Examining Cyberbullying Bystander Behavior Using a Multiple Goals Perspective

Total Page:16

File Type:pdf, Size:1020Kb

Examining Cyberbullying Bystander Behavior Using a Multiple Goals Perspective University of Kentucky UKnowledge Theses and Dissertations--Communication Communication 2014 Examining Cyberbullying Bystander Behavior Using a Multiple Goals Perspective Sarah E. Jones University of Kentucky, [email protected] Right click to open a feedback form in a new tab to let us know how this document benefits ou.y Recommended Citation Jones, Sarah E., "Examining Cyberbullying Bystander Behavior Using a Multiple Goals Perspective" (2014). Theses and Dissertations--Communication. 22. https://uknowledge.uky.edu/comm_etds/22 This Master's Thesis is brought to you for free and open access by the Communication at UKnowledge. It has been accepted for inclusion in Theses and Dissertations--Communication by an authorized administrator of UKnowledge. For more information, please contact [email protected]. STUDENT AGREEMENT: I represent that my thesis or dissertation and abstract are my original work. Proper attribution has been given to all outside sources. I understand that I am solely responsible for obtaining any needed copyright permissions. I have obtained needed written permission statement(s) from the owner(s) of each third-party copyrighted matter to be included in my work, allowing electronic distribution (if such use is not permitted by the fair use doctrine) which will be submitted to UKnowledge as Additional File. I hereby grant to The University of Kentucky and its agents the irrevocable, non-exclusive, and royalty-free license to archive and make accessible my work in whole or in part in all forms of media, now or hereafter known. I agree that the document mentioned above may be made available immediately for worldwide access unless an embargo applies. I retain all other ownership rights to the copyright of my work. I also retain the right to use in future works (such as articles or books) all or part of my work. I understand that I am free to register the copyright to my work. REVIEW, APPROVAL AND ACCEPTANCE The document mentioned above has been reviewed and accepted by the student’s advisor, on behalf of the advisory committee, and by the Director of Graduate Studies (DGS), on behalf of the program; we verify that this is the final, approved version of the student’s thesis including all changes required by the advisory committee. The undersigned agree to abide by the statements above. Sarah E. Jones, Student Dr. Matthew W. Savage, Major Professor Dr. Timothy Sellnow, Director of Graduate Studies EXAMINING CYBERBULLYING BYSTANDER BEHAVIOR USING A A MULTIPLE GOALS PERSPECTIVE _________________________________________ THESIS __________________________________________ A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in the College of Communication and Information at the University of Kentucky By Sarah E. Jones Lexington, Kentucky Director: Dr. Matthew W. Savage, Assistant Professor of Communication Lexington, Kentucky 2014 Copyright © Sarah E. Jones 2014 ABSTRACT OF THESIS EXAMINING CYBERBULLYING BYSTANDER BEHAVIOR USING A MULTIPLE GOALS PERSPECTIVE Cyberbullying, defined as any behavior performed through electronic or digital media by individuals or groups that repeatedly communicates hostile or aggressive messages intended to inflict harm or discomfort on others, is a widespread problem. Bystanders play an integral role in the initiation, maintenance, and prolonged presence of such aggressive behaviors, but have thus far been overlooked in cyberbullying literature. Cyberbullying bystanders are defined in this study as those who witness cyberbullying, either within or outside their personal social network(s) and whose available responses range from inaction to intervention. Operating from a social-ecological perspective and guided by multiple goals theories, this study used focus group methodology and found that cyberbullying bystanders have an impact on perpetration and victimization by way of multiple, distinct goals, which impact their choice of behavioral response. Bystanders’ goals and behaviors served to inform the creation of a cyberbullying bystander typology inclusive of five types: the oblivious/distant bystander, the entertained bystander, the conspiring bystander, the unintentional instigating bystander, and the active/empowered bystander. By allowing a thorough, nuanced understanding of bystanders’ role in cyberbullying, the study has significant implications for communication theory and practical application in the development of prevention and intervention efforts. KEYWORDS: Cyberbullying, Traditional Bullying, Bystanders, Multiple Goals, Social-Ecological Model __________Sarah E. Jones__________ ___________May 6, 2014 _________ EXAMINING CYBERBULLYING BYSTANDER BEHAVIOR USING A MULTIPLE GOALS PERSPECTIVE By Sarah E. Jones _Dr. Matthew Savage_______________ Director of Thesis _Dr. Timothy Sellnow_______________ Director of Graduate Studies ___________May 6, 2014 _ _________ ACKNOWLEDGEMENTS The following thesis, while a work of original research, was only fully realized with the direction, insights, and expertise of several individuals. The Chair of my Thesis Committee, Dr. Matthew Savage, was an exemplar mentor. His expertise in the content area helped me synthesize the wealth of scholarship and his time spent painstakingly line-editing countless rough drafts of the manuscript slowly but surely helped me learn improvements to my methods of writing. Dr. Savage also provided timely instruction and evaluation, and acted as a source of encouragement throughout every stage of the research process, allowing me to complete the thesis on schedule. I also wish to thank the other members of my Thesis Committee: Drs. Allison Scott and Derek Lane. Each continually provided guidance on how to obtain the best data possible, insights on how to best present the research that substantially improved the final product, and challenged my development as a scholar. I would be remiss if I did not also thank Dr. Elaine Wittenberg-Lyles of City of Hope Medical Center who introduced me to qualitative research (and to Dr. Savage) and first provided me the opportunity to research this topic during her time at the University of Kentucky. In the dedication page of her book, Qualitative Research Methods: Collecting Evidence, Crafting Analysis, Communicating Impact, Dr. Sarah Tracy of Arizona State University writes, “…anything worth doing is worth doing badly in the beginning.” The quote has stayed with me because it is a testament to the gradual learning process and evolution of the thesis, and serves as a reminder of the emergent process of qualitative research. I am forever indebted to those that made that process possible. iii TABLE OF CONTENTS Acknowledgements ............................................................................................ iii List of Tables ............................................................................................ vi List of Figures ........................................................................................... vii Chapter One: Introduction and Rationale ................................................................1 Chapter Two: A Survey of Bullying Literature Traditional Bullying .....................................................................................6 Seminal works and definition ..........................................................6 Bullies ..............................................................................................6 Victims .............................................................................................7 Bystanders ........................................................................................7 A social-ecological perspective ...........................................8 Bystander characteristics .....................................................9 Cyberbullying ............................................................................................11 Similarities, differences, and definitions .......................................11 Perpetration characteristics ............................................................12 Prevalence and connectivity ..........................................................12 Cyberbullying bystanders ..............................................................14 A conceptual definition ......................................................14 A social-ecological perspective .........................................16 Bystander frequencies ........................................................18 Power ............................................................................................19 Consequences and effects ..............................................................22 Chapter Three: Multiple Goals Theoretical Framework Overview and Contribution ........................................................................25 Assumptions ............................................................................................26 Research Traditions ...................................................................................28 Application to Cyberbullying ....................................................................30 Chapter Four: Bystander Typologies Bystander Typologies ................................................................................32 Research Questions ....................................................................................36 Chapter Five: Methodology Participants ............................................................................................37
Recommended publications
  • Cyber Violence Against Women and Girls
    CYBER VIOLENCE AGAINST WOMEN AND GIRLS A WORLD-WIDE WAKE-UP CALL 2015 Photo credits:Shutterstock A REPORT BY THE UN BROADBAND COMMISSION FOR DIGITAL DEVELOPMENT WORKING GROUP ON BROADBAND AND GENDER CYBER VIOLENCE AGAINST WOMEN AND GIRLS: A WORLD-WIDE WAKE-UP CALL Acknowledgements This Report has been written collaboratively, drawing on insights and rich contributions from a range of Commissioners and Expert Members of the Working Group on Broadband and Gender. It has been researched and compiled by lead author Nidhi Tandon, assisted by Shannon Pritchard, with editorial inputs by teams from UN Women, UNDP and ITU. Design concepts were developed by Céline Desthomas of ITU. We wish to thank the following people for their contributions and kind review and comments (listed in alphabetical order of institution, followed by alphabetical order of surname): Dafne Sabanes Plou, Jac sm Kee and Chat Garcia Ramilo (APC); Dr Nancy Hafkin; Minerva Novero- Belec (UNDP); Corat Suniye Gulser (UNESCO); Jennifer Breslin and team (UN Women); Samia Melhem and team (World Bank). About the Commission The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to meet the Millennium Development Goals. Established in May 2010, the Commission unites top industry executives with government leaders, thought leaders and policy pioneers and international agencies and organizations concerned with development. The Broadband Commission embraces a range of different perspectives in a multi-stakeholder approach to promoting the roll-out of broadband, as well as providing a fresh approach to UN and business engagement.
