Defending one’s friends, not one’s enemies: A social network analysis of children’s defending, friendship, and dislike relationships using xpnet.

Research output: Contribution to journalArticleAcademicpeer-review

31 Citations (Scopus)
310 Downloads (Pure)

Abstract

Previous studies investigating to what extent students in elementary schools defend their victimized classmates typically treated defending as an individual characteristic. Defending should, however, be seen as a directed dyadic relationship between a victim and a defender, who are embedded multiple positive and negative relationships with each other and their classmates. Accordingly, in the present study defending was investigated using social network analysis. More specifically, it was investigated to what extent defending relationships co-occurred with friendship and dislike relationships involving not only the victim and the defender but also other classmates. Bivariate Exponential Random Graph Models (ERGMs) were used to analyze the defending-friendship and defending-dislike relationships in seven grade-three classrooms. As hypothesized, the results indicated that victimized students were likely to be defended by students who they perceive as friends or who perceive them as friends. Moreover, defending was likely to occur when the victim and (potential) defender had the same friends. Victimized students were unlikely to be defended by classmates whom they disliked or who had indicated to dislike them. Finally, defending was likely to occur between students who disliked the same classmates.
Original languageEnglish
Number of pages14
JournalPLoS ONE
Volume13
Issue number5
DOIs
Publication statusPublished - 18-May-2018

Keywords

  • NEGATIVE NETWORKS
  • SEX-DIFFERENCES
  • PEER REJECTION
  • VICTIMIZATION
  • CLASSROOM
  • BEHAVIOR
  • ACCEPTANCE
  • CHILDHOOD
  • ROLES
  • ADOLESCENCE

Fingerprint

Dive into the research topics of 'Defending one’s friends, not one’s enemies: A social network analysis of children’s defending, friendship, and dislike relationships using xpnet.'. Together they form a unique fingerprint.

Cite this