CINXE.COM

Search results for: cyberbullying

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: cyberbullying</title> <meta name="description" content="Search results for: cyberbullying"> <meta name="keywords" content="cyberbullying"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="cyberbullying" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="cyberbullying"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 36</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: cyberbullying</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">36</span> Cyber Victimization: School Experience of Malaysian Cyberbullied Teenagers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shireen%20Simon">Shireen Simon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyberbullying among schoolchildren and teenagers became a hot issue discussed by Malaysian society. Cyberbullying is a new age of bullying because it uses the modern digital technology intentionally to hurt and degrade someone in the cyber world. Cyberbullying is a problem affecting many teenagers as they embrace online communication and interaction whereby virtual world with no borders. By adopting a qualitative approach, this study has captured 8 cyberbullied victims&rsquo; school experience. Even years after leaving school, these 8 cyberbullied victims remember how it feels to be bullied in the cyber world. The principal investigator also tries to identify the possibility factors that contribute to cyberbullying among these 8 victims. The result shows that these victims were bullied differently in cyber world. This study not just primarily focuses on cyberbullying issues among schoolchildren and teenagers; it also addresses the motives and causes of cyberbullying. Lastly, this article will be served as guidance for school teachers, parents and teenagers to prepare to tackle cyberbullying together. Cyberbullying is no laughing matter in our community, and it is time to spread the seeds of peace inspires others to do the same. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20victimization" title=" cyber victimization"> cyber victimization</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20experience" title=" school experience"> school experience</a>, <a href="https://publications.waset.org/abstracts/search?q=teenagers" title=" teenagers"> teenagers</a> </p> <a href="https://publications.waset.org/abstracts/69991/cyber-victimization-school-experience-of-malaysian-cyberbullied-teenagers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69991.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">287</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">35</span> A Systematic Review of Prevalence, Gender and Age Differences in Cyberbullying Studies in Croatia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stjepka%20Popovi%C4%87">Stjepka Popović</a>, <a href="https://publications.waset.org/abstracts/search?q=Lucija%20Vejmelka"> Lucija Vejmelka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Cyberbullying has become a prevalent issue worldwide, including in Croatia. However, a comprehensive understanding of the extent and nature of cyberbullying in the Croatian context is lacking. Objective: The objective of this systematic review is to evaluate the quality of current research conducted in Croatia on the subject of cyberbullying, identify any gaps in the research, and provide suggestions for future investigations. It examines the prevalence gender and age differences of cyberbullying in Croatia. Participants and Setting: Research is done on secondary data resources (published studies) of cyberbullying in Croatia. The participants in these studies that were included in systematic review are children and youth of all ages residing in Croatia who have been involved in cyberbullying incidents. The setting includes various environments where cyberbullying may occur, such as social media platforms and educational institutions. Methods: To identify pertinent studies on cyberbullying in Croatia, a comprehensive exploration of both international and domestic electronic databases was systematically undertaken. Relevant studies were chosen according to predefined criteria that determined inclusion and exclusion. Key findings from the selected studies were extracted and synthesized, enabling the identification of patterns in the data. Results: A total of 43 studies that fulfilled the inclusion criteria were identified in the review. The prevalence of cyberbullying victimization in Croatia ranged from 7% - 55.3%, with adolescents being the most affected group. The prevalence of cyberbullying perpetration was ranging from 3.2% - 30.3%. The most prevalent form of cyberbullying included gossiping and mocking others. Gender and age differences are highlighted. Conclusions: The outcomes of this systematic review highlight the pressing need for targeted interventions and preventative measures to address cyberbullying in Croatia. Additionally, it is crucial to conduct further research to investigate the long-term impacts and potential factors that can help mitigate cyberbullying in the context of Croatia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20risky%20behavior" title=" online risky behavior"> online risky behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=Croatia" title=" Croatia"> Croatia</a>, <a href="https://publications.waset.org/abstracts/search?q=systematic%20review" title=" systematic review"> systematic review</a> </p> <a href="https://publications.waset.org/abstracts/176585/a-systematic-review-of-prevalence-gender-and-age-differences-in-cyberbullying-studies-in-croatia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176585.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">85</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">34</span> A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sultan%20Alanazi">Sultan Alanazi</a>, <a href="https://publications.waset.org/abstracts/search?q=Adwan%20Alanazi"> Adwan Alanazi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20bullying" title=" cyber bullying"> cyber bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20crimes" title=" internet crimes"> internet crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media%20security" title=" social media security"> social media security</a>, <a href="https://publications.waset.org/abstracts/search?q=E-crimes" title=" E-crimes"> E-crimes</a> </p> <a href="https://publications.waset.org/abstracts/137557/a-framework-for-protecting-teenagers-from-cyber-crimes-and-cyberbullying" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137557.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">33</span> Factors Influencing Accidental Cyberbullying on Social Media: Healthcare Industry Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iram%20Malik">Iram Malik</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahrukh%20Shaukat"> Mahrukh Shaukat</a>, <a href="https://publications.waset.org/abstracts/search?q=Abeer%20Malik"> Abeer Malik</a>, <a href="https://publications.waset.org/abstracts/search?q=Hafiz%20Mushtaq%20Ahmad"> Hafiz Mushtaq Ahmad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There has been a lot of research on cyberbullying but there is limited research on the topic of accidental cyberbullying on social media with a special focus on healthcare industry. This study emphasizes to uncover the factors that contribute to accidental cyberbullying on social media and how it affects individuals, professionals’ and organizations in health care sector. Nowadays social media is becoming a necessary part of our daily life; there is a need to look into how it is shaping our social life and behaviors displayed online. Instances of cyber bullying can have long-term repercussions due to over-sharing of information. The study used simple random sampling and the instrument of data collection was survey. A sample size of 250 healthcare professionals was chosen from the twin cities of Rawalpindi and Islamabad, Pakistan to examine the relationship between their attitude towards internet use, psychological distress, verbal aggression, envy, frustration, self-compassion, personality traits and accidental cyberbullying on social media. The results of the study have been encouraging. The findings show that psychological distress, aggression, envy, frustration and personality traits had direct effect on accidental cyberbullying whereas compassion, altruism lessened the effect of accidental cyberbullying behavior. It is our intent that the findings of this study could help raise awareness regarding fair use of social media, help policy makers in developing appropriate policies for avoiding cyberbullying in future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=accidental%20cyberbullying" title="accidental cyberbullying">accidental cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=aggression" title=" aggression"> aggression</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=frustration" title=" frustration"> frustration</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a> </p> <a href="https://publications.waset.org/abstracts/61428/factors-influencing-accidental-cyberbullying-on-social-media-healthcare-industry-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61428.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">288</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> The Relationship Between Cyberbullying Victimization, Parent and Peer Attachment and Unconditional Self-Acceptance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Florina%20Magdalena%20Anichitoae">Florina Magdalena Anichitoae</a>, <a href="https://publications.waset.org/abstracts/search?q=Anca%20Dobrean"> Anca Dobrean</a>, <a href="https://publications.waset.org/abstracts/search?q=Ionut%20Stelian%20Florean"> Ionut Stelian Florean</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the fact that cyberbullying victimization is an increasing problem nowadays, affecting more and more children and adolescents around the world, we wanted to take a step forward analyzing this phenomenon. So, we took a look at some variables which haven't been studied together before, trying to develop another way to view cyberbullying victimization. We wanted to test the effects of the mother, father, and peer attachment on adolescent involvement in cyberbullying as victims through unconditional self acceptance. Furthermore, we analyzed each subscale of the IPPA-R, the instrument we have used for parents and peer attachment measurement, in regards to cyberbullying victimization through unconditional self acceptance. We have also analyzed if gender and age could be taken into consideration as moderators in this model. The analysis has been performed on 653 adolescents aged 11-17 years old from Romania. We used structural equation modeling, working in R program. For the fidelity analysis of the IPPA-R subscales, USAQ, and Cyberbullying Test, we have calculated the internal consistency index, which varies between .68-.91. We have created 2 models: the first model including peer alienation, peer trust, peer communication, self acceptance and cyberbullying victimization, having CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07, and the second model including parental alienation, parental trust, parental communication, self acceptance and cyberbullying victimization and had CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07. Our results were interesting: on one hand, cyberbullying victimization is predicted by peer alienation and peer communication through unconditional self acceptance. Peer trust directly, significantly, and negatively predicted the implication in cyberbullying. In this regard, considering gender and age as moderators, we found that the relationship between unconditional self acceptance and cyberbullying victimization is stronger in girls, but age does not moderate the relationship between unconditional self acceptance and cyberbullying victimization. On the other hand, regarding the degree of cyberbullying victimization as being predicted through unconditional self acceptance by parental alienation, parental communication, and parental trust, this hypothesis was not supported. Still, we could identify a direct path to positively predict victimization through parental alienation and negatively through parental trust. There are also some limitations to this study, which we've discussed in the end. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adolescent" title="adolescent">adolescent</a>, <a href="https://publications.waset.org/abstracts/search?q=attachment" title=" attachment"> attachment</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying%20victimization" title=" cyberbullying victimization"> cyberbullying victimization</a>, <a href="https://publications.waset.org/abstracts/search?q=parents" title=" parents"> parents</a>, <a href="https://publications.waset.org/abstracts/search?q=peers" title=" peers"> peers</a>, <a href="https://publications.waset.org/abstracts/search?q=unconditional%20self-acceptance" title=" unconditional self-acceptance"> unconditional self-acceptance</a> </p> <a href="https://publications.waset.org/abstracts/141868/the-relationship-between-cyberbullying-victimization-parent-and-peer-attachment-and-unconditional-self-acceptance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141868.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">204</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> Machine Learning Automatic Detection on Twitter Cyberbullying</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raghad%20A.%20Altowairgi">Raghad A. Altowairgi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the wide spread of social media platforms, young people tend to use them extensively as the first means of communication due to their ease and modernity. But these platforms often create a fertile ground for bullies to practice their aggressive behavior against their victims. Platform usage cannot be reduced, but intelligent mechanisms can be implemented to reduce the abuse. This is where machine learning comes in. Understanding and classifying text can be helpful in order to minimize the act of cyberbullying. Artificial intelligence techniques have expanded to formulate an applied tool to address the phenomenon of cyberbullying. In this research, machine learning models are built to classify text into two classes; cyberbullying and non-cyberbullying. After preprocessing the data in 4 stages; removing characters that do not provide meaningful information to the models, tokenization, removing stop words, and lowering text. BoW and TF-IDF are used as the main features for the five classifiers, which are; logistic regression, Naïve Bayes, Random Forest, XGboost, and Catboost classifiers. Each of them scores 92%, 90%, 92%, 91%, 86% respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=Bag-of-Words" title=" Bag-of-Words"> Bag-of-Words</a>, <a href="https://publications.waset.org/abstracts/search?q=term%20frequency-inverse%20document%20frequency" title=" term frequency-inverse document frequency"> term frequency-inverse document frequency</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20language%20processing" title=" natural language processing"> natural language processing</a>, <a href="https://publications.waset.org/abstracts/search?q=Catboost" title=" Catboost"> Catboost</a> </p> <a href="https://publications.waset.org/abstracts/153027/machine-learning-automatic-detection-on-twitter-cyberbullying" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153027.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">130</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> Exploring the Relationships between Cyberbullying Perceptions and Facebook Attitudes of Turkish Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yavuz%20Erdo%C4%9Fan">Yavuz Erdoğan</a>, <a href="https://publications.waset.org/abstracts/search?q=Hidayet%20%C3%87ift%C3%A7i"> Hidayet Çiftçi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyberbullying, a phenomenon among adolescents, is defined as actions that use information and communication technologies such as social media to support deliberate, repeated, and hostile behaviour by an individual or group. With the advancement in communication and information technology, cyberbullying has expanded its boundaries among students in schools. Thus, parents, psychologists, educators, and lawmakers must become aware of the potential risks of this phenomenon. In the light of these perspectives, this study aims to investigate the relationships between cyberbullying perception and Facebook attitudes of Turkish students. A survey method was used for the study and the data were collected by “Cyberbullying Perception Scale”, “Facebook Attitude Scale” and “Personal Information Form”. For this purpose, study has been conducted during 2014-2015 academic year, with a total of 748 students with 493 male (%65.9) and 255 female (%34.1) from randomly selected high schools. In the analysis of data Pearson correlation and multiple regression analysis, multivariate analysis of variance (MANOVA) and Scheffe post hoc test has been used. At the end of the study, the results displayed a negative correlation between Turkish students’ Facebook attitudes and cyberbullying perception (r=-.210; p<0.05). In order to identify the predictors of students’ cyberbullying perception, multiple regression analysis was used. As a result, significant relations were detected between cyberbullying perception and independent variables (F=5.102; p<0.05). Independent variables together explain 11.0% of the total variance in cyberbullying scores. The variables that significantly predict the students’ cyberbullying perception are Facebook attitudes (t=-5.875; p<0.05), and gender (t=3.035; p<0.05). In order to calculate the effects of independent variables on students’ Facebook attitudes and cyberbullying perception MANOVA was conducted. The results of the MANOVA indicate that the Facebook attitudes and cyberbullying perception were significantly differed according to students’ gender, age, educational attainment of the mother, educational attainment of the father, income of the family and daily usage of internet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=facebook" title="facebook">facebook</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=attitude" title=" attitude"> attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20usage" title=" internet usage"> internet usage</a> </p> <a href="https://publications.waset.org/abstracts/30462/exploring-the-relationships-between-cyberbullying-perceptions-and-facebook-attitudes-of-turkish-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30462.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">29</span> How Unpleasant Emotions, Morals and Normative Beliefs of Severity Relate to Cyberbullying Intentions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Paula%20C.%20Ferreira">Paula C. Ferreira</a>, <a href="https://publications.waset.org/abstracts/search?q=Ana%20Margarida%20Veiga%20Sim%C3%A3o"> Ana Margarida Veiga Simão</a>, <a href="https://publications.waset.org/abstracts/search?q=N%C3%A1dia%20Pereira"> Nádia Pereira</a>, <a href="https://publications.waset.org/abstracts/search?q=Aristides%20Ferreira"> Aristides Ferreira</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexandra%20Marques%20Pinto"> Alexandra Marques Pinto</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexandra%20Barros"> Alexandra Barros</a>, <a href="https://publications.waset.org/abstracts/search?q=Vitor%20Martinho"> Vitor Martinho</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyberbullying is a phenomenon of worldwide concern regarding children and adolescents’ mental health and risk behavior. Bystanders of this phenomenon can help diminish the incidence of this phenomenon if they engage in pro-social behavior. However, different social-cognitive and affective bystander reactions may surface because of the lack of contextual information and emotional cues in cyberbullying situations. Hence, this study investigated how cyberbullying bystanders’ unpleasant emotions could be related to their personal moral beliefs and their behavioral intentions to cyberbully or defend the victim. It also proposed to investigate how their normative beliefs of perceived severity about cyberbullying behavior could be related to their personal moral beliefs and their behavioral intentions. Three groups of adolescents participated in this study, namely a first of group 402 students (5th – 12th graders; Mage = 13.12; SD = 2.19; 55.7% girls) to compute explorative factorial analyses of the instruments used; a second group of 676 students (5th – 12th graders; Mage = 14.10; SD = 2.74; 55.5% were boys) to run confirmatory factor analyses; and a third group (N = 397; 5th – 12th graders; Mage = 13.88 years; SD = 1.45; 55.5% girls) to perform the main analyses to test the research hypotheses. Self-report measures were used, such as the Personal moral beliefs about cyberbullying behavior questionnaire, the Normative beliefs of perceived severity about cyberbullying behavior questionnaire, the Unpleasant emotions about cyberbullying incidents questionnaires, and the Bystanders’ behavioral intentions in cyberbullying situations questionnaires. Path analysis results revealed that unpleasant emotions were mediators of the relationship between adolescent cyberbullying bystanders’ personal moral beliefs and their intentions to help the victims in cyberbullying situations. Moreover, adolescent cyberbullying bystanders’ normative beliefs of gravity were mediators of the relationship between their personal moral beliefs and their intentions to cyberbully others. These findings provide insights for the development of prevention and intervention programs that promote social and emotional learning strategies as a means to prevent and intervene in cyberbullying. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=normative%20beliefs%20of%20perceived%20severity" title=" normative beliefs of perceived severity"> normative beliefs of perceived severity</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20moral%20beliefs" title=" personal moral beliefs"> personal moral beliefs</a>, <a href="https://publications.waset.org/abstracts/search?q=unpleasant%20emotions" title=" unpleasant emotions"> unpleasant emotions</a> </p> <a href="https://publications.waset.org/abstracts/142308/how-unpleasant-emotions-morals-and-normative-beliefs-of-severity-relate-to-cyberbullying-intentions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142308.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">216</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> Using the Theory of Reasoned Action and Parental Mediation Theory to Examine Cyberbullying Perpetration among Children and Adolescents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shirley%20S.%20Ho">Shirley S. Ho</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The advancement and development of social media have inadvertently brought about a new form of bullying – cyberbullying – that transcends across physical boundaries of space. Although extensive research has been conducted in the field of cyberbullying, most of these studies have taken an overwhelmingly empirical angle. Theories guiding cyberbullying research are few. Furthermore, very few studies have explored the association between parental mediation and cyberbullying, with majority of existing studies focusing on cyberbullying victimization rather than perpetration. Therefore, this present study investigates cyberbullying perpetration from a theoretical angle, with a focus on the Theory of Reasoned Action and the Parental Mediation Theory. More specifically, this study examines the direct effects of attitude, subjective norms, descriptive norms, injunctive norms and active mediation and restrictive mediation on cyberbullying perpetration on social media among children and adolescents in Singapore. Furthermore, the moderating role of age on the relationship between parental mediation and cyberbullying perpetration on social media are examined. A self-administered paper-and-pencil nationally-representative survey was conducted. Multi-stage cluster random sampling was used to ensure that schools from all the four (North, South, East, and West) regions of Singapore were equally represented in the sample used for the survey. In all 607 upper primary school children (i.e., Primary 4 to 6 students) and 782 secondary school adolescents participated in our survey. The total average response rates were 69.6% for student participation. An ordinary least squares hierarchical regression analysis was conducted to test the hypotheses and research questions. The results revealed that attitude and subjective norms were positively associated with cyberbullying perpetration on social media. Descriptive norms and injunctive norms were not found to be significantly associated with cyberbullying perpetration. The results also showed that both parental mediation strategies were negatively associated with cyberbullying perpetration on social media. Age was a significant moderator of both parental mediation strategies and cyberbullying perpetration. The negative relationship between active mediation and cyberbullying perpetration was found to be greater in the case of children than adolescents. Children who received high restrictive parental mediation were less likely to perform cyberbullying behaviors, while adolescents who received high restrictive parental mediation were more likely to be engaged in cyberbullying perpetration. The study reveals that parents should apply active mediation and restrictive mediation in different ways for children and adolescents when trying to prevent cyberbullying perpetration. The effectiveness of active parental mediation for reducing cyberbullying perpetration was more in the case of children than for adolescents. Younger children were found to be more likely to respond more positively toward restrictive parental mediation strategies, but in the case of adolescents, overly restrictive control was found to increase cyberbullying perpetration. Adolescents exhibited less cyberbullying behaviors when under low restrictive strategies. Findings highlight that the Theory of Reasoned Action and Parental Mediation Theory are promising frameworks to apply in the examination of cyberbullying perpetration. The findings that different parental mediation strategies had differing effectiveness, based on the children’s age, bring about several practical implications that may benefit educators and parents when addressing their children’s online risk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying%20perpetration" title="cyberbullying perpetration">cyberbullying perpetration</a>, <a href="https://publications.waset.org/abstracts/search?q=theory%20of%20reasoned%20action" title=" theory of reasoned action"> theory of reasoned action</a>, <a href="https://publications.waset.org/abstracts/search?q=parental%20mediation" title=" parental mediation"> parental mediation</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=Singapore" title=" Singapore"> Singapore</a> </p> <a href="https://publications.waset.org/abstracts/59756/using-the-theory-of-reasoned-action-and-parental-mediation-theory-to-examine-cyberbullying-perpetration-among-children-and-adolescents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59756.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> The Consequences of Cyberbullying and School Violence: Risk and Protective Factors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ifigenia%20Stylianou">Ifigenia Stylianou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As more than three-quarters of students going online daily via computers, tablets, and smartphones, the phenomenon of cyberbullying is growing rapidly. Knowing that victims of online bullying are often also victims of traditional bullying and that traditional bullying is considered as an extension of cyberbullying. In this study, we aim to identify (1) whether cyberbullying lead to more intense forms of school bullying, and (2) whether some biological and environmental factors mediate between this relation, and act protectively to bullying and inappropriate behaviour in school. To answer this questions, a sample of X students, aged X, were asked to complete eight questionnaires (Personal Experiences Checklist, Inventory of Peers Attachment, Questionnaire on Teacher Interaction, School Climate Survey for Bullying, Strengths and Difficulties Questionnaire, Youth Psychopathic Traits Inventory-Short Form, Barratt Impulsiveness Scale-11) in X time periods. Results can provide us important information to improve understanding the factors that are related to bullying. In addition, the results can assist in developing intervention programs to tangle the issue of bullying at schools. All data have been collected and are currently being processed for statistical analyses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=bullying" title=" bullying"> bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20climate" title=" school climate"> school climate</a>, <a href="https://publications.waset.org/abstracts/search?q=psychopathy%20traits" title=" psychopathy traits"> psychopathy traits</a>, <a href="https://publications.waset.org/abstracts/search?q=attachment" title=" attachment"> attachment</a>, <a href="https://publications.waset.org/abstracts/search?q=mediation%20factors" title=" mediation factors"> mediation factors</a> </p> <a href="https://publications.waset.org/abstracts/81975/the-consequences-of-cyberbullying-and-school-violence-risk-and-protective-factors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81975.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">233</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> Technology Enabled Bullying and Adolescent Reporting Response Behaviours</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Regina%20Connolly">Regina Connolly</a>, <a href="https://publications.waset.org/abstracts/search?q=Justin%20Connolly"> Justin Connolly</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Despite the benefits which they confer, Information & Communication Technologies (ICT) also have the potential to be used negatively. This paper focuses on one of those negative social effects - adolescent cyberbullying. Although early research in this field has pointed to the fact that the successful intervention and resolution of bullying incidents is to a large degree dependent on such incidents being reported to an adult caregiver, the literature consistently shows that adolescents who have been bullied tend not to inform others of their experiences. However, the reasons underlying such reluctance to seek adult intervention remain undetermined. Similarly, the degree to which gender, age or other variables apply in the case of adolescents’ resistance to report cyberbullying experiences has yet to be established. Understanding the factors that influence this resistance to communicate on the part of adolescents will assist caregivers, teachers and those involved in the formulation of school anti-bullying policies in their attempts to counter the cyberbullying phenomenon. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20and%20Communication%20technologies" title="information and Communication technologies">information and Communication technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=technology-enabled%20bullying" title=" technology-enabled bullying"> technology-enabled bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a> </p> <a href="https://publications.waset.org/abstracts/20597/technology-enabled-bullying-and-adolescent-reporting-response-behaviours" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20597.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> Detecting Cyberbullying, Spam and Bot Behavior and Fake News in Social Media Accounts Using Machine Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20D.%20D.%20Chathurangi">M. D. D. Chathurangi</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20G.%20K.%20Nayanathara"> M. G. K. Nayanathara</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20M.%20H.%20M.%20M.%20Gunapala"> K. M. H. M. M. Gunapala</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20M.%20R.%20G.%20Dayananda"> G. M. R. G. Dayananda</a>, <a href="https://publications.waset.org/abstracts/search?q=Kavinga%20Yapa%20Abeywardena"> Kavinga Yapa Abeywardena</a>, <a href="https://publications.waset.org/abstracts/search?q=Deemantha%20Siriwardana"> Deemantha Siriwardana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the growing popularity of social media platforms at present, there are various concerns, mostly cyberbullying, spam, bot accounts, and the spread of incorrect information. To develop a risk score calculation system as a thorough method for deciphering and exposing unethical social media profiles, this research explores the most suitable algorithms to our best knowledge in detecting the mentioned concerns. Various multiple models, such as Naïve Bayes, CNN, KNN, Stochastic Gradient Descent, Gradient Boosting Classifier, etc., were examined, and the best results were taken into the development of the risk score system. For cyberbullying, the Logistic Regression algorithm achieved an accuracy of 84.9%, while the spam-detecting MLP model gained 98.02% accuracy. The bot accounts identifying the Random Forest algorithm obtained 91.06% accuracy, and 84% accuracy was acquired for fake news detection using SVM. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=spam%20behavior" title=" spam behavior"> spam behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=bot%20accounts" title=" bot accounts"> bot accounts</a>, <a href="https://publications.waset.org/abstracts/search?q=fake%20news" title=" fake news"> fake news</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/186451/detecting-cyberbullying-spam-and-bot-behavior-and-fake-news-in-social-media-accounts-using-machine-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186451.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">36</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">24</span> Cyberbullying among College Students: Prevalence and Effects on Psychological Well-Being</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jeyaseelan%20Maria%20Michael">Jeyaseelan Maria Michael</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigated the prevalence of cyberbullying among college female students and its effects on their psychological well-being. The respondents were from the age group of 17 and 18, doing the first-year college in Tamilnadu, India. In this study, 110 participants were selected through simple random sampling. The standardized questionnaire of David Alvare-Garcia’s Cybervictimization Questionnaire for Adolescents (CYVIC) and Ryff’s Psychological Well-Being (PWB) were administered for data collection. CYVIC has four subdomains namely, impersonation, visual-sexual cybervictimization, written-verbal cybervictimization, online exclusion. Ryff’s PWB has six domains namely, autonomy, environmental mastery, personal growth, positive relations with others, purpose in life, and self- acceptance. The collected data were analyzed by SPSS v.23. The results indicate that cyberbullying prevails among college female students (M=1.24, SD= .21). Among the participants, 17 are scored one standard deviation above the mean (1.45). Among the subdomains of the CYVIC, the respondents have the highest score (M=1.40, SD= .38) in written-verbal cybervictimization. Cyber victimization has a significant correlation at the 0.01 level with psychological well-being. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=college%20students" title="college students">college students</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20victimization" title=" cyber victimization"> cyber victimization</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological%20well-being" title=" psychological well-being"> psychological well-being</a> </p> <a href="https://publications.waset.org/abstracts/106977/cyberbullying-among-college-students-prevalence-and-effects-on-psychological-well-being" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106977.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">127</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> Clinical Correlates of Suicide Attempts in Trauma-Exposed Youth</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sandra%20Landy">Sandra Landy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Traumatic experiences in youth are a major risk factor for future suicidality. With suicide steadily increasing over the last 20 years as one of the top three leading causes of death in children and adolescents, it is essential to examine the aspects of trauma that contribute to suicidality. A quantitative secondary data analysis of a prospective, multicenter 24-month observational study of youth who have experienced traumatic experiences was utilized to determine the relationship between bullying and suicide attempts, cyberbullying and suicide attempts, and number of traumas and suicide attempts. Data was analyzed with the Spearman-rank correlation test to determine the relationships. Findings supported past research establishing a relationship between bulling, including cyberbullying, and suicide attempts, as well as increasing number of traumatic experiences and suicide attempts. Further large scale studies may be beneficial to support these findings. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adolescent%28s%29" title="adolescent(s)">adolescent(s)</a>, <a href="https://publications.waset.org/abstracts/search?q=suicide" title=" suicide"> suicide</a>, <a href="https://publications.waset.org/abstracts/search?q=trauma" title=" trauma"> trauma</a>, <a href="https://publications.waset.org/abstracts/search?q=bullying" title=" bullying"> bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a> </p> <a href="https://publications.waset.org/abstracts/185429/clinical-correlates-of-suicide-attempts-in-trauma-exposed-youth" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185429.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">44</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">22</span> Detecting Hate Speech And Cyberbullying Using Natural Language Processing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N%C3%A1dia%20Pereira">Nádia Pereira</a>, <a href="https://publications.waset.org/abstracts/search?q=Paula%20Ferreira"> Paula Ferreira</a>, <a href="https://publications.waset.org/abstracts/search?q=Sofia%20Francisco"> Sofia Francisco</a>, <a href="https://publications.waset.org/abstracts/search?q=Sofia%20Oliveira"> Sofia Oliveira</a>, <a href="https://publications.waset.org/abstracts/search?q=Sidclay%20Souza"> Sidclay Souza</a>, <a href="https://publications.waset.org/abstracts/search?q=Paula%20Paulino"> Paula Paulino</a>, <a href="https://publications.waset.org/abstracts/search?q=Ana%20Margarida%20Veiga%20Sim%C3%A3o"> Ana Margarida Veiga Simão</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social media has progressed into a platform for hate speech among its users, and thus, there is an increasing need to develop automatic detection classifiers of offense and conflicts to help decrease the prevalence of such incidents. Online communication can be used to intentionally harm someone, which is why such classifiers could be essential in social networks. A possible application of these classifiers is the automatic detection of cyberbullying. Even though identifying the aggressive language used in online interactions could be important to build cyberbullying datasets, there are other criteria that must be considered. Being able to capture the language, which is indicative of the intent to harm others in a specific context of online interaction is fundamental. Offense and hate speech may be the foundation of online conflicts, which have become commonly used in social media and are an emergent research focus in machine learning and natural language processing. This study presents two Portuguese language offense-related datasets which serve as examples for future research and extend the study of the topic. The first is similar to other offense detection related datasets and is entitled Aggressiveness dataset. The second is a novelty because of the use of the history of the interaction between users and is entitled the Conflicts/Attacks dataset. Both datasets were developed in different phases. Firstly, we performed a content analysis of verbal aggression witnessed by adolescents in situations of cyberbullying. Secondly, we computed frequency analyses from the previous phase to gather lexical and linguistic cues used to identify potentially aggressive conflicts and attacks which were posted on Twitter. Thirdly, thorough annotation of real tweets was performed byindependent postgraduate educational psychologists with experience in cyberbullying research. Lastly, we benchmarked these datasets with other machine learning classifiers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aggression" title="aggression">aggression</a>, <a href="https://publications.waset.org/abstracts/search?q=classifiers" title=" classifiers"> classifiers</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=datasets" title=" datasets"> datasets</a>, <a href="https://publications.waset.org/abstracts/search?q=hate%20speech" title=" hate speech"> hate speech</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/142382/detecting-hate-speech-and-cyberbullying-using-natural-language-processing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142382.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">228</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">21</span> A Qualitative Study on Cyberbullying and Traditional Bullying among Taiwanese High School Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-Wen%20Wang">Chia-Wen Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Patou%20Masika%20Musumari"> Patou Masika Musumari</a>, <a href="https://publications.waset.org/abstracts/search?q=Teeranee%20Techasrivichien"> Teeranee Techasrivichien</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Pilar%20Suguimoto"> S. Pilar Suguimoto</a>, <a href="https://publications.waset.org/abstracts/search?q=Chang-Chuan%20Chan"> Chang-Chuan Chan</a>, <a href="https://publications.waset.org/abstracts/search?q=Masako%20Ono-Kihara"> Masako Ono-Kihara</a>, <a href="https://publications.waset.org/abstracts/search?q=Masahiro%20Kihara"> Masahiro Kihara </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: In recent years, a particular form of bullying, referred to as 'cyberbullying' has emerged along with the rapid expansion of the Internet, social network services (SNSs) and smart phones. Many Asian countries, including Taiwan, are faced with both the cyberbullying and the traditional form of bullying. This study aims to explore Taiwanese adolescents’ experiences, perceptions and opinions regarding cyberbullying and traditional bullying through the perspective of victim, perpetrator, or witness. Method: This is a qualitative study using face-to-face in-depth interviews guided by a semi-structured questionnaire among high school students -aged 16 to 18 years- in Taipei, Taiwan. The participants were recruited through convenience sampling from five high schools between June and November 2016. Interviews were digitally recorded, transcribed, and analyzed using the thematic analysis approach. Results: Forty-eight participants were recruited, of which, 14 (29.2%) reported had ever experienced bullying. Specifically, 7 participants (14.6%) reported had ever been victims of cyberbullying, 1 (2%) had been victims of traditional bullying, and 6 (12.5%) had been victims of both cyber and traditional bullying. The majority (70.8%) reported had ever witnessed acts of bullying; however, none of the participants recognized had ever been a perpetrator of bullying. Cyberbullying mostly happens on social media (Facebook and Instagram) or LINE instant messaging application, and included upload and sharing of degrading pictures and videos of victims, as well as gossip and mean messages by the perpetrators. The anonymous and public nature of social media groups in schools made it easier to perpetrate bullying. The victim of traditional bullying reported being the target of verbal attack because of his physical appearance. Regardless of the type of bullying, victims reported feeling bad, angry, or depressed as a result of being bullied. Witnesses of both cyber- and traditional bullying cited physical appearance (e.g. having the big/flat bust or big butt, or overweight or obese) and disability as the most reasons of being a bullying victim. Conclusion: Both cyberbullying and traditional bullying had negative emotional and psychological impacts on victims. This study warrants further research to assess the extent of this phenomenon and understand the characteristics of perpetrators, victims, and witnesses to inform the design of tailored interventions using appropriate channels of dissemination. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20bullying" title=" traditional bullying"> traditional bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescents" title=" adolescents"> adolescents</a> </p> <a href="https://publications.waset.org/abstracts/65802/a-qualitative-study-on-cyberbullying-and-traditional-bullying-among-taiwanese-high-school-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65802.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">345</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">20</span> Machine Learning Techniques to Predict Cyberbullying and Improve Social Work Interventions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Oscar%20E.%20Cariceo">Oscar E. Cariceo</a>, <a href="https://publications.waset.org/abstracts/search?q=Claudia%20V.%20Casal"> Claudia V. Casal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Machine learning offers a set of techniques to promote social work interventions and can lead to support decisions of practitioners in order to predict new behaviors based on data produced by the organizations, services agencies, users, clients or individuals. Machine learning techniques include a set of generalizable algorithms that are data-driven, which means that rules and solutions are derived by examining data, based on the patterns that are present within any data set. In other words, the goal of machine learning is teaching computers through 'examples', by training data to test specifics hypothesis and predict what would be a certain outcome, based on a current scenario and improve that experience. Machine learning can be classified into two general categories depending on the nature of the problem that this technique needs to tackle. First, supervised learning involves a dataset that is already known in terms of their output. Supervising learning problems are categorized, into regression problems, which involve a prediction from quantitative variables, using a continuous function; and classification problems, which seek predict results from discrete qualitative variables. For social work research, machine learning generates predictions as a key element to improving social interventions on complex social issues by providing better inference from data and establishing more precise estimated effects, for example in services that seek to improve their outcomes. This paper exposes the results of a classification algorithm to predict cyberbullying among adolescents. Data were retrieved from the National Polyvictimization Survey conducted by the government of Chile in 2017. A logistic regression model was created to predict if an adolescent would experience cyberbullying based on the interaction and behavior of gender, age, grade, type of school, and self-esteem sentiments. The model can predict with an accuracy of 59.8% if an adolescent will suffer cyberbullying. These results can help to promote programs to avoid cyberbullying at schools and improve evidence based practice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=evidence%20based%20practice" title=" evidence based practice"> evidence based practice</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20work%20research" title=" social work research"> social work research</a> </p> <a href="https://publications.waset.org/abstracts/101259/machine-learning-techniques-to-predict-cyberbullying-and-improve-social-work-interventions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101259.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">168</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">19</span> Commentary on Successful and Emerging Bullying Control Programs: A Comparison between Eighteen Bullying Interventions Applied Worldwide</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sohni%20Siddiqui">Sohni Siddiqui</a>, <a href="https://publications.waset.org/abstracts/search?q=Anja%20Schultze-Krumbholz"> Anja Schultze-Krumbholz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Our lives now revolve more around online-related tasks, as the internet has become a necessity. One of the disturbance concerns with high internet usage is the multiplication of cyber-associated risky behaviors such as cyber aggression and/or cyberbullying. Cyber Bullying is an emerging issue that needs immediate attention from many stakeholders such as parents, doctors, school administrators, policymakers, researchers, and others, especially in the COVID-19 pandemic when online learning has been adopted as an instructional strategy, and there is a continuous rise in cyberbullying cases. The aim of the article is to review existing successful and emerging interventions designed to control bullying and cyberbullying by engaging individuals through teachers’ professional development and adopting a whole-school approach. The study identified the strengths and limitations of the programs and suggested improvements to existing interventions. Preparing interventions with a strong theoretical framework, integrating applications of emerging theories in interventions, promoting proactive and reactive strategies in combination, beginning with the baseline needs assessment surveys, reducing digital time and digital divide among parents and children, promoting the concept of lead trainer, peer trainer, and hot spots, focusing on physical activities, use of landmarks are some of the recommendations proposed by authors. In addition to face-to-face intervention, the researchers recommend updating and improving previous intervention programs with games and apps. Especially in the time of pandemic crises, when face-to-face interactions are limited and cyberbullying is triggered, the use of apps, web-based interventions, and games can be an effective way to control electronic perpetration and victimization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti%20bullying%20programs" title="anti bullying programs">anti bullying programs</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20bullying" title=" cyber bullying"> cyber bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=individualized%20trainings" title=" individualized trainings"> individualized trainings</a>, <a href="https://publications.waset.org/abstracts/search?q=teachers%E2%80%99%20professional%20development" title=" teachers’ professional development"> teachers’ professional development</a>, <a href="https://publications.waset.org/abstracts/search?q=whole%20school%20interventions" title=" whole school interventions"> whole school interventions</a> </p> <a href="https://publications.waset.org/abstracts/145901/commentary-on-successful-and-emerging-bullying-control-programs-a-comparison-between-eighteen-bullying-interventions-applied-worldwide" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145901.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18</span> Kiddo: Design and Prototype of a Useable Mobile Application for Kids to Learn under Parental Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Albandary%20Alamer">Albandary Alamer</a>, <a href="https://publications.waset.org/abstracts/search?q=Noura%20Alaskar"> Noura Alaskar</a>, <a href="https://publications.waset.org/abstracts/search?q=Sana%20Bukhamseen"> Sana Bukhamseen</a>, <a href="https://publications.waset.org/abstracts/search?q=Jawaher%20Alkhamis"> Jawaher Alkhamis</a>, <a href="https://publications.waset.org/abstracts/search?q=Enas%20Alghamdi"> Enas Alghamdi</a>, <a href="https://publications.waset.org/abstracts/search?q=Almaha%20Almulhim"> Almaha Almulhim</a>, <a href="https://publications.waset.org/abstracts/search?q=Hina%20Gull"> Hina Gull</a>, <a href="https://publications.waset.org/abstracts/search?q=Rachid%20Zagrouba"> Rachid Zagrouba</a>, <a href="https://publications.waset.org/abstracts/search?q=Madeeha%20Saqib"> Madeeha Saqib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A good and healthy seed will always produce a nice fruit, whereas an infected seed will produce an infected fruit. The same concept applies to the children, and the healthier the environment in which the kids grow, the more likely they become valuable members of society. Kiddo project introduces us to a mobile application that focuses on enhancing the sense of responsibility from a young age and makes raising kids fun and easy. The application aims to enhance the communication between parents and their children and to enrich the good habits of the kid. Kiddo Application enables kids to share their accomplishments with their peers in an interactive environment full of enjoyment, followed by parental monitoring to handle what their kids are posting and friends following. Kiddo provides the kids' and parents’ society with a safe platform free of cyberbullying and inappropriate content with parents' fun engagement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=kids%20social%20media" title="kids social media">kids social media</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20app" title=" educational app"> educational app</a>, <a href="https://publications.waset.org/abstracts/search?q=child-raising" title=" child-raising"> child-raising</a>, <a href="https://publications.waset.org/abstracts/search?q=parental%20control" title=" parental control"> parental control</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=parent-child%20relationship" title=" parent-child relationship"> parent-child relationship</a>, <a href="https://publications.waset.org/abstracts/search?q=good%20habits" title=" good habits"> good habits</a> </p> <a href="https://publications.waset.org/abstracts/149933/kiddo-design-and-prototype-of-a-useable-mobile-application-for-kids-to-learn-under-parental-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149933.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17</span> The Online Power of Values: Adolescents’ Values as Predicting Factors of Their Online Bystanders’ Behavior While Witnessing Cyberbullying</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sharon%20Cayzer-Haller">Sharon Cayzer-Haller</a>, <a href="https://publications.waset.org/abstracts/search?q=Shir%20Ginosar-Yaari"> Shir Ginosar-Yaari</a>, <a href="https://publications.waset.org/abstracts/search?q=Ariel%20Knafo-Noam"> Ariel Knafo-Noam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The 21st century emerged as the digital century, and it is marked by a wide range of technological developments and changes, followed by potential changes in human communication skills. This technological revolution has changed human means of communication in many different ways: children and adolescents are spending much of their time in front of screens, participating in all sorts of online activities (even more so since the outbreak of COVID-19). The current study focuses on the role of values in adolescents' online bystanders' behavior. Values are cognitive, abstract representations of desirable goals that motivate behavior, and we hypothesized finding significant associations between specific values and differential online bystanders' feelings and behavior. Data was collected through online questionnaires that measured the participants' values, using Schwartz's short version of the Portrait Values Questionnaire (Schwartz, 2012). Participants’ online behavior was assessed in a questionnaire addressing reactions to situations of cyber shaming and cyberbullying, and specifically positive feelings and pro-social behavior (e.g., more supportive reactions) toward the victims, as opposed to different offensive behavioral reactions (such as laughing at the victim or ignoring the situation). Participants were recruited with a commercial research panel company, and 308 Israeli adolescents' values and online behavior were examined (mean age 15.2). As hypothesized, results show significant associations between self-transcendence values (universalism and benevolence) and conservation values (conformity, tradition, and security). These two groups of values were positively correlated with pro-social bystanders' feelings and behavior. On the opposite side of the values scale, the value of power was negatively associated with the participants' pro-social behavior, and positively associated with offensive behavioral reactions. Further research is needed, but we conclude that values serve as crucial guiding factors in directing adolescents' online feelings and behavior. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adolescents" title="adolescents">adolescents</a>, <a href="https://publications.waset.org/abstracts/search?q=values" title=" values"> values</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20behavior" title=" online behavior"> online behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=power" title=" power"> power</a> </p> <a href="https://publications.waset.org/abstracts/172350/the-online-power-of-values-adolescents-values-as-predicting-factors-of-their-online-bystanders-behavior-while-witnessing-cyberbullying" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172350.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> Educational Challenges: Cultural Behaviours, Psychopathology and Psychological Intervention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sandra%20Figueiredo">Sandra Figueiredo</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexandra%20Pereira"> Alexandra Pereira</a>, <a href="https://publications.waset.org/abstracts/search?q=Ana%20%20Oliveira"> Ana Oliveira</a>, <a href="https://publications.waset.org/abstracts/search?q=Idia%20Brito"> Idia Brito</a>, <a href="https://publications.waset.org/abstracts/search?q=Ivaniltan%20Jones"> Ivaniltan Jones</a>, <a href="https://publications.waset.org/abstracts/search?q=Joana%20Moreira"> Joana Moreira</a>, <a href="https://publications.waset.org/abstracts/search?q=Madalena%20Silva"> Madalena Silva</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20Para%C3%ADba"> Maria Paraíba</a>, <a href="https://publications.waset.org/abstracts/search?q=Milene%20Silva"> Milene Silva</a>, <a href="https://publications.waset.org/abstracts/search?q=T%C3%A2nia%20Pinho"> Tânia Pinho</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the present society, we are facing behaviours mainly in young individuals that might be considered trends of culture or psychopathology. Both contexts are challenges for Education, Psychology and Health. This paper examines nine case studies specifically in Educational Psychology with the main goal to identify and define phenomena contexts in school culture, the psychopathology involved and to present a psychological intervention for each case. The research was conducted by university students in the period of March 2017-June 2017, in Portugal, and the childhood was focused. The case studies explored the cyberbullying; the bullying - victims and bullies’ perspectives; the obsessive compulsive disorder; perception and inclusion of children from homoparental families; inclusion of foreign students in the higher education system; blindness and the inclusion in physical curricular activities; influence of doc-reality and media in attitudes and self-esteem; and the morningness and eveningness types learning in the same school timetables. The university students were supervised during their research analysis and two methods were available for the intervention research study: the meta-analysis and the empirical study. In the second phase, the pedagogical intervention was designed for the different educational contexts in analysis, especially concerning the school environments. The evidence of literature and the empirical studies showed new trends of school’ behaviours and educational disturbances that require further research and effective (and adequate to age, gender, nationality and culture) pedagogical instruments. Respecting the instruments, on the one hand, to identify behaviors, habits or pathologies and highlight the role and training of teachers, psychologists and health professionals, on the other hand, to promote the early intervention and to enhance healthy child development and orientation of the families. To respond to both milestones, this paper present nine pedagogical techniques and measures that will be discussed on their impact concerning advances for the psychological and educational intervention, centered in the individual and in the new generations of family’ cultures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=behaviour" title="behaviour">behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=culture%20trends" title=" culture trends"> culture trends</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20intervention" title=" educational intervention"> educational intervention</a>, <a href="https://publications.waset.org/abstracts/search?q=psychopathology" title=" psychopathology"> psychopathology</a>, <a href="https://publications.waset.org/abstracts/search?q=obsessive%20compulsive%20disorder" title=" obsessive compulsive disorder"> obsessive compulsive disorder</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=bullying" title=" bullying"> bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=homoparental%20families" title=" homoparental families"> homoparental families</a>, <a href="https://publications.waset.org/abstracts/search?q=sleep%20influence" title=" sleep influence"> sleep influence</a>, <a href="https://publications.waset.org/abstracts/search?q=blindness%20and%20sports%20at%20school" title=" blindness and sports at school"> blindness and sports at school</a>, <a href="https://publications.waset.org/abstracts/search?q=inclusion%20of%20foreign%20students" title=" inclusion of foreign students"> inclusion of foreign students</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20influence%20in%20behaviour" title=" media influence in behaviour"> media influence in behaviour</a> </p> <a href="https://publications.waset.org/abstracts/76294/educational-challenges-cultural-behaviours-psychopathology-and-psychological-intervention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76294.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">223</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> Linguistic Cyberbullying, a Legislative Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Simona%20Maria%20Ignat">Simona Maria Ignat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bullying online has been an increasing studied topic during the last years. Different approaches, psychological, linguistic, or computational, have been applied. To our best knowledge, a definition and a set of characteristics of phenomenon agreed internationally as a common framework are still waiting for answers. Thus, the objectives of this paper are the identification of bullying utterances on Twitter and their algorithms. This research paper is focused on the identification of words or groups of words, categorized as “utterances”, with bullying effect, from Twitter platform, extracted on a set of legislative criteria. This set is the result of analysis followed by synthesis of law documents on bullying(online) from United States of America, European Union, and Ireland. The outcome is a linguistic corpus with approximatively 10,000 entries. The methods applied to the first objective have been the following. The discourse analysis has been applied in identification of keywords with bullying effect in texts from Google search engine, Images link. Transcription and anonymization have been applied on texts grouped in CL1 (Corpus linguistics 1). The keywords search method and the legislative criteria have been used for identifying bullying utterances from Twitter. The texts with at least 30 representations on Twitter have been grouped. They form the second corpus linguistics, Bullying utterances from Twitter (CL2). The entries have been identified by using the legislative criteria on the the BoW method principle. The BoW is a method of extracting words or group of words with same meaning in any context. The methods applied for reaching the second objective is the conversion of parts of speech to alphabetical and numerical symbols and writing the bullying utterances as algorithms. The converted form of parts of speech has been chosen on the criterion of relevance within bullying message. The inductive reasoning approach has been applied in sampling and identifying the algorithms. The results are groups with interchangeable elements. The outcomes convey two aspects of bullying: the form and the content or meaning. The form conveys the intentional intimidation against somebody, expressed at the level of texts by grammatical and lexical marks. This outcome has applicability in the forensic linguistics for establishing the intentionality of an action. Another outcome of form is a complex of graphemic variations essential in detecting harmful texts online. This research enriches the lexicon already known on the topic. The second aspect, the content, revealed the topics like threat, harassment, assault, or suicide. They are subcategories of a broader harmful content which is a constant concern for task forces and legislators at national and international levels. These topic – outcomes of the dataset are a valuable source of detection. The analysis of content revealed algorithms and lexicons which could be applied to other harmful contents. A third outcome of content are the conveyances of Stylistics, which is a rich source of discourse analysis of social media platforms. In conclusion, this corpus linguistics is structured on legislative criteria and could be used in various fields. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corpus%20linguistics" title="corpus linguistics">corpus linguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=legislation" title=" legislation"> legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20language%20processing" title=" natural language processing"> natural language processing</a>, <a href="https://publications.waset.org/abstracts/search?q=twitter" title=" twitter"> twitter</a> </p> <a href="https://publications.waset.org/abstracts/164059/linguistic-cyberbullying-a-legislative-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164059.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> The Role of Access Control Techniques in Creating a Safe Cyberspace for Children</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sara%20Muslat%20Alsahali">Sara Muslat Alsahali</a>, <a href="https://publications.waset.org/abstracts/search?q=Nout%20Mohammed%20Alqahtani"> Nout Mohammed Alqahtani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=kids" title=" kids"> kids</a>, <a href="https://publications.waset.org/abstracts/search?q=parental%20monitoring" title=" parental monitoring"> parental monitoring</a> </p> <a href="https://publications.waset.org/abstracts/125012/the-role-of-access-control-techniques-in-creating-a-safe-cyberspace-for-children" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125012.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Students’ Perceptions of the Use of Social Media in Higher Education in Saudi Arabia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omar%20Alshehri">Omar Alshehri</a>, <a href="https://publications.waset.org/abstracts/search?q=Vic%20Lally"> Vic Lally</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examined the attitudes of using social media tools to support learning at a university in Saudi Arabia. Moreover, it investigated the students&rsquo; current usage of these tools and examined the barriers they could face during the use of social media tools in the education process. Participants in this study were 42 university students. A web-based survey was used to collect data for this study. The results indicate that all of the students were familiar with social media and had used at least one type of social media for learning. It was found out that all students had very positive attitudes towards the use of social media and welcomed using these tools as a supplementary to the curriculum. However, the results indicated that the major barriers to using these tools in learning were distraction, opposing Islamic religious teachings, privacy issues, and cyberbullying. The study recommended that this study could be replicated at other Saudi universities to investigate factors and barriers that might affect Saudi students&rsquo; attitudes toward using social media to support learning. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=barriers%20to%20social%20media%20use" title="barriers to social media use">barriers to social media use</a>, <a href="https://publications.waset.org/abstracts/search?q=benefits%20of%20social%20media%20use" title=" benefits of social media use"> benefits of social media use</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title=" higher education"> higher education</a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20Arabia" title=" Saudi Arabia"> Saudi Arabia</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a> </p> <a href="https://publications.waset.org/abstracts/103367/students-perceptions-of-the-use-of-social-media-in-higher-education-in-saudi-arabia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/103367.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">167</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> Effects and Coping Strategies of Cyber Bullying in Pakistan: A Gender Response</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rabia%20Qusien">Rabia Qusien</a> </p> <p class="card-text"><strong>Abstract:</strong></p> New media has emerged as a significant force in the society which connects people across the globe. Where new media brought many advantages for its users, there is a darker aspect of new technology in the form of cyberbullying. Researcher has employed survey method to reach to its targeted audience. Sample of 604 respondents was selected from one of metropolitan city of Pakistan Lahore to collect the data. Equal sample from both genders was selected to apply gender analysis. Results of this study indicate that cyber bullying is having significant psychological and educational effects. Females face more cyber bullying incidents as compared to males so they face more severe effects of cyber bullying. A comprehensive analysis of managing strategies depicts that mostly youth tries to handle this issue personally but at times they seek the support of their family and friends when they face severe issues. Due to privacy concerns females get more upset and they are more likely to seek social support from friends and family. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20bullying" title="cyber bullying">cyber bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20victims" title=" cyber victims"> cyber victims</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20impacts" title=" educational impacts"> educational impacts</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological%20impacts" title=" psychological impacts"> psychological impacts</a> </p> <a href="https://publications.waset.org/abstracts/94153/effects-and-coping-strategies-of-cyber-bullying-in-pakistan-a-gender-response" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94153.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">143</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Empowering Rangatahi: Amplifying Youth Voices on Smartphone and Social Media Use in Aotearoa New Zealand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Melissa%20L%20Gould">Melissa L Gould</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The uptick in social media users during the COVID-19 lockdowns has accelerated concerns about cellphone addiction, cyberbullying, and exposure to harmful content, particularly mis- and disinformation and extremist content. The validity of these concerns is synthesized for media technologists to expose the strategies behind social media and search platform technology and explain why they restrict their children from using it. Banning cell phones in schools, increasing age limits on social media accounts, and putting warning labels on social media are some of the solutions proposed to protect young people from smartphones and social media. Largely missing from these conversations are the voices of young people (rangatahi). Instead, their lived experiences are being told and managed by adults. This presentation will outline my research that amplified the voices and lived experiences of young people by positioning them as experts. Using The Social Dilemma as a discussion prompt, the focus groups of rangatahi in Aotearoa, New Zealand, provide a space for young people to articulate their own lived experiences and respond to the dominant narratives on their generation's use of smartphones and social media. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20media" title="social media">social media</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20phones" title=" smart phones"> smart phones</a>, <a href="https://publications.waset.org/abstracts/search?q=young%20people" title=" young people"> young people</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20dilemma" title=" social dilemma"> social dilemma</a> </p> <a href="https://publications.waset.org/abstracts/187441/empowering-rangatahi-amplifying-youth-voices-on-smartphone-and-social-media-use-in-aotearoa-new-zealand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187441.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">30</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> Bystander Perceived Severity on Traditional versus Cyber Bullying</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20Smith">C. Smith</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Goga"> T. Goga</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Hancock"> T. Hancock</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bullying has been an increasingly prevalent problem among society for decades. Approximately one out of every four students report being bullied at least once during the school year. Additionally, these instances of bullying are often witnessed but not reported by the bystanders, which could be dependent on the type of bullying situation. Thus, the present study aims to investigate any possible perceptual differences which may exist between traditional bullying (i.e., face to face) and cyberbullying from the bystander’s point of view. Undergraduate students were given a bullying scenario to read from either the traditional condition or the cyber condition. They were then asked to rate how severe they perceived this behavior on a Likert based scale. Participants were also asked if they would intervene (yes or no) and what their individual response would be to the witnessed behavior (report/ignore/confront/other). Results indicated that, while there was no significant difference in perceived severity between the two bullying conditions, there was a significant difference in whether or not participants would intervene between the two types of scenarios. A significant effect was also found between the scenarios for response type. Together, these findings suggest that even though individuals may not be aware of how severe they perceive certain bullying behaviors, the responses they exhibit might suggest otherwise. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bullying" title="bullying">bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=bystander" title=" bystander"> bystander</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber" title=" cyber"> cyber</a>, <a href="https://publications.waset.org/abstracts/search?q=severity" title=" severity"> severity</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional" title=" traditional"> traditional</a> </p> <a href="https://publications.waset.org/abstracts/108810/bystander-perceived-severity-on-traditional-versus-cyber-bullying" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108810.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> Bullying with Neurodiverse Students and Education Policy Reform</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fharia%20Tilat%20Loba">Fharia Tilat Loba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Studies show that there is a certain group of students who are more vulnerable to bullying due to their physical appearance, disability, sexual preference, race, and lack of social and behavioral skills. Students with autism spectrum disorders (ASD) are one of the most vulnerable groups among these at-risk groups. Researchers suggest that focusing on vulnerable groups of students who can be the target of bullying helps to understand the causes and patterns of aggression, which ultimately helps in structuring intervention programs to reduce bullying. Since Australia ratified the United Nations Convention on the Rights of Persons with Disabilities in 2006, it has been committed to providing an inclusive, safe, and effective learning environment for all children. In addition, the 2005 Disability Standards for Education seeks to ensure that students with disabilities can access and participate in education on the same basis as other students, covering all aspects of education, including harassment and victimization. However, bullying hinders students’ ability to fully participate in schooling. The proposed study aims to synthesize the notions of traditional bullying and cyberbullying and attempts to understand the experiences of students with ASD who are experiencing bullying in their schools. The proposed study will primarily focus on identifying the gaps between policy and practice related to bullying, and it will also attempt to understand the experiences of parents of students with ASD and professionals who have experience dealing with bullying at the school level in Australia. This study is expected to contribute to the theoretical knowledge of the bullying phenomenon and provide a reference for advocacy at the school, organization, and government levels. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=education%20policy" title="education policy">education policy</a>, <a href="https://publications.waset.org/abstracts/search?q=bullying" title=" bullying"> bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=Australia" title=" Australia"> Australia</a>, <a href="https://publications.waset.org/abstracts/search?q=neurodiversity" title=" neurodiversity"> neurodiversity</a> </p> <a href="https://publications.waset.org/abstracts/182178/bullying-with-neurodiverse-students-and-education-policy-reform" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182178.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">57</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sara%20Vora%20%28Hoxha%29">Sara Vora (Hoxha)</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=European%20international%20private%20law" title="European international private law">European international private law</a>, <a href="https://publications.waset.org/abstracts/search?q=personality%20rights" title=" personality rights"> personality rights</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a>, <a href="https://publications.waset.org/abstracts/search?q=jurisdiction" title=" jurisdiction"> jurisdiction</a>, <a href="https://publications.waset.org/abstracts/search?q=cross-border%20disputes" title=" cross-border disputes"> cross-border disputes</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20protection" title=" data protection"> data protection</a> </p> <a href="https://publications.waset.org/abstracts/165977/the-web-of-injustice-untangling-violations-of-personality-rights-in-european-international-private-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165977.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">73</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> Body Shaming and Its Psychological Consequences: A Comprehensive Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aryan%20Sood">Aryan Sood</a>, <a href="https://publications.waset.org/abstracts/search?q=Shruti%20Pathak"> Shruti Pathak</a>, <a href="https://publications.waset.org/abstracts/search?q=Dipanshu%20Chaudhary"> Dipanshu Chaudhary</a>, <a href="https://publications.waset.org/abstracts/search?q=Shreyanshi"> Shreyanshi</a>, <a href="https://publications.waset.org/abstracts/search?q=Yogesh%20Pal"> Yogesh Pal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this comprehensive meta-analysis, the study delves into the widespread issue of body shaming, revealing its pervasive impact on various aspects of human life and its profound implications for mental health. The paper first explores the origins of body shaming, including societal norms, media influences, and interpersonal dynamics. It highlights the various forms it takes and its detrimental effects on self-esteem, body image, and psychological well-being. Particularly among adolescents and teenagers in today's social media-driven world, the pressure to conform to idealized beauty standards is significant, leading to negative consequences for their development and health. The research emphasizes the long-lasting mental health effects of body shaming, including depression, body dysmorphia, low self-esteem, and eating disorders. The study also discusses the emergence of body positivity movements as a means to challenge societal norms and promote inclusivity and empathy. Furthermore, the research addresses body shaming in the workplace and presents strategies to combat it, stressing the importance of awareness campaigns, education, and policy changes. In conclusion, the study underscores the critical need for a culture of acceptance and support, the promotion of positive body image, and efforts to mitigate the severe mental health toll that body shaming takes on individuals and communities. Overall, this research provides a comprehensive overview of body shaming, its root causes, and its far-reaching impacts on mental health and well-being. It highlights the urgency of addressing this issue in various contexts, from adolescence to the workplace, and offers solutions, such as awareness campaigns and societal changes, to foster a more inclusive and empathetic future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=body%20shaming" title="body shaming">body shaming</a>, <a href="https://publications.waset.org/abstracts/search?q=mental%20health" title=" mental health"> mental health</a>, <a href="https://publications.waset.org/abstracts/search?q=age" title=" age"> age</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a>, <a href="https://publications.waset.org/abstracts/search?q=societal%20norms" title=" societal norms"> societal norms</a>, <a href="https://publications.waset.org/abstracts/search?q=appearance-based%20discrimination" title=" appearance-based discrimination"> appearance-based discrimination</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=self-esteem" title=" self-esteem"> self-esteem</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=depression" title=" depression"> depression</a>, <a href="https://publications.waset.org/abstracts/search?q=acceptance" title=" acceptance"> acceptance</a> </p> <a href="https://publications.waset.org/abstracts/178774/body-shaming-and-its-psychological-consequences-a-comprehensive-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/178774.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyberbullying&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyberbullying&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10