European Journal of Business Science and Technology 2018, 4(2):187-195 | DOI: 10.11118/ejobsat.v4i2.137

Cybersexual Harassment as ICTs Development Consequences: A Review

Jūratė Kuklytė1
1 Vytautas Magnus University, Kaunas, Lithuania

Rapid progress of information and communication technologies (ICTs) affected the evolution of sexual harassment. Cybersexual harassment can be exposed via social media but as well might be a tool for harassers to attack or stalk individuals after anonysmously. This evolution of phenomenon enter to virtual reality require changes in differenr levels: individual, enterprise and state to counter the hybrid threats. The proposed conceptual framework reflects the main vulnerable groups, consequences. These main aspects trigger for the development of ICTs in order to change organizational policies, political and security regulations.

Keywords: cybersexual harassment, cyberbullying, cybercrime, hybrid threats
JEL classification: D74, D8, M1

Published: December 28, 2018  Show citation

ACS AIP APA ASA Harvard Chicago IEEE ISO690 MLA NLM Turabian Vancouver
Kuklytė, J. (2018). Cybersexual Harassment as ICTs Development Consequences: A Review. European Journal of Business Science and Technology4(2), 187-195. doi: 10.11118/ejobsat.v4i2.137
Download citation

References

  1. Akbulut, Y. and Eristi, B. 2011. Cyberbullying and Cunningham, W. A., Zelazo, P. D., Packer, Victimisation among Turkish University Students. Australasian Journal of Educational Technology, 27 (7), 1155-1170. Go to original source...
  2. Al-Alosi, H. 2017. Technology-Facilitated Abuse: The New Breed of Domestic Violence. The Conversation [online]. Available at: https://theconversation.com/technology-facilitated-abuse-the-new-breedof-domestic-violence-74683.
  3. Arcos, R. 2018. Post-Event Analysis of the Hybrid Threat Security Environment: Assessment of Influence Communication Operations. Strategic Analysis [online]. Available at: https://www.hybridcoe.fi/wp-content/uploads/2018/11/Strategic-Analysis-2018-10-Arcos.pdf. [Accessed 2018, November 25].
  4. Bachmann, S.-D. 2011. Hybrid Threats, Cyber Warfare and NATO's Comprehensive Approach for Countering 21st Century Threats - Mapping the New Frontier of Global Risk and Security Management. Amicus Curiae, 88, 14-17. Go to original source...
  5. Ballard, M. E. and Welch, K. M. 2017. Virtual Warfare: Cyberbullying and Cyber-Victimization in MMOG Play. Games and Culture, 12 (5), 466-491. Go to original source...
  6. Boellstorff, T. 2011. Placing the Virtual Body: Avatar, Chora, Cypherg. In Mascia-Lees, F. E. (ed.). A Companion to the Anthropology of the Body and Embodiment, pp. 504-520. Go to original source...
  7. Bhabha, H. 1997. Of Mimicry and Man: The Ambivalence of Colonial Discourse. In Cooper, F. and Stoler, A. L. (eds.). Tensions of Empire: Colonial Cultures in a Bourgeois World, Part I (Framings), Chapter 3, pp. 152-160. Go to original source...
  8. Carstensen, G. 2004. Sexuella trakasserier finns nog i en annan värld: Konstruktioner av ett (o)giltigt problem. PhD Thesis. Förlags AB Gondolin.
  9. Choi, K.-S. and Lee, J. R. 2017. Theoretical Analysis of Cyber-interpersonal Violence Victimization and Offending using Cyber-routine Activities Theory. Computers in Human Behavior, 73, 394-402. D. J. and Van Bavel, J. J. 2007. The Iterative Reprocessing Model: A Multilevel Framework for Attitudes and Evaluation. Social Cognition, 25 (5), 736-760. Go to original source...
  10. Eckert, S. 2018. Fighting for Recognition: Online Abuse of Women Bloggers in Germany, Switzerland, the United Kingdom, and the United States. New Media & Society, 20 (4), 1282-1302. Go to original source...
  11. Foster, D. 2015. Five Proposals on Homophobia. In Expanding the Circle: Creating an Inclusive Environment in Higher Education for LGBTQ Students and Studies, pp. 225-235.
  12. Fox, J., Ralston, R. A., Cooper, C. K. and Jones, K. A. 2015. Sexualized Avatars Lead to Women's Self-Objectification and Acceptance of Rape Myths. Psychology of Women Quarterly, 39 (3), 349-362. Go to original source...
  13. Gámez-Guadix, M. De Santisteban, P. and Alcazar, M. Á. 2018. The Construction and Psychometric Properties of the Questionnaire for Online Sexual Solicitation and Interaction of Minors with Adults. Sexual Abuse, 30 (8), 975-991. Go to original source...
  14. Giumetti, G. W., Saunders, L. A., Brunette, J. P., DiFrancesco, F. M. and Graham, P. G. 2016. Linking Cyber Incivility With Job Performance Through Job Satisfaction: The Buffering Role of Positive Affect. Psi Chi Journal of Psychological Research, 21 (4), 230-240. Go to original source...
  15. Hatch, M. J. and Cunliffe, A. L. 2006. Organization Theory: Modern, Symbolic, and Postmodern Perspectives. 2nd ed. New York: Oxford University Press.
  16. Holt, T. J. 2018. Regulating Cybercrime through Law Enforcement and Industry Mechanisms. The ANNALS of the American Academy of Political and Social Science, 679 (1), 140-157. Go to original source...
  17. Kaplan, S. 2014. With #GamerGate, the Videogame Industry's Growing Pains go Viral. The Washington Post [online]. Available at: https://www.washingtonpost.com/news/morning-mix/wp/2014/09/12/with-gamergatethe-video-game-industrys-growing-pains-goviral/?noredirect=on&utm_term=.957ef0c3defd. [Accessed 2018, September 29].
  18. Kloess, J. A., Seymour-Smith, S., HamiltonGiachritsis, C. E., Long, M. L., Shipley, D. and Beech, A. R. 2017. A Qualitative Analysis of Offenders' Modus Operandi in Sexually Exploitative Interactions with Children Online. Sexual Abuse, 29 (6), 563-591. Go to original source...
  19. Kuem, J., Ray, S., Siponen M. and Kim, S. S. 2017. What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model. Journal of Management Information Systems, 34 (1), 40-70. Go to original source...
  20. Lewis, R., Rowe, M. and Wiper, C. 2017. Online Abuse of Feminists as An Emerging form of Violence Against Women and Girls. The British Journal of Criminology, 57 (6), 1462-1481. Go to original source...
  21. Lim, V. K. G. and Teo, T. S. H. 2009. Mind Your Emanners: Impact of Cyber Incivility on Employees' Work Attitude and Behavior. Information & Management, 46 (8), 419-425. Go to original source...
  22. Lindberg, N., Sailas, E. and Kaltiala-Heino, R. 2012. The Copycat Phenomenon after Two Finnish School Shootings: An Adolescent Psychiatric Perspective. BMC Psychiatry, 12, 91-106. Go to original source...
  23. Louderback, E. R. and Antonaccio, O. P. 2017. Exploring Cognitive Decision-Making Processes, Computer-focused Cyber Deviance Involvement and Victimization: The Role of Thoughtfully Reflective Decision-Making. Journal of Research in Crime and Delinquency, 54 (5), 639-679. Go to original source...
  24. Lowry, P. B., Zhang, J., Wang, C. and Siponen, M. 2016. Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model. Information Systems Research, 27 (4), 962-986. Go to original source...
  25. Lyons, B. D., Hoffman, B. J., Bommer, W. H., Kennedy, C. L. and Hetrick, A. L. 2016. Off-duty Deviance: Organizational Policies and Evidence for Two Prevention Strategies. Journal of Applied Psychology, 101 (4), 463-483. Go to original source...
  26. Maier, C., Wirth, J., Laumer, S. and Weitzel, T. 2017. Personality and Technostress: Theorizing the Influence of IT Mindfulness. In ICIS 2017 Proceedings [online]. Available at: https://aisel.aisnet.org/icis2017/Security/Presentations/10/. [Accessed 2018, September 15].
  27. Mainiero, L. A. and Jones, K. J. 2013. Workplace Romance 2.0: Developing a Communication Ethics Model to Address Potential Sexual Harassment from Inappropriate Social Media Contacts Between Coworkers. Journal of Business Ethics, 114 (2), 367-379. Go to original source...
  28. Marganski, A. and Melander, L. 2018. Intimate Partner Violence Victimization in the Cyber and Real World: Examining the Extent of Cyber Aggression Experiences and Its Association with In-person Dating Violence. Journal of Interpersonal Violence, 33 (7), 1071-1095. Go to original source...
  29. Matheson, L. C. I. and Lyle, E. 2017. Gender Bias in Canadian Military Leadership Training. Journal of Ethnographic & Qualitative Research, 12 (1), 18-28.
  30. Maurer, T. and Janz, S. 2014. The Russia-Ukraine Conflict: Cyber and Information Warfare in a Regional Context. The International Relations and Security Network, 17, 277-293.
