School Bullying, Perpetration, and Cyberhate: Overlapping Issues

In an international context of increasing racism, xenophobia, anti-Semitism, and Islamophobia in Europe and the USA (FRA, 2013; Hawdon et al. 2015), social media provide a privileged tool for propaganda and victimization. Issues of racism and xenophobia have become more prevalent both in “real life” and on the Internet. This study presents the results of a self-reported questionnaire survey on cyberhate among 1900 French students, age 12–20, where we investigated the association between school bullying and cyberhate victimization and perpetration. Findings show that bullying and cyberhate are a common experience for quite a few young people. Structural equation models provide evidence of the association between ordinary offline victimization and involvement in cyberhate. Our findings for cyberhate provide further evidence suggesting an overlap between traditional bullying and cyberbullying. They confirm the need for further research to acquire a better understanding of the processes that underscore individual involvement in online hate in order to inform effective interventions.


Introduction
Electronic communication is fully integrated into our daily lives. While it offers an unprecedented means of facilitating communication and freedom of expression worldwide, it can also be misused to convey hate. In an international context of increasing racism, xenophobia, anti-Semitism, and Islamophobia in Europe (FRA, 2013) and the USA (Potok 2011;Hawdon et al. 2015;Lennings et al. 2010), social media that facilitates user-generated content can be viewed as a privileged tool for propaganda and victimization. As such, issues of racism and xenophobia have become more prevalent both in "real life" and on the Internet (Blaya 2019;Chakraborti 2018;Corcoran et al. 2016;EHRC, 2016;Keipi et al. 2016;Williams et al. 2020). According to the Council of Europe Committee of Ministers on "hate speech" (Recommendation No. R (97) 20), online hate speech and the incitement of hatred have a potentially greater impact when spread through social media. Indeed, hateful messages can be easily spread through social media Web 2.0 Internetbased applications that make the Internet more interactive and expedite the publication of user-generated content (Kaplan and Haenlein 2010, p. 21).
Furthermore, the Internet offers hatemongers opportunities to recruit sympathizers to their cause and promote a collective identity that may be attractive to the most vulnerable and disfranchised young people in our communities (Perry and Olsson 2009). According to Potok (2011), the number of active hate groups in the US increased by 66% between 2000 and 2010; today, there are well over 1000 such groups. Whereas Ybarra et al. (2011) found only 3.5% of children age 10-15 visited hate sites in 2008, more recent work by Hawdon et al. (2015) showed that 53% of respondents were exposed to online hate content, while 16% were personally targeted. In Europe, the Net Children Go Mobile study reported that the greatest increase in online risk to children was exposure to hateful comments. According to EU Kids Online data, exposure on average increased from 12% in all countries in 2010 to 23% in 2013 (Mascheroni and Ólafsson 2014). These findings have been supported by studies in other countries. In the USA, Tynes et al. (2015) showed that from 2010 and 2013 there was an increase in cyberhate victimization, while in France, the International League against Racism and anti-Semitism (LICRA, 2012) and the Commission Nationale Consultative des Droits de l'Homme (National Consultative Commission for Human Rights -CNDCH, 2012) also showed a significant increase in racist content online.
In the past decades, research has investigated the association between school bullying and cyberbullying as well as the prevalence of cyberhate and exposure to online hate content (Raskauskas and Stoltz 2007;Riebel et al. 2009;Baldry et al. 2018). However, studies investigating the association between school bullying and cyberhate and more particularly the potential association between being a victim or a perpetrator of school bullying and being involved in cyberhate have been sparse, even though the protagonists of the two types of violence might share common environments.

