2020
DOI: 10.1007/s12243-020-00785-0
|View full text |Cite
|
Sign up to set email alerts
|

Understanding cyberbullying as an information security attack—life cycle modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 61 publications
0
2
0
Order By: Relevance
“…When a teenager repeatedly harasses others or encourages others to do the same on social networking sites is called cyberbullying. 93 Cyber-grooming can be defined as when an adult establishes a relationship with a minor and sexually harasses or abuses them. Teenagers are extremely vulnerable to these types of cyber-attacks due to their immature age.…”
Section: Modern Social Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…When a teenager repeatedly harasses others or encourages others to do the same on social networking sites is called cyberbullying. 93 Cyber-grooming can be defined as when an adult establishes a relationship with a minor and sexually harasses or abuses them. Teenagers are extremely vulnerable to these types of cyber-attacks due to their immature age.…”
Section: Modern Social Threatsmentioning
confidence: 99%
“… Cyberbullying and cyber‐grooming attack : It is a modern practice of online harassment where the adversary uses the digital platform, to track a victim user on OSN. When a teenager repeatedly harasses others or encourages others to do the same on social networking sites is called cyberbullying 93 . Cyber‐grooming can be defined as when an adult establishes a relationship with a minor and sexually harasses or abuses them.…”
Section: Privacy and Security Threats In Osnsmentioning
confidence: 99%