Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations
Abstract
:1. Introduction
2. Background of the Study and Problem Statements
- What is the prevalence of cyberstalking victimization among college students?
- What are the relationships between L-RAT constructs and cyberstalking victimization?
- What are the demographic factors that are linked to being a survivor of cyberstalking?
- How do we develop a cyberstalking victimization model?
- To estimate the prevalence of cyberstalking victimization among college students.
- To examine the relationships between L-RAT constructs and cyberstalking victimization.
- To identify the demographic factors that are linked to the history of cyberstalking victimization.
- To develop and validate a cyberstalking victimization model.
3. Theoretical Background
4. The Proposed Cyberstalking Victimization Conceptual Model
5. Data Analysis Techniques
6. The Theoretical Framework Concept
7. Results of Data Analysis
7.1. Data Collection
7.2. Model Quality Assessment
8. Conclusions and Discussion
- i.
- Due to the following reasons, scientific evidence for the use of victimization and criminal opportunity explanations to account for cyberstalking victimization has been insufficient and contradictory to date:
- The available studies on cyberstalking victimization have focused on the primary effect modeling without attention to any possible contextual effect.
- The measurement used in the literature studies for the primary theoretical constructs (proximity/exposure to the motivated offender, a suitable target, and digital guardianship) may not have been appropriately operationalized, and depending on a single definition for the key theoretical concept [96], the current study operationalized the vital theoretical concepts systematically with their indicators depending on the systematic literature review on definitions and factors for cyberstalking victimization, which is assumed to be the first systematic literature review of cyberstalking victimization in the research.
8.1. Practical Implications
- i.
- A conceptual model for cyberstalking victimization that can be utilized to minimize the cyberstalking experienced by implementing it in society and providing research directions that will help us better understand the causes of this new phenomenon and what to do about it.
- ii.
- This study has produced a validated questionnaire about cyberstalking victimization that can be used as an instrument tool by any institution in any society to uncover the prevalence and nature of the cyberstalking victimization phenomenon to contribute to its protective application. In conclusion, this study provides a comprehensive analysis of the factors and relationships that influence cyberstalking victimization and tests the moderator effect between these factors and cyberstalking victimization.
8.2. Limitations and Future Research Suggestions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Stats, I.W. World Internet Usage and Population Statistics 2021 Year-Q1 Estimates. Available online: https://www.internetworldstats.com/stats.htm (accessed on 31 March 2021).
- Breslin, P. An Investigation into the Problem of Cyberstalking in Ireland and an Examination of the Usefulness of Classifying Cyberstalking as an Addictive Disorder; Dublin Business School: Dublin, Ireland, 2010. [Google Scholar]
- Batra, S.; Sachdeva, S. Organizing Standardized Electronic Healthcare Records Data for Mining. Health Policy Technol. 2016, 5, 226–242. [Google Scholar] [CrossRef]
- Broadhurst, R.; Grabosky, P.; Alazab, M.; Bouhours, B.; Chon, S. An analysis of the nature of groups engaged in cyber crime. Int. J. Cyber Criminol. 2014, 8, 1–20. [Google Scholar]
- Chouhan, R. Cyber crimes: Evolution, detection and future challenges. IUP J. Inf. Technol. 2014, 10, 48. [Google Scholar]
- Cox, C. Protecting victims of cyberstalking, cyberharassment, and online impersonation through prosecutions and effective laws. Jurimetrics 2014, 54, 277–302. [Google Scholar]
- Harwood, M. Security Strategies in Web Applications and Social Networking; Jones & Bartlett Publishers: Burlington, MA, USA, 2010. [Google Scholar]
- Hensler-McGinnis, N.F. Cyberstalking Victimization: Impact and Coping Responses in a National University Sample; University of Maryland: College Park, MD, USA, 2008. [Google Scholar]
- Ladan, M.J. Overview of the 2015 Legal and Policy Strategy on Cybercrime and Cybersecurity in Nigeria. SSRN Electron. J. 2015. [Google Scholar] [CrossRef]
- Mahadevan, P. A Social Anthropology of Cybercrime, The Digitization of India’s Economic Periphery. 2020. Available online: https://globalinitiative.net/analysis/cybercrime-india/ (accessed on 31 March 2021).
- Schell, B.J. Internet Addiction and Cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Springer: Berlin/Heidelberg, Germany, 2020; pp. 679–703. [Google Scholar]
- Seijen, S. Risk Perception towards Cybercrime among Students in the Netherlands: The Effect of Multiple Factors on Risk Perception; University of Twente: Enschede, The Netherlands, 2021. [Google Scholar]
- Sissing, S.K. A Criminological Exploration of Cyber Stalking in South Africa; University of South Africa: Pretoria, South Africa, 2013. [Google Scholar]
- Wall, D.S. The Internet as a conduit for criminal activity. Information Technology and the Criminal Justice System; Pattavina, A., Ed.; Sage Publications, Inc.: Newbury Park, CA, USA, 2015; pp. 77–98. [Google Scholar]
- Johnson, L. Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response; Elsevier: Amsterdam, The Netherlands, 2013. [Google Scholar]
- Basu, S. Jones, Law, and Technology. Regul. Cyberstalking 2007, 2, 1–30. [Google Scholar]
- Bocij, P.; Griffiths, M.; McFarlane, L. Cyberstalking: A new challenge for criminal law. Crim. Lawyer 2002, 122, 3–5. [Google Scholar]
- Bocij, P. Victims of cyberstalking: An exploratory study of harassment perpetrated via the Internet. First Monday 2002, 8. [Google Scholar] [CrossRef]
- Dhillon, G.; Smith, K.J. Defining objectives for preventing cyberstalking. J. Bus. Ethics 2019, 157, 137–158. [Google Scholar] [CrossRef]
- Dreßing, H. Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychol. Behav. Soc. Netw. 2014, 17, 61–67. [Google Scholar] [CrossRef] [Green Version]
- Dreßing, H.; Klein, U.; Bailer, J.; Gass, P.; Gallas, C. Cyberstalking. Nervenarzt 2009, 80, 833–836. [Google Scholar] [CrossRef] [PubMed]
- Easttom, C.; Taylor, J.; Hurley, H. Computer Crime, Investigation, and the Law; Course Technology: Boston, MA, USA, 2011. [Google Scholar]
- Fukuchi, A. A balance of convenience: The use of burden-shifting devices in criminal cyberharassment law. BCL Rev. 2011, 52, 289. [Google Scholar]
- Heinrich, P.A. Generation iStalk: An Examination of the Prior Relationship between Victims of Stalking and Offenders; Theses, Dissertations and Capstones; Marshall University: Huntington, WV, USA, 2015. [Google Scholar]
- Henson, B. Fear of Crime Online: Examining the Effects of Online Victimization and Perceived Risk on Fear of Cyberstalking Victimization; University of Cincinnati: Cincinnati, OH, USA, 2011. [Google Scholar]
- Henson, B.; Reyns, B.; Fisher, B. Internet crime. In Key Issues in Crime and Punishment: Crime and Criminal Behavior; Chambliss, W., Ed.; SAGE Publications: Thousand Oaks, CA, USA, 2011. [Google Scholar]
- Leong, N.; Morando, J.J. Communication in cyberspace. NCL Rev. 2015, 94, 105. [Google Scholar]
- Yang, Y.; Lutes, J.; Li, F.; Luo, B.; Liu, P. Stalking online: On user privacy in social networks. In Proceedings of the Second ACM Conference on Data and Application Security and Privacy, New York, NY, USA, 7–9 February 2012. [Google Scholar]
- Lowry, P.B. Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning. In Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, 15–18 December 2013. [Google Scholar]
- Maple, C.; Short, E.; Brown, A. Cyberstalking in the United Kingdom: An Analysis of the ECHO Pilot Survey; University of Bedfordshire: Luton, UK, 2011. [Google Scholar]
- Mullen, P.E.; Pathé, M.; Purcell, R. Stalkers and their Victims; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar]
- Nobles, M.R.; Reyns, B.W.; Fox, K.A.; Fisher, B.S. Protection against pursuit: A conceptual and empirical comparison of cyberstalking and stalking victimization among a national sample. Justice Q. 2014, 31, 986–1014. [Google Scholar] [CrossRef]
- Payne, B.K. Defining Cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Springer: Cham, Switzerland, 2020; pp. 3–25. [Google Scholar]
- Petrocelli, J.J.L.; Deerfield, O.-W.T. Cyberstalking Presenting a new challenge to law enforcement, cyberstalking occurs when electronic technology is utilized to create a criminal level of intimidation, harassment, or fear. Law Order 2005, 53, 56. [Google Scholar]
- Spitzberg, B.H.; Hoobler, G. Cyberstalking and the technologies of interpersonal terrorism. New Media Soc. 2002, 4, 71–92. [Google Scholar] [CrossRef]
- Reyns, B.W. A Situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prev. Commun. Safety 2010, 12, 99–118. [Google Scholar] [CrossRef]
- Yucedal, B. Victimization in Cyberspace: An Application of Routine Activity and Lifestyle Exposure Theories; Kent State University: Kent, OH, USA, 2010. [Google Scholar]
- Shorey, R.C.; Cornelius, T.L.; Strauss, C. Stalking in college student dating relationships: A descriptive investigation. J. Fam. Violence 2015, 30, 935–942. [Google Scholar] [CrossRef]
- Elizondo, P.; McNiel, D.E.; Binder, R. A Review of Statutes and the Role of the Forensic Psychiatrist in Cyberstalking Involving Youth. J. Am. Acad. Psychiatry Law 2019, 47, 198–207. [Google Scholar]
- Jaishankar, K.; Sankary, V. Cyber Stalking: A Global Menace in the Information Super Highway. ERCES Online Q. Rev. 2005, 2. [Google Scholar]
- Kaplan, B. Evaluating Health Care Information Systems: Methods and Applications; SAGE Publications, Inc.: Newbury Park, CA, USA, 1994. [Google Scholar]
- Kethineni, S. Cybercrime in India: Laws, Regulations, and Enforcement Mechanisms. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Springer: Cham, Switzerland, 2020; pp. 305–326. [Google Scholar]
- Vasiu, I.; Vasiu, L. Cyberstalking Nature and response recommendations. Acad. J. Interdiscip. Stud. 2013, 2, 229. [Google Scholar] [CrossRef] [Green Version]
- Reyns, B.W.; Henson, B.; Fisher, B. Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behav. 2012, 33, 1–25. [Google Scholar] [CrossRef]
- Cuenca-Piqueras, C.; Fernández-Prados, J.S.; González-Moreno, M.J. Face-to-face versus online harassment of European women: Importance of date and place of birth. Sex. Cult. 2020, 24, 157–173. [Google Scholar] [CrossRef]
- Curtis, L.F. Virtual vs. Reality: An Examination of the Nature of Stalking and Cyberstalking; Citeseer: 2012. Available online: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.467.5711&rep=rep1&type=pdf (accessed on 31 March 2021).