Cyberhate
Defined as "an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself" (Smith et al. 2008, p. 376), cyberbullying differs from cyberhate. Foxman and Wolf (2013) liken cyberhate to a virus that spreads like an infectious disease in our societies, affecting our most vulnerable members. Quandt and Festl (2017) have defined cyberhate as "online communication initiated by hate groups with the purpose of attracting new members, building and strengthening group identity, coordinating group action, distributing propagandistic messages and indoctrination, provoking counterreactions as part of propagandistic campaigns, and attacking societal groups and individuals with hateful messages" (p. 1). While this definition focuses on organized groups, individuals can also be involved in cyberhate, either as aggressors or as victims. According to Potok (2011), individuals have become more active than organized groups and this requires further attention.
While cyberhate and cyberbullying both use similar means, intend to harm a person or group of persons and happen in the same context, i.e., online, there are some crucial differences between these two forms of online violence. Hawdon et al. (2015) have indicated that cyberhate is based on prejudice and intolerance. Cyberhate targets more communities than individuals, although it involves individuals or communities that are chosen on specific identified or supposed characteristics. The consequences of cyberhate not only generate individual or community unrest but also contribute to altering social cohesion, democracy, and human rights. Moreover, cyberhate can be a form of online communication from organized hate groups with the purpose of indoctrination and provoking rejection, hatred, and violence against societal groups and individuals. While cyberhate can take the form of cyberbullying in the sense that it can involve repeated and intentional victimization that is based on a power imbalance between the perpetrator and the victim (Baldry et al. 2019), cyberbullying cannot be considered systematically as cyberhate. A prime characteristic of cyberhate is that it targets identity and the community to which individuals belong and rather than occurring repeatedly it can be occasional and triggered by events (Kaakinen et al. 2018).
Most definitions of cyberhate have a common core highlighting the dissemination of hatred through electronic means. However, descriptions of cyberhate differ in terms of their focus (i.e., bigotry, ethnic, or religious). For the purpose of this study, we use the term "cyberhate" to refer to all hateful online forms of expression (text, images, videos, pictures, graphic representations) whose objective is to belittle, humiliate, or ridicule a person or group of persons, in order to generate hatred or rejection of these persons for their genuine or supposed belonging to a specific ethnic or religious background. We shall consider information published both privately and publicly as we investigate exposure to hateful online content produced by individuals as well as organized groups.

Bullying and Cyberbullying, the Evidence of an Overlap
In the school context, another aspect of inter-personal violence is school bullying. Research evidence shows an overlap between school bullying and cyberbullying (Raskauskas and Stoltz 2007;Riebel et al. 2009). Cyberbullying often roots at school and what happens in cyberspace is often an extension of what happens at school (Wolak et al. 2007;Blaya 2015;Smith et al. 2018). Commonly the same individuals are involved in school bullying and cyberbullying. For example, Hinduja and Patchin (2010) found that students bullied faceto-face (traditional bullying) were 2.5 times more at risk of being cyberbullied than others.
Moreover, there is evidence that victims and perpetrators are in close proximity to each other. Smith et al. (2008) showed that about one third of victims were in the same class group as their aggressors, while Mishna et al. (2010) found that 78% of victims attended the same school as their aggressors. Similarly, Jones et al. (2013), reported that 60% of the students were cyberbullied by school mates. Due to the overlap between the two types of victimization, Kowalski and Limber (2013) have suggested that bullying and cyberbullying should be studied together.
Student experiences of aggression in traditional bullying also exacerbate aggressive behaviors in cyberspace (Li 2007;Smith et al. 2008). With regard to cyberhate, Hawdon et al. (2015) found that being the target of cyberhate was associated with higher odds of becoming a perpetrator of cyberhate.
On their side, Görzig et al. (2019) and also Wachs et al. (2019) show an existing overlap between cyberbullying and cyberhate. According to their findings, the risk of cyberhate victimization and perpetration is increased when individuals are involved in cyberbullying and there is a reciprocal amplification of both behaviors. They argue that based on social learning theory as well as on problem behavior theory, cyberhate victims may become cyberhate perpetrators and that this behavior might also be associated with cyberbullying perpetration. Although based on nonrepresentative samples, their studies show the relevance of studying such associations and these findings led us to consider the association and overlap of all three types of aggression, i.e., of traditional bullying, cyberbullying, and cyberhate. A common feature of all three types of aggression is that the behavior involves victims who are targeted by an aggressor who intentionally seeks to harm them. We would anticipate that just as there is a strong association between traditional bullying and cyberbullying that there would also be an association between traditional bullying and cyberhate.
Some research suggests that cyberbullying might be motivated by prior offline victimization and that the Internet, due to the potential safety of anonymity and distance, helps some individuals who would not otherwise perpetrate face-to-face bullying seek revenge online (Smith et al. 2008;Dooley et al. 2009;Hemphill et al. 2012). We therefore expected to find a link between school bullying victimization and cyberhate perpetration as shown in Fig. 1. In a similar vein, we posed the question of whether victims of cyberhate would be motivated to perpetrate traditional bullying at school. If so, we expected to find a positive associated between cyberhate victimization and school bullying perpetration.
Research has clearly established that victims of cyberbullying are in all probability highly likely to be victims of traditional bullying (Kowalski et al. 2012). Subsequently, we posed the question of whether this would also be the case with respect to cyberhate. In other words, are victims of cyberhate likely to be victims of traditional bullying at school and are perpetrators of cyberhate likely to be perpetrators of bullying at school? Since cyberhate is a specific form of cyberbullying, we expected to find a relationship where traditional school bullying victimization would be positively related to cyberhate victimization and likewise, traditional school bullying perpetration would be positively related to cyberhate perpetration.
Shown also in the hypothesized (Fig. 1) model is a correlation between victims and perpetrators. It is known that involvement in bullying can be as a victim, a bully, or as a bullyvictim, i.e., young people who are victims of bullying, but who also bully others (Haynie et al. 2001). In a similar vein, and in accordance with Hawdon et al.'s (2015) findings, we anticipated an association between cyberhate victims and perpetrators.
In this study, we specifically focused on questions regarding participants' school bullying experiences, which included victimization and perpetration, as well as cyberhate victimization and perpetration in order to test the proposed model. In light of our expectations, we proposed the model shown in Fig. 1  Currently, the scant research on cyberhate among adolescents has left a gap in the literature and little is known of the prevalence of cyberhate victimization and perpetration. A further aim of the study was how often young people in France reported cyberhate.

