NotesFAQContact Us
Collection
Advanced
Search Tips
50 Years of ERIC
50 Years of ERIC
The Education Resources Information Center (ERIC) is celebrating its 50th Birthday! First opened on May 15th, 1964 ERIC continues the long tradition of ongoing innovation and enhancement.

Learn more about the history of ERIC here. PDF icon

Showing all 7 results
Peer reviewed Peer reviewed
Direct linkDirect link
Whittaker, Elizabeth; Kowalski, Robin M. – Journal of School Violence, 2015
Recent years have witnessed a surge of research on cyberbullying. In this article, three studies examined prevalence rates of cyberbullying among college-age students, venues through which cyberbullying occurs, with a particular focus on social media, and perceptions of cyberbullying as a function of features of the target (e.g., peer, celebrity,…
Descriptors: Internet, Bullying, Social Networks, Victims
Peer reviewed Peer reviewed
Direct linkDirect link
Bussey, Kay; Fitzpatrick, Sally; Raman, Amrutha – Journal of School Violence, 2015
This study examines the association between moral disengagement and cyberbullying using a measure of moral disengagement tailored to cyberbullying. It also examines adolescents' self-beliefs in their competence to engage in cyberbullying (cyberbullying self-efficacy beliefs) and how these beliefs may moderate the relation between moral…
Descriptors: Role, Moral Values, Bullying, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Schultze-Krumbholz, Anja; Göbel, Kristin; Scheithauer, Herbert; Brighi, Antonella; Guarini, Annalisa; Tsorbatzoudis, Haralambos; Barkoukis, Vassilis; Pyzalski, Jacek; Plichta, Piotr; Del Rey, Rosario; Casas, José A.; Thompson, Fran; Smith, Peter K. – Journal of School Violence, 2015
In recently published studies on cyberbullying, students are frequently categorized into distinct (cyber)bully and (cyber)victim clusters based on theoretical assumptions and arbitrary cut-off scores adapted from traditional bullying research. The present study identified involvement classes empirically using latent class analysis (LCA), to…
Descriptors: Bullying, Computer Mediated Communication, Comparative Analysis, Cross Cultural Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Gradinger, Petra; Yanagida, Takuya; Strohmeier, Dagmar; Spiel, Christiane – Journal of School Violence, 2015
It is well-documented that cyberbullying and victimization co-occur with traditional forms indicating that they share similar mechanisms. Therefore, it was hypothesized that the general antibullying program ViSC might also be effective in tackling these new forms of bullying. A longitudinal randomized control group design has been applied to…
Descriptors: Internet, Bullying, Victims, Interpersonal Competence
Peer reviewed Peer reviewed
Direct linkDirect link
Mancilla-Caceres, Juan F.; Espelage, Dorothy; Amir, Eyal – Journal of School Violence, 2015
Even though previous studies have addressed the relation between face-to-face bullying and cyberbullying, none have studied both phenomena simultaneously. In this article, we present a computer game-based method to study both types of peer aggression among youth. Study participants included fifth graders (N = 93) in two U.S. Midwestern middle…
Descriptors: Internet, Bullying, Computer Games, Aggression
Peer reviewed Peer reviewed
Direct linkDirect link
Calvin, Angela J.; Bellmore, Amy; Xu, Jun-Ming; Zhu, Xiaojin – Journal of School Violence, 2015
To understand how bullying is represented within social media, the characteristics of hashtags associated with public mentions of bullying on Twitter between January 1, 2012 and December 31, 2012 are explored in this study. The most frequently used 500 hashtags among the 552,831 distinct hashtags used with the keywords "bully,"…
Descriptors: Bullying, Social Networks, Computer Mediated Communication, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Pieschl, Stephanie; Kuhlmann, Christina; Porsch, Torsten – Journal of School Violence, 2015
Cyberbullying is usually defined by utilizing offline criteria for bullying ("repetition," "power imbalance," "intent to harm"). However, this ignores the potential relevance of cyber-specific factors ("publicity," "medium," "type" [i.e., denigration]). We compared six factors, each with…
Descriptors: Internet, Bullying, Comparative Analysis, Foreign Countries