Information Society and Emerging Crimes: A Sociological Attempt to Explain Cyberstalking Victims in Tehran

Document Type : Research Paper

Authors

1 Professor of Sociology, Faculty of Social Sciences, University of Tehran

2 Ph.D. in Sociology, University of TehranMember of the faculty of the Ministry of Science, Research and Technology

Abstract

The development of information society has led to many other developments, including the expansion of cyberspace and the emergence of new types of cybercrime deviations and crimes. One of these large-scale offenses is Cyberstalking. Official agencies and institutions do not provide accurate data on this type of crime. Also, due to the value system of the country, many of these types of crimes are not reported to the relevant institutions. Therefore, to overcome these limitations, the study has used Felson's victimology approach that gives a more accurate estimation of this crime. This crime occurs because of its interactive nature among people of different genders. The types of Cyberstalking that were the subject of this research are threats, theft of information and identity, the dissemination of lies, and harassment. The research method of this study is to investigate the victims to discover the crime's realistic rate and analyze its causes. The survey's statistical population is citizens over 15 years of age in Tehran using at least one hour of Internet per week. Findings show that around 8.9% of Tehran's users have been attacked at least once. So it can be said Cyberstalking is a social problem that is taking place in cyberspace. Analysis of the findings shows that the online lifestyle of the victims has a significant effect on the rate and quality of the incident. Among the factors affecting the crime are the changes in values in cyberspace and the reduction of social control, which leads to ethical emancipation and self-control. This process ultimately increases the visibility and risk-taking behavior of individuals who provide the platform for her victimization.

Keywords


-         ابوذری، مهرنوش (1391). جرم‌شناسی جرائم سایبری. پایان‌نامۀ کارشناسی ارشد به راهنمایی عباس شیری، دانشگاه تهران، دانشکده حقوق و علوم‌سیاسی، گروه حقوق جزا و جرم‌شناسی.
-         نجفی ابرندآبادی، علی‌حسین (1383). تقریرات درس جرم‌شناسی. مجموعه دو جلدی به کوشش شهرام ابراهیمی.
-         نجفی ابرندآبادی، علی‌حسین (1388). دربارۀ بزهکاری و جرم‌شناسی سایبری (گفتگو)، مجلهتعالیحقوق، شماره 36، ص 1-7.
-         نجفی ابرندآبادی، علی‌حسین (١٣٧٤). تقریراتبزهدیده‌شناسی. دورۀ کارشناسی دانشگاه شهیدبهشتی. تنظیم فاطمه قناد.
-        Back, Sinchul. (2016). Empirical Assessment of Cyber Harassment Victimization via Cyber-Routine Activities Theory. In BSU Master’s Theses and Projects. Item 30. Available at http://vc.bridgew.edu/theses/30.
-         Baum, K.; Catalano, S.; Rand, M.; Rose, K. (2009). Stalking victimization in the United States. U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics.
-         Bocij, P. & McFarlane, L. (2003a). Cyberstalking: The technology of hate. The Police Journal, 76: 204-221.
-         Bocij, P.; McFarlane, L. (2003b). Seven fallacies about cyberstalking. Prison Service Journal, 149: 37-42.
-         Bocij, P. (2004). Cyber stalking: Harassment in the Internet age and how to protect your family.Westport, CT: Praeger Publishers.
-         Bocij, P., & McFarlane, L. (2003). Seven fallacies about cyberstalking. Prison Service Journal, 149: 37-42.
-         Bocij, P., Griffiths, M., and McFarlane, L. (2002). Cyberstalking a new challenge for criminal law Criminal Lawyer, 122, 3-5.
-        Bossler, A. M., & Holt, T. J. (2010). The Effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38: 227-236.
-         Burgess Alexy, E., , A., Baker, T., & Smoyak, S. (2005). Perceptions of cyber stalking among college students. Brief Treatment and Crisis Intervention, 5, 279–289.
-         Clarke, R. V., & Felson, M. (1993). Routine activity and rational choice. New Brunswick, NJ: Transaction Publishers.
-         D’Ovidio, R. & Doyle, J. (2003). A study on cyberstalking: Understanding investigative hurdles. FBI Law Enforcement Bulletin, 72(3): 10-17.
-         Dignan, J. (2005), Understanding Victims and Restorative Justice, Maidenhead: Open.
-         Finch, E. (2001). The criminalization of stalking: Constructing the problem and evaluating the solution. London: Cavendish.
-         Fisher B., & S. Lab(2010) (Eds.), Encyclopedia of victimology and crime prevention. Thousand Oaks: SAGE Publications, Inc. doi: 10.4135/9781412979993.n334.
-         Fukuchi, A. (2011). A balance of convenience: The use of burden-shifting devices in criminal cyberharassment law. Boston College Law Review, 52, 289-338.
-         Goodno, Naomi Harlin(2007) Cyberstalking, a New Crime: Evaluating the Effectiveness of Current State and Federal Laws, Missouri Law Review, Available at:  http://scholarship.law.missouri.edu/mlr/vol72/iss1/7.
-         Grabosky, P.N. (2001). Virtual criminology: Old wine in new bottles? Social and Legal Studies, 10, 243-249.
-         Grabosky, P.N. (2007). Electronic Crime. Upper Saddle River, NJ: Pearson.
-         Hazelwood, Steven D.& Magnin,  Sarah Koon(2013) Cyber Stalking and Cyber Harassment Legislation in the United States: A Qualitative Analysis, International Journal of Cyber Criminology (IJCC) ISSN: 0974 –Vol 7 (2): 155–168.
-         Hirschi, T. (2004). Self-control and crime. In R. F. Baumeister & K. D. Vohs (Eds.), Handbook of self-regulation: Research, theory and applications (pp. 537-552). New York:Guilford Press.
-        Jaishankar, K. (2008). Space Transition Theory of cyber crimes. In Schmallager, F., & Pittaro, M. (Eds.), Crimes of the Internet. (pp.283-301) Upper Saddle River, NJ: Prentice Hall.
-         Jaishankar, K. and Sankary, U.V. (2006). Cyberstalking: A global menace in the information super highway. All India Criminology Conference. 16-18. Madurai: India Madurai Kamaraj University.
-         Jaishankar. K (2011). Cyber Criminology: Exploring Internet Crimes and Criminal behavior. Boca Raton, FL, USA: CRC Press, Taylor and Francis Group.
-         Lindberg, D. (2012). Prevention of cyberstalking: A review of the literature. In Portland State University. Retrieved October 18, 2015.
-         Maple, Carsten & etal(2011) The Impact of Cyberstalking: review and analysis of the ECHO Pilot Project, National Centre for Cyberstalking Research.
-         Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381-410.
-         Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014). Juveniles and cyber stalking in the United States: An analysis of theoretical predictors of patterns of online perpetration. International Journal of Cyber Criminology, 8, 47-56.
-         McFarlane, L., & Bocij, P. (2003). An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers. First Monday, 8(9).
-         Miethe, T. (1991). Citizen-Based Crime Control Activity and Victimization Risks: An Examination of Displacement and the Free-Rider Effect, Criminology, 29, 419-441.
-         Miethe, T. D., & Meier, R. F. (1994). Crime and its social context : toward an integrated theory of offenders, victims, and situations. Albany: State University of New York Press.
-         Mishra, Alok & Mishra, Deepti(2008) Cyber Stalking :A Challenge for Web Security, See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/259148587.
-         Newman, G., & Clarke, R.V. (2003). Superhighway Robbery: Preventing E-commerce Crime. Portland, OR: Willan Publishing.
-         Ogilvie, E. (2000). Cyberstalking. Trends & Issues in Crime and Criminal Justice, No 166. Canberra: Australian Institute of Criminology.1-6.
-         Petrocelli, J. (2005). Cyber stalking. Law & Order, 53(12), 56-58.
-         Pittaro, Michael L (2007) Cyber stalking: An Analysis of Online Harassment and Intimidation, International Journal of Cyber Criminology (IJCC)   ISSN: 0974 – 2891 Vol 1 (2): 180–197.
-         Poonia,Ajeet Singh(2014) Cyber Crime: Challenges and its Classification, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Issue 6, 3(6), 119-121.
-         Reyns, B.W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention & Community Safety, 12, 99-118.
-         Reyns, B. W. (2013). Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory beyond Direct-Contact Offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238.
-         Roberts, Lynne (2008) Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking, International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891, Vol 2 (1): 271–285.
-         SPITZBERG, B. H. (2002). The Tactical Topography of Stalking Victimization and Management. Trauma, Violence, & Abuse, 3(4), 261–288.
-         Stephenson, Peter R., and Walter, Richard D.( 2011) Toward Cyber Crime Assessment: Cyberstalking, Annual Symposium on Information Assurance (ASIA), JUNE 7-8, ALBANY, NY.
-         Wall, D. S. (2008). Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information Communication and Society, 11(6), 861–884.
-         Somaiya,Jheel & etal(2014) A Survey: Web based Cyber Crimes and Prevention Techniques. International Journal of Computer Applications 105(17):6-9.
Yar, M. (2005). The Novelty of 'Cybercrime:' An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2(4), 407-427.