Cybervictimization。研究矩阵

D. Zhmurov
{"title":"Cybervictimization。研究矩阵","authors":"D. Zhmurov","doi":"10.21639/2313-6715.2021.3.11.","DOIUrl":null,"url":null,"abstract":"The article presents an analysis of the cybervictimization phenomenon. The author justifies the use of an integrative (interdisciplinary) approach to the study of this problem, proposes the definition of the term under study as a process or end result of becoming a crime victim in the sphere of unified computer networks. A theoretical and methodological matrix for the analysis of cybervictimization (PCPPE model) was developed. The model includes five system characteristics of cybervictimization, the comprehensive study of which to a maximum extent will simplify the understanding of the essence of the object of study. These characteristics include: profiling, conditionality, prevalence, predictability and epidemicity. Each of these aspects is explained in detail: the author developed a detailed nomenclature of cybervictimization forms. The problems of identifying its extent, as well as the determinant role of gender, age, behavioral and personal factors are discussed in the article, and a list of key cybervictimization acts is formulated. This meta-analysis includes thirteen global categories and about seventy of its accent forms. Among the global categories the following ones are identified: threats, harassment, illegal interest, infringement, insult, spoofing, disclosure, compulsion, seizure, infecting, access and use. The prevalence rates of cybervictimization on the example of the United States (Internet Crime Report) are also studied, certain aspects of the methodology of cyber victim number counting are considered.","PeriodicalId":433311,"journal":{"name":"Prologue: Law Journal","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cybervictimization. Research Matrix\",\"authors\":\"D. Zhmurov\",\"doi\":\"10.21639/2313-6715.2021.3.11.\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article presents an analysis of the cybervictimization phenomenon. The author justifies the use of an integrative (interdisciplinary) approach to the study of this problem, proposes the definition of the term under study as a process or end result of becoming a crime victim in the sphere of unified computer networks. A theoretical and methodological matrix for the analysis of cybervictimization (PCPPE model) was developed. The model includes five system characteristics of cybervictimization, the comprehensive study of which to a maximum extent will simplify the understanding of the essence of the object of study. These characteristics include: profiling, conditionality, prevalence, predictability and epidemicity. Each of these aspects is explained in detail: the author developed a detailed nomenclature of cybervictimization forms. The problems of identifying its extent, as well as the determinant role of gender, age, behavioral and personal factors are discussed in the article, and a list of key cybervictimization acts is formulated. This meta-analysis includes thirteen global categories and about seventy of its accent forms. Among the global categories the following ones are identified: threats, harassment, illegal interest, infringement, insult, spoofing, disclosure, compulsion, seizure, infecting, access and use. The prevalence rates of cybervictimization on the example of the United States (Internet Crime Report) are also studied, certain aspects of the methodology of cyber victim number counting are considered.\",\"PeriodicalId\":433311,\"journal\":{\"name\":\"Prologue: Law Journal\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Prologue: Law Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21639/2313-6715.2021.3.11.\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Prologue: Law Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21639/2313-6715.2021.3.11.","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文对网络受害现象进行了分析。作者证明使用综合(跨学科)方法来研究这一问题是合理的,并建议将所研究的术语定义为在统一计算机网络领域成为犯罪受害者的过程或最终结果。建立了网络受害分析的理论和方法矩阵(ppcpe模型)。该模型包含了网络受害的五大系统特征,对其进行全面的研究将最大程度地简化对研究对象本质的理解。这些特征包括:概况、条件、流行程度、可预测性和流行性。每一个方面都有详细的解释:作者制定了一个详细的网络受害形式的命名法。本文讨论了网络侵害行为的界定问题,以及性别、年龄、行为和个人因素对网络侵害行为的决定作用,并列出了网络侵害行为的主要类型。这项荟萃分析包括13个全球类别和大约70种重音形式。在全球类别中,确定了以下类别:威胁、骚扰、非法利益、侵权、侮辱、欺骗、披露、强迫、扣押、感染、访问和使用。还研究了以美国为例的网络受害者的患病率(互联网犯罪报告),并考虑了网络受害者数量计数方法的某些方面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cybervictimization. Research Matrix
The article presents an analysis of the cybervictimization phenomenon. The author justifies the use of an integrative (interdisciplinary) approach to the study of this problem, proposes the definition of the term under study as a process or end result of becoming a crime victim in the sphere of unified computer networks. A theoretical and methodological matrix for the analysis of cybervictimization (PCPPE model) was developed. The model includes five system characteristics of cybervictimization, the comprehensive study of which to a maximum extent will simplify the understanding of the essence of the object of study. These characteristics include: profiling, conditionality, prevalence, predictability and epidemicity. Each of these aspects is explained in detail: the author developed a detailed nomenclature of cybervictimization forms. The problems of identifying its extent, as well as the determinant role of gender, age, behavioral and personal factors are discussed in the article, and a list of key cybervictimization acts is formulated. This meta-analysis includes thirteen global categories and about seventy of its accent forms. Among the global categories the following ones are identified: threats, harassment, illegal interest, infringement, insult, spoofing, disclosure, compulsion, seizure, infecting, access and use. The prevalence rates of cybervictimization on the example of the United States (Internet Crime Report) are also studied, certain aspects of the methodology of cyber victim number counting are considered.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信