![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/ijcbpl/ijcbpl5.bht:"
@article{DBLP:journals/ijcbpl/Alim15, author = {Sophia Alim}, title = {Analysis of Tweets Related to Cyberbullying: Exploring Information Diffusion and Advice Available for Cyberbullying Victims}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {4}, pages = {31--52}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015100103}, doi = {10.4018/IJCBPL.2015100103}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/Alim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/ArellanoGZ15, author = {Bertha Alicia Ben{\'{\i}}tez Arellano and Lorena Yadira Alem{\'{a}}n de la Garza and Marcela Georgina G{\'{o}}mez Zerme{\~{n}}o}, title = {Communicative Competency Development for High-School Students with a Multimedia Learning Strategy}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {4}, pages = {18--30}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015100102}, doi = {10.4018/IJCBPL.2015100102}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/ArellanoGZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/BakerJ15, author = {Amy E. Baker and Debora Jeske}, title = {Assertiveness and Anxiety Effects in Traditional and Online Interactions}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {3}, pages = {30--46}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015070103}, doi = {10.4018/IJCBPL.2015070103}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/BakerJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/BettsS15, author = {Lucy R. Betts and Karin A. Spenser}, title = {"A Large Can of Worms": Teachers' Perceptions of Young People's Technology Use}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {2}, pages = {15--29}, year = {2015}, url = {https://doi.org/10.4018/ijcbpl.2015040102}, doi = {10.4018/IJCBPL.2015040102}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/BettsS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/Charoensukmongkol15, author = {Peerayuth Charoensukmongkol}, title = {Social Media Use and Job Performance: Moderating Roles of Workplace Factors}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {2}, pages = {59--74}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015040105}, doi = {10.4018/IJCBPL.2015040105}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/Charoensukmongkol15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/Chowdhury15, author = {Wahida Chowdhury}, title = {Are Warnings from Online Users Effective?: An Experimental Study of Malware Warnings Influencing Cyber Behaviour}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {2}, pages = {44--58}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015040104}, doi = {10.4018/IJCBPL.2015040104}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/Chowdhury15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/CloughC15, author = {Bonnie A. Clough and Leanne M. Casey}, title = {Therapy on the Move: The Development of a Therapeutic Smartphone Application}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {1}, pages = {33--41}, year = {2015}, url = {https://doi.org/10.4018/ijcbpl.2015010103}, doi = {10.4018/IJCBPL.2015010103}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/CloughC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/Erickson15, author = {Joan J. Erickson}, title = {To Play or to Learn?: {A} Review of Game-Based Math Learning for Motivation and Cognition}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {1}, pages = {56--74}, year = {2015}, url = {https://doi.org/10.4018/ijcbpl.2015010105}, doi = {10.4018/IJCBPL.2015010105}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/Erickson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/HackerHWZHAH15, author = {Robyn L. Hacker and Amanda O. Hardy and Jacqueline Webster and Xue Zhang and John J. Horan and Robert K. Atkinson and Judith Homer}, title = {The Impact of Ethnically Matched Animated Agents (Avatars) in the Cognitive Restructuring of Irrational Career Beliefs Held by Young Women: Diverse Findings from Four Randomized Clinical Trials}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {3}, pages = {1--12}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015070101}, doi = {10.4018/IJCBPL.2015070101}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/HackerHWZHAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/JafarkarimiSSH15, author = {Hosein Jafarkarimi and Alex Tze Hiang Sim and Robab Saadatdoost and Jee Mei Hee}, title = {Individual Characteristics and Hacking, Piracy, Online Gambling and Pornography Use among Students: {A} Study in Malaysia}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {2}, pages = {30--43}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015040103}, doi = {10.4018/IJCBPL.2015040103}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/JafarkarimiSSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/JonesTR15, author = {Helen S. Jones and John N. Towse and Nicholas J. P. Race}, title = {Susceptibility to Email Fraud: {A} Review of Psychological Perspectives, Data-Collection Methods, and Ethical Considerations}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {3}, pages = {13--29}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015070102}, doi = {10.4018/IJCBPL.2015070102}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/JonesTR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/Kukshinov15, author = {Eugene Y. Kukshinov}, title = {The Virtual Self and Possible Immersive Consequences of Uncharacteristic Self-Presentation in the Virtual Environment}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {4}, pages = {73--82}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015100106}, doi = {10.4018/IJCBPL.2015100106}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcbpl/Kukshinov15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/Leung15, author = {Louis Leung}, title = {A Panel Study on the Effects of Social Media Use and Internet Connectedness on Academic Performance and Social Support}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {1}, pages = {1--16}, year = {2015}, url = {https://doi.org/10.4018/ijcbpl.2015010101}, doi = {10.4018/IJCBPL.2015010101}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/Leung15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/MersinA15, author = {Sevin{\c{c}} Mersin and Ali Acilar}, title = {Exploring the Relationship between Facebook and Self-Esteem among Turkish University Students}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {4}, pages = {62--72}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015100105}, doi = {10.4018/IJCBPL.2015100105}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/MersinA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/NieYZZ15, author = {Dong Nie and Zheng Yan and Nan Zhao and Tingshao Zhu}, title = {A Pilot Study of Comparing Social Network Behaviors between Onlies and Others}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {3}, pages = {56--66}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015070105}, doi = {10.4018/IJCBPL.2015070105}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/NieYZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/PearsonH15, author = {Claire Pearson and Zaheer Hussain}, title = {Smartphone Use, Addiction, Narcissism, and Personality: {A} Mixed Methods Investigation}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {1}, pages = {17--32}, year = {2015}, url = {https://doi.org/10.4018/ijcbpl.2015010102}, doi = {10.4018/IJCBPL.2015010102}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/PearsonH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/SahaGK15, author = {Rahul Saha and G. Geetha and Gulshan Kumar}, title = {Probabilistic Relation between Triadic Closure and the Balance of Social Networks in Presence of Influence}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {4}, pages = {53--61}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015100104}, doi = {10.4018/IJCBPL.2015100104}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcbpl/SahaGK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/TaitJ15, author = {Sophie E. Tait and Debora Jeske}, title = {Hello Stranger!: Trust and Self-Disclosure Effects on Online Information Sharing}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {1}, pages = {42--55}, year = {2015}, url = {https://doi.org/10.4018/ijcbpl.2015010104}, doi = {10.4018/IJCBPL.2015010104}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/TaitJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/TodaNET15, author = {Masahiro Toda and Nobuhiro Nishio and Satoko Ezoe and Tatsuya Takeshita}, title = {Chronotype and Smartphone Use among Japanese Medical Students}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {2}, pages = {75--80}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015040106}, doi = {10.4018/IJCBPL.2015040106}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/TodaNET15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/WelkHZTMM15, author = {Allaire K. Welk and Kyung Wha Hong and Olga A. Zielinska and Rucha Tembe and Emerson R. Murphy{-}Hill and Christopher B. Mayhorn}, title = {Will the "Phisher-Men" Reel You In?: Assessing Individual Differences in a Phishing Detection Task}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {4}, pages = {1--17}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015100101}, doi = {10.4018/IJCBPL.2015100101}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/WelkHZTMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/Wright15, author = {Michelle F. Wright}, title = {Emerging Adults' Coping Strategies: Longitudinal Linkages to their Involvement in Cyber Aggression and Cyber Victimization}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {2}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.4018/ijcbpl.2015040101}, doi = {10.4018/IJCBPL.2015040101}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/Wright15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbpl/Xia15, author = {Belle Selene Xia}, title = {Benefit and Cost Analysis of Massive Open Online Courses: Pedagogical Implications on Higher Education}, journal = {Int. J. Cyber Behav. Psychol. Learn.}, volume = {5}, number = {3}, pages = {47--55}, year = {2015}, url = {https://doi.org/10.4018/IJCBPL.2015070104}, doi = {10.4018/IJCBPL.2015070104}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbpl/Xia15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.