ENGAGEMENT AMONG STUDENTS AND UNKNOWN PERSONS WHILE USING SOCIAL NETWORKING WEBSITES A Thesis Presented to the faculty of the Division of Criminal Justice California State University, Sacramento Submitted in partial satisfaction of The requirements for the degree of MASTER OF SCIENCE in Criminal Justice by Brandon Jess Jaimes SPRING 2012 ENGAGEMENT AMONG STUDENTS AND UNKNOWN PERSONS WHILE USING SOCIAL NETWORKING WEBSITES A Thesis by Brandon Jess Jaimes Approved by: __________________________________, Committee Chair Timothy Croisdale, Ph.D. __________________________________, Second Reader Dimitri Bogazianos, Ph.D. ____________________________ Date ii Student: Brandon Jess Jaimes I certify that this student has met the requirements for format contained in the University format manual, and that this thesis is suitable for shelving in the Library and credit is to be awarded for the thesis. __________________________, Graduate Coordinator Yvette Farmer, Ph.D. Division of Criminal Justice iii ___________________ Date Abstract of ENGAGEMENT AMONG STUDENTS AND UNKNOWN PERSONS WHILE USING SOCIAL NETWORKING WEBSITES by Brandon Jess Jaimes The advent of technology inherently creates problems as much as it lends efficiency, and unfortunately, the internet plays a pivotal role in a few of the major problems it has created. Current research reveals possible connections between social networking websites and increased likelihood of interpersonal victimization. The following is an analysis of 288 students who completed a survey measuring their use of internet communication services and engagement with unknown persons. Analyses showed that a large portion of students place themselves at high risk for a suitable target and lack of guardianship. Variations were found measuring the variable for motivated offender. Few subject responses indicated students engage with unknown persons whether or not they feel safe, but an overwhelming majority of the students do not feel safe engaging with strangers. _______________________, Committee Chair Timothy Croisdale, Ph.D. _______________________ Date iv ACKNOWLEDGEMENTS It is a pleasure to thank the many people who made this thesis possible. I would like to sincerely thank my thesis advisor, Dr. Tim Croisdale who decided to lend me his hand when I needed it most. Dr. Croisdale, thank you for making it easier to put the pieces in place. I am eternally indebted to your acceptance and kindness. I am grateful to have Dr. Bogazianos assist with this thesis. Dr. B., your persuasive belief in my ability encouraged me to grow and analyze elaborate theory. I now have the confidence to tackle the utmost difficult task. I am blessed to have had Dr. Farmer be the graduate coordinator during this life-changing experience. Dr. Farmer, your devotion, enthusiasm, patience, and compassion made my journey much easier. I could not have asked for a better mentor. I would like to thank the people who have taught me persistence: my grandfather, Charlie Jaimes Sr., your love and support has guided me in the darkest of times, my father, Charlie Jaimes Jr., thank you for providing the most valuable secret in life, Jaimes power, and my mother, Beverly Jaimes, for being so loving and proud. I am honored to acknowledge my extended family and my best friends. Thank you for being there during the most difficult and happiest moments in my life. Most importantly, I wish to thank my brothers, Brishen and Bryce Jaimes. Collectively, they have helped me become the person I am today. Thank you. v TABLE OF CONTENTS Page Acknowledgements ................................................................................................................... v List of Tables ........................................................................................................................ viii List of Figures .......................................................................................................................... ix Chapter 1. INTRODUCTION……………………………………………………………………….. 1 Statement of the Problem ............................................................................................. 3 Need and Purpose of Study .......................................................................................... 5 Hypotheses ................................................................................................................... 6 Theory.. ........................................................................................................................ 8 Methodology .............................................................................................................. 11 Scope and Limitations ............................................................................................... 13 Organization of the Study .......................................................................................... 13 2. REVIEW OF LITERATURE ........................................................................................... 15 Introduction................................................................................................................ 15 Sexual Harassment ..................................................................................................... 15 Stalking ...................................................................................................................... 24 Sexual Exploitation .................................................................................................... 33 Identity Theft ............................................................................................................. 42 Summary .................................................................................................................... 49 3. METHODOLOGY ........................................................................................................... 54 Subjects ...................................................................................................................... 54 Instrument .................................................................................................................. 56 Data Collection .......................................................................................................... 57 Testable Hypotheses .................................................................................................. 61 Data Analysis ............................................................................................................. 61 Limitations of Research Design ................................................................................. 64 4. FINDINGS ........................................................................................................................ 66 Suitable Target ........................................................................................................... 66 vi Lack of Guardianship................................................................................................. 69 Motivated Offender.................................................................................................... 70 Predictors of Interpersonal Victimization: Combination of Suitable Target, Motivated Offender, and Lack of Guardianship ........................................................ 82 Subject Response ....................................................................................................... 86 Summary ..................................................................................................................... 88 5. SUMMARY AND CONCLUSIONS ............................................................................. 90 Implications for Future Research ............................................................................... 95 Appendix A. Questionnaire ..................................................................................................... 99 Appendix B. Script Used Prior to Questionnaire Distribution ............................................... 109 Appendix C. Use of E-mail Services over 24-hour Period .................................................... 111 Appendix D. Use of Instant Messenger Services over 24-hour Period.................................. 112 Appendix E. Use of Chat-room Services over 24-hour Period .............................................. 113 Appendix F. Use of Social Networking Website Services over 24-hour Period ................... 114 Appendix G. Privatization of Social Networking Websites and Student’s Perception of Safety .................................................................................................. 115 Appendix H. Collapsed Data for Subjects Contacted by Unknown Persons and Their Perception of Safety ................................................................................ 116 Appendix I. Collapsed Data for Subjects who were Requested Permission to View Their Social Networking Website ................................................................... 117 Appendix J. Subjects who were Asked Permission by Unknown Persons to View Their Private Social Networking Website and Their Perception of Safety ............. 118 Appendix K. Subjects who Conversed with Unknown Persons and Their Perception of Safety .................................................................................................. 119 References ............................................................................................................................. 120 vii LIST OF TABLES Tables 1. Page Table 3.1: CSUS Criminal Justice Undergraduate Courses Selected………………………………… ....... .……………………………….58 2. Table 3.2: Demographics………………………… .. …………………………60 3. Table 3.3: Ages 15-25 by Age………………………………………………...60 4. Table 4.1: Use of Internet……………………………….…………………….67 5. Table 4.2: Social Networking Website Use…………………………………...68 6. Table 4.3: Frequency of Mobile Device Use………………………………….69 7. Table 4.4: Guardianship of Computer Use……………………………………70 8. Table 4.5: Amount of Students Reporting Online Behaviors by Suitable Target, Motivated Offender, Lack of Guardianship, and by Demographics………………………………………………………....85 viii LIST OF FIGURES Figures 1. Page Type of Personal Information Posted on Social Networking Website………………………………… ....... .……………………………….71 2. Access of Personal Information Provided to an Unknown Person on Social Networking Websites……………………………………………………...…..72 3. Indication of Suitable Target: Social Networking Website and Internet Use…………………………………………….………………………………82 4. Contribution of Personal Information and Experiences with Unknown Persons on Social Networking Websites………………………………………83 5. Location of Computer Use and Guardianship………………………..………..84 ix 1 Chapter 1 Introduction The continual technological advancement that allows for efficient communication methods through e-mail, instant messengers, chat-rooms, and websites are just a few ways that the internet can be used to facilitate communication (D'Ovidio, Mitman, ElBurki, & Shumar, 2009). For example, the benefit of e-mail allows users an alternative way to sending postal mail in an electronic form in just a matter of seconds and instant messenger programs allow for real-time text communication, which provides an alternative to other out-dated forms of communication (D'Ovidio et al., 2009). Lastly, social networking websites allow users to interact with each other through several means of electronic picture sharing, instant messaging, e-mailing, or providing links to other websites. However, in addition to the multiple benefits provided by these advancements in technology, they have also provided predators with alternative and anonymous methods for victimizing individuals (Marcum, 2008). Victimization, or more specifically, interpersonal victimization, has become a major concern throughout society today. According to Davis, Lurigio, & Herman (2007), interpersonal victimization can be defined as "harms that occur to individuals because of other human actors behaving in ways that violate social norms" (p.10). We often refer to multiple forms of victimization that do not adequately represent interpersonal victimization (Davis et al., 2007). For example, motor vehicle accident victims or victims of natural disasters are not categorized as interpersonal victims (Davis et al., 2007). The more general referent for the term victimization is interpersonal victimization. With this 2 in mind, Davis et al. address interpersonal victimization and the issues of malice, deception, injustice, and morality compared to impersonal forms of accidents or disasters that occur during general forms of victimization. There are many contributing factors to interpersonal victimization; however, the most common method of interpersonal victimization occurs through face-to-face encounters (Combs-Lane& Smith, 2002). Prior to the advent of the internet, interpersonal victimization occurred among acquaintances, friends, family members, and complete strangers without the assistance of computers (Cassell & Cramer, 2007). However, with the belief that there was a rise in sexual victimization, eventually a form of "moral panic" was prescribed by the media and researchers began to produce studies in an effort to identify victimization risk characteristics (Ben-Yehuda & Goode, 1994). For example, according to Parks and Miller (1997), "interpersonal victimization risks may be greater in certain social settings, such as bars, where alcohol is consumed and aggression is more likely" (p.513). Also, personal and property crime victimization studies suggest that participating in leisure activities away from home and other lifestyle choices were likely to increase victimization risk factors (Arnold, Keane, & Baron, 2005). In another study, research has shown that a combination of behavioral factors (alcohol use) and leisure activities (going to the mall or eating out) are associated with increased risk of criminal victimization among college women (Mustaine & Tewksbury, 1999). Another study found that the exposure to potential predators serves as a risk factor for future sexual victimization, particularly in interpersonal situations where the individual is perceived as a vulnerable target (Parks & Miller, 1997). Lastly, a study determined that women in college have an 3 increased risk of sexual victimization because they tend to provide opportunities in time and space with potential offenders while having little to no guardianship (Fisher, Cullen, & Turner, 2002). Therefore, several studies revealed that with an increase in social activities among face-to-face encounters there was a proportional increase in victimization risk factors (Ben-Yehuda & Goode, 1994; Parks & Miller, 1997; Arnold, Keane, & Baron, 2005; Mustaine & Tewksbury, 1999; Fisher, Cullen, & Turner, 2002). Statement of the Problem The emerging innovations of the internet have created a more efficient and clever avenue of interpersonal victimization for predators, and unfortunately, research on internet use has demonstrated that internet use has significantly increased in the past 10 years (Addison, 2001). Furthermore, the advent of the internet has created an environment of sexual exploitation in the forms of chat-rooms, blogs, instant messengers, webcam chats, picture exchanges, and most importantly for this study, social networking websites. As new developments of technology emerge, society and its activity patterns are constantly transforming (Madriz, 1996). A recent report discovered that 87 percent of youth are using the internet and that percentage of youth is projected to grow (Rainie, 2006). With this in mind, as innovative technologies emerge, the creation of different methodological victimization tactics also emerge (Wolak, Mitchell, & Finkelhor, 2006). For example, according to several studies on internet use by youth, it has been found that increasing numbers of users are experiencing unwanted exposure to sexual material, sexual solicitation, and unwanted non-sexual harassment (Marcum, 2008). Moreover, not only are there a greater number of users accessing the internet to socialize, these 4 individuals are also spending more time on the internet. Unfortunately, it is evident that while the use of social networking websites can produce positive interaction and develop enjoyable relationships for its users, these individuals are spending extensive amounts of time online and are also placing themselves at an elevated level of interpersonal victimization risk (Izenberg & Lierbman, 1998). The recent popularity of social networking websites has created fear among law enforcement agencies, users, and guardians (Marcum, 2008). The issue with the frequent use of social networking websites is the increased risk for interpersonal victimization (Marcum, 2008). It has been shown that the deceptive capability of the internet has created a sense of fear among users (Choo, 2008). In fact, according to Johnson (2006), "many sexual predators use fake identities complete with false pictures and information to mask their true identities in order to seem more enticing to those with whom they wish to interact" (p.4). Unfortunately, these predators, or "cybercriminals" can hide their history of communication, digital pictures, and video files by using password authentication, encryption and stenographic techniques (Choo, 2008). These efforts often hinder law enforcement and investigators in their attempts to decrease online victimization of users and other acts of sexual exploitation (Choo, 2008). Furthermore, anonymity of communication can be provided through the use of the Onion Router, an "anonymising protocol" that allows data to be routed through numerous servers. According to Marks (2007), "the device uses cryptography to obscure the data path and hence make it untraceable for law enforcement” (p. 25). With these methods of masking identity in mind, the fear among the use of social networks has produced multiple beliefs 5 that social networking websites are the new street corner of our society, and that they are a predator's dream come true (Apuzzo, 2006). Collectively, the underlying issue is that even though identities are masked, the users then begin to believe that through constant contact or social interaction through the internet that the stranger may actually be completely honest or sincere. However, multiple studies show that this is not true. This study examines why social networking website users may want to interact with strangers and why they may feel comfortable doing so. Need and Purpose of Study The current study focuses upon social networking websites in order to examine why users may want to interact with strangers that they encounter while using such sites. A questionnaire will be administered to survey the use of a computer and the internet by undergraduate students majoring in criminal justice at California State University, Sacramento. This study will investigate the purpose and intention of the user(s) social networking profile before collecting data on how often these individuals are e-mailed, instant messaged, or asked to be common "friends" on the site by complete strangers. In addition, it is pertinent in this study to understand whether or not these users have privatized their user profiles, for it may be hypothesized that those with privatized user profiles may have a lower rate of victimization risk. Following, it must be noted whether or not users interacted with strangers while using social networking websites. If the users have interacted with strangers among the websites, it is important to determine if the users are aware of interpersonal victimization risk factors described previously. 6 Currently there is a perception that there are numerous dangers associated with the use of social networking websites creating a "moral panic" (Perkel, 2008). However, even though there is a copious amount of literature supporting the correlation with increased use of social networking websites there is an increased risk for potential victimization, few studies have analyzed the rates of interpersonal victimization while using such websites. More importantly, few emerging studies have hypothesized that social networking websites are being used for individuals to explore their identity and sexuality; however, there are no studies that have analyzed why individuals interact with strangers among these sites. This may provide additional understanding of prevention, awareness, and theory involving the interaction of strangers and users of social networking websites. First, this study may create or provide more effective preventative strategies for users when encountering strangers while using social networking websites. Also, this study may create awareness among guardians who monitor individuals while accessing such websites. Finally, this will apply Cohen and Felson's 1979 Routine Activities Theory to progressing technologies and alternate forms of solicitation between strangers and social networking website users. Hypotheses It is suggested that with the advent of the internet, interpersonal victimization may have increased due to the use of social networking websites (D'Ovidio et al., 2009). Most notably, previous research has suggested that increasing numbers of users are experiencing unwanted exposure to sexual material, sexual solicitation, and unwanted 7 non-sexual harassment (Marcum, 2008). It is also unfortunate that the internet provides the ability for predators to mask their true identity or block law enforcement’s capability of tracking their data path and server route (Ogilvie, 2001). In addition, sufficient amounts of research support the notion that with increased use of social networking sites there is increased risk for potential victimization, but this research will focus on a different aspect of interpersonal victimization. This current research will determine if users of social networking websites have ever been contacted by an unknown person, and more specifically, why these users may want to interact with these strangers that they encounter while using such sites. The research will focus on three independent variables as three dimensions of interpersonal victimization: motivated offenders, suitable targets of criminal victimization, and capable guardians of persons or property. The three dimensions are concerned with the rates of interpersonal victimization as they relate to the motivated offenders that are involved, how the subjects are targeted for suitable victimization, and if there is a lack of guardianship over desired persons or things. The researcher has developed three hypotheses for the current study: Motivated Offenders H1A: Interpersonal victimization rates will increase when there is an increase in the number of motivated offenders encountered. H0A: Interpersonal victimization rates will not differ depending on the increase of motivated offenders encountered. 