1. Introduction
Stalking refers to the act or crime of intentionally and repeatedly following or harassing another person in circumstances that would cause a reasonable person to fear injury or death due to the threat expressed or implied. Cyberstalking is this same act or crime performed through information and communication networks, and there is no significant difference between the two definitions other than the location of the stalking (Bocij, 2006). Cyberstalking began to emerge as one of the main issues studied by criminologists, who dully described the damage of cyberstalking in the early days (Bennett et al., 2011; Reyns et al., 2012). However, scholars have shifted their attention to the causality of perpetration with the help of traditional sociological theories, such as strain theory, social learning theory, and self-control theory (Curry & Zavala, 2020; Fissel et al., 2021; Marcum et al., 2017; Wilson et al., 2023); or psychological factors, such as hostility, jealousy, and attachment problems (Deans & Bhogal, 2019; Toplu-Demirtas et al., 2020). Even so, empirical research on cyberstalking is still lacking, and more evidence is needed.
This study explores explanatory factors for cyberstalking on SNS (Social Network Service), especially focusing on gender differences among college students. According to the 2020 Cyber Violence survey conducted by the National Information Society Agency (NIA)
1. in South Korea, only 0.8% of youths surveyed had offending experiences of cyberstalking, while this figure was 19.1% for adults. In this regard, this study intends to examine the cyberstalking of adults, especially university students, who have relatively higher offense experiences of cyberstalking. In addition, this study examined whether the explanatory factors for cyberstalking are differentiated by gender.
Previous studies suggest that men are often the perpetrators of stalking, while women are the victims. Furthermore, there are many cases in which the victim is an ex-girlfriend or lover when the perpetrator is male, whereas for female perpetrators, the victim is a same-gender friend (Meloy & Boyd, 2003; Sheridan et al., 2014). It is also argued that the motive for a male stalker is a high level of obsession or retaliation for the opposite gender who informed him of break-up, while that for female stalkers is an extension of bullying by same-gender peers (Purcell et al., 2010). In addition, stalking by men is somewhat more violent than that by women, and includes physical violence (James & Farnham, 2003; Rosenfeld & Lewis, 2005). Based on these characteristics, it can be presumed that the causes of stalking between men and women are somewhat different. This study analyzes whether the motives and causes of cyberstalking differ between men and women.
Cyberstalking can be viewed as an extension of traditional stalking (or offline stalking, general stalking), but it has different characteristics (Bocij, 2006). Unlike traditional offline stalking, perpetrators and victims in cyberstalking often do not know each other, and the stereotypical role assignment of male perpetrators and female victims is not necessarily the case (or applicable) anymore in cyberstalking (Borrajo et al., 2015a; Deans & Bhogal, 2019). Nevertheless, cyberstalking studies (Dreßing et al., 2014) show that, although the rate of female perpetrators has increased compared to conventional stalking, it is still a norm that males are perpetrators and females are victims, and the target is often former girlfriends or lovers. Of course, some studies (Reyns et al., 2012) have shown that the perpetrators and victims tend to know each other rather than an unknown relationship. Is cyberstalking similar to traditional stalking? However, because cyberstalking today occurs on SNS or through instant mobile messengers rather than blogs and cafes in conventional Internet networks, it is highly likely that it would occur between people who know each other, so it may have characteristics similar to those of conventional stalking in reality.
In this study, we used various explanatory factors for SNS stalking and attempted to verify it. The existing factors can be divided into risk, control, and opportunity factors, and the interactive mechanism of these three factors is examined. The risk factor refers to the motive and causative factor that induces cyberstalking, the control factor is the factor that prevents cyberstalking, on the contrary, and finally the opportunity factor is the situational opportunity factor for the occurrence of stalking. This study examines the main risk effect on cyberstalking and the interaction effect between risk and control factors and between risk and opportunity factors.
The most notable aspect of the study is the application of such interaction effects to men and women separately and examination of the gender differences in the results. Previous studies have shown gender differences in the causes of conventional stalking (Purcell et al., 2010; Sheridan et al., 2014); the research question is whether gender differences exist in the main effects and interaction effects of three factors – risk, control, and opportunity – in cyberstalking. We take a look at the heterogeneous characteristics between men and women in the main effects and interaction effects of three factors of risk, control, and opportunity, and try to provide answers for the difference.
As such, this study attempts to deal with cyberstalking on SNS, such as Facebook and Instagram, due to the recent increases in the use of SNS as well as the rate of cyberstalking. Through these attempts, we will examine whether men and women differ in their risk, control, and opportunity factors for cyberstalking. Specifically, we examine the main effects and interactive effects of the risk, control, and opportunity factors in cases of cyberstalking, and examine the implications and alternatives from the results.
2. Literature Review
2.1. Risk Factors in Cyberstalking and Gender Differences
Stalking can be classified into three types: simple obsession, affectionate obsession, and delusion (Zonna et al., 1998). Simple obsessional is derived from a form of attachment or restoration of a relationship with a former spouse or lover, while affectionate obsessional arises from an expression of affection for someone they love. The delusional type of stalking arises from the illusion (false belief) that the victim loves the perpetrator. In the case of cyberstalking, apart from obsession and delusion, retaliation against the victim is also proposed as a major of offense (Mishra & Mishra, 2008). On the other hand, McFarlane and Bocij (2003) classified cyberstalking into four types of obsessions, retaliation, harassment and grouping. It can be said that obsession and affection are not the only motives; retaliation, punishment, harassment, and collectively in a majority of cases.
Here, in presenting the main causal factors of cyberstalking, we distinguish the explanatory factors of male and female stalking according to the above classification, as well as to the claim (Purcell et al., 2010) that males are mainly obsessed with former lovers, whereas females engage in same-sex bullying. Thus, we discuss the causal factors of cyberstalking with emphasis on the following two factors.
