skip to main content
10.1145/2984393.2984399acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesseeda-cecnsmConference Proceedingsconference-collections
research-article

Communication Security & Cyberbullying: A Review of the Legal Issues

Published: 25 September 2016 Publication History

Abstract

The research of legal issues concerning the Cyberspace is complex because it requires not only legal but also technical knowledge. The present paper examines the challenges and answers stemming from three main research questions: a) are there gaps in legislation concerning Cyberbullying? b) Does the penal legislator consider security in cyberspace as a legal asset? c) How is Cyberbullying treated in the legal system? By taking into account the existing legal and social dimensions of the issue, and triggered by those three research questions, we conclude that the creation of a global framework of Internet behavior rules, Internet legislation and communication security policies is absolutely necessary.

References

[1]
Sfakianakis, E., Siomos, K., Floros, G. (2012). Internet addiction and other internet behaviors of high risk. Athens: Livanis Publishing.
[2]
Smith, P., Mahdavi, J., Carvalho, M., Fisher, S., Russel, S., Tipett, N. (2007), Cyberbullying: It's nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49(4), 376--385.
[3]
Aggelis, I., (2000). Internet and Penal Law, Crime in cyberspace. Criminal Chronicles, pp. 675 et seq., Ed. Law and Economy, P.N.Sakkoulas, Athens.
[4]
Mylonopoulos, Chr., (1991). Electronic computers and Penal Law. Ant. N. Sakkoulas Publishers.
[5]
Diaplous library, (2015). Internet and law. Retrieved from: http://goo.gl/x0T9ud
[6]
Kouros, K., (2015). Electronic Crime. Hellenic Police, Retrieved from: http://goo.gl/Oi3XDa.
[7]
Antoniadou, N., Kokkinos, C., (2013). Cyber-bullying and cyber-victimization among children and adolescents: Frequency and risk factors. Preschool and School Education, Volume 1, Issue 1, pp. 138--169 Laboratory of Educational Research and Applications, Department of Preschool Education, University of Crete.
[8]
Kaplan, A.M., Haenlein, M., (2010). Users of the world, unite! The challenges and opportunities of Social Media. France: Business Horizons.
[9]
O'Brien, L, Moules, T., (2010). The impact of cyber-bullying on young people's mental health. Retrieved from: http://goo.gl/AZeWrM
[10]
Grigoraki, M., Peraki, F., Politi, A., (2014), Cyberbullying on social media: A study in prepubertal and pubertal children aged 11--15, that are studying in schools in Piraeus. Journal Neos Paidagogos.
[11]
Notar, C. E., Padgett, S., Roden, J., Cyberbullying: A Review of the Literature, 2013. Universal Journal of Educational Research, 1, 1--9.
[12]
Willard E. N., Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress, 2005. OSDFS National Conference, US Department of Education.
[13]
Brown, K., Jackson, M., Cassidy, W., Cyber-Bullying: Developing Policy to Direct Responses that are Equitable and Effective in Addressing This Special Form of Bullying. 2006. Canadian Journal of Educational Administration and Policy, n57 p1--36.
[14]
Kyriazi, N., (2003). Jennifer M., Conducting of qualitative research, Scientific editing. Athens, Ellinika Grammata Editions.
[15]
Willard, N. (2007). Cyberbullying and Cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Champaign, IL: Research Press.
[16]
Nikolopoulos, D., (2009). Electronic Harassment: A modern threat. In S., Alivizos (Editor) Educational Dimensions of the new instruments, pp. 88--117. Athens, Grigoris Editions.
[17]
Aftab, P., (2006). What methods work with the different kinds of cyberbullies? Retrieved from http: http://goo.gl/44qEuF
[18]
Anderson, T., Sturm, B., (2007), Cyberbullying: From Playground to computer. Young Adult Library. Services, 5 (9).
[19]
Bruhn, D., (2010). Cyberbullying among German and Dutch adolescents -- research on siblings' influence and factors revelant for prevention and intervention (Master). University of Twente.
[20]
Floros, G.D., Simos, K. E., Fisoun, V., Dafouli, E., and Geroukalis, D., (2013), Adolescent online cyberbullying in Greece: The impact of parental online security practices, bonding, and online impulsiveness. Journal of School Health, 83(6), 445--453.
[21]
Hinduja, S., Patchin, J. W., (2009). Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks, CA: Sage Publications.
[22]
Kowalski, R. M., Limber, S. P., Agatston, P.W., (2008). Cyber Bullying: Bullying in the Digital Age. Malden, MA: Wiley-Blackwell.
[23]
Schneider, S.K., O'Donnell, L, Stueve, A., and Coulter, R.W.S. (2012). Cyberbullying, school bullying, and psychological distress: A regional census of high school students. American Journal of Public Health, 102(1), 171--177.
[24]
Brighi, A., Melotti, G., Guarini, A., Genta, M. L., Ortega, R., Mora-Merchán, J., Smith, P. K, and Thompson, F., (2012). Self-Esteem and Loneliness in Relation to Cyberbullying in Three European Countries, in Cyberbullying in the Global Playground: Research from International Perspectives (eds Q. Li, D. Cross and P. K. Smith), Wiley-Blackwell, Oxford, UK.
[25]
Hinduja, S., Patchin, W., (2010). Bullying, Cyberbullying, and Suicide. Archives of Suicide Research 14(3), 206--221.
[26]
Kowalski, R. M., Limber, S. P., (2013). Psychological, Physical, and Academic Correlates of Cyberbullying and Traditional Bullying. Journal of Adolescent Health, 53(1), S13--S20.
[27]
Patchin, J. W., Hinduja, S., (2010). Cyberbullying and self-esteem. Journal of School Health, 80(12), 614--621.
[28]
Wang, J., Nansel, T. R., Iannotti, R. J., (2011). Cyber Bullying and Traditional Bullying: Differential Association with Depression. Journal of Adolescent Health, 48(4): 415--417.
[29]
Hinduja, S., Patchin, J. W., (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Violence, 6(3), 89--112.
[30]
Hinduja, S., Patchin, J. W., (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129--156.
[31]
Hinduja, S., Patchin, J. W., (2013). Cyberbullying Research: 2013 Update. Retrieved from: http://goo.gl/OukpM4
[32]
Avgerinaki, E. Gkritzalis, S. (2014). Cyberbullying: Modern technical legal, regulatory and ethical issues. Master thesis, Open University of Cyprus.
[33]
Baumberger, B., Bondolfi, T., Flaction E., Glassey, O., (2010) ≪Cyberbullying in Switzerland≫ CyberTraining 2008-2010
[34]
COST Action ISO801, workshop 2, (2010). The legal aspects of cyberbullying, University of Antwerp, Belgium, 26 May 2010
[35]
Mc Guckin, C., O' Moore, M., & Crowley, N., (2010). Cyberbullying-The situation in Ireland-Country Report. Anti Bullying Research and Resource Centre, Trinity College, Uublin, Ireland, CyberTraining 2008-2010
[36]
Calmaestra, J., Ortega, R., Maldonado A., and Mora-Merchán, J., A., (2010). ≪Exploring Cyberbullying in Spain-Country Report≫, University of Cordoba, Autonomous University of Madrid, University of Seville, CyberTraining 2008-2010
[37]
Amado, J., Matos, A., and Pessoa, T., (2010). Cyberbullying - Approaches in Portugal - Country Report. University of Coimbra, Portugal, CyberTraining 2008-2010.
[38]
Aggelopoulos, D., (2012). Cyberspace the International "Evolvement" in the greek "Be". Magazine of the Greek Company for Strategic Studies, Retrieved from: http://goo.gl/3mEJeU, April 1, 2015.
[39]
Jäger, T., Arbinger, R., & Lissmann, U., (2010) Cyberbullying - The Situation in Germany. Country Report, Zentrum für empirische pädagogische Forschung (zepf), University of Koblenz-Landau, Germany, CyberTraining 2008-2010
[40]
ADAM, (2008). CyberTraining -- A Research-based Training Manual On Cyberbullying. Project Number142237-LLP-1-2008-1-DE-LEONARDO-LMP
[41]
TACTICS, Mapping responsibilities and structures of the implementation of child safety policies at EU, national, regional and local level: An exploratory study using a modified organigraphs approach, Retrieved from: http://www.childsafetyeurope.org/tactics/info/final-report-mapping.pdf

Cited By

View all
  • (2022)Uncovering Adverse Childhood Experiences (ACEs) from Clinical Narratives within the Electronic Health RecordProceedings of the ACM on Human-Computer Interaction10.1145/35556056:CSCW2(1-29)Online publication date: 11-Nov-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SEEDA-CECNSM '16: Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference
September 2016
126 pages
ISBN:9781450348102
DOI:10.1145/2984393
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 September 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Communication Security
  2. Cyberbullying
  3. Legislation

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SEEDA-CECNSM '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)21
  • Downloads (Last 6 weeks)2
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Uncovering Adverse Childhood Experiences (ACEs) from Clinical Narratives within the Electronic Health RecordProceedings of the ACM on Human-Computer Interaction10.1145/35556056:CSCW2(1-29)Online publication date: 11-Nov-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media