Results for 'Cyber bullying'

922 found
Order:
  1.  13
    Cyber bullying: Child and youth spirituality.Anastasia Apostolides - 2017 - HTS Theological Studies 73 (3).
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Is the prevention of cyber bullying a current topic in the teaching ethics or bioethics?Beáta Balogová - 2012 - Ethics and Bioethics (in Central Europe) 2 (1-2):78-87.
    The article attempts to open a professional discourse on the question whether society and teaching ethics are aware of the risks which are brought about by the development of ICT and the related possibilities of cyber bullying. Discourse leads to issues of effective prevention in the context of ethics and bioethics with reference to good practice examples from abroad such as the use of a blended learning approach.
     
    Export citation  
     
    Bookmark  
  3.  99
    A philosophical and evolutionary approach to cyber-bullying: social networks and the disruption of sub-moralities.Tommaso Bertolotti & Lorenzo Magnani - 2013 - Ethics and Information Technology 15 (4):285-299.
    Cyber-bullying, and other issues related to violence being committed online in prosocial environments, are beginning to constitute an emergency worldwide. Institutions are particularly sensitive to the problem especially as far as teenagers are concerned inasmuch as, in cases of inter-teen episodes, the deterrent power of ordinary justice is not as effective as it is between adults. In order to develop the most suitable policies, institution should not be satisfied with statistics and sociological perspectives on the phenomenon, but rather (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  4.  13
    How to deal with Cyber-bullying in terms of Moral Education.Sangsoo Lim - 2011 - Journal of Ethics: The Korean Association of Ethics 1 (81):291-316.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  56
    Virtuous reality: moral theory and research into cyber-bullying.Tom Harrison - 2015 - Ethics and Information Technology 17 (4):275-283.
    This article draws on a study investigating how 11–14 year olds growing up in England understand cyber-bullying as a moral concern. Three prominent moral theories: deontology, utilitarianism and virtue ethics, informed the development of a semi-structured interview schedule which enabled young people, in their own words, to describe their experiences of online and offline bullying. Sixty 11–14 year olds from six schools across England were involved with the research. Themes emerging from the interviews included anonymity; the absence (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  4
    101 Facts About Bullying: What Everyone Should Know.Meline M. Kevorkian & Robin D'Antona - 2008 - R&L Education.
    Everyone involved with the care and welfare of children and young adults is confronted with the issue of bullying. Bullying behaviors create an uncomfortable, threatening, and hostile environment that make it difficult for children to learn. 101 Facts about Bullying breaks down what the research says about bullying and its effects, offering ideas for what can and should be done to minimize or reduce it. Kevorkian systematically discusses topics ranging from relational bullying to cyber (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  61
    The Means to Justify the End: Combating Cyber Harassment in Social Media.Tom van Laer - 2014 - Journal of Business Ethics 123 (1):85-98.
    Cyber harassment can have harmful effects on social media users, such as emotional distress and, consequently, withdrawal from social network sites or even life itself. At the same time, users are often upset when network providers intervene and deem such an intrusion an unjust occurrence. This article analyzes how decisions to intervene can be communicated in such a way that users consider them adequate and acceptable. A first experiment shows that informational justice perceptions of social network users depend on (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  9
    Examining the Prevalence and Risk Factors of School Bullying Perpetration Among Chinese Children and Adolescents.Jia Xue, Ran Hu, Lei Chai, Ziqiang Han & Ivan Y. Sun - 2022 - Frontiers in Psychology 13.
    Background and ObjectivesSchool bullying threatens the health of children and adolescents, such as mental health disorders, social deviant behaviors, suicidal behaviors, and coping difficulties. The present study aims to address prevalence rates of both traditional and cyber school bullying perpetration, and the associations between self-control, parental involvement, experiencing conflicts with parents, experiencing interparental conflict, and risk behaviors, and school bullying perpetration among Chinese children and adolescents.MethodThis study used data from a national representative school bullying survey (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  10.  94
    Applying the principles of gestalt theory to teaching ethics.Eugene H. Hunt & Ronald K. Bullis - 1991 - Journal of Business Ethics 10 (5):341 - 347.
