Participant Consent I have read the above information and agree to participate

Participant consent i have read the above information

This preview shows page 142 - 146 out of 154 pages.

Participant Consent: I have read the above information and agree to participate in this study. I am at least 18 years of age. A copy of this form has been given to me. Signature of Participant Date Participant Name (Please Print)
Image of page 142
132 APPENDIX IX INFORMED CONSENT TO PARTICIPATE IN AN AUDIO TAPED INTERVIEW Department of Educational Leadership TITLE OF STUDY: Cyberbullying in Schools: A Research Study on School Policies and Procedures INVESTIGATOR(S): Brian R. Wiseman CONTACT PHONE NUMBER: 702-219-7373 Audio/Video Taping: I agree to be audio taped for the purpose of this research study. Signature of Participant Date Participant Name (Please Print)
Image of page 143
133 BIBLIOGRAPHY Agatston, P. W., Kowalski, R., & Limber, S. (2007). Students‟ perspectives on cyber bullying. Journal of Adolescent Health, 41, 59-60. Anderson, T., & Sturm, B. (2007). Cyberbullying: From playground to computer. Young Adult Library Services, 24-27. Bargh, J. A., McKenna, K. Y. A., & Fitzsimons, G. M. (2002). Can you see the real me? Activation a nd expression of the “true self” on the internet. Journal of Social Issues, 58(1), 33-48. Bauman, S. (2009). Cyberbullying in a rural intermediate school: An exploratory study. The Journal of Early Adolescence, 10(10), 1-31. Beale, A.V., & Hall, K. R. (2007). Cyberbullying: What administrators (and parents) can do. The Clearing House, 81(1) , 8-12. Belsey, B. (n.d.). Retrieved December 19, 2009 from . Beran, T., & Li, Q. (2005). Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research, 32(3), 265-277. Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school bullying. Journal of Student Wellbeing, 1(2), 15-33. Bercovici, J (2010). Myspace‟s dwindling traffic looks even worse from the inside. Retrieved November 13, 2010 from - news/myspaces-dwindling-traffic-lookseven-worse-from-the-inside/19380431/. Boucek, S. G. (2009). Dealing with the nightmare of „sexting”: Given the strides in technology in the last decade, policies and procedures for dealing with such actions are most likely silent on this behavior. Education Digest, 75(3), 10-12.
Image of page 144
134 Brown, K., Jackson, M., & Cassidy, W. (2006). Cyber-bullying: Developing policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy, 57, 1-35. Brunner, J., & Lewis, D. (2008). Tattling ends but bulling continues. Principal Leadership, 8(6), 38-42. Bullen, P., & Hare, N. (2000). The internet: Its effects on safety and behavior. Implications for adolescents. Retrieved on June 13, 2009, from . Campbell, M. A. (2005). Cyberbullying: An old problem in a new guise? Australian Journal of Guidance and Counseling, 15(1), 68-76. Carlson, N (2011). Goldman to clients: Facebook has 600 million users. Retrieved January 26, 2011, from - tech_and_gadgets/ . Cassidy, W., Jackson, M., & Brown, K. N. (2009). Sticks and stones can break my bones, but how can pixels hurt me? Students‟ exp eriences with cyber-bullying. School Psychology International, 30(4), 383-402.
Image of page 145
Image of page 146

You've reached the end of your free preview.

Want to read all 154 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture