Matches in SemOpenAlex for { <https://semopenalex.org/work/W4211087890> ?p ?o ?g. }
- W4211087890 endingPage "192" @default.
- W4211087890 startingPage "173" @default.
- W4211087890 abstract "Free Access References Sheri Bauman, Sheri BaumanSearch for more papers by this author Book Author(s):Sheri Bauman, Sheri BaumanSearch for more papers by this author First published: 11 August 2015 https://doi.org/10.1002/9781119221685.refs AboutPDFPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShareShare a linkShare onFacebookTwitterLinked InRedditWechat References ABC News Primetime (Producer). (2006). Cyberbullying [Television program available as video or DVD]. USA: AMB News. ACLU of Pennsylvania urges court to uphold free-speech ruling in MySpace civil rights case. (2008, December 8). Retrieved from https://www.aclu.org/free-speech/aclu-pennsylvania-urges-court-uphold-free-speech-ruling-student-myspace-case American School Counselor Association. (2005). The ASCA national model: A framework for school counseling programs ( 2nd ed.). Alexandria, VA: Author. American School Counselor Association. (2006). The professional school counselor and student safety and technology. Retrieved from http://www.schoolcounselor.org/asca/media/asca/PositionStatements/PS_Technology.pdf Annenberg School of Communication. (2009, April 28). Annual Internet survey by the Center for the Digital Future finds large increases in use of online newspapers. Retrieved from http://annenberg.usc.edu/News%20and%20Events/News/090429CDF.aspx Appel, R. (2009). Report of the study committee: Harassment, bullying and cyberbullying of students in Vermont schools. Retrieved from http://www.leg.state.vt.us/reports/2009ExternalReports/243455.pdf Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yilmaz, N., & Memmedov, C. (2008). Cyberbullying among Turkish adolescents. CyberPsychology & Behavior, 11, 253– 261. Armstrong, M., & Thorsborne, M. (2006). Restorative responses to bullying. In H. McGrath & T. Noble (Eds.), Bullying solutions: Evidence-based approaches to bullying in Australian schools (pp. 175– 188). Frenchs Forest, NSW, Australia: Pearson. Arrowsmith, R. (2008, March 15). Search engines—An innovative tool in tackling cyber bullying. Workplace Violence News. Retrieved from http://workplaceviolencenews.com/2008/05/15/search-engines-an-innovative-tool-in-tackling-cyber-bullying/ Associated Press. (2009, December 3). ‘Sexting’︁ is more common than you might think. Retrieved from http://www.deseretnews.com/article/705349025/Sexting-is-more-common-than-you-might-think.html?pg=all Attewell, P., Suazo-Garcia, B., & Battle, J. (2003). Computers and young children: Social benefit or social problem? Social Forces, 82(1), 277– 296. Auerbach, I. S. (2008–2009). Screening out cyberbullies: Remedies for victims on the Internet playground. Cardozo Law Review, 30, 1641– 1675. Bandura, A. (1973). Aggression: A social learning analysis. Englewood Cliffs, NJ: Prentice Hall. Bandura, A. (1999). Moral disengagement in the perpetration of inhumanities. Personality and Social Psychology Review, 3, 193– 209. Bandura, A. (2001). Social cognitive theory: An agentic perspective. Annual Review of Psychology, 52, 1– 26. Bandura, A. (2002). Selective moral disengagement in the exercise of moral agency. Journal of Moral Education, 31, 101– 119. Bandura, A., Barbaranelli, C., Caprara, G. V., & Pastorelli, C. (1996). Mechanisms of moral disengagement in the exercise of moral agency. Journal of Personality and Social Psychology, 71, 364– 374. Barker, E. D., Boivin, M., Brendgen, M., Fontaine, N., Arseneault, L., Vitaro, F., . . . Tremblay, R. (2008). Predictive validity and early predictors of peer-victimization trajectories in preschool. Archives of General Psychiatry, 65, 1185– 1192. Baron, R. A., & Richardson, D. R. (2004). Human aggression. New York, NY: Springer. Barton, K. B. (2003). Restorative justice: The empowerment model. Sydney, Australia: Hawkins Press. Barton, K. B. (n.d.). Theories of restorative justice. Retrieved