931 research outputs found

    Bullying in middle school: the role of school counselors and teachers in preventing bullying

    Get PDF
    Master's Project (M.Ed.) University of Alaska Fairbanks, 2017Research suggests that bullying is a problem in schools throughout the nation. Children spend the vast majority of their life attending school. School counselors and teachers are in a unique position to identify, prevent and educate students about bullying. The purpose of this project was to examine the role of school counselors and teachers in the Fairbanks North Star Borough School District (FNSBSD) in preventing bullying in their schools. The participants of this study were 8 school counselors and teachers from four middle schools in the FNSBSD. Data for this research was collected using an anonymous online survey utilizing www.SurveyMonkey.com. The results of the survey indicated that bullying is an issue in the four middle schools selected for the study in FNSBSD. Of the four major types of bullying discussed in my research (cyber, relation, physical, and verbal), there was a consensus among the participants that cyber and relational bullying were the most prevalent and problematic in their schools. Recommendations for future research include expanding on this study to include a larger sample of schools and participants, suggestions for strengthening staff training and implementing school based youth courts in FNSBSD schools as part of the bully intervention and prevention program

    Cybervictimization by cyberbullying: children at risk and children as risk

    Get PDF
    Cybercrime in general derives from a series of events and factors that converge to foster this phenomenon. After an introduction, the reader will find four chapters. The first one provides a contextualization with background information. The changes in socioeconomic life and the accessibility and reach of the new technologies are assessed. The focus is set on the use of the internet and its far-reaching implications including the responses of national and international institutions. Nowadays, the internet is the window to current affairs whereby the social world is projected, and this idea becomes clear throughout the text. The second chapter deals with factors of patterns of cyberbullying. The third one is concentrated on the impact of cyberbullying and the concept of harm. The final one tackles the possibilities of recovery and resilience. All this allows us to draw some general conclusions. The work ends with a list of references and several annexes that help to understand in depth some of the points discussed throughout the text

    \u201cOld Wine in a New Bottle\u201d. Depression and Romantic Relationships in Italian Emerging Adulthood: The Moderating Effect of Gender

    Get PDF
    Intimate partner violence is an important social issue all over the world, and human sciences, in particular, are working to reduce it. Despite this, the topic is a little recognized phenomenon. Understanding the origins and the variables that have an impact on manic-style romantic relationships, as defined by John Alan Lee, is of primary importance, in particular in Italy where the data reveal alarming statistics. Most studies have not controlled for earlier depressive symptoms as a cause of successive depression or as an antecedent of romantic styles. In our study, we investigate the association between depression and romantic style, trying to test the moderating role of the gender variable in 283 Italian emerging adults (139 women and 144 men). In order to achieve this aim, we performed a multigroup structural equation model analysis. The hypothesis that gender moderates the relationship between depression and romantic styles is still yet to be confirmed. Men with high levels of depression do not seem to be able to establish relationships based on commitment, as required by the eros style. Women with high levels of depression are more frequently involved in possessive and demanding relationships or in pragmatic ones, confirming their need for dependence

    Offensive cyber: What are the possibilities of the use of offensive cyber as an offensive capability within the existing international legal framework?

    Get PDF
    Cyber is hot. Although the international community, scientists, military and NATO primarily focus on how to defend themselves against cyber attacks, this study mainly focuses on the offensive side of cyber. The thesis analyses the possibilities of the use of offensive cyber as a capability within the existing international legal framework. The thesis consists of two parts. The first part discusses what offensive cyber is and what its possibilities and capabilities are. Offensive use of cyber is new within modern warfare. Therefore it is important to describe and explain cyber attacks and offensive cyber operations thoroughly. In this part the definitions are set, and the base characteristics of cyber attack are discussed. Not only the possibilities of offensive cyber are described, but also dilemmas for the use of offensive cyber are explained. This first part concludes with possible scenarios for the use of offensive cyber operations. The second part of this thesis is a case study and analyses whether and how offensive cyber fits in, and complies with the existing international legal framework. Firstly, the aspects in the existing international legal framework are discussed, which are unambiguous for regular war scenarios, but seem difficult to interpret when it comes to cyber operations. Secondly, the case study is conducted by analysing the three main principles within the Laws of Armed Conflict (LoAC), proportionality, necessity and distinction, on the four recent cyber cases of Estonia 2007, Georgia 2008, Stuxnet 2010 and Libya 2011. The conclusion of the thesis is that the existing international legal framework is not fully suitable for the use of cyber as an offensive capability. Especially the attribution problem, collateral damage, and distinction between military and civil objects are problematic. As long as there is no consensus on international accepted cyber law that sets the boundaries for the use of offensive cyber, the existing international legal framework is applicable, and the use of offensive cyber will have its challenges and grey areas. A new international accepted legal cyber framework should limit, and set boundaries for the use of offensive cyber. On the other hand, developing a new international accepted legal framework, in which offensive cyber is appointed, is also an opportunity to exploit the optimum use of offensive cyber, within that framework

    Navigating The Manosphere: An Examination Of The Incel Movements’ Attitudes Of Sexual Aggression And Violence Against Women

    Get PDF
    There is a considerable and established literature on the topic of violence against women. Yet, there remains understudied areas of foci with lesser attention paid to its occurrence within online and digital contexts. Of particular interest is the networked misogyny and sexism of the online group that self-identifies as “involuntary celibates”, or “incels”. Drawing on data collected from online forums and chat rooms, the language and discourse of this particular group are analyzed through an integrated conceptual framework encompassing hegemonic masculinity, aggrieved entitlement, and patriarchy to better understand the prevalence and types of violence promoted by “incels”. Emerging themes revealed the pervasiveness of rape culture, pro-attitudes of violence against women, male victimization and oppression, sexual entitlement, and masculinity crises

    Cyber Analogies

    Get PDF
    This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it. Our belief is that learning is most effective when concepts under consideration can be aligned with already-existing understanding or knowledge. Cyber issues are inherently tough to explain in layman's terms. The future is always open and undetermined, and the numbers of actors and the complexity of their relations are too great to give definitive guidance about future developments. In this respect, historical analogies, carefully developed and properly applied, help indicate a direction for action by reducing complexity and making the future at least cognately manageable.US Cyber CommandIntroduction: Emily O. Goldman & John Arquilla; The Cyber Pearl Harbor:James J. Wirtz: Applying the Historical Lessons of Surprise Attack to the Cyber Domain: The Example of the United Kingdom:Dr Michael S. Goodman: The Cyber Pearl Harbor Analogy: An Attacker’s Perspective: Emily O. Goldman, John Surdu, & Michael Warner: “When the Urgency of Time and Circumstances Clearly Does Not Permit...”: Redelegation in Nuclear and Cyber Scenarios: Peter Feaver & Kenneth Geers; Comparing Airpower and Cyberpower: Dr. Gregory Rattray: Active Cyber Defense: Applying Air Defense to the Cyber Domain: Dorothy E. Denning & Bradley J. Strawser: The Strategy of Economic Warfare: A Historical Case Study and Possible Analogy to: Contemporary Cyber Warfare: Nicholas A. Lambert: Silicon Valley: Metaphor for Cybersecurity, Key to Understanding Innovation War: John Kao: The Offense-Defense Balance and Cyber Warfare: Keir Lieber: A Repertory of Cyber Analogies: Robert Axelro

    Cyber Warfare Impact to National Security - Malaysia Experiences

    Get PDF
    This study analyzed the cyber warfare impact on national security and focusing on Malaysia experiences. The issues regarding cyber warfare have become a serious concern since it was a risk of national security in Malaysia. The objectives of the study are to analyze issues related to cyber warfare that affected Malaysian system security, to determine causes that caused to cyber warfare. This study used a qualitative research approach to evaluate the current defense approaches related to cyber warfare in Malaysia. The interviews were conducted with the respective respondents: the Senior Manager, Research Management Centre, Strategic Research, and Advisory Department of Cyber Security Malaysia Department. This study can contribute to expanding the security of national security by demanding the government to adopt a broad acquisition risk management strategy. It can assist in the development of highly effective aggressive and defensive methods to any company dealing with future cyber warfare challenges and risk.   Keywords: cyber warfare, national security, experiences

    CYBERBULLYING IN YOUTUBE’S COMMENTS ON “TRIBUN MEDAN TV CHANNEL”

    Get PDF
    Cyberbullying is defined as bullying, threatening, and even harming a person using electronic communication which has been happening lately and can be seen in our daily life. The purpose of this study is to identify the types of cyberbullying used by the commenter and understand how they bully others in their comments. Things that might happen such as mental down, death, etc. This study applies a qualitative descriptive method. In order to analyze the data, researchers employ an interactive analysis model that Miles and Huberman (1992:23) proposed. The result of this study finds 15 comments containing instances of cyberbullying. The findings are three types of cyberbullying are present on the "Tribun Medan TV" YouTube channel” namely flaming, harassment, and denigration. The Authors suggests the further researcher to investigates cyberbullying in community-based race

    Internet – pierwsze źródło (dez)informacji

    Get PDF
    The Internet is the first medium in which controlling the content has become difficult or even impossible. One of its reasons is the fact that the Internet users – who so far were only passive recipients of media messages – have gained the possibility to create and distribute their own messages. Thus, they have become active participants of the participatory culture, in which it is difficult to distinguish between professional and amateur content. The boundaries between private and public domains have become blurred. The distribution of forces shaping public opinion has changed, because the content comes from large media corporations and nonprofessional creators alike. The Internet message is characterized by instantaneous distribution, the ease of editing and modifying its content, and vagueness of authorship. These features make the Internet particularly susceptible to disinformation purposefully aimed at manipulating its users. The fact that every activity undertaken by the Internet users is recorded and analysed is also conducive to manipulation attempts, as the data obtained this way are used to shape their opinions and influence their decisions. The aim of the article is to undertake a discourse on information and disinformation on the Internet in the context of the development of new digital communication tools. The article provides the examples of information manipulation, which could happen only in such an interactive and multimedia medium as the Internet
    corecore