Academia.eduAcademia.edu

Outline

Cyberbullying in the Metaverse

Journal of Global Information Management

https://doi.org/10.4018/JGIM.325793

Abstract

The emergence of the metaverse, a virtual reality space, has ushered in a new era of digital experiences and interactions in global information systems. With its unique social norms and behaviors, this new world presents exciting opportunities for users to connect, socialize, and explore. However, as people spend more time in the metaverse, it has become increasingly apparent that the issue of cyberbullying needs to be addressed. Cyberbullying is a serious problem that can harm victims psychologically and physically. It involves using technology to harass, intimidate, or humiliate individuals or groups in global information systems. The risk of cyberbullying is high in the metaverse, where users are often anonymous. Therefore, it is crucial to establish a safer and more respectful culture within the metaverse to detect and prevent such incidents from happening.

FAQs

sparkles

AI

What forms of cyberbullying are prevalent in the metaverse?add

The study identifies forms like direct harassment, spreading rumors, impersonation, exclusion, and hate speech as prevalent in the metaverse.

How does the incidence of cyberbullying in the metaverse compare to traditional environments?add

Rates of cybervictimization range from 2.8% to 31.5%, and cyber-perpetration from 3.0% to 30.6%, indicating significant prevalence.

What role do AI and machine learning play in combating metaverse cyberbullying?add

AI and machine learning can detect bullying tendencies in real-time by analyzing user behavior and language, aiding in timely interventions.

How effective are educational campaigns in reducing cyberbullying incidence?add

Educational campaigns empower users to recognize and act against cyberbullying, promoting a culture of respect and safety in virtual environments.

What legislative frameworks are needed to address cyberbullying in the metaverse?add

Proposals suggest establishing a universal legal framework to enable cooperation across jurisdictions and enhance enforcement against cyberbullying.

References (172)

  1. Abbas, N., Nasser, Y., Shehab, M., & Sharafeddine, S. (2021, December). Attack-specific feature selection for anomaly detection in software-defined networks. In 3 rd IEEE Middle East and North Africa COMMunications Conference (MENACOMM) (pp. 142-146). IEEE. doi:10.1109/MENACOMM50742.2021.9678279
  2. Akram, W., & Kumar, R. (2017). A study on positive and negative effects of social media on society. International Journal on Computer Science and Engineering, 5(10), 351-354.
  3. Alam, S., & Cohen, M. (2018). Narrowcasting in sip Articulated privacy control. In Sip handbook (pp. 341-364). CRC Press.
  4. Almomani, A., Alauthman, M., Shatnawi, M. T., Alweshah, M., Alrosan, A., Alomoush, W., Gupta, B. B., Gupta, B. B., & Gupta, B. B. (2022). Phishing website detection with semantic features based on machine learning classifiers: A comparative study. International Journal on Semantic Web and Information Systems, 18(1), 1-24. doi:10.4018/IJSWIS.297032
  5. Amarah, A., Daimin, G., Norhayatie, I., Kadir, A. Z. A., & Wnidayu, T. (2020). Cyberbullying campaign review for new implementation and prevention. International Journal of Synergy in Engineering and Technology, 1(1).
  6. Ang, R. P. (2015). Adolescent cyberbullying: A review of characteristics, prevention and intervention strategies. Aggression and Violent Behavior, 25, 35-42. doi:10.1016/j.avb.2015.07.011
  7. Angafor, G. N., Yevseyeva, I., & Maglaras, L. (2023). Scenario-based incident response training: Lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Information and Computer Security. doi:10.1108/ICS-05-2022-0085
  8. Anshari, M., Syafrudin, M., Fitriyani, N. L., & Razzaq, A. (2022). Ethical responsibility and sustain ability (ers) development in a metaverse business model. Sustainability (Basel), 14(23), 15805. doi:10.3390/su142315805
  9. Arsht, A., & Etcovitch, D. (2018). The human cost of online content moderation. Harvard Journal of Law & Technology.
  10. Ashktorab, Z., & Vitak, J. (2016). Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In Proceedings of the 2016 Chi Conference on Human Factors in Computing Systems (pp. 3895-3905). ACM. doi:10.1145/2858036.2858548
  11. Baccarella, C. V., Wagner, T. F., Kietzmann, J. H., & McCarthy, I. P. (2018). Social media? It's serious! Understanding the dark side of social media. European Management Journal, 36(4), 431-438. doi:10.1016/j.emj.2018.07.002
  12. Balci, K., & Salah, A. A. (2015). Automatic analysis and identification of verbal aggression and abusive behaviors for online social games. Computers in Human Behavior, 53, 517-526. doi:10.1016/j.chb.2014.10.025
  13. Barab, S. A., Makinster, J. G., Moore, J. A., & Cunningham, D. J. (2001). Designing and building an online community: The struggle to support sociability in the inquiry learning forum. Educational Technology Research and Development, 49(4), 71-96. doi:10.1007/BF02504948
  14. Barak, A., & Grohol, J. M. (2011). Current and future trends in internet-supported mental health interventions. Journal of Technology in Human Services, 29(3), 155-196. doi:10.1080/15228835.2011.616939
  15. Barlin'ska, J., Szuster, A., & Winiewski, M. (2018). Cyberbullying among adolescent bystanders: Role of affective versus cognitive empathy in increasing prosocial cyber bystander behavior. Frontiers in Psychology, 9, 799. doi:10.3389/fpsyg.2018.00799 PMID:29899715
  16. Barth, S., & De Jong, M. D. (2017). The privacy paradox: Investigating discrepancies between ex-pressed privacy concerns and actual on-line behavior. A systematic literature review. Telematics and Informatics, 34(7), 1038-1058. doi:10.1016/j.tele.2017.04.013
  17. Baruah, T. D. (2012). Effectiveness of social media as a tool of communication and its potential for technology enabled connections: A micro-level study. International Journal of Scientific and Research Publications, 2(5), 1-10.
  18. Bastiaensens, S., Van Cleemput, K., Vandebosch, H., Poels, K., DeSmet, A., & De Bourdeaudhuij, I. (2019). "Were you cyberbullied? Let me help you." Studying adolescents' online peer support of cyberbullying victims using thematic analysis of online support group I. Narratives in research and interventions on cyberbullying among young people, 95-112.
  19. Bauman, S. (2007). Cyberbullying: A virtual menace. National Coalition Against Bullying National Conferences (Vol. 2).
  20. Beale, A. V., & Hall, K. R. (2007). Cyberbullying: What school administrators (and parents) can do. The Clearing House: A Journal of Educational Strategies, Issues and Ideas, 81(1), 8-12. doi:10.3200/TCHS.81.1.8-12
  21. Bhandari, A., Ozanne, M., Bazarova, N. N., & DiFranzo, D. (2021). Do you care who flagged this post? Effects of moderator visibility on bystander behavior. Journal of Computer-Mediated Communication, 26(5), 284-300. doi:10.1093/jcmc/zmab007
  22. Bhardwaj, A., & Kaushik, K. (2022). Predictive analytics-based cybersecurity framework for cloud infrastructure. International Journal of Cloud Applications and Computing, 12(1), 1-20. doi:10.4018/IJCAC.297106
  23. Blumenfeld, W. J., & Cooper, R. (2010). LGBT and allied youth responses to cyberbullying: Policy implications. The International Journal of Critical Pedagogy, 3(1), 112.
  24. Bote, A. G. (2021). Effects of virtual reality role-play on social communication skills of children with AD/HD. In Proceedings of International Conference on Special Education (Vol. 4). Seomen Sen.
  25. Brdesee, H. S., Alsaggaf, W., Aljohani, N., & Hassan, S. U. (2022). Predictive model using a machine learning approach for enhancing the retention rate of students at-risk. International Journal on Semantic Web and Information Systems, 18(1), 1-21. doi:10.4018/IJSWIS.299859
  26. Brown, K., Jackson, M., & Cassidy, W. (2006). Cyberbullying: Developing policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy, 57.
  27. Buana, I. M. W. (2023). Metaverse: Threat or opportunity for our social world? In understanding metaverse on sociological context. Journal of Metaverse, 3(1), 28-33. doi:10.57019/jmv.1144470
  28. Bullingham, L., & Vasconcelos, A. C. (2013). 'The presentation of self in the online world': Goffman and the study of online identities. Journal of Information Science, 39(1), 101-112. doi:10.1177/0165551512470051
  29. Burrows, C. N., & Blanton, H. (2016). Real-world persuasion from virtual world campaigns: How transportation into virtual worlds moderates in-game influence. Communication Research, 43(4), 542-570. doi:10.1177/0093650215619215
  30. Burton, P., & Mutongwizo, T. (2009). Inescapable violence: Cyber bullying and electronic violence against young people in South Africa. Centre for Justice and Crime Prevention, 8, 1-12.
  31. Calvin, A. J., Bellmore, A., Xu, J.-M., & Zhu, X. (2015). Bully: Uses of hashtags in posts about bullying on twitter. Journal of School Violence, 14(1), 133-153. doi:10.1080/15388220.2014.966828
  32. Calvo-Morata, A., Alonso-Fernández, C., Freire, M., Martínez-Ortiz, I., & Fernández-Manjón, B. (2020). Serious games to prevent and detect bullying and cyberbullying: A systematic serious games and literature review. Computers & Education, 157, 103958. doi:10.1016/j.compedu.2020.103958
  33. Carlyle, K. E., & Steinman, K. J. (2007). Demographic differences in the prevalence, co-occurrence, and correlates of adolescent bullying at school. The Journal of School Health, 77(9), 623-629. doi:10.1111/j.1746- 1561.2007.00242.x PMID:17970866
  34. Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. School Psychology International, 34(6), 575-612. doi:10.1177/0143034313479697
  35. Chadwick, S., & Chadwick, S. (2014). Educational approaches. Impacts of Cyberbullying, Building Social and Emotional Resilience in Schools, 57-80.
  36. Chelmis, C., & Yao, M. (2019). Minority report: Cyberbullying prediction on Instagram. In Proceed ings of the 10 th ACM Conference on Web Science (pp. 37-45).
  37. Chen, Q., Chan, K. L., Guo, S., Chen, M., Lo, C. K., & Ip, P. (2022). Effectiveness of digital health interventions in reducing bullying and cyberbullying: A meta-analysis. Trauma, Violence & Abuse, 15248380221082090. PMID:35446724
  38. Chisholm, J. F. (2014). Review of the status of cyberbullying and cyberbullying prevention. Journal of Information Systems Education, 25(1), 77.
  39. Ciucci, E., & Baroncelli, A. (2014). Emotion-related personality traits and peer social standing: Unique and interactive effects in cyberbullying behaviors. Cyberpsychology, Behavior, and Social Networking, 17(9), 584-590. doi:10.1089/cyber.2014.0020 PMID:25055248
  40. Corcoran, L., & Mc Guckin, C. (2014). Addressing bullying problems in Irish schools and in cyberspace: A challenge for school management. Educational Research, 56(1), 48-64. doi:10.1080/00131881.2013.874150
  41. Dan, S. (2022). NIR spectroscopy oranges origin identification on framework based on machine learning. International Journal on Semantic Web and Information Systems, 18(1), 1-16. doi:10.4018/IJSWIS.297039
  42. DeSanctis, G., Fayard, A.-L., Roach, M., & Jiang, L. (2003). Learning in online forums. European Management Journal, 21(5), 565-577. doi:10.1016/S0263-2373(03)00106-3
  43. DeSmet, A., Van Cleemput, K., Bastiaensens, S., Poels, K., Vandebosch, H., Malliet, S., Verloigne, M., Vanwolleghem, G., Mertens, L., Cardon, G., & De Bourdeaudhuij, I. (2016). Bridging behavior science and gaming theory: Using the intervention mapping protocol to design a serious game against cyberbullying. Computers in Human Behavior, 56, 337-351. doi:10.1016/j.chb.2015.11.039
  44. Deveci, M., Pamucar, D., Gokasar, I., Köppen, M., & Gupta, B. B. (2022). Personal mobility in metaverse with autonomous vehicles using Q-rung orthopair fuzzy sets based OPA-RAFSI model. IEEE Transactions on Intelligent Transportation Systems, 1-10. doi:10.1109/TITS.2022.3186294
  45. Di Pietro, R., & Cresci, S. (2021). Metaverse: security and privacy issues. In 2021 3 rd IEEE Interna-tional Conference on Trust, Privacy and Security in Intelligent Systems and Applications (tps-isa) (pp. 281-288). IEEE. doi:10.1109/TPSISA52974.2021.00032
  46. Diamanduros, T., Downs, E., & Jenkins, S. J. (2008). The role of school psychologists in the assessment, prevention, and intervention of cyberbullying. Psychology in the Schools, 45(8), 693-704. doi:10.1002/pits.20335
  47. DiFranzo, D., Choi, Y. H., Purington, A., Taft, J. G., Whitlock, J., & Bazarova, N. N. (2019). Social media testdrive: Real-world social media education for the next generation. In Proceedings of the 2019 Chi Conference on Human Factors in Computing Systems (pp. 1-11). ACM. doi:10.1145/3290605.3300533
  48. Dinakar, K., Jones, B., Havasi, C., Lieberman, H., & Picard, R. (2012). Common sense reasoning for detection, prevention, and mitigation of cyberbullying. [TiiS]. ACM Transactions on Interactive Intelligent Systems, 2(3), 1-30. doi:10.1145/2362394.2362400
  49. Dionisio, J. D. N., Burns, W. G., & Gilbert, R. (2013). 3D virtual worlds and the metaverse: Current status and future possibilities. ACM Computing Surveys, 45(3), 1-38. doi:10.1145/2480741.2480751
  50. Doumas, D. M., & Midgett, A. (2021). The association between witnessing cyberbullying and de-pressive symptoms and social anxiety among elementary school students. Psychology in the Schools, 58(3), 622-637. doi:10.1002/pits.22467
  51. Dwivedi, Y. K., Hughes, L., Baabdullah, A. M., Ribeiro-Navarrete, S., Giannakis, M., Al-Debei, M. M., Dennehy, D., Metri, B., Buhalis, D., Cheung, C. M. K., Conboy, K., Doyle, R., Dubey, R., Dutot, V., Felix, R., Goyal, D. P., Gustafsson, A., Hinsch, C., Jebabli, I., & Wamba, S. F. et al. (2022). Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 66, 102542. doi:10.1016/j.ijinfomgt.2022.102542
  52. Falchuk, B., Loeb, S., & Neff, R. (2018). The social metaverse: Battle for privacy. IEEE Technology and Society Magazine, 37(2), 52-61. doi:10.1109/MTS.2018.2826060
  53. Fatemidokht, H., Rafsanjani, M. K., Gupta, B. B., & Hsu, C. H. (2021). Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Transactions on Intelligent Transportation Systems, 22(7), 4757-4769. doi:10.1109/ TITS.2020.3041746
  54. Fediy, O., Protsai, L., & Gibalova, N. (2021). Pedagogical conditions for digital citizenship formation among primary school pupils. Revista Romaneasca pentru Educatie Multidimensionala, 13(3), 95-115.
  55. Feinberg, T., & Robey, N. (2009). Cyberbullying. Education Digest, 74(7), 26.
  56. Fischer, E., & Reuber, A. R. (2011). Social interaction via new social media: (How) can interactions on twitter affect effectual thinking and behavior? Journal of Business Venturing, 26(1), 1-18. doi:10.1016/j. jbusvent.2010.09.002
  57. Fitzpatrick, C., & Birnholtz, J. (2018). "I shut the door": Interactions, tensions, and negotiations from a location- based social app. New Media & Society, 20(7), 2469-2488. doi:10.1177/1461444817725064
  58. Foo, C. Y., & Koivisto, E. M. (2004). Defining grief play in mmorpgs: Player and developer perceptions. In Proceedings of the 2004 ACM Sigchi International Conference on Advances in Computer Entertainment Technology (pp. 245-250). ACM. doi:10.1145/1067343.1067375
  59. Frenkel, M. (2009). Global information systems in science: Application to the field of thermodynamics. Journal of Chemical & Engineering Data, 54(9), 2411-2428. doi:10.1021/je800877f
  60. Gadekallu, T. R., Huynh-The, T., Wang, W., Yenduri, G., Ranaweera, P., Pham, Q.-V., & Liyanage, M. (2022). Blockchain for the metaverse: A review. arXiv preprint arXiv:2203.09738.
  61. Gaurav, A. (2022). A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterprise Information Systems, 1-25.
  62. Getta, J. R. (2011). Static optimization of data integration plans in global information systems. University of Wollongon. Ghosh, A., Chakraborty, D., & Law, A. (2018). Artificial intelligence in internet of things. CAAI Transactions on Intelligence Technology, 3(4), 208-218. doi:10.1049/trit.2018.1008
  63. Godwin-Jones, R. (2014). Games in language learning: Opportunities and challenges. Language Learning and Opportunity.
  64. Gongane, V. U., Munot, M. V., & Anuse, A. D. (2022). Detection and moderation of detrimental content on social media platforms: Current status and future directions. Social Network Analysis and Mining, 12(1), 129. doi:10.1007/s13278-022-00951-3 PMID:36090695
  65. Gorini, A., Gaggioli, A., & Riva, G. (2008). A second life for ehealth: Prospects for the use of 3D virtual worlds in clinical psychology. Journal of Medical Internet Research, 10(3), e1029. doi:10.2196/jmir.1029 PMID:18678557
  66. Gupta, B. B., Gaurav, A., Chui, K. T., Wang, L., Arya, V., Shukla, A., & Perakovic´, D. (2023, January). DDoS attack detection through digital twin technique in metaverse. In 2023 IEEE International Conference on Consumer Electronics (ICCE) (pp. 1-5). IEEE. doi:10.1109/ICCE56470.2023.10043433
  67. Han, J., Liu, G., & Gao, Y. (2023). Learners in the metaverse: A systematic review on the use of Roblox in learning. Education Sciences, 13(3), 296. doi:10.3390/educsci13030296
  68. Helfrich, E. L., Doty, J. L., Su, Y.-W., Yourell, J. L., & Gabrielli, J. (2020). Parental views on pre-venting and minimizing negative effects of cyberbullying. Children and Youth Services Review, 118, 105377. doi:10.1016/j. childyouth.2020.105377
  69. Hinduja, S., & Patchin, J. W. (2013). Social influences on cyberbullying behaviors among middle and high school students. Journal of Youth and Adolescence, 42(5), 711-722. doi:10.1007/s10964-012-9902-4 PMID:23296318
  70. Hon, L., & Varathan, K. (2015). Cyberbullying detection system on twitter. IJABM, 1(1), 1-11.
  71. Howell, C. J., & Burruss, G. W. (2020). Datasets for analysis of cybercrime. The Palgrave Handbook of International Cybercrime and Cyber Deviance, 207-219.
  72. Huda, M., Jasmi, K. A., Hehsan, A., Mustari, M. I., Shahrill, M., Basiron, B., & Gassama, S. K. (2017). Empowering children with adaptive technology skills: Careful engagement in the digital information age. International Electronic Journal of Elementary Education, 9(3), 693-708.
  73. Ireland, L., Hawdon, J., Huang, B., & Peguero, A. (2020). Preconditions for guardianship interventions in cyberbullying: Incident interpretation, collective and automated efficacy, and relative popularity of bullies. Computers in Human Behavior, 113, 106506. doi:10.1016/j.chb.2020.106506
  74. Jacob, H. H. (2014). Mastering digital literacy. Solution Tree Press.
  75. Jagatheesaperumal, S. K. Ah-mad, K., Al-Fuqaha, A., & Qadir, J. (2022). Advancing education through extended reality and internet of everything enabled metaverses: Applications, challenges, and open issues. arXiv preprint arXiv:2207.01512.
  76. Jhaver, S., Chen, Q. Z., Knauss, D., & Zhang, A. X. (2022). Designing word filter tools for creator-led comment moderation. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (pp. 1-21). ACM. doi:10.1145/3491102.3517505
  77. Joshua, J. (2017). Information bodies: Computational anxiety in Neal Stephenson's snow crash. Interdisciplinary Literary Studies, 19(1), 17-47. doi:10.5325/intelitestud.19.1.0017
  78. Kaluarachchi, C., Warren, M., & Jiang, F. (2020). Responsible use of technology to combat cyberbullying among young people.
  79. Kameny, I. (1989, January). Global information system issues. In Proceedings. Fifth International Conference on Data Engineering (pp. 672-673). IEEE Computer Society. doi:10.1109/ICDE.1989.47275
  80. Kasiyanto, S., & Kilinç, M. R. (2022). Legal conundrums of the metaverse. Journal of Central Banking Law and Institutions.
  81. Katz, I., Keeley, M., Spears, B., Taddeo, C., Swist, T., & Bates, S. (2014). Research on youth exposure to, and management of, cyberbullying incidents in Australia. Synthesis Report.
  82. Kiene, C., Jiang, J. A., & Hill, B. M. (2019). Technological frames and user innovation: Exploring technological change in community moderation teams. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW), (pp. 1-23). ACM. doi:10.1145/3359146
  83. Kim, S., Razi, A., Stringhini, G., Wisniewski, P. J., & De Choudhury, M. (2021). You don't know how I feel: Insider-outsider perspective gaps in cyberbullying risk detection. In Proceedings of the International AAAI Conference on Web and Social Media (Vol. 15, pp. 290-302). IEEE. doi:10.1609/icwsm.v15i1.18061
  84. Kintonova, A., Vasyaev, A., & Shestak, V. (2021). Cyberbullying and cyber-mobbing in developing countries. Information and Computer Security, 29(3), 435-456. doi:10.1108/ICS-02-2020-0031
  85. Klauck, M., Sugano, Y., & Bulling, A. (2017). Noticeable or distractive? A design space for gaze-contingent user interface notifications. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 1779-1786). IEEE. doi:10.1145/3027063.3053085
  86. Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073-1137. doi:10.1037/a0035618 PMID:24512111
  87. Kumbhojkar, N. R., & Menon, A. B. (2022). Integrated predictive experience management framework (IPEMF) for improving customer experience: In the era of digital transformation. [IJCAC]. International Journal of Cloud Applications and Computing, 12(1), 1-13. doi:10.4018/IJCAC.2022010107
  88. Lai, C., Mohamad, M., Lee, M., Salleh, K. M., Sulaiman, N., Rosli, D., & Chang, W. (2017). Prevalence of cyberbullying among students in Malaysian higher learning institutions. Advanced Science Letters, 23(2), 781-784. doi:10.1166/asl.2017.7492
  89. Li, S., Qin, D., Wu, X., Li, J., Li, B., & Han, W. (2022). False alert detection based on deep learning and machine learning. [IJSWIS]. International Journal on Semantic Web and Information Systems, 18(1), 1-21. doi:10.4018/ IJSWIS.313190
  90. Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962-986. doi:10.1287/isre.2016.0671
  91. Luxton, D. D., June, J. D., & Fairall, J. M. (2012). Social media and suicide: A public health perspec tive. American Journal of Public Health, 102(S2), S195-S200. doi:10.2105/AJPH.2011.300608 PMID:22401525
  92. Marczak, M., & Coyne, I. (2010). Cyberbullying at school: Good practice and legal aspects in the United Kingdom. Journal of Psychologists and Counsellors in Schools, 20(2), 182-193.
  93. McStay, A. (2022). Replika in the metaverse: The moral problem with empathy in 'it from bit.'. AI and Ethics, 1-13. doi:10.1007/s43681-022-00252-7 PMID:36573214
  94. Mergel, I., & Bretschneider, S. I. (2013). A three-stage adoption process for social media use in government. Public Administration Review, 73(3), 390-400. doi:10.1111/puar.12021
  95. Milosevic, T. (2016). Social media companies' cyberbullying policies. International Journal of Communication, 10, 22. Milosevic, T. (2018). Protecting children online? Cyberbullying policies of social media companies. The MIT Press. doi:10.7551/mitpress/11008.001.0001
  96. Milosevic, T., O'Neill, B., & Staksrud, E. (2019). Narratives of industry responses to cyberbullying: Perspectives on self-regulation from and about the industry. In Narratives in research and interventions on cyberbullying among young people (pp. 229-243).
  97. Mkono, M. (2018). 'Troll alert!': Provocation and harassment in tourism and hospitality social media. Current Issues in Tourism, 21(7), 791-804. doi:10.1080/13683500.2015.1106447
  98. Mukherjee, A., & Nath, P. (2007). Role of electronic trust in online retailing: A re-examination of the commitment- trust theory. European Journal of Marketing, 41(9/10), 1173-1202. doi:10.1108/03090560710773390
  99. Murnion, S., Buchanan, W. J., Smales, A., & Russell, G. (2018). Machine learning and semantic analysis of in-game chat for cyberbullying. Computers & Security, 76, 197-213. doi:10.1016/j.cose.2018.02.016
  100. Nesse, R. (1998). Emotional disorders in evolutionary perspective. The British Journal of Medical Psychology, 71(4), 397-415. doi:10.1111/j.2044-8341.1998.tb01000.x PMID:9875953
  101. Ngo, A. T., Tran, A. Q., Tran, B. X., Nguyen, L. H., Hoang, M. T., Nguyen, T. H. T., Doan, L. P., Vu, G. T., Nguyen, T. H., Do, H. T., Latkin, C. A., Ho, R. C. M., & Ho, C. S. H. (2021). Cyberbullying among school adolescents in an urban setting of a developing country: Experience, coping strategies, and mediating effects of different support on psychological well-being. Frontiers in Psychology, 12, 661919. doi:10.3389/fpsyg.2021.661919 PMID:33897571
  102. Nikiforos, S., Tzanavaris, S., & Kermanidis, K.-L. (2020). Virtual learning communities (vlcs) re-thinking: Influence on behavior modification-bullying detection through machine learning and nat ural language processing. Journal of Computers in Education, 7(4), 531-551. doi:10.1007/s40692-020-00166-5
  103. Nocentini, A., Zambuto, V., & Menesini, E. (2015). Anti-bullying programs and information and communication technologies (icts): A systematic review. Aggression and Violent Behavior, 23, 52-60. doi:10.1016/j. avb.2015.05.012
  104. O'Moore, M., Cross, D., & Maritta Valimaki, A. (2013). Guidelines to prevent cyberbullying: A cross-national review. In Cyberbullying through the new media (pp. 154-180). Psychology Press.
  105. Oleksy, T., Wnuk, A., & Piskorska, M. (2023). Migration to the metaverse and its predictors: Attachment to virtual places and metaverse-related threat. Computers in Human Behavior, 141, 107642. doi:10.1016/j.chb.2022.107642
  106. Olweus, D., & Limber, S. P. (2018). Some problems with cyberbullying research. Current Opinion in Psychology, 19, 139-143. doi:10.1016/j.copsyc.2017.04.012 PMID:29279213
  107. Ortiz, P., & Khin Khin, E. (2018). Traditional and new media's influence on suicidal behavior and contagion. Behavioral Sciences & the Law, 36(2), 245-256. doi:10.1002/bsl.2338 PMID:29659071
  108. Ouvrein, G., Pabian, S., Giles, D., Hudders, L., & De Backer, C. (2021). The web of influencers. A marketing- audience classification of (potential) social media influencers. Journal of Marketing Management, 37(13-14), 1313-1342. doi:10.1080/0267257X.2021.1912142
  109. Park, S.-M., & Kim, Y.-G. (2022). A metaverse: Taxonomy, components, applications, and open challenges. IEEE Access : Practical Innovations, Open Solutions, 10, 4209-4251. doi:10.1109/ACCESS.2021.3140175
  110. Parris, L., Varjas, K., Meyers, J., & Cutts, H. (2012). High school students' perceptions of coping with cyberbullying. Youth & Society, 44(2), 284-306. doi:10.1177/0044118X11398881
  111. Pate, R. (2022). Legal issues inside the unnatural world of metaverse. Business Law Review.
  112. Petsas, T., Tsirantonakis, G., Athanasopoulos, E., & Ioannidis, S. (2015). Two-factor authentication: Is the world ready? quantifying 2fa adoption. In Proceedings of the 8th European Workshop on System Security (pp. 1-7). IEEE. doi:10.1145/2751323.2751327
  113. Piscatelli, J., & Lee, C. (2011). State policies on school climate and bully prevention efforts: Challenges and opportunities for deepening state policy support for safe and civil schools. National School Climate Center.
  114. Pless, N., & Maak, T. (2004). Building an inclusive diversity culture: Principles, processes and practice. Journal of Business Ethics, 54(2), 129-147. doi:10.1007/s10551-004-9465-8
  115. Postigo, H. (2003). Emerging sources of labor on the internet: The case of America online volunteers. International Review of Social History, 48(S11), 205-223. doi:10.1017/S0020859003001329
  116. Price, M. E., Verhulst, S. G., & Verhulst, S. (2005). Self-regulation and the internet. Kluwer Law International BV.
  117. Pyzalski, J., Plichta, P., Szuster, A., & Barlin'ska, J. (2022). Cyberbullying characteristics and prevention-What can we learn from narratives provided by adolescents and their teachers? International Journal of Environmental Research and Public Health, 19(18), 11589. doi:10.3390/ijerph191811589 PMID:36141856
  118. Qamar, S., Anwar, Z., & Afzal, M. (2023). A systematic threat analysis and defense strategies for the metaverse and extended reality systems. Computers & Security, 128, 103127. doi:10.1016/j.cose.2023.103127
  119. Qasem, Z., Hmoud, H. Y., Hajawi, D., & Al Zoubi, J. Z. (2022). The effect of technostress on cyberbullying in metaverse social platforms. In Co-creating for context in the transfer and diffusion of it: Ifip wg 8.6 international working conference on transfer and diffusion of it (pp. 291-296). doi:10.1007/978-3-031-17968-6_22
  120. Qin, H. X., Wang, Y., & Hui, P. (2022). Identity, crimes, and law enforcement in the metaverse. ArXiv, abs/2210.06134.
