دانلود و نمایش مقالات مرتبط با Bullying::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Bullying

تعداد مقالات یافته شده: 17
ردیف عنوان نوع
1 Applying artificial intelligence to explore sexual cyberbullying behaviour
استفاده از هوش مصنوعی برای کشف رفتار مزاحمت اینترنتی-2020
Sexual cyberbullying is becoming a serious problem in todays society. In the workplace, this issue is more complex because of the power imbalance between potential perpetrators and victims. Preventing sexual cyber- bullying in organizations is very important for a safety and respectful workplace. Occupational Safety and Health (OSH) standards establish certain policies to be considered to create an organizational culture based on zero tolerance to sexual cyberbullying. The research aims to broaden knowledge about personality and sexual cyberbullying. Therefore, this paper proposes a crucial tool to explore potential sexual cyberbullying behavior. This study analyzed how personality traits, particularly those related to the Dark Triad (psychopathy, Machia-vellianism and narcissism), might influence this behavior. Participants (N ¼ 374) were Spanish young adults, using the convenience sampling to recruit them. The methodology focused on the use of structural equation modelling and ensemble classification tree. First, we tested the proposed hypotheses with structural equation method based on covariance using the Lavaan R-package. Second, for the ensemble of classification trees, we applied the package random Forest and Adabag (bagging and boosting) in R. Results proposed high levels of psychopathy and Machiavellianism are more likely to be related to sexual cyberbullying behaviors. Organizations could use the tool proposed in this research to develop internal policies and procedures for detection and deterrence of potential cyberbullying behaviors. By raising awareness about cyberbullying behaviour including its conceptualization and measurement in training courses, organizations might build an organizational culture based on a respectful workplace without sexual cyberbullying behaviours.
Keywords: Cyberbullying | Dark triad | Machiavellianism | Narcissism | Psychopathy | Structural equation modelling | Ensemble classification tree | Artificial intelligence | Machine learning | Business | Human resource management
مقاله انگلیسی
2 A Multi-Method Investigation of the Personality Correlates of Digital Aggression
بررسی چند روشی ارتباط شخصیتی پرخاشگری دیجیتال-2020
Digital aggression (DA) refers to the use of computer-mediated technologies to harm others. A handful of previous studies have provided mixed results regarding the personality correlates of DA. We clarified these findings by analyzing the associations between three measures of DA (behavioral, Twitter, and self-report) and the Big Five traits using data from 1167 undergraduate participants. Big Five personality trait measures predicted all three DA measures, but results varied across particular assessments of DA. These results point to possible moderators and potentially important differences within the broader construct of DA.
Keywords: Big 5 | Cyberbullying | Digital Aggression | Personality
مقاله انگلیسی
3 Parenting in the digital era: Protective and risk parenting styles for traditional bullying and cyberbullying victimization
والدین در عصر دیجیتال: سبک های والدین محافظت و در معرض خطر برای زورگویی سنتی و قربانی حمله سایبری-2019
This study analyzes the parenting styles that could act as risk or protective factors for bullying and cyberbullying victimization in Spain, considering the predisposition to aggression of the adolescents. The protective or risk effect of parenting styles for adolescents related behavior such as antisocial behavior, school adjustment, and self-esteem was also analyzed. Study sample was 1109 adolescents aged between 12 and 17 years (49.96%, females, M=13.88, SD=1.38). A 4×2×2×2 MANOVA was applied for the outcome variables of bullying victimization (traditional bullying and cyberbullying), antisocial behavior, school adjustment, and self-esteem; with parenting style, predisposition to aggression, sex and age as independent variables. The results confirm and extend emergent research in parenting styles, carried out in Spain and other European and Latin-American countries, showing that indulgent parenting, characterized by the use of reasoning and warmth practices, can act as a protective factor for both traditional bullying and cyberbullying victimization. On the contrary, authoritarian parenting, characterized by the use of physical and verbal coercion and privation practices, would act as a risk factor for cyberbullying and traditional bullying victimization. The protective and risk effects of parenting styles over adolescents adjustment take place irrespective of the adolescents predisposition to aggression
Keywords: Cyberbullying | Bullying | Peer victimization | Parenting styles | Adolescence
مقاله انگلیسی
4 Associations of Lesbian, Gay, Bisexual, Transgender, and QuestioningeInclusive Sex Education With Mental Health Outcomes and School-Based Victimization in U:S: High School Students
انجمن های لزبین ، همجنسگرا ، دوجنسگرا ، ترنسجندر و سؤال از آموزش فراگیر جنسی با پیامدهای سلامت روانی و قربانی سازی مدارس در دانش آموزان دبیرستانی ایالات متحده-2019
