Publication Cover
Sociological Spectrum
Mid-South Sociological Association
Volume 42, 2022 - Issue 4-6
656
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Utilizing criminological theories to predict involvement in cyberviolence among the iGeneration

, &

References

  • Agnew, Robert, and Helene Raskin White. 1992. “An Empirical Test of General Strain Theory.” Criminology 30(4):475–500. doi:10.1111/j.1745-9125.1992.tb01113.x.
  • Agnew, Robert. 1985. “A Revised Strain Theory of Delinquency.” Social Forces 64(1):151–67. doi:10.2307/2578977.
  • Agnew, Robert. 1992. “Foundation for a General Strain Theory of Crime and Delinquency.” Criminology 30(1):47–88. doi:10.1111/j.1745-9125.1992.tb01093.x.
  • Akers, Ronald L., and Gary F. Jensen. 2017. “The Empirical Status of Social Learning Theory of Crime and Deviance: The Past, Present, and Future.” Pp. 37–76 in Taking Stock: The Status of Criminological Theory. Advance in Criminological Theory, Volume 15, edited by F. T. Cullen, J.P. Wright, and Kristie R. Blevins. New York, NY: Routledge.
  • Akers, Ronald L., and Wesley G. Jennings. 2019. “The Social Learning Theory of Crime and Deviance.” Pp. 113–29 in Handbook on Crime and Deviance, edited by M. D. Krohn, M. Hendrix, G. P. Hall, and A. J. Lizotte. Cham: Springer.
  • Akers, Ronald L. 1973. Deviant Behavior: A Social Learning Approach. Belmont, CA: Wadsworth.
  • Alson, Reginald J., Debra Harley, and Karen Lenhoff. 1995. “Hirschi’s Social Control Theory: A Sociological Perspective on Drug Abuse among Persons with Disabilities.” The Journal of Rehabilitation 61(4):31.
  • Anderson, Jenny. 2018. “Even Teens are Worried They Spend Too Much Time on Their Phones.” Quartz. https://qz.com/1367506/pew-research-teens-worried-they-spend-too-much-time-on-phones/.
  • Ansary, Nadia S. 2020. “Cyberbullying: Concepts, Theories, and Correlates Informing Evidence-Based Best Practices for Prevention.” Aggression and Violent Behavior 50:101343. doi:10.1016/j.avb.2019.101343.
  • Aricak, Tolga, Sinem Siyahhan, Aysegul Uzunhasanoglu, Sevda Saribeyoglu, Songul Ciplak, Nesrin Yilmaz, and Cemil Memmedov. 2008. “Cyberbullying among Turkish Adolescents.” Cyberpsychology & Behavior 11(3):253–61. doi:10.1089/cpb.2007.0016.
  • Back, Sinchul, Sadhika Soor, and Jennifer LaPrade. 2018. “Juvenile Hackers: An Empirical Test of Self-Control Theory and Social Bonding Theory.” The International Journal of Cybersecurity Intelligence and Cybercrime 1(1):40–55. doi:10.52306/01010518VMDC9371.
  • Baek, Hyunin, Michael M. Losavio, and George E. Higgins. 2016. “The Impact of Low Self-Control on Online Harassment: Interaction with Opportunity.” Journal of Digital Forensics, Security and Law 11(3):6. doi:10.15394/jdfsl.2016.1417.
  • Bauman, S. 2012. “Cyberbullying in the United States.” Pp. 143–79 in Cyberbullying in the Global Playground: Research from International Perspectives. West Sussex, UK: Wiley-Blackwell.
  • Bayraktar, Fatih, Hana Machackova, Lenka Dedkova, Alena Cerna, and Anna Ševčíková. 2015. “Cyberbullying: The Discriminant Factors among Cyberbullies, Cybervictims, and Cyberbully-Victims in a Czech Adolescent Sample.” Journal of Interpersonal Violence 30(18):3192–216. doi:10.1177/0886260514555006.
  • Bernard, Thomas J., and Jeffrey B. Snipes. 1996. “Theoretical Integration in Criminology.” Crime and Justice 20(1):301–48. doi:10.1086/449245.
  • Bernatzky, Colin, Matthew Costello, and James Hawdon. 2021. “Who Produces Online Hate?: An Examination of the Effects of Self-Control, Social Structure, & Social Learning.” American Journal of Criminal Justice 1–20. doi:10.1007/s12103-020-09597-3.
  • Bossler, Adam M., Thomas J. Holt, and David C. May. 2012. “Predicting Online Harassment Victimization among a Juvenile Population.” Youth & Society 44(4):500–23. doi:10.1177/0044118X11407525.
  • Brailovskaia, Julia, Tobias Teismann, and Jürgen Margraf. 2018. “Cyberbullying, Positive Mental Health and Suicide Ideation/Behavior.” Psychiatry Research 267:240–2. doi:10.1016/j.psychres.2018.05.074.
  • Carroll, Annemaree, Francene Hemingway, Julie Bower, Adrian Ashman, Stephen Houghton, and Kevin Durkin. 2006. “Impulsivity in Juvenile Delinquency: Differences among Early-Onset, Late-Onset, and Non-Offenders.” Journal of Youth and Adolescence 35(4):517–27. doi:10.1007/s10964-006-9053-6.
  • Costello, Matthew, and James Hawdon. 2020. “Hate Speech in Online Spaces.” Pp. 1397–416 in The Palgrave Handbook of International Cybercrime and Cyberdeviance. Camden, UK.
  • Costello, Matthew, James Hawdon, and Amanda Cross. 2017. “Virtually Standing up or Standing by? Correlates of Enacting Social Control Online.” International Journal of Criminology and Sociology 6:16–28.
  • Costello, Matthew, James Hawdon, Thomas Ratliff, and Tyler Grantham. 2016. “Who Views Online Extremism? Individual Attributes Leading to Exposure.” Computers in Human Behavior 63:311–20. doi:10.1016/j.chb.2016.05.033.
  • Costello, Matthew, Rebecca Barrett-Fox, Colin Bernatzky, James Hawdon, and Kelly Mendes. 2020. “Predictors of Viewing Online Extremism among America’s Youth.” Youth & Society 52(5):710–27. doi:10.1177/0044118X18768115.
  • Costello, Matthew, S. Salvatore Restifo, and James Hawdon. 2019. “Anti-Immigrant Online Hate and the Rise of White Nationalism.” In Presented at the Annual Meeting of the Northcentral Sociological Association, March 29. Cincinnati, OH: Regular Session.
  • Cullen, Francis T., John Wright, and Kristie Blevins. 2006. "Taking Stock." The Status of Criminological Theory. Roxbury: Transaction.
  • Cullen, Francis T., John Wright, and Kristie Blevins. 2011. Taking Stock: The Status of Criminological Theory. New Brunswick, NJ: Transaction Publishers.
  • David-Ferdon, Corinne, and Marci Feldman Hertz. 2007. “Electronic Media, Violence, and Adolescents: An Emerging Public Health Problem.” The Journal of Adolescent Health : Official Publication of the Society for Adolescent Medicine 41(6):S1–S5. doi:10.1016/j.jadohealth.2007.08.020.
  • Donner, Christopher M., Catherine D. Marcum, Wesley G. Jennings, George E. Higgins, and Jerry Banfield. 2014. “Low Self-Control and Cybercrime: Exploring the Utility of the General Theory of Crime beyond Digital Piracy.” Computers in Human Behavior 34:165–72. doi:10.1016/j.chb.2014.01.040.
  • Europol. 2011. “TE-SAT 2011: “EU Terrorism Situation and Trend Report.” European Police Office.
  • Evans, Joel R., and Anir Mathur. 2005. “The Value of Online Surveys.” Internet Research 15(2):195–219. doi:10.1108/10662240510590360.
  • Federal Bureau of Investigation. 2011. “Domestic Terrorism: Focus on Militia Extremism.” https://www.fbi.gov/news/stories/2011/september/militia_092211
  • Federal Bureau of Investigation. 2019. 2019 Internet Crime Report. Washington, DC: U.S. Government Printing Office.
  • Ford, Jason A., and Lindsey Blumenstein. 2013. “Self-Control and Substance Use among College Students.” Journal of Drug Issues 43(1):56–68. doi:10.1177/0022042612462216.
  • Foxman, Abraham H., and Christopher Wolf. 2013. Viral Hate: Containing Its Spread on the Internet. Macmillan.
  • Fridh, Maria, Martin Lindström, and Maria Rosvall. 2015. “Subjective Health Complaints in Adolescent Victims of Cyber Harassment: Moderation through Support from Parents/Friends–A Swedish Population-Based Study.” BMC Public Health 15(1):1–11. doi:10.1186/s12889-015-2239-7.
  • Gardner, LeGrande, and Donald J. Shoemaker. 1989. “Social Bonding and Delinquency: A Comparative Analysis.” The Sociological Quarterly 30(3):481–99. doi:10.1111/j.1533-8525.1989.tb01532.x.
  • Glaser, Jack, Jay Dixit, and Donald P. Green. 2002. “Studying Hate Crime with the Internet: What Makes Racists Advocate Racial Violence?” Journal of Social Issues 58(1):177–93. doi:10.1111/1540-4560.00255.
  • Goldsmith, Andrew, and Russell Brewer. 2015. “Digital Drift and the Criminal Interaction Order.” Theoretical Criminology 19(1):112–30. doi:10.1177/1362480614538645.
  • Görzig, Anka, and Hana Machackova. 2016. “Cyberbullying in Europe: A Review of Evidence from Cross-National Data.” in A Social-Ecological Approach to Cyberbullying. Hauppauge, NY: Nova Science.
  • Gottfredson, Michael R., and Travis Hirschi. 1990. A General Theory of Crime. Stanford, CA: Stanford University Press.
  • Harrell, Frank E., Kerry L. Lee Jr., and Daniel B. Mark. 1996. “Multivariable Prognostic Models: Issues in Developing Models, Evaluating Assumptions and Adequacy, and Measuring and Reducing Errors.” Statistics in Medicine 15(4):361–87.
  • Harrell, Frank E., Kerry L. Lee Jr., Robert M. Califf, David B. Pryor, and Robert A. Rosati. 1984. “Regression Modelling Strategies for Improved Prognostic Prediction.” Statistics in Medicine 3(2):143–52. doi:10.1002/sim.4780030207.
  • Hawdon, James, and Matthew Costello. 2021. “Learning to Hate: Explaining Participation in Online Extremism.” Pp. 167–82 in Radicalization and Counter-Radicalization (Sociology of Crime, Law, and Deviance, Vol. 25), edited by Derek Silva and Mathieu Deflem. Bingley, West Yorkshire, UK: Emerald Publishing Limited.
  • Hawdon, James, Atte Oksanen, and Peka Räsänen. 2014. “Victims of Online Hate Groups: American Youth’s Exposure to Online Hate Speech.” Pp. 165–82 in The Causes and Consequences of Group Violence: From Bullies to Terrorists. Lanham, MD: Lexington Books.
  • Hawdon, James, Atte Oksanen, and Peka Räsänen. 2017. “Exposure to Online Hate in Four Nations: A Cross-National Consideration.” Deviant Behavior 38(3):254–66. doi:10.1080/01639625.2016.1196985.
  • Hawdon, James, Colin Bernatzky, and Matthew Costello. 2019. “Cyber-Routines, Political Attitudes, and Exposure to Violence-Advocating Online Extremism.” Social Forces 98(1):329–54. doi:10.1093/sf/soy115.
  • Hawdon, James, Matthew Costello, Colin Bernatzky, and Salvatore J. Restifo. 2020. “The Enthymemes of Supporting President Trump: Explaining the Association between Structural Location, Supporting the President, and Agreeing with Online Extremism.” Social Science Computer Review 40(1):24–41.
  • Hawdon, James, Matthew Costello, Rebecca Barrett-Fox, and Colin Bernatzky. 2019. “The Perpetuation of Online Hate: A Criminological Analysis of Factors Associated with Participating in an Online Attack.” Journal of Hate Studies 15(1):157–81. doi:10.33972/jhs.166.
  • Hawdon, James. 1996. “Deviant Lifestyles: The Social Control of Daily Routines.” Youth & Society 28 (2):162–88. doi:10.1177/0044118X96028002002.
  • Hawdon, James. 1999. “Daily Routines and Crime: Using Routine Activities as Measures of Hirschi's Involvement.” Youth & Society 30(4):395–415. doi:10.1177/0044118X99030004001.
  • Hawdon, James. 2012. “Applying Differential Association Theory to Online Hate Groups: A Theoretical Statement.” Finnish Journal of Social Research 5:39–47. doi:10.51815/fjsr.110713.
  • Herring, Susan C. 2002. “Cyber Violence: Recognizing and Resisting Abuse in Online Environments.” Asian Women 14(3):187–212.
  • Higgins, George E. 2007. “Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value.” Control Theory 1(1):23.
  • Higgins, George E., and David A. Makin. 2004. “Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?” Journal of Economic Crime Management 2(2):1–22.
  • Higgins, George E., Brian D. Fell, and Abby L. Wilson. 2006. “Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling.” Criminal Justice Studies 19(1):3–22. doi:10.1080/14786010600615934.
  • Hinduja, Sameer, and Justin W. Patchin. 2007. “Offline Consequences of Online Victimization: School Violence and Delinquency.” Journal of School Violence 6(3):89–112. doi:10.1300/J202v06n03_06.
  • Hinduja, Sameer, and Justin W. Patchin. 2008. “Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization.” Deviant Behavior 29(2):129–56. doi:10.1080/01639620701457816.
  • Hinduja, Sameer, and Justin W. Patchin. 2013. “Social Influences on Cyberbullying Behaviors among Middle and High School Students.” Journal of Youth and Adolescence 42(5):711–22. doi:10.1007/s10964-012-9902-4.
  • Hirschi, Travis. 1969. “A Control Theory of Delinquency.” Pp. 289–305 in Criminology Theory: Selected Classic Readings. England, UK.
  • Holt, Thomas J. 2012. “Exploring the Intersections of Technology, Crime, and Terror.” Terrorism and Political Violence 24(2):337–54. doi:10.1080/09546553.2011.648350.
  • Holt, Thomas J., Adam M. Bossler, and David C. May. 2012. “Low Self-Control, Deviant Peer Associations, and Juvenile Cyberdeviance.” American Journal of Criminal Justice 37(3):378–95. doi:10.1007/s12103-011-9117-3.
  • Holt, Thomas J., Kristie R. Blevins, and Natasha Burkert. 2010. “Considering the Pedophile Subculture Online.” Sexual Abuse 22(1):3–24. doi:10.1177/1079063209344979.
  • Ingram, Jason R., and Sameer Hinduja. 2008. “Neutralizing Music Piracy: An Empirical Examination.” Deviant Behavior 29(4):334–66. doi:10.1080/01639620701588131.
  • Iranzo, Begoña, Sofía Buelga, María-Jesús Cava, and Jessica Ortega-Barón. 2019. “Cyberbullying, Psychosocial Adjustment, and Suicidal Ideation in Adolescence.” Psychosocial Intervention 28(2):75–81. doi:10.5093/pi2019a5.
  • Iwamoto, Derek K., and Andrew P. Smiler. 2013. “Alcohol Makes You Macho and Helps You Make Friends: The Role of Masculine Norms and Peer Pressure in Adolescent Boys’ and Girls’ Alcohol Use.” Substance Use & Misuse 48(5):371–8. doi:10.3109/10826084.2013.765479.
  • Jang, Hyunseok, Juyoung Song, and Ramhee Kim. 2014. “Does the Offline Bully-Victimization Influence Cyberbullying Behavior among Youths? Application of General Strain Theory.” Computers in Human Behavior 31:85–93. doi:10.1016/j.chb.2013.10.007.
  • Johnson, Shane D., and Elizabeth R. Groff. 2014. “Strengthening Theoretical Testing in Criminology Using agent-Based Modeling.” The Journal of Research in Crime and Delinquency 51(4):509–25. doi:10.1177/0022427814531490.
  • Keipi, Teo, Matti Näsi, Atte Oksanen, and Pekka Räsänen. 2016. Online Hate and Harmful Content: Cross-National Perspectives. New York, NY: Taylor & Francis.
