Cyberbullying in the Metaverse
Journal of Global Information Management
https://doi.org/10.4018/JGIM.325793Abstract
The emergence of the metaverse, a virtual reality space, has ushered in a new era of digital experiences and interactions in global information systems. With its unique social norms and behaviors, this new world presents exciting opportunities for users to connect, socialize, and explore. However, as people spend more time in the metaverse, it has become increasingly apparent that the issue of cyberbullying needs to be addressed. Cyberbullying is a serious problem that can harm victims psychologically and physically. It involves using technology to harass, intimidate, or humiliate individuals or groups in global information systems. The risk of cyberbullying is high in the metaverse, where users are often anonymous. Therefore, it is crucial to establish a safer and more respectful culture within the metaverse to detect and prevent such incidents from happening.
FAQs
AI
What forms of cyberbullying are prevalent in the metaverse?
The study identifies forms like direct harassment, spreading rumors, impersonation, exclusion, and hate speech as prevalent in the metaverse.
How does the incidence of cyberbullying in the metaverse compare to traditional environments?
Rates of cybervictimization range from 2.8% to 31.5%, and cyber-perpetration from 3.0% to 30.6%, indicating significant prevalence.
What role do AI and machine learning play in combating metaverse cyberbullying?
AI and machine learning can detect bullying tendencies in real-time by analyzing user behavior and language, aiding in timely interventions.
How effective are educational campaigns in reducing cyberbullying incidence?
Educational campaigns empower users to recognize and act against cyberbullying, promoting a culture of respect and safety in virtual environments.
What legislative frameworks are needed to address cyberbullying in the metaverse?
Proposals suggest establishing a universal legal framework to enable cooperation across jurisdictions and enhance enforcement against cyberbullying.
References (172)
- Abbas, N., Nasser, Y., Shehab, M., & Sharafeddine, S. (2021, December). Attack-specific feature selection for anomaly detection in software-defined networks. In 3 rd IEEE Middle East and North Africa COMMunications Conference (MENACOMM) (pp. 142-146). IEEE. doi:10.1109/MENACOMM50742.2021.9678279
- Akram, W., & Kumar, R. (2017). A study on positive and negative effects of social media on society. International Journal on Computer Science and Engineering, 5(10), 351-354.
- Alam, S., & Cohen, M. (2018). Narrowcasting in sip Articulated privacy control. In Sip handbook (pp. 341-364). CRC Press.
- Almomani, A., Alauthman, M., Shatnawi, M. T., Alweshah, M., Alrosan, A., Alomoush, W., Gupta, B. B., Gupta, B. B., & Gupta, B. B. (2022). Phishing website detection with semantic features based on machine learning classifiers: A comparative study. International Journal on Semantic Web and Information Systems, 18(1), 1-24. doi:10.4018/IJSWIS.297032
- Amarah, A., Daimin, G., Norhayatie, I., Kadir, A. Z. A., & Wnidayu, T. (2020). Cyberbullying campaign review for new implementation and prevention. International Journal of Synergy in Engineering and Technology, 1(1).
- Ang, R. P. (2015). Adolescent cyberbullying: A review of characteristics, prevention and intervention strategies. Aggression and Violent Behavior, 25, 35-42. doi:10.1016/j.avb.2015.07.011
- Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2023). Scenario-based incident response training: Lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Information and Computer Security. doi:10.1108/ICS-05-2022-0085
- Anshari, M., Syafrudin, M., Fitriyani, N. L., & Razzaq, A. (2022). Ethical responsibility and sustain ability (ers) development in a metaverse business model. Sustainability (Basel), 14(23), 15805. doi:10.3390/su142315805
- Arsht, A., & Etcovitch, D. (2018). The human cost of online content moderation. Harvard Journal of Law & Technology.
- Ashktorab, Z., & Vitak, J. (2016). Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In Proceedings of the 2016 Chi Conference on Human Factors in Computing Systems (pp. 3895-3905). ACM. doi:10.1145/2858036.2858548
- Baccarella, C. V., Wagner, T. F., Kietzmann, J. H., & McCarthy, I. P. (2018). Social media? It's serious! Understanding the dark side of social media. European Management Journal, 36(4), 431-438. doi:10.1016/j.emj.2018.07.002
- Balci, K., & Salah, A. A. (2015). Automatic analysis and identification of verbal aggression and abusive behaviors for online social games. Computers in Human Behavior, 53, 517-526. doi:10.1016/j.chb.2014.10.025
- Barab, S. A., Makinster, J. G., Moore, J. A., & Cunningham, D. J. (2001). Designing and building an online community: The struggle to support sociability in the inquiry learning forum. Educational Technology Research and Development, 49(4), 71-96. doi:10.1007/BF02504948
- Barak, A., & Grohol, J. M. (2011). Current and future trends in internet-supported mental health interventions. Journal of Technology in Human Services, 29(3), 155-196. doi:10.1080/15228835.2011.616939
- Barlin'ska, J., Szuster, A., & Winiewski, M. (2018). Cyberbullying among adolescent bystanders: Role of affective versus cognitive empathy in increasing prosocial cyber bystander behavior. Frontiers in Psychology, 9, 799. doi:10.3389/fpsyg.2018.00799 PMID:29899715
- Barth, S., & De Jong, M. D. (2017). The privacy paradox: Investigating discrepancies between ex-pressed privacy concerns and actual on-line behavior. A systematic literature review. Telematics and Informatics, 34(7), 1038-1058. doi:10.1016/j.tele.2017.04.013
- Baruah, T. D. (2012). Effectiveness of social media as a tool of communication and its potential for technology enabled connections: A micro-level study. International Journal of Scientific and Research Publications, 2(5), 1-10.
- Bastiaensens, S., Van Cleemput, K., Vandebosch, H., Poels, K., DeSmet, A., & De Bourdeaudhuij, I. (2019). "Were you cyberbullied? Let me help you." Studying adolescents' online peer support of cyberbullying victims using thematic analysis of online support group I. Narratives in research and interventions on cyberbullying among young people, 95-112.
- Bauman, S. (2007). Cyberbullying: A virtual menace. National Coalition Against Bullying National Conferences (Vol. 2).
- Beale, A. V., & Hall, K. R. (2007). Cyberbullying: What school administrators (and parents) can do. The Clearing House: A Journal of Educational Strategies, Issues and Ideas, 81(1), 8-12. doi:10.3200/TCHS.81.1.8-12
- Bhandari, A., Ozanne, M., Bazarova, N. N., & DiFranzo, D. (2021). Do you care who flagged this post? Effects of moderator visibility on bystander behavior. Journal of Computer-Mediated Communication, 26(5), 284-300. doi:10.1093/jcmc/zmab007
- Bhardwaj, A., & Kaushik, K. (2022). Predictive analytics-based cybersecurity framework for cloud infrastructure. International Journal of Cloud Applications and Computing, 12(1), 1-20. doi:10.4018/IJCAC.297106
- Blumenfeld, W. J., & Cooper, R. (2010). LGBT and allied youth responses to cyberbullying: Policy implications. The International Journal of Critical Pedagogy, 3(1), 112.
- Bote, A. G. (2021). Effects of virtual reality role-play on social communication skills of children with AD/HD. In Proceedings of International Conference on Special Education (Vol. 4). Seomen Sen.
- Brdesee, H. S., Alsaggaf, W., Aljohani, N., & Hassan, S. U. (2022). Predictive model using a machine learning approach for enhancing the retention rate of students at-risk. International Journal on Semantic Web and Information Systems, 18(1), 1-21. doi:10.4018/IJSWIS.299859
- Brown, K., Jackson, M., & Cassidy, W. (2006). Cyberbullying: Developing policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy, 57.
- Buana, I. M. W. (2023). Metaverse: Threat or opportunity for our social world? In understanding metaverse on sociological context. Journal of Metaverse, 3(1), 28-33. doi:10.57019/jmv.1144470
- Bullingham, L., & Vasconcelos, A. C. (2013). 'The presentation of self in the online world': Goffman and the study of online identities. Journal of Information Science, 39(1), 101-112. doi:10.1177/0165551512470051
- Burrows, C. N., & Blanton, H. (2016). Real-world persuasion from virtual world campaigns: How transportation into virtual worlds moderates in-game influence. Communication Research, 43(4), 542-570. doi:10.1177/0093650215619215
- Burton, P., & Mutongwizo, T. (2009). Inescapable violence: Cyber bullying and electronic violence against young people in South Africa. Centre for Justice and Crime Prevention, 8, 1-12.
- Calvin, A. J., Bellmore, A., Xu, J.-M., & Zhu, X. (2015). Bully: Uses of hashtags in posts about bullying on twitter. Journal of School Violence, 14(1), 133-153. doi:10.1080/15388220.2014.966828
- Calvo-Morata, A., Alonso-Fernández, C., Freire, M., Martínez-Ortiz, I., & Fernández-Manjón, B. (2020). Serious games to prevent and detect bullying and cyberbullying: A systematic serious games and literature review. Computers & Education, 157, 103958. doi:10.1016/j.compedu.2020.103958
- Carlyle, K. E., & Steinman, K. J. (2007). Demographic differences in the prevalence, co-occurrence, and correlates of adolescent bullying at school. The Journal of School Health, 77(9), 623-629. doi:10.1111/j.1746- 1561.2007.00242.x PMID:17970866
- Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. School Psychology International, 34(6), 575-612. doi:10.1177/0143034313479697
- Chadwick, S., & Chadwick, S. (2014). Educational approaches. Impacts of Cyberbullying, Building Social and Emotional Resilience in Schools, 57-80.
- Chelmis, C., & Yao, M. (2019). Minority report: Cyberbullying prediction on Instagram. In Proceed ings of the 10 th ACM Conference on Web Science (pp. 37-45).
- Chen, Q., Chan, K. L., Guo, S., Chen, M., Lo, C. K., & Ip, P. (2022). Effectiveness of digital health interventions in reducing bullying and cyberbullying: A meta-analysis. Trauma, Violence & Abuse, 15248380221082090. PMID:35446724
- Chisholm, J. F. (2014). Review of the status of cyberbullying and cyberbullying prevention. Journal of Information Systems Education, 25(1), 77.
