Cyberstalking is a growing anti-social problem being transformed on a large scale and in various forms. Cyberstalking detection has become increasingly popular in recent years and has technically been investigated by many researchers. However, cyberstalking victimization, an essential part of cyberstalking, has empirically received less attention from the paper community.
The Internet has been an integral part of daily life in recent years. The Internet user stats for 2020 show that more than 5 billion Internet users are distributed worldwide  ; this indicates that the Internet is used by half of the world’s people. The exponential spread of the Internet and other information and communication technology affect every area of life. The Internet has numerous features that make it attractive and explain its rapid penetration, such as ease of use, immediacy, law restrictions, low cost, and widespread availability . On the other hand, there is a dark side to this increased Internet usage. The anonymous nature (the physical distance from others is irrelevant) of the Internet and using communication technologies gives perpetrators a vast opportunity to commit crimes, so the Internet has become a vital tool for facilitating the creation of the new phenomenon of “cybercrime” .
Cyberstalking is a cybercrime categorized as a crime and used as computer networks or devices to advance other ends . While there is no widely accepted concept of cyberstalking, there are several guidelines to follow . The most generally accepted definition is that the activities are carried out over the Internet or mobile devices . Some researchers have argued that there is no agreed definition of cyberstalking (virtual) because there is no agreed-upon meaning (physical) . The word “cyberstalking” is used interchangeably with “cyberharassment”, “online stalking”, or “online harassment” . The dissemination of threats and false claims, data destruction, computer surveillance, identity stealing, and sexual motives , the persistent pursuit of an attacker using electronic or Internet-capable computers , electronic sabotage such as transmitting viruses or spamming, buying products and services in the victims’ names, and sending false messages are all examples of cyberstalking . Cyberstalking is a real threat facing our societies today. We should confront this new phenomenon by examining new modalities and looking for solutions to the issue, and reducing its damage to its victims .
Over the last two decades, the development of the Internet and the exponential growth of the World Wide Web (WWW) have profoundly altered life in contemporary societies . Using cyberspace takes up a significant amount of time in many people’s daily lives . In conjunction with the rapid development of ICTs, the Internet has created a near-perfect arena for crimes to occur . The British Prime Minister, David Cameron, in a 2013 speech to the National Society for the Prevention of Cruelty to Children (NSPCC), said, “The internet is not only where we buy, sell, and socialize; it’s also where violations occur, and people can be harmed”.
As shown in Table 1 , the increase in the number of Internet users is significant compared to the growth in the population . Therefore, it was not surprising that there is a real rise in the number of cybercrimes in Jordan. Cybercrimes pose a critical problem for the police force and judicial police in Jordan because of the unique technical nature of this crime .
The objectives of this research are as follows: To estimate the prevalence of cyberstalking victimization among college students. To examine the relationships between L-RAT constructs and cyberstalking victimization. To identify the demographic factors that are linked to the history of cyberstalking victimization. To develop and validate a cyberstalking victimization model.
This paper focuses on students in Jordan. It is well-known that students frequently use the Internet, which exposes them to the risk of becoming a victim of cyberstalking victimization, making them attractive as a sample for this research. In terms of individuals, this research focuses on students registered at Luminus Technical University College (LTUC) to investigate cyberstalking victimization. Including other students from other colleges in the sample would increase the time required for data collection without adding to the quality of the findings. Concerning criminal activities, this study focuses on cybercrime victimization, and specifically, cyberstalking. A group-administered questionnaire was used to collect data and was then evaluated in the SEM system using the partial least squares (PLS) technique. Microsoft Visio and Excel 2010, SmartPLS 2.0, and IBM SPSS 20 were used as analysis tools to develop the conceptual research model. In addition, QSR’s NVivo 10 was used for the systematic literature review conducted in the current research. Lastly, Mendeley software was used as a management tool for references.
A conceptual model is a well-specified model showing the fundamental relationships of a given set of variables as hypothesized from the theory . Guba and Lincoln  adapted the view by Bamasoud , which found in his study that, if the following points are taken into consideration, i.e., the objective reality can be systematically and rationally investigated empirically and guided by the laws applied to social science; the independency of the researcher and the phenomenon being studied; the researcher remains detached; neutral objective; and propositions are generated by theories that are operationalized as hypotheses and have undergone experimental testing that is replicable, then the research is categorized as positivist.
