scispace - formally typeset
Search or ask a question
Author

Michelle F. Wright

Bio: Michelle F. Wright is an academic researcher from Pennsylvania State University. The author has contributed to research in topics: Aggression & Psychology. The author has an hindex of 25, co-authored 137 publications receiving 3626 citations. Previous affiliations of Michelle F. Wright include University of Manitoba & Masaryk University.


Papers
More filters
Journal ArticleDOI
TL;DR: The results show that the atlas and companion segmentation method can segment T1 and T2 images, as well as their combination, replicate findings on mild cognitive impairment based on high-resolution T2 data, and can discriminate between Alzheimer's disease subjects and elderly controls with 88% accuracy.

862 citations

Journal ArticleDOI
TL;DR: It was found that across people and situations, games and interactive simulations are more dominant for cognitive gain outcomes, however, consideration of specific moderator variables yielded a more complex picture.
Abstract: Substantial disagreement exists in the literature regarding which educational technology results in the highest cognitive gain for learners. In an attempt to resolve this dispute, we conducted a me...

842 citations

Journal ArticleDOI
Michael D. Hill1, Mayank Goyal1, Bijoy K Menon1, Raul G. Nogueira2  +773 moreInstitutions (39)
TL;DR: Nerinetide did not improve the proportion of patients achieving good clinical outcomes after endovascular thrombectomy compared with patients receiving placebo, and this trial is registered with ClinicalTrials.gov, NCT02930018.

321 citations

Book ChapterDOI
01 Jan 2017
TL;DR: Cyber bullying: Bullying in the Digital Age as discussed by the authors provides an empirically-based resource with up-to-date information about the nature and prevalence of cyber bullying through the use of email, instant messages, chat rooms, and other digital messaging systems.
Abstract: Cyber Bullying: Bullying in the Digital Age: * Provides an empirically-based resource with up-to-date information about the nature and prevalence of cyber bullying through the use of email, instant messages, chat rooms, and other digital messaging systems * Examines the role of anonymity in electronic bullying * Includes feedback from focus groups and individual interviews with students and parents * Offers a handy reference with practical strategies for educators, parents, psychologists and policy makers about prevention and intervention of cyber bullying

182 citations

Journal ArticleDOI
TL;DR: Previous findings regarding the relationship between peer rejection and face-to-face aggressive behaviors to the cyber context are extended and underscore the importance of utilizing multiple methods, such as peer-nomination and self-report, to assess cyber aggression in a school setting.
Abstract: Adolescents experience various forms of strain in their lives that may contribute jointly to their engagement in cyber aggression. However, little attention has been given to this idea. To address this gap in the literature, the present longitudinal study examined the moderating influence of peer rejection on the relationship between cyber victimization at Time 1 (T1) and subsequent cyber aggression at Time 2 (T2; 6 months later) among 261 (150 girls) 6th, 7th, and 8th graders. Our findings indicated that both peer rejection and cyber victimization were related to T2 peer-nominated and self-reported cyber aggression, both relational and verbal, after controlling for gender and T1 cyber aggression. Furthermore, T1 cyber victimization was related more strongly to T2 peer-nominated and self-reported cyber aggression at higher levels of T1 peer rejection. These results extend previous findings regarding the relationship between peer rejection and face-to-face aggressive behaviors to the cyber context. In addition, our findings underscore the importance of utilizing multiple methods, such as peer-nomination and self-report, to assess cyber aggression in a school setting.

165 citations


Cited by
More filters
01 Jan 2016
TL;DR: The using multivariate statistics is universally compatible with any devices to read, allowing you to get the most less latency time to download any of the authors' books like this one.
Abstract: Thank you for downloading using multivariate statistics. As you may know, people have look hundreds times for their favorite novels like this using multivariate statistics, but end up in infectious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they juggled with some harmful bugs inside their laptop. using multivariate statistics is available in our digital library an online access to it is set as public so you can download it instantly. Our books collection saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the using multivariate statistics is universally compatible with any devices to read.

14,604 citations

Book
19 Nov 2008
TL;DR: This meta-analyses presents a meta-analysis of the contributions from the home, the school, and the curricula to create a picture of visible teaching and visible learning in the post-modern world.
Abstract: Preface Chapter 1 The challenge Chapter 2 The nature of the evidence: A synthesis of meta-analyses Chapter 3 The argument: Visible teaching and visible learning Chapter 4: The contributions from the student Chapter 5 The contributions from the home Chapter 6 The contributions from the school Chapter 7 The contributions from the teacher Chapter 8 The contributions from the curricula Chapter 9 The contributions from teaching approaches - I Chapter 10 The contributions from teaching approaches - II Chapter 11: Bringing it all together Appendix A: The 800 meta-analyses Appendix B: The meta-analyses by rank order References

6,776 citations

Book
01 Jan 2003
TL;DR: In this paper, Sherry Turkle uses Internet MUDs (multi-user domains, or in older gaming parlance multi-user dungeons) as a launching pad for explorations of software design, user interfaces, simulation, artificial intelligence, artificial life, agents, virtual reality, and the on-line way of life.
Abstract: From the Publisher: A Question of Identity Life on the Screen is a fascinating and wide-ranging investigation of the impact of computers and networking on society, peoples' perceptions of themselves, and the individual's relationship to machines. Sherry Turkle, a Professor of the Sociology of Science at MIT and a licensed psychologist, uses Internet MUDs (multi-user domains, or in older gaming parlance multi-user dungeons) as a launching pad for explorations of software design, user interfaces, simulation, artificial intelligence, artificial life, agents, "bots," virtual reality, and "the on-line way of life." Turkle's discussion of postmodernism is particularly enlightening. She shows how postmodern concepts in art, architecture, and ethics are related to concrete topics much closer to home, for example AI research (Minsky's "Society of Mind") and even MUDs (exemplified by students with X-window terminals who are doing homework in one window and simultaneously playing out several different roles in the same MUD in other windows). Those of you who have (like me) been turned off by the shallow, pretentious, meaningless paintings and sculptures that litter our museums of modern art may have a different perspective after hearing what Turkle has to say. This is a psychoanalytical book, not a technical one. However, software developers and engineers will find it highly accessible because of the depth of the author's technical understanding and credibility. Unlike most other authors in this genre, Turkle does not constantly jar the technically-literate reader with blatant errors or bogus assertions about how things work. Although I personally don't have time or patience for MUDs,view most of AI as snake-oil, and abhor postmodern architecture, I thought the time spent reading this book was an extremely good investment.

4,965 citations

Book ChapterDOI
12 Jul 2017
TL;DR: In this article, the authors explore the ecology of human development, those forces in the person's environment that affect and influence development, i.e., social, economic, and environmental factors.
Abstract: This chapter explores the ecology of human development, those forces in the person's environment that affect and influence development. Urie Bronfenbrenner's model of the human ecosystem guides the discussion, making connections between children in families and in communities and the larger society that surrounds them. The human ecosystem model is much like the study of the natural ecology, focusing on the interactions between subjects at various levels of the environment as they affect each other. The interaction between individual and environment forms the basis of an ecological approach to human development. This view sees the process of development as the expansion of the child's conception of the world and the child's ability to act on that world. Risks to development can come from both direct threats and the absence of opportunities for development. Sociocultural risk refers to the impoverishment in the child's world of essential experiences and relationships.

2,149 citations

01 Jan 2016
TL;DR: The applied missing data analysis is universally compatible with any devices to read and is available in the digital library an online access to it is set as public so you can download it instantly.
Abstract: Thank you for downloading applied missing data analysis. Maybe you have knowledge that, people have look hundreds times for their favorite readings like this applied missing data analysis, but end up in infectious downloads. Rather than enjoying a good book with a cup of tea in the afternoon, instead they juggled with some malicious bugs inside their laptop. applied missing data analysis is available in our digital library an online access to it is set as public so you can download it instantly. Our digital library hosts in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the applied missing data analysis is universally compatible with any devices to read.

1,924 citations