The Power of Electronic - Digital Media at the Event on Cyber Bullying
Keywords:Cyber bullying, perpetrators, victims, digital media
The rise of technology in recent years has made the internet a widely used medium for all ages and social groups. It enables users to communicate, exchange information, be informed, work and be entertained. Through the internet, users can express their views and ideas, engage in art, express their thoughts, make purchases, search for material and information, but also get in touch with people from different regions and countries. (Κασφίκης, Κατάνου, & Μαλαματή, 2009)
• Ευρωπαϊκή Καμπάνια. (2012). Ευρωπαϊκή έρευνα για το φαινόμενο του σχολικού εκφοβισμού.Τελική Έκθεση. Έργο: Ευρωπαϊκή Καμπάνια κατά του Σχολικού εκφοβισμού.
• Καραβόλτσου, Α. (2013). Σχολικός εκφοβισμός. Συνοπτικό εγχειρίδιο αντιμετώπισης σχολικού εκφοβισμού εκπαιδευτικών δευτεροβάθμιας εκπαίδευσης. Αθήνα: Πανεπιστήμιο Αθηνών.
• Κασφίκης, Ν., Κατάνου, Β., & Μαλαματή, Α. (2009). Κοινωνικά δίκτυα. Θεσσαλονίκη: Αριστοτέλειο Πανεπιστήμιο .
• Κούρτη, Ε. (2003). Η επικοινωνία στο διαδίκτυο. Αθήνα: Ελληνικά Γράμματα.
• Νικολόπουλος, Δ. (2009). Ηλεκτρονική Παρενόχληση: Μια σύγχρονη απειλή. Στο Α. Σοφός, Παιδαγωγικές Διαστάσεις των Νέων Μέσων (σσ. 88-117). Αθήνα: Γρηγόρη.
• Adams, C. (2010). Cyber bullying: How to make it stop. Instructor, 120 (2), pp. 44-49.
• Barringer-Brown, C. (2015). Cyber bullying among Students with Serious Emotional and Specific Learning Disabilities . Journal of Education and Human Development, 4 (2), pp. 50-56.
• Didden, R., Scholte, R. H., Korzilius, H., De Moor, J. M., Vermeulen, A., O'Reilly, M., et al. (2009). Cyber bullying among students with intellectual and developmental disability in special education settings. Developmental Neurorehabilitation, 12 (3), pp. 146-151.
• Dooley, J. J., Pyzalski, J., & Cross, D. (2009). Cyber bullying versus face to face bullying: A theoretical and conceptual Review. Journal of Psychology, 217 (4), pp. 182-188.
• Eu Kids On Line. (2011). EU Kids Online: final report 2011.Retrived from http://eprints.lse.ac.uk/45490/1/EU%20Kids%20Online%20final%20report%202011%28lsero%29.pdf
• Feinberg, Τ., & Robey, Ν. (2009). Cyber bullying: Intervention and Prevention Strategies. National Association of School Psychologists. Communique, 38 (4), pp. 1-4.
• Guckert, M. (2013). Understanding bystander perceptions of cyberbulluing in inclusive classroom settings. Fairfax, VA: George Mason University.
• Horakh, G. B. (2012). Cyber bullying and students with learning disabilities. New Jersey: Rowan University.
• Kowalski, R., Limber, S., & Agatston, P. (2012). Cyber bullying in the Digital Age (Second Edition). United States: Wiley-Blackwell.
• Li, Q., Gross, P., & Smith, P. (2012). Cyber bullying in the Global playground. United States: Blackwell Publishing Ltd.
• McQuade, S. C., & Sampat, N. (2008). Survey of internet and at-risk behaviors. Rochester, NY: Rochester Institute of Technology.
• Patchin, J., & Hinduja, S. (2010). Cyber bullying and Self-Esteem. Journal of School Health, 80 (12), pp. 614-621.
• Safe Line. (2015). Towards a safer internet for all. Retrived from http://www.safeline.gr/
• Smith, P. K., Mahdavi, J., Carvalho, M., & Tippett, N. (2006). An investigation into cyber bullying, its forms, awareness and impact, and the relationship between age and gender in cyber bullying. Reserach Brief (RBX03-06) .
• Ybarra, M., & Mitchell, K. (2004). Youth engaging in online harassment: associations with caregiver–child relationships, Internet use, and personal characteristics. Journal of Adolescence, 27 (3), pp. 319-336.
Translated Greek References
• European Campaign. (2012) European research on the phenomenon on school bullying. Final Report. Project: Europe's Anti-Bullying Campaign
• Karavoltsou A. (2013) School bullying. Summary manual for treating school bullying for the educators in the secondary education. Athens: University of Athens
• Kasfikis, N. Katanou, B., & Malamati A., (2009) Social Networks. Thessaloniki. Aristotle University.
• Kourti, E. (2003) Communication online. Athens. Hellinika Grammata.
• Nikolopoulos, D. (2009) Electronic Harassment : A modern threat. In A. Sofos, Pedagogical aspects of the new media (pg. 88-117),
How to Cite
Copyright (c) 2020 Konstantinos Zimianitis
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.