{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2016-06-22T13:18:09+00:00", "custom_fields": { "journal:journal": { "issue": "2", "pages": "144-161", "title": "International Journal of Cyber Criminology", "volume": "9" } }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "KerstensVeenstra2015vol9issue2.pdf": { "checksum": "md5:719abe5e1c0a0193bc5875c2cc477ed7", "ext": "pdf", "id": "e92bee57-f6cd-4aca-a343-b806484f26fa", "key": "KerstensVeenstra2015vol9issue2.pdf", "metadata": null, "mimetype": "application/pdf", "size": 347089 } }, "order": [], "total_bytes": 347089 }, "id": "55055", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/55055/access", "access_links": "https://zenodo.org/api/records/55055/access/links", "access_request": "https://zenodo.org/api/records/55055/access/request", "access_users": "https://zenodo.org/api/records/55055/access/users", "archive": "https://zenodo.org/api/records/55055/files-archive", "archive_media": "https://zenodo.org/api/records/55055/media-files-archive", "communities": "https://zenodo.org/api/records/55055/communities", "communities-suggestions": "https://zenodo.org/api/records/55055/communities-suggestions", "doi": "https://doi.org/10.5281/zenodo.55055", "draft": "https://zenodo.org/api/records/55055/draft", "files": "https://zenodo.org/api/records/55055/files", "latest": "https://zenodo.org/api/records/55055/versions/latest", "latest_html": "https://zenodo.org/records/55055/latest", "media_files": "https://zenodo.org/api/records/55055/media-files", "parent": "https://zenodo.org/api/records/636457", "parent_doi": "https://zenodo.org/doi/", "parent_html": "https://zenodo.org/records/636457", "requests": "https://zenodo.org/api/records/55055/requests", "reserve_doi": "https://zenodo.org/api/records/55055/draft/pids/doi", "self": "https://zenodo.org/api/records/55055", "self_doi": "https://zenodo.org/doi/10.5281/zenodo.55055", "self_html": "https://zenodo.org/records/55055", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:55055/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:55055/sequence/default", "versions": "https://zenodo.org/api/records/55055/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "contributors": [ { "affiliations": [ { "name": "Raksha Shakti University" } ], "person_or_org": { "family_name": "Jaishankar", "given_name": "K", "name": "Jaishankar, K", "type": "personal" }, "role": { "id": "editor", "title": { "de": "EditorIn", "en": "Editor" } } } ], "creators": [ { "affiliations": [ { "name": "NHL University and Police Academy, the Netherlands" } ], "person_or_org": { "family_name": "Kerstens", "given_name": "Joyce", "name": " Kerstens, Joyce ", "type": "personal" } }, { "affiliations": [ { "name": "NHL University and Police Academy, the Netherlands" } ], "person_or_org": { "family_name": "Veenstra", "given_name": "Sander", "name": "Veenstra, Sander ", "type": "personal" } } ], "description": "
It is assumed that the online world creates new possibilities for criminal behaviour. Only recently criminologists started the debate on the applicability of traditional criminological theories to cyber crime offending. Analyses based on a Dutch survey among 6,299 adolescents (50.9 % male), aged from 10 to 18 (M = 13.0, SD = 1.87) indicate that cyber bullying behaviour is not only strongly interwoven with traditional bullying behaviours, but also is affected by the distinct features of the online environment. The findings give support to the suggestion that the aetiological schema to explain cyber bullying should postulate the interaction between individual characteristics, distinct features of the online environment and the interaction between offline and online social realities.
\n\n", "publication_date": "2016-06-07", "publisher": "Zenodo", "references": [ { "reference": "Amato, P., & Fowler, F. (2002). Parenting practices, child adjustment, and family diversity. Journal of Marriage and Family, 64, 703-716." }, { "reference": "Andriessen, D., Onstenk, J., Delnooz, P., Smeijsters, H., & Peij, S. (2010). Gedragscode praktijkgericht onderzoek voor het hbo; Gedragscode voor het voorbereiden en uitvoeren van praktijkgericht onderzoek binnen het Hoger Beroepsonderwijs in Nederland [Dutch Code of conduct for research in applied sciences]. Delft: Elan Strategie & Creatie." }, { "reference": "Armsden, G. C., & Greenberg, M. T. (1987). The Inventory of Parent and Peer Attachment: Individual Differences and their Relationship to Psychological Well-Being in Adolescence. Journal of Youth and Adolescence, 16, 427-454." }, { "reference": "Bernard, T. J. (2002). Twenty years of testing theories. What have we learned and why? In S. C\u00f4te (Ed.), Criminological theories. Bridging the past to the future (pp. 5-13). London: Sage." }, { "reference": "Bottoms, A. (2000). The relationship between theory and research in criminology. In R. D. King & E. Wincup (Eds.), Doing research on crime and justice (pp. 15-60). Oxford: Oxford University Press." }, { "reference": "Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588-608." }, { "reference": "Dijk, T. van (2012). Toegang en toezicht, online tijdbesteding en \u2013activiteiten [Access and monitoring, time online and online activities]. In J. Kerstens & W. Ph. Stol (Red.), Jeugd en Cybersafety, Online slachtoffer- en daderschaponderNederlandsejongeren [Youth & Cybersafety: Online victimization and perpetration among Dutch youth] (pp. 55-72). Den Haag: Boom Lemma uitgevers." }, { "reference": "Eijnden, R. van den, Meerkerk, G., Vermulst, A., Spijkerman, R., & Engels, R. (2008). Online communication, compulsive Internet use and psychosocial well-being among adolescents: a longitudinal study. Developmental Psychology, 44, 655-665." }, { "reference": "Gottfredson, M. R., & Hirschi, T. (1990). A General Theory of Crime. Stanford: Stanford University Press." }, { "reference": "Gottfredson, M. R., & Hirschi, T. (2003). Self-control and opportunity. In C.L. Britt & M. R. Gottfredson (Eds.), Control Theories of Crime and Delinquency (pp. 5-39). New Brunswick: Transaction Publishers." }, { "reference": "Grabosky, P. (2001). Virtual criminality: old wine in new bottles? Social & Legal Studies, 10, 243-249." }, { "reference": "Grasmick, H. G., Tittle, C. R., Bursik Jr. R. J., & Arneklev, B. J. (1993). Testing the core empirical implications of Gottfredson and Hirschi\u2019s general theory of crime. Journal of Research in Crime and Delinquency, 30, 5-29." }, { "reference": "Hay, C. & W. Forrest. (2008). Self-control theory and the concept of opportunity: The case for a more systematic union. Criminology, 46, 1039-1072." }, { "reference": "Hinduja, S., & Patchin, J.W. (2008). Cyberbullying: an exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129-156." }, { "reference": "Holt, T. J. (Ed.) (2013). Cyber crime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft and Harassment. San Diego: Cognella." }, { "reference": "Jaishankar, K. (2008). Space transition theory of cyber crimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 283\u2212301). Upper Saddle River, NJ: Prentice Hall." }, { "reference": "Jaishankar, K. (Ed.) (2011). Cyber Criminology: Exploring Internet Crimes and Criminal Behavior. Boca Raton: Taylor & Francis Group." }, { "reference": "Junger-Tas, J., Steketee, M. &, Moll, M. (2008). Achtergronden van jeugddelinquentie en middelengebruik [The background of juvenile delinquency and substance use]. Utrecht: Verwey-Jonker Instituut." }, { "reference": "Kerstens, J., & Stol, W. P. (2012). Jeugd en Cybersafety: Online slachtoffer- en daderschap onder Nederlandse jongeren [Youth& Cybersafety: Online victimization and perpetration among Dutch youth]. Den Haag: Boom Lemma uitgevers." }, { "reference": "Kowalski, R., & Limber, S. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41(6), s22-s30." }, { "reference": "Lemmens, J. S., Valkenburg, P. M., & Peter, J. (2009). Development and validation of a game addiction scale for adolescents. Media Psychology, 12, 77-95." }, { "reference": "Livingstone, S. (2009). Children and the Internet: Great Expectations, Challenging Realities. Cambridge: Polity." }, { "reference": "Livingstone, S., Haddon, L., G\u00f6rzig, A., \u00d3lafsson, K. (2011). Risks and safety on the Internet: The perspective of European children. Full Findings. LSE, London: EU Kids Online." }, { "reference": "McGuire, M. (2007). Hypercrime: The new geometry of harm. New York: Routledge-Cavendish." }, { "reference": "McQuade, S. C. (2006). Understanding and Managing Cyber crime. Boston: Pearson Education, Inc." }, { "reference": "Meerkerk, G. J. (2007). Pwned by the internet: Explorative research into the causes and consequences of compulsive internet use (PhD thesis). Rotterdam: Erasmus Universiteit Rotterdam." }, { "reference": "Menesini, E. (2012).Cyber bullying: The right value of the phenomenon. Comments on the paper \u201cCyberbullying: An overrated phenomenon?\u201d. European Journal of Developmental Psychology, 9(5), 544-552." }, { "reference": "Nikken, P., &Jansz, J. (2011). Parental mediation of young children\u2019s Internet use. London: EU Kids Online Conference 2011, September 22-23." }, { "reference": "Nofziger, S. (2001). Bullies, Fights and Guns: Testing Self-Control Theory with Juveniles. New York: LFB Scholarly Publishing LLC." }, { "reference": "Olweus, D. (1993). Bullying at school: What we know and what we can do. Oxford: Blackwell Publishers." }, { "reference": "Olweus, D. (2010). Understanding and researching bullying: Some critical issues. In S. R. Jimerson, S. M. Swearer, & D. L. Espelage (Eds.), Handbook of bullying in schools: An international perspective (pp. 9-33). New York: Routledge." }, { "reference": "Olweus, D. (2012). Cyberbullying: An overrated phenomenon? European Journal of Developmental Psychology, 9(5), 520-538." }, { "reference": "Patchin, J.W., & Hinduja, S. (2012). Cyberbullying: An update and synthesis of the research. In J. W. Patchin& S. Hinduja (Eds.), Cyberbullying prevention and response: Expert perspectives (pp. 13-35). New York: Routledge." }, { "reference": "Pettit, G. S., Laird, R. D., Dodge, K. A., Bates, J. E., & Criss, M. M. (2001). Antecedents and behavior-problem outcomes of parental monitoring and psychological control in early adolescence. Child Development, 72(2), 583-598." }, { "reference": "Pratt, T. C., & Cullen, F.T. (2000). The empirical status of Gottfredson and Hirschi's General Theory of Crime: A meta-analysis. Criminology, 38, 931-964." }, { "reference": "Rooij, T. van, &Eijnden, R. van den (2007). Monitor internet en jongeren 2006 en 2007: Ontwikkelingen in internetgebruik en de rol van opvoeding [Monitor Internet and Youth 2006 and 2007: Developments in Internet use and the role of education]. Rotterdam: IVO." }, { "reference": "Salmivalli, C. (2010). Bullying and the peer group: A review. Aggression and Violent Behavior, 15(2), 112-120." }, { "reference": "Schouten, A. P., Valkenburg, P. M., & Peter, J. (2007). Precursors and Underlying Processes of Adolescents\u2019 Online Self-Disclosure: Developing and Testing an \u201cInternet-Attribute-Perception\u201d Model. Media Psychology, 10(2), 292-314." }, { "reference": "Smith, P. K., del Barrio, C., & Tokunaga, R. G. (2013). Definitions of Bullying and Cyberbullying: How useful are the terms? In S. Bauman, D. Cross, & J. Walker (Eds.). Principles of Cyberbullying Research: Definitions, Measures, and Methodology (pp. 26-40). New York: Routledge." }, { "reference": "Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, & Tippet, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49, 376-385." }, { "reference": "Sticca, F., Ruggieri, S., Alsaker, F., &Perren, S. (2013). Longitudinal Risk Factors for Cyberbullying in Adolescence. Journal of Community & Applied Social Psychology, 23, 52-67.doi: 10.1002/casp.2136" }, { "reference": "Stol, W. Ph. (2012). Cyberspace and safety. In E. R. Leukfeldt & W. Ph. Stol (Eds.), Cybersafety: An Introduction (pp. 19-30). Den Haag: Eleven International Publishing." }, { "reference": "Subrahmanyam, K, & \u0160mahel, D. (2011). Digital Youth: The Role of Media in Development. New York: Springer." }, { "reference": "Suler, J. R. (2004). The online disinhibition effect. CyberPsychology and Behavior,7, 321-326." }, { "reference": "Taylor, R., Caeti, T., Loper, D., Fritsch, E., &Liederbach, J. (2006). Digital Crime and Digital Terrorism. Upper Saddle River, New Jersey: Pearson Education Inc." }, { "reference": "Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2010). Digital Crime and Digital Terrorism. Upper Saddle River, NJ: Pearson Prentice Hall." }, { "reference": "Tittle, C.R., Ward, D.A., & Grasmick, H. G. (2003). Self-control and crime/deviance: Cognitive vs. behavioral measures. Journal of Quantitative Criminology, 19(4), 333-348." }, { "reference": "Tokunaga, R.S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computer in Human Behavior, 26, 277-287." }, { "reference": "Udris, R. (2014). Cyberbullying among high school students in Japan: Development and validation of the Online Disinhibition Scale. Computers in Human Behavior, 41, 253-261." }, { "reference": "Unnever, J.D, & Cornell, D.G. (2003). Bullying, self-control, and ADHD. Journal of Interpersonal Violence, 18(2),129-147." }, { "reference": "Vaillancourt, T., McDougall, P., Hymel, S., Krygsman, A., Miller, J., Stiver, K. et al. (2008). Bullying: Are researchers and children/youth talking about the same thing? International Journal of Behavioral Development, 32, 486-495." }, { "reference": "Vandebosch, H., Cleemput, K. van, Mortelmans, D. & Walrave, M. (2006). Cyberpestenbijjongeren in Vlaanderen [Cyberbullying among youth in Flanders]. Brussel: viWTA." }, { "reference": "Veenstra, S. (2012). Cyberpesten [Cyberbullying]. In J. Kerstens & W. Ph. Stol (Red.), Jeugd en Cybersafety, Online slachtoffer- en daderschap onder Nederlandse jongeren [Youth & Cybersafety: Online victimization and perpetration among Dutch youth] (pp. 73-103). Den Haag: Boom Lemma uitgevers." }, { "reference": "Veiligheidsmonitor (2013). Veiligheidsmonitor 2012 [Safety Monitor 2012]. Den Haag: CBS/Ministerie van Veiligheid en Justitie." }, { "reference": "Von Mar\u00e9es, N., & Petermann, F. (2012). Cyberbullying: An increasing challenge for schools. School Psychology International, 33, 467-476." }, { "reference": "Wall, D. (2001). Cyber crimes and the Internet. In D. Wall. (Ed.), Crime and the Internet (pp. 1-17), London: Routledge." }, { "reference": "Williams, K. R., & Guerra, N. G. (2007). Prevalence and predictors of Internet bullying. Journal of Adolescent Health, 41, S14-S21." }, { "reference": "Wilson, J.Q., & Herrnstein, R.J. (1985). Crime and Human Nature. New York: Simon & Schuster." }, { "reference": "Yar, M. (2005). \u2018The Novelty of \u2018Cyber crime\u2019: An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2(4), 407-427." }, { "reference": "Yar, M. (2006). Cyber crime and Society. London: Sage." }, { "reference": "Yar, M. (2012). Sociological en Criminological Theories in the Information Era. In E.R. Leukfeldt, & W.Ph. Stol (Eds.) Cyber Safety: An Introduction (pp. 45-55). Den Haag: Eleven International Publishing." }, { "reference": "Ybarra, M. L., & Mitchell, K. (2004). Youth engaging in online harassment: associations with caregiver-child relationships, Internet use and personal characteristics. Journal of Adolescence, 27(3), 319-336." }, { "reference": "Ybarra, M. L., & Mitchell, K. (2007). Prevalence and frequency of Internet harassment instigation: Implications for adolescent health. Journal of Adolescent Health, 41(2), 189-195." } ], "related_identifiers": [ { "identifier": "http://cybercrimejournal.com/Kerstens&Veenstra2015vol9issue2.pdf", "relation_type": { "id": "isidenticalto", "title": { "de": "Ist identisch mit", "en": "Is identical to" } }, "scheme": "url" } ], "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "rights": [ { "description": { "en": "" }, "icon": "cc-by-nc-sa-icon", "id": "cc-by-nc-sa-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution Non Commercial Share Alike 4.0 International" } } ], "subjects": [ { "subject": "Cyber bullying, Adolescents, Cyber Crime, Criminological Theory, Interrelation Online Offline, Features Online Environment, Perspective of Youth." } ], "title": "Cyber Bullying in the Netherlands: A Criminological Perspective" }, "parent": { "access": { "owned_by": { "user": 13663 } }, "communities": { "default": "9dc977ce-8c52-41f6-b0a1-99d351310dd8", "entries": [ { "access": { "member_policy": "open", "members_visibility": "public", "record_policy": "open", "review_policy": "open", "visibility": "public" }, "children": { "allow": false }, "created": "2015-08-02T09:29:30+00:00", "custom_fields": {}, "deletion_status": { "is_deleted": false, "status": "P" }, "id": "9dc977ce-8c52-41f6-b0a1-99d351310dd8", "links": {}, "metadata": { "curation_policy": "", "page": "
International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy.IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety and policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.
\r\n\r\nhttp://www.cybercrimejournal.com
", "title": "International Journal of Cyber Criminology (ISSN: 0974 \u2013 2891) " }, "revision_id": 0, "slug": "cybercriminologyjournal", "updated": "2016-07-26T09:19:23+00:00" } ], "ids": [ "9dc977ce-8c52-41f6-b0a1-99d351310dd8" ] }, "id": "636457", "pids": { "doi": { "identifier": "", "provider": "legacy" } } }, "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.55055", "provider": "datacite" }, "oai": { "identifier": "oai:zenodo.org:55055", "provider": "oai" } }, "revision_id": 10, "stats": { "all_versions": { "data_volume": 105167967.0, "downloads": 303, "unique_downloads": 281, "unique_views": 492, "views": 519 }, "this_version": { "data_volume": 105167967.0, "downloads": 303, "unique_downloads": 281, "unique_views": 492, "views": 519 } }, "status": "published", "updated": "2020-01-20T16:50:54.165056+00:00", "versions": { "index": 1, "is_latest": true } }