Think! Evidence

The determination of cyber bullying behaviour and exposure of university students

Show simple item record

dc.creator Zehra Özçınar
dc.creator Gökçe Çakartaş Aldağ
dc.date 2012-01-01T00:00:00Z
dc.date.accessioned 2015-07-20T22:09:30Z
dc.date.available 2015-07-20T22:09:30Z
dc.identifier 1305-9076
dc.identifier 1305-905X
dc.identifier https://doaj.org/article/ea22b8c03a99454c9717e03e95c5049e
dc.identifier.uri http://evidence.thinkportal.org/handle/123456789/12851
dc.description This study, the questions, which are used to understand the type and frequency of being exposed to cyber despotism and alsoto understand if they practice the cyber despotism to others, are asked to university students. In this light, “CyberDespotism/Victim Development Scale” is used. According to the results of this scale, exposing to and practicing the cyberdespotism are clarified by the statistical method. The main purpose of the study is to determine the despotism, which is thedimension of violence and also to determine the reasons, frequency, and the way of solutions of the despotism in order topresent the preventive solutions to parents and educators.In this study, the questions, which are used to understand thetype and frequency of being exposed to cyber despotism and also to understand if they practice the cyber despotism toothers, are asked to university students. In this light, “Cyber Despotism/Victim Development Scale” is used.The frequency ofusing information technology among university students is 37.63 and the purpose of using information technology can belisted in order this way: specific packet program research (97.63%), homework (69.13%), and lastly social network(59.00%).The students that are 25 years old and above are both cyber despot and cyber victim contrast to other agegroups.Male students are more in the situation of cyber victim at subscale I and III and more in situation of cyber despot atsubscale I, II, and III than female students.The students, who study at the computer and education technology department,are more in the situation of cyber despot at despot subscale I and II behavior than the other students, who study in otherdepartments. On the other hand, the results show that the students at in the department of preschool teaching are the onesthat are less cyber despot than the other students.The students, whose cumulative GPA are 1.99 and below 1.99, are moreexposed to be cyber despot and cyber victim than the other students. On the other hand, the students, whose cumulativeGPA are 3.00 and above 3.00, are less exposed to be cyber despot and cyber victim in contrast to other students. Moreover,the study shows that the students, whose family income level is 3400 and above, are exposed to be the most cyber despotand the students, whose family income level is 1200 and below, are the ones that are less cyber despots.
dc.language English
dc.language Turskish
dc.publisher World Education, Science, Research and Counseling Center
dc.relation http://www.world-education-center.org/index.php/cjes/article/view/7.3.2/7.3.2
dc.relation https://doaj.org/toc/1305-9076
dc.relation https://doaj.org/toc/1305-905X
dc.rights CC BY-NC
dc.source Cypriot Journal of Educational Sciences , Vol 7, Iss 3, Pp 158-176 (2012)
dc.subject Virtual/cyber despotism
dc.subject virtual/cyber despot
dc.subject virtual/cyber victim
dc.subject virtual/cyber environment
dc.subject Education (General)
dc.subject L7-991
dc.subject Education
dc.subject L
dc.subject DOAJ:Education
dc.subject DOAJ:Social Sciences
dc.subject Education (General)
dc.subject L7-991
dc.subject Education
dc.subject L
dc.subject DOAJ:Education
dc.subject DOAJ:Social Sciences
dc.subject Education (General)
dc.subject L7-991
dc.subject Education
dc.subject L
dc.subject Education (General)
dc.subject L7-991
dc.subject Education
dc.subject L
dc.subject Education (General)
dc.subject L7-991
dc.subject Education
dc.subject L
dc.title The determination of cyber bullying behaviour and exposure of university students
dc.type article


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Think! Evidence


Browse

My Account