Risky eBusiness: An Examination of Risk-taking, Online Disclosiveness, and Cyberstalking Victimization
Vol.6,No.1(2012)
cyberstalking; routine activity theory; social networking; online disclosure
Andrew Welsh
Jennifer A. A. Lavoie
Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5, 279-289. https://doi.org/10.1093/brief-treatment/mhi020
Alshalan, A. (2006). Cyber-crime fear and victimization: An analysis of a national survey (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses Database (3238924).
Baron, R. M., & Kenny, D. A. (1986). The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 51, 1173-1182. https://doi.org/10.1037/0022-3514.51.6.1173
Barrett, J. (2006, May/June). Social networking: A new tech tool and a new security concern for teens and schools. MultiMedia & Internet@Schools, 13, 8-11.
Bateman, P. J., Pike, J. C., & Butler, B. S. (2011). To disclose or not: Publicness in social networking sites. Information Technology & People, 24, 78-100. https://doi.org/10.1108/09593841111109431
Beech, A. R., Elliot, I. A., Birgden, A., & Findlater, D. (2008). The Internet and child sex offending: A criminological review. Aggression and Violent Offending, 13, 216-228. https://doi.org/10.1016/j.avb.2008.03.007
Blais, A. R., & Weber, E. U. (2006). A domain-specific risk-taking (DOSPERT) scale for adult populations. Judgement and Decision Making, 1, 33-47.
Blaauw, E., Winkel, F. W., Arensman, E., Sheridan, L., & Freeve, A. (2002). The toll of stalking. The relationship between features of stalking and psychopathology of victims. Journal of Interpersonal Violence, 17, 50−63. https://doi.org/10.1177/0886260502017001004
Bocij, P. (2003) Victims of cyberstalking: An exploratory study of harassment perpetrated via the internet. First Monday, 8, 10. Retrieved from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1086/1006
Bocij, P., & McFarlane, L. (2002). Online harassment: Towards a definition of cyberstalking. Prison Service Journal, 139, 31-38.
Bocij, P., & McFarlane, L. (2003). Cyberstalking: The technology of hate. Police Journal, 76, 204-221. https://doi.org/10.1350/pojo.76.3.204.19442
Bossler, A. M., & Holt, T. J. (2009). Online activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3, 400-420.
Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer Mediated Communication, 13, 210-230. https://doi.org/10.1111/j.1083-6101.2007.00393.x
Boyd, D. M., & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15, 13-20.
Briggs, P., Simon, W. T., & Simonsen, S. (2011). An exploratory study of Internet-initiated sexual offenses and the chat room sex offender: Has the Internet enabled a new typology of sex offender. Sexual Abuse: A Journal of Research and Treatment, 23, 72-91. https://doi.org/10.1177/1079063210384275
Bugeja, M. J. (2006, January 27). Facing the Facebook. Chronicle of Higher Education, pp. C1, C4.
Burgess, A. W., & Baker, T. (2002). Cyberstalking. In J. C. W. Boon & L. Sheridan (Eds.), Stalking and psychosexual obsession: Psychological perspectives for prevention, policing and treatment (pp. 201-219). Chichester: Wiley.
Campbell, M. A. (2005). Cyberbullying: An old problem in a new guise? Australian Journal of Guidance and Counselling, 15, 68-76. https://doi.org/10.1375/ajgc.15.1.68
Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588-608. https://doi.org/10.2307/2094589
Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviours, and unintended consequences. Journal of Computer-Mediated Communication, 15, 83-108. https://doi.org/10.1111/j.1083-6101.2009.01494.x
Donoso, V. (2011). Assessment of the implementation of the Safer Social Networking Principles for the EU on 9 services: Summary Report. Retrieved from European Commission, Information Society, Safer Internet Programme website: http://ec.europa.eu/information_society/activities/social_networking/docs/final_reports_sept_11/report_phase_b_1.pdf
Finkelhor, D., Mitchell, K. J., & Wolak, J. (2000). Online victimization: A report on the nation’s youth. National Center for Missing and Exploited Children.
