loading

Logout succeed

Logout succeed. See you again!

ebook img

The Anti-Social Network: Cyberstalking Victimization Among College Students PDF

pages207 Pages
release year2012
file size0.94 MB
languageEnglish

Preview The Anti-Social Network: Cyberstalking Victimization Among College Students

Criminal Justice Recent Scholarship Edited by Nicholas P. Lovrich A Series from LFB Scholarly The Anti-Social Network Cyberstalking Victimization among College Students Bradford W. Reyns LFB Scholarly Publishing LLC El Paso 2012 Copyright © 2012 by LFB Scholarly Publishing LLC All rights reserved. Library of Congress Cataloging-in-Publication Data Reyns, Bradford W., 1979- The anti-social network : cyberstalking victimization among college students / Bradford W. Reyns. p. cm. Includes bibliographical references and index. ISBN 978-1-59332-538-1 (hardcover : alk. paper) 1. Cyberstalking. 2. Computers and college students. I. Title. HV6773.15.C94R49 2012 364.15'8--dc23 2012021391 ISBN 978-1-59332-538-1 Printed on acid-free 250-year-life paper. Manufactured in the United States of America. Table of Contents List of Tables ....................................................................................... vii List of Figures ....................................................................................... ix Chapter 1: The Problem of Cyberstalking ............................................. 1 Chapter 2: Lifestyle-Routine Activities Theory ................................... 29 Chapter 3: The Theoretical Transition to Cyberspace ......................... 45 Chapter 4: Researching the Problem of Cyberstalking ........................ 59 Chapter 5: The Extent and Nature of Cyberstalking Victimization ..... 81 Chapter 6: Summary, Implications, and the Future of Cyberstalking Research .................................................... 111 Appendices ........................................................................................ 129 References ......................................................................................... 177 Index ......................................................................................... 193  v List of Tables Table 1.1: Summary of Cyberstalking Victimization (CSV) Studies ................................................................................ 20  Table 4.1: Select Sample and Population Characteristics .................... 64  Table 4.2: Cyberstalking and Identity Fraud Victimization Variables ............................................................................ 68  Table 4.3: Online Exposure Variables ................................................. 69  Table 4.4: Online Guardianship Variables ........................................... 70  Table 4.5: Online Proximity Variables ................................................ 71  Table 4.6: Online Target Attractiveness Variables .............................. 73  Table 4.7: Online Deviance Variables ................................................. 74  Table 4.8: Self-Control Survey Items .................................................. 76  Table 5.1: Extent of Victimization by Demographics and Type of Online Victimizationa ......................................................... 85  Table 5.2: Percentage and Number of Males and Females Victimizeda in Lifetime by Select Demographic Characteristics .................................................................... 86  Table 5.3: Bivariate Relationshipsa between Independent Variables and Control Variables ........................................ 90  Table 5.4: Bivariate Relationshipsa between Independent/Control Variables and Victimization Variables .............................. 92  Table 5.5: Binary Logistic Regression Coefficients, Standard Errors, and Exponentiated Coefficients for Unwanted Contact ............................................................................. 100  vii viii List of Tables Table 5.6: Binary Logistic Regression Coefficients, Standard Errors, and Exponentiated Coefficients for Online Harassment ....................................................................... 101  Table 5.7: Binary Logistic Regression Coefficients, Standard Errors, and Exponentiated Coefficients for Sexual Advances .......................................................................... 102  Table 5.8: Binary Logistic Regression Coefficients, Standard Errors, and Exponentiated Coefficients for Threats of Violence ........................................................................... 103  Table 5.9: Binary Logistic Regression Coefficients, Standard Errors, and Exponentiated Coefficients for Overall Cyberstalking Victimization ............................................ 104  Table 5.10: Binary Logistic Regression Coefficients, Standard Errors, and Exponentiated Coefficients for Identity Fraud ................................................................................ 105  Table 5.11: Summary of Lifestyle-Routine Activities Findings for Cyberstalking Victimization ............................................ 109  Table 6.1: Using Situational Crime Prevention to Limit Opportunities for Cyberstalking ....................................... 123 List of Figures Figure 2.1: The Lifestyle-Exposure Theoretical Model of Personal Victimization ....................................................... 35  Figure 2.2: The Crime Triangle ........................................................... 36  Figure 3.1: The Transition from Places to Networks ........................... 47  Figure 3.2: Routine Activities in an Online Domain ........................... 47  Figure 5.1: Percentage of Respondents who Experienced Online Victimization ...................................................................... 82  Figure 6.1: The Asynchronous Intersection of Victims and Offenders in Online Environments .................................. 121  Figure 6.2: The New Crime Triangle ................................................. 124  ix

See more

The list of books you might like