898
Views
7
CrossRef citations to date
0
Altmetric
Research Article

Victims and Perpetrators of Cyber Harassment: The Role of Power and Control and the Use of Techniques of Neutralization

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Pages 690-707 | Received 01 Mar 2022, Accepted 03 Jun 2022, Published online: 26 Jun 2022

References

  • Agnew, Robert and Ardith A. R. Peters. 1986. “The Techniques of Neutralization: An Analysis of Predisposing and Situational Factors.” Criminal Justice and Behavior 13(1):81–97.
  • Agnew, Robert. 1994. “The Techniques of Neutralization and Violence.” Criminology 32(4):555–80.
  • Alexander, Kellie and Tara Opsal. 2021. “’That’s Just What You Do’: Applying the Techniques of Neutralization to College Hazing.” Deviant Behavior 42(10):1295–312.
  • Angoff, Harrison and Wesley R. Barnhart. 2021. “Bullying and Cyberbullying among LGBQ and Heterosexual Youth from an Intersectional Perspective: Findings from the 2017 National Youth Risk Behavior Survey.” Journal of School Violence 20(3):274–86.
  • Baum, Katrina, Shannon Catalano, Michael Rand, and Kristina Rose. 2009. Stalking Victimization in the United States. Washington, D.C: Bureau of Justice Statistics.
  • Beck, Connie J. and Chitra Raghavan. 2010. “Intimate Partner Abuse Screening in Custody Mediation: The Importance of Assessing Coercive Control.” Family Court Review 48(3):555–65.
  • Bennett, Diana C., Elyse L. Guran, Michelle C. Ramos, and Gayla Margolin. 2011. “College Students’ Electronic Victimization in Friendships and Dating Relationships: Anticipated Distress and Associations with Risky Behaviors.” Violence and Victims 26(4):410–29.
  • Beran, Tanya N., Christina Rinaldi, David S. Bickham, and Michael Rich. 2012. “Evidence for the Need to Support Adolescents Dealing with Harassment and Cyber-Harassment: Prevalence, Progression, and Impact.” School Psychology International 33(5):562–76.
  • Borrajo, Erika, Manuel Gámez-Guadix, Noemí Pereda, and Esther Calvete. 2015. “The Development and Validation of the Cyber Dating Abuse Questionnaire among Young Couples.” Computers in Human Behavior 48:358–65.
  • Bossler, Adam M., Thomas J. Holt, and David C. May. 2012. “Predicting Online Harassment Victimization among a Juvenile Population.” Youth & Society 44(4):500–23.
  • Bossler, Adam M. 2021. “Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks.” American Journal of Criminal Justice 46(6):1–24.
  • Boyd, Cynthia. 2002. The Characteristics of Female Stalking Perpetrators: Behavior, Psychology, and Violence Risk. San Diego: Alliant International University.
  • Breiding, Matthew J., Sharon G. Smith, Kathleen C. Basile, Mikel L. Walters, Jieru Chen, and Melissa T. Merrick. 2014. “Prevalence and Characteristics of Sexual Violence, Stalking, and Intimate Partner Violence Victimization—National Intimate Partner and Sexual Violence Survey.” CDC: Morbidity and Mortality Weekly Report 63(SS09):1–18.
  • Brewster, Mary P. 2003. “Power and Control Dynamics in Prestalking and Stalking Situations.” Journal of Family Violence 18(4):207–17.
  • Brown, Steven Caldwell. 2016. “Where Do Beliefs about Music Piracy Come from and How are They Shared? An Ethnographic Study.” International Journal of Cyber Criminology 10(1):21–39.
  • Brunton-Smith, Ian and Daniel J. McCarthy. 2016. “Explaining Young People’s Involvement in Online Piracy: An Empirical Assessment Using the Offending Crime and Justice Survey in England and Wales.” Victims & Offenders 11(4):509–33.
  • Burke, Sloane C., Michele Wallen, Karen Vail-Smith, and David Knox. 2011. “Using Technology to Control Intimate Partners: An Exploratory Study of College Undergraduates.” Computers in Human Behavior 27(3):1162–67.
  • Buunk, Abraham and Karlijn Massar. 2021. “Intimate Partner Violence in Nicaragua: The Role of Possessive Jealousy, Intrasexual Competitiveness, Life History, Mate Value, and Stress.” Journal of Interpersonal Violence 36(15–16):8101–23.
