{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:56:46Z","timestamp":1730224606427,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/his.2011.6122110","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T22:01:52Z","timestamp":1326319312000},"page":"229-234","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of Cyber-bullying in a virtual social networking"],"prefix":"10.1109","author":[{"given":"Alberto","family":"Ochoa","sequence":"first","affiliation":[]},{"given":"Julio","family":"Ponce","sequence":"additional","affiliation":[]},{"given":"Ruben","family":"Jaramillo","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Ornelas","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Hernandez","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Azpeitia","sequence":"additional","affiliation":[]},{"given":"Arturo","family":"Elias","sequence":"additional","affiliation":[]},{"given":"Arturo","family":"Hernandez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Enhancing Child Safety and Online Technologies Final Report of the Internet Safety Task Force to the Multi-state Working Group on Social Networking of the State Attorneys General of the United States","year":"2008","author":"palfrey","key":"19"},{"key":"17","article-title":"Six degrees of separation in a Graph to a Social Networking","author":"ochoa","year":"2009","journal-title":"ASNA'2009 Zu?rich Switzerland"},{"key":"18","article-title":"Identity Theft","author":"paget","year":"2007","journal-title":"McAfee Avert Labs Technical White Paper No 1"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12433-4_1"},{"key":"16","article-title":"Baharastar - Simulador de Algoritmos Culturales para la Mineri?a de Datos Social","author":"ochoa","year":"2007","journal-title":"Proceedings of COMCEV'2007"},{"key":"13","first-page":"28","article-title":"From Factors to Actors","author":"macy","year":"2002","journal-title":"Annual Review of Sociology"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2007.05.004"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1080\/13811118.2010.494133"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.5772\/97"},{"key":"20","article-title":"Data Mining","author":"pe?rez lo?pez","year":"2006","journal-title":"Soluciones Con Enterprise Miner"},{"journal-title":"Using Technology to Combat Cyberbullying","year":"2010","key":"22"},{"key":"23","article-title":"A Common Protocol for Agent-Based Social Simulation","volume":"9","author":"richiardi","year":"2006","journal-title":"Journal of Artificial Societies and Social Simulation"},{"journal-title":"Prote?geles Li?nea de Denuncia","year":"2010","key":"24"},{"key":"25","first-page":"128","article-title":"Do hipertexto ao algo mais: Usos e abusos do conceitos de hipermi?dia pelo jornalismo on-line","author":"silva","year":"2001","journal-title":"Janelas Do Ciberespac?o Comunicac?a?o e Cibercultura"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2007.00611.x"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-0417(01)00012-2"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.40"},{"key":"29","article-title":"Simulating the behavior of a minority in Turkish Society","author":"ustaoglu","year":"2009","journal-title":"ASNA 2009 Zurich Switzerland"},{"key":"3","article-title":"Letters: Cyber-bullying. Schools in mobile phone campaign to beat the cyberbullies","author":"bevan","year":"2007","journal-title":"The Independent [En Linea]"},{"key":"2","article-title":"Bulling. Intimidacio?n y maltrato entre alumnado","author":"aviles","year":"2002","journal-title":"Educacio?n en Valores [En Li?nea]"},{"key":"10","first-page":"129","volume":"29","author":"hinduja","year":"2008","journal-title":"Cyberbullying An Exploratory Analysis of Factors Related to Offending and Victimization Deviant Behavior"},{"key":"1","article-title":"El Bullying Acoso Escolar. Innovacio?n y experiencias Educativas","author":"alca?ntara","year":"2009","journal-title":"CSI-CSIF Revista Digital"},{"key":"30","article-title":"Who goes there?","author":"villano","year":"2010","journal-title":"Schools CIO Strategies for K12 Technology Leaders"},{"journal-title":"I Know What You Did Last Summer! - COST on Privacy and Data Protection","year":"2010","key":"7"},{"journal-title":"Capital Social Y Nivel de Cohesio?n Social en Ciudad Jua?rez on Book Diagno?stico Sobre la Realidad Social Econo?mica Y Cultural de Los Entornos Locales para El Disen?o de Intervenciones en Materia de Prevencio?n Y Erradicacio?n de la Violencia en la Regio?n Norte El Caso de Ciudad Jua?rez","year":"2010","author":"castillo","key":"6"},{"journal-title":"ChatSafe","year":"2010","author":"carmichael","key":"5"},{"journal-title":"Cyber Law Maximizing Safety and Minimizing Risk in Classrooms","year":"2009","author":"bissonette","key":"4"},{"key":"9","first-page":"17","author":"herna?ndez","year":"2007","journal-title":"CiberBullying Un Problema de Acoso Escolar"},{"journal-title":"Feno?meno Bullying Como Prevenir A Viole?ncia Nas Escolas e Educar para A Paz","year":"2005","author":"fante","key":"8"}],"event":{"name":"2011 11th International Conference on Hybrid Intelligent Systems (HIS 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 11th International Conference on Hybrid Intelligent Systems (HIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112287\/6122068\/06122110.pdf?arnumber=6122110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:02:21Z","timestamp":1490126541000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/his.2011.6122110","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}