This preview shows page 142 - 146 out of 154 pages.
Participant Consent: I have read the above information and agree to participate in this study. I am at least 18 years of age. A copy of this form has been given to me. Signature of Participant Date Participant Name (Please Print)
132APPENDIX IX INFORMED CONSENT TO PARTICIPATE IN AN AUDIO TAPED INTERVIEW Department of Educational Leadership TITLE OF STUDY: Cyberbullying in Schools: A Research Study on School Policies and Procedures INVESTIGATOR(S): Brian R. Wiseman CONTACT PHONE NUMBER: 702-219-7373Audio/Video Taping: I agree to be audio taped for the purpose of this research study. Signature of Participant Date Participant Name (Please Print)
133BIBLIOGRAPHY Agatston, P. W., Kowalski, R., & Limber, S. (2007). Students‟ perspectives on cyber bullying. Journal of Adolescent Health, 41, 59-60. Anderson, T., & Sturm, B. (2007). Cyberbullying: From playground to computer. Young Adult Library Services, 24-27. Bargh, J. A., McKenna, K. Y. A., & Fitzsimons, G. M. (2002). Can you see the real me? Activation and expression of the “true self” on the internet. Journal of Social Issues, 58(1), 33-48. Bauman, S. (2009). Cyberbullying in a rural intermediate school: An exploratory study. The Journal of Early Adolescence, 10(10), 1-31. Beale, A.V., & Hall, K. R. (2007). Cyberbullying: What administrators (and parents) can do. The Clearing House, 81(1), 8-12. Belsey, B. (n.d.). Retrieved December 19, 2009 from . Beran, T., & Li, Q. (2005). Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research, 32(3), 265-277. Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school bullying. Journal of Student Wellbeing, 1(2), 15-33. Bercovici, J (2010). Myspace‟s dwindling traffic looks even worse from the inside.Retrieved November 13, 2010 from -news/myspaces-dwindling-traffic-lookseven-worse-from-the-inside/19380431/. Boucek, S. G. (2009). Dealing with the nightmare of „sexting”: Given the strides in technology in the last decade, policies and procedures for dealing with such actions are most likely silent on this behavior. Education Digest, 75(3), 10-12.
134Brown, K., Jackson, M., & Cassidy, W. (2006). Cyber-bullying: Developing policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy, 57, 1-35. Brunner, J., & Lewis, D. (2008). Tattling ends but bulling continues. Principal Leadership, 8(6), 38-42. Bullen, P., & Hare, N. (2000). The internet: Its effects on safety and behavior. Implications for adolescents. Retrieved on June 13, 2009, from . Campbell, M. A. (2005). Cyberbullying: An old problem in a new guise? Australian Journal of Guidance and Counseling, 15(1), 68-76. Carlson, N (2011). Goldman to clients: Facebook has 600 million users.Retrieved January 26, 2011, from -tech_and_gadgets/.Cassidy, W., Jackson, M., & Brown, K. N. (2009). Sticks and stones can break my bones, but how can pixels hurt me? Students‟ experiences with cyber-bullying. School Psychology International, 30(4), 383-402.