메뉴 건너뛰기




Volumn 36, Issue 3, 2011, Pages 253-268

Security in the 21st century: Examining the link between online social network activity, privacy, and interpersonal victimization

Author keywords

Cybercrime; Online Victimization; Security; Social Networks

Indexed keywords


EID: 80051936286     PISSN: 07340168     EISSN: 15563839     Source Type: Journal    
DOI: 10.1177/0734016811399421     Document Type: Article
Times cited : (52)

References (38)
  • 2
    • 80051936424 scopus 로고    scopus 로고
    • Alexa Web Information Company Retrieved on March 25, 2010 from
    • Alexa Web Information Company. (2010). Site information: Facebook. Retrieved on March 25, 2010 fromhttp://www.alexa.com/siteinfo/facebook.com.
    • (2010) Site information: Facebook
  • 5
    • 80051925908 scopus 로고    scopus 로고
    • CheckFacebook.com Retrieved October 25, 2010, from
    • CheckFacebook.com. (2010). United States: User demographics. Retrieved October 25, 2010, fromhttp://www.checkfacebook.com/.
    • (2010) United States: User demographics
  • 6
    • 77949584268 scopus 로고    scopus 로고
    • Computer crime victimization and integrated theory: An empirical assessment
    • Choi K.Computer crime victimization and integrated theory: An empirical assessment.International Journal of Cyber Criminology. 2008;2:308-333.
    • (2008) International Journal of Cyber Criminology , vol.2 , pp. 308-333
    • Choi, K.1
  • 7
    • 0034366421 scopus 로고    scopus 로고
    • Web surveys: A review of issues and approaches
    • Couper M. P.Web surveys: A review of issues and approaches.Public Opinion Quarterly. 2000;64:464-494.
    • (2000) Public Opinion Quarterly , vol.64 , pp. 464-494
    • Couper, M.P.1
  • 8
    • 58149476761 scopus 로고    scopus 로고
    • Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet
    • Dillman D. A.,Phelps G.,Tortora R.,Swift K.,Kohrell J.,Berck J.,Messer B. L.Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet.Social Science Research. 2009;38:1-18.
    • (2009) Social Science Research , vol.38 , pp. 1-18
    • Dillman, D.A.1    Phelps, G.2    Tortora, R.3    Swift, K.4    Kohrell, J.5    Berck, J.6    Messer, B.L.7
  • 9
    • 27244447793 scopus 로고    scopus 로고
    • A study on cyberstalking: Understanding investigative hurdles
    • D'Ovidio R.,Doyle J.A study on cyberstalking: Understanding investigative hurdles.FBI Law Enforcement Bulletin. 2003;73:10-17.
    • (2003) FBI Law Enforcement Bulletin , vol.73 , pp. 10-17
    • D'Ovidio, R.1    Doyle, J.2
  • 10
    • 67549113728 scopus 로고    scopus 로고
    • Trust and privacy concern within social networking sites
    • Proceedings of the Thirteenth Americas Conference on Information Systems
    • Dwyer C.,Hiltz S. R.,Passerini K.Trust and privacy concern within social networking sites. Proceedings of the Thirteenth Americas Conference on Information Systems; 2007; 2007.
    • (2007)
    • Dwyer, C.1    Hiltz, S.R.2    Passerini, K.3
  • 11
    • 77951895676 scopus 로고    scopus 로고
    • Facebook Retrieved March 30, 2010, from
    • Facebook. (2010). Press room: Statistics. Retrieved March 30, 2010, fromhttp://www.facebook.com/press/info.php?statistics.
    • (2010) Press room: Statistics
  • 13
    • 1842424381 scopus 로고    scopus 로고
    • A survey of online harassment at a university campus
    • Finn J.A survey of online harassment at a university campus.Journal of Interpersonal Violence. 2004;19:468-483.
    • (2004) Journal of Interpersonal Violence , vol.19 , pp. 468-483
    • Finn, J.1
  • 14
    • 85055401848 scopus 로고    scopus 로고
    • Being pursued: Stalking victimization in a national sample of college women
    • Fisher B. S.,Cullen F. T.,Turner M. G.Being pursued: Stalking victimization in a national sample of college women.Criminology & Public Policy. 2002;1:257-308.
    • (2002) Criminology and Public Policy , vol.1 , pp. 257-308
    • Fisher, B.S.1    Cullen, F.T.2    Turner, M.G.3
  • 15
  • 16
    • 65249123151 scopus 로고    scopus 로고
    • Fear of crime among college students: A test of the shadow of sexual assault hypothesis
    • Hilinski C. M.Fear of crime among college students: A test of the shadow of sexual assault hypothesis.American Journal of Criminal Justice. 2009;34:84-102.
    • (2009) American Journal of Criminal Justice , vol.34 , pp. 84-102
    • Hilinski, C.M.1
  • 17
    • 38549162730 scopus 로고    scopus 로고
    • Personal information of adolescents on the Internet: A quantitative content analysis of MySpace
    • Hinduja S.,Patchin J. W.Personal information of adolescents on the Internet: A quantitative content analysis of MySpace.Journal of Adolescence. 2008;31:125-146.
    • (2008) Journal of Adolescence , vol.31 , pp. 125-146
    • Hinduja, S.1    Patchin, J.W.2
  • 18
    • 37249019175 scopus 로고    scopus 로고
    • The Fourth Amendment and privacy issues on the "new" Internet: Facebook.com and MySpace.com
    • Hodge M. J.The Fourth Amendment and privacy issues on the "new" Internet: Facebook.com and MySpace.com.Southern Illinois University Law Journal. 2007;31:95-123.
    • (2007) Southern Illinois University Law Journal , vol.31 , pp. 95-123
    • Hodge, M.J.1
  • 19
    • 57649120953 scopus 로고    scopus 로고
    • Examining the applicability of lifestyle-routine activities theory for cybercrime victimization
    • Holt T. J.,Bossler A. M.Examining the applicability of lifestyle-routine activities theory for cybercrime victimization.Deviant Behavior. 2009;30:1-25.
    • (2009) Deviant Behavior , vol.30 , pp. 1-25
    • Holt, T.J.1    Bossler, A.M.2
  • 21
    • 59949099735 scopus 로고    scopus 로고
    • Retrieved March 30, 2010, from
    • JonesH.SoltrenJ. H. (2005). Facebook: Threats to privacy. Retrieved March 30, 2010, fromhttp://www.swiss.ai.mit.edu/6095/student-papers/fall05-papers/facebook.pdf.
    • (2005) Facebook: Threats to privacy
    • Jones, H.1    Soltren, J.H.2
  • 22
    • 80051937844 scopus 로고    scopus 로고
    • LinkedIn Retrieved April 30, 2010, from
    • LinkedIn. (2010). About. Retrieved April 30, 2010, fromhttp://press.linkedin.com/about.
    • (2010) About
  • 23
    • 77952140052 scopus 로고    scopus 로고
    • Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory
    • Marcum C. D.,Higgins G. E.,Ricketts M. L.Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory.Deviant Behavior. 2010a;31:381-410.
    • (2010) Deviant Behavior , vol.31 , pp. 381-410
    • Marcum, C.D.1    Higgins, G.E.2    Ricketts, M.L.3
  • 24
    • 78650111985 scopus 로고    scopus 로고
    • Assessing sex experiences of online victimization: An examination of adolescent online behaviors using routine activity theory
    • Marcum C. D.,Higgins G. E.,Ricketts M. L.Assessing sex experiences of online victimization: An examination of adolescent online behaviors using routine activity theory.Criminal Justice Review. 2010b;35:412-427.
    • (2010) Criminal Justice Review , vol.35 , pp. 412-427
    • Marcum, C.D.1    Higgins, G.E.2    Ricketts, M.L.3
  • 25
    • 80051953002 scopus 로고    scopus 로고
    • MySpace Retrieved March 30, 2010, from
    • MySpace. (2010). Press room: Fact sheet. Retrieved March 30, 2010, fromhttp://www.myspace.com/pressroom?url=/fact+sheet/.
    • (2010) Press room: Fact sheet
  • 27
    • 74949109669 scopus 로고    scopus 로고
    • Career dimensions of stalking victimization and perpetration
    • Nobles M. R.,Fox K. A.,Piquero N.,Piquero A. R.Career dimensions of stalking victimization and perpetration.Justice Quarterly. 2009;26:476-503.
    • (2009) Justice Quarterly , vol.26 , pp. 476-503
    • Nobles, M.R.1    Fox, K.A.2    Piquero, N.3    Piquero, A.R.4
  • 28
    • 66249084194 scopus 로고    scopus 로고
    • Child abuse, avatar choices, and other risk factors associated with Internet-initiated victimization of adolescent girls
    • Noll J. G.,Shenk C. E.,Barnes J. E.,Putnam F. W.Child abuse, avatar choices, and other risk factors associated with Internet-initiated victimization of adolescent girls.Pediatrics. 2010;123:1078-1083.
    • (2010) Pediatrics , vol.123 , pp. 1078-1083
    • Noll, J.G.1    Shenk, C.E.2    Barnes, J.E.3    Putnam, F.W.4
  • 29
    • 77953121627 scopus 로고    scopus 로고
    • Look who's stalking: Obsessive pursuit and attachment theory
    • Patton C. L.,Nobles M. R.,Fox K. A.Look who's stalking: Obsessive pursuit and attachment theory.Journal of Criminal Justice. 2010;38 (3): 282-290.
    • (2010) Journal of Criminal Justice , vol.38 , Issue.3 , pp. 282-290
    • Patton, C.L.1    Nobles, M.R.2    Fox, K.A.3
  • 31
    • 77949590385 scopus 로고    scopus 로고
    • A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers
    • Reyns B. W.A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers.Crime Prevention and Community Safety. 2010b;12:99-118.
    • (2010) Crime Prevention and Community Safety , vol.12 , pp. 99-118
    • Reyns, B.W.1
  • 33
    • 0036116614 scopus 로고    scopus 로고
    • Cyberstalking and the technologies of interpersonal terrorism
    • Spitzberg B. H.,Hoobler G.Cyberstalking and the technologies of interpersonal terrorism.New Media & Society. 2002;4:71-92.
    • (2002) New Media & Society , vol.4 , pp. 71-92
    • Spitzberg, B.H.1    Hoobler, G.2
  • 34
    • 80051944691 scopus 로고    scopus 로고
    • Tagged Retrieved April 30, 2010, from
    • Tagged. (2010). About. Retrieved April 30, 2010, fromhttp://about-tagged.com/.
    • (2010) About
  • 35
    • 40049108338 scopus 로고    scopus 로고
    • Online "predators" and their victims: Myths, realities, and implications for prevention and treatment
    • Wolak J.,Finkelhor D.,Mitchell K. J.,Ybarra M. L.Online "predators" and their victims: Myths, realities, and implications for prevention and treatment.American Psychologist. 2008;63:111-128.
    • (2008) American Psychologist , vol.63 , pp. 111-128
    • Wolak, J.1    Finkelhor, D.2    Mitchell, K.J.3    Ybarra, M.L.4
  • 36
    • 36348932137 scopus 로고    scopus 로고
    • The co-occurrence of Internet harassment and unwanted sexual solicitation victimization and perpetration: Associations with psychosocial indicators
    • Ybarra M. L.,Espelage D. L.,Mitchell K. J.The co-occurrence of Internet harassment and unwanted sexual solicitation victimization and perpetration: Associations with psychosocial indicators.Journal of Adolescent Health. 2007;41:31-41.
    • (2007) Journal of Adolescent Health , vol.41 , pp. 31-41
    • Ybarra, M.L.1    Espelage, D.L.2    Mitchell, K.J.3
  • 37
    • 38849154633 scopus 로고    scopus 로고
    • How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs
    • Ybarra M. L.,Mitchell K. J.How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs.Pediatrics. 2008;121:350-357.
    • (2008) Pediatrics , vol.121 , pp. 350-357
    • Ybarra, M.L.1    Mitchell, K.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.