Gender Differences in Cyberstalking: The Roles of Risk, Control, and Opportunity Factors in Social Media
Abstract
:1. Introduction
2. Literature Review
2.1. Risk Factors in Cyberstalking and Gender Differences
2.2. Gender Differences in Control and Opportunity Factors
2.2.1. Control and Opportunity Factors
2.2.2. Gender Differences in Their Moderating Effects
3. Current Study and Research Questions
4. Data and Methods
4.1. Sample and Procedure
4.2. Measurements
5. Results
6. Discussion
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
SNS | Social Networking Service |
SES | Socio-Economic Status |
LoA | Lack of Attachment |
DoV | Denial of Victims |
OLS | Ordinary Least Squares |
1 | https://eng.nia.or.kr/site/nia_eng/main.do (accessed on 7 October 2024). |
References
- Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47–88. [Google Scholar] [CrossRef]
- Augustyn, M. B., & McGloin, J. M. (2013). The risk of informal socializing with peers: Considering gender differences across predatory delinquency and substance use. Justice Quarterly, 30(1), 117–143. [Google Scholar] [CrossRef]
- Barlett, C. P. (2015). Anonymously hurting others online: The effect of anonymity on Cyberbullying frequency. Psychology of Popular Media Culture, 4(2), 70–79. [Google Scholar] [CrossRef]
- Barton-Crosby, J., & Hirtenlehner, H. (2021). The role of morality and self-control in conditioning the criminogenic effect of provocation: A partial test of situational action theory. Deviant Behavior, 42(10), 1273–1294. [Google Scholar] [CrossRef]
- Baumeister, R. F., Heaterton, T. F., & Tice, D. M. (1994). Losing control: How people fail at self-regulation. Academic Press. [Google Scholar]
- Bennett, D. C., Guran, E. L., Ramos, M. C., & Margolin, G. (2011). College students’ electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors. Violence and Victims, 26(4), 410–429. [Google Scholar] [CrossRef]
- Bocij, P. (2006). Cyberstalking: Harassment in the Internet age and how to protect your family. Praeger. [Google Scholar]
- Borrajo, E., Gámez-Guadix, M., & Calvete, E. (2015a). Justification beliefs of violence, myths about love and cyber dating abuse. Psicothema, 27(4), 327–333. [Google Scholar] [CrossRef]
- Borrajo, E., Gámez-Guadix, M., Pereda, N., & Calvete, E. (2015b). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358–365. [Google Scholar] [CrossRef]
- Brennan, K. A., Clark, C. L., & Shaver, P. R. (1998). Self-reported measurement of adult attachment. In J. A. Simpson, & W. S. Rholes (Eds.), Attachment theory and close relationship. The Guilford Press. [Google Scholar]
- Burton, V. S., Cullen, F. T., Evans, T. D., Alarid, L. F., & Dunaway, R. G. (1998). Gender, self-control and crime. Journal of Research in Crime and Delinquency, 35(2), 123–147. [Google Scholar] [CrossRef]
- Cheung, N. W. T., & Cheung, Y. W. (2010). Strain, self-control, and gender differences in delinquency among Chinese adolescents: Extending general strain theory. Sociological Perspectives, 53(3), 321–345. [Google Scholar] [CrossRef]
- Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activities approach. American Sociological Review, 44(4), 588–608. [Google Scholar] [CrossRef]
