Search results
1 – 10 of 41Few studies have explored the correlates of police responses to the crime of stalking. The purpose of this paper is to examine the correlates of nine specific police actions (no…
Abstract
Purpose
Few studies have explored the correlates of police responses to the crime of stalking. The purpose of this paper is to examine the correlates of nine specific police actions (no action, multiple actions, took a report, talked to perpetrator, arrested perpetrator, recommended PO or RO, recommended self-protection, referred to prosecutor’s office and referred to social services) to this type of crime. This study found three of the four incident measures (victim-offender relationship, intimidation and physical injury) and three of the four victim demographic measures (age, gender and marital status) significantly predicted seven of the nine police actions.
Design/methodology/approach
Data for this study came from the 2006 Stalking Victimization Supplement of the National Crime Victimization Survey (NCVS). The sample included stalking cases that were reported to the police and all measures were constructed using victims’ responses to survey questionnaires. Nine logistic regression models were estimated and in each model, four incident characteristic variables and four victim demographic variables were regressed on each of the nine police actions.
Findings
This study found three of the four incident characteristic measures (victim-offender relationship, intimidation, and physical injury) and three of the four victim demographic variables (age, gender and marital status) were significantly related to seven of the nine specific police actions (no action, multiple actions, arrested perpetrator, recommended PO or RO, recommended self-protection, referred to prosecutor’s office and referred to social services). None of the incident characteristic and victim demographic measures were related to two of the nine specific police actions (took a report and talked to perpetrator).
Research limitations/implications
This study possesses the same shortcomings associated with the NCVS. The current study involves cross-sectional, official data that are over 10 years old. The measures employed in the current study are victims’ perceptions of how the officers acted. The study does not include information regarding how many times the victim contacted the police or the nature of the stalking episode. The study excludes other variables (suspect’s demeanor, the presence of witnesses) that may be relevant in examining subsequent police responses to stalking.
Practical implications
Frontline offices should be required to undertake stalking training. Further, stalking training needs to be conducted independently from domestic violence training. Mandatory stalking training for law enforcement officers will lead to a greater comprehension of existing stalking statute for the officers as well as help increase the number of offenders being identified and charged with this crime by the officers.
Social implications
Police inaction to reported stalking not only dissuade victims from reporting future victimizations, it will also result in stalking being an under-reported crime. Police inaction could potentially compromise victim safety and/or offender accountability. Police inaction also undermines the legitimacy of law enforcement and attenuates the relationship between citizens and police agencies.
Originality/value
To date, only one study has examined the correlates of subsequent police responses to the crime of stalking. However, this study employed broad measures of police actions (formal and informal). The current study involves specific police actions (e.g. taking a report, referring the victim to social service agencies). Contrary to the prior study that found none of the incident and victim characteristics was related to two broad measures of subsequent police responses, this study found several incident and victim measures significantly predicted seven specific police actions.
Details
Keywords
Although much has been learnt about the psychological and physical harm caused to victims of stalking and cyberstalking, relatively little is known about the impact of stalking on…
Abstract
Although much has been learnt about the psychological and physical harm caused to victims of stalking and cyberstalking, relatively little is known about the impact of stalking on social behaviour and relationships. This paper argues that victims of stalking sometimes go on to employ stalking behaviours against others. Although often arising from an instinctive need for self‐protection, such reactive stalking can be defensive or offensive in nature. Those who engage in such behaviour may do so from a need to assert control over their lives, or from fear of further victimisation. In pursuing this argument, a case study is used to illustrate the behaviours described. The case study focuses on the experiences of three stalking victims and describes attempts to victimise the author during his research. The article also discusses some of the implications of reactive stalking for the criminal justice system and the way in which victims receive support.
Details
Keywords
This paper aims to examine factors that influence the decision to report by victims of identity theft victimization. The study of victim decision-making is not new within the…
Abstract
Purpose
This paper aims to examine factors that influence the decision to report by victims of identity theft victimization. The study of victim decision-making is not new within the field of criminology; however, a majority of the research has focused on decision-making surrounding victims of intimate partner violence and other violent offenses. With the increase of identity theft, knowledge on how a growth in such a crime influences victims is of great concern.
Design/methodology/approach
Guided by Donald Black’s theory of the behavior of law, this study will use the 2012 Identity Theft Supplement of the National Crime Victimization Survey to identify factors that influence whether victims of identity theft report the crime to credit agencies and/or authorities.
Findings
This study finds that measures that influence reporting behaviors differ based on the method of reporting (i.e. reporting to a credit card company, law enforcement or a credit bureau). These findings provide little support for Black’s theory of law, but have several theoretical and policy implications.
Originality/value
This study provides a partial test of Black’s theory of law, as it applies to identity theft victims. While providing little support for the theory, the findings identify many areas that agencies and researchers can use to help further inform their studies and practices.
Details
Keywords
This paper aims to disseminate results from research into three forms of online abuse: text messages, picture messages and online stalking.
Abstract
Purpose
This paper aims to disseminate results from research into three forms of online abuse: text messages, picture messages and online stalking.
Design/methodology/approach
Using a mixed methods design, qualitative and quantitative datasets were derived from an online anonymous questionnaire to identify themes associated with incidents of online abuse.
Findings
Women of all ages have experienced online abuse from men and other women. Men have also been targets of online abuse from other men and women.
Research limitations/implications
Researchers should strive to include mature-aged cohorts.
Practical implications
Researchers should not limit themselves to education settings for their sampling. Online abuse may meet the legal definition of “psychic assault”. The recent legislation against online abuse needs to extend beyond protecting young people and children. Social media owners must take more responsibility for the content on their platforms.
Social implications
The results from this research strongly suggest that gender alone is no longer pivotal to ones’ vulnerability to online abusers.
Originality/value
This research uses a more age-inclusive sample to include the experiences of people aged 25–75, who have largely been excluded from previous studies that have concentrated on the 18–25 age group.
Details
Keywords
This paper aims to examine demographic differences between individuals who do not take measures to protect themselves from identity theft victimization and those who do. A…
Abstract
Purpose
This paper aims to examine demographic differences between individuals who do not take measures to protect themselves from identity theft victimization and those who do. A majority of the research on identity theft has focused on predictors of victimization, reporting behaviors of the victims and their health and mental outcomes. However, little remains known about the individuals who choose to take any identity-theft measures despite concerns over this fast-growing breed of crime.
Design/methodology/approach
Guided by Felson and Cohen’s routine activities theoretical framework (1979), this study uses the 2014 Identity Theft Supplement of the National Crime Victimization Survey to identify the demographic characteristics that influence the use of self-protection measures among individuals in the general population.
Findings
This study finds that these individuals are much more likely to be white, older, female and highly educated. The decision to undertake protection against identity theft is also influenced by the following factors: prior experience of misuse, possession of a bank account in the prior 12 months, current possession of at least one credit card and awareness that one is entitled to a free copy of one’s credit report.
Originality/value
This study addresses the gap in scholarship on identity theft prevention by applying the concept of guardianship in Cohen and Felson’s routine activity theory (1979) to the usage of self-protection measures in a general population. Future findings will identify the areas which agencies and researchers can focus on to inform policies that foster individuals’ own initiatives to take self-protection measures against potential identity theft.
Details
Keywords
The key purpose of this chapter is to identify some ways of enhancing feminist conceptual, empirical, and theoretical work on violence against women. Much attention is given to…
Abstract
The key purpose of this chapter is to identify some ways of enhancing feminist conceptual, empirical, and theoretical work on violence against women. Much attention is given to addressing the harms caused by new electronic forms of woman abuse, including the role of adult Internet pornography and sex robots. This chapter also emphasises the importance of revisiting some major feminist contributions from the past.
Details
Keywords
Stig Berge Matthiesen and Ståle Einarsen
This article examines the phenomenon and concept of bullying in the workplace. Workplace bullying is a form of interpersonal aggression that can be both flagrant and subtle, but…
Abstract
This article examines the phenomenon and concept of bullying in the workplace. Workplace bullying is a form of interpersonal aggression that can be both flagrant and subtle, but is mainly characterized by its persistency and long term duration. The relationships between bullying and related concepts such as workplace aggression and interpersonal conflict are discussed. With reference to previous empirical research as well as theoretical contributions, an attempt is made to clarify some important aspects about the phenomenon, such as various subtypes of workplace bullying. Empirical findings on prevalence, antecedents and outcome factors are outlined and reviewed. The paper also discusses the dose-response perspective.
Jane Bailey, Nicola Henry and Asher Flynn
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…
Abstract
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.
Details
Keywords
Denise Hines and Emily Douglas
Research showing that women commit high rates of intimate partner violence (IPV) against men has been controversial because IPV is typically framed as caused by the patriarchal…
Abstract
Research showing that women commit high rates of intimate partner violence (IPV) against men has been controversial because IPV is typically framed as caused by the patriarchal construction of society and men's domination over women. Johnson's (1995) typology of common couple violence (CCV) and intimate terrorism (IT) attempted to resolve this controversy, but he maintained that IT was caused by patriarchy and committed almost exclusively by men. This study investigates Johnson's theory as it applies to a sample of 302 men who sustained IPV from their female partners and sought help, and a comparison sample of community men. Results showed that the male helpseekers sample was comprised of victims of IT and that violence by the male victims was part of a pattern of what Johnson labels violent resistance. Men in the community sample who were involved in IPV conformed to Johnson's description of CCV. Results are discussed in terms of research, policy, and practice implications of acknowledging women's use of severe IPV and controlling behaviour against their male partners.
Details