cyber abuse
Recently Published Documents


TOTAL DOCUMENTS

35
(FIVE YEARS 23)

H-INDEX

7
(FIVE YEARS 2)

2022 ◽  
Author(s):  
Norbert Litia Rogers

This paper analyses the impact that victims of cyber extortion face in particularly with revenge pornography. It points out legislation available for remedial action in civil cases such as sextortion. The paper is written to help safeguard university students from online harassment and points out the channels available for reporting incidences of revenge porn.


2022 ◽  
pp. 1-23
Author(s):  
Zarina I. Vakhitova ◽  
Clair L. Alston-Knox ◽  
Rob I. Mawby

2021 ◽  
Vol 12 ◽  
Author(s):  
Rula Odeh Alsawalqa

Gender stereotypes can influence electronic dating violence (EDV) because the victims’ experiences with abusers depict crucial social mechanisms concerning relational dependency and unequal power relations between men and women, making it difficult for women to resist, report, or escape cyber abuse. In the Arab context, cyber abuse in romantic relationships has not been sufficiently examined. This study investigated female experiences of EDV through a qualitative exploratory descriptive approach. Participants experienced several short- and long-term negative psychological and emotional behavioral responses. Our findings validate that EDV heightened the probability of intimate partner violence definitively via psychological, emotional, verbal, and physical abuse. Their resistance strategies differed according to the extent and nature of the abuse. None of the participants sought help from family due to fear of being killed or forced out of university, and realizing that they would continue to experience multiple forms of abuse. Rather, they either sought help from female professors at the university or paid the abuser to be left alone. Further, they engaged in protective behaviors to block their abusive partner’s access to them, consulted an Information Technology expert, and secretly requested assistance from the police. Preference for controlling and dominant roles, gaining monetary benefits, sexual exploitation, peer pressure, and revenge and anger due to abandonment were the leading motivations for abuse. Female students in their first year of university, those who lived in a disjointed family environment, or those who suffered abuse from their families were particularly susceptible to being victimized. Moreover, passwords shared with others or accounts left open on others’ devices also enabled EDV. Hence, universities must conduct awareness sessions, for female students, on how to manage emotions and safe communication on social media and build healthy friendships and relationships. Curricula, seminars, workshops, and courses in the Jordanian educational sector should include programs and interventions that challenge perceived gender norms. These results have significant practical and clinical implications that help understand EDV in a poorly understood context and provide the groundwork for further research on the EDV problem in Jordan, addressing a lacuna in the literature on violence against Jordanian women.


2021 ◽  
pp. 2249-2277
Author(s):  
Penny A. Leisring ◽  
Danielle M. Farrell ◽  
Daniela M. Scotto

Author(s):  
Zarina I. Vakhitova ◽  
Alisa Go ◽  
Clair L. Alston-Knox
Keyword(s):  

2021 ◽  
pp. 1-20
Author(s):  
Zarina I. Vakhitova ◽  
Clair L. Alston-Knox ◽  
Ellen Reeves ◽  
Rob I. Mawby
Keyword(s):  

2021 ◽  
pp. 089443932199461
Author(s):  
Erica R. Fissel ◽  
Amanda Graham ◽  
Leah C. Butler ◽  
Bonnie S. Fisher

As technology advances, new opportunities for partners to gain power and control in their romantic relationships are readily available. New cyber-based behaviors have slowly garnered scholarly attention, but measurement-related issues have not. We take the logical next steps to (1) develop and validate a comprehensive measure of intimate partner cyber abuse (IPCA) for adults using classical test theory and item response theory and (2) estimate IPCA prevalence rate for a range of relationship types. A sample of 1,500 adults, currently in an intimate partner relationship, 18 years or older, and living in the United States, completed an online questionnaire about their IPCA experiences within the 6 months prior. Two parameter logistic modeling and confirmatory factor analyses revealed a five-dimensional structure: cyber direct aggression, cyber sexual coercion, cyber financial control, cyber control, and cyber monitoring, with 14.85% of the sample experiencing at least one dimension. These IPCA dimensions were examined for differential functioning across gender identity, race, student status, and relationship type. Collectively, the findings have implications for IPCA measurement and related research, including theoretically derived hypotheses whose findings can inform prevention.


2021 ◽  
Vol 8 (1) ◽  
pp. 104
Author(s):  
Leuza Mubassara ◽  
Muhammad Ibrahim Ibne Towhid ◽  
Sarmin Sultana ◽  
Asibul Islam Anik ◽  
Marium Salwa ◽  
...  

Background: Cyber abuse has become common among children worldwide; however, it is yet to receive attention in Bangladesh. The present study aimed to determine the prevalence and associated risk factors of cyber child abuse in the context of Bangladesh. Methods: This population-based study was conducted on 460 children aged between 11 to 17 years recruited from a selected rural area of Bangladesh by simple random sampling. A cyber abuse scale was developed to measure the prevalence of cyber child abuse. Data were collected with a semi-structured questionnaire through face-to-face interviews. Results: Around 33 percent of children were internet users. The prevalence of at least one, two, and three form(s) of cyber abuses was 59 percent, 38 percent, and 26 percent, respectively, among the internet users. The commonly reported abuses were being subjected to bullying, mockery, rumor, or humiliation (36%), contacted anonymously with ill motive (29%), receiving sexually explicit message or comment (21%), and receiving sexually explicit picture or video (17%). Male children were victimized more by different forms of cyber abuse. Logistic regression analysis showed that children whose internet using periods are more and who have higher knowledge about cyber abuse are more likely to be victimized with cyber abuse. Conclusion: Cyber child abuse is a prevalent yet less explored public health threat in Bangladesh. Raising awareness against cyber abuse, educating children on prevention strategies, and imposing strict laws might help Bangladesh line up with the UN Convention on the Rights of the Child that the country signed in 1990. 


2020 ◽  
pp. 088626052098426
Author(s):  
Ezgi Toplu-Demirtaş ◽  
Ross W. May ◽  
Gregory S. Seibert ◽  
Frank D. Fincham

Although there is a robust positive association between cyber dating abuse victimization and depression, the direction of effects between them is unknown. Thus, we conducted two studies to investigate their temporal relationship. Study 1 ( n = 198) examined whether cyber dating abuse victimization predicted depressive symptoms 6 weeks later, after controlling for the initial level of depressive symptoms. Study 2 ( n = 264) used a two-wave, cross-lagged design to investigate possible bidirectional relations between cyber dating abuse victimization and depression. Participants in both studies were emerging adults in romantic relationships. They completed the Partner Cyber Abuse Questionnaire and depression subscale of the Depression Anxiety and Stress Scale. Many individuals (42.40% in Study 1 and 36.4% in Study 2) reported experiencing cyber abuse from their partners. Study 1 replicated the cross-sectional association previously found between cyber dating abuse victimization and depression and showed that cyber abuse predicted depression 6 weeks later. Study 2 replicated the findings of the first study and revealed that cyber dating abuse victimization was related to higher levels of depressive symptoms 12 weeks later, but the converse was not the case. These results are discussed in terms of their implications for future research and clinical practice.


Sign in / Sign up

Export Citation Format

Share Document