首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 187 毫秒
1.
This paper investigated the impacts of self-esteem and empathy on cyber bullies, victims and bystanders. Additionally, it also examined their impacts on emotional responses experienced, and actions taken by the perpetrators, victims and bystanders. Self-administered surveys were used to gather data from a large sample of 1263 young adults, mostly university students in Malaysia (Mage?=?20.9?years; SD?=?1.22). The Rosenberg Self-Esteem Scale and Toronto Empathy Scale were used to measure self-esteem and empathy, respectively. Binary logistic regressions revealed no significant impacts of self-esteem and empathy on the participants, regardless of their roles. However, self-esteem was found to have significant relationships with victims’ feeling angry and reporting a cyberbullying incident. As for bystanders, self-esteem also had significant relationships with feeling angry, sad, victim-pity and defending the victims. Empathy had no significant relationships with any of the actions and emotional responses for bullies, victims and bystanders.  相似文献   

2.
Present study explored how message framing (gain vs loss) and social media virality metrics (e.g. the number of ‘likes’ and ‘shares’; SMVM) affect pro-environmental message’s influence perception and behavioral intention. In a 2 (framing: gain vs loss) × 2 (SMVM: high vs low) between-subjects experiment (N = 404), participants were exposed to Facebook posts about mitigating climate change. Major findings indicate: (1) gain framing, compared to loss, resulted in increased social desirability perception of pro-environmental messages when they are accompanied by high numbers of likes and shares; (2) social desirability perception mediated the effect of message framing on third person perception (TPP) but not on second person perception (SPP); (3) numbers of likes and shares affected participants’ message influence perceptions (TPP and SPP), and this was mediated by social desirability perception; and (4) message influence perceptions were found to be significant predictors of participants’ intentions for climate change mitigation actions. Study results implicate that SMVM can signal media content popularity and this can further affect social desirability and influence perceptions of the content. Message framing appeared to have an effect on how one thinks media content influence other people, especially in the presence of high levels of endorsement by others. The potential role of SPP, the perception of shared media influence, in augmenting public awareness and engagement is discussed in detail.  相似文献   

3.
In recent years, scholars have documented an increase in flaming behavior, which refers to a strong and hostile expression of emotions and feelings online. In order to identify the mechanism and specific circumstances of flaming, this study employed emotional contagion as the main theoretical framework and conducted a 2 (argument presented in a news article: support gun control vs. against gun control) × 2 (volume of negative comments: small vs. large) × 2 (news readers’ pre-existing beliefs: support gun control vs. against gun control) between-subjects experiment. Participants were asked to read an online news article about a gun-related topic as well as negative reader comments before they wrote a comment of their own. The experimental results showed that participants were more likely to use swear words in their comments when their viewpoint was diametrically opposed to the argument presented in the news article and when the article was accompanied by a low volume of negative comments. This interaction effect was mediated by negative emotions that participants experienced when reading the article and its associated comments. These findings have theoretical implications for future research pertaining to the identification of online circumstances and causes that could help mitigate the occurrence of flaming.  相似文献   

4.
This paper examined the emotional reactions and actions involving cyberbullying, focusing on the cyber bullies, victims, bully-victims and bystanders. Gender analysis was conducted to examine if males and females behave and react differently. Self-administered surveys were used to gather data from a large sample of 1158 young adults, mostly university students in Malaysia (Mage?=?21.0?years; SD?=?2.16). Findings indicate the presence of cyberbullying perpetration after the schooling years, with 8% (N?=?93) bullying, 18.6% (N?=?216) victimization, 15.2% (N?=?174) bullying and victimization, and 53.4% (N?=?675) witnessing a cyberbullying incident in the past one year. Most of the bullies reported to be remorseful; however the majority did nothing after a perpetration. Most of the victims on the other hand, experienced anger, sadness and depression after a victimization with the majority claiming to have defended themselves (75%). The majority of the bully-victims regretted their actions, pitied the victims and felt angry after a cyberbullying perpetration/victimization. Bystanders mostly reported feeling pity for the victim and angry at the bullies, with the majority (61.5%) claiming to have defended the victims. However, 40% of them behaved indifferently out of fear retaliation. Finally, gender analysis revealed females to have significantly experienced more emotions than males whereas more males did nothing after a cyberbullying incident, both as victims and bystanders.  相似文献   

5.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   

6.
提供基于用户感知的IPTV质量端到端自动化评估方法和系统,将用户侧感知数据、用户承载网络运行数据以及远端视频服务平台数据等整合到同一个大数据分析系统,通过大数据分析手段建立用户端到端感知模型及评价体系,实现用户端管云业务感知监测,自动获取用户在使用IPTV过程中的感知度,并实现用户感知度端管云的量化评估。通过端管云业务感知评估结果,有针对性地解决影响用户感知的问题和环节,以改善服务的不足。  相似文献   

7.
The current interest of college students in helping to solve society's problems is attacked in two novel programs at Dartmouth College, Hanover, N. H. Both undergraduate and graduate engineering students are involved in teaching, learning, and working at off-campus sites for a term. One group is in Jersey City, N. J., where they help to teach the ECCP developed "Man-Made World" (MMW) to inner-city high school seniors while working for the city government. Another group is at Tuskegee Institute in Alabama, where they help to teach a novel freshman engineering course based on the MMW as well as attend regular classes. Results of the programs are discussed and future plans are indicated.  相似文献   

8.
Text messages are characterised by a casual language style, ‘textese’ (e.g., c u on thurs). This study investigated adolescents’ perceptions of the use of different levels of textese in digital messages which varied in their intended recipient (friend, teacher). Grade 8 students in Australia (N = 90, aged 13–14 years) each read six text messages purportedly written by a fellow student, and rated the extent to which they agreed (on a 7-point Likert scale) that the message writer was intelligent, paid attention to detail, used an appropriate writing style, and was friendly. Overall, participants rated message senders most favourably on all measures when they used no textese, and least favourably when they used high levels of textese. This pattern was even stronger when messages were addressed to teachers rather than same-aged friends. The findings suggest that adolescents are sensitive to both writing style and recipient when considering digital messages.  相似文献   

9.
围绕时序逻辑电路设计中串行数据检测器这一教学案例进行探讨,分析了传统和两种改进型电路的设计缺陷及其逻辑抽象本质,通过将传统设计方法和实用的电路设计相结合,能够把时序逻辑电路设计中涉及的逻辑抽象、状态等价、状态化简等概念实例化,教学内容的理论体系更完整、教学过程的逻辑性更强,有助于激发同学们夯实理论知识体系、解决实际问题的创新性思维能力。  相似文献   

10.
Serious games have proven to be educational tools with numerous positive effects, capable of promoting learning, changing behavior, or improving training and skills development, among other effects. Serious games can also be applied to address and prevent social problems. This study describes the experiments and analyses we have carried out to test the effectiveness of Conectado, a serious game created to prevent bullying and cyberbullying in schools by increasing awareness of the problem in players. We have used the results from these experiments to answer different research questions regarding the game’s acceptance and effectiveness, validating several characteristics of the game design. We have also studied the influence of players’ characteristics on the effect of the game, as well as the relationship between the in-game behaviors of players and their degree of awareness. We have verified a positive effect of the game in terms of an increase of awareness regarding bullying and cyberbullying for all target users, and have provided further insight into how this increase is related to different players’ characteristics and behaviors.  相似文献   

11.
县级应急广播体系直接承担着面向人民群众宣传党和国家的方针政策、播发应急信息和提供公共文化服务的任务,是应急广播进入千家万户的重要基础,也是应急广播体系建设的重点和难点。本文以云南省江城县为例,对县级应急广播体系建设模式进行研究与实践,通过调频广播、地面数字电视广播、有线数字电视广播、大喇叭系统等多种方式,实现应急广播信号在全县的综合覆盖,为云南省应急广播体系建设奠定基础。  相似文献   

12.
In past works, social robots have been designed to mimic human appearances and behavior. However, little is known about how human beings may imitate social robots. Drawing on social cognitive theory and the Media Equation, this study focuses on the modeling effects of social robots in an environment protection context. A lab experiment (N = 128) with a between-subjects factorial design was conducted to examine how social robots’ behavioral outcomes and social roles affected individuals’ modeling behavior. This study suggested that social robots’ positive behavioral outcomes were effective in evoking users’ modeling tendencies serially through social presence and identification or only through identification. Robots’ mere presentation of behavior with no outcomes exerted effects serially through social presence and identification. Additionally, assigning social robots an instructor role led to users’ modeling behavior serially through users’ perception of robots’ expertise and credibility. The study analyzed the psychological mechanisms behind users’ modeling behavior.  相似文献   

13.
针对现有人机交互系统广泛存在机器人情感响应缺乏独特性和主动性、参与人参与度、满意度、体验感不高的问题,该文依据愉悦度-激活度-优势度(PAD)情感空间提出一种基于模糊认知图的机器人情感响应模型.首先,获取参与人交互输入情感值,对其评估得到参与人的情感状态矩阵;其次,考虑到机器人的性格特征和社会角色,利用模糊认知图的时间...  相似文献   

14.
In this systematic review of exclusively longitudinal studies on cyberbullying perpetration and victimization among adolescents, we identified 76 original longitudinal studies published between 2007 and 2017. The majority of them approached middle school students in two waves at 6 or 12 months apart. Prevalence rates for cyberbullying perpetration varied between 5.3 and 66.2 percent, and for cyberbullying victimization between 1.9 and 84.0 percent. Person-related factors (e.g., traditional bullying, internalizing problems) were among the most studied concepts, primarily examined as significant risk factors. Evidence on the causal relationships with media-related factors (e.g., (problematic) Internet use), and environmental factors (e.g., parent and peer relations) was scarce. This review identified gaps for future longitudinal research on cyberbullying perpetration and victimization in childhood and adolescence.  相似文献   

