783 resultados para cyber-bullying
Resumo:
Background Despite decades of research, bullying in all its forms is still a significant problem within schools in Australia, as it is internationally. Anti-bullying policies and guidelines are thought to be one strategy as part of a whole school approach to reduce bullying. However, although Australian schools are required to have these policies, their effectiveness is not clear. As policies and guidelines about bullying and cyberbullying are developed within education departments, this paper explores the perspectives of those who are involved in their construction. Purpose This study examined the perspectives of professionals involved in policy construction, across three different Australian states. The aim was to determine how their relative jurisdictions define bullying and cyberbullying, the processes for developing policy, the bullying prevention and intervention recommendations given to schools and the content considered essential in current policies. Sample Eleven key stakeholders from three Australian states with similar education systems were invited to participate. The sample selection criteria included professionals with experience and training in education, cyber-safety and the responsibility to contribute to or make decisions which inform policy in this area for schools in their state. Design and methods Participants were interviewed about the definitions of bullying they used in their state policy frameworks; the extent to which cyberbullying was included; and the content they considered essential for schools to include in anti-bullying policies. Data were collected through in-depth, semi-structured interviews and analysed thematically. Findings Seven themes were identified in the data: - (1) Definition of bullying and cyberbullying; - (2) Existence of a policy template; - (3) Policy location; - (4) Adding cyberbullying; - (5) Distinguishing between bullying and cyberbullying; - (6) Effective policy, and; - (7) Policy as a prevention or intervention tool. The results were similar both across state boundaries and also across different disciplines. Conclusion Analysis of the data suggested that, across the themes, there was some lack of information about bullying and cyberbullying. This limitation could affect the subsequent development, dissemination and sustainability of school anti-bullying policies, which have implications for the translation of research to inform better student outcomes.
Resumo:
Nos últimos anos tornou-se óbvio que o mundo virtual das bases de dados e do software – popularmente denominado como ciberespaço – tem um lado negro. Este lado negro tem várias dimensões, nomeadamente perda de produtividade, crime financeiro, furto de propriedade intelectual, de identidade, bullying e outros. Empresas, governos e outras entidades são cada vez mais alvo de ataques de terceiros com o fim de penetrarem as suas redes de dados e sistemas de informação. Estes vão desde os adolescentes a grupos organizados e extremamente competentes, sendo existem indicações de que alguns Estados têm vindo a desenvolver “cyber armies” com capacidades defensivas e ofensivas. Legisladores, políticos e diplomatas têm procurado estabelecer conceitos e definições, mas apesar da assinatura da Convenção do Conselho da Europa sobre Cibercrime em 2001 por vários Estados, não existiram novos desenvolvimentos desde então. Este artigo explora as várias dimensões deste domínio e enfatiza os desafios que se colocam a todos aqueles que são responsáveis pela proteção diária da informação das respetivas organizações contra ataques de origem e objetivos muitas vezes desconhecidos.
Resumo:
While the subject of cyberbullying of children and adolescents has begun to be addressed, there has been less attention or research on cyberbullying in the workplace. Whilst male-dominated workplaces such as manufacturing settings have been found to have an increased risk of workplace bullying, the prevalence of cyberbullying in this sector is not known. This exploratory study investigated the prevalence and methods of face-to-face bullying and cyberbullying of males at work. One hundred and three surveys (a modified version of the NAQ-R1), were returned from randomly selected members of the Australian Manufacturing Worker’s Union (AMWU). The results showed that 34% of the respondents were bullied face-to-face, and 10.7% were cyberbullied. All victims of cyberbullying also experienced face-to-face bullying. The implications for organisations of their “duty of care” in regards to this new form of bullying are indicated.
Resumo:
This special issue came about following an international symposium on bullying held in December 2008 at the Department of Child Studies, Linko¨ping University, Sweden, led by Jakob Cromdal and Paul Horton. The articles represent a diverse body of theoretical and empirical work that emphasises children and young people’s views of and participation in everyday experiences. The articles, as a collection, aim to be provocative in terms of challenging some existing dominant understandings about bullying to propose alternate ways to understand this phenomenon.
Resumo:
Overviews of research are clear that bullying occurs in every school, and that there are significant negative physical and mental health outcomes associated with it (Beaty and Alexeyev, 2008; Carter, 2011). As such, it is imperative to develop successful intervention strategies to help students cope with bullying, including the emergent form of cyberbullying. Research suggests, however, that students have a very limited repertoire of strategies for dealing with bullying generally (Owens, Shute, and Slee, 2004). In this paper the authors outline what is currently known about bullying, including cyberbullying, its impact on students, how theory can assist in developing interventions to assist and support students to cope with bullying, and some of the implications for schools.
