The Anti-Social Network: Cyberstalking Victimization among College Students

By Bradford W. Reyns | Go to book overview

CHAPTER 5
The Extent and Nature of
Cyberstalking Victimization

RESULTS

This chapter presents three sets of results. First, the extent of cyberstalking victimization among members of the sample is reported. Lifetime prevalence of victimization and the characteristics of victims are reported for each type of cyberstalking victimization, identity fraud victimization, and the composite cyberstalking victimization measure. Second, bivariate analyses and results are briefly discussed. Correlations between the independent and dependent variables were initially calculated to explore the nature of these relationships and to inform the multivariate analyses. Third, binary logistic regression models that estimate the effects of the independent variables – online lifestyle-routine activities, online delinquency, and low self-control – on each of the dependent variables are presented and discussed. The dependent variables in question are: unwanted contact, harassment, unwanted sexual advances, threats of violence, identity fraud, and overall cyberstalking victimization.


EXTENT OF VICTIMIZATION

Lifetime Prevalence of Victimization by Types of Pursuit

Figure 5.1 illustrates the lifetime prevalence of cyberstalking victimization across the four types of pursuit behaviors (i.e., contact, harassment, sexual advances, violent threats), identity fraud, and overall cyberstalking. Among sample members, the prevalence of cyberstalking victimization was 40.8% (N = 397).

-81-

Notes for this page

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items
Notes
Cite this page

Cited page

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA 8, MLA 7, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Note: primary sources have slightly different requirements for citation. Please see these guidelines for more information.

Cited page

Bookmark this page
The Anti-Social Network: Cyberstalking Victimization among College Students
Table of contents

Table of contents

Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this book

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen
Items saved from this book
  • Bookmarks
  • Highlights & Notes
  • Citations
/ 196

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA 8, MLA 7, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Search by... Author
    Show... All Results Primary Sources Peer-reviewed

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.