dc.contributor.author | Puente S.M | |
dc.contributor.author | Ríos Hernández I.N. | |
dc.date.accessioned | 2022-09-14T14:33:32Z | |
dc.date.available | 2022-09-14T14:33:32Z | |
dc.date.created | 2022 | |
dc.identifier.issn | 2549247 | |
dc.identifier.uri | http://hdl.handle.net/11407/7420 | |
dc.description | This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians. The interdependence of these three elements revealed that 3.9% of students are at risk due to their routine activities, which had a significant influence on cyber victimization. It is proposed that these findings should be considered in the design of communicative and educational policies aimed at a responsible use of technologies. © 2022 Pontificia Universidad Catolica del Peru. All rights reserved. | eng |
dc.language.iso | eng | |
dc.publisher | Pontificia Universidad Catolica del Peru | |
dc.relation.isversionof | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122384691&doi=10.18800%2fpsico.202201.009&partnerID=40&md5=3fb028d37ac45a8e7b9d44ee55aa9084 | |
dc.source | Revista de Psicologia (Peru) | |
dc.title | Cyber victimization within the Routine Activity Theory Framework in the Digital Age [Cyber-victimisation dans le cadre de la théorie des activités de routine dans le numérique] [Ciber-vitimização desde a Teoria das Atividades Rotineiras na era digital] [Cibervictimización en el marco de la Teoría de Actividades Rutinarias en la era digital] | |
dc.type | Article | |
dc.rights.accessrights | info:eu-repo/semantics/restrictedAccess | |
dc.publisher.program | Maestría en educación | |
dc.publisher.program | Comunicación y Relaciones Corporativas | |
dc.type.spa | Artículo | |
dc.identifier.doi | 10.18800/psico.202201.009 | |
dc.subject.keyword | Capable guardian | eng |
dc.subject.keyword | Cyber victimization | eng |
dc.subject.keyword | Exposure to motivated offender | eng |
dc.subject.keyword | Routine activity theory | eng |
dc.subject.keyword | Suitable target | eng |
dc.subject.keyword | Article | eng |
dc.subject.keyword | Colombia | eng |
dc.subject.keyword | Human | eng |
dc.subject.keyword | Human experiment | eng |
dc.subject.keyword | Major clinical study | eng |
dc.subject.keyword | Offender | eng |
dc.subject.keyword | Questionnaire | eng |
dc.relation.citationvolume | 40 | |
dc.relation.citationissue | 1 | |
dc.relation.citationstartpage | 265 | |
dc.relation.citationendpage | 291 | |
dc.publisher.faculty | Facultad de Comunicación | |
dc.publisher.faculty | Facultad de Ciencias Sociales y Humanas | |
dc.affiliation | Puente, S.M., Universidad de Medellín, Carrera 87 N° 30-65, Medellín, Colombia | |
dc.affiliation | Ríos Hernández, I.N., Universidad de Medellín, Carrera 87 N° 30-65, Medellín, Colombia | |
dc.relation.references | Álvarez, F., Un test de la Teoría de las Actividades Rutinarias. ¿Guardianes capaces o eficacia colectiva? (2015) Revista de Derecho UNED, (16), pp. 65-80. , https://doi.org/10.5944/rduned.16.2015.15247 | |
dc.relation.references | Álvarez-García, D., Dobarro, A., Núñez, J., Validez y confiabilidad del cuestionario de cibervictimización en estudiantes de secundaria (2015) Aula Abierta, (43), pp. 32-38. , https://doi.org/10.1016/j.aula.2014.11.001 | |
dc.relation.references | Akbulut, Y., Sahin, Y.L., Eristi, B., Development of a scale to investigate cybervictimization among online social utility members (2010) Contemporary Educational Technology, 1 (1), pp. 46-59. , https://doi.org/10.30935/cedtech/5961 | |
dc.relation.references | Arntfield, M., Toward a cybervictimology: Cyberbullying, Routine Activities Theory, and the anti-sociality of social media (2015) Canadian Journal of Communication, 40, pp. 371-388. , https://doi.org/10.22230/cjc.2015v40n3a2863 | |
dc.relation.references | Bárcenas, C., Aproximaciones al estudio de la convergencia digital (2013) Estudios sobre las culturas contemporáneas, 38 (19), pp. 9-27. , https://www.redalyc.org/pdf/316/31629858002.pdf, Recuperado de | |
dc.relation.references | Bauman, S., Cross, D., Walker, J., (2012) Principles of cyberbullying research: Definitions, measures, and methodology, , (Eds). Routledge | |
dc.relation.references | Bauman, S., Bellmore, A., New directions in cyberbullying research (2015) Journal of School Violence, 14 (1), pp. 1-10. , https://doi.org/10.1080/15388220.2014.968281 | |
dc.relation.references | Bauman, S., Cyberbullying in a rural intermediate school: An exploratory study (2009) The Journal of Early Adolescence, 30 (6), pp. 803-833. , https://doi:10.1177/0272431609350927 | |
dc.relation.references | Beran, T., Li, Q., The relationship between cyberbullying and school bullying (2007) Journal of Student Wellbeing, 1 (2), pp. 15-33. , http://dx.doi.org/10.21913/JSW.v1i2.172 | |
dc.relation.references | Cohen, L. E., Kluegel, J. R., Land, K. C., Social inequality and predatory criminal victimization: An exposition and test of a formal theory (1981) American Sociological Review, 46 (5), pp. 505-524. , https://doi.org/10.2307/2094935 | |
dc.relation.references | Cohen, l., Felson, M., Social change and crime rate trends: a routine activity approach (1979) American Sociological Review, 44, pp. 588-608. , http://dx.doi.org/10.2307/2094589 | |
dc.relation.references | Cowie, H., Bauman, S., Coyne, I., Myers, C., Pörhölä, M., Almeida, A., Cyberbullying amongst university students: An emergent cause for concern? (2013) Cyberbullying through the new media: Findings from an international network, pp. 165-177. , P. K. Smith & G. Steffgen (Eds), Psychology Press | |
dc.relation.references | Dehue, F., Bolman, C., Vollink, T., Cyberbullying: Youngsters’ experiences and parental perception (2008) CyberPsychology and Behavior, 11 (2), pp. 217-223. , https://doi.org/10.1089/cpb.2007.0008 | |
dc.relation.references | Dilmac, B., Psychological needs as a predictor of cyberbullying: A preliminary report on college students (2009) Educational Sciences: Theory and Practice, 9 (3), pp. 1307-1325 | |
dc.relation.references | Frías-Navarro, D., (2014) Apuntes de SPSS: Análisis de fiabilidad, , https://www.uv.es/friasnav/ApuntesSPSS.pdf, Recuperado de | |
dc.relation.references | García-Guilabert, N., Actividades cotidianas de los jóvenes en internet y victimización por malware (2016) Revista de Internet, Derecho y Política, 22, pp. 48-61. , https://www.redalyc.org/articulo.oa?id=78846481005, Recuperado de | |
dc.relation.references | García, J., La comunicación ante la convergencia digital: algunas fortalezas y debilidades (2009) Signo y Pensamiento, 28 (54), pp. 102-113 | |
dc.relation.references | Hinduja, S., Patchin, J., Cyberbullying: An exploratory analysis offactorsrelatedtooffendingandvictimization (2008) DeviantBehavior, 29 (2), pp. 129-156. , https://doi.org/10.1080/01639620701457816 | |
dc.relation.references | Ito, M., (2013) Hanging out, messing around, and geeking out: Kids living and learning with new media, , MIT Press | |
dc.relation.references | Jenkins, H., (2008) Convergence culture: La cultura de la convergencia de los medios de comunicación, , Paidós | |
dc.relation.references | Kalia, D, Aleem, S., Cyber victimization among adolescents: Examining the role of Routine Activity Theory (2017) Journal of Psychosocial Research, 12 (1), pp. 223-232 | |
dc.relation.references | Kalia, D., Aleem, S., Role of Routine Activity Theory in cyber victimization among adolescents: A gendered perspective (2017) Phonix International Journal for Psychology and Social Sciences, 1 (3), pp. 1-121 | |
dc.relation.references | Kao, D, Kluaypa, B., Lin, H., The cyberbullying assessment of capable guardianship in Routine Activity Theory (2017) Intelligence and Security Informatics, , En Wang, G., Chau, M. y Chen, H. (eds), Springer International Publishing | |
dc.relation.references | Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., Lattanner, M. R., Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth (2014) Psychological Bulletin, 140 (4), pp. 1073-1137. , https://doi:10.1037/a0035618 | |
dc.relation.references | Koutamanis, M., Vossen, H. G. M., Valkenburg, P. M., Adolescents’ comments in social media: Why do adolescents receive negative feedback and who is most at risk? (2015) Computers in Human Behavior, 53, pp. 486-494. , https://doi.org/10.1016/j.chb.2015.07.016 | |
dc.relation.references | Lee, S., Chae, Y., Children´s internet use in a family context: Influence on family relationships and parental mediation (2007) CyberPsychology & Behavior, 10 (5), pp. 640-644. , http://dx.doi.org/10.1089/cpb.2007.9975 | |
dc.relation.references | Livingstone, S., Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression (2008) New Media & Society, 10 (3), pp. 393-411. , https://doi.org/10.1177/1461444808089415 | |
dc.relation.references | Ljepava, N., Application of Routine Activities Theory to the prediction of cyber victimization (2015) En 49th Annual Convention of the Association for Behavioral and Cognitive Therapies, , (Noviembre de). Paper presentado en la 49th Annual Convention of the Association for Behavioral and Cognitive Therapies IL en Chicago | |
dc.relation.references | Menesini, E., Nocentini, A., Calussi, P., The measurement of cyberbullying: dimensional structure and relative item severity and discrimination (2011) Cyberpsychology, Behavior, and Social Networking, 14 (5), pp. 267-274. , https://doi:10.1089/cyber.2010.0002 | |
dc.relation.references | Marcum, C. D., Identifying potential factors of adolescent online victimization for high school seniors (2008) International Journal of Cyber Criminology, 2 (2), pp. 346-367 | |
dc.relation.references | Miró, F., La oportunidad criminal en el ciberespacio. Aplicación y desarrollo de la teoría de las actividades cotidianas para la prevención del cibercrimen (2011) Revista Electrónica de Ciencia Penal y Criminología, 13 (7), pp. 1-55 | |
dc.relation.references | Mitchell, K, Wolak, J., Finkelhor, D., Are blogs putting youth at risk for online sexual solicitation or harassment? (2008) Child Abuse & Neglect, 32 (2), pp. 277-294. , https://doi.org/10.1016/j.chiabu.2007.04.015 | |
dc.relation.references | Tecnologías de la información y de las comunicaciones: maximización del potencial de los niños y protección de los niños contra la violencia en línea, incluida la explotación sexual (2016), Informe anual de la Oficina del Representante Especial del Secretario General sobre l Violencia Contra los Niños | |
dc.relation.references | Patchin, J., Hinduja, S., Bullies move beyond the schoolyard: A preliminary look at cyberbullying (2006) Youth Violence and Juvenile Justice, 4 (2), pp. 148-169. , https://doi:10.1177/1541204006286288 | |
dc.relation.references | Pratt, T., Holtfreter, K., Reisig, M., Routine online activity and internet fraud targeting: Extending the generality of Routine Activity Theory (2010) Journal of Research in Crime and Delinquency, 47 (3), pp. 267-296. , http://dx.doi.org/10.1177/0022427810365903 | |
dc.relation.references | Reyns, B., Henson, B., The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with Routine Activity Theory (2015) International JournalofOffenderTherapyandComparativeCriminology, 60 (10), pp. 1119-1139. , http://dx.doi.org/10.1177/0306624X15572861 | |
dc.relation.references | Rodríguez, J., Oduber, J., Mora, E., Actividades rutinarias y cibervictimización en Venezuela (2017) URVIO, Revista Latinoamericana de Estudios de Seguridad, (20), pp. 63-79 | |
dc.relation.references | Sasson, H., Mesch, G., Parental mediation, peer norms and risky online behavior among adolescents (2014) Computers in Human Behavior, 33, pp. 32-38. , http://dx.doi.org/10.1016/j.chb.2013.12.025 | |
dc.relation.references | Shin, W., Huh, J., Parental mediation of teenagers’ video game playing: Antecedents and consequences (2011) New Media & Society, 13 (6), pp. 945-962. , http://dx.doi.org/10.1177/1461444810388025 | |
dc.relation.references | Sengupta, A., Chaudhuri, A., Are social networking sites a source of online harassment for teens? Evidence from survey data (2011) Children and Youth Services Review, 33 (2), pp. 284-290. , http://dx.doi.org/10.1016/j.childyouth.2010.09.011 | |
dc.relation.references | Vakhitova, Z., Reynald, D., Townsley, M., Toward the adaptation of Routine Activity and Lifestyle Exposure Theories to account for cyber abuse victimization (2015) Journal of Contemporary Criminal Justice, 32 (2), pp. 169-188. , https://doi.org/10.1177%2F1043986215621379 | |
dc.type.coar | http://purl.org/coar/resource_type/c_6501 | |
dc.type.version | info:eu-repo/semantics/publishedVersion | |
dc.type.driver | info:eu-repo/semantics/article | |
dc.identifier.reponame | reponame:Repositorio Institucional Universidad de Medellín | |
dc.identifier.repourl | repourl:https://repository.udem.edu.co/ | |
dc.identifier.instname | instname:Universidad de Medellín | |