2011
DOI: 10.1177/0093854811421448
|View full text |Cite
|
Sign up to set email alerts
|

Being Pursued Online

Abstract: Building upon Eck and Clarke's (2003) ideas for explaining crimes in which there is no face-to-face contact between victims and offenders, the authors developed an adapted lifestyle-routine activities theory. Traditional conceptions of place-based environments depend on the convergence of victims and offenders in time and physical space to explain opportunities for victimization. With their proposed cyberlifestyle-routine activities theory, the authors moved beyond this conceptualization to explain opportuniti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
81
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 301 publications
(106 citation statements)
references
References 56 publications
3
81
1
Order By: Relevance
“…Between 2002 to 2010, there was an explosion of social networks and image-sharing platforms including Friendster, Myspace, Facebook, YouTube, Twitter, Tumblr and Instagram. Research into cyberbullying, cyberstalking and online harassment rapidly expanded over this period as the relative ease, anonymity and reach of online communications were associated with (continuing) concerns regarding invasive and threatening communications (Pittaro 2007;Reyns, Henson and Fisher 2011;Spitzberg and Hoobler 2002), particularly in relation to vulnerable groups such as children and young adults.…”
Section: A Brief History Of Computer and Cyber Criminologiesmentioning
confidence: 99%
“…Between 2002 to 2010, there was an explosion of social networks and image-sharing platforms including Friendster, Myspace, Facebook, YouTube, Twitter, Tumblr and Instagram. Research into cyberbullying, cyberstalking and online harassment rapidly expanded over this period as the relative ease, anonymity and reach of online communications were associated with (continuing) concerns regarding invasive and threatening communications (Pittaro 2007;Reyns, Henson and Fisher 2011;Spitzberg and Hoobler 2002), particularly in relation to vulnerable groups such as children and young adults.…”
Section: A Brief History Of Computer and Cyber Criminologiesmentioning
confidence: 99%
“…Correspondingly, online shopping and downloading behaviours augmented victimization risk. Reyns, Henson & Fisher (2011) found that specifically, antecedents measuring online exposure to risk, online immediacy to motivated offenders, online guardianship, online target charisma, and online deviance were noteworthy predictors of cyber aggravation victimization. However, Leukfeldt (2014) concluded that personal background and financial characteristics play no role in phishing victimization and only "targeted browsing" led to amplified risk.…”
Section: Theoretical Frameworkmentioning
confidence: 94%
“…For instance, Reyns, Henson, and Fisher (2011) found that lack of guardianship (either human, or electronic in the form of profile trackers for cyberbullying) was a greater influence on bullying than suitability of the victim. For instance, Reyns, Henson, and Fisher (2011) found that lack of guardianship (either human, or electronic in the form of profile trackers for cyberbullying) was a greater influence on bullying than suitability of the victim.…”
Section: Routine Activities Theorymentioning
confidence: 99%