from http://www.mtsu.edu/politicalscience/organizations.php Bauman, S. (2007). Essential topics for the helping professional. New York, NY: Allyn & Bacon. Bauman, S. (2008). Effects of gender, grade, and acculturation on overt and relational victimization and depression in Mexican American elementary school students. Journal of Early Adolescence, 28, 528– 554. Bauman, S. (2009). Cyberbullying in a rural intermediate school: An exploratory study. Journal of Early Adolescence. First published December 9, 2009, via Online First. doi:10.1177/0272431609350927 Bauman, S., & Pero, H. (2010). Cyberbullying among deaf and hard of hearing students and their hearing peers. Manuscript submitted for publication. Bauman, S., & Summers, J. (2009). Victimization and depression in Mexican American middle school students. Hispanic Journal for the Behavioral Sciences, 31, 515– 535. Bauman, S., & Tatum, T. (2009). Websites for young children: Gateway to online social networking? Professional School Counseling, 13, 1– 10. BBC News. (2006, November27). Star Wars kid is top viral video. Retrieved from http://news.bbc.co.uk/2/hi/entertainment/6187554.stm Beckstrom, D. C. (2008). State legislation mandating school cyberbullying policies and the potential threat to students' free speech rights. Vermont Law Review, 33, 283– 321. Belsey, B. (2008). [Definition of cyberbullying]. Retrieved from http://www.cyberbullying.ca/ Bemak, F., & Chung, R. (2005). Advocacy as a critical role for urban school counselors: Working toward equity and social justice. Professional School Counseling, 8, 196– 202. Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school bullying. Journal of Student Wellbeing, 1(2), 15– 33. Birkinshaw, S., & Eslea, M. (1998, September). Teachers' attitudes and actions toward boy v. girl and girl v. boy bullying. Paper presented at the annual conference of the developmental section of the British Psychological Society, Lancaster University, England. Björkqvist, K., Ekman, K., & Lagerspetz, K. (2008). Bullies and victims: Their ego picture, ideal ego picture and normative ego picture. Scandinavian Journal of Psychology, 23, 307– 313. Bosworth, M. H. (2008, October 2). Congress passes Broadband Data Improvement Act. Retrieved from http://www.consumeraffairs.com/news04/2008/10/congress_broadband.html Broadband Data Improvement Act of 2008, Pub. L. No. 110–385 § 1492. Broderick, P. C., & Blewitt, P. (2006). The life span: Human development for helping professionals ( 2nd ed.). Upper Saddle River, NJ: Pearson. Bronfenbrenner, U. (1979). The ecology of human development: Experiments by nature and design. Cambridge, MA: Harvard University Press. Buckleitner, W. (2008). Like taking candy from a baby: Young children interact with online environments. Retrieved from http://consumersunion.org/research/like-taking-candy-from-a-baby-how-young-children-interact-with-online-environments/ Burgess-Proctor, A., Hinduja, S., & Patchin, J. W. (2009). Cyberbullying research summary: Victimization of adolescent girls. Retrieved from http://www.cyberbullying.us/cyberbullying_girls_victimization.pdf Cade, V. (2009, January 26). Cyber-bullying in the workplace—When bullies use technology to launch their attacks. Retrieved from http://ezinearticles.com/?Cyber-Bullying-in-the-Workplace---When-Bullies-Use-Technology-to-Launch-Their-Attacks&id=1925602 Calvert, S. L., Rideout, V. J., Woolard, J. L., Barr, R. F., & Strouse, G. A. (2005). Age, ethnicity, and socioeconomic patterns in early computer use. American Behavioral Scientist, 48, 590– 607. Cameron, L., & Thorsborne, M. (1999, February). Restorative justice and school discipline: Mutually exclusive? Paper presented at the Reshaping Australian Institutions Conference, Canberra, Australia. Campbell, M. (2005, October 28). The impact of the mobile phone on young people's social life. Paper presented at the Social Change in the 21st Century Conference, Queensland, Australia. Campbell, M. A. (2007). Cyber bullying and young people: Treatment principles not