Cathy Marcum

There are 49 included publications by Cathy Marcum :

TitleDateViewsBrief Description
Addicted To Pillaging In Cyberspace: Investigating The Role Of Internet Addiction In Digital 2014 673 The present exploratory study sought to address a gap in the current literature on problematic Internet use by investigating the relationship between Internet addiction and digital piracy. The main research question guiding this study was whether IA ...
American Corrections System Response To COVID-19: An Examination Of The Procedures And Policies Used In Spring 2020 2020 446 This article will explore the federal and state correction system responses to COVID-19 as of early May 2020. Current statistics of infection rates and policy responses will be discussed. In addition, adjustments to inmate activities and staff will b...
Are We Protecting Our Youth Online? An Examination Of The Lack Of Policies And Programs Keeping Youth Safe And Analysis Of Policy Vacuum 2007 850 Gibson’s (1984) cyberspace did not become a popular facet in American homes until the 1990s, so in the grand scheme of technology, the Internet is still considered to be in its adolescence. However, despite its young age, approximately 87% of America...
Assessing Sex Experiences of Online Victimization: An Examination of Adolescent Online Behaviors Using Routine Activity Theory 2010 4736 The purpose of this study was to investigate the differences in online victimization between genders, through variables representing the three constructs of routine activity theory. A survey was administered to 100-level courses at a mid-sized univ...
Battle of the sexes: An examination of male and female cyberbullying 2012 3247 Cyber bullying is defined as intentional, aggressive behavior toward another person that is performed through electronic means (i.e., computers, cell phones, PDAs) (Hinduja & Patchin 2007, 2008; Reekman & Cannard, 2009). In other words, it is behav...
Becoming Someone New: Identity Theft Behaviors By High School Students 2015 692 The purpose of the paper is to contribute to the gap in the literature by investigating the identity theft behaviors of adolescents under the age of 18 and the predictors of these behaviors. To better understand the predictors of hacking behaviors in...
Book Review -- Sexual Predators: How To Recognize Them On The Internet And On The Street - How To Keep Your Kids Away (Stephen Dean) 2007 57 A review of Stephen Dean's book, "Sexual Predators: How to Recognize Them on the Internet and On the Street - How to Keep Your Kids Away" (Silver Lake Publishing, Los Angeles, 252 pages, ISBN:1563437945), by Catherine D. Marcum.
Book Review -- Unsafe In The Ivory Tower: The Sexual Victimization Of College Women (B. Fisher, L. Daigle, and F. Cullen) 2011 32 A book review of "Unsafe in the Ivory Tower: The Sexual Victimization of College Women" (B. Fisher, L. Daigle, and F. Cullen) by Catherine D. Marcum.
A Case Study Of The Implementation Of Staff Training Aimed At Reducing Rearrest (STARR) 2016 72 THE IMPLEMENTATION of evidence-based practices (EBP) into community corrections has become one of the most important initiatives in the field. Although the early focus was on effective programs for offenders, more recent emphasis has been on the skil...
The Challenges Of Identifying Dangers Online And Predictors Of Victimization 2021 502 This short paper will provide an overview of the impressive pieces included in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. This issue includes articles on the following pertinent topic, utilizing a range of a...
Comparison Of Financial Lucrativeness And Safety In The World Of Online And Offline Prostitution: An Exploratory Study Of Perceptions And Experiences Of Law Enforcement 2019 42 To date, there is a gap in the literature exploring the perceptions and experiences of law enforcement regarding enforcement of online and offline prostitution. As there are multiple fallacies regarding the benefits of online prostitution versus offl...
Confirmatory Factor Analysis Of The Medical Outcomes Study -- Social Support Survey: Examining The Factor Structure Among Victimized Women On Probation And Parole 2015 279 Women in the justice system are a highly marginalized population that are disproportionately affected by violent victimization and psychological distress. Social support is a key mechanism in understanding these experiences. However, rigorous psychom...
A Consideration For Increasing Post-Release Financial Success 2020 824 There is an ever-growing body of research indicating the importance and effectiveness of correctional programming. The main goal of release is autonomy, which includes financial independence. This can be achieved not only through employment, but also...
Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses 2008 2809 Digital piracy has been shown to be an emerging societal problem. However, research has demonstrated limited techniques that effectively combat digital piracy. The purpose of the present study is to examine the utility of computer viruses in deterri...
Developmental Trajectories Of Nonsocial Reinforcement And Delinquency In Adolescence: An Exploratory Study Of An Understudied Part Of Social Learning Theory 2011 2826 Within social learning theory, nonsocial reinforcement has been hypothesized to have a link with offending. The purpose of the present study was to address two questions: (1) Does nonsocial reinforcement change or remain stable over time? And (2) doe...
