Next Article in Journal
Associations Between Emotional Resilience and Mental Health Among Chinese Adolescents in the School Context: The Mediating Role of Positive Emotions
Previous Article in Journal
Exploring the Impostor Phenomenon Among Korean Daycare Directors: A Grounded Theory Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Gender Differences in Cyberstalking: The Roles of Risk, Control, and Opportunity Factors in Social Media

1
Department of Information Sociology, Soongsil University, Seoul 06978, Republic of Korea
2
Department of Public Administration, Korean National Police University, Asan 31539, Republic of Korea
*
Author to whom correspondence should be addressed.
Behav. Sci. 2025, 15(5), 566; https://doi.org/10.3390/bs15050566
Submission received: 11 March 2025 / Revised: 4 April 2025 / Accepted: 20 April 2025 / Published: 22 April 2025

Abstract

:
This study empirically tests explanatory factors for cyberstalking on social networking services (SNS), especially focusing on gender differences in the effects of risk, control, and opportunity factors. In this study, we used lack of attachment and denial of victim as risk factors, morality and self-control as control factors, and anonymity as an opportunity factor. We predicted that the main risk effect for cyberstalking and the interaction effect between risk and control factors and between risk and opportunity factors can be differentiated by gender. It is hypothesized that the effects of lack of attachment and denial of victim as risk factors for cyberstalking would differ by gender. Furthermore, in the context of risk factors, we predicted that the moderating effect of the control factor would be greater for women, and the effect of the opportunity factor, such as anonymity, would be greater for men. The results of the analysis of cross-sectional data from 270 SNS using college students in Seoul, South Korea, generally supported the hypotheses. As a risk factor, the influence of lack of attachment was greater for men, while denial of victim was greater for women. The moderating effects of the control factors were greater for women in such a way that the interaction between denial of victim and morality was significant for women; while the moderating effect of the opportunity factor was greater for men in such a way that the interaction between lack of attachment and anonymity was more significant for men. This study finds that the risk factors of cyberstalking and the respective moderating effects of control and opportunity factors can be differentiated according to gender.

1. Introduction

Stalking refers to the act or crime of intentionally and repeatedly following or harassing another person in circumstances that would cause a reasonable person to fear injury or death due to the threat expressed or implied. Cyberstalking is the same act or crime performed through information and communication networks, and there is no significant difference between the two definitions other than the location of the stalking (Bocij, 2006). Cyberstalking began to emerge as one of the main issues studied by criminologists, who duly described the damage of cyberstalking in the early days (Bennett et al., 2011; Reyns et al., 2012). However, scholars have shifted their attention to the causality of perpetration with the help of traditional sociological theories, such as strain theory, social learning theory, and self-control theory (Curry & Zavala, 2020; Fissel et al., 2021; Marcum et al., 2017; Wilson et al., 2023), or psychological factors, such as hostility, jealousy, and attachment problems (Deans & Bhogal, 2019; Toplu-Demirtas et al., 2020). Even so, empirical research on cyberstalking is still lacking, and more evidence is needed.
This study explores the explanatory factors for cyberstalking on an SNS (social networking service), especially focusing on gender differences among college students. According to the 2020 Cyber Violence survey conducted by the National Information Society Agency (NIA)1 in South Korea, only 0.8% of youths surveyed had offending experiences of cyberstalking, while this figure was 19.1% for adults. In this regard, this study intends to examine the cyberstalking of adults, especially university students, who have relatively higher offense experiences of cyberstalking. In addition, this study examines whether the explanatory factors for cyberstalking are differentiated by gender.
Previous studies have suggested that men are often the perpetrators of stalking, while women are the victims. Furthermore, there are many cases in which the victim is an ex-girlfriend or lover when the perpetrator is male, whereas for female perpetrators, the victim is a same-gender friend (Meloy & Boyd, 2003; Sheridan et al., 2014). It has also been argued that the motivation for a male stalker is a high level of obsession or retaliation for the opposite gender who informed him of a break-up; while the motivation for female stalkers is an extension of bullying by same-gender peers (Purcell et al., 2010). In addition, stalking by men is more violent than stalking by women, and is more likely to include physical violence (James & Farnham, 2003; Rosenfeld & Lewis, 2005). Based on these characteristics, it can be presumed that the causes of stalking between men and women are somewhat different. This study analyzes whether the motives and causes of cyberstalking differ between men and women. Unlike traditional offline stalking, perpetrators and victims in cyberstalking often do not know each other, and the stereotypical role assignment of male perpetrators and female victims is not necessarily the case (or applicable) anymore in cyberstalking (Borrajo et al., 2015b; Deans & Bhogal, 2019). Nevertheless, cyberstalking studies (Dreßing et al., 2014) have shown that, although the rate of female perpetrators has increased compared to conventional stalking, it is still a norm that males are perpetrators and females are victims, and the target is often former girlfriends or lovers.
In this study, we used various explanatory factors for SNS stalking and attempted to verify it. The existing factors can be divided into risk, control, and opportunity factors, and the interactive mechanism of these three factors is examined. The risk factor refers to the motive and causative factor that induces cyberstalking, the control factor is the factor that prevents cyberstalking, and, conversely, the opportunity factor is the situational opportunity factor for the occurrence of stalking. This study examines the main risk effect on cyberstalking and the interaction effect between the risk and control factors and between the risk and opportunity factors.
The most notable aspect of this study is the application of such interaction effects to men and women separately, and the examination of the gender differences in the results. Previous studies have shown gender differences in the causes of conventional stalking (Purcell et al., 2010; Sheridan et al., 2014): the research question is whether gender differences exist in the main effects and interaction effects of the three factors—risk, control, and opportunity—in cyberstalking. We will examine whether men and women differ in their risk, control, and opportunity factors for cyberstalking and explore the implications and alternatives from the results.

2. Literature Review

2.1. Risk Factors in Cyberstalking and Gender Differences

Stalking can be classified into three types: simple obsession, affectionate obsession, and delusion (Zonna et al., 1998). Simple obsession is derived from a form of attachment or the restoration of a relationship with a former spouse or lover, while affectionate obsession arises from an expression of affection for someone they love. The delusional type of stalking arises from the illusion (false belief) that the victim loves the perpetrator. In the case of cyberstalking, apart from obsession and delusion, retaliation against the victim is also proposed as a major of offense (Mishra & Mishra, 2008). McFarlane and Bocij (2003) classified cyberstalking into four types, including obsession, retaliation, harassment, and grouping.
As we see in the cases of simple obsession and affection obsession, the main forms of stalking begin with the so-called obsession. Obsession is a major factor in men’s stalking behavior toward their former lovers, and is known to be caused by a lack of attachment. It has been argued that stalking arises out of confusion in attachment between the actor and his/her parents during childhood. Previous studies on attachment problems have shown that attachment with parents in childhood is very important, and lack of affection or violence from the parents is more likely to manifest in the form of preoccupied, anxious, and insecure attachments rather than stable attachments. These characteristics of abnormal attachment are prevalent among stalkers suffering from relational problems (Davis et al., 2000; Dutton & Winstead, 2006; Patton et al., 2010). Individuals with attachment disorders want to control others in the relationship, even in coercive ways, because they want to receive attention and reassurance from them, which leads to an increased outbreak of stalking. Moreover, fear of rejection, suspicion of others, and probable breakup of intimate relationships tend to produce anger and subsequent violence in extreme cases.
In particular, heterosexual men with insecure attachment disorders tend to be obsessive with their partners and try to dominate them, which leads to stalking. Although few stalking studies have applied attachment discussion to men and women separately, dating violence studies show that, unlike women, men often try to control their partner in their relationship with ex-partners, and often use violence to vent their resentment against separation. Therefore, if male violence is somehow related to attachment problems (Follingstad et al., 2002), and if cyberstalking is an extension of offline stalking, then attachment is a more suitable predictor for male stalking as compared to female stalking.
It has also been argued that cyberstalking is not just a matter of affection and obsession, but is rather motivated by violent relationships, such as bullying, retaliation, and punishment against others (Strawhun et al., 2013). Cyberstalking is very similar to cyberbullying, as it is a form of bullying (or violence) that has traits of both obsession and bullying. Furthermore, offenders blame and punish targets in the form of stalking. Just as the main cause of cyberbullying is retaliation and punishment against someone who has done wrong or harmed the perpetrator by spreading false rumors about them (Marcum et al., 2014; Wright & Li, 2013), stalking is also aimed at punishing and harassing the target, because cyber stalkers think victims deserve punishment and harassment. Offenders justify their actions through these processes, which also serve as a major explanatory factor (Fissel et al., 2024; Linares et al., 2021; Santos et al., 2024).
Bullying and retribution in stalking tend to occur more often in women than in men (Purcell et al., 2010). Similar to the statement that bullying is more prevalent among women than men, the forms of warning and punishment against those who stand out could be more likely to be suitable in cases of female stalking. Just as women who stalk tend to justify their actions by blaming the person who provides the cause (Langhinrichsen-Rohling, 2012), it takes the form of bullying against female peers to punish and deny out of hate, which is quite different from male stalking. In other words, the motive for punishment, such as denying and blaming the other, can explain female stalking better in the form of bullying. Borrajo et al. (2015a) suggested that the justification belief of violence in explaining cyber dating abuse was more significant in women and acted as a form of self-defense.

2.2. Gender Differences in Control and Opportunity Factors

2.2.1. Control and Opportunity Factors

While the risk factor has a positive (+) relationship with cyberstalking, the control factor has a negative (−) relationship. Here, rather than the motive and risk of cyberstalking, we focus on the factors that can control and prevent it. The most representative theory on the control factor is social control theory (Hirschi, 1969). This theory presents several social bonding factors as an answer to the question of why people do not commit crimes rather than why they commit crimes. In the context of cybercrime, the social bonds assume the individual moral attitude, and ethical sense as moral belief is also important (Joinson, 2003). In cyberspace, cyberstalking is more permissible because of the characteristics of anonymity and noncontact, so a lack of control over former traits makes people commit cyberstalking more often. In that sense, possessing a moral attitude toward cyberstalking can be a major factor in controlling and preventing stalking. In a stalking study of college students, Fox et al. (2011) suggested that the attitude toward stalking was the main explanatory factor for both the perpetration and victimization of stalking. In their cyberstalking analysis, Lee et al. (2020b) also suggested that a moral attitude toward stalking was the main factor of cyberstalking. Therefore, individual morality is a major control factor in cases of stalking.
Self-control is another major control factor found to be significant in the previous studies. The general theory of crime by Gottfredson and Hirschi (1990) noted that most crimes occur immediately and impulsively, so that one’s criminal behavior is differentiated by internal disposition, implying an individual’s capacity to manage and control immediate gratification and impulsivity. Self-control would account for the outbreak of any kind of crime, and even cybercrimes, including cyberstalking, can be explained by a main factor of self-control. In research on stalking (Davis et al., 2012), self-control is evaluated as one of the most important factors in the application of similar self-regulation theory (Baumeister et al., 1994). In other words, it is easy to act accidentally in cyberspace, and a person with low self-control can easily commit cyberstalking, but if a person with high self-control can refrain from and control their behavior, it can be seen that the possibility of violation is low.
On the other hand, in other discussions on crime, the opportunity factor has been emphasized. For example, the lifestyle theory (Hindelang et al., 1978) and the routine activity theory (Cohen & Felson, 1979; Meier & Miethe, 1993) emphasize that there should be an opportunity for crime to occur anyway. Unlike the control factor that has a negative (−) relationship with crime, opportunity is a factor that promotes crime and thus is positively (+) related to it. These discussions can also be applied to cybercrime, suggesting that the more opportunities and conveniences there are for crime to occur, the more cybercrime would occur unaffectedly (Holt & Bossler, 2008; Marcum et al., 2010). In cyberspace, it is easy to commit a crime with a single click, and there are many accidental opportunities, such as the absence of surveillance, which can be seen as a major cause of crime.
Opportunity factors, such as non-face-to-face (or “untact”) and anonymous situations, can act as major factors in cybercrime (Barlett, 2015; Lowry et al., 2016; Wright, 2013). Here, attention is paid to the anonymity of the many opportunity factors. In the case of cyberstalking, anonymity is a major explanatory factor (Philips & Morrissey, 2004). Bocij (2006) also finds that, in addition to disinhibition emerging from anonymity, the ease of opportunity and technical ability are other major factors of cyberstalking. As such, opportunity is another major factor that facilitates cyberstalking.

2.2.2. Gender Differences in Their Moderating Effects

Apart from the risk factors, cyberstalking would be more easily explained when control factors are withheld or opportunity factors are disclosed. As explained above, the control factor acts (works) negatively (−) on cyberbullying, whereas the opportunity factor acts (works) positively (+). Such control and opportunity factors can work as a buffer or catalyst integrally in the action of risk factors.
This argument is based on the existing integrated theory. Agnew’s (1992) general strain theory posits that, while strain is a major risk, crime is more likely to occur when social or internal control is low, covering another factor in building up an integrated theory. To some extent, this type of integrated model has been supported in subsequent studies (Mazerolle & Maahs, 2000; Morash & Moon, 2007). In addition, according to the coercion and social support theory of Colvin et al. (2002), both coercion and supporting factors need to be considered integrally when we divide explanatory factors into two parts: coercion and support. Referencing a study where morality and self-control were utilized as the main factors of control (Barton-Crosby & Hirtenlehner, 2021), Lee et al. (2021) explained cyberbullying with the main effects and the interaction effects between risk factors and control factors, where the former utilized cyberbullying victimization and cyberbullying peers, while the latter used morality and self-control.
In previous studies, morality and self-control were found to be significant in both genders, showing no difference between men and women in inhibiting crime (Burton et al., 1998; Ishoy & Blackwell, 2019; Shekarkhar & Gibson, 2011; Weerman et al., 2016). However, when we considered the role of gender difference in the buffering effect of control factors, they appeared to be more significant among women, even if there were not many supporting materials. Jang and Johnson (2005) compared the gender effect of strain on crime and suggested that religiosity had a buffering effect on crime in women; this finding was supported by Jang (2007). This implies that women are less likely to commit crimes if they have the morality to inhibit criminal activity. In addition, Mears et al. (1998) examined the gender-differentiated buffering effect of morality in the relationship between delinquent peers and crime, and suggested that morality did not buffer the influence of delinquent peers on crime for men, while it played a buffering role for women. This implies that the probability of a criminal act declines with a high level of morality, even if youth have many delinquent peers. Furthermore, the moderating effect of self-control as a controlling factor in the relationship between delinquent peers and crime was greater for women than for men. Cheung and Cheung (2010) showed that the interaction effect of self-control on the influence of strain on delinquency was greater for women than for men. In other words, these outcomes imply that men are unable to control their morality or self-control in the action of a certain risk, but women are more likely to be able to control their morality or self-control in the process.
On the other hand, it is also likely that the risk factors of cyberstalking would work together with the opportunity factors. In fact, scholars who emphasize opportunity factors have argued that motivated offenders commit crimes when there are opportunities for crime, such as suitable targets and the absence of guardians working together (Cohen & Felson, 1979; Meier & Miethe, 1993). As the opportunity factor used to be treated as a major factor interacting with various risk factors in previous cybercrime studies (Lee et al., 2020a), it is likely that criminal opportunity factors would interact with risk factors in explaining cyberstalking. In other words, in the risk factors mechanism, there should be an opportunity for risk to be activated more, and such opportunity factors would promote the impact of risk factors on deviant behaviors.
Some studies on opportunity factors by gender show that opportunity operates more effectively for men than for women. Augustyn and McGloin (2013) argued that women do not easily engage in deviant behavior, even by chance, due to parental control or internal restraints, whereas men have a high plausibility of involvement in delinquency if opportunities arise, due to the manifestation of masculinity in certain circumstances. In addition, Marcum et al. (2014), studying the impacts of various factors on cyberbullying by gender, also suggested that opportunity factors appear to be more important for men. Some research results have shown that factors such as anonymity—a representative variable known as one of the opportunity factors—have a stronger influence on men than on women (Wang et al., 2021). Although few previous studies have dealt with opportunity factors by gender as a moderating variable, we can propose that the effect of opportunity factors as moderators precipitating the impact of risk factors on criminal behavior, such as anonymity, would be greater for men than for women.

3. Current Study and Research Questions

To explain cyberstalking, this study proposes a model that focuses on risk, control, and opportunity factors (separately and simultaneously), and empirically tests the effects of these factors on cyberstalking. First, it investigates the main effects of risk factors for cyberstalking. Second, it investigates the interaction effects of risk factors with both control and opportunity factors, respectively, in explaining cyberstalking. Specifically, it is predicted that two types of interaction effects will be tested, such that there will be an interaction effect between the risk factor and the control factor, as well as an interaction effect between the risk factor and the opportunity factor. The former interaction is called suppressing interaction, whereas the latter is termed precipitating interaction.
We used the lack of attachment and the denial of victim risk factors, as the main types and motives of the risk factors are obsession and retribution. According to the discussion on attachment as a risk factor, it is likely that a person with attachment confusion will commit stalking because of problems in their personal relationships, such as anger or frustration in the relationship. From the standpoint of the previous research on stalking (Follingstad et al., 2002), the lack of attachment seems to occur more likely in men who try to control their relationship with the opposite sex or partner. The denial of victim factor refers to denying and blaming the victim for providing the reasons for stalking, as well as chastising the victim, which seems to be more evident for female stalking than for male stalking (Borrajo et al., 2015a; Langhinrichsen-Rohling, 2012).
Research Question 1.
Does lack of attachment and denial of victim affect cyberstalking? Are there gender differences in the impact of these factors?
Lack of attachment and denial of victim are the main risk factors for cyberstalking, but we posit that stalking would be more likely to occur when control factors such as morality and self-control are low, and less likely to occur when the control factors are high. In the same manner, we posit that the effects of the risk factor on stalking would contribute more to cyberstalking when the opportunity factors are high. In other words, the lack of attachment and denial of victim as risk factors will interact negatively (−) with morality and self-control as control factors, while interacting positively (+) with anonymity as an opportunity factor. Thus, based on previous studies (Jang, 2007; Marcum et al., 2014; Mears et al., 1998; Wang et al., 2021), it can be assumed that there will be differences between men and women in the moderating effect of the control and opportunity factors in such a way that the former will be greater for women, while the latter will be greater for men.
Research Question 2.
Do risk factors (lack of attachment and denial of victim) and control factors (morality and self-control) have negative (−) interaction effects with cyberstalking? Are there gender differences in the impact of these factors?
Research Question 3.
Do risk factors (lack of attachment and denial of victim) and opportunity factors (anonymity) have positive (+) interaction effects on cyberstalking? Are there gender differences in the impact of these factors?

4. Data and Methods

4.1. Sample and Procedure

In this study, we examined SNS cyberstalking among adult college students. For the survey, we selected 60 students from each of the five universities in Seoul, South Korea. One university was selected from each of five regions in Seoul: east, west, north, south, and central. A quota sampling was applied within each university with three demographic variables: gender, academic major, and academic level. The Survey was conducted over two weeks in July 2018, with approval from the Institutional Review Board of the first author’s institution (IRB#SSU-202503-HR-626-1). Participants were informed that their participation was completely voluntary, and their responses would be treated as confidential and protected by the law. A total of 304 male and female students participated in the survey. Among them, individuals who responded “yes” to the question regarding SNS usage were selected, resulting in a final sample of 270 SNS users for analysis.
We conducted OLS regression analysis using SPSS version 24. The baseline model examined the effect of two risk factors on cyberstalking by gender, controlling for sociodemographic variables. In addition, we incorporated interaction terms with each moderating variable. To mitigate multicollinearity, the interaction terms were mean-centered.

4.2. Measurements

We used the actual perpetration of cyberstalking as the dependent variable in the current study. While previous studies have used inconsistent measurements for this variable (Curry & Zavala, 2020; Marcum et al., 2014, 2017), we specifically defined cyberstalking as more than just accessing or monitoring a partner’s social media account without consent. In our context, it refers to the act of stalking, which includes sending persistent messages to a partner against his/her wishes or causing anxiety and fear. To operationalize this definition, participants were asked to respond to the following questions for the past year, “I have continuously sent messages on SNS even though the victim rejected it”, “I have consistently sent a friend request on SNS even though the victim rejected it”, “I have uploaded a post that could cause fear or anxiety in a victim on SNS”, “I have never sent a message or made a comment that could cause fear or anxiety against the victim on SNS”. The four items have a four-point response scale: “never (score = 0)”, “once or twice (score = 1)”, “three to eight times (score = 2)”, and “nine or more times (score = 3)”. Each score (0–3) of the four items was summed and the natural log-transformation of the summed score was applied to reduce positive skewness in the variable (alpha = 0.960).
Lack of attachment, as a risk factor corresponding to attachment avoidance and attachment anxiety, was constructed using 12 items among the items on the attachment scale developed by Brennan et al. (1998), such as “I feel uncomfortable with being too close to others” and scored on a 5-point Likert scale, ranging from “not at all true (1)” to “very true (5)”. The responses were then summed, resulting in a composite score (alpha = 0.922).
Denial of victim, as a risk factor, utilized items from the discussion of techniques of neutralization (Sykes & Matza, 1957) in stalking situations. Three items were selected from the study by Borrajo et al. (2015a), such as “Anyone stalked is responsible for the victimization to a degree”, and scored on a 5-point Likert scale (alpha = 0.890).
The morality of cyberstalking, as a control factor to control the impact of the risk factor, consists of one question regarding how bad the cyberstalking behavior is on a 5-point Likert scale from “not bad at all (1)” to “very bad (5)”.
Self-control, based on a previous study (Grasmick et al., 1993), consisted of two questions for each of the following six traits: impulsivity, risk-seeking, simple task-seeking, activity, selfishness, and temperament. Thus, 12 questions in total, including “I often act impulsively”, were asked to obtain answers on a 5-point scale, ranging from “not at all true (1)” to “very true (5)”. The responses were then summed, resulting in a composite score, and finally were inverse-coded (alpha = 0.823).
Anonymity, as an opportunity factor, was asked to check whether they used SNS mainly in anonymous situations. Four questions were asked: “Actually, I do not use my real name on SNS”, and responses were made on a 5-point scale (alpha = 0.906).
As a sociodemographic control variable, age was recorded based on the year of birth. In addition, the family’s subjective economic status (SES) was assessed using a 5-point Likert scale ranging from “low” to “high”.

5. Results

Table 1 presents descriptive statistics of the variables used in this study. The study sample consisted of 145 males (53.7%) and 125 females (46.3%). The average age of the respondents was 21.37, ranging from 18 to 28 years, with an average age of 21.9 years for males and 20.9 for females. The average value of the family’s economic level was 3.18, ranging between 1 and 5, with 3.24 for males and 3.13 for females. The average lack of attachment as an independent variable was 32.452, ranging between 12 and 60, with males scoring 34.064, a little higher than females (31.062). The average denial of victims was 5.024 in the range of 3–15, with males scoring 6.408, which was significantly higher than that of females (4.166). Morality, as a control factor, had an average of 4.390, ranging between 1 and 5, with males scoring 3.944, which was lower than that of females (4.778). The average self-control score was 37.478 in the range of 12–60, and males scored 36.960, which was lower than that of females (37.747). As an opportunity factor, the average of anonymity in the range of 4–20 was 10.048, and males scored 10.912, which was higher than that of females (9.303). Finally, the average logged score of cyberstalking experience, the dependent variable, has an average of 0.512, ranging between 0 and 2.56, with males (0.814) scoring much higher than females (0.252). The gender differences in mean values for all variables were tested and are presented in Table 1.
Prior to the analysis of the major research question, Table 2 present the effects of the risk factors on cyberstalking. In the case of males, as shown in Table 2, lack of attachment was significant with the largest effect size (β = 0.524), followed by denial of victim (β = 0.347), both at the p < 0.001 level. In the case of females, in Table 2, denial of victim had the greatest effect (β = 0.315) at the p < 0.001 level. However, lack of attachment was not significant for females. When gender was included as a dummy variable (male = 1, female = 0) to examine interaction effects, a significant gender difference was found in the effect of lack of attachment (at the p < 0.001 level), which supports the predictions of this study to some extent.
Table 3, Table 4 and Table 5 present the results of the interaction effect between risk, control, and opportunity factors. Table 3 presents the interaction effect between the risk factors and the control factor, morality. The direct and independent influence of morality was significant for men (β = −0.805) at the p < 0.001 level, but not for women (β = −0.157). Next, we investigated the interaction effects between risk factors (lack of attachment and denial of victim) and morality. It showed that the interaction effect between lack of attachment and morality was not significant for both men and women, but the interaction effect between denial of victim and morality was significant at the p < 0.05 level only for women (β = −0.303) even if it was still not significant for men. In the analysis of gender differences through interaction effects, the results of three interaction effects indicate that the interaction effect between denial of victim and morality is significantly stronger among women (at p < 0.05 level). This means that the moderating effect as a control factor for morality works more in the case of women.
Table 4 presents the interaction effect between the risk factors and the control factor, self-control. The direct and independent influence of self-control was not significant for both men and women. Next, we investigated the interaction effects between risk factors (lack of attachment and denial of victim) and self-control. The interaction effects between the risk factors and self-control were not significant for men, but only one interaction effect was significant for women, that is, between denial of victim and self-control (β = −0.211) at the p < 0.05 level. In the analysis of gender differences through interaction effects, however, the results of three interaction effects indicate that the interaction effect between denial of victim and self-control shows no significant difference between men and women.
Finally, in Table 5, the interaction effect between the risk factors and the opportunity factor for anonymity is provided. Unlike the previous steps, the direct and independent influence of anonymity on cyberstalking was significant for both men (β = 0.263) and women (β = 0.319) at the p < 0.001 level. Next, we investigated the interaction effects between risk factors (lack of attachment and denial of victim) and anonymity (an opportunity factor) were investigated. Results showed that the interaction effect between lack of attachment and anonymity was significant for men (β = 0.251), but it was not significant for women. It showed that the interaction effect between denial of victim and anonymity was not significant for both men and women. In the analysis of gender differences through interaction effects, the results of three interaction effects indicate that the interaction effect between lack of attachment and anonymity is significantly stronger among males (at p < 0.01 level). This implies that the moderating effect of anonymity as an opportunity factor works more in the case of men.

6. Discussion

To explain cyberstalking in the use of SNS, this study investigated the influence of risk factors for cyberstalking and also tried to test the interaction effects focusing on risk, control, and opportunity factors simultaneously. The proposed hypothesis posits that there will be a negative (−) interaction (risk factor × control factor) and a positive (+) interaction (risk factor × opportunity factor). In this study, we used lack of attachment and denial of victim as risk factors, morality and self-control as control factors, and anonymity as an opportunity factor.
Furthermore, this study predicted that the interaction between risk and moderating factors (control and opportunity) would differ by gender. It posits that the impact of the risk factors—lack of attachment and denial of victim—would be differentiated by gender such that lack of attachment would be important for men and denial of victim for women. In the effect of these risk factors, the interaction effect is also differentiated by gender in such a way that the moderating effect of control factors will be greater for women than for men, and the effect of opportunity factors, such as anonymity, will be greater for men than for women. Thus, the interaction between risk factors (lack of attachment and denial of victim) and control factors (morality and self-control) would be greater in women, while the interaction between risk factors (lack of attachment and denial of victim) and opportunity factors (anonymity) would be greater in men.
The research outcomes support the general hypotheses of this study. In the case of men, stalking originates from the obsession with a former lover of the opposite sex. For men, denial of victim was also significant, but the effect of lack of attachment was stronger. Unlike men, women’s lack of attachment was not significant, and the effect of denial of victim was significant, suggesting that stalking is an extension of cyberbullying, and is committed as a form of punishment to deny or blame the other person. An analysis of gender differences in the effects of the two risk factors revealed a significant gender difference in the effect of lack of attachment.
This study predicted that the moderating role of the control factors would be greater for women than for men. As a result, the interaction effect of denial of victim × morality appeared more significant in women, with a significant gender difference observed. However, lack of attachment × morality was not significant for either men or women. Additionally, the results showed that denial of victim × self-control was significant in women; however, gender difference analysis indicated no significant difference between men and women. This suggests that morality reduced the impact of the denial of victim, a key risk factor for women.
This study predicted that the facilitating role of the opportunity factor would be greater for men than for women. It was shown that the role of opportunity factors in interaction differs between men and women. Specifically, the interaction effect of lack of attachment × anonymity was more significant in men, with a significant difference compared to women, even though denial of victim × anonymity was not significant for either men or women. What it suggests is that, as predicted, the opportunity factors in the interaction effects facilitate and precipitate the action of risk factors on cyberstalking for men.
From these study outcomes, we found that the cause of cyberstalking behavior is somewhat different between men and women, and that the moderating effects of control factors and opportunity factors on cyberstalking through risk factors could also be differentiated by gender. This implies that the action of risk factors in cyberstalking needs to be identified separately for each gender. For men, addressing the problems of fixation and parental nurturing is critical to preventing cyberstalking. This finding is consistent with previous research that emphasized the importance of fixation or attachment style (Follingstad et al., 2002), For both women and men, retaliation, punishment, and blaming others are important causes of cyberstalking, and the change of the justification belief is necessary. These results imply that gender-specific solutions are required, such as counseling and healing for male stalkers to reduce their obsession with their former partner or lover, and for women to get along and foster relationships with their same-sex friends. Furthermore, a gender-differentiated policy needs to be pursued in search of countermeasures that contribute to controlling the action of the risk. For example, moral and ethics education may be more effective and suitable for women, whereas the removal of opportunities for cyberstalking would be more effective and suitable for men.
Now that the empirical research on cyberstalking is scarce, this study could be considered to be meaningful and contributable for developing the subject in this field in bits and pieces. It is also meaningful to clarify the process by which the moderating action of control and opportunity factors with risk factors on cyberstalking can be differentiated by gender. However, this study assumes that men reported stalking women and women reported stalking their same-sex friends; but, in the future, it will be necessary to study more in-depth through stalking surveys that identify the target-gender of each stalker, including intimate partner stalking (Gordon & Dardis, 2023; Reiss et al., 2022; Smoker & March, 2017). In addition, this study focused on gender differences in stalking motives and risk factors, specifically examining only two factors: lack of attachment and denial of victim. However, future research should consider a broader range of factors to provide a more comprehensive understanding. A limitation of this study is that the sample was drawn exclusively from college students, which may limit the generalizability of the findings. Furthermore, the cross-sectional research design and relatively small sample size pose methodological concerns that could reduce its statistical power. Future studies should adopt longitudinal research designs and include larger, more diverse samples to enhance the robustness of the findings. We also acknowledge that our measure of self-control was not ideal, as we used a shortened version (12 items instead of the original 24) of Grasmick et al.’s (1993) low self-control scale. Additionally, while this study addressed the skewness of the dependent variable through log transformation, future research should consider alternative statistical approaches, such as logistic regression or other advanced analytical techniques, to further refine the analysis. While this study offers a preliminary example, future research will need to build a more robust integrative model that includes risk, control, and opportunity factors, and may require the construction of gender-integrated or gender-specific models. Future research should continue to expand the sample by targeting not only college students but teenagers and adults as well.

7. Conclusions

This study found that the effects of lack of attachment and denial of victims as risk factors for cyberstalking differed by gender. As a risk factor, the influence of lack of attachment was greater in men, while denial of victim was greater in women. Furthermore, in the context of risk factors, we predicted that the moderating effect of the control factor would be greater for women, and that of the opportunity factor, such as anonymity, would be greater for men. The results indicate that the moderating effects of control factors were stronger for women, as evidenced by the significant interaction between denial of victim and morality. By contrast, the moderating effect of opportunity factors was stronger for men, with the interaction between lack of attachment and anonymity being more significant for men. These findings suggest that the causal processes of cyberstalking and the respective moderating actions can be differentiated across gender, which implies that a gender-differentiated policy needs to be implemented to control the action against cyberstalking.

Author Contributions

Conceptualization, S.-S.L. and C.S.P.; formal analysis, S.-S.L. and C.S.P.; writing—original draft preparation, S.-S.L. and C.S.P.; writing—review and editing, C.S.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

The study was conducted in accordance with the Declaration of Helsinki, and approved by the Soongsil University (protocol code SSU-202503-HR-626-1 and 24 March 2025).

Informed Consent Statement

Informed consent was obtained from all subjects involved in this study.

Data Availability Statement

The datasets presented in this article are not readily available due to technical and language limitations. Requests to access the datasets should be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
SNSSocial Networking Service
SESSocio-Economic Status
LoALack of Attachment
DoVDenial of Victims
OLSOrdinary Least Squares

Note

1
https://eng.nia.or.kr/site/nia_eng/main.do (accessed on 7 October 2024).

