Analysis of Cyber-bullying in a virtual social networking
暂无分享,去创建一个
Arturo Hernández Aguirre | Carlos Alberto Ochoa Ortíz Zezzatti | Alberto Hernandez | Julio César Ponce Gallegos | Rubén Jaramillo-Vacio | Francisco Ornelas | Daniel Azpeitia | Arturo Elías | A. H. Aguirre | C. A. O. Zezzatti | Rubén Jaramillo-Vacio | Francisco Ornelas | Alberto Hernandez | D. Azpeitia | A. Elías
[1] Roberto Leombruni,et al. A Common Protocol for Agent-Based Social Simulation , 2006, J. Artif. Soc. Soc. Simul..
[2] Scott Lobdell,et al. Identity Theft , 2006 .
[3] René Santaolaya Salgado,et al. Use of Agents to Realize a Federated Searching of Learning Objects , 2010, PAAMS.
[4] Ron Sun. Individual action and collective function: From sociology to multi-agent learning , 2001, Cognitive Systems Research.
[5] Adem Karahoca,et al. Data Mining and Knowledge Discovery in Real Life Applications , 2009 .
[6] Peter K. Smith,et al. Cyberbullying: another main type of bullying? , 2008, Scandinavian journal of psychology.
[7] Yale E Cohen,et al. Who Goes There? , 1999, Neuron.
[8] M. Macy,et al. FROM FACTORS TO ACTORS: Computational Sociology and Agent-Based Modeling , 2002 .
[9] Barbara L. Ludlow,et al. Book and Software Review: Cyber Law: Maximizing Safety and Minimizing Risk in Classrooms , 2010 .
[10] James T. Carmichael. ChatSafe ( Patent Pending , 2022 .
[11] María Ángeles Hernández Prados,et al. Ciberbullying, un problema de acoso escolar , 2012 .
[12] Justin W. Patchin,et al. Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. , 2008, Journal of adolescence.
[13] Justin W. Patchin,et al. Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.
[14] Justin W. Patchin,et al. Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .
[15] Karl Rihaczek,et al. 1. WHAT IS DATA MINING? , 2019, Data Mining for the Social Sciences.
[16] John G. Palfrey,et al. Enhancing child safety and online technologies : final report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States , 2010 .
[17] Ian Witten,et al. Data Mining , 2000 .
[18] Latanya Sweeney. Protecting job seekers from identity theft , 2006, IEEE Internet Computing.
[19] G. McNair,et al. Identity Theft , 2007, The SAGE Encyclopedia of Criminal Psychology.