Results 61 to 70 of about 22,301 (286)

Associations of Traditional and Peer Cyber-Victimization With Adolescents’ Internet Use: A Latent Profile Analysis

open access: yesCyberpsychology: Journal of Psychosocial Research on Cyberpspace, 2019
Significant overlap exists between traditional victimization and peer cyber-victimization. Yet, they can also be somewhat differentiated. Adopting person-centered approaches, studies showed that multiple classes of peer victimization are distinguishable.
Gianluca Gini   +4 more
doaj   +1 more source

Incidence of bullying and victimisation among adolescents in New Zealand [PDF]

open access: yes, 2015
Bullying and victimisation are highly prevalent among young people, and both bullies and victims exhibit negative outcomes (Stassen Berger, 2007). Adolescents are greatly involved in bullying and experience particularly adverse outcomes in comparison ...
Hunt, Caroline   +2 more
core  

A Review on Biodegradable Materials of Sustainable Soft Robotics and Electronics

open access: yesAdvanced Science, EarlyView.
Biodegradable materials are gaining increasing attention in soft robotics and electronics due to their environmental friendliness, showing great potential for sustainability. In this review, the classification of biodegradable materials, their applications in the field of soft robotics and electronics, as well as the challenges and future prospects ...
Yizhu Xie   +8 more
wiley   +1 more source

Psychological Features of Individuals Prone to Cyber Victimization

open access: yesПсихология и право, 2022
The article discusses the results of the empirical research into the psychological features of individuals prone to cyber victimization. As a theoretical basis, this paper uses the analysis of the findings of the studies conducted by the ...
N.V. Vlasova, E.L. Buslaeva
doaj   +1 more source

Indicators of School Crime and Safety: 2014 [PDF]

open access: yes, 2015
A joint effort by the Bureau of Justice Statistics and National Center for Education Statistics, this annual report examines crime occurring in schools and colleges. This report presents data on crime at school from the perspectives of students, teachers,
Anlan Zhang   +3 more
core  

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

Emotional and cognitive mechanisms of cyber-displaced aggression: exploring the impact of young adults’ victimization

open access: yesBMC Public Health
This study aims to explore the mediation of revenge planning and anger rumination in the associations among face-to-face victimization, cyber victimization, and cyber-displaced aggression.
Michelle F. Wright
doaj   +1 more source

Cyberbullying and emotional distress in adolescents: the importance of family, peers and school

open access: yesHeliyon, 2019
The paper examines the role of socioeconomic status, family, parenting styles, peer relations and school factors in cyber-bullying with focus on emotional consequences. A survey was conducted with 259 participants (202 female) aged 19–25.
Goran Livazović, Emanuela Ham
doaj   +1 more source

Adolescents’ Cyber Victimization

open access: yes, 2020
The purpose of the present study was to investigate the role of gender and gender stereotype traits (masculinity, femininity) in cyber victimization behaviors (cyber relational victimization, cyber verbal victimization, hacking) through different technologies (mobile phones, gaming consoles, social networking sites).
Wright, Michelle F. (Dr.)   +1 more
openaire   +2 more sources

Cyber-victimization and cybersecurity in China [PDF]

open access: yesCommunications of the ACM, 2013
Seeking insights into cyberattacks associated with China.
openaire   +1 more source

Home - About - Disclaimer - Privacy