Table | Card | RUSMARC | |
Allowed Actions:
Group: Anonymous Network: Internet |
Annotation
"This book explores the effects of cyberbullying and cyberstalking on children and examines solutions that can identify and prevent online harassment through both policy and legislation reform and technological tools"--Provided by publisher.
Document access rights
Network | User group | Action | ||||
---|---|---|---|---|---|---|
ILC SPbPU Local Network | All |
![]() ![]() ![]() |
||||
Internet | Authorized users SPbPU |
![]() ![]() ![]() |
||||
![]() |
Internet | Anonymous |
Table of Contents
- Title Page
- Copyright Page
- Book Series
- Table of Contents
- Preface
- Section 1: Defining and Understanding Cyber Aggression
- Chapter 1: Offending, Victimization, Forensic Investigation, and Prevention of Cyberstalking
- Chapter 2: Developing an Understanding of Cyberbullying
- Chapter 3: Cyberbullying
- Chapter 4: Adolescent Victim Experiences of Cyberbullying
- Chapter 5: Cyberbullying Bystanders
- Section 2: Policy and Reform Solutions
- Chapter 6: Cyberbullying in Adolescence
- Chapter 7: Cyber Bullying
- Chapter 8: Implication of Cyberbullying on Under-Represented Students in Post-Secondary Education
- Chapter 9: Legislative Response to Cyber Aggression
- Chapter 10: Troll Farm
- Chapter 11: Digital Privacy Across Borders
- Section 3: Technological Solutions
- Chapter 12: Technological Help to Prevent and Reduce Cyberbullying
- Chapter 13: Empowering Technology Use to Promote Virtual Violence Prevention in Higher Education Context
- Chapter 14: Brute Force Search Method for Cyberbullying Detection
- Chapter 15: Entropy Based Identification of Fake Profiles in Social Network
- Related Readings
- Index
Usage statistics
pdf/2291125.pdf
|
Access count: 2
Last 30 days: 0 Detailed usage statistics |
epub/2291125.epub
|
Access count: 0
Last 30 days: 0 Detailed usage statistics |