Publication Cover
Victims & Offenders
An International Journal of Evidence-based Research, Policy, and Practice
Volume 15, 2020 - Issue 1
2,612
Views
17
CrossRef citations to date
0
Altmetric
Original Articles

Exploring the Needs of Victims of Cyber-dependent and Cyber-enabled Crimes

ORCID Icon, &

References

  • Bossler, A., Holt, T. J., Cross, C., & Burruss, G. W. (2019). Policing fraud in England and Wales: Examining constables’ and sergeants’ online fraud preparedness. Security Journal. doi:10.1057/s41284-019-00187-5
  • Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. School Psychology International, 34(6), 575–612. doi:10.1177/0143034313479697
  • CBS. (2017). ICT, kennis en economie. [IT, knowledge and economy]. Den Haag, The Netherlands: Centraal Bureau voor de Statistiek.
  • Chibbaro, J. S. (2007). School counselors and the cyberbully: Interventions and implications. Professional School Counseling, 11(1), 65–68. doi:10.5330/PSC.n.2010-11.65
  • Cross, C. A. (2016). They’re very lonely’: Understanding the fraud victimisation of seniors. International Journal for Crime, Justice and Social Democracy, 60–75. doi:10.5204/ijcjsd.v5i4.268
  • Cross, C. A., Richards, K. M., & Smith, R. (2016). The reporting experiences and support needs of victims of online fraud. Trends and Issues in Crime and Criminal Justice, 1–14. Retrieved from https://aic.gov.au/publications/tandi/tandi518
  • Goldworthy, T., & Raj, M. (2015). Stopping the stalker: Victim responses to stalking. In M.-C. Patron & S. S. Holden (Eds.), Victim victorious: From fire to Phoenix (pp. 15–34). Hauppauge, NY: Nova Science Publishers.
  • Harrell, E., & Langton, L. (2013). Victims of identity theft, 2012 (NCJ 243779). Washington, DC: Bureau of Justice Statistics.
  • Huang, L. (2018). Unmet needs and service satisfaction of victim support for the direct and indirect victims of serious violence: Results from a cross-sectional survey in Taiwan. PLoS One, 13(2), e0192905. doi:10.1371/journal.pone.0192905
  • Jansen, J., & Leukfeldt, E. R. (2018). Coping with cybercrime victimization: An exploratory study into impact and change. Journal of Qualitative Criminal Justice & Criminology, 2(2), 205–228.
  • Kochenderfer-Ladd, B., & Pelletier, M. E. (2008). Teachers’ views and beliefs about bullying: Influences on classroom management strategies and students’ coping with peer victimization. Journal of School Psychology, 46(1), 431–453. doi:10.1016/j.jsp.2007.07.005
  • Kool, R. (2014). Alles naar wens? Observaties naar aanleiding van het conceptwetsvoorstel ter aanvulling van het spreekrecht voor slachtoffers en nabestaanden in het strafproces. Tijdschrift Voor Herstelrecht, 14(3), 9–24. doi:10.5553/TvH/1568654X2014014003003
  • Korkodeilou, J. (2014). Dealing with the unknown: Learning from stalking victims’ experiences. Crime Prevention and Community Safety, 16, 253. doi:10.1057/cpcs.2014.10
  • Korkodeilou, J. (2017, January). ‘No place to hide’: Stalking victimisation and its psycho-social effects. International Review of Victimology, 23(1), 17–32. doi:10.1177/0269758016661608
  • Leukfeldt, E. R. (Ed.). (2017). Research agenda: The human factor in cybercrime and cybersecurity. The Hague, The Netherlands: Eleven International Publishers.
  • Leukfeldt, E. R., Notté, R. J., & Malsch, M. (2018). Slachtofferschap van online criminaliteit. Een onderzoek naar behoeften, gevolgen en verantwoordlijkheden na slachtofferschap van cybercrime en gedigitaliseerde criminaliteit [Victims of online crimes. A study into the needs, consequences and responsibilities after victimization of cyber enabled and cyber dependent crimes]. Den Haag, The Netherlands: Ministerie van Justitie en Veiligheid.
  • Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime. A theoretical and empirical analysis. Deviant Behavior, 37, 263–280. doi:10.1080/01639625.2015.1012409
