Search results

1 – 10 of 161
Article
Publication date: 16 February 2024

Ethan Barr and Andrew Newman

Stalking is considered a public health priority with a range of adverse outcomes. This paper aims to explore existing literature on children and adolescents as perpetrators of…

Abstract

Purpose

Stalking is considered a public health priority with a range of adverse outcomes. This paper aims to explore existing literature on children and adolescents as perpetrators of stalking, with a focus on rates of stalking and victim and perpetrator characteristics associated with stalking.

Design/methodology/approach

A review of research where stalking was engaged in by those 18 years old and younger was conducted, where 17 manuscripts met criteria for review.

Findings

This review found a prevalence of young people engaging in stalking of between 5.3% and 36%. Considerations including demographics, typologies, prior relationship characteristics, stalking and pursuit tactics, cyberstalking and a brief consideration of the impact are given.

Practical implications

Literature considering perpetration remains thin, and future research should seek to move towards a widely acceptable definition of stalking, as well as considering effective interventions for early intervention, and to consider the role of mental health services in supporting perpetrators and victims, who may not always be mutually exclusive groups.

Originality/value

This paper extends previous literature reviews; the authors understand this to be original work that contributes to a gap in the literature.

Details

The Journal of Forensic Practice, vol. 26 no. 1
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 29 August 2024

Anushree Tandon, Samuli Laato, Najmul Islam and Amandeep Dhir

A major portion of our social interaction now occurs online, facilitated by social networking sites (SNSs) that enable people to connect and communicate at will. However, the…

Abstract

Purpose

A major portion of our social interaction now occurs online, facilitated by social networking sites (SNSs) that enable people to connect and communicate at will. However, the characteristics of SNS communication can introduce problematic outcomes on otherwise healthy processes, one of which is social comparison. In this work, we investigate whether compulsive SNS use could be driven by two phenomena related to social comparison: the fear of missing out (FoMO) and envy.

Design/methodology/approach

Using the stimulus-organism-response framework, we developed a model that was tested with data from a sample of SNS users (N = 330) based in the United States. The analysis was done through partial least squares structural equation modeling.

Findings

Our findings show FoMO's association with the two forms of dispositional experienced envy, benign and malicious, as well as expected envy of others (expected envy). Interestingly, benign and expected envy were associated with SNS stalking and self-disclosure, but malicious envy had non-significant associations. Finally, both SNS stalking and self-disclosure were linked to compulsive SNS use.

Originality/value

We study the nuanced ways in which the two forms of experienced envy and expected envy can be triggered by FoMO and result in users' engagement with problematic SNS use. Our research provides evidence that, in addition to benign envy being an antecedent of compulsive SNS use, the wish to invoke envious feelings in others can also significantly drive compulsive use.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 7 July 2023

Natalie Booth, Gail Derefaka, Roxanne Khan and Gayle Brewer

This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult…

Abstract

Purpose

This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult attachment style, dispositional self-control and cyber intimate partner aggression (IPA) perpetration and victimization.

Design/methodology/approach

Participants (N = 173) 20–52 years of age (M = 32.75 years, SD = 7.73, mode = 29 years) completed a series of standardized online measures to assess anxious and avoidant attachment, dispositional self-control and experience of cyber IPA (psychological, sexual and stalking), as both a perpetrator and victim.

Findings

Avoidant attachment was associated with increased perpetration of stalking and psychological abuse. Those high on avoidant attachment were also more likely to report that they were victims of cyber IPA psychological abuse and stalking. Self-control did not predict experience of cyber IPA, as a perpetrator or victim. Interactions between self-control and attachment were also non-significant.

Originality/value

This study addressed the paucity of cyber IPA research conducted with adult populations, by examining processes and factors to improve understanding of the experiences of online perpetration and victimization. The study also found evidence for the importance of impellance factors but not inhibiting factors (Finkel, 2008).

Details

Journal of Criminal Psychology, vol. 13 no. 4
Type: Research Article
ISSN: 2009-3829

Keywords

Abstract

Details

The Journal of Adult Protection, vol. 26 no. 1
Type: Research Article
ISSN: 1466-8203

Article
Publication date: 24 August 2023

Haroon Iqbal Maseeh, Shamsun Nahar, Charles Jebarajakirthy, Mitchell Ross, Denni Arli, Manish Das, Mehak Rehman and Hafiz Ahmad Ashraf

The purpose of this study is to explore and identify the privacy concerns of smartphone app users pertinent to app usage.

Abstract

Purpose

The purpose of this study is to explore and identify the privacy concerns of smartphone app users pertinent to app usage.

Design/methodology/approach

Adopting a qualitative phenomenological approach, the authors conducted semi-structured interviews with app users to explore the app users' privacy concerns.

Findings

Credibility concerns, unauthorised secondary use and vulnerability concerns are the three major privacy concerns of app users, under which these concerns have sub-concerns, i.e. popularity, privacy policy, stalking, data sharing, hacking and personal harm.

Practical implications

The findings are useful to app marketers, app developers and app stores. App marketers, app developers and app stores can use the findings to understand and properly address app users' privacy concerns, thereby increasing the apps usage.

Originality/value

By exploring the privacy concerns of app users, the authors' study extends the literature and provides a theoretical development of individuals' privacy concerns in the context of a widely used technology, i.e. smartphone applications. Accordingly, this study contributes to the consumer privacy literature.

Details

Marketing Intelligence & Planning, vol. 41 no. 7
Type: Research Article
ISSN: 0263-4503

Keywords

Content available
Article
Publication date: 2 August 2024

Erica R. Fissel and Jin R. Lee

The purpose of this paper is to understand the self-protective behaviors of young adult cyberstalking victims and the factors that impact adoption of such behaviors.

Abstract

Purpose

The purpose of this paper is to understand the self-protective behaviors of young adult cyberstalking victims and the factors that impact adoption of such behaviors.

Design/methodology/approach

This study used a sample of 880 young adults (18–25 years of age) who had experienced cyberstalking victimization within the previous 12 months. Data were collected through an online self-report survey hosted on Qualtrics from Amazon’s Mechanical Turk workers.

Findings

Results revealed that three-quarters of cyberstalking victims engaged in at least one form of self-protective behavior. The most commonly adopted self-protective behavior was blocking unwanted communications only (29%), while 40% of cyberstalking victims noted engaging in multiple forms of self-protective behaviors. While results varied across models, findings revealed that incident characteristics and respondent characteristics impacted the likelihood of engaging in self-protective behaviors after a cyberstalking victimization experience.

Originality/value

This study contributes to the literature examining the self-protective behaviors adopted by cyberstalking victims, which can shed light on other forms of cyber abuse and help explain victims’ low reporting rates to official sources (e.g. law enforcement).

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-6599

Keywords

Article
Publication date: 17 January 2024

Raiswa Saha, Sakshi Ahlawat, Umair Akram, Uttara Jangbahadur, Amol S. Dhaigude, Pooja Sharma and Sarika Kumar

The study aims to examine the conceptualization of online abuse (OA) and identifies theories, countries of research, top-cited articles, methodologies, antecedents, mediators…

Abstract

Purpose

The study aims to examine the conceptualization of online abuse (OA) and identifies theories, countries of research, top-cited articles, methodologies, antecedents, mediators, outcomes and moderators of OA and future research opportunities. Two research questions are addressed. How have the past studies on OA progressed regarding theories, context, characteristics and methodology? What future research opportunities can be done in this area?

Design/methodology/approach

This study systematically reviews, synthesizes and integrates OA literature using the well-recommended preferred reporting items for systematic reviews and meta-analyses (PRISMA) rules. The literature on OA was synthesized based on the Theory–Context–Characteristics–Methodologies (TCCM) framework given by Paul and Rosado-Serrano.

Findings

Through an examination of TCCM used in OA research, the review presents an all-inclusive and up-to-date overview of the research in this arena and sets a future research agenda to spur scholarly research. This systematic literature review has analyzed top-quality sample papers, published in the past decade. As a result, it contributes to a better understanding of this relationship by analyzing the different types of use and the value added to the shopping experience.

Originality/value

This study provides groundwork for researchers and promotes a deeper understanding of OA.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 24 May 2023

Cynthia Brown, Renee Fiolet, Dana McKay and Bridget Harris

This paper presents a novel exploration of the story completion (SC) method for investigating perpetration of technology-facilitated abuse in relationships (TAR).

Abstract

Purpose

This paper presents a novel exploration of the story completion (SC) method for investigating perpetration of technology-facilitated abuse in relationships (TAR).

Design/methodology/approach

The authors adopted the infrequently used SC method to explore TAR perpetration. The perpetration of TAR can involve socially undesirable and potentially illegal behaviours such as online stalking, non-consensual sharing of nude images, and other coercive and controlling behaviours. These problematic behaviours present an ideal context for employing the SC method to reveal new data on TAR perpetrator perspectives, motivations and behaviours.

Findings

The SC method elicited new hypotheses regarding TAR perpetration behaviours and motivations. Post-study reflection on the multifaceted nature of perpetration raised questions about the utility of SC as a stand-alone method for investigating TAR perpetration. Challenges encountered included: striking the most effective length, detail and ambiguity in the story stems, difficulty in eliciting important contextual features in participants’ stories, and other issues scholars encounter when investigating perpetration of violence more broadly. The authors close with suggestions for more effective use of SC methodology in TAR and intimate partner violence research.

Originality/value

This paper expands discussion of the SC method’s application and extends scholarship on violence and perpetration research methodologies. The paper demonstrates the importance of story stem design to the attainment of research objectives and the usefulness and limitations of SC in exploring this sensitive topic and hard-to-reach population. It also advocates for the combined application of SC with other methodological approaches for the attainment of research outcomes when investigating multifaceted phenomenon.

Details

Qualitative Research Journal, vol. 23 no. 5
Type: Research Article
ISSN: 1443-9883

Keywords

Article
Publication date: 29 July 2024

Kenji Logie and Marie-Helen Maras

The objective of this paper is to explore the development of the Blackmail-as-a-Service business model within the Digital Thrift Shop. This service model involves the sale of…

Abstract

Purpose

The objective of this paper is to explore the development of the Blackmail-as-a-Service business model within the Digital Thrift Shop. This service model involves the sale of doxing files to customers, as well as the removal of the content from the shop and its dissemination to victims or individuals closely connected to them.

Design/methodology/approach

To access the Digital Thrift shop, this study relies on the Tor browser and a darknet indexing site. The authors then use an application to collect and store the web pages as PDFs. Finally, content analysis is performed on these PDFs to understand the Blackmail-as-a-Service business model developed by the Digital Thrift.

Findings

The doxing data available on the Digital Thrift is primarily targeted toward women. Digital Thrift has also established a way to value the purchase, sale and the removal of blackmail data. The presence of Blackmail-as-a-Service on darknet sites poses unique challenges for criminal justice agencies in terms of jurisdiction, due to the lack of harmonized laws and the obstacles involved in taking down content from darknet sites. Finally, the use of a service model for blackmail allows criminals without technical skills to engage in cyber-victimization using blackmail.

Originality/value

Research into Blackmail-as-a-Service from boutique providers has not been conducted. To the best of the authors’ knowledge, this is one of the first study seeking to understand the Blackmail-as-a-Service business model on the darknet when used to target adults. This study presents evidence of a lack of connection between the buyers of the compromising material and the potential victim, challenging preconceived notions about image-based sexual abuse and its connection to individuals involved in interpersonal relationships.

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-6599

Keywords

Article
Publication date: 8 January 2024

Samwel Sanga Alananga

The purpose of this study is to examine households’ behavior towards dirty cooking energy utilisation in an environment where relatively higher accessibility to clean energy is…

Abstract

Purpose

The purpose of this study is to examine households’ behavior towards dirty cooking energy utilisation in an environment where relatively higher accessibility to clean energy is noted. Although the low utilisation rate of clean energy can partly be attributed to utility gains anticipated in dirty energy mixes (DEMs) arising out of accessibility constraints, affordances and enablers, it is still unclear on the extend at which each of these contributes towards DEMs manifestation among the seemingly well-to-do households with higher levels of clean energy mixes (CEM) access. This study, therefore, hinges on scrutinising on this lower utilisation patterns despite a seemingly higher accessibility of CEMs, specifically liquified petroleum gases (LPG).

Design/methodology/approach

The study is based on a household’s survey that was carried out in 2018, reaching a sample of 393 households using questionnaires in four wards of the Kigamboni district in Tanzania. Subsequent analyses were descriptive as well as inferential based on binary logistic regression analysis where utilisation of DEMs was predicted for both the high and low social economic status (SES) households by incorporating accessibility constraints, affordances and enablers.

Findings

The results show, first, if one assumes energy stacking is not an issue, as households become more constrained towards CEMs utilisation, they shift towards DEMs suggesting that the overall effect is a substitution, and second, the complementarity effect ultimately outweighs the substitution effect as households do not shift from DEMs to CEMs rather stack multiple energy. DEMs flourish in this case study area because those with high income are among those in the lowest SES, and some of those with the highest SES are from among the lowest income category, and all of them end up with more DEMs because shifting towards CEMs require income to complement SES.

Practical implications

Policy-wise, removing hurdles in accessing CEMs such as LPG subsidy programme, gas stove provision to the poor, and enhanced LPG awareness will most likely benefits only those who do not stack energy in cooking while strategies targeting those at the lowest SES such as higher education attainment, empower women as a family decision maker, encourage co-occupancy to enlarge the household size and contain urban growth within certain perimeter will have a significant impact only if they raise both incomes and SES.

Originality/value

Despite of the dominance of DEMs for cooking such as charcoal and firewood in Tanzania, CEMs such as LPG, have emerged as complements or alternatives in the household energy basket. The utilisation of such CEMs is, however, still very low despite the accessibility, cost, environmental and health advantages they offer. Accessibility is not the only factor fuelling CEMs; a complementarity must exist between SES and income for the positive transition towards CEMs to be realised.

Details

International Journal of Energy Sector Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-6220

Keywords

1 – 10 of 161