Abstract
Cyber world is undergoing constant and boundless development when cybercrime has always hindered its progress. The advantages of digitalization has inevitably enabled crime to expand its unhindered impact by physical limitations. As the Internet becomes accessible, cyberbullying inflicts social and mental wounds upon the victims. As the presence of cyberbullying becomes more prominent, awareness must be raised among Internet users of its insidious nature. If an individual is exposed to a criminally infested environment in his everyday lifestyle, there is a high possibility for him/her to conform to criminal behaviors and activities. Implications for Routine Activity Theory (RAT) are discussed in Taiwan cyberbullying incident. It is believed that the proposed capable guardianship strategy can protect Internet users from being victimized by cyberbullying, facilitate to cut down its circuit, and fight against it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cash, S.J., Bridge, J.A.: Epidemiology of youth suicide and suicidal behavior. Curr. Opin. Pediatr. 21(5), 613–619 (2009)
Choi, K.S.: Computer crime victimization and integrated theory: an empirical assessment. Int. J. Cyber Criminol. 2(1), 308–333 (2008)
Choi, K.S.: Cyber Criminology and Digital Investigation. LFB Scholarly Publishing LLC, El Paso (2015)
Cohen, L.E., Felson, M.: Social change and crime rate trends: a routine activity approach. Am. Sociol. Rev. 44, 588–608 (1979)
Cohen, L.E., Kluegel, J.R., Land, K.C.: Social inequality and predatory criminal victimization: an exposition and test of a formal theory. Am. Sociol. Rev. 46, 505–524 (1981)
Crick, N.R., Bigbee, M.A.: Relational and overt forms of peer victimization: a multi informant approach. J. Consult. Clin. Psychol. 66(2), 337–347 (1998)
Feinberg, T., Robey, N.: Cyberbullying. Principal Leadersh. (Middle School Edition) 9(1), 10–14 (2008)
Halder, D., Jaishankar, K.: Cyber Crime and the Victimization of Women: Laws, Rights and Regulations. Information Science Reference. IGI Global, Pennsylvania (2012)
Hinduja, S., Patchin, J.W.: Bullying, Cyberbullying, and Suicide. Arch. Suicide Res. 14(3), 206–221 (2010)
Kowalski, R.M., Limber, S.P., Agatston, P.W.: Cyberbullying: Bullying in the Digital Age, 2nd edn. Wiley-blackwell, Malden (2012)
Kwan, G.C.E., Skoric, M.M.: Facebook bullying: an extension of battles in school. Comput. Hum. Behav. 29(1), 16–25 (2013)
Maar, M.C.: An Examination of Organizational Information Protection in The Era of Social Media – A Study of Social Network Security and Privacy Protection. Proquest LLC, Michigan (2013)
Malcore, P.: Teen Cyberbullying and Social Media Use on the Rise [INFOGRAPHIC]. Rawhide Boys Ranch, pp. 1–8 (2015)
Marcum, C.D., Higgins, G.E.: Social Networking as a Criminal Enterprise. CRC Press, Florida (2014)
Miethe, T.D., Meier, R.F.: Crime and its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations. State University of New York Press, Albany (1994)
Olweus, D.: Bullying at School: What We Know and What We Can Do. Blackwell Publishing, Malden (1993)
Patchin, J.W.: Summary of Our Cyberbullying Research (2004–2016), Cyberbullying Research Center, pp. 1–2 (2016)
Ong, R.: Cyber-bullying and young people: how Hong Kong keeps the new playground safe. Comput. Law Secur. Rev. 31(5), 668–678 (2015)
Sabella, R.A., Patchin, J.W., Hinduja, S.: Cyberbullying myths and realities. Comput. Hum. Behav. 29(6), 2703–2711 (2013)
Tsaousis, I.: The relationship of self-esteem to bullying perpetration and peer victimization among schoolchildren and adolescents: a meta-analytic review. Aggress. Violent. Beh. 31, 186–199 (2016)
Wolak, J., Finkelhor, D., Mitchell, K.J., Ybarra, M.L.: Online “Predators” and their victims: myths, realities and implications for prevention and treatment. Am. Psychol. 63(2), 111–128 (2008)
Yar, M.: The novelty of cybercrime: an assessment in light of routine activities theory. Eur. J. Criminol. 2(4), 407–427 (2005)
Yucedal, B.: Victimization in Cyberspace: An Application of Routine Activity and Lifestyle Exposure Theories. Doctoral Dissertation, Kent State University Institute of Philosophy (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Kao, DY., Kluaypa, B., Lin, HC. (2017). The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory. In: Wang, G., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2017. Lecture Notes in Computer Science(), vol 10241. Springer, Cham. https://doi.org/10.1007/978-3-319-57463-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-57463-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57462-2
Online ISBN: 978-3-319-57463-9
eBook Packages: Computer ScienceComputer Science (R0)