Abstract
As technology has become an ever-present facet in the lives of young people, they have become reliant on it to form and maintain relationships. It has also helped facilitate negative relationship behaviors, such as the monitoring of romantic partners without their permission (aka cyberstalking). The purpose of this study is to investigate theoretical predictors of cyberstalking in a sample of university students by applying General Theory of Crime and Social Learning Theory. Results indicated that low selfcontrol and deviant peer association are significant predictors of cyberstalking, specifically attempting to log-in to a person’s social media, as well as social media presence and sex.
Similar content being viewed by others
Notes
We recognize the limitations of using a single item indicator. We liken our measurement to others that have examined different forms of hacking (Marcum et al., 2016); thus, we felt justified in our use of this measure.
Because the dependent measure is captured using an ordinal scale, we attempted to perform plum analysis on the data. We obtained substantively the same results. These results are available from the third author on request.
An attempt was made in these data to address these hypotheses. The attempt was not successful. These results are available upon request.
References
Akers, R. L. (1998). Social learning and social structure: A general theory of crime and deviance. Boston: Northeastern University Press.
Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking victimization in the United States. Washington, DC: US Department of Justice. Retrived from http://www.victimsofcrime.org/docs/src/baum-k-catalano-s-rand-m-rose-k-2009.pdf?sfvrsn=0.
Bennet, D., Guran, E., Ramos, M., & Margolin, G. (2011). College students’ electronic vitimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors. Violence and Victims, 4, 410–429.
Blais, J., Craig, W., Pepler, D., & Connolly, J. (2008). Adolescents online: The importance of internet activity choices to salient relationships. Journal of Youth and Adolescence, 37(5), 522–536. doi:10.1007/s10964-007-9262-7.
Bocij, P., & McFarlane, L. (2003). Cyberstalking: The technology of hate. The Police Journal, 76, 204–221.
Borrajo, E., Gamez-Guadix, M., Prereda, N., & Calvete, E. (2015). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358–365. doi:10.1016/j.chb.2015.01.063.
Bossler, A. M., & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38, 227–236.
Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 38–67). Hershey: IGI Global.
Bossler, A., Holt, T., & May, D. (2012). Predicting online harassment victmization among a juvenile population. Youth & Society, 44(4), 500–523.
Burke, S. C., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: an exploratory study of college undergraduates. Computers in Human Behavior, 27, 1162–1167.
Carpenter, C., & Spottswood, E. (2013). Exploring romantic relationships on social networking sites using the self-expansion model. Computers in Human Behavior, 29, 1531–1537. doi:10.1016/j.chb.2013.01.021.
Caughlin, J., & Sharabi, L. (2013). A communicative interdependence perspective of close relationships: The connections between mediated and unmediated interactions matter. Journal of Communication, 63(5), 873–893.
Chapple, C. L. (2005). Self-control, peer relations, and delinquency. Justice Quarterly, 22, 89–106.
Chaulk, K., & Jones, T. (2011). Online obsessive relational intrusion: Further concerns about Facebook. Journal of Family Violence, 26, 245–254.
Corporate Alliance to End Partner Violence. (2016). Stalking. Retrieved from http://www.caepv.org/getinfo/facts_stats.php?factsec=9.
Cox, C. (2014). Protecting victims of cyberstalking, cyberharassment, and online impersonation through prosecutions and effective laws. The Journal of Law, Science & Technology, 54(3), 277–302.
Dillman, D. (2007). Mail and internet surveys: A tailored design method. Hoboken: Wiley.
Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior and Social Networking, 17(2), 61–67.
Duggan, M. (2015). Mobile messaging and social media 2015. PewResearchCenter: Internet, Science, & Tech. Retrieved from http://www.pewinternet.org/2015/08/19/mobile-messaging-and-social-media-2015/.
Elphinston, R., & Noller, P. (2011). Time to face it! Facebook intrusion and implication for romantic jealousy and relationship satisfaction. Cyberpsychology, Behavior and Social Networking, 17, 3–7.
Facebook (2016). Facebook Newsroom. Retrieved from http://newsroom.fb.com/company-info/.
Fisher, B. S., Cullen, F. T., & Turner, M. G. (2002). Being pursued: Stalking victimization in a national study of college women. Criminology & Public Policy, 1(2), 257–308.
Fox, J., & Warber, K. (2013). Romantic relationship development in the age of Facebook: An exploratory study of emerging adults’ perceptions, motives, and behavior. Cyberpsychology, Behavior and Social Networking, 16, 3–7. doi:10.10189/cyber.2012.0288.
Gibbs, J. J., & Giever, D. (1995). Self-control and its manifestations among university students: An empirical test of Gottfredson and Hirschi’s general theory. Justice Quarterly, 12(2), 231–255.
Gibbs, J. J., Giever, D., & Higgins, G. E. (2003). A test of Gottfredson and Hirschi’s general theory using structural equation modeling. Criminal Justice and Behavior, 30(4), 441–458.
Gibbs, J. J., Giever, D., & Martin, J. S. (1998). Parental-management and self-control: An empirical test of Gottfredson and Hirschi’s general theory. Journal of Research in Crime and Delinquency, 35(1), 42–72.
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford: Stanford University Press.
Grasmick, H. G., Tittle, C. R., Bursik Jr., R. J., & Arneklev, B. J. (1993). Testing the core empirical implications of Gottfredson and Hirschi’s general theory of crime. Journal of Research in Crime and Delinquency, 30(1), 5–29.
Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25, 339–357.
Higgins, G., & Marcum, C. D. (2011). Digital piracy: An integrated theoretical approach. Durham: Carolina Academic Press.
Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29, 440–460.
Hinduja, S., & Ingram, J. R. (2008). Self-control and ethical beliefs on the social learning of intellectual property theft. Western Criminology Review, 9, 52–72.
Hinduja, S. & Patchin, J. (2011). Electronic dating violence: A brief for educators and parents. Cyberbullying Research Center. Retrieved from http://www.cyberbullying.us/.
Hirschi, T. (2004). Self-control and crime. In R. F. Baumeister & K. D. Vohs (Eds.), Handbook of selfregulation: Research, theory and applications. New York: Guilford Press.
Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1–25.
Jennings, W. G., Higgins, G. E., Akers, R. L., Khey, D. N., & DoBrow, J. (2013). Examining the influence of delinquent peer associations on the stability of self-control in late childhood and early adolescence. Deviant Behavior, 34, 407–422.
Kellerman, I., Margolin, G., Borofsky, L., Baucom, B., & Iturralde, E. (2013). Electronic aggression among emerging adults: Motivations and contextual factors. Emerging Adulthood, 1(4), 293–304.
Kubrin, C. E., Stucky, T. D., & Krohn, M. D. (2009). Researching theories of crime and deviance. New York: Oxford University Press.
Longshore, D., Chang, E., Hsieh, S., & Messina, N. (2004). Self-control and social bonds: A combined control perspective on deviance. Crime & Delinquency, 50, 542–564.
Lyndon, A., Bonds-Raacke, J., & Cratty, A. (2011). College students’ Facebook stalking of ex-partners. Cyberpsychology, Behavior and Social Networking, 13, 263–268.
Marcum, C. D., Higgins, G. E., & Poff, B. A. (2016). Exploratory investigation on theoretical predictors of the electronic leash. Computers in Human Behavior. doi:10.1016/j.chb.2016.03.010.
Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014b). Sexting behaviors among adolescents in rural North Carolina: A theoretical examination of low self-control and deviant peer association. International Journal of Cyber Criminology, 8(2), 68–78.
Marcum, C., Higgins, G., Wolfe, S., & Ricketts, M. (2014a). Becoming someone new: Identity theft behaviors by high school students. Journal of Financial Crime, 22(3), 318–328.
Marshall, T. (2012). Facebook surveillance of former romantic partners: Associations with post breakup recovery and personal growth. Cyberpsychology, Behavior and Social Networking, 15, 521–526.
National Conference of State Legislatures. (2012a). Cyberbullying. Retrieved June 19, 2012, from http://www.ncsl.org/issues-research/educ/cyberbullying.aspx.
National Conference of State Legislatures. (2012b). State Cyberstalking and Cyberharassment Laws. Retrieved June 19, 2012 from http://www.ncsl.org/issues-research/telecom/cyberstalking-and-cyberharassment-laws.aspx.
Papacharissi, Z. (2011). A networked self: Identity, community, and culture on social network sites. New York: Routledge.
Papp, L., Danielewicz, J., & Cayemberg, C. (2013). Are we Facebook official? Implications of dating partners’ Facebook use and profiles for intimates relationships satisfaction. Cyberpsychology, Behavior and Social Networking, 15, 85–90. doi:10.10189/cyber.2011.0291.
Perrin, A. (2015a). Social media usage: 2005–2015. PewResearchCenter: Internet, Science & Tech. Retrieved from http://www.pewinternet.org/2015/10/08/social-networking-usage-2005-2015/.
Perrin, A. (2015b). Social media usage: 2005–2015. PewResearchCenter: Internet, Science & Tech. Retrieved from http://www.pewinternet.org/2015/10/08/social-networking-usage-2005-2015/.
PEW. (2013). Teens and Technology 2012. Report of the PEW Research Internet ‘Project. Retrieved from www.pewinternet.org/2013/03/13/teens-and-technology-2013.
Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: a meta-analysis. Criminology, 38(3), 931–964.
Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25.
Sheridan, L. P., & Grant, T. (2007). Is cyberstalking different? Psychology, Crime & Law, 13(6), 627–640.
Shimizu, A. (2013). Domestic violence in the digital age: Towards the creation of a comprehensive cyberstalking statute. Berkeley Journal of Gender, Law & Justice, 28(1), 116–137.
Shorey, R. C., Stuart, G. L., & Cornelius, T. L. (2011). Dating violence and substance use in college students: a review of the literature. Aggression and Violent Behavior, 16(6), 541–550.
Shorey, R., Sherman, A., Kivisto, A., Elkins, S., Rhatigan, D., & Moore, T. (2011). Gender differences in depression and anxiety among victims of initmate partner violence: the moderating effect of shame-proneness. Journal of Interpersonal Violence, 26, 1834–1850. doi:10.1177/0886260510372949.
Sutherland, E. (1939). Priniciples of criminology (3rd ed.). Philadelphia: Lippincott.
Tibbets, S. G. (2012). Criminological theory: The essentials. Thousand Oaks: Sage Publications.
Tokunaga, R., & Gustafson, A. (2014). Seeking interpersonal information over the Internet: An application of the theory of motivated information management to internet use. Journal of Social and Personal Relationships, 31, 1019–1039.
Torres, C., Robles, J., & DeMarco, S. (2013). El ciberacoso como format de ejercer la violencia de genero en la juventud. Un riesgo en la sociedad de la informacion y el conocimiento. Ministerio de Sanidad, Servicios Sociales e Igualdad 10.
Trepte, S., & Reinecke, L. (2013). The reciprocal effects of social network site use and the disposition for self-disclosure: A longitudinal study. Computers in Human Behavior, 29, 1102–1112. doi:10.1016/j.chb.2012.10.002.
Wolfe, S. E., & Higgins, G. E. (2009). Explaining deviant peer associations: an examination of low self-control, ethical predispositions, definitions, and digital piracy. Western Criminology Review, 10(1), 43–55.
Zweig, J., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 1–15.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Marcum, C.D., Higgins, G.E. & Nicholson, J. I’m Watching You: Cyberstalking Behaviors of University Students in Romantic Relationships. Am J Crim Just 42, 373–388 (2017). https://doi.org/10.1007/s12103-016-9358-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12103-016-9358-2