- Ciucci, E., & Baroncelli, A. (2014). Emotion-related personality traits and peer social standing: Unique and interactive effects in cyberbullying behaviors. Cyberpsychology, Behavior, and Social Networking, 17(9), 584-590. doi:10.1089/cyber.2014.0020 PMID:25055248
- Corcoran, L., & Mc Guckin, C. (2014). Addressing bullying problems in Irish schools and in cyberspace: A challenge for school management. Educational Research, 56(1), 48-64. doi:10.1080/00131881.2013.874150
- Dan, S. (2022). NIR spectroscopy oranges origin identification on framework based on machine learning. International Journal on Semantic Web and Information Systems, 18(1), 1-16. doi:10.4018/IJSWIS.297039
- DeSanctis, G., Fayard, A.-L., Roach, M., & Jiang, L. (2003). Learning in online forums. European Management Journal, 21(5), 565-577. doi:10.1016/S0263-2373(03)00106-3
- DeSmet, A., Van Cleemput, K., Bastiaensens, S., Poels, K., Vandebosch, H., Malliet, S., Verloigne, M., Vanwolleghem, G., Mertens, L., Cardon, G., & De Bourdeaudhuij, I. (2016). Bridging behavior science and gaming theory: Using the intervention mapping protocol to design a serious game against cyberbullying. Computers in Human Behavior, 56, 337-351. doi:10.1016/j.chb.2015.11.039
- Deveci, M., Pamucar, D., Gokasar, I., Köppen, M., & Gupta, B. B. (2022). Personal mobility in metaverse with autonomous vehicles using Q-rung orthopair fuzzy sets based OPA-RAFSI model. IEEE Transactions on Intelligent Transportation Systems, 1-10. doi:10.1109/TITS.2022.3186294
- Di Pietro, R., & Cresci, S. (2021). Metaverse: security and privacy issues. In 2021 3 rd IEEE Interna-tional Conference on Trust, Privacy and Security in Intelligent Systems and Applications (tps-isa) (pp. 281-288). IEEE. doi:10.1109/TPSISA52974.2021.00032
- Diamanduros, T., Downs, E., & Jenkins, S. J. (2008). The role of school psychologists in the assessment, prevention, and intervention of cyberbullying. Psychology in the Schools, 45(8), 693-704. doi:10.1002/pits.20335
- DiFranzo, D., Choi, Y. H., Purington, A., Taft, J. G., Whitlock, J., & Bazarova, N. N. (2019). Social media testdrive: Real-world social media education for the next generation. In Proceedings of the 2019 Chi Conference on Human Factors in Computing Systems (pp. 1-11). ACM. doi:10.1145/3290605.3300533
- Dinakar, K., Jones, B., Havasi, C., Lieberman, H., & Picard, R. (2012). Common sense reasoning for detection, prevention, and mitigation of cyberbullying. [TiiS]. ACM Transactions on Interactive Intelligent Systems, 2(3), 1-30. doi:10.1145/2362394.2362400
- Dionisio, J. D. N., Burns, W. G., & Gilbert, R. (2013). 3D virtual worlds and the metaverse: Current status and future possibilities. ACM Computing Surveys, 45(3), 1-38. doi:10.1145/2480741.2480751
- Doumas, D. M., & Midgett, A. (2021). The association between witnessing cyberbullying and de-pressive symptoms and social anxiety among elementary school students. Psychology in the Schools, 58(3), 622-637. doi:10.1002/pits.22467
- Dwivedi, Y. K., Hughes, L., Baabdullah, A. M., Ribeiro-Navarrete, S., Giannakis, M., Al-Debei, M. M., Dennehy, D., Metri, B., Buhalis, D., Cheung, C. M. K., Conboy, K., Doyle, R., Dubey, R., Dutot, V., Felix, R., Goyal, D. P., Gustafsson, A., Hinsch, C., Jebabli, I., & Wamba, S. F. et al. (2022). Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 66, 102542. doi:10.1016/j.ijinfomgt.2022.102542
- Falchuk, B., Loeb, S., & Neff, R. (2018). The social metaverse: Battle for privacy. IEEE Technology and Society Magazine, 37(2), 52-61. doi:10.1109/MTS.2018.2826060
- Fatemidokht, H., Rafsanjani, M. K., Gupta, B. B., & Hsu, C. H. (2021). Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Transactions on Intelligent Transportation Systems, 22(7), 4757-4769. doi:10.1109/ TITS.2020.3041746
- Fediy, O., Protsai, L., & Gibalova, N. (2021). Pedagogical conditions for digital citizenship formation among primary school pupils. Revista Romaneasca pentru Educatie Multidimensionala, 13(3), 95-115.
- Feinberg, T., & Robey, N. (2009). Cyberbullying. Education Digest, 74(7), 26.