  121. Quinn, Z. (2017). Crash override: How gamergate (nearly) destroyed my life, and how we can win the fight against online hate. Hachette UK.
  122. Rachoene, M., & Oyedemi, T. (2015). From self-expression to social aggression: Cyberbullying cul ture among South African youth on Facebook. Communication, 41(3), 302-219.
  123. Raisi, E., & Huang, B. (2017). Cyberbullying detection with weakly supervised machine learning. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 409-416). IEEE. doi:10.1145/3110025.3110049
  124. Rajan, A., Singh, A., R, P., R, R.S., & Reddy KQ, S. (2022). Cyberbullying detection. International Journal of Innovative Research in Advanced Engineering.
  125. Ransbotham, S., Fichman, R. G., Gopal, R., & Gupta, A. (2016). Special section introduction-Ubiquitous it and digital vulnerabilities. Information Systems Research, 27(4), 834-847. doi:10.1287/isre.2016.0683
  126. Rega, V., Gioia, F., & Boursier, V. (2022). Parental mediation and cyberbullying: A narrative literature review. Marriage & Family Review, 58(6), 495-530. doi:10.1080/01494929.2022.2069199
  127. Reid, E., Mandryk, R. L., Beres, N. A., Klarkowski, M., & Frommel, J. (2022a). Feeling good and in control: In-game tools to support targets of toxicity. Proceedings of the ACM on Human-Computer Interaction, 6(CHI PLAY), (pp. 1-27). ACM. doi:10.1145/3549498
  128. Reid, E., Mandryk, R. L., Beres, N. A., Klarkowski, M., & Frommel, J. (2022b). "Bad vibrations": Sensing toxicity from in-game audio features. IEEE Transactions on Games, 14(4), 558-568. doi:10.1109/TG.2022.3176849
  129. Rice, E., Petering, R., Rhoades, H., Winetrobe, H., Goldbach, J., Plant, A., & Kordic, T. (2015). Cyberbullying perpetration and victimization among middle-school students. American Journal of Public Health, 105(3), e66-e72. doi:10.2105/AJPH.2014.302393 PMID:25602905
  130. Ringland, K. E., Wolf, C. T., Dombrowski, L., & Hayes, G. R. (2015). Making "safe" community-centered practices in a virtual world dedicated to children with autism. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 1788-1800). ACM. doi:10.1145/2675133.2675216
  131. Robinson, G., & Maines, B. (2008). Bullying: A complete guide to the support group method. Sage (Atlanta, Ga.). doi:10.4135/9781446214749
  132. Rosenblum, D. (2007). What anyone can know: The privacy risks of social networking sites. IEEE Security and Privacy, 5(3), 40-49. doi:10.1109/MSP.2007.75
  133. Sandars, J., Correia, R., Dankbaar, M., de Jong, P., Goh, P. S., & Hege, I. (2020). Twelve tips for rapidly migrating to online learning during the Covid-19 pandemic.
  134. Schwarz, A. F., Huertas-Delgado, F. J., Cardon, G., & DeSmet, A. (2020). Design features associated with user engagement in digital games for healthy lifestyle promotion in youth: A systematic review of qualitative and quantitative studies. Games for Health Journal, 9(3), 150-163. doi:10.1089/g4h.2019.0058 PMID:31923363
  135. Sebastian, G. (2023). A descriptive study on metaverse: Cybersecurity risks, controls, and regulatory framework. International Journal of Security and Privacy in Pervasive Computing, 15, 1-14. doi:10.4018/IJSPPC.320225
  136. Seraj, M. (2012). We create, we connect, we respect, therefore we are: Intellectual, social, and cultural value in online communities. Journal of Interactive Marketing, 26(4), 209-222. doi:10.1016/j.intmar.2012.03.002
  137. Sewell, A. (2020). An adaption of the good behaviour game to promote social skill development at the whole- class level. Educational Psychology in Practice, 36(1), 93-109. doi:10.1080/02667363.2019.1695583
  138. Shah, J., Das, P., Muthiah, N., & Milanaik, R. (2019). New age technology and social media: Adolescent psychosocial implications and the need for protective measures. Current Opinion in Pediatrics, 31(1), 148-156. doi:10.1097/MOP.0000000000000714 PMID:30507648
  139. Shankar, V., Grewal, D., Sunder, S., Fossen, B., Peters, K., & Agarwal, A. (2022). Digital marketing communication in global market-places: A review of extant research, future directions, and potential approaches. International Journal of Research in Marketing, 39(2), 541-565. doi:10.1016/j.ijresmar.2021.09.005
  140. Singh, A., & Gupta, B. B. (2022). Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: Issues, challenges, and future research directions. [IJSWIS]. International Journal on Semantic Web and Information Systems, 18(1), 1-43. doi:10.4018/IJSWIS.297143
  141. Slonje, R., Smith, P. K., & Frisén, A. (2013). The nature of cyberbullying, and strategies for prevention. Computers in Human Behavior, 29(1), 26-32. doi:10.1016/j.chb.2012.05.024
  142. Solove, D. J., & Citron, D. K. (2017). Risk and anxiety: A theory of data breach harms. Texas Law Review, 96, 737.
  143. Strohmeier, D., & Gradinger, P. (2022). Cyberbullying and cyber victimization as online risks for children and adolescents. European Psychologist, 27(2), 141-150. doi:10.1027/1016-9040/a000479
  144. Su, Z., Zhang, N., Liu, D., Luan, T. H., Shen, X., et al. (2022). A survey on metaverse: Fundamentals, security, and privacy.
  145. Subrahmanyam, K., & Greenfield, P. (2008). Online communication and adolescent relationships. The Future of Children, 18(1), 119-146. doi:10.1353/foc.0.0006 PMID:21338008