- Paullet, K.L. An Exploratory Study of Cyberstalking: Students and Law Enforcement in Allegheny County, Pennsylvania; Robert Morris University: Moon Twp, PA, USA, 2009. [Google Scholar]
- Gialopsos, B.M.; Carter, J.W. Offender searches and crime events. J. Contemp. Crim. Justice 2015, 31, 53–70. [Google Scholar] [CrossRef]
- Stansberry, K.; Anderson, J.; Rainie, L. Experts Optimistic About the Next 50 Years of Digital Life. 2019. Available online: https://www.newswise.com/articles/experts-optimistic-about-the-next-50-years-of-digital-life (accessed on 31 March 2021).
- Gálik, S.; Galikova Tolnaiova, S. Cyberspace as a new existential dimension of man. In Cyberspace; Intech Open: London, UK, 2020; pp. 13–25. [Google Scholar]
- Jahankhani, H.; Al-Nemrat, A.; Hosseinian-Far, A. Cybercrime classification and characteristics. In Cyber Crime and Cyber Terrorism Investigator’s Handbook; Elsevier: Amsterdam, The Netherlands, 2014; pp. 149–164. [Google Scholar]
- Tolnaiová, S.G.; Gálik, S. Cyberspace as a New Living World and Its Axiological Contexts. In Cyberspace; IntechOpen: London, UK, 2020. [Google Scholar]
- Malby, S.; Jesrani, T.; Bañuelos, T.; Holterhof, A.; Hahn, M. Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children; United Nations Office on Drugs and Crime: Vienna, Austria, 2015. [Google Scholar]
- Miller, J.J. Individual offending, routine activities, and activity settings: Revisiting the routine activity theory of general deviance. J. Res. Crime Delinq. 2013, 50, 390–416. [Google Scholar] [CrossRef]
- Begotti, T.; Acquadro Maran, D. Characteristics of cyberstalking behavior, consequences, and coping strategies: A cross-sectional study in a sample of Italian university students. Future Internet 2019, 11, 120. [Google Scholar] [CrossRef] [Green Version]
- Grunin, L.; Yu, G.; Cohen, S. The Relationship Between Youth Cyberbullying Behaviors and Their Perceptions of Parental Emotional Support. Int. J. Bullying Prev. 2020. [Google Scholar] [CrossRef]
- McLoughlin, L. Understanding and measuring coping with cyberbullying in adolescents: Exploratory factor analysis of the brief coping orientation to problems experienced inventory. Curr. Psychol. 2019. [Google Scholar] [CrossRef]
- Pittaro, M.L. Cyber stalking: An analysis of online harassment and intimidation. Int. J. Cyber Criminol. 2007, 1, 180–197. [Google Scholar]
- Shimizu, A. Domestic violence in the digital age: Towards the creation of a comprehensive cyberstalking statute. Berkeley J. Gend. Law Just. 2013, 28, 116. [Google Scholar]
- Gnasigamoney, S.S.; Sidhu, M.S. E-behaviour trends and patterns among Malaysian pre-adolescents and adolescents. Int. J. Digit. Crime Forensics 2013, 5, 50–62. [Google Scholar] [CrossRef] [Green Version]
- Basu, S. Stalking the Stranger in Web 2.0: A Contemporary Regulatory Analysis. Eur. J. Law Technol. 2012, 3. [Google Scholar]
- Meloy, J.R. Stalking: The State of the Science. Crim. Behav. Ment. Health 2007, 17, 1–7. [Google Scholar] [CrossRef]
- Huffman, J.; Overton, A. Missing the Mark: The Neglect of Stalking and Cyberstalking in Introductory Criminology Textbooks. J. Crim. Justice Educ. 2013, 24, 200–217. [Google Scholar] [CrossRef]
- Reyns, B.W. Being Pursued Online: Extent and Nature of Cyberstalking Victimization from a Lifestyle/Routine Activities Perspective; University of Cincinnati: Cincinnati, OH, USA, 2010. [Google Scholar]
- Bossler, A.M.; Holt, D.J. On-line activities, guardianship, and malware infection: An examination of routine activities theory. Int. J. Cyber Criminol. 2009, 3, 400–420. [Google Scholar]
- Holt, T.J.; Bossler, A.M. An Assessment of the Current State of Cybercrime Scholarship. Deviant Behav. 2014, 35, 20–40. [Google Scholar] [CrossRef]
- Kirwan, G. The Psychology of Cyber Crime: Concepts and Principles: Concepts and Principles; IGI Global: Hershey, PA, USA, 2011. [Google Scholar]
- Maple, C.; Wrixon, K. The Rise of Cyberstalking. In Encyclopedia of Information Science and Technology, 3rd ed.; IGI Global: Hershey, PA, USA, 2015; pp. 6801–6809. [Google Scholar]
- Mishra, A.; Mishra, D. Cyber stalking: A challenge for web Security. Cyber Warf. Cyber Terror. 2007, 216–226. [Google Scholar] [CrossRef]
- Ogilvie, E. Cyberstalking. Trends Issues Crime Crim. Justice 2000, 166, 1–6. [Google Scholar]
- Sheridan, L.P.; Grant, T. Is cyberstalking different? Psychol. Crime Law 2007, 13, 627–640. [Google Scholar] [CrossRef]
- Van De Sandt, E. Deviant Security: The Technical Computer Security Practices of Cyber Criminals; University of Bristol: Bristol, UK, 2019. [Google Scholar]
- Alshuaibi, A.S.; Mohd Shamsudin, F.; Alshuaibi, M.S.I. Internet misuse at work in Jordan: Challenges and implications. In Proceedings of the 3rd Convention of the World Association of Business Schools (WAiBS), Kuala Lumpur, Malaysia, 22 November 2015. [Google Scholar]
- (TRC), J.T.R.C. Annual Report of 2015. 2015. Available online: https://www.cbsl.gov.lk/en/publications/economic-and-financial-reports/annual-reports/annual-report-2015 (accessed on 31 March 2021).
- Faqir, R.S. Cyber Crimes in Jordan: A Legal Assessment on the Effectiveness of Information System Crimes Law No (30) of 2010. Int. J. Cyber Criminol. 2013, 7, 81–90. [Google Scholar]
- Piotrowski, C.; Lathrop, P.J. Cyberstalking and college-age students: A bibliometric analysis across scholarly databases. Coll. Stud. J. 2012, 46, 533–536. [Google Scholar]
- Back, S. Empirical Assessment of Cyber Harassment Victimization via Cyber-Routine Activities Theory. Master’s Theses, Ball State University, Muncie, IN, USA, 2016. [Google Scholar]
- DeTardo-Bora, K.A.; Bora, D.J. Cybercrimes: An overview of contemporary challenges and impending threats. Digit. Forensics 2016, 119–132. [Google Scholar] [CrossRef]
- Reyns, B.W. A routine activity perspective on online victimisation: Results from the Canadian General Social Survey. J. Financ. Crime 2015. [Google Scholar] [CrossRef]
- Finn, J. A Survey of Online Harassment at a University Campus. J. Interpers. Violence 2004, 19, 468–483. [Google Scholar] [CrossRef]
- Parsons-Pollard, N.; Moriarty, L.J. Cyberstalking: Utilizing what we do know. Vict. Offenders 2009, 4, 435–441. [Google Scholar] [CrossRef]
- Reyns, B.W.; Henson, B.; Fisher, B.S. Being pursued online: Applying cyberlifestyle–routine activities theory to cyberstalking victimization. Crim. Justice Behav. 2011, 38, 1149–1169. [Google Scholar] [CrossRef]
- Reyns, B.W.; Henson, B. The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with routine activity theory. Int. J. offender Ther. Comp. Criminol. 2016, 60, 1119–1139. [Google Scholar] [CrossRef]
- Roberts, L. Jurisdictional and definitional concerns with computer-mediated Interpersonal crimes: An Analysis on Cyber Stalking. Int. J. Cyber Criminol. 2008, 2, 271–285. [Google Scholar]
- Henson, B.; Reyns, B.W.; Fisher, B.S. Does gender matter in the virtual world? Examining the effect of gender on the link between online social network activity, security and interpersonal victimization. Secur. J. 2013, 26, 315–330. [Google Scholar] [CrossRef]
- Henson, B.; Reyns, B.W.; Fisher, B.S. Cybercrime victimization. In The Wiley Handbook on the Psychology of Violence; Wily: Hoboken, NJ, USA, 2016; pp. 553–570. [Google Scholar] [CrossRef]
- Moriarty, L.J.; Freiberger, K. Cyberstalking: Utilizing newspaper accounts to establish victimization patterns. Vict. Offenders 2008, 3, 131–141. [Google Scholar] [CrossRef]
- Reyns, B.W.; Henson, B.; Fisher, B.S. Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. J. Contemp. Crim. Justice 2016, 32, 148–168. [Google Scholar] [CrossRef]
- Methe, T.D.; Meier, R.F. Opportunity, Choice, and Criminal Victimization: A Test of a Theoretical Model. J. Res. Crime Delinq. 1990, 27, 243–266. [Google Scholar] [CrossRef]
- Cohen, L.E.; Felson, M. Social Change and Crime Rate Trends: A Routine Activity Approach. Am. Sociol. Rev. 1979, 44, 588. [Google Scholar] [CrossRef]
- Hindelang, M.J.; Gottfredson, M.R.; Garofalo, J. Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization; Ballinger: Cambridge, MA, USA, 1978. [Google Scholar]
- Cohen, L.E.; Kluegel, J.R.; Land, K.C. Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory. Am. Sociol. Rev. 1981, 46, 505. [Google Scholar] [CrossRef]
- Phillips, E. Empirical Assessment of Lifestyle-Routine Activity and Social Learning Theory on Cybercrime Offending. Master’s Theses, Ball State University, Muncie, IN, USA, 2015. [Google Scholar]
- Choi, K.S. Computer crime victimization and integrated theory: An empirical assessment. Int. J. Cyber Criminol. 2008, 2, 308–333. [Google Scholar]
- Miethe, T.D.; Stafford, M.C.; Sloane, D. Lifestyle changes and risks of criminal victimization. J. Quant. Criminol. 1990, 6, 357–376. [Google Scholar] [CrossRef]
- Vakhitova, Z.I.; Reynald, D.; Townsley, M. Toward the Adaptation of Routine Activity and Lifestyle Exposure Theories to Account for Cyber Abuse Victimization. J. Contemp. Crim. Justice 2016, 32, 169–188. [Google Scholar] [CrossRef]
