scispace - formally typeset
Search or ask a question
Author

Zarina I. Vakhitova

Bio: Zarina I. Vakhitova is an academic researcher from Monash University. The author has contributed to research in topics: Legal guardian & Crime prevention. The author has an hindex of 6, co-authored 16 publications receiving 134 citations. Previous affiliations of Zarina I. Vakhitova include Saint Petersburg State University & Griffith University.

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a review of existing cyber abuse scholarship, explores potential reasons for the weak empirical support for routine activity and lifestyle exposure theories in cyberspace, and proposes several directions for future research.
Abstract: With the advent of the Internet and the emergence of cybercrimes (e.g., cyber stalking, cyber harassment), criminologists have begun to explore the empirical utility of lifestyle exposure and routine activity theories (RATs) to account for personal victimization as a consequence of cyber abuse. Available cyber abuse studies have produced inconsistent empirical support for both models, which has reignited the debate about whether terrestrial theories, such as RAT, will ever be able to adequately explain cybercrimes due to the spatial and temporal disconnect between the theories and the cyber environment. This article reviews existing cyber abuse scholarship, explores potential reasons for the weak empirical support for routine activity and lifestyle exposure theories in cyberspace, and proposes several directions for future research. We suggest that to further our understanding of cyber abuse processes, scholars need to carefully define and operationalize the key theoretical concepts in the light of latest...

39 citations

Journal ArticleDOI
TL;DR: The authors examined the shifting momentum of right-wing extremists in Australia and provided an in-depth assessment of eight of the most active RWE groups in Australia, and identified the most influential groups.
Abstract: This research examines the shifting momentum of right-wing extremism (RWE) in Australia. The study provides an in-depth assessment of eight of the most active RWE groups in Australia, throu...

36 citations

Journal ArticleDOI
26 Nov 2018-PLOS ONE
TL;DR: Analysis of an example dataset shows that, in terms of a logistic GLM, the conventional methods using the Wald test and the change in deviance can produce results that are difficult to interpret; Bayesian analysis of GLM is a suitable alternative, which is enhanced with prior knowledge about the direction of the effects.
Abstract: In the context of generalized linear models (GLMs), interactions are automatically induced on the natural scale of the data. The conventional approach to measuring effects in GLMs based on significance testing (e.g. the Wald test or using deviance to assess model fit) is not always appropriate. The objective of this paper is to demonstrate the limitations of these conventional approaches and to explore alternative strategies for determining the importance of effects. The paper compares four approaches to determining the importance of effects in the GLM using 1) the Wald statistic, 2) change in deviance (model fitting criteria), 3) Bayesian GLM using vaguely informative priors and 4) Bayesian Model Averaging analysis. The main points in this paper are illustrated using an example study, which examines the risk factors for cyber abuse victimization, and are further examined using a simulation study. Analysis of our example dataset shows that, in terms of a logistic GLM, the conventional methods using the Wald test and the change in deviance can produce results that are difficult to interpret; Bayesian analysis of GLM is a suitable alternative, which is enhanced with prior knowledge about the direction of the effects; and Bayesian Model Averaging (BMA) is especially suited for new areas of research, particularly in the absence of theory. We recommend that social scientists consider including BMA in their standard toolbox for analysis of GLMs.

32 citations

Journal Article
TL;DR: The results show that contextual awareness of cyberspace was predictive of witnessing and intervening in the events of cyber abuse and makes practical recommendations on how crime prevention efforts could be boosted in cybersspace.
Abstract: This study presents an empirical analysis of guardianship against abuse in cyberspace. Building upon the existing body of knowledge about active guardianship processes in the physical world, this study extends our understanding of how these processes operate in the unique setting of cyberspace. To collect information about cyber guardians and cyber abuse events witnessed by the guardians, an online survey of adult Australian users of the Internet and social media sites was conducted (n = 650). The results show that contextual awareness of cyberspace was predictive of witnessing and intervening in the events of cyber abuse. Based on the empirical results, the study makes practical recommendations on how crime prevention efforts could be boosted in cyberspace.

26 citations

Journal ArticleDOI
TL;DR: The findings generally support the empirical utility of lifestyle-routine activity theory to explain cyber Abuse victimization; as with other traditional types of crime, victims’ lifestyles and routine activities play a significant role in their risk of various types of cyber abuse victimization.

21 citations


Cited by
More filters
01 Jan 2016

544 citations

Journal ArticleDOI
TL;DR: There is evidence to suggest that, for some individuals, food can induce addictive-type behaviours similar to those seen with other addictive substances, and the term ‘food addiction’ is likely to apply only in a minority of cases.
Abstract: With the obesity epidemic being largely attributed to overeating, much research has been aimed at understanding the psychological causes of overeating and using this knowledge to develop targeted interventions. Here, we review this literature under a model of food addiction and present evidence according to the fifth edition of the Diagnostic and Statistical Manual (DSM-5) criteria for substance use disorders. We review several innovative treatments related to a food addiction model ranging from cognitive intervention tasks to neuromodulation techniques. We conclude that there is evidence to suggest that, for some individuals, food can induce addictive-type behaviours similar to those seen with other addictive substances. However, with several DSM-5 criteria having limited application to overeating, the term ‘food addiction’ is likely to apply only in a minority of cases. Nevertheless, research investigating the underlying psychological causes of overeating within the context of food addiction has led to some novel and potentially effective interventions. Understanding the similarities and differences between the addictive characteristics of food and illicit substances should prove fruitful in further developing these interventions.

63 citations

Journal ArticleDOI
TL;DR: In this paper, an analysis of a popular social media platform (Twitter) was conducted to examine the types of abuse present in online environments, including physical and/or psychological violence to the person.
Abstract: A changing technological context, specifically that of the growth of social media, is transforming aspects of leisure behaviour, especially in terms of negative interactions between followers of sport and athletes. There is a growing body of research into the maltreatment of adult athletes, exploring issues such as abusive acts or behaviours against the individual, including acts of physical and/or psychological violence to the person. Existing research, however, focuses upon face-to-face behaviours, and to date the nature of abuse in online spaces has been overlooked. It is becoming ever more apparent that virtual environments create optimal climates for abuse to occur due to the ability for individuals to communicate in an instantaneous, uncontrolled and often anonymous manner in virtual worlds. Using a netnographic approach, an analysis of a popular social media platform (Twitter) was conducted to examine the types of abuse present in online environments. This paper presents a conceptual typolo...

62 citations

Journal ArticleDOI
TL;DR: It is found that the COVID-19 pandemic has not radically altered cyberroutines nor changed cybervictimization rates, and a model using routine activity theory to predict cyberVictimization offers clear support for the theory’s efficacy both before and after the pandemic.
Abstract: The COVID-19 pandemic has radically altered life, killing hundreds of thousands of people and leading many countries to issue "stay-at-home" orders to contain the virus's spread. Based on insights from routine activity theory (Cohen & Felson 1979), it is likely that COVID-19 will influence victimization rates as people alter their routines and spend more time at home and less time in public. Yet, the pandemic may affect victimization differently depending on the type of crime as street crimes appear to be decreasing while domestic crimes may be increasing. We consider a third type of crime: cybercrime. Treating the pandemic as a natural experiment, we investigate how the pandemic has affected rates of cybervictimization. We compare pre-pandemic rates of victimization with post-pandemic rates of victimization using datasets designed to track cybercrime. After considering how the pandemic may alter routines and affect cybervictimization, we find that the pandemic has not radically altered cyberroutines nor changed cybervictimization rates. However, a model using routine activity theory to predict cybervictimization offers clear support for the theory's efficacy both before and after the pandemic. We conclude by considering plausible explanations for our findings.

60 citations