- Bullying, Victimization, and Aggression
- Child Development and Digital Technology
- Hate Speech and Cyberbullying Detection
- Stalking, Cyberstalking, and Harassment
- Social and Intergroup Psychology
- Death Anxiety and Social Exclusion
- Sexual Assault and Victimization Studies
- Child and Adolescent Psychosocial and Emotional Development
- Intimate Partner and Family Violence
- Workplace Violence and Bullying
- Impact of Technology on Adolescents
- Psychology of Social Influence
- Suicide and Self-Harm Studies
- COVID-19 and Mental Health
- Gun Ownership and Violence Research
- Emotions and Moral Behavior
- Grief, Bereavement, and Mental Health
- Cultural Differences and Values
- Deception detection and forensic psychology
- Attachment and Relationship Dynamics
- Communication in Education and Healthcare
- Behavioral Health and Interventions
- Youth Development and Social Support
- Job Satisfaction and Organizational Behavior
- Social Media and Politics
Clemson University
2016-2025
Florida State University
2015
Western Carolina University
1993-2004
Wake Forest University
1990
Psychologists explore the reality of cyberbulliesMillions children are affected by bullies each year. Advances in social media, email, instant messaging, and cell phones, however, have moved bullying from a schoolyard fear to constant threat. The second edition Cyberbullying offers most current information on this constantly-evolving issue outlines unique concerns challenges it raises for children, parents, educators. Authored psychologists who internationally recognized as experts field,...
Abstract Media commentators have suggested that recent school shootings were precipitated by social rejection, but no empirical research has examined this claim. Case studies conducted of 15 between 1995 and 2001 to examine the possible role rejection in violence. Acute or chronic rejection—in form ostracism, bullying, and/or romantic rejection—was present all two incidents. In addition, shooters tended be characterized one more three other risk factors—an interest firearms bombs, a...
Although traditional bullying and cyberbullying share features in common, they differ important ways. For example, is often characterized by perceived anonymity can occur any time of the day or night. Conversely, perpetrators are known to victim, most occurs at school. Yet, some researchers have suggested that involvement two types may be related. However, little research has modeled system relationships among perpetration victimization cyberbullying. The present study uses path analysis...
Existing research on workplace incivility has demonstrated an association with a host of negative outcomes, including increased burnout, turnover intentions, and physical symptoms. With the rise in Internet communication over last decade, interpersonal mistreatment spilled to Internet, but little is known about impact communicated via e-mail employee psychological performance outcomes. The current study presents within-subjects experiment wherein support were manipulated laboratory-based...
Two studies generated profiles of cyberbullying/cyberincivility and traditional bullying/incivility in adults, particularly within the workplace. In Study 1, 20% 3,699 participants had majority cyberbullying victimization 7.5% bullying occur adulthood, with 30% saying they were bullied at work. Relationships between negative outcomes found. Because clear evidence workplace 2 addressed relationship these constructs to incivility. Workplace face-to-face incivility related among 321...
The current study examined the role of components Protection Motivation Theory Health (PMT) in predicting protective health behaviors related to COVID-19 virus. Through a snowball sampling procedure, Wave 1 424 respondents completed survey March 2020. One hundred thirteen these participants same 2 May Consistent with research on SARS, females and older individuals engaged more often than men younger individuals. After accounting for variables frequency behaviors, PMT accounted an additional...
In the digital age, where information is a cornerstone for decision-making, social media's not-so-regulated environment has intensified prevalence of fake news, with significant implications both individuals and societies. This study employs bibliometric analysis large corpus 9678 publications spanning 2013–2022 to scrutinize evolution news research, identifying leading authors, institutions, nations. Three thematic clusters emerge: Disinformation in media, COVID-19-induced infodemics,...
Two experiments were conducted to examine the moderating effects of depression and trait self-esteem on reactions social exclusion. Participants received information indicating that they had been included in or excluded from a laboratory group their inclusion exclusion was based either other members' preferences random procedure. who scored high (Experiment 1) low 2) responded more strongly (and logically) experimental manipulations than participants self-esteem. The results suggested place...
One of the most pervasive and undisputed gender stereotypes is that men are more aggressive than women. However, this stereotype has, until recently, led researchers to conclude women nonaggressive and, therefore, ignore topic female aggression as a distinct phenomenon. The basis myth, factors supporting its maintenance, theories examined. A feminist reinterpretation views women's men's behavior within social structural arrangements create sustain differential power relations presented.
The current study was designed to extend the interpersonal deviance literature into online domain by examining incidence and impact of supervisor cyber incivility neuroticism on employee outcomes at work. Conservation Resources (COR) theory used as guiding framework because is thought deplete energetic resources in much same way that other stressors do, ultimately leading negative like burnout. Results indicate positively related burnout, absenteeism, turnover intentions. Support also found...
Cyberbullying can have a deep and long lasting impact on its victims, who are often adolescents. Accurately detecting cyberbullying helps prevent it. However, the noise errors in social media posts messages make very challenging. In this paper, we propose novel pronunciation based convolutional neural network (PCNN) to address challenge. Upon observing that of misspelled words informal online conversations is unchanged, used phoneme codes text as features for network. This procedure corrects...
The explosive growth and online media usage have transformed the communication landscape globally. Social platforms become a thriving ground for exploitation Cyberbullying, high priority challenge in many countries (Gottschalk, 2022). Our study aims to provide bibliometric overview of Cyberbullying research between 2010 2021, including new analysis through lens sustainable development impact COVID-19. We introduce altmetrics assess social attention publications. Analysis 7045 publications,...
The Sexual Experiences Survey [SES] is considered the gold standard measure of non-consensual sexual experiences. This article introduces a new victimization version [SES-V] developed by multidisciplinary collaboration, first revision since 2007. 2024 SES-V designed to construct exploitation 14th birthday. Notable revisions are adoption freely given permission for non-consent, introduction tactics and acts, including made perform or penetrate another person's body, tactics-first wording...
Teasing is an interpersonal behavior that some people perceive to be fun and a matter of joking around other view as cruel means hurting someone’s feelings. These perspectives might reflect the views perpetrators victims, respectively. To examine this, 72 male female participants wrote two narratives, one in which they described incident when were teased another event where perpetrated teasing. Victims formed very different impressions teasing event. Perpetrators perceived more humorous less...