ABSTRACT
Online Educational Virtual Worlds offer promise that is currently not being realised because of potential threats to the child's safety and wellbeing. This paper seeks to better understand the behavioural and psychological issues, particularly relating to cyber-bullying, faced by school children when they are online and what solutions currently exist. As an outcome of this understanding we make recommendations regarding how cyber-bullying should be managed in educational virtual worlds taking a hybrid approach involving policy, technology and non-technology based solutions.
- Aylett, R. S, Paiva, A; and Vala, M. 2007. "FearNot! -- an emergent narrative approach to virtual dramas for anti-bullying education". In: M. Cavazza and S. Donikian (Eds.): ICVS-VirtStory 2007, LNCS 4871, 199--202, 2007. Springer. Google ScholarDigital Library
- Beussink v. Woodland R-IV School District (United State District Court, Eastern District of Missouri, Southeastern Division 1998).Google Scholar
- Boyd, D. 2012. The Good, the Bad, the Ugly... and the Internet. Boston Daily, June 15, 2012. http://www.bostonmagazine.com/news/blog/2012/06/15/roundtable-digital-street/ accessed 6 July 2013.Google Scholar
- Campbell, M. A. 2005. "Cyber-bullying: an old problem in a new guise?" Australian Journal of Guidance and Counselling, 15(1). doi: 10.1375/ajgc.15.1.68 Google ScholarDigital Library
- Childnet. 2007. "Cyber-bullying a whole-school community issue". 8. Retrieved from Cyber-bullying Guidance Overview website: http://www.digizen.org/downloads/cyber-bullyingOverview.pdfGoogle Scholar
- Constitutional Law - First Amendment - Second Circuit Holds that Student's Removal from Class Is Not First Amendment Retaliation Where Motivation Is Protective. - Cox v. Warwick Valley Central School District, 654 F.3d 267 (2d Cir. 2011). (2012). {Article}. Harvard Law Review, 125(4), 1096--1103.Google Scholar
- Crookall, D., Oxford, R. and Saunders, D. 1987. "Towards a Reconceptualization of Simulation: From Representation to Reality". Simulation/Games for Learning, 17(4):147--71.Google Scholar
- Crystal, D. 2006. Language and the Internet: Cambridge University Press. Google ScholarDigital Library
- Student Learning and Support Services Taskforce of the Ministerial Council on Education, Employment, Training and Youth Affairs. (DEEWR) 2003. National Safe Schools Framework Retrieved May 16, 2012, from http://www.cybersmart.gov.au/Schools/Cybersafety%20policies%20and%20procedures/National%20or%20state%20and%20territory%20policies/National%20cybersafety%20policies.aspx#BetterPracticeGuide:ICTinschoolsGoogle Scholar
- Didden, Robert, Ron H. J. Scholte, Hubert Korzilius, Jan M. H. de Moor, Anne Vermeulen, Mark O'Reilly, Lancioni, G. E. 2009. "Cyber-bullying among students with intellectual and developmental disability in special education settings". Developmental Neurorehabilitation, 12(3), 146--151. doi: 10.1080/17518420902971356Google ScholarCross Ref
- Garner, B. A. 2004. Black's Law Dictionary.Google Scholar
- Hunter, C. D. 2000. "Internet filter effectiveness (student paper panel): testing over and underinclusive blocking decisions of four popular filters". Paper presented at the Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, Toronto, Ontario, Canada. Google ScholarDigital Library
- Kowalski, R. M., & Fedina, C. 2011. "Cyber-bullying in ADHD and Asperger Syndrome populations". Research in Autism Spectrum Disorders, 5(3), 1201--1208. doi: 10.1016/j.rasd.2011.01.007Google ScholarCross Ref
- Kowalski RM, Limber SP. Cyber bullying among middle school students. J Adolesc Health 2007;41(Suppl):S22--S30.Google Scholar
- Kowalski, R. M., Limber, S. P., & Agatston, P. W. 2008. Cyber-bullying Bullying in the Digital Age (1st ed. ed.): Blackwell Publishing.Google Scholar
- Kowalski v. Berkeley County Schools (United States Court of Appeals, Fourth Circuit II 2011).Google Scholar
- McQuade, S. C., Colt, J. P., & Meyer, N. B. B. 2009. "Cyber-bullying: protecting kids and adults from online bullies" Retrieved from http://lib.myilibrary.com/Open.aspx?id=234119&loc=&srch=undefined&src=0Google Scholar
- Minocha, S., & Reeves, A. 2010. "Interaction Design and Usability of Learning Spaces in 3D Multi-user Virtual Worlds", Human Work Interaction Design: Usability in Social, Cultural and Organizational Contexts IFIP Advances in Information and Communication Technology, 2010, Volume 316/2010, 157--167.Google Scholar
- Mishna, F., Michael Saini, & Steven Solomon. 2009. "Ongoing and online: Children and youth's perceptions of cyber-bullying". Children and Youth Services Review, 31(12), 1222--1228. doi: 10.1016/j.childyouth.2009.05.004Google ScholarCross Ref
- Ng, E. 2010. Breaking the Silence: Armour Pub.Google Scholar
- Network, M. A. 2010. Privacy Playground Retrieved May 16, 2012, from http://www.media-awareness.ca/english/games/privacy_playground/Google Scholar
- Rigby, K. 2002. New Perspectives on Bullying (illustrated ed.). United Kingdom: Jessica Kingsley Publishers.Google Scholar
- Rogers, V. 2010. Cyber-bulling, Activities to Help Children and Teens to Stay Safe in a Texting, Twittering, Social Networking World (pp. 128).Google Scholar
- Sahin, M. (2012). The relationship between the cyber-bullying/cybervictmization and loneliness among adolescents. Children and Youth Services Review, 34(4), 834--837. doi: 10.1016/j.childyouth.2012.01.010Google ScholarCross Ref
- Savage, D. G. 2012, January 15, 2012 11:07 p.m. Supreme Court to consider cyber-bullying cases Retrieved 04/06/2012, 2012, from http://poststar.com/news/local/supreme-court-to-consider-cyber-bullying-cases/article_1ca81a24-3ff8-11e1-bc9a-0019bb2963f4.htmlGoogle Scholar
- Schrock, Andrew and Boyd, Danah, 2011. Problematic Youth Interaction Online: Solicitation, Harassment, and Cyberbullying. In Computer - Mediated Communication in Personal Relationships (Eds. Kevin B. Wright & Lynn M. Webb). New York: Peter Lang.Google Scholar
- Shariff, S., & Churchill, A. H. 2010. Truths and Myths of Cyber-Bullying: International Perspectives on Stakeholder Responsibility and Children's Safety: Peter Lang.Google Scholar
- Snider, M. 2004. "How to Cyber-bully-Proof Your Kids". Retrieved 8/7/12 from http://www.macleans.ca/science/technology/article.jsp?content=20040524_81184_81184.Google Scholar
- Willard, N. E. 2007. Cyber-Bullying and Cyber-Threats responding to the challenge of online social aggression, threats, and distress. Research Press. Google ScholarDigital Library
- Yun-yin Huang, & Chou, C. 2010. "An analysis of multiple factors of cyber-bullying among junior high school students in Taiwan". Computers in Human Behavior, 26(6), 1581--1590. doi: 10.1016/j.chb.2010.06.005 Google ScholarDigital Library
- Zwaan, J. van der, Dignum, V., & Jonker, C. M. 2012a. "A BDI dialogue agent for social support: specification and evaluation method". In Proc. of the International Workshop on Emotional and Empathic Agents (EEA 2012).Google Scholar
- Zwaan, J. van der, Dignum, V., & Jonker, C. M. 2012b. "On Technology against Cyber-bullying". Technical Report. Delft University of Technology.Google Scholar
Index Terms
- Managing cyber-bullying in online educational virtual worlds
Recommendations
Cyber-Bullying, Personality and Coping among Pre-Adolescents
The aim of this study was to investigate the association of personality Five Factor Model, coping and cyber-bullying/victimization experiences among 300 Greek pre-adolescent students attending the upper two primary school grades. Boys reported more ...
Cyberbullying among young adults in Malaysia
The study explored cyberbullying prevalence among young adults in Malaysia.Social media emerged as the primary tool used.No significant differences for gender and age on cyberbullying activities.Internet frequency significantly predicts cyberbullying.A ...
Bullying and cyberbullying: Convergent and divergent predictor variables
There is certain controversy on whether cyber-bullying is a category of bullying as it appears in a very different scenario away from the schools. The objective of this research has been to know if the variables that predict the involvement of ...
Comments