  • Kennedy, Jonathan, and Gabriel Weimann. 2011. “The Strength of Weak Terrorist Ties.” Terrorism and Political Violence 23(2):201–12. doi:10.1080/09546553.2010.521087.
  • Kowalski, Robin M., and Susan P. Limber. 2007. “Electronic Bullying among Middle School Students.” The Journal of Adolescent Health 41(6):S22–S30. doi:10.1016/j.jadohealth.2007.08.017.
  • Kowalski, Robin M., Susan P. Limber, and Annie McCord. 2019. “A Developmental Approach to Cyberbullying: Prevalence and Protective Factors.” Aggression and Violent Behavior 45:20–32. doi:10.1016/j.avb.2018.02.009.
  • Krohn, Marvin D., and James L. Massey. 1980. “Social Control and Delinquent Behavior: An Examination of the Elements of the Social Bond.” The Sociological Quarterly 21 (4):529–44. doi:10.1111/j.1533-8525.1980.tb00634.x
  • Krohn, Marvin D., and John M. Eassey. 2014. “Integrated Theories of Crime.” Pp. 1–6 in The Encyclopedia of Theoretical Criminology. Hoboken, NJ. doi:10.1002/9781118517390.wbetc028
  • Le Blanc, Marc. 2020. “On the Future of the Individual Longitudinal Age‐Crime Curve.” Criminal Behaviour and Mental Health 30(4):183–95. doi:10.1002/cbm.2159.
  • Li, Qing. 2007. “New Bottle but Old Wine: A Research of Cyberbullying in Schools.” Computers in Human Behavior 23(4):1777–91. doi:10.1016/j.chb.2005.10.005.
  • Lianos, Helen, and Andrew McGrath. 2018. “Can the General Theory of Crime and General Strain Theory Explain Cyberbullying Perpetration?” Crime & Delinquency 64(5):674–700. doi:10.1177/0011128717714204.
  • Loeber, Rolf, Barbara Menting, Donald R. Lynam, Terri E. Moffitt, Magda Stouthamer-Loeber, Rebecca Stallings, David P. Farrington, and Dustin Pardini. 2012. “Findings from the Pittsburgh Youth Study: Cognitive Impulsivity and Intelligence as Predictors of the Age–Crime Curve.” Journal of the American Academy of Child and Adolescent Psychiatry 51(11):1136–49. doi:10.1016/j.jaac.2012.08.019.
  • Longshore, Douglas. 1998. “Self-Control and Criminal Opportunity: A Prospective Test of the General Theory of Crime.” Social Problems 45(1):102–13. doi:10.2307/3097145.
  • Manning, Christel J. 2019. “Gen Z is the Least Religious Generation: Here’s Why That Could Be a Good Thing.” Pacific Standard. https://psmag.com/ideas/gen-z-is-the-least-religious-generation-heres-why-that-could-be-a-good-thing.
  • Marcum, Catherine D., George E. Higgins, Tina L. Freiburger, and Melissa L. Ricketts. 2014. “Exploration of the Cyberbullying Victim/Offender Overlap by Sex.” American Journal of Criminal Justice 39(3):538–48. doi:10.1007/s12103-013-9217-3.
  • Marczak, Magdalena, and Iain Coyne. 2010. “Cyberbullying at School: Good Practice and Legal Aspects in the United Kingdom.” Australian Journal of Guidance and Counselling 20(2):182–93. doi:10.1375/ajgc.20.2.182.
  • Martins, Maria José D., Ana Margarida Vieira Veiga Simão, Isabel Freire, Ana Paula Caetano, and Armanda Matos. 2017. “Cyber-Victimization and Cyber-Aggression among Portuguese Adolescents: The Relation to Family Support and Family Rules.” Pp. 134–49 in Violence and Society: Breakthroughs in Research and Practice. Hershey, PA: IGI Global.
  • Moffitt, Terrie E. 2018. “Male Antisocial Behaviour in Adolescence and Beyond.” Nature Human Behaviour 2(3):177–86. doi:10.1038/s41562-018-0309-4.
  • Moon, Byongook, and Leanne Fiftal Alarid. 2015. “School Bullying, Low Self-Control, and Opportunity.” Journal of Interpersonal Violence 30(5):839–56. doi:10.1177/0886260514536281.
  • Moon, Byongook, Merry Morash, Cynthia Perez McCluskey, and Hye-Won Hwang. 2009. “A Comprehensive Test of General Strain Theory: Key Strains, Situational-and Trait-Based Negative Emotions, Conditioning Factors, and Delinquency.” Journal of Research in Crime and Delinquency 46(2):182–212. doi:10.1177/0022427808330873.
  • Moule, Richard K., David C. Pyrooz Jr., and Scott H. Decker. 2013. “From ‘What the F#@% is a Facebook?’ to ‘Who Doesn’t Use Facebook?’: The Role of Criminal Lifestyles in the Adoption and Use of the Internet.” Social Science Research 42(6):1411–21.
  • Moule, Richard K., David C. Pyrooz Jr., and Scott H. Decker. 2014. “Internet Adoption and Online Behaviour among American Street Gangs: Integrating Gangs and Organizational Theory.” British Journal of Criminology 54(6):1186–206. doi:10.1093/bjc/azu050.
  • Näsi, Matti, Pekka Räsänen, James Hawdon, Emma Holkeri, and Atte Oksanen. 2015. “Exposure to Online Hate Material and Social Trust among Finnish Youth.” Information Technology & People 28(3):607–22. doi:10.1108/ITP-09-2014-0198.
  • Ngee Sim, Tick, and Sui Fen Koh. 2003. “A Domain Conceptualization of Adolescent Susceptibility to Peer Pressure.” Journal of Research on Adolescence 13(1):57–80. doi:10.1111/1532-7795.1301002.
  • Nivette, Amy, Manuel Eisner, and Denis Ribeaud. 2017. “Developmental Predictors of Violent Extremist Attitudes: A Test of General Strain Theory.” Journal of Research in Crime and Delinquency 54(6):755–90. doi:10.1177/0022427817699035.
  • Oksanen, Atte, Ashley Reichelmann, James Hawdon, Matthew Costello, John Ryan, Catherine Blaya, Vincente Llorent, Peka Räsänen, and Izabela Zych. 2019. “Cyberhate Offending and Religious Activity.” Paper Presented at the American Society of Criminology, November 13, 2019. San Francisco, CA.
  • Ortega, Rosario, Juan Calmaestra, and J. A. Mora-Merchán. 2007. “Cuestionario Cyberbullying.” Universidad de Córdoba, Instrumento no Publicado.
  • Patchin, Justin W., and Sameer Hinduja. 2011. “Traditional and Nontraditional Bullying among Youth: A Test of General Strain Theory.” Youth & Society 43(2):727–51. doi:10.1177/0044118X10366951.
  • Peduzzi, Peter, John Concato, Elizabeth Kemper, Theodore R. Holford, and Alvan R. Feinstein. 1996. “A Simulation Study of the Number of Events per Variable in Logistic Regression Analysis.” Journal of Clinical Epidemiology 49(12):1373–9. doi:10.1016/s0895-4356(96)00236-3.
  • Peterson, Jillian, and James Densley. 2017. “Cyber Violence: What Do We Know and Where Do We Go from Here?” Aggression and Violent Behavior 34:193–200. doi:10.1016/j.avb.2017.01.012.
  • Piquero, Alex R., John MacDonald, Adam Dobrin, Leah E. Daigle, and Francis T. Cullen. 2005. “Self-Control, Violent Offending, and Homicide Victimization: Assessing the General Theory of Crime.” Journal of Quantitative Criminology 21(1):55–71. doi:10.1007/s10940-004-1787-2.
  • Pratt, Travis C., and Francis T. Cullen. 2000. “The Empirical Status of Gottfredson and Hirschi's General Theory of Crime: A Meta‐Analysis.” Criminology 38(3):931–64. doi:10.1111/j.1745-9125.2000.tb00911.x.
  • Pratt, Travis C., Francis T. Cullen, Christine S. Sellers, L. Thomas Winfree, Tamara D. Madensen, Leah E. Daigle, Noelle E. Fearn, and Jacinta M. Gau. 2010. “The Empirical Status of Social Learning Theory: A Meta‐Analysis.” Justice Quarterly 27(6):765–802. doi:10.1080/07418820903379610.
  • Pyrooz, David C., Scott H. Decker, and Richard K. Moule Jr. 2015. “Criminal and Routine Activities in Online Settings: Gangs, Offenders, and the Internet.” Justice Quarterly 32(3):471–99. doi:10.1080/07418825.2013.778326.
  • Quayle, Ethel, and Max Taylor. 2002. “Child Pornography and the Internet: Perpetuating a Cycle of Abuse.” Deviant Behavior 23(4):331–61. doi:10.1080/01639620290086413.
  • Räsänen, Pekka, James Hawdon, Emma Holkeri, Teo Keipi, Matti Näsi, and Atte Oksanen. 2016. “Targets of Online Hate: Examining Determinants of Victimization among Young Finnish Facebook Users.” Violence and Victims 31(4):708–25. doi:10.1891/0886-6708.VV-D-14-00079.
  • Reichelmann, Ashley, James Hawdon, Matt Costello, John Ryan, Catherine Blaya, Vicente Llorent, Atte Oksanen, Pekka Räsänen, and Izabela Zych. 2020. “Hate Knows No Boundaries: Online Hate in Six Nations.” Deviant Behavior 42(9):1100–11.
  • Reyns, Bradford W., Billy Henson, and Bonnie S. Fisher. 2012. “Stalking in the Twilight Xone: Extent of Cyberstalking Victimization and Offending among College Students.” Deviant Behavior 33(1):1–25. doi:10.1080/01639625.2010.538364.
  • Robbins, Reuben N., and Angela Bryan. 2004. “Relationships between Future Orientation, Impulsive Sensation Seeking, and Risk Behavior among Adjudicated Adolescents.” Journal of Adolescent Research 19(4):428–45. doi:10.1177/0743558403258860.
  • Romero, Estrella, M. Angeles Luengo, and Jorge Sobral. 2001. “Personality and Antisocial Behaviour: Study of Temperamental Dimensions.” Personality and Individual Differences 31(3):329–48. doi:10.1016/S0191-8869(00)00139-2.
  • Rosa, H., N. Pereira, R. Ribeiro, P. C. Ferreira, J. P. Carvalho, S. Oliveira, L. Coheur, P. Paulino, A. M. Veiga Simão, I. Trancoso, et al. 2019. “Automatic Cyberbullying Detection: A Systematic Review.” Computers in Human Behavior 93:333–45. doi:10.1016/j.chb.2018.12.021.
  • Sampson, Robert J., and John H. Laub. 1993. Crime in the Making: Pathways and Turning Points through Life. Cambridge, MA: Harvard University Press.
  • Sellers, Christine S., John K. Cochran, and L. Thomas Winfree. 2017. “Social Learning Theory and Courtship Violence: An Empirical Test.” Pp. 109–27 in Social Learning Theory and the Explanation of Crime. New York, NY: Routledge.
  • Ševčíková, Anna, and David Šmahel. 2009. “Online Harassment and Cyberbullying in the Czech Republic: Comparison across Age Groups.” Zeitschrift Für Psychologie/Journal of Psychology 217(4):227–9. doi:10.1027/0044-3409.217.4.227.
  • Simmons, Alicia D., and Lawrence D. Bobo. 2015. “Can Non-Full-Probability Internet Surveys Yield Useful Data? A Comparison with Full-Probability Face-to-Face Surveys in the Domain of Race and Social Inequality Attitudes.” Sociological Methodology 45(1):357–87. doi:10.1177/0081175015570096.
  • Šincek, Daniela, Ivana Duvnjak, and Marija Milić. 2017. “Psychological Outcomes of Cyber-vVolence on Victims, Perpetrators and Perpetrators/Victims.” Hrvatska Revija za Rehabilitacijska Istraživanja 53(2):98–110. doi:10.31299/hrri.53.2.8.
  • Slonje, Robert, and Peter K. Smith. 2008. “Cyberbullying: Another Main Type of Bullying?” Scandinavian Journal of Psychology 49(2):147–54. doi:10.1111/j.1467-9450.2007.00611.x.
  • Smith, Peter K., Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell, and Neil Tippett. 2008. “Cyberbullying: Its Nature and Impact in Secondary School Pupils.” Journal of Child Psychology and Psychiatry, and Allied Disciplines 49(4):376–85. doi:10.1111/j.1469-7610.2007.01846.x.
  • Smith, Peter K., Jess Mahdavi, Manuel Carvalho, and Neil Tippett. 2006. An Investigation into Cyberbullying, Its Forms, Awareness and Impact, and the Relationship between Age and Gender in Cyberbullying. Research Brief No. RBX03-06. London: DfES.
  • The White House. 2015. “FACT SHEET: The White House Summit on Countering Violent Extremism.” https://www.whitehouse.gov/the-press-office/2015/02/18/fact-sheet-white-house-summit-countering-violent-extremism
  • Tynes, Brendesha. 2005. “Children, Adolescents and the Culture of Online Hate.” Pp. 267–89 in Handbook of Children, Culture and Violence. Thousand Oaks, CA: Sage.
  • Ünal, Mustafa Coşar, and Tuncay Ünal. 2018. “Recruitment or Enlistment? Individual Integration into the Turkish Hezbollah.” Turkish Studies 19(3):327–62. doi:10.1080/14683849.2017.1379353.
  • Van Geel, Mitch, Paul Vedder, and Jenny Tanilon. 2014. “Relationship between Peer Victimization, Cyberbullying, and Suicide in Children and Adolescents: A Meta-Analysis.” JAMA Pediatrics 168(5):435–42. doi:10.1001/jamapediatrics.2013.4143.
  • Vazsonyi, Alexander T., Jakub Mikuška, and Erin L. Kelley. 2017. “It's Time: A Meta-Analysis on the Self-Control-Deviance Link.” Journal of Criminal Justice 48(1):48–63. doi:10.1016/j.jcrimjus.2016.10.001.
  • Vittinghoff, Eric, and Charles E. McCulloch. 2007. “Relaxing the Rule of Ten Events per Variable in Logistic and Cox Regression.” American Journal of Epidemiology 165(6):710–8. doi:10.1093/aje/kwk052.
  • Wachs, Sebastian, Matthew Costello, Michelle F. Wright, Katerina Flora, Vassiliki Daskalou, Evdoxia Maziridou, Yeji Kwon, Eun-Yeong Na, Ruthaychonnee Sittichai, Ramakrishna Biswal, et al. 2021. “DNT LET’EM H8 U!”: Applying the Routine Activity Framework to Understand Cyberhate Victimization among Adolescents across Eight Countries.” Computers & Education 160:104026. doi:10.1016/j.compedu.2020.104026.
  • Wansink, Brian. 2001. “The Power of Panels.” Journal of Database Marketing & Customer Strategy Management 8(3):190–4. doi:10.1057/palgrave.jdm.3240034.
  • Wolak, Janis, Kimberly J. Mitchell, and David Finkelhor. 2007. “Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts.” The Journal of Adolescent Health 41(6):S51–S8. doi:10.1016/j.jadohealth.2007.08.019.
  • Womer, Sarah, and Robert J. Bunker. 2010. “Sureños Gangs and Mexican Cartel Use of Social Networking Sites.” Small Wars & Insurgencies 21(1):81–94. doi:10.1080/09592310903561486.
  • Ybarra, Michele L., Kimberly J. Mitchell, Janis Wolak, and David Finkelhor. 2006. “Examining Characteristics and Associated Distress Related to Internet Harassment: Findings from the Second Youth Internet Safety Survey.” Pediatrics 118(4):e1169–77. doi:10.1542/peds.2006-0815.
  • Ybarra, Michele L., and Kimberly J. Mitchell. 2004. “Online Aggressor/Targets, Aggressors, and Targets: A Comparison of Associated Youth Characteristics.” Journal of Child Psychology and Psychiatry, and Allied Disciplines 45(7):1308–16. doi:10.1111/j.1469-7610.2004.00328.x.
  • Zych, Izabela, David P. Farrington, and Maria M. Ttofi. 2019. “Protective Factors against Bullying and Cyberbullying: A Systematic Review of Meta-Analyses.” Aggression and Violent Behavior 45:4–19. doi:10.1016/j.avb.2018.06.008.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.