{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:54:43Z","timestamp":1770753283513,"version":"3.50.0"},"reference-count":70,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:00:00Z","timestamp":1623024000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2021,8,17]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This paper aims to consider modern internet phenomena such as cyberbullying and cybermobbing. The emphasis in the paper is placed on the problematic issues of the legal practice of combating cyberbullying and cyber-mobbing in developing countries as these phenomena are still insufficiently studied. The subject of this paper is modern internet phenomena such as cyberbullying and cyber-mobbing. The emphasis in the paper is placed on the problematic issues of the legal practice of combating cyberbullying and cyber-mobbing in developing countries as these phenomena are still insufficiently studied.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The legislation of developing countries is compared with doctrinal and practical developments in the fight against the studied problem in developed countries of the West, as well as countries of the former USSR. Moreover, experiment was conducted to determine the effectiveness of methods to combat cyberbullying using social networks. Thus, 40 random accounts of people (presumably from 18 to 30\u2009years old) were analyzed.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>This paper indicates the concepts of cyber-mobbing and cyberbullying, as well as their varieties that exist in the modern world. This study examines statistical data, programs and measures of different states in the fight against cyberbullying and cyber-mobbing. Results of experiments showed that Instagram users are aware of the availability of built-in extensions of the social network to protect against cyberbullying and use them relatively frequently. With that, female segment of Instagram users is more concerned about the content of the comments under their photos than the male one.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Measures have been developed to prevent and counteract cyberbullying and cyber-mobbing, the introduction of which into the policies of states might help in the fight against these social phenomena.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-02-2020-0031","type":"journal-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T13:49:58Z","timestamp":1622814598000},"page":"435-456","source":"Crossref","is-referenced-by-count":22,"title":["Cyberbullying and cyber-mobbing in developing countries"],"prefix":"10.1108","volume":"29","author":[{"given":"Aliya","family":"Kintonova","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Vasyaev","sequence":"additional","affiliation":[]},{"given":"Viktor","family":"Shestak","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,6,7]]},"reference":[{"issue":"7","key":"key2021081408083271300_ref001","doi-asserted-by":"publisher","first-page":"2209","DOI":"10.14505\/jarle.v9.7(37).01","article-title":"Validity and motivation of decisions in criminal proceedings","volume":"9","year":"2018","journal-title":"Journal of Advanced Research in Law and Economics"},{"key":"key2021081408083271300_ref002","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.diin.2018.12.003","article-title":"Behavioural digital forensics model: embedding behavioural evidence analysis into the investigation of digital crimes","volume":"28","year":"2019","journal-title":"Digital Investigation"},{"issue":"3D","key":"key2021081408083271300_ref003","first-page":"55","article-title":"Cybercrime an emerging challenge for internet users: an overview","volume":"50","year":"2018","journal-title":"Sindh University Research Journal (Science Series)"},{"key":"key2021081408083271300_ref004","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.paid.2019.01.024","article-title":"Cyberbullying detection on twitter using big five and dark triad features","volume":"141","year":"2019","journal-title":"Personality and Individual Differences"},{"key":"key2021081408083271300_ref005","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.avb.2015.05.014","article-title":"Am I at risk of cyberbullying? A narrative review and conceptual framework for research on risk of cyberbullying and cybervictimization: the risk and needs assessment approach","volume":"23","year":"2015","journal-title":"Aggression and Violent Behavior"},{"issue":"2","key":"key2021081408083271300_ref006","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10610-015-9293-7","article-title":"Digital uses, victimization and online aggression: a comparative study between primary school and lower secondary school students in France","volume":"22","year":"2015","journal-title":"European Journal on Criminal Policy and Research"},{"issue":"13","key":"key2021081408083271300_ref07a","first-page":"6","article-title":"Cybermobbing \u2013 challenge for modern education","volume":"2","year":"2013"},{"key":"key2021081408083271300_ref007","volume-title":"Bullying Surveillance among Youths: Uniform Definitions for Public Health and Recommended Data Elements, Version 1.0","author":"Centers for Disease Control and Prevention","year":"2009"},{"issue":"10","key":"key2021081408083271300_ref008","doi-asserted-by":"crossref","first-page":"2294","DOI":"10.1109\/TNNLS.2016.2582746","article-title":"Semisupervised feature analysis by mining correlations among multiple tasks","volume":"28","year":"2017","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"8","key":"key2021081408083271300_ref011","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/TPAMI.2016.2608901","article-title":"Semantic pooling for complex event analysis in untrimmed videos","volume":"39","year":"2017","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"8","key":"key2021081408083271300_ref009","doi-asserted-by":"crossref","first-page":"3911","DOI":"10.1109\/TIP.2017.2708506","article-title":"Feature interaction augmented sparse learning for fast kinect motion detection","volume":"26","year":"2017","journal-title":"IEEE Transactions on Image Processing"},{"issue":"5","key":"key2021081408083271300_ref010","doi-asserted-by":"crossref","first-page":"1180","DOI":"10.1109\/TCYB.2016.2539546","article-title":"Bi-level semantic representation analysis for multimedia event detection","volume":"47","year":"2017","journal-title":"IEEE Transactions on Cybernetics"},{"key":"key2021081408083271300_ref012","article-title":"Digital literacy of teenagers and cyberbulling: the experience of an educational organization in the field of digital skills formation","volume-title":"All-Russian Scientific and Methodological Conference with International Participation","year":"2019"},{"key":"key2021081408083271300_ref013","unstructured":"Cook, S. (2020), \u201cCyberbullying facts and statistics for 2020\u201d, available at: www.comparitech.com\/internet-providers\/cyberbullying-statistics\/ (accessed 15 May 2020)."},{"issue":"1","key":"key2021081408083271300_ref014","first-page":"1","article-title":"The investigation of the relationship of cyberbullying with cyber loafing, internet addiction, information literacy and various other variables","volume":"3","year":"2016","journal-title":"Online Journal of Technology Addiction and Cyberbullying"},{"key":"key2021081408083271300_ref015","unstructured":"Dodd, V. (2017), \u201cCPS to crack down on social media hate crime, says Alison Saunders\u201d, The Guardian, available at: www.theguardian.com\/society\/2017\/aug\/21\/cps-to-crack-down-on-social-media-hate-says-alison-saunders (accessed 12 December 2019)."},{"key":"key2021081408083271300_ref016","unstructured":"Duggan, M. (2014), \u201cExperiencing online harassment\u201d, available at: www.pewresearch.org\/internet\/2014\/10\/22\/part-1-experiencing-online-harassment\/ (accessed 15 May 2020)."},{"key":"key2021081408083271300_ref017","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.chb.2016.08.012","article-title":"Cyberbullying and the law: a review of psychological and legal challenges","volume":"65","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2021081408083271300_ref018","volume-title":"Ending the Torment: Tackling Bullying from the Schoolyard to Cyberspace","year":"2016"},{"issue":"4","key":"key2021081408083271300_ref019","doi-asserted-by":"publisher","first-page":"52","DOI":"10.4018\/IJDLDC.2016100104","article-title":"Incidents of cyberbullying among library and information science (LIS) students at Delta State University, Abraka, Nigeria","volume":"7","year":"2016","journal-title":"International Journal of Digital Literacy and Digital Competence"},{"issue":"4","key":"key2021081408083271300_ref020","doi-asserted-by":"publisher","first-page":"464","DOI":"10.17105\/spr-15-0052.1","article-title":"Clinical trial of second step Middle school program: impact on bullying, cyberbullying, homophobic teasing, and sexual harassment perpetration","volume":"44","year":"2015","journal-title":"School Psychology Review"},{"key":"key2021081408083271300_ref021","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-3-319-25552-1_6","article-title":"Cyberbullying matters: examining the incremental impact of cyberbullying on outcomes over and above traditional bullying in North America","volume-title":"Cyberbullying across the Globe","year":"2016"},{"key":"key2021081408083271300_ref022","volume-title":"Assessment of Violence against Children in Schools in Kazakhstan","year":"2013"},{"key":"key2021081408083271300_ref023","unstructured":"Harris, M. (2018), \u201cGlobal views on cyberbullying\u201d, available at: www.ipsos.com\/en-za\/global-views-cyberbullying (accessed 15 May 2020)."},{"issue":"3","key":"key2021081408083271300_ref024","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1080\/13811118.2010.494133","article-title":"Bullying, cyberbullying, and suicide","volume":"14","year":"2010","journal-title":"Archives of Suicide Research"},{"issue":"2","key":"key2021081408083271300_ref025","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1080\/1045988X.2011.539433","article-title":"Cyberbullying: a review of the legal issues facing educators","volume":"55","year":"2011","journal-title":"Preventing School Failure: Alternative Education for Children and Youth"},{"key":"key2021081408083271300_ref026","first-page":"21","article-title":"Exploration and analysis of the current situation of school bullying and the way of legal regulation in the new period","volume-title":"2019 International Conference on Management, Finance and Social Sciences Research (MFSSR 2019)","year":"2019"},{"key":"key2021081408083271300_ref027","volume-title":"Reaping Digital Dividends: Leveraging the Internet for Development in Europe and Central Asia","year":"2017"},{"issue":"1","key":"key2021081408083271300_ref028","first-page":"213","article-title":"Influences of eco-systemic factors related to adolescents\u2019 cyber violence","volume":"14","year":"2012","journal-title":"Journal of Adolescent Welfare"},{"key":"key2021081408083271300_ref029","volume-title":"Polish Children on the Internet. Threats and Security against EU Data","year":"2010"},{"key":"key2021081408083271300_ref030","volume-title":"Cyberbullying: Bullying in the Digital Age","year":"2012","edition":"2nd ed."},{"key":"key2021081408083271300_ref031","volume-title":"One in Three: Internet Governance and Children\u2019s Rights","year":"2016"},{"issue":"2","key":"key2021081408083271300_ref032","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1375\/ajgc.20.2.182","article-title":"Cyberbullying at school: good practice and legal aspects in the United Kingdom","volume":"20","year":"2010","journal-title":"Australian Journal of Guidance and Counselling"},{"issue":"1","key":"key2021081408083271300_ref033","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1080\/15388220.2016.1263796","article-title":"Cyberbullying in Portuguese schools: prevalence and characteristics","volume":"17","year":"2016","journal-title":"Journal of School Violence"},{"issue":"9","key":"key2021081408083271300_ref034","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1089\/cyber.2012.0040","article-title":"Cyberbullying definition among adolescents: a comparison across six European countries","volume":"15","year":"2012","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"5","key":"key2021081408083271300_ref035","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.jadohealth.2014.06.007","article-title":"Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying","volume":"55","year":"2014","journal-title":"Journal of Adolescent Health"},{"issue":"3","key":"key2021081408083271300_ref036","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.14505\/jarle.v9 3(33).32","article-title":"Practical aspects of consideration of disputes associated with the education of children in a juvenile court","volume":"9","year":"2018","journal-title":"Journal of Advanced Research in Law and Economics"},{"issue":"1","key":"key2021081408083271300_ref037","first-page":"2","article-title":"Cyberbullying among university students: the Kenyan experience","volume":"12","year":"2020","journal-title":"The African Journal of Information Systems"},{"issue":"10","key":"key2021081408083271300_ref038","doi-asserted-by":"crossref","first-page":"2100","DOI":"10.1109\/TKDE.2017.2728531","article-title":"Beyond trace ratio: weighted harmonic mean of trace ratios for multiclass discriminant analysis","volume":"29","year":"2017","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"key2021081408083271300_ref039","doi-asserted-by":"publisher","first-page":"133","DOI":"10.13189\/ujer.2013.010301","article-title":"Cyberbullying: resources for intervention and prevention","volume":"1","year":"2013","journal-title":"Universal Journal of Educational Research"},{"issue":"1","key":"key2021081408083271300_ref040","first-page":"1","article-title":"Cyberbullying among undergraduate students in a Nigerian university: awareness and incidence","volume":"6","year":"2018","journal-title":"Romanian Journal of Psychological Studies"},{"key":"key2021081408083271300_ref041","first-page":"121","article-title":"Internetomania of young people \u2013 fun or illness","volume-title":"Dziecko i Media Elektroniczne \u2013 Nowywymiardzieci\u0144stwa. Komputer i Internet w \u017byciudziecka i Obrazjegodzieci\u0144stwa","year":"2005"},{"key":"key2021081408083271300_ref042","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.chb.2016.12.026","article-title":"Cyberbullying and self-esteem: an Italian study","volume":"69","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"key2021081408083271300_ref043","first-page":"114","article-title":"Regulation of bullying in Hungary and abroad","volume":"1","year":"2016","journal-title":"Medias Res"},{"issue":"2","key":"key2021081408083271300_ref044","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1177\/0044118X10366951","article-title":"Traditional and nontraditional bullying among youth: a test of general strain theory","volume":"43","year":"2011","journal-title":"Youth and Society"},{"key":"key2021081408083271300_ref045","volume-title":"Preventing and Responding to Cyberbullying: Expert Perspectives","year":"2012"},{"key":"key2021081408083271300_ref046","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.chb.2018.05.013","article-title":"Cyberbullying: a concept analysis of defining attributes and additional influencing factors","volume":"86","year":"2018","journal-title":"Computers in Human Behavior"},{"key":"key2021081408083271300_ref047","unstructured":"PREVNet (2016), \u201cLegal consequences of cyberbullying\u201d, available at: www.prevnet.ca\/bullying\/cyber-bullying\/legal-consequences (accessed 14 December 2019)."},{"issue":"1","key":"key2021081408083271300_ref048","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s41935-019-0115-9","article-title":"Who dies and who survives? Investigating the difference between suicide decedents and suicide attempters","volume":"9","year":"2019","journal-title":"Egyptian Journal of Forensic Sciences"},{"issue":"6","key":"key2021081408083271300_ref049","first-page":"165","article-title":"Cybercrime and cybercriminals: a comprehensive study","volume":"4","year":"2016","journal-title":"International Journal of Computer Networks and Communications Security"},{"issue":"11","key":"key2021081408083271300_ref050","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1080\/01639625.2018.1493369","article-title":"Cyberbullying victimization among high school and university students in Ghana","volume":"40","year":"2019","journal-title":"Deviant Behavior"},{"key":"key2021081408083271300_ref051","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.diin.2019.07.005","article-title":"Crime control in the sphere of information technologies in the republic of Turkey","volume":"30","year":"2019","journal-title":"Digital Investigation"},{"issue":"1","key":"key2021081408083271300_ref052","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.chb.2012.05.024","article-title":"The nature of cyberbullying, and strategies for prevention","volume":"29","year":"2013","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2021081408083271300_ref053","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","article-title":"Cyberbullying: its nature and impact in secondary school pupils","volume":"49","year":"2008","journal-title":"Journal of Child Psychology and Psychiatry"},{"key":"key2021081408083271300_ref054","unstructured":"Stobing, C. (2019), \u201cThe best parental control software and apps of 2020\u201d, available at: www.comparitech.com\/parental-control\/ (accessed 15 May 2020)."},{"key":"key2021081408083271300_ref055","first-page":"79","article-title":"A study on the cyber-violence induction factors of teenagers: focused on individual inclination, cyber violence damage experience, and moral consciousness","volume":"19","year":"2006","journal-title":"Korea Journal of Cyber Communication"},{"key":"key2021081408083271300_ref056","article-title":"Cyberbullying: new technologies as tools for applying psychological violence","volume-title":"Nietylko Internet. Nowe Media, Przyroda i \u201cTechnologiespo\u0142eczne\u201d a Praktykikulturowe","year":"2010"},{"key":"key2021081408083271300_ref057","unstructured":"The Threat Assessment of Bullying Behaviours among Youngsters (TABBY) (2019), available at: www.tabby.eu (accessed 14 December 2019)."},{"key":"key2021081408083271300_ref058","unstructured":"Tishchenko, M. (2018), \u201cCyberbullying is illegal: in Russia they propose introducing responsibility for bullying in social networks\u201d, available at: https:\/\/russian.rt.com\/russia\/article\/489396-shtraf-rossiya-kiberbulling (accessed 15 December 2019)."},{"issue":"5","key":"key2021081408083271300_ref059","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1177\/0143034312446882","article-title":"Affective and cognitive empathy as mediators of gender differences in cyber and traditional bullying","volume":"33","year":"2012","journal-title":"School Psychology International"},{"key":"key2021081408083271300_ref060","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.pedn.2018.11.006","article-title":"Cyber bullying experiences of adolescents and parental awareness: Turkish example","volume":"44","year":"2018","journal-title":"Journal of Pediatric Nursing"},{"key":"key2021081408083271300_ref061","unstructured":"UNICEF (2020), \u201cCyberbullying: what is it and how to stop it\u201d, available at: www.unicef.org\/end-violence\/how-to-stop-cyberbullying (accessed 15 May 2020)."},{"key":"key2021081408083271300_ref062","unstructured":"University of Bedfordshire (2019), \u201cUni working to help cyberbullying victims\u201d, available at: www.beds.ac.uk\/news\/2012\/june\/uni-working-to-help-cyberbullying-victims\/ (accessed 15 December 2019)."},{"issue":"5","key":"key2021081408083271300_ref063","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1001\/jamapediatrics.2013.4143","article-title":"Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: a Meta-analysis","volume":"168","year":"2014","journal-title":"JAMA Pediatrics"},{"issue":"3\/4","key":"key2021081408083271300_ref064","doi-asserted-by":"publisher","first-page":"189","DOI":"10.32914\/i.51.3-4.7","article-title":"Preventive measures against computer related crimes: approaching an individual","volume":"51","year":"2018","journal-title":"Informatologia"},{"key":"key2021081408083271300_ref065","first-page":"48","article-title":"Trolling as a form of social aggression in the virtual community","volume":"1","year":"2012","journal-title":"Vestnik Udmurdskogo Universiteta. Filosofiya. Sotsiologiya. Psikhologiya. Pedagogika"},{"issue":"3","key":"key2021081408083271300_ref066","doi-asserted-by":"publisher","first-page":"1","DOI":"10.26795\/2307-1281-2017-3-17","article-title":"Cyberbulling as a method of social addressing teenagers on the bullying situation","volume":"3","year":"2017","journal-title":"Vestnik of Minin University"},{"key":"key2021081408083271300_ref067","first-page":"27","article-title":"Effects of cyberbullying \u2013 accusation or defense of technology? Child abused","volume":"1","year":"2009","journal-title":"Theory, Research, Practice"},{"issue":"1","key":"key2021081408083271300_ref068","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/02681102.2017.1396020","article-title":"Conceptualizing development in information and communication technology for development (ICT4D)","volume":"24","year":"2018","journal-title":"Information Technology for Development"},{"issue":"7","key":"key2021081408083271300_ref069","first-page":"2484","article-title":"Ensuring the protection of the rights of the child is a priority in the legislation of Kazakhstan","volume":"9","year":"2018","journal-title":"Journal of Advanced Research in Law and Economics"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-02-2020-0031\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-02-2020-0031\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:42Z","timestamp":1753406562000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/29\/3\/435-456\/225410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,7]]},"references-count":70,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,6,7]]},"published-print":{"date-parts":[[2021,8,17]]}},"alternative-id":["10.1108\/ICS-02-2020-0031"],"URL":"https:\/\/doi.org\/10.1108\/ics-02-2020-0031","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2021,6,7]]}}}