Cyberbullying is an important issue which prevails among children and adolescents. The present study aimed to investigate the association between network anonymity and cyberbullying behavior and examine the mediating role of network morality and the moderating role of self-control in the linkage of network anonymity and cyberbullying behavior. A total of 620 participants were recruited from three high schools in southeast China and were required to complete a questionnaire measuring network anonymity, cyberbullying behavior, network morality, and self-control. A moderated mediation model was conducted by using PROCESS Macro for SPSS 3.5. The results showed that network anonymity was negatively associated with cyberbullying behavior among Chinese adolescents. Network morality mediated the association and self-control moderated the indirect association between network anonymity and cyberbullying behavior via network morality. These findings indicate that improving the network morality and self-control of adolescents with the joint efforts of individuals, families, government, and society as a whole may be an effective intervention strategy for cyberbullying behavior under the framework of digital citizens.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8775673 | PMC |
http://dx.doi.org/10.3390/ijerph19020637 | DOI Listing |
J Bras Pneumol
January 2025
. EPIUnit ITR, Instituto de Saúde Pública da Universidade do Porto, Universidade do Porto, Porto, Portugal.
Objective: To evaluate the perspectives of tuberculosis experts from different countries regarding national screening procedures.
Methods: This was a qualitative descriptive study. Data were collected by using electronic, anonymized surveys with experts in tuberculosis in seven different countries within two World Health Organization regions (Europe and Africa).
J Neurol
January 2025
Epilepsy Unit - Sleep Disorders Unit, Fondazione IRCCS Istituto Neurologico Carlo Besta, Milan, Italy.
Background: Temporal lobe epilepsy with isolated amygdala enlargement (TLE-AE) still lacks a definite characterization and controversies exist.
Methods: We conducted a retrospective study identifying brain MRI scans with isolated AE between 2015 and 2021. We collected clinical and paraclinical data of patients with TLE-AE and evaluated the outcome.
Rural Remote Health
January 2025
Indiana University School of Medicine, Indianapolis, Indiana, USA.
Introduction: Perceived social support is a psychological construct that is used to describe the 'perception of adequacy' of the support being provided by a person's social network. Higher perceived social support has been linked to multiple benefits across numerous studies over the past several decades and among multiple populations. The Multidimensional Scale of Perceived Social Support (MSPSS) is a 12-item scale to assess the construct of perceived social support.
View Article and Find Full Text PDFBMC Oral Health
January 2025
Pediatric Dentistry Department, Faculty of Dentistry, Başkent University, 06490, Ankara, Turkey.
Background: Hypodontia is the absence of one or more teeth in the primary or permanent dentition during development, and radiographic imaging is the most common method of diagnosis. However, in recent years, artificial intelligence-based decision support systems have been employed to make highly accurate diagnoses. The aim of this study was to classify single premolar agenesis, multiple premolar agenesis, and without tooth agenesis using various artificial intelligence approaches.
View Article and Find Full Text PDFSensors (Basel)
January 2025
School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea.
The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!