Cyber Victimization
Cyber Victimization
Cyber Victimization
PII: S0747-5632(17)30007-9
DOI: 10.1016/j.chb.2017.01.007
Please cite this article as: David Álvarez-García, José Carlos Núñez, Alejandra Barreiro, Trinidad
García, Validation of the Cybervictimization Questionnaire (CYVIC) for adolescents, Computers in
Human Behavior (2017), doi: 10.1016/j.chb.2017.01.007
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to
our customers we are providing this early version of the manuscript. The manuscript will undergo
copyediting, typesetting, and review of the resulting proof before it is published in its final form.
Please note that during the production process errors may be discovered which could affect the
content, and all legal disclaimers that apply to the journal pertain.
ACCEPTED MANUSCRIPT
Highlights
adolescents.
Impersonation.
slapping.
- Scores correlate with Internet Risk Behaviors, School Victimization and Self-
esteem.
ACCEPTED MANUSCRIPT
Faculty of Psychology. University of Oviedo. Plaza Feijóo, s/n, 33003 Oviedo (Spain).
Faculty of Psychology. University of Oviedo. Plaza Feijóo, s/n, 33003 Oviedo (Spain).
Alejandra Barreiro
Faculty of Psychology. University of Oviedo. Plaza Feijóo, s/n, 33003 Oviedo (Spain).
Trinidad García
Faculty of Psychology. University of Oviedo. Plaza Feijóo, s/n, 33003 Oviedo (Spain).
Abstract
The goal of this study is to design a new self-report, targeting adolescents, called the
is a victim of aggression by mobile phone or Internet, and to analyze its factor and
criterion validity and reliability in a sample of adolescents of Asturias (Spain). For this
purpose, the CYVIC was applied to 3159 young people, aged 12 to 18, along with three
scales to measure Internet Risk Behaviors, Offline School Victimization, and Self-
esteem. Regarding factor validity, the model that best represents the internal structure of
score correlates positively with Internet Risk Behaviors and Offline School
Victimization, and negatively with Self-esteem, three variables that previous empirical
factors and items are both adequate. Therefore, it is concluded that the CYVIC is a valid
Abstract
the extent to which the informant is a victim of aggression by mobile phone or Internet.
The goal of this study is to analyze its factor and criterion validity and reliability in a
sample of adolescents of Asturias (Spain). For this purpose, the CYVIC was applied to
3159 young people, aged 12 to 18, along with three scales to measure Internet Risk
Behaviors, Offline School Victimization, and Self-esteem. Regarding factor validity, the
model that best represents the internal structure of the CYVIC has four factors
positively with Internet Risk Behaviors and Offline School Victimization, and
negatively with Self-esteem, three variables that previous empirical evidence indicates
correlate with cybervictimization. The reliability of the CYVIC factors and items are
both adequate. Therefore, it is concluded that the CYVIC is a valid and reliable self-
1. Introduction
with the popularization of the mobile phone and the internet. The development of
electronic devices and software applications offer new possibilities to establish new
advantages, their inappropriate use can also give rise to serious problems (Gámez-
Guadix, Orue, & Calvete, 2013). One of them is the possibility of using these means to
electronic devices, mainly mobile phones and the Internet (Del Rey, Elipe, & Ortega-
Ruiz, 2012). These attacks can take on various forms in adolescence. Nocentini et al.
videos— that have been taken or disseminated by electronic means and that are
comments, through mobile phone or the Internet. Online exclusion implies not being
the victim over the mobile phone or Internet, to make fun of or get him/her into trouble.
Previous research, using both qualitative and quantitative approaches, supports the
Menesini, 2015).
For example, because of its seriousness, we can highlight two specific types of visual
cybervictimization, associated with different risk factors and dynamics. On the one hand
electronic means with the intention of making fun of or ridiculing the victim. In this
2
ACCEPTED MANUSCRIPT
to this type of aggressions. Happy slapping is a particularly disturbing case of this type
an unsuspecting victim with a mobile phone and uploading the recording and
disseminating it over the Internet (Palasinski, 2013). On the other hand, there is the
work, is called Visual-sexual cybervictimization. These can be images the victim shares
with a trusted third party —sexting (Drouin, Ross, & Tobin, 2015; Morelli, Bianchi,
Baiocco, Pezzuti, & Chirumbolo, 2016)—who then disseminates them without the
victim's consent; or they can be images taken by the offender without the victim's
consent. Sometimes, the person who has the images can blackmail the victim,
threatening to disseminate them if the victim does not comply with their wishes —
sextortion (Flores, 2015). On other occasions, it is an ex who uploads and shares the
photos of his/her former couple on the Intertet, which is done out of spite or a desire for
such events and is part, therefore, of what has been called aggravated cases of
youth‐produced sexual images (Wolak & Finkelor, 2011). Despite of the severity of
these cases, and the concern that this situation generates to families, schools and society
in general, empiric research on this issue, as well as on the design of new assessment
commonly considered to be part of the same construct (within the same factor or even
3
ACCEPTED MANUSCRIPT
the same item). However, the use of a written means of communication may favor an
individual's disinhibition, as well as the rapid and massive spreading of the message
(Hinduja & Patchin, 2015). Oral and written cybervictimization may differ, therefore, in
the severity of their effects. Hence the utility of having specific measures of both forms
of verbal cybervictimization.
prevalence and negative effects, warrants analysis and treatment. Although there are
currently estimated that between 20 and 40% of children and adolescents have at some
Starcevic, & Salame, 2015) and between 2 and 7% have been victims of severe
severe cases. Mainly, it has been associated with an increase in internalizing problems
such as anxiety (Rose & Tynes, 2015), low self-esteem (Chang et al., 2013), social
anxiety (Juvonen & Gross, 2008), depressive symptomatology (Bonanno & Hymel,
2013) and suicidal ideation (Van Geel, Vedder, & Tanilon, 2014). In turn, these
internalizing problems can have negative consequences for adolescents in other areas,
such as the academic area. Cybervictimization has been associated with an increase in
concentration problems, poor performance, and truancy (Beran & Li, 2007; Tsitsika et
al., 2015). Cybervictimization has also been associated with an increase in externalizing
mediated by other variables, such as the level of rejection or of social support from
assessment instruments with adequate and rigorous contents and metric properties. In
adolescents have been published. The most complete and current review is the one by
gaps and controversies in the previous proposals. Therefore, we present below a brief
review of the instruments published in recent years (Table 1). All of them are self-
reports, with multiple-choice response formats on which the evaluated adolescent rates
the frequency with which he/she suffers the behavior described in the item. All the
understand the problem. Having a single cybervictimization score hinders, for example,
cybervictimization. The case of gender may be illustrative. Despite the fact that boys
and girls use mobile phones and the Internet in different ways (Fernández-Montalvo,
Dobarro, Álvarez, Núñez, & Rodríguez, 2014), most studies find no differences
5
ACCEPTED MANUSCRIPT
is that, in most cases, this is due to the fact that the analyses are based on a general
cybervictimization score, which may offset the differential effects of gender. As can be
Peter, & Van der Hof, 2015), offer a single measure of cybervictimization; and five of
unifactorial models.
A second limitation of the reviewed self-reports is that the few that do provide
types that are relevant due to their severity and current social relevance. Most of them
focus on verbal cybervictimization: four of the five questionnaires that provide specific
specific measure of online exclusion, two of the five include a specific measure of
impersonation, and any of them offers neither a specific visual cybervictimization score
that involves teasing or happy slapping, nor a visual cybervictimization score related to
certain methodological limitations (Table 1). One of them is that the questionnaires
been validated with small samples: six of the nine questionnaires use samples of less
than 500 subjects to conduct either exploratory or confirmatory factor analyses. Another
limitation is that only two of the 16 questionnaires revised explicitly state that the
6
ACCEPTED MANUSCRIPT
analyses were based on the polychoric correlation matrix, which is the most adequate
option for variables measured at the ordinal level and with nonnormal distributions
tend to concentrate at the lowest values of the scale. A third and final methodological
limitation is that the models considered to be the most representative of its factor
structure generally do not present acceptable fit indexes. Only 6 of the 16 reviewed
questionnaires satisfy the criteria usually used to be considered a good fit (these criteria
are mentioned Section 4.4). In the case of one of these six questionnaires, it has been
necessary to include in the model the correlated measurement errors of a pair of items to
7
Table 1. Questionnaires for measuring cybervictimization among adolescents.
based on the
polychoric
correlation
matrix?
European Cyberbullying Intervention Del Rey et al. (2015) EFA and EFA: Yes - Cyber-aggression 2=1484.15, df=208
2,859
Cyberbullying Questionnaire (CBQ) Gámez-Guadix, CFA 1,491 Not indicated - Perpetration 2=293, df=220, p<.001 NNFI=.98,
Calvete (2014)
Cyberbullying Test Garaigordobil (2015) EFA and EFA: Not indicated - Cyberobserver χ2=4604.73, df=942, p<.001, χ2/df
8
CFA:1,513 - Cybervictim CFI=.91, NNFI=.90, GFI=.92
RMSEA=.056(.056-.063)
SRMR=.050
Virtual Aggression subscale Jiménez, Castillo, EFA 675 Not indicated - Perpetrated or ---
aggression.
- Virtual aggression
victimization.
