{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:17Z","timestamp":1750306157801,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,25]],"date-time":"2016-09-25T00:00:00Z","timestamp":1474761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,25]]},"DOI":"10.1145\/2984393.2984399","type":"proceedings-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T16:59:00Z","timestamp":1476205140000},"page":"66-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Communication Security &amp; Cyberbullying"],"prefix":"10.1145","author":[{"given":"Ioannis C.","family":"Stylios","sequence":"first","affiliation":[{"name":"Department of Information and Communication, Systems Engineering, University of the Aegean, Samos, Greece"}]},{"given":"Olga","family":"Thanou","sequence":"additional","affiliation":[{"name":"Department of Philosophy and History of Science, University of Athens, Athens, Greece"}]},{"given":"Iosif","family":"Androulidakis","sequence":"additional","affiliation":[{"name":"University of Ioannina, Ioannina, Greece"}]},{"given":"Elena","family":"Zaitseva","sequence":"additional","affiliation":[{"name":"University of Zilina, Zilina, Slovakia"}]}],"member":"320","published-online":{"date-parts":[[2016,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Internet addiction and other internet behaviors of high risk","author":"Sfakianakis E.","year":"2012","unstructured":"Sfakianakis , E. , Siomos , K. , Floros , G. ( 2012 ). Internet addiction and other internet behaviors of high risk . Athens : Livanis Publishing . Sfakianakis, E., Siomos, K., Floros, G. (2012). Internet addiction and other internet behaviors of high risk. Athens: Livanis Publishing."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"e_1_3_2_1_3_1","first-page":"675","volume-title":"Criminal Chronicles","author":"Aggelis I.","year":"2000","unstructured":"Aggelis , I. , ( 2000 ). Internet and Penal Law, Crime in cyberspace . Criminal Chronicles , pp. 675 et seq., Ed. Law and Economy, P.N.Sakkoulas, Athens. Aggelis, I., (2000). Internet and Penal Law, Crime in cyberspace. Criminal Chronicles, pp. 675 et seq., Ed. Law and Economy, P.N.Sakkoulas, Athens."},{"key":"e_1_3_2_1_4_1","volume-title":"Electronic computers and Penal Law. Ant","author":"Mylonopoulos","year":"1991","unstructured":"Mylonopoulos , Chr. , ( 1991 ). Electronic computers and Penal Law. Ant . N. Sakkoulas Publishers . Mylonopoulos, Chr., (1991). Electronic computers and Penal Law. Ant. N. Sakkoulas Publishers."},{"key":"e_1_3_2_1_5_1","volume-title":"Internet and law. Retrieved from: http:\/\/goo.gl\/x0T9ud","author":"Diaplous","year":"2015","unstructured":"Diaplous library , ( 2015 ). Internet and law. Retrieved from: http:\/\/goo.gl\/x0T9ud Diaplous library, (2015). Internet and law. Retrieved from: http:\/\/goo.gl\/x0T9ud"},{"key":"e_1_3_2_1_6_1","volume-title":"Retrieved from: http:\/\/goo.gl\/Oi3XDa.","author":"Kouros K.","year":"2015","unstructured":"Kouros , K. , ( 2015 ). Electronic Crime. Hellenic Police , Retrieved from: http:\/\/goo.gl\/Oi3XDa. Kouros, K., (2015). Electronic Crime. Hellenic Police, Retrieved from: http:\/\/goo.gl\/Oi3XDa."},{"key":"e_1_3_2_1_7_1","first-page":"138","article-title":"Cyber-bullying and cyber-victimization among children and adolescents: Frequency and risk factors","volume":"1","author":"Antoniadou N.","year":"2013","unstructured":"Antoniadou , N. , Kokkinos , C. , ( 2013 ). Cyber-bullying and cyber-victimization among children and adolescents: Frequency and risk factors . Preschool and School Education , Volume 1 , Issue 1, pp. 138 -- 169 Laboratory of Educational Research and Applications, Department of Preschool Education, University of Crete. Antoniadou, N., Kokkinos, C., (2013). Cyber-bullying and cyber-victimization among children and adolescents: Frequency and risk factors. Preschool and School Education, Volume 1, Issue 1, pp. 138--169 Laboratory of Educational Research and Applications, Department of Preschool Education, University of Crete.","journal-title":"Preschool and School Education"},{"key":"e_1_3_2_1_8_1","volume-title":"Users of the world, unite! The challenges and opportunities of Social Media. France: Business Horizons","author":"Kaplan A.M.","year":"2010","unstructured":"Kaplan , A.M. , Haenlein , M. , ( 2010 ). Users of the world, unite! The challenges and opportunities of Social Media. France: Business Horizons . Kaplan, A.M., Haenlein, M., (2010). Users of the world, unite! The challenges and opportunities of Social Media. France: Business Horizons."},{"key":"e_1_3_2_1_9_1","volume-title":"The impact of cyber-bullying on young people's mental health. Retrieved from: http:\/\/goo.gl\/AZeWrM","author":"O'Brien L","year":"2010","unstructured":"O'Brien , L , Moules , T. , ( 2010 ). The impact of cyber-bullying on young people's mental health. Retrieved from: http:\/\/goo.gl\/AZeWrM O'Brien, L, Moules, T., (2010). The impact of cyber-bullying on young people's mental health. Retrieved from: http:\/\/goo.gl\/AZeWrM"},{"key":"e_1_3_2_1_10_1","article-title":"Cyberbullying on social media: A study in prepubertal and pubertal children aged 11--15, that are studying in schools in Piraeus","author":"Grigoraki M.","year":"2014","unstructured":"Grigoraki , M. , Peraki , F. , Politi , A. , ( 2014 ), Cyberbullying on social media: A study in prepubertal and pubertal children aged 11--15, that are studying in schools in Piraeus . Journal Neos Paidagogos. Grigoraki, M., Peraki, F., Politi, A., (2014), Cyberbullying on social media: A study in prepubertal and pubertal children aged 11--15, that are studying in schools in Piraeus. Journal Neos Paidagogos.","journal-title":"Journal Neos Paidagogos."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.13189\/ujer.2013.010101","volume":"1","author":"Notar C. E.","year":"2013","unstructured":"Notar , C. E. , Padgett , S. , Roden , J. , Cyberbullying : A Review of the Literature , 2013 . Universal Journal of Educational Research , 1 , 1 -- 9 . doi: 10.13189\/ujer.2013.010101. 10.13189\/ujer.2013.010101 Notar, C. E., Padgett, S., Roden, J., Cyberbullying: A Review of the Literature, 2013. Universal Journal of Educational Research, 1, 1--9. doi: 10.13189\/ujer.2013.010101.","journal-title":"Universal Journal of Educational Research"},{"key":"e_1_3_2_1_12_1","volume-title":"Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress","author":"Willard E. N.","year":"2005","unstructured":"Willard E. N. , Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress , 2005 . OSDFS National Conference, US Department of Education . Willard E. N., Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress, 2005. OSDFS National Conference, US Department of Education."},{"key":"e_1_3_2_1_13_1","volume-title":"Cyber-Bullying: Developing Policy to Direct Responses that are Equitable and Effective in Addressing This Special Form of Bullying","author":"Brown K.","year":"2006","unstructured":"Brown , K. , Jackson , M. , Cassidy , W. , Cyber-Bullying: Developing Policy to Direct Responses that are Equitable and Effective in Addressing This Special Form of Bullying . 2006 . Canadian Journal of Educational Administration and Policy , n57 p1--36. Brown, K., Jackson, M., Cassidy, W., Cyber-Bullying: Developing Policy to Direct Responses that are Equitable and Effective in Addressing This Special Form of Bullying. 2006. Canadian Journal of Educational Administration and Policy, n57 p1--36."},{"key":"e_1_3_2_1_14_1","volume-title":"Conducting of qualitative research, Scientific editing. Athens, Ellinika Grammata Editions.","author":"Kyriazi N.","year":"2003","unstructured":"Kyriazi , N. , ( 2003 ). Jennifer M ., Conducting of qualitative research, Scientific editing. Athens, Ellinika Grammata Editions. Kyriazi, N., (2003). Jennifer M., Conducting of qualitative research, Scientific editing. Athens, Ellinika Grammata Editions."},{"key":"e_1_3_2_1_15_1","volume-title":"Cyberbullying and Cyberthreats: Responding to the challenge of online social aggression, threats, and distress","author":"Willard N.","year":"2007","unstructured":"Willard , N. ( 2007 ). Cyberbullying and Cyberthreats: Responding to the challenge of online social aggression, threats, and distress . Champaign, IL : Research Press . Willard, N. (2007). Cyberbullying and Cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Champaign, IL: Research Press."},{"key":"e_1_3_2_1_16_1","first-page":"88","volume-title":"Educational Dimensions of the new instruments","author":"Nikolopoulos D.","year":"2009","unstructured":"Nikolopoulos , D. , ( 2009 ). Electronic Harassment: A modern threat . In S., Alivizos (Editor) Educational Dimensions of the new instruments , pp. 88 -- 117 . Athens , Grigoris Editions . Nikolopoulos, D., (2009). Electronic Harassment: A modern threat. In S., Alivizos (Editor) Educational Dimensions of the new instruments, pp. 88--117. Athens, Grigoris Editions."},{"key":"e_1_3_2_1_17_1","volume-title":"What methods work with the different kinds of cyberbullies?","author":"Aftab P.","year":"2006","unstructured":"Aftab , P. , ( 2006 ). What methods work with the different kinds of cyberbullies? Retrieved from http: http:\/\/goo.gl\/44qEuF Aftab, P., (2006). What methods work with the different kinds of cyberbullies? Retrieved from http: http:\/\/goo.gl\/44qEuF"},{"key":"e_1_3_2_1_18_1","volume-title":"Cyberbullying: From Playground to computer","author":"Anderson T.","year":"2007","unstructured":"Anderson , T. , Sturm , B. , ( 2007 ), Cyberbullying: From Playground to computer . Young Adult Library . Services, 5 (9). Anderson, T., Sturm, B., (2007), Cyberbullying: From Playground to computer. Young Adult Library. Services, 5 (9)."},{"key":"e_1_3_2_1_19_1","volume-title":"Cyberbullying among German and Dutch adolescents -- research on siblings' influence and factors revelant for prevention and intervention (Master)","author":"Bruhn D.","year":"2010","unstructured":"Bruhn , D. , ( 2010 ). Cyberbullying among German and Dutch adolescents -- research on siblings' influence and factors revelant for prevention and intervention (Master) . University of Twente . Bruhn, D., (2010). Cyberbullying among German and Dutch adolescents -- research on siblings' influence and factors revelant for prevention and intervention (Master). University of Twente."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/josh.12049"},{"key":"e_1_3_2_1_21_1","volume-title":"Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying","author":"Hinduja S.","year":"2009","unstructured":"Hinduja , S. , Patchin , J. W. , ( 2009 ). Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying . Thousand Oaks, CA : Sage Publications . Hinduja, S., Patchin, J. W., (2009). Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks, CA: Sage Publications."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","DOI":"10.1002\/9780470694176","volume-title":"Cyber Bullying: Bullying in the Digital Age","author":"Kowalski R. M.","year":"2008","unstructured":"Kowalski , R. M. , Limber , S. P. , Agatston , P.W. , ( 2008 ). Cyber Bullying: Bullying in the Digital Age . Malden, MA : Wiley-Blackwell . Kowalski, R. M., Limber, S. P., Agatston, P.W., (2008). Cyber Bullying: Bullying in the Digital Age. Malden, MA: Wiley-Blackwell."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.2011.300308"},{"key":"e_1_3_2_1_24_1","volume-title":"Cyberbullying in the Global Playground: Research from International Perspectives (eds Q. Li, D. Cross and P. K. Smith)","author":"Brighi A.","year":"2012","unstructured":"Brighi , A. , Melotti , G. , Guarini , A. , Genta , M. L. , Ortega , R. , Mora-Merch\u00e1n , J. , Smith , P. K , and Thompson , F. , ( 2012 ). Self-Esteem and Loneliness in Relation to Cyberbullying in Three European Countries , in Cyberbullying in the Global Playground: Research from International Perspectives (eds Q. Li, D. Cross and P. K. Smith) , Wiley-Blackwell , Oxford, UK . Brighi, A., Melotti, G., Guarini, A., Genta, M. L., Ortega, R., Mora-Merch\u00e1n, J., Smith, P. K, and Thompson, F., (2012). Self-Esteem and Loneliness in Relation to Cyberbullying in Three European Countries, in Cyberbullying in the Global Playground: Research from International Perspectives (eds Q. Li, D. Cross and P. K. Smith), Wiley-Blackwell, Oxford, UK."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/13811118.2010.494133"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2012.09.018"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2010.00548.x"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2010.07.012"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1300\/J202v06n03_06"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/01639620701457816"},{"key":"e_1_3_2_1_31_1","volume-title":"Cyberbullying Research: 2013 Update. Retrieved from: http:\/\/goo.gl\/OukpM4","author":"Hinduja S.","year":"2013","unstructured":"Hinduja , S. , Patchin , J. W. , ( 2013 ). Cyberbullying Research: 2013 Update. Retrieved from: http:\/\/goo.gl\/OukpM4 Hinduja, S., Patchin, J. W., (2013). Cyberbullying Research: 2013 Update. Retrieved from: http:\/\/goo.gl\/OukpM4"},{"key":"e_1_3_2_1_32_1","volume-title":"Cyberbullying: Modern technical legal, regulatory and ethical issues. Master thesis","author":"Avgerinaki E.","year":"2014","unstructured":"Avgerinaki , E. Gkritzalis , S. ( 2014 ). Cyberbullying: Modern technical legal, regulatory and ethical issues. Master thesis , Open University of Cyprus . Avgerinaki, E. Gkritzalis, S. (2014). Cyberbullying: Modern technical legal, regulatory and ethical issues. Master thesis, Open University of Cyprus."},{"key":"e_1_3_2_1_33_1","volume-title":"&Lt;Cyberbullying in Switzerland&Gt","author":"Baumberger B.","year":"2010","unstructured":"Baumberger , B. , Bondolfi , T. , Flaction E. , Glassey , O. , ( 2010 ) &Lt;Cyberbullying in Switzerland&Gt ; CyberTraining 2008-2010 Baumberger, B., Bondolfi, T., Flaction E., Glassey, O., (2010) &Lt;Cyberbullying in Switzerland&Gt; CyberTraining 2008-2010"},{"key":"e_1_3_2_1_34_1","volume-title":"workshop 2, (2010","author":"Action","year":"2010","unstructured":"COST Action ISO801 , workshop 2, (2010 ). The legal aspects of cyberbullying, University of Antwerp, Belgium , 26 May 2010 COST Action ISO801, workshop 2, (2010). The legal aspects of cyberbullying, University of Antwerp, Belgium, 26 May 2010"},{"key":"e_1_3_2_1_35_1","volume-title":"Cyberbullying-The situation in Ireland-Country Report","author":"Mc Guckin C.","year":"2010","unstructured":"Mc Guckin , C. , O' Moore , M. , & Crowley , N. , ( 2010 ). Cyberbullying-The situation in Ireland-Country Report . Anti Bullying Research and Resource Centre , Trinity College , Uublin, Ireland, CyberTraining 2008-2010 Mc Guckin, C., O' Moore, M., & Crowley, N., (2010). Cyberbullying-The situation in Ireland-Country Report. Anti Bullying Research and Resource Centre, Trinity College, Uublin, Ireland, CyberTraining 2008-2010"},{"key":"e_1_3_2_1_36_1","volume-title":"&Lt;Exploring Cyberbullying in Spain-Country Report&Gt;","author":"Calmaestra J.","year":"2010","unstructured":"Calmaestra , J. , Ortega , R. , Maldonado A. , and Mora-Merch\u00e1n , J., A. , ( 2010 ). &Lt;Exploring Cyberbullying in Spain-Country Report&Gt; , University of Cordoba, Autonomous University of Madrid , University of Seville, CyberTraining 2008-2010 Calmaestra, J., Ortega, R., Maldonado A., and Mora-Merch\u00e1n, J., A., (2010). &Lt;Exploring Cyberbullying in Spain-Country Report&Gt;, University of Cordoba, Autonomous University of Madrid, University of Seville, CyberTraining 2008-2010"},{"key":"e_1_3_2_1_37_1","volume-title":"Cyberbullying - Approaches in Portugal - Country Report","author":"Amado J.","year":"2010","unstructured":"Amado , J. , Matos , A. , and Pessoa , T. , ( 2010 ). Cyberbullying - Approaches in Portugal - Country Report . University of Coimbra , Portugal , CyberTraining 2008-2010. Amado, J., Matos, A., and Pessoa, T., (2010). Cyberbullying - Approaches in Portugal - Country Report. University of Coimbra, Portugal, CyberTraining 2008-2010."},{"key":"e_1_3_2_1_38_1","volume-title":"Retrieved from: http:\/\/goo.gl\/3mEJeU","author":"Aggelopoulos D.","year":"2012","unstructured":"Aggelopoulos , D. , ( 2012 ). Cyberspace the International \"Evolvement\" in the greek \"Be\". Magazine of the Greek Company for Strategic Studies , Retrieved from: http:\/\/goo.gl\/3mEJeU , April 1, 2015. Aggelopoulos, D., (2012). Cyberspace the International \"Evolvement\" in the greek \"Be\". Magazine of the Greek Company for Strategic Studies, Retrieved from: http:\/\/goo.gl\/3mEJeU, April 1, 2015."},{"key":"e_1_3_2_1_39_1","volume-title":"Zentrum f\u00fcr empirische p\u00e4dagogische Forschung (zepf)","author":"J\u00e4ger T.","year":"2010","unstructured":"J\u00e4ger , T. , Arbinger , R. , & Lissmann , U. , ( 2010 ) Cyberbullying - The Situation in Germany. Country Report , Zentrum f\u00fcr empirische p\u00e4dagogische Forschung (zepf) , University of Koblenz-Landau , Germany , CyberTraining 2008-2010 J\u00e4ger, T., Arbinger, R., & Lissmann, U., (2010) Cyberbullying - The Situation in Germany. Country Report, Zentrum f\u00fcr empirische p\u00e4dagogische Forschung (zepf), University of Koblenz-Landau, Germany, CyberTraining 2008-2010"},{"key":"e_1_3_2_1_40_1","volume-title":"CyberTraining -- A Research-based Training Manual On Cyberbullying. Project Number142237-LLP-1-2008-1-DE-LEONARDO-LMP","author":"ADAM","year":"2008","unstructured":"ADAM , ( 2008 ). CyberTraining -- A Research-based Training Manual On Cyberbullying. Project Number142237-LLP-1-2008-1-DE-LEONARDO-LMP ADAM, (2008). CyberTraining -- A Research-based Training Manual On Cyberbullying. Project Number142237-LLP-1-2008-1-DE-LEONARDO-LMP"},{"key":"e_1_3_2_1_41_1","unstructured":"TACTICS Mapping responsibilities and structures of the implementation of child safety policies at EU national regional and local level: An exploratory study using a modified organigraphs approach Retrieved from: http:\/\/www.childsafetyeurope.org\/tactics\/info\/final-report-mapping.pdf  TACTICS Mapping responsibilities and structures of the implementation of child safety policies at EU national regional and local level: An exploratory study using a modified organigraphs approach Retrieved from: http:\/\/www.childsafetyeurope.org\/tactics\/info\/final-report-mapping.pdf"}],"event":{"name":"SEEDA-CECNSM '16: SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference","acronym":"SEEDA-CECNSM '16","location":"Kastoria Greece"},"container-title":["Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2984393.2984399","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2984393.2984399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:46Z","timestamp":1750217986000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2984393.2984399"}},"subtitle":["A Review of the Legal Issues"],"short-title":[],"issued":{"date-parts":[[2016,9,25]]},"references-count":41,"alternative-id":["10.1145\/2984393.2984399","10.1145\/2984393"],"URL":"https:\/\/doi.org\/10.1145\/2984393.2984399","relation":{},"subject":[],"published":{"date-parts":[[2016,9,25]]},"assertion":[{"value":"2016-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}