Resumo:
As technology extends further into consumer daily lives, consumers develop significant relationships with their technology, particularly mobile devices. This conceptual paper aims to investigate the merging of consumers and their technology, termed the cyborg consumer, which has been previously overlooked in the marketing literature. More specifically, this investigation extends the marketing theories of consumer psychological motivation and ersonality traits in examining the influence of these elements on cyborg consumer behaviour, such as intensive consumption of technology and construction of an important part of the self on the Internet. A conceptual framework of the cyborg consumer is presented, which will help marketers to better understand how consumers’ relationships with technology are changing and how marketing practices can be better targeted to the cyborg consumers.
Resumo:
It is well recognised that there are serious correlates for victims of traditional bullying. These have been shown to include increased levels of depression, anxiety and psychosomatic symptoms, in addition to often severe physical harm and even suicide. Bullied students also feel more socially ineffective; have greater interpersonal difficulties, together with higher absenteeism from school and lower academic competence. In the emerging field of cyberbullying many researchers have hypothesised a greater impact and more severe consequences for victims because of the 24/7 nature and the possibility of the wider audience with this form of bullying. However, to date there is scarce empirical evidence to support this. This study sought to compare victims’ perceptions of the harshness and impact of bullying by traditional and cyber means. The major findings showed that although students who had been victimised by traditional bullying reported that they felt their bullying was harsher, crueller and had more impact on their lives than those students who had been cyberbullied, the correlates of their mental health revealed that cyber victims reported significantly more social difficulties, higher anxiety levels and depression than traditional victims. The implications for school counsellors and mental health workers are discussed.
Resumo:
This submission addresses the following terms of reference: 1) the nature, prevalence and level of cybersafety risks and threats experienced by senior Australians; 2) the impact and implications of those risks and threats on access and use of information and communication technologies by senior Australians; 3) the adequacy and effectiveness of current government and industry initiatives to respond to those threats, including education initiatives aimed at senior Australians; 4) best practice safeguards, and any possible changes to Australian law, policy or practice that will strengthen the cybersafety of senior Australians.
Resumo:
The act of computer programming is generally considered to be temporally removed from a computer program's execution. In this paper we discuss the idea of programming as an activity that takes place within the temporal bounds of a real-time computational process and its interactions with the physical world. We ground these ideas within the con- text of livecoding -- a live audiovisual performance practice. We then describe how the development of the programming environment "Impromptu" has addressed our ideas of programming with time and the notion of the programmer as an agent in a cyber-physical system.
Resumo:
The act of computer programming is generally considered to be temporally removed from a computer program’s execution. In this paper we discuss the idea of programming as an activity that takes place within the temporal bounds of a real-time computational process and its interactions with the physical world. We ground these ideas within the context of livecoding – a live audiovisual performance practice. We then describe how the development of the programming environment “Impromptu” has addressed our ideas of programming with time and the notion of the programmer as an agent in a cyber-physical system.
Resumo:
Many commentators have treated the internet as a site of democratic freedom and as a new kind of public sphere. While there are good reasons for optimism, like any social space digital space also has its dark side. Citizens and governments alike have expressed anxiety about cybercrime and cyber-security. In August 2011, the Australian government introduced legislation to give effect to Australia becoming a signatory to the European Convention on Cybercrime (2001). At the time of writing, that legislation is still before the Parliament. In this article, attention is given to how the legal and policy-making process enabling Australia to be compliant with the European Convention on Cybercrime came about. Among the motivations that informed both the development of the Convention in Europe and then the Australian exercise of legislating for compliance with it was a range of legitimate concerns about the impact that cybercrime can have on individuals and communities. This article makes the case that equal attention also needs to be given to ensuring that legislators and policy makers differentiate between legitimate security imperatives and any over-reach evident in the implementation of this legislation that affects rule of law principles, our capacity to engage in democratic practices, and our civic and human rights.
Resumo:
For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering Cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.
Resumo:
The field of cyberbullying is relatively new and there is no universal consensus on its definition, measurement and intervention. Authors agree that bullying has entered into the digital domain and professionals require the skills to help identify and prevent these behaviours. Ninety two students were surveyed to determine their experience with different types of bullying behaviors (face-to-face, cyberbullying or both), as bully, victim or witness. Our objective was to explore the association between those types of bullying and anxiety. The results suggest a significant association between face-to-face bullying and anxiety. Similarly, there was significant association between experiencing both types of bullying and anxiety. Further studies are required with larger and more diverse samples in order to verify current findings and to test for additional associations.