Participants and Procedure
Secondary school students enrolled in 6th through 12th grades (N = 1900) aged 12-20, from 16 schools in France, completed an online questionnaire. State schools were selected randomly from a list of schools produced by the Education Board and were contacted. It was thus a convenience sample as 16 from the selected 45 chose to participate. All students from one class, which was randomly selected by the research team in each year group (grade), completed the questionnaire. The student population of these schools was diverse, located in areas that ranged from upper-class downtown Paris to remote rural areas in the South West of France. Schools were invited to participate, and parental consent was sought for students under 18 years of age. Assent from the participating students was also requested.
All data were collected anonymously during spring 2016. In each school, questionnaires were administered online under the supervision of a research assistant in the school's computer (IT) room. To ensure confidentially, trust and accuracy of students' responses, no school staff was present during data collection, which took no longer than 45 min.

Measures
The questionnaire was based on the EU Kids Online survey (Livingstone et al. 2011) and commonly used by other researchers (e.g., Blaya and Audrin 2019; Blaya and Gatti 2010). As previously shown by Blaya and Audrin (2019), this questionnaire yields good reliability indices (α = .95, ω = .96). The questionnaire comprised several questions about the socio-demographic characteristics of respondents (gender and age) and their families, their digital practices (ICT use), their experiences of bullying in schools, and their satisfaction with life. Participants were also asked information regarding their religion and attitudes toward violence, their trust in institutions, the characteristics of their peer group, and their attitudes toward racism. To ensure parsimony and minimize the cognitive burden on participants, questions in each section were kept to a minimum.

School Bullying Victimization
School bullying victimization was measured with three items (α = .66, ω = .68), which assessed how many times during the past 6 months participants were (1) insulted, or made fun of; (2) threatened; or (3) excluded, by other students of their school. Participants were asked to answer on a scale ranging from 1 (never) to 5 (5 times and more).

Cyberhate Victimization
Cyberhate victimization was measured by two items (α = .67, ω = .70). Item one asked participants if during the past 6 months, they had been the target of hateful or humiliating messages, comments, or images on their cell phone. Item two asked participants if during the last 6 months they had been the target of hateful or humiliating messages, comments, or images on social media. For both items, participants were asked to answer on a scale ranging from 1 (never) to 5 (5 times and more).

