با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Applying artificial intelligence to explore sexual cyberbullying behaviour
استفاده از هوش مصنوعی برای کشف رفتار مزاحمت اینترنتی-2020 Sexual cyberbullying is becoming a serious problem in todays society. In the workplace, this issue is more complex because of the power imbalance between potential perpetrators and victims. Preventing sexual cyber- bullying in organizations is very important for a safety and respectful workplace. Occupational Safety and Health (OSH) standards establish certain policies to be considered to create an organizational culture based on zero tolerance to sexual cyberbullying. The research aims to broaden knowledge about personality and sexual cyberbullying. Therefore, this paper proposes a crucial tool to explore potential sexual cyberbullying behavior. This study analyzed how personality traits, particularly those related to the Dark Triad (psychopathy, Machia-vellianism and narcissism), might influence this behavior. Participants (N ¼ 374) were Spanish young adults, using the convenience sampling to recruit them. The methodology focused on the use of structural equation modelling and ensemble classification tree. First, we tested the proposed hypotheses with structural equation method based on covariance using the Lavaan R-package. Second, for the ensemble of classification trees, we applied the package random Forest and Adabag (bagging and boosting) in R. Results proposed high levels of psychopathy and Machiavellianism are more likely to be related to sexual cyberbullying behaviors. Organizations could use the tool proposed in this research to develop internal policies and procedures for detection and deterrence of potential cyberbullying behaviors. By raising awareness about cyberbullying behaviour including its conceptualization and measurement in training courses, organizations might build an organizational culture based on a respectful workplace without sexual cyberbullying behaviours. Keywords: Cyberbullying | Dark triad | Machiavellianism | Narcissism | Psychopathy | Structural equation modelling | Ensemble classification tree | Artificial intelligence | Machine learning | Business | Human resource management |
مقاله انگلیسی |
2 |
A Multi-Method Investigation of the Personality Correlates of Digital Aggression
بررسی چند روشی ارتباط شخصیتی پرخاشگری دیجیتال-2020 Digital aggression (DA) refers to the use of computer-mediated technologies to harm
others. A handful of previous studies have provided mixed results regarding the
personality correlates of DA. We clarified these findings by analyzing the associations
between three measures of DA (behavioral, Twitter, and self-report) and the Big Five
traits using data from 1167 undergraduate participants. Big Five personality trait
measures predicted all three DA measures, but results varied across particular
assessments of DA. These results point to possible moderators and potentially
important differences within the broader construct of DA. Keywords: Big 5 | Cyberbullying | Digital Aggression | Personality |
مقاله انگلیسی |
3 |
Parenting in the digital era: Protective and risk parenting styles for traditional bullying and cyberbullying victimization
والدین در عصر دیجیتال: سبک های والدین محافظت و در معرض خطر برای زورگویی سنتی و قربانی حمله سایبری-2019 This study analyzes the parenting styles that could act as risk or protective factors for bullying and cyberbullying
victimization in Spain, considering the predisposition to aggression of the adolescents. The protective or risk
effect of parenting styles for adolescents related behavior such as antisocial behavior, school adjustment, and
self-esteem was also analyzed. Study sample was 1109 adolescents aged between 12 and 17 years (49.96%,
females, M=13.88, SD=1.38). A 4×2×2×2 MANOVA was applied for the outcome variables of bullying
victimization (traditional bullying and cyberbullying), antisocial behavior, school adjustment, and self-esteem;
with parenting style, predisposition to aggression, sex and age as independent variables. The results confirm and
extend emergent research in parenting styles, carried out in Spain and other European and Latin-American
countries, showing that indulgent parenting, characterized by the use of reasoning and warmth practices, can act
as a protective factor for both traditional bullying and cyberbullying victimization. On the contrary, authoritarian
parenting, characterized by the use of physical and verbal coercion and privation practices, would act as a
risk factor for cyberbullying and traditional bullying victimization. The protective and risk effects of parenting
styles over adolescents adjustment take place irrespective of the adolescents predisposition to aggression Keywords: Cyberbullying | Bullying | Peer victimization | Parenting styles | Adolescence |
مقاله انگلیسی |
4 |
Associations of Lesbian, Gay, Bisexual, Transgender, and QuestioningeInclusive Sex Education With Mental Health Outcomes and School-Based Victimization in U:S: High School Students
انجمن های لزبین ، همجنسگرا ، دوجنسگرا ، ترنسجندر و سؤال از آموزش فراگیر جنسی با پیامدهای سلامت روانی و قربانی سازی مدارس در دانش آموزان دبیرستانی ایالات متحده-2019 Purpose: Homophobic school climates are related to increased victimization for sexual minority
youth (SMY), leading to increased risk of adverse mental health outcomes. Interventions that
promote positive school climate may reduce the risk of victimization and adverse mental health
outcomes in SMY. This study explored whether lesbian, gay, bisexual, transgender, and questioning
(LGBTQ)einclusive sex education is associated with adverse mental health and school-based
victimization in U.S. youth.
Methods: Data analysis of representative data from the 2015 Youth Risk Behavior Survey and the
2014 School Health Profiles was conducted using multilevel logistic models testing whether youth
in states with higher proportions of schools teaching LGBTQ-inclusive sex education had lower
odds of reporting being bullied in school and experiencing adverse mental health outcomes,
including depressive symptoms and suicidality.
Results: After controlling for covariates, protective effects for all youth were found for suicidal
thoughts (adjusted odds ratio [AOR]: .91, 95% confidence interval [CI]: .89e.93) and making a
suicide plan (AOR: .79; 95% CI: .77e.80). Lesbian and gay youth had lower odds of experiencing
bullying in school as the proportion of schools within a state teaching LGBTQ-inclusive sex
education increased (AOR: .83; CI: .71e.97). Bisexual youth had significantly lower odds of
reporting depressive symptoms (AOR: .92; 95% CI: .87e.98).
Conclusions: Students in states with a greater proportion of LGBTQ-inclusive sex education have
lower odds of experiencing school-based victimization and adverse mental health. These findings
can be used to guide intervention development at the school and state levels Keywords: Sexual minority youth | Mental health | Bullying | Inclusive sex education | School climate |
مقاله انگلیسی |
5 |
Cyberbullying impacts on victims’ satisfaction with information and communication technologies: The role of Perceived Cyberbullying Severity
تاثیرات زورگویی سایبری روی رضایت قربانیان از فناوری های اطلاعاتی و ارتباطی: نقش شدت زورگویی مشاهده شده-2018 This study aims to understand how individuals’ perceptions of the severity of cyberbullying they endure affects
their experience with the Information and Communication Technology (ICT) medium through which cyberbullying
occurs. To this end, it proposes a theoretical model based on Transactional Theory of Stress and Coping
and Expectation-Confirmation Theory. A survey-based study involving 115 cyberbullying victims is employed to
empirically validate the proposed model. Results indicate that victims’ perceptions of the severity of a cyberbullying
episode negatively impact their satisfaction with ICT. Implications of these results for academics and
practitioners are discussed and directions for future research are outlined.
keywords: Cyberbullying| Severity| ICT satisfaction| Expectation-confirmation theory| Transactional theory of stress and coping |
مقاله انگلیسی |
6 |
The evolution of sentiment analysis—A review of research topics, venues, and top cited papers
تحول تحليل احساسات - بازبينی موضوعات پژوهشی،سالنها، و مقالات فوق الذکر-2018 Sentiment analysis is one of the fastest growing research areas in computer science, making it challenging
to keep track of all the activities in the area. We present a computer-assisted literature review, where
we utilize both text mining and qualitative coding, and analyze 6996 papers from Scopus. We find that
the roots of sentiment analysis are in the studies on public opinion analysis at the beginning of 20th
century and in the text subjectivity analysis performed by the computational linguistics community in
1990’s. However, the outbreak of computer-based sentiment analysis only occurred with the availability
of subjective texts on the Web. Consequently, 99% of the papers have been published after 2004. Sentiment
analysis papers are scattered to multiple publication venues, and the combined number of papers in the
top-15 venues only represent ca. 30% of the papers in total. We present the top-20 cited papers from
Google Scholar and Scopus and a taxonomy of research topics. In recent years, sentiment analysis has
shifted from analyzing online product reviews to social media texts from Twitter and Facebook. Many
topics beyond product reviews like stock markets, elections, disasters, medicine, software engineering
and cyberbullying extend the utilization of sentiment analysis.
Keywords: Sentiment analysis ، Opinion mining ، Bibliometric study ، Text mining ، Literature review ، Topic modeling ، Latent Dirichlet Allocation ، Qualitative analysis |
مقاله انگلیسی |
7 |
Understanding the relationship between cyber-victimisation and cyber-bullying on Social Network Sites: The role of moderating factors
درک رابطه بین قربانی سایبری و تهدید سایبری در شبکه های اجتماعی: نقش عوامل تعدیل -2017 The strongest predictor of engagement in cyber-bullying is having experienced cyber-victimisation oneself. We
examined the extent to which trait (moral disengagement, cognitive empathy, affective empathy), demographic
(age, sex), and situational factors (Internet use, parental Internet monitoring) moderated the strength of the re
lationship between victimisation and bullying on Social Network Sites (SNSs). We surveyed 175 adolescents (M
age = 14.82 years; SD = 1.52; 53% male) who had a SNS profile. Higher moral disengagement strengthened the
cyber victim-bully relationship, whereas greater parental monitoring weakened this relationship. Neither affec
tive nor cognitive empathy, age, sex, nor time online moderated the relationship. Overall, 30% to 48% of the var
iance in cyber-bullying frequency was explained. The results suggest that cyber-bullying interventions need to
also focus on experiences of victimisation and that reducing the adolescents moral disengagement and educating
parents about the importance of monitoring adolescent Internet use would be most effective.
Keywords: Cyber-bullying | Cyber-victimisation | Moral disengagement | Empathy | Social Network Sites |
مقاله انگلیسی |
8 |
Identification of influential spreaders in online social networks using interaction weighted K-core decomposition method
شناسایی گسترش دهنده های نفوذ در شبکه های اجتماعی آنلاین با استفاده از روش تجزیه K-core با تعادل وزن-2017 Online social networks (OSNs) have become a vital part of everyday living. OSNs provide
researchers and scientists with unique prospects to comprehend individuals on a scale and
to analyze human behavioral patterns. Influential spreaders identification is an important
subject in understanding the dynamics of information diffusion in OSNs. Targeting
these influential spreaders is significant in planning the techniques for accelerating the
propagation of information that is useful for various applications, such as viral marketing
applications or blocking the diffusion of annoying information (spreading of viruses,
rumors, online negative behaviors, and cyberbullying). Existing K-core decomposition
methods consider links equally when calculating the influential spreaders for unweighted
networks. Alternatively, the proposed link weights are based only on the degree of nodes.
Thus, if a node is linked to high-degree nodes, then this node will receive high weight and
is treated as an important node. Conversely, the degree of nodes in OSN context does not
always provide accurate influence of users. In the present study, we improve the K-core
method for OSNs by proposing a novel link-weighting method based on the interaction
among users. The proposed method is based on the observation that the interaction of users
is a significant factor in quantifying the spreading capability of user in OSNs. The tracking
of diffusion links in the real spreading dynamics of information verifies the effectiveness
of our proposed method for identifying influential spreaders in OSNs as compared with
degree centrality, PageRank, and original K-core.
Keywords: Online social networks | Complex networks | Influential spreaders | K-shell decomposition | Social media | Twitter |
مقاله انگلیسی |
9 |
Identification of influential spreaders in online social networks using interaction weighted K-core decomposition method
شناسایی گسترش نفوذ در شبکه های اجتماعی آنلاین با استفاده از تعامل روش تجزیه وزنی K هسته ای-2017 Online social networks (OSNs) have become a vital part of everyday living. OSNs provide
researchers and scientists with unique prospects to comprehend individuals on a scale and
to analyze human behavioral patterns. Influential spreaders identification is an important
subject in understanding the dynamics of information diffusion in OSNs. Targeting
these influential spreaders is significant in planning the techniques for accelerating the
propagation of information that is useful for various applications, such as viral marketing
applications or blocking the diffusion of annoying information (spreading of viruses,
rumors, online negative behaviors, and cyberbullying). Existing K-core decomposition
methods consider links equally when calculating the influential spreaders for unweighted
networks. Alternatively, the proposed link weights are based only on the degree of nodes.
Thus, if a node is linked to high-degree nodes, then this node will receive high weight and
is treated as an important node. Conversely, the degree of nodes in OSN context does not
always provide accurate influence of users. In the present study, we improve the K-core
method for OSNs by proposing a novel link-weighting method based on the interaction
among users. The proposed method is based on the observation that the interaction of users
is a significant factor in quantifying the spreading capability of user in OSNs. The tracking
of diffusion links in the real spreading dynamics of information verifies the effectiveness
of our proposed method for identifying influential spreaders in OSNs as compared with
degree centrality, PageRank, and original K-core.
Keywords: Online social networks | Complex networks | Influential spreaders | K-shell decomposition | Social media | Twitter |
مقاله انگلیسی |
10 |
A survey of current social network and online communication provision policies to support law enforcement identify offenders
بررسی شبکه های اجتماعی فعلی و سیاست های ارائه ارتباطات آنلاین برای حمایت از اجرای قانون شناسایی مجرمان-2017 Online forms of harassment, stalking and bullying on social network and communication platforms are
now arguably wide-spread and subject to regular media coverage. As these provision continue to attract
millions of users, generating significant volumes of traffic, regulating abuse and effectively reprimanding
those who are involved in it, is a difficult and sometimes impossible task. This article collates information
acquired from 22 popular social network and communication platforms in order to identify current
regulatory gaps. Terms of service and privacy policies are reviewed to assess existing practices of data
retention to evaluate the feasibility of law enforcement officials tracking those whose actions breach the
law. For each provision, account sign-up processes are evaluated and policies for retaining Internet
Protocol logs and user account information are assessed along with the availability of account preser
vation orders. Finally, recommendations are offered for improving current approaches to regulating
social network crime and online offender tracking.
Keywords: Social media networks | Crime | Regulation | Internet | Cyber crime | Harassment |
مقاله انگلیسی |