Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Masquerade

Handbook of Research on Bullying in Media and Beyond
Pretending to be someone else and sending or posting that makes that person look bad or places that person in potential danger.
Published in Chapter:
Cyberbullying Issues
Amina Parveen (University of Kashmir, India), Shazia Jan (University of Kashmir, India), and Insha Rasool (University of Kashmir, India)
Copyright: © 2023 |Pages: 17
DOI: 10.4018/978-1-6684-5426-8.ch027
Abstract
Bullying is the intentional harming and humiliation of others, particularly those who are smaller, weaker, younger, or more vulnerable than the bully. Cyberbullying is defined as bullying that happens via the use of modern technologies. The anonymous internet propagation of nasty remarks about a person is referred to as cyberbullying. Cyberbullying is a burning issue, and it's important to evaluate the implications of cyber aggression on individuals of all ages, particularly adolescents and emerging adults, and to provide some insight into how individuals cope with or handle cyberbullying. The aim of this chapter is to explore and discuss the idea of cyberbullying including its various forms and methods. The reasons for cyberbullying, cyberbullying consequences, prevalence of cyberbullying, and gender disparities in cyberbullying are also discoursed. Different prevention and intervention strategies are also be explored and discussed in order to combat cyberbullying.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Machine Learning Techniques to Mitigate Security Attacks in IoT
A malicious node may act as another legitimate node to capture the message in the network.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Implementing Information Security Using Multimodal Biometrics
It is a form of active attack when one entity pretends to be another entity.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR