{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:11Z","timestamp":1750221311825,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,24]],"date-time":"2017-11-24T00:00:00Z","timestamp":1511481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,24]]},"DOI":"10.1145\/3162957.3163051","type":"proceedings-article","created":{"date-parts":[[2018,1,26]],"date-time":"2018-01-26T13:06:00Z","timestamp":1516971960000},"page":"389-394","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessment of cyberbullying factors among secondary school students in Malaysia"],"prefix":"10.1145","author":[{"given":"Ahmad Iqbal Hakim","family":"Suhaimi","sequence":"first","affiliation":[{"name":"UiTM, Selangor, Malaysia"}]},{"given":"Siti Hajar Athirah Ahmad","family":"Rafiee","sequence":"additional","affiliation":[{"name":"UiTM, Selangor, Malaysia"}]},{"given":"Wan Abdul Rahim Wan Abdul","family":"Isa","sequence":"additional","affiliation":[{"name":"UiTM, Selangor, Malaysia"}]},{"given":"Wan Adilah Wan","family":"Adnan","sequence":"additional","affiliation":[{"name":"UiTM, Selangor, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2017,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","article-title":"IMing, Text Messaging, and Adolescent Social Networks","volume":"11","author":"Alison J.","year":"2006","journal-title":"J. Computer-Mediated Communication."},{"key":"e_1_3_2_1_2_1","first-page":"2","article-title":"Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2-Defenders and Victims","volume":"13","author":"Arief B.","year":"2015","journal-title":"IEEE Security & Privacy."},{"key":"e_1_3_2_1_3_1","first-page":"41","article-title":"Why youth (heart) Social network sites: the role of networked publics in teenage social life","volume":"7641","author":"Boyd D. M.","year":"2007","journal-title":"MacArthur Foundation Series on Digital Media and Learning."},{"volume-title":"Proceedings of the 15th International Conference in Advanced Computing Technologies, (Rajampet, India, Sept. 21--22, 2013). ICACT '13. IEEE, 1--6.","author":"Gunjan V. K.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Hemphill S. A. Tolliy M. Kotecski J. 2015. Predictors of Traditional Cyber-Bullying Victimization - A Longitudinal Study of Australian Secondary School Students. J. Interpersonal Violence. 30 (Sept. 2015) 2567--2590.  Hemphill S. A. Tolliy M. Kotecski J. 2015. Predictors of Traditional Cyber-Bullying Victimization - A Longitudinal Study of Australian Secondary School Students. J. Interpersonal Violence. 30 (Sept. 2015) 2567--2590.","DOI":"10.1177\/0886260514553636"},{"key":"e_1_3_2_1_6_1","first-page":"2","article-title":"Cyberbullying: an exploratory analysis of factors related to offending and victimization","volume":"29","author":"Hinduja S.","year":"2008","journal-title":"J. Deviant Behaviour."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-012-9902-4"},{"volume-title":"Retrived","year":"2016","author":"International Telecommunication Union","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"ISO\/IEC. 2013. ISO International Standard ISO\/IEC 27002:2013 Information technology --- Security techniques --- Code of practice for information security controls. Geneva Switzerland: International Organization for Standardization (ISO).  ISO\/IEC. 2013. ISO International Standard ISO\/IEC 27002:2013 Information technology --- Security techniques --- Code of practice for information security controls. Geneva Switzerland: International Organization for Standardization (ISO)."},{"key":"e_1_3_2_1_10_1","unstructured":"Kowalski R. M. Limber S. P. and Agatston P. W. 2012. Cyber bullying : bullying in the digital era. Wiley-Blackwell.   Kowalski R. M. Limber S. P. and Agatston P. W. 2012. Cyber bullying : bullying in the digital era. Wiley-Blackwell."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Kowalski R. Morgan C. A. and Limber S. P. 2012. Traditional bullying as a potential warning sign of cyberbullying. J. School Psychology International. 33 (Sept. 2012) 505--519.  Kowalski R. Morgan C. A. and Limber S. P. 2012. Traditional bullying as a potential warning sign of cyberbullying. J. School Psychology International. 33 (Sept. 2012) 505--519.","DOI":"10.1177\/0143034312445244"},{"key":"e_1_3_2_1_12_1","first-page":"2","article-title":"Cyberbullying in schools: a research of gender differences","volume":"27","author":"Li Q.","year":"2006","journal-title":"J. School Psychology International."},{"key":"e_1_3_2_1_13_1","first-page":"3","article-title":"A cross-cultural comparison of adolescents' experience related to cyberbullying","volume":"50","author":"Li Q.","year":"2008","journal-title":"J. Educational Research"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/10926771003788979"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1939-0025.2010.01040.x"},{"key":"e_1_3_2_1_16_1","first-page":"6","article-title":"Do cyberbullies suffer too? Cyberbullies' perceptions of the harm they cause to others and to their own mental health","volume":"34","author":"Morgan C. A.","year":"2013","journal-title":"J. School Psychology International"},{"volume-title":"Proceedings of 10th International Conference on Semantic Computing, (California, USE, Feb. 4--6, 2016). ICSC '16. IEEE, 337--341","author":"Nakano T.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","first-page":"6","article-title":"From the School Yard to Cyber Space: A Pilot Study of Bullying Behaviors Among Middle School Students","volume":"37","author":"Ockerman M. S.","year":"2015","journal-title":"J. Research in Middle Level Education."},{"volume-title":"Basic Books","year":"2008","author":"Palfrey J.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","first-page":"3","article-title":"An Exploratory Study of Bullying and Cyberbullying Behaviors Among Economically\/Educationally Disadvantaged Middle School Students","volume":"15","author":"Sbarbaro V.","year":"2011","journal-title":"American J. Health Studies."},{"key":"e_1_3_2_1_21_1","unstructured":"Steeves V. and Wing C. 2005. Young Canadians in a Wired World Media Awareness Network. Industry Canada's SchoolNet program and CANARIE.  Steeves V. and Wing C. 2005. Young Canadians in a Wired World Media Awareness Network. Industry Canada's SchoolNet program and CANARIE."}],"event":{"name":"ICCIP 2017: 2017 the 3rd International Conference on Communication and Information Processing","acronym":"ICCIP 2017","location":"Tokyo Japan"},"container-title":["Proceedings of the 3rd International Conference on Communication and Information Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3162957.3163051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3162957.3163051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:38Z","timestamp":1750212818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3162957.3163051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,24]]},"references-count":21,"alternative-id":["10.1145\/3162957.3163051","10.1145\/3162957"],"URL":"https:\/\/doi.org\/10.1145\/3162957.3163051","relation":{},"subject":[],"published":{"date-parts":[[2017,11,24]]},"assertion":[{"value":"2017-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}