{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T17:06:50Z","timestamp":1772816810631,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s10676-015-9382-9","type":"journal-article","created":{"date-parts":[[2016,1,12]],"date-time":"2016-01-12T07:26:31Z","timestamp":1452583591000},"page":"275-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Virtuous reality: moral theory and research into cyber-bullying"],"prefix":"10.1007","volume":"17","author":[{"given":"Tom","family":"Harrison","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,12]]},"reference":[{"issue":"2","key":"9382_CR1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/02667363.2012.665356","volume":"28","author":"M Ackers","year":"2012","unstructured":"Ackers, M. (2012). Cyberbullying: Through the eyes of children and young people. Educational Psychology in Practice, 28(2), 141\u2013157.","journal-title":"Educational Psychology in Practice"},{"key":"9382_CR2","unstructured":"Ali, A. (2013). Cyber-bullying taxonomies: Definition, forms, consequences and mitigation strategies. In 2013 5th International conference on computer science and information technology (CSIT) (p. 126\u2013133)."},{"issue":"4","key":"9382_CR3","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s10578-010-0176-3","volume":"41","author":"RP Ang","year":"2010","unstructured":"Ang, R. P., & Goh, D. H. (2010). Cyberbullying among adolescents: The role of affective and cognitive empathy, and gender. Child Psychiatry and Human Development, 41(4), 387\u2013397.","journal-title":"Child Psychiatry and Human Development"},{"issue":"2","key":"9382_CR4","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.childyouth.2010.09.011","volume":"33","author":"S Anirban","year":"2011","unstructured":"Anirban, S., & Anoshua, C. (2011). Are social networking sites a source of online harassment for teens? Evidence from survey data. Children and Youth Services Review, 33(2), 284\u2013290.","journal-title":"Children and Youth Services Review"},{"issue":"124","key":"9382_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0031819100037943","volume":"33","author":"GEM Anscombe","year":"1958","unstructured":"Anscombe, G. E. M. (1958). Modern moral philosophy. Philosophy, 33(124), 1\u201319.","journal-title":"Philosophy"},{"key":"9382_CR6","doi-asserted-by":"crossref","first-page":"1739","DOI":"10.1111\/j.1467-8624.2009.01365.x","volume":"80","author":"W Arsenio","year":"2009","unstructured":"Arsenio, W., Adams, E., & Gold, J. (2009). Social information processing, moral reasoning and emotion attributions. Relations with adolescents reactive and proactive aggression. Child Development, 80, 1739\u20131755.","journal-title":"Child Development"},{"key":"9382_CR7","unstructured":"Arthur, J., Kristjansson, K., Thomas, H., Kotzee, B., Ignatowitcz, A., & Qiu, I. (2015). Virtuous medical practice. Birmingham: University of Birmingham. Accessed July 20, 2015 from http:\/\/www.jubileecentre.ac.uk\/userfiles\/jubileecentre\/pdf\/Research%20Reports\/Virtuous_Medical_Practice.pdf ."},{"issue":"2","key":"9382_CR8","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/0305724022014322","volume":"31","author":"A Bandura","year":"2002","unstructured":"Bandura, A. (2002). Selective moral disengagement in the exercise of moral agency. Journal of Moral Education, 31(2), 101\u2013119.","journal-title":"Journal of Moral Education"},{"key":"9382_CR9","unstructured":"Belsey, B. (2005). Internet usage: Facts and news. Accessed September 17, 2012 from www.cyberbullying.ca ."},{"key":"9382_CR10","volume-title":"Ethical guidelines for educational research","author":"BERA","year":"2011","unstructured":"BERA. (2011). Ethical guidelines for educational research. London: BERA."},{"key":"9382_CR13","volume-title":"Transforming qualitative information: Thematic analysis and code development","author":"R Boyatzis","year":"1998","unstructured":"Boyatzis, R. (1998). Transforming qualitative information: Thematic analysis and code development. Thousand Oaks, CA: Sage Publications."},{"issue":"2","key":"9382_CR14","first-page":"4","volume":"73","author":"C Brydolf","year":"2007","unstructured":"Brydolf, C. (2007). Minding myspace: Balancing the benefits and risks of students\u2019 online social networks. Education Digest, 73(2), 4\u20138.","journal-title":"Education Digest"},{"issue":"1","key":"9382_CR15","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1375\/ajgc.15.1.68","volume":"15","author":"M Campbell","year":"2005","unstructured":"Campbell, M. (2005). Cyber-bullying: An old problem in a new guise? Australian Journal of Guidance and Counseling, 15(1), 68\u201376.","journal-title":"Australian Journal of Guidance and Counseling"},{"key":"9382_CR17","volume-title":"Media ethics beyond boarders: A global perspective","author":"N Couldry","year":"2010","unstructured":"Couldry, N. (2010). Media ethics: Towards a framework for media producers and media consumers. In S. J. Eards & H. Wasserman (Eds.), Media ethics beyond boarders: A global perspective. New York: Routledge."