Abstract
Notably, some scholars do not perceive cyber crime victimization as a new form of victimization and some do not holistically group them. Invariably, many countries are dealing with cyber crime victimization through their conventional laws, without creating specific laws. These kinds of new issues have paved way to study the cyber victimization from different perspectives. I emphasize the need to have a sub-discipline of Victimology i.e., Cyber Victimology to examine cyber crimes purely from victims’ /victimization perspective, as I believe cyber crime victimization is a new form of victimization. This chapter will dwell on the establishment of the new field of Victimology, which is referred to as Cyber Victimology.
Some parts of this chapter are derived from earlier publications of the author: Jaishankar, K. (2012). Victimization in the Cyber Space: Patterns and Trends. In S. Manacorda (Ed.). Cybercriminality: Finding a balance between freedom and security (pp. 91–106). Milan, Italy: International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Programme (ISPAC). ISBN 978-88-96410-02-8 Jaishankar, K. (2013). Cyber Victimization: New Typology and Novel Trends of Interpersonal attacks on the Internet. In Korean Institute of Criminology (Ed.). Information Society and Cybercrime: Challenges for Criminology and Criminal Justice (pp. 31–47). Seoul, Korea: Korean Institute of Criminology. Research Report Series 13-B-01.ISBN 978-89-7366-002-5. Reproduced with permission.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alshalan, A. (2006). Cyber-crime fear and victimization: An analysis of a national survey. PhD Dissertation submitted to Mississippi State University.
Arena, K. (2001). U.S. targets porn site’s customers, CNN.com web site (Aug. 8, 2001), Retrieved from http://www.cnn.com/2001/LAW/08/08/ashcroft.childporn.
Brenner, S. (2004). Toward a criminal law for cyberspace: Distributed security. Boston University Journal of Science & Technology Law, 10(2), 1–105.
Briggs, F. (2003). From victim to offender: How child sexual abuse victims become offenders. NSW, Australia: Allen & Unwin.
Broidy, L. M., Daday, J. K., Crandall, C. S., Sklar, D. P., & Jost, P.F. (2006). Exploring demographic, structural, and behavioral overlap among homicide offenders and victims. Homicide Studies, 10, 155–180.
Burgess-Proctor, A., Patchin, J. W., & Hinduja, S. (2010). Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. In V. Garcia & J. Clifford (Eds.). Female crime victims: Reality reconsidered (p. 162–176). Upper Saddle River, NJ: Prentice Hall.
Campbell, M. A. (2005). Cyber bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling, 15(1), 68–76.
Carter, D. (1995). Computer crime categories: How techno-criminals operate. FBI Law Enforcement Bulletin, 64(7), 21.
Council of Europe. (2001). – Convention on Cybercrime. Retrieved from https://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf.
Davis, R., & Hutchison, S. (1997). Computer crime in Canada. Toronto: Thomson Canada Limited.
Deflem, M., & Shutt, J. E. (2006). Law enforcement and computer security threats and measures. In H. Bidgoli (Ed.), The handbook of information security, volume 2: information warfare; social, legal, and international issues; and security foundations (pp. 200–209). Hoboken, NJ: John Wiley & Sons.
Desai, M., & Jaishankar, K. (2007). Cyber stalking victimization of girl students: an empirical study. Presentation in the Second International Conference on Victimology and Sixth Biennial Conference of the Indian Society of Victimology, Chennai, India 9–11, February, 2007.
Eddy, N. (30th November, 2011). Cyber-crime victims often provide access unwittingly: report. Security. Retrieved from http://www.channelinsider.com/c/a/Security/Cybercrime-Victims-Often-Provide-Access-Unwittingly-Report-549746.
Erentaitė, R., Bergman, L. R. & Žukauskienė, R. (2012). Cross-contextual stability of bullying victimization: A person-oriented analysis of cyber and traditional bullying experiences among adolescents. Scandinavian Journal of Psychology, 53(2), 181–190.
European Commission (2001). Communication from the European Commission to the Council and the European Parliament 1.1, COM, 890 final, at 9 (Brussels, Jan. 26, 2001), Retrieved from http://europa.eu.int/ISPO/eif/InternetPoliciesSite/Crime/CrimeCommEN.html.
Federal Bureau of Investigation (FBI) (2012). Nigerian Letter or “419” Fraud. Retrieved from https://www.fbi.gov/scams-and-safety/common-fraud-schemes/nigerian-letter-or-419-fraud
Financial Fraud Action UK (2011). East Londoners at greatest risk of falling for money laundering scam. Retrieved from http://www.financialfraudaction.org.uk/cms/assets/1/MoneyMulesRelease.pdf.
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468–483.
Florêncio, D., & Herley, C. (2010). Phishing and money mules. Redmond, WA, USA: Microsoft Research, One Microsoft Way. Retrieved from http://research.microsoft.com/pubs/143095/mules.pdf
Goodman, M., & Brenner, S. (2002). The emerging consensus on criminal conduct in cyberspace. International Journal of Law and Information Technology, 10(2), 139–223. https://doi.org/10.1093/ijlit/10.2.139
Grabosky, P. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243–49.
Halder, D., & Jaishankar, K. (2008). Cyber crimes against women in India: Problems, perspectives and solutions. TMC Academy Journal, Singapore, 3(1), 48–62.
Halder, D., & Jaishankar, K. (2009). Cyber socializing and victimization of women. Temida - The journal on victimization, human rights and gender, September 2009, 12(3), 5–26.
Halder D., & Jaishankar, K. (2011). Cyber gender harassment and secondary victimization: a comparative analysis of US, UK and India. Victims and Offenders, 6(4), 386–398.
Halder, D., & Jaishankar. K. (2012) Cyber crime and victimization of women: Laws, rights, and regulations. Hershey, PA, USA: IGI Global.
Halder, D., Jaishankar, K., Periyar, E., & Sivakumar, R. (2013). Cyber victimization in India: Preliminary study (pp. 115–136). In K. Jaishankar & N. Ronel (2013). (Eds.), Global criminology: Crime and victimization in the globalized era. Boca Raton, FL, USA: CRC Press, Taylor and Francis Group.
Halder, D., & Jaishankar, K. (2015). Irrational coping theory and Positive Criminology: A frame work to protect victims of cyber crime. In N. Ronel and D. Segev (eds.), Positive Criminology (pp. 276–291). Abingdon, Oxon: Routledge. ISBN 978-0-415-74856-8.
Hinduja, S., & Patchin, J. W. (2005). Research summary: Cyberbullying victimization. Preliminary findings from an online survey of Internet-using adolescents. Retrieved from http://www.cyberbullying.us/cyberbullying_victimization.pdf.
Hinduja, S., & Patchin, J. W. (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Violence, 6(3), 89–112.
Hinduja, S. & Patchin, J. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 1–29.
Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Sage Publications.
Hinduja, S., & Patchin, J. W. (2012). School climate 2.0: Preventing cyberbullying and sexting one classroom at a time. Thousand Oaks, CA: Sage Publications.
House of Commons, UK (2012). Malware and cyber crime. Twelfth report of session 2010–12. London, UK: House of Commons, Science and Technology Committee.
IPWatchdog.com (2003). About cyber crime, IPWatchdog.com Web Site. Retrieved on from http://www.ipwatchdog.com/cybercrimes.html.
Jaishankar K., (2008). Space transition theory of cyber crimes. In F. Schmallager, & M. Pittaro (Eds.), Crimes of the Internet (pp. 283–301). Upper Saddle River, NJ: Prentice Hall.
Jaishankar K., (2009a). Sexting: How do we protect the victim turned offender?, Presentation at the Workshop on “Victim Protection” in the International Conference on “Protecting Children from Sexual Offenders in the Information Technology Era” organized by the International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Programme (ISPAC), during December 11–13, 2009 at Courmeyeur, Mont Blanc, Italy.
Jaishankar, K. (2009b). Sexting: A new form of victimless crime. International Journal of Cyber Criminology, 3(1), 21–25.
Jaishankar, K. (2012). Victimization in the cyber space: Patterns and trends. In S. Manacorda (Ed.). Cybercriminality: Finding a balance between freedom and security (pp. 91–106). Milan, Italy: International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Programme (ISPAC). ISBN 978-88-96410-02-8
Jaishankar, K. (2013). Cyber Victimization: New Typology and Novel Trends of Interpersonal attacks on the Internet. In Korean Institute of Criminology (Ed.). Information society and cybercrime: Challenges for criminology and criminal justice (pp. 31–47). Seoul, Korea: Korean Institute of Criminology. Research Report Series 13-B-01. ISBN 978-89-7366-002-5.
Jaishankar, K. (2015).“Cybercrime victimization: New wine into old wineskins?”. Keynote Presentation at the 15th World Society of Victimology Symposium, organized by WSV, Victims Support Australia, Angelhands Inc. and Australian Institute of Criminology held during 5 – 9, July 2015, at Perth, Australia.
Jaishankar, K., & Halder, D. (Forthcoming). Cyber victimology: Decoding cyber crimevictimization. New York: Routledge, Taylor and Francis Group. ISBN: 978-14-987848-9-4.
Jennings, W. G., Higgins, G. E., Tewksbury, R., Gover, A. R., & Piquero, A. R. (2010). A Longitudinal assessment of the victim-offender overlap. Journal of Interpersonal Violence, 25, 2147–2174.
Jennings, W. G., Park, M., Tomsich, E. A., Gover, A. R., & Akers, R. L. (2011). Assessing the overlap in dating violence perpetration and victimization among South Korean college students: the influence of social learning and self-control. American Journal of Criminal Justice, 36(2), 188–206.
Jennings, W. G., Piquero, A. R., & Reingle, J. M. (2012). On the overlap between victimization and offending: A review of the literature. Aggression and Violent Behavior, 17(1), 16–26.
Jones, L. M., Mitchell, K. J., & Finkelhor, D. (2012). Trends in youth internet victimization: findings from three youth internet safety surveys 2000-2010. Journal of Adolescent Health, 50(2), 179–86.
Klevens, J., Duque, L. F., & Ramírez, C. (2002). The victim-offender overlap and routine activities: Results from a cross-sectional study in Bogotá, Columbia. Journal of Interpersonal Violence, 17, 206–216.
Kumar, A. R., & Jaishankar, K. (2007). Cyber bullying using mobile phones: A study on victimization and perpetration among school students. Presentation in the Second International Conference on Victimology and Sixth Biennial Conference of the Indian Society of Victimology, Chennai, India 9–11, February, 2007.
Landoll, R. R. (2012). The new frontier of peer victimization: Prospective associations between adolescents’ on-line peer victimization and internalizing symptoms. Open Access Dissertations. Paper 820. Retrieved on 15th August 2013 from http://scholarlyrepository.miami.edu/oa_dissertations/820
Lastowka, F.G., & Hunter, D. (2004). Virtual crimes. New York Law School Law Review, 49, 293–316.
Lauritsen, J. L., & Laub, J. H. (2007). Understanding the link between victimization and offending: New reflections on an old idea. Crime Prevention Studies, 22, 55–75.
Li, Q. (2007). Bullying in the new playground: Research into cyberbullying and cyber victimisation. Australasian Journal of Educational Technology, 23(4), 435–454.
Limsamarnphun, N. (2011). Is your data safe and secure? Retrieved on 15 January 2012 fromhttp://www.nationmultimedia.com/new/opinion/Is-your-data-safe-and-secure-30166572.html
Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26, 1103–1156.
Mann, D., & Sutton, M. (1998). NetCrime. More change in the organisation of thieving. British Journal of Criminology, 38(2), 201–228.
Matt, S. M. (2004). Cybercrime: A comparative law analysis. Unpublished Dissertation submitted for the Degree of Magister Legum (LLM) at the University of South Africa. Retrieved from http://uir.unisa.ac.za/dspace/bitstream/10500/2056/4/02chapter2.pdf.
McAfee. (2011). A good decade for cybercrime: McAfee’s look back at ten years of cybercrime, report. Retrieved from http://www.mcafee.com/ca/resources/reports/rp-good-decade-for-cybercrime.pdf.
McQuade, S. (ed.), (2009). The Encyclopedia of Cybercrime. Westport, CT: Greenwood Press.
Mustaine, E. E., & Tewksbury, R. (2000). Comparing the lifestyles of victims, offenders, and victim-offenders: A routine activity theory assessment of similarities and differences for criminal incident participants. Sociological Focus, 33, 339–362.
Nasar, J., Hecht, P., & Wener, R. (2007). ‘Call if you have trouble’: Mobile phones and safety among college students. International Journal of Urban and Regional Research, 31(4), 863–873.
Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773–793.
Ngo F., Jaishankar, K., & Agustina, J. R. (2017). Sexting: Current research gaps and legislative issues. International Journal of Cyber Criminology, 11(2), 161–168.
Norton (2011). Norton cybercrime report: The human impact. Retrieved from http://us.norton.com/theme.jsp?themeid=cybercrime_report.
Parker, D. (1999). Automated crime, information security. Retrieved from http://www.infosecuritymag.com/articles/1999/autocrime.shtml.
Parker, D. (2002). Automated crime, windowsecurity.com web site (Oct. 16, 2002), Retrieved from http://secinf.net/misc/Automated_Crime_.html.
Perreault, S. (2011). Self-reported Internet victimization in Canada, 2009. Statistics Canada, Ministry of Industry. Retrieved from http://www.statcan.gc.ca/pub/85-002-x/2011001/article/11530-eng.htm.
Policy, Research & Media. (January 2012). Cutting them free: How is the UK progressing in protecting its children from sexual exploitation? Retrieved from http://www.barnardos.org.uk/cuttingthemfree.pdf.
Reyns, B. W., Burek, M. W., Henson, B., & Fisher, B. S. (2011). The unintended consequences of digital technology: exploring the relationship between sexting and cybervictimization. Journal of Crime and Justice. iFirst, doi: 10.1080/0735648X.2011.641816, Available online: 7 Dec 2011.
Roberts, L. (2008). Cyber-victimisation in Australia: Extent, impact on individuals and responses. TILES Briefing Paper No. 6.
Roberts, L. D. (2009). Cyber-Victimization. In R. Luppicini & R. Adell (Eds.), Handbook of research on technoethics (pp. 575–592). Hershey, PA, USA: IGI Global.
Rumgay, J. (2010). When victims become offenders: in search of coherence in policy and practice. Report of the Fawcett Society. Retrieved from http://www.fawcettsociety.org.uk/documents/When%20Victims%20Become%20Offenders%20Report%2014.12.04.pdf.
Şahin, M., Aydin, B., & Sari, S. V. (2012). Cyber bullying, cyber victimization and psychological symptoms: A study in adolescents. Cukurova University Faculty of Education Journal, 41(1), 53–59.
Sakellariou, T., Carroll, A., & Houghton, S. (2012). Rates of cyber victimization and bullying among male Australian primary and high school students. School Psychology International, 33, 533–549.
Schiller, E. M., & Gradinger, P. (2013). Combating Cyberbullying and Cybervictimization. Presentation on 15th April, 2013 at College of Education, University of Arizona.
Shaffer, J. N. (2003). The victim-offender overlap: Specifying the role of peer groups. Unpublished Doctoral thesis submitted to the Pennsylvania State University, USA.
Smith, R., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial. Cambridge: Cambridge University Press.
Statistics Canada (2002). Cyber-crime: issues, data sources and feasibility of collecting police-reported statistics. Ottawa: Canadian Centre for Justice Statistics.
Suresh, P., & Paul, J. (2010). Management of banking and financial services. Pearson: New Delhi.
Thomas, D., & Loader, B. (2000). Cybercrime in the information age. In: D. Thomas and B. Loader, (eds.). Cybercrime: Law Enforcement, Security and Surveillance in the Information Age (pp. 1–14). London: Routledge.
Umarhathab, S., Rao, G. D. R., & Jaishankar, K. (2009). Cyber crimes in India: a study of emerging patterns of perpetration and victimization in Chennai city. Pakistan Journal of Criminology, 1(1), 51–66.
Wall, D. S. (1999). Cybercrimes: new wine, no bottles? In P. Davies, P. Francis & V. Jupp (eds.), Invisible crimes: their victims and their regulation (pp. 105–39). London: Macmillan,
Wall, D. S. (2001). Cyber crimes and the internet. In D. Wall (ed.) Crime and the internet (pp. 1–17). London: Routledge.
Wall, D. S. (2005). The internet as a conduit for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 78–94). Thousand Oaks, CA: Sage Publications.
Wall, D. S. (2008). Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information Communication and Society, 11(6), 861–884.
Wall, D. S. (2010). Cyber crimes. Class notes, masters course in criminology and law. School of Law, University of Leeds. On personal communication.
WHOA. (2010). Cyber stalking statistics. Retrieved from http://www.haltabuse.org/resources/stats/2010stats.pdf.
Wolak, J. Mitchell, K. J., & Finkelhor, D. (2006). Online victimization of youth: 5 years later. Alexandria, VA: National Center for Missing & Exploited Children.
Wolak, J., Finkelhor, D., Mitchell, K., & Ybarra, M. (2008). Online “predators” and their victims: myths, realities, and implications for prevention and treatment. American Psychologist, 63, 111–128.
Yar, M. (2005). The novelty of ‘cyber crime’: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427:
Yar, M. (2006). Cybercrime and Society. London: Sage Publications.
Yar, M. (2010). The private policing of internet crime. In Y. Jewkes & M. Yar. (Eds.), Handbook of internet crime (pp. 546–561). Cullompton: Willan Publishers.
Yar, M. (2012) E-Crime 2.0: the criminological landscape of new social media. Information & Communications Technology Law, 21(3), 207–219. https://doi.org/10.1080/13600834.2012.744224
Acknowledgement
I sincerely thank Prof. Dr. Debarati Halder for her inputs and constructive criticisms that greatly enhanced the quality of this chapter.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jaishankar, K. (2020). Cyber Victimology: A New Sub-Discipline of the Twenty-First Century Victimology. In: Joseph, J., Jergenson, S. (eds) An International Perspective on Contemporary Developments in Victimology. Springer, Cham. https://doi.org/10.1007/978-3-030-41622-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-41622-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-41621-8
Online ISBN: 978-3-030-41622-5
eBook Packages: Law and CriminologyLaw and Criminology (R0)