Skip to main content

Cyber Victimology: A New Sub-Discipline of the Twenty-First Century Victimology

  • Chapter
  • First Online:
An International Perspective on Contemporary Developments in Victimology

Abstract

Notably, some scholars do not perceive cyber crime victimization as a new form of victimization and some do not holistically group them. Invariably, many countries are dealing with cyber crime victimization through their conventional laws, without creating specific laws. These kinds of new issues have paved way to study the cyber victimization from different perspectives. I emphasize the need to have a sub-discipline of Victimology i.e., Cyber Victimology to examine cyber crimes purely from victims’ /victimization perspective, as I believe cyber crime victimization is a new form of victimization. This chapter will dwell on the establishment of the new field of Victimology, which is referred to as Cyber Victimology.

Some parts of this chapter are derived from earlier publications of the author: Jaishankar, K. (2012). Victimization in the Cyber Space: Patterns and Trends. In S. Manacorda (Ed.). Cybercriminality: Finding a balance between freedom and security (pp. 91–106). Milan, Italy: International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Programme (ISPAC). ISBN 978-88-96410-02-8 Jaishankar, K. (2013). Cyber Victimization: New Typology and Novel Trends of Interpersonal attacks on the Internet. In Korean Institute of Criminology (Ed.). Information Society and Cybercrime: Challenges for Criminology and Criminal Justice (pp. 31–47). Seoul, Korea: Korean Institute of Criminology. Research Report Series 13-B-01.ISBN 978-89-7366-002-5. Reproduced with permission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Alshalan, A. (2006). Cyber-crime fear and victimization: An analysis of a national survey. PhD Dissertation submitted to Mississippi State University.

    Google Scholar 

  • Arena, K. (2001). U.S. targets porn site’s customers, CNN.com web site (Aug. 8, 2001), Retrieved from http://www.cnn.com/2001/LAW/08/08/ashcroft.childporn.

  • Brenner, S. (2004). Toward a criminal law for cyberspace: Distributed security. Boston University Journal of Science & Technology Law, 10(2), 1–105.

    Google Scholar 

  • Briggs, F. (2003). From victim to offender: How child sexual abuse victims become offenders. NSW, Australia: Allen & Unwin.

    Google Scholar 

  • Broidy, L. M., Daday, J. K., Crandall, C. S., Sklar, D. P., & Jost, P.F. (2006). Exploring demographic, structural, and behavioral overlap among homicide offenders and victims. Homicide Studies, 10, 155–180.

    Article  Google Scholar 

  • Burgess-Proctor, A., Patchin, J. W., & Hinduja, S. (2010). Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. In V. Garcia & J. Clifford (Eds.). Female crime victims: Reality reconsidered (p. 162–176). Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  • Campbell, M. A. (2005). Cyber bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling, 15(1), 68–76.

    Article  Google Scholar 

  • Carter, D. (1995). Computer crime categories: How techno-criminals operate. FBI Law Enforcement Bulletin, 64(7), 21.

    Google Scholar 

  • Council of Europe. (2001). – Convention on Cybercrime. Retrieved from https://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf.

    Google Scholar 

  • Davis, R., & Hutchison, S. (1997). Computer crime in Canada. Toronto: Thomson Canada Limited.

    Google Scholar 

  • Deflem, M., & Shutt, J. E. (2006). Law enforcement and computer security threats and measures. In H. Bidgoli (Ed.), The handbook of information security, volume 2: information warfare; social, legal, and international issues; and security foundations (pp. 200–209). Hoboken, NJ: John Wiley & Sons.

    Google Scholar 

  • Desai, M., & Jaishankar, K. (2007). Cyber stalking victimization of girl students: an empirical study. Presentation in the Second International Conference on Victimology and Sixth Biennial Conference of the Indian Society of Victimology, Chennai, India 9–11, February, 2007.

    Google Scholar 

  • Eddy, N. (30th November, 2011). Cyber-crime victims often provide access unwittingly: report. Security. Retrieved from http://www.channelinsider.com/c/a/Security/Cybercrime-Victims-Often-Provide-Access-Unwittingly-Report-549746.