Digital Piracy: An Examination of Three Measurements of Self-Control 2008 6472 Research has shown a link between digital piracy and self-control. However, the research focuses on only one version of self-control theory. The purpose of the present study is to examine the link between self-control and digital piracy. Using data f...
The Effect Of Internet Related Problems On The Sexting Behaviors Of Juveniles 2014 188 The purpose of the present study is to contribute to the gap in the literature by investigating the sexting behaviors of adolescents under the age of 18 and how these behaviors are related to internet related problems. Using data collected from high ...
The Effects of Experienced, Vicarious, and Anticipated Strain on Violence and Drug Use among Inmates 2012 5684 The bulk of research on general strain theory has focused on determining the effect of experienced strain on the illegal or delinquent behaviors of juveniles or young adults. While much has been gained by this research, it is important to understa...
Ensnared into Crime: A Preliminary Test of Moffitt's Snares Hypothesis in a National Sample of African Americans 2010 2133 The purpose of the present study was to examine the relation between alcohol use and individual differences in the desistance process from criminal behavior during young adulthood. This study used Moffitt's (1993) “snares” hypothesis to posit that al...
Examining Adolescent Cocaine Use With Social Learning and Self-Control Theories 2015 6396 An estimated 1.6 million adolescents use cocaine on a regular basis. Social learning theory and self-control theory are regularly used to explain adolescent substance use, but few studies have examined Hirschi’s (2004) revised self-control theory. Th...
Examining The Effectiveness Of Academic Scholarship On The Fight Against Cyberbullying And Cyberstalking 2019 715 Online victimization via cyberbullying and cyberstalking are plaguing our young online users. These tormenting and intrusive behaviors have infiltrated relationship formation, online communication and social identity. Friends and romantic partners ha...
Examining the Link Between Being a Victim of Bullying and Delinquency Trajectories Among an African American Sample 2012 2303 The purpose of the present study is to provide an analysis of the link between being a victim of bullying and delinquency trajectories. Using a sample of African Americans (n ¼ 725), the results show that three distinct trajectory groups of delinqu...
Examining the Role of Peer Influence and Self-Control on Downloading Behavior 2012 2375 The purpose of the present study is two-fold. First, the present study is designed to provide additional information about the link between off-line and virtual peers and music piracy. Second, the present study provides information about how off-line...
Exploration of the Cyberbullying Victim/Offender Overlap by Sex 2014 1574 As usage of the Internet has grown to approximately 657 million users worldwide, criminality online has become more prevalent. Termed “cybercrime,” this form of criminal behavior can occur in several different. While cybercrime in general is fairly n...
Exploratory Investigation On Theoretical Predictors Of The Electronic Leash 2016 516 As technology has become an ever-present facet in the lives of young people, they have become reliant on it to form and maintain relationships. It has also helped facilitate negative relationship behaviors. The purpose of this study is to investigate...
Identifying potential factors of adolescent online victimization in high school seniors 2008 1427 The purpose of this study was to investigate previous Internet usage in a sample of college freshmen, and to reflect on their experiences with online victimization, through variables representing the three constructs of Routine Activities Theory. A...
Identity Theft Reports Of Adolescents 2016 504 The purpose of this paper was to explore the identity theft victimization experiences of high school students, as well as the predictors of it being reported to school counselors.
I'm Watching You: Cyberstalking Behaviors Of University Students In Romantic Relationships 2016 1040 As technology has become an ever-present facet in the lives of young people, they have become reliant on it to form and maintain relationships. It has also helped facilitate negative relationship behaviors, such as the monitoring of romantic partners...
The Impact of Race on the Pretrial Decision 2010 9074 This study examined the effect of race on the pretrial release decision for drug offenders. Although this decision point has not been examined as extensively as the final sentencing decision, it is a critical discretion point which impacts defendan...
Impulsivity and Offending from Childhood to Young Adulthood in the United States: A Developmental Trajectory Analysis 2013 848 The purpose of the present study was to provide an examination of the development of impulsivity through childhood and its link to offending in adolescence and young adulthood in the United States. Moffitt’s (1993, 2003) dual taxonomy provides a fram...
Incarceration or community placement: Examining the sentences of cybercriminals 2012 1679 The purpose of the present study is to fill a gap in our understanding ofcorrelates of whether a cybercrime conviction leads to prison or communitycorrections. Using data from the Internet Crime Complaint Center reports, theresults show two important...
Interpreting the Intentions of Internet Predators: An Examination of Online Predatory Behavior 2007 6115 Internet predators are finding new ways to prey on the vulnerabilities of youth in chat rooms and lure them into sexual activities. This study will examine three chat room transcripts between adult predators and adult volunteers of the group “Perv...
Juvenile Hallucinogen Use: What Do Multiple Theories Say About It? 2014 75 The purpose of the present study is to examine hallucinogen use using multiple criminological theories. The study uses self-control theory, social learning theory, and problem behavior theory to understand hallucinogen use. Using over 2,000 nationall...
Juveniles and Cyber Stalking in the United States: An Analysis of Theoretical Predictors of Patterns of Online Perpetration 2014 1115 The purpose of the present study is to contribute to the gap within the literature by investigating the cyber stalking behaviors of adolescents under the age of 18, and examine the predictors of these behaviors. In order to better understand the pre...
Learning to E-Cheat: A Criminological Test of Internet Facilitated Academic Cheating 2012 1900 An increasing problem of great concern for academic institutions is the perva- siveness of cheating among students. Further compounding this problem is advancements in technology that have created new ways for students to engage in cheating. Despite ...
Low Self-Control And Cybercrime: Exploring The Utility Of The General Theory Of Crime Beyond Digital Piracy 2014 453 While technological innovations over the last thirty years have markedly improved the ways in which people communicate and gather information, these advances have also led to computer crimes and related deviance becoming permanent fixtures in our soc...
Military Veteran Involvement With The Criminal Justice System: A Systematic Review 2022 537 Justice-involved veterans face heightened risk for mental health issues, substance abuse and correlated interaction with the criminal justice system, given the nature of their military service. The purpose of this study is to provide a systematic rev...
Music piracy and neutralization: A trajectory analysis from short-term longitudinal 2008 2651 Digital piracy is an emerging criminal behavior. Little empirical research has been produced that examines the role of neutralization and performance of this behavior. Using short-term longitudinal data from college students, the present study exam...
Past 6-Year Trends In Current Alcohol Use Among Cyberbullied Adolescents 2021 483 Most of the research on alcohol use and being cyberbullied has focused on the correlation between the two. Less is known about the recent epidemiology of adolescent current alcohol use. Objective: To describe the trends in current alcohol use among a...
Police Department Perceptions Of The Mobility And Safety Of Online Vs Offline Prostitutes: An Exploratory Study 2019 49 To date, there is a gap in the literature exploring the perceptions and experiences of law enforcement regarding enforcement of online and offline prostitution. The purpose of this paper is to investigate the perceptions of law enforcement in the USA...
Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cyber crime 2010 3551 The internet is not a single network, limited to one specific type of information or restrictive of the types of users who can access its information. Conversely, the internet is an intercontinental information highway that has enabled people of ...
Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routine Activity Theory 2010 6903 The purpose of this study was to investigate Internet usage in a sample of college undergraduates, as well as to consider their experiences with online victimization, through variables representing the three constructs of Routine Activity Theory. A s...
Predictors Of Physical And Dating Violence In Middle And High School Students In The United States 2018 89 Dating violence is a growing and prominent problem for today’s middle and high school students. Intimate partner violence, which can include physical, sexual, emotional, and psychological aggression, affects millions of individuals worldwide. This sp...
Purple drank prevalence and characteristics of misusers of codeine cough syrup mixtures 2013 6775 A mixture of codeine cough syrup with alcohol and/or a soft drink known as “purple drank” has gained media attention in recent years as a drug associated with professional athletes and southern rap music. The existing research on purple drank consump...
Routine Cell Phone Activity And Exposure To Sext Messages: Extending The Generality Of Routine Activity Theory And Exploring The Etiology Of A Risky Teenage Behavior 2016 135 Increased cell phone use among adolescents has created new opportunities for deviance and victimization in recent years. One teenage cell phone-based behavior that has received increased attention from a variety of sources including public health res...
Self-Control, Social Learning Theory, Social Bonds And Binge Drinking: Results From A National Sample 2019 965 Binge drinking is still an issue among adolescents. The current study applies the theories of low self-control, social learning theory, and social bond theory to adolescent binge drinking. The data for this study comes from the 2011 Monitoring the Fu...
Sex offenders and criminal recidivism: an exploratory trajectory analysis using a Virginia sample 2012 2686 Several polices have been implemented in an effort to prevent sex offenders from recidivating. Many of these policies apply equally to all sex offenders, assuming that sex offenders are a homogenous group. Research has approached the study of sex off...
Sexting Behaviors Among Adolescents In Rural North Carolina: A Theoretical Examination Of Low Self-Control And Deviant Peer Association 2014 47 The purpose of this study is to assess the prevalence of sexting among high school students as well as examine the theoretical foundation toward explaining this type of behavior. Specifically, we examined data from a sample of high school students in...
A Systematic Review Of Cyberstalking Victimization And Offending Behaviors 2021 883 A systematic review of literature investigating cyberstalking offending and victimization was conducted, considering multiple key words and phrases used to label the behavior: cyberstalking, cyber dating abuse, cybervictimization, Internet, interpers...