To SPB or not to SPB? A mixed methods analysis of self-protective behaviours to prevent repeat victimisation from cyber

  • PDF / 1,307,783 Bytes
  • 18 Pages / 595.276 x 790.866 pts Page_size
  • 62 Downloads / 159 Views

DOWNLOAD

REPORT


(2020) 9:24 Vakhitova et al. Crime Sci https://doi.org/10.1186/s40163-020-00134-5

Open Access

RESEARCH

To SPB or not to SPB? A mixed methods analysis of self‑protective behaviours to prevent repeat victimisation from cyber abuse Zarina I. Vakhitova1*  , Rob I. Mawby2, Clair L. Alston‑Knox3 and Callum A. Stephens1

Abstract  This paper presents the findings from a mixed-methods examination of self-protective behaviours (SPBs) adopted by victims of cyber abuse from the rational choice perspective. The data from a sample of the U.S. adults ( N = 746 ), members of an online opt-in panel, were analysed to first distinguish the types of SPBs adopted by victims of cyber abuse using a thematic analysis of open-ended responses. We then identified the factors associated with an increased likelihood of adopting SPBs and the specific identified types of SPBs using logistic regression with Bayesian variable selection and a stochastic search algorithm. Of the six identified types of SPBs, adjusting privacy settings was the most commonly reported response, and improving security (e.g. changing passwords, etc.) was the least common SPB. Older victims who reported higher than the average perceived impact from victimisation, were abused by a stran‑ ger and experienced either surveillance of their online activities or multiple types of abuse, were significantly more likely to adopt an SPB. Our findings inform strategies for both Internet user education and for preventing cyber abuse victimisation. Keywords:  Cyber abuse, Self-protective behaviours, Repeat victimisation, Bayesian variable selection, Stochastic search algorithm Introduction The use of the Internet and telecommunication technologies to stalk or harass adult victims, referred here as cyber abuse, is both common and often serious (Bocij 2006). According to the recent study by the Pew Research Centre, over 40% of U.S. adults experienced some form of cyber abuse at least once in their lifetime (Duggan 2017); in fact, it is now more common than face-to-face stalking and harassment (Short et  al. 2014). Furthermore, cyber abuse appears to be a global problem with studies from Canada, Portugal, Taiwan, Australia, Hong Kong among others reporting high rates of victimisation (Hokoda et al.

*Correspondence: [email protected] 1 Monash University, Clayton Campus, Menzies Building, 20 Chancellors Walk, Victoria 3800, Australia Full list of author information is available at the end of the article

2006; Pereira et  al. 2016; Statistics Canada 2016; Vakhitova and Reynald 2014; Wong et al. 2014). Cyber abuse can take many different forms such as “name-calling, trolling, doxing, open and escalating threats, vicious sexist, racist, and homophobic rants, attempts to shame others, and direct efforts to embarrass or humiliate people” (Duggan 2017). Other behaviours, also classified as cyber abuse, include impersonating the victim, ordering unwanted goods and services for the victim (e.g. subscribing to online pornography sites), using key-loggers to control and monitor victims, and