scales to be used in
conjunction with other scales, such as in the battery of questionnaires that
was employed in Study 3.
Secondly, there is currently no specifically designed psychometric
tool to measure surrender, despite being one of the main three coping styles
proposed by Young (1999). Young et al. (2003) posits that data for this
construct can be captured from the YSQ, however there are no protocols or
scoring procedures developed to calculate a surrender score from the data on
this measure. Moreover, there are potential issues associated with validity
contamination when the coping score is derived from the same items as the
188
schema score. Therefore, the current study fills a major gap in schema
coping measurement as it developed a scale to measure surrender and found
that the surrender scale is not only theoretically distinct, but also statistically
different from the YSQ-SF3. Surrender can now be implemented and tested
in future studies, in addition to avoidance and overcompensation (retaliation
and pleasing) schema coping styles, to investigate its relationship with
various EMSs.
Thirdly, this study also developed a reliable and valid measure of
adaptive schema coping, in addition to the coping styles considered to be
maladaptive. Adding this factor can enable further information about how
individuals in non-clinical populations cope with EMS activation, and
whether there are certain strategies that can buffer the negative effects.
Lastly, these findings are particularly relevant for the third study of
this thesis, which was the first study known to the student researcher to
include both the maladaptive schema coping styles and adaptive schema
coping styles when testing Young et al.’s (2003) schema theory.
often treated as missing data and results in a large reduction in sample size.
Past studies have recommended removing the Not Applicable response
option and replacing participants’ responses with the lowest response option
(Bradley et al., 1999). Therefore, in Study 3, any Not Applicable responses
were recategorised as a (1) “Completely untrue of me” response.
Because of the difficulty in obtaining an adequately sized sample,
participants aged 18 years and over were also invited to complete the
questionnaire, rather than only individuals in the age bracket that defines
emerging adulthood (18-25 years old). Future studies should replicate the
structure of the measure in an exclusively emerging adult sample.
Moreover, this study did not have enough participants to split the sample in
order to cross-validate the findings, a strategy that has been recommended
and utilised in previous research (DeVellis, 2012). Instead, Study 3 tested
the final SCSI measurement model among a different sample containing
emerging adults who identify as targets (targets-only and victims) and non-
targets of cyberbullying behaviours.
Chapter Summary
This chapter outlined the seven stages in scale development that
were used to guide the development and evaluation of the SCSI. The seven
stages included: (1) defining the test; (2) generating and constructing the
items; (3) selecting a scaling method; (4) determining scale instructions; (5)
administering and testing the items; (6) evaluating the items (factor analysis,
reliability, and validity); and (7) optimising scale length. For the first step,
theory, previous research, and pre-existing schema coping questionnaires
informed the development of each construct definition and construct
dimensionality. The five unidimensional constructs defined were surrender,
avoidance, retaliation and pleasing (as measures of overcompensation), and
adaptive schema coping. This helped inform the second step, where an item
pool was generated to tap into the content domain. This step particularly
190
focused on item writing and judging content and face validity, which
resulted in rewriting and trimming a number of the items. In the third step, a
6-point rating scale, similar to the scaling method of pre-existing schema
measures was selected, but the number of response options, wording, and
order presented was also informed by prior scale development research. In
regard to the fourth step, scale instructions were determined based on an
audit of pre-existing coping questionnaires. The fifth step was described in
the Method section, which provided an overview of how the items were
administered and tested. The Results section covered the last two stages of
scale development: (6) evaluating the items (factor analysis, reliability, and
validity) and (7) optimising scale length.
The overall findings of this study indicated that the SCSI holds
considerable promise as a means of identifying and evaluating the
maladaptive schema coping styles of surrender, avoidance, retaliation, and
pleasing, and also an adaptive schema coping style. In particular, the current
study extended on the YRAI and YCI by developing parsimonious and
reliable and valid versions of these scales. The current study also developed
a scale to measure surrender so that all maladaptive schema coping styles
proposed by Young (1999) could be investigated in future work. An
adaptive schema coping style was also developed to shed further light on
how individuals in non-clinical populations cope with schema activation.
Thus, it is hoped that these findings will facilitate future research examining
Young et al.’s (2003) schema model. In the next chapter (Chapter 7), Study
3 tested the proposed schema model in the context of cyberbullying, which
provided more insight into the relationships between EMSs, schema coping
styles, and psychological distress, as well as the psychometric properties of
the SCSI within a different sample.
191
CHAPTER 7
PHASE 2, STUDY 3: AN INVESTIGATION OF CYBERBULLYING
BEHAVIOURS, EARLY MALADAPTIVE SCHEMAS, COPING
STYLES, AND PSYCHOLOGICAL OUTCOMES IN EMERGING
ADULTS
Introduction
This chapter outlines how Study 3 was conducted, including the
Method and Data Analysis sections, followed by the Results, which reported
data relating to each of the research questions. Firstly, the prevalence of
cyberbullying during emerging adulthood was examined. The findings from
Study 1 were integrated, whereby a subgroup of victims was differentiated
from an overarching target category (and thus targets-only), and rates of
cyberbullying were presented for victims, targets-only, and non-targets.
Themes from coded open-ended qualitative responses were also reported to
better capture the conceptual differences between victims and targets-only.
While the main focus of this thesis was on targets of cyberbullying
behaviours (victims and targets-only) and exploring variations in
psychological distress, the results from non-targets were also reported for
comparison purposes throughout the data analysis. Second, the relationships
between EMSs (at the domain and subscale level) and psychological distress
were examined. Lastly, the moderating role of schema coping styles in the
relationship between EMSs (at the domain level) and psychological distress
were tested. To test the moderation models, first measurement models were
evaluated using CFAs (see Appendix O for measurement model results).
Once the latent constructs in the measurement models were adequately
measured by the observed variables, single indicator latent variables were
computed so the structural models based on Young et al.’s (2003) schema
theory could be specified. Similar to the last two studies, this chapter also
192
Conduct of Studies
The current study was approved by Swinburne University of
Technology Human Research Ethics Subcommittee (Project number:
2016/294; see Appendix J).
193
Method
Participants
Approximately 600 questionnaires comprising 379-items were
distributed to emerging adults residing in Australia. Two hundred and
eighty questionnaires were returned (response rate = 46.6%). The final
sample comprised of 271 emerging adults (79.7% female) between 18 to 25
years of age (M = 21.2, SD = 2.45). The majority of the sample indicated
they were tertiary students (73.8% full-time students, 20.3% part-time
students), with 5.9% of participants indicating they were not studying.
Moreover, 55.7% of participants indicated that secondary school was the
highest level of education they had completed, followed by completing a
trade (25.5%), undergraduate degree (17.3%), and a postgraduate degree
(1.5%). Furthermore, 2.6% of adults were married, 71.2% were single,
25.5% were in a defacto relationship, .4% (n = 1) separated, and .4% (n = 1)
were divorced.
Measures
In the paper questionnaire (see Appendix N), participants were first
presented with demographic questions (e.g., sex, age) and questions about
ICT use. Participants then completed a battery of measures. These included:
Adapted Florence CyberBullying-CyberVictimisation Scales
(FCBCVSs; Palladino, Nocentini, & Menesini, 2015). This instrument
consisted of two scales, one for perpetration and one for victimisation. Both
scales consisted of 14 items, which were translated into English by the
developers of the scale for the purpose of this study. However, minor
corrections to item wording were invited by the questionnaire developers
and only made when the clarity of the item could be improved or match the
language used by emerging adults. Nine additional items regarding social
exclusion, impersonation, hacking another person’s account, rumour
spreading, and creating nasty webpages were also included based on the
194
Procedure
This study followed the same recruitment and data collection
procedures used in Study 2 (see the Method section in Chapter 6 for a
detailed description). The information flyer, Consent Information Statement,
and debriefing statement used in the present study can be found in Appendix
K, L, and M, respectively. Completing the questionnaire took approximately
30-40 minutes.
Statistical Issues
Statistical issues such as data screening and assumption testing were
conducted in SPSS Version 25.0. The data were screened for out-of-range
values, outliers and missing data, followed by assumption testing of
structural equation modelling analysis, such as normality and sample size.
Univariate and multivariate outliers. The data was examined for
univariate and multivariate outliers. Univariate outliers were detected by
checking DESCRIPTIVES, specifically standardised z scores which exceed
3.29 (p < .001) and FREQUENCIES distributions by inspecting histograms
and box plots (Tabachnick & Fidell, 2007). Multivariate outliers were
identified by calculating Mahalanobis distance statistic (p < .001) (Kline,
2015; Tabachnick & Fidell, 2007).
Missing data. Missing data can create problems for the estimation
of structural equation models. Some researchers recommend that up to 10%
missing data is unlikely to be problematic in the interpretation of the result
(Tabachnick & Fidell, 2007), whereas other researchers suggest that even up
to 25% missing data is allowed on the condition that missing data is not
systematic and that the missing data analysis is chosen carefully (Byrne,
2001). However, it is important to note that the pattern of “missingness” is
crucial in determining the seriousness of the missing values, and in turn how
to treat missing data (Tabachnick & Fidell, 2007).
198
congeneric models were specified and re-specified (if needed), five higher
order domains named after the core emotional needs that were theorised to
contribute to the development of specific EMSs, were examined (Young et
al., 2005). EMSs were modelled at the higher order level in order to reduce
the number of models to be tested. The second set of one-factor congeneric
models included the five schema coping styles (surrender, avoidance,
retaliation, pleasing, and adaptive schema coping), which were developed
and pilot tested in Study 2. Surrender was estimated by five items,
avoidance by 10 items, retaliation by 11 items, pleasing by 10 items, and
adaptive schema coping by five items. Once the one-factor schema coping
models were specified and re-specified (if needed), an independent cluster
measurement model was conducted to ensure unidimensionality and
discriminant validity of the constructs. The final one-factor congeneric
model tested was psychological distress and was estimated by 53 items
(Derogatis & Melisaratos, 1983). All CFAs were performed using Mplus
Version 8.0 (Muthén & Muthén, 1998–2017; see Appendix O for
measurement model results for each group).
It is important to mention the topic of measurement invariance,
which is considered a logical pre-requisite when using comparison groups
(e.g., tests of group mean differences or testing whether a theoretical
structural model is invariant across groups) to ensure that researchers are
not comparing “apples and spark plugs” (Vandenberg & Lance, 2000, p.
9). This concept applied to the current study, whereby victims and targets-
only were the main focus of comparison. Equivalent true scores for a latent
construct assumes that each group are responding to the questionnaire in the
same way, and thus scores on a theoretical construct mean the same thing
for these different groups (Pendergast, von der Embse, Kilgus, & Eklund,
2017; Vandenberg & Lance, 2000). There are three main steps involved in
testing measurement variance and include: (1) whether the same items on a
measure hold across groups (configural invariance), (2) that the items have
207
the same meaning for different groups (metric invariance) and, (3) that the
items are being responded to in the same way (scalar invariance). However,
researchers have argued that there are instances when testing for
measurement equivalence is not relevant and instead recommended that the
groups’ measurement and structural models are tested separately (B.
Muthen, personal communication, March 25, 2019; Vandenberg & Lance,
2000).
When considering the findings of Study 1, where it was found that
there were different groupings in response to cyberbullying (e.g., victims vs.
targets) and differences in perception, it was expected that the items on the
measures of interest would not be viewed in the same way and through the
same psychological lens. For instance, the way victims with activated EMSs
(and potentially higher levels of EMSs) respond to the items is likely to be
different to the way targets or non-targets respond. In terms of configural
invariance, it was assumed that there could be specific items measuring an
EMS that relate to one group more than the other, meaning that this test
would fail because different sets of items make up the construct. In terms of
metric invariance, certain items measuring EMSs or schema coping were
assumed to be interpreted differently amongst the groups, such as in the
case of an enmeshment schema. Victims may score high on enmeshment
because they are dependent on a significant other, whereas targets may also
score high on certain enmeshment items because they have a close and
supportive relationship with a significant other. Lastly, in terms of scalar
invariance, it was fully expected that there would be differences in item
location parameters or thresholds, which meant that individuals would be
responding differently to specific items. It was not expected that targets and
non-targets would have comparable levels of EMSs to victims, especially on
the unconditional schemas such as those in disconnection and rejection
(Domain 1), and thus have the same likelihood of shifting between response
options (Pendergast et al., 2017). Therefore, it was presumed that there
208
Results
identify values that fall outside the range of possible values for a variable
and corrected by carefully cross-checking the error with the participant’s
original questionnaire.
In addition, standardised z scores were produced for each variable to
check for outliers and revealed one participant with a value greater than a
magnitude of 3.29 for the dependence schema. Moreover, Mahalanobis
distances were used to check for multivariate outliers which detected nine
participants as outliers. A closer inspection of the outliers revealed that all
but one of the participants were part of the target group (victim or target-
only), which is the main group of interest. For this reason, it was decided
that the outliers would be retained.
The Missing Values Analysis, which is available in SPSS 25.0 was
used to determine whether missing data from the questionnaires was
missing completely at random (MCAR), missing at random (MAR), or
missing not at random (MNAR). Little’s MCAR was interpreted at the
p<.05 level (Tabachnick & Fidell, 2006). The results showed that Little’s
MCAR test was not significant, c2 (4976) = 4985.94, p = .458, indicating
that missing data can be defined as MCAR.
Twenty-nine (10.35%) participants in the sample were partial
respondents. Of these partial respondents, nine participants had more than
25% of missing data and thus were subsequently deleted from further
analyses bringing the revised sample to 271. The amount of missing data for
the remaining 20 (7.38%) partial respondents ranged from .4 % (missing
only 1 item) to 3.6% (missing 10 items). These 20 partial respondents had
their missing data replaced with the EM algorithm available in SPSS
Version 25.0.
Next, skewness and kurtosis values, histograms, and normality plots
were visually inspected for the 18 EMS subscales, five schema coping
styles, and psychological distress. While no value was found to have
extreme skewness (3) and kurtosis values (10 to 20) several scales were
212
(female, 25) ticked on the FCBCVS that they had been the target of Q13
“stolen my personal information (e.g., photos, videos, texts) in order to
reuse” but in their open-ended response indicated, “I wouldn’t call it
cyberbullying or bullying of any nature, but a colleague saved some of my
Facebook photos to use on a cup that was gifted to me.” Moreover, a
participant ticked that they had been on the receiving end of Q10
“embarrassing or compromising videos/photos/pictures of me on the
internet (e.g., e-mail, Websites, YouTube, SNS)” but in the open-ended
response wrote:
The online behaviours done to me, is just friends and family posting embarrassing
videos and photos of me on Facebook or Instagram for my birthday. I haven’t
experienced cyberbullying but I saw it once when someone made a funny video of
someone diving at a swimming carnival - they had filmed it and put music in the
background and different effects (female, 20).
It was an old friendship group who were talking about me and spreading
rumours to others because I simply found a new group. The motives of the
perpetrator was to intentionally hurt me because I left (male, 18).
They wanted to intentionally hurt me. At first, I cried but then confronted the
person face to face that I had apparently said nasty things about (female, 20).
However, there were some participants that reported that despite the
targeting behaviour being harmful they were unsure of the perpetrators
motives or did not perceive harm was intended.
My mates were just making fun of me in a group chat. By definition I guess it was
cyberbullying because it hurt. Their motives were to have a laugh and not
intentionally hurt me. I didn’t directly respond (male, 18).
instance, participants said, “I felt annoyed but only mildly” (female, 18) and
“I wasn’t really hurt or upset at any point because I have a good self-esteem
and the attackers were immature, but it was an unpleasant experience
regardless” (female, 21). There were a small number of participants who
said their experience was very hurtful but did not go on to identify as a
victim.
My Facebook account and emails were hacked by a former friend of mine I had
emails stating I had an abortion and this person sent this in private messages to 50
people in my friends list. It was done to hurt me and I don’t know why. People
that received the messages were supportive. I was very hurt, but I got over it
(female, 24).
I was excluded from a group chat on Facebook and backstabbed. Five girls who I
was meant to be part of a friendship group with. They included me in a group chat
and then created another one specifically without me and then used it to bitch
about me. I didn’t care too much. I just rolled my eyes. I don’t have time for that
immature crap or people who behave like that. I stopped bothering to contact them
and took work over attending their functions. I just be nice to her but make no
effort to visit her now (female, 24).
Group of girls would mimic/ replicate pictures of myself and post it online. They
would also spread rumours about me and make sure everyone hates me. They
216
would also tell their friends to choose sides and take photos of me if I was seen
with my boyfriend. At first, I was sad and annoyed, but I told myself I did nothing
wrong, everything they are saying is false. Why should I be sad over people who
are envious of me. I had a supportive family to help me deal with this situation
(female, 18).
One friend sometimes says insulting things to us which she doesn’t realise what
she says hurt. For example, she implied that I was fat and said other really rude
things…she says stuff like this all the time (female, 18).
217
Friends always take ugly photos of each other and then send it to other friends via
Snapchat all the time. They think it’s of a joking nature but it has had a negative
impact on me and others too. It makes me feel stressed (female, 19).
I was continuously spoken bad of in a group chat and then added into to see
everything. Also happened on snapchat. It made me feel isolated, hurt, lonely
(female, 18).
Rumours about certain actions I had done got spread around. The information got
manipulated and exaggerated to frame me as the bad person. These rumours got
spread around the bullying friend group and my friend group. It caused me to feel
insecure and unsafe and like lashing out at people (male, 18).
Figure 11. Percentage of single episodes cyberbullying behaviours experienced by victims and targets-only
221
Figure 12. Percentage of repeated episodes of cyberbullying behaviours (3 times or more) experienced by victims and targets-only.
222
5
It should be noted that certain EMS subscales and schema coping scales for each
of the three groups are comprised of different items based on the measurement models.
6
Only Domain 1, 2, and 5 for victims and targets, and Domain 1, 2, 4 and 5 for
non-targets were tested due to measurement model issues with other domains (see
Appendix O for details).
223
Table 8.
Means, Standard Deviations, and One-Way ANOVA results for Victims, Targets-only, and Non-Targets
Victims Targets-Only Non-Targets
M SD a M SD a M SD a F
Domain 1 2.94 1.12 - 2.45 1.03 - 2.40 0.97 - F (2, 268) = 6.15, p < .01
Emotional Deprivation 2.33 1.26 0.80 2.04 1.22 0.82 2.32 1.53 0.76 F (2, 268) = 1.61, p = .203
Mistrust/ Abuse 3.35 1.33 0.78 2.90 1.29 0.77 2.27 1.03 0.69 F (2, 268) = 9.01, p < .000
Social Isolation/ Alienation 3.31 1.47 0.74 2.49 1.29 0.90 2.47 1.22 0.78 F (2, 268) = 8.14, p < .000
Defectiveness/ Shame 2.51 1.38 0.86 2.05 1.14 0.86 2.03 1.22 0.74 F (2, 268) = 3.66, p < .027
Abandonment 3.21 1.53 0.82 2.76 1.35 0.85 2.52 1.22 0.77 F (2, 268) = 4.73, p < .010
Domain 2 2.49 0.98 - 2.27 0.87 - 2.03 0.83 - F (2, 268) = 4.89, p < .01
Dependence 2.17 1.06 0.71 2.27 0.98 0.69 1.77 1.01 0.64 F (2, 268) = 6.05, p < .003
Vulnerability to Harm/ Illness 2.74 1.19 0.77 2.51 1.21 0.81 2.03 0.96 0.76 F (2, 268) = 7.59, p < .001
Enmeshment 2.22 1.12 0.65 1.79 0.79 0.64 1.88 0.97 0.60 F (2, 268) = 4.66, p < .010
Failure 2.83 1.39 0.83 2.52 1.15 0.87 2.42 1.26 0.86 F (2, 268) = 2.08, p = .127
Domain 3 - - - - - - - - - -
Entitlement 2.31 1.12 0.66 2.29 1.00 0.68 2.05 0.95 0.61 F (2, 268) = 1.64, p = .196
Insufficient Self-Control 3.13 1.14 0.78 2.87 0.98 0.70 2.58 0.90 0.62 F (2, 268) = 5.39, p < .005
Domain 4 - - - - - - 2.65 0.85 - -
Approval Seeking 3.25 1.15 0.79 2.99 1.07 0.80 2.79 1.16 0.75 F (2, 268) = 3.12, p < .046
Subjugation 2.84 1.14 0.71 2.22 0.95 0.66 1.99 0.91 0.74 F (2, 268) = 14.41, p < .000
Self-Sacrifice 3.88 1.26 0.82 3.26 1.10 0.75 3.18 1.11 0.83 F (2, 268) = 8.20, p < .000
Domain 5 3.27 1.11 - 2.92 0.95 - 2.57 0.91 - F (2, 268) = 8.87, p < .01
Emotional Inhibition 2.96 1.41 0.69 2.73 1.30 0.79 2.43 1.17 0.79 F (2, 268) = 3.04, p < .049
Negativity/ Pessimism 3.14 1.46 0.83 2.97 1.29 0.84 2.41 1.21 0.84 F (2, 268) = 6.58, p < .002
Hypercriticalness 3.76 1.24 0.79 3.12 1.16 0.64 3.19 1.32 0.81 F (2, 268) = 6.34, p < .002
Punitive 3.22 1.48 0.79 2.83 1.18 0.78 2.28 0.93 0.70 F (2, 268) = 11.29, p < .000
Note: Domain 1 = Disconnection and Rejection; Domain 2 = Impaired Autonomy and Performance; Domain 3 = Impaired Limits;
Domain 4 = Other-directedness; Domain 5 = Overvigilance and Inhibition
224
Table 8 (Continued).
Means, Standard Deviations, and ANOVA results for Victims, Targets-only,
and Non-Targets
7
The adaptive schema coping scale was omitted from analyses in the victim
group.
225
Table 9.
Pearson's Correlations for Early Maladaptive Schemas, Schema Domains, Schema Coping Styles, and Psychological Distress
for the Victim Group.
ED MIS SOC DEF AB DEP VUL ENM FAIL ENT INCO APP SUB SAC EI NEG HYP PUN D1 D2 D5 SUR AV RET PLS GSI
ED 1 .428** .472** .573** .473** .333** .388** .032 .394** .016 .367** .223 .518** .162 .296* .448** .329** .248* .720** .356** .414** .169 .359** -.143 .163 .298*
MIS 1 .662** .549** .591** .530** .653** .303* .521** .182 .372** .407** .451** .269* .605** .699** .419** .399** .803** .611** .669** .323** .516** .274* .505** .596**
SOC 1 .650** .576** .558** .673** .428** .660** .081 .395** .399** .519** .305* .465** .692** .493** .574** .842** .710** .701** .311* .463** .114 .459** .646**
DEF 1 .581** .721** .661** .237 .745** .113 .443** .383** .614** .227 .566** .767** .477** .432** .834** .725** .706** .424** .556** .051 .484** .571**
AB 1 .511** .705** .368** .583** .180 .627** .568** .626** .339** .404** .671** .336** .286* .813** .662** .536** .412** .456** .205 .424** .716**
DEP 1 .647** .398** .744** .177 .574** .434** .609** .195 .423** .608** .292* .353** .664** .842** .531** .366** .442** .077 .506** .611**
VUL 1 .433** .706** .181 .469** .500** .583** .272* .392** .786** .333** .380** .773** .850** .600** .426** .493** .181 .548** .774**
ENM 1 .473** .303* .294* .281* .463** .227 .290* .302* .246* .328** .350** .691** .368** .227 .204 .254* .392** .392**
FAIL 1 .050 .516** .425** .593** .262* .455** .697** .373** .469** .727** .902** .631** .373** .439** .124 .450** .632**
ENT 1 .246* .202 .176 .324** .199 .096 .271* .161 .145 .207 .223 .282* .210 .343** .345** .063
INCO 1 .541** .537** .179 .256* .452** .109 .124 .554** .563** .300* .402** .293* .199 .241* .470**
APP 1 .532** .151 .419** .538** .330** .231 .501** .499** .477** .445** .173 .202 .530** .479**
SUB 1 .379** .504** .515** .472** .441** .681** .682** .606** .547** .393** .054 .462** .513**
SAC 1 .152 .220 .535** .319** .328** .292* .375** .058 .036 .036 .231 .256*
EI 1 .558** .600** .461** .581** .476** .818** .180 .396** .132 .392** .445**
NEG 1 .434** .365** .820** .734** .745** .415** .477** .163 .526** .699**
HYP 1 .701** .512** .381** .843** .120 .150 .039 .268* .399**
PUN 1 .485** .470** .792** .179 .150 -.072 .210 .366**
D1 1 .770** .755** .413** .586** .131 .511** .714**
D2 1 .653** .424** .482** .192 .573** .734**
D5 1 .285* .373** .082 .440** .602**
SUR 1 .467** .288* .481** .375**
AV 1 .274* .481** .425**
RET 1 .340** .165
PLS 1 .476**
GSI 1
Note: ED = Emotional Deprivation schema; MIS = Mistrust and Abuse schema; SOC = Social Isolation/ Alienation schema; DEF = Defective/ Shame schema; AB = Abandonment schema; DEP =
Dependence schema; VUL = Vulnerability to Harm and Illness schema; ENM = Enmeshment schema; ; FAIL = Failure to Achieve schema; ENT = Entitlement schema; INCO = Insufficient Self-Control
schema; APP = Approval Seeking/ Recognition Seeking schema; SUB = Subjugation schema; SAC = Self-Sacrifice schema; EI = Emotional Inhibition schema; NEG = Negativity/ Pessimism schema;
HYP = Hypercriticalness/ Unrelenting Standards schema; PUN = Self-punitiveness schema; D1 = Disconnection and Rejection; D2 = Impaired Autonomy and Performance; D5 = Overvigilance and
Inhibition; SUR = Surrender; AV = Avoidance; RET = Retaliation; PLS = Pleasing; GSI = Psychological Distress.
**p < .01. *p < .05
231
Table 10.
Pearson's Correlations for Early Maladaptive Schemas, Schema Domains, Schema Coping Styles, and Psychological Distress
for the Target-Only Group.
ED MIS SOC DEF AB DEP VUL ENM FAIL ENT INCO APP SUB SAC EI NEG HYP PUN D1 D2 D5 SUR AV RET PLS APT GSI
ED 1 .563** .548** .639** .463** .376** .447** .379** .366** .073 .329** .173 .382** .209* .571** .400** .221* .239** .777** .466** .471** .168 .338** .188* .229** -.128 .457**
MIS 1 .580** .561** .612** .584** .599** .524** .429** .231** .408** .238** .605** .368** .540** .657** .430** .391** .813** .631** .658** .112 .330** .337** .217* -.133 .684**
SOC 1 .666** .587** .535** .543** .440** .449** -.041 .296** .197* .591** .264** .504** .570** .320** .331** .826** .585** .564** .256** .328** .036 .252** -.143 .615**
DEF 1 .685** .618** .570** .445** .587** .000 .327** .286** .571** .156 .591** .543** .310** .345** .859** .665** .586** .273** .401** .103 .231** -.107 .573**
AB 1 .630** .662** .592** .563** .171 .457** .405** .592** .361** .422** .678** .411** .369** .823** .725** .612** .315** .475** .250** .324** -.007 .673**
DEP 1 .690** .489** .725** .217* .536** .451** .631** .261** .488** .664** .297** .369** .671** .868** .595** .301** .423** .164 .185* .016 .604**
VUL 1 .580** .687** .150 .513** .432** .605** .244** .481** .776** .426** .369** .691** .897** .670** .281** .362** .276** .247** -.086 .681**
ENM 1 .433** .258** .391** .392** .577** .337** .304** .532** .278** .290** .584** .707** .458** .256** .308** .313** .242** -.068 .489**
FAIL 1 .109 .546** .348** .561** .111 .370** .535** .236** .272** .584** .868** .463** .258** .375** .204* .190* .031 .491**
ENT 1 .358** .515** .167 -.023 .090 .214* .323** .315** .110 .207* .299** .074 .151 .309** .105 .002 .109
INCO 1 .501** .423** .170 .246** .504** .238** .402** .446** .596** .451** .218* .371** .286** .115 -.020 .428**
APP 1 .459** .055 .305** .413** .352** .432** .319** .480** .484** .340** .331** .319** .209* -.030 .237**
SUB 1 .282** .518** .606** .353** .382** .671** .702** .607** .448** .403** .182* .435** -.035 .569**
*
SAC 1 .204* .308** .225* .185* .337** .271** .300** .001 .164 .011 .172 -.009 .451**
EI 1 .481** .363** .320** .637** .494** .712** .231** .313** .057 .199* -.177* .464**
NEG 1 .521** .550** .700** .751** .831** .219* .340** .270** .174 -.086 .724**
HYP 1 .560** .416** .371** .777** .137 .256** .316** .267** .170 .408**
PUN 1 .410** .386** .775** .097 .268** .302** .161 .077 .389**
D1 1 .752** .707** .275** .458** .226* .308** -.125 .736**
D2 1 .655** .325** .437** .280** .255** -.030 .678**
D5 1 .224* .382** .301** .257** -.014 .648**
SUR 1 .509** .038 .586** .150 .181*
AV 1 .256** .523** .153 .290**
RET 1 .020 .182* .262**
PLS 1 .299** .126
*
APT 1 -.088
GSI 1
Note: ED = Emotional Deprivation schema; MIS = Mistrust and Abuse schema; SOC = Social Isolation/ Alienation schema; DEF = Defective/ Shame schema; AB = Abandonment schema; DEP =
Dependence schema; VUL = Vulnerability to Harm and Illness schema; ENM = Enmeshment schema; ; FAIL = Failure to Achieve schema; ENT = Entitlement schema; INCO = Insufficient Self-Control
schema; APP = Approval Seeking/ Recognition Seeking schema; SUB = Subjugation schema; SAC = Self-Sacrifice schema; EI = Emotional Inhibition schema; NEG = Negativity/ Pessimism schema;
HYP = Hypercriticalness/ Unrelenting Standards schema; PUN = Self-punitiveness schema; D1 = Disconnection and Rejection; D2 = Impaired Autonomy and Performance; D5 = Overvigilance and
Inhibition; SUR = Surrender; AV = Avoidance; RET = Retaliation; PLS = Pleasing; APT = Adaptive coping; GSI = Psychological Distress.
**p < .01. *p < .05
232
Table 11.
Pearson's Correlations for Early Maladaptive Schemas, Schema Domains, Schema Coping Styles, and Psychological Distress
for the Non-Target Group.
ED MIS SOC DEF AB DEP VUL ENM FAIL ENT INCO APP SUB SAC EI NEG HYP PUN D1 D2 D4 D5 SUR AV RET PLS APT GSI
ED 1 .398** .420** .595** .398** .330** .325** .404** .375** .282* .320** .143 .359** .185 .406** .335** .281* .372** .752** .457** .272* .437** .105 .251* .010 .018 -.057 .252*
MIS 1 .608** .549** .589** .515** .639** .385** .566** .221 .398** .283* .577** .353** .405** .653** .561** .632** .770** .672** .487** .709** .324** .387** .379** .300** .107 .564**
SOC 1 .663** .514** .459** .549** .292** .426** .384** .407** .395** .551** .285* .617** .496** .431** .469** .818** .548** .499** .636** .296** .300** .147 .204 .069 .544**
DEF 1 .433** .485** .515** .378** .518** .089 .321** .229* .584** .333** .650** .463** .318** .501** .814** .606** .456** .603** .224* .313** .138 .245* .062 .578**
AB 1 .426** .506** .253* .438** .159 .373** .327** .479** .270* .410** .542** .314** .411** .722** .519** .435** .528** .360** .513** .230* .223 .080 .577**
DEP 1 .591** .366** .457** .112 .252* .284* .563** .126 .246* .477** .125 .376** .541** .759** .383** .377** .403** .402** .177 .168 .069 .445**
VUL 1 .471** .519** .089 .338** .473** .641** .362** .435** .810** .440** .587** .601** .807** .599** .715** .350** .578** .305** .292** .182 .739**
ENM 1 .530** .306** .369** .191 .528** .385** .291* .454** .387** .415** .432** .744** .441** .489** .150 .400** .284* .144 .227* .421**
FAIL 1 .025 .534** .328** .549** .293** .371** .543** .311** .552** .543** .827** .471** .551** .408** .408** .260* .357** .130 .489**
ENT 1 .371** .284* .240* .261* .193 .105 .306** .215 .327** .159 .328** .262* .002 .020 .053 -.061 -.092 .125
INCO 1 .439** .377** .315** .462** .371** .319** .323** .443** .487** .470** .468** .276* .277* .205 .235* -.047 .420**
APP 1 .505** .410** .247* .493** .492** .311** .333** .405** .811** .499** .353** .336** .136 .280* .155 .374**
SUB 1 .500** .424** .622** .440** .592** .628** .722** .802** .651** .455** .511** .160 .286* .184 .523**
SAC 1 .216 .335** .492** .373** .352** .368** .799** .453** .204 .301** -.081 .175 -.092 .365**
EI 1 .409** .362** .382** .617** .428** .356** .682** .161 .238* .266* .092 .045 .488**
NEG 1 .555** .734** .585** .721** .590** .849** .344** .520** .360** .241* .212 .636**
HYP 1 .568** .489** .398** .594** .806** .193 .231* .327** .200 .268* .378**
PUN 1 .582** .617** .513** .825** .326** .429** .235* .319** .121 .555**
D1 1 .674** .527** .716** .300** .404** .187 .228* .059 .603**
D2 1 .601** .676** .424** .564** .325** .315** .190 .661**
D4 1 .654** .410** .465** .083 .305** .096 .514**
D5 1 .318** .441** .382** .263* .212 .644**
SUR 1 .538** .235* .656** .291* .234*
AV 1 .413** .487** .404** .596**
RET 1 .293** .443** .342**
PLS 1 .466** .267*
APT 1 .142
GSI 1
Note: ED = Emotional Deprivation schema; MIS = Mistrust and Abuse schema; SOC = Social Isolation/ Alienation schema; DEF = Defective/ Shame schema; AB = Abandonment schema; DEP =
Dependence schema; VUL = Vulnerability to Harm and Illness schema; ENM = Enmeshment schema; ; FAIL = Failure to Achieve schema; ENT = Entitlement schema; INCO = Insufficient Self-Control
schema; APP = Approval Seeking/ Recognition Seeking schema; SUB = Subjugation schema; SAC = Self-Sacrifice schema; EI = Emotional Inhibition schema; NEG = Negativity/ Pessimism schema;
HYP = Hypercriticalness/ Unrelenting Standards schema; PUN = Self-punitiveness schema; D1 = Disconnection and Rejection; D2 = Impaired Autonomy and Performance; D4 = Other-directedness; D5 =
Overvigilance and Inhibition; SUR = Surrender; AV = Avoidance; RET = Retaliation; PLS = Pleasing; APT = Adaptive coping; GSI = Psychological Distress.
**p < .01. *p < .05
233
Table 12.
Overview of the Warnings Produced in the Moderation Models and how the
Structural Models were Tested.
Figure 13. Moderation model of Disconnection and Rejection x Pleasing on psychological distress
for the victim group.
D1 = Disconnection and Rejection domain; Pls = Pleasing; GSI = General Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
composite variable.Table 13.
Overview of the Warnings Produced in the Moderation Models and how the
Structural Models were Tested.
Figure 14. Moderation model of Disconnection and Rejection x Pleasing on psychological distress
for the victim group.
D1 = Disconnection and Rejection domain; Pls = Pleasing; GSI = General Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
composite variable.
Moderation Results for the Victim Group
The
Figure 15. Themoderation results the
relationship between forlatent
victims pertaining
variables to disconnection
of disconnection and
and rejection (Domain 1)
and psychological distress at high and low levels of pleasing for the victim group.Figure 16.
rejection
Moderation(Domain 1), impairedand
model of Disconnection autonomy
Rejectionand performance
x Pleasing (Domain
on psychological 2) and
distress for the victim
group.
overvigilance and inhibition (Domain 5), and individual schemas within
D1 = Disconnection and Rejection domain; Pls = Pleasing; GSI = General Severity Index; Aban =
Abandonment Schema;
impaired limits Def = 3)
(Domain Defectiveness/
(entitlementShame
andSchema; Soc = self-control)
insufficient Social Isolation/and
Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
other-directedness (Domain
composite variable.Table 14. 4) (approval-seeking, subjugation, and self-
sacrifice) are presented in detail below and in Table 13.
Overview of the Warnings Produced in the Moderation Models and how the
Structural Models were Tested.
Figure 17. Moderation model of Disconnection and Rejection x Pleasing on psychological distress
for the victim group.
D1 = Disconnection and Rejection domain; Pls = Pleasing; GSI = General Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
composite variable.Table 15.
Overview of the Warnings Produced in the Moderation Models and how the
Structural Models were Tested.
235
Table 28.
Variable/ Scale ! SE β SE p R2
Domain 1
Domain 1 1.27 .37 .79 .09 .000
Surrender 0.02 .11 .02 .11 .846
Domain 1 x Surrender 0.07 .12 .04 .07 .548 .65
Domain 1 1.49 .49 .94 .16 .000
Avoidance -0.19 .19 -.19 .19 .313
Domain 1 x Avoidance 0.14 .13 .09 .08 .256 .66
Domain 1 1.30 .37 .80 .06 .000
Retaliation 0.03 .09 .03 .09 .732
Domain 1 x Retaliation 0.07 .10 .04 .05 .434 .66
Domain 1 1.28 .41 .79 .12 .000
Pleasing 0.02 .14 .02 .14 .912
Domain 1 x Pleasing 0.21 .12 .13 .06 .036 .66
Domain 2
Domain 2 0.88 .19 .83 .09 .000
Surrender -0.01 .10 -.01 .10 .911
Domain 2 x Surrender 0.04 .06 .04 .06 .456 .69
Domain 2 0.90 .20 .85 .12 .000
Avoidance -0.04 .13 -.04 .13 .772
Domain 2 x Avoidance 0.03 .08 .03 .07 .713 .69
Domain 2 0.88 .17 .83 .07 .000
Retaliation 0.02 .08 .02 .08 .791
Domain 2 x Retaliation 0.03 .05 .03 .04 .480 .69
Domain 2 0.75 .17 .87 .14 .000
Pleasing -0.06 .16 -.06 .17 .701
Domain 2 x Pleasing 0.04 .05 .05 .06 .436 .69
Domain 3
Entitlement -0.09 .16 -.09 .16 .595
Surrender 0.43 .16 .44 .16 .006
Entitlement x Surrender -0.03 .20 -.03 .20 .877 .17
Entitlement -0.09 .15 -.09 .15 .554
Avoidance 0.52 .14 .52 .14 .000
Entitlement x Avoidance 0.10 .13 .10 .13 .457 .26
Entitlement 0.01 .19 .01 .19 .955
Retaliation 0.17 .17 .17 .18 .331
Entitlement x Retaliation -0.09 .26 -.09 .25 .718 .04
Entitlement -0.28 .20 -.28 .20 .162
Pleasing 0.67 .15 .68 .15 .000
Entitlement x Pleasing 0.15 .18 .15 .17 .386 .38
Insufficient Self-Control 0.67 .30 .51 .21 .018
Surrender 0.14 .23 .14 .23 .536
236
Table 13 (Continued).
Variable/ Scale ! SE β SE p R2
Domain 3 (Continued)
Insufficient Self-Control x -0.11 .21 -.08 .16 .601 .36
Surrender
Insufficient Self-Control 0.62 .28 .46 .19 .01
Avoidance 0.30 .19 .31 .20 .12
Insufficient Self-Control x 0.01 .29 .01 .22 .965 .43
Avoidance
Insufficient Self-Control 0.73 .28 .55 .19 .005
Retaliation 0.04 .17 .04 .17 .834
Insufficient Self-Control x -0.12 .20 -.09 .15 .553 .32
Retaliation
Insufficient Self-Control 0.67 .30 .47 .17 .006
Pleasing 0.14 .23 .39 .17 .020
Insufficient Self-Control x -0.11 .21 .05 .15 .763 .35
Pleasing
Domain 4
Approval Seeking 0.46 .16 .46 .16 .005
Surrender 0.16 .18 .16 .19 .389
Approval Seeking x 0.00 .11 .00 .11 .986 .32
Surrender
Approval Seeking 0.45 .10 .46 .11 .000
Avoidance 0.40 .19 .40 .13 .001
Approval Seeking x 0.08 .10 .08 .10 .441 .46
Avoidance
Approval Seeking 0.53 .12 .53 .12 .000
Retaliation 0.06 .14 .06 .14 .680
Approval Seeking x -0.07 .06 -.07 .06 .306 .31
Retaliation
Approval Seeking 0.32 .20 .32 .21 .116
Pleasing 0.32 .23 .32 .24 .175
Approval Seeking x Pleasing 0.07 .08 .07 .08 .386 .36
Subjugation 0.65 .30 .65 .27 .015
Surrender -0.05 .28 -.05 .28 .872
Subjugation x Surrender 0.06 .10 .06 .20 .552 .39
Subjugation 0.49 .16 .49 .15 .001
Avoidance 0.23 .16 .23 .16 .144
Subjugation x Avoidance 0.04 .11 .04 .11 .685 .42
Subjugation 0.60 .12 .61 .10 .000
Retaliation 0.14 .10 .14 .10 .152
Subjugation x Retaliation -0.02 .06 -.02 .06 .740 .40
Subjugation 0.47 .17 .47 .17 .006
Pleasing 0.24 .19 .24 .19 .194
Subjugation x Pleasing 0.19 .11 .19 .11 .081 .47
Self-sacrifice 0.25 .13 .25 .12 .030
237
Table 13 (Continued).
Variable/ Scale ! SE β SE p R2
Domain 4 (Continued)
Surrender 0.37 .14 .38 .15 .009
Self-sacrifice x Surrender -0.11 .14 -.11 .14 .462 .23
Self-sacrifice 0.27 .12 .27 .12 .019
Avoidance 0.49 .13 .49 .12 .000
Self-sacrifice x Avoidance -0.06 .12 -.06 .12 .595 .33
Self-sacrifice 0.28 .13 .28 .12 .022
Retaliation 0.17 .14 .17 .15 .241
Self-sacrifice x Retaliation -0.26 .16 -.26 .16 .109 .18
Self-sacrifice 0.15 .16 .15 .16 .324
Pleasing 0.48 .15 .49 .15 .001
Self-sacrifice x Pleasing 0.12 .21 .12 .21 .577 .32
Domain 5
Domain 5 0.65 .27 .58 .24 .014
Surrender 0.24 .20 .24 .20 .239
Domain 5 x Surrender 0.12 .13 .11 .11 .321 .49
Domain 5 0.57 .32 .52 .28 .066
Avoidance 0.25 .27 .26 .27 .348
Domain 5 x Avoidance 0.14 .17 .13 .15 .389 .48
Domain 5 0.70 .28 .62 .25 .012
Retaliation 0.12 .12 .13 .13 .326
Domain 5 x Retaliation -0.01 .12 -.01 .12 .916 .42
Domain 5 0.55 .36 .50 .33 .129
Pleasing 0.26 .28 .26 .29 .361
Domain 5 x Pleasing 0.18 .20 .16 .17 .337 .50
Note. Bold type indicates statistically significant interaction effect with p value based on
standardised estimates. B = unstandardised coefficients; β = standardised coefficients
generated using the STDYX option in Mplus.
Figure 14. The relationship between the latent variables of disconnection and rejection
(Domain 1) and psychological distress at high and low levels of pleasing for the victim group.
Impaired limits (Domain 3). For the individual EMSs that are often
categorised under impaired limits, entitlement did not have a significant
main effect on psychological distress in any of the schema coping models.
There was a significant main effect for surrender, avoidance, and pleasing
on psychological distress, but retaliation was not significant. No significant
interaction effects were found between entitlement and psychological
distress for any of the schema coping styles (see Table 13).
Insufficient self-control had a significant main effect on
psychological distress for all four schema coping models. Moreover,
pleasing had a significant main effect on psychological distress, however no
other schema coping style had a significant main effect on psychological
distress. No significant interaction effects were found between insufficient
self-control and psychological distress for any of the schema coping styles
(see Table 13).
Other-directedness (Domain 4). For the individual EMSs that are
often categorised under other-directedness, the approval seeking schema had
a significant main effect on psychological distress for the surrender,
avoidance, and retaliation schema coping models, but not for the pleasing
model. Avoidance had a significant main effect on psychological distress
but surrender, retaliation, and pleasing did not. No significant interaction
effects were found between approval seeking and psychological distress for
any of the schema coping styles (see Table 13).
The subjugation schema had a significant main effect on
psychological distress for all four schema coping models. There were no
significant main effects for any of the schema coping styles on
psychological distress. No significant interaction effects were found
between subjugation and psychological distress for any of the schema
coping styles (see Table 13).
The self-sacrifice schema had a significant main effect on
psychological distress for the surrender, avoidance, and retaliation schema
241
coping models, but not for the pleasing model. Surrender, avoidance, and
pleasing had a significant main effect on psychological distress but
retaliation was not significant. No significant interaction effects were found
between self-sacrifice and psychological distress for any of the schema
coping styles (see Table 13).
Overvigilance and inhibition (Domain 5). Overvigilance and
inhibition had a significant main effect on psychological distress for the
surrender and retaliation schema coping models, but not for the avoidance
and pleasing models. The main effects of all four schema coping styles on
psychological distress were not significant. No significant interaction effects
were found between Overvigilance and inhibition and psychological distress
for any of the schema coping styles (see Table 13).
Table 14.
Table 14 (Continued).
Variable/ Scale ! SE β SE p R2
Domain 3 (Continued)
Pleasing -0.14 .14 -.15 .15 .321
Entitlement x Pleasing 0.04 .07 .05 .09 .608 .12
Entitlement 0.29 .08 .37 .10 .000
Adaptive -0.14 .10 -.14 .10 .163
Entitlement x Adaptive 0.06 .10 .07 .13 .560 .14
Insufficient Self-Control 0.11 .10 .11 .10 .275
Surrender 0.19 .11 .19 .11 .067
Insufficient Self-Control x .13 -.09 .13 .491 .06
-0.09
Surrender
Insufficient Self-Control 0.09 .11 .09 .11 .420
Avoidance 0.30 .10 .30 .10 .003
Insufficient Self-Control x .10 -.07 .11 .524 .12
-0.07
Avoidance
Insufficient Self-Control 0.01 .10 .01 .11 .922
Retaliation 0.29 .10 .29 .10 .004
Insufficient Self-Control x 0.03 .08 .03 .08 .735 .09
Retaliation
Insufficient Self-Control 0.11 .10 .11 .11 .281
Pleasing 0.13 .09 .13 .09 .175
Insufficient Self-Control x 0.01 .10 .01 .10 .914 .03
Pleasing
Insufficient Self-Control 0.16 .10 .17 .11 .116
Adaptive -0.13 .11 -.13 .10 .223
Insufficient Self-Control x -0.17 .13 -.17 .12 .175 .07
Adaptive
Domain 4
Approval Seeking 0.54 .11 .48 .09 .000
Surrender 0.07 .12 .07 .12 .538
Approval Seeking x -0.02 .10 -.01 .09 .875 .26
Surrender
Approval Seeking 0.52 .13 .46 .10 .000
Avoidance 0.11 .11 .11 .12 .323
Approval Seeking x -0.06 .09 -.05 .08 .515 .27
Avoidance
Approval Seeking 0.51 .11 .46 .09 .000
Retaliation 0.13 .10 .13 .11 .226
Approval Seeking x 0.00 .09 .00 .08 .967 .27
Retaliation
Approval Seeking 0.55 .10 .49 .08 .000
Pleasing 0.07 .09 .07 .09 .463
Approval Seeking x 0.03 .08 .03 .07 .678 .25
Pleasing
Approval Seeking 0.58 .10 .51 .08 .000
244
Table 14 (Continued).
Variable/ Scale ! SE β SE p R2
Domain 4 (Continued)
Adaptive -0.12 .11 -.12 .11 .293
Approval Seeking x -0.10 .11 -.09 .10 .371 .28
Adaptive
Subjugation 0.20 .08 .23 .10 .022
Surrender 0.10 .12 .10 .13 .409
Subjugation x Surrender 0.08 .10 .09 .11 .429 .10
Subjugation 0.13 .08 .16 .10 .101
Avoidance 0.23 .10 .24 .11 .026
Subjugation x Avoidance 0.08 .09 .09 .11 .388 .13
Subjugation 0.16 .08 .19 .10 .046
Retaliation 0.22 .10 .22 .10 .027
Subjugation x Retaliation 0.05 .07 .06 .08 .511 .12
Subjugation 0.22 .07 .27 .09 .003
Pleasing 0.06 .10 .06 .10 .555
Subjugation x Pleasing 0.12 .08 .14 .10 .144 .11
Subjugation 0.23 .07 .28 .08 .001
Adaptive -0.10 .11 -.10 .11 .368
Subjugation x Adaptive -0.03 .09 -.03 .11 .744 .09
Self-sacrifice 1.17 .24 .96 .16 .000
Surrender -0.38 .18 -.38 .17 .026
Self-sacrifice x Surrender -0.03 .11 -.03 .09 .761 .61
Self-sacrifice 1.04 .20 .82 .12 .000
Avoidance -0.13 .13 -.13 .13 .309
Self-sacrifice x Avoidance -0.22 .09 -.18 .06 .005 .62
Self-sacrifice 0.84 .13 .68 .08 .000
Retaliation 0.14 .11 .14 .11 .222
Self-sacrifice x Retaliation 0.07 .14 .05 .11 .635 .53
Self-sacrifice 1.26 .29 1.01 .18 .000
Pleasing -0.45 .19 -.44 .18 .016
Self-sacrifice x Pleasing -0.10 .10 -.08 .08 .299 .69
Self-sacrifice 0.89 .13 .71 .07 .000
Adaptive -0.13 .11 -.13 .11 .234
Self-sacrifice x Adaptive -0.20 .12 -.16 .09 .085 .56
Domain 5
Domain 5 1.29 .21 .80 .04 .000
Surrender 0.00 .08 .00 .08 .994
Domain 5 x Surrender -0.20 .12 -.12 .08 .118 .66
Domain 5 1.28 .22 .81 .05 .000
Avoidance -0.02 .08 -.02 .08 .762
Domain 5 x Avoidance -0.21 .09 -.13 .06 .026 .65
Domain 5 1.28 .00 .79 .05 .000
Retaliation 0.00 .98 .00 .09 .982
Domain 5 x Retaliation -0.09 .53 -.06 .09 .539 .62
245
Table 14 (Continued).
Variable/ Scale ! SE β SE p R2
Domain 5 (Continued)
Domain 5 1.29 .22 .81 .05 .000
Pleasing -0.07 .09 -.07 .09 .434
Domain 5 x Pleasing -0.12 .10 -.08 .07 .239 .64
Domain 5 1.26 .23 .78 .05 .000
Adaptive -0.09 .10 -.09 .10 .356
Domain 5 x Adaptive -0.15 .13 -.09 .08 .233 .63
Note. Bold type indicates statistically significant interaction effect with p value based on
standardised estimates. B = unstandardised coefficients; β = standardised coefficients
generated using the STDYX option in Mplus.
Figure 15. Moderation model of Disconnection and Rejection x Surrender on psychological distress for
the target-only group.
D1 = Disconnection and Rejection domain; Surr = Surrender; GSI = General Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
composite variable; bsi_gsim = General Severity Index single indicator composite variable.
Figure 158.ToTheinterpret
relationship
thebetween the latent
significant variables
latent of disconnection
variable interactionand
of rejection (Domain 1)
and psychological distress at high and low levels of surrender for the target-only group.Figure 159.
Disconnection
Moderation model ofand Rejectionand
Disconnection x Surrender
Rejection x on psychological
Surrender distress,
on psychological a plot
distress forof
the target-
only group.
D1simple slopes was
= Disconnection created in
and Rejection MplusSurr
domain; using the LOOP
= Surrender; GSI plot option
= General (see Figure
Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
16). Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
Schema;
composite variable; bsi_gsim = General Severity Index single indicator composite variable.
Figure 160. The relationship between the latent variables of disconnection and rejection (Domain 1)
and psychological distress at high and low levels of surrender for the target-only group.
Figure 161. Moderation model of Domain 1 x Pleasing on psychological distress for the target-only
group.
D1 = Disconnection and Rejection domain; Pls = Pleasing; GSI = General Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
composite variable; bsi_gsim = General Severity Index single indicator composite variable.Figure 162.
The relationship between the latent variables of disconnection and rejection (Domain 1) and
psychological distress at high and low levels of surrender for the target-only group.Figure 163.
Moderation model of Disconnection and Rejection x Surrender on psychological distress for the target-
only group.
D1 = Disconnection and Rejection domain; Surr = Surrender; GSI = General Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
composite variable; bsi_gsim = General Severity Index single indicator composite variable.
Figure 16. The relationship between the latent variables of disconnection and rejection (Domain 1)
and psychological distress at high and low levels of surrender for the target-only group.
Figure 164. The relationship between the latent variables of disconnection and rejection (Domain 1)
and psychological distress at high and low levels of surrender for the target-only group.Figure 165.
Moderation model of Disconnection and Rejection x Surrender on psychological distress for the target-
only group.
D1 = Disconnection and Rejection domain; Surr = Surrender; GSI = General Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
composite variable; bsi_gsim = General Severity Index single indicator composite variable.
247
Figure 17. Moderation model of Domain 1 x Pleasing on psychological distress for the target-only
group.
D1 = Disconnection and Rejection domain; Pls = Pleasing; GSI = General Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
composite variable; bsi_gsim = General Severity Index single indicator composite variable.
Figure 238.
To The relationship
interpret between the latent
the significant latent variables
variableofinteraction
disconnection ofand rejection (Domain 1)
and psychological distress at high and low levels of pleasing for the target-only group.Figure 239.
Disconnection
Moderation modeland Rejection
of Domain x Pleasing
1 x Pleasing on psychological
on psychological distress,
distress for a plot of
the target-only group.
D1 = Disconnection and Rejection domain; Pls = Pleasing; GSI = General Severity Index; Aban =
simple slopesSchema;
Abandonment was created in Mplus using
Def = Defectiveness/ ShametheSchema;
LOOPSoc plot= Social
optionIsolation/
(see Figure
Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; _p = single indicator
18) .
composite variable; bsi_gsim = General Severity Index single indicator composite variable.
Figure 240. The relationship between the latent variables of disconnection and rejection (Domain 1)
and psychological distress at high and low levels of pleasing for the target-only group.
Figure 241. Moderation model of Disconnection and Rejection x Avoidance on psychological distress
for the target-only group.
D1 = Disconnection and Rejection domain; Av = Avoidance; GSI = General Severity Index; Aban =
248
Figure 18. The relationship between the latent variables of disconnection and rejection
(Domain 1) and psychological distress at high and low levels of pleasing for the target-only
group.
As Moderation
Figure 318. seen in Figure
model18, higher disconnection
of Disconnection andx Avoidance
and Rejection rejection onscores for
psychological
distress for the target-only group.
targets-only were and
D1 = Disconnection associated
Rejectionwith higher
domain; Av =levels of psychological
Avoidance; distress.Index;
GSI = General Severity An
Aban = Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/
inspection of the Mis
Alienation Schema; interaction revealed
= Mistrust/ that theEdmoderator
Abuse Schema; = Emotionalvariable, pleasing,
Deprivation Schema; p =
buffered the relationship between disconnection and rejection scores andvariable;
single indicator composite variable; Avp_rev = Avoidance single indicator composite
Bsi_gsim = General Severity Index single indicator composite variable.Figure 319. The
relationship between
psychological the latent
distress. Onvariables
the otherof hand,
disconnection andwas
pleasing rejection
found(Domain 1) and
to increase
psychological distress at high and low levels of pleasing for the target-only group.
psychological distress slightly at lower levels of disconnection and
rejection.
Figure 320. Moderation model of Disconnection and Rejection x Avoidance on psychological
distress for the target-only group.
Moreover,and
D1 = Disconnection avoidance
Rejection significantly moderatedGSI
domain; Av = Avoidance; the= relationship
General Severity Index;
Aban = Abandonment Schema; Def = Defectiveness/ Shame
between disconnection and rejection scores and psychological Schema; Soc = Social Isolation/
distress (see
Alienation Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; p =
Table 14). Thecomposite
single indicator model explained a substantial
variable; Avp_rev amount
= Avoidance singleofindicator
variance in
composite variable;
Bsi_gsim = General Severity Index single indicator composite variable.
psychological distress (R² = .78). The SEM model can be seen in Figure 19.
Figure 321. The relationship between the latent variables of disconnection and rejection
(Domain 1) and psychological distress at high and low levels of avoidance for the target-only
group.Figure 322. Moderation model of Disconnection and Rejection x Avoidance on
psychological distress for the target-only group.
D1 = Disconnection and Rejection domain; Av = Avoidance; GSI = General Severity Index;
Aban = Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/
Alienation Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; p =
single indicator composite variable; Avp_rev = Avoidance single indicator composite variable;
Bsi_gsim = General Severity Index single indicator composite variable.Figure 323. The
relationship between the latent variables of disconnection and rejection (Domain 1) and
psychological distress at high and low levels of pleasing for the target-only group.
Figure 19. Moderation model of Disconnection and Rejection x Avoidance on psychological distress
for the target-only group.
D1 = Disconnection and Rejection domain; Av = Avoidance; GSI = General Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
Schema; Mis = Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; p = single indicator
composite variable; Avp_rev = Avoidance single indicator composite variable; Bsi_gsim = General
Severity Index single indicator composite variable.
Figure 398. The relationship between the latent variables of disconnection and rejection (Domain 1)
To interpret
and psychological distressthe
significant
at high
latentofvariable
and low levels avoidanceinteraction
of group.Figure 399.
for the target-only
Moderation model ofand
Disconnection Disconnection
Rejection and Rejection x Avoidance
x Avoidance on psychological
on psychological distress
distress, a plotfor the target-
only group.
D1of= simple
Disconnection
slopesand Rejection
was createddomain; Av =using
in Mplus Avoidance; GSI = General
the LOOP Severity
plot option (seeIndex; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
FigureMis
Schema; 20).
= Mistrust/ Abuse Schema; Ed = Emotional Deprivation Schema; p = single indicator
composite variable; Avp_rev = Avoidance single indicator composite variable; Bsi_gsim = General
Severity Index single indicator composite variable.
Figure 400. The relationship between the latent variables of disconnection and rejection (Domain 1)
and psychological distress at high and low levels of avoidance for the target-only group.
Figure 401. Moderation model of Impaired Autonomy and Performance x Avoidance on psychological
distress for the target-only group.
D2 = Impaired Autonomy and Performance domain; Av = Avoidance; GSI = General Severity Index;
Fail = Failure Schema; Emn = Enmeshment Schema; Vul = Vulnerability to Harm/ Illness Schema; Dep
= Dependence Schema; _p = single indicator composite variable; Avp_rev = Avoidance single indicator
composite variable; Bsi_gsim = General Severity Index single indicator composite variable.Figure 402.
The relationship between the latent variables of disconnection and rejection (Domain 1) and
psychological distress at high and low levels of avoidance for the target-only group.Figure 403.
Moderation model of Disconnection and Rejection x Avoidance on psychological distress for the target-
only group.
D1 = Disconnection and Rejection domain; Av = Avoidance; GSI = General Severity Index; Aban =
Abandonment Schema; Def = Defectiveness/ Shame Schema; Soc = Social Isolation/ Alienation
Figure
Schema; 20.=The
Mis relationship
Mistrust/ Abusebetween
Schema;the
Edlatent variables
= Emotional of disconnection
Deprivation Schema;andp rejection (Domain 1)
= single indicator
and psychological distress at high and low levels of avoidance for the target-only group.
composite variable; Avp_rev = Avoidance single indicator composite variable; Bsi_gsim = General
Severity Index single indicator composite variable.
Figure 404. The relationship between the latent variables of disconnection and rejection (Domain 1)
and psychological distress at high and low levels of avoidance for the target-only group.Figure 405.
Moderation model of Disconnection and Rejection x Avoidance on psychological distress for the target-
only group.
D1 = Disconnection and Rejection domain; Av = Avoidance; GSI = General Severity Index; Aban =
250
Figure 21. Moderation model of Impaired Autonomy and Performance x Avoidance on psychological
distress for the target-only group.
D2 = Impaired Autonomy and Performance domain; Av = Avoidance; GSI = General Severity Index;
Fail = Failure Schema; Emn = Enmeshment Schema; Vul = Vulnerability to Harm/ Illness Schema;
Dep = Dependence Schema; _p = single indicator composite variable; Avp_rev = Avoidance single
indicator composite variable; Bsi_gsim = General Severity Index single indicator composite variable.
Figure 478. The relationship between the latent variables of impaired autonomy and performance
(Domain 2) and psychological distress at high and low levels of avoidance for the target-only
group.Figure 479. Moderation model of Impaired Autonomy and Performance x Avoidance on
psychological distress for the target-only group.
D2 = Impaired Autonomy and Performance domain; Av = Avoidance; GSI = General Severity Index;
Fail = Failure Schema; Emn = Enmeshment Schema; Vul = Vulnerability to Harm/ Illness Schema;
Dep = Dependence Schema; _p = single indicator composite variable; Avp_rev = Avoidance single
indicator composite variable; Bsi_gsim = General Severity Index single indicator composite variable.
251
Figure 22. The relationship between the latent variables of impaired autonomy and performance
(Domain 2) and psychological distress at high and low levels of avoidance for the target-only
group.
psychological distress was significant for all five coping models. There was
a significant main effect for avoidance and retaliation on psychological
distress, but surrender, pleasing, and adaptive schema coping were not
significant. No significant interaction effects were found between
entitlement and psychological distress for any of the schema coping styles
(see Table 14).
Insufficient self-control did not have a significant main effect on
psychological distress in any of the five schema coping models. Moreover,
avoidance and retaliation had a significant main effect on psychological
distress, but surrender, pleasing, and adaptive schema coping were not
significant. No significant interaction effects were found between
insufficient self-control and psychological distress for any of the schema
coping styles (see Table 14).
Other-directedness (Domain 4). For the individual EMSs that are
often categorised under other-directedness, the approval seeking schema had
a significant main effect on psychological distress for the surrender,
retaliation, pleasing, and adaptive schema coping models, but not for the
avoidance model. The main effects of all five schema coping styles on
psychological distress were not significant. No significant interaction effects
were found between approval seeking and psychological distress for any of
the schema coping styles (see Table 14).
The subjugation schema had a significant main effect on
psychological distress for the surrender, retaliation, pleasing, and adaptive
schema coping models, but not for the avoidance model. The main effects of
avoidance and retaliation on psychological distress were significant, but
surrender, pleasing, and adaptive schema coping were not significant. No
significant interaction effects were found between subjugation and
psychological distress for any of the schema coping styles (see Table 14).
The main effect of self-sacrifice on psychological distress was
significant for all five coping models. The main effects of surrender and
253
Figure 24. The relationship between the latent variables of self-sacrifice and psychological
distress at high and low levels of avoidance for the target-only group.
inhibition scores and psychological distress (see Table 14). The model
explained a substantial amount of variance in psychological distress (R² =
.65). The SEM model can be seen in Figure 25.
Figure 25. Moderation model of Overvigilance and Inhibition x Avoidance on psychological distress for
the target-only group.
D5 = Overvigilance and Inhibition domain; Av = Avoidance; GSI = General Severity Index; Aban =
Abandonment Schema; Punit = Punitiveness Schema; Hyper = Hypercriticalness Schema; Neg =
Negativity/ Pessimism Schema; Ei = Emotional Inhibition; _p = single indicator composite variable;
Avp_rev = Avoidance single indicator composite variable; Bsi_gsim = General Severity Index single
indicator composite variable.
Figure 558. The relationship between the latent variables of overvigilance and inhibition (Domain 5) and
psychological distress at high and low levels of avoidance for the target-only group.Figure 559. Moderation
model of Overvigilance and Inhibition x Avoidance on psychological distress for the target-only group.
D5 = Overvigilance and Inhibition domain; Av = Avoidance; GSI = General Severity Index; Aban =
Abandonment Schema; Punit = Punitiveness Schema; Hyper = Hypercriticalness Schema; Neg =
Negativity/ Pessimism Schema; Ei = Emotional Inhibition; _p = single indicator composite variable;
Avp_rev = Avoidance single indicator composite variable; Bsi_gsim = General Severity Index single
indicator composite variable.
Figure 560. The relationship between the latent variables of overvigilance and inhibition (Domain 5) and
psychological distress at high and low levels of avoidance for the target-only group.
Figure 561. Moderation model of Insufficient Self-Control x Avoidance on psychological distress for the
non-target group.
Contp = Insufficient Self-Control Schema; Av = Avoidance; GSI = General Severity Index; Cont =
Insufficient Self-control Schema single indicator composite variable; Avd_p = Avoidance single indicator
composite variable; Bsi_gsim = General Severity Index single indicator composite variable.Figure 562. The
relationship between the latent variables of overvigilance and inhibition (Domain 5) and psychological
distress at high and low levels of avoidance for the target-only group.Figure 563. Moderation model of
Overvigilance and Inhibition x Avoidance on psychological distress for the target-only group.
D5 = Overvigilance and Inhibition domain; Av = Avoidance; GSI = General Severity Index; Aban =
Abandonment Schema; Punit = Punitiveness Schema; Hyper = Hypercriticalness Schema; Neg =
Negativity/ Pessimism Schema; Ei = Emotional Inhibition; _p = single indicator composite variable;
Avp_rev = Avoidance single indicator composite variable; Bsi_gsim = General Severity Index single
indicator composite variable.
256
Figure 26. The relationship between the latent variables of overvigilance and inhibition
(Domain 5) and psychological distress at high and low levels of avoidance for the target-only
group.
Table 15.
Table 15 (Continued).
Table 15 (Continued).
Variable/ Scale ! SE β SE p R2
Domain 4 (Continued)
Retaliation 0.33 .12 .34 .12 .007
Domain 4 x Retaliation -0.21 .19 -.16 .14 .266 .44
Domain 4 0.75 .25 .57 .15 .000
Pleasing 0.05 .15 .05 .15 .723
Domain 4 x Pleasing 0.12 .17 .09 .12 .457 .37
Domain 4 0.79 .24 .58 .13 .000
Adaptive 0.09 .13 .09 .13 .498
Domain 4 x Adaptive 0.08 .16 .06 .11 .591 .37
Domain 5
Domain 5 1.29 .40 .72 .11 .000
Surrender -0.04 .13 -.04 .13 .750
Domain 5 x Surrender 0.08 .18 .04 .10 .679 .50
Domain 5 0.86 .27 .49 .13 .000
Avoidance 0.37 .13 .37 .13 .003
Domain 5 x Avoidance 0.17 .17 .10 .10 .349 .60
Domain 5 1.24 .42 .68 .12 .000
Retaliation 0.11 .14 .11 .11 .421
Domain 5 x Retaliation -0.17 .13 -.09 .06 .142 .55
Domain 5 1.12 .33 .66 .10 .000
Pleasing 0.08 .10 .08 .10 .411
Domain 5 x Pleasing 0.25 .17 .15 .10 .141 .51
Domain 5 1.26 .40 .71 .10 .000
Adaptive 0.00 .15 .00 .15 .977
Domain 5 x Adaptive 0.08 .21 .05 .12 .705 .50
Note. Bold type indicates statistically significant interaction effect with p value based on
standardised estimates. B = unstandardised coefficients; β = standardised coefficients
generated using the STDYX option in Mplus.
significant for all five schema coping models. However, no main effects for
the five schema coping styles on psychological distress were significant.
There were also no significant interaction effects found between impaired
autonomy and performance and psychological distress for any of the schema
coping styles (see Table 15).
Impaired limited (Domain 3). For the individual EMSs that are
often categorised under impaired limits, entitlement did not have a
significant main effect on psychological distress in any of the five schema
coping models. There was a significant main effect for surrender, avoidance,
retaliation, and pleasing on psychological distress, but adaptive schema
coping was not significant. No significant interaction effects were found
between entitlement and psychological distress for any of the schema
coping styles (see Table 15).
Insufficient self-control had a significant main effect on
psychological distress for all five schema coping models. The main effect of
avoidance on psychological distress was significant, however no other
schema coping style had a significant main effect on psychological distress.
Avoidance significantly moderated the relationship between insufficient
self-control scores and psychological distress (see Table 15). The model
explained a substantial amount of variance in psychological distress (R² =
.86). The SEM model can be seen in Figure 27.
261
Figure 28. The relationship between the latent variables of insufficient self-control and
psychological distress at high and low levels of avoidance for the non-target group.
Table 16.
RQ2. To what extent does EMS All schemas at the domain and subscale level, except for the entitlement schema, had significant correlations ranging from
activation (at the domain and weak to strong with psychological distress. This suggests that individuals with higher levels of schemas at the domain or
subscale level) relate to subscale level also have higher levels of psychological distress. On the other hand, the entitlement schema did not have a
psychological distress for victims, significant correlation with psychological distress for any group.
targets-only, and non-targets?
RQ3. To what extent do the schema For victims, pleasing significantly moderated the relationship between disconnection and rejection (Domain 1) scores and
coping styles moderate the psychological distress, whereby higher levels of pleasing exacerbated this relationship. No other significant interaction effects
relationship between EMS were found.
activation (at the domain level)
and psychological distress for For targets-only, surrender, avoidance, and pleasing significantly moderated the relationship between disconnection and
victims, targets-only, and non- rejection (Domain 1) and psychological distress. Moreover, avoidance significantly moderated the relationships between
targets? impaired autonomy and performance (Domain 2), self-sacrifice, and overvigilance and inhibition (Domain 5) with
psychological distress. Higher levels of these schema coping styles buffered the relationship between the schema domain
scores and psychological distress.
For non-targets, avoidance significantly moderated the relationship between insufficient self-control and psychological
distress, whereby higher levels of avoidance exacerbated this relationship. No other significant interaction effects were found.
265
Discussion
response option (e.g., open-ended question) or because they choose not to,
that such behaviour is the result of mutual conflict or friendly banter and not
cyberbullying. For example, in a recent study, Doane et al. (2016) reported
that around 96% of emerging adults in their sample reported being victims
of cyberbullying. Doane et al. employed a multiple-item scale that included
21 cyberbullying behaviours, and no cyberbullying definition or “bully” or
“victim” labels were included. It is possible that not all of the behaviours
participants experienced were the result of cyberbullying but without the
ability to clarify their responses this information is unknown. In an attempt
to mitigate this issue, the current study included an open-ended question
after the cyberbullying measures were presented to triangulate the data and
cross-verify the allocation of participants into the target group and ensure
that their experiences were the result of cyberbullying and not other
behaviours (e.g., friendly banter). However, since not all individuals
responded to this question, their answers to the multi-item scale were not
able to be cross-checked and thus the prevalence rates for the target group
may be slightly inflated. Nonetheless, the purpose of presenting the multi-
item cyberbullying scale first, followed by a definition of cyberbullying and
single-item question about victimisation status second, was so that an
overarching target group and subgroup of victims could be captured.
However, order effects may explain as to why the overall prevalence rate
were higher than those obtained by some other past studies.
Past research has treated the overarching target group as
homogenous and used target and victim labels interchangeably, however the
current study extends on this by separating out the target group into
subgroups of victims and targets-only. The prevalence of cyberbullying
victims in the current study was similar to past studies where around 20% to
25% of college students in the United States reported being victims
(Kowalski et al., 2012; Kowalski et al., 2018; MacDonald & Roberts-
Pittman, 2010; Selkie et al., 2016). This result highlights that cyberbullying
268
ended responses, but these did not have an effect on reducing their
psychological distress levels. Perhaps the difference lies not in the usage of
specific coping strategies but in the effectiveness of such strategies where
victims use certain strategies but these do not have the intended effect of
reducing psychological distress. This may result in the use of non-
productive coping strategies that increase psychological distress.
Furthermore, there was also a subset of the target-only group who did
experience behaviour as harmful, but were unclear of the intentions of the
perpetrator and therefore did not identify themselves as victims. With
insufficient data from this target-only subset, it is difficult to offer an
explanation without being speculative. Researchers should consider whether
the absence of repeated behaviours makes it difficult to ascertain intent to
harm, or whether there are personality or other individual differences about
this subset of people who do not label themselves as victims.
RQ 2: To what extent does EMS activation (at the domain and subscale
level) relate to psychological distress for victims, targets-only, and non-
targets?
Before answering the second research question, it is important to
note that: (1) the measurement models differed between the three groups
and (2) victims had higher levels of EMSs compared to targets-only and
non-targets. With regard to the measurement models, the one-factor
congeneric models for the 18 EMSs and five schema coping styles revealed
that there were only minor differences in the factor structures of the EMSs
and most of the coping styles including avoidance, surrender, and retaliation
across the three groups. However, there were substantial differences in
adaptive coping where it was difficult to establish an adequate measurement
model for victims, and for pleasing where the factor structure differed
between targets-only and victims. For adaptive coping, it appears that the
factor structure is limited to individuals who report lower levels of EMS
270
specific event may have occurred 11 months prior to data collection, which
means psychological distress levels may have returned to baseline levels.
Indeed, the written responses to the open-ended question indicated that
participants (especially victims) were very distressed at the time of the
cyberbullying event, but it was not clear how much time had passed since
the event or what impact this had on self-reported distress. Therefore, it is
possible that mean differences in psychological distress levels between
victims and targets-only could be identified closer to the actual event, in
which victims do indeed experience significantly higher levels of
psychological distress than targets-only. Future research should consider
whether to narrow the time interval (i.e., within the past 4 weeks) or collect
event sampling data where psychological distress levels could be captured
closer to the target behaviour. This would also provide further empirical
support for the findings in Study 1, in which participants suggested that it
means something different to be a target-only of cyberbullying (i.e., no
negative effect experienced) versus a victim (i.e., negative effect
experienced).
across these schema domains (and schemas). For instance, it may be that
targets-only use avoidance to prevent being criticised or receiving
disapproval from others, which reduces psychological distress in the short-
term. However, the use of avoidance strategies is not likely to be effective
for repeated coping attempts or in response to high schema activation levels,
both of which are associated with being a victim. In contrast to the use of
avoidance, the coping styles of surrender, pleasing, and retaliation were not
found to moderate the relationships between the other four schemas and
psychological distress. This is surprising given the nature of these other four
schemas, with no clear explanation for this result.
Non-target group. For non-targets, each of the domains were
positively associated with psychological distress, except for the entitlement
schema (within impaired limits domain) which was not found to be
significant. Avoidance did moderate the effect of the insufficient self-
control domain on psychological distress where high levels of avoidance
exacerbated the effect of the schema. According to Young et al. (2003), in
milder forms of this schema, individuals engage in “discomfort avoidance”
in order to avoid conflict or responsibility. However, higher levels of
avoidance could result in anger, frustration, or guilt for not expressing one’s
emotions, resulting in higher levels of psychological distress. No other
coping styles were found to moderate the effects of schemas on
psychological distress. This can be attributed to the low schema activation
levels for non-targets.
Implications
The current study has several important implications. Firstly, this
study highlighted that cyberbullying is common during emerging adulthood
and calls for more research on cyberbullying among this group, especially
since they are known to be large users of technology and emerging
adulthood is a challenging time in identity development (see Arnett, 2000).
276
Chapter Summary
This chapter presented the methods, results, and discussion for Study
3. The results regarding the first research question found that cyberbullying
is prevalent among emerging adults. In particular, 194 (72%) emerging
adults indicated that they had been a target of cyberbullying behaviours,
280
where 127 participants (47% of the sample) reported being targets-only and
67 participants (25% of the sample) identified as victims of cyberbullying.
Coded open-ended responses provided some support for the findings from
Study 1, where most of the target-only group perceived an intention to harm
but were not necessarily harmed by the incident, whilst the majority of
individuals in the victim group not only perceived an intention to harm but
also reported they were harmed by the incident. Descriptive statistics
revealed that victims reported higher levels of activated schemas (at the
domain and subscale level) compared to targets-only and non-targets,
though no mean differences were found in coping styles and psychological
distress between victims and targets-only.
The results for the second research question indicated that all EMSs,
at the domain and subscale levels, with the exception of the entitlement
schema, were shown to be positively associated with psychological distress
for all groups. Moreover, structural equation modelling was used to address
the third research question and revealed that certain schema coping styles
buffered the effect of several schema domains on psychological distress for
targets. In contrast, pleasing had an exacerbating effect on the relationship
between the disconnection and rejection domain and psychological distress
for victims. These differences can be attributed to the intensity of the
schema activation where victims reported higher levels of activated schemas
compared to targets and non-targets. Another possible explanation was that
despite the schema coping styles having the same label, they were
represented by different items. Overall, the findings provide some support
for Young et al.’s (2003) schema theory where it appears schema activation
and schema coping style affect the level of psychological distress
experienced by the different targets (victims and targets-only) of
cyberbullying.
281
CHAPTER 8
GENERAL DISCUSSION
This thesis stems from asking the question, “why do some victims of
cyberbullying experience more severe adverse reactions than others in
response to cyberbullying behaviours?” Although past research has
examined some of the ways in which individuals cope with being
cyberbullied, this has not fully explained the variation in psychological
distress experienced by victims. It was argued that individual differences
such as EMSs may provide a better explanation as to why there are
differences in psychological distress. In this regard, Young et al.’s (2003)
schema theory was used as a theoretical framework to inform a structural
model that tested whether coping has a moderating effect on the relationship
between EMSs (at the domain level) and psychological distress.
The findings from three studies indicate that higher levels of schema
activation are associated with higher psychological distress levels for
targets-only and victims, though the coping styles of targets-only in relation
to schema activation have a different effect on psychological distress
compared with that of victims. In general, whereas the coping styles used by
targets-only buffered the effect of schema activation on psychological
distress, the coping styles employed by victims exacerbated the effect of
schema activation on psychological distress. These differences were
attributed to the level of schema activation where victims reported higher
activation levels compared to targets-only, though it should be noted the
structure of coping styles differed between targets-only and victims. This
chapter will discuss the theoretical, methodological and practical
implications of the research where recommendations for future research and
the concluding remarks are presented.
283
Theoretical Implications
The findings from this research have implications for theory where
the development of a new multifaceted definition of cyberbullying that
included the perspectives of perpetrators, targets, victims, and bystanders
was proposed. Past definitions and measures of cyberbullying have intended
to outline and capture an objective account of the phenomenon, though have
often defined cyberbullying exclusively from a perpetrator’s perspective.
The inclusion of targets, victims, and bystanders into the definition of
cyberbullying provides a more comprehensive and valid understanding of
how different people perceive and/or experience cyberbullying. This
information can be used to explain some of the similarities and differences
in people’s interpretation and responses to cyberbullying behaviour. For
instance, it seems that victims require both an intent to harm and actual
harm for a behaviour to be considered cyberbullying, whilst a target does
not require actual harm to be experienced for a behaviour to be deemed
cyberbullying. Yet, past research tends to collapse these two groups into
one. Separating out targets and victims allows for differences between these
two groups to be explored. Although beyond the scope of the current
research, the multifaceted definition also informs how we might be able to
operationalise cyberbullying and suggests that researchers triangulate data
from the different perspectives in order to produce accurate prevalence
estimates. Incorporating the other perspectives, if possible, can be used to
gain a more comprehensive understanding of the event or situation and
determine whether or not it is in fact cyberbullying.
Secondly, this was one of the very few studies to utilise schema
theory (Young et al., 2003) in a cyberbullying context. This research found
empirical support for the schema model and also extended on the model and
previous research by being the first study to include all five schema
domains, all 18 schemas, all maladaptive coping styles, and a new adaptive
coping style. Previous research has typically focused on the disconnection
284
and rejection domain at the expense of the four other domains, and at the
same time only used a subset of the schemas associated with that particular
domain. However, the current research has not only included all domains
and schemas, each of these was modelled from the perspective of victims,
targets, and non-targets, thus making a significant contribution to the
literature. Five new scales were also designed to measure schema coping
styles in order to develop more parsimonious and psychometrically sound
instruments fit for research. For instance, new avoidance and
overcompensation measures were developed where overcompensation was
separated into two scales, namely retaliation and pleasing. A new measure
of surrender was also developed and found to be reliable, valid, and
importantly distinct from the surrender items on the YSQ where they have
been sourced from in the past (see Young et al., 2003). This means that a
scale measuring surrender as a coping style can now be used in conjunction
with the YSQ. Lastly, an adaptive coping style scale was also developed to
address the absence of an existing adaptive scale in the literature. Taken
together, the current study findings have significant implications for the
existing literature in terms of the structure and measurement of EMSs and
schema coping styles.
Methodological Implications
This thesis has methodological implications for researchers wanting
to study the phenomenon of cyberbullying in understudied populations.
Given the limited research using emerging adult samples, it was important
to place these individuals at the centre of discussions and qualitatively
explore what cyberbullying means to them. By using a mixed methods
research design, focus groups revealed that emerging adults perceived
current definitions of cyberbullying to be too simplistic. Instead how
emerging adults defined cyberbullying was dependent on whether they
adopted a perpetrator, target, victim, or bystander perspective. The
285
qualitative study went a step further than previous studies as the findings
informed the development of a multifaceted definition of cyberbullying,
which incorporated the different perspectives. It also meant that a valid
definition from the victim’s perspective was used in the final quantitative
study and targets-only could be differentiated from, and compared to,
victims. Moreover, the qualitative findings also informed the adaption of the
FCBCVS, which was normed on adolescents, to reflect the cyberbullying
behaviours experienced by emerging adults. Therefore, since the qualitative
study found that there are differences in the way emerging adults define
cyberbullying and uncovered a range of cyberbullying behaviours relevant
to this group, this may also be the case with other understudied populations
(e.g., adults). Hence, it is imperative that mixed methods research designs
where the qualitative phase informs the quantitative phase (e.g., sequential
exploratory design or multi-phase design with the first study being
qualitative) are conducted to ensure that the definition and measures used
are appropriate for the population being studied.
This research provides researchers with insight into some of the
challenges when using pre-existing schema questionnaires (e.g., YSQ,
YRAI, YCI) in a research context. Due to copyright restrictions regarding
the electronic use of Young and colleagues’ scales, only paper
questionnaires can be used. This means that researchers may need a longer
recruitment phase to obtain the required sample size, especially if they are
planning on using advanced statistical techniques where large sample sizes
are needed. The five new schema coping scales developed in this thesis now
enable researchers to use these measures electronically through survey
software such as Qualtrics, whereas the YRAI and YCI cannot be used
electronically. It should also be noted that the questionnaire measuring the
five scales contains half the number of items measuring the YRAI and YCI
combined, which only measure two of the schema coping styles. Therefore,
286
Practical Implications
This research has important practical implications for emerging
adults, practitioners, website administrators, and both educational and
employment contexts.
Emerging adults. The current research has important implications
for emerging adults. The findings highlight for emerging adults that
cyberbullying is not only an adolescent phenomenon but one that concerns
emerging adults too where cyberbullying was found to be just as prevalent
among emerging adults as it is in adolescence. With cyberbullying being
common among emerging adults it is important that these individuals reflect
on their understanding of what cyberbullying means and how their
behaviour in technology-mediated communications can impact others,
including those who the behaviour is intended for as well as those who are
witnesses to such behaviours. More specifically, emerging adults need to be
aware that others differ in how they perceive and interpret the world and
that their behaviour may be perceived as intentional harmful by one person
and not another, despite being the same behaviour. This may have
ramifications in educational, employment and social contexts.
Practitioners. The multifaceted definition provides counsellors and
psychologists with an understanding of how cyberbullying may be
perceived from the different perspectives. For practitioners, victims of
cyberbullying often report being on the receiving end of a behaviour that
was intentional and caused them significant harm. However, the same
behaviour may not result in the same level of harm for targets or interpreted
as intended to be harmful by perpetrators and bystanders. To this end, in a
psychological or clinical context, the victim’s perspective may be of interest
irrespective of whether there was an intention to harm. From this
288
perspective, what matters to the clinician is how the individual perceives the
incident in order to begin reducing psychological distress. However, the
practitioner may also work with the perpetrator to help them understand the
consequences of their actions and develop empathetic responses to deter
future cyberbullying behaviour.
