Next Article in Journal
Automatic Generation of Meta-Path Graph for Concept Recommendation in MOOCs
Next Article in Special Issue
Automatic Categorization of LGBT User Profiles on Twitter with Machine Learning
Previous Article in Journal
Low Complexity Lane Detection Methods for Light Photometry System
Previous Article in Special Issue
Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations

1
Faculty of Computer Sciences and Informatics, Amman Arab University, Amman 11953, Jordan
2
Department of Management Information System, College of Business Administration, Taif University, Taif 21944, Saudi Arabia
3
School of Computer Sciences, Universiti Sains Malaysia, Pulau Pinang 11800, Malaysia
4
Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah 23218, Saudi Arabia
5
Faculty of Engineering and Information Technology, University of Technology Sydney, Ultimo, NSW 2007, Australia
*
Authors to whom correspondence should be addressed.
Electronics 2021, 10(14), 1670; https://doi.org/10.3390/electronics10141670
Submission received: 9 June 2021 / Revised: 30 June 2021 / Accepted: 5 July 2021 / Published: 13 July 2021
(This article belongs to the Special Issue Machine Learning Technologies for Big Data Analytics)

Abstract

:
Cyberstalking is a growing anti-social problem being transformed on a large scale and in various forms. Cyberstalking detection has become increasingly popular in recent years and has technically been investigated by many researchers. However, cyberstalking victimization, an essential part of cyberstalking, has empirically received less attention from the paper community. This paper attempts to address this gap and develop a model to understand and estimate the prevalence of cyberstalking victimization. The model of this paper is produced using routine activities and lifestyle exposure theories and includes eight hypotheses. The data of this paper is collected from the 757 respondents in Jordanian universities. This review paper utilizes a quantitative approach and uses structural equation modeling for data analysis. The results revealed a modest prevalence range is more dependent on the cyberstalking type. The results also indicated that proximity to motivated offenders, suitable targets, and digital guardians significantly influences cyberstalking victimization. The outcome from moderation hypothesis testing demonstrated that age and residence have a significant effect on cyberstalking victimization. The proposed model is an essential element for assessing cyberstalking victimization among societies, which provides a valuable understanding of the prevalence of cyberstalking victimization. This can assist the researchers and practitioners for future research in the context of cyberstalking victimization.

1. Introduction

The Internet has been an integral part of daily life in recent years. The Internet user stats for 2020 show that more than 5 billion Internet users are distributed worldwide [1]; this indicates that the Internet is used by half of the world’s people. The exponential spread of the Internet and other information and communication technology affect every area of life. The Internet has numerous features that make it attractive and explain its rapid penetration, such as ease of use, immediacy, law restrictions, low cost, and widespread availability [2]. On the other hand, there is a dark side to this increased Internet usage. The anonymous nature (the physical distance from others is irrelevant) of the Internet and using communication technologies gives perpetrators a vast opportunity to commit crimes, so the Internet has become a vital tool for facilitating the creation of the new phenomenon of “cybercrime” [3,4,5,6,7,8,9,10,11,12,13,14].
Cyberstalking is a cybercrime categorized as a crime and used as computer networks or devices to advance other ends [15]. While there is no widely accepted concept of cyberstalking, there are several guidelines to follow [8,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37]. The most generally accepted definition is that the activities are carried out over the Internet or mobile devices [24]. Some researchers have argued that there is no agreed definition of cyberstalking (virtual) because there is no agreed-upon meaning (physical) [24,38]. The word “cyberstalking” is used interchangeably with “cyberharassment”, “online stalking”, or “online harassment” [24,30,39,40]. The dissemination of threats and false claims, data destruction, computer surveillance, identity stealing, and sexual motives [41,42,43], the persistent pursuit of an attacker using electronic or Internet-capable computers [44], electronic sabotage such as transmitting viruses or spamming, buying products and services in the victims’ names, and sending false messages are all examples of cyberstalking [42,43]. Cyberstalking is a real threat facing our societies today. We should confront this new phenomenon by examining new modalities and looking for solutions to the issue, and reducing its damage to its victims [45,46,47].
There is a scarcity of information on cyberstalking in the literature, and further research is required to solve this issue. This paper focuses on cyberstalking victimization. The aim is to investigate it by estimating its prevalence and examining the relationships between factors to propose a conceptual model of cyberstalking victimization to increase understanding of this new phenomenon.

2. Background of the Study and Problem Statements

Over the last two decades, the development of the Internet and the exponential growth of the World Wide Web (WWW) have profoundly altered life in contemporary societies [48,49]. Using cyberspace takes up a significant amount of time in many people’s daily lives [50,51,52]. In conjunction with the rapid development of ICTs, the Internet has created a near-perfect arena for crimes to occur [48]. The British Prime Minister, David Cameron, in a 2013 speech to the National Society for the Prevention of Cruelty to Children (NSPCC), said, “The internet is not only where we buy, sell, and socialize; it’s also where violations occur, and people can be harmed”.
Recently, the Internet has enabled new forms of cybercrime to emerge. Cyberstalking [6] is classified as using ICTs to carry out practices such as finding, surveying, harassing, or exploiting victims to cause anxiety, panic, or alarm and is characterized by the repetitive aspects of the behavior [53]. Cyberstalking is a real threat. The various forms of cyberstalking include sending harassing text messages, taking photos or videos of victims without their consent, sending malicious malware or spyware to the victim’s email, sending false information or statements to others by using the victim’s email directly, and monitoring the victim’s email or computer [54].
In academic circles, cyberstalking is a relatively recent subject. However, it is also gaining traction as a research subject. It is possible to find studies on cybercrimes in general; however, few have tried systematically to propose a cybercrime model, specifically cyberstalking victimization, and empirically test it. Cyberstalking research is still in its infancy, and much more research is needed [25,31,55,56,57,58]. This gap is more noticeable in cyberstalking as a form of cybercrime than in other states. The lack of understanding of this new phenomenon comes from the lack of scientific definition [21]. A lack of statistics also plays a role in this misunderstanding [24,59]. Gnasigamoney and Sidhu [60], who conducted their study in Malaysia, found no statistics about cyberstalking in Malaysia. A prevalence measure is also needed [24,61] and research on the nature of cyberstalking [62].
Cyberstalking studies are neglected compared to physical stalking in the literature (28% and 59%, respectively) [63]. Little is known about cyberstalking [64], and data are limited due to the limited research on this topic [16]. Primary research is needed in terms of empirical work in various aspects of cybercrime and cyberstalking [8,29,37,65,66,67,68,69,70,71]. Although cyberstalking is a severe and growing problem and is recognized by researchers, it remains insufficiently examined [43,72]. To fill this gap in the literature, the present research theoretically develops and empirically tests a proposed conceptual model for cyberstalking victimization in the Hashemite Kingdom of Jordan (hereafter Jordan). This model can help the executive, legislative and judicial authorities, citizens, lawmakers, and others to assess this phenomenon properly.
Cybercrime in Jordan is affecting society like other societies in the world. Jordan is one of only two Middle Eastern countries that has completely liberalized the telecommunications market. It has become the most advanced country in that region in terms of ICTs [73]. As a result of the spread of ICTs and the Internet, Internet users have jumped from 127,300 (in 2000) to 5,700,000 users (2020). Table 1 depicts Jordan’s Internet users and population from 2000 to 2020, according to the world stats 2020. The Jordanian population was 10,909,567, and 80% were Internet users, giving 8,700,000 users, with 6,258,000 having a Facebook account.
As shown in Table 1, the increase in the number of Internet users is significant compared to the growth in the population [74]. Therefore, it was not surprising that there is a real rise in the number of cybercrimes in Jordan. Cybercrimes pose a critical problem for the police force and judicial police in Jordan because of the unique technical nature of this crime [75].
With the lack of attention to cyberstalking in the Jordanian ISC Act, cyberstalking experiences have increased. In December 2015, the Criminal Investigation Department (CID) in Jordan created a Facebook page with the slogan “Towards Safe Cyberspace” to clarify the procedure for making a cybercrime complaint. However, the problem is still more extensive than the solution, and consequently, this research investigates cyberstalking victimization by estimating its prevalence and examining the relationships between factors. The results contribute to knowledge about this issue and help the government authorities assess cyberstalking victimization and increase citizens’ awareness about this threat. The main question in this study is: “How can cyberstalking victimization be investigated?” Four subquestions focus on this research to answer the central question:
  • What is the prevalence of cyberstalking victimization among college students?
  • What are the relationships between L-RAT constructs and cyberstalking victimization?
  • What are the demographic factors that are linked to being a survivor of cyberstalking?
  • How do we develop a cyberstalking victimization model?
The objectives of this research are as follows:
  • To estimate the prevalence of cyberstalking victimization among college students.
  • To examine the relationships between L-RAT constructs and cyberstalking victimization.
  • To identify the demographic factors that are linked to the history of cyberstalking victimization.
  • To develop and validate a cyberstalking victimization model.
This paper focuses on students in Jordan. It is well-known that students frequently use the Internet, which exposes them to the risk of becoming a victim of cyberstalking victimization, making them attractive as a sample for this research. In terms of individuals, this research focuses on students registered at Luminus Technical University College (LTUC) to investigate cyberstalking victimization. Including other students from other colleges in the sample would increase the time required for data collection without adding to the quality of the findings. Concerning criminal activities, this study focuses on cybercrime victimization, and specifically, cyberstalking. A group-administered questionnaire was used to collect data and was then evaluated in the SEM system using the partial least squares (PLS) technique. Microsoft Visio and Excel 2010, SmartPLS 2.0, and IBM SPSS 20 were used as analysis tools to develop the conceptual research model. In addition, QSR’s NVivo 10 was used for the systematic literature review conducted in the current research. Lastly, Mendeley software was used as a management tool for references.
The significance of this paper is based on three main perspectives, which are as follows. First, this is the first survey study in Jordan to improve cyberstalking victimization at an educational, organizational level. To assess the current status of cyberstalking in Jordan, the results will advocate that the recommendations on dealing with such threats will force establishing a Jordanian Computer Emergency Response Team (JoCERT) in the countries. Second, and drawing from literature in the study field, there have been a few attempts to understand cyberstalking victimization worldwide, but unfortunately, none of them in Jordan. There is a lack of cyberstalking statistics and materials available to researchers and citizens. This study will be seen as comprehensive material for future research on this topic and contribute to knowledge.
Furthermore, the report supports the lifestyle routine activities theory (L-RAT) applicability for assessing simulated and physical crime victimization. Third, there are no studies that adequately develop theoretically and empirically test a model for cybercrime victimization and very few on cyberstalking victimization, so the theoretical findings and methodology employed in this study may be helpful in the fields of information systems (IS), criminology (cyber-criminology), psychology and sociology. Jordan is one of only two Middle Eastern countries to liberalize its telecommunications market. The growing use of the Internet and other technology has presented Jordanian society with problems, necessitating creating a legislative model to mitigate the negative consequences of Internet use. This research can be seen to fill in this gap to increase the understanding of this new aggressive phenomenon by examining the critical relationships between factors to prevent people from falling victim to cyberstalking victimization.

3. Theoretical Background

There is a lack of cyberstalking victimization studies in general which are mainly: a lack of studies showing the frequency of cyberstalking incidents, a lack of knowledge of the existence of cyberstalking and the consequences for victims [18,76], a lack of empirical research [70,71,77,78,79], a lack of documentation on the extent of cyberstalking [16,25,44,80,81], a lack of cyberstalking victimization studies on college students [76,82,83], a lack of victim statistics for those who are cyberstalked or harassed, a lack of range and a lack of appropriate tracking methods [78,84], a lack of knowledge about cyberstalking [77,85,86,87], as well as a misunderstanding of what causes cyberstalking [81,88] and a lack of theories for assessing the factors of guardianship in cyberstalking [88].
To explain the definition of violence, researchers have used a variety of methods. Routine behaviors and lifestyle exposure hypotheses are the most commonly used theories. Both theories are called incentive theories because they relate criminality to illegal opportunities present in everyday life. Routine behaviors and lifestyle risk hypotheses ignore violent proclivity and instead rely on the circumstances in which crime occurs. It is difficult to differentiate between the two, according to Yucedal [37], since both hypotheses share similar assumptions. Both hypotheses rely on how individuals’ lifestyles or everyday routine behaviors provide opportunities for criminals to commit crimes. According to Miethe and Meier [89], the distinction between the two is in the language and focus used to describe crime and victimization risk. Cohen and Felson [90] suggested the routine practices hypothesis, which offers a systematic justification for criminal victimization, including logically, by integrating the three factors in time and space: driven criminals, fitting aim, and absence of guardianship. On the other hand, Hindelang, Gottfredson, and Garofalo [91] introduced the lifestyle exposure hypothesis to understand generational variations in the probability of personal victimization.
Routine Activities Theory. Lawrence E. Cohen and Marcus Felson introduced the repetitive tasks principle in 1979 [90]. It describes crime by combining three factors: driven criminals, a desirable target, and the lack of competent guardianship. Crime happens as these elements collide in time and space. The absence of all of these factors, according to Yucedal [37], avoids the incidence of criminal and deviant conduct. The hypothesis was created to understand why crime rates in the United States increased after World War II. According to a 1979 study by Cohen and Felson [90], the increased rate of crime in the 1960s and 1970s was due to changes in social life, which increased criminal opportunities after WWII, especially as women began to join the workforce, resulting in a decrease in the number of household members, leading to more time spent away from home, creating more opportunities for offenders. In addition, changes in social life limited the number of family guardianship members and forced them into closer interaction with suspected criminals. Their increased exposure and mobility provided more chances for motivated offenders to identify viable unprotected targets.
Lifestyle Exposure Theory. According to Hindelang et al. [91], who analyzed data from eight American cities, the probability of victimization is determined by an individual’s lifestyle, which is characterized as repetitive everyday activities, such as work and school as vocational activities, and leisure activities, such as play and socializes. The study also discovered that different behaviors expose people to various circumstances and that these lifestyles put people at a higher risk of being victimized due to their exposure. Furthermore, the researchers claim that people who spend more time in public places, especially at night and with non-family members, are more likely to be victims of personal crimes. Being in public places is directly related to people’s lifestyles. The study also claims that different demographic and socio-economic characteristics, such as family income, sex, marital status, and age, are linked to being victims of personal crimes.
Lifestyle Routine Activities Theory (L-RAT). Lifestyle routine activities theory (L-RAT) [48] combines the concepts of routine activities theory with the lifestyle exposure theory proposed by Hindelang [91] and colleagues. According to Cohen et al. [92], the lifestyle explanation holds that victimization is the product of repetitive habits and behaviors that increase exposure to empowered criminals and decrease exposure to competent guardians. Furthermore, according to Reyns [64], two ideas have been indirectly mixed over the years, and scholars have tested hypotheses on how the environment and repetitive behaviors subject people to the risk of victimization. In a 2014 publication, Sissing stated that the two hypotheses collide at the concept of the lifestyle exposure hypothesis, which states that people exercise their various habits by following their own everyday routine behaviors. This means that demographic characteristics such as age, gender, and ethnicity influence people’s lifestyles and victimization rates.
Furthermore, Cohen et al. [92] found that the lifestyle concepts of occupational and recreational tasks are integrated with the regular activities definition of a desirable goal in another analysis. An individual’s lifestyle, everyday habits, and behaviors, according to L-RAT, are what make them appropriate targets [93]. Meanwhile, Choi [94] claims that the two hypotheses are not mutually exclusive; instead, the repetitive behaviors hypothesis extends the lifestyle exposure theory. Victimization rises as a result of “lifestyle changes”, according to Miethe et al. [95], and repetitive habits and lifestyle exposure hypotheses include two fundamental conclusions regarding the existence and determinants of criminal victimizations. The first is that criminality happens as motivated criminals, convenient targets, and no third-party guardian come together in time and place. The second theory is that such repetitive habits and/or behaviors (frequent night-time or daytime movement outside the home) are riskier than others because they expose a target to more prospective criminals, increase exposure, and/or reduce guardianship. The hypotheses of the two theories were combined into two core propositions by Miethe and Meier [89]: first, routine behavior habits and lifestyles increase the interaction between future criminals and suspects, resulting in a criminal incentive structure; second, the intrinsic importance of an objective and its guardianship value decide the preference of specific crime victims. They also noted that in the theoretical model of victimization known as the “structural-choice” model, proximity and accessibility to motivated criminals are considered “structural” elements.
In contrast, goal appearance and guardianship are considered “choice” components. Thus, exposure and proximity are viewed as systemic characteristics because their patterns of social interactions predispose people to high-risk settings and circumstances. At the same time, appearance and guardianship are thought to decide the preference or selection of specific goals for victimization.
Lifestyle Routine Activities Key Factors. Cohen, Kluegel, and Land [92] were the first to specifically present the L-RAT by defining the causes and relationships between demographic features and victimization, including exposure, proximity, attractiveness, guardianship, and crime definitional properties. The integrated theory L-RAT is similar in its key concepts to the original theories (RAT and lifestyle exposure), such as suitable target vs. target attractiveness, proximity to motivated offenders, and motivated offenders. Vakhitova et al. [96] stated that the main concepts are not evident in the models that were introduced, and it did depend on how the researchers defined. The key factors in the literature will be depicted in the following section, followed by the empirical test supporting the physical world, then the virtual world overview. The location or exposure of motivated criminals reveals the offender’s involvement in a criminal case. Exposure is characterized as “the physical presence and accessibility of individuals and items to potential offenders at any given time or location” [92]. Proximity is defined as “the physical gap between places where potential targets of crime live and areas where comparatively significant populations of potential offenders are present.” The two meanings happen to have a lot in common. According to Felson [97], a driven criminal is “anyone with a desire to commit the crime”, while Bratt [98] defined it as “a person who is motivated to commit the crime.” The question now is: what makes a motivated offender? It is an amalgamation of various factors, including gain vs. need, society, experience, the environment, and the associated beliefs. Scholars have identified proximity as a neighborhood characteristic, and since motivated criminals live locally, high-crime locations are more likely to be attacked [99]. In addition, social-economic features of the place of residence were used to operationalize proximity to motivated criminals, such as average wage, unemployment rate, the form of living (urban vs. rural), and others [96]. In the literature, exposure has also been operationalized using variables representing different degrees and types of activities. These metrics include the number of nights a week spent engaged in recreational activity outside the residence, the number of hours per week the house is unoccupied, etc. According to Cohen et al. [92], the greater the likelihood of criminal victimization, the closer possible targets live to comparatively large populations of motivated criminals. As a result, increasing visibility raises the risk of becoming a survivor.
Finkelhor and Asdigian [100] suggested the expressions of gratifiability, antagonism, and insecurity to assess goal attractiveness. The inspired criminal perceives a gratifying goal as rewarding. On the other hand, an antagonistic target can elicit a harsh response from a motivated offender. A weak target is seen as unable or unable to overcome a motivated offender. Felson and Clarke [101] developed a list of characteristics that raise the likelihood of victimization: value, inertia, exposure, and access (VIVA). Worth refers to the target’s monetary value, inertness to its weight, visibility to its appearance, and accessibility to its functionality [96] (see Figure 1).
According to Burke [102], an appropriate subject is an individual or item of interest or things or people on whom criminality is aimed, such as an object to rob or a person to strike [98]. Clarke and Webb [103] presented the “CRAVED” model of stealing objectives, which identified six essential properties for goods: concealable, removable, accessible, valuable, pleasant, and disposable [104]. They define “concealable” as items concealed in pockets or bags, making them more vulnerable to shoplifters and other stealth thieves. The fact that automobiles and motorcycles are mobile, i.e., disposable, explains why they are often stolen. The term “open” refers to the concept that “desirable items that are easily available and easy to find are more vulnerable.” Visibility and usability are classified as “availability” in the VIVA model. Thieves will usually prefer the more costly or “valuable” items, particularly if they want to sell them. The notion that residential burglars are more likely to steal videos and televisions than similarly available or expensive electronic products such as microwave ovens or food processors is also defined as “enjoyable” by Clarke and Webb [103], which represents the pleasure-loving lifestyle of many criminals and the people who buy from them. The last property is “disposable”, which refers to thieves like items that are simple to sell (see Figure 2).
Capable Guardianship. Cohen et al. [92] characterize guardianship as the ability of individuals such as housewives, neighbors, private security guards, and pedestrian law enforcement officers, as well as items such as locks, burglar alarms, and blocked windows, to deter crimes from happening, either through their presence alone or through some form of direct or indirect intervention. This definition reflects the assumption for guardianship, i.e., the greater the guardianship, the less the risk of criminal victimization. The purpose of guardianship has evolved, and scholars now typically operationalize it to include social guardianship (focusing on presence and action). Miethe and Meier [105] conceptualized capable guardianship as having both personal (and social) and physical measurements. The individual (social) component is intriguing since a human aspect, such as neighbors, police or friends, has a crime-prevention impact. In contrast, the physical dimension reflects the use of target-hardening techniques such as burglar alarms, locks, self-preservation skills and others. Cohen and Felson [90] refer to capable guardianship as “ordinary citizens”, while Burke [102] describes it as “people or objects that deter crime” (see Figure 3).
Empirical Testing of L-RAT on Physical World. The hypothesis of lifestyle routine activities (L-RAT), which has been used widely to describe various forms of physical victimization, is generally supported by the body of study in the literature. The lifestyle routine behaviors viewpoint has been used to describe multiple forms of victimization, such as theft, rape, abuse, arson, assault, larceny, and robbery, as seen in Table 2. However, this scientific viewpoint has not been thoroughly investigated as an explanation for harassment, with only three experiments specifically using the lifestyle repetitive behaviors method to explain stalking victimization [88,106,107]. In summary, the lifestyle routine tasks viewpoint has been seen to help understand victimization in the real world, but further research is required to know if it is still valuable for explaining victimization in the virtual world.
Empirical Testing of L-RAT in Virtual World. Phillips [93] stated that despite having been applied to various crimes in the physical world, using the lifestyle routine activities theory in the virtual world is still limited. According to Back [77], the theoretical integration (L-RAT) is essential to help explain the new crime phenomenon. A sparse amount of literature has been found on L-RAT or RAT as part of the explanation of victimization in cybercrimes. As can be seen in Table 3, the lifestyle routine activities approach has been utilized to explain different types of cybercrime victimization. Yet this theoretical approach remains relatively untested in explaining cyberstalking or cyberharassment. Only a few studies have used the L-RAT or RAT as a subset to understand the factors that increase the risk of becoming a victim of this new type of cybercrime. Eleven studies on this type of cybercrime were found in the literature: Holt and Bossler [156], Bossler et al. [157], Reyns et al. [44], Welsh and Lavoie [158], Marcum [159], Ngo and Paternoster [160], Marcum et al. [161], Leukfeldt and Yar [162], Back [77], Phillips [93] and Yucedal [37].

4. The Proposed Cyberstalking Victimization Conceptual Model

A conceptual model is a well-specified model showing the fundamental relationships of a given set of variables as hypothesized from the theory [172]. Guba and Lincoln [173] adapted the view by Bamasoud [174], which found in his study that, if the following points are taken into consideration, i.e., the objective reality can be systematically and rationally investigated empirically and guided by the laws applied to social science; the independency of the researcher and the phenomenon being studied; the researcher remains detached; neutral objective; and propositions are generated by theories that are operationalized as hypotheses and have undergone experimental testing that is replicable, then the research is categorized as positivist.
The present research aimed to propose a conceptual model for cyberstalking victimization using the L-RAT perspective and empirically testing the hypotheses that were operationalized by the theories. As a result, the positivist paradigm is used to respond to the research questions in this study. The quantitative analysis methodology was selected to address the research questions because this study is concerned with testing hypothesis relationships and using the positivist model. In this research, a group-administered questionnaire was used to test the hypotheses. In this type of survey, a sample of respondents was requested at a familiar place and time, and each one was asked to fill the survey questionnaire at that place. According to Bhattacherjee [175], this format is convenient for the researcher and assures a high response rate. The scope of this study is to set students in Jordan, as it is well known that college students frequently use the Internet, with 90% of them accessing it daily [176], which exposes them to the risk of becoming a victim of cyberstalking victimization, through online social networking, texting, and instant messages [82]. Since college students have been identified as a high-risk demographic, they are a perfect community to research cyberstalking victimization [44]. Therefore, the target demographic for this study was college students, which corresponded to the study’s theme of cyberstalking victimization.
The sample was selected from students from one college in Jordan for various reasons. Firstly, since cyberstalking victimization is not dependent on whether students are from colleges or schools, there was no reason to believe that students from different colleges would experience victimization differently. Any of them could become a victim of this new phenomenon. Secondly, including students from various colleges would increase the time required for data collection without any expected impact on the quality of the results. Thirdly, the college students’ stakeholders asked the researcher to conduct the study in their college due to the importance of investigating the students’ increasing experience of cyberstalking victimization. Fourthly, in exploring this new phenomenon or behavior, the most appropriate sampling type was to choose convenience sampling and focus on one student college and pay more attention to the process of data collection and concentrate on the finding’s analysis. Fifthly, the student college that was selected had many distinguishing features that put it ahead of all other colleges in Jordan: it is the first and only college in Jordan to have been internationally approved by the accreditation board for higher education programs in Britain Edexcel (BE); it has taught life skills in collaboration with the international organization for youth and Microsoft; it teaches English language materials intensively through the British Bell Center; it contains a business incubator; it is also connected with the largest and most modern fleet of transport for community colleges in Jordan, and it also has a section dedicated to consulting and recruiting students and graduates. Finally, it is geographically located in the middle of Jordan, specifically in the center of the capital Amman, making it an optimal environment to conduct this study. For these reasons, Luminus Technical University College (LTUC) was chosen as the college in the present research, and the respondents were the students. Inappropriateness, inadequacy, or excessive sizes of sample continue to influence the quality and accuracy of the study.
Questionnaire Design. The initial conceptual model for this study was drawn based on the systematic literature review because its relevant hypotheses were proposed. The next step is to design the questionnaire to collect the relevant information essential for this study. A questionnaire is a written set of questions to which respondents record their answers [177]. The questionnaire, which Sir Francis Galton invented, is defined as a researcher tool having a set of questions (items) planned to take responses from respondents in a consistent way [175]. Not only are the content and sequence of the questions necessary, but also how the questionnaire looks. The questionnaire should be laid out and presented very well. The current questionnaire started with a proper introduction that talked about cyberstalking (the main topic) and how this new phenomenon was distributed globally and locally and introduced the purpose of the study. The introduction also clearly disclosed the researcher’s identity by giving his name and email address, contact hand phone (HP) numbers, and the university department to which he belongs. The length of the questionnaire was kept within reasonable limits [178]. In addition, the current questionnaire motivated the respondents through specific phrases such as “we strongly believe that your feedback is essential” and “it would be greatly appreciated if you could take the time to complete the questionnaire”. The questionnaire ended on a courteous note with “Thank you for your time; your cooperation is highly appreciated.” This note reminded the respondents to double-check that they had completed all the tasks.
The study’s original model contained three independent variables: proximity to motivated criminals, appropriate aim (target attractiveness), and digital guardianship, as well as one single dependent variable: victimization due to cyberstalking. Proximity to motivated offenders is the first variable of L-RAT—the items were adapted from previous work on this area, with the things developed based on the activities that Jordanian society is interested in. After refining the measures, the items for this construct were operationalized using 23 items by asking the respondents: in the past, which of the following activities did you frequently do online? The answer choices were: hacking, political websites, e-banking, showing goods and services, job-seeking websites, e-government, health-care services, chatting/instant messenger (video), chatting/instant messenger (voice), chatting/instant messenger (text), social networking sites, sending/receiving emails, reading newspapers/magazines, playing games, watching TV programs, downloading computer programs, watching/downloading movies, listening to/downloading music, visiting religious websites, shopping, visiting adult websites, sport, adding unknown friend.
Formulating Measurement Model. The result of the instrument development was used to measure the proposed variables shaped as the conceptual model’s constructs. In their study, Hair et al. [179] identified that the model that comprises the indicators and their associations with the constructs is called the “measurement model” or “outer model”. According to Edwards and Bagozzi [180], measures can be referred to as “reflective indicators” when they are used to inspect an underlying construct that is unobservable (latent variable). In contrast, indicators that determine a construct are called “casual/formative indicators.” MacCallum and Browne [181] mentioned that an unobservable construct that consists of reflective indicators is called a “reflective construct”, while a construct comprised of causal indicators is called a “formative construct.” The designation of a construct as formative or reflective is somewhat illusive in many fields, including information systems. In the literature, many constructs that are used in IS are neither purely reflective nor purely formative. Previous research on IS showed that 30% of the constructs are misspecified [182]. Developing and analyzing a research questionnaire is directly related to the method of producing a measurement model. Therefore, when creating a research model, the researcher should consider two different measurement models: reflective and formative. Hair et al. [179] recommended guidelines for researchers to decide whether to measure a construct reflectively or formatively (see Table 4).
In the current study, these guidelines were used to develop the questionnaire and select the appropriate assessment method. In the policies proposed by Hair et al. [179], four variables (proximity of motivated offenders, a suitable target, digital guardianship and cyberstalking victimization) were specified as reflective constructs (see Table 5).
Instrument Validity and Reliability (Testing Goodness of Data). Validity and reliability testing are essential in questionnaire construction since a research instrument must be valid and consistent to calculate the study’s variables. Validity refers to how well a metric accurately describes the underlying construct it is meant to measure, while reliability refers to how robust or dependable a construct’s measure is. A calculation can be accurate but not true, and vice versa. Both reliability and validity are needed to ensure adequate analysis of the constructs of interest [175].
The degree to which a construct’s calculation is reliable is known as reliability [175]. Internal continuity, in some terms, evaluates the interrelatedness of items. The scale’s items should have a high degree of internal accuracy. Cronbach’s coefficient alpha [188] is the most used to calculate the internal accuracy reliability coefficient, and it is concerned with the degree of interrelatedness within a group of objects constructed to measure a single construct. The higher Cronbach’s alpha is, the more reliable the intrinsic stability is. It is considered acceptable if the value is 0.70, but it is appropriate if it is 0.60 or more [177].
The final questionnaire was shown to an additional seven experts. One from UTM was a proofreader (Arabic and English). The others were the dean of the student’s college, the deputy dean, and teachers whose purposes were to increase the clarity of the instruction and wording and check the final appearance of the instrument before distributing it. Some researchers suggested that this stage was a pretest of the questionnaire, and their corrections suggested that expert suggestions were affected as well as the content validity.

5. Data Analysis Techniques

Different techniques are used for data analysis depending on the type of statistics used. Three different analyses use survey data: descriptive analysis, measurement model analysis, and structural model analysis.
Descriptive Analysis. Descriptive analysis is the mathematical description, aggregation, and presentation of the structures of interest or relationships [175]. In this report, descriptive analysis was used to examine the respondents’ profiles, such as frequency, standard deviation, mean, range, and percentage, using IBM SPSS Statistics 20. The most common data analysis technique for determining relationships between latent variables is structural equation modeling (SEM). It is considered an effective strategy for assessing hypothesized structural linkages between variables and measuring associations between variables and their objects [189]. PLS is a component-based approach to measuring SEM that is often used to model the relationships between dependent and independent variables. The PLS-SEM application has been successfully implemented in various research areas and is becoming widely shared in IS and other disciplines [190]. PLS route modeling can be done using multiple methods, including SmartPLS, used in this analysis. The evaluation of the calculation model and the evaluation of the structural model are all done in the SmartPLS 2.0 method.
Assessment of the Measurement Model. Internal accuracy reliability, indicator reliability, convergent reliability, and discriminant validity are some of the reliability and validity assessments for the reflective measurement model. Table 6 shows the instructions for evaluating the calculation model.
Cronbach’s alpha (CA) is a traditional measure of internal accuracy, with a strong alpha value implying that all objects of the same construct have the same range and context [67]. Composite reliability (CR) considers the various outer loadings of the indicator variables, whereas Cronbach’s alpha suggests that all indicators are similarly accurate. CA and CR range from 0 to 1, with 0.6–0.7 considered acceptable [191], 0.7–0.9 satisfactory, and values > 0.95 considered unacceptable [179].
The degree to which individual objects represent construct convergence compared to items measuring separate constructs is known as convergent validity [190]. The researchers consider the outer loadings of the metrics with the average variance derived to determine convergent validity (AVE). The lower bound for indicators with external loadings is 0.708, while indicators with external loadings of 0.4 to 0.7 can be deleted only if doing so improves the CR; in the meantime, the value of AVE should be greater than 0.5 for a desirable convergent validity. Finally, discriminant validity, which is characterized as the degree to which a construct is genuinely distinct from other constructs by methodological criteria [179], was used to evaluate reflective constructs in this analysis. To develop discriminant validity in SEM with PLS, two standard measures are used. The first metric is indicator cross-loading, indicating that an indicator’s outer loading on the corresponding build should be greater than any other loadings. The Fornell–Larcker criterion, which states that the square root of each construct’s AVE should be greater than its highest correlation with any other construct, is the second metric.
Assessment of Structural Model. After the validation of the measurement model, the structural model can be analyzed. Four test criteria were used to assess the structural model, as shown in Table 7.
Pilot Testing. After assessing the validation using a theoretical approach, the analytical evaluation is the next step in the validation process. Many refined build elements are combined into a testing instrument, delivered to a pilot test sample of representative respondents from the target population [175]. A pilot evaluation is a small-scale approximation of the survey execution with representatives of the target community [192]. Pilot testing aims to identify any issues or flaws in the questions (checking that the questions are understandable, answer choices are appropriate, the order of the questions seems logical), the questionnaire layout (font sizes are easy to read, colors and styles), and the questionnaire process (how long it takes respondents to complete answers, how interested the respondents are in the results).
To ensure validity, pilot testing for the current research was conducted after receiving the suggestions and comments from the pretest and content validity procedure [193]. According to Zukerberg et al. [194], few straightforward guidelines exist to determine sample size. Experts’ recommendations about the appropriate size cover a substantial range, which is considered in the current study. Sudman [195] mentioned that a pilot test on 20–50 cases is sufficient, and Sim and Lewis [196] stated that a pilot study of at least 50 cases was advisable in many circumstances, while the range may vary from 25 to 100 subjects [197]. Thabane et al. [198] stated that sample size calculation might not be required for some studies in general. To accomplish the pilot survey task, 50 questionnaires were distributed. Based on the data collected from the pilot study, descriptive analysis was performed, followed by validation of the instrument’s reliability (see Table 8 and Table 9 for descriptive analysis and reliability).
Data Collection. After assessing the reliability and validity of the questionnaire, copyright was applied from the Innovation and Commercialization Centre (ICC) at UTM. This was successful in December 2015 with the awarding of copyright labeled: Survey on Cyberstalking victimization <2015> Universiti Teknology Malaysia—All rights reserved.
Descriptive Analysis of Pilot Study. The overall number of respondents that participated in the pilot study was 50. IBM SPSS statistics 20 was used to exhibit the respondents’ demographic characteristics in this study. The frequencies and percentages are shown in Table 8.
Instrument’s Reliability. The reliability of the device was evaluated using Cronbach’s alpha. The results showed that all variables have an acceptable level of reliability, with all the scales being reliable at >0.70 (see Table 9).

6. The Theoretical Framework Concept

The tenets of routine activities and lifestyle exposure theories have been combined to create what is known as L-RAT [48,82,83]. This combination is implicit in lifestyle routine activity theories, lifestyle exposure theory, and routine activities theory used interchangeably in research such as Reyns [36]. The two separate approaches were developed in tandem and shared scientific ideas [83,199]. Although the L-RAT perspective has been applied to various physical crimes, its application to cybercrime is limited. The theoretical integration is essential in helping to explain the new crime phenomenon [77,93]. The L-RAT perspective has been one of the most tried and supported analytical models [83,99]. Cyberstalking as a new phenomenon of cybercrime has not been extensively empirically examined [32]. Only a few observational trials have been conducted, and most cyberstalking studies lack a scientific basis [65,82]. Recently, researchers have used this perspective to conduct studies about cyberstalking victimization [24]. This study proposes a conceptual model for this new phenomenon to cover the dire need for empirical assessment of cyberstalking victimization based on the L-RAT perspective. The conceptual model describes the theoretical framework and helps the reader visualize the theorized relationships [177]. The conceptual model of this study consists of four variables: proximity to motivated offenders, suitable target (target attractiveness, digital guardianship and cyberstalking victimization, moderators, and demographic/control variables).
In prior studies, researchers used the term “proximity” or “exposure” interchangeably. The proximity to motivated offender variable for this study was operationalized using 23 items: hacking, political websites, e-banking, showing goods and services, job-seeking websites, e-government, health-care services, chatting/instant messenger (video), chatting/instant messenger (voice), chatting/instant messenger (text), social networking sites, sending/receiving emails, reading newspapers/magazines, playing games, watching TV programs, downloading computer programs, watching/downloading movies, listening to/downloading music, visiting religious websites, shopping, visiting adult websites, sport, adding unknown friend (see Figure 4). To assess the suitable target variable, 12 items were operationalized, including the victims’ personal information that was exhibited on the Internet: name, gender, age, mobile phone number, email address, home address, bank account number, study program, credit card serial, favorite activities, photos, videos (see Figure 5). The guardianship variable was operationalized using 12 items, including the security software installation that the victims frequently activated: antivirus software, antispyware software, firewall software, Ad-Aware software, tracking protection blocks software, filtering/monitoring software (see Figure 6). The information security management techniques that the victims frequently used on their computers were also included: change the login password, save extra copies from files/folders, create a backup process, delete old files, delete old emails/attachments, change any file locations.
Seven control variables were assessed for this study: age (less than 18, 18, 19, 20, 21, 22, others), course program (engineering, computer sciences/it, applied arts, finance and management, medical sciences, education, languages, hotel and tourism, audio and visual techniques, information management and libraries, others), academic semester (first, second, third, fourth, fifth, sixth semester), nationality (Jordanian, foreigner), residence (village, desert, rural, refugees, town, city, other), gender (male, female) and income (less than 500, 500–749, 750–999, 1000–1499, more than 1500 Jordan Dinars, others). The only dependent variable in the current study was operationalized using eight items by asking the victims about the online victimization behavior that they frequently faced, including being harassed or annoyed, having false information posted, being sent sexual material, someone pretending to be them, attempts to disable their computer, having their online profile monitored, being sent threatening/offensive letters or messages to their e-mail, having threatening/offensive comments made to them in chat rooms/on instant messaging sites (see Figure 7). A proposition is a “tentative and conjectural association between constructs”, and “hypotheses” refer to the analytical formulation of these propositions as relationships between variables [175]. With a few exceptions, comprehensive reviews of the L-RAT perspective for cyberstalking victimization lack literature. Most experiments have not operationalized any theory’s ideas (proximity to a motivated criminal, appropriate goal (target attractiveness), and digital guardianship). To account for cyberstalking victimization, this analysis thoroughly examined all of the theory’s ideas, and all hypotheses were formulated as follows:
Hypothesis 1 (H1).
Proximity to motivated offender has a positive effect on cyberstalking victimization.
Hypothesis 2 (H2).
Suitable target has a positive effect on cyberstalking victimization.
Hypothesis 3 (H3).
Digital guardianship harms cyberstalking victimization.
Due to the disparities between people’s diets, lifestyle sensitivity theory, which indirectly included the L-RAT viewpoint, claimed differences in victimization rates across demographic classes. Age, sex, race, marital status, wealth, education, and profession all affected people’s lifestyles [48,99]. Five moderators tested the impact of the interaction between the independent variables (proximity to driven attacker, appropriate goal (target attractiveness), and digital guardianship) and the dependent variable (cyberstalking victimization) to thoroughly assess the L-RAT and deliver/answer the study question about the demographic effects on cyberstalking victimization (cyberstalking victimization). The following are the fifteen theories that were proposed:
Hypothesis 4a (H4a).
The relationship between proximity to motivated offenders and cyberstalking victimization is moderated by gender.
Hypothesis 4b (H4b).
The relationship between suitable target and cyberstalking victimization is moderated by gender.
Hypothesis 4c (H4c).
The relationship between digital guardianship and cyberstalking victimization is moderated by gender.
Hypothesis 5a (H5a).
The relationship between proximity to motivated offenders and cyberstalking victimization is moderated by age.
Hypothesis 5b (H5b).
The relationship between suitable target and cyberstalking victimization is moderated by age.
Hypothesis 5c (H5c).
The relationship between digital guardianship and cyberstalking victimization is moderated by age.
Hypothesis 6a (H6a).
The relationship between proximity to motivated offenders and cyberstalking victimization is moderated by Internet speed.
Hypothesis 6b (H6b).
The relationship between suitable target and cyberstalking victimization is moderated by Internet speed.
Hypothesis 6c (H6c).
The relationship between digital guardianship and cyberstalking victimization is moderated by Internet speed.
Hypothesis 7a (H7a).
The relationship between proximity to motivated offenders and cyberstalking victimization is moderated by residence.
Hypothesis 7b (H7b).
The relationship between suitable target and cyberstalking victimization is moderated by residence.
Hypothesis 7c (H7c).
The relationship between digital guardianship and cyberstalking victimization is moderated by residence.
Hypothesis 8a (H8a).
The relationship between proximity to motivated offenders and Cyberstalking victimization is moderated by nationality.
Hypothesis 8b (H8b).
The relationship between suitable target and Cyberstalking victimization is moderated by nationality.
Hypothesis 8c (H8c).
The relationship between digital guardianship and cyberstalking victimization is moderated by nationality.

7. Results of Data Analysis

7.1. Data Collection

Data collection challenges must be resolved after the data is collected and before the analysis: incomplete data, suspicious response habits consisting of straight-lining or contradictory responses, and outlines. Missing data occurs when a respondent fails to answer more than one question, either deliberately or accidentally. Where the percentage of missing data in a questionnaire exceeds 15%, the result is usually disconnected. Mean value substitution was used to handle missing values in this analysis, captured by SmartPLS tools. The mean of the correct values of the indicator variable was used to replace the missing value of the indicator variable. Another problem with the data gathered is the straight-lining, which happens when a respondent answers many questions. Outliers have a solid solution to a single question or have drastic answers to all questions, in the straight-lining issue, the respondent cases should be removed, and in the outlier issue, if there are few identified outlier cases, the respondent cases are removed from the data set [179]. Consequently, over 908 questionnaires were distributed to the replacements, and 757 questionnaires were eligible for analysis, which meant that 151 cases were removed from the data set (see Table 10).
As shown in Table 10, the response rate of the questionnaire was 100%, which means that all questionnaires were returned. The questionnaires with a high level of missing data were deleted from the data set (11.5%, N = 104). All straight-lining was removed (4.4%, N = 40). Finally, the few outliers were removed (0.77%, N = 7). Descriptive statistics exhibit the essential characteristics feature of the study sample. IBM SPSS Statistics 20 software was used to analyze the descriptive statistics. Table 11 shows the frequencies and percentages of the demographic variables: gender, age, course program, academic semester, nationality, income, and place of residence (see Table 11).
The college students in the case study had to be 18 or more than 18 years, there were 25 respondents aged 18 (3.3%), 70 respondents aged 19 (9.2%), 209 respondents aged 20 (27.6%), 237 respondents aged 21 (31.3%), 165 respondents aged 22 (21.8%), 13 respondents aged 23 (1.7%), 14 respondents aged 24 (1.8%), 7 respondents aged 25 (0.9%), 2 respondents aged 26 (0.3%), 6 respondents aged 27 (0.8%), 2 respondents aged 28, 29, and 30 (0.3%) for each age, 1 respondent aged 33, 38, and 40 (0.1%) for each age. The course program variable comprised of 10 categories: applied arts comprised 72 cases (9.5% of the respondents), audio and visual techniques comprised 28 cases (3.7% of the respondents), computer science/information technology comprised 15 cases (2.0% of the respondents), education comprised 25 cases (3.3% of the respondents), engineering comprised 304 cases (40.2% of the respondents), finance and management comprised 101 cases (13.3% of the respondents), hotel and tourism comprised 61 cases (8.1% of the respondents), information management and libraries comprised 35 cases (4.6% of the respondents), languages comprised 25 cases (3.3% of the respondents), finally medical sciences comprised 91 cases (12.0% of the respondents).The academic semester variable comprised of six categories: first semester comprised 85 cases (11.23% of the respondents), second semester comprised 149 cases (19.7% of the respondents), third semester comprised 96 cases (12.7% of the respondents), fourth semester comprised 229 cases (30.3% of the respondents), the fifth semester comprised 125 cases (16.5% of the respondents), finally the sixth semester comprised 73 cases (9.6% of the respondents). The nationality variable is comprised of two categories: local and foreigner. The local (Jordanian) category comprised 698 and the foreigners 59 (92.2% and 7.8%, respectively). The income variable comprised of five categories: family monthly income less than 500 Jordanian dinars comprised 252 cases (33.3% of the respondents), 500–749 Jordanian dinars comprised 160 cases (21.1% of the respondents), 750–999 Jordanian dinars comprised 136 cases (18.0% of the respondents), 1000–1499 Jordanian dinar comprised 96 cases (12.7% of the respondents), finally more than 1500 comprised 112 cases (14.8% of the respondents). Place of residence variable shaped by six categories: city comprised 510 cases (67.4% of the respondents), desert comprised 22 cases (2.9% of the respondents), refugee comprised 65 cases (8.6% of the respondents), rural comprised 25 cases (3.3% of the respondents), the town comprised 53 cases (70% of the respondents), finally village comprised 82 cases (10.8% of the respondents).
The first objective of the current study is to estimate the prevalence of this new phenomenon among college students. To achieve this objective, IBM SPSS Statistics 20 was employed to calculate the percentages across the eight categories of cyberstalking victimization behaviors that were defined. The behaviors consist of harassment or annoyance, posting false information, sending sexual material, pretending to be you, attempting to disable a computer, monitoring your profile, sending threatening letters or messages to your email, writing threatening/offensive comments to you in chat rooms/on instant messaging sites. Table 12 shows the percentage of prevalence for each type of cyberstalking victimization.
As shown in Table 12, the cyberstalking victimization prevalence ranged between 66.76% (harassment and annoyance) and 39.92% (posted false information). In addition, 64.64% of students received sexual materials, 57.2% had their computers disabled, 61.3% had their profile monitored online, 64.84% were sent threatening letters or messages to their email, 49.18% were sent threatening/offensive comments in chat rooms/on instant messaging sites, and finally, 60% were impersonated.

7.2. Model Quality Assessment

System validation attempts to determine whether the structural model and calculation meet the consistency standards for analytical work [190]. According to Hair et al. [179], this point focuses on learning how to evaluate the consistency of the performance. The evaluation of the structural model (inner model) and the assessment of the estimation models are the two steps in the formal application of these parameters (outer models). The structural equation model is developed by combining the calculation and structural models.
Assessment of the Measurement Models (Outer Models). It is essential to decide whether the measurement paradigm is reflective or formative before assessing it. The current study’s model was reflective. Composite reliability is used to test internal accuracy, predictor consistency, average variance derived (AVE) to assess convergent validity, and cross-loading, and the Fornell–Larcker criteria to determine discriminant validity [179].
Convergent Validity. The degree to which a metric compares positively with alternative measurements of the same construct using the domain sampling model; reflective construct metrics are viewed as separate ways to measure the same construct. Hair et al. [179] identified convergent validity. As a result, objects that are indices (measures) of a particular construct should converge or have a high proportion of variation in common. Convergent validity is noted when things that seem to represent a concept combine, or exhibit major, high similarities with one another, according to Straub et al. [200]. The degree to which several construct metrics agree with one another is known as convergent validity [201]. As a result, according to Hair et al. [179], convergent validity can be assessed using outer loadings and average variance removed (AVE).
Outer Loadings. In reflective calculation models, outer loadings are the approximate relationships that specify an item’s total contribution to its assigned build. Its value should be greater than 0.70, according to Hair et al. [179], but if it is between 0.4 and 0.7, there are certain things to remember when removing the object from the scale. Other research, however, determined that 0.50 was the minimum cut-off value for keeping the object on the scale [189,202,203,204]. Thus, things with values of 0.50 and above were compatible with previous research and were suggested to be held (see Table 13 for the retaining indicators).
Average Variation Extracted (AVE). The degree to which a latent construct enlightens the variance of its respective indicators is measured by AVE. The build clarifies more than half of the uncertainty of its indicators if the AVE value is 0.50 or higher [179]. The AVE values for this analysis are shown in Table 13.
Discriminant Validity. The discriminant validity denotes the clarity of the construct components [201,205]. Straub et al. [200] defined discriminant validity as the posited of the measurement items to show (“makeup”) that construct vary from those which are not assumed to form the construct. In line with these definitions, according to Hair et al. [179], discriminant truth is “the degree to which one concept is completely distinct from other constructs by scientific criteria.” Cross-loadings and the Fornell–Larcker criteria are two techniques for determining discriminant validity. One tool for determining discriminant validity is cross-loadings. Explicitly, an indicator’s outer loading on the corresponding build should be greater than any other loadings. Another way of evaluating discriminant validity is the Fornell–Larcker criteria [206], which assumes that AVE should be greater than the construct’s highest squared correlations with other latent constructs. Consequently, since the current study model consists of four constructs only (relatively small) with more items, it is recommended to use the cross-loadings method because it depended on the individual items in the comparison, so cross-loadings were used (see Table 14).
Internal Consistency Reliability. The customary criterion for evaluating internal consistency reliability is Cronbach’s alpha (CA), which supposes reliability of all indicators, while composite reliability (CR) considers that indicators show dissimilar loadings [190,207]. CA and CR differ between 0 and 1 respectively, with greater values that show a higher level of reliability. An alpha coefficient value of 0.7 is measured well; an acceptable value for some researchers, such as Sekaran and Bougie [177], is between 0.6 and 0.7. Table 15 exhibits the values of CA and CR for the constructs used in the current study with all the values for CA, which range from 0.793 to 0.928 and 0.859 to 0.923. The results show that all the items are reliable.
Assessment of the Structural Model (Inner Model). Hence it is proven that the measurement model defines the construct (latent variables), while the structural model explains the underlying causative relationship among these latent variables [189]. This specifies that after the confirmation, it is a helpful fact that the construct measures are consistent and dependable. By this, the structural model can be assessed [177,179,204]. The assessment of the structural model can be achieved by applying the following tests under specified criteria: first: coefficient of determination (R2); secondly: f2 effect size test; thirdly, predictive relevance of the model (Q2) and (q2) effect size; finally, measuring the relevance and significance of the structural model utilizing path coefficient and standard errors (t-value) through the bootstrapping procedure [179,190,204].
The Coefficient of Determination (R2 value). Hair et al. [179] stated that R2 value is “a measure of the model’s suggestive correctness, and it is measured as a squared connection between actual and predicted values of a specific endogenous construct. The coefficient signifies the endogenous latent variable’s collective effects on the endogenous latent variable; it also shows the amount of variance in the endogenous construct clarified by all the exogenous constructs linked to it.”
The range of R2 value is from 0 to 1 with a higher level which shows higher levels of predictive accuracy. The judgment of R2 level as high depends on the research disciplines and model complexity, whereas R2 values of 0.2 are measured high in specific disciplines, such as consumer behaviors. Values of approximately 0.67, 0.3330, and 0.19 are considered substantial, moderate, and weak, respectively [186,190,207], whereas familiar scholars and researchers consider R2 values of 0.750, 0.500, and 0.250 substantial, moderate, and weak, respectively. The R2 value of the endogenous latent variable (cyberstalking victimization (CV)) is 0.782, which means that the influence of proximity is 78.1% of the variance in the CV, which indicates a substantial range.
Effect Size (f2). The change of these values can be explored, besides the evaluation of R2 values, to identify whether the effect of a particular independent latent variable on a latent dependent variable has a substantive e-impact [179,190,204,207]. The effect size f2 can be calculated as:
f 2 = R 2 i n c l u d e d R 2 e x c l u d e d 1 R 2 i n c l u d e d
When the predictor latent variable is used or omitted in the structural equation, R2included and R2excluded are the R2 given on the latent dependent variable, respectively [204]. Thus, at the structural stage, values of 0.020, 0.150, and 0.350 can be used to determine whether a latent predictor variable has a small, medium, or strong effect [179,190,204,207]. Table 16 exhibits the result of the effect size test.
From the results, f2PTMO→CV = 0.078, f2ST→CV = 0.009 and f2DG→CV = 0.101 had a small effect on CV. The completed formula results are as follows:
f 2 P T M O C V = R 2 i n c l u d e d R 2 e x c l u d e d 1 R 2 i n c l u d e d = 0.782 0.765 / 1 0.782 = 0.078 .
f 2 S U C V = R 2 i n c l u d e d R 2 e x c l u d e d 1 R 2 i n c l u d e d = 0.782 0.780 / 1 0.782 = 0.009 .
f 2 D G C V = R 2 i n c l u d e d R 2 e x c l u d e d 1 R 2 i n c l u d e d = 0.782 0.760 / 1 0.782 = 0.101 .
Predictive Relevance (Q2). Predictive relevance is a method to evaluate the magnitude of the R2 values as a criterion of predictive accuracy by using Stone–Geisser’s Q2 [208,209].
In SmartPLS 2.0, blindfolding technique is available as built-in software. Two contemplations must primarily be considered as basics to run the blindfolding procedure: firstly, this procedure is applicable only for both reflective and single-item constructs, respectively; further, it should be determined which data points are deleted (omitted) by setting an omission distance (D). D should be chosen between 5 and 10 [179]. In the current study, D was set automatically by the software to 7 (as default). Q2 is calculated as follows:
Q 2 = 1 S S E S S O
Q2 = predictive relevance, SSE = sum of squared predictive errors, and SSO = sum of squared observations.
For predictive quality and relevance, the Q2 value must be more than zero. After running the blindfolding procedure, the construct cross-validated redundancy result shows that the Q2 value is 0.4267, reflecting an excellent predictive relevance for cyberstalking victimization. The subsequent phase was to assess the predictive relevance for each independent variable alone to predict cyberstalking victimization, which refers to q2 using the following formula:
q 2 = Q 2 i n c l u d e d Q 2 e x c l u d e d 1 Q 2 i n c l u d e d
where, q2 is effect size of predictive relevance. Q2included and Q2excluded: the predictive relevance value for the endogenous latent variable when the exogenous latent variable is used or omitted, where values of 0.02, 0.15, and 0.35 assume that the effect size for predictive relevance is small, medium, and large, respectively (see Table 17).
As shown in Table 17, the results obtained from calculations are as follows:
q 2 P T M O C V = Q 2 i n c l u d e d Q 2 e x c l u d e d 1 Q 2 i n c l u d e d = 0.4267 0.4188 / 1 0.4267 = 0.014 .
q 2 S U C V = Q 2 i n c l u d e d Q 2 e x c l u d e d 1 Q 2 i n c l u d e d = 0.4267 0.4265 / 1 0.4267 = 0.0004 .
q 2 D G C V = Q i n c l u d e d Q 2 e x c l u d e d 1 Q 2 i n c l u d e d = 0.4267 0.4166 / 1 0.4267 = 0.018 .
Hypotheses Testing (Path Coefficient and Bootstrapping). After running the PLS–SEM algorithm, the path coefficient obtained from the structural model relationships represented the hypothesized relationships among the constructs. Several algorithms can be used to determine the model structure [210,211,212,213,214,215]. The path coefficients show a standardized value ranging from −1 to 1+. A robust positive relationship implies that the path coefficient value is close to +1 and vice versa for close to −1. The standard error depends on the significance of the coefficient, which is achieved utilizing bootstrapping. The standard bootstrapping error makes the empirical t-value to be calculated. Before doing the bootstrapping in SmartPLS 2.0, the samples were set to 5000, the R2 for cyberstalking victimization (the only dependent variable) for the current study was 0.781, and there are commonly critical values used to compare it with t-value to test the significance level. These were 1.650 (with 10% of significance level), 1.960 (with 5% significance level) and 2.580 (with 1% significance level).
H1 hypothesized that proximity to motivated offenders has a significant positive effect on cyberstalking victimization. The results demonstrated a significant and positive effect of proximity to motivated offenders on cyberstalking victimization (path coefficient = 0.3721, STERR = 0.0641, t-value = 5.8085 *** > 2.58, p < 0.01). The results showed that PTMO was statistically significantly related to cyberstalking victimization, and therefore, H1 was accepted. H2 hypothesized that a suitable target has a significant positive effect on cyberstalking victimization. The results demonstrated a significant and positive effect of ST on cyberstalking victimization (path coefficient = 0.1547, STERR = 0.0797, t-value = 1.9423 * > 1.65, p < 0.1). The results showed that SU was statistically significantly related to cyberstalking victimization, and therefore, H2 was accepted. H3 hypothesized that digital guardianship has a significant negative effect on cyberstalking victimization. The results demonstrated a highly significant and positive effect of digital guardianship on cyberstalking victimization (path coefficient = 0.3848, STERR = 0.0600, t-value = 6.4162 > 2.58 ***, p < 0.01). The results exhibited that DG was statistically significantly related to cyberstalking victimization but with a positive relationship.
A moderator effect occurs when an independent variable changes the strength of a relationship in the model between two constructs. There are two types of moderating relationships, categorical and continuous. Categorical moderating effects occur with a categorical variable that affects all relationships, which commonly came with two choices such as, gender (male or female). Continuous moderating effects, on the other hand, happen when a non-categorical variable affects a relationship in a model. The researchers often transform the continuous variable into a categorical variable to model its unique effect on the relationship as continuous [179]. Consequently, this study employed the categorical moderators’ type to assess the significance of moderating effects for five variables (gender, nationality, Internet speed, age, and residence) from exogenous latent variables (IV) to endogenous latent variables (DV).
The first categorical moderating effect was assessed using the parametric approach to PLS multigroup (MGA). MGA is a multigroup analysis technique and was used to test differences between identical models estimated for different groups of data [179]. The parametric approach, as proposed by Keil et al. [216], requires three parameters to be specified: The number of observations in the first group n (1) and in the current test (male or female) were referred to as n (2). The two groups’ path coefficients were referred to as p (1) and p (2). The standard errors of the parameter for the groups, which were referred to as (p (1)) and (p (2)) (see Table 18).
As shown in Table 18, the path coefficients and standard errors showed little difference. The highest variance in path coefficient was observed in the relation between suitable target and cyberstalking (0.113). However, the t-value = 1.002 and p-value = 0.317 indicated no statistical significance for the effect of gender on any exogenous latent variables. Therefore, it was concluded that gender is not a moderator between PTMO, ST, and DG and the endogenous latent variable (CV). The same method was conducted in the nationality variable with the indicators local (Jordanian) and foreigner. A PLS-MGA analysis was performed to test the nationality moderating effect between PTMO, ST, and DG) and CV (see Table 19).
As shown in Table 19, the highest variance in path coefficient was observed in the relation between ST and CV (0.2663). However, the t-value = 1.033 and p-value = 0.302) indicated no statistical significance for the effect of nationality on any exogenous latent variables. Therefore, it was concluded that nationality is not a moderator between PTMO, ST, DG, and CV. The Internet connection speed variable with indicators, normal connection, and the high connection was tested using a PLS-MGA analysis to assess the speed moderating effect between PTMO, ST, and DG and CV (see Table 20).
The highest level of variance in path coefficient was observed in the relation between DG and CV (0.1595), with t-value = 0.912 and p-value = 0.362, which means that there was no statistical significance for the effect of Internet connection speed. Consequently, it was concluded that Internet connection speed is not a moderator between PTMO, ST, DG, and CV. The age variable was transformed to a categorical variable by combining the 16 indicators to become two indicators, which were: age ≤ 20 implies 18, 19 and 20 years old, and age > 20 implies 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 33, 38 and 42 (see the results in Table 21).
As shown in Table 21, the highest level of variance in path coefficient was observed in the relation between DG and CV (0.1683), with the t-value = 1.837* and p-value = 0.067, which indicated that there is a statistical significance for the effect of DG on the CV moderated by age. Consequently, it was concluded that age is a moderator with a significant effect between DG and CV. Other results did not exhibit any other significance. Place of residence was assessed as a categorical moderating effect using PLS-MGA since the frequencies and percentages for the five residence indicators were low compared with the indicator (city): 67.4%. This variable was assessed by dividing the data set into two subsets, which were city residence place and others, which included: desert (2.9%), refugee (8.6%), rural (3.3%), town (7.0%), and village (10.8%) (See the results in Table 22).
As shown in Table 22, the highest level of variance in path coefficient was observed in the relation between ST and CV (0.2143), with t-value = 1.732* and p-value = 0.084, indicating that there is a statistical significance for the effect of ST on the CV moderated by residence. Consequently, it was concluded that the place of residence is a moderator between ST and CV. In the other results, no significance appeared. Based on the empirical test, the confirmed conceptual model is based on assessing the structural model for cyberstalking victimization, as illustrated in Figure 8.
As can be seen in Figure 8, the coefficient of determination (R2) for this model is 0.782, which means that the proximity of motivated offenders, a suitable target, and digital guardianship variables influence 78.2% of the variance in the cyberstalking victimization variable, which indicates a substantial range, indicating that these three variables can be explained or caused by 78.2% of the variance in the cyberstalking victimization variable. Since the R2 value was between 0 to 1, and the higher the value, the better the fit, it is confirmed that the combined effects of these three exogenous variables were substantial and fitted the endogenous variable.
Concerning R2 value, and moving on to test the effect size (f2) of proximity to motivated offenders, a suitable target and digital guardianship on the dependent variable cyberstalking victimization, the results show that the proximity to motivated offenders variable had an impact with a small effect on cyberstalking victimization (f2 = 0.078), the suitable target had an impact with a minimal effect (f2 = 0.009) and digital guardianship also exhibited a minimal effect (f2 = 0.101) on the cyberstalking victimization variable. These results indicated that the effects of the variables PTMO, ST, and DG on cyberstalking victimization have a substantial impact by combining, and there was no effect size for a particular variable separately on cyberstalking victimization, which means that the integration between the combined independent variables and the dependent variable was high and the model fits. The evaluation of the magnitude of the R2 values as a criterion of predictive accuracy was done by using the predictive relevance (Q2). The results show that the Q2 value for this model is 0.4267, reflecting an excellent predictive relevance for cyberstalking victimization. This means that the proximity to motivated offenders, a suitable target, and digital guardianship constructs together predict the cyberstalking victimization construct. After that, the effect size of predictive relevance (q2) was assessed; the results show that none of the independent constructs significantly affect the cyberstalking victimization construct. Proximity to motivated offenders, a suitable target, and digital guardianship show a small effect with values of 0.014, 0.0004, and 0.018, respectively, indicating that the confirmation of the integrated model constructs together shows an excellent predictive relevance and better than predictive relevance for a single construct (0.4267 for the combination >0.014, 0.0004 and 0.018).
Hypotheses testing results exhibited five significant relationships. Although the significant relationships appeared in H1, H2, H3, H7b, and H5c, four of them were significant with the expected direction sign, and one of them was significant but with the other direction. For H1, the proximity to motivated offenders shows a significant positive effect on cyberstalking victimization (t-value = 5.8085 ***). The result matched the expectation that the more proximate/exposed to motivated offenders through lifestyle exposure online activities—chatting/instant messenger (text), chatting/instant messenger (voice), playing games, reading newspapers/magazines, sending/receiving emails, social networking sites, visiting religious websites, watching/downloading videos, listening to/downloading music and adding strangers on SNW/IM)—the greater the probability of experiencing cyberstalking victimization. It is not surprising that engaging in these online activities will frequently lead to becoming a victim of cyberstalking victimization.
The results were consistent with previous studies in terms of proximity/exposure to motivated offenders through online activities, and the variation of items could be the result of different methods of operationalization of the constructs. However, at least one item was consistent with the previous studies in the current study: for example, Marcum [159] found that increased exposure to motivated offenders has a sizable impact on the likelihood of victimization. Welsh and Lavoie [158] found that the frequency of 17 online activities was significantly associated with cyberstalking. Choi [217] found that engaging in online activities through risky activities (websites, downloading free games, music, and movies) and vocational and leisure activities (IM, shopping, watching newspapers) was positively significantly associated with victimization. Phillips [93] also found that risky activities through online SNS activity and risky leisure and vocational activities were positively associated with victimization. Reyns et al. [82] found that one item significantly related to victimization was online proximity, which allowed strangers to access personal online information about their victims. In addition, Back [77] found that active engagement in vocational and leisure activities on SNSs by adding unknown friends (strangers) significantly increased victimization. Holt and Bossler [156] found that spending more time on specific online activities (chatrooms, IRC/IM) increased the odds of being harassed, whereas Ngo and Paternoster [160] found that only IM was significant in terms of non-stranger harassment. Leukfeldt and Yar [162] investigated email, MSN, and Skype regarding online visibility and found that these forms of communication increased the risk of victimization. Yucedal [37] found that online leisure activities significantly affect victimization (spyware and Ad-Aware). Marcum et al. [161] and Bossler et al. [157] found a significant relationship between online activities and victimization. The former found that hours per week spent online (email, IM, SNW, and chatrooms) were significantly associated with victimization; the latter researcher found that the average hours per day spent online on social networking sites increased the odds of victimization. Thus, our findings reflected the findings of previous studies that engaging in online activities will increase the probability of experiencing online victimization, with variations in the results of different methods of operationalization of specific online activities that the researchers included in their studies.
Regarding H2, which was that a suitable target has a significant positive effect on cyberstalking victimization, the results show a conformation for this hypothesis (t-value = 1.9423 *). The results matched with the expectation that students who frequently exhibited their personal information, including age, email address, gender, name, photos, videos, bank account number, home address, mobile phone number, increased the attractiveness as victims, supported the expectation that the motivated offenders and their increased exposure made them a cyberstalking victim. The results showed a mixed reflection matching with the previous studies. The result findings are consistent with those of Marcum et al. [161], Reyns et al. [82], and Marcum [159]. In his study, Marcum [159] found that personal information posted on social networking sites and personal information given to people online has a significant positive effect on victimization. Out of nine predictors, Reyns et al. [82] found that only two items were associated with online victimization, which was, firstly, that a student who showed his gender and relationship status frequently was associated significantly with cyberstalking victimization. Marcum et al. [161] also found in their results on exhibited personal information that communication with strangers, and types of personal information given to people, are significantly associated with online victimization.
In contrast to previous studies, in terms of significance [93,156,159,161,162], none found a significant effect between capable guardianship and online victimization. In contrast, Reyns et al. [82] found that one measure (online profile tracker), designed to monitor social network activities, had a significant relationship with cyberstalking victimization. In contrast to previous studies, in terms of direction [77,217], in his study, Choi [217] found that the number of computer security programs and duration were negatively significantly associated with victimization. Back [77] also found that the cyber security settings on SNSs and security applications reduced cyberharassment victimization. In line with previous studies, the test of the demographic variables shows mixed results. Five moderators tested the relationship between independent factors and cyberstalking victimization, and the results showed that H4, H5a, H5b, H6, H7a and H7c, and H8 were not whereas H5c and H7b were accepted.
H4 tests the moderating effect of gender between L-RAT factors (PTMO, SU, DG) and cyberstalking victimization. The t-value for the path coefficient differences shows 0.695, 1.002, and 0.459 for proximity to motivated offenders, a suitable target and digital guardianship, respectively (Ivs) on cyberstalking (Dv), indicating that there is no significant effect of gender between L-RAT factors and cyberstalking victimization, reflecting that gender is not a moderator for this model. The result is consistent with the previous studies of Ngo and Paternoster [160], Back [77], Yucedal [37] and Leukfeldt and Yar [162], and not with those of Reyns [36], Choi [217], Paullet [47], Alshalan [168] and Curtis [46]. The results of the previous studies depended on the operationalization of the constructs: for example, Paullet [47] found that gender was significant in reporting cyberstalking cases, and Curtis [46] found that gender plays a significant role in cyberstalking preparation.
H5 was tested, and the results show that age showed a moderate effect between digital guardianship and cyberstalking victimization (H5c) with a t-value = 1.837 *, with an insignificant effect for the other factors PTMO and SU (H5a and H5b). Therefore, it can be concluded that age is a moderator between digital guardianship and cyberstalking victimization. The result is consistent with the previous studies of Leukfeldt and Yar [162], Ngo and Paternoster [160], and Choi [217] and inconsistent with those of Holt and Bossler [156], Back [77], Yucedal [37], and Paullet [47]. Thus, H5 was accepted in terms of digital guardianship (H7c).
H6 and H8 concern Internet speed (average speed vs. high speed) and nationality (local vs. foreigner) as moderators between L-RAT factors and cyberstalking victimization. The results did not show any significant differences, so H6 and H8 were not accepted. Similiarly for H4, internet speed, and nationality were assumed as not moderators for the study’s conceptual model. Although previous studies employed the frequency of Internet use and its effect on victimization, Holt, and Bossler [156] did not find any statistically significant effect between Internet speed and online victimization, consistent with the current study. H7 was tested, and the results show that place of residence (city vs. others) has a significant effect of the suitable target on cyberstalking victimization moderated by place of residence (t-value = 1.732 *), with an insignificant effect for others (PTMO, DG) on cyberstalking victimization. This indicates that H7 was accepted in terms of the suitable target (H7b).

8. Conclusions and Discussion

The main aim of this study was to investigate cyberstalking victimization among college students in Jordan. To achieve this objective, firstly, the prevalence of cyberstalking victimization was estimated (objective 1). Secondly, the relationship between lifestyle routine activities theories and cyberstalking victimization constructs was examined (objective 2). Thirdly, the demographic variables associated with the experience of cyberstalking victimization were determined (objective 3). Finally, a conceptual model for cyberstalking victimization was developed and validated (objective 4).
To achieve the first objective of this study, which was to estimate the prevalence of cyberstalking victimization among college students, a systematic literature review was conducted using 14 online databases about the definition of cyberstalking. The definition was essential in order to operationalize the cyberstalking victimization construct through measures that will be used later to measure the cyberstalking victimization percentages through its types and lastly estimate the cyberstalking victimization and achieve this objective through 14 online databases, which were Science Direct, Scopus, Wiley Online Library, Springer, IEEE, ACM Digital Library, Emerald, Sage Journals, JSTOR, Cambridge Journals, Engineering, and Applied Science, ISI Web of Science, Oxford Journals, and Taylor and Francis Online, along with 46 extra materials. A total of 1179 materials were imported from Mendeley software after deleting duplicated materials. In phase II, NVivo data analysis software was used to organize and prepare the data for analysis by employing inclusion and exclusion criteria to choose the materials. Actual data coding was used in phase III to send the data about the prevalence of cyberstalking and create a cyberstalking prevalence node; then, among 24 materials that successfully matched the inclusion and exclusion criteria, the researcher filtered the measures operationalized the cyberstalking victimization construct. After that, the researcher adapted these measures to create the cyberstalking victimization constant. Next, the questionnaire was distributed to the local and overseas panel of experts as a validation procedure. Finally, by analyzing the results obtained from the respondents, the findings showed that the prevalence of cyberstalking victimization was between 39.92% and 66.76% depending on the cyberstalking behavior type. The findings showed a prevalence of 66.76%, 39.92%, 64.64%, 60.00%, 57.20%, 61.30%, 64.84%, and 49.18% for harassment and annoyance, posted false information, sent sexual material, pretended to be a victim, attempted to disable your computer, monitored your profile, sent the threatening letter or message to the victim’s email, wrote threatening/offensive comments to the victim in chat rooms/instant messaging sites, respectively. The findings were consistent with previous studies and came within the range of 0.02% for Jerin and Dolinsky [218] to 82% for Bocij [18].
To address the second research objective of the study and examine the relationships between (L-RAT) and cyberstalking victimization, the same procedure for the first objective was carried out. A systematic literature review was conducted to extract the empirical studies for cyberstalking victimization, and only 12 studies matched the inclusion and exclusion criteria. The constructs under the (L-RAT) perspective with their measures were adapted to propose a conceptual model. As deductive research, this study identified a theoretical model to be a compass to examine the influencing factors and their relationships between L-RAT and cyberstalking victimization. After that, the model constructs and measures were given to the experts to validate them; then, model quality assessment was conducted by assessing the outer and inner models respectively using structural equation modeling (SEM) to validate the proposed model that has been created. Accordingly, and after refining the model, the hypotheses that were developed for testing the influencing factors of L-RAT) on cyberstalking victimization, and the examined relationships were tested. The results showed that all the factors for L-RAT (proximity to motivated offenders, suitable targets, and digital guardianship) had a significant positive relationship with cyberstalking victimization. The first two factors (PTMO, ST) were consistent with the expectation, whereas digital guardianship was contrary to the expectation.
To achieve the third objective of this study, which was to determine the demographic variables that are moderate and associated with the experience of cyberstalking victimization, five variables were proposed to have a moderating effect on the relations between the constructs and cyberstalking victimization. The results showed that gender, nationality, and Internet connection speed did not significantly affect, whereas age showed a significant moderating effect between digital guardianship and cyberstalking victimization. The last moderator, who was a place of residence, showed a significant moderating effect between suitable target and cyberstalking victimization.
Finally, based on the detailed analysis for measurement and structural models, including hypotheses testing results that exhibited five significant relationships and after achieving the second and third objectives, the confirmed conceptual model for cyberstalking victimization was presented. Therefore, the fourth objective was achieved.
Several contributions have been made by achieving the objectives. The primary outcome of this study, which is a conceptual model for cyberstalking victimization, also has significant theoretical and practical implications. This research contributes to the body of knowledge by fulfilling the dire local (Jordan) need and developing the international perspective on cyberstalking victimization research. These contributions are:
i.
Due to the following reasons, scientific evidence for the use of victimization and criminal opportunity explanations to account for cyberstalking victimization has been insufficient and contradictory to date:
  • The available studies on cyberstalking victimization have focused on the primary effect modeling without attention to any possible contextual effect.
  • The measurement used in the literature studies for the primary theoretical constructs (proximity/exposure to the motivated offender, a suitable target, and digital guardianship) may not have been appropriately operationalized, and depending on a single definition for the key theoretical concept [96], the current study operationalized the vital theoretical concepts systematically with their indicators depending on the systematic literature review on definitions and factors for cyberstalking victimization, which is assumed to be the first systematic literature review of cyberstalking victimization in the research.
This study contributes to the body of knowledge by expanding the importance of the L-RAT perspective for understanding victimization in the virtual world by testing the utility of L-RAT in cyberstalking victimization, which has been tested extensively in the traditional world. This study contributes to knowledge by shifting from the dominant focus on testing and studying stalking victimization to cyberstalking victimization. Based on the results, this study provides strong support for the applicability of the assumptions of L-RAT theory to cyberstalking victimization regarding PTMO and ST and partial support regarding digital guardianship. This study integrated routine activities theory and lifestyle exposure theory to become a power tester for cyberstalking victimization and other online victimization. The empirical investigation of the factors influencing cyberstalking victimization conduct keeping in view regarding the Jordan case.

8.1. Practical Implications

Cyberstalking is a relatively new phenomenon, and the scarce literature on this topic makes the investigation essentially an icebreaker in terms of the challenges, while assisting in giving a voice to the victims of cyberstalking. This study concluded that students who spend more time doing specific activities online would experience cyberstalking victimization. Further, students who appear to be suitable for targeting online by showing themselves to be attractive by exhibiting personal info will experience cyberstalking victimization. However, encouraging students to reduce their Internet usage is impossible, as Internet use is often necessary for many aspects of life. Therefore, it is fruitful to develop a model that can enhance awareness and improve cyberstalking victimization by determining the factors that influence it.
This study has developed and validated a conceptual model for cyberstalking victimization. It provides empirical evidence regarding what factors influence cyberstalking victimization, which can help the executive, legislative and judicial authorities, citizens, lawmakers, and others to make an accurate assessment of this phenomenon. This study has made two practical contributions:
i.
A conceptual model for cyberstalking victimization that can be utilized to minimize the cyberstalking experienced by implementing it in society and providing research directions that will help us better understand the causes of this new phenomenon and what to do about it.
ii.
This study has produced a validated questionnaire about cyberstalking victimization that can be used as an instrument tool by any institution in any society to uncover the prevalence and nature of the cyberstalking victimization phenomenon to contribute to its protective application. In conclusion, this study provides a comprehensive analysis of the factors and relationships that influence cyberstalking victimization and tests the moderator effect between these factors and cyberstalking victimization.

8.2. Limitations and Future Research Suggestions

Although the investigation supports the notion that cyberstalking is a problem among college students, as much research, the current study is not without its shortcomings. There are a few flaws in the analysis that will need to be fixed in subsequent studies.
The first drawback concerns conceptual analyses of cyberstalking and cyberharassment, which are difficult to compare owing to a lack of conceptual consistency and inconsistencies in word meanings. Therefore, a consistent concept of cyberstalking is required. Further analysis can be conducted using qualitative and quantitative approaches to understand further the phenomena and circumstances of cyberstalking and analyze the experiences of those subjected to these behaviors. The second drawback is the distinction between conventional and cyberstalking. Unfortunately, the current study did not look at the relationship between stalking and cyberstalking, so further analysis must figure out the differences and parallels. The third limitation is the research design for this study, which was cross-sectional. This introduced complications related to time ordering factors, on digital guardianship to resolve the time order issue, and future research should adopt a longitudinal design. The fourth limitation is related to the sample derived from a single student college in Jordan; this does not devalue our findings, but it is recommended that replication is necessary to represent other population units to improve the generalizability of the findings. The present analysis did not look at whether victims of bullying did not disclose the incidents; this fifth weakness should be addressed in future studies. Lastly, the current study was interested in one type of cybercrime, which was “cyberstalking.” Future research is needed to assess the applicability of L-RAT to different types of cybercrime.

Author Contributions

W.A.-U.: conceptualization, supervision, methodology, formal analysis, resources, data curation, writing—original draft preparation. M.A.: conceptualization, supervision, writing—review and editing, project administration, funding acquisition. L.A.: conceptualization, writing–review and editing, supervision. A.A.A.: conceptualization, writing—review and editing, supervision. P.S.: conceptualization, writing—review and editing. A.H.G.: conceptualization, writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Funding

This study was financially supported via a funding grant by Deanship of Scientific Research, Taif University Researchers Supporting Project number. TURSP-2020/300), Taif University, Taif, Saudi Arabia).

Acknowledgments

This study was financially supported via a funding grant by Deanship of Scientific Research, Taif University Researchers Supporting Project number. TURSP-2020/300, Taif University, Taif, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Stats, I.W. World Internet Usage and Population Statistics 2021 Year-Q1 Estimates. Available online: https://www.internetworldstats.com/stats.htm (accessed on 31 March 2021).
  2. Breslin, P. An Investigation into the Problem of Cyberstalking in Ireland and an Examination of the Usefulness of Classifying Cyberstalking as an Addictive Disorder; Dublin Business School: Dublin, Ireland, 2010. [Google Scholar]
  3. Batra, S.; Sachdeva, S. Organizing Standardized Electronic Healthcare Records Data for Mining. Health Policy Technol. 2016, 5, 226–242. [Google Scholar] [CrossRef]
  4. Broadhurst, R.; Grabosky, P.; Alazab, M.; Bouhours, B.; Chon, S. An analysis of the nature of groups engaged in cyber crime. Int. J. Cyber Criminol. 2014, 8, 1–20. [Google Scholar]
  5. Chouhan, R. Cyber crimes: Evolution, detection and future challenges. IUP J. Inf. Technol. 2014, 10, 48. [Google Scholar]
  6. Cox, C. Protecting victims of cyberstalking, cyberharassment, and online impersonation through prosecutions and effective laws. Jurimetrics 2014, 54, 277–302. [Google Scholar]
  7. Harwood, M. Security Strategies in Web Applications and Social Networking; Jones & Bartlett Publishers: Burlington, MA, USA, 2010. [Google Scholar]
  8. Hensler-McGinnis, N.F. Cyberstalking Victimization: Impact and Coping Responses in a National University Sample; University of Maryland: College Park, MD, USA, 2008. [Google Scholar]
  9. Ladan, M.J. Overview of the 2015 Legal and Policy Strategy on Cybercrime and Cybersecurity in Nigeria. SSRN Electron. J. 2015. [Google Scholar] [CrossRef]
  10. Mahadevan, P. A Social Anthropology of Cybercrime, The Digitization of India’s Economic Periphery. 2020. Available online: https://globalinitiative.net/analysis/cybercrime-india/ (accessed on 31 March 2021).
  11. Schell, B.J. Internet Addiction and Cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Springer: Berlin/Heidelberg, Germany, 2020; pp. 679–703. [Google Scholar]
  12. Seijen, S. Risk Perception towards Cybercrime among Students in the Netherlands: The Effect of Multiple Factors on Risk Perception; University of Twente: Enschede, The Netherlands, 2021. [Google Scholar]
  13. Sissing, S.K. A Criminological Exploration of Cyber Stalking in South Africa; University of South Africa: Pretoria, South Africa, 2013. [Google Scholar]
  14. Wall, D.S. The Internet as a conduit for criminal activity. Information Technology and the Criminal Justice System; Pattavina, A., Ed.; Sage Publications, Inc.: Newbury Park, CA, USA, 2015; pp. 77–98. [Google Scholar]
  15. Johnson, L. Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response; Elsevier: Amsterdam, The Netherlands, 2013. [Google Scholar]
  16. Basu, S. Jones, Law, and Technology. Regul. Cyberstalking 2007, 2, 1–30. [Google Scholar]
  17. Bocij, P.; Griffiths, M.; McFarlane, L. Cyberstalking: A new challenge for criminal law. Crim. Lawyer 2002, 122, 3–5. [Google Scholar]
  18. Bocij, P. Victims of cyberstalking: An exploratory study of harassment perpetrated via the Internet. First Monday 2002, 8. [Google Scholar] [CrossRef]
  19. Dhillon, G.; Smith, K.J. Defining objectives for preventing cyberstalking. J. Bus. Ethics 2019, 157, 137–158. [Google Scholar] [CrossRef]
  20. Dreßing, H. Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychol. Behav. Soc. Netw. 2014, 17, 61–67. [Google Scholar] [CrossRef] [Green Version]
  21. Dreßing, H.; Klein, U.; Bailer, J.; Gass, P.; Gallas, C. Cyberstalking. Nervenarzt 2009, 80, 833–836. [Google Scholar] [CrossRef] [PubMed]
  22. Easttom, C.; Taylor, J.; Hurley, H. Computer Crime, Investigation, and the Law; Course Technology: Boston, MA, USA, 2011. [Google Scholar]
  23. Fukuchi, A. A balance of convenience: The use of burden-shifting devices in criminal cyberharassment law. BCL Rev. 2011, 52, 289. [Google Scholar]
  24. Heinrich, P.A. Generation iStalk: An Examination of the Prior Relationship between Victims of Stalking and Offenders; Theses, Dissertations and Capstones; Marshall University: Huntington, WV, USA, 2015. [Google Scholar]
  25. Henson, B. Fear of Crime Online: Examining the Effects of Online Victimization and Perceived Risk on Fear of Cyberstalking Victimization; University of Cincinnati: Cincinnati, OH, USA, 2011. [Google Scholar]
  26. Henson, B.; Reyns, B.; Fisher, B. Internet crime. In Key Issues in Crime and Punishment: Crime and Criminal Behavior; Chambliss, W., Ed.; SAGE Publications: Thousand Oaks, CA, USA, 2011. [Google Scholar]
  27. Leong, N.; Morando, J.J. Communication in cyberspace. NCL Rev. 2015, 94, 105. [Google Scholar]
  28. Yang, Y.; Lutes, J.; Li, F.; Luo, B.; Liu, P. Stalking online: On user privacy in social networks. In Proceedings of the Second ACM Conference on Data and Application Security and Privacy, New York, NY, USA, 7–9 February 2012. [Google Scholar]
  29. Lowry, P.B. Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning. In Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, 15–18 December 2013. [Google Scholar]
  30. Maple, C.; Short, E.; Brown, A. Cyberstalking in the United Kingdom: An Analysis of the ECHO Pilot Survey; University of Bedfordshire: Luton, UK, 2011. [Google Scholar]
  31. Mullen, P.E.; Pathé, M.; Purcell, R. Stalkers and their Victims; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar]
  32. Nobles, M.R.; Reyns, B.W.; Fox, K.A.; Fisher, B.S. Protection against pursuit: A conceptual and empirical comparison of cyberstalking and stalking victimization among a national sample. Justice Q. 2014, 31, 986–1014. [Google Scholar] [CrossRef]
  33. Payne, B.K. Defining Cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Springer: Cham, Switzerland, 2020; pp. 3–25. [Google Scholar]
  34. Petrocelli, J.J.L.; Deerfield, O.-W.T. Cyberstalking Presenting a new challenge to law enforcement, cyberstalking occurs when electronic technology is utilized to create a criminal level of intimidation, harassment, or fear. Law Order 2005, 53, 56. [Google Scholar]
  35. Spitzberg, B.H.; Hoobler, G. Cyberstalking and the technologies of interpersonal terrorism. New Media Soc. 2002, 4, 71–92. [Google Scholar] [CrossRef]
  36. Reyns, B.W. A Situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prev. Commun. Safety 2010, 12, 99–118. [Google Scholar] [CrossRef]
  37. Yucedal, B. Victimization in Cyberspace: An Application of Routine Activity and Lifestyle Exposure Theories; Kent State University: Kent, OH, USA, 2010. [Google Scholar]
  38. Shorey, R.C.; Cornelius, T.L.; Strauss, C. Stalking in college student dating relationships: A descriptive investigation. J. Fam. Violence 2015, 30, 935–942. [Google Scholar] [CrossRef]
  39. Elizondo, P.; McNiel, D.E.; Binder, R. A Review of Statutes and the Role of the Forensic Psychiatrist in Cyberstalking Involving Youth. J. Am. Acad. Psychiatry Law 2019, 47, 198–207. [Google Scholar]
  40. Jaishankar, K.; Sankary, V. Cyber Stalking: A Global Menace in the Information Super Highway. ERCES Online Q. Rev. 2005, 2. [Google Scholar]
  41. Kaplan, B. Evaluating Health Care Information Systems: Methods and Applications; SAGE Publications, Inc.: Newbury Park, CA, USA, 1994. [Google Scholar]
  42. Kethineni, S. Cybercrime in India: Laws, Regulations, and Enforcement Mechanisms. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Springer: Cham, Switzerland, 2020; pp. 305–326. [Google Scholar]
  43. Vasiu, I.; Vasiu, L. Cyberstalking Nature and response recommendations. Acad. J. Interdiscip. Stud. 2013, 2, 229. [Google Scholar] [CrossRef] [Green Version]
  44. Reyns, B.W.; Henson, B.; Fisher, B. Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behav. 2012, 33, 1–25. [Google Scholar] [CrossRef]
  45. Cuenca-Piqueras, C.; Fernández-Prados, J.S.; González-Moreno, M.J. Face-to-face versus online harassment of European women: Importance of date and place of birth. Sex. Cult. 2020, 24, 157–173. [Google Scholar] [CrossRef]
  46. Curtis, L.F. Virtual vs. Reality: An Examination of the Nature of Stalking and Cyberstalking; Citeseer: 2012. Available online: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.467.5711&rep=rep1&type=pdf (accessed on 31 March 2021).
  47. Paullet, K.L. An Exploratory Study of Cyberstalking: Students and Law Enforcement in Allegheny County, Pennsylvania; Robert Morris University: Moon Twp, PA, USA, 2009. [Google Scholar]
  48. Gialopsos, B.M.; Carter, J.W. Offender searches and crime events. J. Contemp. Crim. Justice 2015, 31, 53–70. [Google Scholar] [CrossRef]
  49. Stansberry, K.; Anderson, J.; Rainie, L. Experts Optimistic About the Next 50 Years of Digital Life. 2019. Available online: https://www.newswise.com/articles/experts-optimistic-about-the-next-50-years-of-digital-life (accessed on 31 March 2021).
  50. Gálik, S.; Galikova Tolnaiova, S. Cyberspace as a new existential dimension of man. In Cyberspace; Intech Open: London, UK, 2020; pp. 13–25. [Google Scholar]
  51. Jahankhani, H.; Al-Nemrat, A.; Hosseinian-Far, A. Cybercrime classification and characteristics. In Cyber Crime and Cyber Terrorism Investigator’s Handbook; Elsevier: Amsterdam, The Netherlands, 2014; pp. 149–164. [Google Scholar]
  52. Tolnaiová, S.G.; Gálik, S. Cyberspace as a New Living World and Its Axiological Contexts. In Cyberspace; IntechOpen: London, UK, 2020. [Google Scholar]
  53. Malby, S.; Jesrani, T.; Bañuelos, T.; Holterhof, A.; Hahn, M. Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children; United Nations Office on Drugs and Crime: Vienna, Austria, 2015. [Google Scholar]
  54. Miller, J.J. Individual offending, routine activities, and activity settings: Revisiting the routine activity theory of general deviance. J. Res. Crime Delinq. 2013, 50, 390–416. [Google Scholar] [CrossRef]
  55. Begotti, T.; Acquadro Maran, D. Characteristics of cyberstalking behavior, consequences, and coping strategies: A cross-sectional study in a sample of Italian university students. Future Internet 2019, 11, 120. [Google Scholar] [CrossRef] [Green Version]
  56. Grunin, L.; Yu, G.; Cohen, S. The Relationship Between Youth Cyberbullying Behaviors and Their Perceptions of Parental Emotional Support. Int. J. Bullying Prev. 2020. [Google Scholar] [CrossRef]
  57. McLoughlin, L. Understanding and measuring coping with cyberbullying in adolescents: Exploratory factor analysis of the brief coping orientation to problems experienced inventory. Curr. Psychol. 2019. [Google Scholar] [CrossRef]
  58. Pittaro, M.L. Cyber stalking: An analysis of online harassment and intimidation. Int. J. Cyber Criminol. 2007, 1, 180–197. [Google Scholar]
  59. Shimizu, A. Domestic violence in the digital age: Towards the creation of a comprehensive cyberstalking statute. Berkeley J. Gend. Law Just. 2013, 28, 116. [Google Scholar]
  60. Gnasigamoney, S.S.; Sidhu, M.S. E-behaviour trends and patterns among Malaysian pre-adolescents and adolescents. Int. J. Digit. Crime Forensics 2013, 5, 50–62. [Google Scholar] [CrossRef] [Green Version]
  61. Basu, S. Stalking the Stranger in Web 2.0: A Contemporary Regulatory Analysis. Eur. J. Law Technol. 2012, 3. [Google Scholar]
  62. Meloy, J.R. Stalking: The State of the Science. Crim. Behav. Ment. Health 2007, 17, 1–7. [Google Scholar] [CrossRef]
  63. Huffman, J.; Overton, A. Missing the Mark: The Neglect of Stalking and Cyberstalking in Introductory Criminology Textbooks. J. Crim. Justice Educ. 2013, 24, 200–217. [Google Scholar] [CrossRef]
  64. Reyns, B.W. Being Pursued Online: Extent and Nature of Cyberstalking Victimization from a Lifestyle/Routine Activities Perspective; University of Cincinnati: Cincinnati, OH, USA, 2010. [Google Scholar]
  65. Bossler, A.M.; Holt, D.J. On-line activities, guardianship, and malware infection: An examination of routine activities theory. Int. J. Cyber Criminol. 2009, 3, 400–420. [Google Scholar]
  66. Holt, T.J.; Bossler, A.M. An Assessment of the Current State of Cybercrime Scholarship. Deviant Behav. 2014, 35, 20–40. [Google Scholar] [CrossRef]
  67. Kirwan, G. The Psychology of Cyber Crime: Concepts and Principles: Concepts and Principles; IGI Global: Hershey, PA, USA, 2011. [Google Scholar]
  68. Maple, C.; Wrixon, K. The Rise of Cyberstalking. In Encyclopedia of Information Science and Technology, 3rd ed.; IGI Global: Hershey, PA, USA, 2015; pp. 6801–6809. [Google Scholar]
  69. Mishra, A.; Mishra, D. Cyber stalking: A challenge for web Security. Cyber Warf. Cyber Terror. 2007, 216–226. [Google Scholar] [CrossRef]
  70. Ogilvie, E. Cyberstalking. Trends Issues Crime Crim. Justice 2000, 166, 1–6. [Google Scholar]
  71. Sheridan, L.P.; Grant, T. Is cyberstalking different? Psychol. Crime Law 2007, 13, 627–640. [Google Scholar] [CrossRef]
  72. Van De Sandt, E. Deviant Security: The Technical Computer Security Practices of Cyber Criminals; University of Bristol: Bristol, UK, 2019. [Google Scholar]
  73. Alshuaibi, A.S.; Mohd Shamsudin, F.; Alshuaibi, M.S.I. Internet misuse at work in Jordan: Challenges and implications. In Proceedings of the 3rd Convention of the World Association of Business Schools (WAiBS), Kuala Lumpur, Malaysia, 22 November 2015. [Google Scholar]
  74. (TRC), J.T.R.C. Annual Report of 2015. 2015. Available online: https://www.cbsl.gov.lk/en/publications/economic-and-financial-reports/annual-reports/annual-report-2015 (accessed on 31 March 2021).
  75. Faqir, R.S. Cyber Crimes in Jordan: A Legal Assessment on the Effectiveness of Information System Crimes Law No (30) of 2010. Int. J. Cyber Criminol. 2013, 7, 81–90. [Google Scholar]
  76. Piotrowski, C.; Lathrop, P.J. Cyberstalking and college-age students: A bibliometric analysis across scholarly databases. Coll. Stud. J. 2012, 46, 533–536. [Google Scholar]
  77. Back, S. Empirical Assessment of Cyber Harassment Victimization via Cyber-Routine Activities Theory. Master’s Theses, Ball State University, Muncie, IN, USA, 2016. [Google Scholar]
  78. DeTardo-Bora, K.A.; Bora, D.J. Cybercrimes: An overview of contemporary challenges and impending threats. Digit. Forensics 2016, 119–132. [Google Scholar] [CrossRef]
  79. Reyns, B.W. A routine activity perspective on online victimisation: Results from the Canadian General Social Survey. J. Financ. Crime 2015. [Google Scholar] [CrossRef]
  80. Finn, J. A Survey of Online Harassment at a University Campus. J. Interpers. Violence 2004, 19, 468–483. [Google Scholar] [CrossRef]
  81. Parsons-Pollard, N.; Moriarty, L.J. Cyberstalking: Utilizing what we do know. Vict. Offenders 2009, 4, 435–441. [Google Scholar] [CrossRef]
  82. Reyns, B.W.; Henson, B.; Fisher, B.S. Being pursued online: Applying cyberlifestyle–routine activities theory to cyberstalking victimization. Crim. Justice Behav. 2011, 38, 1149–1169. [Google Scholar] [CrossRef]
  83. Reyns, B.W.; Henson, B. The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with routine activity theory. Int. J. offender Ther. Comp. Criminol. 2016, 60, 1119–1139. [Google Scholar] [CrossRef]
  84. Roberts, L. Jurisdictional and definitional concerns with computer-mediated Interpersonal crimes: An Analysis on Cyber Stalking. Int. J. Cyber Criminol. 2008, 2, 271–285. [Google Scholar]
  85. Henson, B.; Reyns, B.W.; Fisher, B.S. Does gender matter in the virtual world? Examining the effect of gender on the link between online social network activity, security and interpersonal victimization. Secur. J. 2013, 26, 315–330. [Google Scholar] [CrossRef]
  86. Henson, B.; Reyns, B.W.; Fisher, B.S. Cybercrime victimization. In The Wiley Handbook on the Psychology of Violence; Wily: Hoboken, NJ, USA, 2016; pp. 553–570. [Google Scholar] [CrossRef]
  87. Moriarty, L.J.; Freiberger, K. Cyberstalking: Utilizing newspaper accounts to establish victimization patterns. Vict. Offenders 2008, 3, 131–141. [Google Scholar] [CrossRef]
  88. Reyns, B.W.; Henson, B.; Fisher, B.S. Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. J. Contemp. Crim. Justice 2016, 32, 148–168. [Google Scholar] [CrossRef]
  89. Methe, T.D.; Meier, R.F. Opportunity, Choice, and Criminal Victimization: A Test of a Theoretical Model. J. Res. Crime Delinq. 1990, 27, 243–266. [Google Scholar] [CrossRef]
  90. Cohen, L.E.; Felson, M. Social Change and Crime Rate Trends: A Routine Activity Approach. Am. Sociol. Rev. 1979, 44, 588. [Google Scholar] [CrossRef]
  91. Hindelang, M.J.; Gottfredson, M.R.; Garofalo, J. Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization; Ballinger: Cambridge, MA, USA, 1978. [Google Scholar]
  92. Cohen, L.E.; Kluegel, J.R.; Land, K.C. Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory. Am. Sociol. Rev. 1981, 46, 505. [Google Scholar] [CrossRef]
  93. Phillips, E. Empirical Assessment of Lifestyle-Routine Activity and Social Learning Theory on Cybercrime Offending. Master’s Theses, Ball State University, Muncie, IN, USA, 2015. [Google Scholar]
  94. Choi, K.S. Computer crime victimization and integrated theory: An empirical assessment. Int. J. Cyber Criminol. 2008, 2, 308–333. [Google Scholar]
  95. Miethe, T.D.; Stafford, M.C.; Sloane, D. Lifestyle changes and risks of criminal victimization. J. Quant. Criminol. 1990, 6, 357–376. [Google Scholar] [CrossRef]
  96. Vakhitova, Z.I.; Reynald, D.; Townsley, M. Toward the Adaptation of Routine Activity and Lifestyle Exposure Theories to Account for Cyber Abuse Victimization. J. Contemp. Crim. Justice 2016, 32, 169–188. [Google Scholar] [CrossRef]
  97. FELSON, M. Linking Criminal Choices, Routine Activities, Informal Control, and Criminal Outcomes (1986). In Classics in Environmental Criminology; Routledge: London, UK, 2010; pp. 357–366. [Google Scholar]
  98. Safaldin, M.; Otair, M.; Abualigah, L. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient Intell. Hum. Comp. 2021, 12, 1559–1576. [Google Scholar] [CrossRef]
  99. McNeeley, S. Lifestyle-Routine Activities and Crime Events. J. Contemp. Crim. Justice 2015, 31, 30–52. [Google Scholar] [CrossRef]
  100. Fnkelhor, D.; Asdigian, N.L. Risk factors for youth victimization: Beyond a lifestyles/routine activities theory approach. Violence Vict. 1996, 11, 3–20. [Google Scholar] [CrossRef]
  101. Felson, M.; Clarke, R.V. Opportunity makes the thief. Police Res. Ser. Pap. 1998, 98, 10. [Google Scholar]
  102. Abualigah, L.; Diabat, A.; Abd Elaziz, M. Intelligent workflow scheduling for Big Data applications in IoT cloud computing environments. In Cluster Computing; Springer: Berlin/Heidelberg, Germany, 2021; pp. 1–20. [Google Scholar]
  103. Clarke, R.V.G.; Webb, B. Hot Products: Understanding, Anticipating and Reducing Demand for Stolen Goods; Great Britain Home Office: London, UK, 1999. [Google Scholar]
  104. Clarke, R.V.; Eck, J.E. Crime Analysis for Problem Solvers in 60 Small Steps; US Department of Justice, Office of Community Oriented Policing Services: Washington, DC, USA, 2005.
  105. Miethe, T.D.; Meier, R.F. Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations; Suny Press: New York, NY, USA, 1994. [Google Scholar]
  106. Fisher, B. The Sexual Victimization of College Women; US Department of Justice, Office of Justice Programs, National Institute of Justice: Washington, DC, USA, 2000.
  107. Tewksbury, R.; Mustaine, E.E. Routine Activities And Vandalism: A Theoretical And Empirical Study. J. Crime Justice 2000, 23, 81–110. [Google Scholar] [CrossRef]
  108. Chen, L.E.; Cantor, D. Residential Burglary in the United States: Life-Style and Demographic Factors Associated With the Probability of Victimization. J. Res. Crime Delinq. 1981, 18, 113–127. [Google Scholar] [CrossRef]
  109. Jensen, G.F.; Brownfield, D. Gender, Lifestyles, and Victimization: Beyond Routine Activity. Violence Vict. 1986, 1, 85–99. [Google Scholar] [CrossRef]
  110. Methe, T.D.; Stafford, M.C.; Long, J.S. Social Differentiation in Criminal Victimization: A Test of Routine Activities/Lifestyle Theories. Am. Sociol. Rev. 1987, 52, 184. [Google Scholar] [CrossRef]
  111. Sampson, R.J. Personal Violence by Strangers: An Extension and Test of the Opportunity Model of Predatory Victimization. J. Crim. Law Criminol. 1987, 78, 327. [Google Scholar] [CrossRef] [Green Version]
  112. Sampson, R.J.; Wooldredge, J.D. Linking the micro-and macro-level dimensions of lifestyle-routine activity and opportunity models of predatory victimization. J. Quant. Criminol. 1987, 3, 371–393. [Google Scholar] [CrossRef]
  113. Lasley, J.R. Drinking routines/lifestyles and predatory victimization: A causal analysis. Justice Q. 1989, 6, 529–542. [Google Scholar] [CrossRef]
  114. Kennedy, L.W.; Forde, D.R. Routine Activities and Crime: An Analysis of Victimization in Canada. Criminology 1990, 28, 137–152. [Google Scholar] [CrossRef]
  115. Sampson, R.J.; Lauritsen, J.L. Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence. J. Res. Crime Delinq. 1990, 27, 110–139. [Google Scholar] [CrossRef]
  116. Luritsen, J.L.; Sampson, R.J.; Laub, J.H. The link between offending and victimization among adolescents. Criminology 1991, 29, 265–292. [Google Scholar] [CrossRef]
  117. Lauritsen, J.L.; Laub, J.H.; Sampson, R.J. Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents. Violence Vict. 1992, 7, 91–108. [Google Scholar] [CrossRef] [PubMed]
  118. Wooldredge, J.D.; Cullen, F.T.; Latessa, E.J. Research note victimization in the workplace: A test of routine activities theory. Justice Q. 1992, 9, 325–335. [Google Scholar] [CrossRef]
