Presentation on the draft manuscript 'A systematic literature review of academic cyberbullying- notable research absences in Higher Education contexts' given to the Design Research Activities Workgroup at CPUT
Categorize balanced dataset for troll detectionvivatechijri
As we know cyber bullying is increasing day by day and Cyber troll is one of the cyber-aggressive actions that is not much different from cyberbullying in online abuse so that the victims feel uncomfortable. One of the most used social media platforms in which cyber trolling frequently happens is Twitter. Basically, it is found that during an investigation of cyberbullying cases a lot of information gathered is false which aims to give discomfort, hatred and waste lots of time. So, it is necessary to classify between cyberbullying tweets and normal tweets on twitter. There has already been research on classification of cyberbullying tweets and normal tweets using the Support vector machine (SVM) algorithm. But the drawback of the system is that it only gives 63.83% of accuracy. Firstly, we can improve the accuracy of the system by using the Recurrent Neural Network (RNN) And Secondly, for balancing the dataset we will be using Synthetic Minority Over-sampling Technique (SMOTE). We believe that using these techniques we will be able to increase the accuracy of the previous proposed.
Introduction to a chapter that explores how an infographic poster design course was improved. In particular, students were helped with preparing better academic arguments through being taught a multimodal framework for academic argument in data visualization.
An electronic copy of a handout that is used with the presentation "A Parent and Teacher Training Program for Cyberbullying Detection and Intervention", Andy Jeter's presentation on his action research proposal. The handout includes a list of web resources and cyberbullying prevention tips for teachers and parents. The PowerPoint for the presentation can be found at - http://www.slideshare.net/andymanj/a-parent-and-teacher-training-program-for-cyberbullying-detection-and-intervention
A presentation to the World Nutrition Summit 2021 (Cape Town, March 4-6) on how low-carb activists and insulin resistance scholars can make responsible contributions through their digital voices.
Hate speech has been an ongoing problem on the Internet for many years. Besides, social media, especially Facebook, and Twitter have given it a global stage where those hate speeches can spread far more rapidly. Every social media platform needs to implement an effective hate speech detection system to remove offensive content in real-time. There are various approaches to identify hate speech, such as Rule-Based, Machine Learning based, deep learning based and Hybrid approach. Since this is a review paper, we explained the valuable works of various authors who have invested their valuable time in studying to identifying hate speech using various approaches.
Smart detection of offensive words in social media using the soundex algorith...IJECEIAES
Offensive posts in the social media that are inappropriate for a specific age, level of maturity, or impression are quite often destined more to unadult than adult participants. Nowadays, the growth in the number of the masked offensive words in the social media is one of the ethically challenging problems. Thus, there has been growing interest in development of methods that can automatically detect posts with such words. This study aimed at developing a method that can detect the masked offensive words in which partial alteration of the word may trick the conventional monitoring systems when being posted on social media. The proposed method progresses in a series of phases that can be broken down into a pre-processing phase, which includes filtering, tokenization, and stemming; offensive word extraction phase, which relies on using the soundex algorithm and permuterm index; and a post-processing phase that classifies the users’ posts in order to highlight the offensive content. Accordingly, the method detects the masked offensive words in the written text, thus forbidding certain types of offensive words from being published. Results of evaluation of performance of the proposed method indicate a 99% accuracy of detection of offensive words.
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERINGijaia
Unsupervised machine learning techniques such as clustering are widely gaining use with the recent increase in social communication platforms like Twitter and Facebook. Clustering enables the finding of patterns in these unstructured datasets. We collected tweets matching hashtags linked to COVID-19 from a Kaggle dataset. We compared the performance of nine clustering algorithms using this dataset. We evaluated the generalizability of these algorithms using a supervised learning model. Finally, using a selected unsupervised learning algorithm we categorized the clusters. The top five categories are Safety,
Crime, Products, Countries and Health. This can prove helpful for bodies using large amount of Twitter data needing to quickly find key points in the data before going into further classification.
Categorize balanced dataset for troll detectionvivatechijri
As we know cyber bullying is increasing day by day and Cyber troll is one of the cyber-aggressive actions that is not much different from cyberbullying in online abuse so that the victims feel uncomfortable. One of the most used social media platforms in which cyber trolling frequently happens is Twitter. Basically, it is found that during an investigation of cyberbullying cases a lot of information gathered is false which aims to give discomfort, hatred and waste lots of time. So, it is necessary to classify between cyberbullying tweets and normal tweets on twitter. There has already been research on classification of cyberbullying tweets and normal tweets using the Support vector machine (SVM) algorithm. But the drawback of the system is that it only gives 63.83% of accuracy. Firstly, we can improve the accuracy of the system by using the Recurrent Neural Network (RNN) And Secondly, for balancing the dataset we will be using Synthetic Minority Over-sampling Technique (SMOTE). We believe that using these techniques we will be able to increase the accuracy of the previous proposed.
Introduction to a chapter that explores how an infographic poster design course was improved. In particular, students were helped with preparing better academic arguments through being taught a multimodal framework for academic argument in data visualization.
An electronic copy of a handout that is used with the presentation "A Parent and Teacher Training Program for Cyberbullying Detection and Intervention", Andy Jeter's presentation on his action research proposal. The handout includes a list of web resources and cyberbullying prevention tips for teachers and parents. The PowerPoint for the presentation can be found at - http://www.slideshare.net/andymanj/a-parent-and-teacher-training-program-for-cyberbullying-detection-and-intervention
A presentation to the World Nutrition Summit 2021 (Cape Town, March 4-6) on how low-carb activists and insulin resistance scholars can make responsible contributions through their digital voices.
Hate speech has been an ongoing problem on the Internet for many years. Besides, social media, especially Facebook, and Twitter have given it a global stage where those hate speeches can spread far more rapidly. Every social media platform needs to implement an effective hate speech detection system to remove offensive content in real-time. There are various approaches to identify hate speech, such as Rule-Based, Machine Learning based, deep learning based and Hybrid approach. Since this is a review paper, we explained the valuable works of various authors who have invested their valuable time in studying to identifying hate speech using various approaches.
Smart detection of offensive words in social media using the soundex algorith...IJECEIAES
Offensive posts in the social media that are inappropriate for a specific age, level of maturity, or impression are quite often destined more to unadult than adult participants. Nowadays, the growth in the number of the masked offensive words in the social media is one of the ethically challenging problems. Thus, there has been growing interest in development of methods that can automatically detect posts with such words. This study aimed at developing a method that can detect the masked offensive words in which partial alteration of the word may trick the conventional monitoring systems when being posted on social media. The proposed method progresses in a series of phases that can be broken down into a pre-processing phase, which includes filtering, tokenization, and stemming; offensive word extraction phase, which relies on using the soundex algorithm and permuterm index; and a post-processing phase that classifies the users’ posts in order to highlight the offensive content. Accordingly, the method detects the masked offensive words in the written text, thus forbidding certain types of offensive words from being published. Results of evaluation of performance of the proposed method indicate a 99% accuracy of detection of offensive words.
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERINGijaia
Unsupervised machine learning techniques such as clustering are widely gaining use with the recent increase in social communication platforms like Twitter and Facebook. Clustering enables the finding of patterns in these unstructured datasets. We collected tweets matching hashtags linked to COVID-19 from a Kaggle dataset. We compared the performance of nine clustering algorithms using this dataset. We evaluated the generalizability of these algorithms using a supervised learning model. Finally, using a selected unsupervised learning algorithm we categorized the clusters. The top five categories are Safety,
Crime, Products, Countries and Health. This can prove helpful for bodies using large amount of Twitter data needing to quickly find key points in the data before going into further classification.
An evolutionary approach to comparative analysis of detecting Bangla abusive ...journalBEEI
The use of Bangla abusive texts has been accelerated with the progressive use of social media. Through this platform, one can spread the hatred or negativity in a viral form. Plenty of research has been done on detecting abusive text in the English language. Bangla abusive text detection has not been done to a great extent. In this experimental study, we have applied three distinct approaches to a comprehensive dataset to obtain a better outcome. In the first study, a large dataset collected from Facebook and YouTube has been utilized to detect abusive texts. After extensive pre-processing and feature extraction, a set of consciously selected supervised machine learning classifiers i.e. multinomial Naïve Bayes (MNB), multi layer perceptron (MLP), support vector machine (SVM), decision tree, random forrest, stochastic gradient descent (SGD), ridge, perceptron and k-nearest neighbors (k-NN) has been applied to determine the best result. The second experiment is conducted by constructing a balanced dataset by random under sampling the majority class and finally, a Bengali stemmer is employed on the dataset and then the final experiment is conducted. In all three experiments, SVM with the full dataset obtained the highest accuracy of 88%.
In this introductory lecture titled, "conceptualising and measuring human anxiety on the Internet" the audience is explained what new or interesting the dissertation has to offer and how it is connected to the human-computer interaction fields and to the society in general.
Over the Horizon: Connecting Technology Trends with the Library of Tomorrow (...Mark A. Smith
Mark A. Smith, Harry Pence, Joan Getman - Presentation: Over the Horizon: Connecting Technology Trends with the Library of Tomorrow - Academic Librarians 2010 Conference. Ithaca, NY June 7-8, 2010
Opportunity and risk in social computing environmentsHazel Hall
Hazel Hall's invited paper presented at SLA Eastern Canada Members' Day, McGill University, Montreal, Canada, 29 April 2009. This presentation draws on the project work discussed in the report at: http://drhazelhall.files.wordpress.com/2013/01/soc_comp_proj_rep_public_2008.pdf
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOijaia
With the rapid growth of users in social networking services, data is generated in thousands of terabytes
every day. Practical frameworks for data extraction from social networking sites have not been well
investigated yet. In this paper, a methodology for data extraction with respect to Sina Weibo is discussed.
In order to design a proper method for data extraction, the properties of complex networks and the
challenges when extracting data from complex networks are discussed first. Then, the reason for choosing
Sina Weibo as the data source is given. After that, the methods for data gathering are introduced and the
techniques for data sampling and data clean-up are discussed. Over 1 million users and hundreds of
millions of social relations between them were extracted from Sina Weibo using the methods proposed in
this paper.
Review on Identify Kin Relationship Technique in ImageIJERA Editor
In this paper work Kin relationships are traditionally defined as ties based on blood . Kinship include lineal generational bonds like children, parents, grandparents, and great-grandparents, collateral bonds such as siblings, cousins, nieces and nephews, and aunts and uncles, and ties with in-laws. An often-made distinction is that between primary kin members of the families of origin and procreation and secondary kin other family members. The former refer to as “immediate family,” and the latter are generally labelled “extended family.” Marriage, as a principle of kinship, differs from blood in that it can be terminated. Here Proposing the technique to identify Kin relationship System or Kinship model by using face recognition technique splitting the face into subsets like forehead, eyes, nose, mouth, and cheek areas constitute through Gabor Features on available Real time Database. Given the potential for marital break-up, blood is recognized as the more important principle of kinship.
An evolutionary approach to comparative analysis of detecting Bangla abusive ...journalBEEI
The use of Bangla abusive texts has been accelerated with the progressive use of social media. Through this platform, one can spread the hatred or negativity in a viral form. Plenty of research has been done on detecting abusive text in the English language. Bangla abusive text detection has not been done to a great extent. In this experimental study, we have applied three distinct approaches to a comprehensive dataset to obtain a better outcome. In the first study, a large dataset collected from Facebook and YouTube has been utilized to detect abusive texts. After extensive pre-processing and feature extraction, a set of consciously selected supervised machine learning classifiers i.e. multinomial Naïve Bayes (MNB), multi layer perceptron (MLP), support vector machine (SVM), decision tree, random forrest, stochastic gradient descent (SGD), ridge, perceptron and k-nearest neighbors (k-NN) has been applied to determine the best result. The second experiment is conducted by constructing a balanced dataset by random under sampling the majority class and finally, a Bengali stemmer is employed on the dataset and then the final experiment is conducted. In all three experiments, SVM with the full dataset obtained the highest accuracy of 88%.
In this introductory lecture titled, "conceptualising and measuring human anxiety on the Internet" the audience is explained what new or interesting the dissertation has to offer and how it is connected to the human-computer interaction fields and to the society in general.
