Cyberbullying is an important issue which prevails among children and adolescents. The present study aimed to investigate the association between network anonymity and cyberbullying behavior and examine the mediating role of network morality and the moderating role of self-control in the linkage of network anonymity and cyberbullying behavior. A total of 620 participants were recruited from three high schools in southeast China and were required to complete a questionnaire measuring network anonymity, cyberbullying behavior, network morality, and self-control. A moderated mediation model was conducted by using PROCESS Macro for SPSS 3.5. The results showed that network anonymity was negatively associated with cyberbullying behavior among Chinese adolescents. Network morality mediated the association and self-control moderated the indirect association between network anonymity and cyberbullying behavior via network morality. These findings indicate that improving the network morality and self-control of adolescents with the joint efforts of individuals, families, government, and society as a whole may be an effective intervention strategy for cyberbullying behavior under the framework of digital citizens.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8775673PMC
http://dx.doi.org/10.3390/ijerph19020637DOI Listing

Publication Analysis

Top Keywords

network anonymity
24
cyberbullying behavior
24
anonymity cyberbullying
20
network morality
20
network
11
cyberbullying
8
chinese adolescents
8
moderated mediation
8
mediation model
8
association network
8

Similar Publications

Expert perspectives on tuberculosis screening procedures for migrants.

J Bras Pneumol

January 2025

. EPIUnit ITR, Instituto de Saúde Pública da Universidade do Porto, Universidade do Porto, Porto, Portugal.

Objective: To evaluate the perspectives of tuberculosis experts from different countries regarding national screening procedures.

Methods: This was a qualitative descriptive study. Data were collected by using electronic, anonymized surveys with experts in tuberculosis in seven different countries within two World Health Organization regions (Europe and Africa).

View Article and Find Full Text PDF

Temporal lobe epilepsy with isolated amygdala enlargement: anatomo-electro-clinical features and long-term outcome.

J Neurol

January 2025

Epilepsy Unit - Sleep Disorders Unit, Fondazione IRCCS Istituto Neurologico Carlo Besta, Milan, Italy.

Background: Temporal lobe epilepsy with isolated amygdala enlargement (TLE-AE) still lacks a definite characterization and controversies exist.

Methods: We conducted a retrospective study identifying brain MRI scans with isolated AE between 2015 and 2021. We collected clinical and paraclinical data of patients with TLE-AE and evaluated the outcome.

View Article and Find Full Text PDF

Introduction: Perceived social support is a psychological construct that is used to describe the 'perception of adequacy' of the support being provided by a person's social network. Higher perceived social support has been linked to multiple benefits across numerous studies over the past several decades and among multiple populations. The Multidimensional Scale of Perceived Social Support (MSPSS) is a 12-item scale to assess the construct of perceived social support.

View Article and Find Full Text PDF

Assessment of using transfer learning with different classifiers in hypodontia diagnosis.

BMC Oral Health

January 2025

Pediatric Dentistry Department, Faculty of Dentistry, Başkent University, 06490, Ankara, Turkey.

Background: Hypodontia is the absence of one or more teeth in the primary or permanent dentition during development, and radiographic imaging is the most common method of diagnosis. However, in recent years, artificial intelligence-based decision support systems have been employed to make highly accurate diagnoses. The aim of this study was to classify single premolar agenesis, multiple premolar agenesis, and without tooth agenesis using various artificial intelligence approaches.

View Article and Find Full Text PDF

The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!