User:Marta badia UB/Cibervictimología

Cybervictimization
Cybervictimization is the process of victimizing users through the use of information and communication technologies. This includes the perpetration of negative, abusive or harmful acts towards individuals, organizations or institutions using electronic media, such as cyberbullying, online defamation, identity theft, impersonation, cyberstalking and other criminal or harmful behavior in the digital environment.

Cybervictimization can have psychological, emotional, social and legal consequences for affected individuals. According to K. J., Ybarra, cybervictimization is the act of being subjected to online aggression or harassment, including insults, threats, defamation, and social exclusion through digital platforms.

Types of cybervictimization
Cybervictimization encompasses various types of harassment, including :


 * 1) Stalking
 * 2) Grooming
 * 3) Sexting
 * 4) Sextorsion
 * 5) Cyber scam
 * 6) Online defamation
 * 7) Cyberaggressions
 * 8) Identitiy theft

Cyber-victimization manifests itself in various forms, always involving the Internet and with a generally young victim. The stalker may be the same age as the victim, with the exception of grooming cases, where the stalker is an adult.

Characteristics of cybervictimization
The characteristics of cybervictimization may vary depending on the specific context and circumstances. However, some common characteristics include :


 * 1) Use of technologies: Cybervictimization is carried out through technological means, such as electronic devices, social networks, messaging applications, email, among others.
 * 2) Anonymity: Perpetrators may hide their identity or create fake online profiles, making it more difficult to identify and hold them accountable for their behavior. There is often a power imbalance between the perpetrator and victim, where the perpetrator may exploit the anonymity and perceived distance provided by the online environment to exert control or inflict harm on the victim.
 * 3) Global reach: Due to the nature of the Internet, cybervictimization can occur globally, allowing the stalker to access victims from different geographic locations.
 * 4) Reproducibility: Digital boundaries do not exist, meaning that harassment and offense can occur anytime, anywhere and very quickly, and its impact can be long-lasting.
 * 5) Negative behaviors: Covers a variety of negative behaviors, such as cyberbullying, cyberharassment, harassment, bullying, online hate speech and the dissemination of harmful or false information.
 * 6) Persistence: Online content and messages can remain for extended periods of time, prolonging the emotional and psychological impact on the victim.
 * 7) Rapid amplification and dissemination: Incidents of cybervictimization can spread rapidly through social networks and other online platforms, reaching a wide audience and causing further harm to the victim.
 * 8) Emotional and psychological harm: Cybervictimization can have significant psychological and emotional effects on victims, including feelings of fear, anxiety, depression, humiliation, low self-esteem and social isolation.
 * 9) Impact on daily life: Cybervictimization can interfere with the victim's daily life, affecting their well-being, personal relationships, academic or work performance, and participation in social activities.

Anyone can be subject to cybervictimization, however, there are certain age groups, particularly children, teenagers and young adults, who may be more susceptible due to their limited online experience, naivety and trusting nature.

Cybervictimization in adolescence
During early adolescence, peer interactions are essential to adolescent development. Negative peer relationships can cause feelings of social isolation, loneliness, depression and anxiety. Adolescents are more vulnerable to mental health problems due to the biological, cognitive and social changes they experience.

According to a UNICEF report (2019), it is estimated that approximately two students in every classroom are victims of cyberbullying. This phenomenon has experienced a rapid increase due to the easy accessibility of new technologies for adolescents. These use cell phones, social networks and instant messaging programs on a regular basis to establish friendships and maintain contact with friends and family. According to Brochado et al. 61% of adolescents aged 10 to 18 years report having been victims of cyberbullying, which occurs in digital spaces such as cell phones, computers and social networks.

Adolescents' experiences with cybervictimization have both short- and long-term negative consequences. In addition, the lack of teacher training to detect and address cyberbullying early, along with the vulnerability of victims to online attacks, intensify the negative consequences for them. These adolescents have increased school absence (Beran & Li, 2005; Tokunaga, 2010), poor academic performance, and feel less safe at school (Burgess-Proctor, Patchin & Hinduja, 2010; Tokunaga, 2010).

In addition, victims of cyberaggressions have been observed to exhibit maladaptive patterns in health-related behaviors, such as sleep problems, appetite changes, and headaches (Kowalski & Limber, 2007).

Unlike face-to-face victimization, digital technologies have expanded the possibilities of cybervictimization. Now anyone can be a victim and anyone can be an aggressor, regardless of their physical or social power. Cybervictimization can occur at any time of the day or night and aggressors can be physically distant from their victims (Barlett & Gentile, 2012). This has allowed individuals who previously lacked the ability to bully and degrade others in face-to-face contexts to now do so through digital platforms (Vandebosch & Van Cleemput, 2008).

Consequences of cybervictimization
Cybervictimization can have a variety of negative consequences for affected individuals. Some of the common consequences include (Garaigordobil, 2011) :


 * 1) Emotional and psychological problems: Individuals who experience cybervictimization may experience stress, humiliation, anxiety, depression, anger, helplessness, fatigue, low self-esteem, feelings of shame and insecurity. These experiences can negatively affect their emotional and mental well-being.
 * 2) Impact on physical health: The stress and anxiety caused by cybervictimization can manifest in physical symptoms such as headaches, sleep problems, eating disorders and other chronic stress-related health problems.
 * 3) Problems in academic performance: Cybervictimization can interfere with the academic performance of affected individuals. Online bullying can distract students, affect their concentration and motivation, and lead to school absences.
 * 4) Difficulties in social relationships and isolation: People who are victims of cybervictimization may experience difficulties in their social relationships. They may feel excluded, stigmatized or have difficulty trusting others, which can lead to social isolation.
 * 5) Risk of self-destructive behaviors: In severe cases, cybervictimization may increase the risk of self-destructive behaviors, such as substance abuse, suicidal behavior or self-harm.
 * 6) Impact on self-image and self-esteem: Cybervictimization can negatively affect self-perception and self-esteem. Online comments and attacks can undermine self-confidence and generate feelings of inferiority.
 * 7) Abandonment of previously enjoyed leisure activities.

According to J.F. Estévez, E.Cañas and E.Estévez, not all cybervictims develop these consequences with the same intensity. These differences are related to the development of emotional intelligence (EI), as this can positively influence the emotional adjustment and well-being of adolescents even when problems arise.

Profile of a potential cybervictim
There are some indicators that have been identified in studies (Cook et al., 2010; Garaigordobil, 2018; Garaigordobil & Oñederra, 2010; Urra, 2018) to predict the likelihood of being a cybervictim such as:


 * 1) Age: Teenagers and young adults are often more likely to be cybervictims due to their greater exposure to and use of information and communication technologies.
 * 2) Low self-esteem: People with low self-esteem may be more susceptible to cybervictimization, as they may be more affected by negative comments and online criticism.
 * 3) Social isolation and introversion: Those who experience social isolation or have difficulty establishing interpersonal relationships may be more vulnerable to cybervictimization, as they seek out online interactions that can lead to bullying situations.
 * 4) Limited social skills, lack of assertiveness and social competence: Individuals who lack coping and conflict resolution skills may have difficulty dealing with cyberbullying situations and may be more likely to suffer negative consequences.
 * 5) Reckless use of the Internet: Those who indiscriminately share personal information (passwords, place of residence, friendships, valuables...) or engage in risky online behaviors, such as interacting with strangers, may increase their risk of becoming cybervictims.

According to F.M Llinares, it is difficult to establish a single profile of a potential cybercrime victim, since there are as many profiles as there are criminal opportunities in cyberspace. Moreover, it is important to note that the victim's behavior also influences the creation of these opportunities. This means that not only criminal motivation defines the scope of opportunity in cyberspace, but the victim's own behavior also contributes to generating risks.

Spain
Cybercrime and cybercrime-related victimizations have increased significantly in Spain during the period from 2011 to 2021. In 2021, more than 240,000 victimizations due to this type of crime were recorded in the country.

According to the Report on cybercrime in Spain, in terms of demographic characteristics, it is observed that the majority of cybercrime victims are men, representing 51.9% of the total. In addition, it has been identified that the most affected age bracket is between 26 and 40 years old.

In terms of the most common types of crime, computer fraud, threats and coercion, and computer forgery stand out. However, it is important to bear in mind that the distribution of known incidents may vary according to the scope and gender of the victims.

In particular, women outnumber men in percentage terms in crimes related to computer forgery (usurpation of civil status), illicit access and interception (discovery and disclosure of secrets), crimes against honor (libel) and sexual crimes, such as grooming (crime of contact by means of technology with a minor under 16 years of age for sexual purposes).

Strategies to avoid suffering cybercrime
Cybercrime prevention consists of implementing security measures to reduce the risk of cyber-attacks. According to the National Crime Agency, to avoid becoming a victim of cybercrime, it is important to implement the following online security strategies:


 * 1) Keep devices up to date: to do so, we must install software and firmware updates on our devices, as these updates usually include important security patches.
 * 2) Use strong passwords: Create unique and strong passwords for your online accounts. Avoid using obvious passwords or easily accessible personal information.
 * 3) Be careful when clicking on links: Don't click on suspicious or unsolicited links in emails, messages or on unknown websites. Verify the authenticity of links before clicking on them.
 * 4) Protect your personal information: Avoid sharing sensitive personal information online, such as social security numbers, bank details or passwords, unless absolutely necessary and you are on a secure and trusted website.
 * 5) Use an antivirus and antimalware solution: Install and keep up-to-date a reliable antivirus and antimalware program on your devices to protect against potential threats.
 * 6) Use caution on social networks: Control your privacy settings on social networks and avoid sharing too much personal information publicly. Be cautious when accepting friend requests or followers from strangers.
 * 7) Be aware of social engineering techniques: Be alert to possible attempts at online scams or manipulation. Do not disclose confidential information to strangers and be wary of any suspicious requests or offers.
 * 8) Back up your data: Make regular backups of your important files and data on external devices or in the cloud. This will help you recover your information in case of loss or ransomware.

It is important to keep abreast of the latest threats and tactics used by cybercriminals and to periodically review and adjust security measures to different situations.