Analyzing Patterns Within Academic and Legal Definitions: a Qualitative Content Analysis of the Term "Cyberbullying" Page: 67
The following text was automatically extracted from the image on this page using optical character recognition software:
Table 4.11 (continued).
Collapsed Code Value Collapsed Code Value
damage property 10 cellular mobile telephone 4
persistent 9 electronic communication device 4
telephones 8 electronic transmission 4
written 8 computer network 4
text 8 text messaging 4
physical act 8 photograph 4
gesture 8 physical 4
one offender 8 signs 4
multiple offender 8 signals 4
understood by a reasonable person 8 writing 4
malicious 8 sounds 4
electronic device 7 data 4
abusive 7 intelligence 4
school location 7 wire 4
pagers 7 through websites 4
intent 7 willful 4
fake profile 7 intentional written 4
break into 7 pervasive 4
post 6 another person 4
created 6 mental harm 4
website 6 infringes on rights 4
PDA 6 fear 4
blogs 6 technology 4
4.6.3 Legal Definition Categories
The codes were then collated into categories. The results of the categorization re
provided in Table 4.12 with the corresponding totals for the individual code strength
presence values. 100% reviewer agreement resulted from the categorization. The result
was 11 categories.
Here’s what’s next.
This dissertation can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Dissertation.
Winn, Matthew R. Analyzing Patterns Within Academic and Legal Definitions: a Qualitative Content Analysis of the Term "Cyberbullying", dissertation, August 2013; Denton, Texas. (digital.library.unt.edu/ark:/67531/metadc283860/m1/68/?rotate=90: accessed October 16, 2018), University of North Texas Libraries, Digital Library, digital.library.unt.edu; .