메뉴 건너뛰기




Volumn 36, Issue 1, 2013, Pages 1-17

The unintended consequences of digital technology: Exploring the relationship between sexting and cybervictimization

Author keywords

college students; cybervictimization; lifestyles; sexting; victimization

Indexed keywords


EID: 84897585385     PISSN: 0735648X     EISSN: 21589119     Source Type: Journal    
DOI: 10.1080/0735648X.2011.641816     Document Type: Article
Times cited : (132)

References (44)
  • 2
    • 13444309534 scopus 로고    scopus 로고
    • Sexual harassment on the Internet
    • Barak, A. 2005. Sexual harassment on the Internet. Social Science Computer Review, 23: 77-92.
    • (2005) Social Science Computer Review , vol.23 , pp. 77-92
    • Barak, A.1
  • 3
    • 80052980820 scopus 로고    scopus 로고
    • On-line activities, guardianship, and malware infection: An examination of routine activities theory
    • Bossler, A. M., and, Holt, T. J. 2009. On-line activities, guardianship, and malware infection: an examination of routine activities theory. International Journal of Cyber Criminology, 3: 400-420.
    • (2009) International Journal of Cyber Criminology , vol.3 , pp. 400-420
    • Bossler, A.M.1    Holt, T.J.2
  • 4
    • 77953123853 scopus 로고    scopus 로고
    • The effect of self-control on victimization in the cyberworld
    • Bossler, A. M., and, Holt, T. J. 2010. The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38: 227-236.
    • (2010) Journal of Criminal Justice , vol.38 , pp. 227-236
    • Bossler, A.M.1    Holt, T.J.2
  • 5
    • 84926280114 scopus 로고
    • Odum's concept of the technicways: Some reflections on an underdeveloped sociological notion
    • Bryant, C. D. 1984. Odum's concept of the technicways: some reflections on an underdeveloped sociological notion. Sociological Spectrum, 4: 115-142.
    • (1984) Sociological Spectrum , vol.4 , pp. 115-142
    • Bryant, C.D.1
  • 6
    • 77949584268 scopus 로고    scopus 로고
    • Computer crime victimization and integrated theory: An empirical assessment
    • Choi, K. 2008. Computer crime victimization and integrated theory: an empirical assessment. International Journal of Cyber Criminology, 2: 308-333.
    • (2008) International Journal of Cyber Criminology , vol.2 , pp. 308-333
    • Choi, K.1
  • 8
    • 58149476761 scopus 로고    scopus 로고
    • Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet
    • Dillman, D. A. 2009. Response rate and measurement differences in mixed-mode surveys using mail, telephone, interactive voice response (IVR) and the Internet. Social Science Research, 38: 1-18.
    • (2009) Social Science Research , vol.38 , pp. 1-18
    • Dillman, D.A.1
  • 9
    • 84859801124 scopus 로고    scopus 로고
    • Stemming sexting: Sensible legal approaches to teenagers exchange of self-produced pornography
    • Eraker, E. C. 2010. Stemming sexting: sensible legal approaches to teenagers exchange of self-produced pornography. Berkeley Technology Law Journal, 25: 555-596.
    • (2010) Berkeley Technology Law Journal , vol.25 , pp. 555-596
    • Eraker, E.C.1
  • 10
    • 0041022109 scopus 로고    scopus 로고
    • Crime in the ivory tower: Level and sources of student victimization
    • Fisher, B. S., Sloan, J. J., Cullen, F. T., and, Lu, C. 1998. Crime in the ivory tower: level and sources of student victimization. Criminology, 36: 671-710.
    • (1998) Criminology , vol.36 , pp. 671-710
    • Fisher, B.S.1    Sloan, J.J.2    Cullen, F.T.3    Lu, C.4
  • 12
    • 0027476181 scopus 로고
    • Testing the core empirical implications of Gottfredson and Hirschi's general theory of crime
    • Grasmick, H. G. 1993. Testing the core empirical implications of Gottfredson and Hirschi's general theory of crime. Journal of Research in Crime and Delinquency, 30: 5-29.
    • (1993) Journal of Research in Crime and Delinquency , vol.30 , pp. 5-29
    • Grasmick, H.G.1
  • 13
    • 77956949585 scopus 로고    scopus 로고
    • Gender, adolescent lifestyles, and violent victimization: Implications for routine activity theory
    • Henson, B. 2010. Gender, adolescent lifestyles, and violent victimization: implications for routine activity theory. Victims and Offenders, 5: 303-328.
    • (2010) Victims and Offenders , vol.5 , pp. 303-328
    • Henson, B.1
  • 17
    • 57649120953 scopus 로고    scopus 로고
    • Examining the applicability of lifestyle-routine activities theory for cybercrime victimization
    • Holt, T. J., and, Bossler, A. M. 2009. Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30: 1-25.
    • (2009) Deviant Behavior , vol.30 , pp. 1-25
    • Holt, T.J.1    Bossler, A.M.2
  • 19
    • 0022732592 scopus 로고
    • Gender, lifestyles, and victimization: Beyond routine activity
    • Jensen, G. F., and, Brownfield, D. 1986. Gender, lifestyles, and victimization: beyond routine activity. Violence and Victims, 1: 85-99.
    • (1986) Violence and Victims , vol.1 , pp. 85-99
    • Jensen, G.F.1    Brownfield, D.2
  • 20
    • 0026440771 scopus 로고
    • Conventional and delinquent activities: Implications for the prevention of violent victimization among adolescents
    • Lauritsen, J. L., Laub, J. H., and, Sampson, R. J. 1992. Conventional and delinquent activities: implications for the prevention of violent victimization among adolescents. Violence and Victims, 7: 91-108.
    • (1992) Violence and Victims , vol.7 , pp. 91-108
    • Lauritsen, J.L.1    Laub, J.H.2    Sampson, R.J.3
  • 21
    • 84984289483 scopus 로고
    • The link between offending and victimization among adolescents
    • Lauritsen, J. L., Sampson, R. J., and, Laub, J. H. 1991. The link between offending and victimization among adolescents. Criminology, 29: 265-292.
    • (1991) Criminology , vol.29 , pp. 265-292
    • Lauritsen, J.L.1    Sampson, R.J.2    Laub, J.H.3
  • 23
    • 43549095569 scopus 로고    scopus 로고
    • Control, emancipation, and status: The mobile telephone in teen's parental and peer group control relationships
    • Edited by: Kraut, R. Brynin, M. and Kiesler, S. Oxford: Oxford University Press.
    • Ling, R., and, Yttri, B. 2005. " Control, emancipation, and status: the mobile telephone in teen's parental and peer group control relationships ". In New information technologies at home: the domestic impact of computing and telecommunications, Edited by: Kraut, R., Brynin, M. and Kiesler, S. 219-235. Oxford: Oxford University Press.
    • (2005) New Information Technologies at Home: The Domestic Impact of Computing and Telecommunications , pp. 219-235
    • Ling, R.1    Yttri, B.2
  • 24
    • 78650111985 scopus 로고    scopus 로고
    • Assessing sex experiences of online victimization: Examination of adolescent online behaviors using routine activity theory
    • Marcum, C. D., Ricketts, M. L., and, Higgins, G. E. 2010. Assessing sex experiences of online victimization: examination of adolescent online behaviors using routine activity theory. Criminal Justice Review, 35: 412-437.
    • (2010) Criminal Justice Review , vol.35 , pp. 412-437
    • Marcum, C.D.1    Ricketts, M.L.2    Higgins, G.E.3
  • 25
    • 84897832088 scopus 로고    scopus 로고
    • 598 F.3d 139 (3rd Cir. 2010)
    • Miller v., Mitchell. 598 F.3d 139 (3rd Cir. 2010)
    • Miller, V.M.1
  • 26
    • 84886368928 scopus 로고    scopus 로고
    • Parental regulation and online activities: Examining factors that influence a youth's potential to become a victim of online harassment
    • Moore, R., Guntupalli, N. T., and, Lee, T. 2010. Parental regulation and online activities: examining factors that influence a youth's potential to become a victim of online harassment. International Journal of Cyber Criminology, 4: 685-698.
    • (2010) International Journal of Cyber Criminology , vol.4 , pp. 685-698
    • Moore, R.1    Guntupalli, N.T.2    Lee, T.3
  • 27
    • 0040676527 scopus 로고    scopus 로고
    • Predicting risks of larceny theft victimization: A routine activity analysis using refined lifestyles measures
    • Mustaine, E. E., and, Tewksbury, R. 1998. Predicting risks of larceny theft victimization: a routine activity analysis using refined lifestyles measures. Criminology, 36: 829-858.
    • (1998) Criminology , vol.36 , pp. 829-858
    • Mustaine, E.E.1    Tewksbury, R.2
  • 28
    • 79955486500 scopus 로고    scopus 로고
    • National Campaign to Prevent Teen and Unplanned Pregnancy and CosmoGirl.com. Washington, DC: National Campaign to Prevent Teen and Unplanned Pregnancy.
    • National Campaign to Prevent Teen and Unplanned Pregnancy and CosmoGirl.com. 2008. Sex and tech: results from a survey of teens and young adults, Washington, DC: National Campaign to Prevent Teen and Unplanned Pregnancy.
    • (2008) Sex and Tech: Results from A Survey of Teens and Young Adults
  • 29
    • 0011466221 scopus 로고
    • Notes on the technicways in contemporary society
    • Odum, H. W. 1937. Notes on the technicways in contemporary society. American Sociological Review, 2: 336-346.
    • (1937) American Sociological Review , vol.2 , pp. 336-346
    • Odum, H.W.1
  • 30
    • 0039842473 scopus 로고    scopus 로고
    • The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis
    • Pratt, T. C., and, Cullen, F. T. 2000. The empirical status of Gottfredson and Hirschi's general theory of crime: a meta-analysis. Criminology, 38: 931-964.
    • (2000) Criminology , vol.38 , pp. 931-964
    • Pratt, T.C.1    Cullen, F.T.2
  • 32
    • 77949590385 scopus 로고    scopus 로고
    • A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers
    • Reyns, B. W. 2010b. A situational crime prevention approach to cyberstalking victimization: preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety, 12: 99-118.
    • (2010) Crime Prevention and Community Safety , vol.12 , pp. 99-118
    • Reyns, B.W.1
  • 33
    • 80053010912 scopus 로고    scopus 로고
    • Being pursued online: Applying cyberlifestyle-routine activities theory to cyberstalking victimization
    • Reyns, B. W., Henson, B., and, Fisher, B. S. 2011. Being pursued online: applying cyberlifestyle-routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38: 1149-1169.
    • (2011) Criminal Justice and Behavior , vol.38 , pp. 1149-1169
    • Reyns, B.W.1    Henson, B.2    Fisher, B.S.3
  • 34
    • 26844555441 scopus 로고    scopus 로고
    • Criminal victimization and low self-control: An extension and test of a general theory of crime
    • Schreck, C. J. 1999. Criminal victimization and low self-control: an extension and test of a general theory of crime. Justice Quarterly, 16: 633-654.
    • (1999) Justice Quarterly , vol.16 , pp. 633-654
    • Schreck, C.J.1
  • 35
    • 57349112274 scopus 로고    scopus 로고
    • A reappraisal of the overlap of violent offenders and victims
    • Schreck, C. J., Stewart, E. A., and, Osgood, D. W. 2008. A reappraisal of the overlap of violent offenders and victims. Criminology, 46: 871-906.
    • (2008) Criminology , vol.46 , pp. 871-906
    • Schreck, C.J.1    Stewart, E.A.2    Osgood, D.W.3
  • 38
    • 79952582307 scopus 로고    scopus 로고
    • Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization
    • van Wilsem, J. 2011. Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8: 115-127.
    • (2011) European Journal of Criminology , vol.8 , pp. 115-127
    • Van Wilsem, J.1
  • 39
    • 34247967403 scopus 로고
    • Howard Odum's technicways: A neglected lead in American sociology
    • Vance, R. B. 1972. Howard Odum's technicways: a neglected lead in American sociology. Social Forces, 50: 456-461.
    • (1972) Social Forces , vol.50 , pp. 456-461
    • Vance, R.B.1
  • 40
    • 79952731005 scopus 로고    scopus 로고
    • Child's play or child pornography: The need for better laws regarding sexting
    • Walker, J. T., and, Moak, S. C. 2010. Child's play or child pornography: the need for better laws regarding sexting. ACJS Today, 35: 1-9.
    • (2010) ACJS Today , vol.35 , pp. 1-9
    • Walker, J.T.1    Moak, S.C.2
  • 41
    • 82355166337 scopus 로고    scopus 로고
    • The harm in sexting?: Analyzing the constitutionality of child pornography statutes that prohibit the voluntary production, possession, and dissemination of sexually explicit images by teenagers
    • Wastler, S. 2010. The harm in sexting?: analyzing the constitutionality of child pornography statutes that prohibit the voluntary production, possession, and dissemination of sexually explicit images by teenagers. Harvard Journal of Law and Gender, 33: 687-702.
    • (2010) Harvard Journal of Law and Gender , vol.33 , pp. 687-702
    • Wastler, S.1
  • 44
    • 38849154633 scopus 로고    scopus 로고
    • How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs
    • Ybarra, M. L., and, Mitchell, K. J. 2008. How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics, 120: 350-357.
    • (2008) Pediatrics , vol.120 , pp. 350-357
    • Ybarra, M.L.1    Mitchell, K.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.