Personal Experiences Checklist Hunt, Peters, and EFA and EFA: 433 Not indicated Second-order factor: χ2= 1,486.23, df=460 CFI=.88
(PECK) Rapee (2012) CFA CFA: 432 - Being bullied RMSEA=.07 (.07-.08)
First-order factors:
-Relational or verbal
bullying
-Cyber bullying
- Physical bullying
- Bullying based on
culture
9
Multidimensional Peer Victimization Betts, Houston, and CFA 371 Not indicated - Physical 2=304.08, df=160, p<.001
- Verbal RMSEA=.05
- Attacks on property
- Electronic
Multidimensional Offline and Online Sumter et al. (2015) EFA and EFA: 325 Not indicated - Offline peer 2=1238.35, df=170, p<.005 CFI =
. Indirect offline
Cyber Victimization Survey (CVS) Brown, Demaray, EFA 106 Not indicated - Cybervictimization ---
Cybervictimization scale of the Menesini, Nocentini, CFA 1,092 Not indicated - Cybervictimization Male:
Cyberbullying Scale (CS) and Calussi (2011) 2=20.59, df=14, p=.11; CFI=.98,
10
RMSEA=.030
Female:
CFI=.99, RMSEA=.037
E-Victimisation Scale (E-VS) Lam and Li (2013) EFA and EFA: 231 Not indicated - Cybervictimization 2=67.90, df=5, p<.001;
GFI=.92, AGFI=.75
RMSR=.034
Cyberbullying Scale (CBS) Stewart, Drescher, EFA and EFA: 368 Yes - Cybervictimization CFI=.98, TLI=.98
Cybervictimization scale of the Topcu and Erdur- EFA and EFA: 358 Not indicated - Cybervictimization GFI=.82, AGFI=.76, CFI=.58,
Revised Cyber-Bullying Inventory Baker (2010) CFA CFA: 339 NFI=.54, TLI=.50
(RCBI) RMSEA=.13
NFI=.84, TLI=.86
11
RMSEA=.06
Adolescent Victimization through Buelga, Cava, and EFA and EFA: Not indicated - Cybervictimization S-B2 =366.45, df=131, p<.001
Mobile Phone and Internet Scale Musitu (2012) CFA 1,934 through mobile phone CFI=.93
Cybervictimization scale of the Çetin, Yaman, and EFA and 404 Not indicated - Cyber verbal bullying 2 = 482.33, df=200, p<.001, 2/df=
Cyber Victim and Bullying Scale Peker (2011) CFA - Hiding identity 2.41
RMSEA=.058
Cybervictimization scale of the Palladino et al. CFA 1,123 Not indicated - Written-verbal 2 = 127.02, df=71, p<.001
(FCBVSs) - Exclusion
CFI=.95
RMSEA=.02
12
Online Victimization Scale (OVS) Tynes, Rose, and CFA Study 1: Not indicated - General online Study 1:
- Individual online
RMSEA=.087 (.079-.095)
13
ACCEPTED MANUSCRIPT
3. Objective
The goal of this study is to analyze the factor and criterion validity and
from Asturias (Spain). The CYVIC was designed based on a previous instrument (CBV;
Álvarez-García, Dobarro, & Núñez, 2015), to assess the extent to which the informant is
overcome the main methodological and content limitations of the previously published
intended to contribute to the definition of the construct cybervictimization, its types, and
behavioral indicators, as well as to provide a valid and reliable measure for use in
may have a negative impact on the psychosocial wellbeing and academic performance
of the adolescent. Thus, it is important to have instruments that allow assessing this
problem with the greatest validity and reliability possible. The CYVIC is expected to
measure. Individually applied, it would serve as a guide about the observable indicators
useful for analyzing the prevalence of the different forms of cybervictimization, as well
as the risk factors and consequences associated with them. This information is decisive
for the design of effective intervention programs. Lastly, the CYCIC is expected to be
14
ACCEPTED MANUSCRIPT
The initial hypothesis of this study is that the model that best represents the
response of the assessed adolescents to the CYVIC is the one purposed by Nocentini et
al. (2010), made up of four types of cybervictimization correlated to each other: written-
adolescents.
15
ACCEPTED MANUSCRIPT
4.1. Participants
Regarding sex and age, 52.0% are boys and 48.0% are girls, aged between 12 and 18
years [M = 14.01; SD = 1.39; Skewness= 0.28 (SE= 0.04); Kurtosis= -0.56 (SE= 0.09)].
Of them, 95.1% have their own mobile phone, 84.1% surf the Internet in their free time
for non-academic tasks, 93.5% use instant messaging programs (Messenger, Whatsapp,
stratified sampling from among the total of publicly funded schools of Asturias in which
95.9% of the total number of schools in which CSE is taught in Asturias. To select the
population. In Spain, public schools are those in which both their management and their
financing are entirely public, and private-concerted schools are those whose
schools and 8 private-concerted schools were selected. Although the sample is diverse,
the selected schools were predominantly located in urban areas and from the middle
socio-economic class, as in the population from which they were extracted. In each
selected school, all the groups were assessed. Of these adolescents, 28.3% study 1st
grade, 25.4% are in 2nd grade, 24.3% are studying 3rd grade, and 22.0% study 4th grade
of CSE.
16
ACCEPTED MANUSCRIPT
4.2. Measures
The CYVIC (Appendix A), designed and tested in this study, is a self-report
mobile phone or the Internet. The students should mark the frequency with which they
were the victim of each one of these situations in the past three months, on a 4-point
The CYVIC was designed based on the model purposed by Nocentini et al.
construction of the CYVIC, ten items were removed from the CBV, on statistical and
content grounds, and three new items were added, referring to visual cybervictimization
with sexual connotation, an important kind of cybervictimization that has not been
The original CBV has 26 items, also based on the model of Nocentini et al.
very similar fit indexes for the three models compared (unifactorial, simple
multifactorial, and hierarchical multifactorial), so they did not strongly support any of
the positions on the dimensionality of the construct. We finally chose the one-factor
model, due to its more parsimonious nature, although the fit indexes were not good for
any of the three models considered a priori. To achieve an acceptable fit, we included in
the one-factor model the main correlations between the measurement errors of the items
two problems. Firstly, the possibility that the relation between the pairs of items may be
due to variables other than those considered in the model. Secondly, there is a greater
probability that the resulting model will be unstable when replicated in other samples.
To try to solve both problems, when designing the CYVIC, we removed 10 items from
the CBV that were involved in these measurement error correlations, also taking into
items of visual cybervictimization of a sexual nature. This was done to obtain a specific
violence more related to teasing and happy slapping. They are different phenomena,
with different risk factors and concomitant variables. As shown in Section 2, none of
cybervictimization related to sexting and sextortion, in spite of their severity and the
Rodríguez, 2015) was used. The scale used in the present study is a self-report measure
consisting of 8 items describing Internet risk behaviors, that is, potentially harmful
behaviors related to the use of the Internet: “I allow others to upload my photos or
where and with whom, personal or family photos or videos,..”, “Sometimes, I've made a
date with someone in person whom I only knew from Internet”, “I give my phone
number to boys or girls whom I just met or hardly know”, “I have sent a compromising
picture of me to other people via mobile phone or Internet”, and “I have exchanged
personal information with people whom I only know through the Internet”. The items
are rated on a 4-point Likert-type scale (1 = Totally False, 2 = Rather false, 3 = Mostly
true, 4 = Completely true). The internal consistency of the scale in the sample for this
self-report scale is comprised of six items referring to the frequency with which the
respondent reports having suffered offline school victimization; that is, aggression in
the class”, “My classmates mock me or laugh at me”, “My classmates speak ill of me
behind my back”, “I have been insulted face-to-face by some classmate”, and “Some
classmate has hit me, either in the school or outside of the school grounds”. The items
The internal consistency of the scale in the sample for this study is high (Raykov’s ρ =
.883).
Self-esteem
19
ACCEPTED MANUSCRIPT
scale is made up of five items related to the respondent's self-assessment: “I'm content
well as most of my classmates”, “I like the way I am” and “I consider myself a good
person”. The items are rated on a 4-point Likert-type scale (1 = Totally false, 2 = Rather
false, 3 = Mostly true, 4 = Completely true). The internal consistency of the scale in the
4.3. Procedure
Firstly, the CYVIC questionnaire was designed and the schools were selected.
After selecting the schools, permission was sought from their respective management
teams to apply the questionnaire. Each board of directors was informed of the goals and
procedures of the study, its voluntary and anonymous nature, and the confidential
treatment of the results. Once the school management had agreed to participate,
informed consent was sought from the parents or guardians of the students, given their
status as minors. The questionnaire was applied in all the centers during the second and
third trimester of the 2014-2015 academic course. Before completing the questionnaire,
students were also informed of the anonymous, confidential, and voluntary nature of
questionnaires, although this was flexible depending on the students’ age and
characteristics. The test was applied by the research team to all the groups in each of the
Initially, the presence of missing values or outliers in the data matrix was
analyzed. All the items were completed validly by more than 90% of the participants, so
none were eliminated for this reason for the final analysis of the test. Of the 3233
students who completed the CYVIC, 74 responded validly to less than 90% of the
items, so they were eliminated from the data matrix. After their data were deleted, the
number of missing values in the CYVIC matrix dropped to 125 (0.2% of the total).
We used the statistical program EQS 6.2 (Bentler, 2014) to analyze the
normality and the dimensionality of the test. As there are sufficient theoretical grounds
scale and, thereby, to test the theory (Izquierdo, Olea, & Abad, 2014; Rios & Wells,
estimation method. Given the ordinal nature of the scale, analyses were conducted using
the polychoric correlation matrix. As AGLS requires extensive sample sizes and, in
order not to eliminate more subjects and to be able to use all the available data, missing
To determine the degree of fit of the tested models, we used the chi-square (2) /
degrees of freedom (df) ratio, the Comparative Fit Index (CFI), the Bentler-Bonett Non-
Normed Fit Index (NNFI), the Standardized Root Mean Square Residual (SRMR), the
Root Mean Square Error of Approximation (RMSEA) and the Akaike Information
Criterion (AIC). Usually, it is considered that the fit is good when CFI ≥ .95, NNFI ≥
.95, SRMR ≤.08 and RMSEA ≤ .06 (Hu & Bentler, 1999), and χ2/df < 3 (Ruiz, Pardo, &
San Martín, 2010). The AIC allows comparing the models, and the lowest value is
21
ACCEPTED MANUSCRIPT
preferable. Model fit differences were also determined using the chi-square difference
We studied the discriminant validity of the model with the best fit, analyzing the
correlation between its factors. Very high correlations (r ≥. 85) suggest possible
(Brown, 2015). Given that we actually found a very high correlation between some
The fit indexes and correlations between the factors of the three respecified
models were analyzed. After identifying the model with the most adequate discriminant
validity and fit to the data, factor loadings and standard errors of each item for that
model were found. Factor loadings higher than .30 are usually considered acceptable
Subsequently, the reliability of the test was analyzed. The reliability of each
subscale was analyzed, in terms of internal consistency, finding their respective Raykov
rho coefficient (composite reliability) from the polychoric correlation matrix. This
alpha coefficient, highlighted by authors like Sijtsma (2009). In general, the Raykov rho
coefficient is considered acceptable if its value is above .70, high if it is greater than .80,
and very high if it is higher than .90. We also found the multiple squared correlation of
each item, an indicator of the proportion of the item’s variance explained by the latent
variable and, therefore, the item’s reliability to measure this variable (Bollen, 1989).