    Teaching ethics poses a dilemma for professors of business. First, they have little or no formal training in ethics. Second, they have established ethical values that they may not want to impose upon their students. What is needed is a well-recognized, yet non-sectarian model to facilitate the clarification of ethical questions. Gestalt theory offers such a framework. Four Gestalt principles facilitate ethical clarification and another four Gestalt principles anesthetize ethical clarification. This article examines each principle, illustrates that principle through current (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  11. Beyond Discourse? Using Deleuze and Guattari's schizoanalysis to explore affective assemblages, heterosexually striated space, and lines of flight online and at school.Jessica Ringrose - 2011 - Educational Philosophy and Theory 43 (6):598-618.
    This paper explores how Deleuze and Guattari's philosophical concepts extend and elaborate discursive and psychoanalytic interpretations of qualitative research findings. Analyzing data from a UK research project exploring young people's engagements with Social Networking Sites (SNSs), Deleuze and Guattari's schizoanalytic method is drawn upon to consider complex desire-flows in the social. In particular the notion of ‘affective assemblages’ is developed to explore the relationships between school and online spaces and subjective interfacing with these spaces. The paper suggests online space is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  12. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyberbullying, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  13.  24
    Current issues and enduring questions: a guide to critical thinking and argument, with readings.Sylvan Barnet (ed.) - 2011 - New York: Bedford/St Martin's.
    The unique collaborative effort of a professor of English and a professor of philosophy, Current Issues and Enduring Questions is a balanced and flexible book that provides the benefits of the authors’ dual expertise in effective persuasive writing and rigorous critical thinking. Refined through eight widely adopted editions, it has been revised to address current student interests and trends in argument, research, and writing. Its comprehensive coverage of classic and contemporary approaches to argument includes Aristotle, Toulmin, and a range of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  34
    The Effects of Thought Suppression on Ethical Decision Making: Mental Rebound Versus Ego Depletion.Kai Chi Yam - 2018 - Journal of Business Ethics 147 (1):65-79.
    Although thought suppression is a commonly used self-control strategy that has far-reaching consequences, its effect on ethical decision making is unclear. Whereas ironic process theory suggests that suppressing ethics-related thoughts leads to mental rebounds of ethicality and decreased unethical behavior, ego depletion theory suggests that thought suppression can lead to reduced self-control and increased unethical behavior. Integrating the two theories, I propose that the effect of thought suppression on unethical behavior hinges on the content of the suppressed thoughts. Participants who (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  15.  20
    Confronting the Challenges of Critical Digital Literacy: An Essay Review Critical Constructivism: A Primer.John Pascarella - 2008 - Educational Studies: A Jrnl of the American Educ. Studies Assoc 43 (3):246-255.
    This essay review connects Joe L. Kincheloe's Critical Constructivism on epistemological analysis to the conceptual and sociopolitical challenges of new media in educational contexts. New media is a domain of educational research that has taken ubiquitous directions in recent scholarship. From cyber-bullying to digital rights management to the development of new literacies and the Orwellian nature of plagiarism watchdog sites like Turnitin.com, teachers are wary of tapping new media resources or ?vehicles? to enhance their more traditional instructional strategies (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  13
    Friendship Quality and Gender Differences in Association With Cyberbullying Involvement and Psychological Well-Being.Mairéad Foody, Lian McGuire, Seffetullah Kuldas & James O’Higgins Norman - 2019 - Frontiers in Psychology 10:460972.
    Current literature has documented the detrimental effects of cyberbullying which include a range of internalising and externalising problems for those involved. Although critical, this research can sometimes ignore social-ecological aspects of a child’s life that can potentially ‘buffer’ the negative psychological effects of such involvement. With this in mind, this cross-sectional investigation of 12-16 year olds [M(SD): 13.5(1) years] in Ireland focused on the role of friendship quality and gender in association with cyberbullying involvement and psychological well-being (N= 2410). The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  23
    A Quantitative Study on the Relationship Among Religiosity, Cyberbullying, and Problematic Internet Use.Sezai Korkmaz & Ali Ulvi Mehmedoğlu - 2018 - Dini Araştırmalar 21 (53 (15-06-2018)):35-54.
    In this research, firstly, the related literature of cyberbullying/victimization, problematic internet usage and religiosity and correlations among religiosity, cyberbullying/victimization and problematic internet use were tried to be revealed. Subsequently, the differences between the gender groups on cyberbullying/victimization, problematic internet use and religiosity were examined. Moreover, the differences among the age groups on cyberbullying/victimization, problematic internet use and religiosity were analyzed. The study was conducted with 1130 participants between 16-55 years old. In the study, Personal Information Form, Revised CyberBullying Inventory, Generalized (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  29
    The Cyberethics, Cybersafety, and Cybersecurity at Schools.Irene L. Chen & Libi Shen - 2016 - International Journal of Cyber Ethics in Education 4 (1):1-15.
    The 2006 Megan Meier case, where a teenage girl who was bullied on the Internet through e-mail and Myspace which was said to ultimately lead to her suicide, shed light on the cyber bullying issue in schools. This article uses a case study approach to describe how a number of school institutes were grappling with the loss of confidential information and protecting students on the WWW, each through a unique set of circumstances. It will reveal potential reactions of (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  64
    Cyberbullying in Nigeria: Examining the Adequacy of Legal Responses.Adejoke O. Adediran - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 34 (4):965-984.
    Cyberbullying has been defined as the “process of using the internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person.” The word “cyberbullying” is often used interchangeably with “cyber stalking” and in fact the Cybercrimes Act 2015 of Nigeria, uses the word “cyber stalking” which it defines as any course of conduct directed at a specific person that would cause a reasonable person to feel fear. By the provisions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20. So who am I really? Personal identity in the age of the Internet.Albert Borgmann - 2013 - AI and Society 28 (1):15-20.
    The Internet has become a field of dragon teeth for a person’s identity. It has made it possible for your identity to be mistaken by a credit agency, spied on by the government, foolishly exposed by yourself, pilloried by an enemy, pounded by a bully, or stolen by a criminal. These harms to one’s integrity could be inflicted in the past, but information technology has multiplied and aggravated such injuries. They have not gone unnoticed and are widely bemoaned and discussed. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  94
    Bullying in the U.S. Workplace: Normative and Process-Oriented Ethical Approaches.Helen LaVan & Wm Marty Martin - 2008 - Journal of Business Ethics 83 (2):147-165.
    Bullying is a serious problem in today’s workplace, in that, a large percentage of employees have either been bullied or knows someone who has. There are a variety of ethical concerns dealing with bullying—that is, courses of action to manage the bullying contain serious ethical/legal concerns. The inadequacies of legal protections for bullying in the U.S. workplace also compound the approaches available to deal ethically with bullying. While Schumann (2001, Human Resource Management Review 11, 93–111) (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  22.  33
    Workplace bullying in nursing: towards a more critical organisational perspective.Marie Hutchinson, Margaret Vickers, Debra Jackson & Lesley Wilkes - 2006 - Nursing Inquiry 13 (2):118-126.
    Workplace bullying is a significant issue confronting the nursing profession. Bullying in nursing is frequently described in terms of ‘oppressed group’ behaviour or ‘horizontal violence’. It is proposed that the use of ‘oppressed group’ behaviour theory has fostered only a partial understanding of the phenomenon in nursing. It is suggested that the continued use of ‘oppressed group’ behaviour as the major means for understanding bullying in nursing places a flawed emphasis on bullying as a phenomenon that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  23.  81
    Bullying in the 21st Century Global Organization: An Ethical Perspective.Michael Harvey, Darren Treadway, Joyce Thompson Heames & Allison Duke - 2008 - Journal of Business Ethics 85 (1):27-40.
    The complex global business environment has created a host of problems for managers, none of which is more difficult to address than bullying in the workplace. The rapid rate of change and the everincreasing complexity of organizational environments of business throughout the world have increased the opportunity for bullying to occur more frequently. This article addresses the foundations of bullying by examining the nature' (i.e., bullying behavior influenced by the innate genetic make-up of an individual) and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  24.  32
    Workplace Bullying: Considering the Interaction Between Individual and Work Environment.Al-Karim Samnani & Parbudyal Singh - 2016 - Journal of Business Ethics 139 (3):537-549.
    There has been increased interest in the “dark side” of organizational behavior in recent decades. Workplace bullying, in particular, has received growing attention in the social sciences literature. However, this literature has lacked an integrated approach. More specifically, few studies have investigated causes at levels beyond the individual, such as the group or organization. Extending victim precipitation theory, we present a conceptual model of workplace bullying incorporating factors at the individual-, dyadic-, group-, and organizational-levels. Based on our theoretical (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  25. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  26.  16
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  25
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  29
    Are Bullying Behaviors Tolerated in Some Cultures? Evidence for a Curvilinear Relationship Between Workplace Bullying and Job Satisfaction Among Italian Workers.Gabriele Giorgi, Jose M. Leon-Perez & Alicia Arenas - 2015 - Journal of Business Ethics 131 (1):227-237.
    Since the early 1990s, increasing attention has been paid to the impact of workplace bullying on employees’ well-being and job attitudes. However, the relationship between workplace bullying and job satisfaction remains unclear. This study aims to shed light on the nature of the bullying-job satisfaction relationship in the Italian context. As expected, the results revealed a U-shape curvilinear relationship between workplace bullying and job satisfaction after controlling for demographic variables. In contrast to the curvilinear model, the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  29.  18
    School bullying and bare life: Challenging the state of exception.Paul Horton - 2019 - Educational Philosophy and Theory 51 (14):1444-1453.
    Despite a vast amount of research into school bullying and the widespread implementation of anti-bullying policies and programs, large numbers of students continue to report that they are routinely subjected to bullying by their peers. In this theoretical article, I argue that part of the problem is that there has been a lack of critical discussion of the theoretical foundations upon which such studies are based. Drawing on recent theoretical contributions within the field of school bullying, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  30. Bullying the Bully: Why zero-tolerance policies get a failing grade.H. Theixos & Kristin Borgwald - 2013 - Journal of Social Influence 8 (2-3):149-160.
    Recent studies show that the current punitive approach to bullying, in the form of zero-tolerance policies, is ineffective in reducing bullying and school violence. Despite this significant finding, anti-bullying legislation is increasing. The authors argue that these policies are not only ineffective but that they are also unjust, harmful, and stigmatizing. They advocate a broader integrative approach to bullying programs that includes both victims and bullies.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  32
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  32.  11
    Female bullying among adolescents in Italy: A national mixed-method research.Antonietta De Vita & Giuseppe Burgio - 2023 - ENCYCLOPAIDEIA 27 (65):61-77.
    The subject of bullying has received widespread academic attention, going back to pioneering studies in the 1970s. However, work in this area has tended to take a gender-neutral/male perspective that does not distinguish between male and female bullying. While retaining a dialogue with generalist literature on the subject, this article seeks to highlight the theoretical and political-social relevance of gender-specific and intersectional approaches when exploring the question of bullying between adolescent girls. Based on the study _Il bullismo (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  6
    Cyber law and ethics: regulation of the connected world.Mark Grabowski - 2021 - New York: Taylor & Francis. Edited by Eric P. Robinson.
    A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence, and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in journalism, technology (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Bullying at School - What We Know and What We Can DoCoping with Bullying in Schools.Onesemus Awiria, Dan Olweus & Brendan Byrne - 1994 - British Journal of Educational Studies 42 (4):403.
  35.  30
    Workplace Bullying in a Sample of Italian and Spanish Employees and Its Relationship with Job Satisfaction, and Psychological Well-Being.Alicia Arenas, Gabriele Giorgi, Francesco Montani, Serena Mancuso, Javier Fiz Perez, Nicola Mucci & Giulio Arcangeli - 2015 - Frontiers in Psychology 6.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  36.  9
    Bullying and exclusion from dominant peer group in Polish middle schools.Beata Kozak & Małgorzata Wójcik - 2015 - Polish Psychological Bulletin 46 (1):2-14.
    School bullying also referred to as peer victimization is considered extremely harmful for all parties involved. It has been recognised as an important issue in Polish schools. This article presents the first stage of a project financed by the National Centre of Research and Development and includes the results of qualitative research conducted in groups of middle-school students, middle-school teachers and psychologists. The results highlight several factors leading to the exclusion from the dominant peer group. The results also indicate (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  15
    Bullying among pupils with and without special needs in Slovenian primary schools.A. Kozmus & M. Pšunder - 2017 - Educational Studies 44 (4):408-420.
    Bullying and violence pose widespread problems for contemporary society. In this paper, special attention is given to violence against pupils with SN. The empirical research analyses perceptions of peer violence according to differing roles in relation to violent acts among pupils with and without SN, regarding gender and age. We used the School Bullying Scales measuring instrument, translated and adapted for Slovenia. The main findings of the research are as follows: there is no statistically significant difference between pupils (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  2
    Bullying Trends Inside Sport: When Organized Sport Does Not Attract but Intimidates.Jolita Vveinhardt & Vilija B. Fominiene - 2020 - Frontiers in Psychology 11.
    Bullying is acknowledged by scientists as a considerable and still unresolved problem in sport. By triggering stress-related emotions, they determine the behavior of those experiencing bullying and cause various negative effects on their physical and mental health. However, in the presence of the tenacious trend in sports “to put one’s own house in order,” athletes, coaches, teams, and sports organizations themselves often do not emphasize bullying or state that they do not encounter the problem at all, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  16
    Being Bullied at School: Gratitude as Potential Protective Factor for Suicide Risk in Adolescents.Lourdes Rey, Cirenia Quintana-Orts, Sergio Mérida-López & Natalio Extremera - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  29
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Bullying, stress and health in school principals and medical professionals : experiences at the "front line".Philip Riley & Janice Langan-Fox - 2013 - In Ronald J. Burke (ed.), Human frailties: wrong choices on the drive to success. Burlington: Gower Publishing.
     
    Export citation  
     
    Bookmark  
  42.  66
    Who bullies whom online: A social network analysis of cyberbullying in a school context.Steven Eggermont, Heidi Vandebosch & Denis Wegge - 2014 - Communications 39 (4):415-433.
    Young adolescents’ online bullying behavior has raised a significant amount of academic attention. Nevertheless, little is known about the social context in which such negative actions occur. The present paper addresses this issue and examines how the patterns of traditional bullying and cyberbullying are related, and how electronic forms of bullying can be linked to the social context at school. To address these questions, social network analysis was applied to examine the networks of social interactions and (...) among an entire grade of 1,458 thirteen- to fourteen-year-old pupils. The results show that cyberbullying is an extension of traditional bullying as victims often face the same perpetrators offline and online, there is evidence of mutual cyberbullying among youngsters, and cyberbullying is more likely to occur in same-gender and same-class students. The implications for future research and prevention of cyberbullying are discussed. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  16
    Direct Bullying and Cyberbullying: Experimental Study of Bystanders’ Motivation to Defend Victims and the Role of Anxiety and Identification With the Bully.Tomas Jungert, Pinar Karataş, Nathalie Ophelia Iotti & Sean Perrin - 2021 - Frontiers in Psychology 11.
    School bullying among young adolescents is a globally pervasive problem, but is less common when bystanders are motivated to defend victims. Thus, the focus of this experimental study is on motivation to defend victims of bullying.Methods: A total of 388 students from two Turkish public schools participated in a vignette experiment. Students were randomized to one of two vignettes. Self-report measures of motivation to defend, trait anxiety, depression, and identification with the victim or bully were used.Results: Participants reported (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  25
    Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed a high (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  13
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  19
    Academic Bullying and Human Rights: Is It Time to Take Them Seriously?Dora Kostakopoulou & Morteza Mahmoudi - 2024 - Human Rights Review 25 (1):25-46.
    Notwithstanding universities’ many laudable aims, incidents of serious bullying, academic harassment and sexual harassment in academic settings are reported with increasing regularity globally. However, the human rights violations involved in bullying and academic harassment have not received attention by the literature. In this article, we pierce the veil of silence surrounding university environments and provide a systematic account of the breaches of international and European human rights law involved in academic bullying and harassment. By adopting a socio-legal (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  52
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  32
    School Bullying and Moral Reasoning Competence.Michael Von Grundherr, Anja Geisler, Manuel Stoiber & Mechthild Schäfer - 2017 - Social Development 26 (2):278-294.
    To examine whether high moral reasoning competence of adolescents is associated with low levels of bullying, and to understand whether moral disengagement mediates or moderates this relationship, 925 German children ranging from 11 to 17 years of age (M = 14.18, S = 1.21) completed questionnaires on moral reasoning competence and moral disengagement in surveys at three different schools. The children were classified according to their bullying role, based on a peer- nomination procedure. Multinomial logistic regression analyses showed (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  18
    Bullying the Brain? Longitudinal Links Between Childhood Peer Victimization, Cortisol, and Adolescent Brain Structure.Mieke R. du Plessis, Sanny Smeekens, Antonius H. N. Cillessen, Sarah Whittle & Berna Güroǧlu - 2019 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 922