Participatory Design to Address Disclosure-Based Cyberbullying
Abstract
Supplemental Material
- Download
- 1.65 MB
References
Index Terms
- Participatory Design to Address Disclosure-Based Cyberbullying
Recommendations
Designing Cyberbullying Mitigation and Prevention Solutions through Participatory Design With Teenagers
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing SystemsWhile social media platforms enable individuals to easily communicate and share experiences, they have also emerged as a tool for cyberbullying. Teenagers represent an especially vulnerable population for negative emotional responses to cyberbullying. ...
Parental mediation, cyberbullying, and cybertrolling
Researchers are concerned with identifying the risk and protective factors associated with adolescents' involvement in cyberharassment. One such factor is parental mediation of children's electronic technology use. Little attention has been given to how ...
Pathological narcissism, cyberbullying victimization and offending among homosexual and heterosexual participants in online dating websites
Homosexual individuals are exposed to high levels of victimization. However, no studies have examined personality risk factors for cyberbullying victimization and offending among this population. This study investigated the relationships between ...
Comments
Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 798Total Downloads
- Downloads (Last 12 months)798
- Downloads (Last 6 weeks)156
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in