SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Vakhitova ZI, Go A, Alston-Knox CL. Am. J. Crim. Justice 2023; 48(1): 96-122.

Copyright

(Copyright © 2023, College of Law Enforcement, Eastern Kentucky University, Publisher Holtzbrinck Springer Nature Publishing Group)

DOI

10.1007/s12103-021-09641-w

PMID

unavailable

Abstract

The ever-increasing use of telecommunication technologies and the Internet have led to an increase in new technology-facilitated types of crime and deviance. Due to the challenges posed by the unique environment of cyberspace on the formal crime control agents (e.g., the police), the role of informal guardians becomes particularly salient. The recent research suggests that informal guardianship against conventional crimes is common and that victims who are more socially active are more likely to receive help. However, it is not clear whether the same patterns of guardianship can be observed in cyberspace. To improve our understanding of how guardianship operates in cyberspace, the current study analyses the data from a sample of U.S. adults who were surveyed about their experiences with cyber abuse. The data was analyzed using mixed methods: a thematic analysis of open-ended responses, followed up by the logistic regression using Bayesian variable selection with the stochastic search algorithm. Our findings suggest that family, friends, intimate partners, authorities, work contacts, online friends, and netizens are most likely to provide guardianship. We also found that similar to conventional crimes like robbery or assault, the levels of guardianship responsibility are predictive of intervention against cyber abuse. Finally, we have established a link between the levels of regular interactions with various social groups and guardians' availability and willingness to intervene. Implications for theory and practice, as well as future directions for research, are also discussed.


Language: en

Keywords

Bystander intervention; Cyber abuse; Cyber guardianship; Guardianship in action (GIA); Routine activity theory

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print