NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Cynthia; Fiolet, Renee; McKay, Dana; Harris, Bridget – Qualitative Research Journal, 2023
Purpose: This paper presents a novel exploration of the story completion (SC) method for investigating perpetration of technology-facilitated abuse in relationships (TAR). Design/methodology/approach: The authors adopted the infrequently used SC method to explore TAR perpetration. The perpetration of TAR can involve socially undesirable and…
Descriptors: Internet, Computer Mediated Communication, Antisocial Behavior, Sexual Harassment
Peer reviewed Peer reviewed
Direct linkDirect link
Deveci Topal, Arzu; Kolburan Gecer, Aynur – Educational Research and Reviews, 2015
The development of web 2.0 technology has resulted in an increase in internet sharing. The scope of this study is social networking, which is one of the web 2.0 tools most heavily used by internet users. In this paper, the unethical behaviours that preservice teachers encounter on social networks and the ways to deal with these problems are…
Descriptors: Preservice Teachers, Ethics, Social Networks, Web 2.0 Technologies
Siegle, Del – Gifted Child Today, 2010
Many young people cannot remember a time before Instant Messaging (IM), cell phone text messaging, video conferencing, blogging, e-mailing, and MySpace and Facebook postings existed. Thanks to the ubiquitous nature of technology in the 21st century, digital natives are accustomed to seeing, and being seen, on a scale that was unimaginable by their…
Descriptors: Safety, Information Technology, Bullying, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Yau, Hon Keung; Cheng, Alison Lai Fong – International Journal of Learning and Change, 2010
Organisational defensive patterns, including skilled incompetence, organisational defensive routines and fancy footwork, are considered to be a hindrance to effective learning and innovation capacity building in all organisations. The purpose of this research is to investigate: 1) the perceptions of the influence of organisational defensive…
Descriptors: Foreign Countries, Organizational Communication, Innovation, Questionnaires
Froese-Germain, Bernie – Education Canada, 2008
Online bullying or cyberbullying is one of the changes spawned by the Internet and social networking sites. Sometimes described as "old wine in a new bottle" (to signify a new form of bullying), it is one of those phenomena that has left educators--and just about everyone else--scrambling. In this article, the author details the expanding trend of…
Descriptors: Violence, Bullying, Social Networks, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Bauman, Sheri – Journal of Early Adolescence, 2010
Students (N = 221) in an intermediate school (grades 5-8) in a rural area of the Southwestern United States completed a survey regarding their familiarity with technology and their experiences with cyberbullying during the school year. Initial evidence of survey reliability is presented. In the sample, 1.5% of participants were classified as…
Descriptors: Student Attitudes, Familiarity, Rural Areas, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Diamanduros, Terry; Downs, Elizabeth; Jenkins, Stephen J. – Psychology in the Schools, 2008
Many school-aged children have experienced the cruelty of bullying. The impact and effects of bullying have been described extensively in scholarly literature. Unfortunately, the impact of bullying has also made contemporary headlines with the recent rash of school shootings and other forms of school-based violence. The current body of students…
Descriptors: Counseling Techniques, Psychologists, School Psychologists, Bullying