{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T17:58:40Z","timestamp":1770487120438,"version":"3.49.0"},"reference-count":50,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4,1]]},"abstract":"<p>Digital technology use is increasingly impacting on the lives of young people. To gain a deeper understanding of the perceived impact of young people's digital technology use, 2 focus groups were conducted with 14 teachers recruited from 2 schools. The focus groups were transcribed verbatim and analysed using Interpretative Phenomenological Analysis. The analysis revealed three themes: changing social dynamics, risk and (ir)responsible behaviour, and disclosure and reporting of cyber bullying. Participants discussed how digital technology was shaping young people's social identity and impacting on established norms when interacting in the social arena. A number of benefits were attributed to technology use but participants also recognised young people's naivety and tendency to anthropomorphise the internet. Finally, there was a perception that young people underreported their experiences of cyber bullying and some of the challenges faced when tackling cyber bullying were discussed.<\/p>","DOI":"10.4018\/ijcbpl.2015040102","type":"journal-article","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T11:40:19Z","timestamp":1439379619000},"page":"15-29","source":"Crossref","is-referenced-by-count":6,"title":["\u201cA Large Can of Worms\u201d"],"prefix":"10.4018","volume":"5","author":[{"given":"Lucy R.","family":"Betts","sequence":"first","affiliation":[{"name":"Division of Psychology, Nottingham Trent University, Nottingham, UK"}]},{"given":"Karin A.","family":"Spenser","sequence":"additional","affiliation":[{"name":"Division of Psychology, Nottingham Trent University, Nottingham, UK"}]}],"member":"2432","reference":[{"key":"ijcbpl.2015040102-0","doi-asserted-by":"publisher","DOI":"10.3109\/00048670903270399"},{"key":"ijcbpl.2015040102-1","unstructured":"Anderson, T., & Sturm, B. (2007). Cyberbullying: From playground to computer. Youth Adult Library Services, 5, 24.27."},{"key":"ijcbpl.2015040102-2","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0079"},{"key":"ijcbpl.2015040102-3","doi-asserted-by":"crossref","DOI":"10.4135\/9781849208956","author":"R. S.Barbour","year":"2007","journal-title":"Doing focus groups"},{"key":"ijcbpl.2015040102-4","first-page":"21","article-title":"A school\u2019s duty to provide a safe learning environment: Does this include cyberbullying?","volume":"13","author":"M. A.Campbell","year":"2008","journal-title":"Australia and New Zealand Journal of Law and Education"},{"key":"ijcbpl.2015040102-5","doi-asserted-by":"publisher","DOI":"10.1177\/0143034312445245"},{"key":"ijcbpl.2015040102-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2010.12.005"},{"key":"ijcbpl.2015040102-7","doi-asserted-by":"publisher","DOI":"10.1080\/1045988X.2011.539461"},{"key":"ijcbpl.2015040102-8","first-page":"21","article-title":"Pre-service teachers\u2019 knowledge and attitudes regarding school-based bullying.","volume":"34","author":"K.Craig","year":"2011","journal-title":"Canadian Journal of Education"},{"key":"ijcbpl.2015040102-9","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.114.4.864"},{"key":"ijcbpl.2015040102-10","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1080\/02796015.2003.12086206","article-title":"Research on school bullying and victimization: What have we learned and where do we go from here?","volume":"32","author":"D. L.Espelage","year":"2003","journal-title":"School Psychology Review"},{"key":"ijcbpl.2015040102-11","doi-asserted-by":"publisher","DOI":"10.1007\/s10608-006-9106-x"},{"key":"ijcbpl.2015040102-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.06.005"},{"key":"ijcbpl.2015040102-13","doi-asserted-by":"publisher","DOI":"10.1037\/a0029482"},{"key":"ijcbpl.2015040102-14","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.42.3.429"},{"key":"ijcbpl.2015040102-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2011.09.015"},{"key":"ijcbpl.2015040102-16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2008.00335.x"},{"key":"ijcbpl.2015040102-17","doi-asserted-by":"publisher","DOI":"10.1080\/10926771003788979"},{"key":"ijcbpl.2015040102-18","doi-asserted-by":"publisher","DOI":"10.1093\/eurpub\/ckn101"},{"key":"ijcbpl.2015040102-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2009.06.001"},{"key":"ijcbpl.2015040102-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.amepre.2007.02.001"},{"key":"ijcbpl.2015040102-21","doi-asserted-by":"publisher","DOI":"10.1080\/1045988X.2011.539465"},{"key":"ijcbpl.2015040102-22","doi-asserted-by":"publisher","DOI":"10.1080\/1045988X.2011.560495"},{"key":"ijcbpl.2015040102-23","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/1045988X.2011.560496","article-title":"Cases of victimization case 3: Phoebe Prince (Massachusetts, 2010).","volume":"55","author":"G.Moreno","year":"2011","journal-title":"Preventing School Failure"},{"key":"ijcbpl.2015040102-24","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/1045988X.2011.560497","article-title":"Cases of victimization case 4: Jesse Logan (Ohio, 2008).","volume":"55","author":"G.Moreno","year":"2011","journal-title":"Preventing School Failure"},{"key":"ijcbpl.2015040102-25","doi-asserted-by":"publisher","DOI":"10.1080\/1045988X.2011.560498"},{"key":"ijcbpl.2015040102-26","doi-asserted-by":"publisher","DOI":"10.1001\/jama.285.16.2094"},{"key":"ijcbpl.2015040102-27","author":"D.Olweus","year":"1993","journal-title":"Bullying at school: What we know and what we can do"},{"key":"ijcbpl.2015040102-28","first-page":"283","article-title":"Tackling cyberbullying: Review of empirical evidence regarding successful responses by students, parents, and schools.","volume":"6","author":"S.Perren","year":"2012","journal-title":"International Journal of Conflict and Violence"},{"key":"ijcbpl.2015040102-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.02.014"},{"key":"ijcbpl.2015040102-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2011.01.015"},{"key":"ijcbpl.2015040102-31","first-page":"76","article-title":"Cyber bullying: Clarifying legal boundaries for school supervision in cyberspace.","volume":"1","author":"S.Shariff","year":"2007","journal-title":"International Journal of Cyber Criminology"},{"key":"ijcbpl.2015040102-32","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2729.2008.00304.x"},{"key":"ijcbpl.2015040102-33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1532-7795.2010.00680.x"},{"key":"ijcbpl.2015040102-34","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2007.00611.x"},{"key":"ijcbpl.2015040102-35","first-page":"322","article-title":"Interpretative phenomenological analysis","author":"J. A.Smith","year":"2007","journal-title":"Research methods in psychology"},{"key":"ijcbpl.2015040102-36","first-page":"53","article-title":"Interpretative phenomenological analysis","author":"J. A.Smith","year":"2008","journal-title":"Qualitative psychology: A practical guide to research methods"},{"key":"ijcbpl.2015040102-37","doi-asserted-by":"publisher","DOI":"10.1080\/02667360701661165"},{"key":"ijcbpl.2015040102-38","doi-asserted-by":"publisher","DOI":"10.1080\/1045988X.2011.539454"},{"key":"ijcbpl.2015040102-39","doi-asserted-by":"publisher","DOI":"10.1001\/archgenpsychiatry.2010.79"},{"key":"ijcbpl.2015040102-40","doi-asserted-by":"publisher","DOI":"10.1002\/pits.21603"},{"key":"ijcbpl.2015040102-41","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-012-9867-3"},{"key":"ijcbpl.2015040102-42","doi-asserted-by":"publisher","DOI":"10.1521\/suli.31.1.32.21312"},{"key":"ijcbpl.2015040102-43","first-page":"1","article-title":"The development and validation of the online victimization scale for adolescents.","volume":"4","author":"B. M.Tynes","year":"2010","journal-title":"Cyberpsychology (Brno)"},{"key":"ijcbpl.2015040102-44","author":"J.Underwood","year":"2009","journal-title":"Narrowing the gap: An exploration of the ways technology can support approaches to narrowing the gap for underachieving and low-achieving learners in secondary schools"},{"key":"ijcbpl.2015040102-45","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8330.00239"},{"key":"ijcbpl.2015040102-46","first-page":"75","article-title":"School response to cyberbullying and sexting: The legal challenges. B.Y.U.","volume":"1","author":"N.Willard","year":"2011","journal-title":"Education and Law Journal"},{"key":"ijcbpl.2015040102-47","doi-asserted-by":"publisher","DOI":"10.1080\/1045988X.2011.539429"},{"key":"ijcbpl.2015040102-48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.09.004"},{"key":"ijcbpl.2015040102-49","first-page":"263","article-title":"An examination of preservice teachers\u2019 perceptions about cyberbullying. Eurasia Journal of Mathematics","volume":"6","author":"H.Yilmaz","year":"2010","journal-title":"Science & Technology Education"}],"container-title":["International Journal of Cyber Behavior, Psychology and Learning"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=135313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T14:53:05Z","timestamp":1654095185000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcbpl.2015040102"}},"subtitle":["Teachers' Perceptions of Young People's Technology Use"],"short-title":[],"issued":{"date-parts":[[2015,4,1]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcbpl.2015040102","relation":{},"ISSN":["2155-7136","2155-7144"],"issn-type":[{"value":"2155-7136","type":"print"},{"value":"2155-7144","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,1]]}}}