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19, 468-483. https://doi.org/10.1177/0886260503262083
Finn, J., & Banach, M. (2000). Victimization online: The downside of seeking human services for women on the Internet. Cyberpsychology & Behavior, 3, 785-797. https://doi.org/10.1089/10949310050191764
Fisher, B. S., Cullen, F. T., & Turner, M. G. (2002). Being pursued: Stalking victimization in a national study of college women. Criminology and Public Policy, 1, 257-308. https://doi.org/10.1111/j.1745-9133.2002.tb00091.x
Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. Retrieved from http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf
Grabosky, P. N., & Smith, R. (2001). Telecommunication fraud in the digital age: The convergence of technologies. In D. S. Wall (Ed.), Crime and the Internet (pp. 29-43). London: Routledge, Taylor & Francis Group.
Greenwood, B. (2009). Pew reports: Internet age barrier vanishing. Information Today. Retrieved April 4, 2011, from http://pqasb.pqarchiver.com/infotoday/...
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Retrieved from http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf
Hass, N. (2006, January 8). In your Facebook.com. New York Times, pp. 30-31.
Hinduja, S., & Patchin, J. W. (2008a). Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. Journal of Adolescence, 31, 125-146. https://doi.org/10.1016/j.adolescence.2007.05.004
Hinduja, S., & Patchin, J. W. (2008b). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29, 29-156. https://doi.org/10.1080/01639620701457816
Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1-25. https://doi.org/10.1080/01639620701876577
Jameson, S. (2008). Cyberharassment: Striking a balance between free speech and privacy. CommLaw Conspectus, 17, 231-266.
Jones, S., & Fox, S. (2009). Generations online in 2009. Retrieved from Pew Internet & American Life Project website: http://www.pewinternet.org/Reports/2009/Generations-Online-in-2009/Generational-Differences-in-Online-Activities.aspx
Junco, R., & Mastrodicasa, J. (2007). Connecting to the Net.Generation: What higher education professionals need to know about today’s students. Washington, D.C.: National Association of Student Personnel Administrators.
Kolek, E. & Saunders, D. (2008). Online disclosure: An empirical examination of undergraduate Facebook profiles. Journal of Student Affairs Research and Practice, 45, 1-25. https://doi.org/10.2202/1949-6605.1905
Kornblum, J., & Marklein, M. B. (2006, March, 9). What you say online could haunt you. USA Today, p. 1A.
Lenhart, A., & Madden, M. (2007). Social networking and teens: An overview. Retrieved from Pew Internet & American Life Project website: http://www.pewinternet.org/Reports/2007/Social-Networking-Websites-and-Teens.aspx
Lucks, B. D. (2004). Cyberstalking: Identifying and examining electronic crime in cyberspace. Dissertation Abstracts International: Section B: The Sciences and Engineering, 65(2-B), 1073.
Marchum, C. D., Ricketts, M. L., & Higgins, G. E. (2010). Assessing sex experiences of online victimization: an examination of adolescent online behaviors using routine activity theory. Criminal Justice Review, 35, 412-437. https://doi.org/10.1177/0734016809360331
McGrath, M. G., & Casey, E. (2002). Forensic psychiatry and the internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace. Journal of the American Academy of Psychiatry and the Law, 30, 81-94.
Meloy, J. R. (1996). Stalking (obsessional following): A review of some preliminary studies. Aggression and Violent Behavior, 1, 147-162. https://doi.org/10.1016/1359-1789(95)00013-5
Meloy, J. R. (1998). The psychology of stalking: Clinical and forensic perspectives. New York: Academic Press.
Meloy, J. R. (2003). When stalkers become violent: The threat to public figures and private lives. Psychiatric Annals, 33, 659−665. https://doi.org/10.3928/0048-5713-20031001-09
Miller, C. (2006). Cyberharassment: Its forms and perpetrators. Law Enforcement Technology, 33, 26-30.
Mitchell, K., Finkelhor, D., & Wolak, J. (2007). Youth internet users at risk for the more serious online sexual solicitations. American Journal of Preventative Medicine, 32, 532-537. https://doi.org/10.1016/j.amepre.2007.02.001
Mustaine, E. R, & Tewksbury, R. (1999). A routine activity theory explanation for women’s stalking victimizations. Violence Against Women, 5, 43-62. https://doi.org/10.1177/10778019922181149
Newman, G., & Clarke, R. (2003). Superhighway robbery: Preventing e-commerce crime. Cullompton, UK: Willan Press.
Ogilvie, E. (2000). Cyberstalking. Trends and Issues in Crime and Criminal Justice, 166, 1-6.
Pease, K. (2001). Crime futures and foresight: Challenging criminal behaviour in the information age. In D. Wall (Ed.), Crime and the internet (pp. 18-28). New York: Routledge.
Pittaro, M. L. (2007). Cyber stalking: An analysis of online harassment and intimidation. International Journal of Online Harassment and Intimidation, 1, 180-197.
Raynes-Goldie, K. (2010). Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday, 15, 1. Retrieved from http://ojphi.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2775/2432. https://doi.org/10.5210/fm.v15i1.2775
Rosenfeld, B. (2004). Violence risk factors in stalking and obsessional harassment. A review and preliminary meta-analysis. Criminal Justice and Behavior, 31, 9−36. https://doi.org/10.1177/0093854803259241
Safer Social Networking Principles of the EU. (2009). Retrieved from European Commission, Information Society website http://ec.europa.eu/information_society/activities/social_networking/docs/sn_principles.pdf
Sheridan, L. P., & Grant, T. (2007). Is cyberstalking different? Psychology, Crime, & Law, 13, 627-640. https://doi.org/10.1080/10683160701340528
Spitzberg, B. H., & Cupach, W. R. (2007). The state of the art of stalking: Taking stock of the emerging literature. Aggression and Violent Behavior, 12, 64-86. https://doi.org/10.1016/j.avb.2006.05.001
Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4, 71-92. https://doi.org/10.1177/14614440222226271
Spitzberg, B. H., & Rhea, J. (1999). Obsessive relational intrusion and sexual coercion victimization. Journal of Interpersonal Violence, 14, 3-20. https://doi.org/10.1177/088626099014001001
Spitzberg, B. H., Marshall, L., & Cupach, W. R. (2001). Obsessive relational intrusion, coping, and sexual coercion victimization. Communication Reports, 14, 19-30. https://doi.org/10.1080/08934210109367733
Tewksbury, R., & Mustaine, E. E. (2003). College students’ lifestyles and self-protective behaviors: Futher considerations of the guardianship concept in routine activity theory. Criminal Justice and Behavior, 30, 302-327. https://doi.org/10.1177/0093854803030003003
Weber, E. U., Blais, A. R., & Betz, N. E. (2002). A domain-specific risk-attitude scale: Measuring risk perceptions and risk behaviors. Journal of Behavioral Decision Making, 15, 263-290. https://doi.org/10.1002/bdm.414
Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology, 2, 407-427. https://doi.org/10.1177/147737080556056
Ybarra, M. L. (2004). Linkages between depressive symptomology and Internet harassment among young regular internet users. CyberPsychology & Behavior, 7, 247-257. https://doi.org/10.1089/109493104323024500
Ybarra, M. L., Mitchell, K. J, Finkelhor, D., & Wolak, J. (2007). Internet prevention messages: Targeting the right online behaviors. Archives of Pediatrics & Adolescent Medicine, 161, 138-145.
Young, A. L., & Quan-Haase, A. (2009). Information revelation and Internet privacy concerns on social network sites: A case study of Facebook. Paper presented at Fourth International Conference on Communities and Technologies, Penn State University.
Yucedal, B. (2010). Victimization in cyberspace: An application of Routine Activity and Lifestyle Exposure theories (Doctoral dissertation, Kent State University). Retrieved from http://etd.ohiolink.edu/send-pdf.cgi/YUCEDAL%20BEHZAT.pdf?kent1279290984
Zona, M. A., Sharma, K. K., & Lane, J. C. (1993). A comparative study of erotomanic and obsessional subjects in a forensic sample. Journal of Forensic Sciences, 38, 894-903.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright © 2012 Cyberpsychology: Journal of Psychosocial Research on Cyberspace