Risky eBusiness: An Examination of Risk-taking, Online Disclosiveness, and Cyberstalking Victimization


The expansion of online social networking sites and the relative accessibility to personal information provided by these sites has raised concerns about the risks for a variety of negative experiences, including cyberstalking. The present study investigated whether the theoretical concepts of Routine Activities Theory (RAT) could account for patterns of cyberstalking victimization among social networking site users. The study employed a self-report survey design using a convenience sample of 321 female undergraduate students. RAT was operationalized in the cyber context by measuring the level of online disclosure, frequency of internet use (online exposure) and general proclivity for risk-taking behaviours among participants. Personal experiences of cyberstalking were also assessed. Analyses specifically examined the relationship between RAT variables and cyberstalking outcomes and the extent to which a specific form of guardianship, online disclosiveness, served as a mediator between online activities and the risk for victimization. Online exposure and a proclivity for social risk-taking were associated with cyberstalking victimization. Levels of online disclosure demonstrated a direct positive impact on cyberstalking victimization, however our findings elucidating the role of online disclosure as a guardianship effort mediating the effects of exposure on cyberstalking victimization were mixed.

cyberstalking; routine activity theory; social networking; online disclosure
Author biographies

Andrew Welsh

Author photo Dr. Andrew Welsh is an Associate Professor in the Department of Criminology at Wilfrid Laurier University (Laurier Brantford). A graduate of the Experimental Psychology and Law Program at Simon Fraser University, he studied under Dr. James R.P. Ogloff. Dr. Welshs recent research has examined media constructions of crime and justice issues, including analyses of violence, gender, and victimization in popular media.

Jennifer A. A. Lavoie

Author photo Dr. Jennifer Lavoie is an Assistant Professor in the Department of Criminology at Wilfrid Laurier University (Laurier Brantford). She completed a Post-Doctoral fellowship at the Centre of Addiction and Mental Health in Toronto where her work focused on examining health and forensic outcomes among homeless Canadians living with mental illness. Her research interests are mental health and justice, forensic psychology, prediction of violence and victimization, stress, coping and resilience, mental health in correctional settings, and quantitative research methods.

Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5, 279-289. https://doi.org/10.1093/brief-treatment/mhi020

Alshalan, A. (2006). Cyber-crime fear and victimization: An analysis of a national survey (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses Database (3238924).

Baron, R. M., & Kenny, D. A. (1986). The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 51, 1173-1182. https://doi.org/10.1037/0022-3514.51.6.1173

Barrett, J. (2006, May/June). Social networking: A new tech tool and a new security concern for teens and schools. MultiMedia & Internet@Schools, 13, 8-11.

Bateman, P. J., Pike, J. C., & Butler, B. S. (2011). To disclose or not: Publicness in social networking sites. Information Technology & People, 24, 78-100. https://doi.org/10.1108/09593841111109431

Beech, A. R., Elliot, I. A., Birgden, A., & Findlater, D. (2008). The Internet and child sex offending: A criminological review. Aggression and Violent Offending, 13, 216-228. https://doi.org/10.1016/j.avb.2008.03.007

Blais, A. R., & Weber, E. U. (2006). A domain-specific risk-taking (DOSPERT) scale for adult populations. Judgement and Decision Making, 1, 33-47.

Blaauw, E., Winkel, F. W., Arensman, E., Sheridan, L., & Freeve, A. (2002). The toll of stalking. The relationship between features of stalking and psychopathology of victims. Journal of Interpersonal Violence, 17, 50−63. https://doi.org/10.1177/0886260502017001004

Bocij, P. (2003) Victims of cyberstalking: An exploratory study of harassment perpetrated via the internet. First Monday, 8, 10. Retrieved from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1086/1006

Bocij, P., & McFarlane, L. (2002). Online harassment: Towards a definition of cyberstalking. Prison Service Journal, 139, 31-38.

Bocij, P., & McFarlane, L. (2003). Cyberstalking: The technology of hate. Police Journal, 76, 204-221. https://doi.org/10.1350/pojo.

Bossler, A. M., & Holt, T. J. (2009). Online activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3, 400-420.

Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer Mediated Communication, 13, 210-230. https://doi.org/10.1111/j.1083-6101.2007.00393.x

Boyd, D. M., & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15, 13-20.

Briggs, P., Simon, W. T., & Simonsen, S. (2011). An exploratory study of Internet-initiated sexual offenses and the chat room sex offender: Has the Internet enabled a new typology of sex offender. Sexual Abuse: A Journal of Research and Treatment, 23, 72-91. https://doi.org/10.1177/1079063210384275

Bugeja, M. J. (2006, January 27). Facing the Facebook. Chronicle of Higher Education, pp. C1, C4.

Burgess, A. W., & Baker, T. (2002). Cyberstalking. In J. C. W. Boon & L. Sheridan (Eds.), Stalking and psychosexual obsession: Psychological perspectives for prevention, policing and treatment (pp. 201-219). Chichester: Wiley.

Campbell, M. A. (2005). Cyberbullying: An old problem in a new guise? Australian Journal of Guidance and Counselling, 15, 68-76. https://doi.org/10.1375/ajgc.15.1.68

Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588-608. https://doi.org/10.2307/2094589

Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviours, and unintended consequences. Journal of Computer-Mediated Communication, 15, 83-108. https://doi.org/10.1111/j.1083-6101.2009.01494.x

Donoso, V. (2011). Assessment of the implementation of the Safer Social Networking Principles for the EU on 9 services: Summary Report. Retrieved from European Commission, Information Society, Safer Internet Programme website: http://ec.europa.eu/information_society/activities/social_networking/docs/final_reports_sept_11/report_phase_b_1.pdf

Finkelhor, D., Mitchell, K. J., & Wolak, J. (2000). Online victimization: A report on the nation’s youth. National Center for Missing and Exploited Children.

Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19, 468-483. https://doi.org/10.1177/0886260503262083

Finn, J., & Banach, M. (2000). Victimization online: The downside of seeking human services for women on the Internet. Cyberpsychology & Behavior, 3, 785-797. https://doi.org/10.1089/10949310050191764

Fisher, B. S., Cullen, F. T., & Turner, M. G. (2002). Being pursued: Stalking victimization in a national study of college women. Criminology and Public Policy, 1, 257-308. https://doi.org/10.1111/j.1745-9133.2002.tb00091.x

Govani, T., & Pashley, H. (2005). Student awareness of the privacy implications when using Facebook. Retrieved from http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf

Grabosky, P. N., & Smith, R. (2001). Telecommunication fraud in the digital age: The convergence of technologies. In D. S. Wall (Ed.), Crime and the Internet (pp. 29-43). London: Routledge, Taylor & Francis Group.

Greenwood, B. (2009). Pew reports: Internet age barrier vanishing. Information Today. Retrieved April 4, 2011, from http://pqasb.pqarchiver.com/infotoday/...

Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Retrieved from http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf

Hass, N. (2006, January 8). In your Facebook.com. New York Times, pp. 30-31.

Hinduja, S., & Patchin, J. W. (2008a). Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. Journal of Adolescence, 31, 125-146. https://doi.org/10.1016/j.adolescence.2007.05.004

Hinduja, S., & Patchin, J. W. (2008b). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29, 29-156. https://doi.org/10.1080/01639620701457816

Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1-25. https://doi.org/10.1080/01639620701876577

Jameson, S. (2008). Cyberharassment: Striking a balance between free speech and privacy. CommLaw Conspectus, 17, 231-266.

Jones, S., & Fox, S. (2009). Generations online in 2009. Retrieved from Pew Internet & American Life Project website: http://www.pewinternet.org/Reports/2009/Generations-Online-in-2009/Generational-Differences-in-Online-Activities.aspx

Junco, R., & Mastrodicasa, J. (2007). Connecting to the Net.Generation: What higher education professionals need to know about today’s students. Washington, D.C.: National Association of Student Personnel Administrators.

Kolek, E. & Saunders, D. (2008). Online disclosure: An empirical examination of undergraduate Facebook profiles. Journal of Student Affairs Research and Practice, 45, 1-25. https://doi.org/10.2202/1949-6605.1905

Kornblum, J., & Marklein, M. B. (2006, March, 9). What you say online could haunt you. USA Today, p. 1A.

Lenhart, A., & Madden, M. (2007). Social networking and teens: An overview. Retrieved from Pew Internet & American Life Project website: http://www.pewinternet.org/Reports/2007/Social-Networking-Websites-and-Teens.aspx

Lucks, B. D. (2004). Cyberstalking: Identifying and examining electronic crime in cyberspace. Dissertation Abstracts International: Section B: The Sciences and Engineering, 65(2-B), 1073.

Marchum, C. D., Ricketts, M. L., & Higgins, G. E. (2010). Assessing sex experiences of online victimization: an examination of adolescent online behaviors using routine activity theory. Criminal Justice Review, 35, 412-437. https://doi.org/10.1177/0734016809360331

McGrath, M. G., & Casey, E. (2002). Forensic psychiatry and the internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace. Journal of the American Academy of Psychiatry and the Law, 30, 81-94.

Meloy, J. R. (1996). Stalking (obsessional following): A review of some preliminary studies. Aggression and Violent Behavior, 1, 147-162. https://doi.org/10.1016/1359-1789(95)00013-5

Meloy, J. R. (1998). The psychology of stalking: Clinical and forensic perspectives. New York: Academic Press.

Meloy, J. R. (2003). When stalkers become violent: The threat to public figures and private lives. Psychiatric Annals, 33, 659−665. https://doi.org/10.3928/0048-5713-20031001-09

Miller, C. (2006). Cyberharassment: Its forms and perpetrators. Law Enforcement Technology, 33, 26-30.

Mitchell, K., Finkelhor, D., & Wolak, J. (2007). Youth internet users at risk for the more serious online sexual solicitations. American Journal of Preventative Medicine, 32, 532-537. https://doi.org/10.1016/j.amepre.2007.02.001

Mustaine, E. R, & Tewksbury, R. (1999). A routine activity theory explanation for women’s stalking victimizations. Violence Against Women, 5, 43-62. https://doi.org/10.1177/10778019922181149

Newman, G., & Clarke, R. (2003). Superhighway robbery: Preventing e-commerce crime. Cullompton, UK: Willan Press.

Ogilvie, E. (2000). Cyberstalking. Trends and Issues in Crime and Criminal Justice, 166, 1-6.

Pease, K. (2001). Crime futures and foresight: Challenging criminal behaviour in the information age. In D. Wall (Ed.), Crime and the internet (pp. 18-28). New York: Routledge.

Pittaro, M. L. (2007). Cyber stalking: An analysis of online harassment and intimidation. International Journal of Online Harassment and Intimidation, 1, 180-197.

Raynes-Goldie, K. (2010). Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday, 15, 1. Retrieved from http://ojphi.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2775/2432. https://doi.org/10.5210/fm.v15i1.2775

Rosenfeld, B. (2004). Violence risk factors in stalking and obsessional harassment. A review and preliminary meta-analysis. Criminal Justice and Behavior, 31, 9−36. https://doi.org/10.1177/0093854803259241

Safer Social Networking Principles of the EU. (2009). Retrieved from European Commission, Information Society website http://ec.europa.eu/information_society/activities/social_networking/docs/sn_principles.pdf

Sheridan, L. P., & Grant, T. (2007). Is cyberstalking different? Psychology, Crime, & Law, 13, 627-640. https://doi.org/10.1080/10683160701340528

Spitzberg, B. H., & Cupach, W. R. (2007). The state of the art of stalking: Taking stock of the emerging literature. Aggression and Violent Behavior, 12, 64-86. https://doi.org/10.1016/j.avb.2006.05.001

Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4, 71-92. https://doi.org/10.1177/14614440222226271

Spitzberg, B. H., & Rhea, J. (1999). Obsessive relational intrusion and sexual coercion victimization. Journal of Interpersonal Violence, 14, 3-20. https://doi.org/10.1177/088626099014001001

Spitzberg, B. H., Marshall, L., & Cupach, W. R. (2001). Obsessive relational intrusion, coping, and sexual coercion victimization. Communication Reports, 14, 19-30. https://doi.org/10.1080/08934210109367733

Tewksbury, R., & Mustaine, E. E. (2003). College students’ lifestyles and self-protective behaviors: Futher considerations of the guardianship concept in routine activity theory. Criminal Justice and Behavior, 30, 302-327. https://doi.org/10.1177/0093854803030003003

Weber, E. U., Blais, A. R., & Betz, N. E. (2002). A domain-specific risk-attitude scale: Measuring risk perceptions and risk behaviors. Journal of Behavioral Decision Making, 15, 263-290. https://doi.org/10.1002/bdm.414

Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology, 2, 407-427. https://doi.org/10.1177/147737080556056

Ybarra, M. L. (2004). Linkages between depressive symptomology and Internet harassment among young regular internet users. CyberPsychology & Behavior, 7, 247-257. https://doi.org/10.1089/109493104323024500

Ybarra, M. L., Mitchell, K. J, Finkelhor, D., & Wolak, J. (2007). Internet prevention messages: Targeting the right online behaviors. Archives of Pediatrics & Adolescent Medicine, 161, 138-145.

Young, A. L., & Quan-Haase, A. (2009). Information revelation and Internet privacy concerns on social network sites: A case study of Facebook. Paper presented at Fourth International Conference on Communities and Technologies, Penn State University.

Yucedal, B. (2010). Victimization in cyberspace: An application of Routine Activity and Lifestyle Exposure theories (Doctoral dissertation, Kent State University). Retrieved from http://etd.ohiolink.edu/send-pdf.cgi/YUCEDAL%20BEHZAT.pdf?kent1279290984

Zona, M. A., Sharma, K. K., & Lane, J. C. (1993). A comparative study of erotomanic and obsessional subjects in a forensic sample. Journal of Forensic Sciences, 38, 894-903.





HTML views