Show simple item record

dc.contributor.authorPuente S.M
dc.contributor.authorRíos Hernández I.N.
dc.date.accessioned2022-09-14T14:33:32Z
dc.date.available2022-09-14T14:33:32Z
dc.date.created2022
dc.identifier.issn2549247
dc.identifier.urihttp://hdl.handle.net/11407/7420
dc.descriptionThis quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians. The interdependence of these three elements revealed that 3.9% of students are at risk due to their routine activities, which had a significant influence on cyber victimization. It is proposed that these findings should be considered in the design of communicative and educational policies aimed at a responsible use of technologies. © 2022 Pontificia Universidad Catolica del Peru. All rights reserved.eng
dc.language.isoeng
dc.publisherPontificia Universidad Catolica del Peru
dc.relation.isversionofhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85122384691&doi=10.18800%2fpsico.202201.009&partnerID=40&md5=3fb028d37ac45a8e7b9d44ee55aa9084
dc.sourceRevista de Psicologia (Peru)
dc.titleCyber victimization within the Routine Activity Theory Framework in the Digital Age [Cyber-victimisation dans le cadre de la théorie des activités de routine dans le numérique] [Ciber-vitimização desde a Teoria das Atividades Rotineiras na era digital] [Cibervictimización en el marco de la Teoría de Actividades Rutinarias en la era digital]
dc.typeArticle
dc.rights.accessrightsinfo:eu-repo/semantics/restrictedAccess
dc.publisher.programMaestría en educación
dc.publisher.programComunicación y Relaciones Corporativas
dc.type.spaArtículo
dc.identifier.doi10.18800/psico.202201.009
dc.subject.keywordCapable guardianeng
dc.subject.keywordCyber victimizationeng
dc.subject.keywordExposure to motivated offendereng
dc.subject.keywordRoutine activity theoryeng
dc.subject.keywordSuitable targeteng
dc.subject.keywordArticleeng
dc.subject.keywordColombiaeng
dc.subject.keywordHumaneng
dc.subject.keywordHuman experimenteng
dc.subject.keywordMajor clinical studyeng
dc.subject.keywordOffendereng
dc.subject.keywordQuestionnaireeng
dc.relation.citationvolume40
dc.relation.citationissue1
dc.relation.citationstartpage265
dc.relation.citationendpage291
dc.publisher.facultyFacultad de Comunicación
dc.publisher.facultyFacultad de Ciencias Sociales y Humanas
dc.affiliationPuente, S.M., Universidad de Medellín, Carrera 87 N° 30-65, Medellín, Colombia
dc.affiliationRíos Hernández, I.N., Universidad de Medellín, Carrera 87 N° 30-65, Medellín, Colombia
dc.relation.referencesÁlvarez, F., Un test de la Teoría de las Actividades Rutinarias. ¿Guardianes capaces o eficacia colectiva? (2015) Revista de Derecho UNED, (16), pp. 65-80. , https://doi.org/10.5944/rduned.16.2015.15247
dc.relation.referencesÁlvarez-García, D., Dobarro, A., Núñez, J., Validez y confiabilidad del cuestionario de cibervictimización en estudiantes de secundaria (2015) Aula Abierta, (43), pp. 32-38. , https://doi.org/10.1016/j.aula.2014.11.001
dc.relation.referencesAkbulut, Y., Sahin, Y.L., Eristi, B., Development of a scale to investigate cybervictimization among online social utility members (2010) Contemporary Educational Technology, 1 (1), pp. 46-59. , https://doi.org/10.30935/cedtech/5961
dc.relation.referencesArntfield, M., Toward a cybervictimology: Cyberbullying, Routine Activities Theory, and the anti-sociality of social media (2015) Canadian Journal of Communication, 40, pp. 371-388. , https://doi.org/10.22230/cjc.2015v40n3a2863
dc.relation.referencesBárcenas, C., Aproximaciones al estudio de la convergencia digital (2013) Estudios sobre las culturas contemporáneas, 38 (19), pp. 9-27. , https://www.redalyc.org/pdf/316/31629858002.pdf, Recuperado de
dc.relation.referencesBauman, S., Cross, D., Walker, J., (2012) Principles of cyberbullying research: Definitions, measures, and methodology, , (Eds). Routledge
dc.relation.referencesBauman, S., Bellmore, A., New directions in cyberbullying research (2015) Journal of School Violence, 14 (1), pp. 1-10. , https://doi.org/10.1080/15388220.2014.968281
dc.relation.referencesBauman, S., Cyberbullying in a rural intermediate school: An exploratory study (2009) The Journal of Early Adolescence, 30 (6), pp. 803-833. , https://doi:10.1177/0272431609350927
dc.relation.referencesBeran, T., Li, Q., The relationship between cyberbullying and school bullying (2007) Journal of Student Wellbeing, 1 (2), pp. 15-33. , http://dx.doi.org/10.21913/JSW.v1i2.172
dc.relation.referencesCohen, L. E., Kluegel, J. R., Land, K. C., Social inequality and predatory criminal victimization: An exposition and test of a formal theory (1981) American Sociological Review, 46 (5), pp. 505-524. , https://doi.org/10.2307/2094935
dc.relation.referencesCohen, l., Felson, M., Social change and crime rate trends: a routine activity approach (1979) American Sociological Review, 44, pp. 588-608. , http://dx.doi.org/10.2307/2094589
dc.relation.referencesCowie, H., Bauman, S., Coyne, I., Myers, C., Pörhölä, M., Almeida, A., Cyberbullying amongst university students: An emergent cause for concern? (2013) Cyberbullying through the new media: Findings from an international network, pp. 165-177. , P. K. Smith & G. Steffgen (Eds), Psychology Press
dc.relation.referencesDehue, F., Bolman, C., Vollink, T., Cyberbullying: Youngsters’ experiences and parental perception (2008) CyberPsychology and Behavior, 11 (2), pp. 217-223. , https://doi.org/10.1089/cpb.2007.0008
dc.relation.referencesDilmac, B., Psychological needs as a predictor of cyberbullying: A preliminary report on college students (2009) Educational Sciences: Theory and Practice, 9 (3), pp. 1307-1325
dc.relation.referencesFrías-Navarro, D., (2014) Apuntes de SPSS: Análisis de fiabilidad, , https://www.uv.es/friasnav/ApuntesSPSS.pdf, Recuperado de
dc.relation.referencesGarcía-Guilabert, N., Actividades cotidianas de los jóvenes en internet y victimización por malware (2016) Revista de Internet, Derecho y Política, 22, pp. 48-61. , https://www.redalyc.org/articulo.oa?id=78846481005, Recuperado de
dc.relation.referencesGarcía, J., La comunicación ante la convergencia digital: algunas fortalezas y debilidades (2009) Signo y Pensamiento, 28 (54), pp. 102-113
dc.relation.referencesHinduja, S., Patchin, J., Cyberbullying: An exploratory analysis offactorsrelatedtooffendingandvictimization (2008) DeviantBehavior, 29 (2), pp. 129-156. , https://doi.org/10.1080/01639620701457816
dc.relation.referencesIto, M., (2013) Hanging out, messing around, and geeking out: Kids living and learning with new media, , MIT Press
dc.relation.referencesJenkins, H., (2008) Convergence culture: La cultura de la convergencia de los medios de comunicación, , Paidós
dc.relation.referencesKalia, D, Aleem, S., Cyber victimization among adolescents: Examining the role of Routine Activity Theory (2017) Journal of Psychosocial Research, 12 (1), pp. 223-232
dc.relation.referencesKalia, D., Aleem, S., Role of Routine Activity Theory in cyber victimization among adolescents: A gendered perspective (2017) Phonix International Journal for Psychology and Social Sciences, 1 (3), pp. 1-121
dc.relation.referencesKao, D, Kluaypa, B., Lin, H., The cyberbullying assessment of capable guardianship in Routine Activity Theory (2017) Intelligence and Security Informatics, , En Wang, G., Chau, M. y Chen, H. (eds), Springer International Publishing
dc.relation.referencesKowalski, R. M., Giumetti, G. W., Schroeder, A. N., Lattanner, M. R., Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth (2014) Psychological Bulletin, 140 (4), pp. 1073-1137. , https://doi:10.1037/a0035618
dc.relation.referencesKoutamanis, M., Vossen, H. G. M., Valkenburg, P. M., Adolescents’ comments in social media: Why do adolescents receive negative feedback and who is most at risk? (2015) Computers in Human Behavior, 53, pp. 486-494. , https://doi.org/10.1016/j.chb.2015.07.016
dc.relation.referencesLee, S., Chae, Y., Children´s internet use in a family context: Influence on family relationships and parental mediation (2007) CyberPsychology & Behavior, 10 (5), pp. 640-644. , http://dx.doi.org/10.1089/cpb.2007.9975
dc.relation.referencesLivingstone, S., Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression (2008) New Media & Society, 10 (3), pp. 393-411. , https://doi.org/10.1177/1461444808089415
dc.relation.referencesLjepava, N., Application of Routine Activities Theory to the prediction of cyber victimization (2015) En 49th Annual Convention of the Association for Behavioral and Cognitive Therapies, , (Noviembre de). Paper presentado en la 49th Annual Convention of the Association for Behavioral and Cognitive Therapies IL en Chicago
dc.relation.referencesMenesini, E., Nocentini, A., Calussi, P., The measurement of cyberbullying: dimensional structure and relative item severity and discrimination (2011) Cyberpsychology, Behavior, and Social Networking, 14 (5), pp. 267-274. , https://doi:10.1089/cyber.2010.0002
dc.relation.referencesMarcum, C. D., Identifying potential factors of adolescent online victimization for high school seniors (2008) International Journal of Cyber Criminology, 2 (2), pp. 346-367
dc.relation.referencesMiró, F., La oportunidad criminal en el ciberespacio. Aplicación y desarrollo de la teoría de las actividades cotidianas para la prevención del cibercrimen (2011) Revista Electrónica de Ciencia Penal y Criminología, 13 (7), pp. 1-55
dc.relation.referencesMitchell, K, Wolak, J., Finkelhor, D., Are blogs putting youth at risk for online sexual solicitation or harassment? (2008) Child Abuse & Neglect, 32 (2), pp. 277-294. , https://doi.org/10.1016/j.chiabu.2007.04.015
dc.relation.referencesTecnologías de la información y de las comunicaciones: maximización del potencial de los niños y protección de los niños contra la violencia en línea, incluida la explotación sexual (2016), Informe anual de la Oficina del Representante Especial del Secretario General sobre l Violencia Contra los Niños
dc.relation.referencesPatchin, J., Hinduja, S., Bullies move beyond the schoolyard: A preliminary look at cyberbullying (2006) Youth Violence and Juvenile Justice, 4 (2), pp. 148-169. , https://doi:10.1177/1541204006286288
dc.relation.referencesPratt, T., Holtfreter, K., Reisig, M., Routine online activity and internet fraud targeting: Extending the generality of Routine Activity Theory (2010) Journal of Research in Crime and Delinquency, 47 (3), pp. 267-296. , http://dx.doi.org/10.1177/0022427810365903
dc.relation.referencesReyns, B., Henson, B., The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with Routine Activity Theory (2015) International JournalofOffenderTherapyandComparativeCriminology, 60 (10), pp. 1119-1139. , http://dx.doi.org/10.1177/0306624X15572861
dc.relation.referencesRodríguez, J., Oduber, J., Mora, E., Actividades rutinarias y cibervictimización en Venezuela (2017) URVIO, Revista Latinoamericana de Estudios de Seguridad, (20), pp. 63-79
dc.relation.referencesSasson, H., Mesch, G., Parental mediation, peer norms and risky online behavior among adolescents (2014) Computers in Human Behavior, 33, pp. 32-38. , http://dx.doi.org/10.1016/j.chb.2013.12.025
dc.relation.referencesShin, W., Huh, J., Parental mediation of teenagers’ video game playing: Antecedents and consequences (2011) New Media & Society, 13 (6), pp. 945-962. , http://dx.doi.org/10.1177/1461444810388025
dc.relation.referencesSengupta, A., Chaudhuri, A., Are social networking sites a source of online harassment for teens? Evidence from survey data (2011) Children and Youth Services Review, 33 (2), pp. 284-290. , http://dx.doi.org/10.1016/j.childyouth.2010.09.011
dc.relation.referencesVakhitova, Z., Reynald, D., Townsley, M., Toward the adaptation of Routine Activity and Lifestyle Exposure Theories to account for cyber abuse victimization (2015) Journal of Contemporary Criminal Justice, 32 (2), pp. 169-188. , https://doi.org/10.1177%2F1043986215621379
dc.type.coarhttp://purl.org/coar/resource_type/c_6501
dc.type.versioninfo:eu-repo/semantics/publishedVersion
dc.type.driverinfo:eu-repo/semantics/article
dc.identifier.reponamereponame:Repositorio Institucional Universidad de Medellín
dc.identifier.repourlrepourl:https://repository.udem.edu.co/
dc.identifier.instnameinstname:Universidad de Medellín


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record