首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Cyberbullying has been identified as an important problem amongst youth in the last decade. This paper reviews some recent findings and discusses general concepts within the area. The review covers definitional issues such as repetition and power imbalance, types of cyberbullying, age and gender differences, overlap with traditional bullying and sequence of events, differences between cyberbullying and traditional bullying, motives for and impact of cyber victimization, coping strategies, and prevention/intervention possibilities. These issues will be illustrated by reference to recent and current literature, and also by in-depth interviews with nine Swedish students aged 13–15 years, who had some first-hand experience of one or more cyberbullying episodes. We conclude by discussing the evidence for different coping, intervention and prevention strategies.  相似文献   

2.
Electronic harassment and cyberbullying can take various forms and involve a range of perpetrators. This study utilised survey results from 1673 New Zealand students aged 12–19 years to explore electronic harassment on the internet and mobile phones and the distress associated with it. Overall, a third of participants reported electronic harassment in the prior year, with half (53.7%) rating it as distressing. Specific hypotheses and findings were that: mobile phone harassment would be more common and distressing than internet harassment, this was supported with 7% more participants reporting mobile phone harassment and 5.5% more reporting distress from it compared to internet harassment; females would report more harassment than males, this was supported for mobile phone harassment as females’ odds of harassment was approximately twice that of males (however the hypothesis did not hold for internet harassment); females would report more distress from harassment, this was supported for both internet and mobile phone harassment, with females’ odds of distress approximately twice as high as males; that some forms and perpetrators would be associated with more distress than others, again this was supported with the most distressing form of mobile phone harassment being direct verbal aggression and for harassment on the internet being rumour spreading. The study also found a preponderance of harassment from school peers. As predicted there were multiple interactions between the harassment forms and perpetrators and gender. These results highlight important differences in how harassment is delivered and experienced across the mobile phone and internet modalities. The findings point to the need to explicitly consider mobile phone harassment, as well as better ways to tailor interventions to address distressing harassment. Schools are well placed to address electronic harassment alongside other bullying interventions.  相似文献   

3.
4.
Electronic aggression, or cyberbullying, is a relatively new phenomenon. As such, consistency in how the construct is defined and operationalized has not yet been achieved, inhibiting a thorough understanding of the construct and how it relates to developmental outcomes. In a series of two studies, exploratory and confirmatory factor analyses (EFAs and CFAs respectively) were used to examine whether electronic aggression can be measured using items similar to that used for measuring traditional bullying, and whether adolescents respond to questions about electronic aggression in the same way they do for traditional bullying. For Study I (n = 17 551; 49% female), adolescents in grades 8-12 were asked to what extent they had experience with physical, verbal, social, and cyberbullying as a bully and victim. EFA and CFA results revealed that adolescents distinguished between the roles they play (bully, victim) in a bullying situation but not forms of bullying (physical, verbal, social, cyber). To examine this further, Study II (n = 733; 62% female), asked adolescents between the ages of 11 and 18 to respond to questions about their experience sending (bully), receiving (victim), and/or seeing (witness) specific online aggressive acts. EFA and CFA results revealed that adolescents did not differentiate between bullies, victims, and witnesses; rather, they made distinctions among the methods used for the aggressive act (i.e. sending mean messages or posting embarrassing pictures). In general, it appears that adolescents differentiated themselves as individuals who participated in specific mode of online aggression, rather than as individuals who played a particular role in online aggression. This distinction is discussed in terms of policy and educational implications.  相似文献   

5.
Research is accumulating to confirm adverse consequences of cyberbullying. Less is known about the perceptions, expectations and reactions of those involved as a function of their different roles (e.g., as bullies, victims, bully-victims) and how this relates to their experiences of traditional bullying. We examined whether cyberbullies' beliefs about the impact of their actions reflects the impact as reported by cybervictims themselves. We tested also whether the emotional reactions to cyberbullying differed depending upon whether the victim was or was not also a victim of traditional bullying behaviours. Participants were 1353 Spanish adolescents. Approximately 8% reported experiences of cyberbullying (compared to 12% reporting experiences of traditional bullying). Cyberbullies believed that their victims would experience more discomfort than cybervictims actually reported experiencing. Those who had experienced victimization in both traditional and cyber contexts evaluated cyberbullying as having greater negative impact than did those who had experienced victimization only in cyber contexts. Perceptions differed according to role and the context(s) in which bullying has been experienced. Findings are discussed in relation to the ways in which technologically delivered aggression may differ from traditional bullying.  相似文献   

6.
This study uses a multilayered framework of different independent school and teacher variables to study which factors are related to the use of ICT for teaching and learning in Flemish (Belgium) primary schools. Special attention is paid to widely accepted technology uses by teachers, which is labelled as ‘Institutionalised ICT use’. A questionnaire has been administered to a representative teacher sample (N = 433) in 53 Flemish primary schools. Factor analyses and multilevel hierarchical regression analyses have been conducted. The results of the multilevel analysis show that ‘Institutionalised ICT use’ should not only be considered as a teacher phenomenon but also as a school phenomenon. The null model shows that about 14% of the variance in ICT use of teachers is due to between-school differences. In a final model, the variables ‘ICT professional development’, ‘ICT competences’, ‘developmental educational beliefs’, and ‘schools' ICT vision and policy’ showed a positive association with ‘Institutionalised ICT use’.  相似文献   

7.
8.
This paper examines the role that Information and Communication Technologies (ICT) play in the socioeconomic development of countries. The proposed model analyzes the relationship between ICT access (available ICT infrastructure and individual’s access to ICT), ICT use (ICT intensity and usage, and ICT skills), and socioeconomic development. The methodology employed consists of a Structural Equation Model (SEM). To achieve this goal, country-level data across 163 countries for the year 2013 is used from developing to developed countries. Results obtained indicate the moderating role of ICT use and skills in the relationship between ICT access and the socioeconomic development. The ICT usage and ICT skills enhance the effect of ICT access on the socioeconomic development. The model is robust with respect to the development level.  相似文献   

9.
In this study, we develop a theoretical model based on social network theories and the social influence model to understand how knowledge professionals utilise technology for work and communication. We investigate the association between ego-centric network properties (structure, position and tie) and information and communication technology (ICT) use of individuals in knowledge-intensive and geographically dispersed settings. Analysis from data collected using a reliable and validated questionnaire show that task-level ICT use is significantly associated with degree centrality and functional tie diversity; and communication-level ICT use is negatively associated with efficiency. The implications of these associations for knowledge-intensive work mean that it is important to consider the professional social network characteristics of potential users of the technology for designing ICT-enabled organizations. The greater the number and diversity of peers individuals interact with translates into more opportunities to use ICT for context-specific tasks. Results from this study also show that individuals who tend to isolate themselves from peers tend to be slow adopters or low users of ICT. Thus, an understanding of how network structure inter-relates with technology and its adopters proves beneficial in reaping benefits required at the organizational (macro) and individual (micro) levels.  相似文献   

10.
Cyberbullying, or online aggression, is an issue of increasing concern, however little research has been conducted on the motivations underlying this form of aggression. Using a mixed-method approach, by means of survey and interview data, we explored whether online aggressive acts were motivated by proactive (intentionally aggressing to obtain a resource or a goal), and/or reactive (aggression that occurs in reaction to provocation) reasons. Participants for the survey portion of the study included 733 adolescents between the ages of 10 and 18, while a subset of 15 adolescents participated in semi-structured interviews. Factor analysis revealed that, in contrast to traditional forms of bullying, adolescents do not identify themselves according to the role they played in an internet aggressive situation (i.e. bully, victim, witness), but according to the method of aggression they used (i.e. sending mean messages, posting embarrassing photos, and developing hostile websites). More interestingly, regression analyses demonstrated that motivations for aggressing online also varied according to method of aggression rather than role. For example, adolescents who chose to aggress by posting mean messages or posting embarrassing photos were more likely to do so for reactive reasons, while adolescents who spent time creating hostile websites did so for proactive reasons.  相似文献   

11.
Kumar  Akshi  Sachdeva  Nitin 《World Wide Web》2022,25(4):1537-1550
World Wide Web - As a constructive mode of information sharing, collaboration and communication, social media platforms offer users with limitless opportunities. The same hypermedia can be...  相似文献   

12.
This paper examines how and why student teachers made use of information and communication technology (ICT) during a 1‐year initial teacher education programme from 2008 to 2009. This is a mixed methods study involving a survey (N = 340) of the entire cohort and a series of semi‐structured interviews with a sample of student teachers within the cohort (N = 21). The study explored several themes, including the nature of student teachers' use of ICT; variation in the use of ICT; support for, and constraints on, using ICT; attitudes to ICT and to teaching and learning more generally. It was found that nearly all teachers were receptive to using ICT – more so than their in‐service counterparts – and made frequent use of it during their placement (internship) experience. The Interactive Whiteboard (IWB) was central to nearly all student teachers' use of ICT, in good part, because it was already used by their mentors and was widely accessible. Student teachers' use of ICT was categorized in three levels. Routine users focused mostly on the use of the IWB for whole class teaching; extended users gave greater opportunities for pupils to use ICT for themselves; innovative student teachers used ICT in a greater range of contexts and made more effort to overcome barriers such as access. ICT use was seen as emerging from a mix of factors: chiefly student teachers' access to ICT; their feeling of ‘self‐efficacy’ when using ICT; and their belief that ICT had a positive impact on learning – in particular, the impact on pupils' behavioural and affective engagement. Factors which influenced ICT use included mentoring, training and support. Limitations on student teachers' use of ICT are explored and it is suggested that new teachers need to be supported in developing a more discerning use as they begin their teaching careers.  相似文献   

13.
A recent model analyzing the role of information and communications technology (ICT) in development shows promise. The model coheres with theory on contingency, the problem of reductionism, and distinctions between deeply and shallowly inscribed organizational change arising from ICT. Conditions of e-readiness at the University of Botswana provide an opportune case study for the model. On the whole the original model holds up well, although the case study reveals relevant factors missed by the model: underlying support infrastructure and postimplementation growth in demand. Accordingly, we define an explicit role for time in the model and add a major new dimension of financial sustainability. These additions equip the model to better account for realities affecting ICT's role in development. Further research needs include case and cross-case studies of the revised model. © 2007 Wiley Periodicals, Inc.  相似文献   

14.
This article deals with information and communication technology (ICT) governance, a topic that has been discussed in the literature over the last 20 years. In order to offer a conceptualized view of the ICT governance models adopted by companies, a theoretical framework has been developed. A review of the available literature dealing with ICT governance, as well as a critical analysis of 27 case studies, was carried out, with the aim of highlighting the variables of the proposed framework.  相似文献   

15.
Beck  B. Olien  D. 《Software, IEEE》1989,6(3):63-72
A process model is presented for constructing and executing parallel programs on a shared-memory multiprocessor running under Unix. The model involves some simple extensions to the standard Unix process model, a set of language extensions, runtime library support, and additional operating-system support. The model is easy to use, and it supports several higher-level parallel programming constructs in several languages, including microtasking in C and Fortran and multitasking in Ada and C++. It frees programmers to concentrate on parallel algorithms instead of low-level implementation details, and it yields good performance  相似文献   

16.
17.
New bottle but old wine: A research of cyberbullying in schools   总被引:1,自引:0,他引:1  
This study investigates the nature and the extent of adolescences’ experience of cyberbullying. A survey study of 177 grade seven students in an urban city is conducted. In this paper, “cyberbullying” refers to bullying via electronic communication tools. The results show that almost 54% of the students were victims of traditional bullying and over a quarter of them had been cyber-bullied. Almost one in three students had bullied others in the traditional form, and almost 15% had bullied others using electronic communication tools. Almost 60% of the cyber victims are females, while over 52% of cyber-bullies are males. Majority of the cyber-bully victims and bystanders did not report the incidents to adults.  相似文献   

18.
Abstract This article explores student teachers' views of the use of information and communication technologies (ICT) in schools. There is limited research literature regarding the perceptions that such students develop in relation to the use of ICT in teaching while observing practice in schools. The paper offers an interpretive analysis of the opinions that a cohort of undergraduate student teachers at a Scottish University expressed in an online forum, following a period of school placement. As part of their initial teacher education (ITE), the students were asked to post messages on the forum in relation to the factors that they perceived as promoting or hindering the use of ICT in schools. Perceptions that students held were found to be complex and varied. Students associated the use of ICT with changes in the nature of classroom relations, as well as a reshaping of learning and teaching. While they welcomed the introduction of ICT as a tool for modernising teaching, students identified a variety of factors that hinder this process. The paper finishes by identifying some of the implications for those working with student teachers in encouraging their development of reflective practice with ICT and enhancing their positive attitudes in relation to the use of ICT in schools.  相似文献   

19.
The proliferation and ease of access to information and communication technologies (ICTs) such as Facebook, text messaging, and instant messaging has resulted in ICT users being presented with more real-time streaming data than ever before. Unfortunately, this has also resulted in individuals increasingly engaging in multitasking as an information management strategy. The purpose of this study was to examine how college students multitask with ICTs and to determine the impacts of this multitasking on their college grade point average (GPA). Using web survey data from a large sample of college students at one university (N = 1839), we found that students reported spending a large amount of time using ICTs on a daily basis. Students reported frequently searching for content not related to courses, using Facebook, emailing, talking on their cell phones, and texting while doing schoolwork. Hierarchical (blocked) linear regression analyses revealed that using Facebook and texting while doing schoolwork were negatively associated with overall college GPA. Engaging in Facebook use or texting while trying to complete schoolwork may tax students' capacity for cognitive processing and preclude deeper learning. Our research indicates that the type and purpose of ICT use matters in terms of the educational impacts of multitasking.  相似文献   

20.
Using handhelds in a Jigsaw cooperative learning environment   总被引:1,自引:0,他引:1  
Abstract This paper reports our implementation of a handheld wireless environment to support Jigsaw cooperative learning activities in a college setting. A quasi-experimental research design was conducted to investigate the effects of using handhelds, as well as issues associated with the use of handheld technology. Two intact classes of fourth-year students from a five-year junior nursing college participated in the experiment. Our findings showed that handheld tools enhanced both students' attitudes and performance in learning, and promoted better interactions among students and instructors. We also found that the handheld technology was not sophisticated enough to support cooperative learning goals without full support from a technology specialist.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号