  119. Miethe, T.D.; McDowall, D.J. Contextual effects in models of criminal victimization. Soc. Forces 1993, 71, 741–759. [Google Scholar] [CrossRef]
  120. Rountree, P.W.; Land, K.C.; Miethe, T.D. Macro-micro integration in the study of victimization: A hierarchical logistic model analysis across seattle neighborhoods. Criminology 1994, 32, 387–414. [Google Scholar] [CrossRef]
  121. Schwartz, M.D.; Pitts, V.L. Exploring a feminist routine activities approach to explaining sexual assault. Justice Q. 1995, 12, 9–31. [Google Scholar] [CrossRef]
  122. Fisher, B.S.; Sloan, J.; Cullen, F.T.; Lu, C. Crime in the ivory tower: The level and sources of student victimization. Criminology 1998, 36, 671–710. [Google Scholar] [CrossRef]
  123. Mustaine, E.E.; Tewksbury, R. Predicting Risks of Larceny theft victimization: A routine activity analysis using refined lifestyle measures. Criminology 1998, 36, 829–858. [Google Scholar] [CrossRef]
  124. Mustaine, E.E.; Tewksbury, R.J. A routine activity theory explanation for women’s stalking victimizations. Violence Women 1999, 5, 43–62. [Google Scholar] [CrossRef]
  125. Mustaine, E.E.; Tewksbury, R. Comparing the Lifestyles of Victims, Offenders, and Victim-Offenders: A Routine Activity Theory Assessment of Similarities and Differences for Criminal Incident Participants. Sociol. Focus 2000, 33, 339–362. [Google Scholar] [CrossRef]
  126. Wittebrood, K.; Nieuwbeerta, P. Criminal victimization during one’s life course: The effects of previous victimization and patterns of routine activities. J. Res. Crime Delinq. 2000, 37, 91–122. [Google Scholar] [CrossRef]
  127. Fisher, B.S.; Cullen, F.T.; Turner, M.G. Being pursued: Stalking victimization in a national study of college women. Criminol. Publ. Policy 2002, 1, 257–308. [Google Scholar] [CrossRef]
  128. Mustaine, E.E.; Tewksbury, R. Sexual Assault of College Women: A Feminist Interpretation of a Routine Activities Analysis. Crim. Justice Rev. 2002, 27, 89–123. [Google Scholar] [CrossRef]
  129. Schreck, C.; Wright, R.A.; Miller, J.M. A study of individual and situational antecedents of violent victimization. Justice Q. 2002, 19, 159–180. [Google Scholar] [CrossRef]
  130. Dugan, L.; Apel, R. An exploratory study of the violent victimization of women: Race/Ethnicity and situational context. Criminology 2003, 41, 959–980. [Google Scholar] [CrossRef]
  131. Schreck, C.; Miller, J.M.; Gibson, C.L. Trouble in the School Yard: A Study of the Risk Factors of Victimization at School. Crime Delinq. 2003, 49, 460–484. [Google Scholar] [CrossRef]
  132. Schreck, C.J.; Fisher, B.S. Specifying the influence of family and peers on violent victimization: Extending routine activities and lifestyles theories. J. Interpers. Violence 2004, 19, 1021–1041. [Google Scholar] [CrossRef] [PubMed]
  133. Tseloni, A.; Wittebrood, K.; Farrell, G.; Pease, K. Burglary Victimization in England and Wales, the United States and the Netherlands: A Cross-National Comparative Test of Routine Activities and Lifestyle Theories. Br. J. Criminol. 2004, 44, 66–91. [Google Scholar] [CrossRef]
  134. Schreck, C.J.; Stewart, E.A.; Fisher, B.S. Self-control, Victimization, and their Influence on Risky Lifestyles: A Longitudinal Analysis Using Panel Data. J. Quant. Criminol. 2006, 22, 319–340. [Google Scholar] [CrossRef]
  135. Wilcox, P.; Madensen, T.D.; Tillyer, M.S. Guardianship in Context: Implications for burglary victimization risk and prevention. Criminology 2007, 45, 771–803. [Google Scholar] [CrossRef]
  136. Messner, S.F.; Lu, Z.; Zhang, L.; Liu, J. Risks of Criminal Victimization in Contemporary Urban China: An Application of Lifestyle/Routine Activities Theory. Justice Q. 2007, 24, 496–522. [Google Scholar] [CrossRef]
  137. Taylor, T.J.; Peterson, D.; Esbensen, F.-A.; Freng, A. Gang Membership as a Risk Factor for Adolescent Violent Victimization. J. Res. Crime Delinq. 2007, 44, 351–380. [Google Scholar] [CrossRef]
  138. Taylor, T.J. Youth gang membership and serious violent victimization: The importance of lifestyles and routine activities. J. Interpers. Violence 2008, 23, 1441–1464. [Google Scholar] [CrossRef]
  139. Spano, R.; Freilich, J.D.; Bolland, J. Gang Membership, Gun Carrying, and Employment: Applying Routine Activities Theory to Explain Violent Victimization Among Inner City, Minority Youth Living in Extreme Poverty*. Justice Q. 2008, 25, 381–410. [Google Scholar] [CrossRef]
  140. Burrow, J.D.; Apel, R. Youth Behavior, School Structure, and Student Risk of Victimization. Justice Q. 2008, 25, 349–380. [Google Scholar] [CrossRef]
  141. Wilcox, P. Gendered opportunity? School-based adolescent victimization. J. Res. Crime Delinq. 2009, 46, 245–269. [Google Scholar] [CrossRef]
  142. Savolainen, J.; Sipilä, P.; Martikainen, P.; Anderson, A.L. Family, Community, and Lifestyle: Adolescent Victimization in Helsinki. Sociol. Q. 2009, 50, 715–738. [Google Scholar] [CrossRef]
  143. Reid, J.A.; Sullivan, C.J. A Latent Class Typology of Juvenile Victims and Exploration of Risk Factors and Outcomes of Victimization. Crim. Justice Behav. 2009, 36, 1001–1024. [Google Scholar] [CrossRef]
  144. Henson, B.; Wilcox, P.; Reyns, B.W.; Cullen, F.T. Gender, Adolescent Lifestyles, and Violent Victimization: Implications for Routine Activity Theory. Vict. Offenders 2010, 5, 303–328. [Google Scholar] [CrossRef]
  145. Fisher, B.S.; Daigle, L.E.; Cullen, F.T. What Distinguishes Single from Recurrent Sexual Victims? The Role of Lifestyle-Routine Activities and First-Incident Characteristics. Justice Q. 2010, 27, 102–129. [Google Scholar] [CrossRef]
  146. Tillyer, M.S.; Wilcox, P.; Gialopsos, B.M. Adolescent school-based sexual victimization: Exploring the role of opportunity in a gender-specific multilevel analysis. J. Crim. Justice 2010, 38, 1071–1081. [Google Scholar] [CrossRef]
  147. Sillyer, M.S.; Tillyer, R.; Miller, H.V.; Pangrac, R. Reexamining the Correlates of Adolescent Violent Victimization: The Importance of Exposure, Guardianship, and Target Characteristics. J. Interpers. Violence 2010, 26, 2908–2928. [Google Scholar] [CrossRef]
  148. Tillyer, M.S.; Fisher, B.S.; Wilcox, P.J. The effects of school crime prevention on students’ violent victimization, risk perception, and fear of crime: A multilevel opportunity perspective. Justice Q. 2011, 28, 249–277. [Google Scholar] [CrossRef]
  149. Peguero, A.A.; Popp, A.M.; Koo, D.J. Race, Ethnicity, and School-Based Adolescent Victimization. Crime Delinq. 2015, 61, 323–349. [Google Scholar] [CrossRef]
  150. Pauwels, L.J.R.; Svensson, R. Exploring the Relationship Between Offending and Victimization: What is the Role of Risky Lifestyles and Low Self-Control? A Test in Two Urban Samples. Eur. J. Crim. Policy Res. 2011, 17, 163–177. [Google Scholar] [CrossRef]
  151. Averdijk, M. Reciprocal Effects of Victimization and Routine Activities. J. Quant. Criminol. 2011, 27, 125–149. [Google Scholar] [CrossRef] [Green Version]
  152. Peguero, A.A.; Popp, A.M. Youth violence at school and the intersection of gender, race, and ethnicity. J. Crim. Justice 2012, 40, 1–9. [Google Scholar] [CrossRef]
  153. Maimon, D.; Browning, C.R. Adolescents’ Violent Victimization in the Neighbourhood: Situational and Contextual Determinants. Br. J. Criminol. 2012, 52, 808–833. [Google Scholar] [CrossRef]
  154. Bunch, J.; Clay-Warner, J.; Lei, M.K. Demographic characteristics and victimization risk: Testing the mediating effects of routine activities. Crime Delinq. 2015, 61, 1181–1205. [Google Scholar] [CrossRef]
  155. Gibson, C.L.; Fagan, A.A.; Antle, K. Avoiding Violent Victimization Among Youths in Urban Neighborhoods: The Importance of Street Efficacy. Am. J. Public Health 2014, 104, e154–e161. [Google Scholar] [CrossRef] [PubMed]
  156. Holt, T.J.; Bossler, A.M. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization. Deviant Behav. 2008, 30, 1–25. [Google Scholar] [CrossRef]
  157. Bossler, A.M.; Holt, T.J.; May, D.C. Predicting Online Harassment Victimization Among a Juvenile Population. Youth Soc. 2012, 44, 500–523. [Google Scholar] [CrossRef]
  158. Welsh, A.; Lavoie, J.A.A. Risky eBusiness: An Examination of Risk-taking, Online Disclosiveness, and Cyberstalking Victimization. Cyberpsychol. J. Psychosoc. Res. Cyberspace 2012, 6. [Google Scholar] [CrossRef]
  159. Marcum, C.D. Identifying potential factors of adolescent online victimization for high school seniors. Int. J. Cyber Criminol. 2008, 2, 346. [Google Scholar]
  160. Ngo, F.T.; Paternoster, R. Cybercrime Victimization: An examination of Individual and Situational level factors. Int. J. Cyber Criminol. 2011, 5, 773. [Google Scholar]
  161. Marcum, C.D.; Ricketts, M.L.; Higgins, G.E. Assessing sex experiences of online victimization: An examination of adolescent online behaviors using routine activity theory. Crim. Justice Rev. 2010, 35, 412–437. [Google Scholar] [CrossRef] [Green Version]
  162. Leukfeldt, E.R.; Yar, M. Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis. Deviant Behav. 2016, 37, 263–280. [Google Scholar] [CrossRef] [Green Version]
  163. Hutchings, A.; Hayes, H. Routine activity theory and phishing victimisation: Who gets caught in the ‘net’? Curr. Issues Crim. Justice 2009, 20, 433–452. [Google Scholar] [CrossRef] [Green Version]
  164. Pratt, T.C.; Holtfreter, K.; Reisig, M.D. Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory. J. Res. Crime Delinq. 2010, 47, 267–296. [Google Scholar] [CrossRef]
  165. Van Wilsem, J. Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. Eur. J. Criminol. 2011, 8, 115–127. [Google Scholar] [CrossRef]
  166. Leukfeldt, E.R. Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychol. Behav. Soc. Netw. 2014, 17, 551–555. [Google Scholar] [CrossRef] [PubMed]
  167. Van Wilsem, J. ‘Bought it, but Never Got it’ Assessing Risk Factors for Online Consumer Fraud Victimization. Eur. Sociol. Rev. 2013, 29, 168–178. [Google Scholar] [CrossRef]
  168. Alshalan, A. Cyber-Crime Fear and Victimization: An Analysis of a National Survey; Mississippi State University: Starkville, MS, USA, 2006. [Google Scholar]
  169. Navarro, J.N.; Jasinski, J. Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences. Sociol. Spectr. 2012, 32, 81–94. [Google Scholar] [CrossRef]
  170. Marcum, C.D.; Higgins, G.E.; Ricketts, M.L. Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routine Activity Theory. Deviant Behav. 2010, 31, 381–410. [Google Scholar] [CrossRef]
  171. Reyns, B.W. Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. J. Res. Crime Delinq. 2013, 50, 216–238. [Google Scholar] [CrossRef]
  172. Wiersma, W. Research Methods in Education: An Introduction; Prentice Hall: Upper Saddle River, NJ, USA, 1985. [Google Scholar]
  173. Guba, E.G.; Lincoln, Y.S. Competing paradigms in qualitative research. Handb. Qual. Res. 1994, 2, 105. [Google Scholar]
  174. Bamasoud, D.M.; Iahad, N.A.; Rahman, A.A. Academic researchers’ absorptive capacity influence on collaborative technologies acceptance for research purpose: Pilot study. Mod. Appl. Sci. 2014, 8, 161. [Google Scholar] [CrossRef]
  175. Bhattacherjee, A. Social Science Research: Principles, Methods, and Practices; Global Text Project: Athens, GA, USA, 2012. [Google Scholar]
  176. Kennedy, M.A.; Taylor, M.A. Online harassment and victimization of college students. Justice Policy J. 2010, 7, 1–21. [Google Scholar]
  177. Sekaran, U.; Bougie, R. Research Methods for Business: A Skill Building Approach; John Wiley & Sons: Hoboken, NJ, USA, 2016. [Google Scholar]
  178. Blaxter, L. How to Research; McGraw-Hill Education: New York, NY, USA, 2010. [Google Scholar]
  179. Hair Jr, J.F.; Hult, G.T.M.; Ringle, C.; Sarstedt, M. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM); Sage Publications: Thousand Oaks, CA, USA, 2016. [Google Scholar]
  180. Edwards, J.R.; Bagozzi, R.P. On the nature and direction of relationships between constructs and measures. Psychol. Methods 2000, 5, 155–174. [Google Scholar] [CrossRef]
  181. Maccallum, R.C.; Browne, M.W. The use of causal indicators in covariance structure models: Some practical issues. Psychol. Bull. 1993, 114, 533–541. [Google Scholar] [CrossRef] [PubMed]
  182. Petter, S.; Straub, D.; Rai, A. Specifying Formative Constructs in Information Systems Research. MIS Q. 2007, 31, 623. [Google Scholar] [CrossRef] [Green Version]
  183. Diamantopoulos, A.; Winklhofer, H.M. Index construction with formative indicators: An alternative to scale development. J. Mark. Res. 2001, 38, 269–277. [Google Scholar] [CrossRef]
  184. Fornell, C.; Bookstein, F.L. Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. J. Mark. Res. 1982, 19, 440–452. [Google Scholar] [CrossRef] [Green Version]
  185. Rossiter, J.R. The C-OAR-SE procedure for scale development in marketing. Int. J. Res. Mark. 2002, 19, 305–335. [Google Scholar] [CrossRef] [Green Version]
  186. Chin, W.W. The partial least squares approach to structural equation modeling. Mod. Methods Bus. Res. 1998, 295, 295–336. [Google Scholar]
  187. Jarvis, C.B.; MacKenzie, S.B.; Podsakoff, P.M. A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research. J. Consum. Res. 2003, 30, 199–218. [Google Scholar] [CrossRef]
  188. Cronbach, L.J. Coefficient alpha and the internal structure of tests. Psychometrika 1951, 16, 297–334. [Google Scholar] [CrossRef] [Green Version]
  189. Gefen, D.; Straub, D.; Boudreau, M.C. Structural equation modeling and regression: Guidelines for research practice. Commun. Assoc. Inf. Syst. 2000, 4, 7. [Google Scholar] [CrossRef] [Green Version]
  190. Urbach, N.; Ahlemann, F. Structural equation modeling in information systems research using partial least squares. J. Inf. Technol. Theory Appl. 2010, 11, 5–40. [Google Scholar]
  191. Hair, J. Multivariate Data Analysis Seventh Edition; Prentice Hall: Upper Saddle River, NJ, USA, 2010. [Google Scholar]
  192. Kasunic, M. Designing an Effective Survey; Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst: Pittsburgh, PA, USA, 2005. [Google Scholar]
  193. Netemeyer, R.G.; Bearden, W.O.; Sharma, S. Scaling Procedures: Issues and Applications; Sage Publications: Thousand Oaks, CA, USA, 2003. [Google Scholar]
  194. Zukerberg, A.L.; Moore, J.C.; Von Thurn, D.R. Practical Considerations in Sample Size Selection for Behavior Coding Pretests; US Bureau of the Census: Washington, DC, USA, 1995.
  195. Harter, R.; Eckman, S.; English, N.; O’Muircheartaigh, C. Applied sampling for large-scale multi-stage area probability designs. Handb. Surv. Res. 2010, 2, 169–199. [Google Scholar]
  196. Sim, J.; Lewis, M. The size of a pilot study for a clinical trial should be calculated in relation to considerations of precision and efficiency. J. Clin. Epidemiol. 2012, 65, 301–308. [Google Scholar] [CrossRef] [PubMed]
  197. Cooper, D.R.; Schindler, P.S.; Sun, J. Business Research Methods; Mcgraw-Hill: New York, NY, USA, 2006; Volume 9. [Google Scholar]
  198. Thabane, L.; Ma, J.; Chu, R.; Cheng, J.; Ismaila, A.; Rios, L.P.; Robson, R.; Thabane, M.; Giangregorio, L.; Goldsmith, C.H. A tutorial on pilot studies: The what, why and how. BMC Med Res. Methodol. 2010, 10, 1. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  199. Garofalo, J. Reassessing the Lifestyle Model of Criminal Victimization; Sage Publications: Thousand Oaks, CA, USA, 1987; pp. 23–42. [Google Scholar]
  200. Straub, D.; Boudreau, M.C.; Gefen, D. Validation guidelines for IS positivist research. Commun. Assoc. Inf. Syst. 2004, 13, 24. [Google Scholar] [CrossRef]
  201. Lewis, B.R.; Templeton, G.F.; Byrd, T.A. A methodology for construct development in MIS research. Eur. J. Inf. Syst. 2005, 14, 388–400. [Google Scholar] [CrossRef]
  202. Anderson, J.C.; Gerbing, D.W. Structural equation modeling in practice: A review and recommended two-step approach. Psychol. Bull. 1988, 103, 411. [Google Scholar] [CrossRef]
  203. Bagozzi, R.P.; Yi, Y.; Phillips, L.W. Assessing Construct Validity in Organizational Research. Adm. Sci. Q. 1991, 36, 421. [Google Scholar] [CrossRef]
  204. Chin, W.W. How to write up and report PLS analyses. In Handbook of Partial Least Squares; Springer: Cham, Switzerland, 2010; pp. 655–690. [Google Scholar]
  205. Campbell, D.T.; Fiske, D.W. Convergent and discriminant validation by the multitrait-multimethod matrix. Psychol. Bull. 1959, 56, 81. [Google Scholar] [CrossRef] [Green Version]
  206. Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
  207. Henseler, J.; Ringle, C.M.; Sinkovics, R.R. The use of partial least squares path modeling in international marketing. In New Challenges to International Marketing; Emerald Group Publishing Limited: Bingley, UK, 2009. [Google Scholar]
  208. Geisser, S.; Eddy, W.F. A predictive approach to model selection. J. Am. Stat. Assoc. 1979, 74, 153–160. [Google Scholar] [CrossRef]
  209. Stone, M. Cross-Validatory Choice and Assessment of Statistical Predictions. J. R. Stat. Soc. Ser. B Stat. Methodol. 1974, 36, 111–133. [Google Scholar] [CrossRef]
  210. Abualigah, L.M.Q. Feature Selection and Enhanced Krill Herd Algorithm for Text Document Clustering; Springer: Cham, Switzerland, 2019. [Google Scholar]
  211. Abualigah, L.; Diabat, A.; Mirjalili, S.; Elaziz, M.A.; Gandomi, A.H. The Arithmetic Optimization Algorithm. Comput. Methods Appl. Mech. Eng. 2021, 376, 113609. [Google Scholar] [CrossRef]
  212. Şahin, C.B.; Dinler, Ö.B.; Abualigah, L. Prediction of Software Vulnerability Based Deep Symbiotic Genetic Algorithms: Phenotyping of Dominant-Features. Appl. Intell. 2021. [Google Scholar] [CrossRef]
  213. Şahin, C.B.; Abualigah, L. A novel deep learning-based feature selection model for improving the static analysis of vulnerability detection. Neural Comput. Appl. 2021. [Google Scholar] [CrossRef]
  214. Abualigah, L.; Yousri, D.; Abd Elaziz, M.; Ewees, A.A.; Al-qaness, M.A.; Gandomi, A.H. Aquila Optimizer: A Novel Meta-Heuristic Optimization Algorithm. Comput. Ind. Eng. 2021, 157, 107250. [Google Scholar] [CrossRef]
  215. Abualigah, L.; Gandomi, A.H.; Elaziz, M.A.; Hamad, H.A.; Omari, M.; Alshinwan, M.; Khasawneh, A.M. Advances in Meta-Heuristic Optimization Algorithms in Big Data Text Clustering. Electronics 2021, 10, 101. [Google Scholar] [CrossRef]
  216. Keil, M.; Tan, B.C.; Wei, K.K.; Saarinen, T.; Tuunainen, V.; Wassenaar, A. A cross-cultural study on escalation of commitment behavior in software projects. MIS Q. 2000, 24, 299–325. [Google Scholar] [CrossRef]
  217. Choi, K.-S. Structural Equation Modeling Assessment of Key Causal Factors in Computer Crime Victimization; Indiana University of Pennsylvania: Indiana, PA, USA, 2008. [Google Scholar]
  218. Jerin, R.; Dolinsky, B.; Culture, P. You’ve got mail! You don’t want it: Cyber-victimization and on-line dating. J. Crim. Justice Pop. Cult. 2001, 9, 15–21. [Google Scholar]
Figure 1. Suitable target–VIVA model.
Figure 1. Suitable target–VIVA model.
Electronics 10 01670 g001
Figure 2. Suitable target–CRAVED model.
Figure 2. Suitable target–CRAVED model.
Electronics 10 01670 g002
Figure 3. Capable guardianship model.
Figure 3. Capable guardianship model.
Electronics 10 01670 g003
Figure 4. Proximity to motivated offender model.
Figure 4. Proximity to motivated offender model.
Electronics 10 01670 g004
Figure 5. Suitable target model.
Figure 5. Suitable target model.
Electronics 10 01670 g005
Figure 6. Digital guardianship model.
Figure 6. Digital guardianship model.
Electronics 10 01670 g006
Figure 7. Cyberstalking victimization model.
Figure 7. Cyberstalking victimization model.
Electronics 10 01670 g007
Figure 8. Confirmed structural model for cyberstalking victimization.
Figure 8. Confirmed structural model for cyberstalking victimization.
Electronics 10 01670 g008
Table 1. Internet usage statistics (2000–2020).
Table 1. Internet usage statistics (2000–2020).
YearUsersPopulation% Pop.
2000127,3005,282,5582.4
2002457,0005,282,5588.7
2005600,0005,282,55811.4
2007796,9005,375,30714.8
20081,126,7006,198,67718.2
20091,595,2006,269,28525.4
20101,741,9006,407,08527.2
20122,481,9406,508,88738.1
20208,700,00010,909,56779.7
Table 2. Empirical testing of L-RAT on physical world.
Table 2. Empirical testing of L-RAT on physical world.
No.ReferenceSampleDependent Variable
1Cohen and Cantor (1981) [108]National Crime Survey (NCS)Burglary victimization
2Jensen and Brownfield (1986) [109]Monitoring the Future (MTF)Property, violence, and vandalism victimization
3Miethe et al. (1987) [110]National Crime Survey (NCS)Property and violent victimization
4Sampson (1987) [111]British Crime Survey (BCS)Personal violence and theft
5Sampson and Wooldredge (1987) [112]British Crime Survey (BCS)Larceny victimization, personal and household theft, and burglary
6Lasely (1989) [113]British Crime Survey (BCS)Predatory victimization
7Kennedy and Forde (1990) [114]Canadian urban victimization surveyVehicle theft, breaking and entering (B&E), assault, and robbery victimization
8Miethe and Meier (1990) [89]British Crime Survey (BCS)Burglary, theft, and violent victimization
9Sampson and Lauritsen (1990) [115]British Crime Survey (BCS)Assault victimization, stranger assault, acquaintance assault
10Lauritsen et al. (1991) [116]National Youth Survey (NYS)Assault, robbery, larceny and vandalism
11Lauritsen et al. (1992) [117]National Youth Survey (NYS); Monitoring the future (MTF)MTF: Assault; NYS: Assault and robbery victimization
12Wooldredge et al. (1992) [118]Survey University faculty membersPersonal and property victimization
13Miethe and McDowall (1993) [119]Survey of adults in SeattleBurglary victimization and violence by strangers
14Rountree et al. (1994) [120]Survey of adults in SeattleBurglary and violent victimization
15Schwartz and Pitts (1995) [121]Undergraduate students from Ohio UniversityRape
16Fisher et al. (1998) [122]Nationally representative sample in the U.S.On-campus theft victimization and violent
17Mustaine and Tewksbury (1998) [123]Survey of college studentsMajor and minor theft victimization
18Mustaine and Tewksbury (1999) [124]University women in 9 institutionsStalking
19Fisher et al. (2000) [106]College women in U.S.Sexual victimization
20Mustaine and Tewksbury (2000) [125]Survey of college studentsAssault victimization
21Wittebrood and Nieuwbeerta (2000) [126]Survey of adults in the NetherlandsPersonal larceny, threat, sexual assault, burglary, car and bicycle theft victimization
22Fisher et al. (2001) [127]National representative sample in the U.S.Stalking
23Mustaine and Tewksbury (2002) [128]Survey of college womenGeneral and serious sexual assault victimization
24Schreck et al. (2002) [129]Survey of students in FayettevilleViolent victimization
25Dugan and Apel (2003) [130]National Crime Victimization Survey (NCVS)Violent victimization of women
26Schreck et al. (2003) [131]National Household and Education Survey, School Safety and Discipline (NHES-SSD)Overall, property and violent victimization at school
27Schreck and Fisher (2004) [132]National Longitudinal Study of Adolescent Health (Add Health)Violent victimization
28Tseloni et al. (2004) [133]National Crime Victimization Survey (NCVS), British Crime Survey (BCS) and Police Monitor (PM)Burglary victimization
29Schreck et al. (2006) [134]Gang Resistance Education and Training (GREAT) programVictimization
30Wilcox et al. (2007) [135]Survey of adults in SeattleBurglary victimization
31Messner et al. (2007) [136]Survey of adults in ChinaPersonal theft, swindling, robbery, and assault victimization
32Taylor et al. (2007) [137]Survey of eighth-graders in public schoolViolent and serious violent victimization
33Taylor et al. (2008) [138]Survey of eighth-graders in public schoolSerious violent victimization
34Spano et al. (2008) [139]Mobile Youth SurveyViolent victimization
35Burrow and Apel (2008) [140]National Crime Victimization Survey (NCVS)—School Crime SupplementLarceny and assault victimization at school and in the community
36Wilcox et al. (2009) [141]Rural Substance Abuse and Violence Project (RSVP)Assault and theft victimization
37Savolainen et al. (2009) [142]Survey of adolescents in HelsinkiViolent victimization
38Reid and Sullivan (2009) [143]Developmental Victimization SurveyBullying and general victimization
39Henson et al. (2010) [144]Survey of students from rural Kentucky high schoolMinor and serious violent victimization
40Fisher et al. (2010) [145]National College Women Sexual Victimization study (NCWSV)Sexual victimization and repeat sexual victimization
41Tillyer et al. (2010) [146]Rural Substance Abuse and Violence Project (RSVP)Sexual harassment and assault victimization
42Shubak Tillyer et al. (2011) [147]National Longitudinal Study of Adolescent Health (Add Health)Violent victimization
43Tillyer et al. (2011) [148]Rural Substance Abuse and Violence Project (RSVP)Serious violent victimization
44Peguero et al. (2015) [149]Education Longitudinal Study (ELS)Property and violent victimization at school
45Pauwels and Svensson (2011) [150]School surveys in Sweden and BelgiumGeneral victimization
46Averdijk (2011) [151]National Crime Victimization Survey (NCVS)Household and violent victimization
47Peguero and Popp (2012) [152]Education Longitudinal Study (ELS)Violent victimization at school
48Maimon and Browning (2012) [153]Project on Human Development in Chicago Neighborhoods (PHDCN)Violent victimization
49Bunch et al. (2015) [154]National Crime Victimization Survey (NCVS)Violent and theft victimization
50Gibson et al. (2014) [155]Project on Human Development in Chicago Neighborhoods (PHDCN)Violent victimization (by neighborhood disadvantage)
51Reyns et al. (2016) [88]Canadian general social surveyStalking victimization
Table 3. Empirical testing of L-RAT in the virtual world.
Table 3. Empirical testing of L-RAT in the virtual world.
ReferenceSampleDependent Variable(s)
Hutchings and Hayes (2009) [163]104 residents of Brisbane metropolitan areaPhishing
Choi (2008) [94]204 college studentsComputer crimes
Pratt et al. (2010) [164]992 adults in FloridaConsumer fraud
Van Wilsem (2011) [165]4353 Dutch householdsThreat
Leukfeldt (2014) [166]8379 Dutch populationsPhishing
Van Wilsem (2013) [167] 6201 Dutch householdsConsumer fraud
Bossler and Holt (2009) [65]570 college studentsMalware infection
Alshalan (2006) [168]987 national cybercrime victimization survey (2004)Cybercrime victimization
Holt and Bossler (2008) [156]578 college studentsOnline harassment
Bossler et al. (2012) [157]434 middle and high school studentsOnline harassment victimization
Navarro and Jasinski (2012) [169]935 national sample of teenagersCyberbullying
Reyns et al. (2011) [82]974 college studentsCyberstalking victimization
Welsh and Lavoie (2015) [158]321 female undergraduate studentsCyberstalking victimization
Marcum (2008) [159]483 freshmen college students Online harassment, unwanted exposure to sexual materials, solicitation of sex online
Ngo and Paternoster (2011) [160]295 undergraduate studentsCybercrime victimization (online harassment)
Marcum et al. (2010) [170]744 undergraduate studentsUnwanted sexually explicit material, unwanted sexual harassment, unwanted sexual solicitation
Leukfeldt and Yar (2016) [162]9161 Netherlands statisticsHacking victimization, malware infection victimization, identity theft, consumer fraud victimization, cyberthreat victimization, cyberstalking victimization
Back (2016) [77]1000 online South Korean usersCyberharassment
Phillips (2015) [93]274 college studentsCyberharassment, cyberstalking, cyber impersonation, sexting
Reyns (2013) [171]5985 British Crime Survey (BCS)Identity theft
Yucedal (2010) [37]626 National Crime Victimization Survey (NCVS)Computer virus victimization, online harassment victimization
Table 4. Guidelines for choosing the measurement model method [117].
Table 4. Guidelines for choosing the measurement model method [117].
CriterionDecisionReference
The indicator’s and the construct’s causal priorityFrom the construct to the indicators: reflective. From the indicators to the construct: formativeDiamantopoulos and Winklhofer (2001) [183]
Is the build a trait or a mixture of indicators that explains the indicators?
  • If trait: reflective. If combination: formative
Fornell and Bookstein (1982) [184]
Do the metrics reflect the construct’s effects or causes?
  • If consequences: reflective. If causes: formative
Rossiter (2002) [185]
Is it accurate that if the trait’s evaluation changes, all things will change in the same way (assuming they’re all similarly coded)?
  • If yes: reflective. If no: formative
Chin (1998) [186]
Is it possible to swap out the items?
  • If yes: reflective. If no: formative
Jarvis et al. (2003) [187]
Table 5. Measurement model decision.
Table 5. Measurement model decision.
ConstructItemsCriteriaReflective/
Formative
12345
Proximity to Motivated OffendersUnknown FriendReflective
Visiting Religious WebsitesReflective
Listening/Downloading MusicReflective
Watching/Downloading MoviesReflective
Downloading Computer ProgramsReflective
Watching TV ProgramsReflective
Playing GamesReflective
Reading Newspapers/MagazinesReflective
Sending/Receiving EmailsReflective
Social Networking SitesReflective
Chatting/Instant Messenger (Text)Reflective
Chatting/Instant Messenger (Voice)Reflective
Chatting/Instant Messenger (Video)Reflective
Health-Care ServicesReflective
E-GovernmentReflective
Job-Seeking WebsitesReflective
Showing Goods and ServicesReflective
E-BankingReflective
Political WebsitesReflective
HackingReflective
ShoppingReflective
Visiting Adult WebsitesReflective
SportReflective
Suitable Target/Target AttractivenessNameReflective
GenderReflective
AgeReflective
Mobile Phone NumberReflective
Email AddressReflective
Home AddressReflective
Bank Account NumberReflective
Study ProgramReflective
Credit Card SerialReflective
Favourite ActivitiesReflective
PhotosReflective
VideosReflective
Digital GuardianshipAntivirus SoftwareReflective
Antispyware SoftwareReflective
Firewall SoftwareReflective
Ad-Aware SoftwareReflective
Tracking Protection Blocks SoftwareReflective
Filtering/Monitoring SoftwareReflective
Changeyour Login PasswordReflective
SaveExtra CopiesReflective
Create a Backup ProcessReflective
Delete Old FilesReflective
Delete Old Emails/AttachmentsReflective
Change any File LocationsReflective
Cyberstalking victimizationHarassment Reflective
DefamationReflective
Sexual MaterialsReflective
Pretending to be you Reflective
Disable your ComputerReflective
Monitoring your ProfilesReflective
Sent Threatening/Offensive LetterReflective
Written Menace/Offensive CommentsReflective
Note: 1 denotes causal priority between the indicator and the construct; 2 denotes whether the construct is a characteristic or a mixture of indicators that explain the hands. 3 = Do the metrics reflect the construct’s effects or causes? 4 = Is it correct that if the trait’s appraisal changes, all things will change in the same way (assuming they are all similarly coded)? 5 = Can the objects be swapped out with one another?
Table 6. Evaluation of the measurement model [179].
Table 6. Evaluation of the measurement model [179].
AnalysisTestDescriptionCriteria
Internal consistency reliabilityCronbach’s alpha (CA)Based on the intercorrelations of the observed predictor variables, calculate the reliability (all indicators have equal outer loadings).≥0.6 Acceptable
≥0.7 Satisfactory
Composite reliability (CR)Although considering the various outer loadings of the indicator variables, the same (CA) was found.0.6–0.7 Acceptable
0.7–0.9 Satisfactory
>0.95 Redundant
Convergent validityIndicator reliability (factor outer loading)Is the square of the outer loading of a standardized predictor. It is referred to as the variance derived from the item and it reflects how much of the difference in an item is described by the construct.≥0.7 Acceptable
Average variance extracted (AVE)The latent construct’s ability to describe the variance of its metrics.≥0.5 Desirable
Discriminant validityCross-loadingsAn indicator’s correlation with other constructs in the model.Outer loading for a specific construct > its loading on all the other constructs
Fornell–Larcker criterionCompares the square root of each construct’s average variance derived with all other constructs in the model’s correlations.SQRT (AVE) for each construct > correlation between constructs
Table 7. The assessment of structural model guidelines.
Table 7. The assessment of structural model guidelines.
AnalysisTestDescriptionCriteria
Coefficient of determination (R2)Measures the relationship of a latent variable to its total variance0.670 substantia
l0.333 moderate
0.190 weak [186]
Path coefficient (β)Indicates the strength of the relationship between two latent variablesFrom −1 to 1. Values closer to 1 are more significant
t-value>1.65 significance level 10%
>1.96 significance level 5%
>2.57 significance level 1%
p-valueSignificant at p-value
* <0.10
** <0.05
*** <0.01
Effect size (f2)Measures if an independent latent variable has a substantial impact on a dependent latent variable0.02 < f2 ≤ 0.15
(small effect).
0.15 < f2 ≤ 0.35
(medium effect).
f2 > 0.35
(large effect)
Collinearity issuesToleranceExamines each set of predictor constructs separately for each subpart of the structural modelTolerance > 0.20 acceptable
VIFVIF 5 ≥ acceptable
Predictive relevanceQ2Indicator of the model’s predictive relevance>0 having predictive relevance
q2The relative impact of predictive relevance (effect size)0.02 small
0.15 medium
0.35 large
Table 8. Respondents’ demographic characteristics.
Table 8. Respondents’ demographic characteristics.
Var.ItemsFreq.%Var.ItemsFreq.%
GenderMale3162NationalityLocal4386
Female1938Foreigner714
AgeFewer than 1800Academic semesterFirst sem.918
1812Second sem.1836
19612Third sem.510
201428Fourth sem.816
211428Fifth sem.612
221020Sixth sem.48
Others510IncomeFewer than 5001530
Course programEngineering2448500–7491122
Computer sci./IT12750–999510
Applied Arts6121000–15001020
Finance and Management1020More than 1500816
Medical Sciences612Others12
Education00ResidencyCity4794
Languages00Rural00
Hotel and Tourism12Refugee24
Audio and Visual Techniques00Desert00
Information Management and Libraries24Town12
Others00Village 00
Table 9. Reliability analysis of pilot study.
Table 9. Reliability analysis of pilot study.
ConstructNumber of ItemsCronbach’s Alpha
Proximity to motivated offender230.781
Suitable target120.723
Digital guardianship120.751
Cyberstalking80.768
Table 10. Survey summary.
Table 10. Survey summary.
NO.DescriptionN%
1Questionnaires distributed908100
2Questionnaires received 908100
3Incomplete questionnaire (missed data)10411.5
4Suspicious response patterns (straight-lining) 404.4
5Outliers70.77
Table 11. Descriptive demographic statistics.
Table 11. Descriptive demographic statistics.
Var.ItemsFreq.%Var.ItemsFreq.%
GenderMale36748.5NationalityLocal69892.2
Female39051.5Foreigner597.8
AgeFewer than 1800Academic semesterFirst sem.8511.2
18253Second sem.14919.7
19709Third sem.9612.7
2020928Fourth sem.22930.3
2123731Fifth sem.12516.5
2216522Sixth sem.739.6
Others517IncomeFewer than 50022533.3
Course programEngineering30440.2500–74916021.1
Computer Sci./IT152750–99913618
Applied Arts729.51000–15009612.7
Finance and Management10113.3More than 150011314.9
Medical Sciences9112Others12
Education253.3ResidencyCity51067.4
Languages253.3Rural253.3
Hotel and Tourism618.1Refugee658.6
Audio and Visual Techniques283.7Desert222.9
Information Management and Libraries354.6Town537
Others00Village 8210.8
Table 12. Cyberstalking victimization prevalence.
Table 12. Cyberstalking victimization prevalence.
Cyberstalking Victimization Behavior TypePrevalence
TypeLikert ValueFrequency%The Calculation Used the Weighted Average 1
Harassment/annoyance19312.366.76%
212216.1
316722.1
418925.0
518624.6
Posted false information about you135947.439.92%
222329.5
3496.5
4749.8
5526.9
Sent sexual materials to you113818.264.64%
212416.4
38811.6
423931.6
516822.2
Pretended to be you without your permission113718.160.00%
218724.7
311515.2
417523.1
514318.9
Attempted to disable your computer121228.057.20%
213818.2
38010.6
419826.2
512917.0
Monitored your profile online114018.561.30%
216922.3
39812.9
419926.3
515119.9
Sent threatening/offensive letters or messages to your e-mail114218.864.84%
2496.5
321428.3
418925.0
516321.5
Wrote threatening/offensive comments to you in chat rooms/IMs125633.849.18%
215820.9
315220.1
412116.0
5709.2
1 Sum ((value∗percentage)/100)/5)∗100%.
Table 13. Convergent validity.
Table 13. Convergent validity.
ConstructIndicatorsOuter LoadingAVE
PTMOAdding unknown friend0.67100.5478
Chatting/instant messenger (text)0.7280
Chatting/instant messenger (voice)0.5676
Playing games0.8233
Reading newspapers/magazines0.7993
Sending/receiving emails0.8319
Social networking sites0.7819
Visiting religious websites0.8236
Watching/downloading movies0.6518
Listening to/downloading music0.6730
STMobile phone number0.55400.5765
Home address0.7986
Bank account number0.8684
Videos0.7067
Photos0.7524
Name0.6207
Gender0.7662
Email Address0.8582
Age0.8460
DGAd-Aware software0.82980.6353
Antispyware software0.7580
Antivirus software0.7910
Filtering/monitoring software0.7753
Firewall software0.7942
Tracking Protection blocks software0.8390
Change any file locations0.7361
Delete old emails/attachments0.8301
Login password0.8136
CVAttempted to disable your computer0.78240.5541
Monitored your online profiles0.8147
Pretended to be you online without your permission0.8637
Sent sexually explicit materials to you0.5594
Sent threatening/offensive letters or messages to your e-mail0.6599
Table 14. Cross-loading discriminant validity.
Table 14. Cross-loading discriminant validity.
IndicatorsPTMOSTDGCV
PTMO010.65180.59110.55010.5636
PTMO020.82360.75350.71730.7140
PTMO030.78190.76600.73930.7174
PTMO040.83190.78150.71260.6708
PTMO050.79930.72620.78900.7666
PTMO060.82330.75030.67460.7508
PTMO070.56760.56350.56450.4354
PTMO080.72800.66900.63590.6513
PTMO090.67100.63290.60130.4842
PTMO100.67300.59550.58560.4658
ST010.51780.55400.50440.3782
ST020.73860.79860.75570.6857
ST030.82740.86840.77230.7497
ST040.59510.70670.61910.5598
ST050.65330.75240.65590.6091
ST060.57820.62070.61790.5231
ST070.76540.76620.69820.7388
ST080.77580.85820.74680.7155
ST090.81150.84600.82360.7478
DG010.65420.64600.73610.6514
DG020.76450.73070.79420.6795
DGO30.70090.71570.77530.6879
DG040.75140.79340.83900.7114
DG050.68650.74170.83010.7173
DG060.71040.71830.79100.6907
DG070.67440.71960.75800.6805
DG080.78930.78930.82980.6609
DG090.67230.70730.81360.6740
CV010.68960.67900.63820.7824
CV020.75730.72520.77040.8147
CV030.74980.70250.72800.8637
CV040.42700.50840.51240.5594
CV050.49750.51930.49390.6599
Table 15. Internal consistency reliability.
Table 15. Internal consistency reliability.
Construct AlphaCronbach’s Alpha (CA)Composite Reliability (CR)
PTOM0.9070.923
ST0.9050.923
DG0.9280.940
CV0.7930.859
Table 16. Effect size (f2) of latent variables.
Table 16. Effect size (f2) of latent variables.
Path (R2 = 0.728)R2excludedEffect Size (f2)Rating
PTMO→CV0.7650.078Small effect
ST→CV0.7800.009Very small effect
DG→CV0.7600.101Small effect
PTMO = Proximity to motivated offenders, ST = suitable target, DG = digital guardianship, CV = cyberstalking victimization.
Table 17. Predictive relevance of latent variables.
Table 17. Predictive relevance of latent variables.
Path (Q2 = 0.4267)Q2excludedEffect Size (q2)Effect
PTMO→CV0.41880.014Small
ST→CV0.42650.0004Small
DG→CV0.41660.018Small
PTMO = proximity to motivated offenders, ST = suitable target, DG = digital guardianship, CV = cyberstalking victimization.
Table 18. PLS-MGA results for the gender moderating effect.
Table 18. PLS-MGA results for the gender moderating effect.
Exogenous Latent VariablesMaleFemaleMale vs. Female
p(1)se(p(1))p(2)se(p(2)) | p ( 1 ) p ( 2 )   | t-Valuep-Value
PTMO→CV0.4140.07230.3500.05800.0640.6950.487
ST→CV0.0920.08670.2050.07310.1131.0020.317
DG→CV0.4010.05830.3630.05880.0380.4590.646
N367390---
PTMO = proximity to motivated offenders, ST = suitable target, DG = digital guardianship, CV = cyberstalking victimization.
Table 19. PLS-MGA results for the nationality moderating effect.
Table 19. PLS-MGA results for the nationality moderating effect.
Exogenous Latent VariablesLocalForeignerLocal vs. Foreigner
p(1)se(p(1))p(2)se(p(2)) | p ( 1 ) p ( 2 )   | t-Valuep-Value
PTMO→CV0.3820.06440.3070.05930.07530.3660.715
ST→CV0.1250.08090.3910.04580.26631.0330.302
DG→CV0.4040.06060.2380.04900.16540.8550.393
N59859---
PTMO = proximity to motivated offenders, ST = suitable target, DG = digital guardianship, CV = cyberstalking victimization.
Table 20. PLS-MGA results for the internet connection speed moderating effect.
Table 20. PLS-MGA results for the internet connection speed moderating effect.
Exogenous Latent VariablesNormal Connection SpeedHigh Connection SpeedNormal vs. High
p(1)se(p(1))p(2)se(p(2)) | p ( 1 ) p ( 2 )   | t-Valuep-Value
PTMO→CV0.3560.06530.4960.05040.14040.7610.447
ST→CV0.1580.08270.1790.05950.02070.0890.929
DG→CV0.3990.06200.2390.04020.15950.9120.362
N67285---
PTMO = proximity to motivated offenders, ST = suitable target, DG = digital guardianship, CV = cyberstalking victimization.
Table 21. PLS-MGA results for the age moderating effect.
Table 21. PLS-MGA results for the age moderating effect.
Exogenous Latent VariablesAge > 20Age ≤ 20>20 vs. ≤20
p(1)se(p(1))p(2)se(p(2)) | p ( 1 ) p ( 2 )   | t-Valuep-Value
PTMO→CV0.3380.06450.3760.06370.00140.0150.988
ST→CV0.2250.08810.0670.06670.15791.3100.190
DG→CV0.3060.06600.4740.05350.16831.8370.067
N453304---
PTMO = proximity to motivated offenders, ST = suitable target, DG = digital guardianship, CV = cyberstalking victimization.
Table 22. PLS-MGA results for the place of residence moderating effect.
Table 22. PLS-MGA results for the place of residence moderating effect.
Exogenous Latent VariablesCityOthersCity vs. Others
p(1)se(p(1))p(2)se(p(2)) | p ( 1 ) p ( 2 )   | t-Valuep-Value
PTMO→CV0.3760.06470.3280.06340.04830.4700.639
ST→CV0.0970.07400.3110.09130.21431.7320.084
DG→CV0.4320.06150.2880.05750.14421.4880.137
N510247---
PTMO = proximity to motivated offenders, ST = suitable target, DG = digital guardianship, CV = cyberstalking victimization.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Abu-Ulbeh, W.; Altalhi, M.; Abualigah, L.; Almazroi, A.A.; Sumari, P.; Gandomi, A.H. Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations. Electronics 2021, 10, 1670. https://doi.org/10.3390/electronics10141670

AMA Style

Abu-Ulbeh W, Altalhi M, Abualigah L, Almazroi AA, Sumari P, Gandomi AH. Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations. Electronics. 2021; 10(14):1670. https://doi.org/10.3390/electronics10141670

Chicago/Turabian Style

Abu-Ulbeh, Waheeb, Maryam Altalhi, Laith Abualigah, Abdulwahab Ali Almazroi, Putra Sumari, and Amir H. Gandomi. 2021. "Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations" Electronics 10, no. 14: 1670. https://doi.org/10.3390/electronics10141670

APA Style

Abu-Ulbeh, W., Altalhi, M., Abualigah, L., Almazroi, A. A., Sumari, P., & Gandomi, A. H. (2021). Cyberstalking Victimization Model Using Criminological Theory: A Systematic Literature Review, Taxonomies, Applications, Tools, and Validations. Electronics, 10(14), 1670. https://doi.org/10.3390/electronics10141670

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop