Publication Cover
The Journal of Psychology
Interdisciplinary and Applied
Volume 158, 2024 - Issue 3
1,444
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Careful When You Click? How the Dark Triad of Personality Can Influence the Likelihood of Online Crime Victimization

Pages 238-256 | Received 11 Jan 2023, Accepted 17 Nov 2023, Published online: 06 Dec 2023

References

  • Abell, L., & Brewer, G. (2014). Machiavellianism, self-monitoring, self-promotion and relational aggression on Facebook. Computers in Human Behavior, 36, 258–262. https://doi.org/10.1016/j.chb.2014.03.076
  • Ang, C.-S. (2017). Internet habit strength and online communication: Exploring gender differences. Computers in Human Behavior, 66, 1–6. https://doi.org/10.1016/j.chb.2016.09.028
  • Barnett, M. D., & Sharp, K. J. (2017). Narcissism, gender, and evolutionary theory: The role of private and public self-absorption. Personality and Individual Differences, 104, 326–332. https://doi.org/10.1016/j.paid.2016.08.008
  • Baughman, H. M., Jonason, P. K., & Vernon, P. A. (2016). Relationships between the dark triad and delayed gratification: An evolutionary perspective. Personality and Individual Differences, 101, 467. https://doi.org/10.1016/j.paid.2016.05.087
  • Baughman, H. M., Jonason, P. K., Lyons, M., & Vernon, P. A. (2014). Liar liar pants on fire: Cheater strategies linked to the Dark Triad. Personality and Individual Differences, 71, 35–38. https://doi.org/10.1016/j.paid.2014.07.019
  • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection. An Examination of Routine Activities Theory, 3(1), 21.
  • Bossler, A. M., & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38(3), 227–236. https://doi.org/10.1016/j.jcrimjus.2010.03.001
  • Bossler, A. M., Holt, T. J., & May, D. C. (2012). Predicting online harassment victimization among a juvenile population. Youth & Society, 44(4), 500–523. https://doi.org/10.1177/0044118X11407525
  • Buelow, M. T., & Brunell, A. B. (2014). Facets of grandiose narcissism predict involvement in health-risk behaviors. Personality and Individual Differences, 69, 193–198. https://doi.org/10.1016/j.paid.2014.05.031
  • Byrnes, J. P., Miller, D. C., & Schafer, W. D. (1999). Gender differences in risk taking: A meta-analysis. Psychological Bulletin, 125(3), 367–383. https://doi.org/10.1037/0033-2909.125.3.367
  • Chataway, M. L., & Hart, T. C. (2018). A social-psychological process of “fear of crime” for men and women: Revisiting gender differences from a new perspective. Victims & Offenders, 14(2), 143–164. https://doi.org/10.1080/15564886.2018.1552221
  • Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308–333.
  • Choi, K.-S., & Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. Computers in Human Behavior, 73, 394–402. https://doi.org/10.1016/j.chb.2017.03.061
  • Christie, R., & Geis, F. L. (2013). Studies in machiavellianism. Academic Press.
  • Clodfelter, T. A., Turner, M. G., Hartman, J. L., & Kuhns, J. B. (2010). Sexual harassment victimization during emerging adulthood: A test of routine activities theory and a general theory of crime. Crime & Delinquency, 56(3), 455–481. https://doi.org/10.1177/0011128708324665
  • Cohen, L. E., & Felson, M. (2016). Social change and crime rate trends: A routine activity approach (1979). In Classics in environmental criminology (pp. 203–232). CRC Press.