8 H1B: Interpersonal victimization rates will increase when there is an increase in the number of suitable targets (subjects who provide personal information) that are easy to access by an offender. H0B: Interpersonal victimization rates will not differ depending on the increase of suitable targets that are easy to access by an offender. H1C: Interpersonal victimization rates will increase when there is a lack of capable guardianship of persons or security measures present. H0C: Interpersonal victimization rates will not differ depending on the lack of capable guardianship of persons or security measures present. Theory The hypotheses enable the researcher to: first, determine if there are specific predictors that may increase one’s likelihood to engage with strangers among social networking websites. For it is believed that when the variables are combined, they produce a heightened effect on the level of interpersonal victimization rates (Cohen & Felson, 1979); Second, to provide more awareness strategies for users when encountering strangers while using social networking websites. Additionally, this may create awareness among guardians who monitor individuals while accessing such websites. Routine activities theory, developed by Cohen and Felson (1979), may help explain why variability may be present in victimization. This theory states that changes in crime are due to the opportunities of offenders (Cohen & Felson, 1979). Furthermore, these changes may be a result of a convergence in time and space of motivated offenders, targets that are viewed as being suitable by the offender, and a lack of guardianship over 9 the desired persons or things (Cohen & Felson, 1979). According to Cohen and Felson (1979), many theories only take into consideration specific time periods and groups, whereas routine activities theory attempts to explain all fluctuations in crime. Routine activities theory is based on the presumption that individuals performing daily routines may encounter an incident of victimization (Cohen & Felson, 1979). The incident may only occur if the convergence of those with criminal motivations or intentions are present (Cohen & Felson, 1979). Daily routines are acts that are considered to be essential to someone’s life, such as going to the gym, accessing his or her e-mail account, or working. Many criminologists suggest that a person’s lifestyle increases their risk of being exposed to criminals and criminal activities (Parks & Miller, 1997). Therefore, those seen as being the easiest targets due to their lifestyle choices will face higher crime rates compared to those who place themselves at unequivocal risk (Arnold, Keane, & Baron, 2005). Collectively, the opportunities presented to violators to perform criminal acts must be removed in order to eliminate victimization. Cohen and Felson (1979) suggest that increased guardianship will eliminate the opportunity for criminal acts. Before the introduction of the internet, interpersonal victimization occurred among acquaintances, friends, family members, and complete strangers in a traditional face-to-face manner (Cassell & Cramer, 2007). Over time, reports of sexual victimization were on the rise, and researchers began to produce studies in hope to identify victimization risk factors (Ben-Yehuda & Goode, 1994). For example, Parks and Miller (1997) reported that risks are greater in specific social settings, such as bars. It was found 10 that participating in leisure activities away from home and other lifestyle choices were likely to increase victimization risk factors (Arnold, Keane, & Baron, 2005). Mustaine and Tewksbury (1999) suggested a combination of behavioral factors (i.e. alcohol use) and leisure activities (i.e. going to the mall or eating out) are associated with increased risk of criminal victimization among college women. The exposure to potential predators serves as a risk factor for future sexual victimization, particularly in interpersonal measures where the individual is perceived as a vulnerable target (Parks & Miller, 1997). Moreover, increased victimization occurs because opportunities in time and space with potential offenders converge while having little to no supervision (Fisher, Cullen, & Turner, 2002). While referring to the variables comprised of Cohen and Felson’s (1979) routine activities theory, interpersonal victimization is possible to occur while using social networking websites. However, due to the assembly of the internet, the risk of victimization while using social networking websites may be presented differently. In this thesis, the researcher focuses on the concept of motivated offenders to a broader degree. For those accessing social networking websites, it will be useful to divulge victimization rates for online crimes of harassment, stalking, sexual exploitation, and identity theft. As stated above, the three variables in discussion are the presence of motivated offenders, the appearance of a suitable target, and the lack of guardianship over something or someone that may be desired by an offender. Furthermore, in this thesis a suitable target will be defined by crimes committed against those while accessing the internet, or more specifically, those using social networking websites. In this study, the 11 internet is viewed as a suitable target for offenders because there is an ease of access to individuals. A motivated offender has the advantage of grooming numerous individuals at one time and may remain anonymous if desired. In addition to anonymity, a motivated offender has the ability to appear as any person that they desire. For example, the internet may allow an adult to portray him or herself as being much younger than they are in reality. Lastly, the lack of guardianship occurs when individuals do not use social networking websites with caution due to the belief that conversing with someone over the internet is not a potential threat, and recent studies by Pierce (2006) suggest that there is a correlation between trusting strangers online and giving out personal information. Therefore, those who access the internet and social networking websites at a higher rate are at a higher risk of interpersonal victimization. Methodology A sample of California State University, Sacramento undergraduate students enrolled in criminal justice courses completed an anonymous questionnaire about their use of social networking websites and engagement with unknown persons. Current research reveals possible connections between social networking websites and increased likelihood of victimization. Therefore, the questionnaire was designed to collect information on why some individuals may feel comfortable engaging with unknown persons through social networking websites. This study utilized a random cluster sampling technique selecting California State University, Sacramento students enrolled in criminal justice undergraduate courses. Undergraduate criminal justice courses were selected as individual clusters, simple 12 random sampling was applied to each course offered, and then the fifty clusters were randomly selected with the use of a random sampling generator. Data were collected from students enrolled in the randomly selected courses through a voluntary questionnaire. The questionnaire (see Appendix A) consisted of 20 close-ended questions and one open-ended question requesting subjects to indicate the types of activities performed on the internet, the location of their computer use, how often the internet is used, whether or not there is presence of another person while using the computer, whether or not they are registered to social networking websites, information they may have posted on their personal social networking website, whether or not their personal social networking website is privatized, how often they have been requested or have “friended” an unknown person, whether or not they have conversed with the unknown person they have “friended,” whether or not they have given personal information beyond what is accessible on their personal social networking website, whether or not they do any of the aforementioned activities with the use of a mobile device, whether or not they feel safe engaging with unknown persons among social networking websites, their gender, their age, and their marital status. SPSS will produce figures suggesting whether specific predictors may increase one’s likelihood to engage with strangers among social networking websites. The variables will be measured through a survey polling personal use of a computer and behaviors while using social networking websites, privatization of social networking websites, and types of interpersonal victimization that may occur because of social networking website use. 13 Scope and Limitations The study attempts to analyze engagement with unknown persons with the ambition of unveiling occurrences of interpersonal victimization due to the use of social networking websites. There are several limitations to this study. The primary limitation is that those surveyed were students from criminal justice courses offered through California State University, Sacramento. The survey was not offered to the general public. This limits the ability to generalize all academic majors, as well as other college campuses and college-aged youth in general. Further research examining interpersonal victimization on social networking websites throughout the nation would be interesting. Another limitation to this study is the omission or integrity of data from each reporting subject. With an interviewer not being present it is problematic because it will be difficult to clarify incomplete answers, control the quality of answers provided, or further explain the survey if questions of clarification are asked by individual subjects. Organization of the Study The remainder of this study will examine the presence of predictors that may increase one’s likelihood to engage with strangers among social networking websites. The subsequent chapters will proceed as follows. Chapter two reviews current research illustrating interpersonal victimization through traditional offline environments, as well as, contemporary online environments. Described in chapter three are the methods used to create a data collection instrument, the action of surveying subjects, and the analysis of the data obtained. Chapter four presents the findings of the research. Lastly, chapter five 14 will conclude presenting a summary of the research, discuss the results, and provide further implications of the research. 15 Chapter 2 Review of Literature Introduction The advent of technology inherently creates problems as much as it lends efficiency, and unfortunately, the internet plays a pivotal role in a few of the major problems it has created (D'Ovidio, Mitman, El-Burke, & Shumar, 2009). Since Licklider created and implemented the electronic global communication system known as the internet, there has been a consistent exponential growth of users (Licklider & Clark, 1962). Recently this growth has raised concerns among researchers focusing on developing social problems and the use of the internet (Mitchell, Becker-Blease, & Finkelhor, 2005). There are a considerable amount of problems concerning the internet that have not yet been discussed because they continue to develop along with technology (Mitchell et al., 2005). Therefore, to demonstrate the need for a review of emerging internet victimization, this study examines the issues within offline and online avenues among the following areas of harassment, stalking, sexual exploitation, and identity theft. Sexual Harassment Sexual harassment is a form of interpersonal victimization that is historically associated with environments such as the workplace and educational systems (LaRocca & Kromrey, 1999; Rubin, 1995). The topic of sexual harassment and its definition has been under continual modification and will continue to change as new forms of harassment emerge (Bradenburg, 1997; Dansky & Kilpatrick, 1997; Dziech, 2003; Dziech & Hawkins, 1998; Hall, Graham, & Hoover, 2004; Paludi, 1997; Williams, Lam, 16 & Shively, 1992). The issue of harassment comes in many forms of behaviors and actions. A social psychological framework for sexual harassment was researched by Pryor, LaVite, & Stoller (1993) describing that both situational factors and factors of an individual person contribute to sexual harassment. In this study, Pryor et al. (1993) used two large scale surveys, one from the U.S. Department of Defense and the other from an organizational assessment. Ultimately, this study focused on the incidence of sexual harassment and hoped to answer a series of questions indicating the frequency that subjects experienced 10 different types of “uninvited, unwanted sexual attention over the last 12 months” (Pryor et al., 1993, p.70). This framework is a fundamental connection towards understanding the variables linked to sexual harassment. This framework illustrates sexual harassment as an interpersonal behavior containing both social and personal elements. In addition, sexual harassment is a behavior that is not always displayed by all individuals. With this in mind, only some individuals may be predisposed to behave in a sexually harassing manner. Plus, only particular situations (not all) may trigger the sexually harassing behavior. However, when the facilitating person and situation factors are present together, this creates a possible opportunity for sexual harassment. Therefore, those who are more likely to sexually harass a victim are only likely to do so if the situational factors are present (Pryor et al., 1993). A historical piece by Koss, Gidycz, & Wisniewski (1987) within sexual harassment literature was one of the first to discuss the nature of sexual victimization among female college students linking person and situational factors together. Koss and 17 colleagues (1987) found that female college students were being sexually harassed within a higher educational environment. Also, Gutek (1981) was one of the first researchers to demonstrate that the majority of sexual harassment offenders were men while majority of the victims were women. Collectively, numerous studies have confirmed that sexual harassment is typically pursued by males against females and that females are most often victims of sexual harassment (Cortina, Swan, Fitzgerald, & Waldo, 1998; Dziech, 2003; Gutek, 1981; Kalof, Eby, Matheson, & Kroska, 2001; Paludi, 1997; Russell & Oswald, 2001). Furthermore, research implies that sexual harassment is most likely to occur among “females, graduate students, women in nontraditional fields, minority females, disabled persons, divorced women, young and naïve females, persons who were sexually abused, and homosexuals” (Clodfelter, Turner, Hartman, & Kuhns, 2010, p.457). In order to further confirm findings from sexual harassment research, Clodfelter et al. (2010) studied a random sample of 750 college students from a southeastern university. E-mails were initially sent to the subjects, and then another e-mail was sent giving a link to a website that would host a survey (Clodfelter et al., 2010). The study sample consisted of 65 percent females and 35 percent males and the majority were White (Clodfelter et al., 2010). The research revealed that 22.7 percent of the subjects reported experiencing a form of sexual harassment (Clodfelter et al., 2010). Among those subjects that were sexually harassed, 92.9 percent were by other students and 50.0 percent were by strangers (Clodfelter et al., 2010). More specifically, most of the offenders were males, most often the offenders were White, most of the victims were victimized while alone, and almost all of the victims did not consume alcohol prior to their incident (Clodfelter et al., 2010). 18 The finding that almost all of the victims did not consume alcohol prior to their harassment is significant because it contradicts most literature documenting the prevalence of alcohol during more serious types of victimization (Fisher, Cullen, & Turner, 2000; Testa & Parks, 1996). Lastly, proximity and guardianship were two areas that were also related to experiencing sexual harassment (Clodfelter et al., 2010). A routine activities theory explanation of sexual harassment was produced by DeCoster, Estes, and Mueller (1999) which focused on the areas of proximity, guardianship, and target attractiveness. The research tested hypotheses using data from a national company in the industry of telecommunications (DeCoster et al., 1999). As previously noted by Pryor et al. (1993), the opportunity for sexual harassment is greatest when a person or group of people have routines or daily activities that bring them and their property in contact with motivated offenders. Similarly, Cohen and Felson (1979) speculated that with the absence of guardians, victimization is elevated during routine and daily activities while in the presence of motivated offenders. Therefore, DeCoster et al. (1999) aimed to apply Cohen and Felson’s routine activities theory to sexual harassment in an effort to explain victimization. Within DeCoster et al.’s study (1999), a total of 6,485 employees (3,316 males and 3,169 females) completed a questionnaire which was designed to measure sexual harassment among the workplace. It was discovered that the presence of guardianship plays a critical role in sexual harassment victimization (DeCoster et al., 1999). Specifically in this study, both supervisors and coworkers were supportive in protecting women from sexual harassment (DeCoster et al., 1999). It was also found that proximity 19 to motivated offenders increased the possibility for sexual harassment (DeCoster et al., 1999). For example, women who are among male-dominated jobs are more likely to experience sexual harassment than those in female-dominated settings (DeCoster et al., 1999). With this in mind, it can also be noted that smaller work environments and a high volume of employees also increases their likelihood of sexual harassment due to increased probable exposure (DeCoster et al., 1999). Lastly, individual characteristics “indicative of target attractiveness” were deemed critical for understanding sexual harassment (DeCoster et al., 1999, p.42). Although the findings were not concrete in this study, it was suggested that the most attractive subjects are considered more powerful than their counterparts (DeCoster et al., 1999). Therefore, the preliminary evidence suggests that power-threat issues may be important in understanding the behavior behind possible motivated offenders (DeCoster et al., 1999). In contrast, DeCoster and his colleagues (1999) also suggested that this phenomenon of target attractiveness may also apply to vulnerable-victims perspective in that “the finding that single women are at increased risk of harassment may indicate that these women are viewed as threatening to traditional female roles (power threat) or that these women are less protected than their married counterparts (vulnerable victim)” (DeCoster et al., 1999, p.42). Unfortunately, the research was unable to clarify either of these two findings; however, it is conclusive that proximity, guardianship, and target attractiveness serve as critical roles in creating sexual harassment opportunities (DeCoster et al., 1999). In addition to the previous examples of face-to-face sexual harassment, with the advent of technology, online forms of sexual harassment are now taking place 20 (Anonymous, 2009). Mitchell et al. (2005) found that individuals reported being victimized while using online sites in sexual and nonsexual forms. One type of harassment includes posting defamatory or embarrassing personal information about others (Mitchell et al., 2005). Also, it appears that online harassment is rarely reported to law enforcement because most individuals perceive that the victimization is not that serious (Finn, 2004). Furthermore a study conducted by the Internet Safety Task Force, led by Berckman Center for Internet Society at Harvard University aimed to determine which of today's technologies could best address online safety risks (Anonymous, 2009). Before the task force began its work on technology, it studied research to determine the actual threats youths face (Anonymous, 2009). According to the final report requested by 50 state Attorney Generals, online harassment and cyber-bullying appear to be the most common risks youths face online rather than online solicitation (Anonymous, 2009). In another study, nonrandom samples of 354 criminal justice students from the University of Nevada, Las Vegas were surveyed on victimization while using social networking websites (Taylor, 2008). The sample contained 60.5 percent females and 39.3 percent males, and the majority of the subjects were less than 21 years of age (Taylor, 2008). Also, the subjects were predominantly White (Taylor, 2008). According to Taylor (2008), there were more non-threatening sexual harassment behaviors occurring outside of the internet. However, when comparing verbal sexual harassment while on and offline, the rates were about equal (Taylor, 2008). In addition, sexual harassment behaviors that were considered “fear-inducing” or “threatening” had higher rates offline than online (Taylor, 2008). However, most importantly, according to Taylor (2008), a majority of the 21 subjects stated that they have experienced an overwhelming amount of sexual harassment online rather than offline. In a 1999 Youth Internet Safety Survey, the prevalence of teenage victimization on social networking websites was examined (Mitchell, Finkelhor, & Wolak, 2001). The study surveyed 1,501 youths between the ages of 10 and 17 who were considered frequent internet users visiting chat-rooms and talking to strangers online (Mitchell et al., 2001). It was found that 56 percent frequently visited chat-rooms, 56 percent talked to strangers while online and nearly 20 percent of the youths were sexually solicited while online (Mitchell et al., 2001). Those who were between the ages of 14 and 17 were solicited more often than those 10 to 13, however, a follow-up Youth Internet Safety Survey conducted in 2005 found that the frequency in the number of sexual solicitations had decreased (Mitchell et al., 2001). Furthermore, in the 2005 survey, 82 percent of those non-aggressively sexually solicited were between the ages of 14 and 17 (Mitchell et al., 2001). Almost 75 percent had posted personal information online, and nearly 50 percent used the internet solely for chat-room use (Mitchell et al., 2001). In contrast, the small percentage of those who were aggressively solicited online, 81 percent posted personal information and almost 70 percent used the internet solely for chat-rooms (Mitchell et al., 2001). The survey concluded that risk factors for online solicitations included being female, using chat-rooms, engaging in conversation about sex, and revealing personal information (Mitchell et al., 2001). Another study employed a sample of 1,501 youths between the ages of 10 and 17 who had used the internet at least once a month for the previous 6 months were 22 interviewed about their experiences while using the internet (Mitchell, Ybarra, & Finkelhor, 2007). In this study, the subjects were 53 percent boys and 47 percent girls, most were non-Hispanic/White (73 percent), and 63 percent of the youth lived with both of their parents at the time of the interview (Mitchell et al., 2007). Also, more than three fourths of the parents reported at least some college education and half of those surveyed had an annual income of $50,000 or higher (Mitchell et al., 2007). The authors suggested it was important to recognize that online sexual harassment may be an extension of existing experiences prior to the advent of the internet (Mitchell et al., 2007). For example, research suggests that for some youth, there may be no real distinction between online and offline sexual harassment (Mitchell et al., 2007). Moreover, others feel that the internet may have introduced a new form of a problem that requires new responses or interventions (Mitchell et al., 2007). Conclusively, the authors of this interpersonal victimization study found that 64 percent of the youths experienced at least one online or offline victimization in the past year (Mitchell et al., 2007). More specifically, 23 percent of the youth reported at least one of the two forms of online victimization (Mitchell et al., 2007). They also found that 6 percent reported online harassment, and that 19 percent had experienced online sexual solicitation (Mitchell et al., 2007). This finding is significant because it contradicts the Internet Safety Task Force's finding that online harassment is more common than online solicitation. Finn (2004) examined online harassment at the University of New Hampshire through a survey of undergraduate students. Finn developed a survey that focused on the types of online harassment that occurred through the use of e-mail and instant messengers 23 to insult, harass, threaten, or send pornography (Finn, 2004). Students were asked whether or not they reported online harassment, their frequency of computer use, and demographic questions (Finn, 2004). A majority of the students received pornography at 58.7 percent (Finn, 2004). Further results indicated that approximately 10 percent to 15 percent of students had experienced online harassment from strangers, an acquaintance, or a significant other (Finn, 2004). More specifically, the most frequent portion of harassment reported by the students was from strangers at 16.2 percent through e-mail and 19.3 percent through an instant messenger (Finn, 2004). Also, over 14 percent reported that they received harassing e-mails even after they requested the action to stop, whereas over 13 percent received similar instant messages after they requested the action to stop (Finn, 2004). Finally, over 81 percent reported using instant messengers once or more a week, over 88 percent reported never using a chat-room, no demographic differences were found in relation to the use of e-mail, instant messengers, or chartrooms, and no differences in online harassment were associated with the frequency of internet use (Finn, 2004). According to Kennedy and Taylor (2010), a 77-question self report survey study was conducted at a Southwest university. The study focused on personal use of social networking websites, personal activities conducted while online, and the types of victimizations that may have been experienced due to the use of social networking websites (Kennedy & Taylor, 2010). The subjects were 354 undergraduate criminal justice students (60 percent male and 40 percent female) who received course credit for their participation; however, participation was voluntary and the students could choose 24 not to complete a portion of the survey and still receive full credit (Kennedy & Taylor, 2010). Respondents were debriefed after completing the survey if they felt they had found the survey to be discomforting (Kennedy & Taylor, 2010). The participant's average age was 22 while 25 percent of the sample was 18 and the remaining majority being under 21 (Kennedy & Taylor, 2010). Most of the students were Caucasian (60 percent), 13 percent Hispanic, 10.5 percent African-American, 8.8 percent Asian, and 7.7 percent being of other (Kennedy & Taylor, 2010). The study concluded that sexual harassment and a pestering form of harassment occurred most frequently online (Kennedy & Taylor, 2010). Verbal harassment appeared to occur equally online and offline (Kennedy & Taylor, 2010). Fearful threats also occurred more frequently online rather than offline (Kennedy & Taylor, 2010). It was found that those with private profiles received far less harassment than those with semi-private or non-private profiles (Kennedy & Taylor, 2010). Furthermore, over 31 percent of the students had an online relationship that later lead to a face-to-face meeting and an offline relationship (Kennedy & Taylor, 2010). In contrast, 29 percent of the students had blocked a contact online to prevent future contact (Kennedy & Taylor, 2010). Stalking Stalking is a form of interpersonal victimization that can be defined as the same person repeatedly exhibiting pursuit behaviors that appear obsessive and therefore makes a respondent afraid or concerned for his or her safety (Fisher, Cullen, & Turner, 2002). Recently, in the past two decades, stalking has emerged as a major concern nationwide, and has most notably become a concern after actress Rebecca Shaeffer was shot to death 25 in 1989 by an obsessed fan (McAnaney, Curliss, & Abeyta-Price, 1993). The emergence of this social problem has created policy intervention and lead to the implementation of several educational organizations, victim service organizations, and state and federal laws (Fisher et al., 2002). In short, the issue of stalking is documented to precede other forms of violence and will be greatly discussed (Dietz et al., 1991). In 1989 an obsessed fan had stalked actress Rebecca Shaeffer for two years before murdering her. That same year, five other women were murdered within Orange County after being stalked by former boyfriends or spouses (McAnaney et al., 1993). The following year the first anti-stalking law was passed in California (Fisher et al., 2002). Currently all 50 states and the District of Columbia have enforced anti-stalking laws (Fisher et al., 2002). In addition to states implementing anti-stalking laws, the federal system has incorporated anti-stalking laws that do the following: enforce anti-stalking laws to serve as a model for the states, requires the Attorney General to compile an annual report that will be submitted to Congress containing all of the incidents and information of stalking and how effective anti-stalking legislation has been compared to previous stalking statistics, and prohibit stalking between numerous states and stalking on federal property or jurisdictions (Fisher et al., 2002, p.258). According to an early study regarding stalking by Holmes (1993), it was determined that stalking is a social condition that is attracting attention within areas of the criminal justice system, social sciences, and behavioral sciences. Holmes (1993) concluded that "As criminal justice practitioners, we are concerned with the early identification of those who stalk their victims" (p.326). This is most notable because it 26 has been determined that stalking is presumed to precede other forms of violence (Dietz et al., 1991).Therefore, stalking may lead to more and possibly many other forms of violence such as sexual harassment, sexual assault, domestic violence, and homicide (Fisher et al., 2002). A collection of stalking behaviors, stalking characteristics, and stalking victims have been linked throughout several studies. In general, stalking is mostly directed towards women, the vast majority of offenders are male, most stalkers are young (20 to 34 years of age), stalkers vary in their socioeconomic background, offenders have an above- average intelligence level, and stalking may lead to other forms of violence (Mustaine & Tewksbury, 1999). According to Norris (1988) stalking may lead to sexual assault, according to Keeney and Heide (1994), stalking may lead to homicide, according to Coleman (1997), stalking may lead to domestic violence (Coleman, 1997; Harrell, Smith, & Cook, 1985). Also, it has been shown that on some occasions the offender is a well-known acquaintance of the victim (Coleman, 1997; Harrell et al. 1985). Several studies throughout the years have attempted to estimate the numbers of stalkers within the United States. For example, the National Institute of Justice (1996) and National Victim Center (1997) estimated that there were somewhere between 20,000 and 200,000 offenders. In 1997 the Stalking Victim's Sanctuary estimated that there were more than 500,000 offenders. In contrast, studies also attempt to estimate the numbers of victims. According to the National Victim Center in 1997, it was projected that one in twenty women would be a victim during her lifetime, and in 2000 the National Violence Against Women Survey (NVAW) estimated that more than one million women and 27 almost 200,000 men were stalked that year (Jasinski & Mustaine, 2001). According to Fremouw, Westrup, & Pennypacker (1996), 30.7 percent of their subjects were victims to stalking behaviors, Mustaine and Tewksbury (1999) reported that 10.5 percent of their female subjects had been a victim of stalking, Bjerregaard (2000) found that 24.7 percent of the female respondents were victims of stalking, Tjaden and Thoennes's (1998) study discovered that 8 percent of their female subjects had been stalked at least once in their lives, and Fisher and her colleagues determined that 13.1 percent of their female students were victims of stalking. A study of undergraduate women enrolled at the West Virginia University was conducted to determine the acquaintance and prevention of stalkers that they had encountered (Fremouw, Westrup, & Pennypacker, 1996). Fremouw et al. (1996) surveyed two sets of subjects first acknowledging if they had ever been stalked and then if they had known their offenders. The combination of the subjects revealed that 30.7 percent of them had been stalked and over 40 percent of the subjects were acquainted with the offenders (Fremouw et al., 1996). In addition, according to Fremouw et al. (1996), the subjects primarily chose to simply ignore those who were stalking them or would hang up during their telephone calls. Some subjects confronted the stalker or changed their schedule to avoid the stalker as other means of coping with their obsession (Fremouw et al., 1996). Shockingly, seeking the police or courts for help were often methods of last resort (Fremouw et al., 1996). Another study, led by Coleman (1997) designed a survey which was modeled after Florida's anti-stalking statutes. This small sample study attempted to determine how 28 often women were stalked after ending a relationship (Coleman, 1997). Out of the 141 female undergraduate students that were surveyed from psychology classes, 29.1 percent revealed that they had received repeated and unwanted attention from their former partner after ending the relationship (Coleman, 1997). In addition to the previous examples of offline stalking, with the advent of technology, online forms of stalking are now taking place (D’Ovidio et al., 2009). The same features of the internet that allow people to access new opportunities for education, shopping, entertainment, and love provide new opportunities for crime or influence one to commit crime. For example, Maine's Computer Crimes Task Force reported a rise in reports of online stalking of children. Task Force cases of internet crimes against children soared 237 percent in 2010 (Anonymous, 2004). Overall, the unit's caseload doubled to 1,216 (Anonymous, 2004). The internet and its community provide an avenue for victimization for those who might otherwise not be viable targets for crime if they were not present online (D’Ovidio et al., 2009). The first online stalking law went into effect in 1999 in California, and the current US Federal Anti-Cyber-Stalking law is found at forty seven United States Code section two hundred and twenty three (Hancock, 2000). Cyber-stalking is defined as repeated threats or harassing behavior over e-mail, the internet, or other electronic communications (Hancock, 2000). Moreover, internet stalking can be carried out in the same room as the victim, or as far away as another state or country (Hancock, 2000). Technology allows for stalkers to harass their victims in a manner that allows no need to physically confront them (Hancock, 2000). Unfortunately, there are no clear statistics on 29 the number of internet stalking victims, but an August 1999 report from the Department of Justice estimates that there could be hundreds of thousands affected, and the numbers continue to grow (Hancock, 2000). Since the internet is such a new innovation, there is minimal legislation governing the internet or subsequent research available (Goodwin, 2003). Initiatives to deal with individuals who use the internet for criminal behavior are sparse (Goodwin, 2003). Also, legal institutions are trying to combat the ability for internet crime to cross state and international borders (Goodwin, 2003). However, such operations are difficult (Goodwin, 2003). In addition, the place where the most cyber-stalking information is available is on the internet itself (Goodwin, 2003). Unfortunately, there are few studies surrounding cyber-stalking, but it appears that men are the predominant perpetrators in this form of behavior (Goodwin, 2003). This difference is attributed to the higher number of men “trolling” on the internet (Goodwin, 2003). A nonprofit organization, Working to Halt Online Abuse (WHOA), reports that it receives about 100 requests a week seeking information on how to stop internet stalking from occurring (Finn, 2004). As more people use the internet, the amount of cyberstalking is likely to increase (Finn, 2004). In fact, the construction of the internet may promote cyber-stalking (Finn, 2004). Online environments can lend to a false sense of intimacy or intentions and may potentially promote more cyber-stalking behaviors (Finn, 2004). Also, the sense of anonymity and the lack of social status cues may lead to greater risk-taking behaviors (Finn, 2004). 30 Cyber-stalking is similar to traditional forms of stalking in that it incorporates persistent behaviors that instill fear (Ogilvie, 2001). For example, a woman in Queensland, Australia received multiple e-mails that became more and more threatening after she asked for the e-mails to stop (Ogilvie, 2001). Ultimately, she received death threats from the perpetrator claiming that he was going to video-tape raping her and then upload the video onto the internet (Ogilvie, 2001). In the U.S., a college student harassed five other female students after purchasing information about each of the girls over the internet (Ogilvie, 2001). This stalker sent over 100 messages including death threats and was able to describe their daily activities (Ogilvie, 2001). Each of these offenders' e-mail accounts could be traced and their identities could be established in the same way a letter could be traced through the postal system (Ogilvie, 2001). A majority of these cases did not involve complex forms of stalking, and e-mail was simply being used as an alternative form of communication (Ogilvie, 2001). Unfortunately there are now anonymous remailers that can halt this traceability (Ogilvie, 2001). Anonymous remailers allow the sender's identity to be masked and allow the e-mail content to be concealed (Ogilvie, 2001). As with offline stalking, few examples of stalking are confined to one form (Ogilvie, 2001). While e-mail stalking may be similar to traditional stalking in some instances, it is not restricted to this format (Ogilvie, 2001). Many would assume that personal use of the internet would be needed in order to be victimized by a cyber-stalker; however, the following incident proves otherwise (Goodwin, 2003). A woman met a 51 year old male through church (Goodwin, 2003). Eventually the man decided to ask the woman out on continuous dates but the woman 31 always refused (Goodwin, 2003). Soon after, the man retaliated by posting the woman's personal details on the internet, including her physical description, address, telephone number, and details of how to bypass her home security system (Goodwin, 2003). In addition, he posted false rape and sexual fantasies to forums online (Goodwin, 2003). Multiple men soon arrived at her home to take advantage of these alleged fantasies, as well as leaving sexual phone messages on her machine (Goodwin, 2003). The woman then posted messages to her door stating these requests were false, and the perpetrator followed by posting messages online that these were simply tests to determine who was in fact worthy of her fantasies (Goodwin, 2003). The victim was eventually forced from her home, suffered from weight loss, lost her job, and developed a fear of going outside (Goodwin, 2003). Another example of online stalking includes a female school teacher who decided to meet a man (Andrew) from the internet offline that she originally met while online (Goodwin, 2003). After she met Andrew, she began to get nervous when he wanted to get married right away (Goodwin, 2003). Therefore, she immediately made it clear that she had no romantic interest (Goodwin, 2003). However, he persisted with email messages, letters, packages, and telephone messages (Goodwin, 2003). He began to watch her through the windows of her work and began to develop friendships with other people in her life (Goodwin, 2003). He called her mother, neighbor, and friends, and only stopped after she contacted the police and he was later prosecuted for harassment (Goodwin, 2003). Youths are especially involved in online socialization with various methods of internet communication, such as e-mail, chat-rooms, instant messaging, and social 32 networking websites (Marcum, 2008). Moreover, not only are there more teens using the internet to socialize, they are also spending more time online (Marcum, 2008). Unfortunately, while the use of the internet can produce positive interaction and relationships for its users, these youths that are spending extensive amounts of time online are also placing themselves at risk for victimization (Marcum, 2008). The study by Marcum indicated that communicating with people online and providing personal information to online contacts increased the likelihood of victimization in the form of stalking (Marcum, 2008). Students attending colleges are increasingly dealing with cases of cyber-stalking (Finn, 2004). It is believed that students are especially vulnerable to stalking and/or cyber-stalking because they interact within a small community where class schedules, phones, and e-mails are easily accessed (Finn, 2004). Most college students are in the age range of 18 to 29 which coincides with stalking profiles (Finn, 2004). It is also argued that stalking may become a problem on college campuses because most college students are at the age where they are seeking a sexual relationship (Finn, 2004). A study conducted by Rosen examined 1,257 users of the social networking website, MySpace (Rosen, 2006). It was found that only 1.5 percent of the sample reported being stalked and only 4.6 percent of that sample reported being solicited for sex (Rosen, 2006). It was also found that women were more likely to have been solicited for sex while online (Rosen, 2006). Consequently, those who had been actively using the website for an extended period of time increased their likelihood of victimization (Rosen, 2006). 33 Finally, nonrandom samples of 354 criminal justice students from the University of Nevada, Las Vegas were surveyed on victimization while using social networking websites (Taylor, 2008). This study concluded that more subjects had been victimized offline than online (Taylor, 2008). Similar to Kennedy and Taylor's 2010 study, no students claimed they had changed their daily activities due to a stalking incident offline; however, several students changed some of their personal information, including phone numbers, address, or e-mail address due to online stalking (Taylor, 2008). Sexual Exploitation Sexual exploitation is a form of interpersonal victimization that can be defined as the use of another person in non-consensual and/or consensual sex for profit (Mitchell, Jones, Finkelhor, & Wolak, 2011). Unfortunately, there are an abundance of forms of sexual exploitation, and together, they vary considerably in terms of frequency, severity, implication, prevention, and intervention (Mitchell et al., 2011). Some examples of sexual exploitation include the production and sale of pornography, prostitution, trafficking of individuals for sex, the mail order bride trade, forced marriages, and forced performances in strip clubs (Mitchell et al., 2011). Sexual exploitation is a form of interpersonal victimization driven by exploiters (Fontana-Rosa, 2001). An exploiter is a person who is exclusively interested in a monetary profit (Fontana-Rosa, 2001). Even though the exploiter may not be a pedophile, he can be considered a sex offender in that he specifically exploits others for a profit (Fontana-Rosa, 2001). Most literature describes sexual exploitation as being driven by financial or economic benefit for another person, and financial benefits may include monetary and nonmonetary profits (Mitchell et 34 al., 2011). Nonmonetary items include food, shelter, drugs, and other forms of commodities for trade (Mitchell et al., 2011). It should also be noted that this form of victimization is becoming increasingly popular among children, and most importantly for this study, on the internet (Mitchell et al., 2011). Sexual exploitation is one of the biggest and fastest growing businesses of organized crime in the world (Walker-Rodriguez& Hill, 2011). It is estimated that nearly 293,000 American youths are at risk of falling victims to sexual exploitation each year (Walker-Rodriguez& Hill, 2011). The majority of these youths are those who have runaway and have succumbed to the life of prostitution through mechanisms of sexual exploitation, and research concludes that these children generally come from abusive homes (Walker-Rodriguez& Hill, 2011). Additionally, other victims of sexual exploitation are forced into the prostitution lifestyle through abduction (WalkerRodriguez& Hill, 2011). Sexual exploitation is a notoriously vague topic for researchers within the United States, the inherently concealed operation of this victimization makes it difficult for researchers to obtain data on the number of individuals affected by these crimes. With this in mind, the lack of literature on sexual exploitation reflects that challenge. However, there is some research that has revealed the characteristics of sexually exploitive predators and the demographics of the victims at hand (Walker-Rodriguez & Hill, 2011). The media often has highlighted extreme forms of sexual exploitation, reporting stories of how victims who have trusted strangers have been raped and murdered, and the offline 35 exploitation methods of predators hanging out by schools and parks, looking for specific victims to prey upon (Walker-Rodriguez & Hill, 2011). Over the past couple of decades, research shows a convergence of similar characteristics among those victimized by sexual exploitation (Kramer & Berg, 2003). They include those who are most likely to share similar characteristics of being from single-parent households, being isolated, having family problems, having low selfesteem, poor social skills, and are introverted (Kramer & Berg, 2003). One of the most common forms of entrance into sexual exploitation is prostitution. According to Kramer and Berg (2003), common risk factors associated with entry into prostitution includes childhood abuse, behaviors reflecting running away from home, homelessness, and drug addiction. Furthermore, entry into prostitution can occur first and increase the likelihood of experiencing other forms of sexual violence (Kramer & Berg, 2003). It has been well documented that those involved in prostitution have high rates of sexual abuse, and in turn, victims of sexual abuse have been shown to be particularly vulnerable to becoming involved in abusive and sexually exploitive relationships as adults (Kramer & Berg, 2003). According to Simons and Whitbeck (1991), an analysis of 40 adolescent runaways and 95 homeless women revealed that sexual abuse has a significant impact on the probability of entry into prostitution. In 2000, Tyler, Hoyt, and Whitbeck reaffirmed these previous findings when concluding that sexual abuse in the home has a direct positive effect on sexual victimization of adolescents on the streets. It is a trend that women in prostitution often report a history of childhood physical abuse as well as sexual 36 abuse (Kramer & Berg, 2003). In recent studies, 60-70 percent of prostitutes report being abused as children (Kramer & Berg, 2003). For example, through the use of event-history analysis, it is possible to assess the impact of childhood risks and the likelihood of entry into prostitution (Kramer & Berg, 2003). According to Kramer and Berg (2003), educational level, homelessness, poverty, and many other lower social class characteristics also have a significant effect on the entry into prostitution (Kramer & Berg, 2003). It is well documented that those who were victims to sexual and physical abuse often portray fear, anxiety, depression, selfdestructive behavior, anger, aggression, guilt and shame, an impaired ability to trust, an increased likelihood of re-victimization in adulthood, sexually inappropriate behavior, educational problems, and running away (Kramer & Berg, 2003). Ultimately, the negative and influential events that have occurred in these victim’s lives help understand how sexually exploitive predators operate. It is suggested that sexually exploitive predators prey upon the outcomes of abuse in an individual’s past and coerce individuals into prostitution (Kramer & Berg, 2003). It has become evident that the majority of exploited victims are lured into prostitution as a result of deception, and coercion on behalf of the predators (Blackburn, Taylor, & Davis, 2010). It is also understood that these predators may approach a victim under the pretense of providing a legitimate job, but when the job does not materialize, it becomes obvious that the exploited individual is expected to perform acts of prostitution in order to repay exploiters for food and shelter that they have been providing (Blackburn et al., 2010). Collectively, repayment, rape, 37 physical violence, and other means of control are powerful methods to keep the victim in a lifestyle of prostitution (Blackburn et al., 2010). Another common form of sexual exploitation is sexual trafficking. Recently there have been reports on the news of individuals from all over the world traveling to foreign countries to partake in illegal sexual acts. For example, in March of 2009, three men from Australia were arrested for child sex tourism and possession of child pornography (Blackburn et al., 2010). Also, in July of 2009, a Canadian male was arrested for child sex tourism and the production and distribution of child pornography (Blackburn et al., 2010). Lastly, late in 2009, three American men were expelled from Cambodia for pursuing sexual acts with a ten year old girl and two young boys. The review of these news reports illustrates the problem of child sexual exploitation. Trafficking for the purposes of sexual exploitation is a social problem that has grown exponentially around the world (Blackburn et al., 2010). Unfortunately, data regarding trafficking and sexual exploitation remains sparse, but it is understood that thousands of women and children are being sexually trafficked (Blackburn et al., 2010). It was found that one third of those sexually exploited are younger than the age of 18, and it was also discovered that girls as young as 5 years old are in the sex trade business (Blackburn et al., 2010). It is estimated that profits from child sexual exploitation are roughly a billion dollars a year. Unfortunately, there are no known specific estimates to the extent of the trafficking problem worldwide, and the industry continues to be elusive. Although, it is estimated that 40,000 to 500,000 prostitutes are currently working in areas such as Cambodia (Blackburn et al., 2010). Even though there are no hard statistics 38 representing the true amount of women and children in the sex trade, the estimates at hand clearly illustrate the magnitude of the sexual exploitation problem. A research team facilitated by Blackburn et al. (2010) used interviews and observations in Cambodia and Thailand from June of 2004 throughout 2006 to reveal the complexity and inner workings of sexual exploitation. Over 100 interviews with government officials and another 80 interviews with adult prostitutes and victims of sexual trafficking of children were conducted (Blackburn et al., 2010). The victims that were interviewed were those who were rescued from the sex trade within Cambodia and Thailand (Blackburn et al., 2010). Also, trips to massage parlors, strip clubs, and brothels were conducted to observe real scenarios and settings of the sex trade (Blackburn et al., 2010). In the study it was found that sexual services were commonly coming from females ranging from 7 to 16 years of age (Blackburn et al., 2010). Also, prices ranged from $2 for oral sex up to $35 for vaginal intercourse (Blackburn et al., 2010). In contrast to other research studies, most of the individuals in this sexual market were found not to be forced or kidnapped and then sold into the market (Blackburn et al., 2010). According to the majority of the individuals interviewed, sexual exploitation does occur, but it is not as common as those entering into the trade by themselves (Blackburn et al., 2010). This is believed to be due to the extreme poverty found in Southeast Asia and may not be applicable to the rest of the world (Blackburn et al., 2010). Notably, it was found that 2 girls out of the 80 interviewed had been bought and sold into the trade (Blackburn et al., 2010). 