Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory

The current study provides an empirical testing of the victim-offender overlap in online platforms due to the scarcity of studies examining this overlapping victim-offending dynamic. Two types of cyber-interpersonal violence are examined: Cyber-harassment (including cyber-sexual harassment) and cyber-impersonation. Using Choi's (2008) integrated theory of Cyber-Routine Activities Theory, a sample of 272 college students at a Massachusetts university are examined. Three major findings are revealed: (1) Respondents who engage in risky online leisure activities are more likely to experience interpersonal violence in cyberspace, (2) poor online security management can contribute to the likelihood of being victimized by interpersonal violence on social networking sites (SNS), and (3) respondents who engage in risky social networking site activities are likely to commit cyber-interpersonal violence. For the two types of cyber-interpersonal violence examined in this study, it could also be predicted that females are more likely to have higher levels of victimization. Cybersecurity management and sex had no significant effects on cyber-interpersonal violence offending. The hope is that education on the potential hazards of the Internet and of cyber-interpersonal violence will induce more responsible online activity and engagement. Risky online leisure activities increase cyber-interpersonal violence.Poor online security management increases cyber-interpersonal violence victimization on social networking sites (SNS).Risky Social Networking Sites (SNS) activities contribute to cyber-interpersonal violence offending.Females have higher levels of cyber-harassment victimization.Security management and sex had no significant effects on cyber-interpersonal offending.

[1]  Kenneth C. Land,et al.  Property Crime Rates in the United States: A Macrodynamic Analysis, 1947-1977; With Ex Ante Forecasts for the Mid-1980s , 1980, American Journal of Sociology.

[2]  Trevor F. Cox An Introduction to Multivariate Data Analysis , 2005 .

[3]  Niki Harré,et al.  Factors associated with distressing electronic harassment and cyberbullying , 2013, Comput. Hum. Behav..

[4]  Usual suspects, ideal victims and vice versa: The relationship between youth offending and victimization and the mediating influence of risky lifestyles , 2014 .

[5]  Michael R. Gottfredson,et al.  A general theory of crime. , 1992 .

[6]  Stacey Nofziger,et al.  Violent Lives: A Lifestyle Model Linking Exposure to Violence to Juvenile Violent Offending , 2005 .

[7]  Fawn T. Ngo,et al.  Cybercrime Victimization: An Examination of Individual and Situational Level Factors , 2011 .

[8]  Michael D. Reisig,et al.  LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .

[9]  Brian H. Spitzberg,et al.  Cyber-harassment victimization in Portugal: Prevalence, fear and help-seeking among adolescents , 2016, Comput. Hum. Behav..

[10]  Rebecca Dredge,et al.  Cyberbullying in social networking sites: An adolescent victim's perspective , 2014, Comput. Hum. Behav..

[11]  Michael D. Reisig,et al.  Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .

[12]  T. Holt,et al.  Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .

[13]  Bradford W Reyns,et al.  Guardians of the Cyber Galaxy , 2016 .

[14]  Dong-Hee Shin,et al.  The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..

[15]  Brian H. Spitzberg,et al.  Cyberstalking and the technologies of interpersonal terrorism , 2002, New Media Soc..

[16]  Michael R. Gottfredson,et al.  Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization , 1977 .

[17]  Xiaojin Chen The Link Between Juvenile Offending and Victimization The Influence of Risky Lifestyles, Social Bonding, and Individual Characteristics , 2009 .

[18]  M. Yar The Novelty of ‘Cybercrime’ , 2005 .

[19]  Desmond Upton Patton,et al.  Social media as a vector for youth violence: A review of the literature , 2014, Comput. Hum. Behav..

[20]  L. Pauwels,et al.  Is a Risky Lifestyle Always “Risky”? The Interaction Between Individual Propensity and Lifestyle Risk in Adolescent Offending: A Test in Two Urban Samples , 2010 .

[21]  Joel Miller,et al.  Individual Offending, Routine Activities, and Activity Settings: Revisiting the Routine Activity Theory of General Deviance , 2013 .

[22]  L. Pauwels,et al.  Exploring the Relationship Between Offending and Victimization: What is the Role of Risky Lifestyles and Low Self-Control? A Test in Two Urban Samples , 2011 .

[23]  Bradford W Reyns,et al.  Online Routines and Identity Theft Victimization , 2013 .

[24]  James R. Kluegel,et al.  Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory , 1981 .

[25]  Wesley G. Jennings,et al.  Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy , 2014, Comput. Hum. Behav..

[26]  Christopher E. Beaudoin,et al.  Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors , 2017, Comput. Hum. Behav..

[27]  Kyung-shick Choi Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .

[28]  Terance D. Miethe,et al.  Crime and its social context : toward an integrated theory of offenders, victims, and situations , 1995 .

[29]  Patrick M. O'Malley,et al.  Routine activities and individual deviant behavior , 1996 .

[30]  Aaron Smith,et al.  72% of online adults are social networking site users , 2013 .

[31]  Bonnie S. Fisher,et al.  Security in the 21st Century , 2011 .