Severity: Warning
Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1034
Function: getPubMedXML
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3152
Function: GetPubMedArticleOutput_2016
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
Weight-based cyberbullying is prevalent among youth and adolescents and can have lasting negative psychological effects on the victims. One way to combat these negative effects is through modeling dissenting behavior. When a bystander challenges the bully or supports the victim, this models dissenting behavior. In this study, 181 participants were exposed to message manipulations posted on a Facebook page aimed at testing the conformity effect, the dissenter effect, and the bystander effect in response to enactment of weight-based bullying. Facebook is a common social media site where cyberbullying is reported. Results indicate that in the dissenting condition, participants' comments were significantly more positive or supporting for the victim, as compared to other conditions. This effect was more pronounced for men than for women. In addition, in the dissenting condition, men were less likely to consider the victim unhealthy than women and men in other conditions. These results support the effectiveness of efforts to model dissenting behavior in the face of bullies and extend them to online contexts. Implications are discussed.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1089/cyber.2013.0370 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!