39 Ultimately, sexual exploitation is driven by money (Blackburn et al., 2010). According to the study by Blackburn et al. (2010), extreme poverty and the desire to make money is one of the driving factors behind entering the sex trade. However, not all those entering the sex trade enter as a personal choice (Blackburn et al., 2010). Unfortunately, for those who enter willingly or unwillingly, exploiters often promise legitimate work but then fail to provide (Blackburn et al., 2010). Moreover, victims are afraid to come forward because they may not understand the criminal justice system, speak the language of origin, may be embarrassed, may be afraid of their exploiters, and/or may be without money or passports (Bernat & Zhilina, 2010). Fundamentally, profit is the motivating factor for those who sexually exploit others, and disturbingly, those who are seeking sexual pleasure are often financially supporting sexual exploitation (Blackburn et al., 2010). It is found that places like Cambodia and Thailand in particular are overwhelmed with sexual exploitation due to inexpensive rates, and these rates can often be found on the internet (Blackburn et al., 2010). In addition to offline sexual exploitation, the advance of computer technology has fostered an extreme growth of sexual exploitation among the internet (D’Ovidio et al., 2009). In fact, the internet is currently the primary facilitator of sexual exploitation (Blackburn et al., 2010). The internet allows individuals to discover multiple destinations quickly and easily in search of sex tourism (Blackburn et al., 2010). Also, it has been found that through websites and chat-rooms over the internet, sex tourists share details about the best countries to visit for prostitution (Blackburn et al., 2010). These details go as far as revealing how well the prostitutes performed, the costs for the services, and the 40 individual’s physical characteristics (Blackburn et al., 2010). Interviews provided in the Blackburn et al. (2010) study revealed that men found out about specific areas in Cambodia and Thailand on the internet. The study also found that it was easy to find sex tourism in Cambodia and Thailand on the internet through a general search engine web search (Blackburn et al., 2010). Likewise, it was found that host websites catering to child sex advocates, such as North American Man/Boy Love Association, promote package tours to select countries (Blackburn et al., 2010). As these are only a few examples proliferated by the use of the internet, it is important to review why the internet has flourished as a sexual exploitation medium. The internet has allowed access to information quickly, efficiently, and anonymously for business and communication; however, is has also created a means of seduction for individuals, and lures individuals into potential danger while accessing “friendly” environments, such as chat-rooms and social networking websites allowing for the sexual exploitation of individuals (Marks, 2007). It should be noted that a horrifying feature of sexual exploitation is that the internet provides an additional mechanism of interpersonal victimization (Mitchell et al., 2011). Traditional forms of offline sexual exploitation still occur, but now with the advent of the internet, there are additional forms of seduction and forms of solicitation for individuals to utilize (Mitchell et al., 2011). A rampant form of sexual exploitation that is being dispersed by the internet is child pornography (Lanning, 1984). Child pornography has become one of the most prevalent forms of sexual exploitation since the introduction of the internet (Lanning, 1984). In addition, child pornography is directly linked to the sexual abuse of children 41 (Lanning, 1984). However, the sexual abuse of children during pornographic production is only part of the exploitation (Lanning, 1984). One aspect of child pornography is its intention to lower the inhibitions of children and encourage children to engage in similar activities (Lanning, 1984). According to Lanning (1984), pornography helps to groom children and persuade them that they would enjoy certain sexual acts. Furthermore, such sexual images help exploiters rationalize their requests and help neutralize the abuse (Lanning, 1984). However, all of these uses by exploiters help trap children in abusive situations (Lanning, 1984). Also, sexual exploiters may blackmail individuals by threatening disclosure of photographs they may have shared with them (Lanning, 1984). Exploiters use the internet to make contacts with other exploiters to trade and share homemade or commercial illegal pornography around the world (Blackburn et al., 2010). An exploiter may now disperse pornography from one end of the world to the other with little risk involved with the assistance of the internet (Marks, 2007). Currently hundreds of thousands of sites capitalize from the dispersion of exploitive material, and many pornographers have developed websites, databases, forums, and chat-rooms dedicated to illegal child pornography and pedophilia (Blackburn et al., 2010). Furthermore, criminologists believe that child pornography is the predecessor to further sexual exploitation (Kramer & Berg, 2003). To illustrate the severity of sexual exploitation, Quayle and Taylor (2001) conducted a case study showing how offenders move through a range of offending behaviors. In addition, the researchers discussed how the internet is significant in supporting sexual exploitation by potentially victimizing children through the trading of 42 child pornography and child seduction (Quayle & Taylor, 2001). In the study, the internet was the primary means of communication with others and that communication mostly took place through chat-rooms (Quayle & Taylor, 2001). It is important to note that a participant in the study was able to maintain anonymity and portray himself through deceptive personas (Quayle & Taylor, 2001). For example, he would display himself either as a boy or an adult (Quayle & Taylor, 2001). Furthermore, it was found that the participant initially engaged in conversations and met individuals through chat-rooms (Quayle & Taylor, 2001). After establishing a relationship, he would then attempt to engage in cyber-sex to fulfill his sexual fantasies (Quayle & Taylor, 2001). Interestingly, the participant would use gestures that appeared to be genuine but these efforts were often deceptive in that they were only used to victimize the individual (Quayle & Taylor, 2001). For example, in order to meet victims offline he would present them with gifts in hope to gain further (sexual) contact (Quayle & Taylor, 2001). Conclusively, many researchers believe that the online community supports most sexual deviance (Kramer & Berg, 2003). Moreover, it is suggested that the internet facilitates the sexual exploitation of individuals by providing a new, effective, convenient, and more anonymous environment for predators to access and groom victims, produce and distribute illegal pornography, contact and stalk individuals to engage in sexual acts, and sexual tourism for personal and commercial purposes (Marks, 2007). Identity Theft According to Reisig, Pratt, & Holtfreter (2009), in 2008 there was an estimated 221.3 million people in the United States accessing the internet. Also, in 2007, the 43 internet generated over $136 billion in sales, an increase of 19 percent from the previous year, and annual surveys reveal an overwhelming increase in internet use and online sales (Reisig et al., 2009). On the other hand, the use of the internet can also expose innocent victims to those who access the internet in search of criminal opportunities (D’Ovidio et al., 2009). As previously mentioned, the internet allows for the efficiency of managing emails, obtaining news quickly, or managing finances; however, in spite of the benefits studies show that a majority of internet users and consumers believe the risks associated with internet use are extremely dangerous (Reisig et al., 2009). In fact, reports suggest that nearly 70 percent of internet users believe they are more likely to become a victim of an internet related crime rather than a physical crime (Reisig et al., 2009). Identity theft is a form of interpersonal victimization that can be defined as the unlawful use of another’s personal identifying information, such as their Social Security Number (SSN), date of birth, or mother’s maiden name (Allison, Schuck, & Lersch, 2005). Most literature describes identity theft as being driven by financial gain by fraudulently establishing credit, running up debt, or taking over someone else’s existing financial accounts (Allison et al., 2005). Unfortunately, there is an abundance of forms of identity theft, and they vary in frequency, severity, implication, and prevention. For decades, identity thieves have been obtaining personal information in numerous ways (Allison et al., 2005). For example, traditional offline methods may include stealing a wallet or purse, or digging through someone else’s trash (Allison et al., 2005). In fact, thieves can obtain extremely sensitive information by digging through another person’s garbage (Allison et al., 2005). Additionally, this form of victimization is becoming 44 increasingly popular due to the introduction of the internet and the severity of identity theft has become worse. Identity theft has become a serious problem because it can take a long period of time before a victim is aware that a crime has taken place against them (Allison et al., 2005). Often time, substantial harm has been done to a victim’s credit rating well before they are aware of it (Allison et al., 2005). In some instances, identity theft victims are able to resolve their victimization quickly; however, others face detrimental effects to their financial records (Allison et al., 2005). For example, individuals have been refused loans, have lost job opportunities, or have been arrested for crimes they did not commit (U.S. General Accounting Office, 2009). Many theorists suggest that identity theft is one of the greatest threats to the U.S. economy (Allison et al., 2005). According to the U.S. General Accounting Office (USGAO) (2002) in 1995, identity theft accounted for over $442 million dollars. In 1997, identity theft accounted for over $745 million dollars (U.S. General Accounting Office, 2002). In addition, the Federal Trade Commission estimates that 10 million people or 4.6 percent of the U.S. adult population will become victimized through identity theft within the year (Federal Trade Commission, 2000). This estimate projects possible losses exceeding $50 billion dollars (Federal Trade Commission, 2000). Recently several agencies have introduced bills to prevent identity theft and enforce laws prohibiting such crimes. The Federal Trade Commission is one of the main agencies that collect information regarding identity theft. In 1998, the Identity Theft and Assumption Deterrence Act passed forcing the Federal Trade Commission to keep a log of all complaints made by individuals regarding identity theft (Federal Trade 45 Commission, 2000). According to the Federal Trade Commission (2003), there were 31,117 cases of reported identity theft in 2001, 86,198 in 2002, and 161,819 in 2003. This is a reported increase of 277 percent and 187 percent respectively. In addition, the Federal Trade Commission also compiled victim and offender demographics concerning identity theft (Federal Trade Commission, 2003). Data indicated that the mean age for a victim was 41 years old, the majority of the victims did not know their offender, and it took 12 to 14 months before the victim realized that a crime had been committed against them (Federal Trade Commission, 2003). Despite efforts to prevent identity theft, vulnerabilities remain due to security weaknesses in information systems, and most importantly for this study, through the availability and display of personal information on the internet (Allison et al., 2005). Since the introduction of the internet, individuals have posted personal information for others to view through social networking websites, chat-rooms, instant messengers, and dating service websites (Allison et al., 2005). The development of the internet has created alternate venues for romantic encounters, and internet daters enjoy the interaction through these new technological environments (Rege, 2009). Some of the factors that make online dating attractive are that individuals do not have to leave their home and may access the dating site at any time, they can access the site privately and remain anonymous, they can interact using new forms of interaction, such as, live chats, instant messaging, and they can potentially find their “perfect match” quickly (Rege, 2009). In fact, internet dating has become so popular due to these features that there are now over 1,400 dating sites in North America 46 today (Rege, 2009). Also, it was estimated that individuals spent over $245 million dollars on dating services in 2005, and in 2008, the online dating industry grossed over $957 million dollars making it the fourth highest grossing internet industry (Rege, 2009). However, this industry of successful love match making is also an environment filled with scammers and identity thieves (Rege, 2009). For example, according to the National Consumers League (2008), on average, a victim being scammed lost more than $3,000 dollars in 2007. The digital environment for internet daters allows users to remain anonymous, be instantaneous, alterable, and open to interpretation, making online dating attractive and stimulating (Rege, 2009). However, one of the most recent forms of fraud taking place on the internet is romance scams through dating service websites (Rege, 2009). Romance fraud on the internet is a scam where victims believe that scammers have strong emotional feelings for them, and the romance component of the scam act, acts as bait to lure the victim. Once the scammer has lured the victim, the scammer then persists with identity theft or financial fraud. Researchers have discovered that the process all begins with the creation of a fake profile by the scammer. First, the scammer creates a profile page containing a list of hobbies, a well-articulated biography, and includes a picture. Then the scammer skims the dating website to initiate conversation with a potential victim. This is in an effort to establish a strong bond with the victim to generate trust, confidence, and romance. Over time, the scammer will then request money from the victim through alleged stories of tragic events. These may include recent theft, unexpected hospital expenses from an illness, or to secure funds to meet the victim. The 47 scammer always claims that they need more assistance as the alleged circumstances intensify. The more successful the scammer is in convincing victims of these stories, the more the victim is lured into the scam. Therefore, the scam continues until the victim loses patience or eventually realizes that they are being taken advantage of. Additionally, if victims do not comply with the scammer’s requests the use of emotional blackmail and extortion are used. For instance, if victims are unwilling to send money, then scammers argue that the victim does not have any feelings for them or claim that they were wrong to believe that they were establishing a meaningful relationship. This is only a trick to lure the victim back into the scam. Also, in cases where webcams are used, the scammers record the webcam video and later use these to extort money to prevent broadcast of the films and pictures on the internet. Researchers believe that due to the amount of time taken to establish the relationship with the victim, many victims do not believe they are being scammed making it extremely profitable for the scammer (Rege, 2009). According to Rege (2009), scammers exhibit certain traits in order to take advantage of their victims. For example, they use extreme patience in grooming their victims and establishing trust, they possess basic computer skills and an internet connection, they follow their routines thoroughly, they belong to networks to take advantage of specific resources, and they use neutralization techniques to rationalize their activities (Rege, 2009). All of these traits are important to successfully scam their victims. Consider the fraudulent cases involving Patrick Giblin (Rege, 2009). Giblin created several accounts where he claimed he was a law enforcement officer and he 48 would make contact with individuals online (Rege, 2009). After creating a relationship with a victim, he would then establish further contact through the telephone where he would state he had interest in pursuing a serious sexual relationship (Rege, 2009). Eventually Giblin would request financial help to relocate to the victim’s community (Rege, 2009). Over time, the women would wire him money through Western Union (Rege, 2009). Eventually Giblin was caught and charged in 2005 for defrauding nearly 130 women through dating sites (Rege, 2009). Collectively he gained $320,241 dollars from victims throughout nine different states (Rege, 2009). In another case, Robert Frost was a victim whose identity was stolen and used among various dating websites (Rege, 2009). In this case scammers retrieved pictures that were easily available on the internet (Rege, 2009). Robert Frost was a professional racecar driver, and in 2007, Frost noticed on several occasions women were acting strange towards him (Rege, 2009). For example, he was tracked down, sent flowers, and recognized at several public airports by women he had never met in the past (Rege, 2009). Unaware to Frost, his photos had been uploaded on several different dating websites by scammers to lure women (Rege, 2009). There were images of Frost on over 90 websites, and almost 80 different e-mail addresses and aliases were used (Rege, 2009). Eventually an internet security consultant was hired by Frost to understand the severity of his identity theft (Rege, 2009). At one point the consultant physically traveled to Nigeria and met with one of the “Robert Frosts” being used on the internet (Rege, 2009). When the consultant met with the man, he was a 24 year old whose true identity was George McCall (Rege, 2009). McCall claimed that he had not stolen the photo and used it 49 illegally because he had retrieved the photograph from the internet legally (Rege, 2009). Conclusively, the internet allows scammers to access all of the personal information needed to assume someone else’s identity (Allison et al., 2005). Scammers can access social networking websites and dating website profiles and sift through online identity databases to find suitable targets to victimize (Allison et al., 2005). The internet provides access to all of the sufficient information needed to victimize others (Allison et al., 2005). Summary To demonstrate the need for a review of interpersonal victimization on social networking websites, the current study broadly reviewed the issues of sexual harassment, stalking, sexual exploitation, and identity theft, and their transformation from traditional environments to the internet. Numerous studies have examined the specific characteristics and demographics of offenders as well as defined the risk-taking behaviors that many victims have exhibited. Currently there is a perception that there are dangers associated with the use of social networking websites (Perkel, 2008). Also, there is a copious amount of literature supporting that with increased use of social networking websites there is an increased risk for interpersonal victimization. Recognizing the need to focus on interpersonal victimization and the characteristics of risk-taking behaviors has provided more effective preventative strategies for users when encountering strangers on social networking websites. Studies have shown that sexual harassment is typically perpetrated by males against females, with higher rates of sexual harassment occurring when females engage in situations where there is a higher exposure to motivated offenders (DeCoster et al., 50 1999). Studies have also shown that sexual harassment may occur in many places and across various situations (Fisher et al., 2002). For example, the main form of sexual harassment that occurs online is posting personal information and sharing unwanted sexual photographs of others (Mitchell et al., 2005). One form of interpersonal victimization that is closely associated with sexual harassment due to the common traits that are exhibited between the two crimes is that of stalking. The issue of stalking was not a highly recognized problem until actress Rebecca Shaeffer was murdered in 1989 by a man who had been stalking her (McAnaney, Curliss, & Abeyta-Price, 1993). Studies have shown that women are the primary victims of stalking while men are typically the offenders (Mustaine & Tewksbury, 1999). Yet, despite the recent increase in the number of anti-stalking statutes, little is known about the extent of stalking due to a lack of research in the area. In addition to sexual harassment and stalking, another detrimental crime in society is that of sexual exploitation. Previously reviewed examples of sexual exploitation consisted of prostitution, sexual trafficking, and child pornography. Sexual exploitation is a form of interpersonal victimization driven by exploiters (Fontana-Rosa, 2001). Ultimately, sexual exploitation is driven by money (Blackburn, Taylor, & Davis, 2010). Over the past couple of decades, research shows a convergence of similar characteristics among those victimized by sexual exploitation (Kramer & Berg, 2003). Those who are most likely to