Analysis of effective factors on cyber victimization among citizen (Case study: Babolian citizens)

Document Type : Original Article

Authors

1 university of mazandaran

2 Azad university,Branch of Ayatollah Amoli.Amol,Iran.

Abstract

One of the areas of criminology in recent decades is victimology. With the spread of cyberspace, we are confronting with a new type of victims called cyber victims. Cyberspace for various reasons allows a variety of crimes and victimization of criminals. It can have unfortunate consequences in the individual and social spheres. Therefore, this study aims to investigate the factors affecting cyber victimization with emphasis on the theory of daily life. This study was conducted on survey and data gathered from 384 citizens of Babol city.by using multi-stage cluster sampling method and questionnaire. The results of the correlation test show that There is a significant relationship between the variables of daily life theory and the experience of victimization in cyberspace (diversity of cyberspace use, high-risk behaviors in cyberspace, physical protection, personal protection, attractiveness, experience of near-by victimization and lack of security and control). At the same time, the relationship between physical support and personal support is the opposite of victimization. Beta = 0.12), cyber security Beta = 0.11 had a significant effect on cyber victims, respectively. The coefficient of determination (R2) is calculated as 0.26%, respectively. This means that 26% of the changes in the "cyber victimization experience" are explained by the variables in the equation

Keywords


  • Reference

    • Alikhah F, Najibi Rabiei M.(2007) Fear of Crime among Women at Public Spaces. Social welfare quarterly; 6 (22) :109-132.URL: http://refahj.uswr.ac.ir/article-1-2102-fa.html.( in Persian)
    • Aliverdinia, Akbar. Alimardini, Mona. (2018) An Emprical Application of Routin Activities Theory in the Study of Students Deviant Behaviors. Journal of Applied Sociology. 28(67): 1-24.(in persion)
    • Ballard, M. E., & Welch, K. M. (2017). Virtual Warfare:Cyberbullying and Cyber-Victimization in MMOG Play. Games and Culture, 12(5), 466-491.:10.1177/1555412015592473
    • Biderman, A. D. (1982). [Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization, Michael J. Hindelang, Michael R. Gottfredson, James Garofalo]. Contemporary Sociology, 11(1), 41-42.:10.2307/2066613
    • Bock, K., Shannon, S., Movahedi, Y., & Cukier, M. (2017, 4-8 Sept. 2017). Application of Routine Activity Theory to Cyber Intrusion Location and Time. Paper presented at the 2017 13th European Dependable Computing Conference (EDCC).
    • Brown, C., Demaray, M., & Fredrick, S. (2014). Cyber victimization in middle school and relations to social emotional outcomes. Computers in Human Behavior, 35, 12–21. doi:10.1016/j.chb.2014.02.014
    • Chan, S., & La Greca, A. (2015). Cyber Victimization and Aggression: Are They Linked with Adolescent Smoking and Drinking? Child & Youth Care Forum, 45. doi:10.1007/s10566-015-9318-x
    • , La Greca, M., & Peugh, L. (2019). Cyber victimization, cyber aggression, and adolescent alcohol use: Short-term prospective and reciprocal associations. J Adolesc, 74, 13-23. doi:10.1016/j.adolescence.2019.05.003
    • Chen, Q., Lo, C. K. M., Zhu, Y., Cheung, A., Chan, K. L., & Ip, P. (2018). Family poly-victimization and cyberbullying among adolescents in a Chinese school sample. Child abuse & neglect, 77, 180-187. doi:10.1016/j.chiabu.2018.01.015
    • Choi, K.-s., & Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. Hum. Behav., 73, 394-402
    • . cyberpolice (2012,2019) Report of cyber crime.https://cyberpolice.ir.(in Persian)
    • Dammert, L., & Malone, M. (2006). Does It Take a Village? Policing Strategies and Fear of Crime in Latin America. Latin American Politics and Society, 48, 27-51. doi:10.1111/j.1548-2456.2006.tb00364.x
    • Erentaitė, R., Lars, & Žukauskienė, R. (2012). Cross-contextual stability of bullying victimization: A person-oriented analysis of cyber and traditional bullying experiences among adolescents. Scandinavian journal of psychology, 53, 181-190. doi:10.1111/j.1467-9450.2011.00935.x
    • (2014) Report. https://www.farsnews.ir.( in Persian)
    • Fateiyan, Maryam. (2017) the survey on global cases of increase of cyber violence against women. Ghanonyar Journal of civil & legal sciences.3(3):29-48. .( in Persian)
    • Halder, D., & Karuppannan, J. (2012). Cyber Crime and the Victimization of Women: Laws, Rights and Regulations.
    • Holt, T., Fitzgerald, S., Bossler, , Chee, G., & Ng, E. (2014). Assessing the Risk Factors of Cyber and Mobile Phone Bullying Victimization in a Nationally Representative Sample of Singapore Youth. International journal of offender therapy and comparative criminology, 60. doi:10.1177/0306624X14554852
    • Hsieh, M.-L., & Wang, S.-Y. K. (2018). Routine activities in a virtual space: A Taiwanese case of an ATM hacking spree.
    • Kalkan, A. (2019). The Level Of Exposure To Cyber Bullying For Employees In Workplace.
    • Kirchhoff, G. F. (2006). Perspectives on Victimology The Science, the Historical Context, the Present. Retrieved from Tokiwa International Victimology Institute.:
    • Leukfeldt, E. R., & Yar, M. (2016). Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis. Deviant Behavior, 37(3), 263-280. doi:10.1080/01639625.2015.1012409
    • Li, Y. a. L., Dongping and Li, Xian and Zhou, Yueyue and Sun, Wenqiang and Wang, Yanhui and Li, Jinfeng. (2018). Cyber victimization and adolescent depression: The mediating role of psychological insecurity and the moderating role of perceived social support. Children and Youth Services Review, 94(c), 10-19. doi: 10.1016/j.childyouth.2018.09.027
    • Longobardi, C., Settanni, M., Fabris, M. A., & Marengo, D. (2020). Follow or be followed: Exploring the links between Instagram popularity, social media addiction, cyber victimization, and subjective happiness in Italian adolescents. Children and Youth Services Review, 113, 104955. doi:https://doi.org/10.1016/j.childyouth.2020.104955
    • Malmir, Mahmod., & Zarrokh, Ehsan. (2011). Prevention of cyber victimization. Crime Prevention Studies, 1389(17), 59-86. .( in Persian)
    • Miri, A., Alikhani, P. (2015). The Victimization of Women in the Virtual Environment in the View of Female Users and Its Impact on Islamic Beliefs and Life Quality of the Users. Journal of Islam and Social Studies, 3(11), 146-180. .( in Persian)
    • Ngo, F., & Paternoster, R. (2011). Cybercrime Victimization: An examination of Individual and Situational level factors. International Journal of Cyber Criminology, 5.
    • Niazi M, Shaterian M, Babaee H, Sedigh Mohammadi M.(2016) Meta-Analysis of Factors Affecting the Fear of Crime in Iranian Studies. Journal of Social Problems of Iran.6(2)195-218. URL: http://jspi.khu.ac.ir/article-1-2509-fa.html.( in Persian)
    • Özdemir, Y. (2014). Cyber victimization and adolescent self‐esteem: The role of communication with parents. Asian Journal of Social Psychology, 17, 255-263.
    • Pereira, F., Spitzberg, B., & Matos, M. (2016). Cyber-harassment victimization in Portugal: Prevalence, fear and help-seeking among adolescents. Computers in Human Behavior, 62, 136-146. doi:10.1016/chb.2016.03.039
    • Ramsey, J., Dilalla, L., & McCrary, M. (2015). Cyber Victimization and Depressive Symptoms in Sexual Minority College Students. Journal of School Violence, 15. doi:10.1080/15388220.2015.1100116
    • Ramezani,Elham. Porebrahimi, Alireza. (2016) individual information security and cyber victimization of user in mass media, second international conference of management and information and communication management.Tehran.Iran.( in Persian)
    • Rismanchi, Nahid (2016) sociological study of effect of victimization (traditional and cyber) as pressure resource on deviance.MA thesis, university of Mazandaran.
    • Rountree, P. W. (1998). A Reexamination of the Crime-Fear Linkage. Journal of Research in Crime and Delinquency, 35(3), 341-372. doi:10.1177/0022427898035003005
    • Schoolcraft, K. (2015). Cyber victimization: An examination of routine activities and self-control theory as indicators of online victimization.
    • Shoham, S. G., Knepper, P., & Kett, M. (2010). nternational Handbook of Victimology (1st ed.): Routledge.
    • Truman, J. (2007). Fear Of Crime And Perceived Risk Of Victimization Among College Students. (Master of Arts). University of Central Florida, Retrieved from http://purl.fcla.edu/fcla/etd/CFE0001622
    • Vale, M., Pereira, F., & Gonçalves, M., Matos, M. (2018). Cyber-aggression in adolescence and internet parenting styles: A study with victims, perpetrators and victim-perpetrators. Children and Youth Services Review, 93, 88-99. doi:10.1016/j.childyouth.2018.06.021
    • Williams, Frank P. Marilyn D. McShane. ( 2009) Criminological Theory, translated by Alireza malek mohamadi,Tehran,Mizan press.( in Persian)
    • Yu, S. (2014). Fear of Cyber Crime among College Students in the United States: An Exploratory Study. International Journal of Cyber Criminology, 8, 36.
    • Jabari, Fahimeh.(2016) the detection and ranking of effective factors on cyber victimization( case study: MA students of benefit university in Mazandaran),MA thesis, Nima university. ( in Persian)