For some victims of cyberbullying, universal approaches such as
education around general coping responses or cyber-specific technological
solutions may be helpful in reducing the cyberbullying situation and any
associated distress. For others, a more individual-focused approach may be
needed to complement other interventions. The findings from this research
help psychologists become more aware of specific EMSs and how certain
coping styles (e.g., pleasing) may exacerbate the effects of EMSs. As such,
other treatments like schema therapy (ST) may be a suitable intervention for
some individuals in order to weaken EMSs, build more adaptive schemas,
and change the maladaptive coping styles that perpetuate EMSs (Young et
al., 2003).
Website administrators. It is important for website or page
administrators are aware that cyberbullying is not a single construct and
individuals define it differently. For instance, emerging adults described
many instances on StalkerSpace where it is difficult to determine whether
an incident is cyberbullying or not, and from the perpetrator’s perspective it
could be intended as a harmless joke, but from the target/victim perspective
it could be perceived as intentional and harmful. Therefore, while there can
be clear instances of serious cyberbullying, in other cases it can be difficult
for an administrator or users of the website to determine if a situation is
objectively cyberbullying as it can be subjective. It has also been reported
that social media companies and website administrators are at times slow to
respond to requests or reluctant to take down offensive material that do not
align with their cyberbullying policies, which are framed from a legal
standpoint (Katz et al., 2014). As such, the findings from this research
289
Concluding Remarks
Perhaps we have been looking at cyberbullying through the lens of a
maladaptive schema. What this means is that we have attended to some
variables but not others. For instance, the focus of past research has been on
general coping styles and technological solutions that individuals use to
cope with cyberbullying and ignored other variables that may explain the
more severe adverse reactions experienced by some individuals and not
others. In this case, schema therapy would ask: (1) how can we think about
it differently? (2) what can we do that is different? and (3) what do we need
to imagine when moving forward?
Firstly, we need to challenge our thinking by examining the
evidence. The evidence from this thesis suggests that EMSs and how
individuals cope with activated schemas is one mechanism that can explain
variation in the reactions experienced by targets of cyberbullying. For
instance, overcompensating by pleasing was found to exacerbate the
relationship between disconnection and rejection and psychological distress
for victims of cyberbullying. Therefore, we may need to take a more
individual-focused approach when trying to explain variations in
psychological distress. It is also important to acknowledge here that focus
group data found that emerging adults perceive cyberbullying to be a
multifaceted construct and not a single one. Researchers need to be aware
that their participants may perceive cyberbullying differently to how it is
commonly defined, and this has implications for the interpretation of results
from research studies and the development of interventions and programs.
To this end, it is hoped that this research challenges current thinking on how
cyberbullying is defined and highlights the importance of implementing
research methodologies where laypeople’s views inform the definition.
291
References
Baranoff, J., Oei, T. P. S., Cho, S. H., & Kwon, S. M. (2006). Factor
structure and internal consistency of the Young Schema
Questionnaire (Short Form) in Korean and Australian samples.
Journal of Affective Disorders, 93, 133–140.
doi:10.1016/j.jad.2006.03.003
Barlińska, J., Szuster, A., & Winiewski, M. (2013). Cyberbullying among
adolescent bystanders: Role of the communication medium, form of
violence, and empathy. Journal of Community & Applied Social
Psychology, 23, 37–51. doi:10.1002/casp.2137
Barlett, C. P., & Gentile, D. A. (2012). Attacking others online: The
formation of cyberbullying in late adolescence. Psychology of
Popular Media Culture, 1, 123–135. doi:10.1037/a0028113
Baron, R. M., & Kenny, D. A. (1986). The moderator–mediator variable
distinction in social psychological research: Conceptual, strategic,
and statistical considerations. Journal of Personality and Social
Psychology, 51, 1173–1182. doi:10.1037/0022-3514.51.6.1173
Barry, C. M., Madsen, S. D., Nelson, L. J., Carroll, J. S., & Badger, S.
(2009). Friendship and romantic relationship qualities in emerging
adulthood: Differential associations with identity development and
achieved adulthood criteria. Journal of Adult Development, 16, 209–
222. doi:10.1007/s10804-009-9067-x
Bartlett, F.C. (1932). Remembering: A study in experimental and social
psychology. Cambridge, England: Cambridge University Press.
Bauman, S., & Newman, M. L. (2013). Testing assumptions about
cyberbullying: Perceived distress associated with acts of
conventional and cyber bullying. Psychology of Violence, 3, 27–38.
doi:10.1037/a0029867
295
Bollen, KA. (1989). Structural equation models with latent variables. New
York, New York: John Wiley & Sons.
Bonanno, R. A., & Hymel, S. (2013). Cyber bullying and internalizing
difficulties: Above and beyond the impact of traditional forms of
bullying. Journal of Youth and Adolescence, 42, 685–697.
doi:10.1007/s10964-013-9937-1
Boulton, M., Lloyd, J., Down, J., & Marx, H. (2012). Predicting
undergraduates' self-reported engagement in traditional and
cyberbullying from attitudes. Cyberpsychology, Behavior, and
Social Networking, 15, 141-147. doi:10.1089/cyber.2011.0369
Bowen, N. K., & Masa, R. D. (2015). Conducting measurement invariance
tests with ordinal data: A guide for social work researchers. Journal
of the Society for Social Work and Research, 6, 229–249.
doi:10.1086/681607
Bowling, A. (2005). Just one question: If one question works, why ask
several?. Journal of Epidemiology & Community Health, 59, 342-
345. doi:10.1136/jech.2004.021204
Brack, K., & Caltabiano, N. (2014). Cyberbullying and self-esteem in
Australian adults. Cyberpsychology: Journal of Psychosocial
Research on Cyberspace, 8, 12-22. doi:10.5817/cp2014-2-7
Bradley, C., Todd, C., Gorton, T., Symonds, E., Martin, A., & Plowright, R.
(1999). The development of an individualized questionnaire measure
of perceived impact of diabetes on quality of life: The ADDQoL.
Quality of Life Research, 8(1-2), 79-91.
doi:10.1023/a:1026485130100
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology.
Qualitative Research in Psychology, 3, 77-101.
doi:10.1191/1478088706qp063oa
297
Briggs, S. R., & Cheek, J. M. (1986). The role of factor analysis in the
development and evaluation of personality scales. Journal of
Personality, 54, 106–148. doi:10.1111/j.1467-6494.1986.tb00391.x
Brown, T. A. (2006). Confirmatory factor analysis for applied research.
New York, New York: The Guilford Press.
Bryce, J., & Fraser, J. (2013). “It's common sense that it's wrong”: Young
people's perceptions and experiences of cyberbullying.
Cyberpsychology, Behavior, and Social Networking, 16, 783-787.
doi:10.1089/cyber.2012.0275
Buelga, S., Cava, M. J., Musitu, G., & Torralba, E. (2015). Cyberbullying
aggressors among Spanish secondary education students: An
exploratory study. Interactive Technology and Smart Education, 12,
100–115. doi:10.1108/itse-08-2014-0025
Byrne, B. M. (2001). Structural equation modeling with AMOS: Basic
concepts, applications, and programming. Mahwah, New Jersey:
Lawrence Erlbaum Associates
Byrne, B. M. (2012). Structural equation modeling with Mplus: Basic
concepts, applications, and programming. New York: Routledge
Calvete, E., Estévez, A., López de Arroyabe, E., & Ruiz, P. (2005). The
Schema Questionnaire - Short Form. European Journal of
Psychological Assessment, 21, 90–99. doi:10.1027/1015-
5759.21.2.90
Calvete, E., Fernández-González, L., González-Cabrera, J. M., & Gámez-
Guadix, M. (2017). Continued bullying victimization in adolescents:
Maladaptive schemas as a mediational mechanism. Journal of Youth
and Adolescence, 47, 650–660. doi:10.1007/s10964-017-0677-5
298
Calvete, E., Orue, I., & Hankin, B. L. (2014). A longitudinal test of the
vulnerability-stress model with early maladaptive schemas for
depressive and social anxiety symptoms in adolescents. Journal of
Psychopathology and Behavioral Assessment, 37, 85–99.
doi:10.1007/s10862-014-9438-x
Calvete, E., Orue, I., & González-Diez, Z. (2013). An examination of the
structure and stability of early maladaptive schemas by means of the
Young Schema Questionnaire-3. European Journal of Psychological
Assessment, 29, 283–290. doi:10.1027/1015-5759/a000158
Calvete, E., Orue, I., & Gámez-Guadix, M. (2016). Cyberbullying
victimization and depression in adolescents: The mediating role of
body image and cognitive schemas in a one-year prospective
study. European Journal on Criminal Policy and Research, 22, 271-
284. doi:10.1007/s10610-015-9292-8
Cámara, M., & Calvete, E. (2012). Early maladaptive schemas as
moderators of the impact of stressful events on anxiety and
depression in university students. Journal of Psychopathology and
Behavioral Assessment, 34, 58-68. doi:10.1007/s10862-011-9261-6
Campbell, M. A. (2005). Cyber bullying: An old problem in a new
guise? Journal of Psychologists and Counsellors in Schools, 15, 68-
76. doi:10.1375/ajgc.15.1.68
Campbell, M., & Bauman, S. (2018) Cyberbullying: Definition,
consequences, prevalence. In S. Bauman, & M. Campbell (Eds.),
Reducing cyberbullying in schools (1st Edition): International
evidence-based best practices (pp. 3-16). Academic Press, United
Kingdom.
299
Campbell, M. A., Spears, B., Slee, P., Butler, D., & Kift, S. (2012).
Victims’ perceptions of traditional and cyberbullying, and the
psychosocial correlates of their victimisation. Emotional and
Behavioural Difficulties, 17, 389-401.
doi:10.1080/13632752.2012.704316
Campbell, M. A., Cross, D., Spears, B., & Slee, P. (2010). Cyberbullying:
Legal implications for schools. The Centre for Strategic Education,
118. Retrieved from
https://eprints.qut.edu.au/40772/1/COVERSHEETC40772.pdf
Campbell, M. A., Whiteford, C., & Hooijer, J. (2018). Teachers’ and
parents’ understanding of traditional and cyberbullying. Journal of
School Violence, 18, 388-402. doi:10.1080/15388220.2018.1507826
Carlucci, L., D’Ambrosio, I., Innamorati, M., Saggino, A., & Balsamo, M.
(2018). Co-rumination, anxiety, and maladaptive cognitive schemas:
When friendship can hurt. Psychology Research and Behavior
Management, 11, 133. doi:10.2147/prbm.s144907
Carver, C. S. (1997). You want to measure coping but your protocol’s too
long: Consider the Brief Cope. International Journal of Behavioral
Medicine, 4, 92–100. doi:10.1207/s15327558ijbm0401_6
Carver, C. S., Scheier, M. F., & Weintraub, J. K. (1989). Assessing coping
strategies: A theoretically based approach. Journal of Personality
and Social Psychology, 56, 267–283. doi:10.1037/0022-
3514.56.2.267
Cassidy, W., Faucher, C., & Jackson, M. (Eds.). (2018). Cyberbullying at
university in international context. Oxford, United Kingdom:
Routledge.
300
Cecero, J. J., Beitel, M., & Prout, T. (2008). Exploring the relationships
among early maladaptive schemas, psychological mindedness and
self‐reported college adjustment. Psychology and Psychotherapy:
Theory, Research and Practice, 81, 105-118.
doi:10.1348/147608307x216177
Cénat, J. M., Hébert, M., Blais, M., Lavoie, F., Guerrier, M., & Derivois, D.
(2014). Cyberbullying, psychological distress and self-esteem
among youth in Quebec schools. Journal of Affective Disorders,
169, 7–9. doi:10.1016/j.jad.2014.07.019
Cénat, J. M., Smith, K., Hébert, M., & Derivois, D. (2019).
Cybervictimization and suicidality among French undergraduate
students: A mediation model. Journal of Affective Disorders, 249,
90-95. doi: 10.1016/j.jad.2019.02.026
Chandrashekhar, A. M., Muktha, G. S., & Anjana, D. K. (2016).
Cyberstalking and cyberbullying: Effects and prevention measures.
Imperial Journal of Interdisciplinary Research, 2(3), 95-102.
Retrieved from: http://www.onlinejournal.in/IJIRV2I3/017.pdf
Cheema, J. R. (2014). A review of missing data handling methods in
education research. Review of Educational Research, 84, 487-508.
doi:10.3102/0034654314532697
Christensen, L. B., Johnson, B., Turner, L. (2015). Research methods,
design, and analysis (12th ed.). Edinburgh Gate: Pearson Education.
Clark, L. A., & Watson, D. (1995). Constructing validity: Basic issues in
objective scale development. Psychological Assessment, 7, 309–319.
doi:10.1037/1040-3590.7.3.309
Conway, J. M., & Huffcutt, A. I. (2003). A review and evaluation of
exploratory factor analysis practices in organizational research.
Organizational Research Methods, 6, 147–168.
doi:10.1177/1094428103251541
301
Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance
structure analysis: Conventional criteria versus new alternatives.
Structural Equation Modeling: A Multidisciplinary Journal, 6, 1–55.
doi:10.1080/10705519909540118
Hurley, A. E., Scandura, T. A., Schriesheim, C. A., Brannick, M. T., Seers,
A., Vandenberg, R. J., & Williams, L. J. (1997). Exploratory and
confirmatory factor analysis: Guidelines, issues, and alternatives.
Journal of Organizational Behavior, 18, 667-683.
doi:10.1002/(SICI)1099-1379(199711)18:6<667::AID-
JOB874>3.0.CO;2-T
Iacobucci, D. (2010). Structural equations modeling: Fit indices, sample
size, and advanced topics. Journal of Consumer Psychology, 20, 90-
98. doi:10.1016/j.jcps.2009.09.003
Jack, E. P., & Raturi, A. S. (2006). Lessons learned from methodological
triangulation in management research. Management Research
News, 29, 345-357. doi:10.1108/01409170610683833
Jenaro, C., Flores, N., & Frías, C. P. (2018). Systematic review of empirical
studies on cyberbullying in adults: What we know and what we
should investigate. Aggression and Violent Behavior, 38, 113–122.
doi:10.1016/j.avb.2017.12.003
Johanson, G. A., & Brooks, G. P. (2010). Initial scale development: Sample
size for pilot studies. Educational and Psychological
Measurement, 70, 394-400. doi:10.1177/0013164409355692
Johnson, R. B. (1997). Examining the validity structure of qualitative
research. Education, 118(2), 282-292. Retrieved from:
https://www.researchgate.net/profile/R_Johnson3/publication/24612
6534_Examining_the_Validity_Structure_of_Qualitative_Research/l
inks/54c2af380cf219bbe4e93a59.pdf
311
Kanetsuna, T., Smith, P. K., & Morita, Y. (2006). Coping with bullying at
school: Children's recommended strategies and attitudes to school‐
based interventions in England and Japan. Aggressive Behavior:
Official Journal of the International Society for Research on
Aggression, 32(6), 570-580.
Karaosmanoğlu, H. A., Soygüt, G., & Kabul, A. (2013). Psychometric
properties of the Turkish Young Compensation Inventory. Clinical
Psychology & Psychotherapy, 20, 171–179. doi:10.1002/cpp.787
Katz, I., Keeley, M., Spears, B., Taddeo, C., Swirski, T., & Bates, S. (2014).
Research on youth exposure to, and management of, cyberbullying
incidents in Australia: Synthesis report (SPRC Report 16/2014).
Sydney: Social Policy Research Centre, UNSW Australia.
Katzer, C. (2009). Cyberbullying in Germany. Journal of Psychology, 217,
222–223. doi:10.1027/0044-3409.217.4.222
Kittinger, R., Correia, C. J., & Irons, J. G. (2012). Relationship between
Facebook use and problematic Internet use among college students.
Cyberpsychology, Behavior, and Social Networking, 15, 324-327.
doi:10.1089/cyber.2010.0410
Kitzinger, J. (1994). The methodology of focus groups: The importance of
interaction between research participants. Sociology of Health and
Illness, 16, 103–121. doi:10.1111/1467-9566.ep11347023
Kishton, J. M., & Widaman, K. F. (1994). Unidimensional versus domain
representative parceling of questionnaire items: An empirical
example. Educational and Psychological Measurement, 54, 757-
765. doi:10.1177/0013164494054003022
Klein, A., & Moosbrugger, H. (2000). Maximum likelihood estimation of
latent interaction effects with the LMS method. Psychometrika, 65,
457–474. doi:10.1007/bf02296338
Kline, R. B. (2011). Principles and practice of structural equation
modeling (3rd ed.). New York, New York: Guilford Publications
313
Kraft, E., & Wang, J. (2010). An exploratory study of the cyberbullying and
cyberstalking experiences and factors related to victimization of
students at a public liberal arts college. International Journal of
Technoethics, 1, 74–91. doi:10.4018/jte.2010100106
Kriston, L., Schäfer, J., Jacob, G. A., Härter, M., & Hölzel, L. P. (2013).
Reliability and validity of the German version of the Young Schema
Questionnaire–Short Form 3 (YSQ-S3). European Journal of
Psychological Assessment, 29, 205–212. doi:10.1027/1015-
5759/a000143
Krosnick, J. A. (1999). Survey research. Annual Review of Psychology, 50,
537–567. doi:10.1146/annurev.psych.50.1.537
Krueger, R. A., & Casey, M. A. (2009). Focus groups: A practical guide for
applied research (4th ed). Thousand Oaks, California: SAGE
Publications, Inc.
Kuiper, N. A., Martin, R. A., & Olinger, L. J. (1993). Coping humour,
stress, and cognitive appraisals. Canadian Journal of Behavioural
Science, 25, 81–96. doi:10.1037/h0078791
Langos, C. (2012). Cyberbullying: The challenge to define.
Cyberpsychology, Behavior, and Social Networking, 15, 285-289.
doi:10.1089/cyber.2011.0588
Lazarus, R. S., & Folkman, S. (1984). Stress, appraisal, and coping. New
York: New York. Springer Publishing Company, Inc.
Lee, E. B. (2017). Cyberbullying: Prevalence and predictors among African
American young adults. Journal of Black Studies, 48, 57-73.
doi:10.1177/0021934716678393
Lee, C. W., Taylor, G., & Dunn, J. (1999). Factor structure of the schema
questionnaire in a large clinical sample. Cognitive Therapy and
Research, 23, 441-451. doi:10.1023/a:1018712202933
315
Luck, A., Waller, G., Meyer, C., Ussher, M., & Lacey, H. (2005). The role
of schema processes in the eating disorders. Cognitive Therapy and
Research, 29, 717–732. doi:10.1007/s10608-005-9635-8
MacCallum, R. C., Browne, M. W., & Sugawara, H. M. (1996). Power
analysis and determination of sample size for covariance structure
modeling. Psychological Methods, 1, 130–149. doi:10.1037/1082-
989x.1.2.130
MacCallum, R. C., Widaman, K. F., Zhang, S., & Hong, S. (1999). Sample
size in factor analysis. Psychological Methods, 4, 84–99.
doi:10.1037/1082-989x.4.1.84
MacDonald, C. D., & Roberts-Pittman, B. (2010). Cyberbullying among
college students: Prevalence and demographic differences. Procedia-
Social and Behavioral Sciences, 9, 2003-2009.
doi:10.1016/j.sbspro.2010.12.436
Machackova, H., Cerna, A., Sevcikova, A., Dedkova, L., & Daneback, K.
(2013). Effectiveness of coping strategies for victims of
cyberbullying. Cyberpsychology: Journal of Psychosocial Research
on Cyberspace, 7. doi:10.5817/cp2013-3-5
Machmutow, K., Perren, S., Sticca, F., & Alsaker, F. D. (2012). Peer
victimisation and depressive symptoms: Can specific coping
strategies buffer the negative impact of cybervictimisation?
Emotional and Behavioural Difficulties, 17, 403–420.
doi:10.1080/13632752.2012.704310
Mairet, K., Boag, S., & Warburton, W. (2014). How important is
temperament? The relationship between coping styles, early
maladaptive schemas and social anxiety. International Journal of
Psychology and Psychological Therapy, 14(2), 171-190. Retrieved
from:
https://pdfs.semanticscholar.org/aeb6/0a7d76c750f7563f35be491cf2
812fe11bee.pdf
318
Na, H., Dancy, B. L., & Park, C. (2015). College student engaging in
cyberbullying victimization: Cognitive appraisals, coping strategies,
and psychological adjustments. Archives of Psychiatric Nursing, 29,
155-161. doi:10.1016/j.apnu.2015.01.008
Naruskov, K., Luik, P., Nocentini, A., & Menesini, E. (2012). Estonian
students' perception and definition of cyberbullying. Trames: A
Journal of the Humanities and Social Sciences, 16, 323.
doi:10.3176/tr.2012.4.02
Navarro, R., Yubero, S., Larrañaga, E., & Martínez, V. (2012). Children’s
cyberbullying victimization: Associations with social anxiety and
social competence in a Spanish sample. Child Indicators Research,
5, 281–295. doi:10.1007/s12187-011-9132-4
Naylor, P., Cowie, H., Cossin, F., de Bettencourt, R., & Lemme, F. (2006).