First, as we see in the cases of simple obsession and affection obsession, the main forms of stalking begin with the so-called obsession. Obsession is a major factor in men’s stalking behavior toward their former lovers and is known to be caused by a lack of attachment. It is argued that stalking arises out of confusion in attachment between the actor and his/her parents during childhood. Previous studies on attachment problems show that attachment with parents in childhood is very important, and lack of affection or violence from parents is more likely to manifest in the form of preoccupied, anxious, and insecure attachments rather than stable attachments. These characteristics of abnormal attachment are prevalent among stalkers suffering from relational problems (Davis et al., 2000; Dutton & Winstead, 2006; Patton et al., 2010). Individuals with attachment disorders want to control others in the relationship even in coercive ways because they want to get attention and reassurance from them, which leads to an increased outbreak of stalking. Moreover, fear of rejection, suspicion of others, and probable breakup of intimate relationships tend to produce anger and subsequent violence in extreme cases.
Second, cyberstalking is not just a matter of affection and obsession but is rather motivated by violent relationships such as bullying, retaliation, and punishment against others (Strawhun et al., 2013). Cyberstalking is very similar to cyberbullying, as it is a form of cyberbullying (or violence) that has traits of both, obsession and bullying. Furthermore, offenders blame and punish targets in the form of stalking. Just as the main cause of cyberbullying is retaliation and punishment against someone who has done wrong or harmed the perpetrator by spreading false rumors about them, stalking is also aimed at punishing and harassing the target, because cyber stalkers think victims deserve punishment and harassment. Offenders justify their actions through these processes, which also serve as a major explanatory factor (Fissel et al., 2024; Lanares et al., 2021; Santos et al., 2024).
In particular, heterosexual men with insecure attachment disorders tend to be obsessive with their partners and try to dominate them, leading to stalking. Although few stalking studies have applied attachment discussion to men and women separately, dating violence studies show that, unlike women, men often try to control their partner in their relationship with ex-partners and often use violence to vent their resentment against separation. Therefore, if male violence is somehow related to attachment problems (Follingstad et al., 2002), and if cyberstalking is an extension of offline stalking, then attachment is a more suitable predictor for male stalking as compared to female stalking.
Bullying and retribution in stalking tend to occur more often in women than in men. Similar to the statement that bullying is more prevalent among women than men, the forms of warning and punishment against those who stand out could be more likely to be suitable in cases of female stalking. Just as women’s stalking tends to justify their actions by blaming the person who provides the cause (Langhinrichsen-Rohling, 2012), it takes the form of bullying against female peers to punish and deny out of hate, which is quite different from male stalking. In other words, the motive for punishment, such as denying and blaming the other, can explain female stalking better in the form of bullying. Borrajo and colleagues (2015b) suggested that the justification belief of violence in explaining cyber dating abuse was more significant in women and acted as a form of self-defense.
2.2. Gender Differences in Control and Opportunity Factors
2.2.1. Control and Opportunity Factors
While the risk factor has a positive (+) relationship with cyberstalking, the control factor has a negative (-) relationship. Here, rather than the motive and risk of cyberstalking, we focus on the factors that can control and prevent it. The most representative theory on the control factor is the social control theory (Hirschi, 1969). This theory presents several social bonding factors as an answer to the question of why people do not commit crimes rather than why they commit crimes. In the context of cybercrime, social bond assuming individual moral attitude and ethical sense as moral belief is also important. In cyberspace, cyberstalking is more permissible because of the characteristics of anonymity and noncontact, so a lack of control over former traits makes people commit cyberstalking more. In that sense, possessing a moral attitude toward cyberstalking can be a major factor in controlling and preventing stalking. In a stalking study on college students, Fox et al. (2011) suggested that the attitude toward stalking was the main explanatory factor for both the perpetration and victimization of stalking. In their cyberstalking analysis, Lee et al. (2020a) also suggested that a moral attitude toward stalking was the main factor of cyberstalking. Therefore, individual morality is a major control factor in cases of stalking.
Self-control is another major control factor found to be significant in previous studies. The general theory of crime by Gottfredson and Hirschi (1990) noted that most crimes occur immediately and impulsively so that one’s criminal behavior is differentiated by internal disposition, implying an individual’s capacity to manage and control immediate gratification and impulsivity. Self-control would account for the outbreak of any kind of crime, and even cybercrimes including cyberstalking can be explained by a main factor of self-control. In stalking research (Davis et al., 2012), self-control is evaluated as one of the most important factors in the application of similar self-regulation theory (Baumeister et al., 1994). In other words, it is easy to act accidentally in cyberspace, and a person with low self-control can easily commit cyberstalking, but if the person with high self-control can refrain from and control the behavior, it can be seen that the possibility of violation is low.
On the other hand, in other discussions on crime, its opportunity factor has been emphasized. For example, the lifestyle theory (Hindelang et al., 1978) and routine activity theory (Cohen & Felson, 1979; Meier & Miethe, 1993) emphasize that there should be an opportunity for crime to occur anyway. Unlike the control factor that has a negative (-) relationship with crime, opportunity is a factor that promotes crime and thus is positively (+) related to it. These discussions can also be applied to cybercrime, suggesting that the more opportunities and conveniences there are for crime to occur, the more cybercrime would occur unaffectedly (Holt & Bossler, 2008; Marcum et al., 2010). In cyberspace, it is easy to commit a crime with a single click, and there are many accidental opportunities, such as the absence of surveillance, which can be seen as a major cause of crime.
Opportunity factors, such as non-face-to-face (or untact) and anonymous situations, can act as major factors in cybercrime (Barlett, 2015; Lowry et al., 2016; Wright, 2013). Here, attention is paid to the anonymity of the many opportunity factors. In the case of cyberstalking, anonymity is a major explanatory factor (Philips & Morrissey, 2004). Bocij (2006) also finds that, in addition to disinhibition emerging from anonymity, the ease of opportunity and technical ability are other major factors of cyberstalking. As such, opportunity is another major factor that facilitates cyberstalking.
2.2.2. Gender Differences in Their Moderating Effects
Apart from the risk factors, cyberstalking would be more easily explained when control factors are withheld or opportunity factors are disclosed. As explained above, the control factor acts (works) negatively (-) on cyberbullying, whereas the opportunity factor acts (works) positively (+). Such control and opportunity factors can work as a buffer or catalyst integrally in the action of risk factors.
