References
- Abbott, Koloff. 2008. “States Push for Cyberbully Controls.” USA Today.
- Arntfield, Michael. 2015. “Toward a Cybervictimology: Cyberbullying, Routine Activities Theory, and the Anti-Sociality of Social Media.” Canadian Journal of Communication 40: 371–388. doi: 10.22230/cjc.2015v40n3a2863
- Ashktorab, Zarah, and Jennifer Golbeck. 2017. “Beyond Cyberbullying: Self-Disclosure, Harm and Support on ASKfm.” WebSci 17. https://vitak.files.wordpress.com/2009/02/ashktorab_etal-2017-websci.pdf.
- Bauman, Sherry. 2010. “Cyberbullying in a Rural Intermediate School: An Exploratory Study.” The Journal of Early Adolescence 30 (6): 803–833. doi:10.1177/0272431609350927.
- Bhabha, Horni. 1995. “Cultural Diversity and Cultural Differences.” In The Post-Colonial Studies Reader, edited by B. Ashcroft, G. Griffiths, and H. Tiffin, 29–35. London: Routledge.
- Bossler, Adam M., and Thomas J. Holt. 2009. “On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory.” International Journal of Cyber Criminology 3 (1): 400–420.
- Burns, J. H., and H. L. A. Hart. 1977. Jeremy Bentham, A Comment on the Commentaries and A Fragment on Government. Londres: Athlone Press.
- Calvoz, Raul R., Bradley W. Davis, and Mark A. Gooden. 2013. “Cyber Bullying and Free Speech: Striking an Age-Appropriate Balance.” Cleveland State Law Review 61: 357–389.
- Cheng, Le. 2011. “Administration of Justice and Multimodality in Media: Semiotic Translation, Conflict and Compatibility.” International Journal for the Semiotics of Law 24 (4): 491–502. doi: 10.1007/s11196-010-9175-8
- Cheng, Le, and Xin Wang. 2018. “Cyber Asset in Judicial Discourses: A Socio-Semiotic Interpretation.” Social Semiotics. doi:10.1080/10350330.2018.1487110.
- Cohen, Lawrence, and M. Felson. 1979. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44: 588–608. doi: 10.2307/2094589
- Cohn, Neil. 2015. “Will Emoji Become a New Language?” BBC Future. http://www.bbc.com/future/story/20151012-will-emoji-become-a-new-language.
- Dahl, Östen. 1979. “Typology of Sentence Negation.” Linguistics 17: 79–106. doi: 10.1515/ling.1979.17.1-2.79
- Dayton, Tian. 2011. Creating a False Self: Learning to Live a Lie. https://www.huffingtonpost.com/dr-tian-dayton/creating-a-false-self-lea_b_269096.html?guccounter=1.
- Declaration on Strategic Priorities for Cooperation against Cybercrime. 2013. https://rm.coe.int/1680300ad4..
- Deleuze, G., and F. Guattari. 1988. A Thousand Plateaus. Minneapolis: University of Minnesota Press.
- Donegan, Richard. 2012. “Bullying and Cyberbullying: History, Statistics, law, Prevention and Analysis.” The Elon Journal of Undergraduate Research in Communications 3 (1): 33–42.
- Eck, John E., and Ronald V. Clarke. 2003. “Classifying Common Police Problems: A Routine Activity Approach.” Crime Prevention Studies 16: 17–39.
- Eco, Umberto. 1976. A Theory of Semiotics. Bloomington: Indiana University Press.
- EU General Data Protection Regulation (GDPR). 2018. https://gdpr-info.eu.
- Foucault, Michel. 1984. “Of Other Spaces (1967), Heterotopias.” Architecture, Mouvement, Continuité 5: 46–49.
- Glikson, Ella, Arik Cheshin, and Gerben A. van Kleef. 2017. “The Dark Side of a Smiley: Effects of Smiling Emoticons on Virtual First Impressions.” Social Psychological and Personality Science. doi:10.1177/1948550617720269.
- Hall, Stuart. 1992. “The Question of Cultural Identity.” In Modernity: An Introduction to Modern Societies, edited by Stuart Hall, David Held, Don Hubert, and Kenneth Thompson, 596–632. London: Blackwell Publishers.
- Hamilton, Mark A. 2012. “Verbal Aggression: Understanding the Psychological Antecedents and Social Consequences.” Journal of Language and Social Psychology 31 (5): 5–12. doi:10.1177/0261927X11425032.
- Hayward, John O. 2011. “Anti-Cyber Bullying Statutes: Threat to Student Free Speech.” Cleveland State Law Review 59 (1): 85–124.
