Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Victims and Perpetrators of Cyber Harassment: The Role of Power and Control and the Use of Techniques of Neutralization

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • المؤلفون: van Baak, J.; Maher, C.A.; Protas, M.E.; Hayes, B.E.
  • المصدر:
    van Baak , J , Maher , C A , Protas , M E & Hayes , B E 2023 , ' Victims and Perpetrators of Cyber Harassment: The Role of Power and Control and the Use of Techniques of Neutralization ' , Deviant Behavior , vol. 44 , no. 5 , pp. 690-707 . https://doi.org/10.1080/01639625.2022.2088317
  • نوع التسجيلة:
    article in journal/newspaper
  • اللغة:
    English
  • معلومة اضافية
    • الموضوع:
      2023
    • Collection:
      Universiteit van Amsterdam: Digital Academic Repository (UvA DARE)
    • نبذة مختصرة :
      Cyber harassment is a common problem among younger populations and women. While scholars have noted that cyber harassment may be an attempt to demonstrate power and control, it remains unclear if that is the case from the victim’s and perpetrator’s perspective. Relying on open-ended responses from a sample of college students, we use a validated instrument to qualitatively examine if victims of cyber harassment (N = 170) perceived their victimization to center on aspects of power and control. Additionally, we examine if students who engaged in cyber harassment (N = 33) minimize their behaviors by employing techniques of neutralization and identify how these efforts may overlap with power and control (i.e., threats, checking movements). Findings reveal that one out of three victims reported controlling behaviors, which were commonly experienced by women and perpetrated by men, and regularly included severe controlling techniques. We additionally found that perpetrators of cyber harassment frequently engaged in techniques of neutralization. The most common technique was denial of injury. Implications and directions for future research are discussed.
    • File Description:
      application/pdf
    • Relation:
      https://dare.uva.nl/personal/pure/en/publications/victims-and-perpetrators-of-cyber-harassment-the-role-of-power-and-control-and-the-use-of-techniques-of-neutralization(79c06fc0-bb85-42af-bff7-311ce04b4b51).html
    • الرقم المعرف:
      10.1080/01639625.2022.2088317
    • الدخول الالكتروني :
      https://dare.uva.nl/personal/pure/en/publications/victims-and-perpetrators-of-cyber-harassment-the-role-of-power-and-control-and-the-use-of-techniques-of-neutralization(79c06fc0-bb85-42af-bff7-311ce04b4b51).html
      https://doi.org/10.1080/01639625.2022.2088317
      https://hdl.handle.net/11245.1/79c06fc0-bb85-42af-bff7-311ce04b4b51
      https://pure.uva.nl/ws/files/128971155/Victims_and_Perpetrators_of_Cyber_Harassment_The_Role_of_Power_and_Control_and_the_Use_of_Techniques_of_Neutralization.pdf
    • Rights:
      info:eu-repo/semantics/openAccess
    • الرقم المعرف:
      edsbas.3BA83987