2020
DOI: 10.1016/j.techsoc.2019.101223
|View full text |Cite
|
Sign up to set email alerts
|

Developing a cyberbullying conceptual framework for educators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
25
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 31 publications
(28 citation statements)
references
References 29 publications
1
25
0
2
Order By: Relevance
“… (Independent Education Union 2011 ; Redmond et al 2020 ) 2 Includes Cyberbullying definition The definition includes the repetition of an action and the intention to cause harm. (Chalmers et al 2016 ; Independent Education Union 2011 ; Redmond et al 2020 ; Smith et al 2012 ) 3 Includes a list of cyber-risks forms Includes, but is not limited to, phishing, data and identity theft, infection of systems by malware, cyber sexual predation, exposure to inappropriate content, and cyberbullying. (Independent Education Union 2011 ; Redmond et al 2020 ; Smith et al 2012 ) 4 Includes a list of cyberbullying forms Includes, but is not limited to, exclusion or peer rejection, harassment, or ‘cyberstalking’, outing, impersonation and fake profiles.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“… (Independent Education Union 2011 ; Redmond et al 2020 ) 2 Includes Cyberbullying definition The definition includes the repetition of an action and the intention to cause harm. (Chalmers et al 2016 ; Independent Education Union 2011 ; Redmond et al 2020 ; Smith et al 2012 ) 3 Includes a list of cyber-risks forms Includes, but is not limited to, phishing, data and identity theft, infection of systems by malware, cyber sexual predation, exposure to inappropriate content, and cyberbullying. (Independent Education Union 2011 ; Redmond et al 2020 ; Smith et al 2012 ) 4 Includes a list of cyberbullying forms Includes, but is not limited to, exclusion or peer rejection, harassment, or ‘cyberstalking’, outing, impersonation and fake profiles.…”
Section: Methodsmentioning
confidence: 99%
“…The authors also emphasized on the need to critically evaluate the effectiveness of policies to determine if they are succeeding in reducing cyber-crimes and cyberbullying incidents. More recently, Redmond et al ( 2020 ) developed a cyberbullying conceptual framework for educators. In their work, the authors reviewed the literature on cyberbullying in schools to identify common terms.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Another possible direction may be considering the application of ML to the different types of cyberbullying (i.e., flaming, harassment, denigration, impersonation, outing/trickery, exclusion, cyberstalking, revenge porn, etc.) included in the most relevant taxonomies [13,14,15,16].  The authors of the selected reviews raised two main technical issues related to online databanks [60,64].…”
Section: E Main Issuesmentioning
confidence: 99%
“…According with these interpretations, cyberbullying is a multidimensional construct encompassing a broad set of online behaviors [12]. Several taxonomies describe flaming, harassment, denigration, impersonation, outing/trickery, exclusion, cyberstalking, revenge porn as forms of cyberbullying [13,14,15,16]. In such a broad categorization, Menesini and colleagues have traced a line between two main forms of cyberbullying: i. written cyberbullying in the form of verbal offenses; ii.…”
Section: Introductionmentioning
confidence: 99%