Authors retain the copyright without restrictions for their published content in this journal. HSSR is a SHERPA ROMEO Green Journal.
Publishing License
This is an open-access article distributed under the terms of
THE EFFECTIVENESS OF A PROPOSED PROGRAM BASED ON THE STORY STRATEGY TO EDUCATE PRE-SCHOOL MOTHERS ABOUT WAYS TO PROTECT THEIR CHILDREN FROM ELECTRONIC HARASSMENT
Corresponding Author(s) : Afaf Mamdouh Mohamed Abdel Razek Barakat
Humanities & Social Sciences Reviews,
Vol. 8 No. 4 (2020): July
Abstract
Purpose of Study: The study aimed to show and clarify the effectiveness of the proposed program based on the use of story strategy in educating mothers of preschool children from electronic harassment and the negative effects of internet use.
Methodology: It indicated the importance of controlling and following up the use of children's websites and programs in general and in particular their excessive use of all social networking and instant messaging sites as they fastest and cheaper without parental control which makes them vulnerable to electronic harassment especially who use this sites without awareness of their danger .the program was applied on a sample consisting of (30) mother's of preschool children's in fayoum governorate, sinuras center.
Result: The study found the effectiveness of the proposed program by using life stories in educating mother's of preschool children in ways to protect their children from electronic harassment, and also recommended that the role of parents in sensitizing children's to the harm caused by the use of smartphones and tablets should be enhanced and the importance of mother's devoting special to their children in addition to the need to provide sports activities through the family in use the child time and legalize the use of telephones, and theater storybooks to inform children about the importance of safe surfing and the need to download privacy protection program into virtual world sites.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- Abu Zaid, A. (2011). Social Networks. Soft Censorship, Al-Arabi Magazine, No. (627), pp. 32-36.
- Abdel Nour, Jabbour (1984) Literary Lexicon. Beirut: House of Knowledge for Malians.
- Abdel Hamid, M. (2007). Communication and Media on the Internet.
- Adeniran, A.I.( 2008). The Internet and Emergence of Yahooboys sub-Culture. International Journal of Cyber Criminology, (2):368-381.
- Al-Badania, Diab. (2009). Virtual Crime. A paper presented to the International Conference on Legal Regulation of the Internet, Jumiah.
- Al Badayneh, D. (2013). Human Behavior: When and where virtual Society meets physical Society?. European Journal of Science and Theology, Vol.9, No.1, 3-17.
- Al-Musbahin, Muhail, M. (2013). The effect of using an improvised story strategy on developing the skills of flexibility and stylistic skills.
- Angela, T, O. (2003). Cyber Crime Programs By Satae and Local Law Enforcement: A preliminary Analysis of A National Survey. Unpublished Thesis. California State University, Eric- ED 873 141.
- Asindemade, S.O. (2011). Understanding Cybercrime Perpetrators and the Strategies They Employ. Cyberpsychology, Behaviour and Social Networking, Eric- ED 273 549.
- Atili, Taqwa, and Nasr, Hamdan (2015). The impact of teaching Islamic education on the two strategies of storytelling and online In improving the visualization skills of the basic stage in Jordan, The Jordanian Journal of Educational Sciences, 537-525, 11 (4). https://doi.org/10.1089/cyber.2012.0079 DOI: https://doi.org/10.1089/cyber.2012.0079
- Baas, N., De Jong, M. D., & Drossaert, C. H. (2013). Children's perspectives on cyberbullying: Insights based on participatory research. Cyberpsychology, behavior, and social networking, 16(4), 248-253.†https://doi.org/10.1093/sf/65.4.1035 DOI: https://doi.org/10.1093/sf/65.4.1035
- Blau, S, Judith. (2007). Routine Activities and Rates of Crime: A Macro Level Analysis". Social forces, 65: 1035-1052. DOI: https://doi.org/10.1093/sf/65.4.1035
- Burruss, G.W,(2010). Social Learning and Cyber Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World. Journal of Crime and Justice.
- Bursik, R. J. Jr. (2008). Low Self-Control and Imprudent Behavior. Journal of Quantitative Criminology, Vol. 9, No. 3, Eric - ED 342 532.
- Butler, Z., Howcroft, G., & Elizabeth, P. (2014). Cyber Bullying Among Children and Adolescents: A Systematic. African Cyber Citizenship Conference(ACCC2014) (15).â€
- Chawki, M., & el Shazly, Y. (2013). Online sexual harassment: Issues & solutions. J. Intell. Prop. Info. Tech. & Elec. Com. L., 4, 71.†https://doi.org/10.2307/2094589 DOI: https://doi.org/10.2307/2094589
- Cohen, Lawrence E., and Marcus Felson. (2007). Social Change and Crime Trends: A Routine Activity Approach. American Sociological Review, Eric- ED 588-608. DOI: https://doi.org/10.2307/2094589
- Ellen, deLara., Garbarino, James. (2003). And Words Can Hurt Forever: How to Protect Adolescents from Bullying, Harassment, and Emotional Violence. New York: Free Press. ISBN 0-7432-2899-5.
- Felson, Marcus, and Ronald V. Clarke. (2008). Opportunity Makes the Theif: Practical Theory for Crime Prevention. Police Research Series. Paper 98. Research, development and Statistics Directorate. London. https://doi.org/10.1016/j.chb.2012.11.008 DOI: https://doi.org/10.1016/j.chb.2012.11.008
- Fenaughty, J., & Harré, N. (2013). Factors associated with distressing electronic harassment and cyberbullying. Computers in human behavior, 29(3), 803-811. https://doi.org/10.1080/07418829700093331 DOI: https://doi.org/10.1080/07418829700093331
- Forde, R, David. and Leslie W. Kennedy. (2012). Risky Lifestyles, Routine Activites, and the General Theory of Crim. Justice Quarterly, 14:265-94. DOI: https://doi.org/10.1080/07418829700093331
- Fream, W.F. (2005). A Social Learning Theory Analysis of Computer Crime among College Students. Journal of Research in Crime and Delinquency, (Eric- ED 495518.
- Gibbs, John J. and Dennis Giever. (2005). Self-Control and its Manifestations among University Students. An Empvirical Test of Gottfredson and Hirschi's Theory. Justice Quarterly, Eric– ED 122315.
- Giever, D. (2002). An Empirical Assessment of the Core Elements of Gottfredson and Hirschi’s General Theory of Crim. Indiana University of Pennsylvania.
- Giever, J., Kerr, S. (2004). Parental Management and Self-Control: An Empirical Test of Gottfredson and Hirschi’s General Theory. Paper presented at the Annual Meeting of the American Society of Criminology, Miami, FL.
- Haven, K. (2007). Story proof: The science behind the startling power of story. Greenwood Publishing Group.â€
- Hirschi, T,M. (2000). A General Theory of Crime. California: Stanford University Press.
- Jaber, M. (2013). The concept of social communication. Published article, retrieved November 10, 2014. https://doi.org/10.1201/b10718 DOI: https://doi.org/10.1201/b10718
- Jaishankar, K.(2011). Expanding Cyber Criminology with an Avant-Garde Anthology. Jaishankar, K., (ed.) Cyber Criminology. https://doi.org/10.1007/s12103-007-9011-1 DOI: https://doi.org/10.1201/b10718
- Kerbs, John J., Jolley, Jennifer M. (2007). The Joy of Violence: What about Violence is Fun in Middle-School?. American Journal of Criminal Justice. 32, 12. DOI: https://doi.org/10.1007/s12103-007-9011-1
- Kigerl, A., (2014). Routine Activity Theory and the Determinants of High Cybercrime Countries. Social Science Computer Review, 470-486. https://doi.org/10.1177/0894439311422689 DOI: https://doi.org/10.1177/0894439311422689
- Koops, B.J., (2013). The Internet and its Opportunities for Crime In: Herzog-Evans, M., (ed.) Transnational Criminology Manual. Nijmegen, Netherlands: WLP, Eric- ED .735-754. https://doi.org/10.1515/IJAMH.2008.20.2.121 DOI: https://doi.org/10.1515/IJAMH.2008.20.2.121
- Kumpulainen, K. (2008). Psychiatric conditions associated with bullying. International Journal of Adolescent Medicine and Health. 20 (2), 121–32. PMID 18714551. https://doi.org/10.1080/15388220.2013.792270 DOI: https://doi.org/10.1515/IJAMH.2008.20.2.121
- Lovegrove, P. J., Bellmore, A. D., Green, J. G., Jens, K., & Ostrov, J. M. (2013). My voice is not going to be silent: What can parents do about children’s bullying?. Journal of school violence, 12(3), 253-267.†DOI: https://doi.org/10.1080/15388220.2013.792270
- Najjar, F. (2003). Encyclopedic Dictionary of Education Terms, Beirut, Lebanon National.
- National Institute of Justice (NIJ), US Department of Justice, Office of Justice Programs, & United States of America. (2015). Children Exposed to Violence Meeting Notes, October 20-21.†https://doi.org/10.25078/yb.v1i1.716 DOI: https://doi.org/10.25078/yb.v1i1.716
- Oktarina, P. S. (2019). Innovative teaching strategies for teaching reading: Reciprocal teaching strategy and face story strategy. Yavana Bhasha: Journal of English Language Education, 1(1).†DOI: https://doi.org/10.25078/yb.v1i1.716
- PCCIP (President s Commission on Critical Infrastructure Protection), (2006).Critical Foundations: Protecting America's Infrastructures. The Report of the President's Commission on Critical Infrastructure Protection, available on : http://www.pccip.gov
- Reddy, Burm. (2002). Schools Initiative: translation by George Yusef, Interim Report on Preventing Violence in Schools
- Reilly, W.P, (2013). Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Laws. Computer and High technology law Journal. Vol. 16., 150, MSW file , available on :www.eric.ed.gov (Eric- ED 915 263).
- Saadeh, J. (2018). Teaching thinking skills, with hundreds of practical examples, 7th Edition Amman: Dar Al Shorouk.
- Shirley, J. M. (2005). Storyteller, story-teacher: A portrait of three teachers’ use of story in elementary classes.â€
- The creativity of a sample of female students of special education at the College of Applied Studies and Community Service / King's University. Saud, The International Journal of Specialized Education, 2 (11), 1064-1081.
- Umar, A., & Wulandari, S. (2019). The Implementation of teaching writing by Using short story strategy to eleventh grade sstudents at man krecek pare Kediri.Lenter. Jurnal Pendidikan dan Pengajaran, 9(4), 56-63.â€
- Veenstra S, W. (2013). High Volume Cyber Crime and the Organization of the Police: The results of two empirical studies in the Netherlands. International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 January – June 2013, Vol 7 (1): 1–17.
- Warner, J.(2011). Understanding Cybercrime: A View from Below. International Journal of Cyber Criminology. https://doi.org/10.1177/0013124507304487 DOI: https://doi.org/10.1177/0013124507304487
- Whitted, K. S., Dupper, D. R. (2007). Do Teachers Bully Students?: Findings From a Survey of Students in an Alternative Education Setting. Education and Urban Society. 40: 329. DOI: https://doi.org/10.1177/0013124507304487
- Whitted, K.S. (2005). Student reports of physical and psychological maltreatment in schools: An under-explored aspect of student victimization in schools. University of Tennessee. https://doi.org/10.1177/147737080556056 DOI: https://doi.org/10.1177/147737080556056
- Yar, M (2014). The novelty of cybercrime: An assessment in light of routine activity theory. European Journal of, 2 (4). DOI: https://doi.org/10.1177/147737080556056
- Zayed, M. and Saadi, F. (2006). The art of writing and expression. Tripoli: Al-Risalah Library.
References
Abu Zaid, A. (2011). Social Networks. Soft Censorship, Al-Arabi Magazine, No. (627), pp. 32-36.
Abdel Nour, Jabbour (1984) Literary Lexicon. Beirut: House of Knowledge for Malians.
Abdel Hamid, M. (2007). Communication and Media on the Internet.
Adeniran, A.I.( 2008). The Internet and Emergence of Yahooboys sub-Culture. International Journal of Cyber Criminology, (2):368-381.
Al-Badania, Diab. (2009). Virtual Crime. A paper presented to the International Conference on Legal Regulation of the Internet, Jumiah.
Al Badayneh, D. (2013). Human Behavior: When and where virtual Society meets physical Society?. European Journal of Science and Theology, Vol.9, No.1, 3-17.
Al-Musbahin, Muhail, M. (2013). The effect of using an improvised story strategy on developing the skills of flexibility and stylistic skills.
Angela, T, O. (2003). Cyber Crime Programs By Satae and Local Law Enforcement: A preliminary Analysis of A National Survey. Unpublished Thesis. California State University, Eric- ED 873 141.
Asindemade, S.O. (2011). Understanding Cybercrime Perpetrators and the Strategies They Employ. Cyberpsychology, Behaviour and Social Networking, Eric- ED 273 549.
Atili, Taqwa, and Nasr, Hamdan (2015). The impact of teaching Islamic education on the two strategies of storytelling and online In improving the visualization skills of the basic stage in Jordan, The Jordanian Journal of Educational Sciences, 537-525, 11 (4). https://doi.org/10.1089/cyber.2012.0079 DOI: https://doi.org/10.1089/cyber.2012.0079
Baas, N., De Jong, M. D., & Drossaert, C. H. (2013). Children's perspectives on cyberbullying: Insights based on participatory research. Cyberpsychology, behavior, and social networking, 16(4), 248-253.†https://doi.org/10.1093/sf/65.4.1035 DOI: https://doi.org/10.1093/sf/65.4.1035
Blau, S, Judith. (2007). Routine Activities and Rates of Crime: A Macro Level Analysis". Social forces, 65: 1035-1052. DOI: https://doi.org/10.1093/sf/65.4.1035
Burruss, G.W,(2010). Social Learning and Cyber Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World. Journal of Crime and Justice.
Bursik, R. J. Jr. (2008). Low Self-Control and Imprudent Behavior. Journal of Quantitative Criminology, Vol. 9, No. 3, Eric - ED 342 532.
Butler, Z., Howcroft, G., & Elizabeth, P. (2014). Cyber Bullying Among Children and Adolescents: A Systematic. African Cyber Citizenship Conference(ACCC2014) (15).â€
Chawki, M., & el Shazly, Y. (2013). Online sexual harassment: Issues & solutions. J. Intell. Prop. Info. Tech. & Elec. Com. L., 4, 71.†https://doi.org/10.2307/2094589 DOI: https://doi.org/10.2307/2094589
Cohen, Lawrence E., and Marcus Felson. (2007). Social Change and Crime Trends: A Routine Activity Approach. American Sociological Review, Eric- ED 588-608. DOI: https://doi.org/10.2307/2094589
Ellen, deLara., Garbarino, James. (2003). And Words Can Hurt Forever: How to Protect Adolescents from Bullying, Harassment, and Emotional Violence. New York: Free Press. ISBN 0-7432-2899-5.
Felson, Marcus, and Ronald V. Clarke. (2008). Opportunity Makes the Theif: Practical Theory for Crime Prevention. Police Research Series. Paper 98. Research, development and Statistics Directorate. London. https://doi.org/10.1016/j.chb.2012.11.008 DOI: https://doi.org/10.1016/j.chb.2012.11.008
Fenaughty, J., & Harré, N. (2013). Factors associated with distressing electronic harassment and cyberbullying. Computers in human behavior, 29(3), 803-811. https://doi.org/10.1080/07418829700093331 DOI: https://doi.org/10.1080/07418829700093331
Forde, R, David. and Leslie W. Kennedy. (2012). Risky Lifestyles, Routine Activites, and the General Theory of Crim. Justice Quarterly, 14:265-94. DOI: https://doi.org/10.1080/07418829700093331
Fream, W.F. (2005). A Social Learning Theory Analysis of Computer Crime among College Students. Journal of Research in Crime and Delinquency, (Eric- ED 495518.
Gibbs, John J. and Dennis Giever. (2005). Self-Control and its Manifestations among University Students. An Empvirical Test of Gottfredson and Hirschi's Theory. Justice Quarterly, Eric– ED 122315.
Giever, D. (2002). An Empirical Assessment of the Core Elements of Gottfredson and Hirschi’s General Theory of Crim. Indiana University of Pennsylvania.
Giever, J., Kerr, S. (2004). Parental Management and Self-Control: An Empirical Test of Gottfredson and Hirschi’s General Theory. Paper presented at the Annual Meeting of the American Society of Criminology, Miami, FL.
Haven, K. (2007). Story proof: The science behind the startling power of story. Greenwood Publishing Group.â€
Hirschi, T,M. (2000). A General Theory of Crime. California: Stanford University Press.
Jaber, M. (2013). The concept of social communication. Published article, retrieved November 10, 2014. https://doi.org/10.1201/b10718 DOI: https://doi.org/10.1201/b10718
Jaishankar, K.(2011). Expanding Cyber Criminology with an Avant-Garde Anthology. Jaishankar, K., (ed.) Cyber Criminology. https://doi.org/10.1007/s12103-007-9011-1 DOI: https://doi.org/10.1201/b10718
Kerbs, John J., Jolley, Jennifer M. (2007). The Joy of Violence: What about Violence is Fun in Middle-School?. American Journal of Criminal Justice. 32, 12. DOI: https://doi.org/10.1007/s12103-007-9011-1
Kigerl, A., (2014). Routine Activity Theory and the Determinants of High Cybercrime Countries. Social Science Computer Review, 470-486. https://doi.org/10.1177/0894439311422689 DOI: https://doi.org/10.1177/0894439311422689
Koops, B.J., (2013). The Internet and its Opportunities for Crime In: Herzog-Evans, M., (ed.) Transnational Criminology Manual. Nijmegen, Netherlands: WLP, Eric- ED .735-754. https://doi.org/10.1515/IJAMH.2008.20.2.121 DOI: https://doi.org/10.1515/IJAMH.2008.20.2.121
Kumpulainen, K. (2008). Psychiatric conditions associated with bullying. International Journal of Adolescent Medicine and Health. 20 (2), 121–32. PMID 18714551. https://doi.org/10.1080/15388220.2013.792270 DOI: https://doi.org/10.1515/IJAMH.2008.20.2.121
Lovegrove, P. J., Bellmore, A. D., Green, J. G., Jens, K., & Ostrov, J. M. (2013). My voice is not going to be silent: What can parents do about children’s bullying?. Journal of school violence, 12(3), 253-267.†DOI: https://doi.org/10.1080/15388220.2013.792270
Najjar, F. (2003). Encyclopedic Dictionary of Education Terms, Beirut, Lebanon National.
National Institute of Justice (NIJ), US Department of Justice, Office of Justice Programs, & United States of America. (2015). Children Exposed to Violence Meeting Notes, October 20-21.†https://doi.org/10.25078/yb.v1i1.716 DOI: https://doi.org/10.25078/yb.v1i1.716
Oktarina, P. S. (2019). Innovative teaching strategies for teaching reading: Reciprocal teaching strategy and face story strategy. Yavana Bhasha: Journal of English Language Education, 1(1).†DOI: https://doi.org/10.25078/yb.v1i1.716
PCCIP (President s Commission on Critical Infrastructure Protection), (2006).Critical Foundations: Protecting America's Infrastructures. The Report of the President's Commission on Critical Infrastructure Protection, available on : http://www.pccip.gov
Reddy, Burm. (2002). Schools Initiative: translation by George Yusef, Interim Report on Preventing Violence in Schools
Reilly, W.P, (2013). Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Laws. Computer and High technology law Journal. Vol. 16., 150, MSW file , available on :www.eric.ed.gov (Eric- ED 915 263).
Saadeh, J. (2018). Teaching thinking skills, with hundreds of practical examples, 7th Edition Amman: Dar Al Shorouk.
Shirley, J. M. (2005). Storyteller, story-teacher: A portrait of three teachers’ use of story in elementary classes.â€
The creativity of a sample of female students of special education at the College of Applied Studies and Community Service / King's University. Saud, The International Journal of Specialized Education, 2 (11), 1064-1081.
Umar, A., & Wulandari, S. (2019). The Implementation of teaching writing by Using short story strategy to eleventh grade sstudents at man krecek pare Kediri.Lenter. Jurnal Pendidikan dan Pengajaran, 9(4), 56-63.â€
Veenstra S, W. (2013). High Volume Cyber Crime and the Organization of the Police: The results of two empirical studies in the Netherlands. International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 January – June 2013, Vol 7 (1): 1–17.
Warner, J.(2011). Understanding Cybercrime: A View from Below. International Journal of Cyber Criminology. https://doi.org/10.1177/0013124507304487 DOI: https://doi.org/10.1177/0013124507304487
Whitted, K. S., Dupper, D. R. (2007). Do Teachers Bully Students?: Findings From a Survey of Students in an Alternative Education Setting. Education and Urban Society. 40: 329. DOI: https://doi.org/10.1177/0013124507304487
Whitted, K.S. (2005). Student reports of physical and psychological maltreatment in schools: An under-explored aspect of student victimization in schools. University of Tennessee. https://doi.org/10.1177/147737080556056 DOI: https://doi.org/10.1177/147737080556056
Yar, M (2014). The novelty of cybercrime: An assessment in light of routine activity theory. European Journal of, 2 (4). DOI: https://doi.org/10.1177/147737080556056
Zayed, M. and Saadi, F. (2006). The art of writing and expression. Tripoli: Al-Risalah Library.