This argument is based on existing integrated theory. Agnew’s (1992) general strain theory posits that while strain is a major risk, crime is more likely to occur when social or internal control is low, covering another factor building up an integrated theory. To some extent, this type of integrated model has been supported in subsequent studies (Mazerolle & Maahs, 2000; Morash & Moon, 2007). In addition, according to the coercion and social support theory by Colvin et al. (2002), both coercion and supporting factors need to be considered integrally when we divide explanatory factors into two parts: coercion and support. Referencing a study where self-control and morality were utilized as the main factors of control (Barton-Crosby & Hirtenlehner, 2021), Lee and colleagues (2021) explained cyberbullying with the main effects and the interaction effects between risk factors and control factors, where the former utilized cyberbullying victimization and cyberbullying peers, while the latter used morality and self-control.
In previous studies, morality and self-control were found to be significant in both genders, showing no difference between men and women in inhibiting crime (Burton et al., 1998; Ishoy & Blackwell, 2019; Shekarkhar & Gibson, 2011; Weerman et al., 2016). However, when we consider the role of gender difference in the buffering effect of control factors, they appeared to be more significant among women, even if there were not many supporting materials. Jang and Johnson (2005) compared the gender effect of strain on crime and suggested that religiosity had a buffering effect on crime in women; this finding was supported by Jang (2007). This implies that women are less likely to commit crimes if they have the morality and self-control to inhibit criminal activity. In addition, Mears et al. (1998) examined the gender-differentiated buffering effect of morality in the relationship between delinquent peers and crime and suggested that morality did not buffer the influence of delinquent peers on crime for men, while it played a buffering role for women. This implies that the probability of a criminal act declines with a high level of morality, even if youth have many delinquent peers. Furthermore, the moderating effect of self-control as a controlling factor in the relationship between delinquent peers and crime was greater for women than for men. Cheung and Cheung (2010) showed that the interaction effect of self-control on the influence of strain on delinquency was greater for women than for men. In other words, these outcomes imply that men are unable to control their morality or self-control in the action of a certain risk, but women are more likely to be able to control their morality or self-control in the process.
On the other hand, it is also likely that the risk factors of cyberstalking would work together with the opportunity factors. In fact, scholars who emphasize opportunity factors have argued that motivated offenders commit crimes when there are opportunities for crime, such as suitable targets and the absence of guardians working together (Cohen & Felson, 1979; Meier & Miethe, 1993). As the opportunity factor used to be treated as a major factor interacting with various risk factors in previous cybercrime studies (Lee et al., 2020b), it is likely that criminal opportunity factors would interact with risk factors in explaining cyberstalking in an integrated way. In other words, in the risk factors mechanism, there should be an opportunity for risk to be activated more, and such opportunity factors would promote the impact of risk factors on deviant behaviors.
Some studies on opportunity factors by gender show that opportunity operates more effectively for men than for women. Augustyn and McGloin (2013) argued that women do not easily engage in deviant behavior, even by chance, due to parental control or internal restraints, whereas men have a high plausibility of involvement in delinquency if opportunities arise due to the manifestation of masculinity in certain circumstances. In addition, Marcum et al. (2014), studying the impacts of various factors on cyberbullying by gender, also suggested that opportunity factors appear to be more important to men. Some research results have shown that factors such as anonymity—a representative variable known as one of the opportunity factors—have a stronger influence on men than on women (Wang et al., 2021). Although few previous studies have dealt with opportunity factors by gender as a moderating variable, we can propose that the effect of opportunity factors as moderators precipitating the impact of risk factors on criminal behavior such as anonymity would be greater for men than for women.
3. Current Study and Research Questions
To explain cyberstalking, this study proposes a model that focuses on risk, control, and opportunity factors (separately and simultaneously), and empirically tests the effects of these factors on cyberstalking. First, it investigates the main effects of risk factors for cyberstalking. Second, it investigates the interaction effects of risk factors with both control and opportunity factors, respectively, in explaining cyberstalking. Specifically, it is predicted that two types of interaction effects will be tested, such that there will be an interaction effect between the risk factor and the control factor, as well as an interaction effect between the risk factor and the opportunity factor. The former interaction is called suppressing interaction, whereas the latter is termed precipitating interaction.
We used lack of attachment and denial of victim risk factors, as the main types and motives of the risk factors are obsession and retribution. According to the discussion on attachment as a risk factor, it is likely that a person with attachment confusion will commit stalking because of problems in personal relationships such as anger or frustration in the relationship. From the standpoint of previous stalking research (Follingstad et al., 2002), the lack of attachment seems to occur more likely in men who try to control their relationship with the opposite sex or partner. Denial of the victim refers to denying and blaming the victim for providing reasons for stalking, as well as chastising the victim seems to be more evident for female stalking than for male stalking (Borrajo et al., 2015b; Langhinrichsen-Rohling, 2012).
Research question 1: Does lack of attachment and denial of the victim affect cyberstalking? Are there gender differences in the impact of these factors?
Lack of attachment and denial of victim are the main risk factors for cyberstalking, but we posit that stalking would be more likely to occur when control factors such as morality and self-control are low, and less likely to occur when the control factors are high. In the same manner, we posit that the effects of risk factor on stalking would contribute more to cyberstalking when the opportunity factors are high. In other words, lack of attachment and denial of the victim as risk factors will interact negatively (-) with morality and self-control as control factors, while interacting positively (+) with anonymity as an opportunity factor. Thus, based on previous studies (Jang, 2007; Marcum et al., 2014; Mears et al., 1998; Wang et al., 2021), it can be assumed that there will be differences between men and women in the moderating effect of control and opportunity factors in such a way that the former will be greater for women, while the latter will be greater for men.
Research question 2: Do risk factors (lack of attachment and denial of the victim) and control factors (morality and self-control) have negative (-) interaction effects with cyberstalking? Are there gender differences in the impact of these factors?
Research question 3: Do risk factors (lack of attachment and denial of the victim) and opportunity factors (anonymity) have positive (+) interaction effects on cyberstalking? Are there gender differences in the impact of these factors?
4. Data and Methods
4.1. Sample and Procedure
In this study, we examined SNS cyberstalking among adult college students. For the survey, we selected 60 students from each of the five universities in Seoul, South Korea. Ine university was selected from each of five regions in Seoul: east, west, north, south, and center. A quota sampling was applied within each university with three demographic variables: gender, academic major and academic level. The Survey was conducted over a two-week period in July 2018, with approval from the Institutional Review Board of the first author’s institution (IRB#). Participants were informed that their participation was completely voluntary, and their responses would be treated as confidential and protected by the law. A total of 304 male and female students were surveyed. Among them, 270 SNS users were finally selected and analyzed.
We conducted OLS regression analysis using SPSS version 24. The baseline model examined the effect of two risk factors on cyberstalking by gender, controlling sociodemographic variables. In addition, we incorporated interaction terms with each moderating variables. To mitigate multicollinearity, the interaction terms were mean-centered.
4.2. Measurements
We use the actual perpetration of cyberstalking as the dependent variable in the current study. While previous studies have used inconsistent measurements for this variable (Curry and Zavala, 2020; Marcum et al., 2014, 2017), we specifically define cyberstalking as more than just accessing or monitoring a partner’s social media account without consent. In our context, it refers to the act of stalking, which includes sending persistent messages to a partner against his/her wishes or causing anxiety and fear. To operationalize this definition, participants were asked to respond to the following questions for the past year, “I have continuously sent messages on SNS even though the victim rejected it,” “I have consistently sent a friend request on SNS even though the victim rejected it,” “I have uploaded a post that could cause fear or anxiety in a victim on SNS,” “I have ever sent a message or made a comment that could cause fear or anxiety against the victim on SNS”. Four items have four-response scale: “never (score=0),” “once or two (score=1),” “three to eight times(score=2),” and “nine or more times(score=3).” Each score (0-3) of four items was summed and the natural log-transformation of the summed score was applied to reduce positive skewness in the variable.
Lack of attachment as a risk factor corresponding to attachment avoidance and attachment anxiety was constructed with 12 items among the items on the attachment scale developed by Brennan et al. (1998), such as “I feel uncomfortable with being too close to others” and scored on a 5-point Likert scale, ranging from “not at all true (1)” to “very true (5).” The responses were then summed, resulting in a composite score (alpha=.922).
Denial of the victim utilized items from the discussion of techniques of neutralization (Sykes & Matza, 1957) in stalking situations. Three items were selected from the study by Borrajo et al. (2015b), such as “Anyone stalked is responsible for the victimization to a degree” and scored on a 5-point Likert scale (alpha=.890).
The morality of cyberstalking, as a control factor to control the impact of the risk factor, consists of one question regarding how bad the cyberstalking behavior is on a 5-point Likert scale from “not bad at all (1)” to “very bad (5)”.
Self-control, based on a previous study (Grasmick et al., 1993), consisted of two questions for each of the following six traits: impulsivity, risk-seeking, simple task-seeking, activity, selfishness, and temperament. Thus, 12 questions in total including “I often act impulsively” were asked to get answers on a 5-point scale, ranging from “not at all true (1)” to “very true (5).” The responses were then summed, resulting in a composite score and finally inverse-coded (alpha=.823).
Anonymity, as an opportunity factor, was asked to check whether they used SNS mainly in anonymous situations. Four questions were asked: “Actually I do not use my real name on SNS,” and responses were made on a 5-point scale (alpha=.906).
As a sociodemographic control variable, age was recorded by year of birth. In addition, the family’s subjective economic level was classified into 5 categories from “low” to “lower-middle,” “middle,” “upper-middle,” and “high.”
5. Results
Table 1 presents descriptive statistics of the variables used in this study. The study sample consisted of 145 males (53.7%) and 125 females (46.3%). The average age of the respondents was 21.37 ranging from to 18–28 years, with an average of 21.9 years old for males and 20.9 for females. The average value of the family’s economic level was 3.18 ranging 1-5 with 3.24 for males and 3.13 for females.
The average lack of attachment as an independent variable was 32.452 ranging between 12-60 with males scoring 34.064, a little higher than females (31.062). The average denial of victims was 5.024 in the range of 3–15 with males scoring 6.408, which was significantly higher than that of females (4.166). Morality, as a control factor, had an average of 4.390 ranging from to 1-5 with males scoring 3.944, which was lower than that of females (4.778). The average self-control score was 37.478 in the range of 12-60, and males scored 36.960, which was lower than that of females (37.747). As an opportunity factor, the average of anonymity in the range of 4–20 was 10.048, and males scored 10.912, which was higher than that of females (9.303). Finally, the average logged score of cyberstalking experience, the dependent variable, has an average of .512 ranging between 0–2.56 with males (.814) scoring much higher than females (.252).
Prior to the analysis of the major research question,
Table 2 present the effects of the risk factors on cyberstalking. In the case of males, as shown in
Table 2, lack of attachment was significant with the largest effect size (β = .524), followed by denial of the victim (β = .347), both at the p<.001 level. In the case of females in
Table 2, denial of victim had the greatest effect (β = .315) at the p<.001 level. However, lack of attachment was not significant for females, which is an important difference between males and females, which supports the predictions of this study to some extent.
Table 3-1 and 3-2 present the results of the interaction effect between risk, control, and opportunity factors. Analysis 1 presents the interaction effect between the risk factors and the control factor, morality. The direct and independent influence of morality was significant for men (β = -.805) at the p<.001 level, but not for women (β = -.157). Next, we investigated the interaction effects between risk factors (lack of attack and denial of victim) and morality. It showed that the interaction effect between lack of attachment and morality was not significant for both men and women, but the interaction effect between denial of victim and morality was significant at the p<.05 level only for women (β = -.303) even if it was still not significant for men. This means that the moderating effect as a control factor for morality works more in the case of women.
Analysis 2 presents the interaction effect between the risk factors and the control factor, self-control. The direct and independent influence of self-control was not significant for both men and women. Next, we investigated the interaction effects between risk factors (lack of attack and denial of victim) and self-control, which is a control factor. The interaction effects between risk factors and control factors were not significant for men, but only one interaction effect was significant for women, that is, between denial of victim and self-control (β = -.211) at the p<.05 level. This means that the moderating effect of self-control as a control factor is more important for women.
