Show simple item record

dc.contributor.authorPuente S.M
dc.contributor.authorRíos Hernández I.N.
dc.descriptionThis quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians. The interdependence of these three elements revealed that 3.9% of students are at risk due to their routine activities, which had a significant influence on cyber victimization. It is proposed that these findings should be considered in the design of communicative and educational policies aimed at a responsible use of technologies. © 2022 Pontificia Universidad Catolica del Peru. All rights reserved.eng
dc.publisherPontificia Universidad Catolica del Peru
dc.sourceRevista de Psicologia (Peru)
dc.titleCyber victimization within the Routine Activity Theory Framework in the Digital Age [Cyber-victimisation dans le cadre de la théorie des activités de routine dans le numérique] [Ciber-vitimização desde a Teoria das Atividades Rotineiras na era digital] [Cibervictimización en el marco de la Teoría de Actividades Rutinarias en la era digital]
dc.publisher.programMaestría en educación
dc.publisher.programComunicación y Relaciones Corporativas
dc.subject.keywordCapable guardianeng
dc.subject.keywordCyber victimizationeng
dc.subject.keywordExposure to motivated offendereng
dc.subject.keywordRoutine activity theoryeng
dc.subject.keywordSuitable targeteng
dc.subject.keywordHuman experimenteng
dc.subject.keywordMajor clinical studyeng
dc.publisher.facultyFacultad de Comunicación
dc.publisher.facultyFacultad de Ciencias Sociales y Humanas
dc.affiliationPuente, S.M., Universidad de Medellín, Carrera 87 N° 30-65, Medellín, Colombia
dc.affiliationRíos Hernández, I.N., Universidad de Medellín, Carrera 87 N° 30-65, Medellín, Colombia
dc.relation.referencesÁlvarez, F., Un test de la Teoría de las Actividades Rutinarias. ¿Guardianes capaces o eficacia colectiva? (2015) Revista de Derecho UNED, (16), pp. 65-80. ,
dc.relation.referencesÁlvarez-García, D., Dobarro, A., Núñez, J., Validez y confiabilidad del cuestionario de cibervictimización en estudiantes de secundaria (2015) Aula Abierta, (43), pp. 32-38. ,
dc.relation.referencesAkbulut, Y., Sahin, Y.L., Eristi, B., Development of a scale to investigate cybervictimization among online social utility members (2010) Contemporary Educational Technology, 1 (1), pp. 46-59. ,
dc.relation.referencesArntfield, M., Toward a cybervictimology: Cyberbullying, Routine Activities Theory, and the anti-sociality of social media (2015) Canadian Journal of Communication, 40, pp. 371-388. ,
dc.relation.referencesBárcenas, C., Aproximaciones al estudio de la convergencia digital (2013) Estudios sobre las culturas contemporáneas, 38 (19), pp. 9-27. ,, Recuperado de
dc.relation.referencesBauman, S., Cross, D., Walker, J., (2012) Principles of cyberbullying research: Definitions, measures, and methodology, , (Eds). Routledge
dc.relation.referencesBauman, S., Bellmore, A., New directions in cyberbullying research (2015) Journal of School Violence, 14 (1), pp. 1-10. ,
dc.relation.referencesBauman, S., Cyberbullying in a rural intermediate school: An exploratory study (2009) The Journal of Early Adolescence, 30 (6), pp. 803-833. , https://doi:10.1177/0272431609350927
dc.relation.referencesBeran, T., Li, Q., The relationship between cyberbullying and school bullying (2007) Journal of Student Wellbeing, 1 (2), pp. 15-33. ,
dc.relation.referencesCohen, L. E., Kluegel, J. R., Land, K. C., Social inequality and predatory criminal victimization: An exposition and test of a formal theory (1981) American Sociological Review, 46 (5), pp. 505-524. ,
dc.relation.referencesCohen, l., Felson, M., Social change and crime rate trends: a routine activity approach (1979) American Sociological Review, 44, pp. 588-608. ,
dc.relation.referencesCowie, H., Bauman, S., Coyne, I., Myers, C., Pörhölä, M., Almeida, A., Cyberbullying amongst university students: An emergent cause for concern? (2013) Cyberbullying through the new media: Findings from an international network, pp. 165-177. , P. K. Smith & G. Steffgen (Eds), Psychology Press
dc.relation.referencesDehue, F., Bolman, C., Vollink, T., Cyberbullying: Youngsters’ experiences and parental perception (2008) CyberPsychology and Behavior, 11 (2), pp. 217-223. ,
dc.relation.referencesDilmac, B., Psychological needs as a predictor of cyberbullying: A preliminary report on college students (2009) Educational Sciences: Theory and Practice, 9 (3), pp. 1307-1325
dc.relation.referencesFrías-Navarro, D., (2014) Apuntes de SPSS: Análisis de fiabilidad, ,, Recuperado de
dc.relation.referencesGarcía-Guilabert, N., Actividades cotidianas de los jóvenes en internet y victimización por malware (2016) Revista de Internet, Derecho y Política, 22, pp. 48-61. ,, Recuperado de
dc.relation.referencesGarcía, J., La comunicación ante la convergencia digital: algunas fortalezas y debilidades (2009) Signo y Pensamiento, 28 (54), pp. 102-113
dc.relation.referencesHinduja, S., Patchin, J., Cyberbullying: An exploratory analysis offactorsrelatedtooffendingandvictimization (2008) DeviantBehavior, 29 (2), pp. 129-156. ,
dc.relation.referencesIto, M., (2013) Hanging out, messing around, and geeking out: Kids living and learning with new media, , MIT Press
dc.relation.referencesJenkins, H., (2008) Convergence culture: La cultura de la convergencia de los medios de comunicación, , Paidós
dc.relation.referencesKalia, D, Aleem, S., Cyber victimization among adolescents: Examining the role of Routine Activity Theory (2017) Journal of Psychosocial Research, 12 (1), pp. 223-232
dc.relation.referencesKalia, D., Aleem, S., Role of Routine Activity Theory in cyber victimization among adolescents: A gendered perspective (2017) Phonix International Journal for Psychology and Social Sciences, 1 (3), pp. 1-121
dc.relation.referencesKao, D, Kluaypa, B., Lin, H., The cyberbullying assessment of capable guardianship in Routine Activity Theory (2017) Intelligence and Security Informatics, , En Wang, G., Chau, M. y Chen, H. (eds), Springer International Publishing
dc.relation.referencesKowalski, R. M., Giumetti, G. W., Schroeder, A. N., Lattanner, M. R., Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth (2014) Psychological Bulletin, 140 (4), pp. 1073-1137. , https://doi:10.1037/a0035618
dc.relation.referencesKoutamanis, M., Vossen, H. G. M., Valkenburg, P. M., Adolescents’ comments in social media: Why do adolescents receive negative feedback and who is most at risk? (2015) Computers in Human Behavior, 53, pp. 486-494. ,
dc.relation.referencesLee, S., Chae, Y., Children´s internet use in a family context: Influence on family relationships and parental mediation (2007) CyberPsychology & Behavior, 10 (5), pp. 640-644. ,
dc.relation.referencesLivingstone, S., Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression (2008) New Media & Society, 10 (3), pp. 393-411. ,
dc.relation.referencesLjepava, N., Application of Routine Activities Theory to the prediction of cyber victimization (2015) En 49th Annual Convention of the Association for Behavioral and Cognitive Therapies, , (Noviembre de). Paper presentado en la 49th Annual Convention of the Association for Behavioral and Cognitive Therapies IL en Chicago
dc.relation.referencesMenesini, E., Nocentini, A., Calussi, P., The measurement of cyberbullying: dimensional structure and relative item severity and discrimination (2011) Cyberpsychology, Behavior, and Social Networking, 14 (5), pp. 267-274. , https://doi:10.1089/cyber.2010.0002
dc.relation.referencesMarcum, C. D., Identifying potential factors of adolescent online victimization for high school seniors (2008) International Journal of Cyber Criminology, 2 (2), pp. 346-367
dc.relation.referencesMiró, F., La oportunidad criminal en el ciberespacio. Aplicación y desarrollo de la teoría de las actividades cotidianas para la prevención del cibercrimen (2011) Revista Electrónica de Ciencia Penal y Criminología, 13 (7), pp. 1-55
dc.relation.referencesMitchell, K, Wolak, J., Finkelhor, D., Are blogs putting youth at risk for online sexual solicitation or harassment? (2008) Child Abuse & Neglect, 32 (2), pp. 277-294. ,
dc.relation.referencesTecnologías de la información y de las comunicaciones: maximización del potencial de los niños y protección de los niños contra la violencia en línea, incluida la explotación sexual (2016), Informe anual de la Oficina del Representante Especial del Secretario General sobre l Violencia Contra los Niños
dc.relation.referencesPatchin, J., Hinduja, S., Bullies move beyond the schoolyard: A preliminary look at cyberbullying (2006) Youth Violence and Juvenile Justice, 4 (2), pp. 148-169. , https://doi:10.1177/1541204006286288
dc.relation.referencesPratt, T., Holtfreter, K., Reisig, M., Routine online activity and internet fraud targeting: Extending the generality of Routine Activity Theory (2010) Journal of Research in Crime and Delinquency, 47 (3), pp. 267-296. ,
dc.relation.referencesReyns, B., Henson, B., The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with Routine Activity Theory (2015) International JournalofOffenderTherapyandComparativeCriminology, 60 (10), pp. 1119-1139. ,
dc.relation.referencesRodríguez, J., Oduber, J., Mora, E., Actividades rutinarias y cibervictimización en Venezuela (2017) URVIO, Revista Latinoamericana de Estudios de Seguridad, (20), pp. 63-79
dc.relation.referencesSasson, H., Mesch, G., Parental mediation, peer norms and risky online behavior among adolescents (2014) Computers in Human Behavior, 33, pp. 32-38. ,
dc.relation.referencesShin, W., Huh, J., Parental mediation of teenagers’ video game playing: Antecedents and consequences (2011) New Media & Society, 13 (6), pp. 945-962. ,
dc.relation.referencesSengupta, A., Chaudhuri, A., Are social networking sites a source of online harassment for teens? Evidence from survey data (2011) Children and Youth Services Review, 33 (2), pp. 284-290. ,
dc.relation.referencesVakhitova, Z., Reynald, D., Townsley, M., Toward the adaptation of Routine Activity and Lifestyle Exposure Theories to account for cyber abuse victimization (2015) Journal of Contemporary Criminal Justice, 32 (2), pp. 169-188. ,
dc.identifier.reponamereponame:Repositorio Institucional Universidad de Medellín
dc.identifier.instnameinstname:Universidad de Medellín

Files in this item


There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record