  • Byers, Bryan, Benjamin W. Crider, and Gregory K. Biggers. 1999. “Bias Crime Motivation: A Study of Hate Crime and Offender Neutralization Techniques Used against the Amish.” Journal of Contemporary Criminal Justice 15(1):78–96.
  • Chua, Yi Ting and Thomas J. Holt. 2016. “A Cross-National Examination of the Techniques of Neutralization to Account for Hacking Behaviors.” Victims & Offenders 11(4):534–55.
  • Cromwell, Paul and Quint Thurman. 2003. “The Devil Made Me Do It: Use of Neutralizations by Shoplifters.” Deviant Behavior 24(6):535–50.
  • Daspe, Marie-Ève, Marie-Pier Vaillancourt-Morel, and Stéphane Sabourin. 2018. “Facebook Use, Facebook Jealousy, and Intimate Partner Violence Perpetration.” Cyberpsychology, Behavior and Social Networking 21(9):549–55.
  • Davis, Keith E. and Irene H. Frieze. 2000. “Research on Stalking: What Do We Know and Where Do We Go?” Violence and Victims 15(4):473–87.
  • Dijkstra, Pieternel and Dick P. H. Barelds. 2008. “Self and Partner Personality and Responses to Relationship Threats.” Journal of Research in Personality 42(6):1500–11.
  • Dobash, Russell P., R. Emerson Dobash, Kate Cavanagh, and Ruth Lewis. 1998. “Separate and Intersecting Realities: A Comparison of Men’s and Women’s Accounts of Violence against Women.” Violence Against Women 4(4):382–414.
  • Dragiewicz, Molly, Delanie Woodlock, Michael Salter, and Bridget Harris. 2022. ““What’s Mum’s Password?”: Australian Mothers’ Perceptions of Children’s Involvement in Technology-Facilitated Coercive Control.” Journal of Family Violence 37(1):137–49.
  • Dutton, Mary Ann and Lisa A. Goodman. 2005. “Coercion in Intimate Partner Violence: Towarda New Conceptualization.” Sex Roles 52(11–12):743–56.
  • Finn, Jerry. 2004. “A Survey of Online Harassment at A University Campus.” Journal of Interpersonal Violence 19(4):468–83.
  • Fissel, Erica R. and Bradford W. Reyns. 2020. “The Aftermath of Cyberstalking: School, Work, Social, and Health Costs of Victimization.” American Journal of Criminal Justice 45(1):70–87.
  • Hayes, Brittany E. and Phillip M. Kopp. 2021.“Factors Associated with Stalking Duration among a Nationally Representative Sample: Results from the 2010 National Intimate Partner and Sexual Violence Survey.” Violence Against Women .10.1177/10778012211060863. Advance online publication
  • Henry, Nicola and Anastasia Powell. 2018. “Technology-Facilitated Sexual Violence: A Review of Empirical Research.” Trauma, Violence & Abuse 19(2):195–208.
  • Hinduja, Sammer and Justin W. Patchin. 2011. “Electronic Dating Violence: A Brief Guide for Educators and Parents.” Retrieved February 21, 2022. http://cyberbullying.org/electronic_dating_violence_fact_sheet.pdf
  • Holt, Thomas J. and Robert G. Morris. 2009. “An Exploration of the Relationship between MP3 Player Ownership and Digital Piracy.” Criminal Justice Studies 22(4):381–92.
  • Hsieh, Ming-Li, Shun-Yung K. Wang, and Liqun Cao. 2021. “Understanding Cyberbullying Victimization from an Integrated Approach: Offline Preventive Attributes and Behavior Problems Do Matter.” Victims & Offenders 16(4):610–30.
  • Johnson, Michael.P. 2006. “Conflict and Control: Gender Symmetry and Asymmetry in Domestic Violence.” Violence against Women 12(11):1003–18.
  • Kasian, Marilyn and Susan L. Painter. 1992. “Frequency and Severity of Psychological Abuse in a Dating Population.” Journal of Interpersonal Violence 7(3):350–64.
  • Kaukinen, Catherine. 2004. “Status Compatibility, Physical Violence, and Emotional Abuse in Intimate Relationships.” Journal of Marriage and Family 66(2):452–71.
  • Liddick, Don. 2012. “Techniques of Neutralization and Animal Rights Activists.” Deviant Behavior 34(8):618–34.
  • Logan, T. K. and Robert Walker. 2009. “Partner Stalking: Psychological Dominance or “Business as Usual”?” Trauma, Violence & Abuse 10(3):247–70.
  • Mahalik, James R., Etiony Aldarondo, Steven Gilbert-Gokhale, and Erika Shore. 2005. “The Role of Insecure Attachment and Gender Role Stress in Predicting Controlling Behaviors in Men Who Batter.” Journal of Interpersonal Violence 20(5):617–31.
  • Mahoney, Jacqueline, C. Danielle, M. Farrell, and Christopher M. Murphy. 2021. “Prevalence and Predictors of Cyber Psychological Abuse among Adults.” Journal of Family Violence 37(1):151–63.
  • Malsch, Marijke, Jan W. de Keijser, and Sofia E. E. Debets. 2011. “Are Stalkers Recidivists? Repeated Offending by Convicted Stalkers.” Violence and Victims 26(1):3–15.
  • Marganski, Alison and Lisa Melander. 2018. “Intimate Partner Violence Victimization in the Cyber and Real World: Examining the Extent of Cyber Aggression Experiences and itsAssociation with In-Person Dating Violence.” Journal of Interpersonal Violence 33(7):1071–95.
  • Maruna, Shadd and Heith Copes. 2005. “What Have We Learned from Five Decades of Neutralization Research?” Crime and Justice 32:221–320.
  • McKie, Ruth E. 2019. “Climate Change Counter Movement Neutralization Techniques: A Typology to Examine the Climate Change Counter Movement.” Sociological Inquiry 89(2):288–316.
  • Melander, Lisa A. 2010. “College Students’ Perceptions of Intimate Partner CyberHarassment.” Cyberpsychology, Behavior and Social Networking 13(3):263–68.
  • Melton, H. C. 2007. “Stalking in the Context of Intimate Partner Abuse: In the Victims’Words.” Feminist Criminology 2(4):347–63.
  • Miller, Jody, Kristin Carbone-Lopez, and Mikh V. Gunderman. 2015. “Gendered Narratives ofSelf, Addiction, and Recovery among Women Methamphetamine Users.” Pp. 69–95 in Narrative Criminology: Understanding Stories of Crime, edited by L. Presser and S. Sandberg. New York: NYU Press.
  • Minto, Kiara, Barbara M. Masser, and Winnifred R. Louis. 2022. “Identifying Nonphysical Intimate Partner Violence in Relationships: The Role of Beliefs and Schemas.” Journal of Interpersonal Violence 37(5–6):2416–42.
  • Moore, Robert and Elizabeth C. McMullan. 2009. “Neutralizations and Rationalizations of Digital Piracy: A Qualitative Analysis of University Students.” International Journal of Cyber Criminology 3(1):441–51.
  • Mullen, Paul, E. Michelle Pathé, and Rosemary Purcell. 2009. Stalkers and Their Victims. Cambridge, UK: Cambridge University Press.
  • Myhill, Andy. 2015. “Measuring Coercive Control: What Can We Learn from National Population Surveys?” Violence Against Women 21(3):355–75.
  • Nobles, Matt R., Kathleen A. Fox, Nicole Piquero, and Alex R. Piquero. 2009. “Career Dimensions of Stalking Victimization and Perpetration.” Justice Quarterly 26(3):476–503.
  • Nobles, Matt. R., Bradford W. Reyns, Kathleen A. Fox, and Bonnie S. Fisher. 2014. “Protection against Pursuit: A Conceptual and Empirical Comparison of Cyberstalking and Stalking Victimization among A National Sample.” Justice Quarterly 31(6):986–1014.
  • Peskin, Melissa F., Christine M. Markham, Ross Shegog, Jeff R. Temple, Elizabeth R. Baumler, Robert C. Addy, Belinda Hernandex, Paula Cuccaro, Efrat K. Gabay, Melanie Thiel, and Susan T. Emery . 2017. “Prevalence and Correlates of the Perpetration of Cyber Dating Abuse among Early Adolescents.” Journal of Youth and Adolescence 46(2):358–75.
  • Reyns, Bradford W., Billy Henson and Bonnie S. Fisher. 2012. “Stalking in the Twilight Zone: Extent of Cyberstalking Victimization and Offending among College Students.” DeviantBehavior 33(1):1–25. 10.1080/01639625.2010.538364
  • Reyns, Bradford W. 2019. “Online Pursuit in the Twilight Zone: Cyberstalking Perpetration by College Students.” Victims & Offenders 14(2):183–98.
  • Schnurr, Melissa P., Duhita Mahatmya, and Richard A. Basche III. 2013. “The Role of Dominance, Cyber Aggression Perpetration, and Gender on Emerging Adults’ Perpetration of Intimate Partner Violence.” Psychology of Violence 3(1):70–83.
  • Sheridan, Lorraine P., and Tim Grant. 2007. “Is Cyberstalking Different?” Psychology, Crime & Law 13(6):627–40.
  • Siponen, Mikko, Petri Puhakainen, and Anthony Vance. 2020. “Can Individuals’ Neutralization Techniques Be Overcome? A Field Experiment on Password Policy.” Computers & Security 88:1–12.
  • Southworth, Cynthia, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2007. “Intimate Partner Violence, Technology, and Stalking.” Violence AgainstWomen 13(8):842–56.
  • Spitzberg, Brian H. and Gregory Hoobler. 2002. “Cyberstalking and the Technologies of Interpersonal Terrorism.” New Media & Society 4(1):71–92.
  • Stark, Evan and Marianne Hester. 2019. “Coercive Control: Update and Review.” Violence Against Women 25(1):81–104.
  • Steinmetz, Kevin F. and Kenneth D. Tunnell. 2013. “Under the Pixelated Jolly Roger: A Study of On-Line Pirates.” Deviant Behavior 34(1):53–67.
  • Straus, Murray A., Sherry L. Hamby, Sue Boney-McCoy, and David B. Sugarman. 1996. “The Revised Conflict Tactics Scales (CTS2) Development and Preliminary Psychometric Data.” Journal of Family Issues 17(3):283–316.
  • Sykes, Gresham and David Matza. 1957. “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22(6):664–70.
  • Tanha, Marieh, Connie J. Beck, Aurelio José Figueredo, and Chitra Raghavan. 2010. “Sex Differences in Intimate Partner Violence and the Use of Coercive Control as a Motivational Factor for Intimate Partner Violence.” Journal of Interpersonal Violence 25(10):1836–54.
  • Turgeman-Goldschmidt, Orly. 2008. “Meanings that Hackers Assign to Their Being a Hacker.” International Journal of Cyber Criminology 2(2):382–96.
  • van Baak, Carlijn and Brittany E. Hayes. 2018. “Correlates of Cyberstalking Victimization and Perpetration among College Students.” Violence and Victims 33(6):1036–54.
  • van Baak, Carlijn, Brittany E. Hayes, Joshua D. Freilich, and Steven M. Chermak. 2018. “Honor Crimes in the United States and Offenders’ Neutralization Techniques.” Deviant Behavior 39(2):187–202.
  • Vandiver, Donna M., Scott Bowman, and Armando Vega. 2012. “Music Piracy among College Students: An Examination of Low Self-Control, Techniques of Neutralization, and Rational Choice.” The Southwest Journal of Criminal Justice 8(2):92–111.
  • Vasquez, Arthur and Lynne M. Vieraitis. 2016. “’It’s Just Paint’: Street Taggers’ Use of Neutralization Techniques.” Deviant Behavior 37(10):1179–95.
  • Villareal, Andrés. 2007. “Women’s Employment Status, Coercive Control, and Intimate Partner Violence in Mexico.” Journal of Marriage and Family 69(2):418–34.
  • Wick, S. Elizebeth, Craig Nagoshi, Randy Basham, Catheleen Jordan, Youn Kyoung Kim, Anh Phuong Nguyen, and Peter Lehmann. 2017. “Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory.” International Journal of Cyber Criminology 11(1):24–38.
  • Wilson, Chanelle, Lorraine Sheridan, and David Garratt-Reed.2022. “Examining Cyberstalking Perpetration and Victimization: A Scoping Review.” Trauma, Violence & Abuse .10.1177/15248380221082937. Advance online publication
  • Woodlock, Delanie. 2017. “The Abuse of Technology in Domestic Violence and Stalking.” Violence against Women 23(5):584–602.
  • Zweig, Janine M., Meredih Dank, Jennifer Yahner, and Pamela Lachman. 2013. “The Rate of Cyber Dating Abuse among Teens and How It Relates to Other Forms of Teen Dating Violence.” Journal of Youth and Adolescence 42(7):1063–77.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.