  • Erentaitė, R., Bergman, L. R. & Žukauskienė, R. (2012). Cross-contextual stability of bullying victimization: A person-oriented analysis of cyber and traditional bullying experiences among adolescents. Scandinavian Journal of Psychology, 53(2), 181–190.

    Article  Google Scholar 

  • European Commission (2001). Communication from the European Commission to the Council and the European Parliament 1.1, COM, 890 final, at 9 (Brussels, Jan. 26, 2001), Retrieved from http://europa.eu.int/ISPO/eif/InternetPoliciesSite/Crime/CrimeCommEN.html.

    Google Scholar 

  • Federal Bureau of Investigation (FBI) (2012). Nigerian Letter or “419” Fraud. Retrieved from https://www.fbi.gov/scams-and-safety/common-fraud-schemes/nigerian-letter-or-419-fraud

  • Financial Fraud Action UK (2011). East Londoners at greatest risk of falling for money laundering scam. Retrieved from http://www.financialfraudaction.org.uk/cms/assets/1/MoneyMulesRelease.pdf.

  • Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468–483.

    Article  Google Scholar 

  • Florêncio, D., & Herley, C. (2010). Phishing and money mules. Redmond, WA, USA: Microsoft Research, One Microsoft Way. Retrieved from http://research.microsoft.com/pubs/143095/mules.pdf

    Book  Google Scholar 

  • Goodman, M., & Brenner, S. (2002). The emerging consensus on criminal conduct in cyberspace. International Journal of Law and Information Technology, 10(2), 139–223. https://doi.org/10.1093/ijlit/10.2.139

    Article  Google Scholar 

  • Grabosky, P. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243–49.

    Article  Google Scholar 

  • Halder, D., & Jaishankar, K. (2008). Cyber crimes against women in India: Problems, perspectives and solutions. TMC Academy Journal, Singapore, 3(1), 48–62.

    Google Scholar 

  • Halder, D., & Jaishankar, K. (2009). Cyber socializing and victimization of women. Temida - The journal on victimization, human rights and gender, September 2009, 12(3), 5–26.

    Google Scholar 

  • Halder D., & Jaishankar, K. (2011). Cyber gender harassment and secondary victimization: a comparative analysis of US, UK and India. Victims and Offenders, 6(4), 386–398.

    Article  Google Scholar 

  • Halder, D., & Jaishankar. K. (2012) Cyber crime and victimization of women: Laws, rights, and regulations. Hershey, PA, USA: IGI Global.

    Google Scholar 

  • Halder, D., Jaishankar, K., Periyar, E., & Sivakumar, R. (2013). Cyber victimization in India: Preliminary study (pp. 115–136). In K. Jaishankar & N. Ronel (2013). (Eds.), Global criminology: Crime and victimization in the globalized era. Boca Raton, FL, USA: CRC Press, Taylor and Francis Group.

    Google Scholar 

  • Halder, D., & Jaishankar, K. (2015). Irrational coping theory and Positive Criminology: A frame work to protect victims of cyber crime. In N. Ronel and D. Segev (eds.), Positive Criminology (pp. 276–291). Abingdon, Oxon: Routledge. ISBN 978-0-415-74856-8.

    Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2005). Research summary: Cyberbullying victimization. Preliminary findings from an online survey of Internet-using adolescents. Retrieved from http://www.cyberbullying.us/cyberbullying_victimization.pdf.

    Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Violence, 6(3), 89–112.

    Article  Google Scholar 

  • Hinduja, S. & Patchin, J. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 1–29.

    Article  Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Sage Publications.

    Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2012). School climate 2.0: Preventing cyberbullying and sexting one classroom at a time. Thousand Oaks, CA: Sage Publications.

    Book  Google Scholar 

  • House of Commons, UK (2012). Malware and cyber crime. Twelfth report of session 2010–12. London, UK: House of Commons, Science and Technology Committee.

    Google Scholar 

  • IPWatchdog.com (2003). About cyber crime, IPWatchdog.com Web Site. Retrieved on from http://www.ipwatchdog.com/cybercrimes.html.

    Google Scholar 

  • Jaishankar K., (2008). Space transition theory of cyber crimes. In F. Schmallager, & M. Pittaro (Eds.), Crimes of the Internet (pp. 283–301). Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  • Jaishankar K., (2009a). Sexting: How do we protect the victim turned offender?, Presentation at the Workshop on “Victim Protection” in the International Conference on “Protecting Children from Sexual Offenders in the Information Technology Era” organized by the International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Programme (ISPAC), during December 11–13, 2009 at Courmeyeur, Mont Blanc, Italy.

    Google Scholar 

  • Jaishankar, K. (2009b). Sexting: A new form of victimless crime. International Journal of Cyber Criminology, 3(1), 21–25.

    Google Scholar 

  • Jaishankar, K. (2012). Victimization in the cyber space: Patterns and trends. In S. Manacorda (Ed.). Cybercriminality: Finding a balance between freedom and security (pp. 91–106). Milan, Italy: International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Programme (ISPAC). ISBN 978-88-96410-02-8

    Google Scholar 

  • Jaishankar, K. (2013). Cyber Victimization: New Typology and Novel Trends of Interpersonal attacks on the Internet. In Korean Institute of Criminology (Ed.). Information society and cybercrime: Challenges for criminology and criminal justice (pp. 31–47). Seoul, Korea: Korean Institute of Criminology. Research Report Series 13-B-01. ISBN 978-89-7366-002-5.

    Google Scholar 

  • Jaishankar, K. (2015).“Cybercrime victimization: New wine into old wineskins?”. Keynote Presentation at the 15th World Society of Victimology Symposium, organized by WSV, Victims Support Australia, Angelhands Inc. and Australian Institute of Criminology held during 5 – 9, July 2015, at Perth, Australia.

    Google Scholar 

  • Jaishankar, K., & Halder, D. (Forthcoming). Cyber victimology: Decoding cyber crimevictimization. New York: Routledge, Taylor and Francis Group. ISBN: 978-14-987848-9-4.

    Google Scholar 

  • Jennings, W. G., Higgins, G. E., Tewksbury, R., Gover, A. R., & Piquero, A. R. (2010). A Longitudinal assessment of the victim-offender overlap. Journal of Interpersonal Violence, 25, 2147–2174.

    Article  Google Scholar 

  • Jennings, W. G., Park, M., Tomsich, E. A., Gover, A. R., & Akers, R. L. (2011). Assessing the overlap in dating violence perpetration and victimization among South Korean college students: the influence of social learning and self-control. American Journal of Criminal Justice, 36(2), 188–206.

    Article  Google Scholar 

  • Jennings, W. G., Piquero, A. R., & Reingle, J. M. (2012). On the overlap between victimization and offending: A review of the literature. Aggression and Violent Behavior, 17(1), 16–26.

    Article  Google Scholar 

  • Jones, L. M., Mitchell, K. J., & Finkelhor, D. (2012). Trends in youth internet victimization: findings from three youth internet safety surveys 2000-2010. Journal of Adolescent Health, 50(2), 179–86.

    Article  Google Scholar 

  • Klevens, J., Duque, L. F., & Ramírez, C. (2002). The victim-offender overlap and routine activities: Results from a cross-sectional study in Bogotá, Columbia. Journal of Interpersonal Violence, 17, 206–216.

    Article  Google Scholar 

  • Kumar, A. R., & Jaishankar, K. (2007). Cyber bullying using mobile phones: A study on victimization and perpetration among school students. Presentation in the Second International Conference on Victimology and Sixth Biennial Conference of the Indian Society of Victimology, Chennai, India 9–11, February, 2007.

    Google Scholar 

  • Landoll, R. R. (2012). The new frontier of peer victimization: Prospective associations between adolescents’ on-line peer victimization and internalizing symptoms. Open Access Dissertations. Paper 820. Retrieved on 15th August 2013 from http://scholarlyrepository.miami.edu/oa_dissertations/820

  • Lastowka, F.G., & Hunter, D. (2004). Virtual crimes. New York Law School Law Review, 49, 293–316.

    Google Scholar 

  • Lauritsen, J. L., & Laub, J. H. (2007). Understanding the link between victimization and offending: New reflections on an old idea. Crime Prevention Studies, 22, 55–75.

    Google Scholar 

  • Li, Q. (2007). Bullying in the new playground: Research into cyberbullying and cyber victimisation. Australasian Journal of Educational Technology, 23(4), 435–454.