- Colvin, M., Cullen, F. T., & Ven, T. V. (2002). Coercion, social support, and crime: An emerging theoretical consensus. Criminology, 40(1), 19–42. [Google Scholar] [CrossRef]
- Curry, T., & Zavala, E. (2020). A multi-theoretical perspective on cyber dating abuse victimization and perpetration within intimate relationships: A test of general strain, social learning, and self-control theories. Victims and Offenders, 15(4), 1–21. [Google Scholar] [CrossRef]
- Davis, K. E., Ace, A., & Andra, M. (2000). Stalking perpetrators and psychological maltreatment of partners. Violence and Victims, 15, 473–487. [Google Scholar] [CrossRef] [PubMed]
- Davis, K. E., Swan, S. C., & Gambone, L. J. (2012). Why doesn’t he just leave me alone? Persistent pursuit: A critical review of theories and evidence. Sex Roles, 66(5–6), 328–339. [Google Scholar] [CrossRef]
- Deans, H., & Bhogal, M. S. (2019). Perpetrating cyber dating abuse: A brief report on the role of aggression, romantic jealousy and gender. Current Psychology, 38(5), 1077–1082. [Google Scholar] [CrossRef]
- Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior and Social Networking, 17(2), 61–67. [Google Scholar] [CrossRef]
- Dutton, L. B., & Winstead, B. A. (2006). Predicting unwanted pursuit: Attachment, relationship satisfaction, relationship alternatives, and break-up distress. Journal of Social and Personal Relationships, 23(4), 565–586. [Google Scholar] [CrossRef]
- Fissel, E., Bryson, S. L., & Lee, J. R. (2024). Minimizing responsibility: The impact of moral disengagement on cyberbullying perpetration among adults. Crime and Delinquency, 1–25, online first. [Google Scholar]
- Fissel, E., Fisher, N., & Nedelec, J. (2021). Cyberstalking perpetration among young adults: An assessment of the effects of low self-control and moral disengagement. Crime and Delinquency, 67(12), 1935–1961. [Google Scholar] [CrossRef]
- Follingstad, D. R., Bradley, R. G., Helff, C. M., & Laughlin, J. E. (2002). Model for predicting dating violence anxious attachment, angry temperament, need for relationship control. Violence and Victims, 17(1), 35–47. [Google Scholar] [CrossRef]
- Fox, K. A., Nobles, M. R., & Akers, R. L. (2011). Is stalking a learned phenomenon? An empirical test of social learning theory. Journal of Criminal Justice, 39(1), 39–47. [Google Scholar] [CrossRef]
- Gordon, D. L., & Dardis, C. M. (2023). Perceptions of intimate partner stalking and cyberstalking: Do perpetrator and victim gender and victim’s responses to stalking influence perceptions of criminal behavior and responsibility? Legal & Criminological Psychology, 28(2), 222–236. [Google Scholar]
- Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford University Press. [Google Scholar]
- Grasmick, H. G., Tittle, C. R., Bursik, R. J., & Arneklev, B. J. (1993). Testing the core empirical implications of Gottfredson and Hirschi’s general theory of crime. Journal of Research in Crime and Delinquency, 30(1), 5–29. [Google Scholar] [CrossRef]
- Hindelang, M. S., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime. Ballinger. [Google Scholar]
- Hirschi, T. (1969). Causes of delinquency. University of California Press. [Google Scholar]
- Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25. [Google Scholar] [CrossRef]
