Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3122
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
This article introduces and applies an integrative model of cyberharassment victimization. The model combines routine activity theory (RAT), the general theory of crime (GTC), and the personal resources approach to analyze risk factors for victimization while acknowledging the protective role of a sense of mastery. Survey respondents were aged 15 to 25 years ( = 4816) from the U.S., Finland, Spain, and South Korea. Logistic regression models were used to analyze cyberharassment victimization. RAT-related factors were positively associated with cyberharassment victimization. Low self-control was positively associated with cyberharassment victimization in the U.S., Finland, and Spain but not in South Korea. The sense of mastery was negatively associated with cyberharassment victimization in the U.S., Finland, and South Korea but not in Spain. Protective factors against cyberharassment victimization should be utilized in future studies as adequate knowledge of protective factors could assist policymakers in generating preventative measures against cyberharassment. Our study demonstrates the benefits of integrating criminological theories and protective factors in studies using cross-national data to gain a better understanding of the dynamics of cyberharassment.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9566085 | PMC |
http://dx.doi.org/10.3390/ijerph191912138 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!