Purpose: Homophobic school climates are related to increased victimization for sexual minority youth (SMY), leading to increased risk of adverse mental health outcomes. Interventions that promote positive school climate may reduce the risk of victimization and adverse mental health outcomes in SMY. This study explored whether lesbian, gay, bisexual, transgender, and questioning (LGBTQ)einclusive sex education is associated with adverse mental health and school-based victimization in U.S. youth. Methods: Data analysis of representative data from the 2015 Youth Risk Behavior Survey and the 2014 School Health Profiles was conducted using multilevel logistic models testing whether youth in states with higher proportions of schools teaching LGBTQ-inclusive sex education had lower odds of reporting being bullied in school and experiencing adverse mental health outcomes, including depressive symptoms and suicidality. Results: After controlling for covariates, protective effects for all youth were found for suicidal thoughts (adjusted odds ratio [AOR]: .91, 95% confidence interval [CI]: .89e.93) and making a suicide plan (AOR: .79; 95% CI: .77e.80). Lesbian and gay youth had lower odds of experiencing bullying in school as the proportion of schools within a state teaching LGBTQ-inclusive sex education increased (AOR: .83; CI: .71e.97). Bisexual youth had significantly lower odds of reporting depressive symptoms (AOR: .92; 95% CI: .87e.98). Conclusions: Students in states with a greater proportion of LGBTQ-inclusive sex education have lower odds of experiencing school-based victimization and adverse mental health. These findings can be used to guide intervention development at the school and state levels
Keywords: Sexual minority youth | Mental health | Bullying | Inclusive sex education | School climate
مقاله انگلیسی
5 Cyberbullying impacts on victims’ satisfaction with information and communication technologies: The role of Perceived Cyberbullying Severity
تاثیرات زورگویی سایبری روی رضایت قربانیان از فناوری های اطلاعاتی و ارتباطی: نقش شدت زورگویی مشاهده شده-2018
This study aims to understand how individuals’ perceptions of the severity of cyberbullying they endure affects their experience with the Information and Communication Technology (ICT) medium through which cyberbullying occurs. To this end, it proposes a theoretical model based on Transactional Theory of Stress and Coping and Expectation-Confirmation Theory. A survey-based study involving 115 cyberbullying victims is employed to empirically validate the proposed model. Results indicate that victims’ perceptions of the severity of a cyberbullying episode negatively impact their satisfaction with ICT. Implications of these results for academics and practitioners are discussed and directions for future research are outlined.
keywords: Cyberbullying| Severity| ICT satisfaction| Expectation-confirmation theory| Transactional theory of stress and coping
مقاله انگلیسی
6 The evolution of sentiment analysis—A review of research topics, venues, and top cited papers
تحول تحليل احساسات - بازبينی موضوعات پژوهشی،سالنها، و مقالات فوق الذکر-2018
Sentiment analysis is one of the fastest growing research areas in computer science, making it challenging to keep track of all the activities in the area. We present a computer-assisted literature review, where we utilize both text mining and qualitative coding, and analyze 6996 papers from Scopus. We find that the roots of sentiment analysis are in the studies on public opinion analysis at the beginning of 20th century and in the text subjectivity analysis performed by the computational linguistics community in 1990’s. However, the outbreak of computer-based sentiment analysis only occurred with the availability of subjective texts on the Web. Consequently, 99% of the papers have been published after 2004. Sentiment analysis papers are scattered to multiple publication venues, and the combined number of papers in the top-15 venues only represent ca. 30% of the papers in total. We present the top-20 cited papers from Google Scholar and Scopus and a taxonomy of research topics. In recent years, sentiment analysis has shifted from analyzing online product reviews to social media texts from Twitter and Facebook. Many topics beyond product reviews like stock markets, elections, disasters, medicine, software engineering and cyberbullying extend the utilization of sentiment analysis.
Keywords: Sentiment analysis ، Opinion mining ، Bibliometric study ، Text mining ، Literature review ، Topic modeling ، Latent Dirichlet Allocation ، Qualitative analysis
مقاله انگلیسی
7 Understanding the relationship between cyber-victimisation and cyber-bullying on Social Network Sites: The role of moderating factors
درک رابطه بین قربانی سایبری و تهدید سایبری در شبکه های اجتماعی: نقش عوامل تعدیل -2017
The strongest predictor of engagement in cyber-bullying is having experienced cyber-victimisation oneself. We examined the extent to which trait (moral disengagement, cognitive empathy, affective empathy), demographic (age, sex), and situational factors (Internet use, parental Internet monitoring) moderated the strength of the re lationship between victimisation and bullying on Social Network Sites (SNSs). We surveyed 175 adolescents (M age = 14.82 years; SD = 1.52; 53% male) who had a SNS profile. Higher moral disengagement strengthened the cyber victim-bully relationship, whereas greater parental monitoring weakened this relationship. Neither affec tive nor cognitive empathy, age, sex, nor time online moderated the relationship. Overall, 30% to 48% of the var iance in cyber-bullying frequency was explained. The results suggest that cyber-bullying interventions need to also focus on experiences of victimisation and that reducing the adolescents moral disengagement and educating parents about the importance of monitoring adolescent Internet use would be most effective.
Keywords: Cyber-bullying | Cyber-victimisation | Moral disengagement | Empathy | Social Network Sites
مقاله انگلیسی
8 Identification of influential spreaders in online social networks using interaction weighted K-core decomposition method
شناسایی گسترش دهنده های نفوذ در شبکه های اجتماعی آنلاین با استفاده از روش تجزیه K-core با تعادل وزن-2017
Online social networks (OSNs) have become a vital part of everyday living. OSNs provide researchers and scientists with unique prospects to comprehend individuals on a scale and to analyze human behavioral patterns. Influential spreaders identification is an important subject in understanding the dynamics of information diffusion in OSNs. Targeting these influential spreaders is significant in planning the techniques for accelerating the propagation of information that is useful for various applications, such as viral marketing applications or blocking the diffusion of annoying information (spreading of viruses, rumors, online negative behaviors, and cyberbullying). Existing K-core decomposition methods consider links equally when calculating the influential spreaders for unweighted networks. Alternatively, the proposed link weights are based only on the degree of nodes. Thus, if a node is linked to high-degree nodes, then this node will receive high weight and is treated as an important node. Conversely, the degree of nodes in OSN context does not always provide accurate influence of users. In the present study, we improve the K-core method for OSNs by proposing a novel link-weighting method based on the interaction among users. The proposed method is based on the observation that the interaction of users is a significant factor in quantifying the spreading capability of user in OSNs. The tracking of diffusion links in the real spreading dynamics of information verifies the effectiveness of our proposed method for identifying influential spreaders in OSNs as compared with degree centrality, PageRank, and original K-core.
Keywords: Online social networks | Complex networks | Influential spreaders | K-shell decomposition | Social media | Twitter
مقاله انگلیسی
9 Identification of influential spreaders in online social networks using interaction weighted K-core decomposition method
شناسایی گسترش نفوذ در شبکه های اجتماعی آنلاین با استفاده از تعامل روش تجزیه وزنی K هسته ای-2017
Online social networks (OSNs) have become a vital part of everyday living. OSNs provide researchers and scientists with unique prospects to comprehend individuals on a scale and to analyze human behavioral patterns. Influential spreaders identification is an important subject in understanding the dynamics of information diffusion in OSNs. Targeting these influential spreaders is significant in planning the techniques for accelerating the propagation of information that is useful for various applications, such as viral marketing applications or blocking the diffusion of annoying information (spreading of viruses, rumors, online negative behaviors, and cyberbullying). Existing K-core decomposition methods consider links equally when calculating the influential spreaders for unweighted networks. Alternatively, the proposed link weights are based only on the degree of nodes. Thus, if a node is linked to high-degree nodes, then this node will receive high weight and is treated as an important node. Conversely, the degree of nodes in OSN context does not always provide accurate influence of users. In the present study, we improve the K-core method for OSNs by proposing a novel link-weighting method based on the interaction among users. The proposed method is based on the observation that the interaction of users is a significant factor in quantifying the spreading capability of user in OSNs. The tracking of diffusion links in the real spreading dynamics of information verifies the effectiveness of our proposed method for identifying influential spreaders in OSNs as compared with degree centrality, PageRank, and original K-core.
Keywords: Online social networks | Complex networks | Influential spreaders | K-shell decomposition | Social media | Twitter
مقاله انگلیسی
10 A survey of current social network and online communication provision policies to support law enforcement identify offenders
بررسی شبکه های اجتماعی فعلی و سیاست های ارائه ارتباطات آنلاین برای حمایت از اجرای قانون شناسایی مجرمان-2017
Online forms of harassment, stalking and bullying on social network and communication platforms are now arguably wide-spread and subject to regular media coverage. As these provision continue to attract millions of users, generating significant volumes of traffic, regulating abuse and effectively reprimanding those who are involved in it, is a difficult and sometimes impossible task. This article collates information acquired from 22 popular social network and communication platforms in order to identify current regulatory gaps. Terms of service and privacy policies are reviewed to assess existing practices of data retention to evaluate the feasibility of law enforcement officials tracking those whose actions breach the law. For each provision, account sign-up processes are evaluated and policies for retaining Internet Protocol logs and user account information are assessed along with the availability of account preser vation orders. Finally, recommendations are offered for improving current approaches to regulating social network crime and online offender tracking.
Keywords: Social media networks | Crime | Regulation | Internet | Cyber crime | Harassment
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 5009 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 5009 :::::::: افراد آنلاین: 63