Research Article
BibTex RIS Cite
Year 2025, Volume: 33 Issue: 1, 108 - 123, 28.01.2025
https://doi.org/10.24106/kefdergi.1628420

Abstract

References

  • Akbiyik, C., & Kestel, M. (2016). Investigation of the impact of cyberbullying on students' academic, social, and emotional states. Mersin University Journal of the Faculty of Education, 12, 844-844. https://doi.org/10.17860/mersinefd.282384
  • Ahuja, V. & Alavi, S. (2017). Cyber psychology and cyber behaviour of adolescents-the need of the contemporary era. Procedia Computer Science. 122. 671-676. 10.1016/j.procs.2017.11.422.
  • Akcan, G., Öztürk, E., & Şarlak, D. (2020). Cyber addictions and psychological dynamics. In E. Öztürk (Ed.), Cyber Psychology (1st ed., pp. 33-40). Ankara: Türkiye Klinikleri.
  • Ayas, T., & Horzum, M. B. (2012). On Being Cyber Bully and Victim among Primary School Students. Ilkogretim Online, 11(2).
  • Baek, J., & Bullock, L. M. (2014). Cyberbullying: A cross cultural perspective. Emotional and Behavorial Difficulties, 19(2), 226-238. doi:10.1080/136327522013.849028.
  • Beran T. & Li Q. (2005). Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research, 32(3), 265–277.
  • Brighi, A., Ortega, R., Pyzalski, J., Scheithauer, H., Smith, P. K., Tsormpatzoudis, H., et al. (2012). European cyberbullying intervention project questionnaire – ECIPQ [Unpublished questionnaire]. Retrieved from bullyingandcyber.net.
  • British Psychological Society. (2019). Understanding and Facilitating the Psychological Impact of Digital Technologies. British Psychological Society.
  • Bryman, A. (2016). Social research methods (5th ed.). Oxford University Press.
  • Büyüköztürk, Ş., Çakmak, K. E., Akgün, E. Ö., Karadeniz, Ş. & Demirel, F. (2010). Bilimsel araştırma yöntemleri. Ankara: Pegem
  • Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches (3rd ed.). SAGE Publications.
  • Dudek, Debra & Johnson, Nicola. (2011). Return of the Hacker as Hero: Fictions and Realities of Teenage Technological Experts. Children's Literature in Education. 42. 184-195. 10.1007/s10583-011-9137-0.
  • Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). SAGE Publications.
  • Dukes, S. (1984). Phenomenological methodology in the human sciences. Journal of Religion and Health, 23(3), 197-203.
  • Edwards, L., Kontostathis, A. E. & Fisher, C. (2016). Cyberbullying, race/ethnicity and mental health outcomes: A review of the literature. Media and Communication, 4(3), 71-78.
  • Erbiçer, E. S. (2020). Investigation of Cyberbullying and Cyber Victimization in Relation to Social Cohesion and Some Demographic Variables. Pamukkale University Journal of Education, 49, 190-222. https://doi.org/10.9779/pauefd.559831
  • Finlay, L. (2014). Engaging phenomenological analysis. Qualitative Research in Psychology, 11(2), 121-141.
  • Floros G.D, Siomos K.E, Fisoun V, Dafouli E. and Geroukalis D.(2013). Adolescent online cyberbullying in Greece: The impact of parental online security practices, bonding, and online impulsiveness. J Sch Health. 83(6):445-53. doi: 10.1111/josh.12049. PMID: 23586890.
  • Franke, U. & Brynielsson, J. (2014). Cyber situational awareness - A systematic review of the literature. Computers & Security. 46. 10.1016/j.cose.2014.06.008.
  • Frechette, J., Bitzas, V., Aubry, M., Kilpatrick, K., & Lavoie-Tremblay, M. (2020). Capturing Lived Experience: Methodological Considerations for Interpretive Phenomenological Inquiry. International Journal of Qualitative Methods, 19. https://doi.org/10.1177/1609406920907254
  • Groenewald, T. (2004). A phenomenological research design ıllustrated. International Journal Of Qualitative Methods, 3(1), 42-55.
  • Husserl, E. (1931). Ideas: General Introduction to Pure Phenomenology (W. R. Boyce Gibson, Trans.). George Allen & Unwin. (Original work published 1913)
  • International Telecommunication Union, (ITU). (2018). Global Cybersecurity Index 2018. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf
  • Juvonen, J., & Gross, E. F. (2008). Extending the School Grounds? Bullying Experiences in Cyberspace. Journal of School Health, 78(9), 496-505. doi: 10.1111/j.1746-1561.2008.00335.x. PMID: 18786042.
  • Kirwan, G. (2010a). Cyberpsychology: an overview of emerging research in emerging environment. Ir J Psychol, 1(2), 69–84. https://doi.org/10.1080/03033910.2010.10446324
  • Kirwan, G. (2010b). Cyberpsychology. The Irish Journal of Psychology, 31(1-2), 69–84.
  • Kowalski, R.M., Limber, S.P., & Agatston, P.W. (2012). Cyberbullying: Bullying in the digital age. West Sussex: John Wiley & Sons.
  • Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. SAGE Publications.
  • Machimbarrena, J. M., Calvete, E., Fernández-González, L., Álvarez-Bardón, A., Álvarez-Fernández, L., & González-Cabrera, J. (2018). Internet risks: An overview of victimization in cyberbullying, cyber dating abuse, sexting, online grooming, and problematic internet use. International Journal of Environmental Research and Public Health, 15(11), 2471. https://doi.org/10.3390/ijerph15112471.
  • Mason K. L. (2008). Cyberbullying: A preliminary assessment for school personnel. Psychology in the Schools, 45(4), 323–348.
  • Merriam, S. B. (2009). Qualitative research: A guide to design and implementation (2nd ed.). Jossey-Bass.
  • Miles, M., & Huberman, A. (2014). Qualitative Data Analysis (2nd ed.). London: Sage.
  • Ministry of National Education (MEB). (2024). Technology and Education from the Perspective of Teachers on the 100th Anniversary of the Republic: Regional Workshop Report. MEB Publications. Retrieved from https://ttkbyayin.meb.gov.tr/yayin/199
  • Ministry of Transport and Infrastructure. (2020). National Cybersecurity Strategy and Action Plan, 2020-2023. Retrieved from https://cbddo.gov.tr/siber-guvenlik-stratejisi/
  • Moore, T. (2010). The Economics of Cybersecurity: Principles and Policy Options. International Journal of Critical Infrastructure Protection. 3. 103-117. 10.1016/j.ijcip.2010.10.002.
  • Moustakas, C. (1994). Phenomenological research methods. SAGE Publications, Inc., https://doi.org/10.4135/9781412995658
  • Muniandy, L., Muniandy, B. & Samsudin, Z. (2017). Cyber Security Behaviour among Higher Education Students in Malaysia. Journal of Information Assurance & Cybersecurity. 1-13. 10.5171/2017.800299.
  • Oriol, X., Varela, J., & Miranda, R. (2021). Gratitude as a Protective Factor for Cyberbullying Victims: Conditional Effects on School and Life Satisfaction. International Journal of Environmental Research and Public Health, 18(5). https://doi.org/10.3390/ijerph18052666
  • Öztürk, E., Ateş, A., & Erdoğan, B. (2020). Legal aspects and psychological dynamics of cyber crimes. In E. Öztürk (Ed.), Cyber Psychology (1st ed., pp. 48-55). Ankara: Türkiye Klinikleri.
  • atchın J. W. & Hınduja S. (2015). Measuring cyberbullying: Implications forresearch. Aggression and Violent Behavior, 23, 69-74.
  • Patton, M. Q. (2002). Qualitative research and evaluation methods (3rd ed.). SAGE Publications.
  • Polkinghorne, D. E. (1989). Phenomenological research methods. In R. S. Valle & S. Halling (Eds.), Existential-phenomenological perspectives in psychology (pp. 41-60). Springer.
  • Rahman, N. A., Sairi, I. H., Zizi, N. A., & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology, 10(5), 378–382. https://doi.org/10.18178/ijiet.2020.10.5.1393
  • Reips, U.-D. (2002). Standards for Internet-based experimenting. Experimental Psychology, 49(4), 243-256.
  • Rigby, K. (2003). Consequences of bullying in schools. The Canadian Journal of Psychiatry, 48, 583-590.
