Meiho University Institutional Repository:Item 987654321/3008
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 2876/3793 (76%)
造訪人次 : 3859982      線上人數 : 561
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於MUIR管理 到手機版


    請使用永久網址來引用或連結此文件: http://ir.meiho.edu.tw/ir/handle/987654321/3008


    題名: Characteristics of Students Cyberbullying and its’ Prevention and Treatment
    作者: Lin, Hsiao-Tseng;Liu, Yong-sheng;Hsiao, Szu-Mei
    關鍵詞: Bullying;yberbullying
    日期: 2015-12-14
    上傳時間: 2015-12-15T07:58:13Z (UTC)
    摘要: Background: The word bullying existed long before the internet prevalence; however, with the development of Internet, cyberbullying has become a serious issue oncampus.Based on results of an interviewof800 American young people aged 12-17byPew(Pew Internet & American Life Project)at 2010, these youngster students have spent 93% of the time on the Internet. Among them, more than 63%usethe Internet every dayand 36% are heavy Internet users. Similar statistics also reported by Taiwan Network Information Center (TWNIC) at 2014, it indicates that the Internet access rate for people over 12 years old has reached 77%. Youngsters are very sophisticated users of new internet and mobile technology. Their mental immaturity, along with technological savvy, and the ability to be online without much supervision may lead to behaviors that are high risk.They are easily become the victim of cyberbullying, or even engage in bullying via the Internet and mobile device.
    Significance: Cyberbullyinghashuge impact on the young student all over the world. In some extreme cases, youngsters had even committed suicide after suffering serve cyberbullying.
    Purpose:Thisstudy aims to investigate the characteristics of cyberbullying, and how to 2

    make the prevention and treatment more effective.
    Methodology: This research consists of detailed literature review for more than fiftyrelevant papers and investigation and discussion of four real cyberbullying cases.
    Results: It is estimated that about 25% of the youngster students had been victims of cyberbullying, and the online games can be an important field for cyberbullying. On campus, female students usually view cyber bullying as a problem, but one rarely discussedat school, and that students usually donot consider the school personnel and parentsas helpful resources when dealing with cyber bullying. Apparently girls are more vulnerable to cyberbullying; and the impacts on victims from Internet message, photo, or video are more serious than traditional bullying. Some important conclusions can be drawn from this work regarding the prevention and treatment of cyberbullying. Firstly, theimplementation of three-step process of effective prevention, discovery, andtreatmentare rather critical for cyberbullying. Secondly, relevant scales should be developed to prevent the cyberbullying. Thirdly, relevant network communication and online gameindustry should consider establishing protocol or strict regulation to prevent cyberbullying. Next, government authorityshouldbe more actively involved incyberbullying prevention. For example, Greek government establish an Internet hotlinecalled “SafeLine”to eliminate illegal internet content with emphasis on images of child sexual abuse and to combat against users who encroach on children's rights through illegal internet activities likecyberbullying.Accordingtopast research on experience of onlinepatrolofficers, they want citizens to be more careful online and for clarification of cybercrime laws and increased prosecutions. Finally, reasonable legislation should be tailor-made for cyberbullying. System for identifying users on Internet is an optional;however, there still exist intense controversy over the consideration for violation of privacy
    顯示於類別:[資訊管理系] 學位論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    林筱增劉永勝蕭思美_研討會論文1041210.pdf574KbAdobe PDF1224檢視/開啟


    在MUIR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