The intention to cyberbully and cyberbullying behaviour among undergraduate students
The ever-expanding communication technologies and high usage of the Internet among youths have created an avenue for an emerging social problem, cyberbullying. This study analyses the contributing factors to cyberbullying behaviour; 397 Muslim undergraduate students participated in the study and it...
| Main Authors: | Abdul Rashid, Muhammad Shawal, Mohamed, Shafizan, Tengku Mohd Azman, Tengku Aisha |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
IIUM Press, International Islamic University Malaysia
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/74908/ http://irep.iium.edu.my/74908/1/74908_The%20intention%20to%20cyberbully%20and%20cyberbullying%20behaviour%20among%20undergraduate%20students.pdf |
Similar Items
Predicting the intention to cyberbully and cyberbullying behaviour among the undergraduate students at the International Islamic University Malaysia
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Library online database system for undergraduate students
by: Azlan, Nor Athira, et al.
Published: (2016)
by: Azlan, Nor Athira, et al.
Published: (2016)
Influence of travel and tour website on tourist behaviour to determine destination in Malaysia among IIUM students in Pagoh, Johor.
by: Borahan, Nur Saiful Amree, et al.
Published: (2020)
by: Borahan, Nur Saiful Amree, et al.
Published: (2020)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
Green computing knowledge among students in a Ugandan university
by: Semakula, Isa, et al.
Published: (2016)
by: Semakula, Isa, et al.
Published: (2016)
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014)
by: Hamza, Aminu, et al.
Published: (2014)
Prevalence of mobile usage among university students: a case study of International Islamic University Malaysia
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Metaheuristic approaches for gateway placement optimization in wireless mesh networks: a survey
by: M. Ahmed, Awadallah, et al.
Published: (2014)
by: M. Ahmed, Awadallah, et al.
Published: (2014)
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
Ethical perspective of students in Global Learning Environment
by: Muhammad, AbdulHafeez, et al.
Published: (2013)
by: Muhammad, AbdulHafeez, et al.
Published: (2013)
Fixed wings UAV direction control “Hardware Design”
by: Khalil Abdallah, Mohamed, et al.
Published: (2015)
by: Khalil Abdallah, Mohamed, et al.
Published: (2015)
Implementation of direction control algorithms for fixed wings UAV
by: Abdalla, Mohamed K., et al.
Published: (2015)
by: Abdalla, Mohamed K., et al.
Published: (2015)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
Performance study of intra-domain mobility management
by: Rusli, Nazreen, et al.
Published: (2005)
by: Rusli, Nazreen, et al.
Published: (2005)
An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees
by: Zakaria, Omar, et al.
Published: (2014)
by: Zakaria, Omar, et al.
Published: (2014)
Development of a game for history course of secondary school students
by: Ghulamani, Sumbul, et al.
Published: (2017)
by: Ghulamani, Sumbul, et al.
Published: (2017)
Investigation of gateway placement optimization approaches in wireless mesh networks using genetic algorithms
by: M. Ahmed, Awadallah, et al.
Published: (2014)
by: M. Ahmed, Awadallah, et al.
Published: (2014)
Assessing digital library acceptance by postgraduate students: a proposed framework
by: Pathan, Abida Kanwal, et al.
Published: (2017)
by: Pathan, Abida Kanwal, et al.
Published: (2017)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
An enhanced macro mobility management scheme in NEMO environment to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
Evaluation of nested network mobility approaches
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
Mobility issues in hierarchical mobile IP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
A survey on scalable multicasting in mobile ad hoc
networks
by: Qabajeh, Mohammad M., et al.
Published: (2015)
by: Qabajeh, Mohammad M., et al.
Published: (2015)
Implementation e-government initiatives among Malaysian local authorities
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Medical emergency and healthcare model: enhancemet with SMS and MMS facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Statistical modeling for speech recognition
by: Khalifa, Othman Omran, et al.
Published: (2013)
by: Khalifa, Othman Omran, et al.
Published: (2013)
Design of an intelligent robotic donationbox a case study
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
The adoption of Knowledge Management Systems (KMS) among academicians in Nigeria universities
by: Salami, Ahmed, et al.
Published: (2019)
by: Salami, Ahmed, et al.
Published: (2019)
An analysis of resource sharing scheme in heterogeneous wireless campus network
by: Masud, M.H., et al.
Published: (2013)
by: Masud, M.H., et al.
Published: (2013)
A comprehensive analysis of improving the QoS of IMM traffic for high speed wireless campus network
by: Yalli, Jameel Shehu, et al.
Published: (2014)
by: Yalli, Jameel Shehu, et al.
Published: (2014)
A novel neuroscience-inspired architecture: for computer vision applications
by: Hassan, Marwa Yousif, et al.
Published: (2016)
by: Hassan, Marwa Yousif, et al.
Published: (2016)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Similar Items
-
Predicting the intention to cyberbully and cyberbullying behaviour among the undergraduate students at the International Islamic University Malaysia
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017) -
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014) -
Library online database system for undergraduate students
by: Azlan, Nor Athira, et al.
Published: (2016) -
Influence of travel and tour website on tourist behaviour to determine destination in Malaysia among IIUM students in Pagoh, Johor.
by: Borahan, Nur Saiful Amree, et al.
Published: (2020) -
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)