In the current study, these guidelines were used to develop the questionnaire and select the appropriate assessment method. In the policies proposed by Hair et al. , four variables (proximity of motivated offenders, a suitable target, digital guardianship and cyberstalking victimization) were specified as reflective constructs (see Table 2 ).
|Proximity to Motivated Offenders||Unknown Friend||√||√||√||√||√||Reflective|
|Visiting Religious Websites||√||√||√||√||√||Reflective|
|Downloading Computer Programs||√||√||√||√||√||Reflective|
|Watching TV Programs||√||√||√||√||√||Reflective|
|Social Networking Sites||√||√||√||√||√||Reflective|
|Chatting/Instant Messenger (Text)||√||√||√||√||√||Reflective|
|Chatting/Instant Messenger (Voice)||√||√||√||√||√||Reflective|
|Chatting/Instant Messenger (Video)||√||√||√||√||√||Reflective|
|Showing Goods and Services||√||√||√||√||√||Reflective|
|Visiting Adult Websites||√||√||√||√||√||Reflective|
|Suitable Target/Target Attractiveness||Name||√||√||√||√||√||Reflective|
|Mobile Phone Number||√||√||√||√||√||Reflective|
|Bank Account Number||√||√||√||√||√||Reflective|
|Credit Card Serial||√||√||√||√||√||Reflective|
|Digital Guardianship||Antivirus Software||√||√||√||√||√||Reflective|
|Tracking Protection Blocks Software||√||√||√||√||√||Reflective|
|Changeyour Login Password||√||√||√||√||√||Reflective|
|Create a Backup Process||√||√||√||√||√||Reflective|
|Delete Old Files||√||√||√||√||√||Reflective|
|Delete Old Emails/Attachments||√||√||√||√||√||Reflective|
|Change any File Locations||√||√||√||√||√||Reflective|
|Pretending to be you||√||√||√||√||√||Reflective|
|Disable your Computer||√||√||√||√||√||Reflective|
|Monitoring your Profiles||√||√||√||√||√||Reflective|
|Sent Threatening/Offensive Letter||√||√||√||√||√||Reflective|
|Written Menace/Offensive Comments||√||√||√||√||√||Reflective|
The degree to which a construct’s calculation is reliable is known as reliability . Internal continuity, in some terms, evaluates the interrelatedness of items. The scale’s items should have a high degree of internal accuracy. Cronbach’s coefficient alpha  is the most used to calculate the internal accuracy reliability coefficient, and it is concerned with the degree of interrelatedness within a group of objects constructed to measure a single construct. The higher Cronbach’s alpha is, the more reliable the intrinsic stability is. It is considered acceptable if the value is 0.70, but it is appropriate if it is 0.60 or more .
The final questionnaire was shown to an additional seven experts. One from UTM was a proofreader (Arabic and English). The others were the dean of the student’s college, the deputy dean, and teachers whose purposes were to increase the clarity of the instruction and wording and check the final appearance of the instrument before distributing it. Some researchers suggested that this stage was a pretest of the questionnaire, and their corrections suggested that expert suggestions were affected as well as the content validity.
The tenets of routine activities and lifestyle exposure theories have been combined to create what is known as L-RAT . This combination is implicit in lifestyle routine activity theories, lifestyle exposure theory, and routine activities theory used interchangeably in research such as Reyns . The two separate approaches were developed in tandem and shared scientific ideas . Although the L-RAT perspective has been applied to various physical crimes, its application to cybercrime is limited. The theoretical integration is essential in helping to explain the new crime phenomenon . The L-RAT perspective has been one of the most tried and supported analytical models . Cyberstalking as a new phenomenon of cybercrime has not been extensively empirically examined . Only a few observational trials have been conducted, and most cyberstalking studies lack a scientific basis . Recently, researchers have used this perspective to conduct studies about cyberstalking victimization . This study proposes a conceptual model for this new phenomenon to cover the dire need for empirical assessment of cyberstalking victimization based on the L-RAT perspective. The conceptual model describes the theoretical framework and helps the reader visualize the theorized relationships . The conceptual model of this study consists of four variables: proximity to motivated offenders, suitable target (target attractiveness, digital guardianship and cyberstalking victimization, moderators, and demographic/control variables).
In prior studies, researchers used the term “proximity” or “exposure” interchangeably. The proximity to motivated offender variable for this study was operationalized using 23 items: hacking, political websites, e-banking, showing goods and services, job-seeking websites, e-government, health-care services, chatting/instant messenger (video), chatting/instant messenger (voice), chatting/instant messenger (text), social networking sites, sending/receiving emails, reading newspapers/magazines, playing games, watching TV programs, downloading computer programs, watching/downloading movies, listening to/downloading music, visiting religious websites, shopping, visiting adult websites, sport, adding unknown friend (see Figure 1 ). To assess the suitable target variable, 12 items were operationalized, including the victims’ personal information that was exhibited on the Internet: name, gender, age, mobile phone number, email address, home address, bank account number, study program, credit card serial, favorite activities, photos, videos (see Figure 2 ). The guardianship variable was operationalized using 12 items, including the security software installation that the victims frequently activated: antivirus software, antispyware software, firewall software, Ad-Aware software, tracking protection blocks software, filtering/monitoring software (see Figure 3 ). The information security management techniques that the victims frequently used on their computers were also included: change the login password, save extra copies from files/folders, create a backup process, delete old files, delete old emails/attachments, change any file locations.
Seven control variables were assessed for this study: age (less than 18, 18, 19, 20, 21, 22, others), course program (engineering, computer sciences/it, applied arts, finance and management, medical sciences, education, languages, hotel and tourism, audio and visual techniques, information management and libraries, others), academic semester (first, second, third, fourth, fifth, sixth semester), nationality (Jordanian, foreigner), residence (village, desert, rural, refugees, town, city, other), gender (male, female) and income (less than 500, 500–749, 750–999, 1000–1499, more than 1500 Jordan Dinars, others). The only dependent variable in the current study was operationalized using eight items by asking the victims about the online victimization behavior that they frequently faced, including being harassed or annoyed, having false information posted, being sent sexual material, someone pretending to be them, attempts to disable their computer, having their online profile monitored, being sent threatening/offensive letters or messages to their e-mail, having threatening/offensive comments made to them in chat rooms/on instant messaging sites (see Figure 4 ). A proposition is a “tentative and conjectural association between constructs”, and “hypotheses” refer to the analytical formulation of these propositions as relationships between variables . With a few exceptions, comprehensive reviews of the L-RAT perspective for cyberstalking victimization lack literature. Most experiments have not operationalized any theory’s ideas (proximity to a motivated criminal, appropriate goal (target attractiveness), and digital guardianship). To account for cyberstalking victimization, this analysis thoroughly examined all of the theory’s ideas, and all hypotheses were formulated as follows:
Proximity to motivated offender has a positive effect on cyberstalking victimization.
Suitable target has a positive effect on cyberstalking victimization.
Digital guardianship harms cyberstalking victimization.
Due to the disparities between people’s diets, lifestyle sensitivity theory, which indirectly included the L-RAT viewpoint, claimed differences in victimization rates across demographic classes. Age, sex, race, marital status, wealth, education, and profession all affected people’s lifestyles . Five moderators tested the impact of the interaction between the independent variables (proximity to driven attacker, appropriate goal (target attractiveness), and digital guardianship) and the dependent variable (cyberstalking victimization) to thoroughly assess the L-RAT and deliver/answer the study question about the demographic effects on cyberstalking victimization (cyberstalking victimization). The following are the fifteen theories that were proposed:
The relationship between proximity to motivated offenders and cyberstalking victimization is moderated by gender.
The relationship between suitable target and cyberstalking victimization is moderated by gender.
The relationship between digital guardianship and cyberstalking victimization is moderated by gender.
The relationship between proximity to motivated offenders and cyberstalking victimization is moderated by age.
The relationship between suitable target and cyberstalking victimization is moderated by age.
The relationship between digital guardianship and cyberstalking victimization is moderated by age.
The relationship between proximity to motivated offenders and cyberstalking victimization is moderated by Internet speed.
The relationship between suitable target and cyberstalking victimization is moderated by Internet speed.
The relationship between digital guardianship and cyberstalking victimization is moderated by Internet speed.
The relationship between proximity to motivated offenders and cyberstalking victimization is moderated by residence.
The relationship between suitable target and cyberstalking victimization is moderated by residence.
The relationship between digital guardianship and cyberstalking victimization is moderated by residence.
The relationship between proximity to motivated offenders and Cyberstalking victimization is moderated by nationality.
The relationship between suitable target and Cyberstalking victimization is moderated by nationality.
The relationship between digital guardianship and cyberstalking victimization is moderated by nationality.