- Ishoy, G. A., & Blackwell, B. S. (2019). Situational action theory’s self-control/morality interaction effects and the moderating influence of being female: A comparison of property and violent offending using a sample of juvenile delinquents. Feminist Criminology, 14(4), 391–419. [Google Scholar] [CrossRef]
- James, D. V., & Farnham, F. R. (2003). Stalking and serious violence. Journal of the American Academy of Psychiatry and the Law, 31(4), 432–439. [Google Scholar]
- Jang, S. J. (2007). Gender differences in strain, negative emotions, and coping behaviors: A General Strain theory approach. Justice Quarterly, 24(3), 523–553. [Google Scholar] [CrossRef]
- Jang, S. J., & Johnson, B. R. (2005). Gender, religiosity, and reactions to strain among African Americans. Sociological Quarterly, 46(2), 323–357. [Google Scholar] [CrossRef]
- Joinson, A. N. (2003). Understanding the psychology of internet behavior. Palgrave MacMillian. [Google Scholar]
- Langhinrichsen-Rohling, J. (2012). Gender and stalking: Current intersections and future directions. Sex Roles, 66(5–6), 418–426. [Google Scholar] [CrossRef]
- Lee, S. S., Jang, H. Y., & Park, C. S. (2020a). A comprehensive explanation of three factors for cyberbullying with smartphones. International Journal of Criminal Justice, 2(1), 95–114. [Google Scholar] [CrossRef]
- Lee, S. S., Shin, J., Lim, S., & Lim, H. (2020b). An empirical test of explanatory factors on cyberstalking. Korean Journal of Criminology, 32(2), 97–122. [Google Scholar]
- Lee, S. S., Song, H., & Park, J. H. (2021). Exploring risk and protective factors for Cyberbullying and their interplay: Evidence from a sample of South Korean college students. International Journal of Environmental Research and Public Health, 18(24), 13415. [Google Scholar] [CrossRef] [PubMed]
- Linares, R., Aranda, M., Carcia-Domingo, M., Amezcua, T., Fuentes, V., & Moreno-Padilla, M. (2021). Cyber-dating abuse in young adult coupes: Relations with sexist attitudes and violence justification, smartphone usage and impulsivity. PLoS ONE, 16, e0253180. [Google Scholar] [CrossRef] [PubMed]
- Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962–986. [Google Scholar] [CrossRef]
- Marcum, C. D., Higgins, G. E., Freiburger, T. L., & Ricketts, M. L. (2014). Exploration of the cyberbullying victim/offender overlap by sex. American Journal of Criminal Justice, 39(3), 538–548. [Google Scholar] [CrossRef]
- Marcum, C. D., Higgins, G. E., & Nicholson, J. (2017). I’m watching you: Cyberstalking behaviors of university students in romantic relationships. American Journal of Criminal Justice, 42, 378–388. [Google Scholar] [CrossRef]
- Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410. [Google Scholar] [CrossRef]
- Mazerolle, P., & Maahs, J. (2000). General strain and delinquency: An alternative examination of conditioning influences. Justice Quarterly, 17(4), 753–778. [Google Scholar] [CrossRef]
- McFarlane, L., & Bocij, P. (2003). An Exploration of predatory behavior in cyberspace: Towards a typology of cyber stalkers. First Monday, 8(9), 1–5. [Google Scholar] [CrossRef]
- Mears, D. P., Ploeger, M., & Warr, M. (1998). Explaining the gender gap in delinquency peer influence and moral evaluations of behavior. Journal of Research in Crime and Delinquency, 35(3), 251–266. [Google Scholar] [CrossRef]
- Meier, R. F., & Miethe, T. D. (1993). Understanding theories of criminal victimization. In A. J. Reiss, & M. Tonry (Eds.), Crime and justice (pp. 459–499). University of Chicago Press. [Google Scholar] [CrossRef]
- Meloy, J. R., & Boyd, C. (2003). Female stalkers and their victims. Journal of the American Academy of Psychiatry and the Law, 31(2), 211–219. [Google Scholar]
- Mishra, A., & Mishra, D. (2008). Cyberstalking: A challenge for web security. In L. J. Janczewski, & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism. Information Science Publishing Reference. [Google Scholar]
- Morash, M., & Moon, B. (2007). Gender differences in the effects of strain on the delinquency of South Korean youth. Youth and Society, 38(3), 300–321. [Google Scholar] [CrossRef]
- Patton, C. L., Nobles, M. R., & Fox, K. A. (2010). Look who’s stalking: Obsessive pursuit and attachment theory. Journal of Criminal Justice, 38(3), 282–290. [Google Scholar] [CrossRef]
- Philips, F., & Morrissey, G. (2004). Cyberstalking and cyber predators: A threat to safe sexuality on the Internet. Convergence, 10(1), 66–79. [Google Scholar] [CrossRef]
- Purcell, R. M., Pathé, M., & Mullen, P. (2010). Gender differences in stalking behavior among juveniles. Journal of Forensic Psychiatry and Psychology, 21(4), 555–568. [Google Scholar] [CrossRef]
- Reiss, D. M., Curbow, B. A., & Wang, M. Q. (2022). Intimate partner cyberstalking among young adults: Associations with attachment and social support. Sexuality & Culture, 26, 2202–2221. [Google Scholar]
- Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25. [Google Scholar] [CrossRef]
- Rosenfeld, B., & Lewis, C. (2005). Assessing violence risk in stalking cases: A regression three approach. Law and Human Behavior, 29(3), 343–357. [Google Scholar] [CrossRef]
- Santos, I. L., Lima, D. C. N., Pimentel, C. E., & Mariano, T. E. (2024). Attitude toward violence and cyberstalking: Gender’s moderating role. Deviant Behavior, 45(12), 1698–1710. [Google Scholar] [CrossRef]
- Shekarkhar, Z., & Gibson, C. L. (2011). Gender, self-control and offending behaviors among Latino youth. Journal of Contemporary Criminal Justice, 27(1), 63–80. [Google Scholar] [CrossRef]
- Sheridan, L. P., North, A. C., & Scott, A. J. (2014). Experiences of stalking in same-sex and opposite-sex contexts. Violence and Victims, 29(6), 1014–1028. [Google Scholar] [CrossRef]
- Smoker, M., & March, E. (2017). Predicting perception of intimate partner cyberstalking: Gender and the dark tetrad. Computers in Human Behavior, 72, 390–396. [Google Scholar] [CrossRef]
- Strawhun, J., Adams, N., & Huss, M. T. (2013). The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy and anger in relation to violence and abuse. Violence and Victims, 28(4), 715–730. [Google Scholar] [CrossRef] [PubMed]
- Sykes, G. M., & Matza, D. (1957). Technique of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670. [Google Scholar] [CrossRef]
- Toplu-Demirtas, E., Akcabozan-Kayabol, N. B., Araci-Iyiadin, A., & Fincham, F. D. (2020). Unraveling the roles of distrust, suspicion of infidelity, and jealousy in cyber dating abuse perpetration: An attachment theory perspective. Journal of Interpersonal Violence, 37, NP1432–NP1462. [Google Scholar] [CrossRef]
- Wang, X., Quio, Y., Li, W., & Dong, W. (2021). How is online disinhibition related to adolescents’ cyberbullying perpetration? Empathy and gender as moderators. Journal of Early Adolescence, 42(5), 704–732. [Google Scholar] [CrossRef]
- Weerman, F. M., Bernasco, W., Bruinsma, G. J. N., & Pauwels, L. J. R. (2016). Gender differences in delinquency and situational action theory: A partial test. Justice Quarterly, 33(7), 1182–1209. [Google Scholar] [CrossRef]
- Wilson, C., Sheridan, L., & Garatt-Reed, D. (2023). Examining cyberstalking perpetration and victimization: A scoping review. Trauma, Violence & Abuse, 24(3), 2019–2033. [Google Scholar]
- Wright, M. F. (2013). The relationship between young adults’ belief about anonymity and subsequent cyber aggression. Cyberpsychology, Behavior and Social Networking, 16(12), 858–862. [Google Scholar] [CrossRef]
- Wright, M. F., & Li, Y. (2013). The Association between cyber victimization and subsequent cyber aggression: The moderating effect of peer rejection. Journal of Youth and Adolescence, 42(5), 662–674. [Google Scholar] [CrossRef]
- Zonna, M. A., Palarea, R. E., & Lane, J. C. (1998). Psychiatric diagnosis and the offender-victim typology of stalking. In J. R. Meloy (Ed.), The psychology of stalking: Clinical and forensic perspectives (pp. 69–84). Academic Press. [Google Scholar]
Total | Male | Female | Range | ||||
---|---|---|---|---|---|---|---|
M | SD | M | SD | M | SD | ||
* Age | 21.370 | 2.047 | 21.900 | 2.030 | 20.900 | 1.952 | 18–28 |
SES | 3.180 | 0.742 | 3.240 | 0.807 | 3.130 | 0.680 | 1–5 |
Lack of Attach | 32.452 | 10.281 | 34.064 | 12.058 | 31.062 | 8.251 | 12–60 |
* Denial of Victim | 5.204 | 2.881 | 6.408 | 3.432 | 4.166 | 1.740 | 3–15 |
* Morality | 4.390 | 1.079 | 3.944 | 1.340 | 4.778 | 0.548 | 1–5 |
Self-control | 37.478 | 7.455 | 36.960 | 8.088 | 37.747 | 6.858 | 12–60 |
* Anonymity | 10.048 | 4.451 | 10.912 | 4.750 | 9.303 | 4.047 | 4–20 |
* Cyberstalking | 0.512 | 0.860 | 0.814 | 1.015 | 0.252 | 0.591 | 0–2.56 |
Cyberstalking | ||||||
---|---|---|---|---|---|---|
Male | Female | Total | ||||
b | β | b | β | b | β | |
Age | −0.032 | −0.064 | 0.031 | 0.101 | 0.031 | 0.073 |
SES | −0.040 | −0.032 | −0.058 | −0.067 | −0.058 | −0.050 |
Lack of Attach | 0.044 *** | 0.524 | 0.009 | 0.122 | 0.009 | 0.105 |
Denial of Victim | 0.102 *** | 0.347 | 0.107 *** | 0.315 | 0.107 ** | 0.258 |
Male | 0.404 | 0.135 | ||||
Age * Male | −0.062 | −0.100 | ||||
SES * Male | 0.018 | 0.036 | ||||
Lack of Attach * Male | 0.035 *** | 0.575 | ||||
Denial of Victim * Male | −0.004 | −0.021 | ||||
Adj R square | 0.609 | 0.118 | 0.525 | |||
F score | 49.381 *** | 5.802 *** | 34.073 *** |
Cyberstalking | ||||||
---|---|---|---|---|---|---|
Male | Female | Total | ||||
b | β | b | β | b | β | |
Age | 0.012 | 0.024 | 0.027 | 0.052 | 0.027 | 0.063 |
SES | 0.029 | 0.023 | −0.055 | −0.067 | −0.055 | 0.022 |
Lack of Attach | 0.012 * | 0.139 | 0.007 | 0.112 | 0.007 | 0.082 |
Denial of Victim | 0.012 | 0.040 | 0.101 *** | 0.330 | 0.101 *** | 0.338 |
Morality | −0.610 *** | −0.805 | −0.123 | −0.157 | −0.123 | −0.154 |
LoA * Morality | 0.002 | 0.030 | −0.000 | −0.041 | −0.000 | −0.008 |
DoV * Morality | 0.004 | 0.027 | −0.056 * | −0.303 | −0.056 * | −0.242 |
Male | −0.276 | −0.160 | ||||
Age * Male | −0.015 | −0.190 | ||||
SES * Male | 0.084 | 0.166 | ||||
Lack of Attach * Male | 0.005 | 0.105 | ||||
Denial of Victim * Male | −0.089 * | −0.210 | ||||
Morality * Male | −0.487 *** | −0.577 | ||||
LoA * Morality * Male | 0.002 | 0.035 | ||||
DoV * Morality * Male | 0.060 * | 0.262 | ||||
Adj R square | 0.698 | 0.138 | 0.651 | |||
F score | 71.095 *** | 4.278 *** | 34.394 *** |
Cyberstalking | ||||||
---|---|---|---|---|---|---|
Male | Female | Total | ||||
b | β | b | β | b | β | |
Age | −0.032 | −0.064 | 0.034 | 0.112 | 0.034 | 0.081 |
SES | −0.028 | −0.022 | −0.059 | −0.067 | −0.059 | −0.051 |
Lack of Attach | 0.044 *** | 0.520 | 0.007 | 0.093 | 0.007 | 0.081 |
Denial of Victim | 0.099 *** | 0.335 | 0.078 ** | 0.230 | 0.078 * | 0.262 |
Self−Control | 0.000 | 0.001 | −0.016 | −0.183 | −0.016 | −0.137 |
LoA * Self−Control | 0.001 | 0.052 | 0.000 | 0.026 | −0.000 | −0.022 |
DoV * Self−Control | −0.002 | −0.067 | −0.008 * | −0.211 | −0.008 | −0.208 |
Male | 0.854 | 0.195 | ||||
Age * Male | −0.066 | −0.144 | ||||
SES * Male | 0.031 | 0.062 | ||||
Lack of Attach * Male | 0.037 *** | 0.511 | ||||
Denial of Victim * Male | 0.021 | 0.095 | ||||
Self−Control * Male | −0.016 | −0.140 | ||||
LoA * Self−Control * Male | 0.000 | −0.026 | ||||
DoV * Self−Control * Male | −0.006 | −0.126 | ||||
Adj R square | 0.602 | 0.129 | 0.523 | |||
F score | 27.843 *** | 3.980 *** | 20.413 *** |
Cyberstalking | ||||||
---|---|---|---|---|---|---|
Male | Female | Total | ||||
b | β | b | β | b | β | |
Age | −0.020 | −0.040 | 0.029 | 0.096 | 0.29 | 0.069 |
SES | −0.084 | −0.067 | −0.077 | −0.089 | −0.077 | −0.066 |
Lack of Attach | 0.033 *** | 0.397 | 0.003 | 0.035 | 0.003 | 0.030 |
Denial of Victim | 0.045 | 0.153 | 0.099 *** | 0.291 | 0.099 *** | 0.331 |
Anonymity | 0.056 *** | 0.263 | 0.047 *** | 0.319 | 0.047 ** | 0.241 |
LoA * Anonymity | 0.005 *** | 0.251 | 0.000 | −0.013 | 0.000 | −0.010 |
DoV * Anonymity | 0.001 | 0.016 | 0.014 | 0.204 | 0.014 | 0.133 |
Male | 0.331 | 0.192 | ||||
Age * Male | −0.049 | −0.128 | ||||
SES * Male | −0.007 | −0.013 | ||||
Lack of Attach * Male | 0.031 *** | 0.578 | ||||
Denial of Victim * Male | −0.054 | −0.147 | ||||
Anonymity * Male | 0.010 | 0.071 | ||||
LoA * Anonymity * Male | 0.005 ** | 0.239 | ||||
DoV * Anonymity * Male | −0.013 | −0.100 | ||||
Adj R square | 0.679 | 0.155 | 0.580 | |||
F score | 38.532 *** | 4.782 *** | 25.740 *** |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, S.-S.; Park, C.S. Gender Differences in Cyberstalking: The Roles of Risk, Control, and Opportunity Factors in Social Media. Behav. Sci. 2025, 15, 566. https://doi.org/10.3390/bs15050566
Lee S-S, Park CS. Gender Differences in Cyberstalking: The Roles of Risk, Control, and Opportunity Factors in Social Media. Behavioral Sciences. 2025; 15(5):566. https://doi.org/10.3390/bs15050566
Chicago/Turabian StyleLee, Seong-Sik, and Cheong Sun Park. 2025. "Gender Differences in Cyberstalking: The Roles of Risk, Control, and Opportunity Factors in Social Media" Behavioral Sciences 15, no. 5: 566. https://doi.org/10.3390/bs15050566
APA StyleLee, S.-S., & Park, C. S. (2025). Gender Differences in Cyberstalking: The Roles of Risk, Control, and Opportunity Factors in Social Media. Behavioral Sciences, 15(5), 566. https://doi.org/10.3390/bs15050566