What Is Cyberbullying?

Author(s):  
Michelle F. Wright

Children and adolescents spend a great deal of time using and interacting through electronic technologies, including cell phones, gaming consoles, and the internet. Cyberbullying occurs through electronic technologies, including gaming consoles, email, instant messaging, chatrooms, social media, and text messages via mobile phones. The attention given to cyberbullying incidences are due to the nature of electronic communications. Through electronic technologies, children and adolescents can remain anonymous, allowing them to harm their victims without experiencing repercussions. Cyberbullying can also involve multiple bystanders who are also capable of resharing content. The literature in this chapter draws on research from various disciplines, including communication, computer science, education, media studies, psychology, social work, and sociology. Furthermore, the literature involves a variety of different research designs, including cross-sectional and longitudinal methodologies as well as qualitative and quantitative designs.

2018 ◽  
Vol 5 (5) ◽  
pp. 1750
Author(s):  
Sowndarya T. A. ◽  
Mounesh Pattar

Background: Adolescents use the Internet for a variety of activities besides gaming; they frequently engage themselves with social networking, instant messaging, blogging and downloading information. Heavy Internet use has been associated with potential side effects, such as loss of control over the use of the Internet, adverse effects on other daily activities, emotional status and communication among family members. Objective of present study to assess the prevalence of Internet Addiction (IA) and factors associated with Internet use among Urban and Rural school students.Methods: A school based cross sectional study was conducted in the urban and rural field practice area of a medical college hospital in Mangaluru. Internet addiction was assessed using Young’s Internet Addiction Test.Results: The prevalence of internet addiction among urban school students was found to be i.e. 83.3%, while it was 78% in rural school students. Mild IA was common among both.  Male gender, smart phones and hours spent on internet were common risk factor for IA in both groups.Conclusions: Young’s Internet Addiction Test (IAT) is a simple and easy tool to assess Internet addiction among adolescent school students. Need to give importance of outdoor activity and community level education needed to prevent Internet Addiction.


Author(s):  
Oladele Abiodun Balogun

The wave of the current unprecedented advancements in Information and Communication Technology, which spread in Nigeria, nay Africa is becoming unfathomable has some linguistic implications worthy of philosophical appraisal. The chapter discusses how the new digital milieu is changing human understanding and use of language in social and formal discourse. Contrary to the popular assumptions that the digital communication feat is holistically advantageous, the chapter argues that the advent of digital communication in Nigeria has occasioned unconsciously, more linguistic and social problems on the psyche of Nigerians. Through a careful survey of the style of sending text messages and mails via mobile phones and the Internet, the chapter establishes that Nigerians adopt pragmatic approach, which defies any respect for grammatical and linguistic rules in digital communication. Though, this ideological basis, the chapter argues, might hold some immediate communication effects for the senders and recipients; in spite of these supposed benefits, the chapter argues that the pragmatic approach to digital communication in Nigeria is inadequate. Thus, a case is made in the chapter for a more resonant underlying philosophy of language, which will guide digital communication in contemporary Nigeria.


Author(s):  
Ana Deumert

The concept of Africa requires reflection: what does it mean to study a social phenomenon “in Africa”? Technology use in Africa is complex and diverse, showing various degrees of access across the continent (and in the Diaspora, and digital social inequalities—which are part and parcel of the political economy of communication—shape digital engagement. The rise of mobile phones, in particular, has enabled the emergence of technologically mediated literacies, text-messaging among them. Text-messaging is defined not only by a particular mode of communication (typically written on mobile phones, visual, digital), but it also favors particular topics (intimate, relational, sociable, ludic) and ways of writing (short, non-standard texts that are creative as well as multilingual). The genre of text-messaging thus includes not only short message service (SMS) and (mobile) instant-messaging (which one might call prototypical one-to-one text messages), but also Twitter, an application that, like texting, favors brevity of expression and allows for one-to-many conversations. Access to Twitter is still limited for many Africans, but as ownership of smartphones is growing, so is Twitter use, and the African “Twittersphere” is emerging as an important pan-African space. At times, discussions are very local (as on Ghanaian Twitter), at other times regional (East African Twitter) or global (African Twitter and Black Twitter); all these are emic, folksonomic terms, assigned and discussed by users. Although former colonial languages, especially English, dominate in many prototypical text messages and on Twitter, the genre also provides important opportunities for writing in African languages. The choices made in the digital space echo the well-known debate between Chinua Achebe and Ngũgĩ wa Thiong’o: the Africanization of the former colonial languages versus writing in African languages. In addition, digital writers engage in multilingual writing, combining diverse languages in one text, and thus offer new ways of writing locally as well as shaping a digitally-mediated pan-African voice that draws on global strategies as well as local meaning.


Author(s):  
Kwaku Barfi ◽  
Christiana Nsiah-Asamoah ◽  
Rosemary Twum ◽  
Daniel Ainooson – Noonoo

Students are regarded as frequent users of mobile phones which has proven to be a convenient and acceptable method to promote healthy lifestyle. Students usually engage in relatively high levels of risky behavior and make unhealthy lifestyle choices, a study that investigates how health students access health information is necessary. The study adopted a descriptive cross-sectional study which was undertaken among third-year nursing students from three nurses training institutions in Ghana. A total of 270 students participated in the study. Most of the respondents who were currently subscribers of the health messages reported that they usually received health information on reproductive health issues, nutrition, and practicing safe sex. Most of the health students revealed that they needed more information on safe sex, diet, managing weight, and stress management. The results also show that health students are likely to remember and share short messages with friends. The findings serve as an ‘eye-opener’ for health educators and mobile service providers concerning factors that should be taken into consideration when framing health text messages that will attract health students.


2019 ◽  
Author(s):  
Fatemeh Rangraz Jeddi ◽  
Ehsan Nabovati ◽  
Rahele Hamidi ◽  
Reihane Sharif

Abstract Background Mobile health has potential for promotion of self-management in patients with chronic diseases. This study was conducted to investigate smartphone usage in patients with type II diabetes and their intention to use it for self-management.Methods This cross-sectional study was conducted in 2018 with 176 patients with type II diabetes visiting a specialized diabetes clinic or one of two endocrinology and metabolism specialists in north of Iran. Data were collected using a validated questionnaire containing items on demographic characteristics, disease information, use of mobile phones, smartphones and the internet, and intention to use mobile phones for diabetes self-management.Results The majority of the participants had mobile phones (94.9%), smartphones (61.1%), and daily access to the internet (81.3%), and used phones two hours per day on average (80.1%). They mostly used mobile phones to contact friends (89.2%) and search for information (50.6%), and their greatest intention for using smartphones and the internet for self-management was related to dietary planning (96%), checking blood glucose (90.9%), and contacting specialists (87.5%). Younger participants were more interested in using smartphone applications (apps) (P<0.001). About half of the participants argued that using apps can be interesting (54%) and useful (50%) for diabetes management, and intended to use apps much more in future (48.3%).Conclusions The majority of patients with type II diabetes are inclined to use mobile phone and the Internet, especially to plan their diet, check blood glucose, and contact their doctors. The present study provides valuable information for designing and implementing interventions based on mHealth to promote self-management in type II diabetes.


2017 ◽  
Vol 7 (1) ◽  
pp. 1-12 ◽  
Author(s):  
I.B. Bovina ◽  
N.V. Dvoryanchikov ◽  
S.Yu. Gayamova ◽  
A.V. Milekhin ◽  
S.V. Budykin

The focus of attention of the authors is the consideration of information security of children and adolescents as the object of social representations. Discusses the need for the theory of social representations to develop prophylactic and preventive programs in the field of information security of children and adolescents, in particular, says that the effectiveness of prevention and preventive programs is determined by how this information is understood by the target group, through what filters it passes. Briefly outlines the main provisions of the theory of social representations, discusses the functions of social representations, the mechanism of action ideas. Analyzed in a few studies, the focus of which was the presentation on new technologies, particularly mobile phones and the Internet. Presents the results of a series of studies devoted to the study of information security of children and adolescents, including the results of the first part of a research project dedicated to the analysis of how parents and teachers understand information security and what strategies to protect children and adolescents from dangerous information they are ready to use.


Author(s):  
Arlene J. Nicholas ◽  
John K. Lewis

The traditional college student of today is part of the Net Generation who has been raised in an era of instant access. Their communication and learning is complemented by the Internet, a major influence on this cohort. The regular method of contact is text messaging, instant messaging and cell phones. Learning methods for the Net Generation include Internet tools such as Web-CT, Blackboard, online courses, online journals and i-pod downloads. Are they ready to also change from print textbooks to Internet based textbooks? This paper describes the attitudes of some Net Generation students towards the usage of electronic textbooks. Three case studies were conducted: one class used an online textbook and two other classes used e-chapter supplements. Students were questioned on their perceptions of using and learning with e-textbooks. Their views describe some changing thoughts towards network connected media that is the mantra of this generation.


Author(s):  
Michelle F. Wright

The purpose of this article is to examine cyberbullying among children and adolescents, referred to as “youths” throughout the article. An extension of traditional bullying, cyberbullying is a form of bullying which takes place by means of electronic technologies, such as email, instant messaging, Facebook, and text messaging through mobile devices. Drawing on research from a variety of disciplines, such as psychology, education, social work, sociology, and computer science, this article is organized into nine sections. The article will draw on multidisciplinary qualitative, quantitative, and mixed-design research methodologies from psychology, sociology, social work, and criminology. Furthermore, this article reviews literature utilizing cross-sectional, longitudinal, qualitative, and quantitative research methodologies to describe cyberbullying.


Author(s):  
Kannan Balasubramanian

With the arrival of the internet, cell phones, e-mail, instant messaging and social networking sites we can do many wonderful things electronically now that make our lives easier and more productive. We should get used to the idea that a good part of our social life can happen in cyberspace. You can keep up with your friends and meet new ones through a keyboard, microphone and a webcam. You can send a detailed e-mail, send a quick message or alert your circle of friends and followers about the latest details what's happening around you. At the same time, we should come to terms with the fact that the cyberspace is flooded with attacks from people who are unscrupulous in their intent to damage others in the cyberspace. The attacks date back to the time when telephone was invented, when the attackers found way to invade people's privacy. For most users, the web is just part of a well-rounded life that includes both a cyber world and a real world. The internet can be helpful, educational and fun. But It can also become an obsession leading to waste of time and money. Just because cyberspace is virtual, that does not mean that there are not real dangers out there. The same sort of bad people who can cause problems for people in the “real” world are also lurking on the internet. They spend their time looking for ways to steal your money, ruin your name or even cause you harm.


Sign in / Sign up

Export Citation Format

Share Document