{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:14:32Z","timestamp":1654103672563},"reference-count":49,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10,1]]},"abstract":"<p>Whilst cyber-harassment is a criminal act within the United Kingdom, there is little research examining whether cyber-harassing behaviors are perceived as criminal. This paper assesses whether the \u2018Big Five\u2019 personality characteristics and Internet self-efficacy influence perceived criminality of cyber-harassing behaviors. The sample comprised 320 undergraduate students who completed an online survey measuring perceived criminality of 18 cyber-harassing behaviors. Principal axis factoring revealed three dimensions: malicious behavior, harassing messages, and malicious software. High Internet self-efficacious individuals (i.e., those who feel more in control of online interactions) were more likely than low Internet self-efficacious individuals to perceive malicious software as criminal. Low-agreeable individuals were more likely than high-agreeable individuals to perceive harassing messages as criminal. Whilst personality and Internet self-efficacy influenced perceived criminality for some cyber-harassing behaviors, the findings were not consistent. The paper discusses the findings and implications for future research.<\/p>","DOI":"10.4018\/ijcbpl.2012100104","type":"journal-article","created":{"date-parts":[[2013,2,15]],"date-time":"2013-02-15T22:49:29Z","timestamp":1360968569000},"page":"49-59","source":"Crossref","is-referenced-by-count":2,"title":["Perceived Criminality of Cyber-Harassing Behaviors among Undergraduate Students in the United Kingdom"],"prefix":"10.4018","volume":"2","author":[{"given":"Catherine","family":"Millman","sequence":"first","affiliation":[{"name":"Nottingham Trent University, Nottingham, UK"}]},{"given":"Monica","family":"Whitty","sequence":"additional","affiliation":[{"name":"Department of Media and Communication, Leicester University, Leicester, UK"}]},{"given":"Belinda","family":"Winder","sequence":"additional","affiliation":[{"name":"Department of Psychology, Nottingham Trent University, Nottingham, UK"}]},{"given":"Mark D.","family":"Griffiths","sequence":"additional","affiliation":[{"name":"Department of Psychology, Nottingham Trent University, Nottingham, UK"}]}],"member":"2432","reference":[{"key":"ijcbpl.2012100104-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.09.003"},{"key":"ijcbpl.2012100104-1","doi-asserted-by":"publisher","DOI":"10.1093\/brief-treatment\/mhi020"},{"key":"ijcbpl.2012100104-2","author":"A.Bandura","year":"1997","journal-title":"Self-efficacy: The exercise of control"},{"key":"ijcbpl.2012100104-3","unstructured":"Basu, S., & Jones, R. P. (2007). Regulating cyberstalking. Journal of Information, Law & Technology, (2). Retrieved September 9, 2008, from http:\/\/www2.warwick.ac.uk\/fac\/soc\/law\/elj\/jilt\/2007_2\/basu_jones\/"},{"key":"ijcbpl.2012100104-4","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.141601"},{"key":"ijcbpl.2012100104-5","doi-asserted-by":"crossref","unstructured":"Bocij, P. (2003) Victims of cyberstalking: An exploratory study of harassment perpetrated via the Internet. First Monday, 8, article 10. Retrieved August 21, 2006, from www.firstmonday.dk\/issues\/issue8_10\/bocij\/index.html","DOI":"10.5210\/fm.v8i10.1086"},{"key":"ijcbpl.2012100104-6","author":"P.Bocij","year":"2004","journal-title":"Cyberstalking: Harassment in the Internet Age and how to protect your family"},{"key":"ijcbpl.2012100104-7","first-page":"3","article-title":"Cyberstalking: A new challenge for criminal law.","volume":"122","author":"P.Bocij","year":"2002","journal-title":"The Criminal Lawyer"},{"key":"ijcbpl.2012100104-8","first-page":"31","article-title":"Online harassment: Towards a definition of cyberstalking.","volume":"139","author":"P.Bocij","year":"2002","journal-title":"Prison Service Journal"},{"key":"ijcbpl.2012100104-9","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.69.5.890"},{"key":"ijcbpl.2012100104-10","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6494.05007"},{"key":"ijcbpl.2012100104-11","year":"2009","journal-title":"Code of ethics and conduct"},{"key":"ijcbpl.2012100104-12","doi-asserted-by":"publisher","DOI":"10.1027\/1015-5759.21.2.115"},{"key":"ijcbpl.2012100104-13","author":"T.Budd","year":"2000","journal-title":"The extent and nature of stalking: Findings from the 1998 British Crime Survey (Home Office Research Study No. 210)"},{"key":"ijcbpl.2012100104-14","doi-asserted-by":"publisher","DOI":"10.1177\/0093854806297555"},{"key":"ijcbpl.2012100104-15","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.49.5.1266"},{"key":"ijcbpl.2012100104-16","first-page":"1","article-title":"Best practices in exploratory factor analysis: Four recommendations for getting the most from your analysis.","volume":"10","author":"A. B.Costello","year":"2005","journal-title":"Practical Assessment, Research & Evaluation"},{"key":"ijcbpl.2012100104-17","doi-asserted-by":"publisher","DOI":"10.1080\/135943200417957"},{"key":"ijcbpl.2012100104-18","doi-asserted-by":"publisher","DOI":"10.1108\/09649429510095980"},{"key":"ijcbpl.2012100104-19","author":"W. R.Cupach","year":"2004","journal-title":"The dark side of relationship pursuit: From attraction to obsession and stalking"},{"key":"ijcbpl.2012100104-20","first-page":"10","article-title":"A study on cyberstalking: Understanding investigative hurdles.","volume":"72","author":"R.D\u2019Ovidio","year":"2003","journal-title":"FBI Law Enforcement Bulletin"},{"key":"ijcbpl.2012100104-21","doi-asserted-by":"publisher","DOI":"10.1108\/02683940510579740"},{"key":"ijcbpl.2012100104-22","doi-asserted-by":"publisher","DOI":"10.1080\/016128499248448"},{"key":"ijcbpl.2012100104-23","author":"W. H.Dutton","year":"2007","journal-title":"The Internet in Britain: 2007"},{"key":"ijcbpl.2012100104-24","author":"W. H.Dutton","year":"2009","journal-title":"Oxford Internet survey 2009 report: The Internet in Britain"},{"key":"ijcbpl.2012100104-25","doi-asserted-by":"crossref","unstructured":"Eastin, M. S., & LaRose, R. (2000). Internet self-efficacy and the psychology of the digital divide. Journal of Computer-Mediated Communication, 6. Retrieved August 5, 2008, from http:\/\/jcmc.indiana.edu\/vol6\/issue1\/eastin.html","DOI":"10.1111\/j.1083-6101.2000.tb00110.x"},{"key":"ijcbpl.2012100104-26","unstructured":"Ellison, L. (1999, March 29-30). Cyberstalking: Tackling harassment on the Internet. Paper presented at the 14th Bileta Conference on Cyberspace: Crime, Criminal Justice and the Internet, York, UK."},{"key":"ijcbpl.2012100104-27","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2007.00554.x"},{"key":"ijcbpl.2012100104-28","first-page":"58","article-title":"Incentives in web studies: Methodological issues and a review.","volume":"1","author":"A. S.G\u00f6ritz","year":"2006","journal-title":"International Journal of Internet Science"},{"key":"ijcbpl.2012100104-29","doi-asserted-by":"publisher","DOI":"10.1177\/026455059804500303"},{"key":"ijcbpl.2012100104-30","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.77.5.1087"},{"key":"ijcbpl.2012100104-31","doi-asserted-by":"publisher","DOI":"10.1002\/ab.20277"},{"key":"ijcbpl.2012100104-32","year":"1988","journal-title":"Malicious Communications Act 1988"},{"key":"ijcbpl.2012100104-33","year":"1990","journal-title":"Computer Misuse Act 1999"},{"key":"ijcbpl.2012100104-34","year":"1997","journal-title":"Protection from Harassment Act 1997"},{"key":"ijcbpl.2012100104-35","first-page":"15","article-title":"You\u2019ve got mail! You don\u2019t want it: Cyber-victimization and on-line dating.","volume":"9","author":"R.Jerin","year":"2001","journal-title":"Journal of Criminal Justice and Popular Culture"},{"key":"ijcbpl.2012100104-36","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.85.5.1030"},{"key":"ijcbpl.2012100104-37","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.49.3.710"},{"key":"ijcbpl.2012100104-38","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.52.1.81"},{"key":"ijcbpl.2012100104-39","article-title":"The web experimentation method: Advantages, disadvantages and solutions","author":"U. D.Reips","year":"2000","journal-title":"Psychological experiments on the Internet"},{"key":"ijcbpl.2012100104-40","doi-asserted-by":"publisher","DOI":"10.1348\/135532501168163"},{"key":"ijcbpl.2012100104-41","doi-asserted-by":"publisher","DOI":"10.1080\/10683160701340528"},{"key":"ijcbpl.2012100104-42","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012490560-3\/50024-4"},{"key":"ijcbpl.2012100104-43","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"ijcbpl.2012100104-44","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(01)00054-1"},{"key":"ijcbpl.2012100104-45","author":"P.Tjaden","year":"1998","journal-title":"Stalking in America: Findings from the National Violence Against Women survey (No. 93-IJ-CX-0012)"},{"key":"ijcbpl.2012100104-46","article-title":"Manipulation of self in cyberspace","author":"M. T.Whitty","year":"2007","journal-title":"The dark side of interpersonal communication"},{"key":"ijcbpl.2012100104-47","author":"M. T.Whitty","year":"2006","journal-title":"Cyberspace romance: The psychology of online relationships"},{"key":"ijcbpl.2012100104-48","article-title":"Electronic bullying in the workplace","author":"M. T.Whitty","year":"2003","journal-title":"Workplace violence"}],"container-title":["International Journal of Cyber Behavior, Psychology and Learning"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=75171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:34:05Z","timestamp":1654101245000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcbpl.2012100104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,10,1]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcbpl.2012100104","relation":{},"ISSN":["2155-7136","2155-7144"],"issn-type":[{"value":"2155-7136","type":"print"},{"value":"2155-7144","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10,1]]}}}