935
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Digital poly-victimization: The increasing importance of online crime and harassment to the burden of victimization

, PhD, , BS, , BA, , PhD, , PhD & , MS
Pages 382-398 | Received 27 Apr 2013, Accepted 30 Sep 2013, Published online: 16 Mar 2018

References

  • Anderson, K. (2006). Who are the victims of identity theft? The effect of demographics. Journal of Public Policy & Marketing, 25(2), 160–171.
  • Banyard, V., Hamby, S., & Grych, J. (2017). Health effects of adverse childhood events: Identifying promising protective factors at the intersection of mental and physical well-being. Child Abuse & Neglect, 65, 88–98.
  • Battista, J., & Almond, R. (1973). The development of meaning in life. Psychiatry, 36(4), 409–427.
  • Bennett, D. A. (2001). How can I deal with missing data in my study? Australian and New Zealand Journal of Public Health, 25(5), 464–469.
  • Bernstein, D. P., Ahluvalia, T., Pogge, D., & Handelsman, L. (1997). Validity of the childhood trauma questionnaire in an adolescent psychiatric population. Journal of the American Academy of Child & Adolescent Psychiatry, 36(3), 340–348.
  • Briere, J. (1996). Trauma Symptoms Checklist for Children (TSCC): Professional manual. Odessa, FL: Psychological Assessent Resources.
  • CDC, C. F. D. C. A. P. (2000). Measuring healthy days: Population assessment of health-related quality of life. Retrieved from: http://www.cdc.gov/hrqol/pdfs/mhd.pdf
  • Diener, E., Emmons, R., Larsen, R., & Griffin, S. (1985). The satisfaction with life scale. Journal of Personality Assessment, 49(1), 71–75.
  • Duggan, M. (2017). Online harassment. Washington, DC: Pew Research Center. Retrieved from http://assets.pewresearch.org/wp-content/uploads/sites/14/2017/07/10151519/PI_2017.07.11_Online-Harassment_FINAL.pdf
  • Federal Trade Commission. (2017). Consumer sentinel network data book for January - December 2016. Retrieved from https://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-january-december-2016/csn_cy-2016_data_book.pdf
  • Felitti, V. J., Anda, R. F., Nordenberg, D., Williamson, D. F., Spitz, A. M., Edwards, V., … Marks, J. S. (1998). Relationship of childhood abuse and household dysfunction to many of the leading causes of death in adults: The adverse childhood experiences (ACE) study. American Journal of Preventative Medicine, 14(4), 245–258.
  • Finkelhor, D., Ormrod, R. K., Turner, H. A., & Hamby, S. L. (2005). Measuring poly-victimization using the juvenile victimization questionnaire. Child Abuse & Neglect, 29(11), 1297–1312.
  • Finkelhor, D., Turner, H., Hamby, S.L., & Ormrod, R. (2011). Polyvictimization: Children’s exposure to multiple types of violence, crime, and abuse. Washington, DC: Office of Juvenile Justice and Delinquency Prevention, U.S. Department of Justice.
  • Finkelhor, D., Turner, H., Ormrod, R., Hamby, S., & Kracke, K. (2009). Children’s exposure to violence: A comprehensive national survey.Bulletin. Washington, DC: U.S. Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention.
  • Ford, J. D., Elhai, J. D., Connor, D. F., & Frueh, C. (2010). Poly-victimization and risk of posttraumatic, depressive, and substance use disorders and involvement in delinquency in a national sample of adolescents. Journal of Adolescent Health, 46, 545–552. doi:10.1016/j.jadohealth.2009.11.212
  • Ford, J. D., Grasso, D. J., Hawke, J., & Chapman, J. F. (2013). Poly-victimization among juvenile justice-involved youths. Child Abuse & Neglect, 37(10), 788–800.
  • González, E., & Orgaz, B. (2014). Problematic online experiences among Spanish college students: Associations with internet use characteristics and clinical symptoms. Computers in Human Behavior, 31, 151–158. doi:10.1016/j.chb.2013.10.038
  • Hamby, S. (2017). On defining violence, and why it matters. Psychology of Violence, 7(2), 167–180.
  • Hamby, S., Banyard, V., Grych, J., Smith, A., & Taylor, E. (2017). Subjective well-being scale. Monteagle, TN: Life Paths Appalachian Research Center.
  • Hamby, S., Blount, Z., Taylor, E., & Smith, A. (2017). Family well-being scale. Monteagle, TN: Life Paths Appalachian Research Center.
  • Hamby, S., Finkelhor, D., Ormrod, R. K., & Turner, H. A. (2004). The juvenile victimization questionnaire (JVQ): Administration and scoring manual. Durham, NH: Crimes Against Children Research Center.
  • Hamby, S., & Grych, J. (2013). The web of violence: Exploring connections among forms of interpersonal violence and abuse. New York, NY: Springer.
  • Hamby, S., Grych, J., & Banyard, V. (2017). Resilience portfolios and poly-strengths: Identifying protective factors associated with thriving after adversity. Psychology of Violence. Advanced online publication.
  • Hamby, S., Smith, A., & Taylor, E. (2017). Digital poly-victimization scale. Monteagle, TN: Life Paths Appalachian Research Center.
  • Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide Research, 14(3), 206–221. doi:10.1080/13811118.2010.494133
  • Internet Crime Complaint Center. (2014). 2014 Internet crime report. Retrieved from https://www.fbi.gov/news/news_blog/2014-ic3-annual-report
  • Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94–100.
  • Jones, L., Mitchell, K., & Finkelhor, D. (2012). Trends in youth internet victimization: Findings from three youth internet safety surveys 2000-2010. Journal of Adolescent Health, 50(2), 179–186.
  • Kowalski, R. M., & Limber, S. P. (2013). Psychological, physical, and academic correlates of cyberbullying and traditional bullying. Journal of Adolescent Health, 53, S13–S20. doi:10.1016/j.jadohealth.2012.09.018
  • Mitchell, K., Finkelhor, D., Jones, L., & Wolak, J. (2012). Prevalence and characteristics of youth sexting: A national study. Pediatrics, 129(1), 13–20.
  • Mitchell, K., Jones, L., Turner, H., Shattuck, A., & Wolak, J. (2016). The role of technology in peer harassment: does it amplify harm for youth? Psychology of Violence, 6(2), 193–204. doi:10.1037/a0039317
  • Mitchell, K., & Jones, L. M. (2015). Cyberbullying and bullying must be studied within a broader peer victimization framework. Journal of Adolescent Health, 56, 473–474. doi:10.1016/j.jadohealth.2015.02.005
  • Mitchell, K., Sabina, C., Finkelhor, D., & Wells, M. (2009). Index of problematic online experiences: Item characteristics and correlation with negative symptomatology. Cyberpsychology & Behavior, 12(6), 707–711.
  • Natarajan, D., & Caramaschi, D. (2010). Animal violence demystified. Frontiers in Behavioral Neuroscience, 4(9), 1–16.
  • Pavot, W., & Diener, E. (1993). Review of the satisfaction with life scale. Psychological Assessment, 5(2), 164–172.
  • Pearlin, L., & Schooler, C. (1978). The structure of coping. Journal of Health & Social Behavior, 19, 2–21.
  • Pew Research Center. (2017). Internet/Broadband fact sheet. Retrieved from http://www.pewinternet.org/fact-sheet/internet-broadband/
  • Plass, P. S. (2014). Property crime victimizations in childhood: A retrospective study. Journal of Human Behavior in the Social Environment, 24(4), 448–461.
  • Reyns, B. (2013). Online routine and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime & Deliquency, 50(2), 216–238.
  • Rosenberg, M. (1965). Society and the adolescent self-image. Princeton, NJ: Princeton University Press.
  • Ross, J. M., Drouin, M., & Coupe, A. (2016). Sexting coercion as a component of intimate partner polyvictimization. Journal of Interpersonal Violence. doi:10.1177/0886260516660300
  • Smith, A. (2013). Technology adoption by lower income populations. Retrieved from http://www.pewinternet.org/files/old-media/Files/Presentations/2013/APHSA%20Aaron%20Smith%20Presentation_PDF.pdf
  • Smith, C., & Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral patterns. MIS Quarterly, 34(3), 613–643.
  • Smith, P., Mahdavi, J., Carvalho, M., & Tippett, N. (2006). An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying (RBX03-06)London: DIES.
  • Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. The Journal of Child Psychology and Psychiatry, 49(4), 376–385. doi:10.1111/j.1469-7610.2007.01846.x
  • Staude-Müller, F., Hansen, B., & Voss, M. (2012). How stressful is online victimization? Effects of victim’s personality and properties of the incident. European Journal of Developmental Psychology, 9(2), 260–274.
  • Suler, J. (2004). The online disinhibition effect. Cyberpsychology & Behavior, 7(3), 321–326.
  • Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890–911.
  • Turner, H., Finkelhor, D., Ormrod, R. K., Hamby, S., Leeb, R., Mercy, J., & Holt, M. (2012). Family context, victimization, and child trauma symptoms: Variations in safe, stable, and nurturing relationships during early and middle childhood. American Journal of Orthopsychiatry, 82(2), 209–219.
  • Woodard, C. (2011). American nations: A history of the eleven rival regional cultures of North America. New York, NY: Penguin.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.