SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Prevalence, Predictors, and Risk of Cyber
        Victimization in Canada
         Nikolina Ljepava, M.S. , M.A
Cyber Victimization
     online fraud, identity theft, phishing,
    computer viruses, cyber bullying, cyber
                    stalking….

The prevalence of technology-related crimes
 is continuously increasing*

*Jones, Mitchell, & Finkelhor, 2011.
Cyber Crimes
Two types of technology-related crimes:*

cyber crimes – Internet crimes that rely on
  specialized knowledge (e.g., bank frauds,
  identity thefts, computer viruses)



*(Jaishankar, 2011)
Computer Crimes
 computer crimes - criminal offences
 facilitated by using technologies, unrelated
 to technological knowledge

 Referred more often as “cyber bullying
 victimization”
Routine Activities Theory
(Cohen & Felson, 1979)
 Individual’s day-to-day activities have a
 direct impact on victimization, placing
 some individuals at increased risk of being
 victimized.
 Routine Activities Theory has been
 applied to explain cyber victimization .
Routine Activities Theory
(Cohen & Felson, 1979)

  Examples of the online routine activities:
    Reading email
    Using social networks
    Using instant messaging programs
    Online shopping
    Visiting different websites (web browsing)
    Gaming
Predictors of Cyber Victimization
 Age
 Gender
 Income
 Education
 Loneliness
 Mental health
Purpose of the Study
 1. To explore risk factors related to three
    different types of cyber victimization –
    cyber crime, cyber bullying and child
    cyber bullying.
 2. To test the structural models of cyber
    victimization
 3. To explore the application of Routine
    Activities Theory in online environment
Risk Analysis
 •Replication of the Arnold & Baron (2005)
 research of the victimization risk based on
 epidemiological concepts.
 •Based on logistic regression analysis
 •Calculation of population attributable risk
 and absolute reductions in population risk
 attributable to specific predictors
Structural Equation Modeling
Model 1

Loneliness
 Loneliness


                Online
                Online
              behaviour    Cyber victimization
                           Cyber victimization
               behaviour

  Mental
  Mental
  health
   health

                            Age
                            Age             Sex
                                            Sex
Structural Equation Modeling
Model 2
                           Sex
                           Sex


Loneliness
 Loneliness


                Online
                Online
              behaviour          Cyber victimization
                                 Cyber victimization
               behaviour

  Mental
  Mental
  health
   health


                   Age
                   Age
General Social Survey
 •Victimization cycle 23, conducted 2009
 •Information related to cyber victimization
 collected for the first time in Canada
 •19, 500 participants 15 years and older
 across the 10 Canadian provinces
General Social Survey
 Three modules:
 • Internet use, risk, and prevention
 • Cyber bullying experienced by
 respondents
 • Cyber bullying experienced by
 respondents’ children (as reported by
 respondents).
Instruments

 18 variables were used for the purpose of
  this study.
 In order to conduct logistic regression and
  risk analysis, three dichotomous
  dependent variables were used: cyber
  crime, cyber bullying, and child cyber
  bullying.
Instruments

To test a structural equation model, a
 summary score of eight questions
 exploring different types of cyber bullying
 and cyber crime victimization was created
Predictors

• demographic variables (age, sex, income
  and education),
• mental health variables (life satisfaction,
  stress and depression),
• loneliness (measured by the number of
  close friends and the number of close
  friends living in the same city)
• variables related to online behavior
Participants

• Participants that used Internet within the
  last year
• Full sample after data cleaning – 14,149
• Sample of parents - 3,443
• Age range 15 to over 70 years of age
• 53% of the participants between 35 and
  65 years old
Participants: full sample

 49.7% female, 50.3% male
Participants: full sample

 Income
Participants: full sample

 Education
Participants: parents

 51.4 % female, 48.6% male
Participants: parents

 Income
Participants: parents

 Education
Results

97.3% used Internet within last month
74% reported being cyber victimized
73.9% cyber crime victimization
  Male reported significantly higher cyber crime
    victimization
7.8% cyber bullying victimization
  No gender differences in cyber bullying victimization for
    adult respondents
  Higher incidence in the age group from 15-35 years
    (13.4%).
Results

 10.3% of children cyber bullied *

 71.4% of cyber bullied children female

 73.4% informed their parents about being
 cyber bullied

*parent’s report
Results
Results
Results
Results
    Logistic Regression results: cyber crime

