TY - JOUR
T1 - Understanding the cyber-victimization of young people
T2 - A test of routine activities theory
AU - Griffith, Candace E.
AU - Tetzlaff-Bemiller, Melissa
AU - Hunter, Lance Y.
N1 - Publisher Copyright:
© 2023
PY - 2023/3
Y1 - 2023/3
N2 - Research on cybervictimization focuses on a variety of behaviors. The present study focuses on four behaviors: hacking, having obscene photos shared, bullying, and stalking/trespass to test the Lifestyles Routine Activities Theory (LRAT). Much of the research on cybervictimization uses LRAT to help explain how some groups of individuals are susceptible to becoming victims. We surveyed young adults, aged 18–25, using a paid Qualtrics sample and a convenience sample from a southern university. Using binominal logistic regression, we test the likelihood of victimization across the various behaviors and with the three main elements of LRAT, motivated offender, suitable target, and absence a capable guardian. We found that online dating was the most likely way to be exposed to a motivated offender, that visiting explicit websites made one a suitable target, and knowing how to set privacy settings helped guard against victimization.
AB - Research on cybervictimization focuses on a variety of behaviors. The present study focuses on four behaviors: hacking, having obscene photos shared, bullying, and stalking/trespass to test the Lifestyles Routine Activities Theory (LRAT). Much of the research on cybervictimization uses LRAT to help explain how some groups of individuals are susceptible to becoming victims. We surveyed young adults, aged 18–25, using a paid Qualtrics sample and a convenience sample from a southern university. Using binominal logistic regression, we test the likelihood of victimization across the various behaviors and with the three main elements of LRAT, motivated offender, suitable target, and absence a capable guardian. We found that online dating was the most likely way to be exposed to a motivated offender, that visiting explicit websites made one a suitable target, and knowing how to set privacy settings helped guard against victimization.
KW - Cyber-bullying
KW - Cyber-stalking
KW - Cybervictimization
KW - Hacking
KW - Lifestyle Routine Activities Theory
KW - Obscenity
UR - http://www.scopus.com/inward/record.url?scp=85166524617&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85166524617&partnerID=8YFLogxK
U2 - 10.1016/j.teler.2023.100042
DO - 10.1016/j.teler.2023.100042
M3 - Article
AN - SCOPUS:85166524617
SN - 2772-5030
VL - 9
JO - Telematics and Informatics Reports
JF - Telematics and Informatics Reports
M1 - 100042
ER -