Details
Title | Developing safer online environments for children: tools and policies for combatting cyber aggression |
---|---|
Organization | IGI Global, ; Information Resources Management Association, |
Collection | Электронные книги зарубежных издательств ; Общая коллекция |
Subjects | Cyberbullying — Prevention. ; Cyberstalking — Prevention. ; Internet and children. ; EBSCO eBooks |
Document type | Other |
File type | |
Language | English |
Rights | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Record key | on1127449560 |
Record create date | 11/12/2019 |
Allowed Actions
pdf/2291125.pdf | – |
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
|
---|---|---|
epub/2291125.epub | – |
Action 'Download' will be available if you login or access site from another network
|
Group | Anonymous |
---|---|
Network | Internet |
"This book explores the effects of cyberbullying and cyberstalking on children and examines solutions that can identify and prevent online harassment through both policy and legislation reform and technological tools"--Provided by publisher.
Network | User group | Action |
---|---|---|
ILC SPbPU Local Network | All |
|
Internet | Authorized users SPbPU |
|
Internet | Anonymous |
|
- Title Page
- Copyright Page
- Book Series
- Table of Contents
- Preface
- Section 1: Defining and Understanding Cyber Aggression
- Chapter 1: Offending, Victimization, Forensic Investigation, and Prevention of Cyberstalking
- Chapter 2: Developing an Understanding of Cyberbullying
- Chapter 3: Cyberbullying
- Chapter 4: Adolescent Victim Experiences of Cyberbullying
- Chapter 5: Cyberbullying Bystanders
- Section 2: Policy and Reform Solutions
- Chapter 6: Cyberbullying in Adolescence
- Chapter 7: Cyber Bullying
- Chapter 8: Implication of Cyberbullying on Under-Represented Students in Post-Secondary Education
- Chapter 9: Legislative Response to Cyber Aggression
- Chapter 10: Troll Farm
- Chapter 11: Digital Privacy Across Borders
- Section 3: Technological Solutions
- Chapter 12: Technological Help to Prevent and Reduce Cyberbullying
- Chapter 13: Empowering Technology Use to Promote Virtual Violence Prevention in Higher Education Context
- Chapter 14: Brute Force Search Method for Cyberbullying Detection
- Chapter 15: Entropy Based Identification of Fake Profiles in Social Network
- Related Readings
- Index