References
- Achenbach, T. M. (1966). The classification of children’s psychiatric symptoms: A factor analytic study. Psychological Monographs: Gender and Applied, 80(7), 1–37. https://doi.org/10.1037/h0093906
- Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47–87. https://doi.org/10.1111/j.1745-9125.1992.tb01093.x
- Arnold, R. (2015). Intermediate social statistics: A conceptual and graphic approach. Oxford University Press.
- Arntfield, M. (2015). Toward a cybervictimology: Cyberbulling, routine activities theory, and the anti-sociality of social media. Canadian Journal of Communication, 40(3), 371–388. https://doi.org/10.22230/cjc.2015v40n3a2863
- Athanasiou, K., Melegkovits, E., Andrie, E. K., Magoulas, C., Tzavara, C. K., Richardson, C., Greydanus, D., Tsolia, M., & Tsitsika, A. K. (2018). Cross-national aspects of cyberbullying victimization among 14–17-year-old adolescents across seven European countries. BMC Public Health, 18(1), 1–15. https://doi.org/10.1186/s12889-018-5682-4
- Barlett, C. P., & Chamberlin, K. (2017). Examining cyberbullying across the lifespan. Computers in Human Behavior, 71, 444–449. https://doi.org/10.1016/j.chb.2017.02.009
- Blalock, H. M. (1968). The measurement problem: A gap between the languages of theory and research. In H. M. Blalock & A. B. Blalock (Eds.), Methodology in social research (pp. 1–27). McGraw-Hill.
- Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420. http://cybercrimejournal.com/bosslerholtjan2009.htm
- Cao, L., & Selman, D. (2010). Children of the common mother: Social determinants of liberalism in the U.S. and Canada. Sociological Focus, 43(4), 311–329. https://doi.org/10.1080/00380237.2010.10571381
- Cao, L., & Wang, S. Y. K. (2020). Correlates of stalking in Canada: Social support and comorbidity model. International Journal of Law, Crime and Justice, 63, 1–9. https://doi.org/10.1016/j.ijlcj.2020.100437
- Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589
- Dredge, R., Gleeson, J., & de la Piedad, G. X. (2014a). Presentation on Facebook and risk of cyberbullying victimization. Computers in Human Behavior, 40, 16–22. https://doi.org/10.1016/j.chb.2014.07.035
- Dredge, R., Gleeson, J. M., & de la Piedad, G. X. (2014b). Risk factors associated with impact severity of cyber bullying victimization: A qualitative study of adolescent online social networking. Cyberpsychology, Behavior and Social Networking, 17(5), 287–291. https://doi.org/10.1089/cyber.2013.0541
- Elledge, L. C., Williford, A., Boulton, A. J., DePaolis, K. J., Little, T. D., & Salmivalli, C. (2013). Individual and contextual predictors of cyberbullying: The influence of children’s provictim attitudes and teacher’s ability to intervene. Journal of Youth Adolescence, 42(5), 698–710. https://doi.org/10.1007/s10964-013-9920-x
- Extremera, N., Quintana-Orts, C., Mérida-Lópe, S., & Rey, L. (2018). Cyberbullying victimization, self-esteem and suicidal ideation in adolescence: Does emotional intelligence play a buffering role? Frontiers in Psychology, 9, 1–9. https://doi.org/10.3389/fpsyg.2018.00367
- Felson, M. (1995). Those who discourage crime. In J. E. Eck & D. Weisburd (Eds.), Crime and place. Crime prevention studies (Vol. 4, pp. 53–66). Criminal Justice Press.
- Field, A. (2009). Discovering statistics using SPSS (3rd ed.). SAGE Publications.
- Finkelhor, D., & Asdigian, N. L. (1996). Risk factors for youth victimization: Beyond a life- style/routine activities approach. Violence and Victims, 11(1), 3–19. https://doi.org/10.1891/0886-6708.11.1.3
- Gámez-Guadix, M., Orue, I., Smith, P. K., & Calvete, E. (2013). Longitudinal and reciprocal relations of cyberbullying with depression, substance use, and problematic internet use among adolescents. Journal of Adolescent Health, 53(4), 446–452. https://doi.org/10.1016/j.jadohealth.2013.03.030
- Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford University Press.
- Hawdon, J., Costello, M., Ratliff, T., Jall, L., & Middleton, J. (2017). Conflict management styles and cybervictimization: Extending routine activity theory. Sociological Spectrum, 37(4), 250–266. https://doi.org/10.1080/02732173.2017.1334608
- Hemphill, S. A., & Heerde, J. A. (2014). Adolescent predictors of young adult cyberbullying perpetration and victimization among Australian youth. Journal of Adolescent Health, 55(4), 580–587. https://doi.org/10.1016/j.jadohealth.2014.04.014
- Herrenkohl, T. I., Hill, K. G., Chung, I., Guo, J., Abbott, R. D., & Hawkins, J. (2003). Protective factors against serious violent behavior in adolescence: A prospective study of aggressive children. Social Work Research, 27(3), 179–191. https://doi.org/10.1093/swr/27.3.179
- Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129–156. https://doi.org/10.1080/01639620701457816
- Hinduja, S., & Patchin, J. W. (2015). Bullying beyond the schoolyard: Preventing and responding to cyberbullying (2nd ed.). Sage Publications.
- Hollis, M. E., Felson, M., & Welsh, B. C. (2013). The capable guardian in routine activities theory: A theoretical and conceptual reappraisal. Crime Prevention and Community Safety, 15(1), 65–79. https://doi.org/10.1057/cpcs.2012.14
- Hollis-Peel, M. E., & Welsh, B. C. (2014). What makes a guardian capable? A test of guardianship in action. Security Journal, 27(3), 320–337. https://doi.org/10.1057/sj.2012.32
- Holt, T. J., & Bossler, A. D. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.
- Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cyber crime victimization. Deviant Behavior, 30(1), 1–25. https://doi.org/10.1080/01639620701876577
- Holt, T. J., & Bossler, A. M. (2013). Examining the relationship between routine activities and malware infection indicators. Journal of Contemporary Criminal Justice, 29(4), 420–436. https://doi.org/10.1177/1043986213507401
- Holt, T. J., Turner, M. G., & Exum, M. L. (2014). The impact of self control and neighborhood disorder on bullying victimization. Journal of Criminal Justice, 42(4), 347–355. https://doi.org/10.1016/j.jcrimjus.2014.04.004
- Hsieh, M.-L., & Wang, S.-Y. K. (2018). Routine activities in a virtual space: A Taiwanese case of an ATM hacking spree. International Journal of Cyber Criminology, 12(1), 333–352. https://doi.org/10.5281/zenodo.1467935
- John, A., Glendenning, A. G., Marchant, A., Montgomery, P., Stewart, A., Wood, S., Lloyd, K., & Hawton, K. (2018). Self-harm, suicidal behaviours, and cyberbullying in children and young people: Systematic review. Journal of Medical Internet Research, 20(4), 1–9. https://doi.org/10.3389/fpsyg.2018.00367
- Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073–11137. https://doi.org/10.1037/a0035618
- Kraft, E., & Wang, J. (2010). An exploratory study of the cyberbullying and cyberstalking experiences and factors related to victimization of students at a public liberal arts college. International Journal of Technologies, 1(4), 74–91. https://doi.org/10.4018/jte.2010100106
- Kubrin, C. E., & Wo, J. C. (2016). Social disorganization theory’s greatest challenge: Linking structural characteristics to crime in socially disorganized communities. In A. R. Piquero (Ed.), The handbook of criminological theory (pp. 121–136). John Wiley & Sons, Inc.
- Lee, G., & Scanchez, M. (2018). Cyber bullying behaviors, anonymity, and general strain theory: A study of undergraduate students at a South Eastern University in the United States. International Journal of Cyber Criminology, 12(1), 84–96. https://doi.org/10.5281/zenodo.1467846
- Leukfeldt, E. R. (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior and Social Networking, 17(8), 551–555. https://doi.org/10.1089/cyber.2014.0008
- Leung, A. N. M., Wong, N., & Farver, J. M. (2018). Cyberbullying in Hong Kong Chinese students: Life satisfaction, and the moderating role of friendship qualities on cyberbullying victimization and perpetration. Personality and Individual Differences, 133, 7–12. https://doi.org/10.1016/j.paid.2017.07.016
- MacDonald, C. D., & Roberts-Pittman, B. (2010). Cyberbullying among college students: Prevalence and demographic differences. Procedia, Social and Behavioral Sciences, 9, 2003–2009. https://doi.org/10.1016/j.sbspro.2010.12.436
- Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410. https://doi.org/10.1080/01639620903004903
- Modecki, K., Minchin, J., Harbaugh, A. G., Guerra, N. G., & Runions, K. C. (2014). Bullying prevalence across contexts: A meta-analysis measuring cyber and traditional bullying. Journal of Adolescent Health, 55(5), 602–611. https://doi.org/10.1016/j.jadohealth.2014.06.007
- Myers, C.-A., & Cowie, H. (2019). Cyberbullying across the lifespan of education: Issues and interventions from school to university. International Journal of Environmental Research and Public Health, 16(7), 1–14. https://doi.org/10.3390/ijerph16071217
- Namie, G. (2017). Workplace bullying survey. Retrieved May 25, 2020, from https://www.workplacebullying.org/wbiresearch/wbi-2017-survey/
- Navarro, J. N., & Jasinski, J. L. (2012). Going cyber: Using routine activities theory to predict cyberbullying experiences. Sociological Spectrum, 32(1), 81–94. https://doi.org/10.1080/02732173.2012.628560
- Navarro, R., Serna, C., Martínez, V., & Ruiz-Oliva, R. (2013). The role of internet use and parental mediation on cyberbullying victimization among Spanish children from rural public schools. European Journal of Psychology of Education, 28(3), 725–745. https://doi.org/10.1007/s10212-012-0137-2
- Newman, O. (1972). Defensible space: Crime prevention through urban design. Collier Books.
- Notar, C. E., Padgett, S., & Roden, J. (2013). Cyberbullying: A review of the literature. Universal Journal of Educational Research, 1(1), 1–9. https://doi.org/10.13189/ujer.2013.010101
- Odgers, C. L., Moffitt, T. E., Tach, L. M., Sampson, R. J., Taylor, A., Matthews, C. L., & Caspi, A. (2009). The protective effects of neighborhood collective efficacy on British children growing up in deprivation: A developmental analysis. Developmental Psychology, 45(4), 942–957. https://doi.org/10.1037/a0016162
- Olsson, G., Låftman, S. B., & Modin, B. (2017). School collective efficacy and bullying behavior: A multilevel study. International Journal of Environment Research and Public Health, 14, 1–12. https://doi.org/10.3390/ijerph14121607
- Paek, S. Y., & Nalla, M. K. (2015). The relationship between receiving phishing attempt and identity theft victimization in South Korea. International Journal of Law, Crime and Justice, 43(4), 626–642. https://doi.org/10.1016/j.ijlcj.2015.02.003
- Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4(2), 148–169. https://doi.org/10.1177/1541204006286288
- Patchin, J. W., & Hinduja, S. (2010). Cyberbullying and self-esteem. Journal of School Health, 80(12), 614–621. https://doi.org/10.1111/j.1746-1561.2010.00548.x
- Patchin, J. W., & Hinduja, S. (2011). Traditional and nontraditional bullying among youth: A test of general strain theory. Youth & Society, 43(2), 727–751. https://doi.org/10.1177/0044118X10366951
- Patchin, J. W., & Hinduja, S. (2018). Deterring teen bullying: Assessing the impact of perceived punishment from police, schools, and parents. Youth Violence and Juvenile Justice, 16(2), 190–207.
- Perreault, S. (2011). Self-reported Internet victimization in Canada, 2009 (No. 85-002-X). Statistics Canada.
- Pew Research Center. (2019). Social media fact sheet. Washington, DC. Retrieved July 31, 2019, from https://www.pewinternet.org/fact-sheet/social-media/
- Pickering, S., McCulloch, J., & Wright-Neville, D. (2008). Counter-terrorism policing: Community, cohesion and security. Springer Science+Business Media.
- Pino, N., & Johnson-Johns, A. (2009). College women and the occurrence of unwanted sexual advances in public drinking settings. The Social Science Journal, 46(2), 252–267. https://doi.org/10.1016/j.soscij.2009.04.005
- Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238. https://doi.org/10.1177/0022427811425539
- Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle-routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149–1169. https://doi.org/10.1177/0093854811421448
- Reyns, B. W., Henson, B., & Fisher, B. S. (2016). Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. Journal of Contemporary Criminal Justice, 32(2), 148–168. https://doi.org/10.1177/1043986215621378
- Riddell, J., Pepler, D., & Craig, W. (2018). Cyberbullying in Canada. In A. C. Baldry, C. Blaya, & D. P. Farrington (Eds.), International perspectives on cyberbullying: Prevalence, risk factors and interventions (pp. 39–64). Palgrave.
- Sampson, R. J. (2006). Collective efficacy theory: Lessons learned and directions for future inquiry. In F. T. Cullen, J. P. Wright, & K. Blevins (Eds.), Taking stock: The status of criminological theory (pp. 149–167). Transaction.
- Sampson, R. J., & Groves, W. B. (1989). Community structure and crime: Testing social disorganization theory. American Journal of Sociology, 94(4), 774–802. https://doi.org/10.1086/229068
- Sampson, R. J., & Laub, J. H. (1993). Crime in the making: Pathways and turning points through life. Cambridge: Harvard University Press.
- Sampson, R. J., Raudenbush, S. W., & Earls, F. (1997). Neighborhoods and violent crime: A multilevel study of collective efficacy. Science, 277, 918–924. https://doi.org/10.1126/science.277.5328.918
- Schmidt, C. J., Pierce, J., & Stoddard, S. A. (2016). The mediating effect of future expectations on the relationship between neighborhood context and adolescent bullying perpetration. Journal of Community Psychology, 44(2), 232–248. https://doi.org/10.1002/jcop.21761
- Schumann, L., Craig, W., & Rosu, A. R. (2014). Power differenritals in bullying: Individuals in a community context. Journal of Interpersonal Violence, 29(5), 846–865.
- Shaw, C. R., & McKay, H. (1942). Juvenile delinquency and urban areas. University of Chicago Press.
- Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.
- Skogan, W. G. (1990). Disorder and decline: Crime and the spiral of decay in American neighborhoods. University of California Press.
- Smith, A., & Anderson, M. (2018). Social media use in 2018. Pew Research Center.
- Statistics Canada. (2016). 2014 general social survey, cycle 28. Canada. Retrieved August 25, 2019, from https://www150.statcan.gc.ca/n1/en/catalogue/12M0026X
- Stevens, S. S. (1946). On the theory of scales of measurement. Science, 103(2684), 677–680. https://doi.org/10.1126/science.103.2684.677
- Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277–287. https://doi.org/10.1016/j.chb.2009.11.014
- Tsitsika, A., Janikian, M., Wójcik, S., Makaruk, K., Tzavela, E., Tzavara, E., Greydanus, D., Merrick, J., & Richardson, C. (2015). Cyberbullying victimization prevalence and associations with internalizing and externalizing problems among adolescents in six European countries. Computers in Human Behavior, 51, 1–7. https://doi.org/10.1016/j.chb.2015.04.048
- Vazsonyi, A. T., Machackova, H., Sevcikova, A., Smahel, D., & Cerna, A. (2012). Cyberbullying in context: Direct and indirect effects by low self-control across 25 European countries. European Journal of Developmental Psychology, 9(2), 210–227. https://doi.org/10.1080/17405629.2011.644919
- Velleman, P., & Wilkinson, L. (1993). Nominal, ordinal, interval and ratio typologies are misleading. The American Statistician, 47(1), 65–72. https://doi.org/10.2307/2684788
- We Are Social. (2019). Global digital 2019 reports. New York. Retrieved August 25, 2019, from https://wearesocial.com/blog/2019/01/digital-2019-global-internet-use-accelerates
- Williams, F. P. (2009). Statistical concepts for criminal justice and criminology. Pearson Prentice Hall.
- Wright, M. (2016). Cybervictimization and substance use among adolescents: The moderation of perceived social support. Journal of Social Work Practice in the Addictions, 16(1–2), 93–112. https://doi.org/10.1080/1533256X.2016.1143371
- Wright, M. (2018). Cyberbullying victimization through social networking sites and adjustment difficulties: The role of parental mediation. Journal of the Association for Information Systems, 19(2), 113–123. https://doi.org/10.17705/1jais.00486
- Yar, M. (2005). The novelty of “cybercrime”: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427. https://doi.org/10.1177/147737080556056
- Yubero, S., Navarro, R., Elche, M. L., Larranaga, E., & Ovejero, A. (2017). Cyberbullying victimization in higher education: An exploratory analysis of its association with social and emotional factors among Spanish students. Computers in Human Behaviors, 75, 439–449. https://doi.org/10.1016/j.chb.2017.05.037
- Zsila, A., Orosz, G., Király, O., Urbán, R., Ujhelyi, A., & Jármi, E. (2018). Psychoactive substance use and problematic internet use as predictors of bullying and cyberbullying victimization. International Journal of Mental Health Addiction, 16(2), 466–479. https://doi.org/10.1007/s11469-017-9809-0