| Literature DB >> 35013728 |
Huong Thi Ngoc Ho1, Hai Thanh Luong2.
Abstract
Research on cybercrime victimization is relatively diversified; however, no bibliometric study has been found to introduce the panorama of this subject. The current study aims to address this research gap by performing a bibliometric analysis of 387 Social Science Citation Index articles relevant to cybercrime victimization from Web of Science database during the period of 2010-2020. The purpose of the article is to examine the research trend and distribution of publications by five main fields, including time, productive authors, prominent sources, active institutions, and leading countries/regions. Furthermore, this study aims to determine the global collaborations and current gaps in research of cybercrime victimization. Findings indicated the decidedly upward trend of publications in the given period. The USA and its authors and institutions were likely to connect widely and took a crucial position in research of cybercrime victimization. Cyberbullying was identified as the most concerned issue over the years and cyber interpersonal crimes had the large number of research comparing to cyber-dependent crimes. Future research is suggested to concern more about sample of the elder and collect data in different countries which are not only European countries or the USA. Cross-nation research in less popular continents in research map was recommended to be conducted more. This paper contributed an overview of scholarly status of cybercrime victimization through statistical evidence and visual findings; assisted researchers to optimize their own research direction; and supported authors and institutions to build strategies for research collaboration.Entities:
Keywords: Bibliometric analysis; Co-authorship analysis; Co-occurrence analysis; Cybercrime victimization; Web of science
Year: 2022 PMID: 35013728 PMCID: PMC8732210 DOI: 10.1007/s43545-021-00305-4
Source DB: PubMed Journal: SN Soc Sci ISSN: 2662-9283
Criteria for automatic filter
| Criteria | |
|---|---|
| Timespan | 2010–2020 |
| Document types | Article (Exclude early access) |
| Language | English |
| Research areas | Psychology; Criminology penology |
| WoS index | Social Sciences Citation Index (SSCI) |
Fig. 1PRISMA diagram depicts data collection from WoS database
Fig. 2Annual distribution of publications
Top contributing institutions based on total publications
| Institutions | Countries | TP | TC | AC |
|---|---|---|---|---|
| Masaryk University | Czech Republic | 17 | 191 | 11.24 |
| Michigan State University | USA | 16 | 290 | 18.13 |
| University of Antwerp | Belgium | 13 | 285 | 21.92 |
| Weber State University | USA | 10 | 265 | 26.50 |
| Pennsylvania State University | USA | 9 | 83 | 9.22 |
| Democritus University of Thrace | Greece | 8 | 214 | 26.75 |
| University of Cordoba | Spain | 8 | 484 | 60.50 |
| University of Vienna | Austria | 8 | 109 | 13.63 |
| Edith Cowan University | Australia | 7 | 256 | 36.57 |
| University of Cincinnati | USA | 7 | 254 | 36.29 |
| University of Seville | Spain | 7 | 495 | 70.71 |
| University of Victoria | Australia | 7 | 188 | 26.86 |
TP total publications, TC total citations for the publications reviewed, AC average citations per document
Fig. 3Top productive countries based on the number of publications
Top leading journals based on the quantity of publications
| Journal Titles | TP | TC | AC | SPY |
|---|---|---|---|---|
| Computers in Human Behavior | 56 | 2055 | 36.70 | 1985 |
| Cyberpsychology, Behavior and Social Networking | 24 | 554 | 23.08 | 1999 |
| Journal of Youth and Adolescence | 19 | 1285 | 67.63 | 1972 |
| Aggressive Behavior | 15 | 661 | 44.07 | 1974 |
| Journal of Interpersonal Violence | 14 | 370 | 26.43 | 1986 |
| Cyberpsychology: Journal of Psychosocial Research on Cyberspace | 13 | 73 | 5.62 | 2007 |
| Journal of Adolescence | 12 | 538 | 44.83 | 1978 |
| Journal of School Violence | 12 | 302 | 25.17 | 2002 |
| Frontiers in Psychology | 11 | 85 | 7.73 | 2010 |
| School Psychology International | 9 | 531 | 59.00 | 1979 |
SPY Started Publication Year
Top productive authors based on article count
| Authors | TP | TC | AC |
|---|---|---|---|
| Wright, Michelle F | 20 | 315 | 15.75 |
| Holt, Thomas J | 10 | 250 | 25.00 |
| Reyns, Bradford W | 10 | 265 | 26.50 |
| Holfeld, Brett | 8 | 110 | 13.75 |
| Kokkinos, Constantinos M | 8 | 214 | 26.75 |
| Ortega-Ruiz, Rosario | 8 | 483 | 60.38 |
| Vandebosch, Heidi | 8 | 185 | 23.13 |
| Yanagida, Takuya | 8 | 78 | 9.75 |
| Leukfeldt, Rutger | 7 | 165 | 23.57 |
| Spiel, Christiane | 7 | 107 | 15.29 |
The most-cited publications in subject of cybercrime victimization during 2010–2020
| Title | Author | Source title | Year | TC |
|---|---|---|---|---|
| Psychological, Physical, and Academic Correlates of Cyberbullying and Traditional Bullying | Kowalski et al. | Journal of Adolescent Health | 2013 | 442 |
| The Nature of Cyberbullying, and Strategies for Prevention | Slonje et al. | Computers in Human Behavior | 2013 | 323 |
| Associations among Bullying, Cyberbullying, and Suicide in High School Students | Bauman et al. | Journal of Adolescence | 2013 | 289 |
| Longitudinal and Reciprocal Relations of Cyberbullying With Depression, Substance Use, and Problematic Internet Use Among Adolescents | Gamez-Guadix | Journal of Adolescent Health | 2013 | 253 |
| Peer and Cyber Aggression in Secondary School Students: The Role of Moral Disengagement, Hostile Attribution Bias, and Outcome Expectancies | Pornari et al. | Aggressive Behavior | 2010 | 234 |
| Cyber Bullying and Internalizing Difficulties: Above and Beyond the Impact of Traditional Forms of Bullying | Bonanno et al. | Journal of Youth and Adolescence | 2013 | 205 |
| The Rate of Cyber Dating Abuse Among Teens and How It Relates to Other Forms of Teen Dating Violence | Zweig et al. | Journal of Youth and Adolescence | 2013 | 180 |
| The Overlap Between Cyberbullying and Traditional Bullying | Waasdorp et al. | Journal of Adolescent Health | 2015 | 178 |
| A Longitudinal Study of Cyberbullying: Examining Risk and Protective Factors | Fanti et al. | European Journal of Developmental Psychology | 2012 | 177 |
| Being Pursued Online: Applying Cyberlifestyle-Routine Activities Theory to Cyberstalking Victimization | Reyns et al. | Criminal Justice and Behavior | 2011 | 172 |
Fig. 4Collaboration among authors via network visualization (threshold three articles for an author, displayed 80 authors)
Fig. 5Collaboration among authors via network visualization (threshold three articles for an author, displayed 23 authors)
Fig. 6Collaboration among institutions via network visualization (threshold two articles for an institution, 156 institutions were displayed)
Fig. 7Collaboration among countries via overlay visualization
Statistic of keywords in themes
| No. | Themes | Keywords |
|---|---|---|
| 1 | Cybercrime | Cyber-interpersonal violence, cyber/online bullying, workplace cyberbullying, technologically facilitated violence, cyber/online/digital/internet aggression, proactive cyber aggression, reactive cyber aggression, cyber discrimination, cyber-ostracism, cyber hate, cyber trolling, cyberstalking, cyber grooming, cyber/online harassment, cyber/online sexual harassment, cyber dating abuse/violence, non-consensual pornography, image-based sexual abuse, revenge porn, sexting, virtual theft, cyber/online identity theft, online/internet fraud, pet scams, phishing, cyber/digital abuse, computer focused crimes, cyber-dependent crime, ransomware, hacking, malicious software, malware, computer exploits, port scans, and denial of service (dos) attacks |
| 2 | Sample and demographic factors | Young children, primary school children, elementary school children, post-primary, children and youth, secondary school students, secondary education, post secondary, school students, university students, college students, undergraduate, latino students, student leaders, higher education, juveniles, adolescent, pre-adolescent, early adolescent, late adolescent, youth, young adults, youth adults, adults, emerging adult, emerging adulthood, elder, gender, age, gender stereotype trait, gender typicality, gender junior-high, demographic differences |
| 3 | Location | Australia, Canada, Colombia, India, Northern Ireland, Republic of Ireland, Pakistan, Vietnam, Thailand, Spain, Italia, China, Hong Kong, the USA, Litva, Japan, Belgium, Romania, Turkey, Norway, South Korea, Netherland, Singapore, Portugal, Chile, Cyprus, England, Germany, Sweden, Hungary, Israel, Greece, Austria, Malaysia, Great Britain, United Kingdom, six countries (Germany, India, South Korea, Spain, Thailand and the USA), three countries (Israel, Litva, Luxembourg), four countries (the USA, the UK, Germany and Finland), four countries (Netherland, Germany, Thailand, The USA), two countries (Canada And Tazania), six countries (China, Cyprus, the Czech Republic, India, Japan and The USA), eight countries (Australia, Canada, Germany, Hong Kong, Netherlands, Sweden, The UK, and The USA), six Europe countries (Spain, Germany, Italy, Poland, the UK, and Greece), two countries (Canada and the USA) |
| 4 | Theory | Ciminological theory, routine activities theory, lifestyle-routine activities theory, lifestyle exposure theory, cyber-routine activities theory, criminal opportunity theory, general strain theory (strain theory), actor-network theory, theory of reasoned action (TRA), attribution theory, behavior change theories, buffering effect, bystander intervention model, evolutionary theory, health belief model, multi-theoretical, parent-child communication, perception modeling, protection motivation theory, rational choice theory, risk interpretation model, spillover effect, socio-ecological approach, social identity theory, self-determination theory, self-control theory, person-oriented approach, big five, compensatory social interaction model, the general aggression model, a multi-dimensional measurement model, dark triad personality traits, the cyclic process model |
| 5 | Methodology | Qualitative interviews, mix method design, survey method, questionnaire, question order, natural experiment, systematic review, meta-analysis, social network analysis, thematic analysis, factor analysis, contextual analyses, state-level analysis, multi-level analyses, latent class analysis, confirmatory factor analysis, multi-level analysis, latent profile analysis, latent transition analysis, macro-level crime analysis, panel survey/study, cross-lagged panel design, ex post facto study, longitudinal study, longitudinal cohort, longitudinal data, longitudinal patterns, cross-lagged panel model, daily methods, scale development, validity, bayesian profile regression, bootstrap mediation, class-level variables, classification, co-occurrence, construct validity, construct, convergent, correlates, country comparison, cross-national comparison, cross-sectional survey, cross-national data, cross-national research, multi-nation study, factor structure, frequency, functional magnetic resonance imaging, multiple mediators, individual variables, measurement invariance, methodological challenges, methods of counting crime, national crime victimization survey, self-reports, Quebec longitudinal study of child development. dass-21, European cyberbullying intervention project questionnaire (ECIPQ), SDQ (the strengths and difficulties questionnaire), affective styles, attribution style, CDAQ (cyber dating abuse questionnaire), SN-PEQ (the social networking-peer experiences questionnaire), the submissive behavior scale, the cyber bullying scale, the cyber victimization scale, the moral disengagement scale, the cyber-peer experiences questionnaire, school refusal assessment scale revised, the screening of harassment among peers, the moods and feeling questionnaire, the cambridge friendship questionnaire, online aggression scale, the cyberbullying triangulation questionnaire, the Warwick-Edinburgh mental well-being scale, the cyber dating violence inventory, the cyber aggression questionnaire for adolescents, violence tendency scale, revised cyber bullying inventory, the partner cyber abuse questionnaire, the patient health questionnaire-9, e-victimization scale, e-bullying scale |
| 6 | Technology, platforms and related others | Social media, internet, social networking sites, facebook, kakaotalk, instagram, technology, new technologies, adoption of technology, anonymity, smartphone, protocol, botnet, clickbait, computer-mediated communication, digital devices, electronic communication technology, information and communication technologies (icts), technological infrastructure, technology use, problematic internet use, media, media use, internet attachment, internet and abuse, internet communication, online, online intimidation, online lifestyle, online research, online risk behavior, online risks, online routine activity, overt narcissism, online activity, online behavior, online communication, online/electronic/mobile games, online disclosure, online disinhibition, personal information privacy, virtual, texting, text messaging, technical mediation, information/techical/cyber security, screen time, security notices, security seals, technical mediation, internet frequency, self-disclosure, media violence exposure |
| 7 | Psychology and mental health | Self-esteem, self-compassion, self-control, self-concept, self-efficacy, ict self-efficacy, self-harming, anxiety, symptoms of anxiety, depressive symptoms, childhood stress, hopelessness, moral, moral identity, moral disengagement, mental health, loneliness, externalizing problems, internalizing problems, internalizing symptoms, psychometrics, fear of crime, fear of victimization, fear of cybercrime, nomophobia, trust, attribution, hostile attribution bias, autism, personality profile, empathic accuracy, affective empathy, empathy, cognitive empathy, developmental trajectories, impulsivity, intellectual disability, internet addiction, motivation, cyber-relationship motives, narcissism, personality, psychopathic traits, psychopathy, psychosocial adjustment, school psychology, sensation seeking, psychological well-being, subjective well-being, well-being, active–passive patterns, asperger's syndrome, attention deficit hyperactivity disorder (ADHD), attitudes, attitudes toward Facebook, attitudes toward school, cyberbullying attitudes, autism spectrum disorder, avoidance of rest, awareness, overweight preoccupation, body dissatisfaction, body esteem, callous-unemotional traits, chronic pain, cognitive reappraisal, compulsive internet use, control beliefs, coping self-efficacy, covert narcissism, cyber incivility, cyberpsychology, decision-making, digital data security awareness, distress, eating disorders psychopathology, emotion regulation, emotional problems, emotion dysregulation, emotion perception accuracy, emotion perception bias, emotional adjustment, emotional competence, emotional distress, emotional impact, emotional intelligence, socio-emotional factors, social and emotional competencies, epidemiology, expressive suppression, general self-efficacy, harmful intention, intentionality, incivility, life satisfaction, mental health difficulties, metacognitive awareness, mimicry, internet use motives, motivational valence, normative beliefs about aggression, need for stimulation, belief in a just world, normative belief, normative belief about helping, normative beliefs, optimism, social cognition, social competence, perceptions, perceived acceptance, perceived burdensomeness, perceived emotional intelligence, perceived popularity, perceived risk, perceived social support, perceptions of blame, perceptions of peers, anger rumination, anger, state anger, trait anger, perpetration trait anger, persistence, physical and psychological problems, post-traumatic stress symptoms, psychological and behavioral health problems, psychological disease, psychological distress, psychological symptoms, psychopathology symptoms, psychometric properties, romantic jealousy, rumination, vulnerabilities, violence tendency, externalizing behaviors, antisocial behavior, behavior activation, behavior, behavior problems, behavior measures, bystanders behavior, cyberbullying behavior, high-risk internet behaviors, school refusal behavior, submissive behavior, helping behavior, controlling behavior, cyber behavior, promiscuity |
| 8 | Physical health | Sex, sex difference, sexual double standard, sexual orientation, sexual pressure, suicide ideation, suicide attempt, suicidality, adolescent health, physical disabilities, physical health, diet, disability, health risks, paedosexual, adolescent development |
| 9 | Family | Parental mediation, parents, family climate, household activity, in-law conflict, parent-adolescent communication, parent-adolescent information sharing, parent–child communication, parental awareness, parental control, parental mediation of media, parental monitoring, parental monitoring of cyber behavior, parental style |
| 10 | School | school bonding, school context, school record, value of learning, university, teacher bonding, teacher justice, teachers, peer education, peer influence, peer rejection, peer relations, peer nominations, peers, prosocial peer affiliation, friendship networks, classmate justice, friendship quality, high school, middle school, peer nomination, peer attachment, peers/peer relations, school climate, academic performance, academic problems, school adjustment, schools |
| 11 | Society | Social standing, social relationships, norms, social norms, injunctive norms, subjective norm, descriptive norms, moral norms, interpersonal relationships, collectivism, individualism, contextual factors, controllers, cross-cultural, social information processing, social exclusion, social engagement, social desirability, social coping, social bonds, social belongingness, socialization, machiavellianism, femininity, masculinity, fun-seeking tendencies, help-seeking, helpfulness, cryptomarkets, cultural values, ethno-cultural groups, social learning, social skills, culture, bystander, cyber bystander, social support |
| 12 | Crimes and deviant behaviors | Violence, offline violence, gendered violence, dating violence, sexual violence, teen dating violence, intimate partner violence, domestic violence, youth violence, bullying, school bullying, offline bullying, covert bullying, workplace bullying, face-to-face bullying, non-physical bullying, traditional face-to-face bullying, traditional bullying perpetration, sibling bullying, perpetrators of bullying, substance use, adolescent substance use, smoking, alcohol use, fraud, scam, white-collar crime, property crime, abuse, addiction, verbal aggression, aggressive behavior, aggressor, physical aggression, face-to-face aggression, anti-muslim hate crime, hate speech, disability hate crime, crime, crime drop, delinquency, elder abuse, juvenile delinquency, perpetration, offender, online deviance, troubled offline behavior, sexual solicitation, partner abuse, sexual harassment, sexual orientation-based harassment, peer harassment, race-based harassment |
| 13 | Victim | Victim blaming, recurring victimization, relational victimization, victims of bullying, bullying victimization, traditional bully victimization, face-to-face victimization, family victimization, traditional victimization, school victimization, peer victimization, threat victimization, cybercrime victimization, cyberstalking victimization, cyber-theft victimization, cyber victims, aggressive victim |
| 14 | Prevention and intervention | Uniform crime reporting program, solutions, social problem-solving, safety, intervention, intervention strategies, intervention success, prevention, coping strategies, predictors, protective factors, police, policing, anti-bullying program, Canadian 24-h movement guidelines, capable guardianship, control, control balance, coping efficacy, national incident-based reporting system, crime reporting, reporting, cyber witnessing, cyberbullying intervention, bullying prevention, cyberbullying reduction, eurobarometer, evidence-based intervention, safety, prediction, preventive behavior, super controllers, counseling, guardianship, whole-school program trial, psychological service providers, risk and protective factors, intrusion prevention system, risk management, risk factors, mediation, restrictive mediation, instructive mediation, moderation, |
| 15 | Others | Routine activities, validation, opportunity, popularity, prevalence, agency, associations, assessment, attachment, causes, certs, victim-offender overlap, coronavirus, covid-19, definition, definitional issues, judgments, multiple risk exposure, multiple informants, outcome expectancies, participant roles, physical activity, publicity, reliability, resistance, response decision, response evaluation, role continuity, sustainability, sleep, similarities, severity |
These keywords were most of author keyword, adding a few selected keywords from the titles and abstracts by the author of this current study
Fig. 8Co-occurrence between author keywords via network visualization (the minimum number of occurrences per word is seven, 36 keywords were displayed)