The Factors of Cyber Bullying and the Effects on Cyber Victims
| Format: | Restricted Document |
|---|
Similar Items
Legal challenges in protecting children against cyber bullying in Malaysia: an overview
by: Che Soh @ Yusoff, Roslina
Published: (2019)
by: Che Soh @ Yusoff, Roslina
Published: (2019)
Mapping Developmental Precursors of Cyber-Aggression: Trajectories of Risk Predict Perpetration and Victimization
by: Modecki, K., et al.
Published: (2013)
by: Modecki, K., et al.
Published: (2013)
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
The Effects Of Personalized Multimedia App On Knowledge, Perceived Awareness And Perceived Motivation Of Cyber-Bullying Among Adolescents
by: Abbdul Wahab, Nadia
Published: (2016)
by: Abbdul Wahab, Nadia
Published: (2016)
Stop bullying!
Does gender influence bullying and bully victims?
by: Azid, N., et al.
Published: (2022)
by: Azid, N., et al.
Published: (2022)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber hygiene during Covid-19 to avoid cyber attacks
by: Lee, Yvonne Yi Jin
Published: (2022)
by: Lee, Yvonne Yi Jin
Published: (2022)
Factors predicting cyber aggression victimization mediated by internet addiction among urban youth in the Klang Valley, Malaysia
by: Yusup, Sarina
Published: (2018)
by: Yusup, Sarina
Published: (2018)
Islam and the cyber world
by: Shuriye, Abdi Omar, et al.
Published: (2014)
by: Shuriye, Abdi Omar, et al.
Published: (2014)
Cyber Safety in Malaysia
by: Soon , Seng Thah
Published: (2017)
by: Soon , Seng Thah
Published: (2017)
Cyber law in Malaysia
by: Ibrahim, Azmuddin
Published: (2009)
by: Ibrahim, Azmuddin
Published: (2009)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Cyber essentials for Nigerian business
by: Orunta, Nathaniel
Published: (2015)
by: Orunta, Nathaniel
Published: (2015)
Cyber laws and it-rich society
by: P.S. Sangal,
Published: (2001)
by: P.S. Sangal,
Published: (2001)
Semantics of Cyber-Physical Systems
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
Cyber cafe management system
by: Mohd Khazro'ie, Jaafar
Published: (2010)
by: Mohd Khazro'ie, Jaafar
Published: (2010)
Cyber counselling: is it really new?
by: Zainudin, Zaida Nor, et al.
Published: (2018)
by: Zainudin, Zaida Nor, et al.
Published: (2018)
Cyber- counseling: is it really new?
by: Zainudin, Zaida Nor, et al.
Published: (2018)
by: Zainudin, Zaida Nor, et al.
Published: (2018)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
The announcement of Dar al-Harb in cyber media in context of the theological policy of jihad: reading the cyber-jihad and ISIS based on the pharmakon characteristic of the cyber media
by: Erdem, Burcu Kaya, et al.
Published: (2017)
by: Erdem, Burcu Kaya, et al.
Published: (2017)
Keyboard warrior, online predator or cyber bully? The growing menace of child exposure to internet harm based on research evidence
by: Yusuf, Sarina, et al.
Published: (2020)
by: Yusuf, Sarina, et al.
Published: (2020)
Down the cyber rabbit hole: whistleblowing as a means to fulfilling moral obligations in cyber space
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
Determinants and practices towards cyber supply chain performance with cyber supply chain visibility as a mediator
by: Anisha Banu, Dawood Gani
Published: (2022)
by: Anisha Banu, Dawood Gani
Published: (2022)
Citizen, cyber government and the legal aspects
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023)
by: Collie, Nicholas
Published: (2023)
Defamation in the cyber age: the emerging trends
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
Jurisdictional and definitional issues of cyber-stalking
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Cyber Safety Instrumentation Systems, CSIS
by: Eren, Halit
Published: (2011)
by: Eren, Halit
Published: (2011)
Cyber-physical systems for smart grid
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
CyberReach Project Research Report
by: Hyde, Zoe, et al.
Published: (2006)
by: Hyde, Zoe, et al.
Published: (2006)
Linguistic deception of Chinese cyber fraudsters
by: Tan, Kim Hua, et al.
Published: (2017)
by: Tan, Kim Hua, et al.
Published: (2017)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017)
by: Sani, Rozana
Published: (2017)
Conference on Librarians for the Cyber World 2015
by: PPM, Persatuan Pustakawan Malaysia
Published: (2015)
by: PPM, Persatuan Pustakawan Malaysia
Published: (2015)
A Dynamic Cyber Terrorism Framework
by: Rabiah, Ahmad, et al.
Published: (2012)
by: Rabiah, Ahmad, et al.
Published: (2012)
Cyber stalking: regulating harassment on the net?
Cyber security awareness: Is there any significant difference in demographic factors?
by: Sharkawi, Ismawati, et al.
Published: (2023)
by: Sharkawi, Ismawati, et al.
Published: (2023)
Similar Items
-
Legal challenges in protecting children against cyber bullying in Malaysia: an overview
by: Che Soh @ Yusoff, Roslina
Published: (2019) -
Mapping Developmental Precursors of Cyber-Aggression: Trajectories of Risk Predict Perpetration and Victimization
by: Modecki, K., et al.
Published: (2013) -
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014) -
The Effects Of Personalized Multimedia App On Knowledge, Perceived Awareness And Perceived Motivation Of Cyber-Bullying Among Adolescents
by: Abbdul Wahab, Nadia
Published: (2016) -
Stop bullying!
Does gender influence bullying and bully victims?
by: Azid, N., et al.
Published: (2022)