  • Saldana, J. (2016). The coding manual for qualitative researchers (3rd ed.). SAGE Publications.
  • Saltik, R. (2021). The memory of happiness in the age of cyberpsychology: The transformation of experienced happiness on social media (Unpublished doctoral dissertation). Marmara University, Institute of Social Sciences, Istanbul.
  • Schneier, Bruce. (2010). Schneier on Security: Privacy and Control. Journal of Privacy and Confidentiality. 2. 10.29012/jpc.v2i1.579.
  • Seidman, I. (2019). Interviewing as qualitative research: A guide for researchers in education and the social sciences (5th ed.). Teachers College Press.
  • Singh, A. (2019). The Internet of Things (IoT) and Cyber Security. Available at SSRN: https://ssrn.com/abstract=3399641 or http://dx.doi.org/10.2139/ssrn.3399641
  • Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying?. Scandinavian Journal Of Psychology, 49(2), 147-154.
  • Smith, J. A., & Shinebourne, P. (2012). Interpretative phenomenological analysis. In H. Cooper (Ed.), APA handbook of research methods in psychology, Vol 2: Research designs (pp. 73-82). American Psychological Association.
  • Şahin, M. (2012). The relationship between the cyberbullying/cybervictmization and loneliness among adolescents. Children and Youth Services Review, 34(4), 834-837. The British Psychological Society, (2019). Cyberpsychology section. https://www.bps.org.uk/member-networks/cyberpsychology-section
  • UNESCO. (2021, October). Tackling cyberbullying and other forms of online violence involving children and young people. https://unesdoc.unesco.org/ark:/48223/pf0000379486
  • UNICEF (2019). Safer Internet Day: UNICEF calls for concerted action to prevent bullying and harassment for the over 70 per cent of young people online worldwide. https://www.unicef.org/pacificislands/press-releases/safer-internet-day-unicef-calls-concerted-action-prevent-bullying-and-harassment
  • Taştekin, E., & Bayhan, P. (2018). Examining Cyberbullying and Victimization Among Adolescents. Online Journal of Technology Addiction and Cyberbullying, 5(2), 21-45.
  • Tracy, S. J. (2010). Qualitative quality: Eight “big-tent” criteria for excellent qualitative research. Qualitative Inquiry, 16(10), 837-851.
  • Turkish Statistical Institute. (2023). Survey on Information and Communication Technology (ICT) Usage in Households and by Individuals. https://data.tuik.gov.tr/Bulten/Index?p=Survey-on-Information-and-Communication-Technology-(ICT)-Usage-in-Households-and-by-Individuals-2023-49407&dil=2
  • Turkish Statistical Institute. (2024). Survey on Information and Communication Technology (ICT) Usage in Households and by Individuals, 2024.https://data.tuik.gov.tr/Bulten/Index?p=Hanehalki-Bilisim-Teknolojileri-(BT)-Kullanim-Arastirmasi-2024-5342#:~:text20g%C3%B6zlendi
  • Voiskounsky, A. (2021). Teaching cyberpsychology: Today and tomorrow. IMS 2021-International Conference "Internet and Modern Society", June 24-26, 2021, St. Petersburg, Russia.
  • Whitty, M. T., & Young, G. (2016). Cyberpsychology: The study of individuals, society and digital technologies. John Wiley & Sons.
  • Wolfsberg, J. (2006). Student Safety from Cyberbullies, in Chat Rooms, and in Instant Messaging. Education Digest: Essential Readings Condensed for Quick Review. 72.
  • Ybarra M. L. & Mıtchell K. J. (2004). Youth engaging in online harassment: associations with caregiver–child relationships, Internet use, and personal characteristics. Journal of Adolescence, 27(3), 319–336.
  • Van Manen, M. (2016). Researching lived experience: Human science for an action sensitive pedagogy (2nd ed.). Routledge.
  • Yıldırım, A., & Şimşek, H. (2021). Qualitative Research Methods in the Social Sciences (12th ed.). Seçkin Publishing.

Cyber Psychology from Educational Administration Perspective: Teachers and School Administrators’ Qualitative Insights

Year 2025, Volume: 33 Issue: 1, 108 - 123, 28.01.2025
https://doi.org/10.24106/kefdergi.1628420

Abstract

Purpose: This study aims to cultivate awareness of the phenomena of bullying and security within the framework of cyber psychology. In line with this primary objective, the experiences and awareness levels of participating school administrators and teachers were examined.
Method: A descriptive phenomenological design, supported by a large sample, was employed to explore the semantic spectrum of cyber security and cyber bullying concepts. The study group consisted of 192 teachers and 64 school administrators, selected through purposeful sampling, specifically convenience sampling. A semi-structured online interview form served as the data collection tool. Content analysis was conducted with the goal of conceptualizing the data and identifying themes that describe the phenomenon. The findings are presented through descriptive narratives.
Findings: The findings reveal the significant emotional distress and security concerns negatively influenced by cyber psychology. Additionally, it has been found that cyberbullying and security issues lead to serious consequences for individuals, such as loss of self-confidence, social isolation, persistent anxiety, and long-term psychological trauma.The data reveal that females are the gender most frequently subjected to cyber bullying, with the most vulnerable age group being 14-18, followed by the 11-14 age range. The identified sub-themes of cyber bullying include fraud, hacking, violation of privacy, verbal abuse, blackmail, threatening and psychological violence.
Highlights: By examining the experiences of participants across a large sample, the study broadens the understanding of cyber bullying and security concepts. The detailed analysis of sub-themes provides both theoretical insights and practical recommendations for policymakers and practitioners. The study serves as an important reference to enhance awareness among teachers and school administrators who are the closest to children and youth in school and to develop measures that address the increasing challenges of internet use in education.

Ethical Statement

Ethics Committee approval of Gazi University Ethics Committee Commission dated 13.11.2023 and numbered E-77082166-604.01.02-797715 for the research proposal.