- Fischer, E., & Reuber, A. R. (2011). Social interaction via new social media: (How) can interactions on twitter affect effectual thinking and behavior? Journal of Business Venturing, 26(1), 1-18. doi:10.1016/j. jbusvent.2010.09.002
- Fitzpatrick, C., & Birnholtz, J. (2018). "I shut the door": Interactions, tensions, and negotiations from a location- based social app. New Media & Society, 20(7), 2469-2488. doi:10.1177/1461444817725064
- Foo, C. Y., & Koivisto, E. M. (2004). Defining grief play in mmorpgs: Player and developer perceptions. In Proceedings of the 2004 ACM Sigchi International Conference on Advances in Computer Entertainment Technology (pp. 245-250). ACM. doi:10.1145/1067343.1067375
- Frenkel, M. (2009). Global information systems in science: Application to the field of thermodynamics. Journal of Chemical & Engineering Data, 54(9), 2411-2428. doi:10.1021/je800877f
- Gadekallu, T. R., Huynh-The, T., Wang, W., Yenduri, G., Ranaweera, P., Pham, Q.-V., & Liyanage, M. (2022). Blockchain for the metaverse: A review. arXiv preprint arXiv:2203.09738.
- Gaurav, A. (2022). A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterprise Information Systems, 1-25.
- Getta, J. R. (2011). Static optimization of data integration plans in global information systems. University of Wollongon. Ghosh, A., Chakraborty, D., & Law, A. (2018). Artificial intelligence in internet of things. CAAI Transactions on Intelligence Technology, 3(4), 208-218. doi:10.1049/trit.2018.1008
- Godwin-Jones, R. (2014). Games in language learning: Opportunities and challenges. Language Learning and Opportunity.
- Gongane, V. U., Munot, M. V., & Anuse, A. D. (2022). Detection and moderation of detrimental content on social media platforms: Current status and future directions. Social Network Analysis and Mining, 12(1), 129. doi:10.1007/s13278-022-00951-3 PMID:36090695
- Gorini, A., Gaggioli, A., & Riva, G. (2008). A second life for ehealth: Prospects for the use of 3D virtual worlds in clinical psychology. Journal of Medical Internet Research, 10(3), e1029. doi:10.2196/jmir.1029 PMID:18678557
- Gupta, B. B., Gaurav, A., Chui, K. T., Wang, L., Arya, V., Shukla, A., & Perakovic´, D. (2023, January). DDoS attack detection through digital twin technique in metaverse. In 2023 IEEE International Conference on Consumer Electronics (ICCE) (pp. 1-5). IEEE. doi:10.1109/ICCE56470.2023.10043433
- Han, J., Liu, G., & Gao, Y. (2023). Learners in the metaverse: A systematic review on the use of Roblox in learning. Education Sciences, 13(3), 296. doi:10.3390/educsci13030296
- Helfrich, E. L., Doty, J. L., Su, Y.-W., Yourell, J. L., & Gabrielli, J. (2020). Parental views on pre-venting and minimizing negative effects of cyberbullying. Children and Youth Services Review, 118, 105377. doi:10.1016/j. childyouth.2020.105377
- Hinduja, S., & Patchin, J. W. (2013). Social influences on cyberbullying behaviors among middle and high school students. Journal of Youth and Adolescence, 42(5), 711-722. doi:10.1007/s10964-012-9902-4 PMID:23296318
- Hon, L., & Varathan, K. (2015). Cyberbullying detection system on twitter. IJABM, 1(1), 1-11.
- Howell, C. J., & Burruss, G. W. (2020). Datasets for analysis of cybercrime. The Palgrave Handbook of International Cybercrime and Cyber Deviance, 207-219.
- Huda, M., Jasmi, K. A., Hehsan, A., Mustari, M. I., Shahrill, M., Basiron, B., & Gassama, S. K. (2017). Empowering children with adaptive technology skills: Careful engagement in the digital information age. International Electronic Journal of Elementary Education, 9(3), 693-708.
- Ireland, L., Hawdon, J., Huang, B., & Peguero, A. (2020). Preconditions for guardianship interventions in cyberbullying: Incident interpretation, collective and automated efficacy, and relative popularity of bullies. Computers in Human Behavior, 113, 106506. doi:10.1016/j.chb.2020.106506
- Jacob, H. H. (2014). Mastering digital literacy. Solution Tree Press.
- Jagatheesaperumal, S. K. Ah-mad, K., Al-Fuqaha, A., & Qadir, J. (2022). Advancing education through extended reality and internet of everything enabled metaverses: Applications, challenges, and open issues. arXiv preprint arXiv:2207.01512.
- Jhaver, S., Chen, Q. Z., Knauss, D., & Zhang, A. X. (2022). Designing word filter tools for creator-led comment moderation. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (pp. 1-21). ACM. doi:10.1145/3491102.3517505
- Joshua, J. (2017). Information bodies: Computational anxiety in Neal Stephenson's snow crash. Interdisciplinary Literary Studies, 19(1), 17-47. doi:10.5325/intelitestud.19.1.0017
- Kaluarachchi, C., Warren, M., & Jiang, F. (2020). Responsible use of technology to combat cyberbullying among young people.
- Kameny, I. (1989, January). Global information system issues. In Proceedings. Fifth International Conference on Data Engineering (pp. 672-673). IEEE Computer Society. doi:10.1109/ICDE.1989.47275
- Kasiyanto, S., & Kilinç, M. R. (2022). Legal conundrums of the metaverse. Journal of Central Banking Law and Institutions.
- Katz, I., Keeley, M., Spears, B., Taddeo, C., Swist, T., & Bates, S. (2014). Research on youth exposure to, and management of, cyberbullying incidents in Australia. Synthesis Report.
- Kiene, C., Jiang, J. A., & Hill, B. M. (2019). Technological frames and user innovation: Exploring technological change in community moderation teams. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW), (pp. 1-23). ACM. doi:10.1145/3359146
- Kim, S., Razi, A., Stringhini, G., Wisniewski, P. J., & De Choudhury, M. (2021). You don't know how I feel: Insider-outsider perspective gaps in cyberbullying risk detection. In Proceedings of the International AAAI Conference on Web and Social Media (Vol. 15, pp. 290-302). IEEE. doi:10.1609/icwsm.v15i1.18061
- Kintonova, A., Vasyaev, A., & Shestak, V. (2021). Cyberbullying and cyber-mobbing in developing countries. Information and Computer Security, 29(3), 435-456. doi:10.1108/ICS-02-2020-0031
- Klauck, M., Sugano, Y., & Bulling, A. (2017). Noticeable or distractive? A design space for gaze-contingent user interface notifications. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 1779-1786). IEEE. doi:10.1145/3027063.3053085
- Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073-1137. doi:10.1037/a0035618 PMID:24512111
- Kumbhojkar, N. R., & Menon, A. B. (2022). Integrated predictive experience management framework (IPEMF) for improving customer experience: In the era of digital transformation. [IJCAC]. International Journal of Cloud Applications and Computing, 12(1), 1-13. doi:10.4018/IJCAC.2022010107
- Lai, C., Mohamad, M., Lee, M., Salleh, K. M., Sulaiman, N., Rosli, D., & Chang, W. (2017). Prevalence of cyberbullying among students in Malaysian higher learning institutions. Advanced Science Letters, 23(2), 781-784. doi:10.1166/asl.2017.7492
- Li, S., Qin, D., Wu, X., Li, J., Li, B., & Han, W. (2022). False alert detection based on deep learning and machine learning. [IJSWIS]. International Journal on Semantic Web and Information Systems, 18(1), 1-21. doi:10.4018/ IJSWIS.313190
- Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962-986. doi:10.1287/isre.2016.0671
- Luxton, D. D., June, J. D., & Fairall, J. M. (2012). Social media and suicide: A public health perspec tive. American Journal of Public Health, 102(S2), S195-S200. doi:10.2105/AJPH.2011.300608 PMID:22401525
- Marczak, M., & Coyne, I. (2010). Cyberbullying at school: Good practice and legal aspects in the United Kingdom. Journal of Psychologists and Counsellors in Schools, 20(2), 182-193.
- McStay, A. (2022). Replika in the metaverse: The moral problem with empathy in 'it from bit.'. AI and Ethics, 1-13. doi:10.1007/s43681-022-00252-7 PMID:36573214
- Mergel, I., & Bretschneider, S. I. (2013). A three-stage adoption process for social media use in government. Public Administration Review, 73(3), 390-400. doi:10.1111/puar.12021
- Milosevic, T. (2016). Social media companies' cyberbullying policies. International Journal of Communication, 10, 22. Milosevic, T. (2018). Protecting children online? Cyberbullying policies of social media companies. The MIT Press. doi:10.7551/mitpress/11008.001.0001
- Milosevic, T., O'Neill, B., & Staksrud, E. (2019). Narratives of industry responses to cyberbullying: Perspectives on self-regulation from and about the industry. In Narratives in research and interventions on cyberbullying among young people (pp. 229-243).
- Mkono, M. (2018). 'Troll alert!': Provocation and harassment in tourism and hospitality social media. Current Issues in Tourism, 21(7), 791-804. doi:10.1080/13683500.2015.1106447
- Mukherjee, A., & Nath, P. (2007). Role of electronic trust in online retailing: A re-examination of the commitment- trust theory. European Journal of Marketing, 41(9/10), 1173-1202. doi:10.1108/03090560710773390
- Murnion, S., Buchanan, W. J., Smales, A., & Russell, G. (2018). Machine learning and semantic analysis of in-game chat for cyberbullying. Computers & Security, 76, 197-213. doi:10.1016/j.cose.2018.02.016
- Nesse, R. (1998). Emotional disorders in evolutionary perspective. The British Journal of Medical Psychology, 71(4), 397-415. doi:10.1111/j.2044-8341.1998.tb01000.x PMID:9875953
- Ngo, A. T., Tran, A. Q., Tran, B. X., Nguyen, L. H., Hoang, M. T., Nguyen, T. H. T., Doan, L. P., Vu, G. T., Nguyen, T. H., Do, H. T., Latkin, C. A., Ho, R. C. M., & Ho, C. S. H. (2021). Cyberbullying among school adolescents in an urban setting of a developing country: Experience, coping strategies, and mediating effects of different support on psychological well-being. Frontiers in Psychology, 12, 661919. doi:10.3389/fpsyg.2021.661919 PMID:33897571
- Nikiforos, S., Tzanavaris, S., & Kermanidis, K.-L. (2020). Virtual learning communities (vlcs) re-thinking: Influence on behavior modification-bullying detection through machine learning and nat ural language processing. Journal of Computers in Education, 7(4), 531-551. doi:10.1007/s40692-020-00166-5
- Nocentini, A., Zambuto, V., & Menesini, E. (2015). Anti-bullying programs and information and communication technologies (icts): A systematic review. Aggression and Violent Behavior, 23, 52-60. doi:10.1016/j. avb.2015.05.012
- O'Moore, M., Cross, D., & Maritta Valimaki, A. (2013). Guidelines to prevent cyberbullying: A cross-national review. In Cyberbullying through the new media (pp. 154-180). Psychology Press.
- Oleksy, T., Wnuk, A., & Piskorska, M. (2023). Migration to the metaverse and its predictors: Attachment to virtual places and metaverse-related threat. Computers in Human Behavior, 141, 107642. doi:10.1016/j.chb.2022.107642
- Olweus, D., & Limber, S. P. (2018). Some problems with cyberbullying research. Current Opinion in Psychology, 19, 139-143. doi:10.1016/j.copsyc.2017.04.012 PMID:29279213
- Ortiz, P., & Khin Khin, E. (2018). Traditional and new media's influence on suicidal behavior and contagion. Behavioral Sciences & the Law, 36(2), 245-256. doi:10.1002/bsl.2338 PMID:29659071
- Ouvrein, G., Pabian, S., Giles, D., Hudders, L., & De Backer, C. (2021). The web of influencers. A marketing- audience classification of (potential) social media influencers. Journal of Marketing Management, 37(13-14), 1313-1342. doi:10.1080/0267257X.2021.1912142
- Park, S.-M., & Kim, Y.-G. (2022). A metaverse: Taxonomy, components, applications, and open challenges. IEEE Access : Practical Innovations, Open Solutions, 10, 4209-4251. doi:10.1109/ACCESS.2021.3140175
- Parris, L., Varjas, K., Meyers, J., & Cutts, H. (2012). High school students' perceptions of coping with cyberbullying. Youth & Society, 44(2), 284-306. doi:10.1177/0044118X11398881
- Pate, R. (2022). Legal issues inside the unnatural world of metaverse. Business Law Review.
- Petsas, T., Tsirantonakis, G., Athanasopoulos, E., & Ioannidis, S. (2015). Two-factor authentication: Is the world ready? quantifying 2fa adoption. In Proceedings of the 8th European Workshop on System Security (pp. 1-7). IEEE. doi:10.1145/2751323.2751327
- Piscatelli, J., & Lee, C. (2011). State policies on school climate and bully prevention efforts: Challenges and opportunities for deepening state policy support for safe and civil schools. National School Climate Center.
- Pless, N., & Maak, T. (2004). Building an inclusive diversity culture: Principles, processes and practice. Journal of Business Ethics, 54(2), 129-147. doi:10.1007/s10551-004-9465-8
- Postigo, H. (2003). Emerging sources of labor on the internet: The case of America online volunteers. International Review of Social History, 48(S11), 205-223. doi:10.1017/S0020859003001329
- Price, M. E., Verhulst, S. G., & Verhulst, S. (2005). Self-regulation and the internet. Kluwer Law International BV.
- Pyzalski, J., Plichta, P., Szuster, A., & Barlin'ska, J. (2022). Cyberbullying characteristics and prevention-What can we learn from narratives provided by adolescents and their teachers? International Journal of Environmental Research and Public Health, 19(18), 11589. doi:10.3390/ijerph191811589 PMID:36141856
- Qamar, S., Anwar, Z., & Afzal, M. (2023). A systematic threat analysis and defense strategies for the metaverse and extended reality systems. Computers & Security, 128, 103127. doi:10.1016/j.cose.2023.103127
- Qasem, Z., Hmoud, H. Y., Hajawi, D., & Al Zoubi, J. Z. (2022). The effect of technostress on cyberbullying in metaverse social platforms. In Co-creating for context in the transfer and diffusion of it: Ifip wg 8.6 international working conference on transfer and diffusion of it (pp. 291-296). doi:10.1007/978-3-031-17968-6_22
- Qin, H. X., Wang, Y., & Hui, P. (2022). Identity, crimes, and law enforcement in the metaverse. ArXiv, abs/2210.06134.
- Quinn, Z. (2017). Crash override: How gamergate (nearly) destroyed my life, and how we can win the fight against online hate. Hachette UK.
- Rachoene, M., & Oyedemi, T. (2015). From self-expression to social aggression: Cyberbullying cul ture among South African youth on Facebook. Communication, 41(3), 302-219.
- Raisi, E., & Huang, B. (2017). Cyberbullying detection with weakly supervised machine learning. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 409-416). IEEE. doi:10.1145/3110025.3110049
- Rajan, A., Singh, A., R, P., R, R.S., & Reddy KQ, S. (2022). Cyberbullying detection. International Journal of Innovative Research in Advanced Engineering.
- Ransbotham, S., Fichman, R. G., Gopal, R., & Gupta, A. (2016). Special section introduction-Ubiquitous it and digital vulnerabilities. Information Systems Research, 27(4), 834-847. doi:10.1287/isre.2016.0683
- Rega, V., Gioia, F., & Boursier, V. (2022). Parental mediation and cyberbullying: A narrative literature review. Marriage & Family Review, 58(6), 495-530. doi:10.1080/01494929.2022.2069199
- Reid, E., Mandryk, R. L., Beres, N. A., Klarkowski, M., & Frommel, J. (2022a). Feeling good and in control: In-game tools to support targets of toxicity. Proceedings of the ACM on Human-Computer Interaction, 6(CHI PLAY), (pp. 1-27). ACM. doi:10.1145/3549498
- Reid, E., Mandryk, R. L., Beres, N. A., Klarkowski, M., & Frommel, J. (2022b). "Bad vibrations": Sensing toxicity from in-game audio features. IEEE Transactions on Games, 14(4), 558-568. doi:10.1109/TG.2022.3176849
- Rice, E., Petering, R., Rhoades, H., Winetrobe, H., Goldbach, J., Plant, A., & Kordic, T. (2015). Cyberbullying perpetration and victimization among middle-school students. American Journal of Public Health, 105(3), e66-e72. doi:10.2105/AJPH.2014.302393 PMID:25602905
- Ringland, K. E., Wolf, C. T., Dombrowski, L., & Hayes, G. R. (2015). Making "safe" community-centered practices in a virtual world dedicated to children with autism. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 1788-1800). ACM. doi:10.1145/2675133.2675216
- Robinson, G., & Maines, B. (2008). Bullying: A complete guide to the support group method. Sage (Atlanta, Ga.). doi:10.4135/9781446214749
- Rosenblum, D. (2007). What anyone can know: The privacy risks of social networking sites. IEEE Security and Privacy, 5(3), 40-49. doi:10.1109/MSP.2007.75
- Sandars, J., Correia, R., Dankbaar, M., de Jong, P., Goh, P. S., & Hege, I. (2020). Twelve tips for rapidly migrating to online learning during the Covid-19 pandemic.
- Schwarz, A. F., Huertas-Delgado, F. J., Cardon, G., & DeSmet, A. (2020). Design features associated with user engagement in digital games for healthy lifestyle promotion in youth: A systematic review of qualitative and quantitative studies. Games for Health Journal, 9(3), 150-163. doi:10.1089/g4h.2019.0058 PMID:31923363
- Sebastian, G. (2023). A descriptive study on metaverse: Cybersecurity risks, controls, and regulatory framework. International Journal of Security and Privacy in Pervasive Computing, 15, 1-14. doi:10.4018/IJSPPC.320225
- Seraj, M. (2012). We create, we connect, we respect, therefore we are: Intellectual, social, and cultural value in online communities. Journal of Interactive Marketing, 26(4), 209-222. doi:10.1016/j.intmar.2012.03.002
- Sewell, A. (2020). An adaption of the good behaviour game to promote social skill development at the whole- class level. Educational Psychology in Practice, 36(1), 93-109. doi:10.1080/02667363.2019.1695583
- Shah, J., Das, P., Muthiah, N., & Milanaik, R. (2019). New age technology and social media: Adolescent psychosocial implications and the need for protective measures. Current Opinion in Pediatrics, 31(1), 148-156. doi:10.1097/MOP.0000000000000714 PMID:30507648
- Shankar, V., Grewal, D., Sunder, S., Fossen, B., Peters, K., & Agarwal, A. (2022). Digital marketing communication in global market-places: A review of extant research, future directions, and potential approaches. International Journal of Research in Marketing, 39(2), 541-565. doi:10.1016/j.ijresmar.2021.09.005
- Singh, A., & Gupta, B. B. (2022). Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: Issues, challenges, and future research directions. [IJSWIS]. International Journal on Semantic Web and Information Systems, 18(1), 1-43. doi:10.4018/IJSWIS.297143
- Slonje, R., Smith, P. K., & Frisén, A. (2013). The nature of cyberbullying, and strategies for prevention. Computers in Human Behavior, 29(1), 26-32. doi:10.1016/j.chb.2012.05.024
- Solove, D. J., & Citron, D. K. (2017). Risk and anxiety: A theory of data breach harms. Texas Law Review, 96, 737.
- Strohmeier, D., & Gradinger, P. (2022). Cyberbullying and cyber victimization as online risks for children and adolescents. European Psychologist, 27(2), 141-150. doi:10.1027/1016-9040/a000479
- Su, Z., Zhang, N., Liu, D., Luan, T. H., Shen, X., et al. (2022). A survey on metaverse: Fundamentals, security, and privacy.
- Subrahmanyam, K., & Greenfield, P. (2008). Online communication and adolescent relationships. The Future of Children, 18(1), 119-146. doi:10.1353/foc.0.0006 PMID:21338008
- Tambini, D., Leonardi, D., & Marsden, C. T. (2008). Codifying cyberspace: Communications self-regulation in the age of internet convergence. Routledge.
- Tamers, S. L., Streit, J., Pana-Cryan, R., Ray, T., Syron, L., Flynn, M. A., Castillo, D., Roth, G., Geraci, C., Guerin, R., Schulte, P., Henn, S., Chang, C.-C., Felknor, S., & Howard, J. (2020). Envision ing the future of work to safeguard the safety, health, and well-being of the workforce: A perspective from the CDC's National Institute for Occupational Safety and Health. American Journal of Industrial Medicine, 63(12), 1065-1084. doi:10.1002/ajim.23183 PMID:32926431
- Tandoc, E. C. Jr. (2019). The facts of fake news: A research review. Sociology Compass, 13(9), e12724. doi:10.1111/soc4.12724
- Tang (2023).
- Topcu-Uzer, C., & Tanrıkulu, I. (2018). Technological solutions for cyberbullying. In Reducing cyberbullying in schools (pp. 33-47). Elsevier. doi:10.1016/B978-0-12-811423-0.00003-1
- Topor, D. R., & Budson, A. E. (2020). Twelve tips to present an effective webinar. Medical Teacher, 42(11), 1216-1220. doi:10.1080/0142159X.2020.1775185 PMID:33096974
- Tozzo, P., Cuman, O., Moratto, E., & Caenazzo, L. (2022). Family and educational strategies for cyberbullying prevention: A systematic review. International Journal of Environmental Research and Public Health, 19(16), 19. doi:10.3390/ijerph191610452 PMID:36012084
- Trabelsi, Z., Mellouli, S., & Khoury, R. (2022). Online content moderation and the challenge of conceptualizing cyberbullying. AIS.
- Trompeter, N., Jackson, E., Sheanoda, V., Luo, A., Allison, K. R., & Bussey, K. (2022). Cyberbullying prevalence in Australian adolescents: Time trends 2015-2020. Journal of School Violence, 21(3), 252-265. doi:10.1080/ 15388220.2022.2075881
- Tugtekin, U. (2023). The dark side of metaverse learning environments: Potential threats and risk factors. In Shaping the future of online learning: Education in the metaverse (pp. 57-67). IGI Global. doi:10.4018/978- 1-6684-6513-4.ch004
- Tyagi, S., & Yadav, D. (2022). A detailed analysis of image and video forgery detection techniques. The Visual Computer, 1-21.
- Ünal-Aydın, P., Özkan, Y., Öztürk, M., Aydın, O., & Spada, M. M. (2023). The role of metacognitions in cyberbullying and cybervictimization among adolescents diagnosed with major depressive disorder and anxiety: A case-control study. Clinical Psychology & Psychotherapy. PMID:36634222
- Van der Nagel, E. (2017). From usernames to profiles: The development of pseudonymity in internet communication. Internet Histories, 1(4), 312-331. doi:10.1080/24701475.2017.1389548
- Wahab, O. A., Bentahar, J., Otrok, H., & Mourad, A. (2020). Optimal load distribution for the detection of VM-based DDoS attacks in the cloud. IEEE Transactions on Services Computing, 13(1), 114-129. doi:10.1109/ TSC.2017.2694426
- Wang, H., Li, Z., Li, Y., Gupta, B. B., & Choi, C. (2020). Visual saliency guided complex image retrieval. Pattern Recognition Letters, 130, 64-72. doi:10.1016/j.patrec.2018.08.010
- Wang, L., & Jiang, S. (2022). Effectiveness of parent-related interventions on cyberbullying among adolescents: A systematic review and meta-analysis. Trauma, Violence & Abuse, 15248380221137065. doi:10.1177/15248380221137065 PMID:36458864
- Wang, P., Hawk, W. B., & Tenopir, C. (2000). Users' interaction with world wide web resources: An exploratory study using a holistic approach. Information Processing & Management, 36(2), 229-251. doi:10.1016/S0306- 4573(99)00059-X
- Westerlund, M. (2019). The emergence of deepfake technology: A review. Technology Innovation Management Review, 9(11), 39-52. doi:10.22215/timreview/1282
- Whitby, P. (2011). Is your child safe online? Crimson Publishing.
- Willard, N. E. (2007). Cyberbullying and cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Research Press.
- Williams, M. L., & Pearson, O. (2016). Hate crime and bullying in the age of social media.
- Wu, J., Zheng, Z., & Zhao, J. L. (2021). Fairplay: Detecting and deterring online customer misbehavior. Information Systems Research, 32(4), 1323-1346. doi:10.1287/isre.2021.1035
- Xiang, T., & Gong, S. (2008). Video behavior profiling for anomaly detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 30(5), 893-908. doi:10.1109/TPAMI.2007.70731 PMID:18369257
- Xu, Z., & Zhu, S. (2010). Filtering offensive language in online communities using grammatical relations. In Proceedings of the 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (pp. 1-10). ACM.
- Ybarra, M. L., Mitchell, K. J., Finkelhor, D., & Wolak, J. (2007). Internet prevention messages: Targeting the right online behaviors. Archives of Pediatrics & Adolescent Medicine, 161(2), 138-145. doi:10.1001/ archpedi.161.2.138D PMID:17283298
- Yoon, H.-S. (2020). A case study on the development of a serious game. Journal of Korea Game Society, 20(2), 45-60. doi:10.7583/JKGS.2020.20.2.45
- Yosep, I., Hikmat, R., & Mardhiyah, A. (2023). Preventing cyberbullying and reducing its negative impact on students using e-parenting: A scoping review. Sustainability (Basel), 15(3), 1752. doi:10.3390/su15031752