},{"key":"9382_CR18","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1002\/9781119954484.ch14","volume-title":"Cyberbullying in the global playground. Research from international perspectives","author":"D Cross","year":"2012","unstructured":"Cross, D., Li, Q., Smith, P. K., & Monks, H. (2012). Understanding and preventing cyberbullying. Where have we been and where should we be going? In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global playground. Research from international perspectives (pp. 287\u2013305). West Sussex: Wiley."},{"key":"9382_CR19","volume-title":"Protecting young people from cyberbullying","author":"E Cross","year":"2009","unstructured":"Cross, E., Richardson, B., Thaddaeus, D., & Jessica, V. (2009). Protecting young people from cyberbullying. London: Beatbullying."},{"issue":"16","key":"9382_CR22","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/s10676-014-9354-5","volume":"14","author":"A Elder","year":"2014","unstructured":"Elder, A. (2014). Excellent online friendships: An Aristotelian defense of social media. Ethics and Information Technology, 14(16), 287\u2013297.","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9382_CR23","first-page":"44","volume":"48","author":"B Froese-Germain","year":"2008","unstructured":"Froese-Germain, B. (2008). Bullying gets digital shot-in-the-arm. Education Canada, 48(4), 44\u201347.","journal-title":"Education Canada"},{"key":"9382_CR25","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1002\/ab.20153","volume":"32","author":"G Gini","year":"2006","unstructured":"Gini, G. (2006). Social cognition and moral cognition in bullying: What\u2019s wrong? Aggressive Behaviour, 32, 528\u2013539.","journal-title":"Aggressive Behaviour"},{"issue":"3","key":"9382_CR26","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s10551-006-9171-9","volume":"72","author":"N Granitz","year":"2007","unstructured":"Granitz, N., & Loewy, D. (2007). Applying ethical theories: Interpreting and responding to student plagiarism. Journal of Business Ethics, 72(3), 293\u2013306.","journal-title":"Journal of Business Ethics"},{"key":"9382_CR27","volume-title":"The influence of the Internet on the character virtues of 11\u201314\u00a0year olds","author":"T Harrison","year":"2014","unstructured":"Harrison, T. (2014). The influence of the Internet on the character virtues of 11\u201314\u00a0year olds. Birmingham: University of Birmingham."},{"key":"9382_CR28","unstructured":"Hasebrink, U., Livingstone, S., Haddon, L., & Olafsson, K. (2009). Comparing children\u2019s online opportunities and risks across Europe: Cross-national comparisons for EU Kids Online (2nd ed.). Deliverable D3.2, LSE, London, EU Kids Online. Accessed June 17, 2014 from http:\/\/eprints.lse.ac.uk\/24368\/1\/D3.2_Report-Cross_national_comparisons-2nd-edition.pdf ."},{"issue":"1","key":"9382_CR29","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1093\/jpepsy\/27.1.47","volume":"27","author":"C Heary","year":"2002","unstructured":"Heary, C., & Hennessy, E. (2002). The use of focus group interviews in paediatric health care research. Journal of Pediatric Psychology, 27(1), 47\u201357.","journal-title":"Journal of Pediatric Psychology"},{"key":"9382_CR30","doi-asserted-by":"crossref","DOI":"10.4135\/9781446249420","volume-title":"Researching Young people\u2019s lives","author":"S Heath","year":"2009","unstructured":"Heath, S., Brooks, R., Cleaver, E., & Ireland, E. (2009). Researching Young people\u2019s lives. London: Sage."},{"key":"9382_CR31","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511805851","volume-title":"Empathy and moral development: Implications for caring and justice","author":"ML Hoffman","year":"2000","unstructured":"Hoffman, M. L. (2000). Empathy and moral development: Implications for caring and justice. Cambridge: Cambridge University Press."},{"issue":"6","key":"9382_CR33","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1002\/1098-240X(200012)23:6<510::AID-NUR9>3.0.CO;2-L","volume":"23","author":"SD Horner","year":"2000","unstructured":"Horner, S. D. (2000). Focus on research methods: Using focus group methods with middle school children. Research in Nursing & Health, 23(6), 510\u2013517.","journal-title":"Research in Nursing & Health"},{"key":"9382_CR76","unstructured":"Krueger, R. (1994). Focus groups: A practical guide for applied research (2nd ed.). London: Sage Publications."},{"key":"9382_CR73","volume-title":"A good childhood, searching for values in a competitive age","author":"R Layard","year":"2009","unstructured":"Layard, R., & Dunn, J. (2009). A good childhood, searching for values in a competitive age. London: Penguin."},{"key":"9382_CR39","unstructured":"Lenhart, A. (2007). Cyberbullying. Washington, DC: Pew Research Center. Accessed November 20, 2013 from www.pewinternet.org\/Reports\/2007\/Cyberbullying.aspx ."