NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
JongSerl Chun; Serim Lee; Jinyung Kim – SAGE Open, 2024
Since the dynamics and forms of cyber violence evolve at the same rapid pace as technology platforms, we used social big data to develop an ontology for cyber violence victimization in South Korea. Following the seven-stage ontology development process, we extracted keywords from 3,075 social media data sources including online articles, comments,…
Descriptors: Foreign Countries, Bullying, Computer Mediated Communication, Social Media
Graafland, Julie Hooft – OECD Publishing, 2018
This paper provides a synthesis of the literature on and recent trends in new technologies and its effect on 21st century children (0-18 years old). It begins by providing an overview of recent trends in the access and use of new technologies as well as a summary of online opportunities and risks. It then explores a variety of factors, including…
Descriptors: Technology Uses in Education, Technological Advancement, Web 2.0 Technologies, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
McGee, Patricia – International Journal of Mobile and Blended Learning, 2014
Blended or hybrid course design is generally considered to involve a combination of online and classroom activities. However defining blended courses solely based on delivery mode suggests there is nothing more to a blended course than where students meet and how they use technology. Ultimately there is a risk that blended courses defined in this…
Descriptors: Blended Learning, Teaching Methods, Active Learning, Time Management
Peer reviewed Peer reviewed
Direct linkDirect link
Bauman, Sheri – Theory Into Practice, 2013
This article reviews what research has learned about cyberbullying, and the practical implications of those research findings. In general, there are few firm conclusions that can be drawn from the extant literature, as differences in definitions, methods, and measures make it impossible to compare findings across studies. We do have enough…
Descriptors: Bullying, Computer Mediated Communication, Correlation, Gender Differences
Peer reviewed Peer reviewed
Direct linkDirect link
Schubert, Aaron; Wurf, Gerald – Issues in Educational Research, 2014
Federal and State Government policies and curricula mandate the uptake of emergent digital technologies within schools. Recent research focusing on the propagation of adolescent-produced sexual images via digital technologies, more commonly known as sexting, highlights the need for an examination of the risks associated with the use of digital…
Descriptors: Computer Mediated Communication, Adolescents, Content Analysis, School Policy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Convery, Ian; Cox, Diane – Practitioner Research in Higher Education, 2012
Internet-based research methods can include: online surveys, web page content analysis, videoconferencing for online focus groups and/or interviews, analysis of "e-conversations" through social networking sites, email, chat rooms, discussion boards and/or blogs. Over the last ten years, an upsurge in internet-based research (IBR) has led…
Descriptors: Ethics, Research Methodology, Online Surveys, Web Sites
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Piotrowski, Chris – Alabama Counseling Association Journal, 2012
Research on the topic of cyber-bullying has proliferated over the past decade, particularly on its impact on children through adolescents. Thus, it would be of interest to examine the scope and extent of research interest on the topic in scholarly publications. This paper reports on a reference citation analysis of the database PsycINFO, using the…
Descriptors: Violence, Risk, Bullying, Citation Analysis