Analysis of Risk Factors and Stimulating Reasons in the Phenomenon of Cyber Victimization

سال انتشار: 1403
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 110

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IJWR-7-2_006

تاریخ نمایه سازی: 1 مهر 1403

چکیده مقاله:

Due to the popularity of mobile phones and the internet, as well as the development of electronic devices and various software, numerous benefits and facilities have emerged. However, misuse of these tools can lead to serious problems such as deliberate harm to others or cyber victimization. This study utilizes the Everyday Activities Theory and questionnaire techniques to analyze the risk factors and stimulating reasons for cyber victimization among citizens of Kashan City. According to the research findings, there is a significant relationship between independent variables such as online protection, online proximity to motivated offenders, risky offline activities, online attractive targets, deviant lifestyle, and the level of cyber victimization. Among these, the correlation between online proximity to motivated offenders and cyber victimization is greater than other independent variables (r=۰.۵۰۵, sig=۰.۰۰۰). Path analysis results also indicate that the linear combination of the independent variables present in the model can explain ۳۷% of the variance in cyber victimization.

کلیدواژه ها:

نویسندگان

Elham Shafaiimoghadam

Assistant Professor, Department of Social Sciences, Faculty of Humanities and Law, University of Kashan, Kashan, Iran

Zahra Baratiyan

Department of Social Sciences, Faculty of Humanities and Law, University of Kashan, Kashan, Iran

saeedeh Mirzaee

Department of Social Sciences, Faculty of Humanities and Law, University of Kashan, Kashan, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • ] S. Hinduja and J. W. Patchin, “Bullying, Cybervictimization, and ...
  • A. Nocentini, J. Calmaestra, A. Schultze-Krumbholz, H. Scheithauer, R. Ortega, ...
  • B. E. Palladino, A. Nocentini, and E. Menesini, “Online and ...
  • D. Álvarez-García, J. C. Núñez Pérez, A. Dobarro González, and ...
  • M. Malmir and E. Zarrokh, “Prevention of cyber victimization,” Crime ...
  • M. Heydarian Dolatabadi and R. Mazaheri Kuhanestani, “A Comparative Study ...
  • H. Keramati Moez and S. M. Mirkhalili, “Iran's Legislative Criminal ...
  • N. Sajadi and M. Madadi, “Ways of Prevention and the ...
  • F. Moradi Haghgoo, B. Shamloo, and A. Saibani, “The Relationship ...
  • Z. Seydin Borojni, F. Moazen, and A. Beheshti, “Non-criminal prevention ...
  • ENISA, “Youth and Cybersecurity: Trends and Statistics,” European Union Agency ...
  • A. Aliverdinia and F. Ghorbanzade Siahkalroodi, “The Sociological Study of ...
  • R. A. Bonanno and S. Hymel, “Cybervictimization and internalizing difficulties: ...
  • B. W. Reyns, B. Henson, and B. S. Fisher, “Being ...
  • K. Van Royen, K. Poels, W. Daelemans, and H. Vandebosch, ...
  • K. Thomas, C. Grier, and V. Paxson, "Consequences of connectivity: ...
  • Norton, “How to protect personal information online: A ۱۵-step guide,” ...
  • Aura, "How to protect your personal information & privacy online," ...
  • M. C. Martínez-Monteagudo, B. Delgado, J. M. García-Fernández, and C. ...
  • M. Bada, M. A. Sasse, and J. R. C. Nurse, ...
  • S. Wachs and M. F. Wright, “The Moderation of Online ...
  • A. Hayes, “Online deviant lifestyle as an emerging phenomenon in ...
  • B. Smith, "These behaviors are widely conducted through computer websites, ...
  • T. J. Holt and A. M. Bossler, Cybercrime: Causes, Correlates, ...
  • T. C. Pratt, K. Holtfreter, and M. D. Reisig, “Routine ...
  • G. S. Mesch, “Parental mediation, online activities, and Cybervictimization,” CyberPsychology ...
  • M. A. Haji Deh Abadi and E. Salimi, “The Etiology ...
  • T. J. Holt and A. M. Bossler, Cybercrime in Progress: ...
  • P. K. Smith, J. Mahdavi, M. Carvalho, S. Fisher, S. ...
  • W. Hong and J. Y. L. Thong, “Internet Privacy Concerns: ...
  • A. M. Bossler and T. J. Holt, “Online activities, guardianship, ...
  • D. S. Wall, Cybercrime: The Transformation of Crime in the ...
  • D. Cornish and R. V. Clarke, “Opportunities, precipitators, and criminal ...
  • B. W. Reyns, Being Pursued Online: Extent and Nature of ...
  • L. E. Cohen and M. Felson, “Social Change and Crime ...
  • M. Yar, “The Novelty of ‘Cybercrime’: An Assessment in Light ...
  • Sharma, R., Kumar, A. and Masih, S. (۲۰۱۴) Knowledge and ...
  • C. Anderson, The Long Tail: Why the Future of Business ...
  • A. A. Gillespie, Cybercrime: Key issues and debates, ۲nd ed. ...
  • T. J. Holt and A. M. Bossler, “Examining the Applicability ...
  • R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and ...
  • S. Alavi and M. Rakesh, "A Review on Cybersecurity Threats ...
  • K. Choi, “Computer crime victimization and integrated theory: An empirical ...
  • B. S. Fisher, F. T. Cullen, and M. G. Turner, ...
  • B. S. Fisher, J. J. Sloan, F. T. Cullen, and ...
  • E. E. Mustaine and R. Tewksbury, “Sexual assault of college ...
  • E. E. Mustaine and R. Tewksbury, “A routine activity theory ...
  • L. E. Cohen, J. R. Kluegel, and K. C. Land, ...
  • J. R. Dunham and K. M. Monk, “Evolution or de-evolution? ...
  • M. Jami Pour, M. Faraz Pour, and M. Asadi, “Investigating ...
  • C. D. Marcum, Adolescent Online Victimization: A Test of Routine ...
  • D. M. Reynald, “Guardianship in action: Developing a new tool ...
  • G. F. Jensen and D. Brownfield, "Gender, lifestyles, and victimization: ...
  • B. Henson, P. Wilcox, B. W. Reyns, and F. T. ...
  • T. Unal, Y. Gokce, and B. Nussbaum, "Law versus technology: ...
  • S. C. Boerman, S. Kruikemeier, and F. J. Zuiderveen Borgesius, ...
  • نمایش کامل مراجع