simplistic advice. Retrieved from http://eprints.qut.edu.au/14903/1/14903.pdf Campfield, D. C. (2008). Cyberbullying and victimization: Prosocial characteristics of bullies, victims, and bully/victims (Unpublished master's thesis). University of Montana, Missoula. Carney, A. G., & Merrell, K. W. (2001). Perspectives on understanding and preventing an international problem. School Psychology International, 22, 364– 382. Cashmore, P. (2009, November 4). Twitter lists and real-time journalism. Retrieved from http://www.cnn.com/2009/TECH/11/04/twitter.lists/ Cassidy, W., Jackson, M., & Brown, K. N. (2009). Sticks and stones can break my bones, but how can pixels hurt me? Students' experiences with cyberbullying. School Psychology International, 30, 383– 402. Celizic, M. (2009, March 6). Her teen committed suicide over ‘sexting.’︁ Retrieved from http://www.msnbc.msn.com/id/29546030/ Chaffetz, J. (2009, October 29). Freshman rep: Social media is 21st century route to victory. Retrieved from http://www.cnn.com/2009/POLITICS/10/29/chaffetz.social.media/index.html Chat 101, the basics (and more) of chat . . . (n.d.). Retrieved from http://www.ker95.com/index.html Chatfield, T. B. (2007). The MySpace.com handbook: The complete guide for members and parents. Ocala, FL: Atlantic. Cheney, M. F. (2009, February 16). Cyberbullying: The inability of current criminal and civil remedies to protect our children from a very real threat. Unpublished note on file with Thomas Jefferson School of Law, San Diego, CA. Child mobile phone use costs them sleep. (2009, June 8). The Advertiser. Retrieved from http://www.adelaidenow.com.au/news/child-mobile-phone-use-costs-them-sleep/story-e6freo8c-1225729208564 Children's Internet Protection Act (CIPA), Pub. L. No. 106-554 (2000), codified at 20 U.S.C. §§ 6801, 6777, 9134 (2003). Children's Online Privacy Protection Act, 15 U.S.C. § 6501–6506 (1998). Chun, S. (n.d.). Jury deliberates case of Internet hoax that led to deadly shooting. Retrieved from http://www.cnn.com/2007/US/law/12/20/chun.myspaceshooting/index.html Cohen, R. (2009, July 1). A Facebook teaching moment. The ethicist. The New York Times Magazine. Retrieved from http://www.nytimes.com/2009/07/05/magazine/05FOB-ethicist-t.html?_r=2 Common Sense Media. (2009). Is social networking changing childhood? A national poll. Retrieved from https://www.commonsensemedia.org/about-us/news/press-releases/is-social-networking-changing-childhood Communications Decency Act, 47 U.S.C. § 151 (1996). Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (1986). Conn, K. (2004). Bullying and harassment. Baltimore, MD: Association for Supervision and Curriculum Development. C. Cordes, & E. Miller (Eds.). (2000). Fool's gold: A critical look at computers in childhood. College Park, MD: Alliance for Childhood. Coughlan, S. (2007). Cyberbullying threat to teachers. Retrieved from http://news.bbc.co.uk/2/hi/uk_news/education/6522501.stm CQR Consulting. (n.d.). Workplace cyberbullying. Retrieved from http://www.cqr.com/community/disconnect?A=SearchResult&SearchID=6516435&ObjectID=602696&ObjectType=35 Craig, W. M. (1998). The relationship among bullying, victimization, depression, anxiety, and aggression in elementary school children. Personality and Individual Differences, 24, 123– 130. Craig, W., & Pepler, D. (1997). Observations of bullying and victimization in the school years. Canadian Journal of School Psychology, 2, 41– 60. Crick, N. R., & Dodge, K. A. (1994). A review and reformulation of social information-processing mechanisms in children's social adjustment. Psychological Bulletin, 115, 74– 101. Cross, D., Epstein, M., Clark, S., & Lester, L. (2008, July 16). Cyber bullying in Australia: Trends and recommended practices. Paper presented at the biennial conference of the International Society for the Study of Behavioural Development, Wurzburg, Germany. Cross, D., Hall, M., Hamilton, G., Pintabona, Y., & Erceg, E. (2004). Australia: The friendly schools project. In P. K. Smith, D. Pepler, & K. Rigby (Eds.), Bullying in schools: How successful can interventions be? (pp. 187– 210). Cambridge, England: Cambridge University Press. Cross, J. E., & Peisner, W. (2009). RECOGNIZE: A social norms campaign to reduce rumor spreading in a junior high school. Professional School Counseling, 12, 365– 377. Cyberbullying: The Ryan Halligan story. (2009). Retrieved from http://www.oprah.com/media/20090501-tows-ryan-halligan Cyberstalking. (n.d.). Retrieved from http://www.cyberguards.com/CyberStalking.html Dake, J. A., Price, J. H., Telljohann, S. K., & Funk, J. B. (2003). Teacher perceptions and practices regarding school bullying prevention. Journal of School Health, 73, 347– 356. Daniloff, D. (2009, Spring). Cyberbullying goes to college. Bostonia. Retrieved from http://www.bu.edu/bostonia/spring09/bully/ Davidson, R. (2007, December 10). The heart–brain connection: The neuroscience of social, emotional, and academic learning. Presentation at a meeting of the Collaborative for Academic, Social, and Emotional Learning (CASEL), New York City, NY. Dehue, F., Bolman, C., & Völlink, T. (2008). Cyberbullying: Youngsters' experiences and parental perception. Cyberpsychology and Behavior, 11, 217– 222. Derbyshire, D. (2009, February 24). Social websites harm children's brains: Chilling warning to parents from top neuroscientist. Mail Online. Retrieved from http://findarticles.com/p/articles/mi_m0EIN/is_2008_July_29/ai_n27950858 DiClemente, R. J. (1991). Predictors of HIV-preventive sexual behavior in a high-risk adolescent population: The influence of perceived peer norms and sexual communication on incarcerated adolescents' consistent use of condoms. Journal of Adolescent Health, 12, 385– 390. docstoc.com. (2009). Text 2 connect with teens—Parents guide to text messaging. Retrieved from http://www.docstoc.com/docs/5130079/Txt-2-Connect-with-Teens–Parents-Guide-to-Text-Messaging Dodge, K. (1986). A social information processing model of social competence in children. In M. Perlmutter (Ed.), The Minnesota Symposium on Child Psychology (Vol. 18, pp. 77– 125). Hillsdale, NJ: Erlbaum. Dretzin, R. (Writer, Director, & Producer), & Maggio, J. (Director & Producer). (2008). Growing up online. In PBS Frontline. Available from http://www.pbs.org/wgbh/pages/frontline/kidsonline/etc/tapes.html Duncan, A. (1996). The shared concern method for resolving group bullying in schools. Educational Psychology in Practice, 12, 94– 98. Dwyer, C. (2007). Digital relationships in the “MySpace” generation: Results from a qualitative study. Proceedings of the 40th Hawaii International Conference on System Sciences. Retrieved from http://csis.pace.edu/˜dwyer/research/DwyerHICSS2007.pdf Eisenberg, M. E., & Forster, J. K. (2003). Adolescent smoking behavior: Measures of social norms. American Journal of Preventive Medicine, 25, 122– 128. Electronic Frontiers Australia. (2000). EFA model acceptable use policy for employee use of the Internet. Retrieved from https://www.efa.org.au/Publish/aup.html Epps, J., & Kendall, P. C. (1995). Hostile attribution bias in adults. Cognitive Therapy and Research, 19, 159– 178. Espelage, D. L., & Swearer, S. M. (2003). Bullying in American schools: A social– ecological perspective on prevention and intervention. Mahwah, NJ: Erlbaum. Estroff, S. D. (2007, January 18). Online social scene clicks with younger set. JewishJournal.com. Retrieved from http://www.jewishjournal.com/articles/item/online_social_scene_clicks_with_younger_set_20070119/ Exploring differences in pre-teen social networking sites. (2008, March 27). Retrieved from http://www.speedofcreativity.org/2008/03/27/exploring-differences-in-preteen-social-networking-sites/ February roundup: Social networking sites for kids. (2008, February 29). Retrieved from http://www.socialmediamom.com/?s=February+roundup%2C+Social+networking+sites+for+kids Fekkes, M., Pijpers, F. I. M., & Verloove-Vanhorick, S. P. (2004). Bullying behavior and associations with psychosomatic complaints and depression in victims. The Journal of Pediatrics, 