2017
DOI: 10.1080/02732173.2017.1334608
|View full text |Cite
|
Sign up to set email alerts
|

Conflict Management Styles and Cybervictimization: Extending Routine Activity Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
24
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 24 publications
(27 citation statements)
references
References 47 publications
3
24
0
Order By: Relevance
“…It can be argued, for instance, that the iteration shown in the model transforms a cyberstalker's behaviour into a routine activity. This seems reasonable given that a number of studies have connected online victimisation with Routine Activity Theory (see, for instance, (Choi & Lee, 2017;Hawdon, Costello, Ratliff, Hall, & Middleton, 2017;Leukfeldt & Yar, 2016;Pyrooz, Decker, & Moule, 2013). As an example Näsi, Räsänen, Kaakinen, Keipi, and Oksanen ( 2016) conducted a study that attempted to predict online victimisation in a group of 3,565 young people aged 15 -30.…”
Section: The Online Victimisation Intervention and Reduction (Oviar) ...mentioning
confidence: 99%
“…It can be argued, for instance, that the iteration shown in the model transforms a cyberstalker's behaviour into a routine activity. This seems reasonable given that a number of studies have connected online victimisation with Routine Activity Theory (see, for instance, (Choi & Lee, 2017;Hawdon, Costello, Ratliff, Hall, & Middleton, 2017;Leukfeldt & Yar, 2016;Pyrooz, Decker, & Moule, 2013). As an example Näsi, Räsänen, Kaakinen, Keipi, and Oksanen ( 2016) conducted a study that attempted to predict online victimisation in a group of 3,565 young people aged 15 -30.…”
Section: The Online Victimisation Intervention and Reduction (Oviar) ...mentioning
confidence: 99%
“…What work in this area really highlights is how difficult it is to monitor and police the internet. While there is certainly social control exercised on the internet, there are limits to the effectiveness of this control (see Hawdon et al, 2017 ). Yet, by understanding the patterns of victimization, the underlying causes of perpetration, and the techniques that facilitate cybercrime, we become better armed in designing strategies to prevent it, defend against it, mitigate its adverse effects, and prosecute those who commit it.…”
Section: Cybercrime: Victimization Perpetration and Techniquesmentioning
confidence: 99%
“…We begin with Routine Activity Theory and consider its key dimensions (i.e., proximity to motivated offenders, target suitability, and guardianship) relative to online experiences. Recent work demonstrates that certain online behaviors can bring online users into virtual proximity to hateful materials, as well as render them suitable targets for cyberviolence (Costello et al 2016a,b;Hawdon et al 2017b). First, we take into account several activities that tap into proximity to motivated offenders, or, more specifically, "dangerous" virtual spaces that might contain anti-immigrant hate.…”
Section: Independent Variablesmentioning
confidence: 99%