Being Pursued Online

Building upon Eck and Clarke’s (2003) ideas for explaining crimes in which there is no face-to-face contact between victims and offenders, the authors developed an adapted lifestyle–routine activities theory. Traditional conceptions of place-based environments depend on the convergence of victims and offenders in time and physical space to explain opportunities for victimization. With their proposed cyberlifestyle–routine activities theory, the authors moved beyond this conceptualization to explain opportunities for victimization in cyberspace environments where traditional conceptions of time and space are less relevant. Cyberlifestyle–routine activities theory was tested using a sample of 974 college students on a particular type of cybervictimization—cyberstalking. The study’s findings provide support for the adapted theoretical perspective. Specifically, variables measuring online exposure to risk, online proximity to motivated offenders, online guardianship, online target attractiveness, and online deviance were significant predictors of cyberstalking victimization. Implications for advancing cyberlifestyle–routine activities theory are discussed.

[1]  Pamela Wilcox,et al.  Gender, Adolescent Lifestyles, and Violent Victimization: Implications for Routine Activity Theory , 2010 .

[2]  Janet L. Lauritsen,et al.  Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents , 1992, Violence and Victims.

[3]  Catherine D. Marcum,et al.  Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routine Activity Theory , 2010 .

[4]  Michael R. Gottfredson,et al.  Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization , 1977 .

[5]  Johnny Nhan,et al.  Finding a Pot of Gold at the End of an Internet Rainbow: Further Examination of Fraudulent Email Solicitation , 2009 .

[6]  Richard Tewksbury,et al.  Sexual Assault of College Women: A Feminist Interpretation of a Routine Activities Analysis , 2002 .

[7]  Brian H. Spitzberg,et al.  Cyberstalking and the technologies of interpersonal terrorism , 2002, New Media Soc..

[8]  J. M. Miller,et al.  21st century criminology : a reference handbook , 2009 .

[9]  Joshua D. Freilich,et al.  An assessment of the empirical validity and conceptualization of individual level multivariate studies of lifestyle/routine activities theory published from 1995 to 2005 , 2009 .

[10]  Mackenzie Lambine Unsafe in the Ivory Tower: The sexual victimization of college women , 2012 .

[11]  Robert J. Sampson,et al.  Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence , 1990 .

[12]  Thomas J. Holt,et al.  On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory , 2009 .

[13]  Kathleen C. Basile,et al.  Stalking in the United States: recent national prevalence estimates. , 2006, American journal of preventive medicine.

[14]  Michael L. Pittaro Cyber stalking: An Analysis of Online Harassment and Intimidation , 2007 .

[15]  P. Brantingham,et al.  Criminality of place , 1995 .

[16]  Stalking Victimization Among College Women and Subsequent Help-Seeking Behaviors , 2009, Journal of American college health : J of ACH.

[17]  Bonnie S. Fisher,et al.  Stalking in the Twilight Zone: Extent of Cyberstalking Victimization and Offending Among College Students , 2012 .

[18]  Francis T. Cullen,et al.  BEING PURSUED: STALKING VICTIMIZATION IN A NATIONAL STUDY OF COLLEGE WOMEN* , 2002 .

[19]  Richard Tewksbury,et al.  A Routine Activity Theory Explanation for Women's Stalking Victimizations , 1999, Violence against Women.

[20]  H. D. McKay,et al.  Juvenile Delinquency and Urban Areas , 1943 .

[21]  R. Tewksbury,et al.  College Students' Lifestyles and Self-Protective Behaviors , 2003 .

[22]  J. Finn A Survey of Online Harassment at a University Campus , 2004, Journal of interpersonal violence.

[23]  Nancy Thoennes,et al.  Stalking in America : findings from the National Violence Against Women Survey , 1998 .

[24]  Oscar Newman,et al.  Creating defensible space , 1996 .

[25]  Laura J. Moriarty,et al.  Cyberstalking: Utilizing What We do Know , 2009 .

[26]  Amy I. Cass Routine Activities and Sexual Assault: An Analysis of Individual- and School-Level Factors , 2007, Violence and Victims.

[27]  Lynne D. Roberts,et al.  Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking , 2008 .

[28]  M. Felson,et al.  Crime and Everyday Life , 1998 .

[29]  Michael D. Reisig,et al.  LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .

[30]  R. Clarke Hot Products : understanding , anticipating and reducing demand for stolen goods , 1999 .

[31]  Carly M. Hilinski Fear of Crime among College Students: A Test of the Shadow of Sexual Assault Hypothesis , 2009 .

[32]  Janis Wolak,et al.  Online victimization: A report on the nation’s youth. , 2000 .

[33]  Matt R. Nobles,et al.  Look who's stalking: Obsessive pursuit and attachment theory , 2010 .

[34]  B. Fisher,et al.  Unsafe in the Ivory Tower: The Sexual Victimization of College Women , 2009 .

[35]  Kenneth C. Land,et al.  Burglary Victimization, Perceptions of Crime Risk, and Routine Activities: A Multilevel Analysis Across Seattle Neighborhoods and Census Tracts , 1996 .

[36]  Marcus Felson,et al.  THOSE WHO DISCOURAGE CRIME , 2006 .

[37]  Robert D. Tortora,et al.  Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet , 2009 .

[38]  Robert J. Sampson,et al.  Linking the micro- and macro-level dimensions of lifestyle-routine activity and opportunity models of predatory victimization , 1987 .

[39]  Richard A. Wright,et al.  A study of individual and situational antecedents of violent victimization , 2002 .

[40]  Terance D. Miethe,et al.  Opportunity, Choice, and Criminal Victimization: A Test of a Theoretical Model , 1990 .

[41]  B. Fisher Crime and Fear on Campus , 1995 .

[42]  L. Sheridan,et al.  Is cyberstalking different? , 2007 .

[43]  T. Holt,et al.  Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .

[44]  Kyung-shick Choi Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .

[45]  Matt R. Nobles,et al.  Career Dimensions of Stalking Victimization and Perpetration , 2009 .

[46]  P. Grabosky Virtual Criminality: Old Wine in New Bottles? , 2001 .

[47]  J. Wolak,et al.  Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[48]  S. Smoyak,et al.  Perceptions of Cyberstalking Among College Students , 2005 .

[49]  James R. Kluegel,et al.  Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory , 1981 .

[50]  L. Edward Wells,et al.  Crime and Place , 2012 .

[51]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[52]  Francis T. Cullen,et al.  CRIME IN THE IVORY TOWER: THE LEVEL AND SOURCES OF STUDENT VICTIMIZATION* , 1998 .

[53]  M. Rand,et al.  National Crime Victimization Survey: Stalking Victimization in the United States , 2009 .

[54]  Patrick R. Gartin,et al.  Hot Spots of Predatory Crime: Routine Activities and the Criminology of Place , 1989 .

[55]  P. Wilcox,et al.  Stalking acknowledgement and reporting among college women experiencing intrusive behaviors: Implications for the emergence of a “classic stalking case” , 2007 .

[56]  M. Couper A REVIEW OF ISSUES AND APPROACHES , 2000 .

[57]  Gary F. Jensen,et al.  Gender, Lifestyles, and Victimization: Beyond Routine Activity , 1986, Violence and Victims.

[58]  Janet L. Lauritsen,et al.  THE LINK BETWEEN OFFENDING AND VICTIMIZATION AMONG ADOLESCENTS , 1991 .

[59]  Kenneth C. Land,et al.  Property Crime Rates in the United States: A Macrodynamic Analysis, 1947-1977; With Ex Ante Forecasts for the Mid-1980s , 1980, American Journal of Sociology.

[60]  Richard Tewksbury,et al.  PREDICTING RISKS OF LARCENY THEFT VICTIMIZATION: A ROUTINE ACTIVITY ANALYSIS USING REFINED LIFESTYLE MEASURES , 1998 .

[61]  V. Pitts,et al.  Exploring a feminist routine activities approach to explaining sexual assault , 1995 .

[62]  Kenneth C. Land,et al.  MACRO‐MICRO INTEGRATION IN THE STUDY OF VICTIMIZATION: A HIERARCHICAL LOGISTIC MODEL ANALYSIS ACROSS SEATTLE NEIGHBORHOODS* , 1994 .

[63]  S. Menard Logistic Regression: From Introductory to Advanced Concepts and Applications , 2009 .

[64]  Christopher J. Schreck,et al.  Specifying the Influence of Family and Peers on Violent Victimization , 2004, Journal of interpersonal violence.

[65]  L. Eby Book Review: Survey Research Methods, 3rd ed., by Floyd J. Fowler Jr. (2002). Thousand Oaks, Ca: Sage. , 2003 .

[66]  P. Chisnall Mail and Internet Surveys: The Tailored Design Method , 2007, Journal of Advertising Research.

[67]  Michael D. Reisig,et al.  Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .

[68]  Bradford W. Reyns A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers , 2010 .