المراجع الأجنبية

  1. Aarseth, E. (2001). Computer game studies, year one. Game studies, 1(1), 1-15.
  2. Alvarez-García, D., Nunez, J. C., Barreiro-Collazo, A., & Garcia, T. (2017). Validation of the Cybervictimization Questionnaire (CYVIC) for adolescents. Computers in Human Behavior, 70, 270-281.‏
  3. Ancis, J. R. (2020). The Age of Cyberpsychology: An Overview. Technology, Mind, and Behavior, 1(1).‏
  4. Arrieta, A. B., Díaz-Rodríguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., … & Herrera, F. (2020). Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI. Information Fusion58, 82-115.‏
  5. Baker, K. D., & Ray, M. (2011). Online counseling: The good, the bad, and the possibilities. Counselling Psychology Quarterly24(4), 341-346.‏
  6. Bastemur, S., & Bastemur, E. (2015). Technology based counseling: perspectives of Turkish counselors. Procedia-Social and Behavioral Sciences176, 431-438.‏
  7. Bennion, M. R., Hardy, G. E., Moore, R. K., Kellett, S., & Millings, A. (2019). e-Therapies in England for stress, anxiety or depression: how are apps developed? A survey of NHS e-therapy developers. BMJ health & care informatics26(1).‏
  8. Botella, C., Garcia-Palacios, A., Baños, R., & Quero, S. (2009). Cybertherapy: Advantages, limitations, and ethical issues. PsychNology Journal, 7, 77-100.
  9. Carras, M. C., Van Rooij, A. J., Van de Mheen, D., Musci, R., Xue, Q. L., & Mendelson, T. (2017). Video gaming in a hyperconnected world: A cross-sectional study of heavy gaming, problematic gaming symptoms, and online socializing in adolescents. Computers in Human Behavior68, 472-479.‏
  10. Chiappetta, M. (2017). The Technostress: definition, symptoms and risk prevention. Senses and Sciences4(1).‏
  11. Combes, B. (2021). The Net Generation: Tech-savvy or lost in virtual space?. In IASL Annual Conference Proceedings.10.29173/iasl7966.
  12. Coughlan, J.J. & Mullins, Cormac. (2020). Communication in the Time of Corona: The Rise of the Virtual Clinic. Health management. 20. 549-552.
  13. Egnatoff, W. J. (1999). Tapscott, D.(1998). Growing Up Digital. The Rise of the Net Generation. New York: McGraw Hill. xii+ 338. ISSN 0-07-063361-4. Web site: www. growingupdigital. com. Education and Information Technologies4(2), 203-205.
  14. Gaggioli, A. (2017). Cyberpsychology Meets the Internet of Things. Cyberpsychology, Behavior, and Social Networking, 20(3), 208-209.‏
  15. Griffths, M. D. (2020). Internet use disorders: What’s new and what’s not?: Commentary on: How to overcome taxonomical problems in the study of Internet use disorders and what to do with “smartphone addiction”? (Montag et al., 2019). Journal of Behavioral Addictions, 9(4), 934–937.
  16. Grigg, D. W. (2010). Cyber-aggression: Definition and concept of cyberbullying. Australian Journal of Guidance and Counselling20(2), 143.‏
  17. Grimes, P. W., Millea, M. J., & Woodruff, T. W. (2004). Grades—Who’s to blame? Student evaluation of teaching and locus of control. The Journal of Economic Education35(2), 129-147.‏
  18. Hanurawan, F., Chusniyah, T., Rahmawati, H., & Hutagalung, F. D. (2021). Cyber Aggression between Intentions and Cyber Wellness of Students: An application of TPB Models. International Journal of Instruction, 14(2), 67-82.‏
  19. Hilton, R. (2006). Gaming as an Education tool. Journal of Young Consumers, 7 (2), 14-19.
  20. Hurley, O. A. (2021). Sport Cyberpsychology in Action During the COVID-19 Pandemic (Opportunities, Challenges, and Future Possibilities): A Narrative Review. Frontiers in Psychology12, 424.‏
  21. Hwang, Y., Choi, I., Yum, J. Y., & Jeong, S. H. (2017). Parental mediation regarding children’s smartphone use: Role of protection motivation and parenting style. Cyberpsychology, Behavior, and Social Networking20(6), 362-368.‏
  22. Koops, B. J., & Leenes, R. (2006). Identity theft, identity fraud and/or identity-related crime. Datenschutz und Datensicherheit-DuD30(9), 553-556.‏
  23. Kuss, D. (2017). Mobile technology and social media. Human Development, 60(4), 141-143.‏
  24. Lapidot-Lefler, N., & Barak, A. (2012). Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in human behavior28(2), 434-443.‏
  25. Lapidot-Lefler, N., & Barak, A. (2015). The benign online disinhibition effect: Could situational factors induce self-disclosure and prosocial behaviors?. Cyberpsychology: Journal of Psychosocial Research on Cyberspace9(2).‏
  26. Lim, V. K., & Teo, T. S. (2009). Mind your E-manners: Impact of cyber incivility on employees’ work attitude and behavior. Information & Management46(8), 419-425.‏
  27. Lindenberg, K., Halasy, K., Szász-Janocha, C., & Wartberg, L. (2018). A phenotype classification of internet use disorder in a large-scale high-school study. International journal of environmental research and public health, 15(4), 733.‏
  28. Maurer, M. M. (1994). Computer anxiety correlates and what they tell us: A literature review. Computers in Human Behavior10(3), 369-376.‏
  29. Mardianto, Mardianto & Hanurawan, Fattah & Chusniyah, Tutut & Rahmawati, Hetti & Malang, Negeri. (2019). Cyber Aggression of Students: The Role and Intensity of the Use of Social Media and Cyber Wellness. 5. 567-582.
  30. Moujahdi, C., Ghouzali, S., Mikram, M., Abdul, W., & Rziza, M. (2014). Inter-communication classification for multi-view face recognition. Int. Arab J. Inf. Technol.11(4), 387-395.‏
  31. Meredith, J. (2020). Conversation analysis, cyberpsychology and online interaction. Social and Personality Psychology Compass, 14(5), 285-294.‏
  32. Newman, J. (2002). In search of the videogame player: The lives of Mario. New media & society4(3), 405-422.‏
  33. Oguama, L. (2021). Domain Name Theft–Cybersquatting: What It Means for Trade Marks. Available at SSRN 3837629.‏
  34. Paik, C. M., & Michael, W. B. (2002). Further psychometric evaluation of the Japanese version of an academic self-concept scale. The Journal of psychology136(3), 298-306.‏
  35. Parsons, T. D., Gaggioli, A., & Riva, G. (2020). Extended Reality for the Clinical, Affective, and Social Neurosciences. Brain Sciences10(12), 922.‏
  36. Prensky, M. (2001). Digital natives, digital immigrants part 2: Do they really think differently?. On the horizon. 9. 1-6.
  37. 46. Rahwan, I., Cebrian, M., Obradovich, N., Bongard, J., Bonnefon, J. F., Breazeal, C., … & Wellman, M. (2019). Machine behaviour. Nature568(7753), 477-486.‏ ‏
  38. Salicetia, F. (2015). Internet addiction disorder (IAD). Procedia-Social and Behavioral Sciences, 191, 1372-1376.
  39. Schlegel, C., Geering, A., & Weber, U. (2021). Learning in virtual space: An intergenerational pilot project. GMS Journal for Medical.
  40. Selkie, E., Evans, Y., Ton, A., Midamba, N., & Moreno, M. A. (2018). Ideas for addressing electronic harassment among adolescents attending a video blogging convention. BMC public health18(1), 1-8.‏
  41. Singh, A. K., & Singh, P. K. (2019). Recent Trends, Current Research in Cyberpsychology: a literature review. Library Philosophy and Practice, NA-NA.‏
  42. Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008) Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49(4), 376–385.
  43. Solo, Ashu. (2020). FIGHTING ONLINE DEFAMATION, DOXING, AND IMPERSONATION. 93-97. 10.33965/its_ste2020_202001R013.
  44. Sorkhabi, O. M. (2021). Deep learning in geodesy. DOI: 10.21203 /rs.3.rs-446466/v2.
  45. Strupczewski, G. (2021). Defining cyber risk. Safety science135, 105143.‏
  46. Suler, J. (2004). The online disinhibition effect. Cyberpsychology & behavior7(3), 321-326.‏
  47. Tachi, S., Arai, H., Maeda, T., Oyama, E., Tsunemoto, N., & Inoue, Y. (1991). Tele-existence in real world and virtual world. In Fifth International Conference on Advanced Robotics’ Robots in Unstructured Environments (pp. 193-198). IEEE.
  48. Tao, J., & Tan, T. (2005). Affective computing: A review. In International Conference on Affective computing and intelligent interaction (pp. 981-995). Springer, Berlin, Heidelberg.
  49. Taylor, J. E. T., & Taylor, G. W. (2020). Artificial cognition: How experimental psychology can help generate explainable artificial intelligence. Psychonomic Bulletin & Review, 1-22.‏
  50. Torres-Rodríguez, A., Griffiths, M. D., Carbonell, X., & Oberst, U. (2018). Internet gaming disorder in adolescence: Psychological characteristics of a clinical sample. Journal of Behavioral Addictions7(3), 707-718.‏
  51. Tuli, T. B., Terefe, T. O., & Rashid, M. M. U. (2020). Telepresence Mobile Robots Design and Control for Social Interaction. International Journal of Social Robotics, 1-10.
  52. Umejiaku, N. O., & Anyaegbu, M. I. (2016). LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA. International Journal of Computer & Technology15, 7130-7139.‏
  53. Work, S. P. S. Policing on Preventing Cyber Fraud in Indonesia. 10.13140/RG.2.2.14771.55844.
  54. Wright, M. F., & Wachs, S. (2019). Adolescents’ psychological consequences and cyber victimization: the moderation of school-belongingness and ethnicity. International journal of environmental research and public health, 16(14), 2493.‏
  55. Yee, N., & Bailenson, J. (2007). The Proteus effect: The effect of transformed self-representation on behavior. Human communication research, 33(3), 271-290.‏
  56. Young ,K.(1996). Internet addiction :The emergence of a new clinical disorder. University of Pittsburgh at Bradford. Paper Presented at the104th annual meeting of the American Psychological Association,August15,Toronto,Canada.
  57. Zainudin, Z. N., Asri, A. S., Talib, M. A., Hassan, S. A., Ahmad, N. A., & Yusop, Y. M. (2020). The Prevalence of Cyber-Counselling: A Systematic Literature Review on Effectiveness and Preferences. International Journal of Academic Research in Business and Social Sciences, 10(10), 731-751.‏

اترك تعليقًا

لن يتم نشر عنوان بريدك الإلكتروني. الحقول الإلزامية مشار إليها بـ *