10,048 research outputs found

    Victimization, Stress, and Psychological Well-being: An Analysis of the 2009 Canadian Victimization Survey

    Get PDF
    This study addresses several methodological and theoretical gaps in extant literature that has examined victimization and its correlation with resultant mental health outcomes. The 2009 Canadian GSS Victimization [cycle 23] survey, comprising of 19,422 participants aged 15 years or older, was used to examine: (1) the extent to which different forms of victimization are related to stress, psychological well-being (i.e., self-report mental health and life satisfaction), and substance abuse behavior; (2) whether stress acts as a mediator in the relationship between victimization and mental health outcome measures; (3) if low total household income moderates the association between victimization and mental health. It was found that several types of victimization significantly predicted greater levels of stress, poorer self-report mental health and lower levels of life satisfaction, as well as greater odds of engaging in alcohol and drug use behavior. It was also determined that perceived stress mediates (either fully or partially) the relationship between some forms of victimization and psychological well-being (i.e., measurement of self-report mental health and life satisfaction, but not substance abuse). Although very limited support is found for the third hypothesis, it was determined that low THI modifies the association between physical/sexual assault and life satisfaction to predict a stronger negative correlation, compared to the main effect; low THI modifies the association between personal victimization and high alcohol use to predict a stronger positive correlation. Agnew’s General Strain Theory (1992), Pearlin’s Stress Process (1981), and the causation hypothesis are used to inform the discussion of results. Future research/policy directions are discussed

    E- Crime Behaviour of Internet Users

    Get PDF
    Electronic crime or cyber crime refers to crimes that can only be committed using information technology such as phishing, data theft and payment fraud. Software called crime ware makes it easy to find and target the victims. E-commerce websites in particular are often seen as the "sweet spots", especially by organized criminals. Whilst some one-off attacks may be the result of disgruntled customers and organized attacks are more likely to be undertaken internally by staff or externally by organized criminals. This paper compiles e-crime nature, types, provides detailed review of work done in e-crime prevention and gives analysis of e-crime behavior of internet users based on a primary survey

    Addressing the cyber safety challenge: from risk to resilience

    Get PDF
    Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs. Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to: Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach Keep risk in perspective – the risks and benefits of digital participation go hand in hand Broaden the focus from awareness-raising to long-term behaviour change. As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved. Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services

    Victimization by Deepfake in the Metaverse: Building a Practical Management Framework

    Get PDF
    Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework and provide solutions to mitigate deepfake-related victimization in the metaverse. This study identifies and further suggests a framework for advocacy of deepfake crime victimization in the metaverse through the application of the routine activities theory, as well as offender motivation and potential explanation of criminal behavior through Eysenck’s theory of criminality

    The self-management of chronic conditions and the experience of cyber-victimisation in the United Kingdom

    Get PDF
    A thesis submitted to the University of Bedfordshire, in fulfilment of the requirements for the degree of Doctor of Philosophy (PhD)Background The victimisation of people with chronic conditions and disabilities has physical, mental and psychosocial consequences. Although this victimisation is documented, victims usually struggle to get the proper support. Research focusing on cyber-victimisation of people with long-term conditions is limited and lacks qualitative elements. Aims This study aimed to understand the impact of cyber-victimisation among individuals living with chronic conditions in the UK. Methods A mixed-method design was adopted using a mixed-method online survey, followed by in-depth interviews with victims. The participants were encouraged to share their voices as experts in their own experiences. This was supported by short interviews with general practitioners (GPs) as the gatekeepers to the health system and one of the supportive channels available to victims. A systematic review was completed and published, which helped to identify gaps in the literature. Primary data was collected from 55 victim support groups, patient-support groups, and via social media. The challenges in recruiting victims for this sensitive topic were identified and published to guide future research. The theoretical framework underpinning the study incorporated the Biographical Disruption model, Self-Management and Social Support. Results Quantitative data from 152 participants showed that almost one in every two people with chronic conditions was cyber-victimised (45.39%). In total, 76.81% of victims had a self-reported disability, and the relationship between cyber-victimisation and disability was statistically significant. Furthermore, 61.11% of victims reported that experiencing cyber-victimisation had affected their self-management plan. The highest impact was on lifestyle changes such as exercise, diet, avoiding triggers, and avoiding excessive smoking or alcohol drinking. This was followed by changes to medications and follow up with healthcare professionals. Indeed, 69% of victims perceived a worsened self-efficacy scale for health condition self-management following cyber-victimisation. In general, formal support was rated poor, with only 24.53% of victims having spoken to their GPs with variable responses. Six themes emerged from the qualitative data: Biomedical Events (overall health - physical complaints), Impact on Mental Health (psychological and psychiatric effects - helplessness), Multi-level Impact (existing vulnerability - disruption and reprioritisation), The Impact of Complexity (complex situation - struggle for support), Social Network Involvement (social isolation and victim blaming - controversial social support - misrepresentation of self), and Disability Discrimination (inclusion, culture and hate – tax and disability benefits). The participating GPs thought that cyber-victimisation had both mental and physical impact on people with chronic conditions, with concerns over online health forums use. GPs’ responses were influenced by individual variations. Conclusion Cyber-victimisation against people with chronic conditions is prevalent. It is a traumatic event that was introduced after the biographical disruption and working to cope with long-term conditions. It triggered significant fear, had a devastating impact and depleted victims of social support. The impact was multifaceted, and the results from the survey and interviews were convergent. They were also confirmed by the GPs’ input. The outcomes provided an in-depth understanding of the impact of cyber-victimisation on such marginalised groups. To initiate change, the results were summarised in a health promotion design that was informed by the participants and gatekeepers, and improved for dissemination. Further context-specific, condition-specific, participatory, and multidisciplinary work are indicated

    The Impact of Cybervictimization on the Self-Management of Chronic Conditions:Lived Experiences

    Get PDF
    BackgroundCybervictimization of people with long-term conditions is a disturbing phenomenon with a documented impact on health and well-being. These experiences are primarily examined using quantitative methods, focusing on children and young people. However, research centered on the cybervictimization of adults with chronic conditions is scarce, with limited qualitative input from the victims as experts in their own experiences. ObjectiveThis study aims to understand the impact of cybervictimization on the self-management of long-term conditions among adults with chronic conditions and disabilities in the United Kingdom. MethodsThis paper reports the findings from the qualitative phase of a phenomenologically informed mixed methods study. The biographical disruption concept was used to conceptualize the study. In-depth semistructured interviews were conducted with 13 participants with chronic conditions who experienced cybervictimization. A codebook was developed, and a zigzag approach to thematic analysis was used to define and refine themes. Ethical considerations and risk assessment were ongoing during the research process because of the sensitivity of the topic and cases of harassment. ResultsCybervictimization has direct and indirect impacts on the self-management of chronic conditions. This impact was verified across 6 overarching themes that emerged from this study. First, biomedical events included overall health deterioration because of existing conditions, new diagnoses, and subjective physical complaints. Second, the impact on mental health was perceived through psychological consequences and psychiatric disorders that developed after or during this traumatic experience. Third, the multilevel impact theme focused on disrupting the strategies for coping with health conditions and involved unplanned changes to victims’ health management priorities. Fourth, the impact of complexity reflected the perceived uniqueness in each case, intersectionality, struggle to obtain formal support, and subsequent health complications. Fifth, social network involvement comprised the effects of social isolation, victim blaming, and deception. Finally, the disability discrimination theme focused on prejudice, issues on inclusion, and hostility in society, with subsequent effects on well-being. ConclusionsPeople with long-term conditions experienced different forms of cybervictimization, all disruptive with various effects on health. Disability discrimination was a prominent finding to be further investigated. This paper reports the impact as themes to guide further research and practice, with the recognition that long-term conditions and impairments are not a homogeneous group. Despite the devastating consequences, there are positive points that strengthen potential interventions. Awareness-raising campaigns, training of support channels, and multidisciplinary research are recommended to tackle this issue and initiate change

    Understanding offending behaviours and the autism spectrum

    Get PDF

    Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review

    Full text link
    Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft
    • 

    corecore