Volume 10, Issue 1 (9-2019)                   Social Problems of Iran 2019, 10(1): 145-169 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Aliverdinia A, Ghorbanzadeh F. (2019). The Sociological Study of Cyberstalking Victimization among Mazandaran University Studentsdents. Social Problems of Iran. 10(1), 145-169.
URL: http://jspi.khu.ac.ir/article-1-2917-en.html
1- Professor of Sociology, Mazandaran University , aliverdinia@umz.ac.ir
2- MA Sociology, Mazandaran University
Abstract:   (1096 Views)
Currently, Cyberstalking victimization is a problem all over the world which has been increasing in Iran as well. The present study, based on routine activities theory, examines the causes of the Cyberstalking victimization among Mazandaran University students. The research method of the study is survey using a questionnaire as a data collection tool. A total of 374 students of Mazandaran University in the academic year of 1963-97 were selected through stratified sampling method. The findings indicate that there is a significant difference between girls and boys in rates of Cyberstalking victimization. Boys are more likely to be victims of Cyberstalking victimization than girls, while girls are more likely to be victims of financial and sexual Cyberstalking victimization. The results of the regression analysis showed that the variables of this study were able to explain 26 percent of the Cyberstalking Victimization changes among students. Of all the variables entered in the regression, three variables of “online offender’s lifestyle” and “direct online protection” and “online proximity to offenders” have a significant effect on Cyberstalking victimization.
Full-Text [PDF 1178 kb]   (451 Downloads)    
Type of Article: Original Research | Subject: Crime & Deviances
Received: 2018/09/1 | Accepted: 2019/11/26 | Published: 2019/09/1

References
1. اسلامی، ابراهیم (1395) «جایگاه حمایت از بزه‌دیدگان جرایم سایبری در مقررات کیفری حقوق داخلی و حقوق بین الملل»، پژوهشنامة حقوق اسلامی، سال هفدهم، شمارة 1 (پیاپی 43): 157-182.
2. خبرگزاری مهر، (1394)، «تهران در صدر جرایم اینترنتی»، برگرفته از https://www.mehrnews.com/news/3575583، 5/5/1397.
3. دواس، دی.‌ای (1390) پیمایش در تحقیقات اجتماعی، ترجمة هوشنگ نایبی، تهران: نی.
4. زررخ، احسان (1390) «بزه‌دیده‌شناسی سایبری»، مجلة پژوهش، سال هفدهم، شمارة 64: 127-157.
5. علیوردی‌نیا، اکبر؛ منا علیمردانی (1395) «کاربست تجربی نظریۀ فعالیت‌های روزمره در بررسی رفتارهای انحرافی دانشجویان»، جامعه‌شناسی کاربردی، سال بیست و هشتم، شمارة پیاپی (67)، شمارة 3: 1-24.
6. مالمیر، محمود؛ زررخ، احسان (1389) «پیشگیری از بزه‌دیدگی سایبری»، مطالعات پیشگیری از جرم، سال پنجم، شمارة 17: 59-86.
7. میر، فاطمه (1394) نقش بزه‌دیدگی در تحقق جرایم سایبری، پایان‌نامة دورة کارشناسی ارشد علوم اقتصادی دانشگاه فردوسی مشهد.
8. Addington, Lynn A (2013) "Reporting and Clearance of Cyberbullying Incidents: Applying 'Offline' Theories to Online Victims." Journal of Contemporary Criminal Justice,20(10):1-21. [DOI:10.1177/1043986213507399]
9. Bennett, R. (1991) Routine activities: A Cross-National Assessment of a Criminological Perspective, Social Forces 70, 147-63. [DOI:10.1093/sf/70.1.147]
10. Bauman, S., Toomey, R. B., & Walker, J. L. (2013) Associations Among Bullying, Cyberbullying, And Suicide In High School Students, Journal of Adolescence, 36(2), 341-350. [DOI:10.1016/j.adolescence.2012.12.001]
11. Bossler, A. M., & Holt, T. J. (2009) On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory, International Journal of Cyber Criminology, 3(1), 400- 420.
12. Bossler, A. M., Holt, T. J., & May, D. C. (2012) Predicting online harassment victimization among a Juvenile population. Youth & Society, 44(4), 500- 523. [DOI:10.1177/0044118X11407525]
13. Choi, K. S. (2008) Computer Crime Victimization and Integrated Theory: An Empirical Assessment, International Journal of Cyber Criminology, 2(1), 308-333.
14. Cohen, L. E., & Felson, M. (1979) Social Change and Crime Rate Trends: A Routine Activity Approach, American Sociological Review,44: 588-608. [DOI:10.2307/2094589]
15. Cohen, L. E., Kluegel, J. R., & Land, K. C. (1981) Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory. American Sociological Review, 46, 505-524. [DOI:10.2307/2094935]
16. Dashora, K. (2011) "Cybercrime in the Society: Problems and Preventions" , Journal of Alternative Perspectives in the Social Sciences, 3 (1), 240-259.
17. Denning, D. (1999) Information Warfare and Security. New York: Addison Wesley.
18. Dilmac, Bulent & Aydogan, D. (2010) Parental Attitude as Predictor of Cyber Bullying among Primary School Children, International Journal of Social, Behavioral, Educational, Economic and Management Engineering, 4 (7), 1667-1671.
19. Drebing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014) Cyber stalking In a Large Sample of Social Network Users: Prevalence, Characteristics, And Impact Upon Victims, Cyber psychology, Behavior, and Social Networking, 17(2), 61-67. [DOI:10.1089/cyber.2012.0231]
20. Felson, M. (1998) Crime and Everyday Life, 2nd ed. Thousand Oaks, CA: Pine Forge Press.
21. Hensler-McGinnis, N. F. (2008) Cyberstalking Victimization: Impact and Coping Responses in a National University Sample. Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park. [DOI:10.1037/e611792009-001]
22. Henson, B., Reyns, B. W., & Fisher, B. S. (2011) Security in The 21st Century: Examining the Link Between Online Social Network Activity, Privacy, And Interpersonal Victimization. Criminal Justice Review, 36(3), 253-268. [DOI:10.1177/0734016811399421]
23. Jeralds, L. M. (2011) Bullying Victimization, Target Suitability, and Guardianship: A Routine Activities Approach (Doctoral Dissertation, University of North Carolina Wilmington).
24. Kennedy, M. A., & Taylor, M. A. (2010) Online Harassment and Victimization of College Students, Justice Policy Journal, 7(1), 1-21.
25. Leukfeldt, E. R., & Yar, M. (2016) Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis, Deviant Behavior, 37(3), 263-280. [DOI:10.1080/01639625.2015.1012409]
26. Lipton, J. D. (2011) Combating cyber-victimization. Berkeley Technology Law Journal, 26(2), 1103-1155.
27. Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010) Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routine Activity Theory, Deviant Behavior, 31(5), 381-410 [DOI:10.1080/01639620903004903]
28. McNeeley, S. (2015). Lifestyle-Routine Activities and Crime Events, Journal of Contemporary Criminal Justice, 31(1), 30-52. [DOI:10.1177/1043986214552607]
29. Miller, J, Mitchell Christopher, J, Schreck, T. (2006) Criminological Theory: a Brief Introduction Boston, Pearson/ Allyn and Bacon.
30. Miller, J. Mitchell (Ed). (2009) 21st Century Criminology A Reference Handbook, USA: SAGE Publications.
31. Ngo, F. T., & Paternoster, R (2011) Cybercrime Victimization: An Examination of Individual and Situational Level Factors. International Journal of Cyber Criminology, 5(1), 773.
32. Paullet, Karen & Rota, & Swan, T. (2009) Cyber stalking: An Exploratory Study Of Students at a Mid-Atlantic University, Issues in Information Systems, 10(2): 640-649.
33. Reychay, Iris, Sukenik, S. (2015) Cyberbullying: Keeping Our Children Safe in 21 st century, Handbook of Research on Digital Crime, Cyberspace Security and Information Assurance, 77-79. [DOI:10.4018/978-1-4666-6324-4.ch006]
34. Reyns, B., B. Henson & S. F. (2011) Being Pursued Online. Applying Cyber lifestyle-Routine Activities Theory to Cyber stalking Victimization, Criminal Justice and Behavior 38(11):1149-1169. [DOI:10.1177/0093854811421448]
35. Shinder, D. L., & Tittel, E. (2002) Scene of the Cybercrime: Computer Forensics Handbook, Syngress Publishing.
36. Smith, A., Rainie, L., & Zickuhr, K. (2010) College Students and Technology, Pew Research Center's Internet & American Life Project, Washington, DC.
37. Tseloni, A., Wittebrood, K., Farrell, G. and Pease, K. (2004) Burglary Victimization In England and Wales, The Unites States and The Netherlands: A Cross-national Comparative Test of Routine Activities and Lifestyle Theories. British Journal of Criminology 44, 66-91. [DOI:10.1093/bjc/44.1.66]
38. Webster, F. (2002) Theories of The Information Society, 2nd edn. London: Routledge. [DOI:10.4324/9780203426265]
39. Wilsem, Johan V. (2009) World Tied Together? Online and Non - Domestic Routine Activities and Their Impact on Digital and Traditional Threat Victimization, European Journal of Criminology, 8 (12), 115 - 127. [DOI:10.1177/1477370810393156]
40. Yar, M. (2005) The Novelty of 'Cybercrime' An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2(4), 407-427. [DOI:10.1177/147737080556056]
41. Yucedal, B. (2010) Victimization in cyberspace: An Application of Routine Activity and Lifestyle Exposure Theories (Doctoral Dissertation, Kent State University).

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2024 CC BY-NC 4.0 | Journal of Social Problems of Iran

Designed & Developed by : Yektaweb