Results 101 to 110 of about 3,057 (166)

I’ll be there for you? The bystander intervention model and cyber aggression

open access: yesCyberpsychology: Journal of Psychosocial Research on Cyberpspace
The Bystander Intervention Model (BIM) has been validated for face-to-face emergencies and dictates that observers’ decision to intervene hinges on five sequential steps, while barriers block progress between steps.
Vasileia Karasavva, Amori Mikami
doaj   +1 more source

Normative beliefs about cyberbullying: comparisons of Israeli and U.S. youth

open access: yesHeliyon, 2019
We examined how normative beliefs about cyberbullying influenced the choice of electronic aggression in hypothetical peer-to-peer scenarios. Data was collected from 1097 Israeli and 1196 U.S. students in grades 5th-10th, who completed self-report surveys
Yehuda Peled   +3 more
doaj   +1 more source

Peer Victimization in Overweight Adolescents and Its Effect on Their Self-Esteem and Peer Difficulties [PDF]

open access: yes, 2019
This study has three objectives: to examine whether adolescents who perceive themselves as overweight differ from others in terms of offline victimization at school, cybervictimization, self-esteem, and difficulties relating to peers; to examine the ...
Núñez, Andrea   +3 more
core   +1 more source

Cross‐Cultural Validation of the Malevolent Creativity Behavior Scale in 7 Countries

open access: yesThe Journal of Creative Behavior, Volume 60, Issue 1, March 2026.
ABSTRACT This study examined the psychometric properties and cross‐cultural validity of the Malevolent Creativity Behavior Scale (MCBS). A total of 2937 participants from Brazil, China, Ghana, Kenya, Peru, the United Kingdom, and the United States completed the 13‐item MCBS.
Cristian Ramos‐Vera   +12 more
wiley   +1 more source

Beyond Restriction: Relationship Quality and Gender as Moderators of the Association Between Parental Restrictive Mediation and Adolescent Cyberbullying in China

open access: yesChildren
Background/Objectives: Although parental mediation has been widely recognized as a protective factor against cyberbullying, evidence regarding restrictive mediation remains inconsistent and sometimes contradictory. This inconsistency underscores the need
Xiaolong Xie   +4 more
doaj   +1 more source

The Prevalence of Different Types of Bullying and Their Predictors Among 8th Graders in Post‐Soviet Countries: Cross‐National Insights From Kazakhstan and Russia. Findings From Trends in International Mathematics and Science Study 2019

open access: yesPsychology in the Schools, Volume 63, Issue 3, Page 709-726, March 2026.
ABSTRACT Despite growing research on bullying in Western contexts, less is known about its prevalence and predictors in post‐Soviet nations. This study explores bullying among 8th‐grade students in Kazakhstan and Russia‐two post‐Soviet countries with contrasting development levels but shared historical ties.
Saltanat Kaliyeva
wiley   +1 more source

Internalized criticism and absence of care: separate pathways from childhood abuse and neglect to dual harm via self-compassion

open access: yesFrontiers in Psychiatry
BackgroundNon-suicidal self-injury and cyber aggression are increasingly prevalent among college students. Childhood maltreatment is a known risk factor for both behaviors, yet few studies have examined their co-occurrence (dual harm) or the underlying ...
Yanxia Mao   +3 more
doaj   +1 more source

A Test of the Psychometric Characteristics of the BIS-Brief Among Three Groups of Youth [PDF]

open access: yes, 2018
The current study empirically investigates the relationships between the Dark Triad personality traits and cyber-aggression among adolescents (14–18 year old). The sample consisted of 324 participants aged 14–18 (M = 16.05, SD = 1.31).
Acheson, Ashley   +10 more
core   +1 more source

Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool   +7 more
wiley   +1 more source

Cyberbullying or Cyber Aggression?: A Review of Existing Definitions of Cyber-Based Peer-to-Peer Aggression

open access: yesSocieties, 2015
Due to the ongoing debate regarding the definitions and measurement of cyberbullying, the present article critically appraises the existing literature and offers direction regarding the question of how best to conceptualise peer-to-peer abuse in a cyber ...
Lucie Corcoran   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy