Results 61 to 70 of about 22,301 (286)
Significant overlap exists between traditional victimization and peer cyber-victimization. Yet, they can also be somewhat differentiated. Adopting person-centered approaches, studies showed that multiple classes of peer victimization are distinguishable.
Gianluca Gini +4 more
doaj +1 more source
Incidence of bullying and victimisation among adolescents in New Zealand [PDF]
Bullying and victimisation are highly prevalent among young people, and both bullies and victims exhibit negative outcomes (Stassen Berger, 2007). Adolescents are greatly involved in bullying and experience particularly adverse outcomes in comparison ...
Hunt, Caroline +2 more
core
A Review on Biodegradable Materials of Sustainable Soft Robotics and Electronics
Biodegradable materials are gaining increasing attention in soft robotics and electronics due to their environmental friendliness, showing great potential for sustainability. In this review, the classification of biodegradable materials, their applications in the field of soft robotics and electronics, as well as the challenges and future prospects ...
Yizhu Xie +8 more
wiley +1 more source
Psychological Features of Individuals Prone to Cyber Victimization
The article discusses the results of the empirical research into the psychological features of individuals prone to cyber victimization. As a theoretical basis, this paper uses the analysis of the findings of the studies conducted by the ...
N.V. Vlasova, E.L. Buslaeva
doaj +1 more source
Indicators of School Crime and Safety: 2014 [PDF]
A joint effort by the Bureau of Justice Statistics and National Center for Education Statistics, this annual report examines crime occurring in schools and colleges. This report presents data on crime at school from the perspectives of students, teachers,
Anlan Zhang +3 more
core
Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu +9 more
wiley +1 more source
This study aims to explore the mediation of revenge planning and anger rumination in the associations among face-to-face victimization, cyber victimization, and cyber-displaced aggression.
Michelle F. Wright
doaj +1 more source
Cyberbullying and emotional distress in adolescents: the importance of family, peers and school
The paper examines the role of socioeconomic status, family, parenting styles, peer relations and school factors in cyber-bullying with focus on emotional consequences. A survey was conducted with 259 participants (202 female) aged 19–25.
Goran Livazović, Emanuela Ham
doaj +1 more source
Adolescents’ Cyber Victimization
The purpose of the present study was to investigate the role of gender and gender stereotype traits (masculinity, femininity) in cyber victimization behaviors (cyber relational victimization, cyber verbal victimization, hacking) through different technologies (mobile phones, gaming consoles, social networking sites).
Wright, Michelle F. (Dr.) +1 more
openaire +2 more sources
Cyber-victimization and cybersecurity in China [PDF]
Seeking insights into cyberattacks associated with China.
openaire +1 more source

