NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)1
Since 2006 (last 20 years)11
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 12 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Kritzinger, Elmarie – Africa Education Review, 2017
Technology is playing an increasingly significant role in people's lives. They use it for work, education, business and social activities; however, their use of different kinds of information communication technologies (ICTs) puts their personal information at risk. It is essential for everyone using ICTs to be aware of the potential information…
Descriptors: School Culture, Foreign Countries, Computer Security, Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Eskey, Michael T.; Taylor, Cathy L.; Eskey, Michael T., Jr. – Online Journal of Distance Learning Administration, 2014
The advent of online learning has created the medium for cyber-bullying in the virtual classroom and also by e-mail. Bullying is usually expected in the workplace and between students in the classroom. Most recently, however, faculty members have become surprising targets of online bullying. For many, there are no established policies nor is…
Descriptors: Teacher Attitudes, Internet, Bullying, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Patchin, Justin W.; Hinduja, Sameer – Youth & Society, 2011
Bullying at school is a common problem facing youth, school officials, and parents. A significant body of research has detailed the serious consequences associated with bullying victimization. Recently, however, a new permutation has arisen and arguably become even more problematic. "Cyberbullying," as it has been termed, occurs when youth use…
Descriptors: Bullying, Internet, Electronic Mail, Telecommunications
Levine, Emily L. – ProQuest LLC, 2013
The purpose of this study was to examine parents' perceptions of their role in supervision of their children's use of technology and their reported responses to events in which their children are cyberbullying oppressors, victims, or bystanders. The theoretical perspectives such as Bronfenbrenner's (1979) ecological theory,…
Descriptors: Bullying, Computer Mediated Communication, Parent Role, Child Rearing
Akbulut, Yavuz; Cuhadar, Cem – Online Submission, 2011
The current phenomenological study addressed the reflections of preservice information technology (IT) teachers regarding their cyberbullying or victimization experiences. Fifty five preservice IT teachers at a Turkish teacher training institution were offered a lecture with the purpose of awareness-raising on cyberbullying, which was followed by…
Descriptors: Information Technology, Synchronous Communication, Victims of Crime, Social Networks
Brown, Christina F.; Demaray, Michelle K. – Communique, 2009
Cyberbullying is a rapidly growing problem among school-age children. Current estimates indicate that 20% to 35% of children and adolescents report experiencing cyberbullying (Diamanduros, Downs, & Jenkins, 2008; Kowalski & Limber, 2007). Definitions of cyberbullying vary and no standard definition has yet been established. Hinduja and…
Descriptors: Research Needs, Bullying, Computer Mediated Communication, Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Reeckman, Barbara; Cannard, Laine – Youth Studies Australia, 2009
TAFE discipline procedures only apply to cyberbullying events that occur on campus, but this study found that some online incidents occurring off campus affect young people's experience of TAFE and students wanted staff to deal with them. Unlike conventional bullying, it appears that young people think cyberbullying shouldn't be defined by…
Descriptors: Young Adults, Adolescents, Secondary Education, Bullying
Jacobs, Thomas A. – Free Spirit Publishing, 2010
The Internet age has led to a different kind of teen bullying: cyberbullying. What is cyberbullying and what can teens do about it? In "Teen Cyberbullying Investigated," Judge Tom Jacobs presents a powerful collection of landmark court cases involving teens and charges of cyberbullying and cyberharassment. This riveting, informative guide will…
Descriptors: Bullying, School Districts, Court Litigation, Adolescents
Wingate, Julius Jason – ProQuest LLC, 2010
This study examines the use of Internet polling at schools to gain student input for the improvement of learning conditions to assist in the continuous improvement planning. The study consists of 2006 respondents and three different schools containing the middle school child. The grades included in the study were 5, 6, 7, and 8. Although two…
Descriptors: Student Attitudes, Educational Improvement, School Location, Total Quality Management
David-Ferdon, Corinne; Hertz, Marci Feldman – Centers for Disease Control and Prevention, 2009
Electronic media play an integral role in the lives of all people. Over the years, the rapid evolution of technology in various forms has significantly influenced the way people live and interact. Televisions, record players, computers, and VCRs changed how people learned, were entertained, stayed connected, and explored. In the past two decades,…
Descriptors: Electronic Publishing, Violence, Access to Computers, Adolescents
Peer reviewed Peer reviewed
Direct linkDirect link
Beran, Tanya; Li, Qing – Journal of Educational Computing Research, 2005
A total of 432 students from grades 7-9 in Canadian schools reported their experiences of cyber-harassment, which is a form of harassment that occurs through the use of electronic communications such as e-mail and cell phones. More than two-thirds of students (69%) have heard of incidents of cyber-harassment, about one quarter (21%) have been…
Descriptors: Junior High School Students, Information Technology, Bullying, Telecommunications
Willard, Nancy – School Library Journal, 2006
Cyberbullying is the use of electronic information such as e-mail and other digital age tools to bully or harass individuals. Cyberbullies post angry and vulgar messages in online "flaming" wars or hack into a peer's e-mail account to wreak havoc, assaulting the reputations and already fragile egos of their young victims. The devastating effects…
Descriptors: Electronic Mail, Bullying, School Safety, Computer Mediated Communication