References
- R. Hanna, A. Rohm, and V. L. Crittenden, "We're all connected: the power of the social media ecosystem," Business Horizons, vol. 54, no. 3, pp. 265-273, 2011. https://doi.org/10.1016/j.bushor.2011.01.007
- D. S. Wall, Cybercrime: The Transformation of Crime in the Information Age. Cambridge, MA: Polity Press, 2007.
- S. Hinduja and J. W. Patchin, "Bullying, cyberbullying, and suicide," Archives of Suicide Research, vol. 14, no. 3, pp. 206-221, 2010. https://doi.org/10.1080/13811118.2010.494133
- J. W. Patchin and S. Hinduja, Cyberbullying Prevention and Response: Expert Perspectives. New York, NY: Routledge, 2012.
- M. Ribble, Digital Citizenship in Schools, 2nd ed. Eugene, OR: International Society for Technology in Education, 2011.
- D. Murad, N. H. Rodzi, and T. Avineshwaran, "Angry woman driver becomes cyberbullying victim," 2014 [Online]. Available: http://www.thestar.com.my/News/Nation/2014/07/17/Road-rage-leads-to-outrage-Angry-woman-driver-becomes-cyber-bullying-victim/.
- N. A. Rahman, N. S. Razali, S. A. Mohd Ali, N. H. Ahamed Hassain Malim, M. H. Husin, and M. M. Singh, "Digital etiquette: educating primary school children via mobile game application," in Proceedings of the 7th Knowledge Management International (KMICe2014), Langkawi, Malaysia, 2014.
- R. Slonje, P. K. Smith, and A. Frisen, "The nature of cyberbullying, and strategies for prevention," Computers in Human Behavior, vol. 29, no. 1, pp. 26-32, 2013. https://doi.org/10.1016/j.chb.2012.05.024
- S. Hinduja and J. W. Patchin, "Sexting: a brief guide for educators and parents," 2010 [Online]. Available: http://cyberbullying.org/sexting-a-brief-guide-for-educators-and-parents-2.
- M. H. Husin, G. Deegan, and N. Evans, "Social twins: Enterprise 2.0 and Government 2.0," European Journal of ePractice, vol. 2012, no. 17, pp. 51-67, 2012.
- L. Griezel, R. G. Craven, A. S. Yeung, and L. R. Finger, "The development of a multi-dimensional measure of cyber bullying," in Proceedings of Australian Association for Research in Education, Brisbane, 2008.
- C. Su and T. J. Holt, "Cyber bullying in Chinese Web Forums: an examination of nature and extent," International Journal of Cyber Criminology, vol. 4, no. 1-2, pp. 672-684, 2010.
- T. Feinberg and N. Robey, "Cyberbullying: intervention and prevention strategies," National Association of School Psychologists: Communique, vol. 38, no. 4, pp. 22-24, 2009.
- D. Siegle, "Cyberbullying and sexting: technology abuses of the 21st century," Gifted Child Today, vol. 33, no. 2, pp. 14-65, 2010. https://doi.org/10.1177/107621751003300206
- P. Newton, "Canadian teen commits suicide after alleged rape, bullying," 2013 [Online]. Available: http://edition.cnn.com/2013/04/10/justice/canada-teen-suicide.
- N. M. Aune, "Cyberbullying," 2009 [Online]. Available: http://www2.uwstout.edu/content/lib/thesis/2009/2009aunen.pdf.
- L. Brooke, "Punched from the screen: workplace cyber bullying becoming more widespread," 2012 [Online]. Available: http://www.nottingham.ac.uk/news/pressreleases/2012/november/punched-from-the-screen---workplace-cyber-bullying.aspx.
- M. S. Hershcovis, "Incivility, social undermining, bullying…oh my!: a call to reconcile constructs within workplace aggression research," Journal of Organizational Behavior, vol. 32, no. 3, pp. 499-519, 2011. https://doi.org/10.1002/job.689
- K. Krombholz, D. Merkl, and E. Weippl, "Fake identities in social media: a case study on the sustainability of the Facebook business model," Journal of Service Science Research, vol. 4, no. 2, pp. 175-212, 2012. https://doi.org/10.1007/s12927-012-0008-z
- C. Privitera and M. A. Campbell, "Cyberbullying: the new face of workplace bullying?" CyberPsychology and Behavior, vol. 12, no. 4, pp. 395-400, 2009. https://doi.org/10.1089/cpb.2009.0025
- M. Hutchinson, M. Vickers, D. Jackson, and L. Wilkes, "Workplace bullying in nursing: towards a more critical organisational perspective," Nursing Inquiry, vol. 13, no. 2, pp. 118-126, 2006. https://doi.org/10.1111/j.1440-1800.2006.00314.x
- R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and H. H. Reese, "Cyber bullying among college students: evidence from multiple domains of college life," in Misbehavior Online in Higher Education. Bingley: Emerald Publishing Group, 2012, pp. 293-321.
- X. Zhang, C. Li, and W. Zheng, "Intrusion prevention system design," in Proceedings of the 4th International Conference on Computer and Information Technology, Wuhan, China, 2004, pp. 386-390.
- S. Zhang and D. Leidner, "Workplace cyberbullying: the antecedents and consequences," in Proceedings of 20th Americas Conference on Information Systems, Savannah, GA, 2014.
- D. E. Denning, "An intrusion-detection model," IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222-232, 1987. https://doi.org/10.1109/TSE.1987.232894
- J. S. Sherif and T. G. Dearmond, "Intrusion detection: systems and models," in Proceedings of 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Pittsburgh, PA, 2002, pp. 115-133.
- M. Ptaszynski, P. Dybala, T. Matsuba, F. Masui, R. Rzepka, and K. Araki, "Machine learning and affect analysis against cyber-bullying," in Proceedings of the Linguistic and Cognitive Approaches to Dialog Agents Symposium, Leicester, UK, 2010, pp. 7-16.
- P. Norberg, "I don't care that people don't like what I do: business codes viewed as invisible or visible restrictions," Journal of Business Ethics, vol. 86, no. 2, pp. 211-225, 2009. https://doi.org/10.1007/s10551-008-9844-7
- Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, "Aiding the detection of fake accounts in large scale social online services," in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, San Jose, CA, 2012.
- G. Kontaxis, J. Polakis, S. Ioannidis, and E. P. Markatos, "Detecting social network profile cloning," in Proceedings of 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Seattle, WA, 2011, pp. 295-300.
- Y. S. Kim, B. L. Leventhal, Y. J. Koh, A. Hubbard, and W. T. Boyce, "School bullying and youth violence: causes or consequences of psychopathologic behavior?" Archives of General Psychiatry, vol. 63, no. 9, pp. 1035-1041, 2006. https://doi.org/10.1001/archpsyc.63.9.1035
- S. F. Page, "Innovative schools in Michigan," 2015 [Online]. Available: http://files.eric.ed.gov/fulltext/ED558046.pdf.
- S. Einarsen, "The nature and causes of bullying at work," International Journal of Manpower, vol. 20, no. 1, pp. 16-27, 1999. https://doi.org/10.1108/01437729910268588
- R. N. Bolton, A. Parasuraman, A. Hoefnagels, N. Migchels, S. Kabadayi, T. Gruber, Y. K. Loureiro, and D. Solnet, "Understanding Generation Y and their use of social media: a review and research agenda," Journal of Service Management, vol. 24, no. 3, pp. 245-267, 2013. https://doi.org/10.1108/09564231311326987
- European Network and Information Security Agency, "Cyber-bullying and online grooming: helping to protect against the risks," 2011 [Online]. Available: https://www.enisa.europa.eu/publications/Cyber-Bullying%20and%20Online%20Grooming.
- R. Dredge, J. Gleeson, and X. P. Garcia, "Cyberbullying in social networking sites: an adolescent victim's perspective," Computers in Human Behavior, vol. 36, pp. 13-20, 2014. https://doi.org/10.1016/j.chb.2014.03.026
- S. Park, E. Y. Na, and E. M. Kim, "The relationship between online activities, netiquette and cyberbullying," Children and Youth Services Review, vol. 42, pp. 74-81, 2014. https://doi.org/10.1016/j.childyouth.2014.04.002
- A. Anandarajah, "Cyber bully" 2004 [Online]. Available: http://www.cybersecurity.my/en/knowledge_bank/news/2004/main/detail/904/index.html.
- Malaysian Communications and Multimedia Commission, "MCMC's 2011 Annual Report," 2012 [Online]. Available: https://www.mcmc.gov.my/skmmgovmy/media/General/pdf/SKMM_11eng.pdf.
- C. Shih, "The new social norms," in The Facebook Era: Tapping Online Social Networks to Market, Sell, and Innovate, 2nd ed. Boston, MA: Pearson Education, 2011, pp. 31-44.
- BrainPOP "Digital etiquette game," 2012 [Online]. Available: http://www.brainpop.com/technology/computersandinternet/digitaletiquette.
- Carnegie Cyber Academy, "Betty's netiquette quiz," 2012 [Online]. Available: http://www.carnegiecyberacademy.com/funStuff/netiquette/netiquette.html.
- C. Chou and H. Peng, "Promoting awareness of Internet safety in Taiwan in-service teacher education: a ten-year experience," The Internet and Higher Education, vol. 14, no. 1, pp. 44-53, 2011. https://doi.org/10.1016/j.iheduc.2010.03.006
- L. Abeysekera and P. Dawson, "Motivation and cognitive load in the flipped classroom: definition, rationale and a call for research," Higher Education Research & Development, vol. 34, no. 1, pp. 1-14, 2015. https://doi.org/10.1080/07294360.2014.934336