    [Show full text]
  • 1 Kenneth Burke and the Theory of Scapegoating Charles K. Bellinger Words Sometimes Play Important Roles in Human History. I
    Kenneth Burke and the Theory of Scapegoating Charles K. Bellinger Words sometimes play important roles in human history. I think, for example, of Martin Luther’s use of the word grace to shatter Medieval Catholicism, or the use of democracy as a rallying cry for the American colonists in their split with England, or Karl Marx’s vision of the proletariat as a class that would end all classes. More recently, freedom has been used as a mantra by those on the political left and the political right. If a president decides to go war, with the argument that freedom will be spread in the Middle East, then we are reminded once again of the power of words in shaping human actions. This is a notion upon which Kenneth Burke placed great stress as he painted a picture of human beings as word-intoxicated, symbol-using agents whose motives ought to be understood logologically, that is, from the perspective of our use and abuse of words. In the following pages, I will argue that there is a key word that has the potential to make a large impact on human life in the future, the word scapegoat. This word is already in common use, of course, but I suggest that it is something akin to a ticking bomb in that it has untapped potential to change the way human beings think and act. This potential has two main aspects: 1) the ambiguity of the word as it is used in various contexts, and 2) the sense in which the word lies on the boundary between human self-consciousness and unself-consciousness.
    [Show full text]
  • OCSA Bullying/Cyberbullying/Hate Violence Policy
    OCSA BULLYING/CYBER BULLYING/HATE VIOLENCE POLICY All students and employees of the Orange County School of the Arts have the right to work, to attend school, and to participate in the educational process in a safe environment that is free from bullying and hate-motivated behavior. Every effort shall be made to promote mutual respect among students and staff and between and among students to encourage safe and harmonious relations that support human dignity and equality. The OCSA Board of Trustees recognizes the harmful effects of bullying on student learning and school attendance and desires to provide safe school environments that protect students from physical and emotional harm. School employees shall establish student safety as a high priority and shall not tolerate bullying of any student. No student or group of students shall, through physical, written, verbal, or other means, harass, sexually harass, threaten, intimidate, cyberbully, cause bodily injury to, or commit hate violence against any other student or school personnel. Students who have been bullied or cyberbullied shall promptly report such incidents to any staff member. Behavior or statements that degrade, intimidate, and/or harm an individual on the basis of his/her race, ethnicity, culture, heritage, immigration status, gender, sexual orientation, physical/mental attributes, religious beliefs or practices shall not be tolerated. Bullying in any form or platform, repeatedly picking fights with, or repeatedly taunting another person shall not be tolerated. This policy applies to all OCSA students and employees. This policy applies to all acts related to school activity or school attendance occurring within a school under the jurisdiction of the Executive Director of the Orange County School of the Arts.
    [Show full text]
  • The Challenges of Cyberbullying
    NEW ENCOUNTERS? THE CHALLENGES OF CYBERBULLYING Professor Shauna Van Praagh & Alyssa Wiseman November 17, 2015 What is Cyberbullying? "A person is bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons, and he or she has difficulty defending himself or herself." - Dan Olweus (1993 and before) -An Act to prevent and stop bullying and violence in schools, 2012 Definition is fairly consistent worldwide—entails three criteria: (1) Verbal or physical aggression; (2) That is repeated over time; and (3) That involves a power differential. “Sticks and Stones” “I couldn’t write about online bullying without writing about face-to-face bullying too because Facebook and other social networking sites aren’t a discrete, walled off universe.” (39) - Emily Bazelon, “Sticks and Stones: Defeating the Culture of Bullying and Rediscovering the Power of Character and Empathy Despite wide media attention, cyberbullying is not necessarily more widespread than face-to-face bullying. Still, cyberbullying presents new concerns... “Sticks and Stones” New concerns include: (1) The Internet makes bullying harder to escape; (2) The Internet allows the perpetrator to bully without having to confront his or her victim; (3) The number of potential witnesses can be exponentially higher; and (4) There is the possibility that comments and images/ videos can go viral. Also, with undefined boundaries, whose responsibility is it to prevent or “deal” with cyberbullying? “It’s Complicated” danah boyd brings to light problematic tendencies and reactions: (1) Scapegoating technology: easier to focus on what is tangible rather than broader systemic issues at play; (2) Parental nostalgia: we idealize our childhoods and forget the problem we faced when we were young; (3) “Digital natives”: draws away attention from the problems children face in the digital era In creating these divides, different stakeholders may absolve themselves of responsibility.
    [Show full text]
  • Getting Beneath the Surface: Scapegoating and the Systems Approach in a Post-Munro World Introduction the Publication of The
    Getting beneath the surface: Scapegoating and the Systems Approach in a post-Munro world Introduction The publication of the Munro Review of Child Protection: Final Report (2011) was the culmination of an extensive and expansive consultation process into the current state of child protection practice across the UK. The report focused on the recurrence of serious shortcomings in social work practice and proposed an alternative system-wide shift in perspective to address these entrenched difficulties. Inter-woven throughout the report is concern about the adverse consequences of a pervasive culture of individual blame on professional practice. The report concentrates on the need to address this by reconfiguring the organisational responses to professional errors and shortcomings through the adoption of a ‘systems approach’. Despite the pre-occupation with ‘blame’ within the report there is, surprisingly, at no point an explicit reference to the dynamics and practices of ‘scapegoating’ that are so closely associated with organisational blame cultures. Equally notable is the absence of any recognition of the reasons why the dynamics of individual blame and scapegoating are so difficult to overcome or to ‘resist’. Yet this paper argues that the persistence of scapegoating is a significant impediment to the effective implementation of a systems approach as it risks distorting understanding of what has gone wrong and therefore of how to prevent it in the future. It is hard not to agree wholeheartedly with the good intentions of the developments proposed by Munro, but equally it is imperative that a realistic perspective is retained in relation to the challenges that would be faced in rolling out this new organisational agenda.
    [Show full text]
  • Sweden National Reporting Procedures for Cyberbullying, Hate Speech and Hate Crime
    Reporting in Sweden National reporting procedures for cyberbullying, hate speech and hate crime The information below is extracted from a mapping study of national reporting mechanisms in the countries involved in the No Hate Speech Movement of the Council of Europe. It aims to provide: 1. Contact information of national reporting mechanisms for cyberbullying, hate speech and hate crime where they exist 2. Information about the legal grounds for acting on cyberbullying, hate speech and hate crime where they exist The views expressed in this document do not necessarily reflect the opinions of the Council of Europe1. 1. REPORTING MECHANISMS Reporting hate speech and hate crime Polisen (the police). Website: http://polisen.se Phone:+46 114 14. Reporting cyberbullying If the cyberbullying is connected to the school one should report it to the school management or a teacher. For other cases one can turn to the police. 2. Background information There is no Swedish word that translates hate speech in Swedish. There is a term called “hate against a community”. Another is “discrimination”. Hate speech online can also be called bullying or harassment. Sweden does not have a distinction between hate speech and hate crime that we know of. The Discrimination Act includes discrimination on the basis of sex, transgender identity or expression, ethnicity, disability, sexual orientation and age. People can report everything that is against the law at the police station or by phone. Reports will be investigated by the police. In 2014 there were almost 6270 reports of hate crime in Sweden. That was an increase with 14 % compared to 2015.
    [Show full text]
  • Working with People Who Commit Hate Crime RANIA HAMAD (UNIVERSITY of EDINBURGH) December 2019 INSIGHT 50 · Working with People Who Commit Hate Crime 2
    INSIGHTS 50 A SERIES OF EVIDENCE SUMMARIES Working with people who commit hate crime RANIA HAMAD (UNIVERSITY OF EDINBURGH) DECEMBER 2019 INSIGHT 50 · WORKing with PEOPLE WHO COMMit HATE CRIME 2 Acknowledgements This Insight was reviewed by Helen Allbutt and Kristi Long (NHS Education for Scotland), Sarah Davis (Community Intervention Team, City of Edinburgh Council), Paul Iganski (Lancaster University), Steve Kirkwood (University of Edinburgh), Maureen McBride (University of Glasgow), Neil Quinn (University of Strathclyde) and colleagues from Scottish Government. Comments represent the views of reviewers and do not necessarily represent those of their organisations. Iriss would like to thank the reviewers for taking the time to reflect and comment on this publication. This work is licensed under the Creative Commons Attribution-Non Commercial-Share Alike 2.5 UK: Scotland Licence. To view a copy of this licence, visit https://creativecommons.org/licenses/by-nc-sa/2.5/scotland/ Copyright ©December 2019 INSIGHT 50 · WORKing with PEOPLE WHO COMMit HATE CRIME 3 Key points • Criminal Justice Social Work (CJSW) practitioners work on a daily basis with people convicted of hate crime and/or display prejudice, but there is a lack of specific Scottish research on effective practice in this area. • From the existing research, hate crime interventions are best undertaken one-to-one, incorporating cultural/diversity awareness, anger/emotion management, hate crime impact and restorative justice. • People convicted of hate crime frequently experience adverse circumstances and may have unacknowledged shame, anger, and feelings of threat and loss. • Practitioners should develop relationships with people who commit hate offences characterised by acceptance, respect, and empathy, without judgement or collusion.
    [Show full text]
  • Technology-Enabled Bullying & Adolescent Non-Reporting
    Technology-enabled Bullying & Adolescent Non-reporting Breaking the Silence Justin Connolly1 and Regina Connolly2 1Dublin City University, Dublin 9, Dublin, Ireland 2Dublin City University, Business School, Dublin 9, Dublin, Ireland Keywords: Information and Communication Technologies, Technology-enabled Bullying, Cyberbullying. Abstract: Although early research has pointed to the fact that the successful intervention and resolution of cyberbullying incidents is to a large degree dependent on such incidents being reported to an adult caregiver, the literature consistently shows that adolescents who have been bullied tend not to inform others of their experiences. However, the reasons underlying reluctance to seek adult intervention remain undetermined. Understanding the factors that influence adolescent resistance will assist caregivers, teachers and those involved in the formulation of school anti-bullying policies in their attempts to counter the cyberbullying phenomenonre should be a space before of 12-point and after of 30-point. 1 INTRODUCTION harmful behavior. Direct cyberbullying involves repeatedly sending offensive messages. More The problem of adolescent bullying has evolved in indirect forms of cyberbullying include tandem with the digitization of society. Bullying is disseminating denigrating materials or sensitive a problem that transcends social boundaries and can personal information or impersonating someone to result in devastating psychological and emotional cause harm (p.10).’ trauma including low self-esteem, poor academic As can be seen from the above definitions, there performance, depression, and, in some cases, are important distinctions between cyberbullying violence and suicide. In its traditional context, it has and bullying. The first distinction relates to the been described as being characterized by the nature of the bullying.
    [Show full text]
  • A/HRC/46/57 General Assembly
    United Nations A/HRC/46/57 General Assembly Distr.: General 3 March 2021 Original: English Human Rights Council Forty-sixth session 22 February–19 March 2021 Agenda item 3 Promotion and protection of all human rights, civil, political, economic, social and cultural rights, including the right to development Minority issues Report of the Special Rapporteur on minority issues, Fernand de Varennes*, ** Summary In the present report, the Special Rapporteur on minority issues, Fernand de Varennes, provides an overview of his activities since his previous report (A/HRC/43/47), and a thematic report in which he addresses the widespread targeting of minorities through hate speech in social media. He describes related phenomena, including the widespread denial or failure of State authorities to recognize or effectively protect minorities against prohibited forms of hate speech. He concludes by emphasizing the responsibility of States, civil society and social media platforms to acknowledge that hate speech is mainly a minority issue and, as a matter of urgency, their duty to take further steps towards the full and effective implementation of the human rights obligations involved. * The present report was submitted after the deadline so as to reflect the most recent information. ** The annexes to the present report are circulated as received, in the language of submission only. GE.21-02920(E) A/HRC/46/57 I. Introduction 1. The mandate of the Special Rapporteur on minority issues was established by the Commission on Human Rights in its resolution 2005/79 of 21 April 2005, and subsequently extended by the Human Rights Council in successive resolutions.
    [Show full text]
  • Cyber Bulling
    Cyberbullying What Can I Do? Mark S. Borer, MD, DFAPA, DFAACAP 5/16 Subset of: Bullying and Social Aggression in DE Medical Society of Delaware 5/16 © All rights reserved Credits for Archived Slide Set • Dr. Borer has presented on bullying at various schools and staff developments over his years in practice and he has created different portions of this slide set over time. The slide set is updated from time to time from online, organizational, and educational resources, as well as from ongoing clinical experience. • Formatting for the slides was provided in part by Medical Society of Delaware. • Some of the slides present materials available through various referenced websites. Dr. Borer also prepared an educational program on bullying and social aggression for Lorman Seminars in ’06, which informs some of his thoughts and topics in this slide set, and which he references herein. • The presentations by Dr. Borer at the Medical Society of Delaware, as well as this slide set, have been shared for the benefit of Delaware’s youth. Dr. Borer has received no remuneration for use of this slide set. The materials in these slides may inform the presentations of others, but the slide set itself is copyrighted and used with permission by the Medical Society of DE and by the Delaware Bullying Prevention Association. Cyberbullying—A Definition • CYBER OR ELECTRONIC Bullying – using the Internet, email, text messaging, or other social media to threaten, harass, hurt, single out, embarrass, spread rumors, and/or reveal secrets about others. • Engaging others in targeting a particular individual enhances the bullying and the potential hurt and damage to the individual.
    [Show full text]
  • (2005) Cyber Bullying: an Old Problem in a New Guise?
    1 This is the author’s version of a paper that was later published as: Campbell, Marilyn A (2005) Cyber bullying: An old problem in a new guise?. Australian Journal of Guidance and Counselling 15(1):68-76. Copyright 2005 Australian Academic Press. Cyber bullying: An old problem in a new guise? Marilyn A. Campbell Queensland University of Technology Abstract Although technology provides numerous benefits to young people, it also has a ’dark side’, as it can be used for harm, not only by some adults but also by the young people themselves. Email, texting, chat rooms, mobile phones, mobile phone cameras and web sites can and are being used by young people to bully peers. It is now a global problem with many incidents reported in the United States, Canada, Japan, Scandinavia and the United Kingdom, as well as in Australia and New Zealand. This growing problem has as yet not received the attention it deserves and remains virtually absent from the research literature. This article explores definitional issues, the incidence and potential consequences of cyber bullying, as well as discussing possible prevention and intervention strategies. 2 Historically bullying has not been seen as a problem that needed attention, but rather has been accepted as a fundamental and normal part of childhood (Limber & Small, 2003). In the last two decades, however, this view has changed and schoolyard bullying is seen as a serious problem that warrants attention. Bullying is an age-old societal problem, beginning in the schoolyard and often progressing to the boardroom (McCarthy, Rylance, Bennett, & Zimmermann, 2001).
    [Show full text]
  • Pdfs/Nursing/Center Lateral Violence and Bullying P
    A COMPARATIVE STUDY OF UNDERGRADUATE UPPERCLASSMEN STUDENTS’ PERCEPTIONS OF STUDENT AND FACULTY INCIVILITY IN THREE ACADEMIC DISCIPLINES: NURSING, EDUCATION, AND BUSINESS by Rebecca Susan Wagner Liberty University A Dissertation Presented in Partial Fulfillment Of the Requirements for the Degree Doctor of Education Liberty University August 2014 A COMPARATIVE STUDY OF UNDERGRADUATE UPPERCLASSMEN STUDENTS’ PERCEPTIONS OF STUDENT AND FACULTY INCIVILITY IN THREE ACADEMIC DISCPLINES: NURSING, EDUCATION, AND BUSINESS by Rebecca Susan Wagner A Dissertation Presented in Partial Fulfillment Of the Requirements for the Degree Doctor of Education Liberty University, Lynchburg, VA July 2014 APPROVED BY: Amy McLemore, Ed.D., Committee Chair Anthony Koyzis, Ph.D., Committee Member Cynthia Clark, Ph.D., Committee Member Kurt Michael, Ph.D., Chair of Quantitative Doctoral Research 2 A COMPARATIVE STUDY OF UNDERGRADUATE UPPERCLASSMEN STUDENTS’ PERCEPTIONS OF STUDENT AND FACULTY INCIVILITY IN THREE ACADEMIC DISCIPLINES: NURSING, EDUCATION, AND BUSINESS ABSTRACT Incivility, defined as rude, discourteous, and disrespectful behavior, in higher education and in nursing education, is a growing problem and concern as it affects the college learning environment and professional preparation for the workplace. Healthcare institutions and accreditation bodies require interventional actions to address the prevalence of incivility in healthcare, nursing practice specifically, and in nursing education as a precursor to the professional workplace. The purpose of this causal comparative study was to explore Heider’s attribution theory using the Incivility in Higher Education (IHE) survey to compare undergraduate upperclassmen students’ perceptions of student and faculty incivility among the three academic disciplines of nursing, education, and business in a large public university in the Western Mountain region of the US.
    [Show full text]