ABSTRACT
Most cyberspace users fell victim to some cybercrime. This poster reports on a survey of students conducted to provide an overview of cybercrime victimization and related help-seeking behaviors. The results suggest that unwelcome private messages with sexual content or requests, infections with a virus, unauthorized access to online accounts, and offensive and hostile messages were most common cybercrimes. Respondents would most often turn to their friends, the police, and family members for help.
- Catherine L. Anderson and Ritu Agarwal. 2010. Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions. MIS Quarterly 34, 3 (2010), 613--643.Google ScholarDigital Library
- Wanda Cassidy, Margaret Jackson, and Karen N. Brown. 2009. Sticks and Stones Can Break My Bones, But How Can Pixels Hurt Me? School Psychology International 30, 4 (aug 2009), 383--402. https://doi.org/10.1177/0143034309106948Google ScholarCross Ref
- Shelly L. Clevenger, Jordana N. Navarro, and Mia Gilliam. 2018. Technology and the endless "cat and mouse" game: A review of the interpersonal cybervictimization literature. Sociology Compass 12, 12 (dec 2018), e12639. https://doi.org/10.1111/soc4.12639Google ScholarCross Ref
- Leen D'Haenens, Sofie Vandoninck, and Verónica Donoso. 2013. How to cope and build online resilience? Technical Report. EU Kids Online. 15 pages.Google Scholar
- Giovanna Mascheroni and Kjartan Ólafsson. 2014. Net Children Go Mobile: Risks and opportunities. Second Edition. Technical Report. Educatt, Milano. 1--123 pages.Google Scholar
- Filipa Pereira, Brian H. Spitzberg, and Marlene Matos. 2016. Cyber-harassment victimization in Portugal: Prevalence, fear and help-seeking among adolescents. Computers in Human Behavior 62 (sep 2016), 136--146. https://doi.org/10.1016/j.chb.2016.03.039Google Scholar
- Symantec. 2019. Internet Security Threat Report Volume 24 | February 2019. Technical Report. Symantec. 61 pages.Google Scholar
- S. Elizabeth Wick, Craig Nagoshi, Randy Basham, Catheleen Jordan, Youn Kyoung Kim, Anh Phuong Nguyen, and Peter Lehmann. 2017. Patterns of cyber harassment and perpetration among college students in the United States: A test of Routine Activities Theory. International Journal of Cyber Criminology 11, 1 (2017), 24--38. https://doi.org/10.5281/zenodo.495770Google Scholar
- Michelle F. Wright. 2015. Cyber victimization and adjustment difficulties: The mediation of Chinese and American adolescents' digital technology usage. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 9, 1 (2015), a7. https://doi.org/10.5817/CP2015-1-7Google Scholar
Index Terms
- Cybercrime victimization and seeking help: A survey of students in Slovenia
Recommendations
Why cybercrime?
How do cybercrime markets emerge, evolve, and persist? How can cybercrime be prevented, decreased and mitigated? Extant anti-cybercrime efforts have concentrated on deterrence through criminal prosecution and technical mitigation. Deterrence-only ...
U.S. Cybercrime Law: Defining Offenses
In recent years, a new term has arisen—“cybercrime”—which essentially denotes the use of computer technology to commit or to facilitate the commission of unlawful acts, or “crimes.” This article explains why we treat cybercrime as a special class of “...
Introduction—Cybercrime: A Note on International Issues
Cybercrime investigations often transcend national boundaries. This creates problems for investigators because the procedural laws that govern the conduct of criminal investigations are territorially-based; that is, they apply only within the territory ...
Comments