Agatston, P., Kowalski, R. and Limber, S. (2007) Students’ perspectives on cyber bullying. Journal of Adolescent Health 41(6): S59–S60.CrossRef
Amoroso, E. (1994) Fundamentals of Computer Security Technology. Upper Saddle River, NJ: Prentice Hall.
Australian Bureau of Statistics. (2009) Household Use of Information Technology, Australia 2008–2009, Cat. No. 8146.0. Canberra, Australia: ABS, http://www.abs.gov.au/ausstats/abs@.nsf/mf/8146.0
Australian Bureau of Statistics. (2011) Internet Activity, Australia December 2010, Cat. No. 8153.0. Canberra, Australia: ABS, http://www.abs.gov.au/ausstats/abs@.nsf/mf/8153.0/
Australian Communications and Media Authority. (2008) Developments in Internet Filtering Technologies and Other Measures for Promoting Online Safety: Second Annual Report to the Minister for Broadband, Communications and the Digital Economy. Canberra, Australia: ACMA.
Australian Communication and Media Authority. (2009) Use of Electronic Media and Communications: Early Childhood to Teenage Years. Findings from Growing Up in Australia: The Longitudinal Study of Australian Children (3 to 4 and 7 to 8-year-olds), and Media and Communications in Australian Families (8 to 17-year-olds), 2007. Canberra, Australia: ACMA.
Australian Communication and Media Authority. (2011) CyberSmart Cyber-safety Program. Canberra, Australia: ACMA, http://www.cybersmart.gov.au/
Bauer, J. and van Eeten, M. (2009) Cybersecurity: Stakeholder incentives, externalities and policy options. Telecommunications Policy 33(10–11): 706–719.CrossRef
Beran, T. and Li, Q. (2005) Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research 32(3): 265–277.CrossRef
Berson, I. and Berson, M. (2003) Digital literacy for effective citizenship: Cybersafety, digital awareness, and media literacy. Social Education 67(3): 164–167.
Berson, I., Berson, M. and Berson, J. (2002) Emerging risks of violence in the digital age: Lessons for educators from an online study of adolescent girls in the United States. Journal of School Violence 1(2): 51–72.CrossRef
Bhaskar, R. (2006) State and local law enforcement is not ready for a cyber katrina. Communications of the ACM 49(2): 81–83.CrossRef
Bissonette, A. (2009) Cyber Law: Maximizing Safety and Minimizing Risk in Classrooms. Thousand Oaks, CA: Corwin.
Brown, K., Jackson, M. and Cassidy, W. (2006) Cyber-bullying: Developing a policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy 57(December): 8–11.
Burns, R., Whitworth, K. and Thompson, C. (2004) Assessing law enforcement preparedness to address Internet fraud. Journal of Criminal Justice 32(5): 477–493.CrossRef
Bushman, B. and Huesmann, L. (2006) Short-term and long-term effects of violent media on aggression in children and adults. Archives of Pediatrics and Adolescent Medicine 160(4): 348–352.CrossRef
Butcher, S. (2011) Brodie's Suicide prompts Law on Bullying. The Melbourne Age, Australia, http://www.theage.com.au/small-business/brodies-suicide-prompts-law-on-bullying-20110405-1czub.html
, accessed 5 April 2011.
Campbell, M. (2005) Cyber bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling 15(1): 68–76.CrossRef
Commonwealth of Australia. (2010) Inquiry into Cyber-Safety. Joint Select Committee on Cyber-Safety, http://www.aph.gov.au/house/committee/jscc/index.htm
Commonwealth of Australia. (2011) High Wire Act: Cyber-Safety and the Young, Joint Select Committee on Cyber-Safety (June).
Corley, K. and Gioia, D. (2004) Identity ambiguity and change in the wake of a corporate spin-off. Administrative Science Quarterly 49(2): 173–208.
CrimTrac Agency. (2009) In focus: CETS/ANVIL project. OnTrac 2(3): 6–9.
Cross, D. et al (2009) Australian Covert Bullying Prevalence Study (ACBPS). Perth, Australia: Child Health Promotion Research Centre, Edith Cowan University.
Denzin, N. and Lincoln, Y. (2005) The Handbook of Qualitative Research, 3rd edn. Thousand Oaks, CA: Sage Publications.
Freeman, R., Wicks, A. and Parmar, B. (2004) Stakeholder theory and ‘the corporate objective revisited'. Organization Science 15(3): 364–369.CrossRef
Gentile, D. and Gentile, J. (2008) Violent video games as exemplary teachers: A conceptual analysis. Journal of Youth and Adolescence 37(2): 127–141.CrossRef
Goodstein, A. (2007) Totally Wired: What Teens and Tweens are Really Doing Online. New York: St Martin's Press.
Hinduja, S. and Patchin, J. (2007) Offline consequences of online victimization: School violence and delinquency. Journal of School Violence 6(3): 89–112.CrossRef
Hinduja, S. and Patchin, J. (2008) Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior 29(2): 129–156.CrossRef
Hinduja, S. and Patchin, J. (2009) Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks, CA: Corwin Press Sage.
Jain, A. (2005) Cyber Crime Issues, Threats and Management. Delhi, India: Isha Books.
Jakubiak, D. (2010) A Smart Kid's Guide to Avoiding Online Predators. New York: Rosen Publishing Group.
Johnson, E. (2006) Security awareness: Switch to a better programme. Network Security 2006(2): 15–18.CrossRef
Johnson, S. (2004) Keep your Kids Safe on the Internet. New York: McGraw-Hill/Osborne.
Juvonen, J. and Gross, E. (2008) Extending the school grounds? – Bullying experiences in cyberspace. Journal of School Health 78(9): 496–505.CrossRef
Keith, S. and Martin, M. (2005) Cyber-bullying: Creating a culture of respect in a cyber world. Children and Youth 13(4): 224–228.
Kids Helpline. (2011) Kids helpline services, http://www.kidshelp.com.au
, accessed 5 May 2011.
Klomek, A., Marrocco, F., Kleinman, M., Schonfeld, I. and Gould, M. (2008) Peer victimization, depression, and suicidiality in adolescents. Suicide and Life-Threatening Behavior 38(2): 166–180.CrossRef
Kowalski, R. and Limber, S. (2008) Electronic bullying among middle school students. Journal of Adolescent Health 41(6): S22–S30.CrossRef
Kowalski, R., Limber, S. and Agatston, P. (2007) Cyber Bullying: Bullying in the Digital Age. Malden, MA: Wiley/Blackwell.
LaRose, R., Rifon, N. and Enbody, R. (2008) Promoting personal responsibility for Internet safety. Communications of the ACM 51(3): 71–76.CrossRef
Li, Q. (2007a) Bullying in the new playground: Research into cyberbullying and cyber victimization. Australasian Journal of Educational Technology 23(4): 435–454.CrossRef
Li, Q. (2007b) New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior 23(4): 1777–1791.CrossRef
Lifeline. (2011) Crisis Support, Suicide Prevention, Mental Health Support, http://www.lifeline.org.au
Livingstone, S. and Helsper, E. (2007) Taking risks when communicating on the Internet: the role of offline social-psychological factors in young people's vulnerability to online risks. Information, Communication & Society 10(5): 619–644.CrossRef
Lodge, J. and Frydenberg, E. (2007) Cyber-bullying in Australian schools: Profiles of adolescent coping and insights for school practitioners. The Australian Educational and Developmental Psychologist 24(1): 45–58.
Mansell, R. and Collins, B. (2005) Trust and Crime in Information Societies. Cheltenham, UK: Edward Elgar Publishing.
McCarthy, M. (2004) Filtering the internet: The children's internet protection act. Educational Horizons 82(2): 108–113.
McQuade, S., Colt, J. and Meyer, N. (2009) Cyber Bullying: Protecting Kids and Adults from Online Bullies. Santa Barbara, CA: ABC-CLIO.
Microsoft Corporation. (2005) Tool Thwarts Online Child Predators: Microsoft helped international law enforcement create the Child Exploitation Tracking System as part of a continuing collaboration to stop those who prey on children online, http://www.microsoft.com/presspass/features/2005/apr05/04-07CETS.mspx
, accessed 12 May 2011.
Miles, M. and Huberman, A. (1997) Qualitative Data Analysis – An Expanded Case Book, 2nd edn. Thousand Oaks, CA: Sage Publications.
Mitchell, K., Finkelhor, D. and Wolak, J. (2005) Protecting youth online: Family use of filtering and blocking software. Child Abuse and Neglect 29(7): 753–765.CrossRef
Myers, J., McCaw, D. and Hemphill, L. (2011) Responding to Cyber Bullying: An Action Tool for School Leaders. Thousand Oaks, CA: Sage Publications.
Palfrey, J., Boyd, D., Sacco, D. and DeBonis, L. (2008) Enhancing Child Safety and Online Technologies. Boston, MA: Berkman Center for Internet and Society, Harvard University.
Parliament of Victoria. (2011) Crimes Amendment (Bullying) Bill 2011, http://www.austlii.edu.au/au/legis/vic/bill/cab2011266/
, accessed 1 June 2011.
Philippsohn, S. (2001) Trends in cybercrime: An overview of current financial crimes on the internet. Computers & Security 20(1): 53–69.CrossRef
Privitera, C. and Campbell, M. (2009) Cyberbullying: The new face of workplace bullying? CyberPsychology and Behavior 12(4): 395–400.CrossRef
Rogers, V. (2010) Cyberbullying: Activities to Help Children and Teens to Stay Safe in a Texting, Twittering, Social Networking World. London, UK: Jessica Kingsley Publishers.
Roland, E. (2002) Bullying, depressive symptoms and suicidal thoughts. Educational Research 44(1): 55–67.CrossRef
Shariff, S. (2009) Confronting Cyberbullying: What Schools need to know to Control Misconduct and Avoid Legal Consequences. Cambridge, UK: Cambridge University Press.CrossRef
Smith, G. (2007) How to Protect Your Children on the Internet: A Roadmap for Parents and Teachers. Westport, CT: Greenwood Publishing Group.
Smith, P., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008) Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry 49(4): 376–385.CrossRef
Sommer, P. (2004) The future for the policing of cybercrime. Computer Fraud & Security 2004(1): 8–12.CrossRef
Sommers, M. (2008) The Dangers of Online Predators. New York: Rosen Publishing.
Spears, B., Slee, P., Owens, L. and Johnson, B. (2008) Behind the Scenes: Insights into the Human Dimension of Covert Bullying. Adelaide, Australia: Hawke Research Institute for Sustainable Societies, University of South Australia.
Sullivan, M. (2008) Online Predators. Englewood Cliffs, NJ: Xulon Press.
Thomas, D. and Loader, B. (2003) Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. New York: Routledge.
Thomson, M. and von Solms, R. (1998) Information security awareness: Educating your users effectively. Information Management & Computer Security 6(4): 167–173.CrossRef
Trolley, B. and Hanel, C. (2010) Cyber Kids, Cyber Bullying, Cyber Balance. Thousand Oaks, CA: Corwin Sage.
UK Office of Cyber Security. (2009) Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyberspace. London, UK: Crown.
UK Office of Science and Technology. (2004) Cyber Trust and Crime Prevention Project: Gaining Insight from Three Different Futures. London, UK: Crown.
Vandebosch, H. and Van Cleemput, K. (2008) Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior 11(4): 499–503.CrossRef
Walsh, M. (2003) Teaching qualitative analysis using QSR NVivo. The Qualitative Report 8(2): 251–256.
Wang, J., Iannotti, R. and Nansel, T. (2009) School bullying among adolescents in the United States: Physical, verbal, relational, and cyber. Journal of Adolescent Health 45(4): 368–375.CrossRef
Willard, N. (2007a) Cyber Bullying and Cyber Threats. Champaign, IL: Research Press.
Willard, N. (2007b) Cyber-Safe Kids, Cyber-Savvy Teens. San Francisco, CA: John Wiley & Sons.
Wilson, D. and Jones, T. (2008) In my own world: A case study of a paedophile's thinking and doing and his use of the internet. The Howard Journal of Criminal Justice 47(2): 107–120.CrossRef
Wolak, J., Mitchell, K. and Finkelhor, D. (2007) Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. Journal of Adolescent Health 41(6): 51–58.CrossRef
Wooding, S., Anham, A. and Valeri, L. (2003) Raising Citizen Awareness of Information Security: A Practical Guide, eAware Program. Berlin, Germany: RAND Europe.
Ybarra, M., Diener-West, M. and Leaf, P. (2007a) Examining the overlap in Internet harassment and school bullying: Implications for school intervention. Journal of Adolescent Health 41(6): 42–50.CrossRef
Ybarra, M., Espelage, D. and Mitchell, K. (2007b) The co-occurrence of internet harassment and unwanted sexual solicitation victimization and perpetration: Associations with psychosocial indicators. Journal of Adolescent Health 41(6) : S31–S41.CrossRef
Ybarra, M. and Mitchell, K. (2004) Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry 45(7): 1308–1316.CrossRef