{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:40:37Z","timestamp":1743039637794,"version":"3.40.3"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319072920"},{"type":"electronic","value":"9783319072937"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07293-7_13","type":"book-chapter","created":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T05:31:11Z","timestamp":1401687071000},"page":"133-144","source":"Crossref","is-referenced-by-count":11,"title":["Understanding the Factors That Influence the Perceived Severity of Cyber-bullying"],"prefix":"10.1007","author":[{"given":"Sonia","family":"Camacho","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Hassanein","sequence":"additional","affiliation":[]},{"given":"Milena","family":"Head","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Johnson, C.L.: An examination of the primary and secondary effects of cyber-bullying: development and testing of a cyberbullying moderator\/mediator model. Wayne State University Dissertations (2011)"},{"issue":"3-4","key":"13_CR2","first-page":"421","volume":"17","author":"L. Beckman","year":"2012","unstructured":"Beckman, L., Hagquist, C., Hellstr\u00f6m, L.: Does the association with psychosomatic health problems differ between cyberbullying and traditional bullying? EBD\u00a017(3-4), 421\u2013434 (2012)","journal-title":"EBD"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.chb.2012.05.024","volume":"29","author":"R. Slonje","year":"2013","unstructured":"Slonje, R., Smith, P.K., Fris\u00e9n, A.: The nature of cyberbullying, and strategies for prevention. Comput. Hum. Behav.\u00a029, 26\u201332 (2013)","journal-title":"Comput. Hum. Behav."},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.chb.2009.11.014","volume":"26","author":"R.S. Tokunaga","year":"2010","unstructured":"Tokunaga, R.S.: Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Comput. Hum. Behav.\u00a026, 277\u2013287 (2010)","journal-title":"Comput. Hum. Behav."},{"key":"13_CR5","unstructured":"\u0160leglova, V., Cerna, A.: Cyberbullying in Adolescent Victims: Perception and Coping. Cyberpsychology, 5(2), article 4 (2011)"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1111\/j.1746-1561.2008.00335.x","volume":"78","author":"J. Juvonen","year":"2008","unstructured":"Juvonen, J., Gross, E.F.: Bullying experiences in cyberspace. J. Sch. Healt.\u00a078, 496\u2013505 (2008)","journal-title":"J. Sch. Healt."},{"issue":"3","key":"13_CR7","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1080\/13811118.2010.494133","volume":"14","author":"S. Hinduja","year":"2010","unstructured":"Hinduja, S., Patchin, J.W.: Bullying, cyberbullying, and suicide. Arch. Suicide Res.\u00a014(3), 206\u2013221 (2010)","journal-title":"Arch. Suicide Res."},{"key":"13_CR8","unstructured":"Broderick, R.: 9 Teenage Suicides in the Last Year Were Linked to Cyber-Bullying on Social Network Ask.fm. In: BuzzFeed (2013), \n                    \n                      http:\/\/www.buzzfeed.com\/ryanhatesthis\/a-ninth-teenager-since-last-september-has-committed-suicide"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1016\/j.chb.2010.03.017","volume":"26","author":"E. Calvete","year":"2010","unstructured":"Calvete, E., Orue, I., Est\u00e9vez, A., Villa, L., Padilla, P.: Cyberbullying in adolescents: Modalities and aggressors\u2019 profile. Comput. Hum. Behav.\u00a026, 1128\u20131135 (2010)","journal-title":"Comput. Hum. Behav."},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"1581","DOI":"10.1016\/j.chb.2010.06.005","volume":"26","author":"Y.-Y. Huang","year":"2010","unstructured":"Huang, Y.-Y., Chou, C.: An analysis of multiple factors of cyberbullying among junior high school students in Taiwan. Comput. Hum. Behav.\u00a026, 1581\u20131590 (2010)","journal-title":"Comput. Hum. Behav."},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1016\/j.chb.2011.11.013","volume":"28","author":"D. Law","year":"2012","unstructured":"Law, D., Shapka, J.D., Domene, J.F., Gagn\u00e9, M.H.: Are cyberbullies really bullies? An investigation of reactive and proactive online aggression. Comput. Hum. Behav.\u00a028, 664\u2013672 (2012)","journal-title":"Comput. Hum. Behav."},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.jadohealth.2010.07.012","volume":"48","author":"J. Wang","year":"2011","unstructured":"Wang, J., Nansel, T.R., Iannotti, R.J.: Cyber and Traditional Bullying: Differential Association With Depression. J. Adolescent Healt.\u00a048, 415\u2013417 (2011)","journal-title":"J. Adolescent Healt."},{"key":"13_CR13","first-page":"58","volume":"181","author":"A. Desmet","year":"2012","unstructured":"Desmet, A., Bastiaensens, S., Van Cleemput, K., Poels, K., Vandebosch, H., De Bourdeaudhuij, I.: Mobilizing Bystanders of Cyberbullying: an Exploratory Study into Behavioural Determinants of Defending the Victim. Stud. Health Technol. Inform.\u00a0181, 58\u201363 (2012)","journal-title":"Stud. Health Technol. Inform."},{"issue":"3","key":"13_CR14","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1089\/cpb.2007.0016","volume":"11","author":"T. Aricak","year":"2008","unstructured":"Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yilmaz, N., Memmedov, C.: Cyber-bullying among Turkish adolescents. Cyberpsychol. Behav.\u00a011(3), 253\u2013261 (2008)","journal-title":"Cyberpsychol. Behav."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Parris, L., Varjas, K., Meyers, J., Cutts, H.: High school students\u2019 perceptions of coping with cyberbullying. Youth Soc. 1\u201323 (2011)","DOI":"10.1177\/0044118X11398881"},{"issue":"3-4","key":"13_CR16","first-page":"389","volume":"17","author":"M. Campbell","year":"2012","unstructured":"Campbell, M., Spears, B., Slee, P., Butler, D., Kift, S.: Victims\u2019 perceptions of traditional and cyberbullying, and the psychosocial correlates of their victimisation. EBD\u00a017(3-4), 389\u2013401 (2012)","journal-title":"EBD"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1016\/j.compedu.2011.06.014","volume":"57","author":"B. \u00c7etin","year":"2011","unstructured":"\u00c7etin, B., Yaman, E., Peker, A.: Cyber victim and bullying scale: A study of validity and reliability. Comput. Educ.\u00a057, 2261\u20132271 (2011)","journal-title":"Comput. Educ."},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Price, M., Chin, M.A., Higa-McMillan, C., Kim, S., Frueh, B.C.: Prevalence and Internalizing Problems of Ethnoracially Diverse Victims of Traditional and Cyber Bullying. School Mental Health, 1\u20139 (2013)","DOI":"10.1007\/s12310-013-9104-6"},{"issue":"3","key":"13_CR19","first-page":"33","volume":"5","author":"J.L. Greif","year":"2006","unstructured":"Greif, J.L., Furlong, M.J.: The assessment of school bullying: using theory to inform practice. JSV\u00a05(3), 33\u201350 (2006)","journal-title":"JSV"},{"issue":"3-4","key":"13_CR20","first-page":"319","volume":"17","author":"A. \u0160evc\u00edkov\u00e1","year":"2012","unstructured":"\u0160evc\u00edkov\u00e1, A., \u0160mahel, D., Otavov\u00e1, M.: The perception of cyberbullying in adolescent victims. EBDs\u00a017(3-4), 319\u2013328 (2012)","journal-title":"EBDs"},{"key":"13_CR21","volume-title":"Stress, Appraisal and Coping","author":"R.S. Lazarus","year":"1984","unstructured":"Lazarus, R.S., Folkman, S.: Stress, Appraisal and Coping. Springer, New York (1984)"},{"issue":"5","key":"13_CR22","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1002\/(SICI)1099-1379(199909)20:5<739::AID-JOB1949>3.0.CO;2-C","volume":"20","author":"P.L. Perrew\u00e9","year":"1999","unstructured":"Perrew\u00e9, P.L., Zellars, K.L.: An examination of attributions and emotions in the transactional approach to the organizational stress process. J. Organ. Behav.\u00a020(5), 739\u2013752 (1999)","journal-title":"J. Organ. Behav."},{"issue":"1","key":"13_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/10615800701740457","volume":"21","author":"S. Folkman","year":"2008","unstructured":"Folkman, S.: The case for positive emotions in the stress process. Anxiety Stress Copin\u00a021(1), 3\u201314 (2008)","journal-title":"Anxiety Stress Copin"},{"key":"13_CR24","first-page":"27","volume-title":"Appraisal Processes in Emotion: Theory, Methods, Research","author":"R.S. Lazarus","year":"2001","unstructured":"Lazarus, R.S.: Relational Meaning and Discrete Emotions. In: Schorr, A. (ed.) Appraisal Processes in Emotion: Theory, Methods, Research, pp. 27\u201367. Oxford University Press, Cary (2001)"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1002\/ab.20389","volume":"37","author":"E.D. Felix","year":"2011","unstructured":"Felix, E.D., Sharkey, J.D., Greif Green, J., Furlong, M.J., Tanigawa, D.: Getting precise and pragmatic about the assessment of bullying: the development of the California Bullying Victimization Scale. Aggressive Behav.\u00a037, 234\u2013247 (2011)","journal-title":"Aggressive Behav."},{"key":"13_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1621-7","volume-title":"The Salience of Marketing Stimuli: An Incongruity-Salience Hypothesis on Consumer Awareness","author":"G. Guido","year":"2001","unstructured":"Guido, G.: The Salience of Marketing Stimuli: An Incongruity-Salience Hypothesis on Consumer Awareness. Kluwer Academic Publishers, Norwel (2001)"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Staude-M\u00fcller, F., Hansen, B., Voss, M.: How stressful is online victimization? Effects of victim\u2019s personality and properties of the incident. Eur. J. Dev. Psychol. 260\u2013274 (2012)","DOI":"10.1080\/17405629.2011.643170"},{"key":"13_CR28","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1027\/0044-3409.217.4.197","volume":"217","author":"R. Ortega","year":"2009","unstructured":"Ortega, R., Elipe, P., Mora-Merch\u00e1n, J., Calmaestra, J., Vega, E.: The emotional impact on victims of traditional bullying and cyberbullying \u2013 A study of Spanish adolescents. Z. Psychol.\u00a0217, 197\u2013204 (2009)","journal-title":"Z. Psychol."},{"issue":"12","key":"13_CR29","first-page":"14","volume":"3","author":"J. Welch","year":"1997","unstructured":"Welch, J.: Electronic menaces are a flaming liability. People Manag.\u00a03(12), 14 (1997)","journal-title":"People Manag."},{"key":"13_CR30","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10964-010-9569-7","volume":"40","author":"B.K. Fredstrom","year":"2011","unstructured":"Fredstrom, B.K., Adams, R.E., Gilman, R.: Electronic and school-based victimization: Unique Contexts for Adjustment Difficulties During Adolescence. J. Youth Adolesc.\u00a040, 405\u2013415 (2011)","journal-title":"J. Youth Adolesc."},{"issue":"1","key":"13_CR31","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1287\/isre.1040.0015","volume":"15","author":"P.A. Pavlou","year":"2004","unstructured":"Pavlou, P.A., Gefen, D.: Building Effective Online Marketplaces with Institution-Based Trust. Inform. Syst. Res.\u00a015(1), 37\u201359 (2004)","journal-title":"Inform. Syst. Res."},{"issue":"4","key":"13_CR32","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/S1359-1789(98)00043-3","volume":"5","author":"S. Einarsen","year":"2000","unstructured":"Einarsen, S.: Bullying and harassment at work: A review of the Scandinavian approach. Aggress. Violent Beh.\u00a05(4), 379\u2013401 (2000)","journal-title":"Aggress. Violent Beh."},{"issue":"1","key":"13_CR33","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1287\/isre.1070.0153","volume":"19","author":"S. Devaraj","year":"2008","unstructured":"Devaraj, S., Easly, R., Crant, J.: How does personality matter? Relating the five-factor model to technology acceptance and use. Inform. Syst. Res.\u00a019(1), 93\u2013105 (2008)","journal-title":"Inform. Syst. Res."},{"key":"13_CR34","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.paid.2010.04.001","volume":"49","author":"M.E. Boyes","year":"2010","unstructured":"Boyes, M.E., French, D.J.: Neuroticism, stress, and coping in the context of an anagram-solving task. Pers. Indiv. Differ.\u00a049, 380\u2013385 (2010)","journal-title":"Pers. Indiv. Differ."},{"key":"13_CR35","volume-title":"Conceiving the self","author":"M. Rosenberg","year":"1979","unstructured":"Rosenberg, M.: Conceiving the self. Basic Books, Inc., New York (1979)"},{"key":"13_CR36","doi-asserted-by":"publisher","first-page":"229","DOI":"10.2307\/2136671","volume":"25","author":"J.A. Fleishman","year":"1984","unstructured":"Fleishman, J.A.: Personality characteristics and coping patterns. J. Health Soc. Behav.\u00a025, 229\u2013244 (1984)","journal-title":"J. Health Soc. Behav."},{"issue":"4","key":"13_CR37","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1027\/0044-3409.217.4.182","volume":"217","author":"J.J. Dooley","year":"2009","unstructured":"Dooley, J.J., Pyzalski, J., Cross, D.: Cyberbullying versus face-to-face cyberbullying: A theoretical and conceptual review. Z. Psychol.\u00a0217(4), 182\u2013188 (2009)","journal-title":"Z. Psychol."},{"key":"13_CR38","volume-title":"The psychology of embarrassment","author":"R.J. Edelmann","year":"1987","unstructured":"Edelmann, R.J.: The psychology of embarrassment. John Wiley and Sons, Chichester (1987)"},{"issue":"2","key":"13_CR39","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1080\/17405629.2011.643670","volume":"9","author":"R. Slonje","year":"2012","unstructured":"Slonje, R., Smith, P.K., Fris\u00e9n, A.: Processes of cyberbullying, and feelings of remorse by bullies: A pilot study. Eur. J. Dev. Psychol.\u00a09(2), 244\u2013259 (2012)","journal-title":"Eur. J. Dev. Psychol."},{"key":"13_CR40","unstructured":"Kids Help Phone: Cyberbullying: reality check. Kids Help Phone Research Update (2012), \n                    \n                      http:\/\/org.kidshelpphone.ca\/media\/80712\/2012-cir-cyberbullying.pdf"},{"key":"13_CR41","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.chb.2008.12.024","volume":"25","author":"C. Ross","year":"2009","unstructured":"Ross, C., Orr, E.S., Sisic, M., Arseneault, J.M., Simmering, M.G., Orr, R.R.: Personality and motivations associated with Facebook use. Comput. Hum. Behav.\u00a025, 578\u2013586 (2009)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"13_CR42","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1287\/isre.13.3.334.81","volume":"13","author":"D.H. McKnight","year":"2002","unstructured":"McKnight, D.H., Choudhury, V., Kacmar, C.: Developing and validating trust measures for e-commerce: an integrative typology. Inform. Syst. Res.\u00a013(3), 334\u2013359 (2002)","journal-title":"Inform. Syst. Res."},{"key":"13_CR43","unstructured":"McCrae, R.R., Costa, P.T.: NEO Inventories for the NEO Personality Inventory-3 (NEO-PI-3), NEO Five-Factor Inventory-3 (NEO-FFI-3), NEO Personality Inventory-Revised (NEO PI-R). PAR, Lutz (2010)"},{"key":"13_CR44","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1037\/0022-3514.61.6.1028","volume":"61","author":"G.R. Pierce","year":"1991","unstructured":"Pierce, G.R., Sarason, I.G., Sarason, B.R.: General and relationship-based perceptions of social support: Are two constructs better than one? J. Pers. Soc. Psychol.\u00a061, 1028\u20131039 (1991)","journal-title":"J. Pers. Soc. Psychol."},{"issue":"5","key":"13_CR45","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1080\/15374416.2011.597090","volume":"40","author":"C. Salmivalli","year":"2011","unstructured":"Salmivalli, C., Voeten, M., Poskiparta, E.: Bystanders Matter: Associations Between Reinforcing, Defending, and the Frequency of Bullying Behavior in Classrooms. J. Clin. Child Adolesc. Psychol.\u00a040(5), 668\u2013676 (2011)","journal-title":"J. Clin. Child Adolesc. Psychol."},{"issue":"3","key":"13_CR46","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"A.C. Johnston","year":"2010","unstructured":"Johnston, A.C., Warkentin, M.: Fear appeals and information security behaviors: An empirical study. MIS Quart.\u00a034(3), 549\u2013566 (2010)","journal-title":"MIS Quart."},{"key":"13_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/08870440290001494","volume":"17","author":"R. Moss-Morris","year":"2002","unstructured":"Moss-Morris, R., Weinman, J., Petrie, K.J., Horne, R., Cameron, L.D., Buick, D.: The revised illness perception questionnaire (IPQ-R). Psychol. Healt.\u00a017, 1\u201316 (2002)","journal-title":"Psychol. Healt."},{"key":"13_CR48","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1057\/palgrave.ejis.3000552","volume":"14","author":"B.R. Lewis","year":"2005","unstructured":"Lewis, B.R., Templeton, G.F., Byrd, T.A.: A methodology for construct development in MIS research. Eur. J. Inform. Syst.\u00a014, 388\u2013400 (2005)","journal-title":"Eur. J. Inform. Syst."},{"key":"13_CR49","doi-asserted-by":"crossref","unstructured":"Gefen, D., Straub, D.W., Boudreau, M.C.: Structural Equation Modeling and Regression: Guidelines for Research and Practice. CAIS\u00a04(7) (2000)","DOI":"10.17705\/1CAIS.00407"},{"issue":"3","key":"13_CR50","doi-asserted-by":"publisher","first-page":"369","DOI":"10.2307\/248684","volume":"11","author":"I. Benbasat","year":"1987","unstructured":"Benbasat, I., Goldstein, D.K., Mead, M.: The Case Research Strategy in Studies of Information Systems. MIS Quart.\u00a011(3), 369\u2013386 (1987)","journal-title":"MIS Quart."}],"container-title":["Lecture Notes in Computer Science","HCI in Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07293-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:20:58Z","timestamp":1582413658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07293-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319072920","9783319072937"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07293-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}