School Bullying Perpetration
School bullying perpetration was measured with three items (α = .61, ω = .63). Similar to the offline victimization dimension, participants were asked how many times they (1) insulted or made fun of others, (2) threatened others, or (3) excluded other students. They were asked to answer on a scale ranging from 1 (never) to 5 (5 times and more).

Cyberhate Perpetration
Cyberhate perpetration was measured by two items (α = .68, ω = .69). Participants were asked if they had (1) published or (2) shared or transferred humiliating or hateful messages, images, or comments toward one specific person or a group of persons on the Internet. Participants were asked to answer on a scale ranging from 1 (never) to 5 (5 times and more).

Data Analyses
Analyses were performed using R and Mplus version 7.4. Due to the non-normality of our data, we computed robust maximum likelihood estimates. We kept at least two items for each latent variable, as recommended by Kenny (http:// davidakenny.net/cm/identify.htm). Items were kept if their factor loadings (as computed in the hypothesized model depicted in Fig. 1 were equal or higher than .3 and if their R 2 was equal or higher than .3. To assess the model's goodness-of-fit, we relied on indices having different measurement properties, as recommended by Hu and Bentler (1998). Thus, we used the root mean-square error of approximation (RMSEA), the comparative fit indices (CFI), and the SRMR statistics. Browne and Cudeck (1992) suggest that models with RMSEA below .05 are indicative of good fit, and that values up to .08 reflect reasonable errors of approximation. The CFI statistic (McDonald and Marsh 1990) reflects the "distance" of the model from the perfect fit. It is generally acknowledged that a value greater than .9 reflects an acceptable distance to the perfect fit. We also report the SRMR statistics, which represent an averaged distance between the hypothesized model and the real model (Hu and Bentler 1998). This statistics ranges from 0 to 1 and is considered "good" if it is small (around .05 or less). Finally, we report the chi 2 /df ratio, whose value is considered acceptable if it is of 5 or less (Statistics Solutions 2020).

Participants
The age of the 1900 participants ranged between 11 and 20 years (age mean = 14.631, SD = 2.053), 50.25% were females, 49.75% were males). As shown in Table 1, nearly two thirds (64.4%) of the participants indicated that they had been insulted by someone during the past 6 months either online or face-to-face, while just over half (52.3%) reported that they had insulted someone else either online or face-to-face. Furthermore, one out of ten (10.5%) respondents reported cyberhate victimization while 5.2% acknowledged cyberhate perpetration. Findings show that the percentages of young people involved as victims or perpetrators were much higher offline (traditional) than online (cyber).
A good fit with the data was found for the hypothesized model, as shown in Fig. 2 (RMSEA = .046, CFI = .948, and SRMR = .034, chi 2 /df = 1.645). The factor loadings for latent variable items are shown in Table 2. The analysis indicated that items have strong loadings on their respective latent factors, while (as expected) moderate to strong links between the four latent factors were found. (see Fig. 2 and Table 3).
Regarding the links between factors (see Table 3), analyses found that school bullying perpetration and cyberhate perpetration were related (r = .295, p = .001, 95% CI = [.144; .447]), suggesting that in schools where students insult, threaten, or make fun of others in everyday life, students may also perpetrate hate messages against others online. The link between online and offline behaviors was significant for victimization (r = .469, p = .001, 95% CI = [.391; .547), revealing that the more likely students are to be bullied at school, the more likely they are to face humiliating hate messages online. Interestingly, results revealed a strong relationship between school bullying perpetration and victimization (r = .436, p = .001, 95% CI = [.345; .527]), but a weaker relationship between cyberhate victimization and cyberhate perpetration (r = .341, p = .001, 95% CI = [.196; .485]).

Discussion
In our study, we sought to investigate the association of offline victimization and perpetration of bullying and cyberhate since this has never been closely investigated. Our findings have important implications for both research and practice. One out of ten respondents reported cyberhate victimization while 5% of them acknowledged perpetration. Within the limitations of our sample, this provides evidence that hatred is part of the online experience for many young people. These children are potentially fragilized in their identity, self-esteem (Tynes 2006), and their social life (Awan and Zempi 2016). In a population of five and a half million adolescents, 5% equates to 275,000 young people, so there is a genuine need to take the issue seriously. The structural equation modeling analysis found an association between victimization and perpetration for both offline and online behavior. It seems that offline perpetrations increase as either offline or online victimization increases. Offline victimization was also correlated with cyberhate victimization. These results align with propositions of an overlap among perpetrators and victims (Jennings et al. 2012;Hawdon et al. 2015). This can partly be explained by the fact that victims and offenders often share similar environments both online and offline (Hinduja and Patchin 2010). Our findings support the old adage that "violence breeds violence." It appears that opportunities are taken by young people to target others whether that is in traditional face-to-face approaches or through anonymous means online. Newman and Newman (2012) have described the importance of adolescent friendship group and cliques, so our findings could be interpreted through the lens of Socio-Identity Theory (SIT). This theory posits that social groups form on an insider/outsider basis and belonging to one group is an important part of social identity. This can explain both victimization and perpetration, as different groups thrive on conflict and prejudice. The aim of outgroup bias is to value one's own group to the detriment of the other group (Tajfel and Turner 1979). This could explain the association of victimization and perpetration, particularly through anonymous electronic means, as young people invest in maintaining the cohesion of their own social group. Young people outside the social group, with no group to defend them, would be the most vulnerable. Indeed, research by Oksanen et al. (2014) and  Tynes (2006) has shown that victims of cyberhate tend to withdraw socially and not to aggress in return. Given the overlap between bullying and cyberhate, existing intervention programs against school bullying should also tackle cyberhate. Despite developments in interventions against school bullying, cyberhate is one of the issues that has increased the most in the experiences of young people compared with other forms of identity-based cyberbullying (Hawdon et al. 2015). This leads us to stress the need for stronger input from educational institutions in the constructive role they can take to raise awareness and concern among young people toward human rights, diversity, and tolerance as well as IT literacy and to empower young people to reduce online risk taking and cyberhate. This survey has implications for educational practice. While we are facing increasing division on religion, economic, and cultural criteria, we need to get a clearer understanding of our diversities if we wish to smooth the devastating effects of discrimination, racism, xenophobia, Islamophobia, and anti-Semitism as well as anti-West culture, to achieve a positive cohesion of society and youth.
Although the current study utilized a large and diverse sample of youth, limitations must be noted. Findings cannot be generalized due to the non-representative sample that is based on individuals who agreed to complete the questionnaire and schools who volunteered to participate. Moreover, our data were cross-sectional and collected at one point in time, we cannot therefore draw any conclusions regarding the causality between being a victim or a perpetrator. Future studies should adopt longitudinal designs in order to assess this point. Questionnaires are self-reported, and answers are potentially biased like any survey of this type. Potential biases are recall and social desirability. However, to limit recall bias, questions were about the 12 months previous to the survey. We sought to minimize social desirability, by ensuring that the questionnaires were totally anonymous and completed in exam like conditions. Students were isolated to a single table, under the supervision of two researchers and had no opportunity to communicate with others.
The items selected to measure both traditional bullying and cyberhate provide a limited view of what cyberhate could look like and it would be prudent to further investigate more forms of expression of both types of negative behaviors. Finally, our data were cross-sectional and collected at one point in time, we cannot therefore draw any conclusions regarding the causality between being a victim or a perpetrator. Future studies should adopt longitudinal designs in order to assess this point.
Funding Open access funding provided by The University of Teacher Education, State of Vaud (HEP Vaud). This work was supported by the Centre National de la Recherche Scientifique (call for research projects "attentats-recherche," 2016).

Compliance with Ethical Standards
Conflict of Interest The authors declare that they have no conflict of interest.
Research Involving Human Participants and/or Animals The survey was approved by the ethics committee of the Université Nice Sophia Antipolis and fulfills the requirements from the CNIL and CNRS.
Informed Consent Participants and their legal representant gave their informed consent to their participation to the research.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were Fig. 2 Hypothesized model of school bullying and cyberhate made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.