Fear and perceived likelihood of victimization in the traditional and cyber settings [PDF]
This study considers the influence of perceived likelihood, demographics (gender and education) and personality on fear of victimization and cyber-victimization using a survey design (N=159).
Jeske, Debora, Maddison, Jessica
core +1 more source
Traditional and cyberbullying victimization as correlates of psychosocial distress and barriers to a healthy lifestyle among severely obese adolescents : a matched case-control study on prevalence and results from a cross-sectional study [PDF]
Background: Obese youth are at increased risk for peer victimization, which may heighten their risk of psychosocial problems and physical activity avoidance, and lower the effectiveness of professional and lifestyle weight-loss initiatives.
De Bourdeaudhuij, Ilse +5 more
core +1 more source
Asegúrate: an intervention program against cyberbullying based on teachers' commitment and on design of its instructional materials [PDF]
This article presents the impact on cyberbullying of the Asegúrate program. This educational program is based on the theory of normative social behavior, self-regulation skills,and the beliefs held by adolescents and consists in a whole package of ...
Casas Bolaños, José Antonio +2 more
core +2 more sources
Adolescents’ beliefs in romantic myths of love have been related to cyber dating violence victimization. However, these relationships could be mediated by adolescents’ tolerant attitudes toward dating abuse and be different for adolescent boys and girls.
María Jesús Cava Caballero +3 more
doaj +1 more source
Parenting practices as risk or preventive factors for adolescent involvement in cyberbullying: Contribution of children and parent gender [PDF]
Literature points out the role of parenting on adolescent cyberbullying involvement. However, it is necessary to clarify how gender affects this relationship.
Gómez Ortiz, Olga +3 more
core +2 more sources
Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory [PDF]
Cybercrime is recognized as one of the top threats to UK economic security. On a daily basis, the computer networks of businesses suffer security breaches. A less explored dimension of this problem is cybercrimes committed by insiders.
Burnap, Pete +3 more
core +3 more sources
Bullying and Cyberbullying in Minorities: Are They More Vulnerable than the Majority Group? [PDF]
Inclusion in education of all the children is necessary for the success, equality and peace among individuals and societies. In this context, special attention needs to be paid to the minorities. These groups might encounter additional difficulties which
Agirdag +60 more
core +2 more sources
Peer victimization and substance use: Understanding the indirect effect of depressive symptomatology across gender [PDF]
OBJECTIVE: Peer victimization in school is common, with emerging literature suggesting that it may also increase risk for substance abuse. Yet, little is known about the underlying mechanisms within this risk pathway. The objective of this study is to
Barnes-Najor, Jessica +4 more
core +1 more source
Smart Cyber Victimization Discovery on Twitter
[EN] The advancement of technologies, the promotion of smart-phones, and social networking have led to a high tendency among users to spend more time online interacting with each other via the available technologies. This is because they help overcome physical limitations and save time and energy by doing everything online.
Niloufar Shoeibi +5 more
openaire +2 more sources
Outcomes of Cyber-Victimization and Bystander Reactions in Online Brand Communities [PDF]
Online brand communities such as Facebook fan pages show an increasing level of cyber-victimization, which is where a community member is bullied by another member. Based on the cyber-victimization literature in psychology, we designed an experiment that explores how cyber-victimization affects three commercial outcomes, namely, a victim’s positive ...
Ounvorawong, Nuttakon +3 more
openaire +1 more source

