One step forward, two steps back: Cyberbullying within social networking sites
Tóm tắt
Although public awareness of cyberbullying has increased, evidence suggests the social problem has not abated. While past studies have highlighted numerous factors that affect risks of experiencing cyberbullying in general, few studies have focused on identifying risk factors within social networking sites (SNS). Moreover, even fewer studies have utilized a theoretical perspective to frame and ground findings. Therefore, using data collected as part of the Pew Internet Project, and Routine Activities Theory (Cohen and Felson, 1979) as a theoretical framework, this study fills a substantial void in the literature by reviewing what activities within SNS affect the risk of experiencing cyberbullying.
Tài liệu tham khảo
citation_journal_title=Educational Psychology in Practice; citation_title=Cyberbullying: Through the eyes of children and young people; citation_author=MJ Ackers; citation_volume=28; citation_issue=2; citation_publication_date=2012; citation_pages=141-157; citation_doi=10.1080/02667363.2012.665356; citation_id=CR1
citation_journal_title=Journal of Educational Computing Research; citation_title=Cyber-harassment: A study of a new method for an old behavior; citation_author=T Beran, Q Li; citation_volume=32; citation_issue=3; citation_publication_date=2005; citation_pages=265-277; citation_doi=10.2190/8YQM-B04H-PG4D-BLLH; citation_id=CR2
citation_journal_title=International Journal of Cyber Criminology; citation_title=On-line activities, guardianship, and malware infection: An examination of routine activities theory; citation_author=AM Bossler, TJ Holt; citation_volume=3; citation_issue=1; citation_publication_date=2009; citation_pages=400-420; citation_id=CR3
citation_journal_title=Youth & Society; citation_title=Predicting online harassment victimization among a juvenile population; citation_author=AM Bossler, TJ Holt, DC May; citation_volume=44; citation_issue=4; citation_publication_date=2012; citation_pages=500-523; citation_doi=10.1177/0044118X11407525; citation_id=CR4
citation_journal_title=Emotional and Behavioural Difficulties; citation_title=Victims’ perceptions of traditional and cyberbullying, and the psychosocial correlates of their victimisation; citation_author=M Campbell, B Spears, P Slee, D Butler, S Kift; citation_volume=17; citation_issue=3–4; citation_publication_date=2012; citation_pages=389-401; citation_doi=10.1080/13632752.2012.704316; citation_id=CR5
citation_journal_title=American Sociological Review; citation_title=Social change and crime rate trends: A routine activity approach; citation_author=LE Cohen, M Felson; citation_volume=44; citation_issue=4; citation_publication_date=1979; citation_pages=588-608; citation_doi=10.2307/2094589; citation_id=CR6
citation_title=Crime and Nature; citation_publication_date=2006; citation_id=CR7; citation_author=M Felson
citation_journal_title=Alberta Journal of Educational Research; citation_title=Adolescents’ evaluation of cyberbullying events; citation_author=C Gomez-Garibello, S Shariff, M McConnell, V Talwar; citation_volume=58; citation_issue=3; citation_publication_date=2012; citation_pages=474-477; citation_id=CR8
citation_journal_title=Journal of Contemporary Criminal Justice; citation_title=Fear of crime online? Examining the effect of risk, previous victimization, and exposure on fear of online interpersonal victimization; citation_author=B Henson, BW Reyns, BS Fisher; citation_volume=29; citation_issue=4; citation_publication_date=2013; citation_pages=475-497; citation_doi=10.1177/1043986213507403; citation_id=CR9
citation_journal_title=Deviant Behavior; citation_title=Can low self-control help with the understanding of the software piracy problem?; citation_author=GE Higgins; citation_volume=26; citation_issue=1; citation_publication_date=2004; citation_pages=1-24; citation_doi=10.1080/01639620490497947; citation_id=CR10
citation_journal_title=Deviant Behavior; citation_title=Cyberbullying: An exploratory analysis of factors related to offending and victimization; citation_author=S Hinduja, JW Patchin; citation_volume=29; citation_issue=2; citation_publication_date=2008; citation_pages=129-156; citation_doi=10.1080/01639620701457816; citation_id=CR11
citation_journal_title=Crime Prevention & Community Safety; citation_title=The capable guardian in routine activities theory: A theoretical and conceptual reappraisal; citation_author=ME Hollis, M Felson, BC Welsh; citation_volume=15; citation_issue=1; citation_publication_date=2013; citation_pages=65-79; citation_doi=10.1057/cpcs.2012.14; citation_id=CR12
citation_journal_title=Deviant Behavior; citation_title=Examining the applicability of lifestyle-routine activities theory for cybercrime victimization; citation_author=TJ Holt, AM Bossler; citation_volume=30; citation_issue=1; citation_publication_date=2008; citation_pages=1-25; citation_doi=10.1080/01639620701876577; citation_id=CR13
citation_journal_title=Journal of Adolescent Health; citation_title=Trends in youth internet victimization: Findings from three youth internet safety surveys 2000–2010; citation_author=LM Jones, KJ Mitchell, D Finkelhor; citation_volume=50; citation_issue=2; citation_publication_date=2012; citation_pages=179-186; citation_doi=10.1016/j.jadohealth.2011.09.015; citation_id=CR14
citation_journal_title=Computers in Human Behavior; citation_title=Facebook bullying: An extension of battles in school; citation_author=GCE Kwan, MM Skoric; citation_volume=29; citation_issue=1; citation_publication_date=2013; citation_pages=16-25; citation_doi=10.1016/j.chb.2012.07.014; citation_id=CR15
citation_journal_title=Journal of Aggression, Maltreatment &Trauma; citation_title=Cyberbullying in high schools: A study of students’ behaviors and beliefs about this new phenomenon; citation_author=Q Li; citation_volume=19; citation_publication_date=2010; citation_pages=372-392; citation_doi=10.1080/10926771003788979; citation_id=CR16
Marcum, C. (2014) CybercrimeFrederick, MD: Wolters Kluwer Law & Business.
citation_journal_title=Deviant Behavior; citation_title=Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory; citation_author=CD Marcum, GE Higgins, ML Ricketts; citation_volume=31; citation_issue=5; citation_publication_date=2010; citation_pages=381-410; citation_doi=10.1080/01639620903004903; citation_id=CR18
citation_journal_title=International Journal of Cyber Criminology; citation_title=Identifying potential factors of adolescent online victimization for high school seniors; citation_author=CD Marcum; citation_volume=2; citation_issue=2; citation_publication_date=2008; citation_pages=346-67; citation_id=CR19
citation_journal_title=International Journal of Cyber Criminology; citation_title=Parental regulation and online activities: Examining factors that influence a youth’s potential to become a victim of online harassment; citation_author=R Moore, NT Guntupalli, T Lee; citation_volume=4; citation_issue=1–2; citation_publication_date=2010; citation_pages=685-698; citation_id=CR20
citation_journal_title=Deviant Behavior; citation_title=Transforming potential offenders into motivated ones: Are sex offenders tempted by alcohol and pornography?; citation_author=EE Mustaine, R Tewksbury; citation_volume=30; citation_issue=7; citation_publication_date=2009; citation_pages=561-588; citation_doi=10.1080/01639620802467821; citation_id=CR21
citation_journal_title=Sociological Spectrum; citation_title=Going cyber: Using routine activities theory to predict cyberbullying experiences; citation_author=JN Navarro, JL Jasinski; citation_volume=32; citation_issue=1; citation_publication_date=2012; citation_pages=81-94; citation_doi=10.1080/02732173.2012.628560; citation_id=CR22
citation_journal_title=Women & Criminal Justice; citation_title=Why girls? Using routine activities theory to predict cyberbullying experiences between girls and boys; citation_author=JN Navarro, JL Jasinski; citation_volume=23; citation_issue=4; citation_publication_date=2013; citation_pages=286-303; citation_doi=10.1080/08974454.2013.784225; citation_id=CR23
citation_title=Identity theft; citation_inbook_title=Social Networking as a Criminal Enterprise; citation_publication_date=2014; citation_id=CR24; citation_author=JN Navarro; citation_author=JL Jasinski
citation_journal_title=European Journal of Developmental Psychology; citation_title=Cyberbullying: An overrated phenomenon?; citation_author=D Olweus; citation_volume=9; citation_issue=5; citation_publication_date=2012; citation_pages=520-538; citation_doi=10.1080/17405629.2012.682358; citation_id=CR25
citation_journal_title=Youth & Society; citation_title=Traditional and nontraditional bullying among youth: A test of general strain theory; citation_author=JW Patchin, S Hinduja; citation_volume=43; citation_issue=2; citation_publication_date=2011; citation_pages=727-751; citation_doi=10.1177/0044118X10366951; citation_id=CR26
Pew Research Center. (2011a) Teens & digital citizenship survey 2011 [Data file and code book].
http://www.pewinternet.org/datasets/
, accessed 4 November 2014.
Pew Research Center. (2011b) Teens & digital citizenship survey 2011 [survey instrument].
http://www.pewinternet.org/files/old-media/Files/Questionnaire/2011/Teens%20Digital%20Citizenship_Topline_Kindness_Cruelty_Release110911.pdf
, accessed 4 November 2014.
citation_journal_title=Security Journal; citation_title=The influence of the cyber-social environment on fear of victimization: Cyberbullying and school; citation_author=R Randa; citation_volume=26; citation_issue=4; citation_publication_date=2013; citation_pages=331-348; citation_doi=10.1057/sj.2013.22; citation_id=CR29
citation_journal_title=Journal of Research in Crime and Delinquency; citation_title=Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses; citation_author=BW Reyns; citation_volume=50; citation_issue=2; citation_publication_date=2013; citation_pages=216-238; citation_doi=10.1177/0022427811425539; citation_id=CR30
citation_journal_title=Criminal Justice and Behavior; citation_title=Being pursued online: Applying cyberlifestyle – Routine activities theory to cyberstalking victimization; citation_author=BW Reyns, B Henson, BS Fisher; citation_volume=38; citation_issue=11; citation_publication_date=2011; citation_pages=1149-1169; citation_doi=10.1177/0093854811421448; citation_id=CR31
Seiler, S.J. and Navarro, J.N. (2014) Bullying on the pixel playground: Investigating risk factors of cyberbullying at the intersection of children’s online-offline social lives. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8(4).
citation_journal_title=Children and Youth Services Review; citation_title=Are social networking sites a source of online harassment for teens? Evidence from survey data; citation_author=A Sengupta, A Chaudhuri; citation_volume=33; citation_issue=2; citation_publication_date=2011; citation_pages=284-290; citation_doi=10.1016/j.childyouth.2010.09.011; citation_id=CR33
citation_journal_title=Scandinavian Journal of Psychology; citation_title=Cyberbullying: Another main type of bullying?; citation_author=R Slonje, PK Smith; citation_volume=49; citation_issue=2; citation_publication_date=2008; citation_pages=147-154; citation_doi=10.1111/j.1467-9450.2007.00611.x; citation_id=CR34
citation_journal_title=Computers in Human Behavior; citation_title=Following you home from school: A critical review and synthesis of research on cyberbullying victimization; citation_author=RS Tokunaga; citation_volume=26; citation_issue=3; citation_publication_date=2010; citation_pages=277-287; citation_doi=10.1016/j.chb.2009.11.014; citation_id=CR35
citation_journal_title=Procedia-Social and Behavioral Sciences; citation_title=Student’s experiences with traditional bullying and cyberbullying: Findings from a romanian sample; citation_author=R Tomşa, C Jenaro, M Campbell, D Neacşu; citation_volume=78; citation_publication_date=2013; citation_pages=586-590; citation_doi=10.1016/j.sbspro.2013.04.356; citation_id=CR36
citation_journal_title=European Journal of Criminology; citation_title=The novelty of ‘cybercrime’an assessment in light of routine activity theory; citation_author=M Yar; citation_volume=2; citation_issue=4; citation_publication_date=2005; citation_pages=407-427; citation_doi=10.1177/147737080556056; citation_id=CR37