Offender-victim relationship and offender motivation in the context of indirect cyber abuse: A mixed-method exploratory analysis
Cyber abuse can be executed directly (e.g. by sending derogatory emails or text messages addressed to the victim) or indirectly (e.g. by posting derogatory, private or false information, documents, images or videos about the victim online). This exploratory, mixed-method triangulated study examines...
Main Author: | |
---|---|
Contributors: | ; |
Format: | Electronic Article |
Language: | English |
Published: |
2018
|
In: |
International review of victimology
Year: 2018, Volume: 24, Issue: 3, Pages: 347-366 |
Online Access: |
Volltext (Resolving-System) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000naa a22000002 4500 | ||
---|---|---|---|
001 | 168729660X | ||
003 | DE-627 | ||
005 | 20200114104032.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200114s2018 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1177/0269758017743073 |2 doi | |
035 | |a (DE-627)168729660X | ||
035 | |a (DE-599)KXP168729660X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Vakhitova, Zarina |e VerfasserIn |4 aut | |
109 | |a Vakhitova, Zarina |a Vakhitova, Zarina I. | ||
245 | 1 | 0 | |a Offender-victim relationship and offender motivation in the context of indirect cyber abuse |b A mixed-method exploratory analysis |c Zarina Vakhitova, Julianne Webster, Clair Alston-Knox [und 2 weitere] |
264 | 1 | |c 2018 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Cyber abuse can be executed directly (e.g. by sending derogatory emails or text messages addressed to the victim) or indirectly (e.g. by posting derogatory, private or false information, documents, images or videos about the victim online). This exploratory, mixed-method triangulated study examines cyber abuse crime events with the goal of identifying factors associated with the increased risk of personal victimization from both direct and indirect methods of cyber abuse. First, in-depth qualitative interviews with cyber abuse victims (n = 12) were conducted. The interviews were analysed using thematic analysis to generate hypotheses. These hypotheses were then tested using content analysis of newspaper reports (n = 110) and victims' posts on online forums (n = 91) describing incidents of cyber abuse. Logistic regression using Bayesian Model Averaging analysis revealed that the combination of a prior offender-victim relationship and expressive motivation best predicts the use of indirect methods of cyber abuse, while direct methods of cyber abuse are more likely to occur when the offender does not know the victim and is motivated by instrumental ends. Implications for crime prevention are also discussed. | ||
700 | 1 | |a Webster, Julianne |e VerfasserIn |4 aut | |
700 | 1 | |a Alston-Knox, Clair |e VerfasserIn |4 aut | |
773 | 0 | 8 | |i Enthalten in |t International review of victimology |d Los Angeles, Calif. [u.a.] : Sage, 1989 |g 24(2018), 3, Seite 347-366 |h Online-Ressource |w (DE-627)573752672 |w (DE-600)2442080-3 |w (DE-576)309208572 |x 2047-9433 |7 nnns |
773 | 1 | 8 | |g volume:24 |g year:2018 |g number:3 |g pages:347-366 |
856 | 4 | 0 | |u http://dx.doi.org/10.1177/0269758017743073 |x Resolving-System |3 Volltext |
936 | u | w | |d 24 |j 2018 |e 3 |h 347-366 |
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3575086338 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 168729660X | ||
LOK | |0 005 20200114104032 | ||
LOK | |0 008 200114||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21-110 |c DE-627 |d DE-21-110 | ||
LOK | |0 092 |o n | ||
LOK | |0 689 |a s |a Cyber abuse | ||
LOK | |0 689 |a s |a Offender–victim relationship | ||
LOK | |0 689 |a s |a Offender motivation | ||
LOK | |0 689 |a s |a Bayesian Model Averaging | ||
LOK | |0 689 |a s |a Logistic regression | ||
LOK | |0 852 |a DE-21-110 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a krub |a krzo | ||
ORI | |a SA-MARC-krimdoka001.raw |