What Is The Age Coefficient Related To Fear Of Cyberstalking By Intimate Partner

Improved Essays
1. As noted in table 1 of Hensen et al., the dependent variables are:
• fear of cyberstalking by intimate partners
• fear of cyberstalking by friends/acquaintances
• fear of cyberstalking by strangers

2. The age coefficient in regarding fear of cyberstalking by an intimate partner as noted on table 2 is –0.11. Furthermore, the value associated with age in the section of intimate partner is noted with a single * so we know that p is less than or equal to 0.05. The value associated with the age coefficient (-0.11) is less than the level of significance (0.05). As a result, the null hypothesis can be rejected concluding that the age coefficient is significantly statistically related for the fear of cyberstalking by intimate partner.
…show more content…
(The age coefficient related to to fear of cyberstalking by a friend/acquaintance in table 2 is given the value –0.10 Much like the previous question, the value associated with age in regards to the category friend/acquaintance is set with an *. Because of this, it is given that p is less than or equal to 0.05. When relating the two values we see that the value reflected by the age coefficient (-0.10) is less than the level of significance (0.05) or p. As a result of this the null hypothesis should be rejected. As a result it is known that the age coefficient is statistically related for the fear of cyberstalking by a friend or acquaintance. Because the age coefficient for fear of cyberstalking by a friend/ acquaintance is - 0.10 a one-unit change in age would show a decrease of

Related Documents

  • Improved Essays

    Aily Shimizu’s view on stalking specifically revolved around cyberstalking in her work of Recent Developments Domestic Violence in the Digital Age: Towards the Creation of a Comprehensive Cyberstalking Statute. She describes how much more dangerous for stalking has gotten to because of the digital technologies everyone has now. “Indeed, the Internet has provided a new vehicle by which individuals can commit the traditional act of stalking” (117). Due to the emphasis Shimizu set on the word ‘tradition’, it meant that it is more dangerous now than before because of the extreme reliance of technologies and being able to use it as an advantage of easy access, predators have found ways to prey on those who frequent social media sites.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Analysis Section: In order to determine if prevention programs particularly the BUILD program, are successful in helping reduce youths at risk I conducted a research study. This study consisted of a one group post-test only design and quantitative data, the sample size consisted of 26 youth participant’s, 13 were male and 13 were female, all were African American, all were participants of the BUILD program, all attended Leland elementary, and there ages varied from 5-15 years old. To successfully answer the research questions and research hypothesis of this proposal, data collection instruments called the Likert scale and dichotomous scales were used and adopted. After constructing and combining all the various instruments (Likert scale, dichotomous scale, and constructed measures), I created a strong survey questionnaire.…

    • 1382 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Dallas Buyers Club Theory

    • 571 Words
    • 3 Pages

    Bernstein, D. D., Penner, L. A., Clarke-Stewart, A. & Roy, E.J. (2006). Psychology (7th ed.) USA: Houghton Mifflin Company. Carver, C. S., Lawrence, J. W. & Scheier, M. F. (1999). Self-Discrepancies and Affect: Incorporating the Role of Feared Selves.…

    • 571 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Computer technology progressed rapidly since the 1900’s. Computers are no longer scarcely around, many people have them and use them on a daily basis. They have also become an important source of evidence in criminal activities. Computers are very helpful for homicide investigators, because they can discover whether methods on how to murder were researched on the internet, if anything suspicious can be found in emails, or if threats were made towards the victim prior to the murder. Since children can easily get on the computer to use the internet, it gives sexual predators an opportunity to seek out child victims online.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Our lives are surrounded by fear, we are all afraid of fear itself. The thought of death, rejection, the outcome, and the situation; we all fear something for a reason. There’s a reason we fear things, whether it's the past experience or even the vibe people get. In the book “The Psychopath Test” by Ronson, it addresses the amount of fear humans have and the reason why humans do the things they do.…

    • 237 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Dahler, Don. “12-year-old's suicide spotlights cyber-bullying threat.” CBS Evening News. CBS Interactive Inc. 2013. Web.…

    • 894 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Over the past decade people all around world have began to include technology more and more in their daily lives. A major part of these innovations is the Internet. It is one of the most powerful technological innovations in history. It allows us to communicate across continents, display photos and videos to millions of people at a time, and gather information from anywhere in the world. Of course it can be recognized using common sense that there are also consequences that come with such a powerful resource.…

    • 575 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    In the USA sample, 38.7% of participants were male and 61.3 were female. Independent samples T-tests found that age did not significantly differ amongst males (M = 27.23, SD = 8.0) and females (M = 28.81, SD = 8.03), t(390) = -2.0, p >.05, d = -.20. Additionally, 201 of the participants identified as Indian and 191 identified as American. Independent samples T-tests found age did not significantly differ amongst the USA sample (M = 27.84, SD =8.76) and the Indian sample (M = 28.05,…

    • 1316 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    While some sites concentrate on laws that defend victims age 18 and under, Working to Halt Online Abuse is a help resource comprising of a list of up-to-date and unresolved cyberstalking-related in the United States federal and state laws. In addition, it lists those states that do not have laws yet and associated laws from other countries. The Global Cyber Law Database (GCLD) wishes to become the most inclusive and influential foundation of cyber laws for all countries.…

    • 1184 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    A fact that I already know about the topic is that almost every teenager today will experience or has experienced cyberbullying at some point in their lives. In a way cyberbullying relates to human rights. Anyone who participates in the act of cyberbullying they have the human right to say anything they please on the internet to anyone. I am interested in this topic because I am a victim of cyberbullying. The acts of cyberbullying that I have experienced range from me ignoring it and letting it go to breaking down crying to being physically hurt.…

    • 1835 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Narcissism Epidemic

    • 667 Words
    • 3 Pages

    Samaneh Nasizadeh Prof. Gallego Psychology 2301 6 October, 15 Finding the Accurate Method of Study In recent years, there is a critical controversy among psychology experts, whether there is a narcissism epidemic among young Americans. Some psychologists such as, “Jean Twenge and her colleagues argue that American born since the 1980s are different in being unusually self-confident, self-assertive, and self-centered”(King, 7). On the other hand, the opponents of this idea like Kali H. Trzesniewski and Brent Donnellan strongly refuse this conclusion and they believe that it does not exist narcissism epidemic among young Americans.…

    • 667 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The results of the study support one of the hypothesis while the research did not support the second hypothesis, leaving speculation regarding the research question, do victims of repeated cyber bullying episodes have less depressive symptoms when using emotion-focused coping strategies? This indicates further analysis of the research needs to be conducted in order to identify what coping methods are best adapted to depressive symptoms in relation to repeat cyber bullying. A comparison between levels of cyber bullying and level of depressive symptoms in university students demonstrated support for the hypothesis that university student that experience repeated cyber bullying will have higher instances of depression than those university…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Should Schools limit students online speech? Cyberbullying; a problem throughout this country. The increase in technology and social media (such as iPhones, Instagram, Twitter, etc.) has allowed people to send messages almost instantly throughout the internet. This also means that crude, inappropriate, and hurtful messages can be spread faster as well.…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The content of the news clips revolves around the ongoing issue of cyberbullying, and the serious effects it can have on America’s youth. The two different news clips are framed differently, one being episodic and the other thematic. A thematic frame on a news video makes the issue seem like a public problem, which would in turn mean people favoring government intervention. An episodic frame would pin the fault on the bully.…

    • 1242 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Introduction Statement of the Problem Cybercrime is a word used to portray criminal action involving computers or computer networks being used as an instrument, an objective, or a setting of unlawful acts and incorporate everything from electronic cracking to denial of service assaults. It is likewise used to describe conventional misdeeds where computers or networks are used to facilitate criminal activity. Cybercrime can involve computer viruses, cyberbullying, cyberstalking, identity theft, malware, and spam. The impacts of a solitary, effective cyberattack can have huge ramifications including economic costs, stolen intellectual property and loss of confidence and trust. Criminals have been exploiting cyberspace even before the introduction of the personal computer (PC).…

    • 811 Words
    • 4 Pages
    Improved Essays