  • Leukfeldt, E. R., Veenstra, S., & Stol, W. P. (2013). High Volume Cyber Crime and the Organization of the Police. The results of two empirical studies in the Netherlands. International Journal of Cyber Criminology, 7(1), 1–17.
  • Lisak, D. (2010). Behind the torment of rape victims lies a dark fear: Reply to the commentaries. Violence against Women, 16(12), 1372–1374. doi:10.1177/1077801210387751
  • Long, L., & Ullman, S. E. (2013). The impact of multiple traumatic victimization on disclosure and coping mechanisms for black women. Feminist Criminology, 8(4), 295–319. doi:10.1177/1557085113490783
  • Malsch, M., Dijkman, N., & Akkermans, A. J. (2015). Het zichtbare slachtoffer: Privacy van slachtoffers binnen het strafproces. Amsterdam, The Netherlands: NSCR & VU University.
  • McGuire, M., & Dowling, S. (2013). Chapter 1: Cyber-dependent crimes. In: Cyber Crime: A Review of the Evidence. Home Office Research Report, 75, 4–34.
  • ONS. (2016). Crime in England and Wales: Year ending December 2015. London, UK: Author.
  • Reyns, B., & Randa, R. (2015). Victim reporting behaviors following identity theft victimization: Results from the national crime victimization survey. Crime & Delinquency, 63. doi:10.1177/0011128715620428
  • Scott, I., & Deena, A. (2018, June). Disentangling the impact of female victimization across racial and ethnic lines. Victims & Offenders, 13(5), 711–737.
  • Shapland, J., Willmore, J., & Duff, P. (1985). Victims in the Criminal Justice System. Aldershot, UK: Gower Publishing.
  • Skinner, T., & Taylor, T. (2009). “Being shut out in the dark”: Young survivors’ experiences of reporting a sexual offence. Feminist Criminology, 4(2), 130–150. doi:10.1177/1557085108326118
  • Slonje, R., Smith, P. K., & Frisén, A. (2012). The nature of cyberbullying, and strategies for prevention. Computers in Human Behavior, 29(1), 26–32. doi:10.1016/j.chb.2012.05.024
  • Ten Boom, A., Kuijpers, K. F., & Moene, M. H. (2008). Behoeften van slachtoffers van delicten een systematische literatuurstudie naar behoeften zoals door slachtoffers zelf geuit [The needs of victims. A systematic literature review]. Den Haag, The Netherlands: Boom Juridische uitgevers.
  • Van der Aa, S., & Groenen, A. (2011). Identifying the needs of stalking victims and the responsiveness of the criminal justice system: A qualitative study in Belgium and the Netherlands. An International Journal of Evidence-based Research, Policy, and Practice, 6(1), 2010.
  • Van der Meulen, N. S., & Koops, E. J. (2012). Van preventie naar risicoacceptatie en herstel voor slachtoffers in Nederlands beleid tegen identiteitsfraude. Een Beschouwing Naar Aanleiding Van De zaak-Romet [from Prevention to Risk Acception. The Case of Romet] Nederlands Juristenblad, 87(25), 1709–1712.
  • Van Dijk, J. (2000). Widening information gaps and policies of prevention. In K. Hacker & J. van Dijk (Eds.), Digital democracy, issues of theory and practice (pp. 166–183). London, Thousand Oaks, New Delhi: Sage.
  • Van Veen, P., & Mutsaers, S. (2012). Pestkop, apenkop. [Bully] Eijsden, The Netherlands: VVI Uitgeverij.
  • Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J. L. (2019). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. European Journal of Criminology. doi:10.1177/1477370819849677
  • Wood, M., Lepanjuuri, K., Paskell, C., Thompson, J., Adams, L., & Coburn, S. (2015). Victim and witness satisfaction survey. Great Britain: Crown Prosecution Service.
  • Worsley, D. J., Wheatcroft, J., Short, E., & Corcoran, R. (2017). Victims’ voices: Understanding the emotional impact of cyberstalking and individuals’ coping responses. SAGE Open, 7. doi:10.1177/2158244017710292

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.