<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000nam a22000004a 4500</leader>
  <controlfield tag="001">UP-1686042739784961170</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20251003102256.0</controlfield>
  <controlfield tag="006">a     r     001 0 </controlfield>
  <controlfield tag="007">ta</controlfield>
  <controlfield tag="008">240510s2021    ii      r     001 0 eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">978-93-52697-55-7 (hardbound)</subfield>
  </datafield>
  <datafield tag="037" ind1=" " ind2=" ">
   <subfield code="a">MC-27503</subfield>
   <subfield code="b">Belview</subfield>
   <subfield code="c">Php 4,250.00</subfield>
  </datafield>
  <datafield tag="040" ind1="0" ind2=" ">
   <subfield code="a">DMC</subfield>
   <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="041" ind1="0" ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="090" ind1="0" ind2="0">
   <subfield code="a">HV 6773</subfield>
   <subfield code="b">I58 2021</subfield>
  </datafield>
  <datafield tag="100" ind1="0" ind2=" ">
   <subfield code="a">Random Publications</subfield>
   <subfield code="e">author</subfield>
  </datafield>
  <datafield tag="110" ind1="0" ind2=" ">
   <subfield code="a">Random Publications</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">International perspectives on cyberbullying</subfield>
   <subfield code="c">Random Publications.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="0">
   <subfield code="a">New Delhi</subfield>
   <subfield code="b">Random Publications</subfield>
   <subfield code="c">2021</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">viii, 282 pages</subfield>
   <subfield code="b">illustrations (black and white)</subfield>
   <subfield code="c">24 cm. </subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">unmediated</subfield>
   <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">volume</subfield>
   <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="520" ind1="0" ind2=" ">
   <subfield code="a">Cyberbullies use the anonymity that the internet provides to continuously provoke and taunt an individual or group of individuals. This book brings together an international group of experts to present the latest psychosocial and developmental criminological research on cyberbullying, cybervictimization and intervention. Cyberbullying derives from bullying, which is defined loosely as &quot;any unwanted behavior&quot;. It involves intentionally putting down another person, threatening another person, joking on another person, and making that person feel worthless via electronic means. Most people who think of cyberbullying generally only think of another person ganging up on another person through Facebook or twitter. It is way more than that. Sending a text to a friend telling them something mean about another person is also cyberbullying. Downgrading other players on Xbox is also cyberbullying. Creating a fake profile to intentionally trick/harass someone is cyberbullying. Even though most of these things are done anonymously and it may never get back to that person it is intentionally putting someone down via electronics. The aim of this study was to gain  a better understanding of the impact of cyber bullying on students and the possible need for prevention messages targeting students, educators and parents. &#13;
&#13;
Contents: 1. Introduction, 2. Next Generation Mobile Networks, 3. Cyberbullying Tactics, 4. Social Media and Gaming, 5. New Generation Attacks, 6. Child Pornography, 7. Cyber-situational awareness, 8. The Already Big Thing on the Internet, 9. Cyber intelligence and traditional approaches, 10. Foundations of Internet Surveillance Studies, 11. Computer Insecurity: Security and Systems Design</subfield>
   <subfield code="c">Provided by Publisher</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Cybercrime.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Computer security  .</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Electronic surveillance .</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Child pornography .</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Khan, Mohammad Azvar</subfield>
   <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPD</subfield>
   <subfield code="b">DMC</subfield>
   <subfield code="h">HV 6773</subfield>
   <subfield code="i">I58 2021</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Book</subfield>
  </datafield>
 </record>
</collection>