144, 17– 22. Feyerick, D., & Steffen, S. (2009). ‘Sexting’︁ lands teen on sex offender list. Retrieved from http://www.cnn.com/2009/CRIME/04/07/sexting.busts/ Fiddle Didle. (2008, April 27). Re: KidConfidence video review for Club Penuin.com [Web log comment]. Retrieved from http://kidconfidence.com/blogs/2007/04/21/kidconfidence-video-review-for-Club-Penguin-com Field, E. (2007). Bully blocking ( Rev. ed.). London, England: Jessica Kingsley. Field, E. (n.d.). Workplace bullying. Retrieved from http://bullying.com/au/workplace-bullying/index/php Field, E., & Carroll, P. (2006). Effective ways to work with parents. In H. McGrath & T. Noble (Eds.), Bullying solutions: Evidence-based approaches to bullying in Australian schools (pp. 209– 225). Frenchs Forest, NSW, Australia: Pearson. 57th& Irving (Producer), & Burstein, N. (Director). (2008). American teen [Documentary film]. USA: Paramount Vantage. Franklin, C., Biever, J., Moore, K., Clemons, D., & Scamardo, M. (2001). The effectiveness of solution-focused therapy with children in a school setting. Research on Social Work Practice, 11, 411– 434. Fuller, S. N. (2006). The effects of a school counseling bullying curriculum on bully behavior in an urban K–5 elementary school (Doctoral dissertation, University of Nebraska). Available from Proquest Dissertations and Theses database. Gini, G. (2006). Social cognition and moral cognition in bullying: What's wrong? Aggressive Behavior, 32, 528– 539. Glew, G. M., Fan, M., Katon, W., Rivara, F. P., & Kernic, M. A. (2005). Bullying, psychosocial adjustment, and academic performance in elementary school. Archives of Pediatric & Adolescent Medicine, 159, 1026– 1031. Gradinger, P., Strohmeier, D., & Spiel, C. (in press). Traditional bullying and cyberbullying: Identification of risk groups for adjustment problems. Journal of Psychology. Graham, S., Bellmore, A. D., & Mize, J. (2006). Peer victimization, aggression, and their co-occurrence in middle school: Pathways to adjustment problems. Journal of Abnormal Child Psychology, 34, 363– 378. Graham, S., & Juvonen, J. (2001). An attributional approach to peer victimization. In J. Juvonen & S. Graham (Eds.), Peer harassment in school: The plight of the vulnerable and victimized (pp. 49– 72). New York, NY: Guilford. Greenfield, P. M. (2004). Developmental considerations for determining appropriate Internet use guidelines for children and adolescents. Journal of Applied Developmental Psychology, 25, 751– 762. Griezel, L., Craven, R. G., Yeung, A. S., & Finger, L. R. (2008, December). The development of a multi-dimensional measure of cyber bullying. Paper presented at the annual conference of the Australian Association for Research in Education, Brisbane, Australia. Hafner, K. (2009, May 26). Texting may be taking a toll. Retrieved from http://www.nytimes.com/2009/05/26/health/26teen.html Hanish, L. D., & Guerra, N. G. (2000). The role of ethnicity and school context in predicting children's victimization by peers. American Journal of Community Psychology, 28, 201– 223. Harachi, T. W., Catalano, R. F., & Hawkins, J. D. (1999). United States. In P. K. Smith, Y. Morita, J. Junger-Tas, D. Olweus, R. Catalano, & P. Slee (Eds.), The nature of school bullying: A cross-national perspective (pp. 279– 295). London, England: Routledge. Hare, B. (2009, October 30). Defriending can bruise your ‘digital ego.’︁ Retrieved from http://www.cnn.com/2009/TECH/science/10/30/online.rejection.defriending/index.html Harris Interactive. (2008). Cell phones key to teens' social lives, 47% can text with eyes closed. Retrieved from http://www.marketingcharts.com/interactive/cell-phones-key-to-teens-social-lives-47-can-text-with-eyes-closed-6126 Havenstein, H. (2008, September 12). One in five employers uses social networks in hiring process. Retrieved from http://www.computerworld.com Hawker, D. (1998, September). Bullying and victims' distress: Psychological bullying hurts most. Paper presented at the annual conference of the Developmental Section of the British Psychological Society, University of Lancaster, England. Hawkins, D. L., Pepler, D., & Craig, W. (2001). Peer interventions in playground bullying. Social Development, 10, 512– 527. Hawn, C. (2007, March 23). Time to play, money to spend. Retrieved from http://money.cnn.com/magazines/business2/business2_archive/2007/04/01/8403359/index.htm Heider, F. (1958). The psychology of interpersonal relations. New York, NY: Wiley. Heimowitz, D., & Azicri, J. (Producers & directors). (2007, 2008). Adina's deck [DVD]. USA: Author. Hinduja, S., & Patchin, J. (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Violence, 6, 89– 112. Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Corwin Press. Holland, S. S. (Director). (2007). Shredderman rules! [Cable TV program available in DVD]. USA: Sony Pictures. Holmes, J. R., & Holmes-Lonergan, H. A. (2004). The bully in the family: Family influences on bullying. In C. E. Sanders & G. D. Phye (Eds.), Bullying: Implications for the classroom (pp. 111– 135). Amsterdam, The Netherlands: Elsevier Press. Holt, M. K., & Espelage, D. (2003). A cluster analytic investigation of victimization among high school students: Are profiles differentially associated with psychological symptoms and school belonging? Journal of Applied School Psychology, 19, 81– 98. Hostin, S. (2008, March 16). Online campus gossips won't show their faces. Retrieved from http://www.cnn.com/2008/CRIME/03/17/sunny.juicy/ H.R. 1966, 111th Cong. (2009). Retrieved from http://www.opencon-gress.org/bill/111-h1966/text and http://cnn.co.hu/2009/TECH/science/10/27/online.rejection.defriending/index.html Huesmann, L. R., Guerra, N. G., Miller, L. S., & Zelli, A. (1992). The role of social norms in the development of aggressive behavior. In A. Fraczek & H. Zumley (Eds.), Socialization and aggression (pp. 139– 152). Berlin, Germany: Springer-Verlag. Hymel, S., Rocke-Henderson, N., & Bonanno, R. (2005). Moral disengagement: A framework for understanding bullying among adolescents. Journal of Social Sciences, 8, 1– 11. Imbee: First safe social network for kids closes. (2009, March 17). Retrieved from http://bluepoppy-sem.com/2009/imbee-first-safe-social-network-for-kids-closes/ Inbar, M. (2009, December 2). ‘Sexting’︁ bullying cited in teen's suicide. Retrieved from http://www.msnbc.msn.com/id/34236377/ns/today-today_people/ Internet world stats. (2009). Retrieved from http://www.internetworldstats.com/ Jacobsen, K., & Bauman, S. (2007). School counselors' response to school bullying scenarios. Professional School Counseling, 11, 1– 9. Jaeger, P. T., Bertot, J. C., & McClure, C. R. (2004). The effects of the Children's Internet Protection Act (CIPA) in public libraries and its implications for research: A statistical, policy, and legal analysis. Journal of the American Society for Information Science and Technology, 55, 1131– 1139. Jarvis, K. (2007, November 3). Handling cases of bullying & the method of shared concern. Paper presented at the National Coalition Against Bullying National Conference, Melbourne, Australia. Jones, S., & Fox, S. (2009). Generations online in 2009. Retrieved from http://www.pewinternet.org/Reports/2009/Generations-Online-in-2009.aspx Jonsson, P. (2008, February 25). Teachers strike back at students' online pranks. Christian Science Monitor. Retrieved from http://www.csmonitor.com/USA/2008/0225/p01s02-usgn.html J. S. v. Bethlehem Area School District, 757 A.2d 412 (Pa. Comm. Ct. 2000). Retrieved from http://www.departments.bucknell.edu/edu/ed370/ABSTRACTS%2001/harris.html Juvonen, J., & Gross, E. (2008). Extending the school grounds? Bullying experiences in cyberspace. Journal of School Health, 78, 496– 505. Kapatzia, A., & Sygkollitou, E. (2007). Cyberbullying in middle and high schools: Prevalence, gender, and age differences (Master's thesis). Aristotle University, Thessaloniki, Greece. Katzer, C., Fetchenhauer, D., & Belschak, F. (2009). Cyberbullying: Who are the victims? A comparison of victimization in Internet chatrooms and victimization in school. Journal of Media Psychology, 21(1), 25– 36. Kelley, H. H. (1967). Attribution theory in social psychology. In D. Levine (Ed.), Nebraska Symposium on Motivation (Vol. 15, pp. 192– 238). Lincoln: University of Nebraska Press. Kerkhof, E. (2009). Myspace, yourspace, ourspace: Student cyberspeech, bullying and their impact on school discipline. University of Illinois Law Review, 2009, 1623– 1654. Kessler, J. (2009). Black Philadelphia police sue over message board, say it's racist. Retrieved from http://www.cnn.com/2009/CRIME/07/17/police.racism.lawsuit/index.html Kidswirl. (2009, March 11). Facebook for kids. Retrieved from http://www.aboutus.org/KidSwirl.com Kim, V. (2009, December 14). Judge backs student's First Amendment rights. Retrieved from http://www.boston.com/news/nation/articles/2009/12/14/judge_rules_students_cruel_remarks_online_are_not_unconstitutional/ Kingsbury, W., & Espelage, D. (2008). Attribution style and coping along the bully–victim continuum. Scientia Paedogogica Experimentalis, 44, 71– 102. Kochenderfer-Ladd, B. (2003). Identification of aggressive and asocial victims and the stability of their peer victimization. Merrill-Palmer Quarterly, 49, 401– 425. Kowalski, R., & Limber, S. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41, S22– S30. Kowalski, R., Limber, S., & Agatston, P. W. (2008). Cyberbullying. Malden, MA: Blackwell. Kowalski, R., Limber, S., Scheck, A., Redfearn, M., Allen, J., Calloway, A., . . . Vernon, L. (2005, August). Electronic bullying among school-aged children and youth. Paper presented at the 113th Annual Convention of the American Psychological Association, Washington, DC. Kraft, E. (2006). Cyberbullying: A worldwide trend of misusing technology to harass others. WIT Transactions on Information and Communication Technologies, 36, 155– 166. Leff, S. S., Power, T. J., & Goldstein, A. B. (2004). Outcome measures to assess the effectiveness of bullying-prevention programs in the school. In D. L. Espelage & S. M. Swearer (Eds.), Bullying in American schools: A social–ecological perspective on prevention and intervention (pp. 1– 12). Mahwah, NJ: Erlbaum. Leishman, J. (2005, March). Cyber-bullying. CBC News Online. Retrieved from http://njbullying.org/CBCNewsIndepthBullying.htm Lenhart, A. (2007, June 27). Data memo. Washington, DC: Pew Internet and American Life Project. Lenhart, A. (2009, May). Cyberbullying: What the research is telling us. Paper presented at the National Association of Attorneys General Year of the Child Conference, Philadelphia, PA. Li, Q. (2006). Cyberbullying in schools: A research of gender difference. School Psychology International, 27, 157– 170. Li, Q. (2007a). Bullying in the new playground: Research into cyberbullying and cybervictimization. Australian Journal of Educational Technology, 23, 436– 454. Li, Q. (2007b). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior, 23, 1777– 1791. Limber, S. (2002, May 13). Addressing youth bullying behavior. Paper presented at the Educational Forum on Adolescent Health, American Medical Association, Chicago, IL. Livingstone, S. (2008). Taking risky opportunities in youthful content creation: Teenagers' use of social networking sites for intimacy, privacy, and self-expression. New Media & Society, 10, 393– 411. Lodge, J., & Frydenberg, E. (2007). Cyberbullying in Australian schools: Profiles of adolescent coping and insights for school practitioners. The Australian Educational and Developmental Psychologist, 24, 45– 58. Ma, L., Phelps, E., Lerner, J. V., & Lerner, R. M. (2009). Academic competence for adolescents who bully and are bullied: Findings from the" @default.
- W4211087890 created "2022-02-13" @default.
- W4211087890 date "2015-08-11" @default.
- W4211087890 modified "2023-09-23" @default.
- W4211087890 title "References" @default.
- W4211087890 cites W103934069 @default.
- W4211087890 cites W140067858 @default.
- W4211087890 cites W1410560272 @default.
- W4211087890 cites W1512129502 @default.
- W4211087890 cites W1571350300 @default.
- W4211087890 cites W1605141827 @default.
- W4211087890 cites W1820479570 @default.
- W4211087890 cites W1914444476 @default.
- W4211087890 cites W1980661066 @default.
- W4211087890 cites W1983800911 @default.
- W4211087890 cites W1986858713 @default.
- W4211087890 cites W1987857714 @default.
- W4211087890 cites W1989170290 @default.
- W4211087890 cites W1991733140 @default.
- W4211087890 cites W1991916569 @default.
- W4211087890 cites W1992327722 @default.
- W4211087890 cites W1996689336 @default.
- W4211087890 cites W2001244132 @default.
- W4211087890 cites W2003743855 @default.
- W4211087890 cites W2004417889 @default.
- W4211087890 cites W2005532575 @default.
- W4211087890 cites W2005623329 @default.
- W4211087890 cites W2005920787 @default.
- W4211087890 cites W2011348980 @default.
- W4211087890 cites W2020716095 @default.
- W4211087890 cites W2023253596 @default.
- W4211087890 cites W2029022908 @default.
- W4211087890 cites W2030328692 @default.
- W4211087890 cites W2030541504 @default.
- W4211087890 cites W2031236208 @default.
- W4211087890 cites W2031977514 @default.
- W4211087890 cites W2032983906 @default.
- W4211087890 cites W2033191320 @default.
- W4211087890 cites W2036509711 @default.
- W4211087890 cites W2037547209 @default.
- W4211087890 cites W2042093593 @default.
- W4211087890 cites W2044915179 @default.
- W4211087890 cites W2046235077 @default.
- W4211087890 cites W2047617439 @default.
- W4211087890 cites W2049041303 @default.
- W4211087890 cites W2052336537 @default.
- W4211087890 cites W2053990380 @default.
- W4211087890 cites W2059507573 @default.
- W4211087890 cites W2063392280 @default.
- W4211087890 cites W2063412550 @default.
- W4211087890 cites W2065703109 @default.
- W4211087890 cites W2067938289 @default.
- W4211087890 cites W2069227208 @default.
- W4211087890 cites W2073457732 @default.
- W4211087890 cites W2074133223 @default.
- W4211087890 cites W2076001323 @default.
- W4211087890 cites W2077756157 @default.
- W4211087890 cites W2079526566 @default.
- W4211087890 cites W2081322833 @default.
- W4211087890 cites W2089517338 @default.
- W4211087890 cites W2089738156 @default.
- W4211087890 cites W2090556209 @default.
- W4211087890 cites W2097210817 @default.
- W4211087890 cites W2101843697 @default.
- W4211087890 cites W2105717202 @default.
- W4211087890 cites W2111794635 @default.
- W4211087890 cites W2114641497 @default.
- W4211087890 cites W2117198260 @default.
- W4211087890 cites W2118332019 @default.
- W4211087890 cites W2122263961 @default.
- W4211087890 cites W2122408501 @default.
- W4211087890 cites W2125036394 @default.
- W4211087890 cites W2127111127 @default.
- W4211087890 cites W2127804360 @default.
- W4211087890 cites W2129658059 @default.
- W4211087890 cites W2130971877 @default.
- W4211087890 cites W2131023627 @default.
- W4211087890 cites W2132733567 @default.
- W4211087890 cites W2137501765 @default.
- W4211087890 cites W2141041389 @default.
- W4211087890 cites W2142423963 @default.
- W4211087890 cites W2144772961 @default.
- W4211087890 cites W2147425193 @default.
- W4211087890 cites W2149321897 @default.
- W4211087890 cites W2149501799 @default.
- W4211087890 cites W2149911775 @default.
- W4211087890 cites W2151716672 @default.
- W4211087890 cites W2152126085 @default.
- W4211087890 cites W2153153689 @default.
- W4211087890 cites W2154416002 @default.
- W4211087890 cites W2154549635 @default.
- W4211087890 cites W2155469441 @default.
- W4211087890 cites W2155911744 @default.
- W4211087890 cites W2156763515 @default.
- W4211087890 cites W2159743129 @default.
- W4211087890 cites W2161553514 @default.
- W4211087890 cites W2162193576 @default.
- W4211087890 cites W2162342489 @default.