share similar characteristics are from single-parent households, are isolated, have family problems, have low self-esteem, exhibit poor social skills, and are introverted (Kramer & 51 Berg, 2003). Ultimately, the negative and influential events that have occurred in these victim lives help understand how sexually exploitive predators operate. The motivated offenders seek suitable targets on the internet in an effort to sexually exploit them. Another form of interpersonal victimization that is similarly destructive like sexual exploitation is that of identity theft due to its common drive for money. Most literature describes identity theft as being driven by financial gain through fraudulently establishing credit, running up debt, or taking over someone else’s existing financial accounts (Allison et al., 2005). Identity theft has become a serious problem because it can take a long period of time before a victim is aware that a crime has taken place against them (Allison et al., 2005). The Federal Trade Commission estimates that 10 million people or 4.6 percent of the U.S. adult population will become victimized through identity theft within the year (Federal Trade Commission, 2000). This estimate projects possible losses exceeding $50 billion dollars (Federal Trade Commission, 2000). However, one of the most recent forms of fraud taking place on the internet is romance scams through dating service websites (Rege, 2009). The digital environment for internet daters allows users to remain anonymous, be instantaneous, alterable, and open to interpretation, making online dating attractive and stimulating (Rege, 2009). Romance fraud on the internet is a scam where victims believe that scammers have strong emotional feelings for them, and the romance component of the scam act, acts as bait to lure the victim. Once the scammer has lured the victim, the scammer then persists with identity theft or financial fraud. Conclusively, the internet allows scammers to access all of the personal information needed to assume someone else’s identity (Allison et al., 52 2005). Scammers can access social networking websites and dating website profiles and sift through online identity databases to find suitable targets to victimize (Allison et al., 2005). The internet provides easy access to all of the sufficient information needed to victimize others in numerous ways (Allison et al., 2005). The routine activities theory has been frequently applied to the issues of sexual harassment, stalking, sexual exploitation, and identity theft, and the majority of studies have found that the actions of victims have a significant impact on their risk of interpersonal victimization. The three variables that generally comprise the theory are the presence of motivated offenders, suitable targets, and the lack of guardianship over a person or thing. The concept of motivated offenders can be applied to social networking websites and can also be useful in explaining interpersonal victimization rates on the internet. According to researchers, it is likely that there will be individuals on social networking websites looking to commit criminal acts (Pierce, 2006). Additionally, the concept of a suitable target may be applied to the use of computers and the internet because there is easy access to victims. There are an abundant amount of users on the internet at one time and the offenders can relatively remain anonymous. Finally, the concept of guardianship is significant because users may perceive the internet as a safe place. For example, Pierce (2006) found that there was a correlation between trusting strangers on the internet and giving out personal information. During the past 20 years, the number of individuals using the internet has increased dramatically. For instance, individuals accessing social networking websites 53 are more likely to come into contact with potential motivated offenders. The rise in popularity of the internet has essentially changed their routine activities. Rather than using traditional forms of communicating in person, individuals now have the option of using the internet, and they are using it more often. This shift in the routine activities of these individuals will likely impact the types of crimes that are perpetrated against them. According to the routine activities theory crimes will likely increase when there is a convergence in time and space (cyber-space) of motivated offenders, suitable targets, and lack of guardianship. By understanding why individuals exhibit risk-taking behaviors and interact with strangers among social networking websites, preventative measures may be created to eliminate online interpersonal victimization. 54 Chapter 3 Methodology Traditionally, sources of data involving criminal events have been police department records. Unfortunately, police records only include reported events. With regard to victims, surveys attempt to provide reliable rates at which crime occurs and may also provide distinguishable characteristics of common victims. Over time, surveys have become one of the most popular ways of measuring people's concerns and fears about crime. There are numerous studies involving offline victimization and behaviors that lead to increased victimization; however, there are few studies that examine victimization occurring while individuals use the internet. Recently, moral panic has instilled fears about victimization as a result of using social networking websites. This study was designed to gauge interaction among strangers and the potential for victimization using social networking websites. This study intends to understand prevention, awareness, and theory involving the interaction of strangers among such websites. This chapter will discuss the methodology used by the researcher. The methodology will describe the process used to select the sample, the instrument used to collect the dataset, the variables used for the analysis, the coding of data, testable hypotheses, and the types of analyses to follow. Subjects It was estimated for the 2010-2011 academic year that were approximately 1,600 criminal justice major undergraduate students enrolled at California State University, Sacramento. Only the undergraduate students majoring in criminal justice were asked to 55 participate in a survey measuring personal computer and internet use. Moreover, by implementing a confidence interval of 5.0 percent and confidence level of 95.0 percent, a sample size of up to 310 subjects was necessary. In addition, according to the CSUS academic programs website (www.csus.edu/HHS/cj/History-of-the-Division.html), class sizes average fewer than 30 students; however, some criminal justice classes may now have up to 75 students. With the class average of 30 students in mind, it was estimated that 10 to 11 classes would be surveyed in an attempt to accommodate the approximate 310-subject sample size. Lastly, due to the possibility of instructors not accommodating access to their classes, simple random sampling generating classes with overlapping time schedules, and students being in multiple clusters, an estimated sample size of 310 subjects was only be used as an estimated target. A simple random sampling technique was used to select classes at CSUS of criminal justice major students enrolled in criminal justice undergraduate courses. First, undergraduate criminal justice courses were selected as individual clusters. The clusters were randomly selected with the use of a random sampling generator. The generator is designed for researchers and students to generate random numbers or assign participants to experimental conditions. The range of numbers were limited to the number of classes that were being offered for the semester (each course code was numbered in chronological order pertaining to its ascending number to eliminate any gaps that may be present in course codes). With the use of the generator, one set of 50 classes was generated. This process included grouping undergraduate students through criminal justice courses. Simple random sampling was applied to the population of the 56 undergraduate criminal justice courses to provide for a random sampling of undergraduate criminal justice courses. While only 10-11 classes were needed, 50 were selected randomly to fill the sample in case some instructors refused access to their classes. Student participation was completely voluntary and the students were free to end their participation at any time without prejudice. All surveys were anonymous. Instrument A questionnaire was developed and administered to collect information on why some students feel comfortable engaging with unknown persons through social networking websites (see appendix A). The questionnaire included 20 close-ended items and one open-ended comment prompt. These close-ended questions contained requests for the subjects to indicate the types of activities performed on the internet, the location of their computer use, how often the internet is used, whether or not there is presence of another person while using the computer, whether or not they are registered to social networking websites, information they may have posted on their personal social networking website, whether or not their personal social networking website is privatized, how often they have been requested or have "friended" an unknown person, whether or not they have conversed with the unknown person they have "friended," whether or not they have given personal information beyond what is accessible on their personal social networking website, whether or not they do any of the aforementioned activities with the use of a mobile device, whether or not they feel safe engaging with unknown persons among social networking websites, their gender, their age, and their marital status. After each question is a list of responses that the respondent is asked to 57 mark as their most fitting response. A full set of exhaustive and mutually exclusive responses are supplied. Other examples of questions simply ask the respondent to choose "yes" or "no”, fill in a blank space with a number, and/or circle a spot on a continuum. One open-ended question within the questionnaire allows respondents to offer comments. They are asked to fill in this space only if they have circled a spot on a continuum indicating whether or not they feel safe engaging with unknown persons among social networking websites. Data Collection California State University, Sacramento undergraduate students enrolled in criminal justice courses were asked to complete a questionnaire about their use of social networking websites and engagement with unknown persons. Current research reveals possible connections between social networking websites and increased likelihood of victimization. The questionnaire was designed to explain why some individuals may feel comfortable engaging with unknown persons through social networking websites. Instructors of the classes that had been selected from the use of the random number generator were e-mailed asking for permission to administer the survey indicated in Table 3.1. If permission was granted, the survey was arranged to be administered at the beginning of each scheduled class. Once the class began, the subjects were briefed from a script by the researcher (see appendix B), and a student volunteer from each of the scheduled class sessions was asked to pass out the self-administered survey to all of the students. During this time the researcher waited directly outside of the classroom while the volunteer distributed the questionnaires. This ensured anonymity. Once the 58 questionnaire was completed, the subject passed the survey to the front of the class where it was placed in a sealed envelope by the volunteer (the volunteer was also allowed to participate in the study). After all of the questionnaires had been collected, the volunteer then returned the sealed envelope to the researcher. The complete survey process averaged 14 minutes in length. Table 3.1:CSUS Criminal Justice Undergraduate Courses Selected Course # Course Description CRJ-2 CRJ-101 Law of Crimes Introduction to Criminal Justice Research Methods Crime and Punishment Sexual Offenses and Offenders The Structure and Function of American Courts Law of Arrest, Search, and Seizure Police Administration Contemporary Issues CRJ-102 CRJ-114 CRJ-121 CRJ-123 CRJ-142 CRJ-144 # of Students Enrolled 50 31 45 60 60 49 60 60 A total of 415 surveys were delivered to eight different selected courses as indicated in Table 3.1, but only a total of 288 completed surveys were returned. Additionally, demographic information for the sample is presented in Table 3.2. The current sample was 49.7 percent male, 48.3 percent female, and 2.1 percent (N=6) of the population declined to specify their gender. The average age of the participants was 25 and the median was 22 years of age. As indicated in Table 3.3, the majority of the participants were 21 years of age, making up 24.7 percent of the population. Only 3.5 percent (N=10) of the population declined to specify their age. Table 3.2 also shows that the subjects 59 were predominantly White (42.0 percent), while 19.1 percent of the population were Hispanic, 11.8 percent were Asian, 6.3 percent were Black, 2.8 percent were Pacific Islander, 0.3 percent were American Indian, 8.7 percent were multiracial, 4.2 percent identified themselves as being of other ethnicities, and 4.9 percent (N=14) of the population declined to specify their ethnicity. In addition, Table 3.2 shows that the subjects were predominantly single (85.1 percent), 6.3 percent were married, 4.2 percent were in a domestic partnership, 1.7 percent were separated, 0.3 percent were divorced, and 2.4 percent (N=7) of the population declined to specify their marital status. 60 Table 3.2:Demographics Variables Values Gender Age Ethnicity Marital Status Percentage Male Female Declined 15-25 26-35 36-45 46-55 Declined American Indian Asian Black Hispanic White Pacific Islander Multiracial Other Declined Married Divorced Separated Single Domestic Partner Declined 49.7% 48.3% 2.1% 81.3% 13.5% 1.4% 0.3% 3.5% 0.3% 11.8% 6.3% 19.1% 42.0% 2.8% 8.7% 4.2% 4.9% 6.3% 0.3% 1.7% 85.1% 4.2% 2.4% Table 3.3:Ages 15-25 by Age Variable Values Percentage Age 17 19 20 21 22 23 24 25 N 0.3% 2.8% 12.5% 24.7% 14.9% 11.5% 10.1% 4.5% 143 139 6 234 39 4 1 10 1 34 18 55 121 8 25 12 14 18 1 5 245 12 7 N 1 8 36 71 43 33 29 13 61 Testable Hypotheses This study tests three hypotheses: one hypothesis for each of the dimensions of the dependent variable; interpersonal victimization. Dimension one of the dependent variable: Motivated Offenders. H1A: Interpersonal victimization rates will increase when there is an increase in the number of motivated offenders encountered. Dimension two of the dependent variable: Suitable Target. H1B: Interpersonal victimization rates will increase when there is an increase in the number of suitable targets (subjects who provide personal information) that are easy to access by an offender. Dimension three of the dependent variable: Presence of Guardianship. H1C: Interpersonal victimization rates will increase when there is a lack of capable guardianship of persons or things present. Data Analysis Completed questionnaire responses were coded and then entered into SPSS for analysis. Analysis would examine if there were patterns concerning computer use, internet use, and encounters with unknown persons of those utilizing social networking websites. More specifically, this study sought to determine if there were specific predictors that may increase one’s likelihood to engage with unknown persons among social networking websites. The variables in this study were measured through a 21question survey on personal computer use, location of computer use, social networking 62 website use, types of personal information released, and experiences involving unknown persons on the internet. The dependent variable in this study was interpersonal victimization accessing the internet for California State University, Sacramento undergraduate students. The independent variables included activities performed on the computer, location of computer use, frequency of internet use, accessible personal information, and social networking website privatization. Furthermore, the dependent variable tests Cohen and Felson’s (1979) routine activities theory suggesting that when the independent variables are combined (suitable target, motivated offender, and lack of guardianship), they produce a heightened effect on the level of interpersonal victimization rates. It was hypothesized that one’s likelihood to engage with strangers among social networking websites would have an effect on interpersonal victimization rates. As outlined in the literature review, these interpersonal victimization rates include sexual harassment, stalking, sexual exploitation, and identity theft. The testable hypotheses for this study suggest that there will be variance in the interpersonal victimization rates with each addition of the dependent variables (motivated offenders, suitable targets, and lack of guardianship). To test these hypotheses, the data reflecting the dependent variable was analyzed for incidence rates. The questionnaire (see appendix A) can be broken down into three sections outlining Cohen and Felson’s (1979) variables concerning a suitable target, motivated offender, and a lack of guardianship. For instance, personal computer use, which includes using social networking websites and the estimated amount of time using the internet, were analyzed to determine the incidence 63 rate of a suitable target. The types of personal information released and the experiences involving unknown persons were analyzed to determine the incidence rate of a motivated offender. Lastly, the location of computer use, restrictions of use, and the presence of monitoring one’s use of a computer were analyzed to determine the incidence rate for a lack of guardianship. SPSS produced the rates and percentages to determine the presence of the aforementioned. To further define these terms, the incidence rates are the percentage of those who indicated computer and internet use, indicated the release of personal information and encounters with unknown persons, and indicated a lack of guardianship. The incidence rates express the number of experiences for each of the independent and dependent variables expressed by each of the subjects from the 288-sample population. Once the rates for the selected responses from the questionnaires were generated for each subject, various tables were compiled to express the incidence rates of each question on the survey. One table was compiled expressing personal information released and further access to personal information by an unknown person to compare these rates with each subject’s perception of safety. Another table was compiled expressing rates of page privatization, rates of contact by unknown persons, rates asking to view a private page, rates giving permission to view their pages, and rates of interaction with an unknown person and then comparing these rates with each subject’s perception of safety. An additional table expressing the percentages for the combined indicators of a suitable target, motivated offender, and lack of guardianship was compiled; and finally, the rates of a suitable target, motivated offender, and lack of guardianship were generated and a 64 table was compiled comparing the incidence rates with each demographic variable (gender, age, ethnicity, and marital status) as a means to produce possible predictors of interpersonal victimization. After all of the incidence rates and tables were compiled, a few responses from the open-ended question were analyzed and reported. Only select responses were reported illustrating perceptions of safety or unsafe experiences while accessing the internet. Limitations of Research Design One of the most significant limitations to the research design is the small sample size. There were approximately 1,600 criminal justice major undergraduate students enrolled at California State University, Sacramento, and only these criminal justice major undergraduate students were asked to participate in a survey. By implementing a confidence interval of 5.0 percent and confidence level of 95.0 percent, this projected an approximate sample size of up to 310 subjects; however, only 288 responses were retrieved. A sample size of only 288 students could largely affect the findings of this study by increasing the margin of error. Another limitation is the truthfulness and accuracy of responses supplied by the respondents. The dishonesty or inaccurate responses could significantly alter the findings of this research. As discussed in chapter one, a limitation to this study is the omission of data from each reporting subject. With an interviewer not being present, it is problematic because it will be difficult to clarify incomplete answers. This could potentially affect the findings of this research. Another limitation to this study is that the findings of this research may not be generalized to all academic majors, as well as other college campuses and college- 65 aged youth in general. Applying specific rates of interpersonal victimizations found in this research to other locations may not be possible or accurate. Lastly, criminal justice majors may also be more aware of becoming potential victims. This may skew the results in comparison to other academic majors that are not as aware. Further research examining interpersonal victimization on social networking websites throughout the nation could prove otherwise. 66 Chapter 4 Findings This study examines the interactions between unknown persons and the potential for interpersonal victimization while accessing the internet. Tables and figures in this chapter indicate the rates of interpersonal victimization for 288 criminal justice major undergraduate students from California State University, Sacramento. Various methods of examination including descriptive and bivariate analyses were conducted to test the hypotheses outlined in chapter three. Suitable Target Table 4.1 shows the breakdown of internet use for the students. An overwhelming majority (95.5 percent) of participants reported using the internet for e-mail, 95.1 percent used it for research, 83.0 percent accessed the web for shopping and social networking websites, 62.2 percent planned travel, 43.8 percent played games, and 40.6 percent communicated through an instant messenger. Despite the high levels of use, only 18.1 percent of the students accessed the internet for other purposes. Very few responded using the internet for chat-room use (9.0 percent) and website design (5.6 percent). 67 Table 4.1:Use of Internet Variables E-mail Research Social Networking Websites Shopping Planning Travel Gaming Instant Message Other Chat-rooms Website Design Percentage 95.5% 95.1% 83.0% 83.0% 62.2% 43.8% 40.6% 18.1% 9.0% 5.6% N 275 274 239 239 179 126 117 52 26 16 Personal computer use was compiled to understand the amount of time students use the internet throughout a day. Appendices C through F show the time spent on the internet over a 24-hour time period accessing e-mail, instant messenger services, chatrooms, and social networking websites. Numerous locations in the table are empty because these times were not selected. Appendix C depicts the use of e-mail services. The most common frequency of e-mail use was 1 hour (28.8 percent) and 2 hours (19.1 percent). Appendix D shows the use of instant messenger services, and an overwhelming amount of the students (70.1 percent) suggested that they do not use instant messenger services. Only 16.3 percent of the subjects indicated using an instant messenger leaving 12.2 percent of students utilizing instant messenger services over 2-6, 8, 10, and 24-hour time periods. In Appendix E, 94.0 percent of the students indicated they do not use the internet for chat-room purposes. Appendix F suggests a wide spectrum of social networking website use. One of the highest single percentages (16.7 percent) of subjects reported not using a social networking website page, although this does not mean that the majority of the population does not access one. For instance, 24.0 percent access their 68 social networking website pages for at least 1 hour, 15.6 percent for 2 hours, 11.8 percent for 3 hours, 4.2 percent for 4 hours, 9.4 percent for 5 hours, 3.5 percent for 6 hours, 1.0 percent for 8 hours, 5.2 percent for 10 hours, 0.3 percent for 12 hours, and 6.6 percent of the students access their pages 24 hours a day. Social networking websites are widely used by criminal justice major undergraduate students at California State University, Sacramento. Table 4.2 shows that a majority of the students (83.0 percent) access Facebook, 34.7 percent have a MySpace account, 13.5 percent use Twitter, 7.3 percent of the students use another unnamed version of a social networking website, and 3.5 percent of the students have a Friendster or Xanga account. Table 4.2:Social Networking Website Use Variables Percentage N Facebook MySpace Friendster Twitter Xanga Other 239 100 10 39 10 21 83.0% 34.7% 3.5% 13.5% 3.5% 7.3% Since the introduction of mobile phones, there has been a vast increase in the use of internet and its offerings of e-mail, instant messenger services, chat-rooms, and social networking websites. The subjects indicated whether or not they engaged in any of the aforementioned activities using a mobile device such as a smart phone. Table 4.3 indicates that 60.1 percent of the subjects use a mobile device to access the internet and other services. 