“…It can be argued, for instance, that the iteration shown in the model transforms a cyberstalker's behaviour into a routine activity. This seems reasonable given that a number of studies have connected online victimisation with Routine Activity Theory (see, for instance, (Choi & Lee, 2017;Hawdon, Costello, Ratliff, Hall, & Middleton, 2017;Leukfeldt & Yar, 2016;Pyrooz, Decker, & Moule, 2013). As an example Näsi, Räsänen, Kaakinen, Keipi, and Oksanen ( 2016) conducted a study that attempted to predict online victimisation in a group of 3,565 young people aged 15 -30.…”