    Article  Google Scholar 

  • Limsamarnphun, N. (2011). Is your data safe and secure? Retrieved on 15 January 2012 fromhttp://www.nationmultimedia.com/new/opinion/Is-your-data-safe-and-secure-30166572.html

    Google Scholar 

  • Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26, 1103–1156.

    Google Scholar 

  • Mann, D., & Sutton, M. (1998). NetCrime. More change in the organisation of thieving. British Journal of Criminology, 38(2), 201–228.

    Article  Google Scholar 

  • Matt, S. M. (2004). Cybercrime: A comparative law analysis. Unpublished Dissertation submitted for the Degree of Magister Legum (LLM) at the University of South Africa. Retrieved from http://uir.unisa.ac.za/dspace/bitstream/10500/2056/4/02chapter2.pdf.

  • McAfee. (2011). A good decade for cybercrime: McAfee’s look back at ten years of cybercrime, report. Retrieved from http://www.mcafee.com/ca/resources/reports/rp-good-decade-for-cybercrime.pdf.

  • McQuade, S. (ed.), (2009). The Encyclopedia of Cybercrime. Westport, CT: Greenwood Press.

    Google Scholar 

  • Mustaine, E. E., & Tewksbury, R. (2000). Comparing the lifestyles of victims, offenders, and victim-offenders: A routine activity theory assessment of similarities and differences for criminal incident participants. Sociological Focus, 33, 339–362.

    Article  Google Scholar 

  • Nasar, J., Hecht, P., & Wener, R. (2007). ‘Call if you have trouble’: Mobile phones and safety among college students. International Journal of Urban and Regional Research, 31(4), 863–873.

    Article  Google Scholar 

  • Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773–793.

    Google Scholar 

  • Ngo F., Jaishankar, K., & Agustina, J. R. (2017). Sexting: Current research gaps and legislative issues. International Journal of Cyber Criminology, 11(2), 161–168.

    Google Scholar 

  • Norton (2011). Norton cybercrime report: The human impact. Retrieved from http://us.norton.com/theme.jsp?themeid=cybercrime_report.

  • Parker, D. (1999). Automated crime, information security. Retrieved from http://www.infosecuritymag.com/articles/1999/autocrime.shtml.

  • Parker, D. (2002). Automated crime, windowsecurity.com web site (Oct. 16, 2002), Retrieved from http://secinf.net/misc/Automated_Crime_.html.

  • Perreault, S. (2011). Self-reported Internet victimization in Canada, 2009. Statistics Canada, Ministry of Industry. Retrieved from http://www.statcan.gc.ca/pub/85-002-x/2011001/article/11530-eng.htm.

    Google Scholar 

  • Policy, Research & Media. (January 2012). Cutting them free: How is the UK progressing in protecting its children from sexual exploitation? Retrieved from http://www.barnardos.org.uk/cuttingthemfree.pdf.

  • Reyns, B. W., Burek, M. W., Henson, B., & Fisher, B. S. (2011). The unintended consequences of digital technology: exploring the relationship between sexting and cybervictimization. Journal of Crime and Justice. iFirst, doi: 10.1080/0735648X.2011.641816, Available online: 7 Dec 2011.

    Google Scholar 

  • Roberts, L. (2008). Cyber-victimisation in Australia: Extent, impact on individuals and responses. TILES Briefing Paper No. 6.

    Google Scholar 

  • Roberts, L. D. (2009). Cyber-Victimization. In R. Luppicini & R. Adell (Eds.), Handbook of research on technoethics (pp. 575–592). Hershey, PA, USA: IGI Global.

    Chapter  Google Scholar 

  • Rumgay, J. (2010). When victims become offenders: in search of coherence in policy and practice. Report of the Fawcett Society. Retrieved from http://www.fawcettsociety.org.uk/documents/When%20Victims%20Become%20Offenders%20Report%2014.12.04.pdf.

    Google Scholar 

  • Şahin, M., Aydin, B., & Sari, S. V. (2012). Cyber bullying, cyber victimization and psychological symptoms: A study in adolescents. Cukurova University Faculty of Education Journal, 41(1), 53–59.

    Google Scholar 

  • Sakellariou, T., Carroll, A., & Houghton, S. (2012). Rates of cyber victimization and bullying among male Australian primary and high school students. School Psychology International, 33, 533–549.

    Article  Google Scholar 

  • Schiller, E. M., & Gradinger, P. (2013). Combating Cyberbullying and Cybervictimization. Presentation on 15th April, 2013 at College of Education, University of Arizona.

    Google Scholar 

  • Shaffer, J. N. (2003). The victim-offender overlap: Specifying the role of peer groups. Unpublished Doctoral thesis submitted to the Pennsylvania State University, USA.

    Google Scholar 

  • Smith, R., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Statistics Canada (2002). Cyber-crime: issues, data sources and feasibility of collecting police-reported statistics. Ottawa: Canadian Centre for Justice Statistics.

    Google Scholar 

  • Suresh, P., & Paul, J. (2010). Management of banking and financial services. Pearson: New Delhi.

    Google Scholar 

  • Thomas, D., & Loader, B. (2000). Cybercrime in the information age. In: D. Thomas and B. Loader, (eds.). Cybercrime: Law Enforcement, Security and Surveillance in the Information Age (pp. 1–14). London: Routledge.

    Google Scholar 

  • Umarhathab, S., Rao, G. D. R., & Jaishankar, K. (2009). Cyber crimes in India: a study of emerging patterns of perpetration and victimization in Chennai city. Pakistan Journal of Criminology, 1(1), 51–66.

    Google Scholar 

  • Wall, D. S. (1999). Cybercrimes: new wine, no bottles? In P. Davies, P. Francis & V. Jupp (eds.), Invisible crimes: their victims and their regulation (pp. 105–39). London: Macmillan,

    Chapter  Google Scholar 

  • Wall, D. S. (2001). Cyber crimes and the internet. In D. Wall (ed.) Crime and the internet (pp. 1–17). London: Routledge.

    Google Scholar 

  • Wall, D. S. (2005). The internet as a conduit for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 78–94). Thousand Oaks, CA: Sage Publications.

    Google Scholar 

  • Wall, D. S. (2008). Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information Communication and Society, 11(6), 861–884.

    Article  Google Scholar 

  • Wall, D. S. (2010). Cyber crimes. Class notes, masters course in criminology and law. School of Law, University of Leeds. On personal communication.

    Google Scholar 

  • WHOA. (2010). Cyber stalking statistics. Retrieved from http://www.haltabuse.org/resources/stats/2010stats.pdf.

  • Wolak, J. Mitchell, K. J., & Finkelhor, D. (2006). Online victimization of youth: 5 years later. Alexandria, VA: National Center for Missing & Exploited Children.

    Google Scholar 

  • Wolak, J., Finkelhor, D., Mitchell, K., & Ybarra, M. (2008). Online “predators” and their victims: myths, realities, and implications for prevention and treatment. American Psychologist, 63, 111–128.

    Article  Google Scholar 

  • Yar, M. (2005). The novelty of ‘cyber crime’: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427:

    Article  Google Scholar 

  • Yar, M. (2006). Cybercrime and Society. London: Sage Publications.

    Book  Google Scholar 

  • Yar, M. (2010). The private policing of internet crime. In Y. Jewkes & M. Yar. (Eds.), Handbook of internet crime (pp. 546–561). Cullompton: Willan Publishers.

    Google Scholar 

  • Yar, M. (2012) E-Crime 2.0: the criminological landscape of new social media. Information & Communications Technology Law, 21(3), 207–219. https://doi.org/10.1080/13600834.2012.744224

    Article  Google Scholar 

Download references

Acknowledgement

I sincerely thank Prof. Dr. Debarati Halder for her inputs and constructive criticisms that greatly enhanced the quality of this chapter.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jaishankar, K. (2020). Cyber Victimology: A New Sub-Discipline of the Twenty-First Century Victimology. In: Joseph, J., Jergenson, S. (eds) An International Perspective on Contemporary Developments in Victimology. Springer, Cham. https://doi.org/10.1007/978-3-030-41622-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41622-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41621-8

  • Online ISBN: 978-3-030-41622-5

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics