One step forward, two steps back: Cyberbullying within social networking sites

Springer Science and Business Media LLC - Tập 30 Số 3 - Trang 844-858 - 2017
Navarro, Jordana N1, Clevenger, Shelly2, Beasley, Maddie E1, Jackson, Lindsey K1
1Department of Sociology and Political Science, Tennessee Technological University, Cookeville, USA
2Department of Criminal Justice Sciences, Illinois State University, Normal, USA

Tóm tắt

Although public awareness of cyberbullying has increased, evidence suggests the social problem has not abated. While past studies have highlighted numerous factors that affect risks of experiencing cyberbullying in general, few studies have focused on identifying risk factors within social networking sites (SNS). Moreover, even fewer studies have utilized a theoretical perspective to frame and ground findings. Therefore, using data collected as part of the Pew Internet Project, and Routine Activities Theory (Cohen and Felson, 1979) as a theoretical framework, this study fills a substantial void in the literature by reviewing what activities within SNS affect the risk of experiencing cyberbullying.

Tài liệu tham khảo

citation_journal_title=Educational Psychology in Practice; citation_title=Cyberbullying: Through the eyes of children and young people; citation_author=MJ Ackers; citation_volume=28; citation_issue=2; citation_publication_date=2012; citation_pages=141-157; citation_doi=10.1080/02667363.2012.665356; citation_id=CR1 citation_journal_title=Journal of Educational Computing Research; citation_title=Cyber-harassment: A study of a new method for an old behavior; citation_author=T Beran, Q Li; citation_volume=32; citation_issue=3; citation_publication_date=2005; citation_pages=265-277; citation_doi=10.2190/8YQM-B04H-PG4D-BLLH; citation_id=CR2 citation_journal_title=International Journal of Cyber Criminology; citation_title=On-line activities, guardianship, and malware infection: An examination of routine activities theory; citation_author=AM Bossler, TJ Holt; citation_volume=3; citation_issue=1; citation_publication_date=2009; citation_pages=400-420; citation_id=CR3 citation_journal_title=Youth & Society; citation_title=Predicting online harassment victimization among a juvenile population; citation_author=AM Bossler, TJ Holt, DC May; citation_volume=44; citation_issue=4; citation_publication_date=2012; citation_pages=500-523; citation_doi=10.1177/0044118X11407525; citation_id=CR4 citation_journal_title=Emotional and Behavioural Difficulties; citation_title=Victims’ perceptions of traditional and cyberbullying, and the psychosocial correlates of their victimisation; citation_author=M Campbell, B Spears, P Slee, D Butler, S Kift; citation_volume=17; citation_issue=3–4; citation_publication_date=2012; citation_pages=389-401; citation_doi=10.1080/13632752.2012.704316; citation_id=CR5 citation_journal_title=American Sociological Review; citation_title=Social change and crime rate trends: A routine activity approach; citation_author=LE Cohen, M Felson; citation_volume=44; citation_issue=4; citation_publication_date=1979; citation_pages=588-608; citation_doi=10.2307/2094589; citation_id=CR6 citation_title=Crime and Nature; citation_publication_date=2006; citation_id=CR7; citation_author=M Felson citation_journal_title=Alberta Journal of Educational Research; citation_title=Adolescents’ evaluation of cyberbullying events; citation_author=C Gomez-Garibello, S Shariff, M McConnell, V Talwar; citation_volume=58; citation_issue=3; citation_publication_date=2012; citation_pages=474-477; citation_id=CR8 citation_journal_title=Journal of Contemporary Criminal Justice; citation_title=Fear of crime online? Examining the effect of risk, previous victimization, and exposure on fear of online interpersonal victimization; citation_author=B Henson, BW Reyns, BS Fisher; citation_volume=29; citation_issue=4; citation_publication_date=2013; citation_pages=475-497; citation_doi=10.1177/1043986213507403; citation_id=CR9 citation_journal_title=Deviant Behavior; citation_title=Can low self-control help with the understanding of the software piracy problem?; citation_author=GE Higgins; citation_volume=26; citation_issue=1; citation_publication_date=2004; citation_pages=1-24; citation_doi=10.1080/01639620490497947; citation_id=CR10 citation_journal_title=Deviant Behavior; citation_title=Cyberbullying: An exploratory analysis of factors related to offending and victimization; citation_author=S Hinduja, JW Patchin; citation_volume=29; citation_issue=2; citation_publication_date=2008; citation_pages=129-156; citation_doi=10.1080/01639620701457816; citation_id=CR11 citation_journal_title=Crime Prevention & Community Safety; citation_title=The capable guardian in routine activities theory: A theoretical and conceptual reappraisal; citation_author=ME Hollis, M Felson, BC Welsh; citation_volume=15; citation_issue=1; citation_publication_date=2013; citation_pages=65-79; citation_doi=10.1057/cpcs.2012.14; citation_id=CR12 citation_journal_title=Deviant Behavior; citation_title=Examining the applicability of lifestyle-routine activities theory for cybercrime victimization; citation_author=TJ Holt, AM Bossler; citation_volume=30; citation_issue=1; citation_publication_date=2008; citation_pages=1-25; citation_doi=10.1080/01639620701876577; citation_id=CR13 citation_journal_title=Journal of Adolescent Health; citation_title=Trends in youth internet victimization: Findings from three youth internet safety surveys 2000–2010; citation_author=LM Jones, KJ Mitchell, D Finkelhor; citation_volume=50; citation_issue=2; citation_publication_date=2012; citation_pages=179-186; citation_doi=10.1016/j.jadohealth.2011.09.015; citation_id=CR14 citation_journal_title=Computers in Human Behavior; citation_title=Facebook bullying: An extension of battles in school; citation_author=GCE Kwan, MM Skoric; citation_volume=29; citation_issue=1; citation_publication_date=2013; citation_pages=16-25; citation_doi=10.1016/j.chb.2012.07.014; citation_id=CR15 citation_journal_title=Journal of Aggression, Maltreatment &Trauma; citation_title=Cyberbullying in high schools: A study of students’ behaviors and beliefs about this new phenomenon; citation_author=Q Li; citation_volume=19; citation_publication_date=2010; citation_pages=372-392; citation_doi=10.1080/10926771003788979; citation_id=CR16 Marcum, C. (2014) CybercrimeFrederick, MD: Wolters Kluwer Law & Business. citation_journal_title=Deviant Behavior; citation_title=Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory; citation_author=CD Marcum, GE Higgins, ML Ricketts; citation_volume=31; citation_issue=5; citation_publication_date=2010; citation_pages=381-410; citation_doi=10.1080/01639620903004903; citation_id=CR18 citation_journal_title=International Journal of Cyber Criminology; citation_title=Identifying potential factors of adolescent online victimization for high school seniors; citation_author=CD Marcum; citation_volume=2; citation_issue=2; citation_publication_date=2008; citation_pages=346-67; citation_id=CR19 citation_journal_title=International Journal of Cyber Criminology; citation_title=Parental regulation and online activities: Examining factors that influence a youth’s potential to become a victim of online harassment; citation_author=R Moore, NT Guntupalli, T Lee; citation_volume=4; citation_issue=1–2; citation_publication_date=2010; citation_pages=685-698; citation_id=CR20 citation_journal_title=Deviant Behavior; citation_title=Transforming potential offenders into motivated ones: Are sex offenders tempted by alcohol and pornography?; citation_author=EE Mustaine, R Tewksbury; citation_volume=30; citation_issue=7; citation_publication_date=2009; citation_pages=561-588; citation_doi=10.1080/01639620802467821; citation_id=CR21 citation_journal_title=Sociological Spectrum; citation_title=Going cyber: Using routine activities theory to predict cyberbullying experiences; citation_author=JN Navarro, JL Jasinski; citation_volume=32; citation_issue=1; citation_publication_date=2012; citation_pages=81-94; citation_doi=10.1080/02732173.2012.628560; citation_id=CR22 citation_journal_title=Women & Criminal Justice; citation_title=Why girls? Using routine activities theory to predict cyberbullying experiences between girls and boys; citation_author=JN Navarro, JL Jasinski; citation_volume=23; citation_issue=4; citation_publication_date=2013; citation_pages=286-303; citation_doi=10.1080/08974454.2013.784225; citation_id=CR23 citation_title=Identity theft; citation_inbook_title=Social Networking as a Criminal Enterprise; citation_publication_date=2014; citation_id=CR24; citation_author=JN Navarro; citation_author=JL Jasinski citation_journal_title=European Journal of Developmental Psychology; citation_title=Cyberbullying: An overrated phenomenon?; citation_author=D Olweus; citation_volume=9; citation_issue=5; citation_publication_date=2012; citation_pages=520-538; citation_doi=10.1080/17405629.2012.682358; citation_id=CR25 citation_journal_title=Youth & Society; citation_title=Traditional and nontraditional bullying among youth: A test of general strain theory; citation_author=JW Patchin, S Hinduja; citation_volume=43; citation_issue=2; citation_publication_date=2011; citation_pages=727-751; citation_doi=10.1177/0044118X10366951; citation_id=CR26 Pew Research Center. (2011a) Teens & digital citizenship survey 2011 [Data file and code book]. http://www.pewinternet.org/datasets/ , accessed 4 November 2014. Pew Research Center. (2011b) Teens & digital citizenship survey 2011 [survey instrument]. http://www.pewinternet.org/files/old-media/Files/Questionnaire/2011/Teens%20Digital%20Citizenship_Topline_Kindness_Cruelty_Release110911.pdf , accessed 4 November 2014. citation_journal_title=Security Journal; citation_title=The influence of the cyber-social environment on fear of victimization: Cyberbullying and school; citation_author=R Randa; citation_volume=26; citation_issue=4; citation_publication_date=2013; citation_pages=331-348; citation_doi=10.1057/sj.2013.22; citation_id=CR29 citation_journal_title=Journal of Research in Crime and Delinquency; citation_title=Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses; citation_author=BW Reyns; citation_volume=50; citation_issue=2; citation_publication_date=2013; citation_pages=216-238; citation_doi=10.1177/0022427811425539; citation_id=CR30 citation_journal_title=Criminal Justice and Behavior; citation_title=Being pursued online: Applying cyberlifestyle – Routine activities theory to cyberstalking victimization; citation_author=BW Reyns, B Henson, BS Fisher; citation_volume=38; citation_issue=11; citation_publication_date=2011; citation_pages=1149-1169; citation_doi=10.1177/0093854811421448; citation_id=CR31 Seiler, S.J. and Navarro, J.N. (2014) Bullying on the pixel playground: Investigating risk factors of cyberbullying at the intersection of children’s online-offline social lives. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8(4). citation_journal_title=Children and Youth Services Review; citation_title=Are social networking sites a source of online harassment for teens? Evidence from survey data; citation_author=A Sengupta, A Chaudhuri; citation_volume=33; citation_issue=2; citation_publication_date=2011; citation_pages=284-290; citation_doi=10.1016/j.childyouth.2010.09.011; citation_id=CR33 citation_journal_title=Scandinavian Journal of Psychology; citation_title=Cyberbullying: Another main type of bullying?; citation_author=R Slonje, PK Smith; citation_volume=49; citation_issue=2; citation_publication_date=2008; citation_pages=147-154; citation_doi=10.1111/j.1467-9450.2007.00611.x; citation_id=CR34 citation_journal_title=Computers in Human Behavior; citation_title=Following you home from school: A critical review and synthesis of research on cyberbullying victimization; citation_author=RS Tokunaga; citation_volume=26; citation_issue=3; citation_publication_date=2010; citation_pages=277-287; citation_doi=10.1016/j.chb.2009.11.014; citation_id=CR35 citation_journal_title=Procedia-Social and Behavioral Sciences; citation_title=Student’s experiences with traditional bullying and cyberbullying: Findings from a romanian sample; citation_author=R Tomşa, C Jenaro, M Campbell, D Neacşu; citation_volume=78; citation_publication_date=2013; citation_pages=586-590; citation_doi=10.1016/j.sbspro.2013.04.356; citation_id=CR36 citation_journal_title=European Journal of Criminology; citation_title=The novelty of ‘cybercrime’an assessment in light of routine activity theory; citation_author=M Yar; citation_volume=2; citation_issue=4; citation_publication_date=2005; citation_pages=407-427; citation_doi=10.1177/147737080556056; citation_id=CR37