Over the Horizon: Connecting Technology Trends with the Library of Tomorrow (...Mark A. Smith
Mark A. Smith, Harry Pence, Joan Getman - Presentation: Over the Horizon: Connecting Technology Trends with the Library of Tomorrow - Academic Librarians 2010 Conference. Ithaca, NY June 7-8, 2010
Opportunity and risk in social computing environmentsHazel Hall
Hazel Hall's invited paper presented at SLA Eastern Canada Members' Day, McGill University, Montreal, Canada, 29 April 2009. This presentation draws on the project work discussed in the report at: http://drhazelhall.files.wordpress.com/2013/01/soc_comp_proj_rep_public_2008.pdf
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOijaia
With the rapid growth of users in social networking services, data is generated in thousands of terabytes
every day. Practical frameworks for data extraction from social networking sites have not been well
investigated yet. In this paper, a methodology for data extraction with respect to Sina Weibo is discussed.
In order to design a proper method for data extraction, the properties of complex networks and the
challenges when extracting data from complex networks are discussed first. Then, the reason for choosing
Sina Weibo as the data source is given. After that, the methods for data gathering are introduced and the
techniques for data sampling and data clean-up are discussed. Over 1 million users and hundreds of
millions of social relations between them were extracted from Sina Weibo using the methods proposed in
this paper.
Review on Identify Kin Relationship Technique in ImageIJERA Editor
In this paper work Kin relationships are traditionally defined as ties based on blood . Kinship include lineal generational bonds like children, parents, grandparents, and great-grandparents, collateral bonds such as siblings, cousins, nieces and nephews, and aunts and uncles, and ties with in-laws. An often-made distinction is that between primary kin members of the families of origin and procreation and secondary kin other family members. The former refer to as “immediate family,” and the latter are generally labelled “extended family.” Marriage, as a principle of kinship, differs from blood in that it can be terminated. Here Proposing the technique to identify Kin relationship System or Kinship model by using face recognition technique splitting the face into subsets like forehead, eyes, nose, mouth, and cheek areas constitute through Gabor Features on available Real time Database. Given the potential for marital break-up, blood is recognized as the more important principle of kinship.
Research Evaluation in an Open Science contextHilda Muchando
The Knowledge Exchange has published the report ‘𝙊𝙥𝙚𝙣𝙣𝙚𝙨𝙨 𝙋𝙧𝙤𝙛𝙞𝙡𝙚: 𝙈𝙤𝙙𝙚𝙡𝙡𝙞𝙣𝙜 𝙧𝙚𝙨𝙚𝙖𝙧𝙘𝙝 𝙚𝙫𝙖𝙡𝙪𝙖𝙩𝙞𝙤𝙣 𝙛𝙤𝙧 𝙤𝙥𝙚𝙣 𝙨𝙘𝙝𝙤𝙡𝙖𝙧𝙨𝙝𝙞𝙥’.
The report presents how the Openness Profile can help address existing gaps in the assessment of Open Science in relation to issues such as:
• The need to accelerate the transition to Open - operationalising and normalising open scholarship practices has proven challenging.
• Conflicting ambitions combined with strong network effects that punish those who deviate from sector norms around research assessment and practice.
• The economic nature of challenges, either financial or relating to actors’ incentives, associated with the transition to open scholarship.
• Distortion of researcher behaviour due to over-reliance on traditional metrics.
• Underfunded and underdeveloped funder grant information systems. Poor adoption of PIDs and little to no interoperability with downstream stakeholders.
• Key contributors to the academic knowledge ecosystem being under-recognised
• Research being organised with ‘well defined’ rules that do not include ‘open’-related criteria.
The potential to improve open research evaluation practice as well as the requirements to implement the Openness Profile are addressed, including recommendations for stakeholders.
Developing a Socially-Aware Engineering Identity Through Transdisciplinary Le...colin gray
In conjunction with the drive towards human-centered design in engineering education, questions arise regarding how students build and engage a socially-aware engineering identity. In this paper, we describe how students in a transdisciplinary undergraduate program struggle to engage with ontological and epistemological perspectives that draw on that social turn, particularly in relation to human-centered engineering approaches and sociotechnical complexity. We use a critical qualitative meaning reconstruction approach to deeply analyze the meaning-making assumptions of these students to reveal characteristic barriers in engaging with other subjectivities, and related epistemological and ontological claims implicit in these subjectivities. We conclude with implications for encouraging socially-aware identity formation in engineering education.
The proliferation of communication technologies is profoundly changing the nature of academic practice. In this presentation I describe the impact of blogging and social networking tools on the practice and dissemination of academic research across disciplinary boundaries. I suggest that the traditional notion of the university is giving way to communities of scholars who are not tied to particular institutions, and less dependent on traditional forms of dissemination and publication. The resulting ‘democratisation’ of academia is portrayed in terms of a tension between democracy and expert knowledge mediated by technology.
One prominent contemporary challenge for technologists is to understand the ongoing impact of technological change on academic communities. At The Open University, the Digital Scholarship research team is mapping the use of Twitter in order to better understand user engagement with these technologies. I will present headline findings from this research and discuss the implications for scholarly practice at the OU.
Disseminating Scientific Research via Twitter: Research Evidence and Practica...Katja Reuter, PhD
About one-fifth of current scientific papers are being shared on Twitter. With nearly 69 million active U.S. Twitter users (24% of the U.S. adult population) and 328 million monthly active users worldwide, Twitter is one of the biggest social networks worldwide. Understandably, hopes are high that tweets mentioning scientific articles and research findings can reach peers and the general public. Studies show that most of the engagement with scientific papers on Twitter takes place among members of academia and thus reflects visibility within the scientific community rather than impact on society. However, there are ways to reach the broader public. This webinar will provide an overview of using Twitter to reach peers and non-specialist groups, the relationship between tweets and citations, and provide tips for building an academic Twitter presence.
Speaker: Katja Reuter, PhD, Assistant Professor of Clinical Preventive Medicine at the Institute for Health Promotion and Disease Prevention Research in the Department of Preventive Medicine at the Keck School of Medicine of USC; Director of Digital Innovation and Communication for the Southern California Clinical and Translational Research Institute (SC CTSI).
Learning objectives:
1. Describe the strengths and limitations of using Twitter for the dissemination of scientific research.
2. Describe practical approaches for building an academic presence on Twitter.
3. Describe approaches to identify and reach different audiences on Twitter.
Opponent's questions in the public examination of Marcus Duveskog's doctoral dissertation, School of Computing, University of Eastern Finland, January 29, 2015.
Joining the ‘buzz’ : the role of social media in raising research visibility ...Eileen Shepherd
[This presentation is based on my previous presentation, of the same title, at the LIASA 2014 conference. It was presented as a webinar for LIASA Higher Education Libraries Interest Group on 6/11/2014]
Traditional bibliometric methods of evaluating academic research, such as journal impact factors and article citations, have been supplemented in the past 5-10 years by the development of altmetrics (alternative metrics or article level metrics). Altmetrics measures impact of research, data and publications, such as references in data and knowledge bases, article views, downloads and mentions in social media and news media. This presentation gives a brief background to altmetrics and demonstrates how Rhodes University librarians are using social media to raise the visibility of the research output of their institution. (Rhodes University is in Grahamstown, South Africa)
Joining the ‘buzz’ : the role of social media in raising research visibility at Rhodes University, Grahamstown, South Africa - HELIG Webinar presented by Eileen Shepherd
Similar to A systematic literature review of academic cyberbullying 2021 (20)
This presentation will address how the negative phenomenon of academic cybermobbing is a novel form of censorship that the orthodoxy exercises where the stronger tools of 'Undone Science’ and narrative control within Higher Education by external funders seem to have failed.
The background on the Shushmoji app presented to Youngling. Its interns will be working to complete an Android update this year and an Apple version for launch in 2022.
If you are interested in sponsoring SAICSIT2020, kindly view this presentation. Our virtual conference presents a special opportunity to reach 100 experts and 50 emergent researchers in CS and IT. Do contact me (SAICSIT2020's web and sponsorship chair) or CPUT's Advancement Department for more information.
By contrast to often celebratory accounts of teaching contemporary digital media literacies, my thesis describes how the technological and material inequalities between students at a government and an independent school became mirrored in digital portfolios. Presented at the 8th International Conference on Multimodality http://www.8icom.co.za
A Design Development and Research Conference 2014 presentation for a co-authored paper exploring two students' cases in very different formal and extra-mural contexts and the workarounds both made when preparing digital self-presentations and online portfolios.
Learners' relationships in class, and outside it, are important contributors to their self-presentation in e-portfolios as Visual Arts learners or performances in other roles.
I explore a cross-section of five e-portfolio examples from 29 learners. I describe the varied relationships and identities their choices reflect. Understanding these aspects is relevant for helping address a gap in research literature.
It is also important for educators to cater for in their design of e-portfolio syllabi. In particular, educators must do their best to ensure that e-portfolios do not simply amplify the privileges of richly-resourced learners or reflect the paucity of under-resourced ones.
This presentation explores the aspects of significance that are reflected in the extent, type and variety of design choices that Visual Arts learners make in designing e-portfolios. These include; attitudes to the disciplines in the school subject, relationships in constructing the e-portfolio and orientation to current and future audiences. A pedagogic reflection suggests that Visual Arts educators include these aspects when teaching e-portfolio curricula. Reflecting on their art, potential collaborators and audiences may help learners make more coherent choices.
This presentation describes how indicators for Connected Learning are present in the extra-mural presences that two University of Cape Town students created.
An exploration of secondary school students’ multimodal choices with online portfolios in 2010.
It introduces the research area; my 2010 fieldwork and findings. It then gives some initial conclusions and suggestions for future research.
Using Activity theory to study the factors influencing the sustained adoption of e-portfolio curricula by secondary school Visual arts educators in South Africa.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
A systematic literature review of academic cyberbullying 2021
1. A systematic literature
review of academic
cyberbullying- notable
research absences in
Higher Education
contexts
1
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
Presenters
Dr Patricia Harpur
Cape Peninsula University of Cape Town
Faculty of Informatics and Design, Applied Design
Dr Travis Noakes
Cape Peninsula University of Cape Town
Faculty of Informatics and Design, Applied Design
Two articles from the Online
Academic Bullying (OAB) project
Distinguishing an online academic
bullying
proposed a framework for analyzing
online academic bullying as a distinctive,
negative phenomenon.
Cyberbullying Analysis in
Higher Education
The OAB’s third manuscript
explores what research has been
done into academic cyberbullying
to help inform the OAB’s research
program.
‹#›
The value (or otherwise) of social
media to the medical professional:
some personal reflections
Third OAB manuscript
2. Presentation overview
STEPPING INTO THE RESEARCH
1. Online Academic Bullying (OAB) research team
2. Global growth in cyber harassment research
3. Increased research in workplace bullying in Higher Education
4. Minimal research into scientific dissenters’ digital voices
5. The value (or otherwise) of social media to the medical
professional: some personal reflections
6. Distinguishing online academic bullying
A SYSTEMATIC LITERATURE REVIEW (SLR)
7. Who do we understand to be marginalized academics?
8. Planning the SLR
9. Selection in the SLR
10. Extraction for the SLR
11. Execution of the SLR
12. SLR’s limitations
EVIDENCE – FINDINGS ON THEMES
13. Defining cyberbullying
14. Personality traits
15. Behavior patterns
16. Dealing with cyberbullying
17. Academic contexts
16. Next steps
REFLECTIONS – POWER CREATES GAPS
18. Where are the whistleblowers and dissidents?
19. Academic free speech on controversial science
20. Future online academic bullying research
NEXT STEPS
22. OAB’s future research priorities
23. Conclusion – transdisciplinarity
24. Appreciation and credits
ACKNOWLEDGEMENTS
introducing our presentation’s structure
A systematic literature review of academic cyberbullying
2
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
3. stepping into the research
About the lead author
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
3
Dr Patricia Harpur completed a D.Tech Information
Technology degree, focusing on mobile technology-
enhanced learning. She is an active academic, supervisor
and mentor in higher education contexts. She embraces the
challenges of research methodology and quality in
productivity and effectiveness, applying ‘guide-on-the side’
strategies. She ascribes to a constructivist philosophy,
learning from and sharing alongside others.
https://www.researchgate.net/profile/Patricia-Harpur-2
https://scholar.google.co.za/citations?user=n1-qgFAAAAAJ&hl=en
DR PAT HARPUR
‹#›
4. About the second author
stepping into the research
Dr Travis Noakes’ research has explored visual arts students’ e-
portfolio designs for connected learning and UCT journalism
students’ designs of data infographics.
As part of the ‘Online Academic Bullying’ (OAB) research team,
he explores health experts’ use of digital platforms for promoting
an emergent scientific paradigm and their negotiations of cyber
harassment.
https://orcid.org/0000-0001-9566-8983
https://publons.com/researcher/1881059/travis-miles-noakes/
https://www.semanticscholar.org/author/Travis-M-Noakes/144922761
https://scholar.google.co.za/citations?user=-beyzEoAAAAJ&hl=en
https://www.researchgate.net/profile/Travis-Noakes-2
https://capepeninsula.academia.edu/TravisNoakes?from_navbar=true
TRAVIS NOAKES, PhD
4
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
5. stepping into the research
DIVERSE DISCIPLINES
Online Academic Bullying (OAB) research team
5
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
Based in the Cape Peninsula University of Technology (CPUT),
Faculty of Informatics and Design, Applied Design
Principal investigators
Adjunct Professor Tim Noakes
Associate Professor Izak van Zyl
Co-investigator, project manager, legal and funding
proposals
Dr Travis Noakes of Informatics
Co-investigator & data analyst
Dr Pat Harpur
Psychologist
Dr Cleo Protogerou (California MERCED/ UCT)
Statistical analyst
Dr Corrie Uys
www.researchgate.net/project/Online-academic-
bullying
1. Preparing a definitive framework for OAB
2. Describing Insulin Resistance (IR) scholars’
successful exercise of digital voice
3. Defining academic cybermobs (contrast
versus academic mobs)
4. Describing the qualities of legitimate, informal,
academic debates online concerning state of
the art IR news, with examples.
Four main scholarly objectives
News via the OAB’s ResearchGate channel
6. stepping into the research
SUPPORTING TNF’S RESEARCH INTO ACADEMIC FREE SPEECH AND DIGITAL VOICES
Online Academic Bullying (OAB) data extraction team
6
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
The Noakes Foundation is the founder sponsor of Younglings’ SMILR lab at
www.linkedin.com/posts/younglingsafrica_empowering-software-development-interns
Infrastructural funder- payments and funding proposals
Jana Retief
Software development support
Python software code for social media data analysis
queries
API1 and 2 data dictionary applications
Run bulk data extraction from queries of Twitter’s
Standard Search API (1 and 2)
Import data into QDAS (eg Atlas.ti, NVivo))
Software interns
Younglings Africa
Software development interns
Mentor
Senior software developer
Cheryl Mitchell
7. stepping into the research
COMMON DEFINITION
What is harassment?
7
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
What is harassment?
Harassment is typically understood as a willful and malicious
‘course of conduct’ directed at a person that would cause a
reasonable person to suffer substantial emotional distress and
that does cause the person to suffer distress.
(Citron, 2014:124)
www.hup.harvard.edu/catalog.php?isbn=9780674659902
8. stepping into the research
PERSISTENT HARM ON A MYRIAD OF DIGITAL PLATFORMS
Cyber harassment is a very negative phenomenon
8
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
The cyber label captures the different ways the Internet can
exacerbate the injuries suffered. (Citron, 2014:3)
Cyber harassment consists of repeated ‘online speech’ (digital
media- text, image, video) that is often an anti-social, low-value
contribution to discourse.
It can involve threats of violence, privacy invasions, reputation-
harming lies, calls for strangers to physically harm the victims and
technology attacks.
Cyber harassment is not an isolated incident, but rather features
repeated attacks.
9. stepping into the research
EXPECT ATTACKS FROM ALL SIDES REGARDLESS OF POSITION
Workplace bullying, harassment and mobbing in the Academe
9
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
https://doi.org/10.1007/978-981-10-5154-8_13-1
Professor Loraleigh Keashly’s (2019:62) review of the
global literature on bullying in academe, particularly
involving faculty, confirmed that research interest
has increased substantially in the past decade, which
on its own is a notable indicator of its importance.
The literature suggests that faculty with marginalized
social identities and lower organizational rank are the
most vulnerable. Examination of the intersectionality of
these identities reveals that not even tenure or high
organizational status can protect some faculty from
being bullied.
Faculty bullying recipients “get it from all sides”. They
are bullied by internal actors such as colleagues,
students and administrators, but also by external actors
such as the state and increasingly the public through
online harassment.
10. stepping into the research
CYBER HARASSMENT FROM HIGHER EDUCATION EMPLOYEES
Is online academic bullying a distinctive threat?
10
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
FORMS OF CYBER HARASSMENT
1. Cyberstalking and hyper-surveillance
2. Deception
3. Trolling and flaming
4. Cyberbullying
5. Pariah profiles (eg on “rationalwiki’)
6. Invasion of privacy - doxxing
7. Revenge porn
8. Encouraging self-harm and suicide
9. Endorsing extremist views and terrorism
11. stepping into the research
CYBER HARASSMENT FROM HIGHER EDUCATION EMPLOYEES
A systematic literature review of academic cyberbullying
11
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
CRediT author statement
Pat Harpur
Conceptualization, Methodology, Writing
- Original Draft, Visualization
Travis Noakes
Investigation, Writing - Review & Editing
Tim Noakes
Funding Acquisition, Supervision, Writing
- Review & Editing
This foundational study explores the
themes and descriptors that are prevalent
in the academic cyberbullying research
literature. While a growing body of
research addresses the negative
phenomenon of cyber harassment in
higher education, it can be unclear which
topics are most popular. Likewise, there is
a gap concerning those ideas and
descriptors that are important but
neglected.
12. a systematic literature review
ETHICS AND RESEARCH LIMITATIONS
SLR research method’s phases
12
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
Figure 1
Four-phase systematic literature review
strategy, synthesised from Alrasheedi et al.
(2015), Bandara et al. (2011) and Okoli and
Schabram (2010).
13. 13
13
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
a systematic literature review
PHASE 1. PLANNING THE SLR
SLR method- planning
1. Assembling of keywords and phrases served
as a choice of search criteria.
2. Screened articles were captured in EndNote.
3. Selected articles were catalogued and
grouped as custom-defined topics, inclusive
of index sortation, attachments, author(s),
year, title, source type and research notes.
ADD ATLAS SCREENGRAB?
14. 14
14
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
a systematic literature review
PHASE 2. SELECTION
SLR method- selection
1. Phase 1’s literature sources
were appraised for relevance,
limiting the scope of the review
(Fink, 2019).
2. This led to a focused selection
process comprising three further
iterations, determined by
inclusion and exclusion criteria.
The inclusion (I1 to I6) and
exclusion (E1 to E6) criteria
listed below were applied to the
211 articles emerging during
Phase 1.
3. The inclusion and exclusion
criteria listed in Table 2 were
defined by search terms.
Table 2. Inclusion and exclusion criteria
15. 15
15
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
a systematic literature review
EXTRACTION
SLR method- extraction
1. Exclusion criteria resulted in a reduced set of 104 articles.
2. Iteration 3 addressed noted gaps linked mainly to marginalised
academics and led to the addition of 4 articles, increasing the
final number of publications to 108 articles.
3. Thereafter, each article was evaluated, applying the following
four customised quality assurance criteria (QAC) informed by
Inayat et al. (2014) and Kitchenham et al. (2009):
QAC1: Are aims of the article suitably aligned to this study?
QAC2: Does the article focus on issues in online bullying of marginalised
academics in higher education contexts?
QAC3: Is there an easily identified framework or set of criteria?
QAC4: Are the findings of value for the synthesis of a framework?
4. An ordinal scale was applied where Yes = 1, Nominally = 0.5 and
No = 0. Ratings resulted in an aggregated index for each article
with the possibility of minimum and maximum values of 0 and 4
respectively (Alrasheedi, Capretz and Raza, 2015).
5. Table 2 represents an illustrative sample of the finalised
evaluation outcomes. This evaluation process achieved an
overall aggregated index of 82.3%.
16. 16
16
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
a systematic literature review
EXTRACTION, CONT.
SLR method- execution
During ‘Phase 3 – Extraction’, words and phrases – quotations
from selected articles – were extracted and open-coded in
readiness for the synthesis to be performed (Okoli and Schabram,
2010). This step divided data into manageable pieces to support
understanding and categorisation (Dey, 2003). The extraction
process was iterative and applied to “…systematically capture,
code, and analyse the literature within one single repository…”
(Bandara, Miskon and Fielt, 2011:3). Further iterative
development of a theoretically-based and customised codebook
evolved in parallel (Saldaña, 2012, Friese, 2014).
Axial coding of extracted content comprised a refinement of initial
codes leading to a focused emergence of patterns and
connections between encoded snippets. This process aimed to
establish framework elements (Seidel, 1998). Nodes provided
locations for encoded segments, enabling the labelling and
organisation of text sections.
18. 18
18
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
a systematic literature review
EXECUTION
SLR method- execution
Query functionality and the construction of memo
snippets supported pattern searching. Writing of
memos recorded research anecdotes and created
opportunities for reflection, analysis, integration and
interpretation. In addition, memo content supported
interpretive synthesis achieved in ‘Phase 4 –
Execution’. Finally, selective coding (Strauss and
Corbin, 1994) sought to identify core categories,
providing a central hierarchy rather than a peripheral
framework structure.
Figure 2 sets out and summarises the relationships
between encoded article snippets, emergent themes,
and codes
Figure 2 Framework of themes (n=5) and codes (n=33)
19. 19
19
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
a systematic literature review
EFFORT, SCOPE AND COIs
Limitations and ethical concerns
SLR METHOD
Much greater effort required than other literature review forms (eg narrative review)
Searches limited to Google Scholar
Not focused on databases
Focused on journal articles versus other formats
BIAS
Share the Atlas.ti file for reviewers and others to scrutinise
Encourage critical feedback on our work from other researchers (DRAW)
Do the corrections suggested by reviewers
CONFLICTS OF INTEREST (COI)
Declare potential conflicts of interest to the editor
1. Tim and Travis Noakes are directors at TNF, which makes our research possible
2. TNF research funding only goes to work by Younglings and data analysts
3. No authors are remunerated from TNF (TNF’s policy is to never pay family
members, thereby avoiding a financial COI)
20. evidence – findings on themes
Common research themes
20
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
DEFINITIONS, TRAITS, BEHAVIOURS, RESPONDING, HIGHER ED
1. Academic cyberbullying defined
2. Personality traits
3. Behaviour patterns
4. Dealing with cyberbullying
5. Academic contexts
Sound definitions of a negative phenomenon
Explaining the psychology of perpetrators
Documenting forms of cyber-harassment
Describing responses to cyberbullies
Situating academic cyberbullies and online
academic bullying
21. evidence - findings on themes
Most popular research theme
21
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
PERSONALITY TRAITS
22. evidence - findings on themes
Second most popular research theme
22
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
BEHAVIOR PATTERNS
23. evidence - findings on themes
Second least popular research theme
23
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
C. DEALING WITH CYBERBULLYING
24. evidence - findings on themes
Least popular research theme
24
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
ACADEMIC CONTEXTS
25. Reflections
25
25
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
conclusions – important gaps and research opportunities
NOTABLE ABSENCES IN AN ACADEMIC CYBERBULLYING RESEARCH
Definitions
- a myriad of roles in cyber-harassment?
- academic cybermobs?
Personality traits
? Behaviour patterns
? Dealing with cyberbullying
- Detection and preventative policies?
- Practical support for academic employees targeted
by cyberbullies?
? Academic contexts
- Digital platform affordances for scholars’ voices?
- Successful negotiations of cyber harassment?
- Whistleblowers and dissidents’ experiences
- Impacts on academic free speech
Much research has been done to accurately define cyberbullying and
other forms of cyber-harassment. There is also extensive coverage
for cyberaggression, cyberbullying activities, recipients’ coping
practices, victimization and its impacts. By contrast, the important
topics of freedom of speech, dissenting academics, whistle-blowers
and protective factors have been neglected.
This suggests an opportunity for researchers to grow our
understanding through describing academics’ experiences of online
academic bullying. It is also important that the role of social media
platforms and Higher Education institutions are explored, particularly
in their policy measures and related protective initiatives for
defending recipients from online incivility and other forms of cyber
harassment. Future research in the field should also address whistle-
blowers and dissenting scholars’ experiences of this negative
phenomenon and its role in constraining recipients’ academic free
speech.
26. conclusions – important gaps and research opportunities
Speech is not free in the academic science field
26
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
IT IS LIKELY TO BE ACADEMIC CAREER SUICIDE TO CHALLENGE THESE POWERFUL ORTHODOXIES
1. The Cholesterol Model of Chronic Death and Disease is supported by Evidence Based Medicine.
2. Climate scientists are certain that rising temperatures are largely caused by increased CO2 emissions.
3. The high costs of environmental sustainability must trump all other social considerations.
4. Vaccines are completely safe for all recipients over the long term.
5. COVID-19 is a pandemic with natural origins.
6. Lockdowns, mass vaccinations and health passports are the optimal response to COVID-19 risks.
DISSENTERS AND WHISTLEBLOWERS GO EXTINCT
27. 27
27
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
a systematic literature review
WHISTLEBLOWERS AND CHALLENGERS OF BELIEFS SHOULD BE CONSIDERED
Who are marginalized academics?
Protected classes
Race
Gender
Disabled
Sexual preference
Unprotected scholars
Whistleblowers
Unorthodox, but well-argued
viewpoints that challenge powerfully
entrenched beliefs
Marginalised demographics Anti-hegemonic positions
28. 28
28
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
a systematic literature review
EXPLORING HARASSMENT ACROSS THE ACADEMIC STAR COMPLEX
Being a shining star won’t save dissidents
THE ACADEMIC STAR-COMPLEX
1. Public intellectuals Independent of a university First tier academic celebrity
2. Scholar University affiliated (established career) Second tier microocelebrity
3. Wannabe starlet University affiliated (early career) Third tier microcelebrity
4. Failed starlet Former scholar, middle management Fourth tier bureaucrat
5. Given up Heavy lecture load, lots of drudge work Fifth tier lecturer
<Large untenured underclass in 3,4 and 5 support 1 and 2>
The HE field produces a limited number of winners, while the majority will be defined as
mediocre. Dashed dreams are the norm for many actors. Success depends on extant
social capital, merit (to a point) and random luck. (Fleming, 2021:124)
29. next steps
REFINE THE OABRAT FRAMEWORK
Primary OAB research contributions
29
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
Test the OABRAT framework in ‘Distinguishing online academic bullying’
1. Does the OABRAT framework work for Insulin Resistance experts
on tiers 2 and 3?
Case studies from the OABRAT questionnaire:
i. Public Intellectual
ii. {Scholar}
iii. Early stage researcher targeted by Dean(s) {Wannabe starlet}
iv. Mature PhD/PostDoc student targeted by Professor(s) {Wannabe starlet}
v. Dietitian/Nutritionist targeted by formal bodies, uni employees and peers
vi. Doctor targeted by formal bodies and peers
2. What successes (and failures) do a few experts describe in using digital voice?
3. How do these experts negotiate cyber harassment on digital platforms?
4. How do experts discuss state-of-the-art science news via microblogging?
5. How were these IR experts targeted by academic cybermobs on Twitter?
OAB research goals
1. Prepare the definitive framework for
OAB
2. Describing Insulin Resistance (IR)
scholars’ successful exercise of digital
voice
3. Defining academic cybermobs
(contrast versus academic mobs)
4. Describing the qualities of legitimate,
informal, academic debates online
concerning state of the art IR news,
with examples.
30. next steps
From interdisciplinary to transdisciplinary research
30
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
DISCIPLINARY RESEARCH VERSUS OTHER FORMS
In their chapter Cyberhate, communication and transdisciplinarity, Associate Professor Emma Jane and
Dr Nicole Vincent argue about the perils of mono-disciplinarity (2020:183). They describe how
communication studies researchers who have followed a narrow lens in in exploring cyber harassment
have discounted its severity and impacts. By framing aggressive or hostile communications as ‘mere
miscommunication’ such researchers have hindered their own discipline’s development and,
inadvertently, supported cyber-aggressors and cyberhate apologists.
Communication studies is inherently multi-disciplinary/interdisciplinary in nature (Dutton, 2013:8).
Nevertheless, the rigid approaches and orthodoxies associated with with various disciplines have still
tended to produce fragmented and incomplete coverage of online hostility in the literature (Janes,
2015). Jane and Vincent argue that a transdisciplinary approach can produce a holistic description of
cyber harassment as a real-world problem.
31. FIVE DISTINCT FEATURES
31
31
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
Applying transdisciplinary research
Disciplinary Interdisciplinary Multidisciplinary Transdisciplinary
Qualitative Qualitative Quantitative Mixed methods
i. Tackling complex, real-world problems
ii. where the nature of the problem itself may be obscure or in dispute and that therefor
iii. demands that scholars transcend disciplinary paradigms and bridge science with practice
iv. partly by seeking out and integrating diverse views of multiple stakeholders
(including those outside academia)
v. with the aim of devising analyses and interventions which promote human flourishing.
32. acknowledgements
THE NOAKES FOUNDATION and CPUT DHET
Thanks to our funders
32
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
TNF’s Academic Free Speech and Digital Voices theme
https://thenoakesfoundation.org/portfolio-items/online-
academic-bullying
TNF’s Lab for Low Carb Nutrition Research
https://www.researchgate.net/lab/The-Noakes-Foundation-
Lab-for-Low-Carb-Nutrition-Research-Timothy-D-Noakes
DHET URF grant
FID Research Committee publication fund
33. gratitude
Thanks for watching, watch again on Slideshare
33
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
‹#›
https://creativecommons.org/licenses/by-nc-sa/4.0/
https://www.slideshare.net/TravisNoakes
34. GRAPHICS CREDITS
34
34
Presentation by Dr Pat Harpur and Dr Travis Noakes 2021/10/22
emoji sticker illustrations
Download the App Follow
Stop, academic bully! Stop, bully! Hey, silly ass! Stop, torturer!
Editor's Notes
TRAVIS
Welcome to Dr Pat Harpur and my presentation on a manuscript we have been working on for a special issue of Future Internet
The issue focuses on Cyberbullying Analysis in Higher Education
The salient hyperlinks are up on my blog for your ease-of-clicking- its link is at the top of today’s Zoom chat.
TRAVIS
Here’s the structure of our presentation
After introducing us and the background to the Online Academic Bullying (OAB) research project
We will discuss our Systematic Literature Review on academic cyberbullying and its limitations.
Then we’ll explore the evidence in the themes that emerged from over a hundred papers
and focus on the notable research absences in academic cyberbullying research.
We will discuss the potential implications for research projects such as our team’s,
Before tackling what this means for the OAB project’s research priorities.
PAT
Dr Pat Harpur CPUT and
TRAVIS
Add
TRAVIS
Pat and I are two of the six researchers in the OAB project.
The SLR article falls within the OAB project’s first aim on the right,
Since it helps the research team double-check if they have covered all aspects of OAB so that its model is truly definitive.
The SLR also helps as pathfinder project fin potentially confirming the other three project objectives address notable gaps.
TRAVIS
In addition to the research team, the OAB also includes a senior software data analyst mentor
and two interns who extract Twitter data at Younglings Social Media and Internet research lab
for import into qualitative data analysis software.
TRAVIS
Daniel Citron’s excellent book, ‘Hate Crimes in Cyberspace’, provides this common definition for harassment
which focuses on impacts on the recipient from cyberbullies’ willful and malicious content.
TRAVIS
The term ‘cyber harassment’ is necessary, as Citron points out, for describing how the reach and pervasiveness of the internet can exacerbate
the injuries that targets suffer in digital spaces.
Here, there is an interesting paradox between how the texts, images, sounds and videos shared by the perpetrators of cyber harassment may seem banal and trivial
BUT the impact of this content can threaten families, careers and lives!
Repeated privacy invasions, threats of violence and attacks on a target’s reputation may sabotage their professional and family lives, future opportunities and even lead to suicide or target’s “going postal”.
TRAVIS
The negative impacts of embodied and cyber harassment also impinge on the Higher Education workplace,
Where research interest in workplace bullying, harassment and mobbing has increased substantially.
Professor Loraleigh Keashly’s illuminating literature review points out that academics with marginalized social identities are the most vulnerable,
but even faculty with tenure and high organizational status can be at risk from bullying ‘on all sides’.
Prof Keashly notes that academics also face increased targeting from the state and the public.
TRAVIS
The OAB project argues that this cuts both ways, as Prof Noakes and my ‘Distinguishing online academic bullying’ article flags.
Distinctive forms of cyberbullying can be launched from Higher Education employees who target
dissident individuals, such as low-carbohydrate, insulin resistance paradigm supporters,
for “wrongthink” outside today’s dominant orthodoxy.
While the forms on the right are subtle compared to the extreme ones at the bottom of the left, such as encouraging suicide,
the effects of daily criticism and persistent victimization can be as bad.
PAT
I joined the OAB research team in November last year.
In discussing options for potential publication, I recommended that I lead a Systematic Literature Review (SLR)
on what the literature on academic cyberbullying tells us.
Our paper focuses on which themes and sub-topics are popular,
as well as those which are not, or absent, but may still be important to address.
PAT
To understand what researchers are focused on in cyber-harassment,
I followed the four-phase systematic literature review strategy illustrated here.
I will describe each phase in the next few slides…
PAT
Distinguishing online academic bullying’s bibliography was over 200 publications long.
ADD
PAT
In the second phase, the inclusion and exclusion criteria on the right were applied.
ADD
PAT
For the extraction process
ADD
PAT
Selection phase
ADD
PAT
Execution
ADD
PAT
In terms of the SLR limitations…
There is a form of ‘journal reification’ in focusing on articles, versus other types of publication.
TRAVIS
In terms of bias, we aim to make our analysis materials accessible online,
take in your critical feedback
and make the necessary corrections from reviewers.
As recriticising past OAB research outputs on Twitter,
critics like to tweet about
potential COI related to Prof Noakes and my roles in TNF, being relatives and concerns around funding
We answer these in our COI statement to the editor
that addresses the points listed here.
In this manuscript’s case, none of the authors have been paid by TNF.
PAT
The five themes the SLR identified are shown here in order of popularity.
PAT
Personality traits
PAT
Behaviour patterns
PAT
Dealing with cyberbullying
PAT
Least popular research theme is academic contexts
TRAVIS
The importance of preparing sound definitions of different forms of cyber harassment is evident in this topic’s popularity.
However, there is still an opportunity under this theme to address combinations of roles and defining academic cybermobs.
Psychologists are addressing the personality traits of cyber aggressors,
but more descriptions of aggressors’ behavior patterns are needed.
In writing the manuscript, we learnt that what is not being said is very important.
Power shapes important absences concerning research into dissenters and whistleblowers in the academic workplace.
More research should be done in the HE context on detection and preventative policies,
plus offering practical support for recipients of harassment.
There is also an opportunity to contribute regarding whistleblowers and dissidents’ experiences
as well as how cyber harassment has emerged as a new threat to academic free speech.
TRAVIS
This is vitally important in the science field
where tenure and academic free speech, in theory, should support the dissent
that is integral to the scientific method and challenging existing paradigms, potentially producing better models.
None of the powerful orthodoxies shown here should be treated as being beyond scientific critique
despite what their powerful hegemons may argue.
Because if they prove to be wrong, the ramifications for science and society may be huge
in shaping the most humane responses to major problems.
TRAVIS
Issues of power and politics shape what researchers may focus on.
It is great that there are workplace policies in place that the protected classes on the left can successfully leverage
Such policies have developed out of the lived-experiences and strong activism of marginalized groups and actors.
Likewise there is a practical contribution that for whistleblowers and dissidents might be better protected
For example, through university policies against cyber aggression by academic peers.
TRAVIS
There is also an opportunity to explore variations by in the experiences of cyber harassment according to field position.
I have struggled to find a microcelebrity scale for academics on Twitter or other platforms
but field theory enables researchers to define academics’ contrasting positions in an ‘academic star complex’.
In Higher Education, Fleming describes these five tiers
Employees may range from the public intellectual at the top to those who have given up at the bottom.
This framing is helpful for guiding who to approach for writing about by tier.
The experiences of a public intellectual may be far more extreme than a young scholar, say.
TRAVIS
Such considerations will inform future research on the online academic bullying framework,
which was informed by a public intellectual’s experiences that could well be an outlier.
The SLR confirms that the OAB project’s goals on the left can make worthwhile contributions to closing gaps in the literature.
The project team will continue working to answer the questions on the right…
and developing a set of case studies across the HE field for IR dissidents.
TRAVIS
From a methodological approach, the OAB project papers have either been disciplinary or interdisciplinary collaborations.
We would like explore a transdisciplinary approach, following Associate Professor Emma Jane and Dr Nicole Vincent’s recommendation
that such an approach is helpful for avoiding the pitfalls of mono-disciplinarity in communication studies research concerning
what can be an opaque, real-world problem.
TRAVIS
TNF
CPUT DHET URF
TRAVIS
Thanks very much to David and Alletia for encouraging us to do this talk for DRAW
and thank you to the audience for your attention.
Hopefully, we have a few minutes for questions or comments?