  146. Tambini, D., Leonardi, D., & Marsden, C. T. (2008). Codifying cyberspace: Communications self-regulation in the age of internet convergence. Routledge.
  147. Tamers, S. L., Streit, J., Pana-Cryan, R., Ray, T., Syron, L., Flynn, M. A., Castillo, D., Roth, G., Geraci, C., Guerin, R., Schulte, P., Henn, S., Chang, C.-C., Felknor, S., & Howard, J. (2020). Envision ing the future of work to safeguard the safety, health, and well-being of the workforce: A perspective from the CDC's National Institute for Occupational Safety and Health. American Journal of Industrial Medicine, 63(12), 1065-1084. doi:10.1002/ajim.23183 PMID:32926431
  148. Tandoc, E. C. Jr. (2019). The facts of fake news: A research review. Sociology Compass, 13(9), e12724. doi:10.1111/soc4.12724
  149. Tang (2023).
  150. Topcu-Uzer, C., & Tanrıkulu, I. (2018). Technological solutions for cyberbullying. In Reducing cyberbullying in schools (pp. 33-47). Elsevier. doi:10.1016/B978-0-12-811423-0.00003-1
  151. Topor, D. R., & Budson, A. E. (2020). Twelve tips to present an effective webinar. Medical Teacher, 42(11), 1216-1220. doi:10.1080/0142159X.2020.1775185 PMID:33096974
  152. Tozzo, P., Cuman, O., Moratto, E., & Caenazzo, L. (2022). Family and educational strategies for cyberbullying prevention: A systematic review. International Journal of Environmental Research and Public Health, 19(16), 19. doi:10.3390/ijerph191610452 PMID:36012084
  153. Trabelsi, Z., Mellouli, S., & Khoury, R. (2022). Online content moderation and the challenge of conceptualizing cyberbullying. AIS.
  154. Trompeter, N., Jackson, E., Sheanoda, V., Luo, A., Allison, K. R., & Bussey, K. (2022). Cyberbullying prevalence in Australian adolescents: Time trends 2015-2020. Journal of School Violence, 21(3), 252-265. doi:10.1080/ 15388220.2022.2075881
  155. Tugtekin, U. (2023). The dark side of metaverse learning environments: Potential threats and risk factors. In Shaping the future of online learning: Education in the metaverse (pp. 57-67). IGI Global. doi:10.4018/978- 1-6684-6513-4.ch004
  156. Tyagi, S., & Yadav, D. (2022). A detailed analysis of image and video forgery detection techniques. The Visual Computer, 1-21.
  157. Ünal-Aydın, P., Özkan, Y., Öztürk, M., Aydın, O., & Spada, M. M. (2023). The role of metacognitions in cyberbullying and cybervictimization among adolescents diagnosed with major depressive disorder and anxiety: A case-control study. Clinical Psychology & Psychotherapy. PMID:36634222
  158. Van der Nagel, E. (2017). From usernames to profiles: The development of pseudonymity in internet communication. Internet Histories, 1(4), 312-331. doi:10.1080/24701475.2017.1389548
  159. Wahab, O. A., Bentahar, J., Otrok, H., & Mourad, A. (2020). Optimal load distribution for the detection of VM-based DDoS attacks in the cloud. IEEE Transactions on Services Computing, 13(1), 114-129. doi:10.1109/ TSC.2017.2694426
  160. Wang, H., Li, Z., Li, Y., Gupta, B. B., & Choi, C. (2020). Visual saliency guided complex image retrieval. Pattern Recognition Letters, 130, 64-72. doi:10.1016/j.patrec.2018.08.010
  161. Wang, L., & Jiang, S. (2022). Effectiveness of parent-related interventions on cyberbullying among adolescents: A systematic review and meta-analysis. Trauma, Violence & Abuse, 15248380221137065. doi:10.1177/15248380221137065 PMID:36458864
  162. Wang, P., Hawk, W. B., & Tenopir, C. (2000). Users' interaction with world wide web resources: An exploratory study using a holistic approach. Information Processing & Management, 36(2), 229-251. doi:10.1016/S0306- 4573(99)00059-X
  163. Westerlund, M. (2019). The emergence of deepfake technology: A review. Technology Innovation Management Review, 9(11), 39-52. doi:10.22215/timreview/1282
  164. Whitby, P. (2011). Is your child safe online? Crimson Publishing.
  165. Willard, N. E. (2007). Cyberbullying and cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Research Press.
  166. Williams, M. L., & Pearson, O. (2016). Hate crime and bullying in the age of social media.
  167. Wu, J., Zheng, Z., & Zhao, J. L. (2021). Fairplay: Detecting and deterring online customer misbehavior. Information Systems Research, 32(4), 1323-1346. doi:10.1287/isre.2021.1035
  168. Xiang, T., & Gong, S. (2008). Video behavior profiling for anomaly detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 30(5), 893-908. doi:10.1109/TPAMI.2007.70731 PMID:18369257
  169. Xu, Z., & Zhu, S. (2010). Filtering offensive language in online communities using grammatical relations. In Proceedings of the 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (pp. 1-10). ACM.
  170. Ybarra, M. L., Mitchell, K. J., Finkelhor, D., & Wolak, J. (2007). Internet prevention messages: Targeting the right online behaviors. Archives of Pediatrics & Adolescent Medicine, 161(2), 138-145. doi:10.1001/ archpedi.161.2.138D PMID:17283298
  171. Yoon, H.-S. (2020). A case study on the development of a serious game. Journal of Korea Game Society, 20(2), 45-60. doi:10.7583/JKGS.2020.20.2.45
  172. Yosep, I., Hikmat, R., & Mardhiyah, A. (2023). Preventing cyberbullying and reducing its negative impact on students using e-parenting: A scoping review. Sustainability (Basel), 15(3), 1752. doi:10.3390/su15031752