Offender-victim relationship and offender motivation in the context of indirect cyber abuse: A mixed-method exploratory analysis

Cyber abuse can be executed directly (e.g. by sending derogatory emails or text messages addressed to the victim) or indirectly (e.g. by posting derogatory, private or false information, documents, images or videos about the victim online). This exploratory, mixed-method triangulated study examines...

Full description

Saved in:  
Bibliographic Details
Main Author: Vakhitova, Zarina (Author)
Contributors: Webster, Julianne ; Alston-Knox, Clair
Format: Electronic Article
Language:English
Published: 2018
In: International review of victimology
Year: 2018, Volume: 24, Issue: 3, Pages: 347-366
Online Access: Volltext (Resolving-System)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000naa a22000002 4500
001 168729660X
003 DE-627
005 20200114104032.0
007 cr uuu---uuuuu
008 200114s2018 xx |||||o 00| ||eng c
024 7 |a 10.1177/0269758017743073  |2 doi 
035 |a (DE-627)168729660X 
035 |a (DE-599)KXP168729660X 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Vakhitova, Zarina  |e VerfasserIn  |4 aut 
109 |a Vakhitova, Zarina  |a Vakhitova, Zarina I. 
245 1 0 |a Offender-victim relationship and offender motivation in the context of indirect cyber abuse  |b A mixed-method exploratory analysis  |c Zarina Vakhitova, Julianne Webster, Clair Alston-Knox [und 2 weitere] 
264 1 |c 2018 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Cyber abuse can be executed directly (e.g. by sending derogatory emails or text messages addressed to the victim) or indirectly (e.g. by posting derogatory, private or false information, documents, images or videos about the victim online). This exploratory, mixed-method triangulated study examines cyber abuse crime events with the goal of identifying factors associated with the increased risk of personal victimization from both direct and indirect methods of cyber abuse. First, in-depth qualitative interviews with cyber abuse victims (n = 12) were conducted. The interviews were analysed using thematic analysis to generate hypotheses. These hypotheses were then tested using content analysis of newspaper reports (n = 110) and victims' posts on online forums (n = 91) describing incidents of cyber abuse. Logistic regression using Bayesian Model Averaging analysis revealed that the combination of a prior offender-victim relationship and expressive motivation best predicts the use of indirect methods of cyber abuse, while direct methods of cyber abuse are more likely to occur when the offender does not know the victim and is motivated by instrumental ends. Implications for crime prevention are also discussed. 
700 1 |a Webster, Julianne  |e VerfasserIn  |4 aut 
700 1 |a Alston-Knox, Clair  |e VerfasserIn  |4 aut 
773 0 8 |i Enthalten in  |t International review of victimology  |d Los Angeles, Calif. [u.a.] : Sage, 1989  |g 24(2018), 3, Seite 347-366  |h Online-Ressource  |w (DE-627)573752672  |w (DE-600)2442080-3  |w (DE-576)309208572  |x 2047-9433  |7 nnns 
773 1 8 |g volume:24  |g year:2018  |g number:3  |g pages:347-366 
856 4 0 |u http://dx.doi.org/10.1177/0269758017743073  |x Resolving-System  |3 Volltext 
936 u w |d 24  |j 2018  |e 3  |h 347-366 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3575086338 
LOK |0 003 DE-627 
LOK |0 004 168729660X 
LOK |0 005 20200114104032 
LOK |0 008 200114||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 092   |o n 
LOK |0 689   |a s  |a Cyber abuse 
LOK |0 689   |a s  |a Offender–victim relationship 
LOK |0 689   |a s  |a Offender motivation 
LOK |0 689   |a s  |a Bayesian Model Averaging 
LOK |0 689   |a s  |a Logistic regression 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krub  |a krzo 
ORI |a SA-MARC-krimdoka001.raw