Cyber-sexual violence is an emerging social and public health concern, yet our knowledge and understanding of this issue is limited. In light of this, the purpose of the present study was to investigate the factors that create a vulnerability for cyber-sexual violence at each level of social ecology, using an ecological and intersectional framework as a guide. In order to fulfill the above research objective, a cross-sectional research design was employed in which a sample of Canadian adults completed an online self-guided survey. The results of this study indicate that cyber-sexual violence vulnerability can be conceptualized as emerging from an interplay among the individual level variables of age and gender identity; the microsystem leve...
The present study applied Johnson’s (2006) typology to cyberspace. In addition, it examined how cybe...
Cyber intimate partner violence (CIPV) is a multidimensional phenomenon which encompasses online for...
Gender norms and the co-occurrence of perpetration and victimization behaviors have been examined as...
The present study explores the relationship between risky lifestyles, both online and offline, in re...
As digital modes of communication and participation become further enmeshed into everyday lives, so,...
Technologies have become important for interaction in couples. However, in some cases, controlling a...
Cyber-sexual violence refers to a form of harmful sexually aggressive behaviors committed with the f...
There is a growing research interest in cyber dating abuse (CDA). CDA includes abusive online behavi...
Internet technology has paved new diversion in crime and victimization. There is voluminous data rel...
The last twenty years have seen an explosion in the development of information technology, to the po...
Despite growing attention to violence that women face in online settings, a relatively small proport...
The last twenty years have seen an explosion in the development of information technology, to the po...
Online forms of sexual harassment and abuse as experienced by adults represent an emerging yet under...
PurposeThis study aimed to outline the construct of online sexual harassment (OSH) to ensure its acc...
The last twenty years have seen an explosion in the development of information technology, to the po...
The present study applied Johnson’s (2006) typology to cyberspace. In addition, it examined how cybe...
Cyber intimate partner violence (CIPV) is a multidimensional phenomenon which encompasses online for...
Gender norms and the co-occurrence of perpetration and victimization behaviors have been examined as...
The present study explores the relationship between risky lifestyles, both online and offline, in re...
As digital modes of communication and participation become further enmeshed into everyday lives, so,...
Technologies have become important for interaction in couples. However, in some cases, controlling a...
Cyber-sexual violence refers to a form of harmful sexually aggressive behaviors committed with the f...
There is a growing research interest in cyber dating abuse (CDA). CDA includes abusive online behavi...
Internet technology has paved new diversion in crime and victimization. There is voluminous data rel...
The last twenty years have seen an explosion in the development of information technology, to the po...
Despite growing attention to violence that women face in online settings, a relatively small proport...
The last twenty years have seen an explosion in the development of information technology, to the po...
Online forms of sexual harassment and abuse as experienced by adults represent an emerging yet under...
PurposeThis study aimed to outline the construct of online sexual harassment (OSH) to ensure its acc...
The last twenty years have seen an explosion in the development of information technology, to the po...
The present study applied Johnson’s (2006) typology to cyberspace. In addition, it examined how cybe...
Cyber intimate partner violence (CIPV) is a multidimensional phenomenon which encompasses online for...
Gender norms and the co-occurrence of perpetration and victimization behaviors have been examined as...