Teachers’ and pupils’ definitions of bullying. British Journal of
Educational Psychology, 76, 553–576.
doi:10.1348/000709905X52229
Nederhof, A. J. (1985). Methods of coping with social desirability bias: A
review. European Journal of Social Psychology, 15, 263-280.
doi:10.1002/ejsp.2420150303
Netemeyer, R. G., Bearden, W. O., & Sharma, S. (2003). Scaling
procedures: Issues and applications. Thousand Oaks, California:
SAGE Publications, Inc.
Nevitt, J., & Hancock, G. R. (2004). Evaluating small sample approaches
for model test statistics in structural equation modelling.
Multivariate Behavioral Research, 39, 439-478.
doi:10.1207/s15327906mbr3903_3
Newman, D. A. (2014). Missing data: Five practical guidelines.
Organizational Research Methods, 17, 372-411.
doi:10.1177/1094428114548590
322
Pendergast, L. L., von der Embse, N., Kilgus, S. P., & Eklund, K. R. (2017).
Measurement equivalence: A non-technical primer on categorical
multi-group confirmatory factor analysis in school
psychology. Journal of School Psychology, 60, 65–82.
doi:10.1016/j.jsp.2016.11.002
Pereda, N., Forns, M., & Peró, M. (2007). Dimensional structure of the
Brief Symptom Inventory with Spanish college
students. Psicothema, 19(4), 634-639. Retrieved from:
https://www.redalyc.org/pdf/727/72719415.pdf
Pepler, D. J., & Slaby, R. G. (1994). Theoretical and developmental
perspectives on youth and violence. In L. D. Eron, J. H. Gentry, & P.
Schlegel (Eds.), Reason to hope: A psychosocial perspective on
violence & youth (pp. 27-58). doi:10.1037/10164-001
Perren, S., & Gutzwiller-Helfenfinger, E. (2012). Cyberbullying and
traditional bullying in adolescence: Differential roles of moral
disengagement, moral emotions, and moral values. European
Journal of Developmental Psychology, 9, 195-209.
doi:10.1080/17405629.2011.643168
Peterson, M., & Maier, S. F, & Seligman, M. E. P., (1993). Learned
helplessness: A theory for the age of personal control. New York,
New York: Oxford University Press.
Peugh, J. L., & Enders, C. K. (2004). Missing data in educational research:
A review of reporting practices and suggestions for improvement.
Review of Educational Research, 74, 525-556.
doi:10.3102/00346543074004525
Phizacklea, T., & Sargisson, R. J. (2018). The cyberbullying experiences
survey with New Zealand psychology students. International
Journal of Psychology & Behavior Analysis, 4, 1-6. doi:
10.15344/2455-3867/2018/146
326
Riso, L. P., Froman, S. E., Raouf, M., Gable, P., Maddux, R. E., Turini-
Santorelli, N., ... & Cherry, M. (2006). The long-term stability of
early maladaptive schemas. Cognitive Therapy and Research, 30,
515-529. doi:10.1007/s10608-006-9015-z
Riso, L. P., & McBride, C. (2007). Introduction: A return to a focus on
cognitive schemas. In L. P. Riso, P. L. du Toit, D. J. Stein, & J. E.
Young (Eds.), Cognitive schemas and core beliefs in psychological
problems: A scientist-practitioner guide (pp. 3-9). Washington, DC,
US: American Psychological Association.
Roth, S., & Cohen, L. J. (1986). Approach, avoidance, and coping with
stress. American Psychologist, 41, 813. doi:10.1037/0003-
066X.41.7.813
Rothbaum, F., Weisz, J. R., & Snyder, S. S. (1982). Changing the world and
changing the self: A two-process model of perceived
control. Journal of Personality and Social Psychology, 42, 5–37.
doi:10.1037/0022-3514.42.1.5
Sakulsriprasert, C., Phukao, D., Kanjanawong, S., & Meemon, N. (2016).
The reliability and factor structure of Thai Young Schema
Questionnaire-Short Form 3. Asian Journal of Psychiatry, 24, 85-90.
doi:10.1016/j.ajp.2016.09.011
Saggino, A., Balsamo, M., Carlucci, L., Cavalletti, V., Sergi, M. R., da
Fermo, G., ... & Tommasi, M. (2018). Psychometric properties of
the Italian version of the Young Schema Questionnaire l-3:
Preliminary results. Frontiers in Psychology, 9, 312.
doi:10.3389/fpsyg.2018.00312
Sari, S. V. (2016). Was it just joke? Cyberbullying perpetrations and their
styles of humor. Computers in Human Behavior, 54, 555–559.
doi:10.1016/j.chb.2015.08.053
Saris, W. E., & Gallhofer, I. N. (2014). Design, evaluation, and analysis of
questionnaires for survey research. John Wiley & Sons.
329
Spears, B., Slee, P., Owens, L., & Johnson, B. (2009). Behind the scenes
and screens: Insights into the human dimension of covert and
cyberbullying. Journal of Psychology, 217, 189-196.
doi:10.1027/0044-3409.217.4.189
Spector, P. E. (1992). Summated rating scale construction: An introduction.
Newbury Park, California: SAGE Publications, Inc.
Spranger, S. C., Waller, G., & Bryant-Waugh, R. (2001). Schema avoidance
in bulimic and non-eating-disordered women. International Journal
of Eating Disorders, 29, 302–306. doi:10.1002/eat.1022
Solberg, M. E., & Olweus, D. (2003). Prevalence estimation of school
bullying with the Olweus Bully/Victim Questionnaire. Aggressive
Behavior: Official Journal of the International Society for Research
on Aggression, 29(3), 239-268. doi:10.1002/ab.10047
Soygüt, G., Karaosmanoğlu, A., & Çakir, Z. (2009). Assessment of early
maladaptive schemas: A psychometric study of the Turkish Young
Schema Questionnaire-Short Form-3. Turkish Journal of Psychiatry,
20(1), 75-84. Retrieved from:
http://www.turkpsikiyatri.com/C20S1/en/75-84.pdf
Staude-Müller, F., Hansen, B., & Voss, M. (2012). How stressful is online
victimization? Effects of victim's personality and properties of the
incident. European Journal of Developmental Psychology, 9, 260-
274. doi:10.1080/17405629.2011.643170
Steptoe, A. (2019). Happiness and health. Annual Review of Public Health,
40, 339–359. doi:10.1146/annurev-publhealth-040218-044150
Stevens, J. (1992). Applied multivariate statistics for the social sciences (2nd
ed.), Hillsdale, New Jersey: Lawrence Erlbaum.
Sticca, F., & Perren, S. (2013). Is cyberbullying worse than traditional
bullying? Examining the differential roles of medium, publicity, and
anonymity for the perceived severity of bullying. Journal of Youth
Adolescence, 42, 739-750. doi:10.1007/s10964-012-9867-3
333
Wang, X., Yang, L., Yang, J., Wang, P., & Lei, L. (2017). Trait anger and
cyberbullying among young adults: A moderated mediation model
of moral disengagement and moral identity. Computers in Human
Behavior, 73, 519-526. doi:10.1016/j.chb.2017.03.073
Waller, G., Meyer, C., & Ohanian, V. (2001). Psychometric properties of
the long and short versions of the Young Schema Questionnaire:
Core beliefs among bulimic and comparison women. Cognitive
Therapy and Research, 25, 137-147. doi:10.1023/A:1026487018110
Wegge, D., Vandebosch, H., Eggermont, S., Van Rossem, R., & Walrave,
M. (2016). Divergent perspectives: Exploring a multiple informant
approach to cyberbullying victimization and perpetration. European
Journal on Criminal Policy and Research, 22, 235-251.
doi:10.1007/s10610-015-9287-5
Welburn, K., Coristine, M., Dagg, P., Pontefract, A., & Jordan, S. (2002).
The Schema Questionnaire—Short Form: Factor analysis and
relationship between schemas and symptoms. Cognitive Therapy
and Research, 26, 519-530. doi:10.1023/a:1016231902020
Weng, L. J. (2004). Impact of the number of response categories and anchor
labels on coefficient alpha and test-retest reliability. Educational and
Psychological Measurement, 64, 956–972.
doi:10.1177/0013164404268674
West, S. G., Finch, J. F., & Curran, P. J. (1995). Structural equation models
with nonnormal variables: Problems and remedies. In R. H. Hoyle
(Ed.), Structural equation modeling: Concepts, issues, and
applications (pp. 56-75). Thousand Oaks, California: SAGE
Publications, Inc.
Weston, R., & Gore, P. A. (2006). A brief guide to structural equation
modeling. The Counseling Psychologist, 34, 719–751.
doi:10.1177/0011000006286345
337
I refer to the ethical review of the above project protocol undertaken by a SUHREC Subcommittee
(SHESC3). Your responses to the review, as e-mailed on 21 February 2014, were put to a delegate for
consideration.
I am pleased to advise that, as submitted to date, the project may proceed in line with standard on-going
ethics clearance conditions here outlined.
- All human research activity undertaken under Swinburne auspices must conform to Swinburne and
external regulatory standards, including the current National Statement on Ethical Conduct in Human
Research and with respect to secure data use, retention and disposal.
- The named Swinburne Chief Investigator/Supervisor remains responsible for any personnel appointed to
or associated with the project being made aware of ethics clearance conditions, including research and
consent procedures or instruments approved. Any change in chief investigator/supervisor requires timely
notification and SUHREC endorsement.
- The above project has been approved as submitted for ethical review by or on behalf of SUHREC.
Amendments to approved procedures or instruments ordinarily require prior ethical appraisal/ clearance.
SUHREC must be notified immediately or as soon as possible thereafter of (a) any serious or unexpected
adverse effects on participants and any redress measures; (b) proposed changes in protocols; and (c)
unforeseen events which might affect continued ethical acceptability of the project.
- At a minimum, an annual report on the progress of the project is required as well as at the conclusion
(or abandonment) of the project.
- A duly authorised external or internal audit of the project may be undertaken at any time.
Yours sincerely,
Ann
_____________________________________
Dr Ann Gaeth
Executive Officer (Research)
Swinburne Research (H68)
Swinburne University of Technology
P O Box 218
HAWTHORN VIC 3122
Ph +61 3 9214 8356
341
We are asking for university students and young adults from the
wider community aged between 18 and 25 years to participate in
focus groups that will discuss general observations and opinions of
cyberbullying. Each focus group will take approximately 60 minutes to
complete and participants are only required to attend one focus group. These
focus groups will be conducted at Swinburne University of Technology,
Hawthorn campus. If you are interested in participating in this research project,
please express your interest via the email provided below.
Alexandra Alipan
Doctor of Philosophy (PhD) Student
aalipan@swin.edu.au
342
We are inviting university students and young adults from the wider community aged between
18 and 25 years to participate in a semi-structured focus group. If you are interested in
participating in this research project, please contact the main student investigator via the
email provided at the end. The main student investigator will liaise with participants to
organise a time to attend a focus group. Participants will be notified of the day, time, and
location of the focus group via email. A reminder email will be sent to participants one week
before the session, containing details of the focus group.
By undertaking this study, focus groups will give young adults the opportunity to explain their
answers in detail. This method can also help the researchers consider new and previously
unconsidered aspects of the cyberbullying phenomenon. Once all the focus groups are
completed they will be reviewed for common themes.
Potential benefits to participants include providing young adults with some insight into their own use of
information and communication technologies, what cyberbullying is and the behaviours considered to be
cyberbullying, how it may affect individuals, as well as some positive and negative coping strategies to
deal with perpetrators.
Research output
This research will form the requirements for the Doctor of Philosophy (Arts, Humanities and Social
Sciences) program. It is expected that this research will result in a presentation at a national or
international conference. It is also anticipated that at least one article describing the findings will be
published in an academic journal. Participants’ responses may be used in the write up of the thesis and in
publications, however participants will be de-identified.
344
• Alexandra Alipan, Main Student Investigator, Faculty of Health, Arts and Design,
Swinburne University of Technology, on (03) 9241 8900 or at aalipan@swin.edu.au
• Dr. Jason Skues, Supervising Investigator, Faculty of Health, Arts and Design, Swinburne
University of Technology, on (03) 9241 4497 or at jskues@swin.edu.au
• Associate Professor Stephen Theiler, Supervising Investigator, Faculty of Health, Arts and
Design, Swinburne University of Technology, on (03) 9241 5002 or at
stheiler@swin.edu.au
This project has been approved by or on behalf of Swinburne’s Human Research Ethics
Committee (SUHREC) in line with the National Statement on Ethical Conduct in Human
Research. If you have any concerns or complaints about the conduct of this project, you can
contact:
Research Ethics Officer, Swinburne Research (H68),
Swinburne University of Technology, P O Box 218, HAWTHORN VIC 3122.
Tel (03) 9214 5218 or +61 3 9214 5218 or resethics@swin.edu.au
345
This research is being undertaken due to the number of flaws in the current cyberbullying literature. One of which is
limited research with young adults. This study will address the gaps in the literature by today discussing what
cyberbullying means to you all as young adults. Your responses will help us as researchers gain a deeper
understanding about cyberbullying and what it means, as well as how people should cope when being cyberbullied.
Hopefully today will be beneficial for you too. From the discussions today, we hope we provide you with some
insight into your own use of information and communication technologies, what cyberbullying is and behaviours
considered to be cyberbullying, how it may affect an individual, as well as some positive and negative coping
strategies to deal with bullies.
The interview will take around 60 minutes. Alexandra will be taking some hand-written notes and audio recording
the session. This because we don’t want to miss any of your comments and we want to be as accurate as possible.
All responses will be kept confidential. This means that your responses will only be shared with researchers of this
study and we will ensure that any information we include in our report does not identify you as the respondent.
It is important for you to remember that (a) your participation in a focus group is voluntary; (b) all reported data will
be de-identified; (c) you are free to withdraw from the study at any time and without explanation; and (d) you are
free to abstain from any questions you do not wish to answer. If you feel distressed during or after the session you
can speak to the facilitator who is a clinical and counselling psychologist or refer to the Consent Information
Statement, which provides services for both Swinburne students and non-Swinburne students. We will not ask about
personal experiences of cyberbullying, and ask that you refrain from mentioning personal experiences.
• Ten minutes before end of session tell participants the session is coming to a close
• Is there anything anyone would like to add?
• Let participants know that if they are feeling distressed they are welcome to speak to Steve or alternatively refer
to the consent information statement for mental health resources they can contact.
• Thank participants for their time
• Hand out debriefing form to REP students
346
SHR Project 2014/268 The Development and Validation of an Adapted Measure of Schema Coping
A/Prof. Stephen Theiler, Ms Alexandra Alipan, Dr Jason Skues - FHAD
Approved duration: 09-04-2015 to 08-04-2016 [adjusted]
I refer to the ethical review of the above project protocol by a Subcommittee (SHESC1) of Swinburne’s
Human Research Ethics Committee (SUHREC). Your responses to the review, as per the emails sent on
09 December 2014 and 01 April 2015, were put to the Subcommittee delegate for consideration.
I am pleased to advise that, as submitted to date, the project may proceed in line with standard on-
going ethics clearance conditions here outlined.
- All human research activity undertaken under Swinburne auspices must conform to Swinburne and external
regulatory standards, including the current National Statement on Ethical Conduct in Human Research and with
respect to secure data use, retention and disposal.
- The named Swinburne Chief Investigator/Supervisor remains responsible for any personnel appointed to or
associated with the project being made aware of ethics clearance conditions, including research and consent
procedures or instruments approved. Any change in chief investigator/supervisor requires timely notification and
SUHREC endorsement.
- The above project has been approved as submitted for ethical review by or on behalf of SUHREC. Amendments
to approved procedures or instruments ordinarily require prior ethical appraisal/clearance. SUHREC must be
notified immediately or as soon as possible thereafter of (a) any serious or unexpected adverse effects on
participants any redress measures; (b) proposed changes in protocols; and (c) unforeseen events which might
affect continued ethical acceptability of the project.
- At a minimum, an annual report on the progress of the project is required as well as at the conclusion (or
abandonment) of the project. Information on project monitoring, self-audits and progress reports can be found
at: http://www.research.swinburne.edu.au/ethics/human/monitoringReportingChanges/
- A duly authorised external or internal audit of the project may be undertaken at any time.
Please contact the Research Ethics Office if you have any queries about on-going ethics clearance. The
SHR project number should be quoted in communication. Researchers should retain a copy of this email
as part of project recordkeeping.
Yours sincerely,
Astrid Nordmann
SHESC1 Secretary
----------------------------------------------
Dr Astrid Nordmann
347
This study is being conducted to develop and test a new measure of how
people cope in response to a stressful situation.
The researchers invite all individuals aged 18 years and over to participate in this
study.
Please contact the investigator via email if you are interested in participating in
this study and to obtain a questionnaire.
A potential benefit of participating in this study includes providing you with insight
into some of the strategies you use to cope with stress.
Alexandra Alipan
PhD Candidate
aalipan@swin.edu.au
If you have any questions or concerns about any aspect of this project or
the manner in which it is conducted, please contact one of the researchers
or the Research Ethics Officer, Swinburne Research (H68), Swinburne
University of Technology, P.O. Box 218, HAWTHORN, VIC 3122. Tel. (03)
9214 5218.
aalipan@swin.edu.au
Email:
Schema Coping.
Validation of a Measure of
Development and
Research Project: The
aalipan@swin.edu.au
Email:
Schema Coping.
Validation of a Measure of
Development and
Research Project: The
aalipan@swin.edu.au
Email:
Schema Coping.
Validation of a Measure of
Development and
Research Project: The
aalipan@swin.edu.au
Email:
Coping.
Measure of Schema
Validation of an Adapted
Development and
Research Project: The
___________
aalipan@swin.edu.au
Email:
Schema Coping.
Validation of a Measure of
Development and
Research Project: The
aalipan@swin.edu.au
Email:
Schema Coping.
Validation of a Measure of
Development and
Research Project: The
348
Completing the questionnaire will take approximately 60 minutes. First year psychology
students who participate in this study will receive 60 minutes of credit for participating in the
Research Experience Program (REP). No other compensation will be provided.
Even though the online questionnaire will ask questions regarding how a person copes with
stress, it is unlikely that participants will experience harm or distress. However, in the unlikely
event that any problems arise, individuals can contact:
349
Swinburne students:
• On-campus counsellors at the Student Development and Counselling service –
Address: Level 4, The George, Wakefield St, Hawthorn. Ph: 9214 8025 or
http://www.swinburne.edu.au/stuserv/counselling/contact-appointments.html
• Swinburne Online Counselling -
http://www.swinburne.edu.au/stuserv/counselling/SOC.html
Non-Swinburne students:
• Swinburne Psychology Clinic (low cost service) Level 4, George Swinburne
Building Swinburne Hawthorn Campus +61 3 9214
8653 psychclinic@swin.edu.au
• Lifeline - ph: 13 11 14 or http://www.lifeline.org.au/Get-Help/
• Beyond Blue – ph: 1300 22 4636 or http://www.beyondblue.org.au
Research output
This research will form the requirements for the Doctor of Philosophy (Science) program. It is
expected that this research will result in a presentation at a national or international
conference. It is also anticipated that at least one article describing the findings will be
published in an academic journal. Published results will be based on group comparisons
(e.g., age, sex) and overall (aggregated) data; Individual responses to the optional open-
ended questions may be used, however as all responses are anonymous individuals’
responses will be unidentifiable.
• Alexandra Alipan, Main Student Investigator, Faculty of Health, Arts and Design,
Swinburne University of Technology, on (03) 9241 8900 or at aalipan@swin.edu.au
• Dr. Jason Skues, Supervising Investigator, Faculty of Health, Arts and Design, Swinburne
University of Technology, on (03) 9241 4497 or at jskues@swin.edu.au
• Associate Professor Stephen Theiler, Supervising Investigator, Faculty of Health, Arts and
Design, Swinburne University of Technology, on (03) 9241 5002 or at
stheiler@swin.edu.au
This project has been approved by or on behalf of Swinburne’s Human Research Ethics Committee
(SUHREC) in line with the National Statement on Ethical Conduct in Human Research. If you have any
concerns or complaints about the conduct of this project, you can contact:
Research Ethics Officer, Swinburne Research (H68),
Swinburne University of Technology, P O Box 218, HAWTHORN VIC 3122.
Tel (03) 9214 5218 or +61 3 9214 5218 or resethics@swin.edu.au
350
Swinburne students:
• On-campus counsellors at the Student Development and Counselling service –
Address: Level 4, The George, Wakefield St, Hawthorn. Ph: 9214 8025 or
http://www.swinburne.edu.au/stuserv/counselling/contact-appointments.html
• Swinburne Online Counselling -
http://www.swinburne.edu.au/stuserv/counselling/SOC.html
Non-Swinburne students:
• Swinburne Psychology Clinic (low cost service) Level 4, George Swinburne
Building Swinburne Hawthorn Campus +61 3 9214
8653 psychclinic@swin.edu.au
• Lifeline - ph: 13 11 14 or http://www.lifeline.org.au/Get-Help/
• Beyond Blue – ph: 1300 22 4636 or http://www.beyondblue.org.au
Further Information:
If you would like further information about the project please do not hesitate to contact:
• Alexandra Alipan, Main Student Investigator, Faculty of Health, Arts and Design,
Swinburne University of Technology, on (03) 9241 8900 or at aalipan@swin.edu.au
• Dr. Jason Skues, Supervising Investigator, Faculty of Health, Arts and Design, Swinburne
University of Technology, on (03) 9241 4497 or at jskues@swin.edu.au
• Associate Professor Stephen Theiler, Supervising Investigator, Faculty of Health, Arts and
Design, Swinburne University of Technology, on (03) 9241 5002 or at
stheiler@swin.edu.au
This project has been approved by or on behalf of Swinburne’s Human Research Ethics
Committee (SUHREC) in line with the National Statement on Ethical Conduct in Human
Research. If you have any concerns or complaints about the conduct of this project, you can
contact:
Research Ethics Officer, Swinburne Research (H68),
Swinburne University of Technology, P O Box 218, HAWTHORN VIC 3122.
Tel (03) 9214 5218 or +61 3 9214 5218 or resethics@swin.edu.au
Demographic Questions
DASS-21
Instructions:
Please read each statement and circle a number 0, 1, 2 or 3, which indicates how much the statement applied to you
over the past week. There are no right or wrong answers. Do not spend too much time on any statement.
Instructions:
The statements below reflect different coping styles mainly related to when you are under stress or
distressed. To respond to the statements below, please take a few moments to think of a
stressful situation you have experienced involving someone else or a group of people over the
last three months (e.g., tertiary education, your job, your partner, your family, your friends, or other).
Please write a brief description of that situation in the space below (e.g., where did it happen, who
was involved, how did you feel, what were your thoughts, and why was it important to you).
1. Rate the number that shows how stressful this situation was for you.
1 2 3 4
Once again, when responding to each of the statements on the next page, please answer them
based on how you dealt with this stressful situation involving someone else or a group of
people.
Read each statement carefully and make sure you answer as honestly as you can. Remember that
there is no right or wrong answer and your answers are anonymous. Please respond to each
statement separately in your mind from all other statements. For each of the coping styles, rate each
statement from ‘Completely untrue of me’ to ‘Completely true of me’ to what extent you used it in the
situation. Don’t worry whether it worked or not, we are only interested in how much you either used it
or didn’t use it. The statements may not reflect all of your coping style(s) accurately so there is room
to add comments.
RATING SCALE:
Completely untrue of me; Slightly true of me; Not Applicable;
Mostly untrue of me; Mostly true of me;
Slightly untrue of me; Completely true of me;
Please try to answer every question. Please TICK the box that best corresponds to your
answer for each question.
354
When distressed or upset by the stressful situation involving someone else or a group of
people (as described at the beginning):
6. I became dependent on
others.
8. I blamed myself.
9. I did nothing.
When distressed or upset by the stressful situation involving someone else or a group of
people (as described at the beginning):
When distressed or upset by the stressful situation involving someone else or a group of
people (as described at the beginning):
When distressed or upset by the stressful situation involving someone else or a group of
people (as described at the beginning):
When distressed or upset by the stressful situation involving someone else or a group of
people (as described at the beginning):
When distressed or upset by the stressful situation involving someone else or a group of
people (as described at the beginning):
When distressed or upset by the stressful situation involving someone else or a group of
people (as described at the beginning):
If you want to add something more to these coping styles please do so here:
361
Brief COPE
Instructions:
These items deal with ways you've been coping with the stressful situation in your life, described
previously. There are many ways to try to deal with problems. These items ask what you've been
doing to cope with this one. Obviously, different people deal with things in different ways, but I'm
interested in how you've tried to deal with it. Each item says something about a particular way of
coping. I want to know to what extent you've been doing what the item says. How much or how
frequently. Don't answer on the basis of whether it seems to be working or not—just whether or not
you're doing it. Use these response choices. Try to rate each item separately in your mind from the
others. Make your answers as true FOR YOU as you can.
RATING SCALE:
1 2 3 4
I haven't been I've been I've been doing I've been
doing this at all doing this a this a medium doing this a
little bit amount lot
1 2 3 4
I haven't been I've been I've been doing I've been
doing this at all doing this a this a medium doing this a
little bit amount lot
1 2 3 4
I haven't been I've been I've been doing I've been
doing this at all doing this a this a medium doing this a
little bit amount lot
1MFBTFOPUFUIFDIBOHFJOSBUJOHTDBMF
365
366
367
368
369
370
371
372
373
374
375
SHR Project 2016/294 – A mixed methods investigation of cyberbullying behaviours, early maladaptive
schemas, coping styles, and psychological outcomes in young adults.
Approved duration: 19-12-2016 to 19-12-2017 [Adjusted]
A/Prof Stephen Theiler, Dr Jason Skues, Alexandra Alipan (Student) - FHAD
I refer to the ethical review of the above project by a Subcommittee (SHESC3) of Swinburne's Human
Research Ethics Committee (SUHREC). Your response to the review as e-mailed on 9 December 2016 was put
to the Subcommittee delegate for consideration.
I am pleased to advise that, as submitted to date, ethics clearance has been given for the above project to
proceed in line with standard on-going ethics clearance conditions outlined below.
- All human research activity undertaken under Swinburne auspices must conform to Swinburne and
external regulatory standards, including the National Statement on Ethical Conduct in Human
Researchand with respect to secure data use, retention and disposal.
- The named Swinburne Chief Investigator/Supervisor remains responsible for any personnel
appointed to or associated with the project being made aware of ethics clearance conditions,
including research and consent procedures or instruments approved. Any change in chief
investigator/supervisor, and addition or removal of other personnel/students from the project,
requires timely notification and SUHREC endorsement.
- The above project has been approved as submitted for ethical review by or on behalf of SUHREC.
Amendments to approved procedures or instruments ordinarily require prior ethical
appraisal/clearance. SUHREC must be notified immediately or as soon as possible thereafter of (a)
any serious or unexpected adverse effects on participants and any redress measures; (b) proposed
changes in protocols; and (c) unforeseen events which might affect continued ethical acceptability of
the project.
- At a minimum, an annual report on the progress of the project is required as well as at the
conclusion (or abandonment) of the project. Information on project monitoring and
variations/additions, self-audits and progress reports can be found on the Research Internet pages.
- A duly authorised external or internal audit of the project may be undertaken at any time.
Please contact the Research Ethics Office if you have any queries about on-going ethics clearance, citing the
Swinburne project number. A copy of this e-mail should be retained as part of project record-keeping.
Yours sincerely,
Sally Fried
Secretary, SHESC3
376
The researchers invite all individuals residing in Australia and aged between 18-25
years to participate in this study.
Please contact the investigator via email if you are interested in participating in this
study and to obtain a questionnaire.
Alexandra Alipan
PhD Candidate
aalipan@swin.edu.au
If you have any questions or concerns about any aspect of this project or the
manner in which it is conducted, please contact one of the researchers or the
Research Ethics Officer, Swinburne Research (H68), Swinburne University of
Technology, P.O. Box 218, HAWTHORN, VIC 3122. Tel. (03) 9214 5218.
Email: aalipan@swin.edu.au
Young Adults
Psychological Outcomes in
Coping Styles, and
Early Maladaptive Schemas,
Cyberbullying Behaviours,
An Investigation of
Email: aalipan@swin.edu.au
Young Adults
Psychological Outcomes in
Coping Styles, and
Early Maladaptive Schemas,
Cyberbullying Behaviours,
An Investigation of
Email: aalipan@swin.edu.au
Young Adults
Psychological Outcomes in
Coping Styles, and
Early Maladaptive Schemas,
Cyberbullying Behaviours,
An Investigation of
Email: aalipan@swin.edu.au
Young Adults
Psychological Outcomes in
Coping Styles, and
Early Maladaptive Schemas,
Cyberbullying Behaviours,
An Investigation of
Email: aalipan@swin.edu.au
Young Adults
Psychological Outcomes in
Coping Styles, and
Early Maladaptive Schemas,
Cyberbullying Behaviours,
An Investigation of
Email: aalipan@swin.edu.au
Young Adults
Psychological Outcomes in
Coping Styles, and
Early Maladaptive Schemas,
Cyberbullying Behaviours,
An Investigation of
377
Completing the questionnaire will take approximately 40 minutes. First year psychology students who
participate in this study will receive 60 minutes of credit for participating in the Research Experience
Program (REP). No other compensation will be provided.
The questionnaire will ask questions regarding participants’ cyberbullying experiences and how they
cope with stress, which may be potentially distressing. Although it is unlikely that participants will
experience harm or distress. However, in the unlikely event that any problems arise, individuals can
contact:
378
379
IMPORTANT
Please keep this debriefing information page. You will need this information for your
end-of-semester document which details the Independent Variables, Dependent
Variables, and aims of the studies you participated in.
DO NOT send back this page as you will not be able to access this page in the future.
Debrief information:
The main purpose of the study is to examine how Australian young adults interpret and
cope with cyberbullying, which in turn help to explain the variation in psychological and
social outcomes often associated with cyberbullying. The independent variables in this
study are: hypothetical vignettes (each of the 6 vignettes described either a
cyberbullying situation [1 vignette], ambiguous situation [4 vignettes], or non
cyberbullying situation [1 vignette]), cyberbullying involvement, cyberbullying
behaviours and early maladaptive schemas. The dependent variables are: surrender,
avoidance, retaliation, pleasing, adaptive coping, and problem-focused and emotion-
focused coping, somatisation, obsessive-compulsive, interpersonal sensitivity,
depression, anxiety, hostility, phobic anxiety, paranoid ideation and psychoticism.
Please do not talk to other potential participants (e.g., first year psychology students) about
the nature of the study in advance.
Swinburne students:
• On-campus counsellors at the Student Development and Counselling service –
Address: Level 4, The George, Wakefield St, Hawthorn. Ph: 9214 8025 or
http://www.swinburne.edu.au/stuserv/counselling/contact-appointments.html
• Swinburne Online Counselling -
http://www.swinburne.edu.au/stuserv/counselling/SOC.html
Non-Swinburne students:
• Swinburne Psychology Clinic (low cost service) Level 4, George Swinburne
Building Swinburne Hawthorn Campus +61 3 9214 8653 psychclinic@swin.edu.au
• Lifeline - ph: 13 11 14 or http://www.lifeline.org.au/Get-Help/
• Beyond Blue – ph: 1300 22 4636
or http://www.beyondblue.org.au
Further Information:
If you would like further information about the project please do not hesitate to contact:
• Alexandra Alipan, Main Student Investigator, Faculty of Health, Arts and Design,
Swinburne University of Technology, on (03) 9241 8900 or at aalipan@swin.edu.au
• Dr. Jason Skues, Supervising Investigator, Faculty of Health, Arts and Design, Swinburne
University of Technology, on (03) 9241 4497 or at jskues@swin.edu.au
• Associate Professor Stephen Theiler, Supervising Investigator, Faculty of Health, Arts and
Design, Swinburne University of Technology, on (03) 9241 5002 or at
stheiler@swin.edu.au
This project has been approved by or on behalf of Swinburne’s Human Research Ethics Committee
(SUHREC) in line with the National Statement on Ethical Conduct in Human Research. If you have any
concerns or complaints about the conduct of this project, you can contact:
Research Ethics Officer, Swinburne Research (H68),
Swinburne University of Technology, P O Box 218, HAWTHORN VIC 3122.
Tel (03) 9214 5218 or +61 3 9214 5218 or resethics@swin.edu.au
_________________________
2. What is your age (in
years)? ________ years old
8. How much time (in minutes) do you spend sending text messages via mobile phone per day?
_______________________ mins
9. How much time (in minutes) do you spend on the Internet per day, including on your mobile phone?
_______________________ mins
381
10. What do you mainly use the Internet for? (Tick all that apply)
Homework or Research ☐
Email ☐
Chat rooms ☐
Instant messaging (IM) ☐
Personal finance (online banking, stock ☐
trading)
Online shopping ☐
Current events (news, sports, weather) ☐
Online games ☐
Creating web sites ☐
Facebook or other social networking sites ☐
Other ___________________________________________________
12. On which social network site or sites do you have a profile or account? (Tick all that apply)
Facebook ☐
Twitter ☐
Instagram ☐
YouTube ☐
Tumblr ☐
Snapchat ☐
LinkedIn ☐
Ask.Fm/ Spring.me / Qooh.me ☐
Google Plus ☐
MySpace ☐
Other ____________________________
Don’t Know/ Don’t have own profile ☐
382
13. Thinking about your Social Networking Sites (SNSs), when, if ever, was the last time you checked your
privacy settings on your profile?
Sometime in the past week ☐
Sometime in the past month ☐
Sometime in the past year ☐
When you first created your profile ☐
You have never checked them ☐
You don’t know or you can’t remember ☐
14. Overall, how difficult is it to manage the privacy controls on your social network profile?
Extremely Difficult ☐
Very difficult ☐
Somewhat difficult ☐
Not at all difficult ☐
Do not use privacy settings ☐
15. I know how to:
☐ ☐
☐ ☐
383
10
Instructions:
Please indicate on the rating scale below, in the past 12 months how often you have done the following things to
someone?
For each of the behaviours tick the response that best describes how often these things were DONE BY YOU.
☐ ☐ ☐ ☐ ☐
5. Sent threatening or insulting e-
mails ☐ ☐ ☐ ☐ ☐
6. Sent embarrassing or
compromising videos/ photos/
pictures of someone else by
☐ ☐ ☐ ☐ ☐
mobile phone
11
12
Please indicate on the rating scale below, in the past 12 months how often someone has done the following things
to you?
For each behaviour cross the number that best describes how often these things were DONE TO YOU:
Never Only once or Two or three About once a Several times a
twice times a month week week
(1) (2) (3) (4) (5)
1. Received threatening or
insulting text messages ☐ ☐ ☐ ☐ ☐
2. Received violent videos/
photos/ pictures by mobile ☐ ☐ ☐ ☐ ☐
phone
3. Received threats or insults
on the Internet (e.g., Web
sites, chatrooms, blogs, ☐ ☐ ☐ ☐ ☐
social network sites)
4. Received silent/prank phone
calls
☐ ☐ ☐ ☐ ☐
5. Received threatening or
insulting e-mails ☐ ☐ ☐ ☐ ☐
6. Someone sent embarrassing
or compromising videos/
photos/ pictures of me by ☐ ☐ ☐ ☐ ☐
mobile phone
7. Received threatening or
insulting phone calls ☐ ☐ ☐ ☐ ☐
8. Received violent videos/
photos/ pictures posted or
shared on the Internet (e.g., ☐ ☐ ☐ ☐ ☐
e-mail, Web sites, YouTube,
social network sites)
9. Someone made phone calls
spreading rumours about me ☐ ☐ ☐ ☐ ☐
10. Someone posted
embarrassing or
compromising videos/
photos/ pictures of me on ☐ ☐ ☐ ☐ ☐
the Internet (e.g., e-mail,
Web sites, YouTube, social
network sites)
11. Someone manipulated my
private personal data in ☐ ☐ ☐ ☐ ☐
order to reuse
386
13
Never Only once or Two or three About once a Several times a
twice times a month week week
(1) (2) (3) (4) (5)
12. Ignored me on purpose in an
online group ☐ ☐ ☐ ☐ ☐
13. Someone stole my personal
information (e.g., images, ☐ ☐ ☐ ☐ ☐
photos) in order to reuse
14. Someone spread rumours
about me on the Internet ☐ ☐ ☐ ☐ ☐
15. Someone stole my password
and used my account (e.g,. ☐ ☐ ☐ ☐ ☐
email, Facebook)
16. Deliberately excluded from
an online group (e.g., Web
sites, chatrooms, social ☐ ☐ ☐ ☐ ☐
networking site)
17. Someone stole and used my
phone book ☐ ☐ ☐ ☐ ☐
18. Someone blocked me in a
chatroom or on a social
networking site in order to ☐ ☐ ☐ ☐ ☐
exclude me from the group
19. Someone hacked my account
(e.g., email, Facebook) and
☐ ☐ ☐ ☐ ☐
posted humiliating or mean
content pretending to come
from me
20. Someone created a mean or
hurtful webpage about me
☐ ☐ ☐ ☐ ☐
(e.g., hate page)
14
Cyberbullying Definition
a. Based on the bully’s In your life time In the past 12 months In the past couple of
perspective (definition 1), months
have you cyberbullied
another person? Yes ☐ Yes ☐ Yes ☐
No ☐ No ☐ No ☐
b. Based on the victim’s In your life time In the past 12 months In the past couple of
perspective (definition 2), months
have you been a victim of
cyberbullying? Yes ☐ Yes ☐ Yes ☐
No ☐ No ☐ No ☐
c. Based on the bystander In your life time In the past 12 months In the past couple of
perspective (definition 3), months
have you witnessed
other people being Yes ☐ Yes ☐ Yes ☐
cyberbullied?
No ☐ No ☐ No ☐
388
15
Instructions:
• What happened?
• Who was involved?
• How did this make you feel?
• What do you think were the motives of the perpetrator?
• Did you respond to the behaviour? If so, how?
• Did other people become involved or intervene? If so, what was their behaviour?
If you indicated ‘never’ to all 23 behaviours listed on pages 12-13 (behaviours DONE TO YOU) AND
have not been a victim of cyberbullying (in the past 12 months or past couple of months; on page
14) then please skip to the next page.
389
18
Instructions:
The statements on the following page reflect different coping styles mainly related to
when you are under stress or distressed.
To respond to the statements on the following page, please take a few moments to
think of a stressful situation you have experienced involving someone else or a
group of people over the last 12 months (e.g., your colleagues, your partner, your
family, your friends, or other).
1. Rate the number that shows how stressful this situation was for you.
1 2 3 4
Read each statement carefully and make sure you answer as honestly as you can.
Remember that there is no right or wrong answer and your answers are
anonymous. Please respond to each statement separately in your mind from all other
statements.
For each of the coping styles, rate each statement from 1 to 6 to what extent you
used it in the situation. Don’t worry whether it worked or not, we are only interested
in how much you either used it or didn’t use it.
RATING SCALE:
Completely untrue of me
Mostly untrue of me
Slightly untrue of me
Slightly true of me
Mostly true of me
Completely true of me
Not Applicable
Please try to answer every question. Please TICK the box that best corresponds to
your answer for each question.
390
19
When distressed or upset by the stressful situation involving someone else or a group of people (as described on page 18):
20
When distressed or upset by the stressful situation involving someone else or a group of people (as described on page 18):
21
When distressed or upset by the stressful situation involving someone else or a group of people (as described on page 18):
22
Instructions: These items deal with ways you've been coping with the stressful situation in your life, described
previously. There are many ways to try to deal with problems. These items ask what you've been doing to cope with this
one. Obviously, different people deal with things in different ways, but I'm interested in how you've tried to deal with it. Each
item says something about a particular way of coping. I want to know to what extent you've been doing what the item
says. How much or how frequently. Don't answer on the basis of whether it seems to be working or not—just whether or not
you're doing it. Use these response choices. Try to rate each item separately in your mind from the others. Make your answers
as true FOR YOU as you can.
RATING SCALE:
1 2 3 4
I haven't been I've been doing I've been doing I've been doing
doing this at all this a little bit this a medium this a lot
amount
23
1 2 3 4
I haven't been I've been I've been doing I've been doing
doing this at all doing this a this a medium this a lot
little bit amount
Page 27
399
400
24
Instructions:
You are going to read a list of problems and complaints that people sometimes have. For each one, please
indicate how much that problem has bothered or distressed you during the past 12 months. Please
respond whether each problem has bothered you 1 = not at all; 2 = a little bit; 3 = moderately; 4 = quite a
bit; or 5 = extremely.
25
Not at all A little bit Moderately Quite a bit Extremely
402
26
Not at all A little bit Moderately Quite a bit Extremely
403
Table 17.
Mistrust and Abuse 28.13 (5) .000 .263 [.173-.361] .960 .919 .703 .080 Original
3.81 (2) .149 Retained 3, 21, 39, 75.
Deleted item 57
Social Isolation/ 5.68 (5) .339 Original
Alienation
2 items – under-identified model so no model fit statistics produced. Retained item 22 and 58.
Deleted 4, 40, 76.
Defectiveness/ Shame 14.73 (5) .012 .170 [.073-.275] .996 .992 .455 .028 Original
3 indicators – just-identified model so no model fit statistics produced. Retained 5, 41, 77.
Deleted 23, 59
Failure 6.63 (5) 0.250 Original
3 indicators – just-identified model so no model fit statistics produced. Retained 24, 42, 78.
Deleted 6, 60
Dependence 9.68 (5) 0.085 Original
4.70 (2) 0.096 Retained 7, 43, 61, 79.
Deleted 25
Vulnerability to Harm 6.75 (5) 0.240 Original. All 5 items
retained
Enmeshment 17.72 (5) 0.003 .195 [.102-.297] .926 .852 .589 .088 Original
1.53 (2) 0.466 Retained 9, 27, 45, 61.
Deleted item 81
Entitlement 5.81 (5) .325 Original
3 indicators – just-identified model so no model fit statistics produced. Retained 14, 32, 68.
Deleted 50, 86
Insufficient Self- 4.31 (5) .505 Original. All 5 items
control retained
Subjugation 12.42 (5) .029 .149 [.043-.255] .952 .905 .482 .075 Original
3.73 (2) .155 Retained 28, 46, 64, 82.