},{"issue":"6","key":"9382_CR41","first-page":"43","volume":"13","author":"E Lievens","year":"2011","unstructured":"Lievens, E. (2011). Risk-reducing regulatory strategies for protecting minors in social networks. Strategy for Telecommunications, Information and Media, 13(6), 43\u201354.","journal-title":"Strategy for Telecommunications, Information and Media"},{"key":"9382_CR42","volume-title":"Children and the Internet","author":"S Livingston","year":"2009","unstructured":"Livingston, S. (2009). Children and the Internet. Cambridge: Polity Press."},{"issue":"3","key":"9382_CR43","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.giq.2011.12.008","volume":"29","author":"H Lyu","year":"2012","unstructured":"Lyu, H. (2012). Internet policy in Korea: A preliminary framework for assigning moral and legal responsibility to agents in Internet activities. Government Information Quarterly, 29(3), 394\u2013402.","journal-title":"Government Information Quarterly"},{"key":"9382_CR44","volume-title":"After virtue","author":"A MacIntyre","year":"1981","unstructured":"MacIntyre, A. (1981). After virtue. Notre Dame: University of Notre Dame Press."},{"key":"9382_CR45","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1348\/026151009X403838","volume":"28","author":"T Malti","year":"2010","unstructured":"Malti, T., Gasser, L., & Gutzwiller-Helfenfinger, E. (2010). Children\u2019s interpretive understanding, moral judgments, and emotion attributions: Relations to social behaviour. British Journal of Developmental Psychology, 28, 275\u2013292.","journal-title":"British Journal of Developmental Psychology"},{"issue":"3","key":"9382_CR47","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/s10676-012-9297-7","volume":"14","author":"MT McFall","year":"2012","unstructured":"McFall, M. T. (2012). Real character-friends: Aristotelian friendship, living together, and technology. Ethics and Information Technology, 14(3), 221\u2013230.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9382_CR49","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1348\/026151007X205281","volume":"26","author":"E Menesini","year":"2008","unstructured":"Menesini, E., & Camodeca, M. (2008). Shame and guilt as behaviour regulators: Relationships with bullying, victimization and prosocial behaviour. British Journal of Developmental Psychology, 26(2), 183\u2013196.","journal-title":"British Journal of Developmental Psychology"},{"issue":"5","key":"9382_CR50","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1089\/cyber.2010.0002","volume":"14","author":"E Menesini","year":"2011","unstructured":"Menesini, E., Nocentini, A., & Calussi, P. (2011). The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination. Cyberpsychology, Behaviour and Social Networking, 14(5), 267\u2013274.","journal-title":"Cyberpsychology, Behaviour and Social Networking"},{"issue":"1","key":"9382_CR51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2044-835X.2011.02066.x","volume":"31","author":"E Menesini","year":"2013","unstructured":"Menesini, E., Nocentini, A., & Camodeca, M. (2013). Morality, values, traditional bullying, and cyberbullying in adolescence. The British Journal of Developmental Psychology, 31(1), 1\u201314.","journal-title":"The British Journal of Developmental Psychology"},{"issue":"3","key":"9382_CR52","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1111\/j.1939-0025.2010.01040.x","volume":"80","author":"F Mishnan","year":"2010","unstructured":"Mishnan, F., Cook, C., Gadalla, T., Daciuk, J., & Solomon, S. (2010). Cyber-bullying\u00a0behaviours among middle and high school students. The American Journal of Orthopsychiatry, 80(3), 362\u2013374.","journal-title":"The American Journal of Orthopsychiatry"},{"issue":"12","key":"9382_CR53","doi-asserted-by":"crossref","first-page":"1222","DOI":"10.1016\/j.childyouth.2009.05.004","volume":"3","author":"F Mishnan","year":"2009","unstructured":"Mishnan, F., Michael, S., & Solomon, S. (2009). Ongoing and online: Children and youth\u2019s perceptions of cyberbullying. Children and Youth Services Review, 3(12), 1222\u20131228.","journal-title":"Children and Youth Services Review"},{"key":"9382_CR55","unstructured":"Ofcom. (2014). Children and parents: Media use and attitudes report. Accessed July 10, 2015 from http:\/\/stakeholders.ofcom.org.uk\/binaries\/research\/media-literacy\/media-use-attitudes-14\/Childrens_2014_Report.pdf ."},{"key":"9382_CR56","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1080\/17405629.2011.643168","volume":"9","author":"S Perren","year":"2012","unstructured":"Perren, S., & Gutzwiller-Helfenfinger, E. (2012). Cyberbullying and traditional bullying in adolescence: Differential roles of moral disengagement, moral emotions, and moral values. European Journal of Developmental Psychology, 9, 195\u2013209.","journal-title":"European Journal of Developmental Psychology"},{"issue":"3","key":"9382_CR57","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1080\/08900523.2013.792691","volume":"28","author":"P Plaisance","year":"2013","unstructured":"Plaisance, P. (2013). Virtue ethics and digital flourishing: An application of Philippa foot to life online. Journal of Mass Media Ethics, 28(3), 91\u2013102.","journal-title":"Journal of Mass Media Ethics"},{"key":"9382_CR58","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1007\/s10802-010-9399-9","volume":"38","author":"T Pozzoli","year":"2010","unstructured":"Pozzoli, T., & Gini, G. (2010). Active defending and passive bystanding behavior in bullying: The role of personal characteristics and perceived peer pressure. Journal of Abnormal Child Psychology, 38, 815\u2013827.","journal-title":"Journal of Abnormal Child Psychology"},{"key":"9382_CR60","volume-title":"Real world research","author":"C Robson","year":"2011","unstructured":"Robson, C. (2011). Real world research. Oxford: Blackwell Publishers."},{"key":"9382_CR61","doi-asserted-by":"crossref","DOI":"10.4324\/9780203928837","volume-title":"Cyber-bullying: Issues and solutions for the school the classroom and the home","author":"S Shariff","year":"2008","unstructured":"Shariff, S. (2008). Cyber-bullying: Issues and solutions for the school the classroom and the home. Oxon: Routledge."},{"key":"9382_CR75","unstructured":"Shariff, S., & Hoff, D. L. (2007). Cyberbullying: Clarifying legal boundaries for school supervision in cyberspace. International Journal of Cyber Criminology. http:\/\/www.cybercrimjournal.co.nr . Accessed 12 Oct 2013."},{"issue":"3","key":"9382_CR62","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1089\/1094931041291295","volume":"7","author":"J Suler","year":"2004","unstructured":"Suler, J. (2004). The online disinhibition effect. Cyberpsychology and Behaviour, 7(3), 321\u2013326.","journal-title":"Cyberpsychology and Behaviour"},{"issue":"3","key":"9382_CR64","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.chb.2009.11.014","volume":"26","author":"RS Tokunaga","year":"2010","unstructured":"Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimisation. Computers in Human Behaviour, 26(3), 277\u2013287.","journal-title":"Computers in Human Behaviour"},{"key":"9382_CR65","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1089\/cpb.2006.9.584","volume":"9","author":"PM Valkenburg","year":"2006","unstructured":"Valkenburg, P. M., Peter, J. S., & Schouten, A. P. (2006). Friend networking sites and their relationship to adolescents\u2019 well-being and social self-esteem. Cyberpsychology Behavior, 9, 584\u2013590.","journal-title":"Cyberpsychology Behavior"},{"issue":"2","key":"9382_CR66","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s10676-009-9202-1","volume":"12","author":"S Vallor","year":"2010","unstructured":"Vallor, S. (2010). Social networking technology and the virtues. Ethics and Information Technology, 12(2), 157\u2013170.","journal-title":"Ethics and Information Technology"},{"key":"9382_CR67","doi-asserted-by":"crossref","unstructured":"Weisband, S., & Kiesler, S. (1996). Self-disclosure on computer forms: Meta-analysis and implications. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 3\u201310).","DOI":"10.1145\/238386.238387"},{"key":"9382_CR68","volume-title":"Computer ethics, etiquette, and safety for the 21st-century student","author":"N Willard","year":"2002","unstructured":"Willard, N. (2002). Computer ethics, etiquette, and safety for the 21st-century student. Eugene, OR: ISTE."},{"key":"9382_CR69","volume-title":"Ethics and the limitations of philosophy","author":"B Williams","year":"1985","unstructured":"Williams, B. (1985). Ethics and the limitations of philosophy. Cambridge: Harvard University Press."},{"key":"9382_CR70","unstructured":"Winter, R. E., & Leneway, R. J. (2008). Cyberbullying\u2014Terror in the classroom: What can be done? Accessed January 15, 2013 from http:\/\/www.chaminade.org\/cyberbullying.htm ."},{"issue":"3","key":"9382_CR72","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.clsr.2010.03.005","volume":"26","author":"X Zhang","year":"2010","unstructured":"Zhang, X. (2010). Charging children with child pornography\u2014Using the legal system to handle the problem of sexting. Computer Law & Security Review, 26(3), 251\u2013259.","journal-title":"Computer Law & Security Review"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9382-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-015-9382-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9382-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T13:08:22Z","timestamp":1567516102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-015-9382-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":56,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["9382"],"URL":"https:\/\/doi.org\/10.1007\/s10676-015-9382-9","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12]]}}}