Finally, in Analysis 3, the interaction effect between the risk factors and the opportunity factor for anonymity is provided. Unlike the previous steps, the direct and independent influence of anonymity on cyberstalking was significant for both men (β = 0.263) and women (β = 0.319) at the p<.001 level. Next, the interaction effects between risk factors (lack of attack and denial of victim) and anonymity (an opportunity factor) were investigated. Result showed that the interaction effect between lack of attachment and anonymity was significant for men (β =0.251), but it was not significant for women. It showed that the interaction effect between denial of victim and anonymity was not significant for both men and women. This implies that the moderating effect of anonymity as an opportunity factor works more in the case of men.
6. Discussion
To explain cyberstalking in the use of SNS, this study investigated the influence of risk factors for cyberstalking and also tried to test the interaction effects focusing on risk, control, and opportunity factors simultaneously. The proposed hypothesis posits that there will be a negative (−) interaction (risk factor × control factor) and a positive (+) interaction (risk factor × opportunity factor). Even if the risk of committing cyberstalking commission is high, its probability is low if the condition of the control factor is high, or that of the opportunity factor is low. In contrast, even if the risk of a cyberstalking commission is low, the probability of a real commission increases if the condition of the control factor is low or that of the opportunity factor is high. In this study, we used lack of attachment and denial of victim as risk factors, morality and self-control as control factors, and anonymity as opportunity factors.
Furthermore, this study predicted that the interaction between risk and moderating factors (control and opportunity) would differ by gender. It posits that the impact of the risk factors - lack of attachment and denial of victim – would be differentiated by gender such that lack of attachment would be important for men and denial of victim for women. In the action of these risk factors, the interaction effect is also differentiated by gender in such a way that the moderating effect of control factors will be greater for women than for men, and that of opportunity factors such as anonymity will be greater for men than for women. Thus, the interaction between risk factors (lack of attachment and denial of victim) and control factors (morality and self-control) would be greater in women, while that between risk factors (lack of attachment and denial of victim) and opportunity factors (anonymity) would be greater in men.
The research outcomes support the general hypotheses of this study. In the case of men, stalking originates from the obsession with a former lover of the opposite sex. For men, denial of victim was also significant, but the effect of lack of attachment was stronger. On the other hand, unlike men, women’s lack of attachment was not significant, and the effect of denial of victim was significant, suggesting that stalking is an extension of cyberbullying and is committed as a form of punishment to deny or blame the other person. Moreover, the effect of the control factor is greater for women, with the interaction effect of denial of victim x morality and the interaction effect of denial of victim x self-control being more significant for women. This suggests that the two control factors reduced the impact of denial of victim, a key risk factor for women.
On the other hand, the facilitating role of the opportunity factor was predicted to be greater for men than for women. However, the role of opportunity factors in interaction is different for men and women such that while the interaction effect of lack of attachment × anonymity appeared more significant in men, even though denial of victim × anonymity was not significant in both men and women. What it suggests is that, as predicted, the opportunity factors in the interaction effects facilitate and precipitate the action of risk factors on cyberstalking for men.
Out of these study outcomes, we found that the cause of cyberstalking behavior is somewhat different between men and women and that the moderating effects of control factors and opportunity factors on cyberstalking through risk factors could also be differentiated by gender. This implies that the action of risk factors in cyberstalking needs to be identified separately for each gender. For men, addressing the problems of fixation and parental nurturing is critical to preventing cyberstalking. This finding is consistent with previous research that emphasized the importance of fixation or attachment style (Follingstad et al., 2002), even though it did not examine gender differences. For both women and men, retaliation, punishing, and blaming others are important causes of cyberstalking and the change of the justification belief is necessary. These results imply that gender-specific solutions are required, such as counseling and healing for male stalkers to reduce their obsession with their former partner or lover, and for women to get along and foster relationships with their same-sex friends. Furthermore, a gender-differentiated policy needs to be pursued in search of countermeasures that contribute to controlling the action of the risk. For example, moral and ethics education may be more effective and suitable for women, whereas the removal of opportunities for cyberstalking would be more effective and suitable for men. In addition,
Now that empirical research on cyberstalking is scarce, this study could be considered to be meaningful and contributable for developing the subject in this field in bits and pieces. In addition, it is also meaningful to clarify the process by which the moderating action of control and opportunity factors with risk factors on cyberstalking can be differentiated by gender. However, a limitation of this study is that the study sample was collected from college students. In addition, this study assumes that men reported stalking women and women reported stalking their same-sex friends, but in the future, it is necessary to study more in-depth through stalking surveys that identify the target-gender of each stalker including intimate partner stalking (Gordon& Dardis, 2023; Reiss et al., 2022; Smoker & March, 2017). While this study provides an example , future research will need to build a more robust integrative model that includes risk, control, and opportunity factors, and may require the construction of gender-integrated or gender-specific models. Future research should continue to expand the sample by targeting not only college students but teenagers and adults as well.
7. Conclusions
This study found that the effects of lack of attachment and denial of victims as risk factors for cyberstalking differed by gender. As a risk factor, the influence of lack of attachment was greater in men, while denial of the victim was greater in women Furthermore, in the context of risk factors, we predicted that the moderating effect of the control factor would be greater for women, and that of the opportunity factor such as anonymity would be greater for men. The results show that the moderating effects of the control factors were greater for women in such a way that the interaction between denial of victim and morality and that between denial of victim and self-control were significant for women, while the moderating effect of the opportunity factor was greater for men in such a way that the interaction between lack of attachment and anonymity was more significant for men. These findings suggest that the causal processes of cyberstalking and the respective moderating actions can be differentiated across gender, which implies that a gender-differentiated policy needs to controlling the action against cyberstalking.
Author Contributions
Conceptualization, SL and P; formal analysis, SL and P; writing—original draft preparation, SL, and P; writing—review and editing, P. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Institutional Review Board Statement
Informed Consent Statement
Informed consent was obtained from all subjects involved in the study.
Data Availability Statement
n/a.
Conflicts of Interest
The authors declare no conflicts of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| SNS |
Social Network Service |
| LoA |
Lack of Attachment |
| Dov |
Denial of Victims |
| OLS |
Ordinary Least Squares |
References
- Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47–88. [CrossRef]
- Augustyn, M. B. & McGloin, J. M. (2013). The risk of informal socializing with peers: Considering gender differences across predatory delinquency and substance use. Justice Quarterly, 30(1), 117–143. [CrossRef]
- Barlett, C. P. (2015). Anonymously hurting others online: The effect of anonymity on Cyberbullying frequency. Psychology of Popular Media Culture, 4(2), 70–79. [CrossRef]
- Baron-Crosby, J. & Hirtenlehner, H. (2010). The role of morality and self-control in conditioning the criminogenic effect of provocation: A partial test of situational action theory. Deviant Behavior, 42(10), 1273–1294.
- Bartusch, D. R. J., Lynam, D. R., Moffitt, T. E. & Silva, P. A. (1997). Is age important? Testing a General versus a Developmental Theory of Antisocial Behavior. Criminology, 35(1), 13–48. [CrossRef]
- Baumeister, R. F., Heaterton, T. F. & Tice, D. M. (1994). Losing Control: How People fail at Self-Regulation. New York: Academic Press.
- Bennett, D. C., Guran, E. L., Ramos, M. C. & Margolin, G. (2011). College students’ electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors. Violence and Victims, 26(4), 410–429. [CrossRef]
- Bocij, P. (2006). Cyberstalking: Harassment in the Internet age and how to protect your family. Praeger.
- Borrajo, E., Gámez-Guadix, M. & Calvete, E. (2015b). Justification beliefs of violence, myths about love and cyber dating abuse. Psicothema, 27(4), 327–333. [CrossRef]
- Borrajo, E., Gámez-Guadix, M., Pereda, N. & Calvete, E. (2015a). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358–365. [CrossRef]
- Brennan, K. A., Clark, C. L. & Shaver, P. R. (1998). Self-reported measurement of adult attachment. In JA Simpson and WS Rholes (Eds.), Attachment theory and close relationship. NY: The Guilford Press.
- Burton, V. S., Cullen, F. T., Evans, T. D., Alarid, L.F. & Dunaway, R. G. (1998). Gender, self-control and crime. Journal of Research in Crime and Delinquency, 35(2), 123–147. [CrossRef]
- Cheung, N. W. T. & Cheung, Y. W. (2010). Strain, self-control, and gender differences in delinquency among Chinese adolescents: Extending general strain theory. Sociological Perspectives, 53(3), 321–345. [CrossRef]
- Cohen, L. E. & Felson, M. (1979). Social change and crime rate trends: A routine activities approach. American Sociological Review, 44(4), 588–608. [CrossRef]
- Colvin, M., Cullen, F. T. & Ven, T. V. (2002). Coercion, social support, and crime: An emerging theoretical consensus. Criminology, 40(1), 19–42. [CrossRef]
- Curry, T. & Zavala, E. (2020). A multi-theoretical perspective on cyber dating abuse victimization and perpetration within intimate relationships: A test of general strain, social learning, and self-control theories. Victims and Offenders, 15(4), 1–21.
- Davis, K. E., Ace, A. & Andra, M. (2000). Stalking perpetrators and psychological maltreatment of partners. Violence and Victims, 15, 473–487.
- Davis, K. E., Swan, S. C. & Gambone, L. J. (2012). Why doesn’t he just leave me alone? Persistent pursuit: A critical review of theories and evidence. Sex Roles, 66(5–6), 328–339. [CrossRef]
- Deans, H. & Bhogal, M. S. (2019). Perpetrating cyber dating abuse: A brief report on the role of aggression, romantic jealousy and gender. Current Psychology, 38(5), 1077–1082. [CrossRef]
- Dreßing, H., Bailer, J., Anders, A., Wagner, H. & Gallas, C. (2014). Cyberstalking in large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior and Social Networking, 17(2), 61–67. [CrossRef]
- Dutton, L. B. & Winstead, B. A. (2006). Predicting unwanted pursuit: Attachment, relationship satisfaction, relationship alternatives, and break-up distress. Journal of Social and Personal Relationships, 23(4), 565–586. [CrossRef]
- Fissel, E., Bryson, S.L. & Lee, J.R. (2024). Minimizing responsibility: The impact of moral disengagement on cyberbullying perpetration among adults. Crime and Delinquency, online first, 1-25.
- Fissel, E., Fisher, N. & Nedelec, J. (2021). Cyberstalking perpetration among young adults: An assessment of the effects of low self-control and moral disengagement. Crime and Delinquency, 67(12), 1935-1961.
- Follingstad, D. R., Bradley, R. G., Helff, C. M. & Laughlin, J. E. (2002). Model for predicting dating violence anxious attachment, angry temperament, need for relationship control. Violence and Victims, 17(1), 35–47. [CrossRef]
- Fox, K. A., Nobles, M. R. & Akers, R. L. (2011). Is stalking a learned phenomenon? An empirical test of social learning theory. Journal of Criminal Justice, 39(1), 39–47. [CrossRef]
- Gordon, D. L. & Dardis, C. M. (2023). Perceptions of intimate partner stalking and cyberstalking: Do perpetrator and victim gender and victim’s responses to stalking influence perceptions of criminal behavior and responsibility? Legal & Criminological Psychology, 28(2), 222-236.
- Gottfredson, M. R. & Hirschi, T. (1990). A general theory of crime. Stanford, CA: Stanford University Press.
- Grasmick, H. G., Tittle, C. R., Bursik, R. J. & Arneklev, B. J. (1993). Testing the core empirical implications of Gottfredson and Hirschi’s general theory of crime. Journal of Research in Crime and Delinquency, 30(1), 5–29. [CrossRef]
- Hindelang, M. S., Gottfredson, M. R. & Garofalo, J. (1978). Victims of personal crime. Cambridge. MA: Ballinger.
- Hirschi, T. (1969). Causes of delinquency. Berkeley, CA: University of California Press.
- Holt, T. J. & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25. [CrossRef]
- Ishoy, G. A. & Blackwell, B. S. (2019). Situational action theory’s self-control/morality interaction effects and the moderating influence of being female: A comparison of property and violent offending using a sample of juvenile delinquents. Feminist Criminology, 14(4), 391–419. [CrossRef]
- James, D. V. & Farnham, F. R. (2003). Stalking and serious violence. Journal of the American Academy of Psychiatry and the Law, 31(4), 432–439.
- Jang, S. J. & Johnson, B. R. (2005). Gender, religiosity, and reactions to strain among African Americans. Sociological Quarterly, 46(2), 323–357. [CrossRef]
- Joinson, A. N. (2003). Understanding the psychology of Internet behavior. Palgrave MacMillian.
- Jang, S. J. (2007). Gender differences in strain, negative emotions, and coping behaviors: A General Strain theory approach. Justice Quarterly, 24(3), 523–553. [CrossRef]
- Lanares, R., Aranda, M., Carcia-Domingo, M., Amezcua, T., Fuentes, V. & Moreno-Padilla, M. (2021). Cyber-dating abuse in young adult coupes: Relations with sexist attitudes and violence justification, smartphone usage and impulsivity. PLOS ONE, 1–19.
- Langhinrichsen-Rohling, J. (2012). Gender and stalking: Current intersections and future directions. Sex Roles, 66(5–6), 418–426. [CrossRef]
- Lee, S. S., Song, H. & Park, J. H. (2021). Exploring risk and protective factors for Cyberbullying and their interplay: Evidence from a sample of South Korean college students. International Journal of Environmental Research and Public Health, 18(24), 13415. [CrossRef]
- Lee, S. S., Jang, H. Y. & Park, C. S. (2020b). A comprehensive explanation of three factors for cyberbullying with smartphones. International Journal of Criminal Justice, 2(1), 95–114. [CrossRef]
- Lee, S. S., Shin. J., Lim, S. & Lim, H. (2020a). An empirical test of explanatory factors on cyberstalking. Korean Journal of Criminology, 32(2), 97–122.
- Lowry, P. B., Zhang, J., Wang, C. & Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962–986. [CrossRef]
- Marcum, C. D., Higgins, G. E., Freiburger, T. L. & Ricketts, M. L. (2014). Exploration of the cyberbullying victim/offender overlap by sex. American Journal of Criminal Justice, 39(3), 538–548. [CrossRef]
- Marcum, C. D., Higgins, G. E. & Nicholson, J. (2017). I’m watching you: Cyberstalking behaviors of university students in romantic relationships. American Journal of Criminal Justice, 42, 378–388.
- Marcum, C. D., Higgins, G. E. & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410. [CrossRef]
- Marcum, C. D., Higgins, G. E. & Ricketts, M. L. (2014). Juveniles and cyber stalking in the United States: An analysis of theoretical predictors of patterns of online perpetration. International Journal of Cyber Criminology, 8(1), 47–56.
- Mazerolle, P. & Maahs, J. (2000). General Strain and delinquency: An alternative examination of conditioning influences. Justice Quarterly, 17(4), 753–778. [CrossRef]
- McFarlane, L. & Bocij, P. (2003). An Exploration of predatory behavior in cyberspace: Towards a typology of cyber stalkers. First Monday, 8(0), 1–5.
- Mears, D. P., Ploeger, M. & Warr, M. (1998). Explaining the gender gap in delinquency peer influence and moral evaluations of behavior. Journal of Research in Crime and Delinquency, 35(3), 251–266. [CrossRef]
- Meier, R. F. & Miethe, T. D. (1993). Understanding theories of criminal victimization. In Crime and justice A. J. Reiss, & M. Tonry (Eds.). Chicago: University of Chicago Press, (pp. 459–499). [CrossRef]
- Meloy, J. R. & Boyd, C. (2003). Female stalkers and their victims. Journal of the American Academy of Psychiatry and the Law, 31(2), 211–219.
- Mishra, A. & Mishra, D. (2008). Cyberstalking: A challenge for web security. In L.J. Janczewski & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism. Hershey, PA: Information Science Publishing Reference.
- Morash M and Moon B (2007). Gender differences in the effects of strain on the delinquency of South Korean youth. Youth and Society, 38(3), 300–321. [CrossRef]
- Patton, C. L., Nobles, M. R. & Fox, K. A. (2010). Look who’s stalking: Obsessive pursuit and attachment theory. Journal of Criminal Justice, 38(3), 282–290. [CrossRef]
- Philips, F. & Morrissey, G. (2004). Cyberstalking and cyber predators: A threat to safe sexuality on the Internet. Convergence, 10(1), 66–79. [CrossRef]
- Purcell, R. M., Pathé, M. & Mullen, P. (2010). Gender differences in stalking behavior among juveniles. Journal of Forensic Psychiatry and Psychology, 21(4), 555–568. [CrossRef]
- Reiss, D. M., Curbow, B. A., & Wang, M. Q. (2022). Intimate partner cyberstalking among young adults: Associations with attachment and social support. Sexuality & Culture, 26, 2202-2221.
- Reyns, B. W., Henson, B. & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25. [CrossRef]
- Rosenfeld, B. & Lewis, C. (2005). Assessing violence risk in stalking cases: A regression three approach. Law and Human Behavior, 29(3), 343–357. [CrossRef]
- Santos, I. L., Lima, D. C. N., Pimentel, C. E., & Mariano, T. E. (2024). Attitude toward violence and cyberstalking: Gender’s moderating role. Deviant Behavior, 45(12), 1698-1710.
- Shekarkhar, Z. & Gibson, C. L. (2011). Gender, self-control and offending behaviors among Latino youth. Journal of Contemporary Criminal Justice, 27(1), 63–80. [CrossRef]
- Sheridan, L. P., North, A. C. & Scott, A. J. (2014). Experiences of stalking in same-sex and opposite-sex contexts. Violence and Victims, 29(6), 1014–1028. [CrossRef]
- Smoker, M. & March, E. (2017). Predicting perception of intimate partner cyberstalking: Gender and the dark tetrad. Computers in Human Behavior, 72, 390-396.
- Strawhun, J., Adams, N. & Huss, M. T. (2013). The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy and anger in relation to violence and abuse. Violence and Victims, 28(4), 715–730. [CrossRef]
- Sykes, G. M. & Matza, D. (1957). Technique of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670. [CrossRef]
- Toplu-Demirtas, E., Akcabozan-Kayabol, N. B., Araci-Iyiadin, A. & Fincham, F. D. (2020). Unraveling the roles of distrust, suspicion of infidelity, and jealousy in cyber dating abuse perpetration: An attachment theory perspective. Journal of Interpersonal Violence, 0(0), 1–31.
- Wang, X., Quio, Y., Li, W. & Dong, W. (2021). How is online disinhibition related to adolescents’ cyberbullying perpetration? Empathy and gender as moderators. Journal of Early Adolescence, 0(0), 1–29.
- Weerman, F. M., Bernasco, W., Bruinsma, G. J. N. & Pauwels, L. J. R. (2016). Gender differences in delinquency and situational action theory: A partial test. Justice Quarterly, 33(7), 1182–1209. [CrossRef]
- Wilson, C., Sheridan, L., & Garatt-Reed, D. (2023). Examining cyberstalking perpetration and victimization: A scoping review. Trauma, Violence & Abuse, 24(3), 2019-2033.
- Wright, M. F. (2013). The relationship between young adults’ belief about anonymity and subsequent cyber aggression. Cyberpsychology, Behavior and Social Networking, 16(12), 858–862. [CrossRef]
- Zonna, M. A., Palarea, R. E. & Lane, J. C. (1998). psychiatric diagnosis and the offender-victim typology of stalking. In JR Meloy (Ed.), The psychology of stalking: Clinical and forensic perspectives (pp. 69–84). San Diego: Academic Press.
Table 1.
Descriptive Statistics of the Variables (Means, S.D. and Range).
Table 1.
Descriptive Statistics of the Variables (Means, S.D. and Range).
| |
Total |
Male |
Female |
Range |
| M |
SD |
M |
SD |
M |
SD |
| Age |
21.370 |
2.047 |
21.900 |
2.030 |
20.900 |
1.952 |
18-28 |
| SES |
3.180 |
.742 |
3.240 |
.807 |
3.130 |
.680 |
1-5 |
| Lack of Attach |
32.452 |
10.281 |
34.064 |
12.058 |
31.062 |
8.251 |
12-60 |
| Denial of Victim |
5.204 |
2.881 |
6.408 |
3.432 |
4.166 |
1.740 |
3-15 |
| Morality |
4.390 |
1.079 |
3.944 |
1.340 |
4.778 |
.548 |
1-5 |
| Self-control |
37.478 |
7.455 |
36.960 |
8.088 |
37.747 |
6.858 |
12-60 |
| Anonymity |
10.048 |
4.451 |
10.912 |
4.750 |
9.303 |
4.047 |
4-20 |
| Cyberstalking |
.512 |
.860 |
.814 |
1.015 |
.252 |
.591 |
0-2.56 |
Table 2.
Impact of Risk Factors on Cyberstalking.
Table 2.
Impact of Risk Factors on Cyberstalking.
| |
|
Cyberstalking |
|
| Male |
Female |
| B |
β |
B |
β |
| Age |
-.032 |
-.064 |
.031 |
.101 |
| SES |
-.040 |
-.032 |
-.058 |
-.067 |
| Lack of Attach |
.044*** |
.524 |
.009 |
.122 |
| Denial of Victim |
.102*** |
.347 |
.107*** |
.315 |
| Adj R square |
.609 |
.118 |
| F score |
49.381*** |
5.802*** |
Table 3.
(1) Multiple Regressions on Cyberstalking (Male). (2) Multiple Regression on Cyberstalking (Female).
Table 3.
(1) Multiple Regressions on Cyberstalking (Male). (2) Multiple Regression on Cyberstalking (Female).
| (1) |
| |
|
Cyberstalking |
|
| 1 |
2 |
3 |
| B |
Β |
B |
β |
B |
β |
| Age |
.012 |
.024 |
-.032 |
-.064 |
-.020 |
-.040 |
| SES |
.029 |
.023 |
-.028 |
-.022 |
-.084 |
-.067 |
| Lack of Attach |
.012* |
.139 |
.044*** |
.520 |
.033*** |
.397 |
| Denial of Victim |
.012 |
.040 |
.099*** |
.335 |
.045 |
.153 |
| Morality |
-.610*** |
-.805 |
|
|
|
|
| Self-control |
|
|
.000 |
.001 |
|
|
| Anonymity |
|
|
|
|
.056*** |
.263 |
| LoA * Morality |
.002 |
.030 |
|
|
|
|
| DoV * Morality |
.004 |
.027 |
|
|
|
|
| LoA * Self-control |
|
|
.001 |
.052 |
|
|
| DoV * Self-control |
|
|
-.002 |
-.067 |
|
|
| LoA * Anonymity |
|
|
|
|
.005*** |
.251 |
| DoV * Anonymity |
|
|
|
|
.001 |
.016 |
| Adj R square |
.698 |
.602 |
.679 |
| F score |
71.095*** |
27.843*** |
38.532*** |
| (2) |
| |
|
Cyberstalking |
|
| 1 |
2 |
3 |
| B |
β |
B |
β |
B |
β |
| Age |
.027 |
.052 |
.034 |
.112 |
.029 |
.096 |
| SES |
-.055 |
-.067 |
-.059 |
-.067 |
-.077 |
-.089 |
| Lack of Attach |
.007 |
.112 |
.007 |
.093 |
.003 |
.035 |
| Denial of Victim |
.101*** |
.330 |
.078** |
.230 |
.099*** |
.291 |
| Morality |
-.123 |
-.157 |
|
|
|
|
| Self-control |
|
|
-.016 |
-.183 |
|
|
| Anonymity |
|
|
|
|
.047*** |
.319 |
| LoA * Morality |
-.000 |
-.041 |
|
|
|
|
| DoV * Morality |
-.056* |
-.303 |
|
|
|
|
| LoA * Self-control |
|
|
.000 |
.026 |
|
|
| DoV * Self-control |
|
|
-.008* |
-.211 |
|
|
| LoA * Anonymity |
|
|
|
|
.000 |
-.013 |
| DoV * Anonymity |
|
|
|
|
.014 |
.204 |
| Adj R square |
.138 |
.129 |
.155 |
| F score |
4.278*** |
3.980*** |
4.782*** |
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).