Deleted item 10
Self-sacrifice 16.95 (5) .005 .189 [.095-.291] .965 .93 .498 .060 Original
2.21 (2) .331 Retained item 11, 47, 65,
83. Deleted item 29
Approval Seeking 13.64 (5) .018 .161 [.061-.266] .971 .942 .454 .065 Original
.66 (2) .720 Retained 34, 52, 70, 88.
Deleted item 16
Emotional Inhibition 33.53 (5) .000 .292 [.203-.389] .891 .783 .803 .110 Original
.95 (2) .622 Retained items 12, 30,
48, 84. Deleted item 66
Hypercriticalness 32.26 (5) .000 .285 [.196-.383] .884 .767 .765 .103 Original
3.82 (2) .148 Retained 31, 49, 67, 85.
Deleted item 13
Pessimism 6.05 (5) .301 Original
2.07 (2) .355 Retained 17, 53, 71, 89.
Deleted item 35
Self-punitiveness 18.13 (5) .003 .198 [.105-.300] .990 .980 .515 .068 Original
3 indicators – just-identified model so no model fit statistics produced. Retained 36, 72, 90.
Deleted item 18 and 54
Note. The best fitting model is bolded.
( ), chi-square goodness of fit statistic; df, model degrees of freedom; p-value, ( ) p-value; RMSEA (CI), root-mean-square of approximation with 90%
confidence intervals; CFI, comparative fit Index; TLI, Tucker Lewis index; WRMR, weighted root mean square residual; SRMR, standardised root
mean square residual.
All models fit with robust weighted least squares estimation (WLSMV; Muthén & Muthén, 2007).
405
For the one-factor congeneric models for the five schema coping
styles, the data did not fit the model well. For surrender, the one-factor
model was not a good fit to the data, ! " (9) = 23.02, p < .006, RMSEA =
.152 [.076-.231], CFI = .988, TLI = .980, and SRMR = .055. One of the six
items (SURR 4) was removed due to the modification index indicating high
inter-item correlations and common item phrasing, and another (SURR 5)
was removed due to poor item properties and item content. For instance, the
remaining surrender items were about compliance whereas SURR 5 was
more about dependence. The re-specified model resulted in a good fit to the
data, ! " (2) = 1.40, p < .498.
For avoidance, the one-factor model was not a good fit to the data,
! " (35) = 74.84, p < .001, RMSEA = .130 [.089-.171], CFI = .910, TLI =
.884, and SRMR = .104. Three of the 10 items (AV 8, AV 9, and AV 10)
were removed due to a non-significant factor loading and inter-item
correlations (AV 10), indicating that they were not strong indicators of their
intended construct (Field, 2005), or due to a high modification index value
and item content (AV 8 and AV 9). For example, AV 8 is about sleeping
more whereas the other items are centred more around behavioural
avoidance of others and excessive autonomy. The re-specified model
resulted in a good fit to the data, ! " (14) = 16.49, p < .285.
For retaliation, the one-factor model was not a good fit to the data,
! " (44) = 101.75, p < .000, RMSEA = .140 [.104-.176], CFI = .906, TLI =
.883, and SRMR = .098. Three of the 11 items (RET 2, RET 3, and RET 8)
were removed due to low inter-item correlations, modification index values
and item phrasing. For example, RET 8 was about bullying others to get
one’s own way and was highly negatively skewed indicating low
endorsement for this item compared to other items on this same scale, and
thus low inter-inter correlations. The re-specified model resulted in a good
fit to the data, ! " (20) = 27.81, p < .114.
406
For pleasing, the one-factor model was not a good fit to the data,
! " (35) = 101.77, p < .000, RMSEA = .167 [.130-.206], CFI = .913, TLI =
.889, and SRMR = .110. Of the 11 items, PLS 3 was removed due to item
redundancy with PLS 2. Both had a correlation >.8 and similar item
phrasing but PLS 2 captured the content theme of pleasing more strongly.
PLS 1 was deleted due to non-significant inter-item correlations < .3 and a
very low factor loading and reliability/variance estimate compared to other
items. PLS 5 and PLS 6 were removed due to item content as both items
were about giving in to others and while this could be related to pleasing the
items did not fit in with the remaining items, which were more about status
seeking. The re-specified model resulted in a good fit to the data, ! " (9) =
14.35, p < .110.
For adaptive schema coping, the one-factor model was not a good fit
to the data, ! " (5) = 41.08, p < .000, RMSEA = .328 [.240-.425], CFI = .896,
TLI = .792, and SRMR = .134. Of the five items, APT 5 was removed due
to low and non-significant (< .3) inter-item correlations and a high
correlation (> .8) and similar item phrasing to APT 4. The re-specified
model resulted in a good fit to the data, ! " (2) = 1.53, p < .464. While
deleting this item resulted in the one-factor model achieving good model fit
statistics, it should be noted that items APT 2, APT 3, and APT 4 also had
poor item properties in the victim group, with many non-significant inter-
item correlations, low factor loadings and item reliabilities/ variance (R2).
However, deleting these items either made the model fit worse or a warning
occurred.
A one-factor congeneric model with 53 items was specified to
measure psychological distress and found the data fit the model well
! " (1325) = 1712.84, p < .000, RMSEA = .066 [.057-.075], CFI = 0.955, TLI
these one-factor models were retained with their original items (see Table
18). One item from the emotional deprivation subscale was deleted despite
obtaining good model fit for this factor due to item redundancy being
present. ED 55 had an inter-item correlation of .82 with ED 1 and > .80
correlations with several other items. Once this item was deleted the data
was a better fit to the model. In addition, two items from Entitlement were
deleted, despite obtaining good model fit due to non-significant inter-item
correlations and ENT 50 also having a non-significant factor loading (<
.30). The other 10 original one-factor congeneric EMSs models obtained
poor model fit and were re-specified by inspecting the quality and content of
the indicators, which was the same approach employed in the victim group.
All revised EMSs resulted in good model fit. The results of the original and
revised one-factor congeneric models for each of the 18 EMSs for the target
group is displayed in Table 18.
408
Table 18.
YSQ Subscale !" (%&) p-value RMSEA (CI) CFI TLI WRMR SRMR Comments
Emotional Deprivation 10.99 (5) .052 .097 [.000-.176] .995 .989 .335 .033 Original
5.47 (2) .065 Retained items: 1,
19, 37, 73.
Deleted item 55
Abandonment 14.30 (5) .014 .121 [.050-.197] .992 .983 .409 .036 Original
1.27 (2) .472 Retained 2, 38, 56, 74.
Deleted items 20
Mistrust and Abuse 24.60 (5) .000 .176 [.110-.248] .985 .970 .587 .058 Original
0.34 (2) .846 Retained 3, 21, 39, 57.
Deleted item 75
Social Isolation/ 8.66 (5) .124 Original. All 5 items
Alienation retained
Defectiveness/ Shame 11.27 (5) .046 .099 [.012-.178] .996 .992 .342 .027 Original
1.09 (2) .580 Retained 5, 41, 59, 77.
Deleted 23
Failure 3.25 (5) .662 Original. All 5 items
retained
Dependence 9.35 (5) .096 Original. All 5 items
retained
Vulnerability to Harm 3.85 (5) .572 Original. All 5 items
retained
Enmeshment 15.12 (5) .010 .126 [.056-.202] .957 .913 .492 .063 Original.
4.15 (2) .125 Retained items 27, 45,
63, 81. Deleted 9
Entitlement 6.29 (5) .279 Original
3 indicators – just-identified model so no model fit statistics produced. Retained 32, 68, 86.
Deleted 14, 50
Insufficient Self- 3.92 (5) .561 Original. All 5 items
control retained
Subjugation 18.89 (5) .002 .148 [.081-.222] .938 .876 .606 .071 Original
1.96 (2) .375 Retained 10, 28, 64, 82.
Deleted item 46
Self-sacrifice 11.30 (5) .046 .100 [.013-.178] .985 .971 .746 .043 Original
0.41 (2) .814 Retained item 29, 47, 65,
83. Deleted item 11
Approval Seeking 1.51 (5) .912 Original
Emotional Inhibition 25.26 (5) .000 .179 [.113-.251] .954 .907 .638 .068 Original
5.77 (2) .056 .122 [.000-.243] .989 .967 .615 .035 Retained items 12, 30,
48, 66.
Unrelating Standards / 16.51 (5) .001 .135 [.066-.209] .963 .926 .501 .052 Original
Hypercriticalness
.05 (2) .975 Retained 13, 49, 67, 85.
Deleted item 31
Pessimism 25.54 (5) .000 .180 [.115-.252] .971 .941 .589 .058 Original
2.82 (2) .245 Retained 17, 35, 53, 89.
Deleted item 71
Self-punitiveness 11.44 (5) .043 .101 [.016-.179] .992 .984 .738 .047 Original
1.64 (2) .440 Retained 36, 54, 72, 90.
Deleted item 18
.901, and SRMR = .093. As in the victim group, RET 8 was removed due to
low inter-item correlations, high modification index values, and item
phrasing. After deleting this item, the data was still not a good fit the model.
An EFA was conducted to probe for further model changes. RET 1, RET 2,
RET 4 and RET 10 were deleted from this factor due to modification
indices indicating common phrasing among the items and in an attempt to
remove sources of misfit from the one-factor model. The re-specified model
resulted in a good fit to the data, ! " (9) = 9.55, p < .388.
410
For pleasing, the one-factor model was not a good fit to the data,
! " (35) = 150.39, p < .000, RMSEA = .161 [.135-.188], CFI = .903, TLI =
.876, and SRMR = .093. Of the 11 items, 4 items were removed (PLS 1,
PLS 9, PLS 2, and PLS 4), with PLS 1 and PLS 9 being removed due to
poor item properties (low factor loadings and inter-item correlations and
low item reliabilities/variance). PLS 2 and PLS 4 were removed due to high
modification indices and inspecting the content of the remaining items
which appeared to be more about pleasing others rather than status-seeking
items. The re-specified model resulted in a good fit to the data, ! " (9) =
12.58, p < .183.
A one-factor congeneric model with five items was specified to
measure adaptive schema coping and found the data fit the model well ! " (5)
= 8.58, p < .127.
A one-factor congeneric model with 53 items was specified to
measure psychological distress and found the data fit the model well
! " (1325) = 1977.11, p < .000, RMSEA = .062 [.056-.068], CFI = .935, TLI
Table 19.
YSQ Subscale !" (%&) p-value RMSEA (CI) CFI TLI WRMR SRMR Comments
Emotional 23.14 (5) .000 .217 [.133-.310] .974 .949 .423 .056 Original
Deprivation
3 indicators – just-identified model so no model fit statistics produced. Retained items: 1, 37, 55.
Deleted item 19 and 73
Abandonment 11.04 (5) .051 Original
1.91 (2) .385 Retained 2, 20, 38, 56.
Deleted item 74
Mistrust and Abuse 47.22 (5) .000 .331 [.249-.420] .949 .897 .934 .108 Original
1.27 (2) .529 Retained 3, 39, 57, 75.
Deleted item 21
Social Isolation/ 5.23 (5) .389 Original
Alienation
3 indicators – just-identified model so no model fit statistics produced. Retained item 4, 22, 58.
Deleted 40 and 76
Defectiveness/ 11.36 (5) .045 .129 [.019-.229] .997 .995 .745 .040 Original
Shame
3 indicators – just-identified model so no model fit statistics produced. Retained 5, 59, 77.
Deleted 23, 41
Failure 17.11 (5) .004 .177 [.090-.273] .988 .976 .956 .047 Original
4.09 (2) .129 Retained 6, 24, 42, 60.
Deleted 78.
Dependence 8.88 (5) .114 Original
3 indicators – just-identified model so no model fit statistics produced. Retained 7, 43, 79.
Deleted 25 and 61
Vulnerability to 2.87 (5) .720 Original. All 5 items
Harm retained
Enmeshment 19.45 (5) .002 .194 [.108-.288] .946 .892 .649 .092 Original
2.96 (2) .228 Retained 9, 45, 61, 81.
Deleted item 27
Entitlement 46.09 (5) .000 .327 [.244-.416] .810 .620 .998 .124 Original
3 indicators – just-identified model so no model fit statistics produced. Retained 32, 68, 86.
Deleted 14, 50,
Insufficient Self- 22.33 (5) .001 .212 [.128-.305] .908 .816 .712 .100 Original.
control
2.48 (2) .289 Retained 15, 33, 51, 69.
Deleted 87.
Subjugation 13.83 (5) .017 .151 [.059-.249] .970 .939 .423 .052 Original
0.44 (2) .803 Retained 10, 46, 64, 82.
Deleted item 28
Self-sacrifice 5.79 (5) .327 Original. All 5 items
retained.
Approval Seeking 20.18 (5) .001 .199 [.113-.293] .959 .918 .516 .064 Original
3 indicators – just-identified model so no model fit statistics produced. Retained 34, 52, 88.
Deleted item 16, 70
Emotional Inhibition 9.94 (5) .077 Original. All 5 items
retained.
Unrelating 2.30 (5) .807 Original. All 5 items
Standards/ retained.
hypercriticalness
Pessimism 18.03 (5) .003 .184 [.097-.279] .982 .964 .490 .058 Original
3.47 (2) .176 Retained 35, 53, 71, 89.
Deleted item 17
Self-punitiveness 8.37 (5) .137 Original. All 5 items
retained.
Note. The best fitting model is bolded.
( ), chi-square goodness of fit statistic; df, model degrees of freedom; p-value, ( ) p-value; RMSEA (CI), root-mean-square of approximation
with 90% confidence intervals; CFI, comparative fit Index; TLI, Tucker Lewis index; WRMR, weighted root mean square residual; SRMR,
standardised root mean square residual.
All models fit with robust weighted least squares estimation (WLSMV; Muthén & Muthén, 2007).
412
.945, and SRMR = .101. Similar to the victim group, two of the 11 items
(RET 2 and RET 8) were removed due to low inter-item correlations, high
modification index values and item phrasing. An EFA also showed that
RET 2 (“I directed my anger towards the person/people”) formed a
413
separated factor to other items on same scale, which are more about trying
to control, manipulate, and dominate others.
For pleasing, the one-factor model was not a good fit to the data,
! " (35) = 77.66, p < .000, RMSEA = .126 [.088-.164], CFI = .958, TLI =
.946, and SRMR = .084. Of the 11 items, three items were removed (PLS 1,
PLS 4, and PLS 9), which was similar to the target group, with PLS 1 and
PLS 9 being removed due to poor item properties (low factor loadings and
inter-item correlations and low item reliabilities/variance). PLS 4 was
removed due to high modification indices and after inspection of the content
of the remaining items, which appeared to be more about pleasing others
rather than status-seeking.
A one-factor congeneric model with five items was specified to
measure adaptive schema coping and found the data fit the model well ! " (5)
= 6.35, p < .273.
A one-factor congeneric model with 53 items was specified to
measure psychological distress and found the data fit the model well
! " (1325) = 1611.94, p < .000, RMSEA = .053 [.043-.062], CFI = .955, TLI
independent cluster, the adaptive schema coping scale was omitted from
further analyses. Once deleting the adaptive scale from the independent
cluster measurement model, the model ran without a warning but the model
fit to the data was not acceptable as the chi-square value was statistically
significant, and despite the RMSEA and CFI meeting the minimum cut-offs,
the TLI and SRMR were less than the recommended threshold measure,
χ2(269) = 371.71, p < .000, RMSEA = .075, CFI = .909, TLI = .899, SRMR
= .108. The items RET 7, AV 1 and AV 3 were removed due to non-
significant factor loadings or inter-item correlations. For example, AV 3
which is about procrastinating had low and non-significant correlations with
other avoidance items and stronger correlations with surrender items. RET
6, PLS 2 and PLS 8 were also deleted due to a high modification index with
the surrender latent factor, indicating that these items may cross-load on this
factor. An inspection of the item correlations showed that these items had
moderate to high correlations with surrender items and item content
revealed similar item content to surrender items. Once the model was re-
specified by removing these items, the data was a good fit to the model,
! " (146) = 187.90, p < .011, RMSEA = .065 [.033-.091], CFI = .951, TLI =
CFI = .911, TLI = .903, and SRMR = .104. However, PLS 10 and RET 4
were removed due to high modification index values with other latent
factors. The bivariate correlation matrix for these two items also showed
moderate correlations with most of the items on other scales, some of which
were even stronger than the correlations with items measuring the same
construct. Deleting these two items resulted the five factor independent
cluster measurement model being a good fit to the data.
Higher order schema domain models. Higher order factors rather
than independent cluster measurement models were tested for the 18
individual schemas, which were categorised into their respective domain
based on Young et al.’s (2003) schema theory. High order factors were used
since each of the schema domains represent an underlying unmet core
emotional need that is the common theme of the specific schemas clustered
within that domain. Higher order models are also recommended over
independent cluster measurement models when it is expected that latent
variables would be highly correlated with one another and lack discriminant
validity (Cunningham, 2010). In saying this, there were still several weak
items considered for removal such as those with strong cross-loadings on
other factors or items with poor item properties. The same process used for
assessing model fit for the one-factor congeneric models was also employed
when dealing with misfit in the higher order models, in that, model fit
statistics, modification indices, items properties, and theory guided relevant
changes to the model. These items were cautiously removed to improve
model fit and ensure that sources of model misspecification were removed
before testing the structural model.
Victim group. For victims, the higher order model of disconnection
and rejection (Domain 1) was found to not be a good fit to the data, ! " (99) =
171.86, p < .000, RMSEA = .105 [.078-.131], CFI = .963, TLI = .956, and
SRMR = .082. The mistrust/ abuse item, MIS 39, had a high modification
index value with abandonment item, AB 38, suggesting a co-varied error
416
was made to run the two EMSs within this domain, entitlement and
insufficient self-control, separately (see one-factor congeneric model results
in Table 17).
The higher order model of other-directedness (Domain 4) displayed
a warning regarding the latent variable covariance matrix (PSI) not being
positive definite. The subjugation latent factor appeared to be contributing
to this warning with a factor loading above 1.0 and negative residual
variance. An inspection of the correlation matrix showed that subjugation
items are just as or if not more highly correlated with items on approval
seeking and self-sacrifice compared to the correlations among its own items.
After trying an EFA to further determine the causes of model misfit, it also
showed that subjugation was highly related with approval seeking and self-
sacrifice but that approval seeking and self-sacrifice were not significantly
correlated. Many items measuring self-sacrifice also appeared to
significantly cross-load on the subjugation factor. Because higher order
models need more than two factor indicators to be identified and for the
estimates to be trustworthy, it was decided to test the individual schemas
within this domain (i.e., subjugation, approval seeking, and self-sacrifice)
separately to avoid multicollinearity issues (see one-factor congeneric
model results in Table 17).
The higher order model of overvigilance and inhibition (Domain 5)
was found to not be a good fit to the data, ! " (86) = 220.27, p < .000,
RMSEA = .153 [.128-.178], CFI = .874, TLI = .846, and SRMR = .125. The
emotional inhibition items, EMIN 48 and EMIN 12, self-punitiveness item,
PUN 90, and pessimism item, PESS 17, showed modification indices with
other latent factors, indicating potential cross-loading of the items on to
other factors. After removal of these items to address model misfit, poor fit
was still obtained, ! " (40) = 103.04, p < .000, RMSEA = .153 [.117-.190],
CFI = .920, TLI = .890, and SRMR = .093. No other changes to the model
were made, nor made sense.
418
! " (61) = 86.94, p < .016, RMSEA = .074 [.033-.108], CFI = .975, TLI =
model was a good fit to the data, ! " (100) = 134.41, p < .012, RMSEA =
.067 [.033-.094], CFI = .974, TLI = .968, and SRMR = .074.
422
Publications
Alipan, A., Skues, J., Theiler, S., & Wise, L. (2019). Defining
cyberbullying: A multifaceted definition based on the perspectives of
emerging adults. International Journal of Bullying
Prevention. doi:10.1007/s42380-019-00018-6
Alipan, A., Skues, J., & Theiler, S. (2018). “They will find another way to
hurt you”: Emerging adults’ perceptions of coping with
cyberbullying. Emerging Adulthood. doi:10.1177/2167696818816896
Alipan, A., Skues, J., Theiler, S., & Wise, L. (2015). Defining
cyberbullying: A multiple perspectives approach. Annual Review of
Cybertherapy and Telemedicine 2015: Virtual Reality in Healthcare:
Medical Simulation and Experiential Interface, 219, 9.
doi:10.3233/978-1-61499-595-1-9
Conference Presentations
Alipan, A., Skues. J., & Theiler, S. (June, 2019). Investigating the
relationship between cyberbullying, early maladaptive schemas,
coping, and psychological distress in emerging adults. World Anti-
Bullying Forum, Dublin, Ireland.
Alipan, A. (July, 2016). The role of early maladaptive schemas in coping
with cyberbullying. Presented at the Alannah & Madeline
Foundation's National Centre Against Bullying (NCAB) Conference.
Towards Bullying Solutions: Theory and Practice, Melbourne,
Australia.
Alipan, A. (June, 2015). Defining cyberbullying: A multiple perspectives
approach. Presented in the Social Networking and Cyberbullying
symposium at the 20th Annual Cybertherapy and Social Networking
Conference. San Diego, USA.