References

  1. Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47–88. [Google Scholar] [CrossRef]
  2. Augustyn, M. B., & McGloin, J. M. (2013). The risk of informal socializing with peers: Considering gender differences across predatory delinquency and substance use. Justice Quarterly, 30(1), 117–143. [Google Scholar] [CrossRef]
  3. Barlett, C. P. (2015). Anonymously hurting others online: The effect of anonymity on Cyberbullying frequency. Psychology of Popular Media Culture, 4(2), 70–79. [Google Scholar] [CrossRef]
  4. Barton-Crosby, J., & Hirtenlehner, H. (2021). The role of morality and self-control in conditioning the criminogenic effect of provocation: A partial test of situational action theory. Deviant Behavior, 42(10), 1273–1294. [Google Scholar] [CrossRef]
  5. Baumeister, R. F., Heaterton, T. F., & Tice, D. M. (1994). Losing control: How people fail at self-regulation. Academic Press. [Google Scholar]
  6. Bennett, D. C., Guran, E. L., Ramos, M. C., & Margolin, G. (2011). College students’ electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors. Violence and Victims, 26(4), 410–429. [Google Scholar] [CrossRef]
  7. Bocij, P. (2006). Cyberstalking: Harassment in the Internet age and how to protect your family. Praeger. [Google Scholar]
  8. Borrajo, E., Gámez-Guadix, M., & Calvete, E. (2015a). Justification beliefs of violence, myths about love and cyber dating abuse. Psicothema, 27(4), 327–333. [Google Scholar] [CrossRef]
  9. Borrajo, E., Gámez-Guadix, M., Pereda, N., & Calvete, E. (2015b). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358–365. [Google Scholar] [CrossRef]
  10. Brennan, K. A., Clark, C. L., & Shaver, P. R. (1998). Self-reported measurement of adult attachment. In J. A. Simpson, & W. S. Rholes (Eds.), Attachment theory and close relationship. The Guilford Press. [Google Scholar]
  11. Burton, V. S., Cullen, F. T., Evans, T. D., Alarid, L. F., & Dunaway, R. G. (1998). Gender, self-control and crime. Journal of Research in Crime and Delinquency, 35(2), 123–147. [Google Scholar] [CrossRef]
  12. Cheung, N. W. T., & Cheung, Y. W. (2010). Strain, self-control, and gender differences in delinquency among Chinese adolescents: Extending general strain theory. Sociological Perspectives, 53(3), 321–345. [Google Scholar] [CrossRef]
  13. Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activities approach. American Sociological Review, 44(4), 588–608. [Google Scholar] [CrossRef]
  14. Colvin, M., Cullen, F. T., & Ven, T. V. (2002). Coercion, social support, and crime: An emerging theoretical consensus. Criminology, 40(1), 19–42. [Google Scholar] [CrossRef]
  15. Curry, T., & Zavala, E. (2020). A multi-theoretical perspective on cyber dating abuse victimization and perpetration within intimate relationships: A test of general strain, social learning, and self-control theories. Victims and Offenders, 15(4), 1–21. [Google Scholar] [CrossRef]
  16. Davis, K. E., Ace, A., & Andra, M. (2000). Stalking perpetrators and psychological maltreatment of partners. Violence and Victims, 15, 473–487. [Google Scholar] [CrossRef] [PubMed]
  17. Davis, K. E., Swan, S. C., & Gambone, L. J. (2012). Why doesn’t he just leave me alone? Persistent pursuit: A critical review of theories and evidence. Sex Roles, 66(5–6), 328–339. [Google Scholar] [CrossRef]
  18. Deans, H., & Bhogal, M. S. (2019). Perpetrating cyber dating abuse: A brief report on the role of aggression, romantic jealousy and gender. Current Psychology, 38(5), 1077–1082. [Google Scholar] [CrossRef]
  19. Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior and Social Networking, 17(2), 61–67. [Google Scholar] [CrossRef]
  20. Dutton, L. B., & Winstead, B. A. (2006). Predicting unwanted pursuit: Attachment, relationship satisfaction, relationship alternatives, and break-up distress. Journal of Social and Personal Relationships, 23(4), 565–586. [Google Scholar] [CrossRef]
  21. Fissel, E., Bryson, S. L., & Lee, J. R. (2024). Minimizing responsibility: The impact of moral disengagement on cyberbullying perpetration among adults. Crime and Delinquency, 1–25, online first. [Google Scholar]
  22. Fissel, E., Fisher, N., & Nedelec, J. (2021). Cyberstalking perpetration among young adults: An assessment of the effects of low self-control and moral disengagement. Crime and Delinquency, 67(12), 1935–1961. [Google Scholar] [CrossRef]
  23. Follingstad, D. R., Bradley, R. G., Helff, C. M., & Laughlin, J. E. (2002). Model for predicting dating violence anxious attachment, angry temperament, need for relationship control. Violence and Victims, 17(1), 35–47. [Google Scholar] [CrossRef]
  24. Fox, K. A., Nobles, M. R., & Akers, R. L. (2011). Is stalking a learned phenomenon? An empirical test of social learning theory. Journal of Criminal Justice, 39(1), 39–47. [Google Scholar] [CrossRef]
  25. Gordon, D. L., & Dardis, C. M. (2023). Perceptions of intimate partner stalking and cyberstalking: Do perpetrator and victim gender and victim’s responses to stalking influence perceptions of criminal behavior and responsibility? Legal & Criminological Psychology, 28(2), 222–236. [Google Scholar]
  26. Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford University Press. [Google Scholar]
  27. Grasmick, H. G., Tittle, C. R., Bursik, R. J., & Arneklev, B. J. (1993). Testing the core empirical implications of Gottfredson and Hirschi’s general theory of crime. Journal of Research in Crime and Delinquency, 30(1), 5–29. [Google Scholar] [CrossRef]
  28. Hindelang, M. S., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime. Ballinger. [Google Scholar]
  29. Hirschi, T. (1969). Causes of delinquency. University of California Press. [Google Scholar]
  30. Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25. [Google Scholar] [CrossRef]
  31. Ishoy, G. A., & Blackwell, B. S. (2019). Situational action theory’s self-control/morality interaction effects and the moderating influence of being female: A comparison of property and violent offending using a sample of juvenile delinquents. Feminist Criminology, 14(4), 391–419. [Google Scholar] [CrossRef]
  32. James, D. V., & Farnham, F. R. (2003). Stalking and serious violence. Journal of the American Academy of Psychiatry and the Law, 31(4), 432–439. [Google Scholar]
  33. Jang, S. J. (2007). Gender differences in strain, negative emotions, and coping behaviors: A General Strain theory approach. Justice Quarterly, 24(3), 523–553. [Google Scholar] [CrossRef]
  34. Jang, S. J., & Johnson, B. R. (2005). Gender, religiosity, and reactions to strain among African Americans. Sociological Quarterly, 46(2), 323–357. [Google Scholar] [CrossRef]
  35. Joinson, A. N. (2003). Understanding the psychology of internet behavior. Palgrave MacMillian. [Google Scholar]
  36. Langhinrichsen-Rohling, J. (2012). Gender and stalking: Current intersections and future directions. Sex Roles, 66(5–6), 418–426. [Google Scholar] [CrossRef]
  37. Lee, S. S., Jang, H. Y., & Park, C. S. (2020a). A comprehensive explanation of three factors for cyberbullying with smartphones. International Journal of Criminal Justice, 2(1), 95–114. [Google Scholar] [CrossRef]
  38. Lee, S. S., Shin, J., Lim, S., & Lim, H. (2020b). An empirical test of explanatory factors on cyberstalking. Korean Journal of Criminology, 32(2), 97–122. [Google Scholar]
  39. Lee, S. S., Song, H., & Park, J. H. (2021). Exploring risk and protective factors for Cyberbullying and their interplay: Evidence from a sample of South Korean college students. International Journal of Environmental Research and Public Health, 18(24), 13415. [Google Scholar] [CrossRef] [PubMed]
  40. Linares, R., Aranda, M., Carcia-Domingo, M., Amezcua, T., Fuentes, V., & Moreno-Padilla, M. (2021). Cyber-dating abuse in young adult coupes: Relations with sexist attitudes and violence justification, smartphone usage and impulsivity. PLoS ONE, 16, e0253180. [Google Scholar] [CrossRef] [PubMed]
  41. Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962–986. [Google Scholar] [CrossRef]
  42. Marcum, C. D., Higgins, G. E., Freiburger, T. L., & Ricketts, M. L. (2014). Exploration of the cyberbullying victim/offender overlap by sex. American Journal of Criminal Justice, 39(3), 538–548. [Google Scholar] [CrossRef]
  43. Marcum, C. D., Higgins, G. E., & Nicholson, J. (2017). I’m watching you: Cyberstalking behaviors of university students in romantic relationships. American Journal of Criminal Justice, 42, 378–388. [Google Scholar] [CrossRef]
  44. Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410. [Google Scholar] [CrossRef]
  45. Mazerolle, P., & Maahs, J. (2000). General strain and delinquency: An alternative examination of conditioning influences. Justice Quarterly, 17(4), 753–778. [Google Scholar] [CrossRef]
  46. McFarlane, L., & Bocij, P. (2003). An Exploration of predatory behavior in cyberspace: Towards a typology of cyber stalkers. First Monday, 8(9), 1–5. [Google Scholar] [CrossRef]
  47. Mears, D. P., Ploeger, M., & Warr, M. (1998). Explaining the gender gap in delinquency peer influence and moral evaluations of behavior. Journal of Research in Crime and Delinquency, 35(3), 251–266. [Google Scholar] [CrossRef]
  48. Meier, R. F., & Miethe, T. D. (1993). Understanding theories of criminal victimization. In A. J. Reiss, & M. Tonry (Eds.), Crime and justice (pp. 459–499). University of Chicago Press. [Google Scholar] [CrossRef]
  49. Meloy, J. R., & Boyd, C. (2003). Female stalkers and their victims. Journal of the American Academy of Psychiatry and the Law, 31(2), 211–219. [Google Scholar]
  50. Mishra, A., & Mishra, D. (2008). Cyberstalking: A challenge for web security. In L. J. Janczewski, & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism. Information Science Publishing Reference. [Google Scholar]
  51. Morash, M., & Moon, B. (2007). Gender differences in the effects of strain on the delinquency of South Korean youth. Youth and Society, 38(3), 300–321. [Google Scholar] [CrossRef]
  52. Patton, C. L., Nobles, M. R., & Fox, K. A. (2010). Look who’s stalking: Obsessive pursuit and attachment theory. Journal of Criminal Justice, 38(3), 282–290. [Google Scholar] [CrossRef]
  53. Philips, F., & Morrissey, G. (2004). Cyberstalking and cyber predators: A threat to safe sexuality on the Internet. Convergence, 10(1), 66–79. [Google Scholar] [CrossRef]
  54. Purcell, R. M., Pathé, M., & Mullen, P. (2010). Gender differences in stalking behavior among juveniles. Journal of Forensic Psychiatry and Psychology, 21(4), 555–568. [Google Scholar] [CrossRef]
  55. Reiss, D. M., Curbow, B. A., & Wang, M. Q. (2022). Intimate partner cyberstalking among young adults: Associations with attachment and social support. Sexuality & Culture, 26, 2202–2221. [Google Scholar]
  56. Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25. [Google Scholar] [CrossRef]
  57. Rosenfeld, B., & Lewis, C. (2005). Assessing violence risk in stalking cases: A regression three approach. Law and Human Behavior, 29(3), 343–357. [Google Scholar] [CrossRef]
  58. Santos, I. L., Lima, D. C. N., Pimentel, C. E., & Mariano, T. E. (2024). Attitude toward violence and cyberstalking: Gender’s moderating role. Deviant Behavior, 45(12), 1698–1710. [Google Scholar] [CrossRef]
  59. Shekarkhar, Z., & Gibson, C. L. (2011). Gender, self-control and offending behaviors among Latino youth. Journal of Contemporary Criminal Justice, 27(1), 63–80. [Google Scholar] [CrossRef]
  60. Sheridan, L. P., North, A. C., & Scott, A. J. (2014). Experiences of stalking in same-sex and opposite-sex contexts. Violence and Victims, 29(6), 1014–1028. [Google Scholar] [CrossRef]
  61. Smoker, M., & March, E. (2017). Predicting perception of intimate partner cyberstalking: Gender and the dark tetrad. Computers in Human Behavior, 72, 390–396. [Google Scholar] [CrossRef]
  62. Strawhun, J., Adams, N., & Huss, M. T. (2013). The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy and anger in relation to violence and abuse. Violence and Victims, 28(4), 715–730. [Google Scholar] [CrossRef] [PubMed]
  63. Sykes, G. M., & Matza, D. (1957). Technique of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670. [Google Scholar] [CrossRef]
  64. Toplu-Demirtas, E., Akcabozan-Kayabol, N. B., Araci-Iyiadin, A., & Fincham, F. D. (2020). Unraveling the roles of distrust, suspicion of infidelity, and jealousy in cyber dating abuse perpetration: An attachment theory perspective. Journal of Interpersonal Violence, 37, NP1432–NP1462. [Google Scholar] [CrossRef]
  65. Wang, X., Quio, Y., Li, W., & Dong, W. (2021). How is online disinhibition related to adolescents’ cyberbullying perpetration? Empathy and gender as moderators. Journal of Early Adolescence, 42(5), 704–732. [Google Scholar] [CrossRef]
  66. Weerman, F. M., Bernasco, W., Bruinsma, G. J. N., & Pauwels, L. J. R. (2016). Gender differences in delinquency and situational action theory: A partial test. Justice Quarterly, 33(7), 1182–1209. [Google Scholar] [CrossRef]
  67. Wilson, C., Sheridan, L., & Garatt-Reed, D. (2023). Examining cyberstalking perpetration and victimization: A scoping review. Trauma, Violence & Abuse, 24(3), 2019–2033. [Google Scholar]
  68. Wright, M. F. (2013). The relationship between young adults’ belief about anonymity and subsequent cyber aggression. Cyberpsychology, Behavior and Social Networking, 16(12), 858–862. [Google Scholar] [CrossRef]
  69. Wright, M. F., & Li, Y. (2013). The Association between cyber victimization and subsequent cyber aggression: The moderating effect of peer rejection. Journal of Youth and Adolescence, 42(5), 662–674. [Google Scholar] [CrossRef]
  70. Zonna, M. A., Palarea, R. E., & Lane, J. C. (1998). Psychiatric diagnosis and the offender-victim typology of stalking. In J. R. Meloy (Ed.), The psychology of stalking: Clinical and forensic perspectives (pp. 69–84). Academic Press. [Google Scholar]
Table 1. Descriptive Statistics of the Variables (Mean, S.D., and Range).
Table 1. Descriptive Statistics of the Variables (Mean, S.D., and Range).
TotalMaleFemaleRange
MSDMSDMSD
* Age21.3702.04721.9002.03020.9001.95218–28
SES3.1800.7423.2400.8073.1300.6801–5
Lack of Attach32.45210.28134.06412.05831.0628.25112–60
* Denial of Victim5.2042.8816.4083.4324.1661.7403–15
* Morality4.3901.0793.9441.3404.7780.5481–5
Self-control37.4787.45536.9608.08837.7476.85812–60
* Anonymity10.0484.45110.9124.7509.3034.0474–20
* Cyberstalking0.5120.8600.8141.0150.2520.5910–2.56
* Denotes a significant mean difference between males and females (p < 0.05 (two-tailed test)).
Table 2. Impact of Risk Factors on Cyberstalking.
Table 2. Impact of Risk Factors on Cyberstalking.
Cyberstalking
MaleFemaleTotal
bβbβbβ
Age−0.032−0.0640.0310.1010.0310.073
SES−0.040−0.032−0.058−0.067−0.058−0.050
Lack of Attach0.044 ***0.5240.0090.1220.0090.105
Denial of Victim0.102 ***0.3470.107 ***0.3150.107 **0.258
Male 0.4040.135
Age * Male −0.062−0.100
SES * Male 0.0180.036
Lack of Attach * Male 0.035 ***0.575
Denial of Victim * Male −0.004−0.021
Adj R square0.6090.1180.525
F score49.381 ***5.802 ***34.073 ***
Notes. * p < 0.05, ** p < 0.01, *** p < 0.001.
Table 3. Multiple Regressions of the interaction effects with morality on Cyberstalking.
Table 3. Multiple Regressions of the interaction effects with morality on Cyberstalking.
Cyberstalking
MaleFemaleTotal
bβbβbβ
Age0.0120.0240.0270.0520.0270.063
SES0.0290.023−0.055−0.067−0.0550.022
Lack of Attach0.012 *0.1390.0070.1120.0070.082
Denial of Victim0.0120.0400.101 ***0.3300.101 ***0.338
Morality−0.610 ***−0.805−0.123−0.157−0.123−0.154
LoA * Morality0.0020.030−0.000−0.041−0.000−0.008
DoV * Morality0.0040.027−0.056 *−0.303−0.056 *−0.242
Male −0.276−0.160
Age * Male −0.015−0.190
SES * Male 0.0840.166
Lack of Attach * Male 0.0050.105
Denial of Victim * Male −0.089 *−0.210
Morality * Male −0.487 ***−0.577
LoA * Morality * Male 0.0020.035
DoV * Morality * Male 0.060 *0.262
Adj R square0.6980.1380.651
F score71.095 ***4.278 ***34.394 ***
Notes. * p < 0.05, ** p < 0.01, *** p < 0.001.
Table 4. Multiple Regressions of the interaction effects with self-control on Cyberstalking.
Table 4. Multiple Regressions of the interaction effects with self-control on Cyberstalking.
Cyberstalking
MaleFemaleTotal
bβ bβbβ
Age−0.032−0.0640.0340.1120.0340.081
SES−0.028−0.022−0.059−0.067−0.059−0.051
Lack of Attach0.044 ***0.5200.0070.0930.0070.081
Denial of Victim0.099 ***0.3350.078 **0.2300.078 *0.262
Self−Control0.0000.001−0.016−0.183−0.016−0.137
LoA * Self−Control0.0010.0520.0000.026−0.000−0.022
DoV * Self−Control−0.002−0.067−0.008 *−0.211−0.008−0.208
Male 0.8540.195
Age * Male −0.066−0.144
SES * Male 0.0310.062
Lack of Attach * Male 0.037 ***0.511
Denial of Victim * Male 0.0210.095
Self−Control * Male −0.016−0.140
LoA * Self−Control * Male 0.000−0.026
DoV * Self−Control * Male −0.006−0.126
Adj R square0.6020.1290.523
F score27.843 ***3.980 ***20.413 ***
Notes. * p < 0.05, ** p < 0.01, *** p < 0.001.
Table 5. Multiple Regressions of the interaction effects with anonymity on Cyberstalking.
Table 5. Multiple Regressions of the interaction effects with anonymity on Cyberstalking.
Cyberstalking
MaleFemaleTotal
bβ bβbβ
Age−0.020−0.0400.0290.0960.290.069
SES−0.084−0.067−0.077−0.089−0.077−0.066
Lack of Attach0.033 ***0.3970.0030.0350.0030.030
Denial of Victim0.0450.1530.099 ***0.2910.099 ***0.331
Anonymity0.056 ***0.2630.047 ***0.3190.047 **0.241
LoA * Anonymity0.005 ***0.2510.000−0.0130.000−0.010
DoV * Anonymity0.0010.0160.0140.2040.0140.133
Male 0.3310.192
Age * Male −0.049−0.128
SES * Male −0.007−0.013
Lack of Attach * Male 0.031 ***0.578
Denial of Victim * Male −0.054−0.147
Anonymity * Male 0.0100.071
LoA * Anonymity * Male 0.005 **0.239
DoV * Anonymity * Male −0.013−0.100
Adj R square0.6790.1550.580
F score38.532 ***4.782 ***25.740 ***
Notes. * p < 0.05, ** p < 0.01, *** p < 0.001.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lee, S.-S.; Park, C.S. Gender Differences in Cyberstalking: The Roles of Risk, Control, and Opportunity Factors in Social Media. Behav. Sci. 2025, 15, 566. https://doi.org/10.3390/bs15050566

AMA Style

Lee S-S, Park CS. Gender Differences in Cyberstalking: The Roles of Risk, Control, and Opportunity Factors in Social Media. Behavioral Sciences. 2025; 15(5):566. https://doi.org/10.3390/bs15050566

Chicago/Turabian Style

Lee, Seong-Sik, and Cheong Sun Park. 2025. "Gender Differences in Cyberstalking: The Roles of Risk, Control, and Opportunity Factors in Social Media" Behavioral Sciences 15, no. 5: 566. https://doi.org/10.3390/bs15050566

APA Style

Lee, S.-S., & Park, C. S. (2025). Gender Differences in Cyberstalking: The Roles of Risk, Control, and Opportunity Factors in Social Media. Behavioral Sciences, 15(5), 566. https://doi.org/10.3390/bs15050566

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop