Engaging concepts germane to lifestyle-routine activities theory (LRAT), this study examines how social media (SM) utilization shapes online victimization experience. It also explores how considerations about online prevention measures play a moderating role between utilization and victimization. This study focuses on the Facebook® utilization of a subset of the U.S. population hitherto understudied in cybercrime prevention studies: Hispanics. An online survey was used to collect information pertaining to respondents’ online victimization experience, social media utilization, and aspects of prevention measures. Logistic and negative binomial regression analyses were performed on two measures of online victimization (ever victimized and frequency of victimization). The findings demonstrate how LRAT can explain the link between SM utilization, prevention measures, and online victimization. The results highlight the role of two temporal aspects of utilization (intensity and extensity) in shaping online victimization experience along with the conditioning role of the salience of mutuality (i.e., the importance of mutuality—to an SM user—in deciding to accept an online friend request). Mutuality was found to be a critical moderating factor between temporal aspects of SM utilization and online victimization. The findings have important implications for online safety, cybercrime prevention, and online victimization awareness initiatives.
Keywords: Online victimization, social media utilization, salience of mutuality, cybercrime preventionAlani, A. S. A. (2014). Principal component analysis in statistics. Eastern Mediterranean University.
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. Mis Quarterly, 34(3), 613-–643.
Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400-–420.
Bossler, A. M., Holt, T. J., & May, D. C. (2012). Predicting online harassment victimization among a juvenile population. Youth & Society, 44(4), 500-–523.
Choi, K. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308-–333.
CMO Council. (2016). Take a bite out of the cybercrime campaign. The peer-powered network. https://www.cmocouncil.org/media-center/press-releases/569
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588-–608.
Coleman, J. S. (1988). Supplement: Organizations and institutions: Sociological and economic approaches to the analysis of social structure. American Journal of Sociology, 94, S95-–S120.
Cruz-Cunha, M. M., & Portela, I. M. (2015). Handbook of research on digital crime, cyberspace security, and information assurance. (Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series). IGI Global.
Dilmac, B. (2009). Psychological needs as a predictor of cyber bullying: A preliminary report on college students. Educational Sciences: Theory & Practice, 9(3), 1307-–1325.
Facebook. (2016). Bullying prevention hub. https://www.facebook.com/saf-ety/bullying/
Facebook Help Center. (2015). Advanced privacy controls. https://www.-facebook.com/help/466544860022370/?helpref=hc_fnav
FBI Law Enforcement Bulletin. (2015, April 8). Bulletin report. Hate crime victimization statistics (Bulletin Report). https://leb.fbi.gov/2015/april/bulletin-reports Federal Bureau of Investigation. (2015a). Identity theft. https://www.fbi.gov/-about-us/investigate/cyber/identity_theft
Federal Bureau of Investigation. (2015b). Identity theft overview. https://-www.fbi.gov/about-us/investigate/cyber/identity_theft/identity-theft-overview
Federal Bureau of Investigation. (2014). The Internet of things poses opportunities for cybercrime. Public Service Announcement. http://www.ic3.gov/-media/2015/150910.aspx
Frailing, K., & Harper, D. W. (2013). Fundamental of criminology: New dimensions. Carolina Academic Press.
Gilkerson, L. (2012). Bullying statistics: Fast facts about cyberbullying. Retrieved from http://www.covenanteyes.com/2012/01/17/bullying-statistics-fast-facts-about-cyberbullying/
Halder, D., & Jaishankar, K. (2011). Cybercrime and the victimization of women: Laws, rights, and regulations. IGI Global.
Henson, B., Reyns, B. W., & Fisher, B. S. (2011). Security in the 21st century: Examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review, 36(3), 253-–268.
Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1-–25.
Identity Guard Resource Center. (2015). Why your college student is especially vulnerable to identity theft. http://www.identityguard.com/identity-theft-resources/articles/why-your-college-student-is-especially-vulnerable-to-identity-theft/
Internet Crime Complaint Center. (2014). Article title here. Federal Bureau of Investigations. https://www.fbi.gov/news/news_blog/2014-ic3-annual-report
Jensen, G. F., & Brownfield, D. (1986). Gender, lifestyles, and victimization: Beyond routine activity. Violence and Victims, 1(2), 85-–99.
Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46(4), 757-–780.
Keller, M. (2013). Social media and interpersonal communication. Social Work Today, 13(3), 10.
Legal Information Institute. (2015). Computer and internet fraud. Cornell University Law School. https://www.law.cornell.edu/wex/computer_and_internet-_fraud#
Lindsay, M., & Krysik, J. (2012). Online harassment among college students. Information, Communication & Society, 15(5), 703-–719.
Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing Facebook privacy settings: User expectations vs. reality. http://www.ccs.neu-.edu/home/amislove/publications/Privacy-IMC.pdf
Loong, A. C. J. (2014). Cyberstalking on Facebook: Examining the relationship between Facebook usage characteristics and cyber stalking victimization among young Malaysian Facebook users (Unpublished doctoral dissertation)., Department of Internet Engineering and Computer Science, Faculty of Engineering and Science, Universiti Tunku Abdul Rahman, Location).
Mann, B. L. (2015). Social networking websites- A concatenation of impersonation, denigration, sexual and aggressive solicitation, cyber-bullying and happy slapping videos. In A. Editor (Ed.), Privacy in the information society, (Vol. #, pp. 493-–503). The Library of Essays on Law and Privacy. London, U.K. Ashgate Publishing. http://www.ucs.mun-.ca/~bmann/0_ARTICLES/Mann_Social_Netg_PrivInfoSoc_15.pdf
Marcum, C. D. (2008). Identifying potential factors of adolescent online victimization for high school seniors. International Journal of Cyber Criminology, 2(2), 346-–367.
Marcum, C. D., Ricketts, M. L., & Higgins, G. E. (2010). Assessing sex experiences of online victimization: An examination of adolescent online behaviors using routine activity theory. Criminal Justice Review, 35(4), 412-–437.
Mathiyalakan, S., Heilman, G., & White, S. (2013). Gender differences in student attitudes toward privacy in Facebook. Communications of the IIMA, 13(4), 35-–44.
Milanovic, R. (2015, April 13). The world’s 21 most important social media sites and apps in 2015. Social Media Today. http://www.socialmediatoday.com/social-networks/2015-04-13/worlds-21-most-important-social-media-sites-and-apps-2015
Myrstol, B. A., & Chermak, S. M. (2005). Victimology. Chapter 15.In A. Editor (Ed.), Book title (pp. xx–xx). Publisher. http://wps.ablongman.com/wps/media/objects/1893/1938583/CH_15_web.pdf
National Crime Victim Law Institute (NCVLI). (2010). What is “online fraud”? Protecting, enforcing, & advancing victims’ rights. https://law.lclark.edu/live-/news/6855-what-is-online-fraud
Neuman, L. W. (2011). Social research methods: Qualitative and quantitative approaches. Pearson. 7th Edition.
Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773-–793.
Oluga, S. O., Ahmad, A. B. H., Alnagrat, A. J. A., Oluwatosin, H. S., Sawad, M. O. A., & Muktar, N. A. B. (2014). An overview of contemporary cyberspace activities and the challenging cyberspace Crimes/Threats. International Journal of Computer Science and Information Security, 12(3), 62-–100. http://search.proquest.com/-docview/1534315580?accountid=7081
Perrin, A., & Duggan, M. (2015). Americans’ internet access: 2000-2015. As internet use nears saturation for some groups, a look at patterns of adoption. Pew Research Center. http://www.pewinternet.org/2015/06/26/americans-internet-access-2000-2015/
Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyber lifestyle-routine activities theory to cyber stalking victimization. Criminal Justice and Behavior, 38(11), 1149-–1169.
Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1-–25.
Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime & Delinquency, 50(2), 216-–238. doi:https://doi.org/ 10.1177/0022427811425539
Serious Fraud Office (SFO). (2015). What is fraud? http://www.sfo.gov.uk-/fraud/what-is-fraud.aspx
Smith, C. (2016). By the numbers: 200+ amazing Facebook statistics. Digital Stats/Gadgets (DMR). http://expandedramblings.com/index.php/by-the-numbers-17-amazing-facebook-stats/
Social Security Administration. (2015). Identity theft and your social security number. USAAuthor. https://www.ssa.gov/pubs/EN-05-10064.pdf
SONA Systems. (2016). Sona System Experimental Management System: Master documentation Set. SONA Systems Ltd.
Sugarmann, J. (2014, December 5). Murder rate for Hispanics is twice the murder rate for whites. HuffPost. http://www.huffingtonpost.com/josh-sugarmann/murder-rate-for-hispanics_b_5309973.html
Taylor, R. W., Caeti, T. J., Loper, D. K., Fritsch, E. J., & Liederbach, J. (2006). Digital crime and digital terrorism. Pearson Prentice Hall.
Tillyer, M. S., & Eck, J. E. (2009). Routine activities. In J. M. Miller (Ed.), 21st century criminology: A reference handbook (pp. 279-–287). Sage.
United States Census Bureau. (2015). QuickFacts. Laredo cityCity, Texas. https://www.census.gov/quickfacts/table/PST045216/4841464,00
Wall, D. S. (2008). Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime. International Review of Law Computers & Technology, 22(1-2), 45-–63.
Whitty, M. T., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. CyberPsychology, Behavior, and Social Networking, 15(3), 181-–183.
Zou, X., Ingram, P., & Higgins, E. T. (2015). Social networks and life satisfaction: The interplay of network density and regulatory focus. Motivation and Emotion 39, 693–713.
Yar, M. (2005). The novelty of “cybercrime”: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407-–427.
Ybarra, M., Boyd, D., Korchmaros, J., & Oppenheim, J. (2012). Defining and measuring cyberbullying within the larger context of bullying victimization. Journal of Adolescent Health, 51(1), 53-–58.
Zhang, A. T., Land, L. P. W., & Dick, G. (2010). Key influences of cyberbullying for university students. Pacific Asia Conference on Information Systems (PACIS) Proceedings, Paper 83, 1-12. Publisher.