NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
What Works Clearinghouse Rating
Showing 1 to 15 of 18 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Pabian, Sara; Vandebosch, Heidi – International Journal of Behavioral Development, 2016
The purpose of this study was to test bidirectional relationships between (cyber)bullying and (a) bonding to school and (b) bonding to teachers. These relationships were examined while controlling for traditional and cyberbullying victimization, as well as gender and age. The sample consisted of 2,128 Belgian early adolescents, who participated in…
Descriptors: Bullying, Computer Mediated Communication, Teacher Student Relationship, Student School Relationship
Abdüsselam, Mustafa Serkan; Yildiz, Cemalettin; Göl, Resül – Online Submission, 2016
The aim of this qualitative study is to determine middle and secondary school students' approaches related to computers and internet. To achieve this aim a form consisted of 8 open-ended questions was used. The implementation was carried out to 322 middle school and 161 secondary school students in Trabzon and Giresun cities on 2015-2016 school…
Descriptors: Middle School Students, High School Students, Student Attitudes, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Umaña-Taylor, Adriana J.; Tynes, Brendesha M.; Toomey, Russell B.; Williams, David R.; Mitchell, Kimberly J. – Developmental Psychology, 2015
Guided by a risk and resilience framework, the current study examined the associations between Latino adolescents' ("n" = 219; "M" [subscript age] = 14.35; "SD" = 1.75) perceptions of ethnic discrimination in multiple settings (e.g., online, school) and several domains of adjustment (e.g., mental health, academic),…
Descriptors: Hispanic American Students, Adolescents, Risk, Resilience (Psychology)
Peer reviewed Peer reviewed
Direct linkDirect link
Bussey, Kay; Fitzpatrick, Sally; Raman, Amrutha – Journal of School Violence, 2015
This study examines the association between moral disengagement and cyberbullying using a measure of moral disengagement tailored to cyberbullying. It also examines adolescents' self-beliefs in their competence to engage in cyberbullying (cyberbullying self-efficacy beliefs) and how these beliefs may moderate the relation between moral…
Descriptors: Role, Moral Values, Bullying, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Heiman, Tali; Olenik-Shemesh, Dorit – Journal of Learning Disabilities, 2015
Cyberbullying refers to a negative activity aimed at deliberate and repeated harm through the use of a variety of electronic media. This study examined the Internet behavior patterns and gender differences among students with learning disabilities who attended general education and special education classes, their involvement in cyberbullying, and…
Descriptors: Bullying, Computer Mediated Communication, Internet, Gender Differences
Watkins, Ryan; Engel, Laura C.; Hastedt, Dirk – International Association for the Evaluation of Educational Achievement, 2015
The rise of digital information and communication technologies (ICT) has made the acquisition of computer and information literacy (CIL) a leading factor in creating an engaged, informed, and employable citizenry. However, are young people, often described as "digital natives" or the "net generation," developing the necessary…
Descriptors: Information Literacy, Information Technology, Influence of Technology, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Muir, Tracey – Mathematics Education Research Journal, 2014
Today's students increasingly engage in online environments, with ready access to digital resources and mobile technologies. While much of this activity is socially motivated, the internet is also a source of knowledge for students and frequently accessed for school assignments, projects and assessment purposes. As mathematics continues to be…
Descriptors: Electronic Learning, Tutoring, Search Engines, Online Searching
Peer reviewed Peer reviewed
Direct linkDirect link
Kooiman, Brian J.; Sheehan, Dwayne P. – American Journal of Distance Education, 2014
Exergames (active video games that require kinesthetic movement) played in proximity to other players or against a gaming machine have been linked to positive increases in cognitive functioning. This study tested to see if remote exergame play over the Internet had an impact similar to exergames that are played in proximity. The study shows that…
Descriptors: Video Technology, Educational Technology, Physical Education, Motion
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Jing; Iannotti, Ronald J.; Luk, Jeremy W. – Journal of School Psychology, 2012
Patterns of engagement in cyber bullying and four types of traditional bullying were examined using latent class analysis (LCA). Demographic differences and externalizing problems were evaluated across latent class membership. Data were obtained from the 2005-2006 Health Behavior in School-aged Survey and the analytic sample included 7,508 U.S.…
Descriptors: Middle Schools, Bullying, Grades (Scholastic), Females
Peer reviewed Peer reviewed
Direct linkDirect link
Ackers, Melanie Jane – Educational Psychology in Practice, 2012
The topic of cyberbullying is raising international debate and concern. Through the development and dissemination of a questionnaire 12 student researchers were supported in surveying 325 UK students across Years 7, 8 and 9 to gain further knowledge of this area, in relation to children and young people. Results were analysed and comparisons made…
Descriptors: Young Adults, Foreign Countries, Children, Adolescents
Marsh, Rose M. – ProQuest LLC, 2012
Schools have gone through educational reforms having various focuses on curriculum changes, consolidation, open classrooms, mastery learning, decentralization, shared decisionmaking, legislative mandates and controls, high expectations, integrated thematic instruction, professional development, technology integration, and standards with…
Descriptors: Beginning Teacher Induction, Beginning Teachers, Mentors, Virtual Classrooms
Letwinsky, Karim Medico – ProQuest LLC, 2012
The purpose of this quantitative study was to investigate the relationship between mathematics teachers' self-efficacy and the use of technology and the Internet in secondary education classrooms. The focus was on the Internet as a tool to promote mathematics communication and literacy in the online environment. A total of 100 mathematics teachers…
Descriptors: Mathematics Teachers, Secondary School Teachers, Mathematics Instruction, Self Efficacy
Peer reviewed Peer reviewed
Direct linkDirect link
Puustinen, Minna; Bernicot, Josie; Bert-Erboul, Alain – Learning and Instruction, 2011
The present study regarded the self-regulated vs. not-self-regulated function and the indirect vs. direct (i.e., polite vs. impolite) linguistic form of middle school students' requests for help. Natural data (149 requests were sent via an online homework-help forum by French-speaking seventh to ninth graders) was used. Nearly 60% of the requests…
Descriptors: Homework, Speech Communication, Grade 9, French
Peer reviewed Peer reviewed
PDF on ERIC Download full text
DeVoe, Jill; Murphy, Christina – National Center for Education Statistics, 2011
In school year 2008-09, some 7,066,000 U.S. students ages 12 through 18, or 28.0 percent of all such students, reported they were bullied at school, and about 1,521,000, or 6.0 percent, reported they were cyber-bullied anywhere (i.e., on or off school property). These Web Tables use data from the 2009 School Crime Supplement (SCS) to the National…
Descriptors: Elementary School Students, Middle School Students, High School Students, Bullying
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics
Previous Page | Next Page »
Pages: 1  |  2