- FELSON, M. Linking Criminal Choices, Routine Activities, Informal Control, and Criminal Outcomes (1986). In Classics in Environmental Criminology; Routledge: London, UK, 2010; pp. 357–366. [Google Scholar]
- Safaldin, M.; Otair, M.; Abualigah, L. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient Intell. Hum. Comp. 2021, 12, 1559–1576. [Google Scholar] [CrossRef]
- McNeeley, S. Lifestyle-Routine Activities and Crime Events. J. Contemp. Crim. Justice 2015, 31, 30–52. [Google Scholar] [CrossRef]
- Fnkelhor, D.; Asdigian, N.L. Risk factors for youth victimization: Beyond a lifestyles/routine activities theory approach. Violence Vict. 1996, 11, 3–20. [Google Scholar] [CrossRef]
- Felson, M.; Clarke, R.V. Opportunity makes the thief. Police Res. Ser. Pap. 1998, 98, 10. [Google Scholar]
- Abualigah, L.; Diabat, A.; Abd Elaziz, M. Intelligent workflow scheduling for Big Data applications in IoT cloud computing environments. In Cluster Computing; Springer: Berlin/Heidelberg, Germany, 2021; pp. 1–20. [Google Scholar]
- Clarke, R.V.G.; Webb, B. Hot Products: Understanding, Anticipating and Reducing Demand for Stolen Goods; Great Britain Home Office: London, UK, 1999. [Google Scholar]
- Clarke, R.V.; Eck, J.E. Crime Analysis for Problem Solvers in 60 Small Steps; US Department of Justice, Office of Community Oriented Policing Services: Washington, DC, USA, 2005.
- Miethe, T.D.; Meier, R.F. Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations; Suny Press: New York, NY, USA, 1994. [Google Scholar]
- Fisher, B. The Sexual Victimization of College Women; US Department of Justice, Office of Justice Programs, National Institute of Justice: Washington, DC, USA, 2000.
- Tewksbury, R.; Mustaine, E.E. Routine Activities And Vandalism: A Theoretical And Empirical Study. J. Crime Justice 2000, 23, 81–110. [Google Scholar] [CrossRef]
- Chen, L.E.; Cantor, D. Residential Burglary in the United States: Life-Style and Demographic Factors Associated With the Probability of Victimization. J. Res. Crime Delinq. 1981, 18, 113–127. [Google Scholar] [CrossRef]
- Jensen, G.F.; Brownfield, D. Gender, Lifestyles, and Victimization: Beyond Routine Activity. Violence Vict. 1986, 1, 85–99. [Google Scholar] [CrossRef]
- Methe, T.D.; Stafford, M.C.; Long, J.S. Social Differentiation in Criminal Victimization: A Test of Routine Activities/Lifestyle Theories. Am. Sociol. Rev. 1987, 52, 184. [Google Scholar] [CrossRef]
- Sampson, R.J. Personal Violence by Strangers: An Extension and Test of the Opportunity Model of Predatory Victimization. J. Crim. Law Criminol. 1987, 78, 327. [Google Scholar] [CrossRef] [Green Version]
- Sampson, R.J.; Wooldredge, J.D. Linking the micro-and macro-level dimensions of lifestyle-routine activity and opportunity models of predatory victimization. J. Quant. Criminol. 1987, 3, 371–393. [Google Scholar] [CrossRef]
- Lasley, J.R. Drinking routines/lifestyles and predatory victimization: A causal analysis. Justice Q. 1989, 6, 529–542. [Google Scholar] [CrossRef]
- Kennedy, L.W.; Forde, D.R. Routine Activities and Crime: An Analysis of Victimization in Canada. Criminology 1990, 28, 137–152. [Google Scholar] [CrossRef]
- Sampson, R.J.; Lauritsen, J.L. Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence. J. Res. Crime Delinq. 1990, 27, 110–139. [Google Scholar] [CrossRef]
- Luritsen, J.L.; Sampson, R.J.; Laub, J.H. The link between offending and victimization among adolescents. Criminology 1991, 29, 265–292. [Google Scholar] [CrossRef]
- Lauritsen, J.L.; Laub, J.H.; Sampson, R.J. Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents. Violence Vict. 1992, 7, 91–108. [Google Scholar] [CrossRef] [PubMed]
- Wooldredge, J.D.; Cullen, F.T.; Latessa, E.J. Research note victimization in the workplace: A test of routine activities theory. Justice Q. 1992, 9, 325–335. [Google Scholar] [CrossRef]
- Miethe, T.D.; McDowall, D.J. Contextual effects in models of criminal victimization. Soc. Forces 1993, 71, 741–759. [Google Scholar] [CrossRef]
- Rountree, P.W.; Land, K.C.; Miethe, T.D. Macro-micro integration in the study of victimization: A hierarchical logistic model analysis across seattle neighborhoods. Criminology 1994, 32, 387–414. [Google Scholar] [CrossRef]
- Schwartz, M.D.; Pitts, V.L. Exploring a feminist routine activities approach to explaining sexual assault. Justice Q. 1995, 12, 9–31. [Google Scholar] [CrossRef]
- Fisher, B.S.; Sloan, J.; Cullen, F.T.; Lu, C. Crime in the ivory tower: The level and sources of student victimization. Criminology 1998, 36, 671–710. [Google Scholar] [CrossRef]
- Mustaine, E.E.; Tewksbury, R. Predicting Risks of Larceny theft victimization: A routine activity analysis using refined lifestyle measures. Criminology 1998, 36, 829–858. [Google Scholar] [CrossRef]
- Mustaine, E.E.; Tewksbury, R.J. A routine activity theory explanation for women’s stalking victimizations. Violence Women 1999, 5, 43–62. [Google Scholar] [CrossRef]
- Mustaine, E.E.; Tewksbury, R. Comparing the Lifestyles of Victims, Offenders, and Victim-Offenders: A Routine Activity Theory Assessment of Similarities and Differences for Criminal Incident Participants. Sociol. Focus 2000, 33, 339–362. [Google Scholar] [CrossRef]
- Wittebrood, K.; Nieuwbeerta, P. Criminal victimization during one’s life course: The effects of previous victimization and patterns of routine activities. J. Res. Crime Delinq. 2000, 37, 91–122. [Google Scholar] [CrossRef]
- Fisher, B.S.; Cullen, F.T.; Turner, M.G. Being pursued: Stalking victimization in a national study of college women. Criminol. Publ. Policy 2002, 1, 257–308. [Google Scholar] [CrossRef]
- Mustaine, E.E.; Tewksbury, R. Sexual Assault of College Women: A Feminist Interpretation of a Routine Activities Analysis. Crim. Justice Rev. 2002, 27, 89–123. [Google Scholar] [CrossRef]
- Schreck, C.; Wright, R.A.; Miller, J.M. A study of individual and situational antecedents of violent victimization. Justice Q. 2002, 19, 159–180. [Google Scholar] [CrossRef]
- Dugan, L.; Apel, R. An exploratory study of the violent victimization of women: Race/Ethnicity and situational context. Criminology 2003, 41, 959–980. [Google Scholar] [CrossRef]
- Schreck, C.; Miller, J.M.; Gibson, C.L. Trouble in the School Yard: A Study of the Risk Factors of Victimization at School. Crime Delinq. 2003, 49, 460–484. [Google Scholar] [CrossRef]
- Schreck, C.J.; Fisher, B.S. Specifying the influence of family and peers on violent victimization: Extending routine activities and lifestyles theories. J. Interpers. Violence 2004, 19, 1021–1041. [Google Scholar] [CrossRef] [PubMed]
- Tseloni, A.; Wittebrood, K.; Farrell, G.; Pease, K. Burglary Victimization in England and Wales, the United States and the Netherlands: A Cross-National Comparative Test of Routine Activities and Lifestyle Theories. Br. J. Criminol. 2004, 44, 66–91. [Google Scholar] [CrossRef]
- Schreck, C.J.; Stewart, E.A.; Fisher, B.S. Self-control, Victimization, and their Influence on Risky Lifestyles: A Longitudinal Analysis Using Panel Data. J. Quant. Criminol. 2006, 22, 319–340. [Google Scholar] [CrossRef]
- Wilcox, P.; Madensen, T.D.; Tillyer, M.S. Guardianship in Context: Implications for burglary victimization risk and prevention. Criminology 2007, 45, 771–803. [Google Scholar] [CrossRef]
- Messner, S.F.; Lu, Z.; Zhang, L.; Liu, J. Risks of Criminal Victimization in Contemporary Urban China: An Application of Lifestyle/Routine Activities Theory. Justice Q. 2007, 24, 496–522. [Google Scholar] [CrossRef]
- Taylor, T.J.; Peterson, D.; Esbensen, F.-A.; Freng, A. Gang Membership as a Risk Factor for Adolescent Violent Victimization. J. Res. Crime Delinq. 2007, 44, 351–380. [Google Scholar] [CrossRef]
- Taylor, T.J. Youth gang membership and serious violent victimization: The importance of lifestyles and routine activities. J. Interpers. Violence 2008, 23, 1441–1464. [Google Scholar] [CrossRef]
- Spano, R.; Freilich, J.D.; Bolland, J. Gang Membership, Gun Carrying, and Employment: Applying Routine Activities Theory to Explain Violent Victimization Among Inner City, Minority Youth Living in Extreme Poverty*. Justice Q. 2008, 25, 381–410. [Google Scholar] [CrossRef]
- Burrow, J.D.; Apel, R. Youth Behavior, School Structure, and Student Risk of Victimization. Justice Q. 2008, 25, 349–380. [Google Scholar] [CrossRef]
- Wilcox, P. Gendered opportunity? School-based adolescent victimization. J. Res. Crime Delinq. 2009, 46, 245–269. [Google Scholar] [CrossRef]
- Savolainen, J.; Sipilä, P.; Martikainen, P.; Anderson, A.L. Family, Community, and Lifestyle: Adolescent Victimization in Helsinki. Sociol. Q. 2009, 50, 715–738. [Google Scholar] [CrossRef]
- Reid, J.A.; Sullivan, C.J. A Latent Class Typology of Juvenile Victims and Exploration of Risk Factors and Outcomes of Victimization. Crim. Justice Behav. 2009, 36, 1001–1024. [Google Scholar] [CrossRef]
- Henson, B.; Wilcox, P.; Reyns, B.W.; Cullen, F.T. Gender, Adolescent Lifestyles, and Violent Victimization: Implications for Routine Activity Theory. Vict. Offenders 2010, 5, 303–328. [Google Scholar] [CrossRef]
- Fisher, B.S.; Daigle, L.E.; Cullen, F.T. What Distinguishes Single from Recurrent Sexual Victims? The Role of Lifestyle-Routine Activities and First-Incident Characteristics. Justice Q. 2010, 27, 102–129. [Google Scholar] [CrossRef]
- Tillyer, M.S.; Wilcox, P.; Gialopsos, B.M. Adolescent school-based sexual victimization: Exploring the role of opportunity in a gender-specific multilevel analysis. J. Crim. Justice 2010, 38, 1071–1081. [Google Scholar] [CrossRef]
- Sillyer, M.S.; Tillyer, R.; Miller, H.V.; Pangrac, R. Reexamining the Correlates of Adolescent Violent Victimization: The Importance of Exposure, Guardianship, and Target Characteristics. J. Interpers. Violence 2010, 26, 2908–2928. [Google Scholar] [CrossRef]
- Tillyer, M.S.; Fisher, B.S.; Wilcox, P.J. The effects of school crime prevention on students’ violent victimization, risk perception, and fear of crime: A multilevel opportunity perspective. Justice Q. 2011, 28, 249–277. [Google Scholar] [CrossRef]
- Peguero, A.A.; Popp, A.M.; Koo, D.J. Race, Ethnicity, and School-Based Adolescent Victimization. Crime Delinq. 2015, 61, 323–349. [Google Scholar] [CrossRef]
- Pauwels, L.J.R.; Svensson, R. Exploring the Relationship Between Offending and Victimization: What is the Role of Risky Lifestyles and Low Self-Control? A Test in Two Urban Samples. Eur. J. Crim. Policy Res. 2011, 17, 163–177. [Google Scholar] [CrossRef]
- Averdijk, M. Reciprocal Effects of Victimization and Routine Activities. J. Quant. Criminol. 2011, 27, 125–149. [Google Scholar] [CrossRef] [Green Version]
- Peguero, A.A.; Popp, A.M. Youth violence at school and the intersection of gender, race, and ethnicity. J. Crim. Justice 2012, 40, 1–9. [Google Scholar] [CrossRef]
- Maimon, D.; Browning, C.R. Adolescents’ Violent Victimization in the Neighbourhood: Situational and Contextual Determinants. Br. J. Criminol. 2012, 52, 808–833. [Google Scholar] [CrossRef]
- Bunch, J.; Clay-Warner, J.; Lei, M.K. Demographic characteristics and victimization risk: Testing the mediating effects of routine activities. Crime Delinq. 2015, 61, 1181–1205. [Google Scholar] [CrossRef]
- Gibson, C.L.; Fagan, A.A.; Antle, K. Avoiding Violent Victimization Among Youths in Urban Neighborhoods: The Importance of Street Efficacy. Am. J. Public Health 2014, 104, e154–e161. [Google Scholar] [CrossRef] [PubMed]
- Holt, T.J.; Bossler, A.M. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization. Deviant Behav. 2008, 30, 1–25. [Google Scholar] [CrossRef]
- Bossler, A.M.; Holt, T.J.; May, D.C. Predicting Online Harassment Victimization Among a Juvenile Population. Youth Soc. 2012, 44, 500–523. [Google Scholar] [CrossRef]
- Welsh, A.; Lavoie, J.A.A. Risky eBusiness: An Examination of Risk-taking, Online Disclosiveness, and Cyberstalking Victimization. Cyberpsychol. J. Psychosoc. Res. Cyberspace 2012, 6. [Google Scholar] [CrossRef]
- Marcum, C.D. Identifying potential factors of adolescent online victimization for high school seniors. Int. J. Cyber Criminol. 2008, 2, 346. [Google Scholar]
- Ngo, F.T.; Paternoster, R. Cybercrime Victimization: An examination of Individual and Situational level factors. Int. J. Cyber Criminol. 2011, 5, 773. [Google Scholar]
- Marcum, C.D.; Ricketts, M.L.; Higgins, G.E. Assessing sex experiences of online victimization: An examination of adolescent online behaviors using routine activity theory. Crim. Justice Rev. 2010, 35, 412–437. [Google Scholar] [CrossRef] [Green Version]
- Leukfeldt, E.R.; Yar, M. Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis. Deviant Behav. 2016, 37, 263–280. [Google Scholar] [CrossRef] [Green Version]
- Hutchings, A.; Hayes, H. Routine activity theory and phishing victimisation: Who gets caught in the ‘net’? Curr. Issues Crim. Justice 2009, 20, 433–452. [Google Scholar] [CrossRef] [Green Version]
- Pratt, T.C.; Holtfreter, K.; Reisig, M.D. Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory. J. Res. Crime Delinq. 2010, 47, 267–296. [Google Scholar] [CrossRef]
- Van Wilsem, J. Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. Eur. J. Criminol. 2011, 8, 115–127. [Google Scholar] [CrossRef]
- Leukfeldt, E.R. Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychol. Behav. Soc. Netw. 2014, 17, 551–555. [Google Scholar] [CrossRef] [PubMed]
- Van Wilsem, J. ‘Bought it, but Never Got it’ Assessing Risk Factors for Online Consumer Fraud Victimization. Eur. Sociol. Rev. 2013, 29, 168–178. [Google Scholar] [CrossRef]
- Alshalan, A. Cyber-Crime Fear and Victimization: An Analysis of a National Survey; Mississippi State University: Starkville, MS, USA, 2006. [Google Scholar]
- Navarro, J.N.; Jasinski, J. Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences. Sociol. Spectr. 2012, 32, 81–94. [Google Scholar] [CrossRef]
- Marcum, C.D.; Higgins, G.E.; Ricketts, M.L. Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routine Activity Theory. Deviant Behav. 2010, 31, 381–410. [Google Scholar] [CrossRef]
- Reyns, B.W. Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. J. Res. Crime Delinq. 2013, 50, 216–238. [Google Scholar] [CrossRef]
- Wiersma, W. Research Methods in Education: An Introduction; Prentice Hall: Upper Saddle River, NJ, USA, 1985. [Google Scholar]
- Guba, E.G.; Lincoln, Y.S. Competing paradigms in qualitative research. Handb. Qual. Res. 1994, 2, 105. [Google Scholar]
- Bamasoud, D.M.; Iahad, N.A.; Rahman, A.A. Academic researchers’ absorptive capacity influence on collaborative technologies acceptance for research purpose: Pilot study. Mod. Appl. Sci. 2014, 8, 161. [Google Scholar] [CrossRef]
- Bhattacherjee, A. Social Science Research: Principles, Methods, and Practices; Global Text Project: Athens, GA, USA, 2012. [Google Scholar]
- Kennedy, M.A.; Taylor, M.A. Online harassment and victimization of college students. Justice Policy J. 2010, 7, 1–21. [Google Scholar]
- Sekaran, U.; Bougie, R. Research Methods for Business: A Skill Building Approach; John Wiley & Sons: Hoboken, NJ, USA, 2016. [Google Scholar]
- Blaxter, L. How to Research; McGraw-Hill Education: New York, NY, USA, 2010. [Google Scholar]
- Hair Jr, J.F.; Hult, G.T.M.; Ringle, C.; Sarstedt, M. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM); Sage Publications: Thousand Oaks, CA, USA, 2016. [Google Scholar]
- Edwards, J.R.; Bagozzi, R.P. On the nature and direction of relationships between constructs and measures. Psychol. Methods 2000, 5, 155–174. [Google Scholar] [CrossRef]
- Maccallum, R.C.; Browne, M.W. The use of causal indicators in covariance structure models: Some practical issues. Psychol. Bull. 1993, 114, 533–541. [Google Scholar] [CrossRef] [PubMed]
- Petter, S.; Straub, D.; Rai, A. Specifying Formative Constructs in Information Systems Research. MIS Q. 2007, 31, 623. [Google Scholar] [CrossRef] [Green Version]
- Diamantopoulos, A.; Winklhofer, H.M. Index construction with formative indicators: An alternative to scale development. J. Mark. Res. 2001, 38, 269–277. [Google Scholar] [CrossRef]
- Fornell, C.; Bookstein, F.L. Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. J. Mark. Res. 1982, 19, 440–452. [Google Scholar] [CrossRef] [Green Version]
- Rossiter, J.R. The C-OAR-SE procedure for scale development in marketing. Int. J. Res. Mark. 2002, 19, 305–335. [Google Scholar] [CrossRef] [Green Version]
- Chin, W.W. The partial least squares approach to structural equation modeling. Mod. Methods Bus. Res. 1998, 295, 295–336. [Google Scholar]
- Jarvis, C.B.; MacKenzie, S.B.; Podsakoff, P.M. A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research. J. Consum. Res. 2003, 30, 199–218. [Google Scholar] [CrossRef]
- Cronbach, L.J. Coefficient alpha and the internal structure of tests. Psychometrika 1951, 16, 297–334. [Google Scholar] [CrossRef] [Green Version]
- Gefen, D.; Straub, D.; Boudreau, M.C. Structural equation modeling and regression: Guidelines for research practice. Commun. Assoc. Inf. Syst. 2000, 4, 7. [Google Scholar] [CrossRef] [Green Version]
- Urbach, N.; Ahlemann, F. Structural equation modeling in information systems research using partial least squares. J. Inf. Technol. Theory Appl. 2010, 11, 5–40. [Google Scholar]
- Hair, J. Multivariate Data Analysis Seventh Edition; Prentice Hall: Upper Saddle River, NJ, USA, 2010. [Google Scholar]
- Kasunic, M. Designing an Effective Survey; Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst: Pittsburgh, PA, USA, 2005. [Google Scholar]
- Netemeyer, R.G.; Bearden, W.O.; Sharma, S. Scaling Procedures: Issues and Applications; Sage Publications: Thousand Oaks, CA, USA, 2003. [Google Scholar]
- Zukerberg, A.L.; Moore, J.C.; Von Thurn, D.R. Practical Considerations in Sample Size Selection for Behavior Coding Pretests; US Bureau of the Census: Washington, DC, USA, 1995.
- Harter, R.; Eckman, S.; English, N.; O’Muircheartaigh, C. Applied sampling for large-scale multi-stage area probability designs. Handb. Surv. Res. 2010, 2, 169–199. [Google Scholar]
- Sim, J.; Lewis, M. The size of a pilot study for a clinical trial should be calculated in relation to considerations of precision and efficiency. J. Clin. Epidemiol. 2012, 65, 301–308. [Google Scholar] [CrossRef] [PubMed]
- Cooper, D.R.; Schindler, P.S.; Sun, J. Business Research Methods; Mcgraw-Hill: New York, NY, USA, 2006; Volume 9. [Google Scholar]
- Thabane, L.; Ma, J.; Chu, R.; Cheng, J.; Ismaila, A.; Rios, L.P.; Robson, R.; Thabane, M.; Giangregorio, L.; Goldsmith, C.H. A tutorial on pilot studies: The what, why and how. BMC Med Res. Methodol. 2010, 10, 1. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Garofalo, J. Reassessing the Lifestyle Model of Criminal Victimization; Sage Publications: Thousand Oaks, CA, USA, 1987; pp. 23–42. [Google Scholar]
- Straub, D.; Boudreau, M.C.; Gefen, D. Validation guidelines for IS positivist research. Commun. Assoc. Inf. Syst. 2004, 13, 24. [Google Scholar] [CrossRef]
- Lewis, B.R.; Templeton, G.F.; Byrd, T.A. A methodology for construct development in MIS research. Eur. J. Inf. Syst. 2005, 14, 388–400. [Google Scholar] [CrossRef]
- Anderson, J.C.; Gerbing, D.W. Structural equation modeling in practice: A review and recommended two-step approach. Psychol. Bull. 1988, 103, 411. [Google Scholar] [CrossRef]
- Bagozzi, R.P.; Yi, Y.; Phillips, L.W. Assessing Construct Validity in Organizational Research. Adm. Sci. Q. 1991, 36, 421. [Google Scholar] [CrossRef]
- Chin, W.W. How to write up and report PLS analyses. In Handbook of Partial Least Squares; Springer: Cham, Switzerland, 2010; pp. 655–690. [Google Scholar]
- Campbell, D.T.; Fiske, D.W. Convergent and discriminant validation by the multitrait-multimethod matrix. Psychol. Bull. 1959, 56, 81. [Google Scholar] [CrossRef] [Green Version]
- Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
- Henseler, J.; Ringle, C.M.; Sinkovics, R.R. The use of partial least squares path modeling in international marketing. In New Challenges to International Marketing; Emerald Group Publishing Limited: Bingley, UK, 2009. [Google Scholar]
- Geisser, S.; Eddy, W.F. A predictive approach to model selection. J. Am. Stat. Assoc. 1979, 74, 153–160. [Google Scholar] [CrossRef]
- Stone, M. Cross-Validatory Choice and Assessment of Statistical Predictions. J. R. Stat. Soc. Ser. B Stat. Methodol. 1974, 36, 111–133. [Google Scholar] [CrossRef]
- Abualigah, L.M.Q. Feature Selection and Enhanced Krill Herd Algorithm for Text Document Clustering; Springer: Cham, Switzerland, 2019. [Google Scholar]
- Abualigah, L.; Diabat, A.; Mirjalili, S.; Elaziz, M.A.; Gandomi, A.H. The Arithmetic Optimization Algorithm. Comput. Methods Appl. Mech. Eng. 2021, 376, 113609. [Google Scholar] [CrossRef]
- Şahin, C.B.; Dinler, Ö.B.; Abualigah, L. Prediction of Software Vulnerability Based Deep Symbiotic Genetic Algorithms: Phenotyping of Dominant-Features. Appl. Intell. 2021. [Google Scholar] [CrossRef]
- Şahin, C.B.; Abualigah, L. A novel deep learning-based feature selection model for improving the static analysis of vulnerability detection. Neural Comput. Appl. 2021. [Google Scholar] [CrossRef]
- Abualigah, L.; Yousri, D.; Abd Elaziz, M.; Ewees, A.A.; Al-qaness, M.A.; Gandomi, A.H. Aquila Optimizer: A Novel Meta-Heuristic Optimization Algorithm. Comput. Ind. Eng. 2021, 157, 107250. [Google Scholar] [CrossRef]
- Abualigah, L.; Gandomi, A.H.; Elaziz, M.A.; Hamad, H.A.; Omari, M.; Alshinwan, M.; Khasawneh, A.M. Advances in Meta-Heuristic Optimization Algorithms in Big Data Text Clustering. Electronics 2021, 10, 101. [Google Scholar] [CrossRef]
- Keil, M.; Tan, B.C.; Wei, K.K.; Saarinen, T.; Tuunainen, V.; Wassenaar, A. A cross-cultural study on escalation of commitment behavior in software projects. MIS Q. 2000, 24, 299–325. [Google Scholar] [CrossRef]
- Choi, K.-S. Structural Equation Modeling Assessment of Key Causal Factors in Computer Crime Victimization; Indiana University of Pennsylvania: Indiana, PA, USA, 2008. [Google Scholar]
- Jerin, R.; Dolinsky, B.; Culture, P. You’ve got mail! You don’t want it: Cyber-victimization and on-line dating. J. Crim. Justice Pop. Cult. 2001, 9, 15–21. [Google Scholar]
Year | Users | Population | % Pop. |
---|---|---|---|
2000 | 127,300 | 5,282,558 | 2.4 |
2002 | 457,000 | 5,282,558 | 8.7 |
2005 | 600,000 | 5,282,558 | 11.4 |
2007 | 796,900 | 5,375,307 | 14.8 |
2008 | 1,126,700 | 6,198,677 | 18.2 |
2009 | 1,595,200 | 6,269,285 | 25.4 |
2010 | 1,741,900 | 6,407,085 | 27.2 |
2012 | 2,481,940 | 6,508,887 | 38.1 |
2020 | 8,700,000 | 10,909,567 | 79.7 |
No. | Reference | Sample | Dependent Variable |
---|---|---|---|
1 | Cohen and Cantor (1981) [108] | National Crime Survey (NCS) | Burglary victimization |
2 | Jensen and Brownfield (1986) [109] | Monitoring the Future (MTF) | Property, violence, and vandalism victimization |
3 | Miethe et al. (1987) [110] | National Crime Survey (NCS) | Property and violent victimization |
4 | Sampson (1987) [111] | British Crime Survey (BCS) | Personal violence and theft |
5 | Sampson and Wooldredge (1987) [112] | British Crime Survey (BCS) | Larceny victimization, personal and household theft, and burglary |
6 | Lasely (1989) [113] | British Crime Survey (BCS) | Predatory victimization |
7 | Kennedy and Forde (1990) [114] | Canadian urban victimization survey | Vehicle theft, breaking and entering (B&E), assault, and robbery victimization |
8 | Miethe and Meier (1990) [89] | British Crime Survey (BCS) | Burglary, theft, and violent victimization |
9 | Sampson and Lauritsen (1990) [115] | British Crime Survey (BCS) | Assault victimization, stranger assault, acquaintance assault |
10 | Lauritsen et al. (1991) [116] | National Youth Survey (NYS) | Assault, robbery, larceny and vandalism |
11 | Lauritsen et al. (1992) [117] | National Youth Survey (NYS); Monitoring the future (MTF) | MTF: Assault; NYS: Assault and robbery victimization |
12 | Wooldredge et al. (1992) [118] | Survey University faculty members | Personal and property victimization |
13 | Miethe and McDowall (1993) [119] | Survey of adults in Seattle | Burglary victimization and violence by strangers |
14 | Rountree et al. (1994) [120] | Survey of adults in Seattle | Burglary and violent victimization |
15 | Schwartz and Pitts (1995) [121] | Undergraduate students from Ohio University | Rape |
16 | Fisher et al. (1998) [122] | Nationally representative sample in the U.S. | On-campus theft victimization and violent |
17 | Mustaine and Tewksbury (1998) [123] | Survey of college students | Major and minor theft victimization |
18 | Mustaine and Tewksbury (1999) [124] | University women in 9 institutions | Stalking |
19 | Fisher et al. (2000) [106] | College women in U.S. | Sexual victimization |
20 | Mustaine and Tewksbury (2000) [125] | Survey of college students | Assault victimization |
21 | Wittebrood and Nieuwbeerta (2000) [126] | Survey of adults in the Netherlands | Personal larceny, threat, sexual assault, burglary, car and bicycle theft victimization |
22 | Fisher et al. (2001) [127] | National representative sample in the U.S. | Stalking |
23 | Mustaine and Tewksbury (2002) [128] | Survey of college women | General and serious sexual assault victimization |
24 | Schreck et al. (2002) [129] | Survey of students in Fayetteville | Violent victimization |
