Publication Cover
Vulnerable Children and Youth Studies
An International Interdisciplinary Journal for Research, Policy and Care
Volume 8, 2013 - Issue 4
1,856
Views
31
CrossRef citations to date
0
Altmetric
Original Articles

Young people as victims of crime on the internet: A population-based study in Finland

&
Pages 298-309 | Received 10 Aug 2012, Accepted 15 Nov 2012, Published online: 15 Jan 2013

References

  • Bossler, A. M., & Holt, T. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38, 227–236. doi:10.1016/j.jcrimjus.2010.03.001
  • Bradford, W. R., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33, 1–25. doi:10.1080/01639625.2010.538364
  • Brenner, S. W. (2006). Cybercrime jurisdiction. Crime, Law & Social Change, 46, 189–206. doi:0.1007/s10611-007-9063-7
  • Britz, M. T. (2008). Computer forensics and cyber crime: An introduction. Upper Saddle River, NJ: Prentice Hall.
  • Brown, J. D., & Bobkowski, P. S. (2011). Older and newer media: Patterns of use and effects on adolescents’ health and well-being. Journal of Research on Adolescence, 21, 95–113. doi:10.1111/j.1532-7795.2010.00717.x
  • Casey, E. ( Ed.). (2011). Digital evidence and computer crime: Forensic science, computer and the Internet (3rd ed.). Waltham, MA: Academic Press.
  • Gerstenfeld, P. B., Grant, D. R., & Chiang, C.-P. (2003). Hate online: A content analysis of extremist Internet sites. Analyses of Social Issues and Public Policy, 3, 29–44. doi:10.1111/j.1530-2415.2003.00013.x
  • Hawdon, J. (2012). Applying differential association theory to online hate groups: A theoretical statement. Research on Finnish Society, 5, 39–47.
  • Helweg-Larsen, K., Schütt, N., & Larsen, H. B. (2012). Predictors and protective factors for adolescent Internet victimization: Results from a 2008 nationwide Danish youth survey. Acta Pediatrica, 101, 533–539. doi:10.1111/j.1651-2227.2011.02587.x
  • Henry, J. S. (2009). Beyond free speech: Novel approaches to hate on the Internet in the United States. Information & Communications Technology Law, 18, 235–251. doi:10.1080/13600830902808127
  • Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1–25. doi:10.1080/01639620701876577
  • Jackson, J., Allum, N., & Gaskell, G. (2005). Perceptions of risk in cyberspace. In R. Mansell & B. S. Collins (Eds.), Trust and crime in information societies (pp. 245–281). Cheltenham: Edward Elgar.
  • Juvonen, J., & Gross, E. (2008). Extending the school grounds? Bullying experiences in cyberspace. Journal of School Health, 78, 496–505. doi:10.1111/j.1746-1561.2008.00335.x
  • Lee, E., & Leets, L. (2002). Persuasive storytelling by hate groups online: Examining its effects on adolescents. American Behavioral Scientist, 45, 927–957. doi:10.1177/0002764202045006003
  • Lehdonvirta, V., & Räsänen, P. (2011). How do young people identify with online and offline peer groups? A comparison between UK, Spain, and Japan. Journal of Youth Studies, 14, 91–108. doi:10.1080/13676261.2010.506530
  • Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26, 1103–1155.
  • Livingstone, S., Haddon, L., Görzig, A., & Ólafsson, K. (2011). Risks and safety on the Internet: The perspective of European children. Full findings. London: LSE, EU Kids Online.
  • Marcum, C. D. (2008). Identifying potential factors of adolescent online victimization for high school seniors. International Journal of Cyber Criminology, 2, 346–367.
  • Mitchell, K. J., Finkelhor, D., & Wolak, J. (2007). Online requests for sexual pictures from youth: Risk factors and incident characteristics. Journal of Adolescent Health, 41, 196–203. doi:10.1016/j.jadohealth.2007.03.013
  • Mitchell, K. J., Finkelhor, D., Wolak, J., Ybarra, M. L., & Turner, H. (2011). Youth Internet victimization in a broader victimization context. Journal of Adolescent Health, 48, 128–134. doi:10.1016/j.jadohealth.2010.06.009
  • Mitchell, K. J., Wolak, J., & Finkelhor, D. (2008). Are blogs putting youth at risk for online sexual solicitation or harassment? Child Abuse & Neglect, 32, 277–294. doi:10.1016/j.chiabu.2007.04.015
  • Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of Individual and Situational level factors. International Journal of Cyber Criminology, 5, 773–793.
  • Ortega, R., Paz, E., Mora-Merchán, J. A., Genta, M. L., Brighi, A., Guarini, A., …Tippen, N. (2012). The emotional impact of bullying and cyberbullying on victims: A European cross-national study. Aggressive Behavior. doi:10.1002/ab.21440
  • Pittaro, M. L. (2007). Cyber stalking: An analysis of online harassment and intimidation. International Journal of Cyber Criminology, 1, 180–197.
  • Public Safety Survey. (2009) [computer file]. FSD2502, version 1.0 (2010-01-05). Helsinki: Itella Information [data collection], 2009. State Provincial Offices of Mainland Finland. Police Departments [producers]. Tampere: Finnish Social Science Data Archive [distributor], 2010.
  • Räsänen, P., & Kouvo, A. (2007). Linked or divided by the web? Internet and sociability in four European countries. Information, Communication & Society, 10, 219–241. doi:10.1080/13691180701307461
  • Sheridan, L. P., & Grant, T. (2007). Is cyberstalking different. Psychology, Crime & Law, 13, 627–640. doi:10.1080/10683160701340528
  • Sirén, R., Aaltonen, M., & Kääriäinen, J. (2010). Suomalaisten väkivaltakokemukset 1980–2009: Kansallisen uhritutkimuksen tuloksia. Research Communications 103. Helsinki: National Research Institute of Legal Policy.
  • Sourander, A., Brunstein Klomek, A., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., … Helenius, H. (2010). Psychological risk factors associated with cyberbullying among adolescents. A population-based study. Archives of General Psychiatry, 67, 720–728.
  • Statistics Finland. (2009). Statistics Finland PX-Web Database. Retrieved June 19, 2012, from http://pxweb2.stat.fi/database/StatFin/vrm/vaerak/vaerak_en.asp
  • Wall, D. S. (2007). Cybercrime: Transformation of crime in the information age. Cambridge: Polity.
  • Wall, D. S. (2008). Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime. International Review of Law, Computers and Technology, 22, 45–63. doi:10.1080/13600860801924907
  • Walrave, M., & Heirman, W. (2011). Cyberbullying: Predicting victimisation and perpetration. Children & Society, 25, 59–72. doi:10.1111/j.1099-0860.2009.00260.x
  • Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (2010). Online “predators” and their victims: Myths, realities, and implications for prevention and treatment. Psychology of Violence, 1, 13–35. doi:10.1037/2152-0828.1.S.13
  • Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45, 1308–1316. doi:10.1111/j.1469-7610.2004.00328.x
  • Ybarra, M. L., & Mitchell, K. J. (2008). How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics, 121, 350–357. doi:10.1542/peds.2007-0693

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.