References

  • Akbiyik, C., & Kestel, M. (2016). Investigation of the impact of cyberbullying on students' academic, social, and emotional states. Mersin University Journal of the Faculty of Education, 12, 844-844. https://doi.org/10.17860/mersinefd.282384
  • Ahuja, V. & Alavi, S. (2017). Cyber psychology and cyber behaviour of adolescents-the need of the contemporary era. Procedia Computer Science. 122. 671-676. 10.1016/j.procs.2017.11.422.
  • Akcan, G., Öztürk, E., & Şarlak, D. (2020). Cyber addictions and psychological dynamics. In E. Öztürk (Ed.), Cyber Psychology (1st ed., pp. 33-40). Ankara: Türkiye Klinikleri.
  • Ayas, T., & Horzum, M. B. (2012). On Being Cyber Bully and Victim among Primary School Students. Ilkogretim Online, 11(2).
  • Baek, J., & Bullock, L. M. (2014). Cyberbullying: A cross cultural perspective. Emotional and Behavorial Difficulties, 19(2), 226-238. doi:10.1080/136327522013.849028.
  • Beran T. & Li Q. (2005). Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research, 32(3), 265–277.
  • Brighi, A., Ortega, R., Pyzalski, J., Scheithauer, H., Smith, P. K., Tsormpatzoudis, H., et al. (2012). European cyberbullying intervention project questionnaire – ECIPQ [Unpublished questionnaire]. Retrieved from bullyingandcyber.net.
  • British Psychological Society. (2019). Understanding and Facilitating the Psychological Impact of Digital Technologies. British Psychological Society.
  • Bryman, A. (2016). Social research methods (5th ed.). Oxford University Press.
  • Büyüköztürk, Ş., Çakmak, K. E., Akgün, E. Ö., Karadeniz, Ş. & Demirel, F. (2010). Bilimsel araştırma yöntemleri. Ankara: Pegem
  • Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches (3rd ed.). SAGE Publications.
  • Dudek, Debra & Johnson, Nicola. (2011). Return of the Hacker as Hero: Fictions and Realities of Teenage Technological Experts. Children's Literature in Education. 42. 184-195. 10.1007/s10583-011-9137-0.
  • Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). SAGE Publications.
  • Dukes, S. (1984). Phenomenological methodology in the human sciences. Journal of Religion and Health, 23(3), 197-203.
  • Edwards, L., Kontostathis, A. E. & Fisher, C. (2016). Cyberbullying, race/ethnicity and mental health outcomes: A review of the literature. Media and Communication, 4(3), 71-78.
  • Erbiçer, E. S. (2020). Investigation of Cyberbullying and Cyber Victimization in Relation to Social Cohesion and Some Demographic Variables. Pamukkale University Journal of Education, 49, 190-222. https://doi.org/10.9779/pauefd.559831
  • Finlay, L. (2014). Engaging phenomenological analysis. Qualitative Research in Psychology, 11(2), 121-141.
  • Floros G.D, Siomos K.E, Fisoun V, Dafouli E. and Geroukalis D.(2013). Adolescent online cyberbullying in Greece: The impact of parental online security practices, bonding, and online impulsiveness. J Sch Health. 83(6):445-53. doi: 10.1111/josh.12049. PMID: 23586890.
  • Franke, U. & Brynielsson, J. (2014). Cyber situational awareness - A systematic review of the literature. Computers & Security. 46. 10.1016/j.cose.2014.06.008.
  • Frechette, J., Bitzas, V., Aubry, M., Kilpatrick, K., & Lavoie-Tremblay, M. (2020). Capturing Lived Experience: Methodological Considerations for Interpretive Phenomenological Inquiry. International Journal of Qualitative Methods, 19. https://doi.org/10.1177/1609406920907254
  • Groenewald, T. (2004). A phenomenological research design ıllustrated. International Journal Of Qualitative Methods, 3(1), 42-55.
  • Husserl, E. (1931). Ideas: General Introduction to Pure Phenomenology (W. R. Boyce Gibson, Trans.). George Allen & Unwin. (Original work published 1913)
  • International Telecommunication Union, (ITU). (2018). Global Cybersecurity Index 2018. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf
  • Juvonen, J., & Gross, E. F. (2008). Extending the School Grounds? Bullying Experiences in Cyberspace. Journal of School Health, 78(9), 496-505. doi: 10.1111/j.1746-1561.2008.00335.x. PMID: 18786042.
  • Kirwan, G. (2010a). Cyberpsychology: an overview of emerging research in emerging environment. Ir J Psychol, 1(2), 69–84. https://doi.org/10.1080/03033910.2010.10446324
  • Kirwan, G. (2010b). Cyberpsychology. The Irish Journal of Psychology, 31(1-2), 69–84.
  • Kowalski, R.M., Limber, S.P., & Agatston, P.W. (2012). Cyberbullying: Bullying in the digital age. West Sussex: John Wiley & Sons.
  • Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. SAGE Publications.
  • Machimbarrena, J. M., Calvete, E., Fernández-González, L., Álvarez-Bardón, A., Álvarez-Fernández, L., & González-Cabrera, J. (2018). Internet risks: An overview of victimization in cyberbullying, cyber dating abuse, sexting, online grooming, and problematic internet use. International Journal of Environmental Research and Public Health, 15(11), 2471. https://doi.org/10.3390/ijerph15112471.
  • Mason K. L. (2008). Cyberbullying: A preliminary assessment for school personnel. Psychology in the Schools, 45(4), 323–348.
  • Merriam, S. B. (2009). Qualitative research: A guide to design and implementation (2nd ed.). Jossey-Bass.
  • Miles, M., & Huberman, A. (2014). Qualitative Data Analysis (2nd ed.). London: Sage.
  • Ministry of National Education (MEB). (2024). Technology and Education from the Perspective of Teachers on the 100th Anniversary of the Republic: Regional Workshop Report. MEB Publications. Retrieved from https://ttkbyayin.meb.gov.tr/yayin/199
  • Ministry of Transport and Infrastructure. (2020). National Cybersecurity Strategy and Action Plan, 2020-2023. Retrieved from https://cbddo.gov.tr/siber-guvenlik-stratejisi/
  • Moore, T. (2010). The Economics of Cybersecurity: Principles and Policy Options. International Journal of Critical Infrastructure Protection. 3. 103-117. 10.1016/j.ijcip.2010.10.002.
  • Moustakas, C. (1994). Phenomenological research methods. SAGE Publications, Inc., https://doi.org/10.4135/9781412995658
  • Muniandy, L., Muniandy, B. & Samsudin, Z. (2017). Cyber Security Behaviour among Higher Education Students in Malaysia. Journal of Information Assurance & Cybersecurity. 1-13. 10.5171/2017.800299.
  • Oriol, X., Varela, J., & Miranda, R. (2021). Gratitude as a Protective Factor for Cyberbullying Victims: Conditional Effects on School and Life Satisfaction. International Journal of Environmental Research and Public Health, 18(5). https://doi.org/10.3390/ijerph18052666
  • Öztürk, E., Ateş, A., & Erdoğan, B. (2020). Legal aspects and psychological dynamics of cyber crimes. In E. Öztürk (Ed.), Cyber Psychology (1st ed., pp. 48-55). Ankara: Türkiye Klinikleri.
  • atchın J. W. & Hınduja S. (2015). Measuring cyberbullying: Implications forresearch. Aggression and Violent Behavior, 23, 69-74.
  • Patton, M. Q. (2002). Qualitative research and evaluation methods (3rd ed.). SAGE Publications.
  • Polkinghorne, D. E. (1989). Phenomenological research methods. In R. S. Valle & S. Halling (Eds.), Existential-phenomenological perspectives in psychology (pp. 41-60). Springer.
  • Rahman, N. A., Sairi, I. H., Zizi, N. A., & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology, 10(5), 378–382. https://doi.org/10.18178/ijiet.2020.10.5.1393
  • Reips, U.-D. (2002). Standards for Internet-based experimenting. Experimental Psychology, 49(4), 243-256.
  • Rigby, K. (2003). Consequences of bullying in schools. The Canadian Journal of Psychiatry, 48, 583-590.
  • Saldana, J. (2016). The coding manual for qualitative researchers (3rd ed.). SAGE Publications.
  • Saltik, R. (2021). The memory of happiness in the age of cyberpsychology: The transformation of experienced happiness on social media (Unpublished doctoral dissertation). Marmara University, Institute of Social Sciences, Istanbul.
  • Schneier, Bruce. (2010). Schneier on Security: Privacy and Control. Journal of Privacy and Confidentiality. 2. 10.29012/jpc.v2i1.579.
  • Seidman, I. (2019). Interviewing as qualitative research: A guide for researchers in education and the social sciences (5th ed.). Teachers College Press.
  • Singh, A. (2019). The Internet of Things (IoT) and Cyber Security. Available at SSRN: https://ssrn.com/abstract=3399641 or http://dx.doi.org/10.2139/ssrn.3399641
  • Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying?. Scandinavian Journal Of Psychology, 49(2), 147-154.
  • Smith, J. A., & Shinebourne, P. (2012). Interpretative phenomenological analysis. In H. Cooper (Ed.), APA handbook of research methods in psychology, Vol 2: Research designs (pp. 73-82). American Psychological Association.
  • Şahin, M. (2012). The relationship between the cyberbullying/cybervictmization and loneliness among adolescents. Children and Youth Services Review, 34(4), 834-837. The British Psychological Society, (2019). Cyberpsychology section. https://www.bps.org.uk/member-networks/cyberpsychology-section
  • UNESCO. (2021, October). Tackling cyberbullying and other forms of online violence involving children and young people. https://unesdoc.unesco.org/ark:/48223/pf0000379486
  • UNICEF (2019). Safer Internet Day: UNICEF calls for concerted action to prevent bullying and harassment for the over 70 per cent of young people online worldwide. https://www.unicef.org/pacificislands/press-releases/safer-internet-day-unicef-calls-concerted-action-prevent-bullying-and-harassment
  • Taştekin, E., & Bayhan, P. (2018). Examining Cyberbullying and Victimization Among Adolescents. Online Journal of Technology Addiction and Cyberbullying, 5(2), 21-45.
  • Tracy, S. J. (2010). Qualitative quality: Eight “big-tent” criteria for excellent qualitative research. Qualitative Inquiry, 16(10), 837-851.
  • Turkish Statistical Institute. (2023). Survey on Information and Communication Technology (ICT) Usage in Households and by Individuals. https://data.tuik.gov.tr/Bulten/Index?p=Survey-on-Information-and-Communication-Technology-(ICT)-Usage-in-Households-and-by-Individuals-2023-49407&dil=2
  • Turkish Statistical Institute. (2024). Survey on Information and Communication Technology (ICT) Usage in Households and by Individuals, 2024.https://data.tuik.gov.tr/Bulten/Index?p=Hanehalki-Bilisim-Teknolojileri-(BT)-Kullanim-Arastirmasi-2024-5342#:~:text20g%C3%B6zlendi
  • Voiskounsky, A. (2021). Teaching cyberpsychology: Today and tomorrow. IMS 2021-International Conference "Internet and Modern Society", June 24-26, 2021, St. Petersburg, Russia.
  • Whitty, M. T., & Young, G. (2016). Cyberpsychology: The study of individuals, society and digital technologies. John Wiley & Sons.
  • Wolfsberg, J. (2006). Student Safety from Cyberbullies, in Chat Rooms, and in Instant Messaging. Education Digest: Essential Readings Condensed for Quick Review. 72.
  • Ybarra M. L. & Mıtchell K. J. (2004). Youth engaging in online harassment: associations with caregiver–child relationships, Internet use, and personal characteristics. Journal of Adolescence, 27(3), 319–336.
  • Van Manen, M. (2016). Researching lived experience: Human science for an action sensitive pedagogy (2nd ed.). Routledge.
  • Yıldırım, A., & Şimşek, H. (2021). Qualitative Research Methods in the Social Sciences (12th ed.). Seçkin Publishing.
There are 65 citations in total.

Details

Primary Language English
Subjects Educational Administration, Supervision, Planning and Economics (Other)
Journal Section Research Article
Authors

Su Ertürk 0000-0002-9418-7632

Gülnihal Yıldırım 0000-0003-4803-056X

Temel Çalık 0000-0003-3656-6260

Publication Date January 28, 2025
Submission Date March 27, 2024
Acceptance Date January 20, 2025
Published in Issue Year 2025 Volume: 33 Issue: 1

Cite

APA Ertürk, S., Yıldırım, G., & Çalık, T. (2025). Cyber Psychology from Educational Administration Perspective: Teachers and School Administrators’ Qualitative Insights. Kastamonu Education Journal, 33(1), 108-123. https://doi.org/10.24106/kefdergi.1628420

10037