{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T00:44:38Z","timestamp":1759797878855,"version":"build-2065373602"},"reference-count":66,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"vor","delay-in-days":278,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Technological advancements of the 20th century have not only expanded women\u2019s access to information and virtual interaction but have also contributed to a rise in cybercrimes. Cybercrime involves intentional and often repeated aggressive behaviour enacted through digital technologies to inflict psychological, emotional, or social harm on individuals or groups. These acts are frequently amplified by power imbalances and the persistent, far-reaching nature of online platforms. Female users, often perceived as more vulnerable by legal and societal systems, face disproportionately higher risks of cyber victimization. Such offences can lead to severe physical, sexual, psychological, and economic consequences. This study explores the nature and impact of cybercrimes experienced by female university students in Kashmir. Using a mixed-methods approach, the research collected quantitative data from 250 female students, of whom 15 were selected for qualitative interviews. Although the prevalence of cybercrimes in the region is not alarmingly high, the lack of computer literacy, limited awareness of cyber laws, and minimal digital protection mechanisms increase women\u2019s vulnerability to online threats. The psychological consequences of cybercrime were profound, manifesting in depression, anxiety, and withdrawal from digital spaces. The study underscores the urgent need to enhance cyber safety education, legal protections, and support systems to safeguard female users in the region\u2019s digital landscape. This study highlights the urgent need for targeted interventions to bolster cyber literacy and resilience among female university students in Kashmir. By fostering digital safety awareness and strengthening institutional support systems, stakeholders can create a safer online environment, empowering women to engage confidently in the digital sphere without fear of exploitation or harm.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf026","type":"journal-article","created":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T14:22:33Z","timestamp":1759760553000},"source":"Crossref","is-referenced-by-count":0,"title":["Unmasking the silent threat: understanding cybercrimes targeting female students of Kashmir university\u2014a mixed-method analysis"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4153-3325","authenticated-orcid":false,"given":"Syed Shubeena","family":"Yaqoob","sequence":"first","affiliation":[{"name":"University of Kashmir Department of Sociology, , Hazratbal, Srinagar, 190006 ,","place":["India"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6731-5943","authenticated-orcid":false,"given":"Aasif Hussain","family":"Sheikh","sequence":"additional","affiliation":[{"name":"University of Kashmir Department of Sociology, , Hazratbal, Srinagar, 190006 ,","place":["India"]}]}],"member":"286","published-online":{"date-parts":[[2025,10,6]]},"reference":[{"key":"2025100610222686300_bib1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.5120\/ijca2017915407","article-title":"Cyber-crimes against womenfolk on social networks: Bangladesh context","volume":"174","author":"Ahmed","year":"2017","journal-title":"IJCA"},{"key":"2025100610222686300_bib2","doi-asserted-by":"publisher","DOI":"10.56021\/9781421419268","volume-title":"Global perspectives on higher education","author":"Altbach","year":"2016"},{"key":"2025100610222686300_bib3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.18203\/2394-6040.ijcmph20175763","article-title":"Cyber sexual harassment: a cross-sectional survey over female university students in Upper Egypt","volume":"5","author":"Arafa","year":"2018","journal-title":"Int J Community Med Public Health"},{"key":"2025100610222686300_bib4","first-page":"107","article-title":"Pattern and correlates of cyberbullying victimization among Egyptian university students in Beni-Suef, Egypt","volume":"92","author":"Arafa","year":"2017","journal-title":"J Egypt Public Health Assoc"},{"key":"2025100610222686300_bib5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1089\/vio.2017.0056","article-title":"Networked individuals, gendered violence: a literature review of cyberviolence","volume":"5","author":"Backe","year":"2018","journal-title":"Violence Gender"},{"key":"2025100610222686300_bib6","article-title":"A sociological study of cybercrimes against women in India: deciphering the causes and evaluating the impact on the victims","volume":"19","author":"Balabantaray","year":"2023","journal-title":"Int J Asia Pac Stud"},{"key":"2025100610222686300_bib7","article-title":"Mixed methods research","author":"Bian","year":"2018","journal-title":"Office for Faculty Excellence"},{"key":"2025100610222686300_bib8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","author":"Braun","year":"2006","journal-title":"Qual Res Psychol"},{"key":"2025100610222686300_bib9","first-page":"47","article-title":"Online violence against women as an obstacle to gender equality: a critical view from Europe","volume":"2020","author":"Barker","year":"2020","journal-title":"Eur Equal Law Rev"},{"key":"2025100610222686300_bib10","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1080\/08974454.2013.806839","article-title":"Teen dating relationships and outcomes of well-being: examining gender differences in nonviolent and violent dating relationships","volume":"23","author":"Button","year":"2013","journal-title":"Women Criminal Justice"},{"key":"2025100610222686300_bib11","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1057\/sj.2012.11","article-title":"Not a victimless crime: the impact of fraud on individual victims and their families","volume":"27","author":"Button","year":"2014","journal-title":"Secur J"},{"key":"2025100610222686300_bib12","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1177\/1557085105282899","article-title":"Intersections of race, class, gender, and crime: future directions for feminist criminology","volume":"1","author":"Burgess-Proctor","year":"2006","journal-title":"Feminist Criminol"},{"key":"2025100610222686300_bib13","doi-asserted-by":"publisher","first-page":"194","DOI":"10.13189\/ujph.2015.030504","article-title":"Exploring cyber harassment among women who use social media","volume":"3","author":"Burke\u00a0WinkelmAn","year":"2015","journal-title":"UJPH"},{"key":"2025100610222686300_bib14","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1080\/15564886.2020.1787282","article-title":"Gender identification and the fear of crime: do masculinity and femininity matter in reporting fear of crime?","volume":"16","author":"Choi","year":"2021","journal-title":"Victims Offenders"},{"key":"2025100610222686300_bib15","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1111\/1745-9125.12247","article-title":"Feminist criminology in an era of misogyny","volume":"58","author":"Chesney-Lind","year":"2020","journal-title":"Criminology"},{"key":"2025100610222686300_bib16","first-page":"116","article-title":"Cyber-crime against women","volume":"4","author":"Chaudhary","year":"2019","journal-title":"Chetana Int J Educ"},{"key":"2025100610222686300_bib17","first-page":"6","article-title":"Cyber-crimes and challenges faced by criminal justice system","volume":"7","author":"Chudasama","year":"2021","journal-title":"Int J Inf Secur Softw Eng"},{"key":"2025100610222686300_bib18","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674735613","volume-title":"Hate crimes in cyberspace","author":"Citron","year":"2014"},{"key":"2025100610222686300_bib19","first-page":"677","article-title":"Population-based health promotion perspective for older driver safety: conceptual framework to intervention plan","volume":"2","author":"Classen","year":"2007","journal-title":"Clin Interv Aging"},{"key":"2025100610222686300_bib20","volume-title":"Research design: Qualitative, quantitative, and mixed methods approaches","author":"Creswell","year":"2018","edition":"5th ed."},{"key":"2025100610222686300_bib21","first-page":"269","article-title":"A technical review report on cyber-crimes in India","volume-title":"Proc Int Conf Emerg Smart Comput Informatics (ESCI)","author":"Datta","year":"2020"},{"key":"2025100610222686300_bib22","first-page":"1","article-title":"Mis) perceptions of crime in Australia","volume":"396","author":"Davis","year":"2010","journal-title":"Trends Issues Crime Crim Justice"},{"key":"2025100610222686300_bib23","article-title":"The gender gap and cybercrime: an examination of college students' online offending","volume":"11","author":"Donner","year":"2016","journal-title":"Vict Offenders"},{"key":"2025100610222686300_bib24","doi-asserted-by":"publisher","DOI":"10.1057\/9781137404206","volume-title":"Postfeminist digital cultures: Femininity, social media, and self-representation","author":"Dobson","year":"2015"},{"key":"2025100610222686300_bib25","volume-title":"Online harassment","author":"Duggan","year":"2014"},{"key":"2025100610222686300_bib26","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.1177\/1461444816688457","article-title":"Fighting for recognition: online abuse of women bloggers in Germany, Switzerland, the United Kingdom, and the United States","volume":"20","author":"Eckert","year":"2018","journal-title":"New Media Soc"},{"key":"2025100610222686300_bib27","first-page":"1","article-title":"A stalker's paradise\u201d: how intimate partner abusers exploit technology","volume-title":"Proc 2018 CHI Conf Hum Factors Comput Syst","author":"Freed","year":"2018"},{"key":"2025100610222686300_bib28","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.wsif.2018.04.005","article-title":"Intimate intrusions online: studying the normalisation of abuse in dating apps","volume":"69","author":"Gillett","year":"2018","journal-title":"Women's Studies Int Forum"},{"key":"2025100610222686300_bib29","article-title":"Crimes against women in cyberspace.\u00a0Greater Kashmir"},{"key":"2025100610222686300_bib30","volume-title":"Cyber-crime and the victimization of women: Laws, rights and regulations","author":"Halder","year":"2011"},{"key":"2025100610222686300_bib31","article-title":"Cyber violence against women and girls: a worldwide wake-up call","author":"UN Broadband Commission for Digital Development","year":"2015"},{"key":"2025100610222686300_bib32","article-title":"Free to be online? Girls' and young women's experiences of online harassment","author":"Plan International","year":"2020"},{"key":"2025100610222686300_bib33","article-title":"Cyber harassment helpline: annual report","author":"Digital Rights Foundation","year":"2018"},{"key":"2025100610222686300_bib34","volume-title":"The chilling: Global trends in online violence against women journalists","author":"UNESCO","year":"2021"},{"key":"2025100610222686300_bib35","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1080\/01639620701457816","article-title":"Cyberbullying: an exploratory analysis of factors related to offending and victimization","volume":"29","author":"Hinduja","year":"2008","journal-title":"Deviant Behavior"},{"key":"2025100610222686300_bib36","first-page":"1","article-title":"Women and violence: a study of women's empowerment and its challenges in Jammu and Kashmir","volume":"2","author":"Gul","year":"2015","journal-title":"Online Submiss"},{"key":"2025100610222686300_bib37","volume-title":"Bullying beyond the schoolyard: Preventing and responding to cyberbullying","author":"Hinduja","year":"2015","edition":"2nd ed."},{"key":"2025100610222686300_bib38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/01639620701876577","article-title":"Examining the applicability of lifestyle-routine activities theory for cybercrime victimization","volume":"30","author":"Holt","year":"2008","journal-title":"Deviant Behavior"},{"key":"2025100610222686300_bib39","doi-asserted-by":"publisher","DOI":"10.4135\/9781473916029","volume-title":"Misogyny online: A short (and brutish) history","author":"Jane","year":"2017"},{"key":"2025100610222686300_bib40","first-page":"13","article-title":"A study on cyber-crime and security scenario in India","volume":"3","author":"Joshi","year":"2013","journal-title":"Int J Eng Manag Res"},{"key":"2025100610222686300_bib41","first-page":"233","article-title":"Cybercrimes against women: present scenario","volume":"3","author":"Kaur","year":"2015","journal-title":"Int J Manag Soc Sci"},{"key":"2025100610222686300_bib42","first-page":"1950","article-title":"Competence in cybercrime: a review of existing laws","volume":"11","author":"Khudhair","year":"2021","journal-title":"Rev Geintec Gestao Inov Tecnol"},{"key":"2025100610222686300_bib43","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1177\/24559296211013511","article-title":"Liberating working women in traditional occupations: exclusion, exploitation and deprivation","volume":"6","author":"Khan","year":"2021","journal-title":"J Heritage Manage"},{"key":"2025100610222686300_bib44","first-page":"61","article-title":"Digital revolution, cyber-crimes and cyber legislation: a challenge to governments in developing countries","volume":"4","author":"Kundi","year":"2014","journal-title":"J Inf Eng Appl"},{"key":"2025100610222686300_bib45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11522-6","volume-title":"The global cybercrime industry: Economic, institutional, and strategic perspectives","author":"Kshetri","year":"2010"},{"key":"2025100610222686300_bib46","first-page":"1462","article-title":"Online abuse of feminists as an emerging form of violence against women and girls","volume":"57","author":"Lewis","year":"2017","journal-title":"Br J Criminol"},{"key":"2025100610222686300_bib47","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1080\/13691180701657998","article-title":"Taking risks when communicating on the internet: the role of offline social-psychological factors in young people's vulnerability to online risks","volume":"10","author":"Livingstone","year":"2007","journal-title":"Information, Communication & Society"},{"key":"2025100610222686300_bib48","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1177\/1557085116673172","article-title":"Acknowledging female victims of green crimes: environmental exposure of women to industrial pollutants","volume":"13","author":"Lynch","year":"2018","journal-title":"Feminist Criminology"},{"key":"2025100610222686300_bib49","doi-asserted-by":"publisher","first-page":"1894","DOI":"10.1177\/0886260513511699","article-title":"Pre-pregnancy dating violence and birth outcomes among adolescent mothers in a national sample","volume":"29","author":"Madkour","year":"2014","journal-title":"J Interpers Violence"},{"key":"2025100610222686300_bib50","doi-asserted-by":"publisher","DOI":"10.4324\/9780367818050","volume-title":"Conflict society and peacebuilding: Comparative perspectives","author":"Marchetti","year":"2020"},{"key":"2025100610222686300_bib51","doi-asserted-by":"publisher","first-page":"21","DOI":"10.35940\/ijmh.F0650.034720","article-title":"Cybercrime: women combating with the negative effect of technology in the era of globalization","volume":"4","author":"Mansi","year":"2020","journal-title":"IJMH"},{"key":"2025100610222686300_bib52","first-page":"114","article-title":"Impact of conflict on women in Kashmir","volume":"5","author":"Maqbool","year":"2017","journal-title":"Int J Polit Sci Dev"},{"key":"2025100610222686300_bib53","doi-asserted-by":"publisher","first-page":"177","DOI":"10.15406\/frcij.2020.08.00325","article-title":"Cybercrime: youth awareness survey in Delhi NCR, India","volume":"8","author":"Meena","year":"2020","journal-title":"FRCIJ"},{"key":"2025100610222686300_bib54","article-title":"Cyber crime and women in India: an in-depth analysis","author":"Mishra"},{"key":"2025100610222686300_bib55","volume-title":"Crime in India2022: Cybercrime statistics","author":"National Crime Records Bureau (NCRB)","year":"2022"},{"key":"2025100610222686300_bib56","article-title":"Violence online in India: cybercrimes against women and minorities on social media","author":"Pasricha","year":"2016","journal-title":"Feminism India"},{"key":"2025100610222686300_bib57","doi-asserted-by":"publisher","DOI":"10.1057\/978-1-137-58047-4","volume-title":"Sexual violence in a digital age","author":"Powell","year":"2017"},{"key":"2025100610222686300_bib58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i32\/100189","article-title":"Influence of educational qualification on different types of cybercrime: a statistical interpretation","volume":"9","author":"Rao","year":"2016","journal-title":"Indian J Sci Technol"},{"key":"2025100610222686300_bib59","article-title":"Women empowerment: issues and challenges in Jammu and Kashmir","author":"Sarwer","year":"2017","journal-title":"Int J Soc Relev Concern"},{"key":"2025100610222686300_bib60","doi-asserted-by":"publisher","first-page":"185","DOI":"10.34256\/ajir20114","article-title":"Cybercrimes: threats, challenges, awareness, and solutions in Sierra Leone","volume":"3","author":"Sawaneh","year":"2020","journal-title":"Asian J Interdiscip Res"},{"key":"2025100610222686300_bib61","doi-asserted-by":"publisher","first-page":"142","DOI":"10.4135\/9781849208864","article-title":"Ethical issues","volume-title":"Development fieldwork: A practical guide","author":"Scheyvens","year":"2003","edition":"1st ed."},{"key":"2025100610222686300_bib62","first-page":"86","article-title":"Cyber-crimes: the rampaging threat","volume":"2","author":"Singh","year":"2014","journal-title":"Int J Res Inf Technol"},{"key":"2025100610222686300_bib63","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s10551-013-1806-z","article-title":"The means to justify the end: combatting cyber harassment in social media","volume":"123","author":"van\u00a0Laer","year":"2014","journal-title":"J Bus Ethics"},{"key":"2025100610222686300_bib64","doi-asserted-by":"crossref","first-page":"3555","DOI":"10.1007\/s10708-021-10443-0","article-title":"Geographical distribution of violence against women in Jammu & Kashmir, India","volume":"87","author":"Wani","year":"2022","journal-title":"GeoJournal"},{"key":"2025100610222686300_bib65","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.avb.2017.06.010","article-title":"A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media","volume":"36","author":"Walker","year":"2017","journal-title":"Aggression Violent Behavior"},{"key":"2025100610222686300_bib66","article-title":"Cyber-violence against women","author":"West","year":"2014","journal-title":"Battered Women's Support Services"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf026\/64519404\/tyaf026.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf026\/64519404\/tyaf026.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T14:22:39Z","timestamp":1759760559000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf026\/8275824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":66,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf026","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf026"}}