69 Table 4.3:Frequency of Mobile Device Use Value Yes No Declined Percentage N 37.5% 60.1% 108 173 2.4% 7 Lack of Guardianship Table 4.4 illustrates the level of guardianship while using a computer. For example, the location of computer use represents guardianship. The computer was most often used (97.9 percent) within the subject’s home, 78.5 percent of the subjects reported using the computer at school, 31.6 percent use a computer at a friend’s, 19.1 percent at another location, and 16.7 percent at a coffee shop. Additionally, students were asked to indicate their primary location of computer use. Tables 4.4 indicates that the majority of the students (87.5 percent) used a computer at their home, and the remaining students accessed a computer at school (7.6 percent), at a different location (3.1 percent), at a friend’s (1.0 percent), or at a coffee shop (0.7 percent). Another component representing more guardianship is the presence of another person in the same room while using a computer. Table 4.4 points out that 37.5 percent of the subjects use a computer while someone else is present in the room. Only one subject declined to answer this question. Restrictions of computer use are the last component in Table 4.4 representing a lack of guardianship. Table 4.4 implies that 3.8 percent of the students are not restricted from specific content or the amount of time spent on a computer while using it. Only three subjects declined to answer to their restrictions while accessing a computer suggesting that a majority of the students (95.1 percent) are not restricted while using a computer. 70 Table 4.4:Guardianship of Computer Use Variables Values Location of Computer Use Primary Computer Location Presence of Other Restrictions Home School Friend's Other Coffee Shop Home School Friend's Coffee Shop Other Presence Declined Presence Declined N 282 226 91 55 48 252 22 3 2 9 108 1 11 3 Percentage 97.9% 78.5% 31.6% 19.1% 16.7% 87.5% 7.6% 1.0% 0.7% 3.1% 37.5% 0.3% 3.8% 1.0% Motivated Offender Individuals post various kinds of personal information on social networking websites. Figure 1 indicates the distribution of information posted on each subject’s social networking website. Five specific characteristics were posted most often, pictures (81.3 percent), gender (80.2 percent), age (66.7 percent), relationship status (65.4 percent), and hobbies (50.3 percent). The remaining characteristics were not as prevalent, for instance, extracurricular activities were posted by 32.0 percent, goals by 21.5 percent, a telephone number by 8.7 percent, descriptive characteristics such as eye color were posted by 8.3 percent, other characteristics by 8.0 percent, distress problems by 6.6 percent, and a home address was posted by 5.2 percent. 71 Number of Participants Figure 1: Type of Personal Information Posted on Social Networking Website 300 250 200 150 100 50 0 Yes No Personal Information Posted on Website Figure 2 indicates that subjects who provide unknown persons with descriptive information further than what is accessible on their website. Comparing Figure 2 with Figure 1, it is apparent that the level of information released from a private social networking page to an unknown person is very small. Figure 2 shows that personal information given to an unknown person beyond what is accessible on their website decreased significantly when compared to Figure 1. A subject’s age was the most common characteristic given to a stranger (10.8 percent), and the least common was the other category by only 1.4 percent. 72 Number of Participants Figure 2: Access of Personal Information Provided to an Unknown Person on Social Networking Websites 300 250 200 150 100 50 0 Yes No Personal Information Released to an Unknown Person Crosstabulation tables were compiled in order to analyze the perception of safety expressed by each subject (see Appendices G through K). The analysis indicated various levels of safety that the student’s experience while accessing social networking websites. Furthermore, the analysis compared the rates of each characteristic posted by subjects on their social networking website with their perception of safety. These analyses also compare the rates of each characteristic that was granted further access to unknown persons by subjects on their social networking website with their perception of safety. One of the most common characteristics (age) posted on a social networking website was also one of the most feared characteristics to be accessible to strangers. In spite of the fear, 43 subjects posted their age while 21 subjects who indicated feeling unsafe did not post their age. In contrast, eight subjects felt safe posting their age while only one subject who did not post their age felt safe. Six subjects who reported feeling 73 unsafe did permit further access to the characteristic of age to an unknown person while 60 of the subjects who reported feeling unsafe did not permit further access. In contrast, two people felt safe permitting further access to age by an unknown person while seven subjects who did not permit further access to age indicated feeling safe. Collectively, the majority of the students indicated they did not feel safe whether they did or did not post their age or allow further access to the characteristic of age. Gender was another one of the most common characteristics feared to be accessible on a social networking website, and despite feeling unsafe, 52 subjects posted their gender, and 12 subjects who indicated feeling unsafe did not post their gender. Only eight subjects felt safe posting their gender while one subject who did not post their gender felt safe. Six subjects who reported feeling unsafe did permit further access to the description of gender to an unknown person while 60 of the subjects who reported feeling unsafe did not permit further access. Meanwhile, two people felt safe permitting further access to gender by an unknown person while seven subjects who did not permit further access to gender indicated feeling safe. Overall, the majority of the students felt unsafe whether they did or did not post their gender or allow further access to the characteristic. While they reported feeling unsafe, two subjects posted descriptive characteristics on a social networking website and 62 subjects who indicated feeling unsafe did not post descriptive characteristics. It was also found that four subjects felt safe posting their descriptive characteristics while only five subjects who did not post descriptive characteristics felt safe. Three subjects who reported feeling unsafe did permit further access to descriptive characteristics to an unknown person while 63 of the subjects who 74 reported feeling unsafe did not permit further access. Only one person felt safe permitting further access to descriptive characteristics by an unknown person while eight subjects who did not permit further access to descriptive characteristics indicated feeling safe. The subjects expressed a lack of safety even if they did or did not post their descriptive characteristics or allow further access to the characteristic. Hobbies were found to be one of the most common characteristics posted on a social networking website, and it was found to be one of the most common descriptive characteristics that made subjects feel unsafe for others to possess. Twenty-nine of the students that felt unsafe posted their hobbies on a social networking website while 35 subjects who indicated feeling unsafe did not post their hobbies. In contrast, five subjects felt safe posting their hobbies while only four subjects who did not post their hobbies felt safe. It was indicated that three subjects who reported feeling unsafe did permit further access to the characteristic of hobbies to an unknown person while a majority of the subjects who reported feeling unsafe did not permit further access. In addition, two people felt safe permitting further access to hobbies to an unknown person while seven subjects who did not permit further access to hobbies indicated feeling safe. In short, most students indicated feeling unsafe posting or not posting their hobbies, or providing further access to strangers about their hobbies. Pictures were found to be one of the most common personal identifiers posted by students on their social networking website as well as one of the most feared characteristics to be accessible to strangers. Fifty-four subjects felt unsafe posting their pictures on a social networking website and ten subjects who did not post their pictures 75 also felt unsafe. Nine subjects felt safe posting their pictures while zero subjects did not post their pictures in order to feel safe. Five subjects who reported feeling unsafe did permit further access to their pictures by an unknown person while 61 of the subjects who reported feeling unsafe did not permit further access. In contrast, two people felt safe permitting further access to pictures by an unknown person while seven subjects who did not permit further access to pictures indicated feeling safe. Students felt unsafe on the internet if they did or did not post personal pictures or give them out to unknown persons. In spite of feeling unsafe, six subjects posted their telephone number on a social networking website while 20 percent indicated feeling unsafe did not post telephone number. Very few subjects (2) felt safe posting their telephone number while seven subjects who did not post their telephone number felt safe. Four subjects who reported feeling unsafe did permit further access to their telephone number by an unknown person while most (62) of the subjects who reported feeling unsafe did not permit further access. Only one person felt safe permitting further access to their telephone number by an unknown person while eight subjects who did not permit further access to their telephone number indicated feeling safe. Nearly all of the subjects report feeling unsafe by either posting or not posting their telephone number or by providing their telephone number to an unknown person. Only five subjects posted their home location on a social networking website even though they felt unsafe, and a majority of the subjects (59) did not post their home location also feeling unsafe. Two subjects felt safe posting their home location while seven subjects who did not post their home location felt safe. Almost none of the subjects 76 (one) reported feeling unsafe, but did permit further access to their home location by an unknown person; however, 65 of the subjects who reported feeling unsafe did not permit further access. It was indicated that one person felt safe permitting further access to their home location by an unknown person while eight subjects who did not permit further access to their home location indicated feeling safe. Almost all of the subjects feel unsafe posting or not posting their home address on a social networking website or permitting further access to the characteristic. Even though they felt unsafe doing so, twelve subjects posted their extracurricular activities on a social networking website while 52 subjects who indicated feeling unsafe did not post their extracurricular activities. In contrast, seven subjects felt safe posting their extracurricular activities while two subjects who did not post their extracurricular activities felt safe. Only one subject who reported feeling unsafe did permit further access to their extracurricular activities by an unknown person while 65 of the subjects who reported feeling unsafe did not permit further access. One person felt safe permitting further access to extracurricular activities by an unknown person while eight subjects who did not permit further access to their extracurricular activities indicated feeling safe. Most subjects feel threatened for their safety if they did or did not post their extracurricular activities or allow further access to the activities. In spite of feeling unsafe, nine subjects posted their goals on a social networking website while 55 subjects who indicated feeling unsafe did not post their goals. In contrast, four subjects felt safe posting their goals while five subjects who did not post their goals felt safe. Only one subject who reported feeling unsafe did permit further 77 access to their goals by an unknown person while a large portion (65) of the subjects who reported feeling unsafe did not permit further access. Two people indicated feeling safe and permitted further access to their goals by an unknown person while seven subjects who did not permit further access to their goals indicated feeling safe. Subjects that did or did not post their goals or allow further access to the characteristic of goals expressed feeling unsafe. While they reported feeling unsafe, four subjects posted their distress problems on a social networking website while 60 subjects who indicated feeling unsafe did not post their distress problems. One subject felt safe posting their distress problems while eight subjects who did not post their distress problems felt safe. None of the subjects permitted further access about their distress problems to an unknown person because they felt unsafe while 64 of the subjects who reported feeling unsafe did not permit further access. In addition, none of the subjects felt safe permitting further access to their distress problems by an unknown person while nine subjects who did not permit further access to their distress problems indicated feeling safe. Collectively, a pattern of feeling unsafe was indicated by the subjects whether they did or did not post their distress problems or allow further access to the characteristic. A subject’s relationship status was found to be one of the most common descriptive characteristics posted on a social networking website. Despite feeling fearful, 38 subjects posted their relationship status on a social networking website while 26 subjects who indicated feeling unsafe did not post their relationship status. In contrast, eight subjects felt safe posting their relationship status while one subject who did not post 78 their relationship status felt safe. Few subjects (3) who reported feeling unsafe did permit further access to their relationship status by an unknown person while most (63) of the subjects who reported feeling unsafe did not permit further access. Only two people felt safe permitting further access to their relationship status by an unknown person while seven subjects who did not permit further access to their relationship status indicated feeling safe. A majority of the subjects feel unsafe whether they did or did not post their relationship status or allow further access to their status. Despite feeling unsafe, six subjects posted other information on a social networking website while 58 subjects who indicated feeling unsafe did not post other information. Two subjects felt safe posting other information while seven subjects who did not post other information felt safe. None of the subjects permitted further access to other information by an unknown person because they felt unsafe while a large portion (66) of the subjects who reported feeling unsafe did not permit further access. In contrast, none of the students felt safe permitting further access to other information by an unknown person while nine subjects who did not permit further access to other information indicated feeling safe. The subjects expressed a lack of safety even if they did or did not post other information or allow further access to other descriptive characteristics. Comparing the tables of descriptive information posted willingly by subjects with the tables representing the data when students permit further access to descriptive information by unknown persons demonstrates a trend of feeling unsafe. Several descriptive categories reveal a large number of subjects that post information willingly on 79 their social networking website. A shocking discovery is that they do so while feeling unsafe. In addition, several descriptive categories reveal an extremely small number of subjects who permit further access to personal information by an unknown person because they do not feel safe doing so. The few who permit further access to strangers are trusting of unknown persons and exhibit risk-taking behaviors. Similar to the previous analyses illustrating each subject’s perception of safety are Appendices G to K. Appendices G through K were compiled to illustrate the level of safety subjects perceive while having their social networking website private, being requested by unknown persons to view their privatized website, allowing strangers permission to view their privatized page, and conversing with unknown persons through the introduction of a social networking website. Appendix G shows that 54 subjects felt unsafe even though their website was privatized whereas seven subjects felt unsafe not having their social networking website privatized. Unfortunately, it is not known why these subjects had an unsecured page while they felt unsafe. Additionally, Appendix G shows that only six subjects felt safe having their website privatized whereas three subjects felt safe not having their page privatized. Collectively, a majority of the students felt unsafe even if their page was or was not privatized. Appendix H indicates how many strangers contacted a subject through their social networking website and whether or not the student felt safe during these contacts. Appendix H shows that 66 students were contacted up to 100 times and that they felt unsafe during these contacts. In contrast, Appendix H also points out that only eight 80 students were contacted up to 100 times by a stranger but they felt safe, and only one student felt safe being contacted by a stranger within 901 and 1000 times. A majority of the students demonstrated feeling unsafe when being contacted by a stranger. Appendix I approximates how many times a person unknown to the subject requested permission to view his or her profile and if the subject felt safe or unsafe during these requests. As indicated in Appendix I, 66 subjects indicated being requested up to 100 times by a stranger and feeling unsafe. In contrast, Appendix I also points out that seven subjects were requested by a stranger up to 100 times, one subject requested by a stranger 201-300 times, and one subjects requested by a stranger 901-1000 times. Most students indicated feeling unsafe when being requested permission by a stranger to access their personal social networking website. Appendix J indicates how many times a stranger was granted permission to view his or her website and whether or not the subject felt safe or unsafe doing so. Of the times when someone unknown to the student requested their permission, the student indicated whether none, a few, some, most, or all were granted access. As indicated in Appendix J, approximately 56 students felt unsafe being requested permission and therefore did not allow the stranger access to their page. Appendix J also shows that only three students felt unsafe while permitting a few strangers to view their profile. It is unknown why these three students provided the strangers access to their privatized page even though they felt unsafe. In contrast, Appendix J illustrates that only seven students for each of the categories in all felt safe denying permission or granting permission to the requesting 81 stranger. It is evident that the majority of the students felt unsafe being requested permission by a stranger to view their personal website. Appendix K provides the perception of safety experienced by a subject while deciding to converse with an unknown person at a social networking website. This appendix indicates that a majority of the students experienced feeling unsafe and therefore did not converse with a stranger through the website. For instance, 58 students felt unsafe and did not converse with the unknown person whereas five students did even though they felt unsafe. It is not known why the five subjects decided to converse with the unknown person while feeling unsafe. In addition, Appendix K also shows that four subjects would feel safe conversing with a stranger at a social networking website but never have, and only five subjects have conversed with strangers while experiencing a level of safety. It is evident in the data depicted in Appendices G to K that a majority of the students do not feel safe engaging with unknown persons at a social networking website. Students are commonly approached by strangers to view their privatized website or to converse, but the students expressed not feeling comfortable granting permission or making further contact. Only a few students indicated feeling safe when contacted, giving permission, or conversing with an unknown person. These select individuals who interact with strangers are trusting of unknown persons and exhibit risk-taking behaviors. 82 Predictors of Interpersonal Victimization: Combination of Suitable Target, Motivated Offender, and Lack of Guardianship A figure was generated to show how often a subject uses e-mail services, instant messenger services, chat-rooms, and social networking websites. As shown in Figure 3, uses of internet were combined with the use of a social networking account to indicate the likelihood of becoming a suitable target. Figure 3 illustrates that 88.2 percent of the students possess a social networking account and use e-mail services at least once a day, 82.0 percent of the students have a social networking account and use it regularly, and 38.2 percent have a social networking website and use an instant messenger commonly. In contrast, chat-room services were rarely used for those who have a social networking account (84.0 percent). Number of Participants Figure 3: Indication of a Suitable Target: Social Networking Website and Internet Use 300 250 200 150 100 SNW Account No 50 SNW Account Yes 0 No Yes No Yes No Yes No Yes E-mail Instant Message Chatroom SNW Use of Internet By comparing further access to personal information and the number of times a subject conversed with an unknown person through a social networking website, will 83 indicate how likely a subject is to place themselves within proximity of a motivated offender. Figure 4 illustrates the presence of a motivated offender by combining the subjects who permitted further access to personal information and the subjects who conversed with a stranger at a social networking website. It was hypothesized that interpersonal victimization rates will increase when there is an increase in the combination of dependent variables. Presence of a motivated offender is indicated in Figure 4 illustrating the level of risk that subjects place themselves to experience interpersonal victimization. Figure 4 shows that 21.5 percent of the subjects released personal information and conversed with an unknown person while only 8.3 percent of the students conversed with an unknown person but did not give out personal information about themselves. In contrast, Figure 4 also suggests that the majority of the students did not converse with an unknown person or give out personal information. Number of Participants Figure 4: Contribution of Personal Information and Experiences with Unknown Persons on Social Networking Websites 120 100 80 Provided Further Access to Personal Information No 60 Provided Further Access to Personal Information Yes 40 20 0 No Yes Conversed with Unknown Person 84 A lack of restrictions and guardianship along with the location of computer use describes the level of guardianship over each of the subjects. An overwhelming majority of the students did not have restrictions or another person present in the same room while using a computer in their home. Figure 5 shows that 84.0 percent of the students do not have restrictions while using their computer in their home, and 54.5 percent of the students do not have a person monitoring their computer use in the home. Figure 5: Location of Computer Use and Guardianship Number of Participants 250 200 Computer Location Home 150 Computer Location School 100 Computer Location Coffee Shop 50 Computer Location Other 0 No Yes Guardian No Yes Restrictions Presence of Guardianship The percentages for the combined indicators of a suitable target, motivated offender, and lack of guardianship are shown in Table 4.5. This table also compares those rates with the incidence rates with each demographic variable (gender, age, ethnicity, and marital status) to produce possible predictors of interpersonal victimization. Even though percentages were used to simplify the presence of a predictor for interpersonal victimization, high percentages for the combination of all three independent variables 85 (suitable target, motivated offender, lack of guardianship, were not present. Despite this finding, the data strongly suggest that students are indeed suitable targets, experience motivated offenders at various rates, and lack a great amount of guardianship placing them at a high level of risk for interpersonal victimization. Table 4.5: Amount of Students Reporting Online Behaviors by Suitable Target, Motivated Offender, Lack of Guardianship, and by Demographics Suitable Motivated Target Offender Lack of Guardianship Gender Male Female 48.9% 49.6% 52.4% 46.6% 46.7% 52.0% 15-25 26-35 36-45 46-55 82.4% 13.3% 1.2% 0.4% 85.4% 12.1% 1.5% 0.3% 86.3% 10.1% 0.8% 0.4% 0.4% 11.7% 5.6% 18.4% 43.2% 3.0% 9.0% 4.5% 0.6% 10.7% 8.6% 16.6% 42.4% 2.6% 11.2% 5.5% 0.1% 13.0% 10.9% 21.6% 33.1% 1.1% 11.0% 3.0% 6.0% 0.4% 1.9% 86.5% 3.0% 4.6% 0.3% 1.2% 90.3% 3.5% 5.4% 0.4% 1.3% 84.2% 7.3% Age Ethnicity/Race American Indian Asian Black Hispanic White Pacific Islander Multiracial Other Marital Status Married Divorced Separated Widowed Single Domestic Partner 86 Subject Response After evaluating the encounters with unknown persons and the rates of perceived safety while accessing the internet for California State University, Sacramento undergraduate students, it has become clear that a majority of the students feel unsafe. In addition, the preceding tables and figures showed that a majority of the students possess a social networking account, use it often, and access them with the use of a mobile device. Even though a majority of the subjects are placing themselves at risk with heightened levels of being a suitable target, allowing further access to personal information by an unknown person was estimated to be significantly low. However, an overwhelming majority of the students expressed a lack of guardianship. The computer was often used at home without the presence of another or having restrictions limit computer function. Conclusively, there were subjects who placed themselves at risk by exhibiting risky behaviors and combining the variables of a suitable target, motivated offender, and a lack of guardianship, but the number of subjects who collectively placed themselves at risk was extremely low. To demonstrate why these subjects feel safe placing themselves at risk, a few of the open-ended questions will be reviewed. The following will analyze responses to the open-ended question asking to explain why the subject may feel safe or unsafe engaging with unknown persons over the internet. The first section will review those who expressed feeling safe. Five responses were selected due to their unique remarks of safety. It was found that many respondents felt safe using the internet to search for relationships. For example, a respondent chose a seven on the safety continuum and expressed, “I only talk to girls my age that I find 87 attractive, so I feel safe in the fact that I am just trying to get to know them for potential dating purposes.” Another respondent selected an eight on the safety continuum and expressed, “I usually keep it simple. I only talk to them because we both game or have the same interest I keep it to that.” Oddly, one respondent chose a nine on the continuum even though he expressed “the way technology is used today and what can be traced and found scares me.” The most notable respondent circled the highest level of safety on the continuum (10), and stated, “Because if anyone has cause for concern it would be them not me.” This response is alarming as a potential victim that there is no consequence for them, they don’t need to be careful. In contrast to the previous responses, the following will review those who expressed feeling unsafe engaging with unknown persons over the internet. Six responses were selected due to their unique remarks. After selecting a four on the safety continuum, one respondent stated, “I feel unsafe for the reason I don’t know who they are. They might have fake pictures? I don’t engage with nobody that I don’t know.” Another respondent circled a three on the safety continuum and remarked, “I did an essay in an English class regarding a young girl Judy Cajuste who was murdered, believed by a man on MySpace.” Next, a subject marked a three on the safety continuum and expressed, “Once, one guy told me, he knew where I lived. So I’m scared that some of them know more about me than I want them to know. So I feel unsafe with most of them especially guys.” Another subject only selected a three on the safety continuum even though he had previously “been a past victim of identity fraud.” Additionally, many responses indicated that males often contact females over social networking websites. For example, a 88 respondent felt unsafe and indicated so by selecting a three on the safety continuum, she stated that, “Usually the unknown people contacting me are males. They usually contact me because they think I am attractive. Many females are hurt from communicating with males they don’t know.” The last response selected indicated the highest level of feeling unsafe (1) on the safety continuum. This respondent stated, “I had some guy that wouldn’t leave me alone and it’s scary.” Summary Incidence rates of interpersonal victimization were analyzed to address the phenomenon of moral panic discussed in previous research about social networking websites. The testable hypotheses stating interpersonal victimization rates will increase when there is an increase in the number of motivated offenders (H1A), suitable target (H1B), and presence of guardianship (H1C) were not supported by the data. The majority of the subjects indicated a high level of personal computer use, which includes using social networking websites and an estimated amount of time using the internet suggesting an increased likelihood of becoming a suitable target. Only a few subjects (N=62) indicated releasing personal information and conversing with unknown persons while using social networking websites which increases their likelihood of being placed with proximity of a motivated offender. Most of the subjects indicated computer use within the home, minimal restrictions of use, and a limited presence of monitoring one’s use of a computer while using social networking websites suggesting an overall lack of guardianship. Cohen and Felson’s (1979) routine activities theory suggesting that when the variables are combined (suitable target, motivated offender, and lack of 89 guardianship), they produce a heightened effect on the level of interpersonal victimization rates; however, it was not clear whether all three variables were present in combination and interpersonal victimization rates were not accounted for. It was not feasible to construct a questionnaire asking subjects to recall incidents of victimization because of the level of risk involved. Furthermore, the goal of the current study was to determine why subjects engage with unknown persons among social networking websites, so the frequencies of interpersonal victimizations were not surveyed. However, the questionnaire was created with an open-ended question in hope that subjects would disclose incidents of interpersonal victimization. Only a few respondents included experiences of victimization as outlined in the subject’s response section. 90 Chapter 5 Summary and Conclusions Reports from media have raised fears about internet use and a person’s general safety. Moral panic initiated research focusing on the safety of uses of the internet such as interacting with strangers, posting personal information, and accessing social networking websites. Researchers suggest that the internet may facilitate victimization by making suitable targets more accessible to motivated offenders and creating opportunities for predators to be alone with victims. It is possible that motivated offenders can find suitable targets more easily online than through conventional social networks. The efficiency of email services, instant messenger services, chat-room services, and social networking websites allow for fast and private exchanges of personal information, which motivated offenders can use to develop relationships and seduce victims. The routine activities theory is applicable to the current study because of the presence of three variables, suitable target, motivated offender, and lack of guardianship. This theory states that changes in crime are due to the opportunities of offenders, and is based on the presumption that individuals performing daily routines may encounter an incident of victimization. This study suggests that a person’s lifestyle increases their risk of being exposed to motivated offenders and interpersonal victimization. In this study, the students were viewed as a suitable target for offenders because there was an ease of access to individuals through social networking websites. A motivated offender has the advantage of grooming numerous individuals at one time, so the types of personal information released and the experiences involving unknown persons were analyzed to 91 determine the incidence rate of a motivated offender. Lack of guardianship occurs when individuals do not use social networking websites with caution due to the belief that conversing with a stranger over the internet is not a potential threat; therefore, the location of computer use, restrictions of use, and the presence of monitoring one’s use of a computer were analyzed to determine the incidence rate for a lack of guardianship. The computer was most often used (97.9 percent) within the subject’s home, a majority of the students (95.1 percent) are not restricted while using a computer, and 37.5 percent of the subjects use a computer while someone else is present in the room. The current study has shown that there is a high rate of California State University, Sacramento criminal justice major students who use social networking websites. Facebook is the most commonly used social networking website accessed by 83.0 percent of the subjects. It is possible the remaining 17.0 percent may not use social networking websites as a result of protecting oneself from unwanted individuals viewing personal information. Surprisingly, only 13.9 percent of the subjects with an account displayed their personal information publicly, while 77.4 percent had private pages. When analyses were conducted to see if online exposure affected the incidence rates for solicitation, it was expected that there would be a relationship with those having the lowest levels of privacy being contacted the most, and those with private profiles would be contacted the least. The current research found that many individual internet behaviors are not associated with higher rates of unsafe solicitations by unknown persons, but there is increased risk associated with engaging in online risk-taking. The following behaviors indicate a risky pattern of internet use. Over 91.0 percent of the 92 subjects posted personal information online and only 6.3 percent did not. Furthermore, of those who posted personal information, 60.1 percent gave further access to personal information to strangers, and only 34.4 percent did not permit further access to personal information. It was found that of the 60.1 percent that granted access to personal information, only small amounts were distributed through various descriptive categories. Further access to age was distributed by 10.8 percent of the subjects, gender by 10.4 percent, descriptive characteristics by 5.6 percent, hobbies by 8.7 percent, pictures by 8.0 percent, telephone number by 7.3 percent, home location by 2.1 percent, extracurricular activities by 4.5 percent, goals by 4.9 percent, distress problems by 2.4 percent, relationship status by 9.0 percent, and other information by 1.4 percent. Permission to view a subject’s privatized social networking website by an unknown person were analyzed. None of the strangers were granted permission by 66.3 percent of the subjects, a few were granted permission by 17.4 percent, some were granted permission by 3.8 percent, most were granted permission by 1.7 percent, and all were granted permission by 1.0 percent. Subjects indicated conversing with these unknown persons 30.6 percent of the time. Students who create profiles or posted pictures of themselves online are more likely to be contacted online by strangers, but researchers believe that these individuals aren’t at risk. The largest percentage of those contacted (18.1) indicated that they had been contacted on average by 10 separate unknown persons. It is interactive behaviors, such as conversing online with unknown people that place them more at risk of interpersonal victimization. Over 65 percent of the subjects indicated that they were 93 requested permission by a stranger to view their private social networking website, but only 24.7 percent of the subjects granted permission to these individuals. Additionally, 30.6 percent of the subjects conversed with the unknown people that requested permission to view their site. The most notable findings in the research indicate that an overwhelming majority of the students do not feel safe engaging with unknown persons on a social networking website. Students are commonly approached by strangers to view their privatized website or to converse, but the students expressed not feeling comfortable granting permission or making further contact. Only a few students indicated feeling safe when contacted, giving permission, or conversing with an unknown person. These select individuals who interact with strangers are trusting of unknown persons and exhibit risktaking behaviors. To further assess interpersonal victimization among social networking websites, the data were analyzed to see if any trends were present. Trends for the combination of a suitable target, motivated offender, and lack of guardianship would indicate predictors of interpersonal victimization. Indication of a suitable target was implied by analyzing those who had a social networking website account and used various internet communication services. Email services were used throughout a 24 hour period by 88.2 percent of the subjects, social networking websites by 82.0 percent, instant messenger services by 38.2 percent, and chat-rooms by 8.4 percent. Indication of a motivated offender was implied by analyzing those who permitted further access to personal information and conversed with unknown persons at a social networking website. Only 21.5 percent of students released information and conversed with an unknown person while 8.3 percent conversed 94 with an unknown person but did not give out personal information. Surprisingly, students did not converse with an unknown person or give out personal information (24.7 percent). Indication for a significant level of guardianship was implied by analyzing the student’s restrictions, guardianship, and location of computer use. A large portion of students (84.0 percent) did not have restrctions or the presence of a guardian while using a computer in their home. Ultimately, the combination of all three independent variables were not present at high percentages, but the data strongly suggest that students are indeed suitable targets, experience motivated offenders at various rates, and lack a great amount of guardianship placing them at a high level of risk for interpersonal victimization. The goal of the current study was to determine why subjects engage with unknown persons among social networking websites, so frequencies of interpersonal victimizations were not surveyed. However, the questionnaire was created with an openended question in hope that subjects would disclose their experiences with unknown persons on social networking websites. Few subject responses indicated students engage with unknown persons whether or not they feel safe, but an overwhelming majority of the students do not feel safe engaging with strangers. It was disclosed that some subjects interact with strangers in search of potential relationships, because they play video games together, or that they don’t mind conversing with strangers because they don’t feel threatened for their safety. 95 Implications for Future Research Those who visit online communication mediums may be more at risk than others. It is believed that those who regularly use the internet to communicate with strangers are more likely to have problems with their parents, suffer sadness, loneliness, or depression, have histories of sexual abuse, and engage in risky behavior compared to those who do not. It was found that many subjects use the internet for e-mail services, instant messenger services, and social networking websites, but rather than focusing on the types of online sites or posting personal information, prevention messages should focus on online interactions because internet-initiated crimes come about through direct communications between motivated offenders and suitable targets. Incidents of interpersonal victimization driven by the internet against individuals are believed to be underreported because victims may feel embarrassed, not view the incident as a crime, or not view themselves as being a victim. People who send personal information such as their gender, hobbies, and personal pictures to strangers are more likely to be solicited by them. However, posting personal information on the internet may not be as risky as some fear, but there is increased risk associated with the kinds of potentially risky online behaviors exhibited. There are several behaviors that are often deemed risky for people to engage in such as granting permission to unknown persons to view a privatized social networking website, conversing with unknown persons, or discussing further relations in an offline environment. It is believed that as the number of different types of these behaviors increase, so do the odds of online interpersonal victimization. Those who interact with strangers over the internet engaging in a high 96 number of risky behaviors increase their level for concern compared to those who do not exhibit risky behaviors while interacting with strangers. Further analyses should be conducted in this area calculating subject’s frequency of victimization in order to account for all incidents and determine if online crimes are underreported. This may also help determine if all online behaviors are indeed risky. Motivated offenders use internet communications such as e-mail services, instant messenger services, chat-rooms, and social networking websites to meet and develop intimate relationships with potential victims. Corrections, victimization, and psychology researchers should use the experiences of known criminals and disclose their tactics used to select victims. In addition, further research should target the demographics of criminals that use internet communications. These methods will help create messages, awareness, and strategies for prevention. It was indicated by several subjects that they use social networking websites for dating purposes. It would be interesting to know the frequency of use of social networking websites strictly for dating purposes. It would also be interesting to know the frequency of those who follow people’s personal information posted through social networking websites without ever contacting them. Further research could reveal how often strangers stalk and/or follow public or private social networking profiles, blogs, or online journals. Unfortunately, the questionnaire did not ask subjects whether or not their social networking website was initially set as a privatized page. Therefore, it is unknown whether previous victimization motivated the subject to change his or her page to private. 97 It may be assumed that a majority of the students originally had public profiles but then changed the setting to private as a result of incidents of victimization or contact by unknown persons. With a subject changing his or her privacy setting this would prevent future incidents from occurring. Future research should ask subjects whether or not their social networking website was originally open for to the public to view. In this study, levels of contact with unknown persons were considered to be low as well as the amount of permission or further access granted to personal information. It is possible that criminal justice students could have a heightened awareness of personal security and victimization. Further research examining interpersonal victimization on social networking websites throughout the nation could prove otherwise. 98 APPENDICES 99 APPENDIX A Questionnaire * If you have already participated in this survey, please, do not participate again* You are invited to participate in a study that seeks California State University, Sacramento undergraduate students to complete a questionnaire about their use of computers, the Internet, and social networking websites. The data from this questionnaire will be used to complete a thesis in partial requirement to obtain a masters degree in Criminal Justice. You were selected as a possible participant in this study through random selection of undergraduate Criminal Justice courses. Participation is completely voluntary, students may end their participation at any time, and all responses will be kept anonymous. If any of the questions make you feel uncomfortable, you may refuse to answer them. All of the information provided will only be analyzed by me and the thesis committee. Therefore results from the research will be reported with no identifiers. If you decide to participate, please complete the attached questionnaire. It may take approximately 10-15 minutes to complete the questionnaire. Participation in this study certifies that participants are 18 years of age or older. Your decision whether or not to participate will not prejudice your future relationships with the California State University, Sacramento. Your return of this questionnaire is implied consent. 100 Please feel free to ask questions regarding this study. You may contact either professor Tim Croisdale at croisdale@csus.edu or me, at bj277@saclink.csus.edu later if you have additional questions. Thank you for your participation. Brandon Jaimes 1) Please indicate your activities performed on the Internet. Check all that apply. □ Research □ Gaming □ Planning travel □ Website design □ Shopping □ E-mail □ Instant message □ Chat rooms □ Social networking websites □ Other (specify) _________________________________________________________ □ None □ Decline to Answer 2) Please indicate the location of your computer when using it. Check all that apply. □ Home (any room) 101 □ School □ Friend’s □ Coffee shop □ Other (specify) _________________________________________________________ □ Not Applicable □ Decline to Answer 3) Please indicate the location where you most frequently use a computer. Check one of the following: □ Home (any room) □ School □ Friend’s □ Coffee shop □ Other (specify) _________________________________________________________ □ Not Applicable □ Decline to Answer 4) Please indicate how often you use each of the following on a typical day. Please specify by filling in the spaces provided. E-mail: _______________ Instant Messenger: _______________ Chat Rooms: ________________ 102 Social Networking Websites: _________________ □ Decline to Answer 5) Is there a parent/guardian, friend, teacher/counselor, sibling, or someone else usually present in the same room while you are using a computer? Check one of the following: □ Yes □ No □ Decline to Answer 6) Thinking of the computer you use most often, does it have any restrictions on the amount of time you can spend online or prevent you from viewing websites with adult content, etc.? Check one of the following: □ Yes □ No □ Other (specify) _________________________________________________________ □ Decline to Answer 7) Please indicate if you have an account for any of the following social networking websites. Check all that apply. □ Facebook □ MySpace □ Friendster □ Twitter 103 □ Xanga □ Other (specify) _________________________________________________________ □ None □ Decline to Answer 8) If applicable, please indicate what information is posted on your social networking website. Check all that apply. □ Age (i.e., 21 years old) □ Gender (i.e., male, female, etc.) □ Additional descriptive characteristics (i.e., eye color, hair color, etc.) □ Hobbies (i.e., shopping, dancing, working out, etc.) □ Picture(s) of self □ Telephone number (i.e., cell phone number, home phone number, etc.) □ Home location (i.e., address) □ Extracurricular activities (i.e., playing for the school baseball team) □ Goals/aspirations (i.e., becoming a doctor, losing weight, etc.) □ Distress problems (i.e., death in the family, etc.) □ Relationship status (i.e., single, married, etc.) □ Other (specify) _________________________________________________________ □ None □ Decline to Answer 104 9) If applicable, is your social networking website page privatized or require your permission for others to view it? Check one of the following: □ Yes □ No □ Decline to Answer 10) How many times have you ever been contacted by an unknown person through a social networking website? Please specify by filling in the space provided. ________________ □ Decline to Answer 11) On any/all of your social networking websites, approximately how many times has a person unknown to you requested your permission to view your profile/ website? Please specify by filling in the space provided. ________________ □ Decline to Answer 12) Of those times when someone unknown to you requested your permission, how many times did you give them permission? Check one of the following: □ None □ A few □ Some □ Most 105 □ All □ Decline to Answer 13) Have you conversed with an unknown person at a social networking website? Check one of the following: □ Yes □ No □ Decline to Answer 14) Have you ever given personal information beyond what is accessible on your website to an unknown person? If “yes”, see below and check all that apply. □ Age (i.e., 21 years old) □ Gender (i.e., male, female, etc.) □ Additional descriptive characteristics (i.e., eye color, hair color, etc.) □ Hobbies (i.e., shopping, dancing, working out, etc.) □ Picture(s) of self □ Telephone number (i.e., cell phone number, home phone number, etc.) □ Home location (i.e., address) □ Extracurricular activities (i.e., playing for the school baseball team) □ Goals/aspirations (i.e., becoming a doctor, losing weight, etc.) □ Distress problems (i.e., death in the family, etc.) □ Relationship status (i.e., single, married, etc.) □ Other (specify) _________________________________________________________ 106 □ No □ Decline to Answer 15) Do you engage in any of the activities mentioned above using a mobile device such as a smart phone? Check one of the following: □ Yes □ No □ Decline to Answer 16) In general, how safe do you feel engaging with unknown persons? On a scale from 1 (very unsafe) to 10 (very safe), please circle a spot on the continuum provided below. □ Decline to Answer 1--------2--------3--------4--------5--------6--------7--------8--------9--------10 Very Unsafe Safe Very Safe 17) If you circled a spot on the continuum to question #16, please explain your answer as to why you may feel safe or unsafe. Please fill in the blank spaces provided unless you decline to answer. __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ __________________________________________________________________ 107 18) What is your gender? Check one of the following: □ Male □ Female □ Decline to Answer 19) What is your age as of your last birthday? Please fill in the blank space provided unless you decline to answer. _____________________ Years 20) What ethnicity/race would you most identify yourself as? Check one of the following: □ American Indian □ Asian □ Black □ Hispanic □ White □ Pacific Islander □ Multiracial □ Other (specify) _________________________________________________________ □ Decline to Answer 21) Please indicate your marital status. Check one of the following: □ Married □ Divorced 108 □ Separated (Can be single, previously married, but not yet divorced) □ Widowed □ Single (Never-married) □ Domestic partner □ Decline to Answer Thank you for your participation. 109 APPENDIX B Script Used Prior to Questionnaire Distribution Hello students, today you are asked to participate in a voluntary study which will be administered by me, Brandon Jaimes, in an attempt to further understand undergraduate criminal justice student computer use, Internet use, and social networking website use. This study has been created to complete a thesis in partial requirement to obtain a masters degree in criminal justice here at the University. You have all been selected as a possible participant in this study through random sampling of scheduled class meetings. Keep in mind the following: First, if you decide to participate, you may quit the survey at anytime without prejudice. Second, participation is completely voluntary, and you, as well as your responses, will remain completely anonymous. Third, results from the research will be reported with no identifiers. Fourth, there will be no compensation for participating in the survey. Remember, if any of the questions make you uncomfortable, you may refuse to answer them. I will ask for a volunteer from the class to distribute the questionnaire while I remain outside. This volunteer will then collect the completed questionnaires, put them in an envelope, seal the envelope, and then hand the envelope to me outside the door. Remember, your return of this questionnaire is implied consent. Also, if you have already participated in this survey at a previous time, please, do not participate again. If you may have any questions regarding this study, you may contact either professor Tim Croisdale 110 at croisdale@csus.edu or me, at bj277@saclink.csus.edu. Thank you for considering participation. 111 APPENDIX C Use of E-mail Services Over 24-hour Period Frequency of E-mail Use Values (Hours) Percentage 0 1 2 3 4 5 6 or more Declined 11.8% 28.8% 19.1% 8.7% 5.5% 9.4% 15.3% 1.4% N 34 83 55 25 16 27 44 4 112 APPENDIX D Use of Instant Messenger Services Over 24-hour Period Frequency of Instant Messenger Use Values (Hours) Percentage 0 70.1% 1 16.3% 2 3.1% 3 3.1% 4 0.7% 5 1.0% 6 or more 4.2% Declined 1.4% N 202 47 9 9 2 3 12 4 113 APPENDIX E Use of Chat-room Services Over 24-hour Period Frequency of Chat-room Use Values (Hours) Percentage 0 1 2 3 4 5 6 or more Declined 94.0% 2.8% 0.7% 0.7% 0.3% 0.30% 1.40% N 270 8 2 2 1 1 4 114 APPENDIX F Use of Social Networking Website Services Over 24-hour Period Frequency of Social Networking Website Use Values (Hours) Percentage N 0 1 2 3 4 5 6 or more Declined 20.8% 19.8% 15.6% 11.8% 4.2% 9.4% 16.7% 1.4% 60 57 45 34 12 27 48 4 115 APPENDIX G Privatization of Social Networking Websites and Student’s Perception of Safety Privatization of SNW and Perception of Safety Crosstabulation Privatized Social Networking Website No Yes N/A Declined Total Level Unsafe N 7 54 0 5 66 of % 17.5% 24.2% 0.0% 23.8% 22.9% Safety 2 N 2 22 2 3 29 % 5.0% 9.9% 50.0% 14.3% 10.1% 3 N 6 40 2 6 54 % 15.0% 17.9% 50.0% 28.6% 18.8% 4 N 3 19 0 2 24 % 7.5% 8.5% 0.0% 9.5% 8.3% 5 N 9 29 0 2 40 % 22.5% 13.0% 0.0% 9.5% 13.9% 6 N 1 14 0 1 16 % 2.5% 6.3% 0.0% 4.8% 5.6% 7 N 1 11 0 0 12 % 2.5% 4.9% 0.0% 0.0% 4.2% 8 N 4 9 0 0 13 % 10.0% 4.0% 0.0% 0.0% 4.5% 9 N 2 8 0 0 10 % 5.0% 3.6% 0.0% 0.0% 3.5% Safe N 3 6 0 0 9 % 7.5% 2.7% 0.0% 0.0% 3.1% Declined N 2 11 0 2 15 % 5.0% 4.9% 0.0% 9.5% 5.2% Total N 40 223 4 21 288 % 100.0% 100.0% 100.0% 100.0% 100.0% 116 APPENDIX H Collapsed Data for Subjects Contacted by Unknown Persons and Their Perception of Safety Collapsed Data for Those Contacted and Perception of Safety Crosstabulation Collapsed Data for Contacted 0-100 101-200 901-1000 Total Level of Safety Unsafe 2 3 4 5 6 7 8 9 Safe Declined Total N % N % N % N % N % N % N % N % N % N % N % N % 66 23.2% 29 10.2% 33 18.6% 23 8.1% 40 14.0% 16 5.6% 12 4.2% 13 4.6% 10 3.5% 8 2.8% 15 5.3% 285 100.0% 0 0.0% 0 0.0% 1 50.0% 1 50.0% 0 0.0% 0 0.0% 0 0.0% 0 0.0% 0 0.0% 0 0.0% 0 0.0% 2 100.0% 0 0.0% 0 0.0% 0 0.0% 0 0.0% 0 0.0% 0 0.0% 0 0.0% 0 0.0% 0 0.0% 1 100.0% 0 0.0% 1 100.0% 66 22.9% 29 10.1% 54 18.8% 24 8.3% 40 13.9% 16 5.6% 12 4.2% 13 4.5% 10 3.5% 9 3.1% 15 5.2% 288 100.0% 117 APPENDIX I Collapsed Data for Subjects who were Requested Permission to View their Social Networking Website Collapsed Data for Requested Permission Crosstabulation Collapsed Data for Requested Permission 9010-100 101-200 201-300 1000 Total Level Unsafe N 6 0 0 0 66 of % 23.2% 0.0% 0.0% 0.0% 22.9% Safety 2 N 29 0 0 0 29 % 10.2% 0.0% 0.0% 0.0% 10.1% 3 N 54 0 0 0 54 % 18.9% 0.0% 0.0% 0.0% 18.8% 4 N 23 1 0 0 24 % 8.1% 100.0% 0.0% 0.0% 8.3% 5 N 40 0 0 0 40 % 14.0% 0.0% 0.0% 0.0% 13.9% 6 N 16 0 0 0 16 % 5.6% 0.0% 0.0% 0.0% 5.6% 7 N 12 0 0 0 12 % 4.2% 0.0% 0.0% 0.0% 4.2% 8 N 13 0 0 0 13 % 4.6% 0.0% 0.0% 0.0% 4.5% 9 N 10 0 0 0 10 % 3.5% 0.0% 0.0% 0.0% 3.5% Safe N 7 0 1 1 9 % 2.5% 0.0% 100.0% 100.0% 3.1% Declined N 15 0 0 0 15 % 5.3% 0.0% 0.0% 0.0% 5.2% Total N 285 1 1 1 288 % 100.0% 100.0% 100.0% 100.0% 100.0% 118 APPENDIX J Subjects who were Asked Permission by Unknown Persons to View Their Private Social Networking Website and Their Perception of Safety Permission to View Privatized SNW and Perception of Safety Crosstabulation Permission to View Privatized Social Networking Website None A Few Some Most All N/A Declined Level Total Unsafe N 56 3 0 0 0 0 7 66 of 2 N 22 2 0 0 0 2 3 29 Safety 3 N 39 9 1 0 0 0 5 54 4 N 14 9 0 0 0 0 1 24 5 N 23 8 2 1 1 0 5 40 6 N 8 5 1 1 0 0 1 16 7 N 3 6 3 0 0 0 0 12 8 N 10 2 0 0 0 0 1 13 9 N 5 2 2 1 0 0 0 10 Safe N 2 2 1 2 2 0 0 9 Declined N 9 2 1 0 0 0 3 15 N 191 50 11 5 3 2 26 288 Total 119 APPENDIX K Subjects who Conversed with Unknown Persons and Their Perception of Safety Conversed with Unknown Person and Perception of Safety Crosstabulation Conversed No Yes N/A Declined Total Level Unsafe N 58 5 0 3 66 of % 31.7% 5.7% 0.0% 18.8% 22.9% Safety 2 N 21 6 1 1 29 % 11.5% 6.8% 100.0% 6.3% 10.1% 3 N 36 16 0 2 54 % 19.7% 18.2% 0.0% 12.5% 18.8% 4 N 13 10 0 1 24 % 7.1% 11.4% 0.0% 6.3% 8.3% 5 N 21 15 0 4 40 % 11.5% 17.0% 0.0% 25.0% 13.9% 6 N 7 8 0 1 16 % 3.8% 9.1% 0.0% 6.3% 5.6% 7 N 5 7 0 0 12 % 2.7% 8.0% 0.0% 0.0% 4.2% 8 N 6 7 0 0 13 % 3.3% 8.0% 0.0% 0.0% 4.5% 9 N 5 5 0 0 10 % 2.7% 5.7% 0.0% 0.0% 3.5% Safe N 4 5 0 0 9 % 2.2% 5.7% 0.0% 0.0% 3.1% Declined N 7 4 0 4 15 % 3.8% 4.5% 0.0% 25.0% 5.2% Total N 183 88 1 16 288 % 100.0% 100.0% 100.0% 100.0% 100.0% 120 REFERENCES Addison, D. (2001). Youngsters Increase Time Online as Sites Seek Return Visits. Marketing 10. Allison, F.H., Schuck, A.M., & Lersch, K.M. (2005). Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, and Victim/Offender Characteristics. Journal of Criminal Justice, 33, 19-29. Anonymous. (2004). Cyberstalking of Kids Jumps 237% in Maine. Juvenile Justice Digest, 32(19), 4. Anonymous. (2009). Fear of Online Sex Predators May be Overblown, Report Says. Criminal Justice Newsletter, 7. Apuzzo, M. (2006). Prosecutors: Men used myspace.com to Meet Underage Girls for Sex. Retrieved from http://www.boston.com/news/local/connecticut/articles /2006/03/02/prosecutors_men_used_myspacecom_to_meet_underage_girls_ for_sex. Arnold, R., Keane, C., & Baron, S. (2005). Assessing Risk of Victimization through Epidemiological Concepts: An Alternative Analytic Strategy Applied to Routine Activities Theory. Canadian Review of Sociology, 42(3), 345-364. Ben-Yehuda, N., & Goode, E. (1994). Moral Panics: The Social Construction of Deviance. Oxford: Blackwell. Bernat, F.P., & Zhilina, T. (2010). Human Trafficking: The Local Becomes Global. Women & Criminal Justice, 20(1/2), 2-9. 121 Bjerregaard, B. (2000). An Empirical Study of Stalking Victimization. Violence and Victims, 15, 389-406. Blackburn, A.G., Taylor, R.W., & Davis, J.E. (2010). Understanding the Complexities of Human Trafficking and Child Sexual Exploitation: The Case of Southeast Asia. Women & Criminal Justice, 20 (1/2), 105-126. Bradenburg, J.B. (1997). Confronting Sexual Harassment: What Schools and Colleges Can Do. New York: Teachers College Press. Cassell, J., & Cramer, M. (2007). High Tech or High Risk? Moral Panics about Girls Online. Digital Youth, Innovation, and the Unexpected: The MacArthur Foundation Series on Digital Media and Learning, 53-75. Choo, K.K.R. (2008). Organized Crime Groups in Cyberspace: A Typology. Trends Organized Crime, 11, 270-295. Clodfelter, T.A., Turner, M.G., Hartman, J.L., & Kuhns, J.B. (2010). Sexual Harassment Victimization During Emerging Adulthood: A Test of Routine Activities Theory and a General Theory of Crime. Crime and Delinquency, 56(3), 455-481. Coleman, F.L. (1997). Stalking Behavior and the Cycle of Domestic Violence. Journal of Interpersonal Violence, 12, 420-432. Combs-Lane, A.M., & Smith, D.W. (2002). Risk of Sexual Victimization in College Women: The Role of Behavioral Intentions and Risk-Taking Behaviors. Journal of Interpersonal Violence, 17(2). 122 Cortina, L.M., Swan, S., Fitzgerald, L.F., & Waldo, C. (1998). Sexual Harassment and Assault: Chilling the Climate for Women in Academia. Psychology of Women Quarterly. 22, 419-441. Dansky, B., & Kilpatrick, P. (1997). Effects of Sexual Harassment .In W. O’ Donohue (Ed.), Sexual Harassment: Theory, Research, and Treatment (p.152-174). Boston: Allyn & Bacon. Davis, R.C., Lurigio, A.J., & Herman, S.A. (2007). Victims of Crime. Thousand Oaks, CA: Sage DeCoster, S., Estes, S., & Mueller, C. (1999). Routine Activities and Sexual Harassment in the Workplace. Work and Occupations, 26, 21-49. Dietz, P.E., Matthews, D.B., Van Duyne, C., Martell, D.A., Parry, C.D.H, Stewart, T., Warren, J., & Crowder, J. (1991). Threatening and Otherwise Inappropriate Letters to Hollywood Celebrities. Journal of Forensic Sciences, 36, 1445-1468. D’Ovidio, R., Mitman, T., El-Burke, I, & Shumar, W. (2009). Adult-Child Sex Advocacy Websites as Social Learning Environments: A Content Analysis. International Journal of Cyber Criminology, 3(1), 421-440. Dziech, B.W. (2003). Sexual Harassment of College Campuses. In M. Paludi & C. Paludi (Eds.), Academic and Workplace Sexual Harassment: A Handbook of Cultural, Social Science, Management, and Legal Perspectives (p.147-172). Westport, CT: Praeger. Dziech, B.W., & Hawkins, M.W. (1998). Sexual Harassment in Higher Education: Reflections and New Perspective. New York: Garland. 123 Federal Trade Commission.(2000). Identity Theft. Retrieved from http://www.ftc.gov/os/2000/03/identitytheft.htm Federal Trade Commission.(2003). Fraud Complaints and Identity Theft Victims by State. Retrieved from http://www.consumer.gov/sentinel/trends.html Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468-483. Fisher, B.S., Cullen, F.T., & Turner, M.G. (2000). The Sexual Victimization of College Women. Washington, DC: U.S. Department of Justice, National Institute of Justice. Fisher, B.S., Cullen, F.T., & Turner, M.G. (2002).Being Pursued: Stalking Victimization in a National Study of College Women. Criminology & Public Policy, 1(2), 257308. Fontana-Rosa, J.C. (2001). Legal Competency in a Case of Pedophilia: Advertising on the Internet. International Journal of Offender Therapy and Comparative Criminology, 54, 118-128. Fremouw, W.J., Westrup, D., & Pennypacker, J. (1996). Stalking on Campus: The Prevalence and Strategies for Coping with Stalking. Journal of Forensic Sciences, 42, 666-669. Goodwin, S.L. (2003). Cyberstalking: A new criminal behavior? Women Police. 37(1), 23. Gutek, B.A. (1981). Experiences of Sexual Harassment: Results from a Representative Survey. National Institution of Mental Health. Unknown: 1-34. 124 Hall, R.F., Graham, R.D., & Hoover, G.A. (2004). Sexual Harassment in Higher Education: A Victim’s Remedies and a Private University Liability. Education and the Law. 16, 33-45. Hancock, B. (2000). Cyberstalking on the Rise. Computers & Security, 19(4), 307-308. Harrell, A.V., Smith, B.E., & Cook, R.F. (1985). The Social Psychological Effects of Victimization (Report submitted to the National Institute of Justice). Washington, DC: Institute for Social Analysis. Holmes, R.M. (1993). Stalking in America: Types and Methods of Criminal Stalkers. Journal of Contemporary Criminal Justice, 9, 317-327. Izenberg, N., & Lierbman, D. (1998). The Web, Communication Trends, and Children’s Health; How the Children Use the Web. Doing Internet Research. London: Sage. Jasinski, J.L., & Mustaine, E.E. (2001). Police Response to Physical Assault and Stalking Victimization: A Comparison of Influential Factors. American Journal of Criminal Justice, 26(1), 23-41. Johnson, D. (2006). Seven Things All Adults Should Know About MySpace. Retrieved from http://education.illinois.edu/wp/netfiles.uiuc.edu/kleckaus/www/social_ networking_sites.html Kalof, L., Eby, K.K., Matheson, J.L., & Kroska, R.J. (2001). The Influence of Race and Gender on Student Self-Reports of Sexual Harassment by College Professors. Gender and Society.15, 282-302. Keeney, B.T., & Heide, K.M. (1994).Gender Differences in Serial Murderers. Journal of Interpersonal Violence, 9, 383-398. 125 Kennedy, M.A., & Taylor, M.A. (2010). Online Harassment and Victimization of College Students. Justice Policy Journal, 7(1). Koss, M.P., Gidycz, C.A., & Wisniewski, N. (1987). The Scope of Rape: Incidence and Prevalence of Sexual Aggression and Victimization in a National Sample of Higher Education Students. Journal of Consulting and Clinical Psychology. 55, 162-170. Kramer, L.A., & Berg, E.C. (2003). A Survival Analysis of Timing of Entry into Prostitution: The Differential Impact of Race, Educational Level, and Childhood/Adolescent Risk Factors. Sociological Inquiry, 73(4), 511-528. Lanning, K,V. (1984). Child Pornography and Sex Rings. FBI Law Enforcement Bulletin, 53, 10-16. LaRocca, M., & Kromrey, J. (1999). The Perception of Sexual Harassment in Higher Education: Impact of Gender and Attractiveness. Sex Roles, 40(11/12), 921-940. Licklider, J.C.R., & Clark, W.E. (1962). On-Line Man-Computer Communication. AFIPS Conference Proceedings 21, 112-128. Madriz, E. (1996). The Perception of Risk in the Workplace. A Test of Routine Activity Theory. Journal of Criminal Justice, 24, 407-412. Marcum, C. (2008). Potential Causal Factors of Adolescent Online Victimization Produced from a Test of Routine Activities Theory. Conference Paper-American Society of Criminology, 1. Marks, P. (2007). How to Leak a Secret and Not Get Caught. New Scientist, 2586(13). 126 McAnaney, K.G., Curliss, L.A., & Abeyta-Price, C.E. (1993). From Imprudence to Crime: Anti-stalking laws. Notre Dame Law Review, 68, 819-909. Mitchell, K.J., Becker-Blease, K.A., & Finkelhor, D. (2005). Inventory of Problematic Internet Experiences Encountered in Clinical Practice. Professional Psychology, 36(5), 498-509. Mitchell, K.J., Finkelhor, D., & Wolak, J. (2001). Risk factors for and impact of online sexual solicitation of youth. Journal of American Medical Association, 285, 3011-3014. Mitchell, K.J., Jones, L.M., Finkelhor, D., & Wolak, J. (2011). Internet-Facilitated Commercial Sexual Exploitation of Children: Findings From a Nationally Representative Sample of Law Enforcement Agencies in the United States. Sexual Abuse: A Journal of Research and Treatment, 23(1), 43-71. Mitchell, K.J., Ybarra, M., & Finkelhor, D. (2007). The Relative Importance of Online Victimization in Understanding Depression, Delinquency, and Substance Use. Child Maltreatment, 12(4), 314. Mustaine, E.E., & Tewksbury, R. (1999). A Routine Activity Theory Explanation for Women's Stalking Victimizations. Violence Against Women, 5(1), 43-62. National Consumers League. (2008). Love Stinks. Consumer Group Helps Lonely Evade Scams. Retrieved from http://www.nclnet.org/news/2008/sweetheart_swindles_ 02082008.htm National Institute of Justice. (1996). Domestic Violence, Stalking, and Anti-stalking legislation. Washington, DC: Author. 127 National Victim Center. (1997). Stalking [On-line]. Retrieved from http://www. nvc.org/ddir/info43.htm. Norris, J. (1988). Serial Killers: The Growing Menace. New York: Dolphin. Ogilvie, E. (2001). Cyberstalking. Crime & Justice International, 17(50), 9-10. Paludi, M. (1997). Sexual Harassment in Schools. In W. O’Donohue (Eds.), Sexual Harassment: Theory, Research, and Treatment (p.225-249).Boston: Allyn & Bacon. Parks, K.A., & Miller, B.A. (1997). Bar Victimization of Women. Psychology of Women Quarterly, 21(4), 509-525. Perkel, D. (2008). Copy and Paste Literacy? Literacy Practices in the Production of a Myspace Profile. In K. Drotner, H.S. Jensen and K. Schroeder (Eds.), Informal Learning and Digital Media: Constructions, Contexts, Consequences. Newcastle, UK: Cambridge Scholar Press. Pierce, T. (2006). Talking to Strangers on MySpace: Teens’ Use of Internet Social Networking Sites. Journal of Media Psychology, 11(3). Pryor, J.B., La Vite, C.M., & Stoller, L.M. (1993).A Social Psychological Analysis of Sexual Harassment: The Person/ Situation Interaction. Journal of Vocational Behavior, 42, 68-83. Quayle, E., & Taylor, M. (2001). Child Seduction and Self-Representation on the Internet. Cyberpsychology & Behavior, 4(5), 597-608. 128 Rainie, L. (2006). Life Online: Teens and Technology and the World to Come. Speech to the Annual Conference of the Public Library Association. Retrieved from http://www.pewinternet.org/ppt/Teens%20and%20technology.pdf. Rege, A. (2009). What’s Love Got to Do With it? Exploring Online Dating Scams and Identity Fraud. International Journal of Cyber Criminology, 3(2), 494-512. Reisig, M.D., Pratt, T.C., & Holtfreter, K. (2009). Perceived Risk of Internet Theft Victimization: Examining the Effects of Social Vulnerability and Financial Impulsivity. Criminal Justice and Behavior, 36(4), 369-384. Rosen L. (2006). Blocking sexual predators on MySpace: The kids are Alright. Retrieved from http://www.csudh.edu/psych/lrosen.htm Rubin, P.N. (1995). Civil Rights and Criminal Justice: Primer on Sexual Harassment. Research in Action (NJC Publication No. 156663). Washington, DC: Department of Justice. Russell, B.L., & Oswald, D.L. (2001). Strategies and Dispositional Correlates of Sexual Coercion Perpetrated by Women: An Exploratory Investigation. Sex Roles, 45, 103-115. Simons, R.L., & Whitbeck, L.B. (1991). Sexual Abuse as a Precursor to Prostitution and Victimization Among Adolescent and Adult Homeless Women. Journal of Family Issues, 12, 361-379. Stalking Victim's Sanctuary. (1997). Stalking 101 [On-line]. Retrieved from http://www.ccon.com/stalkvictim/stalk.htm. 129 Taylor, M.A. (2008). Victimization on Social Networking Sites (Master’s Thesis). University of Nevada, Las Vegas. Testa, M., & Parks, K.A. (1996). The Role of Women’s Alcohol Consumption in Sexual Victimization. Aggression and Violent Behavior, 1, 217-234. Tjaden, P., & Thoennes, N. (1996). Stalking in America: How big is the Problem? Paper Presented at the Annual Meetings of the American Society of Criminology, Chicago, Illinois. Tyler, K., Hoyt, D., & Whitbeck, L. (2000). The Effects of Early Sexual Abuse on Later Sexual Victimization Among Homeless and Runaway Adolescents. Journal of Interpersonal Violence, 15, 235-250. U.S. General Accounting Office. (2009). Identity Fraud: Governments Have Acted to Protect Personally Identifiable Information, but Vulnerabilities Remain (Publication No. GA0-09-759T). Washington, DC: Author. Walker-Rodriguez, A., & Hill, R. (2011). Human Sex Trafficking. FBI Law Enforcement Bulletin; Mar 2011, 80(3). Williams, E.A., Lam, J.A., & Shively, M. (1992). The Impact of a University Policy on the Sexual Harassment of Female Students. Journal of Higher Education.63, 5064. Wolak, J., Mitchell, K., & Finkelhor, D. (2006). Online Victimization of Children: Five Years Later.Washington, D.C.: National Centers for Missing and Exploited Children.