  31. Moafa, F. A., Ahmad, K., Al-Rahmi, W. M., Yahaya, N., Kamin, Y. B. and Alamri, M. M. 2018. Cyber Harassment Prevention Through User Behavior Analysis Online in Kingdom of Saudi Arabia (KSA). Journal of Theoretical and Applied Information Technology, 96 (6), 1732-1746.
  32. Navickas, V., Kuznetsova, S. A. and Gruzauskas, V. 2017. Cyber-Physical Systems Expression in Industry 4.0 Context. Financial and Credit Activity: Problems of Theory and Practice, 2 (23), 188-197. Go to original source...
  33. Park, Y. A., Fritz, C. and Jex, S. M. 2018. Daily Cyber Incivility and Distress: The Moderating Roles of Resources at Work and Home. Journal of Management, 44 (7), 2535-2557. Go to original source...
  34. Pereira, F., Spitzberg, B. H. and Matos, M. 2016. Cyber-harassment Victimization in Portugal: Prevalence, Fear and Help-seeking among Adolescents. Computers in Human Behavior, 62, 136-146. Go to original source...
  35. Ritter, B. A. 2008. Cybersexual Harassment: Development and Validation of a Measure of the Online Environment and Online Sexual Harassment. Academy of Management Annual Meeting Proceedings, 1, 1-6. Go to original source...
  36. Ritter, B. A. 2014. Deviant Behavior in ComputerMediated Communication: Development and Validation of a Measure of Cybersexual Harassment. Journal of Computer-Mediated Communication, 19 (2), 197-214. Go to original source...
  37. Salter, M. 2018. Publicising Privacy, Weaponising Publicity: The Dialectic of Online Abuse on Social Media. In Dobson, A. S., Robards, B. and Carah, N. (eds.). Digital Intimate Publics and Social Media, pp. 29-43. Go to original source...
  38. Sarpotdar, A. 2013. Sexual Harassment of Women: Reflections on the Private Sector. Economic & Political Weekly, 48 (40).
  39. Shannon, D. 2008. Online Sexual Grooming in Sweden - Online and Offline Sex Offences against Children as Described in Swedish Police Ddata. Journal of Scandinavian Studies in Criminology and Crime Prevention, 9 (2), 160-180. Go to original source...
  40. Shapka, J. D. and Maghsoudi, R. 2017. Examining the Validity and Reliability of the Cyber-Aggression and Cyber-Victimization Scale. Computers in Human Behavior, 69, 10-17. Go to original source...
  41. Sklenarova, H., Schulz, A., Schuhmann, P., Osterheider, M. and Neutze, J. 2018. Online Sexual Solicitation by Adults and Peers - Results from a Population Based German Sample. Child Abuse & Neglect, 76, 225-236. Go to original source...
  42. Spence, E. H. 2012. Virtual Rape, Real Dignity: Meta-Ethics for Virtual Worlds. In Sageng, J. R., Fossheim, H. J. and Larsen, T. M. (eds.). Philosophy of Computer Games, Chapter 9, pp. 125-142. Go to original source...
  43. Strikwerda, L. 2015. Present and Future Instances of Virtual Rape in Light of Three Categories of Legal Philosophical Theories on Rape. Philosophy & Technology, 28 (4), 491-510. Go to original source...
  44. Surma, I. 2016. Pushing the Boundaries of Digital Diplomacy: The International Experience and the Russian Practice. In Zlateva, T. and Greiman, V. A. (eds.). International Conference on Cyber Warfare and Security, pp. 304-311.
  45. Tiidenberg, K. 2014. Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 8 (1). Go to original source...
  46. Vitis, L. and Gilmour, F. 2017. Dick Pics on Blast: A Woman's Resistance to Online Sexual Harassment Using Humour, Art and Instagram. Crime, Media, Culture: An International Journal, 13 (3), 335-355. Go to original source...
  47. Vveinhardt, J. and Kuklytė, J. 2017. The Side Effect of Cyberbullying. In Kuzmin, S. V. (ed.). XLIX Международная научно-практическая конференция, pp. 8-10. ISBN 978-5-9500243-0-6.
  48. Warren, I. and Palmer, D. 2010. Crime Risks of Three-Dimensional Virtual Environments. Trends & Issues in Crime and Criminal Justice, 388, 1-6. Go to original source...
  49. Wolfendale, J. 2007. My Avatar My Self: Virtual Harm and Attachment. Ethics and Information Technology, 9 (2), 111-119. Go to original source...
  50. Young, G. and Whitty, M. T. 2010. Games Without Frontiers: On the Moral and Psychological Implications of Violating Taboos within MultiPlayer Virtual Spaces. Computers in Human Behavior, 26 (6), 1228-1236. Go to original source...

This is an open access article distributed under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.