Sameer Hinduja

Sameer Hinduja
  • Doctor of Philosophy
  • Professor (Full) at Florida Atlantic University

About

89
Publications
445,078
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12,353
Citations
Current institution
Florida Atlantic University
Current position
  • Professor (Full)

Publications

Publications (89)
Article
Full-text available
Background Scholars have argued that cyberbullying should be characterized as an Adverse Childhood Experience (ACE) given its potential for traumatic impacts on youth development. Considering the current attention surrounding mental health and well-being among adolescents, it seems critical to empirically measure this relationship, and also determi...
Article
Full-text available
Research indicates that participation in metaverse environments and with virtual reality (VR) is increasing among younger populations, and that youth may be the primary drivers of widespread adoption of these technologies. This will more readily happen if their experiences are safe, secure, and positive. We analyze data from a nationally representa...
Article
Full-text available
Sextortion, the threatened dissemination of explicit, intimate, or embarrassing images of a sexual nature without consent, is an understudied problem. Despite a recent increase in reported incidents among adolescents in the United States, little is known about the nature and extent of sextortion among this population. The current research explores...
Article
Full-text available
PURPOSE Early in the COVID‐19 pandemic, there was a concern that cyberbullying incidents would increase as youth were spending more time online. Additionally, reports emerged that Asian American citizens were being disproportionately targeted due to the purported origination of the disease. The current study explores whether cyberbullying incidents...
Article
Full-text available
Background Research on digital self‐harm – the anonymous online posting, sending, or otherwise sharing of hurtful content about oneself – is still in its infancy. Yet unexplored is whether digital self‐harm is related to suicidal ideation or suicide attempts. Methods In the current study, survey data were collected in 2019 from a national sample o...
Article
Full-text available
Bias-based cyberbullying involves repeated hurtful actions online that devalue or harass one’s peers specific to an identity-based characteristic. Cyberbullying in general has received increased scholarly scrutiny over the last decade, but the subtype of bias-based cyberbullying has been much less frequently investigated, with no known previous stu...
Article
Full-text available
Bullying and cyberbullying prevention remain a major priority for schools, communities, and families, and research is clear that positive, constructive parenting practices can play a key preventive role. The current work explores six dimensions of parenting (warmth, structure, autonomy support, rejection, chaos, and coercion), and their specific re...
Article
Full-text available
Research on digital self-harm - the anonymous or pseudonymous posting of hurtful or negative information about oneself on the internet and social media platforms - is in the early stages of development. While scholars have started to focus on the correlates of this behavior, there remains a need to anchor the study of digital self-harm within estab...
Article
Full-text available
The goal of this study was to provide key prevalence rates for experiences with cyberbullying among tweens (children between the ages of 9 and 12 years old). We were also interested in the extent to which tweens engaged in helping behaviors when they observed cyberbullying. American tweens ( n = 1034; mean age = 10.52, SD = 1.12) completed an onlin...
Article
Full-text available
Few studies have explored whether individuals who are bullied at school or online are more likely to engage in delinquent behavior. Even less is known about whether negative emotions (i.e., anger or frustration)—as a result of being victimized—mediate the relationships between being bullied or cyberbullied and delinquency (as predicted by Agnew’s g...
Article
Full-text available
Digital dating abuse is a term used to describe physical, sexual, or psychological/emotional violence that occurs between romantic partners through the use of texting, social media, and related online mediums. Survey data were obtained from a nationally representative sample of 2,218 American middle and high school students (12–17 years old) who ha...
Article
Full-text available
Research shows that roughly 10-25% of American teens have participated in “sexting,” the sharing of sexually-explicit or sexually-suggestive images. When minors in the United States share nude images of themselves with others, they could be distributing child pornography. If these images are received from others and stored on personal devices, thos...
Article
Full-text available
Sexting is the sending or receiving of sexually explicit or sexually suggestive images or video, usually via mobile devices. Despite widespread public concern about these behaviors as they occur among adolescents, including potentially serious legal consequences, relatively little research has been done to estimate the frequency of sexting among mi...
Article
Full-text available
Sextortion is the threatened dissemination of explicit, intimate, or embarrassing images of a sexual nature without consent, usually for the purpose of procuring additional images, sexual acts, money, or something else. Despite increased public interest in this behavior, it has yet to be empirically examined among adolescents. The current study fil...
Article
Full-text available
While previous studies have identified that school bullying and cyberbullying victimization among adolescents is associated with suicidal thoughts and attempts, no work has measured the severity of bullying incidents and their impact on the youth at school within that context. As such, a survey was distributed to a representative sample of U.S. you...
Article
Full-text available
Article
In an effort to better prevent and respond to bullying and cyberbullying, schools are recognizing a need to focus on positive youth development. One often-neglected developmental construct in this rubric is resilience, which can help students successfully respond to the variety of challenges they face. Enhancing this internal competency can complem...
Article
Full-text available
Purpose: Despite increased media and scholarly attention to digital forms of aggression directed toward adolescents by their peers (e.g., cyberbullying), very little research has explored digital aggression directed toward oneself. "Digital self-harm" is the anonymous online posting, sending, or otherwise sharing of hurtful content about oneself....
Article
Full-text available
While decades of criminological research have returned mixed results when it comes to deterrence theory, deterrence-informed policies continue to proliferate unabated. Specific to bullying among adolescents , many U.S. states have recently passed new laws – or updated old ones – increasing potential punishment for youth who abuse others. Police are...
Article
Full-text available
Bullying has long been a concern of youth advocates (e.g., educators, counselors, researchers, policy makers). Recently, cyberbullying (bullying perpetrated through online technology) has dominated the headlines as a major current-day adolescent challenge. This article reviews available empirical research to examine the accuracy of commonly-perpetu...
Article
Full-text available
Cyberbullying is a problem affecting a meaningful proportion of youth as they embrace online communication and interaction. Research has identified a number of real-world negative ramifications for both the targets and those who bully. During adolescence, many behavioral choices are influenced and conditioned by the role of major socializing agents...
Article
Full-text available
Actor-network theory, as developed within the sociology of science and technology, views any phenomenon as the product or effect of a patterned network of heterogeneous elements. This paper applies such a paradigmatic perspective to the phenomenon of music piracy, in an attempt to underscore the relevance of studying and analyzing each of the compo...
Article
Full-text available
There appears to be some perceptual confusion with regard to the scope and extent of online bullying based on media reports and a number of studies—some of which are theoretically sound and methodologically rigorous and some of which are not. In the following text, we share findings from our own research and those of our peers to highlight the actu...
Article
Full-text available
Digital piracy involves the copying of digital goods, software, digital documents, digital music), and digital videos without the express permission of the copyright holder; it is either a civil or criminal offense in many national jurisdictions. The purpose of the current work is to examine the connection between music piracy and the criminologica...
Article
Full-text available
The current work, based on data from a cross-sectional sample of approximately 2,000 randomly selected university students, seeks to clarify exactly who is most likely to engage in online music piracy. The extant knowledgebase on why individuals take part in this form of intellectual property is growing, but little is known about the type and backg...
Article
Intelligence, espionage, and related topics: An annotated bibliography of serial journal and magazine scholarship, 1844–1998.(1999). Compiled by James D. Calder. Westport, CT: Greenwood Press. 1330 pages.
Article
State Crime: Governments, Violence and Corruption. Penny Green and Tony Ward. Pluto Press, 2004. ISBN 0–7453–1785–5. Hardback $75.00. 264 pages. ISBN 0–7453–1784–7. Paperback $24.95 Superhighway Robbery: Preventing E‐commerce Crime. Graeme R. Newman and Ronald V. Clarke. Cullompton, Devon, United Kingdom. Willan Publishing, 2003. ISBN 1843920182. H...
Article
Full-text available
Online aggression isn't just traditional bullying with new tools. It's widespread, devastating, and knows no downtime. Cyberbullying: In one way, it's nothing new. Kids have been bullying one another for generations. But looked at another way, cyberbullying is new. Teens can now use technology to expand the reach and extent of their harm in a way t...
Article
Full-text available
School districts are often given the challenging task of addressing problematic online behaviors committed by students while simultaneously protecting themselves from civil liability by not overstepping their authority. This is difficult, because the law concerning these behaviors is ambiguous and continuously evolving, and little consensus has yet...
Article
Full-text available
This article examines the relationship between middle school students' experience with cyberbullying and their level of self-esteem. Previous research on traditional bullying among adolescents has found a relatively consistent link between victimization and lower self-esteem, while finding an inconsistent relationship between offending and lower se...
Article
Full-text available
As online social networking has become an immersive and pervasive phenomenon, traditional considerations and expectations of personal privacy have been drastically altered. This paradigmatic change has led to adolescents possibly making themselves vulnerable to embarrassment, censure, damage to one’s name or reputation, or even victimization by oth...
Article
Full-text available
Empirical studies and some high-profile anecdotal cases have demonstrated a link between suicidal ideation and experiences with bullying victimization or offending. The current study examines the extent to which a nontraditional form of peer aggression--cyberbullying--is also related to suicidal ideation among adolescents. In 2007, a random sample...
Article
Full-text available
Bullying at school is a common problem facing youth, school officials, and parents. A significant body of research has detailed the serious consequences associated with bullying victimization. Recently, however, a new permutation has arisen and arguably become even more problematic. Cyberbullying, as it has been termed, occurs when youth use techno...
Article
Full-text available
MySpace has received a significant amount of negative attention from the media and many concerned adults, who point to several isolated incidents where predators have contacted, become involved with and even assaulted adolescents whom they met through the popular social networking web site. Furthermore, concerned parents have expressed discontent w...
Article
Full-text available
Social learning theory has been proven to demonstrate much explanatory value in the study of software and music piracy that occurs over the Internet. As a multifaceted predictive framework, though, the salience of some of the theory’s individual components has yet to be empirically measured. Answering the call of recent research to do just that, th...
Article
Full-text available
Using Robert Agnew's General Strain Theory as a guiding framework, the relationship between workplace-related stressors and maladaptive emotional and behavioral outcomes was examined via personal interview data from a private-sector corporation. Victims of aggressive behavior, such as those who had been attacked or threatened physically, insulted o...
Article
Full-text available
Purpose The purpose of this paper is to quantify the number of cybercrime units that are on the world wide web and the manner in which they represent themselves, and to clarify how they are communicating information to their constituency (i.e. the visitors to their site) through new technology. Design/methodology/approach There is no sampling fram...
Article
Full-text available
Computer crime has increased exponentially in recent years as hardware, software, and network resources become more affordable and available to individuals from all walks of life. Software piracy is one prevalent type of cybercrime and has detrimentally affected the economic health of the software industry. Moreover, piracy arguably represents a re...
Article
Full-text available
Courses in security are essential in criminal justice programs, but tend to be nonexistent at many postsecondary institutions. Faculty often struggle to legitimize these types of courses, and find that students are reluctant to take them. However, prior research indicates that student career choices and perceptions of the security field change afte...
Article
Full-text available
The current study sought to test the viability of employing Sykes and Matza's (195750. Sykes , G. and D. Matza . 1957 . “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22 : 664 – 670 . [CrossRef], [Web of Science ®]View all references) techniques of neutralization as a framework for understanding online music p...
Article
Full-text available
Many youth have recently embraced online social networking sites such as MySpace (myspace.com) to meet their social and relational needs. While manifold benefits stem from participating in such web-based environments, the popular media has been quick to demonize MySpace even though an exponentially small proportion of its users have been victimized...
Article
Full-text available
Victimization on the Internet through what has been termed cyberbullying has attracted increased attention from scholars and practitioners. Defined as “willful and repeated harm inflicted through the medium of electronic text” (Patchin and Hinduja 200653. Patchin , J. W. and S. Hinduja . 2006 . “Bullies Move Beyond the Schoolyard: A Preliminary L...
Article
Full-text available
Social learning theory has been identified as a strong predictor of various computer-related crimes, espe-cially intellectual property theft (Higgins and Makin 2004; Hinduja 2006; Rogers 2001; Skinner and Fream 1997). Undoubtedly, the relationship is more complex, as other factors appear to affect one's proclivity to be influenced by the social lea...
Article
Full-text available
Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutral...
Article
Full-text available
As increasing numbers of youth embrace computer-mediated communication to meet academic and social needs, interpersonal violence directly and indirectly related to the Internet is occurring more often. Cyberbullying in particular has shot to the forefront of agendas in schools and communities due to the emotional, psychological, and even physical h...
Article
Full-text available
Although the level of dissatisfaction with police officer performance appraisal systems in many agencies is substantial (Hughes, 1990; Lilley, 2002), a recent nationwide survey of six hundred police organizations indicated that overall satisfaction was significantly higher among agencies with greater levels of community policing implementation (Lil...
Article
Full-text available
In an attempt to extend Agnew's (1992) general strain theory to adults in an organizational setting, an analysis of secondary data was conducted to determine how employee mistreatment by co-workers affects performance and well-being. Age, gender, race, education, religion, and ethnic discrimination were utilized as independent variables on outcome...
Article
Full-text available
Many traditional crimes are now being aided or abetted through the use of computers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing a...
Article
Full-text available
As increasing numbers of youth embrace computer-mediated communication to meet academic and social needs, interpersonal violence directly and indirectly related to the Internet is occurring more often. Cyberbullying in particular has shot to the forefront of agendas in schools and communities due to the emotional, psychological, and even physical h...
Article
Full-text available
Using secondary data, an analysis was conducted to determine how worker mistreatment by co-workers affects performance and well-being. Perceived negative treatment experienced because of age, sex, race, ethnicity, and education, and a group of eight less subtle forms of harassment, were used as predictors of maladaptive emotional and behavioral res...
Article
Full-text available
Bullying in a school setting is an important social concern that has received increased scholarly attention in recent years. Specifically, its causes and effects have been under investigation by a number of researchers in the social and behavioral sciences. A new permutation of bullying, however, has recently arisen and become more common: Techsavv...
Article
Full-text available
“MP3” has become an iconic term and hugely popular phenomenon in recent years. This compressed digital music format has been championed as the greatest multimedia revolution since the television. The technology has also been maligned as a dubious (and illegal) tool that allows individuals to obtain CD-quality music without purchasing an audio CD, t...
Article
Full-text available
Purpose – The purpose of this research is to compare traditional and community policing agencies with regard to how individual officers are formally evaluated and to assess organizational goals and objectives in each type of agency. Design/methodology/approach – A 75-item questionnaire was mailed to 600 municipal and county law enforcement agencies...
Article
Full-text available
As computer and Internet-related crimes continue to increase in prevalence and scope, some law enforcement agencies have developed specialized task forces to address the issue. Because of the relative newness of high-tech deviance, however, it is not clear how to best proceed with the efficient, productive, and strategic allocation of resources, th...
Article
Full-text available
Two technological behemoths, the computer and the Internet, have greatly facilitated the ease of collecting, managing, processing, and sharing information about individuals. This has been beneficial in accomplishing some socially and economically valuable objectives such as preventing fraud, tracking illegal behavior, and introducing potential cust...
Article
Full-text available
Applied theories from computer science and cognitive psychology are used to develop a method to track criminals online. Using an actual case from an identity theft and online credit card fraud, the paper shows how to track digital trails in cyberspace. The paper's purposes are first to illustrate the historical, theoretical development and applicat...
Article
Full-text available
Computer crime on the Internet poses a significant threat to the well-being of businesses and individuals, and none are immune from the repercussions that can result. One type of this unethical and unlawful activity is online software piracy. In this work, the significance of piracy as a topic for academic inquiry is first presented, followed by a...
Article
Full-text available
Software piracy has become a significant problem for businesses and educational institutions, and as computer crime continues to proliferate in our Information Age, its causes and roots merit academic inquiry. This exploratory piece establishes the correlative and contributory factors in software pirating, specifically concerning types of Internet...
Article
Thesis (Ph. D.)--Michigan State University. School of Criminal Justice, 2004. Includes bibliographical references (leaves 277-298).
Article
Thesis (Ph. D.)--Michigan State University. School of Criminal Justice, 2004. Includes bibliographical references (leaves 277-298). Microfiche.
Article
Thesis (M.S.)--Michigan State University. Dept. of Criminal Justice, 2000. Includes bibliographical references (p. 135-141). Photocopy.

Network

Cited By