RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재

      사이버불링 피해와 영향요인 연구: 생활양식과 일상활동을 중심으로 = Examination of Cyberbullying Experiences among Korean Students from Different Routine Activity

      한글로보기

      https://www.riss.kr/link?id=A108252588

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      The study is aim to classify the bullying types in cyberspace and analyze the characteristics of latent victim groups through OLS regression. In particular, focusing on lifestyle-exposure/routine activity theory (LRAT), it was verified how the victim'...

      The study is aim to classify the bullying types in cyberspace and analyze the characteristics of latent victim groups through OLS regression. In particular, focusing on lifestyle-exposure/routine activity theory (LRAT), it was verified how the victim's lifestyle differs according to the type of victimization caused by cyberbullying. The doLCA plug-in of STATA 16.0 was used as a tool for processing and analysis of data. The original data is the 「Cyber Violence Survey 2020」 by the National Information Society Agency. As a result of the analysis, the latent bullying victim groups in cyberspace were classified into five groups: All-High, Verbal-High, All-Low, Stalking-High, and All-Middle. Each latent victim group has positive effect of offending experience in cyberspace compared to All-Low group. These findings were explained by lifestyle-exposure and routine activity theory(LRAT). Specifically, sex, age, Internet usage time, and preferred activities revealed difference among each group. Implications through findings of the study were discussed. As a result, in order to reduce the cyberbullying victimization, it is necessary to improve the victimization environment of cyberbullying related to usage of SNS. Particularly, since cyber routine activities can lead to cyberbullying victimization, proper education that can reduce dangerous behaviors such as disclosure of personal information is important.

      더보기

      참고문헌 (Reference)

      1 오인수, "초등학생 온라인 괴롭힘의 실태 및 오프라인 괴롭힘과의 비교분석" 교육연구소 12 (12): 75-98, 2011

      2 남상인 ; 권남희, "청소년 사이버 불링 가해에 영향을 미치는 변인 연구" 미래를 여는 청소년학회 10 (10): 23-43, 2013

      3 신택수, "종단프로파일분석과 군집분석을 이용한 잠재집단연구: 성장혼합모형과 비교를 통하여" 한국교육평가학회 23 (23): 641-664, 2010

      4 김범구 ; 조아미, "잠재계층분석(LCA)을 이용한 학업중단 청소년의 유형과 특성" 한국청소년정책연구원 24 (24): 5-31, 2013

      5 조춘범 ; 이현, "잠재계층분석(LCA)을 이용한 청소년 사이버불링 피해자 유형과 특성" (사)한국청소년문화연구소 (61) : 125-148, 2020

      6 홍명기, "사회학습이론을 적용한 대학생의 사이버불링에대한 연구: 현실친구와가상친구의 영향력에 대한 비교" 경기대학교 대학원 2018

      7 오세연 ; 곽영길, "사이버 불링을 통한 학교폭력의 실태와 대응방안에 관한 연구" 한국치안행정학회 10 (10): 65-88, 2013

      8 Kowalski, R. M, "Youth Internet Survey" Clemson University 2006

      9 Ybarra, M. L, "Youth Engaging in Online Harassment:Associations with Caregiver-child Relationships, Internet Use, and Personal Characteristics" 27 (27): 319-336, 2004

      10 Van Wilsem, J, "Worlds Tied Together? Online and Non-domestic Routine Activities and Their Impact on Digital and Traditional Threat Victimization" 8 (8): 115-127, 2011

      1 오인수, "초등학생 온라인 괴롭힘의 실태 및 오프라인 괴롭힘과의 비교분석" 교육연구소 12 (12): 75-98, 2011

      2 남상인 ; 권남희, "청소년 사이버 불링 가해에 영향을 미치는 변인 연구" 미래를 여는 청소년학회 10 (10): 23-43, 2013

      3 신택수, "종단프로파일분석과 군집분석을 이용한 잠재집단연구: 성장혼합모형과 비교를 통하여" 한국교육평가학회 23 (23): 641-664, 2010

      4 김범구 ; 조아미, "잠재계층분석(LCA)을 이용한 학업중단 청소년의 유형과 특성" 한국청소년정책연구원 24 (24): 5-31, 2013

      5 조춘범 ; 이현, "잠재계층분석(LCA)을 이용한 청소년 사이버불링 피해자 유형과 특성" (사)한국청소년문화연구소 (61) : 125-148, 2020

      6 홍명기, "사회학습이론을 적용한 대학생의 사이버불링에대한 연구: 현실친구와가상친구의 영향력에 대한 비교" 경기대학교 대학원 2018

      7 오세연 ; 곽영길, "사이버 불링을 통한 학교폭력의 실태와 대응방안에 관한 연구" 한국치안행정학회 10 (10): 65-88, 2013

      8 Kowalski, R. M, "Youth Internet Survey" Clemson University 2006

      9 Ybarra, M. L, "Youth Engaging in Online Harassment:Associations with Caregiver-child Relationships, Internet Use, and Personal Characteristics" 27 (27): 319-336, 2004

      10 Van Wilsem, J, "Worlds Tied Together? Online and Non-domestic Routine Activities and Their Impact on Digital and Traditional Threat Victimization" 8 (8): 115-127, 2011

      11 Hindelang, M. J, "Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization" Ballinger 1978

      12 Fisher, B. S, "Unsafe in the Ivory Tower: The Sexual Victimization of College Women" Sage Publications 2009

      13 Henson, B, "The Wiley Handbook on the Psychology of Violence" 555-570, 2016

      14 Hasking, P. A, "The Three Latent Classes of Adolescent Delinquency and the Risk Factors for Membership in each Class" 37 (37): 19-35, 2011

      15 Khoury-Kassabri, M, "The Relationship between StaffMaltreatment of Students and Students’ Violent Behavior" 33 : 914-923, 2009

      16 Aizenkot, D, "The Predictability of Routine Activity Theory for Cyberbullying Victimization among Children and Youth:Risk and Protective Factors" 36 (36): NP8498-NP8519, 2021

      17 Kaminski, R. J, "The Impacts of the Virginia Tech and Northern Illinois University Shootings on Fear of Crime on Campus" 38 (38): 88-98, 2010

      18 Cohen, L. E, "Social Change and Crime Rate Trends: A Routine Activity Approach" 588-608, 1979

      19 Mishna, F, "Risk Factors for Involvement in Cyber Bullying: Victims, Bullies and Bully-victims" 34 : 63-70, 2012

      20 Tseloni, A, "Repeat Personal Victimization. “Boosts” or “flags”?" 43 (43): 196-212, 2003

      21 Long, J. S, "Regression Models for Categorical Dependent Variables Using Stata (Vol. 7)" Stata Press 2006

      22 Bossler, A. M, "Predicting Online Harassment Victimization among a Juvenile Population" 44 (44): 500-523, 2012

      23 Reyns, B. W, "Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory Beyond Direct-contact Offenses" 50 (50): 216-238, 2013

      24 Mishna, F, "Ongoing and Online: Children and Youth’s Perceptions of Cyber Bullying" 31 (31): 1222-1228, 2009

      25 "National Crime Prevention Council"

      26 Higgins, G. E, "Low Self-control and Social Learning in Understanding Students'Intentions to Pirate Movies in the United States" 25 (25): 339-357, 2007

      27 Garrett, E. S, "Latent Class Model Diagnosis" 56 (56): 1055-1067, 2000

      28 Marcum, C. D, "Juveniles and Cyber Stalking in the United States: An Analysis of Theoretical Predictors of Patterns of Online Perpetration" 8 (8): 2014

      29 Raskauskas, J, "Involvement in Traditional and Electronic Bullying among Adolescents" 43 (43): 564-575, 2007

      30 Navarro, J. N, "Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences" 32 (32): 81-94, 2012

      31 Juvonen, J, "Extending the School Grounds?: Bullying Experiences in Cyberspace" 78 (78): 496-506, 2008

      32 Akdemir, N, "Exploring the Human Factor in Cyberenabled and Cyber-dependent Crime Victimisation: A Lifestyle Routine Activities approach" Internet Research 2020

      33 Li, C. K, "Examining the Mediating Effects of Social Learning on the Low Self-control—Cyberbullying Relationship in a Youth Sample" 37 (37): 126-138, 2016

      34 Holt, T. J, "Examining the Applicability of Lifestyleroutine Activities Theory for Cybercrime Victimization" 30 (30): 1-25, 2008

      35 Kowalski, R. M, "Electronic Bullying among Middle School Students" 41 (41): S22-S30, 2007

      36 Jang, H, "Does the Offline Bully-victimization Influence Cyberbullying Behavior among Youths? Application of General Strain Theory" 31 : 85-93, 2014

      37 Wolak, J, "Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-only Contacts" 41 : 51-58, 2007

      38 Zhang, L, "Deviant Lifestyle and Crime Victimization" 29 (29): 133-143, 2001

      39 Li, X, "Cybersecurity as a Relative Concept" 18 : 11-24, 2006

      40 Ngo, F. T, "Cybercrime Victimization: An Examination of Individual and Situational Level Factors" 5 (5): 773-, 2011

      41 Smith, P. K, "Cyberbullying: Its Nature and Impact in Secondary School Pupils" 49 (49): 376-385, 2008

      42 Kowalski, R. M, "Cyberbullying: Bullying in the Digital Age" John Wiley & Sons 2012

      43 Hinduja, S, "Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization" 29 (29): 129-156, 2008

      44 Routledge. Faucher, C, "Cyberbullying among University Students: Gendered Experiences, Impacts, and Perspectives" 2014

      45 Whittaker, E, "Cyberbullying Via Social Media" 14 (14): 11-29, 2015

      46 Wang, J, "Cyber and Traditional Bullying:Differential Association with Depression" 48 (48): 415-417, 2011

      47 National Information Society Agency, "Cyber Violence Survey" 2020

      48 Akers, R. L, "Criminological Theories:Introduction, Evaluation and Application" Oxford University Press 2017

      49 Cornish, D. B, "Crime Opportunity Theories" 197-211, 2017

      50 Pellegrini, A. D, "Bullies and Victims in School: A Review and Call for Research" 19 : 165-176, 1998

      51 Reyns, B. W, "Being Pursued Online: Applying Cyberlifestyle‐Routine Activities Theory to Cyberstalking Victimization" 38 : 1149-1169, 2011

      52 Kritsotakis, G, "Associations of Bullying and Cyberbullying with Substance Use and Sexual Risk Taking in Young Adults" 49 (49): 360-370, 2017

      53 Bauman, S, "Associations among Bullying, Cyberbullying, and Suicide in High School Students" 36 (36): 341-350, 2013

      54 Sengupta, A, "Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data" 33 : 284-290, 2011

      55 Singer, J, "Applied Longitudinal Data Analysis" Oxford University Press 2003

      56 Akaike, H, "A New Look at the Statistical Model Identification" 19 (19): 716-723, 1974

      57 Kokkinos, C. M, "A Lifestyle Exposure Perspective of Victimization through Facebook among University Students. Do Individual Differences Matter?" 74 : 235-245, 2017

      58 Dayhoff, M, "22 a Model of Evolutionary Change in Proteins" 5 : 345-352, 1978

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      2028 평가예정 재인증평가 신청대상 (재인증)
      2022-01-01 평가 등재학술지 유지 (재인증) KCI등재
      2019-01-01 평가 등재학술지 유지 (계속평가) KCI등재
      2016-01-01 평가 등재학술지 유지 (계속평가) KCI등재
      2012-01-01 평가 등재학술지 선정 (등재후보2차) KCI등재
      2011-01-01 평가 등재후보 1차 PASS (등재후보1차) KCI등재후보
      2009-01-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.89 0.89 0.8
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.85 0.78 0.882 0.42
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