Cyber Bullying in UK Law
-
Cyber-bullying research in Kenya: a meta-analysis
Purpose: Cyber-bullying is a form of harassment that is perpetrated using electronic media. The practice has become increasingly common especially with the growing ubiquity of social media platform...
-
Bullying Enters the 21st Century? Turning a Critical Eye to Cyber-bullying Research
Current concerns around cyber-bullying emphasize child-victims and have prompted calls for understanding and reaction to an alleged new type of child-offender. Though there is little doubt that cyb...
-
Definitional constructs of cyber‐bullying and cyber‐aggression from a triangulatory overview: a preliminary study into elements of cyber‐bullying
Purpose: The purpose of this paper is to explore the acts that constitute cyber‐bullying and to see how from a lay concept these acts are classified. Design/methodology/approach: Data were gathere...
-
Italian adolescents’ experience of unwanted online attentions: Recognizing and defining behaviours
For young people, in addition to positive experiences, there are risks and negative consequences in the usage of the Internet and Information and Communication Technologies (ICT), such as forms of ...... ... and the general public express this phenomenon (for example, cyber-bullying, cyber-aggression, cyber-harassment). The present research ... ...
-
A systematic review of bullying definitions: how definition and format affect study outcome
Purpose: The purpose of this paper is to explore how varying definitions of bullying and formats of the definitions affect research study outcomes. Design/methodology/approach: A systematic search...... ... As traditional formsof bullying differ from cyber-bullying research on the latter were excluded.Findings –Only 17 of the 18,045 screened met the study eligibility criteria. In total, 12 of the ... ...
-
Victimization experience does matter: Testing the effect of different types of victimization on fear of crime among adolescents
The aim of the present study is to thoroughly examine the relationship between adolescent fear of crime and a wide variety of offences which commonly affect children. The analysed data comes from t...... ... with fear of crime, though the strongest effects were found for cyber-victimization andbullying rather than conventional violent and property ... of offences which children are typically victimized by,including bullying as well as victimization in cyberspace.Inconsistent relationship between ... ...
-
Improving the affective analysis in texts. Automatic method to detect affective intensity in lexicons based on Plutchik’s wheel of emotions
Purpose: This paper aims to propose a method for automatically labelling an affective lexicon with intensity values by using the WordNet Similarity (WS) software package with the purpose of improvi...... ... to detect the roles of participants in a situation ofcyber bullying, for example, the bully and victim. Other problems in which the ... ...
-
Exploring bullying behaviors from the perspective of physicians and nurses in Jordanian public hospitals
Purpose: This study aims to explore the perception of physicians and nurses toward the prevalence of workplace bullying behaviors (verbal, physical, social, and cyber) in Jordanian public hospitals...... ... aims to explore the perception of physicians and nurses toward the prevalence ofworkplace bullying behaviors (verbal, physical, social, and cyber) in Jordanian public hospitals.Design/methodology/approach –The study population consisted of 1,056 physicians and nurses workingon the day and ... ...
-
When cyberaggression is personal: gender differences in threats and betrayals of partners and friends
Purpose: New ways of perpetrating relational aggression have been facilitated by the increased availability and adoption of technology for communication, resulting in growing cyberaggression rates ...... ... –offenderrelationships.Keywords Gender, Domestic violence, Cyber dating abuse, Cyberaggression, Online harassment,Victim–offender ... , as intraditional forms of schoolyard or workplace harassment and bullying, humiliating anddamaging texts or images can be transmitted all over the ... ...
-
Book Review: A. Gillespie, Child Exploitation and Communication Technologies, Russell House Publishing Ltd, Dorset, 2008, £19.95 Pb, ISBN 978—1-90554—123—2
... ... Moreover it highlights the worrying trends in cyber-bullying and self-exploitation, which are covered in subsequent chapters ... ...
See all results