{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:47:58Z","timestamp":1772113678741,"version":"3.50.1"},"reference-count":122,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T00:00:00Z","timestamp":1760400000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T00:00:00Z","timestamp":1760400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s42044-025-00347-4","type":"journal-article","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T18:42:44Z","timestamp":1760467364000},"page":"2815-2840","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Predicting cyber-harassment in the digital age: an integrated model of psychological, technological, and environmental factors using SEM"],"prefix":"10.1007","volume":"8","author":[{"given":"Farhan Bashir","family":"Shaikh","sequence":"first","affiliation":[]},{"given":"Areej Fatemah","family":"Meghji","sequence":"additional","affiliation":[]},{"given":"Nisar Ahmed","family":"Dahri","sequence":"additional","affiliation":[]},{"given":"Maryam","family":"Kalhoro","sequence":"additional","affiliation":[]},{"given":"Ramesh Kumar","family":"Ayyasamy","sequence":"additional","affiliation":[]},{"given":"Suthashini","family":"Subramaniam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,14]]},"reference":[{"key":"347_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10207-025-01014-2","volume":"24","author":"P Pucer","year":"2025","unstructured":"Pucer, P., \u017dvanut, B., Vrhovec, S.: Adoption of smartphones among older adults and the role of perceived threat of cyberattacks. Int. J. Inf. Secur. 24, 101 (2025)","journal-title":"Int. J. Inf. Secur."},{"key":"347_CR2","unstructured":"Dahri N.A., Yahaya N., Al-Rahmi W.M., Almuqren L., Almgren A.S., Alshimai A., Al-Adwan A.S.: The effect of AI gamification on students\u2019 engagement and academic achievement: SEM analysis perspectives. IEEE Access 2025"},{"key":"347_CR3","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1177\/0165551519879702","volume":"47","author":"K Feher","year":"2021","unstructured":"Feher, K.: Digital identity and the online self: footprint strategies\u2013an exploratory and comparative research study. J. Inf. Sci. 47, 192\u2013205 (2021)","journal-title":"J. Inf. Sci."},{"key":"347_CR4","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1108\/JOSM-04-2018-0113","volume":"29","author":"RN Bolton","year":"2018","unstructured":"Bolton, R.N., McColl-Kennedy, J.R., Cheung, L., Gallan, A., Orsingher, C., Witell, L., Zaki, M.: Customer experience challenges: bringing together digital, physical and social realms. J. Serv. Manag. 29, 776\u2013808 (2018)","journal-title":"J. Serv. Manag."},{"key":"347_CR5","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1057\/s41599-022-01318-x","volume":"2022","author":"SA Aljasir","year":"2022","unstructured":"Aljasir, S.A., Alsebaei, M.O.: Cyberbullying and cybervictimization on digital media platforms: the role of demographic variables and parental mediation strategies. Humanit. Soc. Sci. Commun. 2022, 9 (2022). https:\/\/doi.org\/10.1057\/s41599-022-01318-x","journal-title":"Humanit. Soc. Sci. Commun."},{"key":"347_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1057\/s41284-025-00470-8","volume":"38","author":"S Saleem","year":"2025","unstructured":"Saleem, S., Khan, N.F., Zafar, S., Ahmed, M.: Cyberbullying victimization among university students-a national study of Pakistan. Secur. J. 38, 1\u201334 (2025)","journal-title":"Secur. J."},{"key":"347_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1057\/s41599-024-03274-0","volume":"2024","author":"S Li","year":"2024","unstructured":"Li, S., Ainiwaer, K., Zhang, Y.: The relationship between childhood trauma and cyberbullying: a meta-analysis of mainland chinese adolescents and young adults. Humanit. Soc. Sci. Commun. 2024, 11 (2024). https:\/\/doi.org\/10.1057\/s41599-024-03274-0","journal-title":"Humanit. Soc. Sci. Commun."},{"key":"347_CR8","doi-asserted-by":"publisher","first-page":"92715","DOI":"10.1109\/ACCESS.2021.3086679","volume":"9","author":"FB Shaikh","year":"2021","unstructured":"Shaikh, F.B., Rehman, M., Amin, A., Shamim, A., Hashmani, M.A.: Cyberbullying behaviour: a study of undergraduate university students. IEEE Access 9, 92715\u201392734 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3086679","journal-title":"IEEE Access"},{"key":"347_CR9","doi-asserted-by":"publisher","DOI":"10.1111\/ejed.12750","author":"C Zhou","year":"2024","unstructured":"Zhou, C., Hou, F.: Can AI empower L2 education? Exploring its influence on the behavioural, cognitive and emotional engagement of EFL teachers and language learners. Eur. J. Educ. (2024). https:\/\/doi.org\/10.1111\/ejed.12750","journal-title":"Eur. J. Educ."},{"key":"347_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41562-017-0209-z","volume":"2017","author":"JB Pingault","year":"2017","unstructured":"Pingault, J.B., Schoeler, T.: Assessing the consequences of cyberbullying on mental health. Nat. Hum. Behav. 2017, 1 (2017). https:\/\/doi.org\/10.1038\/s41562-017-0209-z","journal-title":"Nat. Hum. Behav."},{"key":"347_CR11","doi-asserted-by":"publisher","DOI":"10.17226\/27396","author":"S Galea","year":"2024","unstructured":"Galea, S., Buckley, G.J., Wojtowicz, A.: Social media and adolescent health. Soc. Media Adolesc. Heal (2024). https:\/\/doi.org\/10.17226\/27396","journal-title":"Soc. Media Adolesc. Heal"},{"key":"347_CR12","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.avb.2015.05.013","volume":"23","author":"JW Patchin","year":"2015","unstructured":"Patchin, J.W., Hinduja, S.: Measuring cyberbullying: implications for research. Aggress. Violent Behav. 23, 69\u201374 (2015). https:\/\/doi.org\/10.1016\/j.avb.2015.05.013","journal-title":"Aggress. Violent Behav."},{"key":"347_CR13","first-page":"74","volume":"15","author":"AU Khan","year":"2020","unstructured":"Khan, A.U., Roshan, R.: Youth and cyber harassment: reporting mechanism of cyber harassment by the KPK universities students. Dialogue Can. Philos. Assoc. 