Examining the Effectiveness of Academic Scholarship on the Fight Against Cyberbullying and Cyberstalking
Online victimization via cyberbullying and cyberstalking are plaguing our young online users. These tormenting and intrusive behaviors have infiltrated relationship formation, online communication and social identity. Friends and romantic partners have become increasingly dependent on the use of technology to initiate relationships. The purpose of this paper is to provide an overview of the current state of these online crimes and the involvement of youth and young adults. We will consider current responses by our criminal justice system, as well as our educational and community groups. Based on what is currently implemented and its success factor, we will make our assertions about the effectiveness of scholastic work and its influence on what we are doing to combat these forms of cybervictimization.
KeywordsInternet Cyberbullying Cyberstalking Victimization
- Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking Victimization in the United States. Washington, DC: US Department of Justice. Retrieved from: http://www.victimsofcrime.org/docs/src/baum-k-catalano-s-rand-m-rose-k-2009.pdf?sfvrsn=0
- Bennet, D., Guran, E., Ramos, M., & Margolin, G. (2011). College students’ electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors. Violence and Victims, (4), 410–429.Google Scholar
- Brighi, A., Melotti, G., Guarini, A., Genta, M. L., Ortega, R., Mora-Merchán, J., Smith, P. K., & Thompson, F. (2012). Self-esteem and loneliness in relation to cyberbullying in three European countries. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global playground: Research from international perspectives (pp. 32–56). Chichester: Wiley Blackwell.CrossRefGoogle Scholar
- Elphinston, R., & Noller, P. (2011). Time to face it! Facebook intrusion and implication for romantic jealousy and relationship satisfaction. Cyberpsychology, Behavior and Social Networking, 17, 3–7.Google Scholar
- Hazelwood, S., & Koon-Magnin, S. (2013). Cyberstalking and cyberharassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology, 7(2), 155–160.Google Scholar
- Hinduja, S. & Patchin, J. (2011). Electronic dating violence: A brief for educators and parents. Cyberbullying Research Center. Retrieved from http: www.cyberbullying.us. Accessed 15 June 2018
- Hinduja, S., & Patchin, J. (2015). Bullying beyond the schoolyard: Preventing and responding to cyberbullying (2nd ed.). Thousand Oaks: Sage.Google Scholar
- Hinduja, S. & Patchin, J. (2016). Bullying and cyberbullying laws. Retrieved from http://cyberbullying.org/bullying-laws. Accessed 15 June 2018
- Holt, T. J. & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1–25.Google Scholar
- Lyndon, A., Bonds-Raacke, J., & Cratty, A. (2011). College students’ Facebook stalking of ex-partners. Cyberpsychology, Behavior and Social Networking, 13, 263–268.Google Scholar
- Marcum, C.D. (2012). Cyberbullying and cyberstalking. In Crime On-Line: Correlates, Causes, and Context. 2nd Edition T. Holt (Ed.) (pp. 175–181). Carolina Academic Press.Google Scholar
- Marcum, C. D., Higgins, G. E., Freiburger, T. L., & Ricketts, M. L. (2010). Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cyber crime. International Journal of Police Science and Management, 12(4), 516–525.Google Scholar
- Marcum, C. D., Higgins, G. E., Freiburger, T. L., & Ricketts, M. L. (2013). Exploration of the cyberbullying victim/offender overlap by sex. American Journal of Criminal Justice. https://doi.org/10.1007/s12103-013-9217-3.
- Marcum, C. D., Higgins, G. E., & Mackinnon, A. L. (2016a). Identity theft reports of adolescents: Exploring the experiences of school counselors. Journal of Financial Crime, 23(4).Google Scholar
- Marcum, C. D., Higgins, G. E., & Poff, B. A. (2016b). Exploratory Investigation on Theoretical Predictors of the Electronic Leash. Computers in Human Behavior. https://doi.org/10.1016/j.chb.2016.03.010.
- Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014). Sexting behaviors among adolescents in rural North Carolina: A theoretical examination of low self-control and deviant peer association. International Journal of Cyber Criminology, 8(2), 68–78.Google Scholar
- Marshak, E. (2017). Online harassment: A legislative solution. Harvard Journal on Legislation. Retrieved from http://harvardjol.com/wp-content/uploads/2017/05/HLL205.pdf. Accessed 15 June 2018
- Mayer, J. (2016). Cybercrime litigation. University of Pennsylvania Law Review, 16, 1453–1507.Google Scholar
- Olweus, D. (1993). Bullying at School: What We Know and What We Can Do. Oxford. Cambridge: Blackwell.Google Scholar
- Olweus, D. (Ed.). (1994). Bullying at school: Long-term outcomes for victims and an effective school-based intervention program. New York: Plenum Press.Google Scholar
- Shorey, R., Sherman, A., Kivisto, A., Elkins, S., Rhatigan, D., & Moore, T. (2011). Gender differences in depression and anxiety among victims of intimate partner violence: The moderating effect of shame-proneness. Journal of Interpersonal Violence, 26, 1834–1850. https://doi.org/10.1177/0886260510372949.CrossRefGoogle Scholar