NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Runions, Kevin C. – British Journal of Educational Psychology, 2014
Background: The role of reactive aggression in the development of peer victimization remains unclear due in part to a failure to account for confounding problems of behavioural undercontrol (e.g., hyperactivity). As well, the school social context has rarely been examined to see whether these risks are mediated by relationships with teachers.…
Descriptors: Aggression, Victims, Behavior Problems, Path Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Kingree, Jeffrey B.; Thompson, Martie P. – Journal of American College Health, 2013
Objective: This prospective study examined attitudes (ie, hostility toward women, acceptance of rape myths), peer influences (ie, peer pressure to have sex, peer approval of forced sex), and risky behaviors (ie, high-risk alcohol use, number of sexual partners) as possible mediators of the association between fraternity membership and sexual…
Descriptors: Sexual Harassment, Fraternities, Group Membership, Social Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Kolbert, Jered B.; Field, Julaine E.; Crothers, Laura M.; Schreiber, James B. – Journal of School Violence, 2010
Although studies have found a relation between the use of relational aggression and depressive symptomatology, there is less evidence for the relation of the role of gender identity in these processes. Consequently, this study investigated the roles of social and relational aggression and feminine gender role identity in depressive symptoms among…
Descriptors: Aggression, Social Behavior, Females, Sex Role
Ceyhan, A. Aykut; Ceyhan, Esra – Online Submission, 2007
This research aims at examining the relationships among unethical computer usage behavior and the personality characteristics of locus of control, adjustment to social norms, antisocial tendency, and aggression on Turkish university students. The research was applied to 217 university students. Data were collected through Unethical Computer Using…
Descriptors: Locus of Control, Ethics, Norms, Structural Equation Models