15, 74\u201382 (2020)","journal-title":"Dialogue Can. Philos. Assoc."},{"key":"347_CR14","doi-asserted-by":"crossref","unstructured":"Khan A.H., Ejaz N., Matthews S., Snow S., Matthews B.: Speculative design for education: using participatory methods to map design challenges and opportunities in Pakistan. In Proceedings of the Proceedings of the 2021 ACM Designing Interactive Systems Conference; 2021; pp. 1748\u20131764","DOI":"10.1145\/3461778.3462117"},{"key":"347_CR15","doi-asserted-by":"crossref","unstructured":"Ahmed R.: Cyber harassment in the digital age: trends, challenges, and countermeasures; 2024","DOI":"10.20944\/preprints202409.1882.v1"},{"key":"347_CR16","doi-asserted-by":"publisher","DOI":"10.26710\/jbsee.v6i2.1150","author":"SF Qureshi","year":"2020","unstructured":"Qureshi, S.F., Abbasi, M., Shahzad, M.: Cyber harassment and women of Pakistan: analysis of female victimization. J. Bus. Soc. Rev. Emerg. Econ. (2020). https:\/\/doi.org\/10.26710\/jbsee.v6i2.1150","journal-title":"J. Bus. Soc. Rev. Emerg. Econ."},{"key":"347_CR17","doi-asserted-by":"publisher","first-page":"101577","DOI":"10.1016\/J.TECHSOC.2021.101577","volume":"65","author":"S Saleem","year":"2021","unstructured":"Saleem, S., Khan, N.F., Zafar, S.: Prevalence of cyberbullying victimization among Pakistani youth. Technol. Soc. 65, 101577 (2021). https:\/\/doi.org\/10.1016\/J.TECHSOC.2021.101577","journal-title":"Technol. Soc."},{"key":"347_CR18","unstructured":"Digital 2024. ``Digital 2024: Pakistan --- DataReportal -- Global Digital Insights.\u2019\u2019 Digital 2024: Pakistan. Retrieved 2024, 2024"},{"key":"347_CR19","unstructured":"Abdul Siraj S., Ali Z.; The influence of social media usage on the well-being evidence from Pakistani University Students"},{"key":"347_CR20","unstructured":"Hussain M., Yasin Z., Lahore U., Saeed R., Yaseen Z.: Social media usage patterns among university students In; 36: Vol, 2021"},{"key":"347_CR21","doi-asserted-by":"publisher","first-page":"101863","DOI":"10.1016\/J.TECHSOC.2022.101863","volume":"68","author":"NB Alotaibi","year":"2022","unstructured":"Alotaibi, N.B., Mukred, M.: Factors affecting the cyber violence behavior among saudi youth and its relation with the suiciding: a descriptive study on university students in riyadh City of KSA. Technol. Soc. 68, 101863 (2022). https:\/\/doi.org\/10.1016\/J.TECHSOC.2022.101863","journal-title":"Technol. Soc."},{"key":"347_CR22","doi-asserted-by":"publisher","first-page":"787","DOI":"10.33824\/PJPR.2019.34.4.43","volume":"34","author":"H Kanwal","year":"2019","unstructured":"Kanwal, H., Jami, H.: Exploring modes, strategies, and psychosocial consequences of cyberbullying perpetration and victimization among university students. Pakistan J. Psychol. Res. 34, 787\u2013817 (2019). https:\/\/doi.org\/10.33824\/PJPR.2019.34.4.43","journal-title":"Pakistan J. Psychol. Res."},{"key":"347_CR23","doi-asserted-by":"publisher","DOI":"10.2139\/SSRN.4250814","author":"K Kakamad","year":"2022","unstructured":"Kakamad, K., Rashid, A.: Cyberbullying among university students. SSRN Electron. J. (2022). https:\/\/doi.org\/10.2139\/SSRN.4250814","journal-title":"SSRN Electron. J."},{"key":"347_CR24","doi-asserted-by":"publisher","first-page":"2428907","DOI":"10.1080\/2331186X.2024.2428907","volume":"11","author":"AYR Hmoud","year":"2024","unstructured":"Hmoud, A.Y.R., Salah, O.H., Altalib, R.A.H.: The adoption of gamification in higher education and its impact on academic performance: empirical evidence from jordan and palestine. Cogent Educ. 11, 2428907 (2024)","journal-title":"Cogent Educ."},{"key":"347_CR25","doi-asserted-by":"publisher","first-page":"1492295","DOI":"10.3389\/fpsyg.2025.1492295","volume":"16","author":"G Prestera","year":"2025","unstructured":"Prestera, G., Amadori, A., Sangiuliano-Intra, F., Taverna, L., Basso, D., Brighi, A.: The impact of social norms and conformity on cyberbullying perpetration among adolescents: an integration of the theory of planned behavior model. Front. Psychol. 16, 1492295 (2025)","journal-title":"Front. Psychol."},{"key":"347_CR26","doi-asserted-by":"crossref","unstructured":"Hayashi Y., Tahmasbi N.: Psychological predictors of bystanders\u2019 intention to help cyberbullying victims among college students: an application of theory of planned behavior. J. Interpers Violence, 37: NP11333\u2013 NP11357","DOI":"10.1177\/0886260521992158"},{"key":"347_CR27","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1108\/JHR-02-2019-0033\/FULL\/PDF","volume":"34","author":"N Auemaneekul","year":"2020","unstructured":"Auemaneekul, N., Powwattana, A., Kiatsiri, E., Thananowan, N.: Investigating the mechanisms of theory of planned behavior on cyberbullying among thai adolescents. J. Heal. Res. 34, 42\u201355 (2020). https:\/\/doi.org\/10.1108\/JHR-02-2019-0033\/FULL\/PDF","journal-title":"J. Heal. Res."},{"key":"347_CR28","doi-asserted-by":"publisher","first-page":"105565","DOI":"10.1016\/j.childyouth.2020.105565","volume":"119","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Zhao, H.: Dark personality traits and cyber aggression in adolescents: a moderated mediation analysis of belief in virtuous humanity and self-control. Child Youth Serv. Rev. 119, 105565 (2020)","journal-title":"Child Youth Serv. Rev."},{"key":"347_CR29","volume-title":"\u2018\u201cComputer-supported collaborative learning in programming education: a systematic literature review\u201d,\u2019 in 2020 IEEE Global Engineering Education Conference (EDUCON)","author":"L Silva","year":"2020","unstructured":"Silva, L., Mendes, A.J., Gomes, A.: \u2018\u201cComputer-supported collaborative learning in programming education: a systematic literature review\u201d,\u2019 in 2020 IEEE Global Engineering Education Conference (EDUCON). Porto, Portugal (2020)"},{"key":"347_CR30","doi-asserted-by":"publisher","first-page":"346","DOI":"10.3390\/bs15030346","volume":"15","author":"J Zhao","year":"2025","unstructured":"Zhao, J., Chen, S.S., Wei, H., Hu, Y.: Social exclusion and online aggressive behavior: mediation through ego depletion and moderation through mindfulness. Behav. Sci. (Basel) 15, 346 (2025)","journal-title":"Behav. Sci. (Basel)"},{"key":"347_CR31","doi-asserted-by":"crossref","unstructured":"Aizenkot D., Kashy-Rosenbaum G.: Cyberbullying victimization in whatsapp classmate groups among israeli elementary, middle, and high school students. J. Interpers. Violence 2021, 36, NP8498\u2013NP8519","DOI":"10.1177\/0886260519842860"},{"key":"347_CR32","unstructured":"Akgun S., Greenhow C.: Artificial Intelligence (AI) in education: addressing societal and ethical challenges in K-12 Settings. In Proceedings of the Proceedings of the 16th International Conference of the Learning Sciences-ICLS 2022, pp. 1373\u20131376; International Society of the Learning Sciences, 2022"},{"key":"347_CR33","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1080\/15564886.2022.2126574","volume":"20","author":"S Silva","year":"2025","unstructured":"Silva, S., Figueiredo, P., Rami\u00e3o, E., Barroso, R.: Childhood trauma and cyberbullying perpetration: the mediating role of callous-unemotional traits. Vict. Offender. 20, 675\u2013689 (2025)","journal-title":"Vict. Offender."},{"key":"347_CR34","doi-asserted-by":"crossref","unstructured":"Akbulut Y., Eristi B.: Cyberbullying and victimisation among turkish university students. Australas. J. Educ. Technol. 2011, 27","DOI":"10.14742\/ajet.910"},{"key":"347_CR35","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"347_CR36","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.copsyc.2017.03.034","volume":"19","author":"JJ Allen","year":"2018","unstructured":"Allen, J.J., Anderson, C.A., Bushman, B.J.: The general aggression model. Curr. Opin. Psychol. 19, 75\u201380 (2018)","journal-title":"Curr. Opin. Psychol."},{"key":"347_CR37","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.avb.2012.02.007","volume":"17","author":"CJ Ferguson","year":"2012","unstructured":"Ferguson, C.J., Dyck, D.: Paradigm change in aggression research: the time has come to retire the general aggression model. Aggress. Violent Behav. 17, 220\u2013228 (2012)","journal-title":"Aggress. Violent Behav."},{"key":"347_CR38","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/s12103-013-9226-2","volume":"39","author":"G Drawve","year":"2014","unstructured":"Drawve, G., Thomas, S.A., Walker, J.T.: The likelihood of arrest: a routine activity theory approach. Am. J. Crim. Justice 39, 450\u2013470 (2014)","journal-title":"Am. J. Crim. Justice"},{"key":"347_CR39","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1177\/15248380231153864","volume":"25","author":"BE Hayes","year":"2024","unstructured":"Hayes, B.E., Maher, C.A.: A systematic review of lifestyle-routine activity theory in the context of direct-contact sexual victimization. Trauma, Violence, Abus. 25, 369\u2013392 (2024)","journal-title":"Trauma, Violence, Abus."},{"key":"347_CR40","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1177\/0894439311422689","volume":"30","author":"A Kigerl","year":"2012","unstructured":"Kigerl, A.: Routine activity theory and the determinants of high cybercrime countries. Soc. Sci. Comput. Rev. 30, 470\u2013486 (2012)","journal-title":"Soc. Sci. Comput. Rev."},{"key":"347_CR41","doi-asserted-by":"publisher","first-page":"67","DOI":"10.29333\/iji.2021.1425a","volume":"14","author":"FH Mardianto","year":"2021","unstructured":"Mardianto, F.H., Chusniyah, T., Rahmawati, H., Hutagalung, F.D.: Cyber aggression between intentions and cyber wellness of students: an application of TPB models. Int. J. Instr. 14, 67\u201382 (2021). https:\/\/doi.org\/10.29333\/iji.2021.1425a","journal-title":"Int. J. Instr."},{"key":"347_CR42","doi-asserted-by":"publisher","first-page":"101331","DOI":"10.1016\/j.techsoc.2020.101331","volume":"62","author":"SA Raza","year":"2020","unstructured":"Raza, S.A., Qazi, W., Shah, N., Qureshi, M.A., Qaiser, S., Ali, R.: Drivers of intensive facebook usage among university students: an implications of U&G and TPB theories. Technol. Soc. 62, 101331 (2020). https:\/\/doi.org\/10.1016\/j.techsoc.2020.101331","journal-title":"Technol. Soc."},{"key":"347_CR43","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.chb.2018.11.013","volume":"92","author":"CP Barlett","year":"2019","unstructured":"Barlett, C.P., Madison, C.S., Heath, J.B., DeWitt, C.C.: Please browse responsibly: a correlational examination of technology access and time spent online in the barlett gentile cyberbullying model. Comput. Human Behav. 92, 250\u2013255 (2019). https:\/\/doi.org\/10.1016\/j.chb.2018.11.013","journal-title":"Comput. Human Behav."},{"key":"347_CR44","doi-asserted-by":"publisher","first-page":"101856","DOI":"10.1016\/J.AVB.2023.101856","volume":"72","author":"M Kim","year":"2023","unstructured":"Kim, M., Ellithorpe, M., Burt, S.A.: Anonymity and its role in digital aggression: a systematic review. Aggress. Violent Behav. 72, 101856 (2023). https:\/\/doi.org\/10.1016\/J.AVB.2023.101856","journal-title":"Aggress. Violent Behav."},{"key":"347_CR45","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1080\/15388220.2014.949377","volume":"14","author":"E Whittaker","year":"2015","unstructured":"Whittaker, E., Kowalski, R.M.: Cyberbullying via social media. J. Sch. Violence 14, 11\u201329 (2015). https:\/\/doi.org\/10.1080\/15388220.2014.949377","journal-title":"J. Sch. Violence"},{"key":"347_CR46","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1002\/aps.42","volume":"2","author":"J Suler","year":"2005","unstructured":"Suler, J.: The online disinhibition effect. Int. J. Appl. Psychoanal. Stud. 2, 184\u2013188 (2005)","journal-title":"Int. J. Appl. Psychoanal. Stud."},{"key":"347_CR47","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.chb.2011.10.014","volume":"28","author":"N Lapidot-Lefler","year":"2012","unstructured":"Lapidot-Lefler, N., Barak, A.: Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Comput. Human Behav. 28, 434\u2013443 (2012)","journal-title":"Comput. Human Behav."},{"key":"347_CR48","doi-asserted-by":"crossref","unstructured":"Cohen L.E., Felson M.: Social change and crime rate trends: a routine activity approach. Am. Sociol. Rev. 1979, 588\u2013608","DOI":"10.2307\/2094589"},{"key":"347_CR49","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1080\/17405629.2013.858626","volume":"11","author":"S Pabian","year":"2014","unstructured":"Pabian, S., Vandebosch, H.: Using the theory of planned behaviour to understand cyberbullying: the importance of beliefs for developing interventions. Eur. J. Dev. Psychol. 11, 463\u2013477 (2014)","journal-title":"Eur. J. Dev. Psychol."},{"key":"347_CR50","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10862-020-09835-2","volume":"43","author":"NL Hayes","year":"2021","unstructured":"Hayes, N.L., Marsee, M.A., Russell, D.W.: Latent profile analysis of traditional and cyber-aggression and victimization: associations with dark triad traits and psychopathology symptoms. J. Psychopathol. Behav. Assess. 43, 399\u2013412 (2021)","journal-title":"J. Psychopathol. Behav. Assess."},{"key":"347_CR51","volume-title":"The integration of Theory of planned behaviour (TPB) and Technology acceptance model (TAM) in determining online purchasing behaviour in Malaysia","author":"NA Jamil","year":"2012","unstructured":"Jamil, N.A.: The integration of Theory of planned behaviour (TPB) and Technology acceptance model (TAM) in determining online purchasing behaviour in Malaysia. Univ. Utara, Malaysia (2012)"},{"key":"347_CR52","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/EBR-11-2018-0203","volume":"31","author":"JF Hair","year":"2019","unstructured":"Hair, J.F., Risher, J.J., Sarstedt, M., Ringle, C.M.: When to use and how to report the results of PLS-SEM. Eur. Bus. Rev. 31, 2\u201324 (2019)","journal-title":"Eur. Bus. Rev."},{"key":"347_CR53","doi-asserted-by":"crossref","unstructured":"Dahri N.A., Yahaya, N., Vighio M.S.: Transforming teacher education through collaborative digital innovations: an empirical study of teachers\u2019 perceptions and experiences. Educ. Inf. Technol. 2025, 1\u201337","DOI":"10.1007\/s10639-025-13583-9"},{"key":"347_CR54","doi-asserted-by":"crossref","unstructured":"Alwakid W.N.: Dahri N.A.: Harnessing AI capabilities and green entrepreneurial orientation for sustainable SME performance using SEM analysis approach. Technol. Soc. 2025, 103007","DOI":"10.1016\/j.techsoc.2025.103007"},{"key":"347_CR55","doi-asserted-by":"crossref","unstructured":"Diamantopoulos, A., Siguaw, J. A.: Formative versus reflective indicators in organizational measure development: a comparison and empirical illustration. Br. J. Manag. 17(4), 263\u2013282 (2006)","DOI":"10.1111\/j.1467-8551.2006.00500.x"},{"key":"347_CR56","doi-asserted-by":"publisher","first-page":"S13","DOI":"10.1016\/J.JADOHEALTH.2012.09.018","volume":"53","author":"RM Kowalski","year":"2013","unstructured":"Kowalski, R.M., Limber, S.P.: Psychological, physical, and academic correlates of cyberbullying and traditional bullying. J. Adolesc. Heal. 53, S13-20 (2013). https:\/\/doi.org\/10.1016\/J.JADOHEALTH.2012.09.018","journal-title":"J. Adolesc. Heal."},{"key":"347_CR57","doi-asserted-by":"crossref","unstructured":"Ghazal S., Aldowah H., Umar I.: Critical factors to learning management system acceptance and satisfaction in a blended learning environment. In Proceedings of the Recent Trends in Information and Communication Technology: Proceedings of the 2nd International Conference of Reliable Information and Communication Technology (IRICT 2017); Springer, 2018; pp. 688\u2013698","DOI":"10.1007\/978-3-319-59427-9_71"},{"key":"347_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/J.CHB.2015.02.052","volume":"49","author":"AK Goodboy","year":"2015","unstructured":"Goodboy, A.K., Martin, M.M.: The personality profile of a cyberbully: examining the dark triad. Comput. Human Behav. 49, 1\u20134 (2015). https:\/\/doi.org\/10.1016\/J.CHB.2015.02.052","journal-title":"Comput. Human Behav."},{"key":"347_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/J.JISA.2022.103338","author":"K Padayachee","year":"2022","unstructured":"Padayachee, K.: Understanding the effects of situational crime prevention and personality factors on insider compliance. J Inf Secur Appl (2022). https:\/\/doi.org\/10.1016\/J.JISA.2022.103338","journal-title":"J Inf Secur Appl"},{"key":"347_CR60","doi-asserted-by":"publisher","first-page":"110809","DOI":"10.1016\/J.PAID.2021.110809","volume":"177","author":"A Pascual-Sanchez","year":"2021","unstructured":"Pascual-Sanchez, A., Hickey, N., Mateu, A., Martinez-Herves, M., Kramer, T., Nicholls, D.: Personality traits and self-esteem in traditional bullying and cyberbullying. Pers. Individ. Dif. 177, 110809 (2021). https:\/\/doi.org\/10.1016\/J.PAID.2021.110809","journal-title":"Pers. Individ. Dif."},{"key":"347_CR61","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.adolescence.2017.09.013","volume":"61","author":"S Resett","year":"2017","unstructured":"Resett, S., Gamez-Guadix, M.: Traditional bullying and cyberbullying: differences in emotional problems, and personality. are cyberbullies more machiavellians? J. Adolesc. 61, 113\u2013116 (2017). https:\/\/doi.org\/10.1016\/j.adolescence.2017.09.013","journal-title":"J. Adolesc."},{"key":"347_CR62","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/S0092-6566(02)00505-6","volume":"36","author":"DL Paulhus","year":"2002","unstructured":"Paulhus, D.L., Williams, K.M.: The dark triad of personality: narcissism, machiavellianism, and psychopathy. J. Res. Pers. 36, 556\u2013563 (2002). https:\/\/doi.org\/10.1016\/S0092-6566(02)00505-6","journal-title":"J. Res. Pers."},{"key":"347_CR63","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1089\/cyber.2019.0172","volume":"22","author":"WM Brown","year":"2019","unstructured":"Brown, W.M., Hazraty, S., Palasinski, M.: Examining the dark tetrad and its links to cyberbullying. Cyberpsychol. Behav. Soc. Netw. 22, 552\u2013557 (2019). https:\/\/doi.org\/10.1089\/cyber.2019.0172","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"key":"347_CR64","doi-asserted-by":"publisher","unstructured":"Patchin J.W., Hinduja, S.: Traditional and nontraditional bullying among youth: a test of general strain theory. 2010, 43, 2, https:\/\/doi.org\/10.1177\/0044118X10366951","DOI":"10.1177\/0044118X10366951"},{"key":"347_CR65","doi-asserted-by":"publisher","DOI":"10.1080\/02185385.2020.1788978","author":"JK Chen","year":"2020","unstructured":"Chen, J.K., Chen, L.M.: Cyberbullying among adolescents in Taiwan, Hong Kong, and Mainland China: a cross-national study in Chinese societies. Asia Pacific J. Soc. Work Dev. (2020). https:\/\/doi.org\/10.1080\/02185385.2020.1788978","journal-title":"Asia Pacific J. Soc. Work Dev."},{"key":"347_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fpsyg.2019.01098","volume":"10","author":"S Musharraf","year":"2019","unstructured":"Musharraf, S., Bauman, S., Anis-ul-Haque, M., Malik, J.A.: General and ICT self-efficacy in different participants roles in cyberbullying\/victimization among Pakistani university students. Front. Psychol. 10, 1\u201311 (2019). https:\/\/doi.org\/10.3389\/fpsyg.2019.01098","journal-title":"Front. Psychol."},{"key":"347_CR67","doi-asserted-by":"publisher","unstructured":"El\u00e7i A., Se\u00e7kin Z.: Cyberbullying awareness for mitigating consequences in higher education. 2016, 34, 5, https:\/\/doi.org\/10.1177\/0886260516646095","DOI":"10.1177\/0886260516646095"},{"key":"347_CR68","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/J.COSE.2017.01.010","volume":"66","author":"D Jeske","year":"2017","unstructured":"Jeske, D., van Schaik, P.: Familiarity with internet threats: beyond awareness. Comput. Secur. 66, 129\u2013141 (2017). https:\/\/doi.org\/10.1016\/J.COSE.2017.01.010","journal-title":"Comput. Secur."},{"key":"347_CR69","first-page":"103","volume":"11","author":"H Magsi","year":"2017","unstructured":"Magsi, H., Agha, N., Magsi, I.: Understanding cyber bullying in pakistani context: causes and effects on young female university students in Sindh Province. New Horiz. 11, 103\u2013110 (2017)","journal-title":"New Horiz."},{"key":"347_CR70","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/TEM.2018.2835461","volume":"66","author":"DQ Chen","year":"2019","unstructured":"Chen, D.Q., Liang, H.: Wishful thinking and IT threat avoidance: an extension to the technology threat avoidance theory. IEEE Trans. Eng. Manag. 66, 552\u2013567 (2019). https:\/\/doi.org\/10.1109\/TEM.2018.2835461","journal-title":"IEEE Trans. Eng. Manag."},{"key":"347_CR71","doi-asserted-by":"publisher","first-page":"e0267702","DOI":"10.1371\/JOURNAL.PONE.0267702","volume":"17","author":"S Thumronglaohapun","year":"2022","unstructured":"Thumronglaohapun, S., Maneeton, B., Maneeton, N., Limpiti, S., Manojai, N., Chaijaruwanich, J., Kummaraka, U., Kardkasem, R., Muangmool, T., Kawilapat, S., et al.: Awareness, perception and perpetration of cyberbullying by high school students and undergraduates in Thailand. PLoS ONE 17, e0267702 (2022). https:\/\/doi.org\/10.1371\/JOURNAL.PONE.0267702","journal-title":"PLoS ONE"},{"key":"347_CR72","doi-asserted-by":"publisher","first-page":"e84","DOI":"10.1016\/J.PEDN.2018.11.006","volume":"44","author":"D Uludasdemir","year":"2019","unstructured":"Uludasdemir, D., Kucuk, S.: Cyber bullying experiences of adolescents and parental awareness: Turkish example. J. Pediatr. Nurs. 44, e84-90 (2019). https:\/\/doi.org\/10.1016\/J.PEDN.2018.11.006","journal-title":"J. Pediatr. Nurs."},{"key":"347_CR73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S12144-022-03483-3","volume":"42","author":"Y Yurdakul","year":"2023","unstructured":"Yurdakul, Y., Ayhan, A.B.: The effect of the cyberbullying awareness program on adolescents\u2019 awareness of cyberbullying and their coping skills. Curr. Psychol. 42, 1 (2023). https:\/\/doi.org\/10.1007\/S12144-022-03483-3","journal-title":"Curr. Psychol."},{"key":"347_CR74","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10578-010-0176-3","volume":"41","author":"RP Ang","year":"2010","unstructured":"Ang, R.P., Goh, D.H.: Cyberbullying among adolescents: the role of affective and cognitive empathy, and gender. Child Psychiatry Hum. Dev. 41, 387\u2013397 (2010). https:\/\/doi.org\/10.1007\/s10578-010-0176-3","journal-title":"Child Psychiatry Hum. Dev."},{"key":"347_CR75","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1037\/A0034335","volume":"4","author":"CP Barlett","year":"2015","unstructured":"Barlett, C.P.: Anonymously hurting others online: the effect of anonymity on cyberbullying frequency. Psychol. Pop. Media Cult. 4, 70\u201379 (2015). https:\/\/doi.org\/10.1037\/A0034335","journal-title":"Psychol. Pop. Media Cult."},{"key":"347_CR76","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/S42380-019-00051-5\/METRICS","volume":"2","author":"AN Doane","year":"2020","unstructured":"Doane, A.N., Ehlke, S., Kelley, M.L.: Bystanders against cyberbullying: a video program for college students. Int. J. Bullying Prev. 2, 41\u201352 (2020). https:\/\/doi.org\/10.1007\/S42380-019-00051-5\/METRICS","journal-title":"Int. J. Bullying Prev."},{"key":"347_CR77","doi-asserted-by":"publisher","first-page":"121","DOI":"10.47679\/202219","volume":"1","author":"R Wilantika","year":"2022","unstructured":"Wilantika, R., Khotimah, H., Intansari, F., Larasati, B.S., Nabila, J., Saputri, H., Mukhlis, H.: Empathy, self-esteem, and cyberbullying in vocational high school students. Nusant. J. Behav. Soc. Sci. 1, 121\u2013126 (2022). https:\/\/doi.org\/10.47679\/202219","journal-title":"Nusant. J. Behav. Soc. Sci."},{"key":"347_CR78","doi-asserted-by":"publisher","first-page":"551881","DOI":"10.3389\/FSOC.2020.551881","volume":"5","author":"V Auriemma","year":"2020","unstructured":"Auriemma, V., Iorio, G., Roberti, G., Morese, R.: Cyberbullying and empathy in the age of hyperconnection: an interdisciplinary approach. Front. Sociol. 5, 551881 (2020). https:\/\/doi.org\/10.3389\/FSOC.2020.551881","journal-title":"Front. Sociol."},{"key":"347_CR79","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.tele.2018.07.006","volume":"35","author":"V Balakrishnan","year":"2018","unstructured":"Balakrishnan, V., Fernandez, T.: Self-esteem, empathy and their impacts on cyberbullying among young adults. Telemat. Informatics 35, 2028\u20132037 (2018). https:\/\/doi.org\/10.1016\/j.tele.2018.07.006","journal-title":"Telemat. Informatics"},{"key":"347_CR80","doi-asserted-by":"publisher","first-page":"107461","DOI":"10.1016\/J.CHB.2022.107461","volume":"138","author":"J Li","year":"2023","unstructured":"Li, J., Wu, Y., Hesketh, T.: Internet use and cyberbullying: impacts on psychosocial and psychosomatic wellbeing among Chinese adolescents. Comput. Human Behav. 138, 107461 (2023). https:\/\/doi.org\/10.1016\/J.CHB.2022.107461","journal-title":"Comput. Human Behav."},{"key":"347_CR81","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.soscij.2018.06.002","volume":"56","author":"B Eri\u015fti","year":"2019","unstructured":"Eri\u015fti, B., Akbulut, Y.: Reactions to cyberbullying among high school and university students. Soc. Sci. J. 56, 10\u201320 (2019). https:\/\/doi.org\/10.1016\/j.soscij.2018.06.002","journal-title":"Soc. Sci. J."},{"key":"347_CR82","doi-asserted-by":"publisher","first-page":"e01992","DOI":"10.1016\/J.HELIYON.2019.E01992","volume":"5","author":"G Livazovi\u0107","year":"2019","unstructured":"Livazovi\u0107, G., Ham, E.: Cyberbullying and emotional distress in adolescents: the importance of family. Peers School. Heliyon 5, e01992 (2019). https:\/\/doi.org\/10.1016\/J.HELIYON.2019.E01992","journal-title":"Peers School. Heliyon"},{"key":"347_CR83","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1207\/S15374424JCCP3401_5","volume":"34","author":"AM La Greca","year":"2005","unstructured":"La Greca, A.M., Harrison, H.M.: Adolescent peer relations, friendships, and romantic relationships: do they predict social anxiety and depression? J. Clin. Child Adolesc. Psychol. 34, 49\u201361 (2005). https:\/\/doi.org\/10.1207\/S15374424JCCP3401_5","journal-title":"J. Clin. Child Adolesc. Psychol."},{"key":"347_CR84","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/IJERPH20043136","volume":"3136","author":"MHL Lee","year":"2023","unstructured":"Lee, M.H.L., Kaur, M., Shaker, V., Yee, A., Sham, R., Siau, C.S.: Cyberbullying, social media addiction and associations with depression, anxiety, and stress among medical students in Malaysia. Int. J. Environ. Res. Public Health 3136, 20 (2023). https:\/\/doi.org\/10.3390\/IJERPH20043136","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"347_CR85","doi-asserted-by":"publisher","DOI":"10.1080\/02185385.2020.1772101","author":"V Balakrishnan","year":"2020","unstructured":"Balakrishnan, V., Norman, A.A.: Psychological motives of cyberbullying among Malaysian young adults. Asia Pacific J. Soc. Work Dev. (2020). https:\/\/doi.org\/10.1080\/02185385.2020.1772101","journal-title":"Asia Pacific J. Soc. Work Dev."},{"key":"347_CR86","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1002\/AB.22079","volume":"49","author":"Y Guo","year":"2023","unstructured":"Guo, Y., Xia, L.X.: Relational model of relative deprivation, revenge, and cyberbullying: a three-time longitudinal study. Aggress. Behav. 49, 333\u2013344 (2023). https:\/\/doi.org\/10.1002\/AB.22079","journal-title":"Aggress. Behav."},{"key":"347_CR87","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1037\/ppm0000055","volume":"5","author":"CP Barlett","year":"2016","unstructured":"Barlett, C.P., Gentile, D.A., Chew, C.: Predicting cyberbullying from anonymity. Psychol. Pop. Media Cult. 5, 171\u2013180 (2016). https:\/\/doi.org\/10.1037\/ppm0000055","journal-title":"Psychol. Pop. Media Cult."},{"key":"347_CR88","doi-asserted-by":"publisher","unstructured":"Wang L., Yum Ngai S.S.: Cyberbullying perpetration among Chinese adolescents: the role of power imbalance, fun-seeking tendency, and attitude toward cyberbullying. 2021, 37, 23\u201324, https:\/\/doi.org\/10.1177\/08862605211062988","DOI":"10.1177\/08862605211062988"},{"key":"347_CR89","doi-asserted-by":"publisher","DOI":"10.6007\/IJARBSS\/V11-I11\/11654","author":"Z Madon","year":"2021","unstructured":"Madon, Z., Chin, Y.H.: Relationship between beliefs underlying attitude subjective norm perceived behavior control and cyberbullying intention of adolescents among secondary school students in Selangor, Malaysia. Int. J. Acad. Res. Bus. Soc. Sci. (2021). https:\/\/doi.org\/10.6007\/IJARBSS\/V11-I11\/11654","journal-title":"Int. J. Acad. Res. Bus. Soc. Sci."},{"key":"347_CR90","doi-asserted-by":"publisher","DOI":"10.1080\/10494820.2020.1728342","author":"WM Al-Rahmi","year":"2020","unstructured":"Al-Rahmi, W.M., Yahaya, N., Alturki, U., Alrobai, A., Aldraiweesh, A.A., Alsayed, A.O., Kamin, Y.: Bin social media \u2013 based collaborative learning: the effect on learning success with the moderating role of cyberstalking and cyberbullying. Interact. Learn. Environ. (2020). https:\/\/doi.org\/10.1080\/10494820.2020.1728342","journal-title":"Interact. Learn. Environ."},{"key":"347_CR91","doi-asserted-by":"publisher","first-page":"6293","DOI":"10.1007\/S10639-023-12064-1\/TABLES\/7","volume":"29","author":"FB Shaikh","year":"2024","unstructured":"Shaikh, F.B., Ayyasamy, R.K., Balakrishnan, V., Rehman, M., Kalhoro, S.: Cyberbullying attitude, intention and behaviour among Malaysian tertiary students \u2013 a two stage SEM- ANN approach. Educ. Inf. Technol. 29, 6293\u20136317 (2024). https:\/\/doi.org\/10.1007\/S10639-023-12064-1\/TABLES\/7","journal-title":"Educ. Inf. Technol."},{"key":"347_CR92","doi-asserted-by":"crossref","unstructured":"Mohammad Abedrabbu Alkhawaldeh M.A.S.K.: Harnessing the power of artificial intelligence for personalized assistive technology in learning disabilities. J. Southwest Jiaotong Univ. 2023, 58","DOI":"10.35741\/issn.0258-2724.58.4.60"},{"key":"347_CR93","unstructured":"Swain J.: Exploring the use of digital technologies and stakeholder perspectives of online harms and harassment in the higher education sector. 2024"},{"key":"347_CR94","doi-asserted-by":"publisher","DOI":"10.1080\/02185385.2020.1788979","author":"MF Wright","year":"2020","unstructured":"Wright, M.F., Huang, Z., Wachs, S., Aoyama, I., Kamble, S., Soudi, S., Li, Z., Lei, L., Shu, C.: Associations between cyberbullying perpetration and the dark triad of personality traits: the moderating effect of Country of Origin and gender. Asia Pacific J. Soc. Work Dev. (2020). https:\/\/doi.org\/10.1080\/02185385.2020.1788979","journal-title":"Asia Pacific J. Soc. Work Dev."},{"key":"347_CR95","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1108\/JFBM-10-2019-0065","volume":"11","author":"AA Chang","year":"2021","unstructured":"Chang, A.A., Mubarik, M.S., Naghavi, N.: Passing on the legacy: exploring the dynamics of succession in family businesses in Pakistan. J. Fam. Bus. Manag. 11, 161\u2013184 (2021)","journal-title":"J. Fam. Bus. Manag."},{"key":"347_CR96","unstructured":"Bandura A.: Social cognitive theory of human development. Int. Encycl. Educ. 1996, 5513\u20135518"},{"key":"347_CR97","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1080\/17482798.2013.781514","volume":"7","author":"R Festl","year":"2013","unstructured":"Festl, R., Scharkow, M., Quandt, T.: Peer influence, internet use and cyberbullying: a comparison of different context effects among german adolescents. J. Child. Media 7, 446\u2013462 (2013)","journal-title":"J. Child. Media"},{"key":"347_CR98","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1016\/j.jad.2018.11.022","volume":"245","author":"R Calati","year":"2019","unstructured":"Calati, R., Ferrari, C., Brittner, M., Oasi, O., Oli\u00e9, E., Carvalho, A.F., Courtet, P.: Suicidal thoughts and behaviors and social isolation: a narrative review of the literature. J. Affect. Disord. 245, 653\u2013667 (2019)","journal-title":"J. Affect. Disord."},{"key":"347_CR99","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1111\/j.1749-6632.2011.06028.x","volume":"1231","author":"JT Cacioppo","year":"2011","unstructured":"Cacioppo, J.T., Hawkley, L.C., Norman, G.J., Berntson, G.G.: Social isolation. Ann. N. Y. Acad. Sci. 1231, 17\u201322 (2011)","journal-title":"Ann. N. Y. Acad. Sci."},{"key":"347_CR100","doi-asserted-by":"crossref","unstructured":"Gianesini G., Brighi A.: (2015) Cyberbullying in the era of digital relationships: the unique role of resilience and emotion regulation on adolescents\u2019 Adjustment. In Technology and youth: Growing up in a digital world; Emerald Group Publishing Limited, 2015; pp. 1\u201346 ISBN 1537\u20134661","DOI":"10.1108\/S1537-466120150000019001"},{"key":"347_CR101","doi-asserted-by":"crossref","unstructured":"Throuvala M.A., Griffiths M.D., Rennoldson, M., Kuss D.J.: (2021) Psychosocial skills as a protective factor and other teacher recommendations for online harms prevention in schools: a qualitative analysis. In Proceedings of the Frontiers in Education; Frontiers Media SA, 2021; Vol. 6, p. 648512","DOI":"10.3389\/feduc.2021.648512"},{"key":"347_CR102","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.chb.2015.05.026","volume":"52","author":"LM Carrier","year":"2015","unstructured":"Carrier, L.M., Spradlin, A., Bunce, J.P., Rosen, L.D.: Virtual empathy: positive and negative impacts of going online upon empathy in young adults. Comput. Human Behav. 52, 39\u201348 (2015)","journal-title":"Comput. Human Behav."},{"key":"347_CR103","unstructured":"Heirman W., Walrave M.: Predicting adolescent perpetration in cyberbullying: an application of the theory of planned behavior. 2012, 24, 614\u2013620"},{"key":"347_CR104","doi-asserted-by":"crossref","unstructured":"Jafarkarimi H., Saadatdoost R., Sim A.T.H., Hee J.M.: Cyberbullying among students: an application of theory of planned behavior. In Proceedings of the International Conference on Research and Innovation in Information Systems, ICRIIS 0--5; 2017","DOI":"10.1109\/ICRIIS.2017.8002521"},{"key":"347_CR105","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1177\/0272431616670752\/ASSET\/IMAGES\/LARGE\/10.1177_0272431616670752-FIG2.JPEG","volume":"38","author":"DJ Meter","year":"2018","unstructured":"Meter, D.J., Bauman, S.: Moral disengagement about cyberbullying and parental monitoring: effects on traditional bullying and victimization via cyberbullying involvement. J. Early Adolesc. 38, 303\u2013326 (2018). https:\/\/doi.org\/10.1177\/0272431616670752\/ASSET\/IMAGES\/LARGE\/10.1177_0272431616670752-FIG2.JPEG","journal-title":"J. Early Adolesc."},{"key":"347_CR106","doi-asserted-by":"crossref","unstructured":"Hair Jr J.F., M Hult G.T., M Ringle C., Sarstedt M., Castillo Apraiz J., Cepeda Carri\u00f3n G.A., Rold\u00e1n J.L.: Manual de Partial Least Squares Structural Equation Modeling (Pls-Sem); OmniaScience, 2019; ISBN 8494799622.","DOI":"10.3926\/oss.37"},{"key":"347_CR107","doi-asserted-by":"crossref","unstructured":"Almogren A.S., Al-Rahmi W.M., Dahri N.A.: Integrated technological approaches to academic success: mobile learning, social media, and AI in higher education. IEEE Access 2024","DOI":"10.1109\/ACCESS.2024.3498047"},{"key":"347_CR108","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1037\/a0019265","volume":"22","author":"PK Jonason","year":"2010","unstructured":"Jonason, P.K., Webster, G.D.: The dirty dozen: a concise measure of the dark triad. Psychol. Assess. 22, 420\u2013432 (2010). https:\/\/doi.org\/10.1037\/a0019265","journal-title":"Psychol. Assess."},{"key":"347_CR109","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.chb.2017.04.062","volume":"75","author":"V Balakrishnan","year":"2017","unstructured":"Balakrishnan, V.: Unraveling the underlying factors SCulPT-Ing cyberbullying behaviours among Malaysian young adults. Comput. Human Behav. 75, 194\u2013205 (2017). https:\/\/doi.org\/10.1016\/j.chb.2017.04.062","journal-title":"Comput. Human Behav."},{"key":"347_CR110","unstructured":"Doane A.N.: Testing of a brief internet cyberbullying prevention program in college students; Psychology Theses & Dissertations, 2011"},{"key":"347_CR111","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1111\/jcc4.12039","volume":"19","author":"BA Ritter","year":"2014","unstructured":"Ritter, B.A.: Deviant behavior in computer-mediated communication: development and validation of a measure of cybersexual harassment. J. Comput. Commun. 19, 197\u2013214 (2014). https:\/\/doi.org\/10.1111\/jcc4.12039","journal-title":"J. Comput. Commun."},{"key":"347_CR112","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1177\/001316447003000308","volume":"30","author":"RV Krejcie","year":"1970","unstructured":"Krejcie, R.V., Morgan, D.W.: Determining sample size for research activities. Educ. Psychol. Meas. 30, 607\u2013610 (1970)","journal-title":"Educ. Psychol. Meas."},{"key":"347_CR113","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1108\/EBR-10-2013-0128","volume":"26","author":"F Hair Jr","year":"2014","unstructured":"Hair, F., Jr., Sarstedt, M., Hopkins, L., Kuppelwieser, V.: Partial least squares structural equation modeling (PLS-SEM) an emerging tool in business research. Eur. Bus. Rev. 26, 106\u2013121 (2014)","journal-title":"Eur. Bus. Rev."},{"key":"347_CR114","doi-asserted-by":"crossref","unstructured":"Fornell C., Larcker D.F.: Structural equation models with unobservable variables and measurement error: algebra and statistics 1981","DOI":"10.2307\/3150980"},{"key":"347_CR115","volume":"23","author":"WN Alwakid","year":"2025","unstructured":"Alwakid, W.N., Dahri, N.A., Humayun, M., Alwakid, G.N.: Integrating AI chatbots for enhancing academic support in business education: a SEM-based study toward sustainable learning. Int. J. Manag. Educ. 23, 101252 (2025)","journal-title":"Int. J. Manag. Educ."},{"key":"347_CR116","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18, 39\u201350 (1981)","journal-title":"J. Mark. Res."},{"key":"347_CR117","doi-asserted-by":"crossref","unstructured":"Soormo R.B., Al-Rahmi W.M., Dahri N.A., Alblehai F., Alshimai A., Aldaijy A., Salameh A.A.: Evaluating the influence of UTAUT factors on the adoption of QR Codes in MSMEs: an application of SEM and ANN methodologies. IEEE Access 2024","DOI":"10.1109\/ACCESS.2024.3510375"},{"key":"347_CR118","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1353\/csd.2015.0039","volume":"56","author":"S Bauman","year":"2015","unstructured":"Bauman, S., Baldasare, A.: Cyber aggression among college students: demographic differences, predictors of distress, and the role of the university. J. Coll. Stud. Dev. 56, 317\u2013330 (2015). https:\/\/doi.org\/10.1353\/csd.2015.0039","journal-title":"J. Coll. Stud. Dev."},{"key":"347_CR119","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/J.JAD.2019.05.061","volume":"256","author":"W Wang","year":"2019","unstructured":"Wang, W., Xie, X., Wang, X., Lei, L., Hu, Q., Jiang, S.: Cyberbullying and depression among chinese college students: a moderated mediation model of social anxiety and neuroticism. J. Affect. Disord. 256, 54\u201361 (2019). https:\/\/doi.org\/10.1016\/J.JAD.2019.05.061","journal-title":"J. Affect. Disord."},{"key":"347_CR120","doi-asserted-by":"crossref","unstructured":"Shraya B., Dopathi H.C.R., Anitha G., Pattanaik B.: Unveiling the intricacies of cyber harassment intentions on social media platforms. In Proceedings of the 2024 3rd International Conference for Innovation in Technology, INOCON; 2024","DOI":"10.1109\/INOCON60754.2024.10512248"},{"key":"347_CR121","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1387\/zer.10667","volume":"18","author":"S Livingstone","year":"2013","unstructured":"Livingstone, S.: Online risk, harm and vulnerability: reflections on the evidence base for child internet safety policy. Zer Rev. Estud. Comun. 18, 13\u201328 (2013)","journal-title":"Zer Rev. Estud. Comun."},{"key":"347_CR122","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.chb.2017.03.073","volume":"73","author":"X Wang","year":"2017","unstructured":"Wang, X., Yang, L., Yang, J., Wang, P., Lei, L.: Trait anger and cyberbullying among young adults: a moderated mediation model of moral disengagement and moral identity. Comput. Human Behav. 73, 519\u2013526 (2017). https:\/\/doi.org\/10.1016\/j.chb.2017.03.073","journal-title":"Comput. Human Behav."}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-025-00347-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42044-025-00347-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-025-00347-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:09:57Z","timestamp":1765357797000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42044-025-00347-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,14]]},"references-count":122,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["347"],"URL":"https:\/\/doi.org\/10.1007\/s42044-025-00347-4","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"value":"2520-8438","type":"print"},{"value":"2520-8446","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,14]]},"assertion":[{"value":"17 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}