Ontology type: schema:ScholarlyArticle
2020-06-26
AUTHORSHatice Yildiz Durak, Mustafa Saritepeci
ABSTRACTBehaviors which are conducted via information technologies, which are irritating, and which cause psychological strain for the individuals are categorized as cyberbullying (CB). Cyber victimization (CV), on the other hand, expresses exposure to CB behaviors. In this study, we utilize General Strain Theory (GST) as the theoretical basis to examine the relationship between CB and exposure to CV among university students. GST explains that individuals may display aberrant behaviors in order to alleviate psychological strains and the negative emotions they experience. Accordingly, individuals who experienced CV may display CB when the conditions are suitable. With that in mind, we examined the relationship between CB and CV using a relational screening model with participation of 3302 university students. We found, consistent with the literature, a direct relationship between CB and CV in all models. However, it was determined that their mediating effects are not meaningful when the variables of metacognitive and digital data security awareness (DDSA) are added to the model separately. When these two variables are added to the model together as the mediator at the same time, DDSA negatively mediates the relation between CB and CV. Including various activities aiming to develop DDSA within intervention programs for CB and CV, may improve positive outcomes for participants. More... »
PAGES2905-2915
http://scigraph.springernature.com/pub.10.1007/s10826-020-01768-4
DOIhttp://dx.doi.org/10.1007/s10826-020-01768-4
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1128800531
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/17",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Psychology and Cognitive Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1701",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Psychology",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Department of Computer Technology and Information Systems, Faculty of Science, Bartin University, Bartin, Turkey",
"id": "http://www.grid.ac/institutes/grid.449350.f",
"name": [
"Department of Computer Technology and Information Systems, Faculty of Science, Bartin University, Bartin, Turkey"
],
"type": "Organization"
},
"familyName": "Yildiz Durak",
"givenName": "Hatice",
"id": "sg:person.010414313050.00",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010414313050.00"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Department of Computer Education and Instructional Technology, Ere\u011fli Faculty of Education, Necmettin Erbakan University, Konya, Turkey",
"id": "http://www.grid.ac/institutes/grid.411124.3",
"name": [
"Department of Computer Education and Instructional Technology, Ere\u011fli Faculty of Education, Necmettin Erbakan University, Konya, Turkey"
],
"type": "Organization"
},
"familyName": "Saritepeci",
"givenName": "Mustafa",
"id": "sg:person.015603232575.22",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015603232575.22"
],
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1023/a:1003044231033",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1050212899",
"https://doi.org/10.1023/a:1003044231033"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s10212-012-0137-2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1025845031",
"https://doi.org/10.1007/s10212-012-0137-2"
],
"type": "CreativeWork"
}
],
"datePublished": "2020-06-26",
"datePublishedReg": "2020-06-26",
"description": "Behaviors which are conducted via information technologies, which are irritating, and which cause psychological strain for the individuals are categorized as cyberbullying (CB). Cyber victimization (CV), on the other hand, expresses exposure to CB behaviors. In this study, we utilize General Strain Theory (GST) as the theoretical basis to examine the relationship between CB and exposure to CV among university students. GST explains that individuals may display aberrant behaviors in order to alleviate psychological strains and the negative emotions they experience. Accordingly, individuals who experienced CV may display CB when the conditions are suitable. With that in mind, we examined the relationship between CB and CV using a relational screening model with participation of 3302 university students. We found, consistent with the literature, a direct relationship between CB and CV in all models. However, it was determined that their mediating effects are not meaningful when the variables of metacognitive and digital data security awareness (DDSA) are added to the model separately. When these two variables are added to the model together as the mediator at the same time, DDSA negatively mediates the relation between CB and CV. Including various activities aiming to develop DDSA within intervention programs for CB and CV, may improve positive outcomes for participants.",
"genre": "article",
"id": "sg:pub.10.1007/s10826-020-01768-4",
"inLanguage": "en",
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1102930",
"issn": [
"1062-1024",
"1573-2843"
],
"name": "Journal of Child and Family Studies",
"publisher": "Springer Nature",
"type": "Periodical"
},
{
"issueNumber": "10",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "29"
}
],
"keywords": [
"general strain theory",
"cyber victimization",
"psychological strain",
"university students",
"negative emotions",
"relational screening model",
"intervention programs",
"CB behavior",
"strain theory",
"positive outcomes",
"aberrant behavior",
"victimization",
"security awareness",
"individuals",
"emotions",
"students",
"cyberbullying",
"direct relationship",
"relationship",
"behavior",
"participants",
"mind",
"variables",
"awareness",
"theoretical basis",
"theory",
"mediators",
"model",
"outcomes",
"participation",
"program",
"relation",
"exposure",
"literature",
"same time",
"information technology",
"study",
"effect",
"screening model",
"hand",
"basis",
"examination",
"time",
"activity",
"conditions",
"CB",
"order",
"technology",
"strains"
],
"name": "Examination of the Relationship between Cyberbullying and Cyber Victimization",
"pagination": "2905-2915",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1128800531"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s10826-020-01768-4"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s10826-020-01768-4",
"https://app.dimensions.ai/details/publication/pub.1128800531"
],
"sdDataset": "articles",
"sdDatePublished": "2022-05-20T07:37",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/article/article_873.jsonl",
"type": "ScholarlyArticle",
"url": "https://doi.org/10.1007/s10826-020-01768-4"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10826-020-01768-4'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10826-020-01768-4'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10826-020-01768-4'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10826-020-01768-4'
This table displays all metadata directly associated to this object as RDF triples.
125 TRIPLES
22 PREDICATES
76 URIs
66 LITERALS
6 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:pub.10.1007/s10826-020-01768-4 | schema:about | anzsrc-for:17 |
2 | ″ | ″ | anzsrc-for:1701 |
3 | ″ | schema:author | Na8f4698501a842cd8d6be2950f707cfb |
4 | ″ | schema:citation | sg:pub.10.1007/s10212-012-0137-2 |
5 | ″ | ″ | sg:pub.10.1023/a:1003044231033 |
6 | ″ | schema:datePublished | 2020-06-26 |
7 | ″ | schema:datePublishedReg | 2020-06-26 |
8 | ″ | schema:description | Behaviors which are conducted via information technologies, which are irritating, and which cause psychological strain for the individuals are categorized as cyberbullying (CB). Cyber victimization (CV), on the other hand, expresses exposure to CB behaviors. In this study, we utilize General Strain Theory (GST) as the theoretical basis to examine the relationship between CB and exposure to CV among university students. GST explains that individuals may display aberrant behaviors in order to alleviate psychological strains and the negative emotions they experience. Accordingly, individuals who experienced CV may display CB when the conditions are suitable. With that in mind, we examined the relationship between CB and CV using a relational screening model with participation of 3302 university students. We found, consistent with the literature, a direct relationship between CB and CV in all models. However, it was determined that their mediating effects are not meaningful when the variables of metacognitive and digital data security awareness (DDSA) are added to the model separately. When these two variables are added to the model together as the mediator at the same time, DDSA negatively mediates the relation between CB and CV. Including various activities aiming to develop DDSA within intervention programs for CB and CV, may improve positive outcomes for participants. |
9 | ″ | schema:genre | article |
10 | ″ | schema:inLanguage | en |
11 | ″ | schema:isAccessibleForFree | false |
12 | ″ | schema:isPartOf | N62bd3ae5424f466eb953896366069b1c |
13 | ″ | ″ | N65781258103842618a7b93945fc222c1 |
14 | ″ | ″ | sg:journal.1102930 |
15 | ″ | schema:keywords | CB |
16 | ″ | ″ | CB behavior |
17 | ″ | ″ | aberrant behavior |
18 | ″ | ″ | activity |
19 | ″ | ″ | awareness |
20 | ″ | ″ | basis |
21 | ″ | ″ | behavior |
22 | ″ | ″ | conditions |
23 | ″ | ″ | cyber victimization |
24 | ″ | ″ | cyberbullying |
25 | ″ | ″ | direct relationship |
26 | ″ | ″ | effect |
27 | ″ | ″ | emotions |
28 | ″ | ″ | examination |
29 | ″ | ″ | exposure |
30 | ″ | ″ | general strain theory |
31 | ″ | ″ | hand |
32 | ″ | ″ | individuals |
33 | ″ | ″ | information technology |
34 | ″ | ″ | intervention programs |
35 | ″ | ″ | literature |
36 | ″ | ″ | mediators |
37 | ″ | ″ | mind |
38 | ″ | ″ | model |
39 | ″ | ″ | negative emotions |
40 | ″ | ″ | order |
41 | ″ | ″ | outcomes |
42 | ″ | ″ | participants |
43 | ″ | ″ | participation |
44 | ″ | ″ | positive outcomes |
45 | ″ | ″ | program |
46 | ″ | ″ | psychological strain |
47 | ″ | ″ | relation |
48 | ″ | ″ | relational screening model |
49 | ″ | ″ | relationship |
50 | ″ | ″ | same time |
51 | ″ | ″ | screening model |
52 | ″ | ″ | security awareness |
53 | ″ | ″ | strain theory |
54 | ″ | ″ | strains |
55 | ″ | ″ | students |
56 | ″ | ″ | study |
57 | ″ | ″ | technology |
58 | ″ | ″ | theoretical basis |
59 | ″ | ″ | theory |
60 | ″ | ″ | time |
61 | ″ | ″ | university students |
62 | ″ | ″ | variables |
63 | ″ | ″ | victimization |
64 | ″ | schema:name | Examination of the Relationship between Cyberbullying and Cyber Victimization |
65 | ″ | schema:pagination | 2905-2915 |
66 | ″ | schema:productId | N2660d03dca8a40da90708a4c10a5154f |
67 | ″ | ″ | Na3114790ce0d4ac893b63573763c9402 |
68 | ″ | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1128800531 |
69 | ″ | ″ | https://doi.org/10.1007/s10826-020-01768-4 |
70 | ″ | schema:sdDatePublished | 2022-05-20T07:37 |
71 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
72 | ″ | schema:sdPublisher | N91b5d3883ba54adeb8a0b25b52596165 |
73 | ″ | schema:url | https://doi.org/10.1007/s10826-020-01768-4 |
74 | ″ | sgo:license | sg:explorer/license/ |
75 | ″ | sgo:sdDataset | articles |
76 | ″ | rdf:type | schema:ScholarlyArticle |
77 | N2660d03dca8a40da90708a4c10a5154f | schema:name | doi |
78 | ″ | schema:value | 10.1007/s10826-020-01768-4 |
79 | ″ | rdf:type | schema:PropertyValue |
80 | N297150bbd7bc4815a313aa3e864b2ebf | rdf:first | sg:person.015603232575.22 |
81 | ″ | rdf:rest | rdf:nil |
82 | N62bd3ae5424f466eb953896366069b1c | schema:issueNumber | 10 |
83 | ″ | rdf:type | schema:PublicationIssue |
84 | N65781258103842618a7b93945fc222c1 | schema:volumeNumber | 29 |
85 | ″ | rdf:type | schema:PublicationVolume |
86 | N91b5d3883ba54adeb8a0b25b52596165 | schema:name | Springer Nature - SN SciGraph project |
87 | ″ | rdf:type | schema:Organization |
88 | Na3114790ce0d4ac893b63573763c9402 | schema:name | dimensions_id |
89 | ″ | schema:value | pub.1128800531 |
90 | ″ | rdf:type | schema:PropertyValue |
91 | Na8f4698501a842cd8d6be2950f707cfb | rdf:first | sg:person.010414313050.00 |
92 | ″ | rdf:rest | N297150bbd7bc4815a313aa3e864b2ebf |
93 | anzsrc-for:17 | schema:inDefinedTermSet | anzsrc-for: |
94 | ″ | schema:name | Psychology and Cognitive Sciences |
95 | ″ | rdf:type | schema:DefinedTerm |
96 | anzsrc-for:1701 | schema:inDefinedTermSet | anzsrc-for: |
97 | ″ | schema:name | Psychology |
98 | ″ | rdf:type | schema:DefinedTerm |
99 | sg:journal.1102930 | schema:issn | 1062-1024 |
100 | ″ | ″ | 1573-2843 |
101 | ″ | schema:name | Journal of Child and Family Studies |
102 | ″ | schema:publisher | Springer Nature |
103 | ″ | rdf:type | schema:Periodical |
104 | sg:person.010414313050.00 | schema:affiliation | grid-institutes:grid.449350.f |
105 | ″ | schema:familyName | Yildiz Durak |
106 | ″ | schema:givenName | Hatice |
107 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010414313050.00 |
108 | ″ | rdf:type | schema:Person |
109 | sg:person.015603232575.22 | schema:affiliation | grid-institutes:grid.411124.3 |
110 | ″ | schema:familyName | Saritepeci |
111 | ″ | schema:givenName | Mustafa |
112 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015603232575.22 |
113 | ″ | rdf:type | schema:Person |
114 | sg:pub.10.1007/s10212-012-0137-2 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1025845031 |
115 | ″ | ″ | https://doi.org/10.1007/s10212-012-0137-2 |
116 | ″ | rdf:type | schema:CreativeWork |
117 | sg:pub.10.1023/a:1003044231033 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1050212899 |
118 | ″ | ″ | https://doi.org/10.1023/a:1003044231033 |
119 | ″ | rdf:type | schema:CreativeWork |
120 | grid-institutes:grid.411124.3 | schema:alternateName | Department of Computer Education and Instructional Technology, Ereğli Faculty of Education, Necmettin Erbakan University, Konya, Turkey |
121 | ″ | schema:name | Department of Computer Education and Instructional Technology, Ereğli Faculty of Education, Necmettin Erbakan University, Konya, Turkey |
122 | ″ | rdf:type | schema:Organization |
123 | grid-institutes:grid.449350.f | schema:alternateName | Department of Computer Technology and Information Systems, Faculty of Science, Bartin University, Bartin, Turkey |
124 | ″ | schema:name | Department of Computer Technology and Information Systems, Faculty of Science, Bartin University, Bartin, Turkey |
125 | ″ | rdf:type | schema:Organization |