767 resultados para Cyber-bullying sensibility
Resumo:
Little is known about the prevalence of cyberbullying among university students and less about whether they utilise anti-bullying policies. However, failure to report cyberbullying incidents to authorities would lessen the efficacy of these policies. This study investigated the prevalence of cyberbullying among university students and their reporting intentions for cyberbullying incidents. Two hundred and eighty- two students completed a survey on their intentions to report cyberbullying. Results found cyberbullying exists among university students and they would report to authorities if the policy outlined specific information. Students who had been cyber victimised were more likely to report than those students who had not been cyberbullied. Implications for universities are discussed.
Resumo:
The beliefs, attitudes and understandings of pre-service teachers towards bullying and more recently, cyberbullying remains unclear. Previous studies have found them to be generally lacking confidence to address bullying, which could impact negatively on school climate if, when they enter the profession, these beliefs undermine existing anti-bullying initiatives. This study explores Australian pre-service teachers' (N= 717) understanding and knowledge of traditional bullying and cyberbullying and their confidence and capacity to deal with it. Findings from self-report, anonymous questionnaires from students attending three universities in Australia indicated that two thirds (66%) of current pre-service teachers felt informed to very informed and capable to very capable (62%) of dealing with school bullying and 90% could discern cyber and traditional bullying behaviours from other online and offline aggressive acts. Gender and Year level differences were found. The potential impact of their knowledge and understanding of bullying and cyberbullying on school climate, and sustaining and maintaining anti-bullying interventions as they enter the profession is discussed.
Resumo:
This study investigated the associations of gender, age, trait anger, moral disengagement, witnessing of interparental conflict, school connectedness and the religious makeup of the school setting in the involvement in traditional bullying and cyberbullying perpetration. Five hundred Australian students completed an anonymous self-report, paper-based questionnaire. According to the results, 25.2% of the participants reported having engaged in traditional or cyberbullying perpetration. While trait anger and moral disengagement were associated with being a traditional bully, trait anger, interparental conflicts, moral disengagement and school connectedness were associated with being a traditional bully-victim. Additionally, trait anger and moral disengagement were associated with being a traditional-and-a-cyberbully. Our findings indicated that besides individual variables, the family and school environment have an impact on traditional and cyberbullying perpetration behavior. Results imply that any prevention attempts to reduce traditional and cyberbullying should consider students’ experiences both at home and at school.
Resumo:
This study investigated whether bystanders of traditional bullying and cyberbullying used face-to-face methods, online methods or both methods when reporting, discouraging and providing support to the victims of traditional bullying and cyberbullying. A questionnaire was completed by 348 high school students (Years 7 – 12) from seven independent schools in Australia. Overall, students predominantly utilized face-to-face methods when reporting to others for both types of bullying. Older students were more likely to use online methods to discourage the traditional bully (i.e., asking the bully to stop). Males and older students were more likely to use online methods to support victims of traditional bullying. Females were more likely to use face-to-face methods to support victims of cyberbullying. Implications for practice and future research are discussed.
Resumo:
Network data packet capture and replay capabilities are basic requirements for forensic analysis of faults and security-related anomalies, as well as for testing and development. Cyber-physical networks, in which data packets are used to monitor and control physical devices, must operate within strict timing constraints, in order to match the hardware devices' characteristics. Standard network monitoring tools are unsuitable for such systems because they cannot guarantee to capture all data packets, may introduce their own traffic into the network, and cannot reliably reproduce the original timing of data packets. Here we present a high-speed network forensics tool specifically designed for capturing and replaying data traffic in Supervisory Control and Data Acquisition systems. Unlike general-purpose "packet capture" tools it does not affect the observed network's data traffic and guarantees that the original packet ordering is preserved. Most importantly, it allows replay of network traffic precisely matching its original timing. The tool was implemented by developing novel user interface and back-end software for a special-purpose network interface card. Experimental results show a clear improvement in data capture and replay capabilities over standard network monitoring methods and general-purpose forensics solutions.
Resumo:
The aim of this study has been to analyze measures adopted to counteract workplace bullying from the perspective of human resource management. First, the kind of measures that are adopted to prevent bullying were examined. Second, factors affecting the extent of such measures were explored. The introduction of written anti-bullying policies and the provision of information were found to be the most common measures adopted. The policies strongly emphasized the role of supervisors and the immediate superior. Measures to counteract bullying were positively related to the adoption of ‘sophisticated’ human resource practices, previous negative publicity concerning bullying and the presence of a young human resource manager. The results, however, also indicated that imitation seemed to provide an important impetus behind anti-bullying efforts.
Resumo:
Workplace bullying has been shown to have severe negative consequences for both the victims and organisations concerned. Thus, the aim of this paper is to further understanding of workplace bullying by in particular exploring the significance of gender in this phenomenon. The focus is on the prevalence, forms and perceptions of bullying, and the extent to which these interactions and perceptions can be understood as gendered. The aim of the paper is twofold: firstly, to describe gender differences in bullying in the male-dominated business world, and, secondly, to explain these differences by discussing how gender is linked to bullying and victimisation. It is argued that the higher prevalence rates reported by women can be seen as the result of an interaction between higher actual exposure rates to negative behaviours, lower perceived possibilities to defend themselves, and less reluctance to classify negative experiences as bullying, which all are mediated by perceptions of power.
Resumo:
The aim of this study was to analyse the prevalence and forms of workplace bullying among business professionals holding predominantly managerial or expert positions. A cross-sectional survey study was conducted among Finnish professionals with a university degree in business studies. In the study two different strategies for measuring bullying were used and compared. When provided a definition of bullying, 8.8% of the respondents reported that they had at least occasionally been bullied during the past 12 months. However, when using a slightly modified version of the Negative Acts Questionnaire (Einarsen & Hoel 2001), containing a list of 32 predefined negative and potentially harassing acts, as many as 24.1% of the respondents reported that they had been subjected to at least one of the negative acts on a weekly basis. The respondents had experienced predominantly work-related negative acts, e.g. that their opinions and views were ignored, that they were given unreasonable deadlines or that information was withheld. Although the prevalence rates reported with the two strategies varied considerably, there was still consistency between the two strategies in the sense that those who had classified themselves as bullied also reported higher exposure rates to almost all of the negative acts included.
Resumo:
This paper summarizes literature explaining workplace bullying and focuses on organisational antecedents of bullying. In order to better understand the logic behind bullying, a model discussing different types of explanations is put forward. Thus, explanations for and factors associated with bullying are classified into three groups, i.e. enabling structures or necessary antecedents (e.g. perceived power imbalances, low perceived costs, and dissatisfaction and frustration), motivating structures or incentives (e.g. internal competition, reward systems, and expected benefits), and precipitating processes or triggering circumstances (e.g. downsizing and restructuring, organisational changes, changes in the composition of the workgroup). The paper concludes that bullying is often an interaction between structures and processes from all three groupings.
Resumo:
This paper argues that workplace bullying can in some cases be a form of organisational politics, that is, a deliberate, competitive strategy from the perspective of the individual perpetrator. A cross-sectional study conducted among business professionals revealed that there was a correlation between a politicised and competitive climate and bullying. This finding implies that globalisation, increased pressures for efficiency, and restructuring, which limits the number of management positions and thereby contributes to increased internal competition, may lead to more bullying. The findings have important implications for management, since the possible political aspects of bullying must be taken into account in order to be able to undertake successful prevention and intervention measures.
Resumo:
Workplace bullying can be defined as repeated and persistent negative acts that involve a power imbalance and create a hostile work environment. Partly because of the many negative consequences associated with the phenomenon, bullying has recently become the focus of many studies by contemporary organisational researchers. Drawing on a survey, this thesis provides information on the prevalence and forms of bullying among business professionals, a group of employees neglected in previous bullying research. The thesis follows a tradition among Nordic researchers that emphasises the role of the psychosocial work environment in bullying. In particular, it illustrates how high internal competition and a high degree of organisational politics in business life may lead employees to use bullying as a tactic to gain benefits over their colleagues. Furthermore, it explores the significance of gender in bullying in male-dominated work environments, with women tending to be subjected to more negative acts, tending to feel less capable to defend themselves in these situations, and tending to feel less reluctant to classify these experiences as bullying. In addition to the introductory essay, this thesis consists of a book chapter and four articles. These five papers address particular aspects of workplace bullying: the prevalence and forms of bullying, the significance of gender in bullying, and organisational antecedents of bullying.
Resumo:
Although workplace bullying and other inappropriate treatment in the workplace have received growing attention, especially in Northern Europe, in the past few decades, little research has so far been conducted about the prevention of and intervention in such phenomena. This paper provides a review of different organizational measures typically recommended for preventing and intervening in workplace bullying and other forms of inappropriate treatment in the workplace. These measures include anti-bullying policies, training and information, appropriate job designs, active monitoring, and early intervention. As for intervention, both informal and formal strategies are discussed. Furthermore, the paper reports findings from a study among Finnish municipalities on the extent to which these measures are actually used in Finland, a country that has fairly recently introduced anti-bullying legislation.
Resumo:
In this paper we present the design of ``e-SURAKSHAK,'' a novel cyber-physical health care management system of Wireless Embedded Internet Devices (WEIDs) that sense vital health parameters. The system is capable of sensing body temperature, heart rate, oxygen saturation level and also allows noninvasive blood pressure (NIBP) measurement. End to end internet connectivity is provided by using 6LoWPAN based wireless network that uses the 802.15.4 radio. A service oriented architecture (SOA) 1] is implemented to extract meaningful information and present it in an easy-to-understand form to the end-user instead of raw data made available by sensors. A central electronic database and health care management software are developed. Vital health parameters are measured and stored periodically in the database. Further, support for real-time measurement of health parameters is provided through a web based GUI. The system has been implemented completely and demonstrated with multiple users and multiple WEIDs.
Resumo:
The centralized paradigm of a single controller and a single plant upon which modern control theory is built is no longer applicable to modern cyber-physical systems of interest, such as the power-grid, software defined networks or automated highways systems, as these are all large-scale and spatially distributed. Both the scale and the distributed nature of these systems has motivated the decentralization of control schemes into local sub-controllers that measure, exchange and act on locally available subsets of the globally available system information. This decentralization of control logic leads to different decision makers acting on asymmetric information sets, introduces the need for coordination between them, and perhaps not surprisingly makes the resulting optimal control problem much harder to solve. In fact, shortly after such questions were posed, it was realized that seemingly simple decentralized optimal control problems are computationally intractable to solve, with the Wistenhausen counterexample being a famous instance of this phenomenon. Spurred on by this perhaps discouraging result, a concerted 40 year effort to identify tractable classes of distributed optimal control problems culminated in the notion of quadratic invariance, which loosely states that if sub-controllers can exchange information with each other at least as quickly as the effect of their control actions propagates through the plant, then the resulting distributed optimal control problem admits a convex formulation.
The identification of quadratic invariance as an appropriate means of "convexifying" distributed optimal control problems led to a renewed enthusiasm in the controller synthesis community, resulting in a rich set of results over the past decade. The contributions of this thesis can be seen as being a part of this broader family of results, with a particular focus on closing the gap between theory and practice by relaxing or removing assumptions made in the traditional distributed optimal control framework. Our contributions are to the foundational theory of distributed optimal control, and fall under three broad categories, namely controller synthesis, architecture design and system identification.
We begin by providing two novel controller synthesis algorithms. The first is a solution to the distributed H-infinity optimal control problem subject to delay constraints, and provides the only known exact characterization of delay-constrained distributed controllers satisfying an H-infinity norm bound. The second is an explicit dynamic programming solution to a two player LQR state-feedback problem with varying delays. Accommodating varying delays represents an important first step in combining distributed optimal control theory with the area of Networked Control Systems that considers lossy channels in the feedback loop. Our next set of results are concerned with controller architecture design. When designing controllers for large-scale systems, the architectural aspects of the controller such as the placement of actuators, sensors, and the communication links between them can no longer be taken as given -- indeed the task of designing this architecture is now as important as the design of the control laws themselves. To address this task, we formulate the Regularization for Design (RFD) framework, which is a unifying computationally tractable approach, based on the model matching framework and atomic norm regularization, for the simultaneous co-design of a structured optimal controller and the architecture needed to implement it. Our final result is a contribution to distributed system identification. Traditional system identification techniques such as subspace identification are not computationally scalable, and destroy rather than leverage any a priori information about the system's interconnection structure. We argue that in the context of system identification, an essential building block of any scalable algorithm is the ability to estimate local dynamics within a large interconnected system. To that end we propose a promising heuristic for identifying the dynamics of a subsystem that is still connected to a large system. We exploit the fact that the transfer function of the local dynamics is low-order, but full-rank, while the transfer function of the global dynamics is high-order, but low-rank, to formulate this separation task as a nuclear norm minimization problem. Finally, we conclude with a brief discussion of future research directions, with a particular emphasis on how to incorporate the results of this thesis, and those of optimal control theory in general, into a broader theory of dynamics, control and optimization in layered architectures.