     Predicto                        Odds Ratio   SE         z        p value
     Agegr5                          1.035834     .0076397   4.77     0.000
     sex                             .549076      .0241462   -13.63   0.000
     Morethan100                     .7224016     .0472819   -4.97    0.000
     missingincm                     .6008996     .0430427   -7.11    0.000
     inc20_39                        .6173358     .0405762   -7.34    0.000
     inc40_59                        .7650704     .0519032   -3.95    0.000
     undegree                        2.67254      .1969819   13.34    0.000
     comcol                          1.635635     .1147576   7.01     0.000
     someuni                         1.762247     .1413277   7.06     0.000
     edmiss                          10.7847      11.0755    2.32     0.021
     Fb                              .7044694     .0344521   -7.16    0.000
     chat                            .6069713     .035262    -8.59    0.000
     meetinRL                        .55473       .0436345   -7.49    0.000
     secpriv                         .7643397     .012909    -15.91   0.000
     truncsrh120                     .8953929     .0131294   -7.54    0.000
     psycon                          1.315463     .1797177   2.01     0.045
Results
    Logistic regression cyber bullying

     Predictor                        Odds Ratio           SE         z        p value
     Agegr5                           1.168699             .0188339   9.67     0.000
     comcol                           .5979134             .0794098   -3.87    0.000
     edmiss                           8.64662              28.18306   8.47     0.000
     Fb                               .6915541             .0664929   -3.84    0.000
     chat                             .5572777             .0481839   -6.76    0.000
     meetinRL                         .3968217             .0346108   -10.60   0.000
     secpriv                          .8253592             .0265101   -5.98    0.000
     lifesat                          .8976057             .0221205   -4.38    0.000
     stress                           1.244524             .0536452   5.07     0.000
     psycon                           1.597002             .2780475   2.69     0.007


    Logistic regression results: cyber bullying children

     Predictor                        Odds Ratio           SE         z        p value
     sex                              1.502771             .2021978   3.03     0.002
     chat                             .7307806             .1078592   -2.13    0.034
     secpriv                          .8913731             .0456775   -2.24    0.025
     stress                           1.270991             .0919194   3.32     0.001
Results
  Percentage of Population Risk Attributable to Predictors of Cyber Victimization Under

         LogisticRegression

   Predictors                      Cyber crime        Cyber         Child cyber
                                   victimization      bullying      bullying
                                                      victimization victimization*
   Age                                   4%              73%             --
   Sex                                 15%                 9%            --
   Social networks use                   9%              43%            28%
   Chat programs                       10%               51%            29%
   Meeting in real life                94%               92%            87%
   Security and privacy                92%               89%            85%
   Depression medication               <1%.                1%            --
   Life satisfaction                     5%              25%            19%
   Stress                              10%               40%             --
   Loneliness                            5%              13%             --
   Income                              46%               23%            35%
   Education                             8%              56%            16%
   Parent cyber bullied                 --                --              6%
  Note. Predictors are based on parents’ behaviour.
Results
Absolute Reductions in Population Risk Attributable to Predictors of Cyber Victimization

 Predictors                      Cyber crime       Cyber         Child cyber
                                 victimization     bullying      bullying
                                                   victimization victimization
 Age                                 .004              .056            --
 Sex                                 .013              .009            --
 Social networks use                 .007              .033          .003
 Chat programs                       .009              .040          .003
 Meeting in real life                .077              .072          .008
 Security and privacy                .077              .069          .079
 Loneliness                          .004              .011            --
 Stress                              .009              .031            --
 Depression medication               .000              .001            --
 Life satisfaction                   .004              .020          .002
 Income                              .039              .018          .032
 Education                           .007              .043          .014
 Unreduced population risk           .084              .077          .092
Results:

Structural
  model
Results


Comparative model fit for the models tested

Models tested       χ2            df            p    CFI    TLI    RMSEA
Model 1           5147.2          54          .000   .802   .666    .082
Model 2           1600.5          51          .000   .942   .911    .046
Results
     Parameter estimates for Model in Figure 2.

                                                      Stand.
           Parameter                                            Estimate    S.E    p value
                                                    Estimate
    onlinebehaviour    <---       mentalhealth           .148      .534     .081      ***
    onlinebehaviour    <---       loneliness             .028      .001     .000      ***
    onlinebehaviour    <---       SEX                    .085      .042     .006      ***
    onlinebehaviour    <---       AGEGR5                 .838     -.064     .001      ***
    IRP_160R           <---       onlinebehaviour        .494     1.000
    IRP_170R           <---       onlinebehaviour        .404      .732     .017      ***
    IRP_180R           <---       onlinebehaviour        .261      .371     .013      ***
    secprivr1          <---       onlinebehaviour        .211     1.099     .048      ***
    ISL_020            <---       loneliness             .777     1.000
    psycon             <---       mentalhealth           .373     1.000
    MEDDEPR            <---       mentalhealth           .283     1.080     .103      ***
    SRH_130            <---       mentalhealth           .438     6.429     .615      ***
    SRH_120            <---       mentalhealth          -.691   -15.906    1.422      ***
    cyvictim           <---       onlinebehaviour      1.385      6.230     .706      ***
    ISL_010            <---       loneliness             .941     1.955     .142      ***
    cyvictim           <---       AGEGR5                 .995      .339     .045      ***
    cyvictim           <---       SEX                   -.226     -.503     .049      ***
Conclusion
• Demographic variables , mental health
  and online behaviour predicted cyber
  victimization.
• Loneliness influenced online behavioural
  patterns indirectly influencing cyber
  victimization
Conclusion
• Age: significant predictor of both cyber crime
  and cyber bullying victimization, with risk of both
  types of cyber victimization decreasing with age.
• Sex: significant predictor only of cyber crime
  victimization (for male participants)
• Income and educational categories: significant
  predictors of cyber crime victimization (higher
  income and education higher risk)
Conclusion
• Lower life satisfaction, higher levels of stress
  and experiencing psychological problems
  predicted cyber victimization.

• Depression was not found to significantly predict
  any type of Internet victimization
Conclusion
• Online behaviour accounted for most of the
  cyber victimization risk for all three types of
  cyber victimization.
• These findings support the application of
  Routine Activities Theory in online environment:
  the way we behave online can increase (or
  decrease) risk of cyber victimization.
Conclusion
For children cyber bullying :
• bullying was reported more often to
  mothers
• parental security and privacy preferences
  accounted for the highest percentage of
  attributable risk of children cyber
  victimization
Conclusion
• Structural model suggests the mediating effect
  of online behaviour needs to be taken into a
  consideration when researching the influence of
  different predictors on victimization on Internet.
• Overall modifications in online behaviour can
  decrease the incidence of online victimization
• Applicable in prevention programs, especially for
  children / adolescent population
QUESTIONS?
ljepavan@uwindsor.ca

Weitere ähnliche Inhalte

Andere mochten auch

Online Learning K-12
Online Learning K-12Online Learning K-12
Online Learning K-12gdudgeon
 
Programación mental y autoestima para una vida feliz
Programación mental  y autoestima para una vida felizProgramación mental  y autoestima para una vida feliz
Programación mental y autoestima para una vida felizDr. Gustavo Piñeiro
 
Proyecto power point ivan santiago moran 1°-O
Proyecto power point ivan santiago moran 1°-OProyecto power point ivan santiago moran 1°-O
Proyecto power point ivan santiago moran 1°-OIvan Santiago Moran
 
GEOTRAX INTERNATIONAL
GEOTRAX INTERNATIONALGEOTRAX INTERNATIONAL
GEOTRAX INTERNATIONALCV RAO RAO
 
As impressões de homens naturais são passageiras, robert murray m'cheyne
As impressões de homens naturais são passageiras, robert murray m'cheyneAs impressões de homens naturais são passageiras, robert murray m'cheyne
As impressões de homens naturais são passageiras, robert murray m'cheyneDeusdete Soares
 
CodeFest 2014. Деревянкин А. — Skype Video Mail. Нагрузочное тестирование bac...
CodeFest 2014. Деревянкин А. — Skype Video Mail. Нагрузочное тестирование bac...CodeFest 2014. Деревянкин А. — Skype Video Mail. Нагрузочное тестирование bac...
CodeFest 2014. Деревянкин А. — Skype Video Mail. Нагрузочное тестирование bac...CodeFest
 
Dossier El Perro del Hortelano - 300 pistolas
Dossier El Perro del Hortelano - 300 pistolasDossier El Perro del Hortelano - 300 pistolas
Dossier El Perro del Hortelano - 300 pistolasalvaromorte
 
Enfermedades urologicas tratamiento con-acupuntura
Enfermedades urologicas tratamiento con-acupunturaEnfermedades urologicas tratamiento con-acupuntura
Enfermedades urologicas tratamiento con-acupunturafabian
 
Programa electoral PSOE GETAFE 2003 2007
Programa electoral PSOE GETAFE 2003 2007Programa electoral PSOE GETAFE 2003 2007
Programa electoral PSOE GETAFE 2003 2007sanidadpublica
 
Piénsalo bien. Los asuntos de la Vida no son tan simples como parece
Piénsalo bien.  Los asuntos de la Vida no son tan simples como parecePiénsalo bien.  Los asuntos de la Vida no son tan simples como parece
Piénsalo bien. Los asuntos de la Vida no son tan simples como parecemaforer
 
03 2015 leaflet im-m
03 2015   leaflet im-m 03 2015   leaflet im-m
03 2015 leaflet im-m Urs Müller
 
Stratesys - Soluciones OpenText DAM-2016
Stratesys - Soluciones OpenText DAM-2016Stratesys - Soluciones OpenText DAM-2016
Stratesys - Soluciones OpenText DAM-2016Stratesys
 
Pedini guida 2014
Pedini guida 2014Pedini guida 2014
Pedini guida 2014Chee Keaun
 
Il codice di hammurabi 2
Il codice di hammurabi 2Il codice di hammurabi 2
Il codice di hammurabi 21GL14_15
 

Andere mochten auch (20)

Online Learning K-12
Online Learning K-12Online Learning K-12
Online Learning K-12
 
Programación mental y autoestima para una vida feliz
Programación mental  y autoestima para una vida felizProgramación mental  y autoestima para una vida feliz
Programación mental y autoestima para una vida feliz
 
Proyecto power point ivan santiago moran 1°-O
Proyecto power point ivan santiago moran 1°-OProyecto power point ivan santiago moran 1°-O
Proyecto power point ivan santiago moran 1°-O
 
Vendo luego existo
Vendo luego existoVendo luego existo
Vendo luego existo
 
GEOTRAX INTERNATIONAL
GEOTRAX INTERNATIONALGEOTRAX INTERNATIONAL
GEOTRAX INTERNATIONAL
 
As impressões de homens naturais são passageiras, robert murray m'cheyne
As impressões de homens naturais são passageiras, robert murray m'cheyneAs impressões de homens naturais são passageiras, robert murray m'cheyne
As impressões de homens naturais são passageiras, robert murray m'cheyne
 
CodeFest 2014. Деревянкин А. — Skype Video Mail. Нагрузочное тестирование bac...
CodeFest 2014. Деревянкин А. — Skype Video Mail. Нагрузочное тестирование bac...CodeFest 2014. Деревянкин А. — Skype Video Mail. Нагрузочное тестирование bac...
CodeFest 2014. Деревянкин А. — Skype Video Mail. Нагрузочное тестирование bac...
 
Alfaro cours 2006
Alfaro cours 2006Alfaro cours 2006
Alfaro cours 2006
 
Dossier El Perro del Hortelano - 300 pistolas
Dossier El Perro del Hortelano - 300 pistolasDossier El Perro del Hortelano - 300 pistolas
Dossier El Perro del Hortelano - 300 pistolas
 
Enfermedades urologicas tratamiento con-acupuntura
Enfermedades urologicas tratamiento con-acupunturaEnfermedades urologicas tratamiento con-acupuntura
Enfermedades urologicas tratamiento con-acupuntura
 
Habbo
HabboHabbo
Habbo
 
Programa electoral PSOE GETAFE 2003 2007
Programa electoral PSOE GETAFE 2003 2007Programa electoral PSOE GETAFE 2003 2007
Programa electoral PSOE GETAFE 2003 2007
 
Piénsalo bien. Los asuntos de la Vida no son tan simples como parece
Piénsalo bien.  Los asuntos de la Vida no son tan simples como parecePiénsalo bien.  Los asuntos de la Vida no son tan simples como parece
Piénsalo bien. Los asuntos de la Vida no son tan simples como parece
 
Peregrinos a santiago
Peregrinos a santiagoPeregrinos a santiago
Peregrinos a santiago
 
03 2015 leaflet im-m
03 2015   leaflet im-m 03 2015   leaflet im-m
03 2015 leaflet im-m
 
Stratesys - Soluciones OpenText DAM-2016
Stratesys - Soluciones OpenText DAM-2016Stratesys - Soluciones OpenText DAM-2016
Stratesys - Soluciones OpenText DAM-2016
 
Livcom
LivcomLivcom
Livcom
 
Pedini guida 2014
Pedini guida 2014Pedini guida 2014
Pedini guida 2014
 
Marketing para profesores de tenis
Marketing para profesores de tenisMarketing para profesores de tenis
Marketing para profesores de tenis
 
Il codice di hammurabi 2
Il codice di hammurabi 2Il codice di hammurabi 2
Il codice di hammurabi 2
 

Ähnlich wie Prevalence and Risk Factors of Cyber Victimization in Canada

Cybergrooming - Risk factors, coping strategies and associations with cyberbu...
Cybergrooming - Risk factors, coping strategies and associations with cyberbu...Cybergrooming - Risk factors, coping strategies and associations with cyberbu...
Cybergrooming - Risk factors, coping strategies and associations with cyberbu...Sebastian Wachs
 
New Media Ecosystem, by Lee Rainie
New Media Ecosystem, by Lee RainieNew Media Ecosystem, by Lee Rainie
New Media Ecosystem, by Lee RainieKDMC
 
Blocking Cyberbullying: Findings, Discussion, and Youth-Designed Intervention...
Blocking Cyberbullying: Findings, Discussion, and Youth-Designed Intervention...Blocking Cyberbullying: Findings, Discussion, and Youth-Designed Intervention...
Blocking Cyberbullying: Findings, Discussion, and Youth-Designed Intervention...YTH
 
Mobile Tech and the Law
Mobile Tech and the LawMobile Tech and the Law
Mobile Tech and the LawJISC Legal
 
02 investigaytors nov1 (nx powerlite)
02 investigaytors nov1 (nx powerlite)02 investigaytors nov1 (nx powerlite)
02 investigaytors nov1 (nx powerlite)CBRC
 
Online child victimization: A perspective
Online child victimization: A perspectiveOnline child victimization: A perspective
Online child victimization: A perspectiveMicrosoft Eesti
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpa21raym
 
113 online suicide prevention: First two year results presented at the ESSSB1...
113 online suicide prevention: First two year results presented at the ESSSB1...113 online suicide prevention: First two year results presented at the ESSSB1...
113 online suicide prevention: First two year results presented at the ESSSB1...Jan Mokkenstorm
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 
Symantec Intelligence Report August 2011
Symantec Intelligence Report August 2011Symantec Intelligence Report August 2011
Symantec Intelligence Report August 2011Symantec
 
Lee Rainie - The new impact of libraries
Lee Rainie - The new impact of librariesLee Rainie - The new impact of libraries
Lee Rainie - The new impact of librariesnvbonline
 
120822 mobile learning (uhi)
120822 mobile learning (uhi)120822 mobile learning (uhi)
120822 mobile learning (uhi)JISC Legal
 
Digital drama
Digital dramaDigital drama
Digital dramaktcole
 
Social justice
Social justiceSocial justice
Social justicekm03john
 

Ähnlich wie Prevalence and Risk Factors of Cyber Victimization in Canada (20)

Cybergrooming - Risk factors, coping strategies and associations with cyberbu...
Cybergrooming - Risk factors, coping strategies and associations with cyberbu...Cybergrooming - Risk factors, coping strategies and associations with cyberbu...
Cybergrooming - Risk factors, coping strategies and associations with cyberbu...
 
Quello Advisory Board Slides may-2016
Quello Advisory Board Slides may-2016Quello Advisory Board Slides may-2016
Quello Advisory Board Slides may-2016
 
Networked and Hyperconnected: The New Social (and work) Operating System
Networked and Hyperconnected:The New Social (and work) Operating SystemNetworked and Hyperconnected:The New Social (and work) Operating System
Networked and Hyperconnected: The New Social (and work) Operating System
 
New Media Ecosystem, by Lee Rainie
New Media Ecosystem, by Lee RainieNew Media Ecosystem, by Lee Rainie
New Media Ecosystem, by Lee Rainie
 
Blocking Cyberbullying: Findings, Discussion, and Youth-Designed Intervention...
Blocking Cyberbullying: Findings, Discussion, and Youth-Designed Intervention...Blocking Cyberbullying: Findings, Discussion, and Youth-Designed Intervention...
Blocking Cyberbullying: Findings, Discussion, and Youth-Designed Intervention...
 
Mobile Tech and the Law
Mobile Tech and the LawMobile Tech and the Law
Mobile Tech and the Law
 
Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017
 
02 investigaytors nov1 (nx powerlite)
02 investigaytors nov1 (nx powerlite)02 investigaytors nov1 (nx powerlite)
02 investigaytors nov1 (nx powerlite)
 
Online child victimization: A perspective
Online child victimization: A perspectiveOnline child victimization: A perspective
Online child victimization: A perspective
 
Mobile is the needle; Social is the thread
Mobile is the needle; Social is the threadMobile is the needle; Social is the thread
Mobile is the needle; Social is the thread
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter SchoolCybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter School
 
113 online suicide prevention: First two year results presented at the ESSSB1...
113 online suicide prevention: First two year results presented at the ESSSB1...113 online suicide prevention: First two year results presented at the ESSSB1...
113 online suicide prevention: First two year results presented at the ESSSB1...
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
The emerging information landscape The 8 realities of the “new normal”
The emerging information landscape The 8 realities of the “new normal” The emerging information landscape The 8 realities of the “new normal”
The emerging information landscape The 8 realities of the “new normal”
 
Symantec Intelligence Report August 2011
Symantec Intelligence Report August 2011Symantec Intelligence Report August 2011
Symantec Intelligence Report August 2011
 
Lee Rainie - The new impact of libraries
Lee Rainie - The new impact of librariesLee Rainie - The new impact of libraries
Lee Rainie - The new impact of libraries
 
120822 mobile learning (uhi)
120822 mobile learning (uhi)120822 mobile learning (uhi)
120822 mobile learning (uhi)
 
Digital drama
Digital dramaDigital drama
Digital drama
 
Social justice
Social justiceSocial justice
Social justice
 

Mehr von Nikolina Ljepava

Business application of social networks
Business application of social networks Business application of social networks
Business application of social networks Nikolina Ljepava
 
Pisanje naučnih radova u APA formatu
Pisanje naučnih radova u APA formatuPisanje naučnih radova u APA formatu
Pisanje naučnih radova u APA formatuNikolina Ljepava
 
Razvoj i evaluacija centra za rani razvoj
Razvoj i evaluacija centra za rani razvojRazvoj i evaluacija centra za rani razvoj
Razvoj i evaluacija centra za rani razvojNikolina Ljepava
 
Istraživanje uticaja razvoja e-trgovine na tržišne trendove u oblasti poštans...
Istraživanje uticaja razvoja e-trgovine na tržišne trendove u oblasti poštans...Istraživanje uticaja razvoja e-trgovine na tržišne trendove u oblasti poštans...
Istraživanje uticaja razvoja e-trgovine na tržišne trendove u oblasti poštans...Nikolina Ljepava
 
Edukacija roditelja kao način prevencije zlostavljanja dece na Internetu
Edukacija roditelja kao način prevencije zlostavljanja dece na InternetuEdukacija roditelja kao način prevencije zlostavljanja dece na Internetu
Edukacija roditelja kao način prevencije zlostavljanja dece na InternetuNikolina Ljepava
 
Etika u sajberprostoru, n ljepava, april 2012
Etika u sajberprostoru, n ljepava, april 2012Etika u sajberprostoru, n ljepava, april 2012
Etika u sajberprostoru, n ljepava, april 2012Nikolina Ljepava
 

Mehr von Nikolina Ljepava (8)

Business application of social networks
Business application of social networks Business application of social networks
Business application of social networks
 
Deca, mediji i internet
Deca, mediji i internetDeca, mediji i internet
Deca, mediji i internet
 
Pisanje naučnih radova u APA formatu
Pisanje naučnih radova u APA formatuPisanje naučnih radova u APA formatu
Pisanje naučnih radova u APA formatu
 
Razvoj i evaluacija centra za rani razvoj
Razvoj i evaluacija centra za rani razvojRazvoj i evaluacija centra za rani razvoj
Razvoj i evaluacija centra za rani razvoj
 
Istraživanje uticaja razvoja e-trgovine na tržišne trendove u oblasti poštans...
Istraživanje uticaja razvoja e-trgovine na tržišne trendove u oblasti poštans...Istraživanje uticaja razvoja e-trgovine na tržišne trendove u oblasti poštans...
Istraživanje uticaja razvoja e-trgovine na tržišne trendove u oblasti poštans...
 
Edukacija roditelja kao način prevencije zlostavljanja dece na Internetu
Edukacija roditelja kao način prevencije zlostavljanja dece na InternetuEdukacija roditelja kao način prevencije zlostavljanja dece na Internetu
Edukacija roditelja kao način prevencije zlostavljanja dece na Internetu
 
Symorg, 2010
Symorg, 2010Symorg, 2010
Symorg, 2010
 
Etika u sajberprostoru, n ljepava, april 2012
Etika u sajberprostoru, n ljepava, april 2012Etika u sajberprostoru, n ljepava, april 2012
Etika u sajberprostoru, n ljepava, april 2012
 

Kürzlich hochgeladen

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Kürzlich hochgeladen (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Prevalence and Risk Factors of Cyber Victimization in Canada

  • 1. Prevalence, Predictors, and Risk of Cyber Victimization in Canada Nikolina Ljepava, M.S. , M.A
  • 2. Cyber Victimization online fraud, identity theft, phishing, computer viruses, cyber bullying, cyber stalking…. The prevalence of technology-related crimes is continuously increasing* *Jones, Mitchell, & Finkelhor, 2011.
  • 3. Cyber Crimes Two types of technology-related crimes:* cyber crimes – Internet crimes that rely on specialized knowledge (e.g., bank frauds, identity thefts, computer viruses) *(Jaishankar, 2011)
  • 4. Computer Crimes computer crimes - criminal offences facilitated by using technologies, unrelated to technological knowledge Referred more often as “cyber bullying victimization”
  • 5. Routine Activities Theory (Cohen & Felson, 1979) Individual’s day-to-day activities have a direct impact on victimization, placing some individuals at increased risk of being victimized. Routine Activities Theory has been applied to explain cyber victimization .
  • 6. Routine Activities Theory (Cohen & Felson, 1979) Examples of the online routine activities: Reading email Using social networks Using instant messaging programs Online shopping Visiting different websites (web browsing) Gaming
  • 7. Predictors of Cyber Victimization Age Gender Income Education Loneliness Mental health
  • 8. Purpose of the Study 1. To explore risk factors related to three different types of cyber victimization – cyber crime, cyber bullying and child cyber bullying. 2. To test the structural models of cyber victimization 3. To explore the application of Routine Activities Theory in online environment
  • 9. Risk Analysis •Replication of the Arnold & Baron (2005) research of the victimization risk based on epidemiological concepts. •Based on logistic regression analysis •Calculation of population attributable risk and absolute reductions in population risk attributable to specific predictors
  • 10. Structural Equation Modeling Model 1 Loneliness Loneliness Online Online behaviour Cyber victimization Cyber victimization behaviour Mental Mental health health Age Age Sex Sex
  • 11. Structural Equation Modeling Model 2 Sex Sex Loneliness Loneliness Online Online behaviour Cyber victimization Cyber victimization behaviour Mental Mental health health Age Age
  • 12. General Social Survey •Victimization cycle 23, conducted 2009 •Information related to cyber victimization collected for the first time in Canada •19, 500 participants 15 years and older across the 10 Canadian provinces
  • 13. General Social Survey Three modules: • Internet use, risk, and prevention • Cyber bullying experienced by respondents • Cyber bullying experienced by respondents’ children (as reported by respondents).
  • 14. Instruments  18 variables were used for the purpose of this study.  In order to conduct logistic regression and risk analysis, three dichotomous dependent variables were used: cyber crime, cyber bullying, and child cyber bullying.
  • 15. Instruments To test a structural equation model, a summary score of eight questions exploring different types of cyber bullying and cyber crime victimization was created
  • 16. Predictors • demographic variables (age, sex, income and education), • mental health variables (life satisfaction, stress and depression), • loneliness (measured by the number of close friends and the number of close friends living in the same city) • variables related to online behavior
  • 17. Participants • Participants that used Internet within the last year • Full sample after data cleaning – 14,149 • Sample of parents - 3,443 • Age range 15 to over 70 years of age • 53% of the participants between 35 and 65 years old
  • 18. Participants: full sample  49.7% female, 50.3% male
  • 21. Participants: parents  51.4 % female, 48.6% male
  • 24. Results 97.3% used Internet within last month 74% reported being cyber victimized 73.9% cyber crime victimization Male reported significantly higher cyber crime victimization 7.8% cyber bullying victimization No gender differences in cyber bullying victimization for adult respondents Higher incidence in the age group from 15-35 years (13.4%).
  • 25. Results  10.3% of children cyber bullied *  71.4% of cyber bullied children female  73.4% informed their parents about being cyber bullied *parent’s report
  • 29. Results Logistic Regression results: cyber crime Predicto Odds Ratio SE z p value Agegr5 1.035834 .0076397 4.77 0.000 sex .549076 .0241462 -13.63 0.000 Morethan100 .7224016 .0472819 -4.97 0.000 missingincm .6008996 .0430427 -7.11 0.000 inc20_39 .6173358 .0405762 -7.34 0.000 inc40_59 .7650704 .0519032 -3.95 0.000 undegree 2.67254 .1969819 13.34 0.000 comcol 1.635635 .1147576 7.01 0.000 someuni 1.762247 .1413277 7.06 0.000 edmiss 10.7847 11.0755 2.32 0.021 Fb .7044694 .0344521 -7.16 0.000 chat .6069713 .035262 -8.59 0.000 meetinRL .55473 .0436345 -7.49 0.000 secpriv .7643397 .012909 -15.91 0.000 truncsrh120 .8953929 .0131294 -7.54 0.000 psycon 1.315463 .1797177 2.01 0.045
  • 30. Results Logistic regression cyber bullying Predictor Odds Ratio SE z p value Agegr5 1.168699 .0188339 9.67 0.000 comcol .5979134 .0794098 -3.87 0.000 edmiss 8.64662 28.18306 8.47 0.000 Fb .6915541 .0664929 -3.84 0.000 chat .5572777 .0481839 -6.76 0.000 meetinRL .3968217 .0346108 -10.60 0.000 secpriv .8253592 .0265101 -5.98 0.000 lifesat .8976057 .0221205 -4.38 0.000 stress 1.244524 .0536452 5.07 0.000 psycon 1.597002 .2780475 2.69 0.007 Logistic regression results: cyber bullying children Predictor Odds Ratio SE z p value sex 1.502771 .2021978 3.03 0.002 chat .7307806 .1078592 -2.13 0.034 secpriv .8913731 .0456775 -2.24 0.025 stress 1.270991 .0919194 3.32 0.001
  • 31. Results Percentage of Population Risk Attributable to Predictors of Cyber Victimization Under LogisticRegression Predictors Cyber crime Cyber Child cyber victimization bullying bullying victimization victimization* Age 4% 73% -- Sex 15% 9% -- Social networks use 9% 43% 28% Chat programs 10% 51% 29% Meeting in real life 94% 92% 87% Security and privacy 92% 89% 85% Depression medication <1%. 1% -- Life satisfaction 5% 25% 19% Stress 10% 40% -- Loneliness 5% 13% -- Income 46% 23% 35% Education 8% 56% 16% Parent cyber bullied -- -- 6% Note. Predictors are based on parents’ behaviour.
  • 32. Results Absolute Reductions in Population Risk Attributable to Predictors of Cyber Victimization Predictors Cyber crime Cyber Child cyber victimization bullying bullying victimization victimization Age .004 .056 -- Sex .013 .009 -- Social networks use .007 .033 .003 Chat programs .009 .040 .003 Meeting in real life .077 .072 .008 Security and privacy .077 .069 .079 Loneliness .004 .011 -- Stress .009 .031 -- Depression medication .000 .001 -- Life satisfaction .004 .020 .002 Income .039 .018 .032 Education .007 .043 .014 Unreduced population risk .084 .077 .092
  • 34. Results Comparative model fit for the models tested Models tested χ2 df p CFI TLI RMSEA Model 1 5147.2 54 .000 .802 .666 .082 Model 2 1600.5 51 .000 .942 .911 .046
  • 35. Results Parameter estimates for Model in Figure 2. Stand. Parameter Estimate S.E p value Estimate onlinebehaviour <--- mentalhealth .148 .534 .081 *** onlinebehaviour <--- loneliness .028 .001 .000 *** onlinebehaviour <--- SEX .085 .042 .006 *** onlinebehaviour <--- AGEGR5 .838 -.064 .001 *** IRP_160R <--- onlinebehaviour .494 1.000 IRP_170R <--- onlinebehaviour .404 .732 .017 *** IRP_180R <--- onlinebehaviour .261 .371 .013 *** secprivr1 <--- onlinebehaviour .211 1.099 .048 *** ISL_020 <--- loneliness .777 1.000 psycon <--- mentalhealth .373 1.000 MEDDEPR <--- mentalhealth .283 1.080 .103 *** SRH_130 <--- mentalhealth .438 6.429 .615 *** SRH_120 <--- mentalhealth -.691 -15.906 1.422 *** cyvictim <--- onlinebehaviour 1.385 6.230 .706 *** ISL_010 <--- loneliness .941 1.955 .142 *** cyvictim <--- AGEGR5 .995 .339 .045 *** cyvictim <--- SEX -.226 -.503 .049 ***
  • 36. Conclusion • Demographic variables , mental health and online behaviour predicted cyber victimization. • Loneliness influenced online behavioural patterns indirectly influencing cyber victimization
  • 37. Conclusion • Age: significant predictor of both cyber crime and cyber bullying victimization, with risk of both types of cyber victimization decreasing with age. • Sex: significant predictor only of cyber crime victimization (for male participants) • Income and educational categories: significant predictors of cyber crime victimization (higher income and education higher risk)
  • 38. Conclusion • Lower life satisfaction, higher levels of stress and experiencing psychological problems predicted cyber victimization. • Depression was not found to significantly predict any type of Internet victimization
  • 39. Conclusion • Online behaviour accounted for most of the cyber victimization risk for all three types of cyber victimization. • These findings support the application of Routine Activities Theory in online environment: the way we behave online can increase (or decrease) risk of cyber victimization.
  • 40. Conclusion For children cyber bullying : • bullying was reported more often to mothers • parental security and privacy preferences accounted for the highest percentage of attributable risk of children cyber victimization
  • 41. Conclusion • Structural model suggests the mediating effect of online behaviour needs to be taken into a consideration when researching the influence of different predictors on victimization on Internet. • Overall modifications in online behaviour can decrease the incidence of online victimization • Applicable in prevention programs, especially for children / adolescent population

Hinweis der Redaktion

  1. Security and privacy scale – do you use antivirus software, read privacy policies, use well known websites, do not reveal your private information online… 8 questions
  2. These findings support previous findings from) and Wang, Iannotti and Nansel (2009) who related higher education and income to more risky online behavioural patterns and higher incidence of cyber crime victimization. Age cohort effect. Most of the participants belonged to age group over 35 years – different results if only with participants under 35