Perceptions of popularity-related behaviors in the cyber context: Relations to cyber social behaviors

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Despite acknowledging that adolescents are active users of electronic technology, little is known about their perceptions concerning how such technologies might be used to promote their social standing among their peer group and whether these perceptions relate to their cyber social behaviors (i.e., cyber aggression perpetration, cyber prosocial behavior). To address this gap in the literature, the present study included 857 seventh graders (M age: 12.19; 50.8% female) from a large Midwestern city in the United States. They completed questionnaires on face-to-face social behaviors, cyber social behaviors, perceived popularity, social preference, and their perceptions of characteristics and activities related to the cyber context which might be used to promote popularity. Findings revealed four activities and characteristics used to improve adolescents' social standing in the peer group, including antisocial behaviors, sociability, prosocial behaviors, and technology access. Using antisocial behaviors in the cyber context to promote popularity was related to cyber aggression perpetration, while controlling for gender, social preference, and perceived popularity. On the other hand, sociability and prosocial behaviors in the cyber context used to improve popularity as well as technology access were associated with cyber prosocial behavior. A call for additional research is made.

Original languageEnglish (US)
Article number636929
JournalChild Development Research
Volume2015
DOIs
StatePublished - 2015

All Science Journal Classification (ASJC) codes

  • Education
  • Developmental and Educational Psychology
  • Linguistics and Language
  • Behavioral Neuroscience

Fingerprint

Dive into the research topics of 'Perceptions of popularity-related behaviors in the cyber context: Relations to cyber social behaviors'. Together they form a unique fingerprint.

Cite this