Results 41 to 50 of about 359,822 (261)
The present study examines adolescents’ experiences with, and perspectives about, parental regulation of internet-based peer socialization including cyber aggression.
Sara E. Goldstein
doaj +1 more source
To pay or not: game theoretic models of ransomware [PDF]
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim’s files with the objective of financial gain. In this article, we review and
August +38 more
core +1 more source
The volume and source of cyberabuse influences victim blame and perceptions of attractiveness [PDF]
Cyberabuse is an escalating problem in society, as opportunities for abuse to occur in online public domains increase. Such acts are often defined by the frequency of abuse, and in many cases multiple individuals play a part in the abuse.
Hand, Christopher J. +2 more
core +3 more sources
‘Dark technology’, aggressiveness and the question of cyber-ethics
The aim of this paper is to assess the role of ‘dark technology’ in contemporary society, specifically in the context of reprehensible actions in the virtual space of the internet, for example what is known as ‘fake porn’, circulated in the form of ‘deepfake’ videos.
Mbinjama-Gamatham, Adelina +1 more
openaire +4 more sources
A Look into the Future: Cyber-aggression as the Problem of Interaction in Space Exploration [PDF]
In the article, the authors broadened on the definition and concept of cyber-aggression. The authors have carried out their inquiry on the cyber-aggression in terms of the possibility of broadening of human potential by using the high-tech devices.
Dmytro Dzvinchuk, Oleksandra Kachmar
doaj +1 more source
The game transfer phenomena scale: an instrument for investigating the nonvolitional effects of video game playing [PDF]
A variety of instruments have been developed to assess different dimensions of playing videogames and its effects on cognitions, affect, and behaviors.
Anderson CA +6 more
core +2 more sources
“I h 8 u”: Findings from a five-year study of text and e-mail bullying [PDF]
Copyright @ 2010 British Educational Research Association. The final version of this article is available at the link below.This study charts reports of nasty or threatening text and e-mail messages received by students in academic years 7 and 8 (11-13 ...
Agatston P. W. +51 more
core +2 more sources
When Cyber Aggression Prediction Meets BERT on Social Media [PDF]
: Increasingly, cyber aggression becomes the prevalent phenomenon that erodes the social media environment. However, due to subjective and expense, the traditional self-reporting questionnaire is hard to be employed in the current cyber area.
Zhenkun Zhou +3 more
semanticscholar +1 more source
Classification of Cyber-Aggression Cases Applying Machine Learning
The adoption of electronic social networks as an essential way of communication has become one of the most dangerous methods to hurt people’s feelings. The Internet and the proliferation of this kind of virtual community have caused severe negative
Guadalupe Obdulia Gutiérrez-Esparza +2 more
doaj +1 more source
Factors influencing negative cyber-bystander behavior: A systematic literature review
Cyber-aggression is global epidemic affecting citizens of cyberspace, without regards to physical, geographical and time constraints. Recent research has identified the significant role of cyber-bystanders in exacerbating and de-escalating incidents on ...
Sobana Jeyagobi +5 more
doaj +1 more source

