<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>International Journal of Psychology (IPA)</title>
<title_fa>نشریه بین المللی روانشناسی</title_fa>
<short_title>ijpb</short_title>
<subject>Literature &amp; Humanities</subject>
<web_url>http://ijpb.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2008-1251</journal_id_issn>
<journal_id_issn_online>2676-4326</journal_id_issn_online>
<journal_id_pii>8</journal_id_pii>
<journal_id_doi>10.61882/ijpb</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>14</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science>13</journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1397</year>
	<month>8</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2018</year>
	<month>11</month>
	<day>1</day>
</pubdate>
<volume>12</volume>
<number>1</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>en</language>
	<article_id_doi></article_id_doi>
	<title_fa>Prediction of Cyber Bullying through Components of Adversity Quotient in Depressive Students</title_fa>
	<title>Prediction of Cyber Bullying through Components of Adversity Quotient in Depressive Students</title>
	<subject_fa>عمومى</subject_fa>
	<subject>General</subject>
	<content_type_fa>پژوهشي</content_type_fa>
	<content_type>Research</content_type>
	<abstract_fa>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: justify;&quot;&gt;The main purpose of this study was to predict cyber bullying (email and online) through the components of the adversity quotient (perceived control, origin and ownership, reach and endurance). The population in this study comprised all employees of a big public organization in Tehran in winter 2015 (1393). Among them, 271 persons were selected on the basis of convenience sampling method. Data were collected through the Adversity Quotient Profile (PEAK Learning Inc., 2008) and the Cyber Bullying Questionnaire (Savage, 2012), and analysed using Pearson correlation coefficient and multiple regression analysis. The results indicated significant negative relationships between all the components of the Adversity Quotient (perceived control, origin and ownership, reach and endurance) with Cyber Bullying (p&lt;.05). Furthermore, the results of multiple regression analysis showed that the components of perceived control (F=48.2, P&lt;.05) and reach (F=28.2, p&lt;.01) could significantly predict cyber bullying.&lt;/div&gt;</abstract_fa>
	<abstract>&lt;div style=&quot;text-align: justify;&quot;&gt;The main purpose of this study was to predict cyber bullying (email and online) through the components of the adversity quotient (perceived control, origin and ownership, reach and endurance). The population in this study comprised all employees of a big public organization in Tehran in winter 2015 (1393). Among them, 271 persons were selected on the basis of convenience sampling method. Data were collected through the Adversity Quotient Profile (PEAK Learning Inc., 2008) and the Cyber Bullying Questionnaire (Savage, 2012), and analysed using Pearson correlation coefficient and multiple regression analysis. The results indicated significant negative relationships between all the components of the Adversity Quotient (perceived control, origin and ownership, reach and endurance) with Cyber Bullying (p&lt;.05). Furthermore, the results of multiple regression analysis showed that the components of perceived control (F=48.2, P&lt;.05) and reach (F=28.2, p&lt;.01) could significantly predict cyber bullying.&lt;/div&gt;</abstract>
	<keyword_fa>adversity quotient, cyber bullying, Public Sector</keyword_fa>
	<keyword>adversity quotient, cyber bullying, Public Sector</keyword>
	<start_page>30</start_page>
	<end_page>49</end_page>
	<web_url>http://ijpb.ir/browse.php?a_code=A-10-1-10&amp;slc_lang=en&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>Monireh Sadat</first_name>
	<middle_name></middle_name>
	<last_name>Hosseini</last_name>
	<suffix></suffix>
	<first_name_fa>Monireh Sadat</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>Hosseini</last_name_fa>
	<suffix_fa></suffix_fa>
	<email></email>
	<code>10031947532846001257</code>
	<orcid>10031947532846001257</orcid>
	<coreauthor>No</coreauthor>
	<affiliation></affiliation>
	<affiliation_fa></affiliation_fa>
	 </author>


	<author>
	<first_name>Arezoo</first_name>
	<middle_name></middle_name>
	<last_name>Vali Nezhad</last_name>
	<suffix></suffix>
	<first_name_fa>Arezoo</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>Vali Nezhad</last_name_fa>
	<suffix_fa></suffix_fa>
	<email></email>
	<code>10031947532846001258</code>
	<orcid>10031947532846001258</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation></affiliation>
	<affiliation_fa></affiliation_fa>
	 </author>


	<author>
	<first_name>Ali</first_name>
	<middle_name></middle_name>
	<last_name>Mahdad</last_name>
	<suffix></suffix>
	<first_name_fa>Ali</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>Mahdad</last_name_fa>
	<suffix_fa></suffix_fa>
	<email></email>
	<code>10031947532846001259</code>
	<orcid>10031947532846001259</orcid>
	<coreauthor>No</coreauthor>
	<affiliation></affiliation>
	<affiliation_fa></affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