25 | Dugan and Apel (2003) [130] | National Crime Victimization Survey (NCVS) | Violent victimization of women |
26 | Schreck et al. (2003) [131] | National Household and Education Survey, School Safety and Discipline (NHES-SSD) | Overall, property and violent victimization at school |
27 | Schreck and Fisher (2004) [132] | National Longitudinal Study of Adolescent Health (Add Health) | Violent victimization |
28 | Tseloni et al. (2004) [133] | National Crime Victimization Survey (NCVS), British Crime Survey (BCS) and Police Monitor (PM) | Burglary victimization |
29 | Schreck et al. (2006) [134] | Gang Resistance Education and Training (GREAT) program | Victimization |
30 | Wilcox et al. (2007) [135] | Survey of adults in Seattle | Burglary victimization |
31 | Messner et al. (2007) [136] | Survey of adults in China | Personal theft, swindling, robbery, and assault victimization |
32 | Taylor et al. (2007) [137] | Survey of eighth-graders in public school | Violent and serious violent victimization |
33 | Taylor et al. (2008) [138] | Survey of eighth-graders in public school | Serious violent victimization |
34 | Spano et al. (2008) [139] | Mobile Youth Survey | Violent victimization |
35 | Burrow and Apel (2008) [140] | National Crime Victimization Survey (NCVS)—School Crime Supplement | Larceny and assault victimization at school and in the community |
36 | Wilcox et al. (2009) [141] | Rural Substance Abuse and Violence Project (RSVP) | Assault and theft victimization |
37 | Savolainen et al. (2009) [142] | Survey of adolescents in Helsinki | Violent victimization |
38 | Reid and Sullivan (2009) [143] | Developmental Victimization Survey | Bullying and general victimization |
39 | Henson et al. (2010) [144] | Survey of students from rural Kentucky high school | Minor and serious violent victimization |
40 | Fisher et al. (2010) [145] | National College Women Sexual Victimization study (NCWSV) | Sexual victimization and repeat sexual victimization |
41 | Tillyer et al. (2010) [146] | Rural Substance Abuse and Violence Project (RSVP) | Sexual harassment and assault victimization |
42 | Shubak Tillyer et al. (2011) [147] | National Longitudinal Study of Adolescent Health (Add Health) | Violent victimization |
43 | Tillyer et al. (2011) [148] | Rural Substance Abuse and Violence Project (RSVP) | Serious violent victimization |
44 | Peguero et al. (2015) [149] | Education Longitudinal Study (ELS) | Property and violent victimization at school |
45 | Pauwels and Svensson (2011) [150] | School surveys in Sweden and Belgium | General victimization |
46 | Averdijk (2011) [151] | National Crime Victimization Survey (NCVS) | Household and violent victimization |
47 | Peguero and Popp (2012) [152] | Education Longitudinal Study (ELS) | Violent victimization at school |
48 | Maimon and Browning (2012) [153] | Project on Human Development in Chicago Neighborhoods (PHDCN) | Violent victimization |
49 | Bunch et al. (2015) [154] | National Crime Victimization Survey (NCVS) | Violent and theft victimization |
50 | Gibson et al. (2014) [155] | Project on Human Development in Chicago Neighborhoods (PHDCN) | Violent victimization (by neighborhood disadvantage) |
51 | Reyns et al. (2016) [88] | Canadian general social survey | Stalking victimization |
Reference | Sample | Dependent Variable(s) |
---|---|---|
Hutchings and Hayes (2009) [163] | 104 residents of Brisbane metropolitan area | Phishing |
Choi (2008) [94] | 204 college students | Computer crimes |
Pratt et al. (2010) [164] | 992 adults in Florida | Consumer fraud |
Van Wilsem (2011) [165] | 4353 Dutch households | Threat |
Leukfeldt (2014) [166] | 8379 Dutch populations | Phishing |
Van Wilsem (2013) [167] | 6201 Dutch households | Consumer fraud |
Bossler and Holt (2009) [65] | 570 college students | Malware infection |
Alshalan (2006) [168] | 987 national cybercrime victimization survey (2004) | Cybercrime victimization |
Holt and Bossler (2008) [156] | 578 college students | Online harassment |
Bossler et al. (2012) [157] | 434 middle and high school students | Online harassment victimization |
Navarro and Jasinski (2012) [169] | 935 national sample of teenagers | Cyberbullying |
Reyns et al. (2011) [82] | 974 college students | Cyberstalking victimization |
Welsh and Lavoie (2015) [158] | 321 female undergraduate students | Cyberstalking victimization |
Marcum (2008) [159] | 483 freshmen college students | Online harassment, unwanted exposure to sexual materials, solicitation of sex online |
Ngo and Paternoster (2011) [160] | 295 undergraduate students | Cybercrime victimization (online harassment) |
Marcum et al. (2010) [170] | 744 undergraduate students | Unwanted sexually explicit material, unwanted sexual harassment, unwanted sexual solicitation |
Leukfeldt and Yar (2016) [162] | 9161 Netherlands statistics | Hacking victimization, malware infection victimization, identity theft, consumer fraud victimization, cyberthreat victimization, cyberstalking victimization |
Back (2016) [77] | 1000 online South Korean users | Cyberharassment |
Phillips (2015) [93] | 274 college students | Cyberharassment, cyberstalking, cyber impersonation, sexting |
Reyns (2013) [171] | 5985 British Crime Survey (BCS) | Identity theft |
Yucedal (2010) [37] | 626 National Crime Victimization Survey (NCVS) | Computer virus victimization, online harassment victimization |
Criterion | Decision | Reference |
---|---|---|
The indicator’s and the construct’s causal priority | From the construct to the indicators: reflective. From the indicators to the construct: formative | Diamantopoulos and Winklhofer (2001) [183] |
Is the build a trait or a mixture of indicators that explains the indicators? |
| Fornell and Bookstein (1982) [184] |
Do the metrics reflect the construct’s effects or causes? |
| Rossiter (2002) [185] |
Is it accurate that if the trait’s evaluation changes, all things will change in the same way (assuming they’re all similarly coded)? |
| Chin (1998) [186] |
Is it possible to swap out the items? |
| Jarvis et al. (2003) [187] |
Construct | Items | Criteria | Reflective/ Formative | ||||
---|---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | |||
Proximity to Motivated Offenders | Unknown Friend | √ | √ | √ | √ | √ | Reflective |
Visiting Religious Websites | √ | √ | √ | √ | √ | Reflective | |
Listening/Downloading Music | √ | √ | √ | √ | √ | Reflective | |
Watching/Downloading Movies | √ | √ | √ | √ | √ | Reflective | |
Downloading Computer Programs | √ | √ | √ | √ | √ | Reflective | |
Watching TV Programs | √ | √ | √ | √ | √ | Reflective | |
Playing Games | √ | √ | √ | √ | √ | Reflective | |
Reading Newspapers/Magazines | √ | √ | √ | √ | √ | Reflective | |
Sending/Receiving Emails | √ | √ | √ | √ | √ | Reflective | |
Social Networking Sites | √ | √ | √ | √ | √ | Reflective | |
Chatting/Instant Messenger (Text) | √ | √ | √ | √ | √ | Reflective | |
Chatting/Instant Messenger (Voice) | √ | √ | √ | √ | √ | Reflective | |
Chatting/Instant Messenger (Video) | √ | √ | √ | √ | √ | Reflective | |
Health-Care Services | √ | √ | √ | √ | √ | Reflective | |
E-Government | √ | √ | √ | √ | √ | Reflective | |
Job-Seeking Websites | √ | √ | √ | √ | √ | Reflective | |
Showing Goods and Services | √ | √ | √ | √ | √ | Reflective | |
E-Banking | √ | √ | √ | √ | √ | Reflective | |
Political Websites | √ | √ | √ | √ | √ | Reflective | |
Hacking | √ | √ | √ | √ | √ | Reflective | |
Shopping | √ | √ | √ | √ | √ | Reflective | |
Visiting Adult Websites | √ | √ | √ | √ | √ | Reflective | |
Sport | √ | √ | √ | √ | √ | Reflective | |
Suitable Target/Target Attractiveness | Name | √ | √ | √ | √ | √ | Reflective |
Gender | √ | √ | √ | √ | √ | Reflective | |
Age | √ | √ | √ | √ | √ | Reflective | |
Mobile Phone Number | √ | √ | √ | √ | √ | Reflective | |
Email Address | √ | √ | √ | √ | √ | Reflective | |
Home Address | √ | √ | √ | √ | √ | Reflective | |
Bank Account Number | √ | √ | √ | √ | √ | Reflective | |
Study Program | √ | √ | √ | √ | √ | Reflective | |
Credit Card Serial | √ | √ | √ | √ | √ | Reflective | |
Favourite Activities | √ | √ | √ | √ | √ | Reflective | |
Photos | √ | √ | √ | √ | √ | Reflective | |
Videos | √ | √ | √ | √ | √ | Reflective | |
Digital Guardianship | Antivirus Software | √ | √ | √ | √ | √ | Reflective |
Antispyware Software | √ | √ | √ | √ | √ | Reflective | |
Firewall Software | √ | √ | √ | √ | √ | Reflective | |
Ad-Aware Software | √ | √ | √ | √ | √ | Reflective | |
Tracking Protection Blocks Software | √ | √ | √ | √ | √ | Reflective | |
Filtering/Monitoring Software | √ | √ | √ | √ | √ | Reflective | |
Changeyour Login Password | √ | √ | √ | √ | √ | Reflective | |
SaveExtra Copies | √ | √ | √ | √ | √ | Reflective | |
Create a Backup Process | √ | √ | √ | √ | √ | Reflective | |
Delete Old Files | √ | √ | √ | √ | √ | Reflective | |
Delete Old Emails/Attachments | √ | √ | √ | √ | √ | Reflective | |
Change any File Locations | √ | √ | √ | √ | √ | Reflective | |
Cyberstalking victimization | Harassment | √ | √ | √ | √ | √ | Reflective |
Defamation | √ | √ | √ | √ | √ | Reflective | |
Sexual Materials | √ | √ | √ | √ | √ | Reflective | |
Pretending to be you | √ | √ | √ | √ | √ | Reflective | |
Disable your Computer | √ | √ | √ | √ | √ | Reflective | |
Monitoring your Profiles | √ | √ | √ | √ | √ | Reflective | |
Sent Threatening/Offensive Letter | √ | √ | √ | √ | √ | Reflective | |
Written Menace/Offensive Comments | √ | √ | √ | √ | √ | Reflective |
Analysis | Test | Description | Criteria |
---|---|---|---|
Internal consistency reliability | Cronbach’s alpha (CA) | Based on the intercorrelations of the observed predictor variables, calculate the reliability (all indicators have equal outer loadings). | ≥0.6 Acceptable ≥0.7 Satisfactory |
Composite reliability (CR) | Although considering the various outer loadings of the indicator variables, the same (CA) was found. | 0.6–0.7 Acceptable 0.7–0.9 Satisfactory >0.95 Redundant | |
Convergent validity | Indicator reliability (factor outer loading) | Is the square of the outer loading of a standardized predictor. It is referred to as the variance derived from the item and it reflects how much of the difference in an item is described by the construct. | ≥0.7 Acceptable |
Average variance extracted (AVE) | The latent construct’s ability to describe the variance of its metrics. | ≥0.5 Desirable | |
Discriminant validity | Cross-loadings | An indicator’s correlation with other constructs in the model. | Outer loading for a specific construct > its loading on all the other constructs |
Fornell–Larcker criterion | Compares the square root of each construct’s average variance derived with all other constructs in the model’s correlations. | SQRT (AVE) for each construct > correlation between constructs |
Analysis | Test | Description | Criteria |
---|---|---|---|
Coefficient of determination | (R2) | Measures the relationship of a latent variable to its total variance | 0.670 substantia l0.333 moderate 0.190 weak [186] |
Path coefficient | (β) | Indicates the strength of the relationship between two latent variables | From −1 to 1. Values closer to 1 are more significant |
t-value | >1.65 significance level 10% >1.96 significance level 5% >2.57 significance level 1% | ||
p-value | Significant at p-value * <0.10 ** <0.05 *** <0.01 | ||
Effect size | (f2) | Measures if an independent latent variable has a substantial impact on a dependent latent variable | 0.02 < f2 ≤ 0.15 (small effect). 0.15 < f2 ≤ 0.35 (medium effect). f2 > 0.35 (large effect) |
Collinearity issues | Tolerance | Examines each set of predictor constructs separately for each subpart of the structural model | Tolerance > 0.20 acceptable |
VIF | VIF 5 ≥ acceptable | ||
Predictive relevance | Q2 | Indicator of the model’s predictive relevance | >0 having predictive relevance |
q2 | The relative impact of predictive relevance (effect size) | 0.02 small 0.15 medium 0.35 large |
Var. | Items | Freq. | % | Var. | Items | Freq. | % |
---|---|---|---|---|---|---|---|
Gender | Male | 31 | 62 | Nationality | Local | 43 | 86 |
Female | 19 | 38 | Foreigner | 7 | 14 | ||
Age | Fewer than 18 | 0 | 0 | Academic semester | First sem. | 9 | 18 |
18 | 1 | 2 | Second sem. | 18 | 36 | ||
19 | 6 | 12 | Third sem. | 5 | 10 | ||
20 | 14 | 28 | Fourth sem. | 8 | 16 | ||
21 | 14 | 28 | Fifth sem. | 6 | 12 | ||
22 | 10 | 20 | Sixth sem. | 4 | 8 | ||
Others | 5 | 10 | Income | Fewer than 500 | 15 | 30 | |
Course program | Engineering | 24 | 48 | 500–749 | 11 | 22 | |
Computer sci./IT | 1 | 2 | 750–999 | 5 | 10 | ||
Applied Arts | 6 | 12 | 1000–1500 | 10 | 20 | ||
Finance and Management | 10 | 20 | More than 1500 | 8 | 16 | ||
Medical Sciences | 6 | 12 | Others | 1 | 2 | ||
Education | 0 | 0 | Residency | City | 47 | 94 | |
Languages | 0 | 0 | Rural | 0 | 0 | ||
Hotel and Tourism | 1 | 2 | Refugee | 2 | 4 | ||
Audio and Visual Techniques | 0 | 0 | Desert | 0 | 0 | ||
Information Management and Libraries | 2 | 4 | Town | 1 | 2 | ||
Others | 0 | 0 | Village | 0 | 0 |
Construct | Number of Items | Cronbach’s Alpha |
---|---|---|
Proximity to motivated offender | 23 | 0.781 |
Suitable target | 12 | 0.723 |
Digital guardianship | 12 | 0.751 |
Cyberstalking | 8 | 0.768 |
NO. | Description | N | % |
---|---|---|---|
1 | Questionnaires distributed | 908 | 100 |
2 | Questionnaires received | 908 | 100 |
3 | Incomplete questionnaire (missed data) | 104 | 11.5 |
4 | Suspicious response patterns (straight-lining) | 40 | 4.4 |
5 | Outliers | 7 | 0.77 |
Var. | Items | Freq. | % | Var. | Items | Freq. | % |
---|---|---|---|---|---|---|---|
Gender | Male | 367 | 48.5 | Nationality | Local | 698 | 92.2 |
Female | 390 | 51.5 | Foreigner | 59 | 7.8 | ||
Age | Fewer than 18 | 0 | 0 | Academic semester | First sem. | 85 | 11.2 |
18 | 25 | 3 | Second sem. | 149 | 19.7 | ||
19 | 70 | 9 | Third sem. | 96 | 12.7 | ||
20 | 209 | 28 | Fourth sem. | 229 | 30.3 | ||
21 | 237 | 31 | Fifth sem. | 125 | 16.5 | ||
22 | 165 | 22 | Sixth sem. | 73 | 9.6 | ||
Others | 51 | 7 | Income | Fewer than 500 | 225 | 33.3 | |
Course program | Engineering | 304 | 40.2 | 500–749 | 160 | 21.1 | |
Computer Sci./IT | 15 | 2 | 750–999 | 136 | 18 | ||
Applied Arts | 72 | 9.5 | 1000–1500 | 96 | 12.7 | ||
Finance and Management | 101 | 13.3 | More than 1500 | 113 | 14.9 | ||
Medical Sciences | 91 | 12 | Others | 1 | 2 | ||
Education | 25 | 3.3 | Residency | City | 510 | 67.4 | |
Languages | 25 | 3.3 | Rural | 25 | 3.3 | ||
Hotel and Tourism | 61 | 8.1 | Refugee | 65 | 8.6 | ||
Audio and Visual Techniques | 28 | 3.7 | Desert | 22 | 2.9 | ||
Information Management and Libraries | 35 | 4.6 | Town | 53 | 7 | ||
Others | 0 | 0 | Village | 82 | 10.8 |
Cyberstalking Victimization Behavior Type | Prevalence | |||
---|---|---|---|---|
Type | Likert Value | Frequency | % | The Calculation Used the Weighted Average 1 |
Harassment/annoyance | 1 | 93 | 12.3 | 66.76% |
2 | 122 | 16.1 | ||
3 | 167 | 22.1 | ||
4 | 189 | 25.0 | ||
5 | 186 | 24.6 | ||
Posted false information about you | 1 | 359 | 47.4 | 39.92% |
2 | 223 | 29.5 | ||
3 | 49 | 6.5 | ||
4 | 74 | 9.8 | ||
5 | 52 | 6.9 | ||
Sent sexual materials to you | 1 | 138 | 18.2 | 64.64% |
2 | 124 | 16.4 | ||
3 | 88 | 11.6 | ||
4 | 239 | 31.6 | ||
5 | 168 | 22.2 | ||
Pretended to be you without your permission | 1 | 137 | 18.1 | 60.00% |
2 | 187 | 24.7 | ||
3 | 115 | 15.2 | ||
4 | 175 | 23.1 | ||
5 | 143 | 18.9 | ||
Attempted to disable your computer | 1 | 212 | 28.0 | 57.20% |
2 | 138 | 18.2 | ||
3 | 80 | 10.6 | ||
4 | 198 | 26.2 | ||
5 | 129 | 17.0 | ||
Monitored your profile online | 1 | 140 | 18.5 | 61.30% |
2 | 169 | 22.3 | ||
3 | 98 | 12.9 | ||
4 | 199 | 26.3 | ||
5 | 151 | 19.9 | ||
Sent threatening/offensive letters or messages to your e-mail | 1 | 142 | 18.8 | 64.84% |
2 | 49 | 6.5 | ||
3 | 214 | 28.3 | ||
4 | 189 | 25.0 | ||
5 | 163 | 21.5 | ||
Wrote threatening/offensive comments to you in chat rooms/IMs | 1 | 256 | 33.8 | 49.18% |
2 | 158 | 20.9 | ||
3 | 152 | 20.1 | ||
4 | 121 | 16.0 | ||
5 | 70 | 9.2 |
Construct | Indicators | Outer Loading | AVE |
---|---|---|---|
PTMO | Adding unknown friend | 0.6710 | 0.5478 |
Chatting/instant messenger (text) | 0.7280 | ||
Chatting/instant messenger (voice) | 0.5676 | ||
Playing games | 0.8233 | ||
Reading newspapers/magazines | 0.7993 | ||
Sending/receiving emails | 0.8319 | ||
Social networking sites | 0.7819 | ||
Visiting religious websites | 0.8236 | ||
Watching/downloading movies | 0.6518 | ||
Listening to/downloading music | 0.6730 | ||
ST | Mobile phone number | 0.5540 | 0.5765 |
Home address | 0.7986 | ||
Bank account number | 0.8684 | ||
Videos | 0.7067 | ||
Photos | 0.7524 | ||
Name | 0.6207 | ||
Gender | 0.7662 | ||
Email Address | 0.8582 | ||
Age | 0.8460 | ||
DG | Ad-Aware software | 0.8298 | 0.6353 |
Antispyware software | 0.7580 | ||
Antivirus software | 0.7910 | ||
Filtering/monitoring software | 0.7753 | ||
Firewall software | 0.7942 | ||
Tracking Protection blocks software | 0.8390 | ||
Change any file locations | 0.7361 | ||
Delete old emails/attachments | 0.8301 | ||
Login password | 0.8136 | ||
CV | Attempted to disable your computer | 0.7824 | 0.5541 |
Monitored your online profiles | 0.8147 | ||
Pretended to be you online without your permission | 0.8637 | ||
Sent sexually explicit materials to you | 0.5594 | ||
Sent threatening/offensive letters or messages to your e-mail | 0.6599 |
Indicators | PTMO | ST | DG | CV |
---|---|---|---|---|
PTMO01 | 0.6518 | 0.5911 | 0.5501 | 0.5636 |
PTMO02 | 0.8236 | 0.7535 | 0.7173 | 0.7140 |
PTMO03 | 0.7819 | 0.7660 | 0.7393 | 0.7174 |
PTMO04 | 0.8319 | 0.7815 | 0.7126 | 0.6708 |
PTMO05 | 0.7993 | 0.7262 | 0.7890 | 0.7666 |
PTMO06 | 0.8233 | 0.7503 | 0.6746 | 0.7508 |
PTMO07 | 0.5676 | 0.5635 | 0.5645 | 0.4354 |
PTMO08 | 0.7280 | 0.6690 | 0.6359 | 0.6513 |
PTMO09 | 0.6710 | 0.6329 | 0.6013 | 0.4842 |
PTMO10 | 0.6730 | 0.5955 | 0.5856 | 0.4658 |
ST01 | 0.5178 | 0.5540 | 0.5044 | 0.3782 |
ST02 | 0.7386 | 0.7986 | 0.7557 | 0.6857 |
ST03 | 0.8274 | 0.8684 | 0.7723 | 0.7497 |
ST04 | 0.5951 | 0.7067 | 0.6191 | 0.5598 |
ST05 | 0.6533 | 0.7524 | 0.6559 | 0.6091 |
ST06 | 0.5782 | 0.6207 | 0.6179 | 0.5231 |
ST07 | 0.7654 | 0.7662 | 0.6982 | 0.7388 |
ST08 | 0.7758 | 0.8582 | 0.7468 | 0.7155 |
ST09 | 0.8115 | 0.8460 | 0.8236 | 0.7478 |
DG01 | 0.6542 | 0.6460 | 0.7361 | 0.6514 |
DG02 | 0.7645 | 0.7307 | 0.7942 | 0.6795 |
DGO3 | 0.7009 | 0.7157 | 0.7753 | 0.6879 |
DG04 | 0.7514 | 0.7934 | 0.8390 | 0.7114 |
DG05 | 0.6865 | 0.7417 | 0.8301 | 0.7173 |
DG06 | 0.7104 | 0.7183 | 0.7910 | 0.6907 |
DG07 | 0.6744 | 0.7196 | 0.7580 | 0.6805 |
DG08 | 0.7893 | 0.7893 | 0.8298 | 0.6609 |
DG09 | 0.6723 | 0.7073 | 0.8136 | 0.6740 |
CV01 | 0.6896 | 0.6790 | 0.6382 | 0.7824 |
CV02 | 0.7573 | 0.7252 | 0.7704 | 0.8147 |
CV03 | 0.7498 | 0.7025 | 0.7280 | 0.8637 |
CV04 | 0.4270 | 0.5084 | 0.5124 | 0.5594 |
CV05 | 0.4975 | 0.5193 | 0.4939 | 0.6599 |
Construct Alpha | Cronbach’s Alpha (CA) | Composite Reliability (CR) |
---|---|---|
PTOM | 0.907 | 0.923 |
ST | 0.905 | 0.923 |
DG | 0.928 | 0.940 |
CV | 0.793 | 0.859 |
Path (R2 = 0.728) | R2excluded | Effect Size (f2) | Rating |
---|---|---|---|
PTMO→CV | 0.765 | 0.078 | Small effect |
ST→CV | 0.780 | 0.009 | Very small effect |
DG→CV | 0.760 | 0.101 | Small effect |
Path (Q2 = 0.4267) | Q2excluded | Effect Size (q2) | Effect |
---|---|---|---|
PTMO→CV | 0.4188 | 0.014 | Small |
ST→CV | 0.4265 | 0.0004 | Small |
DG→CV | 0.4166 | 0.018 | Small |
Exogenous Latent Variables | Male | Female | Male vs. Female | ||||
---|---|---|---|---|---|---|---|
p(1) | se(p(1)) | p(2) | se(p(2)) | t-Value | p-Value | ||
PTMO→CV | 0.414 | 0.0723 | 0.350 | 0.0580 | 0.064 | 0.695 | 0.487 |
ST→CV | 0.092 | 0.0867 | 0.205 | 0.0731 | 0.113 | 1.002 | 0.317 |
DG→CV | 0.401 | 0.0583 | 0.363 | 0.0588 | 0.038 | 0.459 | 0.646 |
N | 367 | 390 | - | - | - |
Exogenous Latent Variables | Local | Foreigner | Local vs. Foreigner | ||||
---|---|---|---|---|---|---|---|
p(1) | se(p(1)) | p(2) | se(p(2)) | t-Value | p-Value | ||
PTMO→CV | 0.382 | 0.0644 | 0.307 | 0.0593 | 0.0753 | 0.366 | 0.715 |
ST→CV | 0.125 | 0.0809 | 0.391 | 0.0458 | 0.2663 | 1.033 | 0.302 |
DG→CV | 0.404 | 0.0606 | 0.238 | 0.0490 | 0.1654 | 0.855 | 0.393 |
N | 598 | 59 | - | - | - |
Exogenous Latent Variables | Normal Connection Speed | High Connection Speed | Normal vs. High | ||||
---|---|---|---|---|---|---|---|
p(1) | se(p(1)) | p(2) | se(p(2)) | t-Value | p-Value | ||
PTMO→CV | 0.356 | 0.0653 | 0.496 | 0.0504 | 0.1404 | 0.761 | 0.447 |
ST→CV | 0.158 | 0.0827 | 0.179 | 0.0595 | 0.0207 | 0.089 | 0.929 |
DG→CV | 0.399 | 0.0620 | 0.239 | 0.0402 | 0.1595 | 0.912 | 0.362 |
N | 672 | 85 | - | - | - |
Exogenous Latent Variables | Age > 20 | Age ≤ 20 | >20 vs. ≤20 | ||||
---|---|---|---|---|---|---|---|
p(1) | se(p(1)) | p(2) | se(p(2)) | t-Value | p-Value | ||
PTMO→CV | 0.338 | 0.0645 | 0.376 | 0.0637 | 0.0014 | 0.015 | 0.988 |
ST→CV | 0.225 | 0.0881 | 0.067 | 0.0667 | 0.1579 | 1.310 | 0.190 |
DG→CV | 0.306 | 0.0660 | 0.474 | 0.0535 | 0.1683 | 1.837 | 0.067 |
N | 453 | 304 | - | - | - |
Exogenous Latent Variables | City | Others | City vs. Others | ||||
---|---|---|---|---|---|---|---|
p(1) | se(p(1)) | p(2) | se(p(2)) | t-Value | p-Value | ||
PTMO→CV | 0.376 | 0.0647 | 0.328 | 0.0634 | 0.0483 | 0.470 | 0.639 |
ST→CV | 0.097 | 0.0740 | 0.311 | 0.0913 | 0.2143 | 1.732 | 0.084 |
DG→CV | 0.432 | 0.0615 | 0.288 | 0.0575 | 0.1442 | 1.488 | 0.137 |
N | 510 | 247 | - | - | - |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Abu-Ulbeh, W.; Altalhi, M.; Abualigah, L.; Almazroi, A.A.; Sumari, P.; Gandomi, A.H. Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations. Electronics 2021, 10, 1670. https://doi.org/10.3390/electronics10141670
Abu-Ulbeh W, Altalhi M, Abualigah L, Almazroi AA, Sumari P, Gandomi AH. Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations. Electronics. 2021; 10(14):1670. https://doi.org/10.3390/electronics10141670
Chicago/Turabian StyleAbu-Ulbeh, Waheeb, Maryam Altalhi, Laith Abualigah, Abdulwahab Ali Almazroi, Putra Sumari, and Amir H. Gandomi. 2021. "Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations" Electronics 10, no. 14: 1670. https://doi.org/10.3390/electronics10141670
APA StyleAbu-Ulbeh, W., Altalhi, M., Abualigah, L., Almazroi, A. A., Sumari, P., & Gandomi, A. H. (2021). Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations. Electronics, 10(14), 1670. https://doi.org/10.3390/electronics10141670