- Heaven, Douglas. 2017. “Say it with Feeling: The Complex World of Emojis.” NewScientist. https://www.newscientist.com/article/mg23431311-200-say-it-with-feeling-the-complex-world-of-emojis/.
- Herring, Susan C., and Sanja Kapidzic. 2015. “Teens, Gender, and Self-Presentation in Social Media.” In International Encyclopedia of Social and Behavioral Sciences. 2nd ed., edited by J. D. Wright, 85–115. Oxford: Elsevier.
- High, Brenda. 2007. Bullycide in America: Moms Speak out About the Bullying/Suicide Connection. Washington: JBS Publishing. http://www.bullycide.org.
- Holt, Thomas J., and Adam M Bossler. 2008. “Exploring the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” Deviant Behavior 30 (1): 1–25. doi: 10.1080/01639620701876577
- Ipol. 2016. Justice, Freedom and Security. Brussels: Policy Department, Citizens’ Rights and Constitutional Affairs, European Parliament. http://www.europarl.europa.eu/RegData/etudes/IDAN/2016/556944/IPOL_IDA.
- Joinson, Adam N. 1998. “Causes and Effects of Disinhibition on the Internet.” In The Psychology of the Internet, edited by J. Gackenbach, 43–60. New York: Academic Press.
- Joinson, Adam N. 2001. “Self-disclosure in Computer-Mediated Communication: The Role of Self-Awareness and Visual Anonymity.” European Journal of Social Psychology 31 (2): 177–192. doi:10.1002/ejsp.36.
- Kaplan, Andreas M., and Michael Haenlein. 2010. “Users of the World, Unite! The Challenges and Opportunities of Social Media.” Business Horizons 53 (1): 59–68. doi:10.1016/j.bushor.2009.09.003.
- Kirley, Elizabeth, and Marilyn McMahon. 2017. “Emoji and the Law: What Happens When They’re Used to Threaten or Suggest Violence.” ABC News. https://www.abc.net.au/news/2017-12-05/emoji-and-the-law-threatening-suggesting-violence-cases/9227136.
- Knack, J. M., P. Iyer-Eimerbrink, and R. Young. 2016. “Anonymity of Cyberbullying.” In Encyclopedia of Evolutionary Psychological Science, edited by V. Weekes-Shackelford, T. Shackelford, and V. Weekes-Shackelford. Cham: Springer. doi:10.1007/978-3-319-16999-6_2496-1.
- Koebler, Jason. 2011. “Cyber Bullying Growing More Malicious, Expert Say.” US News. https://www.usnews.com/education/blogs/high-school-notes/2011/06/03/cyber-bullying-growing-more-malicious-experts-say.
- Li, Qin. 2007. “New Bottled but Old Wine: A Research of Cyberbullying in Schools.” Computers in Human Behaviors 23: 1777–1791. doi: 10.1016/j.chb.2005.10.005
- Livingstone, Sonia, and Leslie Haddon. 2009. EU Kids Online: Final Report. http://www.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20I%20(2006-9)/EU%20Kids%20Online%20I%20Reports/EUKidsOnlineFinalReport.pdf.
- Luxton, David D., Jennifer D. June, and Jonathan M. Fairall. 2012. “Social Media and Suicide: A Publich Health Perspective.” American Publich Health 102: 195–200. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3477910/ doi: 10.2105/AJPH.2011.300608
- Melucci, Alberto. 1996. Challenging Codes: Collective Action in the Information Age. New York: Cambridge University Press.
- Metaclf, Katrin Nyman. 2018. “A Legal View on Outer Space and Cyberspace: Similarities and Differences.” Tallin Paper 10: 1–11.
- Miethe, Terrance D., and Robert F. Meier. 1994. Crime and its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations. Albany: State University of New York Press.
- Neppe, M. Vernon, and Edward R. Close. 2011. “Applying Consciousness, Infinity and Dimensionality Creating a Paradigm Shift – Introducing the Triadic Dimensional Distinction Vortical Paradigm.” Neuro Quantology 9 (3): 375–392.
- Oràsan, Constantin. 2018. “Aggressive Language Identification Using Word Embeddings and Sentiments Features.” Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying, 113–119. http://aclweb.org/anthology/W18-4414.
- Paget, Matthew M. 2012. “Sticks, Stones, and Cyberspaces: On Cyberbullying and the Limits of Student Speech.” School Law Bulletin 2: 45–65. http://sogpubs.unc.edu/electronicversions/pdfs/slb1202.pdf.
- Power, Aurelia, Anthony Keane, Brian Nolan, and Brian O'Neill. 2018. “Detecting Discourse-Independent Negated Forms of Public Textual Cyberbullying.” Journal of Computer-Assisted Linguistic Research 2: 1–20. doi:10.4995/jclr.2018.8917.
- Pratt, Travis, Kristy Holtfreter, and Michael Reisig. 2010. “Routine Activity & Internet Fraud Targeting: Extending the Generality of Routine Activity Theory.” Journal of Research in Crime & Delinquency 47 (3): 267–296. doi: 10.1177/0022427810365903
- Putri, Sukma Ari Ragil, and A. A. I. Prinhandari Satvikadewi. 2017. “A Critical Discourse Analysis Study of Cyberbullying in LGBTQ’S Instragram Account.” SHS Web of Conferences 33: 25–32. https://www.shs-conferences.org/articles/shsconf/pdf/2017/01/shsconf_icome2017_00071.pdf doi: 10.1051/shsconf/20173300071
- Reyns, Bradford W., Billy Henson, and Bonnie S. Fisher. 2011. “Being Pursued Online: Applying Cyberlifestyle-Routine Activities Theory to Cyberstalking Victimization.” Criminal Justice and Behavior 38 (11): 1149–1169. doi: 10.1177/0093854811421448
- Roberts, Joshua W., and Scott A. Hunt. 2012. “Social Control in a Sexually Deviant Cybercommunity: A Cappers’ Code of Conduct.” Deviant Behavior 33 (10): 757–773. doi: 10.1080/01639625.2012.679894
- Royce, Winston W. 1970. “Managing the Development of Large Software System.” http://www-scf.usc.edu/~csci201/lectures/Lecture11/royce1970.pdf.
- Runions, Kevin C., and Michal Bak. 2015. “Online Moral Disengagement, Cyberbullying, and Cyber-Aggression.” Cyberpsychology, Behavior, and Social Networking 18 (7): 400–405. doi:10.1089/cyber.2014.0670.
- School Violence and Bullying – Global Status Report (Unesco Report, Education 2030). 2017. http://unesdoc.unesco.org/images/0024/002469/246970e.pdf.
- Solove, Daniel J. 2008. The Future of Reputation: Gossip, Rumor and Privacy on the Internet. Yale, CT: Yale University Press.
- Suler, John. 2004. “The Online Disinhibition Effect.” Cyber Psychology & Behaviour 7 (3): 321–326. doi:10.1089/1094931041291295.
- Tanaka-Ishii, Kumiko. 2013. “Semiotics of Void and Information Representation.” In Design, User Experience, and Usability. Design Philosophy, Methods, and Tools, edited by A. Marcus, DUXU 2013, Lecture Notes in Computer Science, Vol. 8012, 152–161. Berlin: Springer. doi:10.1007/978-3-642-39229-0_18.
- Tedford, Thomas L., Dale A. Herbeck, and Saul Franklin Haiman. 2009. Freedom of Speech in the United States. 6th ed. State College, PA: Strata Publishing Inc.
- Undheim, Anne Mari, and Anne Mari Sund. 2010. “Prevalence of Bullying and Aggressive Behavior and Their Relationship to Mental Health Problems Among 12- to 15-Year-Old Norwegian Adolescents.” European Child & Adolescent Psychiatry 19 (11): 803–811. doi: 10.1007/s00787-010-0131-7
- Wagner, Anne. 2016. “A Space in-Between—Legal Translation as a ‘Third Space’.” Journal of Civil Law Studies 9 (1): 167–190.
- Wagner, Anne. 2018. “Structuralist Semiotics of Law.” In Encyclopedia of the Philosophy of Law and Social Philosophy, edited by M. Sellers and S. Kirste. Dordrecht: Springer. doi:10.1007/978-94-007-6730-0_185-2.
- Wagner, Anne, and Le Cheng. 2011. Exploring Courtroom Discourse: The Language of Power and Control. London: Ashgate.
- Waseem, Zeerak, Thomas Davidson, Dana Warmsley, and Ingmar Weber. 2017. “Understanding Abuse: A Typology of Abusive Language Detection Subtasks.” Proceedings of the First Worships on Abusive Language Online, Vancouver, Canada, 78–84. http://aclweb.org/anthology/W17-3012.
- Weiser, Benjamin. 2015. “At Silk Road Trial, Lawyers Fight to Include Evidence They Call Vital: Emoji.” New York Times. https://www.nytimes.com/2015/01/29/nyregion/trial-silk-road-online-black-market-debating-emojis.html?_r=0.