3,780
Views
110
CrossRef citations to date
0
Altmetric
Articles

The unintended consequences of digital technology: exploring the relationship between sexting and cybervictimization

, , &
Pages 1-17 | Published online: 07 Dec 2011

References

  • Agresti , A. 2002 . Categorical data analysis , 2nd ed , Hoboken , NJ : John Wiley & Sons .
  • Barak , A. 2005 . Sexual harassment on the Internet . Social Science Computer Review , 23 : 77 – 92 .
  • Bossler , A. M. and Holt , T. J. 2009 . On-line activities, guardianship, and malware infection: an examination of routine activities theory . International Journal of Cyber Criminology , 3 : 400 – 420 .
  • Bossler , A. M. and Holt , T. J. 2010 . The effect of self-control on victimization in the cyberworld . Journal of Criminal Justice , 38 : 227 – 236 .
  • Bryant , C. D. 1984 . Odum's concept of the technicways: some reflections on an underdeveloped sociological notion . Sociological Spectrum , 4 : 115 – 142 .
  • Choi , K. 2008 . Computer crime victimization and integrated theory: an empirical assessment . International Journal of Cyber Criminology , 2 : 308 – 333 .
  • Dillman , D. A. 2007 . Mail and Internet surveys: the tailored design method , Hoboken , NJ : Wiley .
  • Dillman , D. A. 2009 . Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet . Social Science Research , 38 : 1 – 18 .
  • Eraker , E. C. 2010 . Stemming sexting: sensible legal approaches to teenagers’ exchange of self-produced pornography . Berkeley Technology Law Journal , 25 : 555 – 596 .
  • Fisher , B. S. , Sloan , J. J. , Cullen , F. T. and Lu , C. 1998 . Crime in the ivory tower: level and sources of student victimization . Criminology , 36 : 671 – 710 .
  • Gottfredson , M. R. and Hirschi , T. 1990 . A general theory of crime , Stanford , CA : Stanford University Press .
  • Grasmick , H. G. 1993 . Testing the core empirical implications of Gottfredson and Hirschi's general theory of crime . Journal of Research in Crime and Delinquency , 30 : 5 – 29 .
  • Henson , B. 2010 . Gender, adolescent lifestyles, and violent victimization: implications for routine activity theory . Victims and Offenders , 5 : 303 – 328 .
  • Hindelang , M. J. 1976 . Criminal victimization in eight American cities: a descriptive analysis of common theft and assault , Cambridge , MA : Ballinger .
  • Hindelang , M. J. , Gottfredson , M. R. and Garofalo , J. 1978 . Victims of personal crime: an empirical foundation for a theory of personal victimization , Cambridge , MA : Ballinger .
  • Hinduja , S. and Patchin , J. W. 2010 . Sexting: a brief guide for educators and parents [online]. Cyberbullying Research Center. Available from: http://www.cyberbullying.us [Accessed 5 Nov 2010]
  • Holt , T. J. and Bossler , A. M. 2009 . Examining the applicability of lifestyle-routine activities theory for cybercrime victimization . Deviant Behavior , 30 : 1 – 25 .
  • Jaishankar , K. 2009 . Sexting: a new form of victimless crime? . International Journal of Cyber Criminology , 3 : 21 – 25 .
  • Jensen , G. F. and Brownfield , D. 1986 . Gender, lifestyles, and victimization: beyond routine activity . Violence and Victims , 1 : 85 – 99 .
  • Lauritsen , J. L. , Laub , J. H. and Sampson , R. J. 1992 . Conventional and delinquent activities: implications for the prevention of violent victimization among adolescents . Violence and Victims , 7 : 91 – 108 .
  • Lauritsen , J. L. , Sampson , R. J. and Laub , J. H. 1991 . The link between offending and victimization among adolescents . Criminology , 29 : 265 – 292 .
  • Lenhart , A. 2009 . Teens and sexting: how and why minor teens are sending sexually suggestive nude or nearly nude images via text messaging , Washington , DC : Pew Internet & American Life Project .
  • Ling , R. and Yttri , B. 2005 . “ Control, emancipation, and status: the mobile telephone in teen's parental and peer group control relationships ” . In New information technologies at home: the domestic impact of computing and telecommunications , Edited by: Kraut , R. , Brynin , M. and Kiesler , S. 219 – 235 . Oxford : Oxford University Press .
  • Marcum , C. D. , Ricketts , M. L. and Higgins , G. E. 2010 . Assessing sex experiences of online victimization: examination of adolescent online behaviors using routine activity theory . Criminal Justice Review , 35 : 412 – 437 .
  • Miller v. , Mitchell . 598 F.3d 139 (3rd Cir. 2010)
  • Moore , R. , Guntupalli , N. T. and Lee , T. 2010 . Parental regulation and online activities: examining factors that influence a youth's potential to become a victim of online harassment . International Journal of Cyber Criminology , 4 : 685 – 698 .
  • Mustaine , E. E. and Tewksbury , R. 1998 . Predicting risks of larceny theft victimization: a routine activity analysis using refined lifestyles measures . Criminology , 36 : 829 – 858 .
  • National Campaign to Prevent Teen and Unplanned Pregnancy and CosmoGirl.com . 2008 . Sex and tech: results from a survey of teens and young adults , Washington , DC : National Campaign to Prevent Teen and Unplanned Pregnancy .
  • Odum , H. W. 1937 . Notes on the technicways in contemporary society . American Sociological Review , 2 : 336 – 346 .
  • Pratt , T. C. and Cullen , F. T. 2000 . The empirical status of Gottfredson and Hirschi's general theory of crime: a meta-analysis . Criminology , 38 : 931 – 964 .
  • Reyns , B. W. 2010a . Being pursued online: the extent and nature of cyberstalking victimization from a lifestyle/routine activities perspective Dissertation (PhD). University of Cincinnati
  • Reyns , B. W. 2010b . A situational crime prevention approach to cyberstalking victimization: preventive tactics for Internet users and online place managers . Crime Prevention and Community Safety , 12 : 99 – 118 .
  • Reyns , B. W. , Henson , B. and Fisher , B. S. 2011 . Being pursued online: applying cyberlifestyle-routine activities theory to cyberstalking victimization . Criminal Justice and Behavior , 38 : 1149 – 1169 .
  • Schreck , C. J. 1999 . Criminal victimization and low self-control: an extension and test of a general theory of crime . Justice Quarterly , 16 : 633 – 654 .
  • Schreck , C. J. , Stewart , E. A. and Osgood , D. W. 2008 . A reappraisal of the overlap of violent offenders and victims . Criminology , 46 : 871 – 906 .
  • Taylor , R. W. 2011 . Digital crime and digital terrorism , 2nd ed , Boston : Prentice Hall .
  • Truman , J. L. and Rand , M. J. 2010 . Criminal victimization, 2009 , Washington , DC : US Department of Justice .
  • van Wilsem , J. 2011 . Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization . European Journal of Criminology , 8 : 115 – 127 .
  • Vance , R. B. 1972 . Howard Odum's technicways: a neglected lead in American sociology . Social Forces , 50 : 456 – 461 .
  • Walker , J. T. and Moak , S. C. 2010 . Child's play or child pornography: the need for better laws regarding sexting . ACJS Today , 35 : 1 – 9 .
  • Wastler , S. 2010 . The harm in ‘sexting’?: analyzing the constitutionality of child pornography statutes that prohibit the voluntary production, possession, and dissemination of sexually explicit images by teenagers . Harvard Journal of Law and Gender , 33 : 687 – 702 .
  • Wolak , J. , Mitchell , K. and Finkelhor , D. 2006 . Online victimization of youth: five years later , Washington , DC : National Center for Missing and Exploited Children .
  • Wolfgang , M. E. 1958 . Patterns in criminal homicide , New York : Wiley .
  • Ybarra , M. L. and Mitchell , K. J. 2008 . How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs . Pediatrics , 120 : 350 – 357 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.