{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:07:22Z","timestamp":1771466842745,"version":"3.50.1"},"reference-count":50,"publisher":"Informa UK Limited","issue":"3","funder":[{"name":"ENCASE (ENhancing seCurity and privAcy in the Social wEb)"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2018,3,4]]},"DOI":"10.1080\/0144929x.2018.1432688","type":"journal-article","created":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T07:22:57Z","timestamp":1518074577000},"page":"258-266","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":29,"title":["From risk factors to detection and intervention: a practical proposal for future work on cyberbullying"],"prefix":"10.1080","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3570-6578","authenticated-orcid":false,"given":"Andri","family":"Ioannou","sequence":"first","affiliation":[{"name":"Cyprus Interaction Lab, Department of Multimedia and Graphic Arts, Lemesos, Cyprus"}]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Alabama, Birmingham, USA"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University College London (UCL), London, UK"}]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University College London (UCL), London, UK"}]},{"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Michael","family":"Sirivianos","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Computer Engineering and Informatics, Cyprus University of Technology, Lemesos, Cyprus"}]}],"member":"301","published-online":{"date-parts":[[2018,2,8]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1080\/10926771.2017.1330793"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1002\/casp.2137"},{"issue":"1","key":"CIT0004","first-page":"112","volume":"3","author":"Blumenfeld W. J.","year":"2010","journal-title":"The International Journal of Critical Pedagogy"},{"key":"CIT0001a","doi-asserted-by":"publisher","DOI":"10.5817\/CP2014-2-7"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.3390\/soc5020245"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.12968\/ijtr.2009.16.1.37935"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.009"},{"key":"CIT0009","first-page":"02","volume":"11","author":"Dinakar K.","year":"2011","journal-title":"The Social Mobile Web"},{"key":"CIT0010","volume-title":"Spinning our Wheels: Improving our Ability to Respond to Bullying and Cyberbullying","author":"Englander E.","year":"2012"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1177\/0886260503262083"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2015.05.002"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2014.04.014"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-012-9902-4"},{"key":"CIT0015","volume-title":"Cyberbullying Legislation and Case Law: Implications for School Policy and Practice","author":"Hinduja S.","year":"2015"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2017.09.010"},{"key":"CIT0002a","doi-asserted-by":"publisher","DOI":"10.1080\/13811118.2010.494133"},{"issue":"4","key":"CIT0018","first-page":"224","volume":"13","author":"Keith S.","year":"2005","journal-title":"Reclaiming Children and Youth"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.017"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/02643944.2015.1134631"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0588"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/s11218-014-9280-8"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1177\/0143034306064547"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1080\/10926771003788979"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415150305"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2011.08.032"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08608-8_14"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.03.085"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1375\/ajgc.20.2.129"},{"key":"CIT0031","author":"Obermaier M.","year":"2014","journal-title":"New Media & Society"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-015-0259-3"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1177\/1541204006286288"},{"issue":"5","key":"CIT0034","first-page":"1189","volume":"34","author":"Patton M. Q.","year":"1999","journal-title":"Health Services Research"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2013.04.002"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.170"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-016-3877-0"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.2011.300308"},{"key":"CIT0039","first-page":"368","author":"Schrock A.","year":"2011","journal-title":"Computer-mediated Communication in Personal Relationships, edited by Kevin B. Wright, and Lynn M. Webb"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2010.09.011"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.024"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"CIT0043","first-page":"146","volume-title":"Alleviating Bullying: Conquering the Challenge of Violent Crimes","author":"Smith-Ross C.","year":"2014"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1001\/archgenpsychiatry.2010.79"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0445"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-012-9867-3"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1375\/ajgc.20.2.225"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0042"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809341263"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.019"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2015.10.019"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2018.1432688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T08:29:05Z","timestamp":1519374545000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2018.1432688"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,8]]},"references-count":50,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,2,3]]},"published-print":{"date-parts":[[2018,3,4]]}},"alternative-id":["10.1080\/0144929X.2018.1432688"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2018.1432688","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}