We used the statistical software SPSS 21 (IBM Corp., 2012) to analyze the
between the score in each of the four factors of the CYVIC and three external criteria,
García, Núñez, Dobarro, & Rodríguez, 2015): internet risk behaviors, offline school
5. Results
Factor validity
We compared the fit of the data to the theoretical model, consisting of four
factors (4FM), with that of four other models that were also plausible from a theoretical
point of view (Table 2). On the one hand, a model with six factors was tested (6FM),
which, unlike the 4FM, makes the distinction between two types of visual
verbal cybervictimization (oral and written). On the other hand, all the items from the
also test a one-factor model (1FM), as well as hierarchical versions of the four- and six-
factor models, with the cybervictimization factor as a second-order factor (4FM2 and
6FM2). In the case of the non-hierarchical models tested (M4F and M6F), the factors
are latent variables significantly related to each other and free of measurement error;
each item (observable indicator) is only explained by one factor, and is associated with
a certain measurement error. The results (Table 3) indicate that it is not the 4FM, but the
6FM, the one that best fit indexes presents. Goodness of fit of the 6FM is better, in a
statistically significant way, than that of the 1FM (Δ2= 506.59; Δdf= 15; p<.001), the
4FM (Δ2= 95.20; Δdf= 9; p<.001), the 4FM2 (Δ2= 107.55; Δdf= 11; p<.001) and the
Table 2. Models proposed for the analysis of the dimensionality of the CYVIC.
Factors
Model Items
Second-order First-order
Impersonation
1, 12, and 18
Visual cybervictimization 2, 3, 6, 9, 10, 14,
4FM - and 15
Written-Verbal cybervictimization 5, 7, 8, 11, 17, and
19
Online exclusion
4, 13, and 16
Impersonation
1, 12, and 18
Visual cybervictimization 2, 3, 6, 9, 10, 14,
4FM2 Cybervictimization and 15
Written-Verbal cybervictimization 5, 7, 8, 11, 17, and
19
Online exclusion
4, 13, and 16
Impersonation 1, 12, and 18
1FM = One-factor model; 4FM = Four-factor model; 4FM2 = Hierarchical model with four first-order
24
ACCEPTED MANUSCRIPT
factors and one second-order factor; 6FM = Six-factor model; 6FM2 = Hierarchical model with six first-
Table 3. Goodness-of-fit indexes of the five tested models for the CYVIC, with the total
sample (N = 3159).
RMSEA
Model 2 df p 2/df CFI NNFI SRMR AIC
[CI 90%]
1FM 863.34 152 <.001 5.68 .921 .911 .159 .038(.036-.041) 559.34
4FM 451.95 146 <.001 3.10 .966 .960 .106 .026(.023-.028) 159.95
4FM2 464.30 148 <.001 3.14 .965 .959 .109 .026(.023-.029) 168.30
6FM 356.75 137 <.001 2.60 .976 .969 .090 .023(.020-.025) 82.75
6FM2 551.24 146 <.001 3.78 .955 .947 .114 .030(.027-.032) 259.24
1FM = One-factor model; 4FM = Four-factor model; 4FM2 = Hierarchical model with four first-order
factors and one second-order factor; 6FM = Six-factor model; 6FM2 = Hierarchical model with six first-
CFI = Comparative Fit Index; NNFI = Non-Normed Fit Index; SRMR = Standardized Root Mean Square
Residual; RMSEA = Root Mean Square Error of Approximation; CI = Confidence interval; AIC = Akaike
Information Criterion.
Discriminant validity
The factors of the 6FM present positive and statistically significant correlations
with each other (Table 4). The two factors referring to verbal violence (written and oral)
and, even more so, the two factors referring to visual violence (Sexual and
Teasing/Happy slapping) have very high correlations with each other (r >. 85).
25
ACCEPTED MANUSCRIPT
3159).
Visual-
Visual- Verbal- Verbal- Online
Impersonation Teasing/Happy
Sexual Written Oral Exclusion
slapping
Impersonation 1.00
Visual-
slapping
In view of the very high correlation between the two factors of Visual
slapping from the model and retain them in the questionnaire as additional indicators.
We decided to remove them from the model and not to merge both factors for the
cybervictimization.
Thus, three models were tested post-hoc. First, we analyzed the fit indexes and
slapping. This model presents good fit indexes (Table 5). However, the two factors of
Verbal cybervictimization (Oral and Written) still present a correlation of .86. For this
26
ACCEPTED MANUSCRIPT
reason, a second model was tested post-hoc, with four factors, in which the two verbal
factors are combined into a single factor. In this way, the four-factor model (ph4FM)
Sexual Cybervictimization. The fit of the 4FM is good — although worse than that of
the ph5FM (Δ2= 71.30; Δdf= 4; p<.001)— and the correlations between its factors are
lower than .85 (Figure 2). We finally tested a third post-hoc model, in which we merged
the items referring to Verbal cybervictimization and Exclusion into a single factor.
The correlation between each pair of factors is lower than .80, but its level of fit to the
data is the worst of the three post-hoc models tested (Table 5). The fit of the ph3FM is
worse, in a statistically significant way, than that of the ph4FM (Δ2= 58.12; Δdf= 3;
Table 5. Goodness of fit indexes of the three post-hoc models, with the total sample (N
= 3159).
RMSEA [CI
Model 2 df p 2/df CFI NNFI SRMR AIC
90%]
.019 [.016,
ph5FM 175.75 80 <.001 2.20 .982 .976 .061 15.75
.023]
.025 [.021,
ph4FM 247.05 84 <.001 2.94 .969 .961 .083 79.05
.028]
.028 [.025,
ph3FM 305.17 87 <.001 3.51 .958 .949 .092 131.17
.032]
27
ACCEPTED MANUSCRIPT
CFI = Comparative Fit Index; NNFI = Non-Normed Fit Index; SRMR = Standardized Root Mean Square
Residual; RMSEA = Root Mean Square Error of Approximation; CI = Confidence interval; AIC = Akaike
Information Criterion.
In the ph4FM, the standardized factor loadings of the items presented moderate
or high values (Figure 2). All the items have a standardized regression coefficient equal
to or higher than .60, except Item 5 (λ =. 58). However, some items have high standard
errors.
28
ACCEPTED MANUSCRIPT
The reliability of the CYVIC subscales and of each of their items can be
considered moderate or high (Table 6). The Raykov rho composite reliability coefficient
29
ACCEPTED MANUSCRIPT
of each of its four factors has values between .74 and .89. The proportion of variance in
an item explained by the latent variable (R2) ranges between 34 and 77%.
Factor Item ρ R2
Impersonation .816
1 .610
12 .765
18 .514
2 .561
9 .738
14 .540
5 .339
7 .709
8 .633
11 .533
17 .760
19 .590
4 .357
13 .458
16 .633
30
ACCEPTED MANUSCRIPT
Criterion validity
The four CYVIC factors correlated statistically and significantly with the three
analyzed external criteria. There was a positive correlation with participants´ reported
Internet Risk Behaviors and Offline School Victimization; and a negative one with Self-
Table 7. Spearman's rank correlation coefficients between the score on each factor of
the CYVIC and the scores on the Internet Risk Behaviors, Offline School Victimization,
* p ≤ .001.
6. Discussion
assess the extent to which the informant is a victim of aggression by mobile phone or
Internet. The goal of the present study was to analyze its factor and criterion validity
and reliability in a sample of adolescents of Asturias (Spain). The results show that the
31
ACCEPTED MANUSCRIPT
CYVIC offers adequate statistical guarantees for the purpose for which it was designed.
The initial hypothesis, according to which the model that best represents the structure of
the test is the one purposed by Nocentini et al. (2010), made up of four types of
The model that best represents the data obtained, with adequate discriminant
exclusion, and impersonation) and in which the four items of Visual Cybervictimization
them show an unifactorial structure. Conversely, the results obtained in this study
support the multifactorial perspective of the construct, in the line of other questionnaires
such as CYBVIC (Buelga et al., 2012), CVBS (Çetin et al., 2011), FCBVSs (Palladino
et al., 2015), MOOPV (Sumter et al., 2015), and OVS (Tynes et al., 2010). The CYVIC,
cybervictimization that it assesses and in the observable indicators used. The results do
not justify the division of the two factors of Verbal cybervictimization and the two
factors of Visual cybervictimization, which was considered in two of the models tested
in the present study. These two divisions could be of practical interest. However, from
a psychometric perspective, the results suggest that the response of the evaluated
adolescents does not differentiate the observable indicators of these factors sufficiently
32
ACCEPTED MANUSCRIPT
to consider two different types of visual violence and two different types of verbal
violence.
Regarding the criterion validity of the test, the CYVIC scores correlate
statistically and significantly with three external variables that previous evidence
expectations (Álvarez-García, Núñez, Dobarro, & Rodríguez, 2015), the CYVIC scores
correlated positively with Offline school victimization and Internet risk behaviors, and
negatively with Self-esteem. The CYVIC subscales differ from one another in the
strength of the correlation, which supports the multidimensional nature of the construct.
moderate-high. The reliability of the items can be considered acceptable. Some of the
items present high standard errors. Although this may be due to the influence of
exogenous variables that are not considered in this study, it may also be due, at least
partially, to the correlation between the scale factors. For example, the variance of the
scores on Item 4 can be explained by the latent variable Online exclusion, but also
6.1. Implications
the methodological aspects, the CYVIC has been validated with a broad sample of
randomly selected adolescents; the analyses were based on the polychoric correlation
matrix; and the model finally identified as representative of the internal structure of the
questionnaire shows a good fit to the empirical data obtained. With regard to the
33
ACCEPTED MANUSCRIPT
contents, the CYVIC provides a measure of four types of cybervictimization and four
additional indicators, which allows a more accurate analysis of the problem, its
prevalence, risk factors, and the effect of interventions, in comparison with most
with the few questionnaires that provide specific measures of different types of
cybervictimization, the CYVIC offers some new features. The CYVIC provides a
sexting and sextortion, separate from other forms of visual cybervictimization related to
teasing and happy slapping. None of the reviewed questionnaires offers this possibility.
commonly included in this type of questionnaires, makes the CYVIC a complete, useful
In comparison with the CBV—the source of the final version of the CYVIC—,
the removal of 10 items and the addition of 3 items allowed us to more clearly identify
the model that best represents the internal structure of the questionnaire, to notably
improve the fit of the model to the empirical data obtained, and the internal consistency
of the factors, and, hence, to more clearly support the multidimensional nature of the
construct.
This work has various theoretical and practical implications. From the
its subtypes and observable indicators. The results support the hypothesis of the
Nocentini et al. (2010), and the suitability of the observable indicators included in the
34
ACCEPTED MANUSCRIPT
CYVIC. From the practical viewpoint, researchers, educators, and clinicians now have
available a brief assessment tool, easy to apply, encode and analyze, economical in
terms of time and cost when compared to other assessment methods, and with adequate
metric guarantees. As it has been stated in section 3, it is expected that this instrument
will be useful for the identification of adolescents being victims of cyberaggression; the
consequences associated with the problem; the design of intervention programs and the
analysis of their effectiveness. To date, the CYVIC has been successfully used to
García, Barreiro-Collazo, & Núñez, 2017). Likewise, the relationship found in the
present study between cybervictimization and the three external criteria analyzed
suggests the desirability for intervention programs for the prevention and treatment of
adolescence. However, it has some limitations. We note mainly three. Firstly, the
CYVIC is a self-report instrument, so the results may be affected by response bias such
2016). In the future, a sincerity scale could be included, or the results could be
questionnaire has been tested with a broad and randomly selected sample, but it was
extracted from a specific population, limited to certain ages and geographical areas.
35
ACCEPTED MANUSCRIPT
Although we do not expect that the sample used in this study will differ significantly
from others drawn from contexts similar to the one described in subsection 4.1, any
generalization of the findings of this study to other age groups or regions should be
made with caution (Muñiz, Elosua, & Hambleton, 2013). With a view to the future, the
validation of the test in other ages and cultural contexts would be of interest. Third and
lastly, the convergent validity of the questionnaire was not analyzed in the present
study. In future applications of the instrument, the correlation between the CYVIC
scores and those from other tests designed to measure the same variables should be
examined.
7. Conclusions
in adolescence have been published. All the reviewed questionnaires have made a
the design and validation of the CYVIC. The instrument was validated in a wide sample
polychoric correlation matrix has been used to perform the analysis, as required by the
from the present study indicate that the CYVIC shows better goodness of fit indexes
indicators. In this sense, our findings support the pertinence of the typology purposed by
Nocentini et al. (2010), although the indicators used in the present study differ from
those included by the authors in their recent questionnaire (Palladino et al., 2015). From
define risk factors and consequences associated with the problem; to design, on the
basis of this information, effective intervention programs; and to measure the impact of
these programs. Regarding the design of intervention programs, results from the present
necessary to take into account, among other variables, those related to Internet risk
8. References
Aboujaoude, E., Savage, M. W., Starcevic, V., & Salame, W. O. (2015). Cyberbullying:
Review of an old problem gone viral. Journal of Adolescent Health, 57(1), 10-
37
ACCEPTED MANUSCRIPT
10.3916/C50-2017-08
Álvarez-García, D., Dobarro, A., Álvarez, L., Núñez, J. C., & Rodríguez, C. (2014). La
10.5944/educxx1.17.2.11494
Álvarez-García, D., Dobarro, A., & Núñez, J. C. (2015). Validez y fiabilidad del
Álvarez-García, D., Núñez, J. C., Dobarro, A., & Rodríguez, C. (2015). Risk factors
Bentler, P. M. (2014). EQS 6.2 for Windows (Build 107)- Structural Equation Modeling
Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school bullying.
Berne, S., Frisén, A., Schultze-Krumbholz, A., Scheithauer, H., Naruskov, K., Luik, P.,
Bollen, K. A. (1989). Structural equations with latent variables. New York: John Wiley
& Sons.
Bonanno, R. A., & Hymel, S. (2013). Cyber bullying and internalizing difficulties:
Above and beyond the impact of traditional forms of bullying. Journal of Youth
Brown, C. F., Demaray, M. K., & Secord, S. M. (2014). Cyber victimization in middle
Brown, T. A. (2015). Confirmatory factor analysis for applied research (2nd ed). New
Buelga, S., Cava, M. J., & Musitu, G. (2012). Validación de la Escala de Victimización
Scale of Victimization among Adolescents through the Mobile Phone and the
Çetin, B., Yaman, E., & Peker, A. (2011). Cyber Victim and Bullying Scale: A study of
10.1016/j.compedu.2011.06.014
Chang, F. C., Lee, C. M., Chiu, C. H., Hsi, W. Y., Huang, T. F., & Pan, Y. C. (2013).
Del Rey, R., Casas, J. A., Ortega-Ruiz, R., Schultze-Krumbholz, A., Scheithauer, H.,
Smith, P., Thompson, F., Barkoukis, V., Tsorbatzoudis, H., Brighi, A., Guarini,
A., Pyzalski, J., & Plichta, P. (2015). Structural validation and cross-cultural
Del Rey, R., Elipe, P., & Ortega-Ruiz, R. (2012). Bullying and cyberbullying:
613.
Drouin, M., Ross, J., & Tobin, E. (2015). Sexting: A new, digital vehicle for intimate
10.1016/j.chb.2015.04.001
Fernández-Montalvo, J., Peñalva, A., & Irazabal, I. (2015). Internet Use Habits and
2015-12
Flores, J. (2015). Sexting: Teens, sex, smartphones and the rise of sextortion and gender
Global perspectives on youth and digital media (pp. 22-25). Cambridge, MA:
Gámez-Guadix, M., Orue, I., & Calvete, E. (2013). Evaluation of the cognitive-
40
ACCEPTED MANUSCRIPT
254.
10.1177/0886260515600165
Hinduja, S., & Patchin, J.W. (2015). Bullying Beyond the Schoolyard (2nd Ed.).
Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure
10.1080/10705519909540118
Hunt, C., Peters, L., & Rapee, R. M. (2012). Development of a measure of the
IBM Corp. (2012). SPSS Statistics for Windows, version 21.0. Armonk, NY: IBM Corp.
Izquierdo, I., Olea, J., & Abad, F. J. (2014). Exploratory factor analysis in validation
10.7334/psicothema2013.349
[Validation of the Peer Aggression Scale and the Virtual Aggression subscale in
41
ACCEPTED MANUSCRIPT
Juvonen, J., & Gross, E.F. (2008). Extending the school grounds? - Bullying
10.1111/j.1746-1561.2008.00335.x
Klettke, B., Hallford, D. J., & Mellor, D. J. (2014). Sexting prevalence and correlates: A
10.1016/j.cpr.2013.10.007
Lam, L. T., & Li, Y. (2013). The validation of the E-Victimisation Scale (E-VS) and the
7. doi: 10.1016/j.chb.2012.06.021
(2014). El análisis factorial exploratorio de los ítems: una guía práctica, revisada
/10.6018/analesps.30.3.199361
Menesini, E., Nocentini, A., & Calussi, P. (2011). The measurement of cyberbullying:
10.1089/cyber.2010.0002
Morelli, M., Bianchi, D., Baiocco, R., Pezzuti, L., & Chirumbolo, A. (2016). Not-
allowed sharing of sexts and dating violence from the perpetrator's perspective:
doi: 10.1016/j.chb.2015.11.047
Muñiz, J., Elosua, P., & Hambleton, R. K. (2013). International Test Commission
Navarro-González, D., Lorenzo-Seva, U., & Vigil-Colet, A. (2016). How response bias
Nocentini, A., Calmaestra, J., Schultze-Krumbholz, A., Scheithauer, H., Ortega, R., &
142.
Ortega-Ruiz, R., & Núñez, J. C. (2012). Bullying and cyberbullying: Research and
10.1177/0886260512469107
Palladino, B. E., Nocentini, A., & Menesini, E. (2015). Psychometric properties of the
Rios, J., & Wells, C. (2014). Validity evidence based on internal structure. Psicothema,
Ruiz, M. A., Pardo, A., & San Martín, R. (2010). Modelos de ecuaciones estructurales
Sijtsma, K. (2009). On the use, misuse, and the very limited usefulness of Cronbach’s
43
ACCEPTED MANUSCRIPT
Stewart, R. W., Drescher, Ch. F., Maack, D. J., Ebesutani, Ch., & Young, J. (2014). The
10.1177/0886260513517552
Sumter, S. R., Valkenburg, P. M., Baumgartner, S. E., Peter, J., & Van der Hof, S.
10.1016/j.chb.2014.12.042
Tokunaga, R. S. (2010). Following you home from school: A critical review and
Topcu, Ç., & Erdur-Baker, Ö. (2010). The Revised Cyber Bullying Inventory (RCBI):
Tsitsika, A., Janikian, M., Wójcik, S., Makaruk, K., Tzavela, E., Tzavara, C.,
Tynes, B. M., Rose, Ch. A., & Williams, D. R. (2010). The development and validation
http://cyberpsychology.eu/view.php?cisloclanku=2010112901&article=1
Van Geel, M., Vedder, P., & Tanilon, J. (2014). Relationship between peer
10.1001/jamapediatrics.2013.4143
Wolak, J., & Finkelhor, D. (2011). Sexting: A typology. Durham, NC: Crimes Against
Wright, M., & Li, Y. (2013). The association between cyber victimization and
45
ACCEPTED MANUSCRIPT
Appendix A
Indicate how often you've been victim of the following situations, in the last 3 months:
1 2 3 4
las han difundido a través del móvil o Internet. [Someone has taken
(e.g., on the beach, in a locker room,..) without my consent and they have
chat, red social (por ej., Tuenti) o programa de mensajería instantánea (por
ej., Messenger, WhatsApp), sin haber hecho nada, sólo por ser yo. [I was
kicked out or not accepted on some chat list, social network contact list
permiso, para hacerme daño o reírse de mí. [Someone has hung real
I had taken.]
10. Me han pegado, lo han grabado y luego lo han difundido. [I have been
(e.g., WhatsApp).]
12. Se han hecho pasar por mí en Twitter, Tuenti,.., creando un falso perfil
47
ACCEPTED MANUSCRIPT
false user profile (photo, personal details,..) with which I was insulted or
ridiculed.]
13. Se han hecho quejas falsas sobre mí en algún foro, red social o juego
on-line, que han hecho que me expulsasen. [Someone has made false
14. Me han presionado para hacer cosas que no quería (haya accedido
me.]
líos. [Someone who has gotten my password has sent annoying messages
48
ACCEPTED MANUSCRIPT
19. Se han publicado rumores falsos sobre mí en alguna red social. [There
49
ACCEPTED MANUSCRIPT
Acknowledgements