  • Craker, N., & March, E. (2016). The dark side of Facebook®: The Dark Tetrad, negative social potency, and trolling behaviours. Personality and Individual Differences, 102, 79–84. https://doi.org/10.1016/j.paid.2016.06.043
  • Custers, K., Hall, E. D., Smith, S. B., & McNallie, J. (2017). The indirect association between television exposure and self-protective behavior as a result of worry about crime: The moderating role of gender. Mass Communication and Society, 20(5), 637–662. https://doi.org/10.1080/15205436.2017.1317353
  • DeLiema, M. (2018). Elder fraud and financial exploitation: Application of routine activity theory. The Gerontologist, 58(4), 706–718. https://doi.org/10.1093/geront/gnw258
  • Donner, C. M. (2016). The gender gap and cybercrime: An examination of college students’ online offending. Victims & Offenders, 11(4), 556–577. https://doi.org/10.1080/15564886.2016.1173157
  • Donnelly, L. C., & Calogero, R. M. (2018). The role of stranger harassment experiences in college women’s perceived possibility of gender crimes happening to them. Journal of Applied Social Psychology, 48(3), 165–173. https://doi.org/10.1111/jasp.12497
  • Elkin, M. (2019). Crime in England and Wales—Office for National Statistics. Retrieved September 18, 2019, from https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/crimeinenglandandwales/yearendingmarch2019
  • Errasti, J., Amigo, I., & Villadangos, M. (2017). Emotional uses of Facebook and Twitter: Its relation with empathy, narcissism, and self-esteem in adolescence. Psychological Reports, 120(6), 997–1018. https://doi.org/10.1177/0033294117713496
  • Gentile, B., Miller, J. D., Hoffman, B. J., Reidy, D. E., Zeichner, A., & Campbell, W. K. (2013). A test of two brief measures of grandiose narcissism: The Narcissistic Personality Inventory–13 and the Narcissistic Personality Inventory-16. Psychological Assessment, 25(4), 1120–1136. https://doi.org/10.1037/a0033192
  • Gordts, S., Uzieblo, K., Neumann, C., Van den Bussche, E., & Rossi, G. (2017). Validity of the self-report psychopathy scales (SRP-III full and short versions) in a community sample. Assessment, 24(3), 308–325. https://doi.org/10.1177/1073191115606205
  • Hartung, J., Bader, M., Moshagen, M., & Wilhelm, O. (2022). Age and gender differences in socially aversive (“dark”) personality traits. European Journal of Personality, 36(1), 3–23. https://doi.org/10.1177/0890207020988435
  • Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization.
  • Hosker-Field, A. M., Molnar, D. S., & Book, A. S. (2016). Psychopathy and risk taking: Examining the role of risk perception. Personality and Individual Differences, 91, 123–132. https://doi.org/10.1016/j.paid.2015.11.059
  • Ináncsi, T., Pilinszki, A., Paál, T., & Láng, A. (2018). Perceptions of close relationship through the machiavellians’ dark glasses: Negativity, distrust, self-protection against risk and dissatisfaction. Europe’s Journal of Psychology, 14(4), 806–830. https://doi.org/10.5964/ejop.v14i4.1550
  • Jonason, P. K., & Davis, M. D. (2018). A gender role view of the Dark Triad traits. Personality and Individual Differences, 125, 102–105. https://doi.org/10.1016/j.paid.2018.01.004
  • Jones, D. N., & Paulhus, D. L. (2014). Introducing the Short Dark Triad (SD3): A brief measure of dark personality traits. Assessment, 21(1), 28–41. https://doi.org/10.1177/1073191113514105
  • Kajonius, P. J., & Björkman, T. (2020). Dark malevolent traits and everyday perceived stress. Current Psychology, 39, 2351–2356. https://doi.org/10.1007/s12144-018-9948-x
  • Kalia, D., & Aleem, S. (2017). Cyber victimization among adolescents: examining the role of routine activity theory. Journal of Psychosocial Research, 12(1), 223–232.
  • Kapidzic, S. (2013). Narcissism as a predictor of motivations behind Facebook profile picture selection. Cyberpsychology, Behavior and Social Networking, 16(1), 14–19. https://doi.org/10.1089/cyber.2012.0143
  • Kausel, E. E., Culbertson, S. S., Leiva, P. I., Slaughter, J. E., & Jackson, A. T. (2015). Too arrogant for their own good? Why and when narcissists dismiss advice. Organizational Behavior and Human Decision Processes, 131, 33–50. https://doi.org/10.1016/j.obhdp.2015.07.006
  • Kong, D. T. (2015). Narcissists’ negative perception of their counterpart’s competence and benevolence and their own reduced trust in a negotiation context. Personality and Individual Differences, 74, 196–201. https://doi.org/10.1016/j.paid.2014.10.015
  • Krizan, Z., & Bushman, B. J. (2011). Better than my loved ones: Social comparison tendencies among narcissists. Personality and Individual Differences, 50(2), 212–216. https://doi.org/10.1016/j.paid.2010.09.031
  • Lee, S. A., & Gibbons, J. A. (2017). The Dark Triad and compassion: Psychopathy and narcissism’s unique connections to observed suffering. Personality and Individual Differences, 116(Supplement C), 336–342. https://doi.org/10.1016/j.paid.2017.05.010
  • Lee, S.-Y., Lee, D., Nam, C. R., Kim, D. Y., Park, S., Kwon, J.-G., Kweon, Y.-S., Lee, Y., Kim, D. J., & Choi, J.-S. (2018). Distinct patterns of Internet and smartphone-related problems among adolescents by gender: Latent class analysis. Journal of Behavioral Addictions, 7(2), 454–465. https://doi.org/10.1556/2006.7.2018.28
  • Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. https://doi.org/10.1080/01639625.2015.1012409
  • Louderback, E. R., & Antonaccio, O. (2021). New applications of self-control theory to computer-focused cyber deviance and victimization: A comparison of cognitive and behavioral measures of self-control and test of peer cyber deviance and gender as moderators. Crime & Delinquency, 67(3), 366–398. https://doi.org/10.1177/0011128720906116
  • Lopes, B., & Yu, H. (2017). Who do you troll and Why: An investigation into the relationship between the Dark Triad Personalities and online trolling behaviours towards popular and less popular Facebook profiles. Computers in Human Behavior, 77, 69–76. https://doi.org/10.1016/j.chb.2017.08.036
  • Malachowski, C. C., Martin, M. M., & Vallade, J. I. (2013). An examination of students’ adaptation, aggression, and apprehension traits with their instructional feedback orientations. Communication Education, 62(2), 127–147. https://doi.org/10.1080/03634523.2012.748208
  • Malesza, M., & Ostaszewski, P. (2016). The utility of the Dark Triad model in the prediction of the self-reported and behavioral risk-taking behaviors among adolescents. Personality and Individual Differences, 90, 7–11. https://doi.org/10.1016/j.paid.2015.10.026
  • March, E. (2019). Psychopathy, sadism, empathy, and the motivation to cause harm: New evidence confirms malevolent nature of the Internet troll. Personality and Individual Differences, 141, 133–137. https://doi.org/10.1016/j.paid.2019.01.001
  • Marcum, C. D. (2008). Identifying potential factors of adolescent online victimization for high school seniors. International Journal of Cyber Criminology, 2(2), 346–367.
  • Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410. https://doi.org/10.1080/01639620903004903
  • Marganski, A., & Melander, L. (2018). Intimate partner violence victimization in the cyber and real world: Examining the extent of cyber aggression experiences and its association with in-person dating violence. Journal of Interpersonal Violence, 33(7), 1071–1095. https://doi.org/10.1177/0886260515614283
  • Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior, 92, 139–150. https://doi.org/10.1016/j.chb.2018.11.002
  • Međedović, J., & Petrović, B. (2015). The Dark Tetrad: Structural properties and location in the personality space. Journal of Individual Differences, 36(4), 228–236. https://doi.org/10.1027/1614-0001/a000179
  • Melander, L., & Hughes, V. (2018). College partner violence in the digital age: explaining cyber aggression using routine activities theory. Partner Abuse, 9(2), 158–180. https://doi.org/10.1891/1946-6560.9.2.158
  • Morrison, D., & Gilbert, P. (2001). Social rank, shame and anger in primary and secondary psychopaths. The Journal of Forensic Psychiatry, 12(2), 330–356. https://doi.org/10.1080/09585180110056867
  • Mulder, S. F., & Aken, M. A. G. (2014). Socially anxious children at risk for victimization: The role of personality. Social Development, 23(4), 719–733. https://doi.org/10.1111/sode.12068
  • Navarro, J. N., & Jasinski, J. L. (2012). Going cyber: Using routine activities theory to predict cyberbullying experiences. Sociological Spectrum, 32(1), 81–94. https://doi.org/10.1080/02732173.2012.628560
  • Ngo, F. T., & Paternoster, R. (2011). Cybercrime Victimization: An examination of Individual and Situational level factors. International Journal of Cyber Criminology, 5(1), 773–793.
  • Panlogic. (2020). Cyber crime. https://www.nationalcrimeagency.gov.uk/what-we-do/crime-threats/cyber-crime
  • Paulhus, D. L. (2014). Toward a taxonomy of dark personalities. Current Directions in Psychological Science, 23(6), 421–426. https://doi.org/10.1177/0963721414547737
  • Paulhus, D. L., & Williams, K. M. (2002). The dark triad of personality: Narcissism, machiavellianism and psychopathy. Journal of Research in Personality, 36(6), 556–563. https://doi.org/10.1016/S0092-6566(02)00505-6
  • Podaná, Z. (2017). Violent victimization of youth from a cross-national perspective: An analysis inspired by routine activity theory. International Review of Victimology, 23(3), 325–340. https://doi.org/10.1177/0269758017695606
  • Porter, S., Bhanwer, A., Woodworth, M., & Black, P. J. (2014). Soldiers of misfortune: An examination of the Dark Triad and the experience of schadenfreude. Personality and Individual Differences, 67, 64–68. https://doi.org/10.1016/j.paid.2013.11.014
  • Rahafar, A., Randler, C., Castellana, I., & Kausch, I. (2017). How does chronotype mediate gender effect on Dark Triad? Personality and Individual Differences, 108, 35–39. https://doi.org/10.1016/j.paid.2016.12.002
  • Reyns, B. W., Henson, B., & Fisher, B. S. (2016). Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. Journal of Contemporary Criminal Justice, 32(2), 148–168. https://doi.org/10.1177/1043986215621378
  • Rim, Y. (1966). Machiavellianism and decisions involving risk. The British Journal of Social and Clinical Psychology, 5(1), 30–36. https://doi.org/10.1111/j.2044-8260.1966.tb00952.x
  • Sakalaki, M., Richardson, C., & Thépaut, Y. (2007). Machiavellianism and economic opportunism. Journal of Applied Social Psychology, 37(6), 1181–1190. https://doi.org/10.1111/j.1559-1816.2007.00208.x
  • Seybert, H., Lööf, A. (2010). Internet usage in 2010 – Households and Individuals. Eurostat Data in focus 50 -2010. http://www.osimga.gal/export/sites/osimga/gl/documentos/d/2010_12_20_eurostat_internet_usage_in_2010_households_and_individuals.pdf
  • Szabó, E., & Jones, D. N. (2019). Gender differences moderate Machiavellianism and impulsivity: Implications for Dark Triad research. Personality and Individual Differences, 141, 160–165. https://doi.org/10.1016/j.paid.2019.01.008
  • Tsoukas, A., & March, E. (2018). Predicting short- and long-term mating orientations: The role of sex and the dark tetrad. Journal of Sex Research, 55(9), 1206–1218. https://doi.org/10.1080/00224499.2017.1420750
  • Vakhitova, Z. I., Reynald, D. M., & Townsley, M. (2016). Toward the adaptation of routine activity and lifestyle exposure theories to account for cyber abuse victimization. Journal of Contemporary Criminal Justice, 32(2), 169–188. https://doi.org/10.1177/1043986215621379
  • van Geel, M., Goemans, A., Toprak, F., & Vedder, P. (2017). Which personality traits are related to traditional bullying and cyberbullying? A study with the Big Five, Dark Triad and sadism. Personality and Individual Differences, 106, 231–235. https://doi.org/10.1016/j.paid.2016.10.063
  • Vogel, V. d., & Lancel, M. (2016). Gender Differences in the Assessment and Manifestation of Psychopathy: Results From a Multicenter Study in Forensic Psychiatric Patients. International Journal of Forensic Mental Health, 15(1), 97–110. https://doi.org/10.1080/14999013.2016.1138173
  • Walker, K., & Sleath, E. (2017). A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media. Aggression and Violent Behavior, 36, 9–24. https://doi.org/10.1016/j.avb.2017.06.010
  • Weber, M., Aufenanger, S., Dreier, M., Quiring, O., Reinecke, L., Wölfling, K., Müller, K. W., & Beutel, M. E. (2018). Gender differences in escapist uses of sexually explicit internet material: Results from a German probability sample. Sexuality & Culture, 22(4), 1171–1188. https://doi.org/10.1007/s12119-018-9518-2
  • Williams, M. L. (2015). Guardians upon high: An application of routine activities theory to online identity theft in Europe at the country and individual level. British Journal of Criminology, 56(1), 21–48. https://doi.org/10.1093/bjc/azv011
  • Yaghoobi, A., Mohammadzade, S., Chegini, A. A., Vasel, M. Y., & Paidar, M. R. Z. (2016). The relationship between attachment styles, self-monitoring and cybercrime in social network users. International Journal of High Risk Behaviors & Addiction, 5(3), 1–4.
  • Yao, X., Zhang, F., Yang, T., Lin, T., Xiang, L., Xu, F., & He, G. (2019). Psychopathy and decision-making: Antisocial factor associated with risky decision-making in offenders. Frontiers in Psychology, 10, 166. https://doi.org/10.3389/fpsyg.2019.00166