{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:14:56Z","timestamp":1774523696702,"version":"3.50.1"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/aiccsa47632.2019.9035368","type":"proceedings-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T03:08:51Z","timestamp":1584414531000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["A Comparative Analysis of Cyberbullying and Cyberstalking Laws in the UAE, US, UK and Canada"],"prefix":"10.1109","author":[{"given":"Haifa Al","family":"Hosani","sequence":"first","affiliation":[]},{"given":"Maryam","family":"Yousef","sequence":"additional","affiliation":[]},{"given":"Shaima Al","family":"Shouq","sequence":"additional","affiliation":[]},{"given":"Farkhund","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Djedjiga","family":"Mouheb","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"Cyberbullying what's the law?&#x201D; [Online] - Cyberbullying and the law"},{"key":"ref38","article-title":"Cyberbullying and the law: A review of psychological and legal challenges","author":"eiasam","year":"0","journal-title":"[Book Section] Computers in Human Behavior - [s l ] Department of Psychology Kingston University London Penrhyn Road Kingston upon Thames KT1 2EE UK"},{"key":"ref33","year":"0","journal-title":"North Carolina G S 14&#x2013;458 1"},{"key":"ref32","article-title":"Laws Policies","year":"2017"},{"key":"ref31","year":"0","journal-title":"Megan Meier Cyberbullying Prevention Act"},{"key":"ref30","article-title":"Electronic Communications Privacy Act of 1986","year":"0","journal-title":"It ojp gov"},{"key":"ref37","year":"0","journal-title":"Online harassment could broadband providers help?"},{"key":"ref36","year":"0","journal-title":"Protection from Harassment Act 1997"},{"key":"ref35","year":"2018","journal-title":"Domestic abuse findings from the Crime Survey for England and Wales year ending March 2017"},{"key":"ref34","article-title":"Misdemeanors Explained: Types of Misdemeanors\/Penalties","year":"0","journal-title":"Hale Law Firm PC"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.27"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.170"},{"key":"ref28","author":"floyd","year":"2016","journal-title":"A Guide to Cyber Crime Laws"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14505\/jarle.v8.5(27).22"},{"key":"ref29","author":"wagh","year":"2013","journal-title":"Comparative Analysis of Trends of Cyber Crime Laws in USA and India Cloud Publications"},{"key":"ref2","first-page":"165","article-title":"Cyberstalking","author":"durkin","year":"2018","journal-title":"The SAGE Encyclopedia of the Internet B Warf Thousand Oaks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2017.14 Medicine and Therapeutics"},{"key":"ref20","article-title":"New UAE Law against hate crimes and discrimination","author":"marshall","year":"2015","journal-title":"Tamimi"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73263-3_4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.020"},{"key":"ref24","article-title":"Cyberbullying on Trial: The Computer Fraud and Abuse Act and United States v. Drew","volume":"17","author":"castle","year":"2009","journal-title":"Law Policy"},{"key":"ref23","article-title":"A New Method to Address Cyberbullying in the United States: The Application of a Notice-and-Takedown Model as a Restriction on Cyberbullying Speech","year":"2017","journal-title":"The George Washington University Law School"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.2017.1302402"},{"key":"ref25","article-title":"A Majority of Teens Have Experienced Some Form of Cyberbullying","year":"2018","journal-title":"Internet Science & Tech Pew Research Center"},{"key":"ref50","year":"0","journal-title":"The Children's Online Privacy Protection Act"},{"key":"ref51","year":"2016","journal-title":"Cyber Misbehavior United States Department of Justice Executive Office for United States Attorneys Washington DC 20530"},{"key":"ref59","article-title":"Canada: number of internet users 2023","year":"2019","journal-title":"The Statisticain"},{"key":"ref58","article-title":"100 Internet Statistics & Facts For 2019 You Should Know About","author":"liedke","year":"2019","journal-title":"Website Hosting Rating"},{"key":"ref57","article-title":"UAE Internet Statistics 2019 (Infographics)","year":"0","journal-title":"Official Gamil Blog"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5553\/REM\/.000010"},{"key":"ref55","article-title":"Court strikes down Canada's first anti-cyberbullying law, calls it &#x2018;colossal failure&#x2019;","author":"ruskin","year":"2015","journal-title":"CBC News"},{"key":"ref54","article-title":"Cyberbullying law requires students to reveal Facebook passwords","author":"rushe","year":"2015","journal-title":"The Guardian"},{"key":"ref53","article-title":"18 U.S. Code &#x00A7; 2261A - Stalking","year":"0","journal-title":"Legal Information Institute"},{"key":"ref52","article-title":"18 U.S. Code &#x00A7; 875 - Interstate communications","year":"0","journal-title":"LII\/Legal Information Institute"},{"key":"ref10","article-title":"Always on, always aware","author":"belse","year":"0","journal-title":"Cyberbullying Research Center"},{"key":"ref11","author":"kraft","year":"0","journal-title":"An Exploratory Study of the Cyberbullying and Cyberstalking Experiences and Factors Related to Victimization of Students at a Public Liberal Arts College 2010 [E-book] Available Research Gate"},{"key":"ref40","article-title":"National Stalking Helpline","year":"0","journal-title":"Suzy Lamplugh Organization"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1177\/0093854811421448"},{"key":"ref13","year":"2018","journal-title":"United Arab Emirates internet penetration 2013&#x2013; 2019 &#x2014; Statistic Statista"},{"key":"ref14","article-title":"Two in five are cybercrime victims","author":"malek","year":"0","journal-title":"The National 2016"},{"key":"ref15","article-title":"How to deal with cyber bullying in UAE","author":"chaturvedi","year":"2015","journal-title":"Khaleej Times"},{"key":"ref16","author":"imranuddin","year":"0","journal-title":"A study of cyber laws in the United Arab Emirates 2017"},{"key":"ref17","article-title":"Cyberbullying: a Snapshot of the Laws in the UAE","author":"robertson","year":"2017","journal-title":"Tamimi"},{"key":"ref18","year":"0","journal-title":"UAE Federal Decree Law No (5) of 2012 On Combating Cybercrimes"},{"key":"ref19","article-title":"Trolling the Online Abuse Law","author":"fawcett","year":"2015","journal-title":"Tamimi"},{"key":"ref4","article-title":"2016 Cyberbullying Data","author":"patchin","year":"2016","journal-title":"Cyberbullying Research Center"},{"key":"ref3","year":"2012","journal-title":"Norton Cybercrime Report"},{"key":"ref6","article-title":"UAE-wide campaign to protect children from cyber-bullying","author":"bell","year":"2013","journal-title":"The National"},{"key":"ref5","author":"willard","year":"2004","journal-title":"Educator's guide to cyberbullying Addressing the harm caused by online social cruelty"},{"key":"ref8","author":"thompson","year":"2014","journal-title":"Defending against cybercrime"},{"key":"ref7","article-title":"Cyberbullying happens more often on Instagram, a new survey suggests","author":"grigonis","year":"2017","journal-title":"Digital Trends"},{"key":"ref49","article-title":"CAN-SPAM Act of 2003","year":"0","journal-title":"Spamlaws com"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(12)70019-2"},{"key":"ref46","article-title":"The Right to Be Forgotten: A Step in the Right Direction for Cyberspace Law Policy","author":"cook","year":"2015","journal-title":"Journal of Law Technology & the Internet"},{"key":"ref45","article-title":"Internet Harassment or Cyberbullying","year":"0","journal-title":"Canadian Centre for Occupational Health and Safety"},{"key":"ref48","author":"doyle","year":"0","journal-title":"Cybercrime An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws 2014"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1177\/107621751003300206"},{"key":"ref42","article-title":"The Mental Health and Well-Being of Ontario Students, 1991&#x2013;2011: Detailed OSDUHS Findings","author":"paglia-boak","year":"2012","journal-title":"CAMH Research Document Series 34 Centre for Addiction and Mental Health Toronto Canada"},{"key":"ref41","article-title":"Cyberbullying: What's the problem?","author":"mcnutt","year":"0"},{"key":"ref44","year":"0","journal-title":"Cantech Letter Canada's Cyberbullying Laws Threaten More Than Just Internet Trolls"},{"key":"ref43","article-title":"Protecting Canadians from Online Crime Act","year":"0","journal-title":"Wikipedia"}],"event":{"name":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2019,11,3]]},"end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9006726\/9035208\/09035368.pdf?arnumber=9035368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:45:59Z","timestamp":1658155559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9035368\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/aiccsa47632.2019.9035368","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}