15.
This study analyzes the effects of crosstalk-induced faults due to parameter variation during the manufacture of DRAMs. The focus is on read operations, which are sensitive to crosstalk and to neighborhood data patterns. Analytical studies and numerical simulations have been used to investigate a class of crosstalk reading faults (CRF) that read operations are susceptible to. The results reveal that there exist worst case data patterns in each physical RAM block and cell arrangement. The worst case data pattern occurs when neighboring and victim bit-lines switch to opposite values at the same time. If the bit-line arrangement is known, the test for the CRFs is quite trivial. If there is no knowledge of the internal chip structure, a deterministic pattern cannot be assigned and therefore a generic test method is needed. In this paper, a test algorithm is proposed that exhausts every state of any 3 or 5 bit-lines of a RAM block. Zemo Yang is a senior engineering manager in S3 Graphics Inc. in Fremont, California. He has fifteen years of experience in electrical modeling and signal integrity analysis, IC packaging, high-speed module design, and IC product and test engineering. Zemo received his M.S. degrees in physics and electrical engineering from the University of Arizona in 1988 and 1991 respectively. He is currently PhD candidate at Santa Clara University. Samiha Mourad is the William and Janice Terry Professor of Engineering at Santa Clara University where she chairs the Electrical Engineering Department and conducts research in ASIC Design and Testing. Prior to joining Santa Clara University, she spent several years as a research associate at the Center for Reliable Computing of Stanford University. She has authored and coauthored over 100 conference and journal papers, and three books. Her latest book, Principles of Testing Digital Systems, was published by Wiley and Sons in 2000.  相似文献   

16.
Much scholarship has examined the parasocial bonds between audiences and media personalities. However, recent research differentiated between the development of parasocial relationships and the actual experience of parasocial interaction (EPSI) that can result from structural elements of a message such as style of address (Hartmann & Goldhoorn, 2011). This study presents an alternate conceptualization of style of address and employs an online assessment to examine its impact on the EPSI. Results indicated that bodily address, where the onscreen performer could be seen speaking to the viewer, fostered a stronger sense of interaction relative to verbal or no address. Moreover, emotional contagion, an affective component of empathy, likewise facilitated these perceived interactions, most strongly in response to bodily address.  相似文献   

17.
多代理系统以一种分布式的计算模式有助于信息协作分析和决策,而代理的智能感知能力让系统可以根据周围环境而动态调整行为。本文基于多代理技术,介绍了一个普适计算环境下的医疗急救原型系统。通过对Agent技术、感知技术的研究,将其运用到系统的多代理模型的设计中,并介绍了多代理的信息协作算法,感知的多代理系统能够有效提高急救效率和成功率。  相似文献   

18.
A wide range of factors affects risk perception during urban cycling. In this research, we investigate a factor so far not addressed: the spatial configuration of the vista space; with the underlying reasoning that more complex or rapidly changing vista spaces are perceived as more dangerous. We present a method to quantify a vista space’s spatial configuration by generating highly precise isovists based on laser scans. We test our assumptions in a lab-based study, where participants rate the perceived risk for cycling in various image sequences displaying complex traffic situations. The tested traffic situations are selected from a project collecting citizens’ reports about urban cycling risks. Our findings support the hypothesis that the spatial configuration of the vista space is a highly relevant factor for risk perception which deserves further investigation. Further analyses imply that volunteered geographic information on subjective topics such as risk perception may be of limited accuracy, but is likely to be representative for a larger population.  相似文献   

19.
In this paper, we present an energy-aware informed prefetching technique called Eco-Storage that makes use of the application-disclosed access patterns to group the informed prefetching process in a hybrid storage system (e.g., hard disk drive and solid state disks). Since the SSDs are more energy efficient than HDDs, aggressive prefetching for the data in the HDD level enables it to have as much standby time as possible in order to save power. In the Eco-Storage system, the application can still read its on-demand I/O reading requests from the hybrid storage system while the data blocks are prefetched in groups from HDD to SSD. We show that these two steps can be handled in parallel to decreases the system’s power consumption. Our Eco-Storage technique differs from existing energy-aware prefetching schemes in two ways. First, Eco-Storage is implemented in a hybrid storage system where the SDD level is more energy efficient. Second, it can group the informed prefetching process and quickly prefetch the data from the HDD to the SSD to increase the frequent HDD standby times. This will makes the application finds most of its on-demand I/O reading requests in the SSD level. Finally, we develop a simulator to evaluate our Eco-Storage system performance. Our results show that our Eco-Storage reduces the power consumption by at least 75 % when compared with the worst case of non-Eco-Storage case using a real-world I/O trace.  相似文献   

20.
A novel deterministic packet marking (DPM) for IP traceback against denial of service (DoS) and distributed denial of service (DDoS) attacks is presented, which features good scalability and high accuracy. In this scheme, an ingress router pre-calculates a Hash of its IP address and splits the Hash into several fragments. When marking a packet, the router randomly selects a fragment to mark into the packet. In the traceback stage the victim identifies the marked router with the help of the map of its upstream routers. Based on the map, the victim can identify a candidate ingress router after receiving only several marked packets. The scheme overcomes defects in previous deterministic packet marking schemes, where too much packets are required to recover a router and high false positive rate occurs in case of large-scale DDoS. Theoretical analysis, the pseudo code and experimental results are provided. The scheme is proved to be accurate and efficient and can handle large-scale DDoS attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号