Está en la página 1de 23

Referencias y bibliografía complementaria

Agustina, J. R. (2009). La arquitectura digital de Internet como factor criminógeno: Es-
trategias de prevención frente a la delincuencia virtual. International e-journal of
criminal sciences, 3, 4-31.
Agustina, J. R. (2010). ¿Menores infractores o víctimas de pornografía infantil? Res-
puestas legales e hipótesis criminológicas ante el Sexting. Revista Electrónica de
Ciencia Penal y Criminología, 12(11), 1-44.
Agustina, J. R. (2014). Cibercriminalidad y perspectiva victimológica: un enfoque general
explicativo de la cibervictimización. Cuadernos de política criminal, 114(III), 143-178.
Agustina, J. R., y Gómez-Durán, E. L. (2012). Sexting: Research criteria of a globalized
social phenomenon. Archives of sexual behavior, 41(6), 1325-1328.
Agustina, J. R., y Gómez-Durán, E. L. (2016). Factores de riesgo asociados al sexting
como umbral de diversas formas de victimización. Estudio de factores correlacio-
nados con el sexting en una muestra universitaria. Revista de Internet, Derecho y
Política, 22, 21-47.
Agustina, J. R., y Montiel, I. (2017). Sexting en adolescentes: nuevos retos médico-lega-
les. Revista española de medicina legal, 43(1), 43-44.
Agustina, J. R., y Vargas Ovalle, A. (2019). ¿Es necesaria una dogmática de los ciberde-
litos? A propósito de la utilización de agentes encubiertos en la lucha contra la ex-
plotación sexual de menores en el ciberespacio. En P. García Cavero y A. I. Chinguel
Rivera (coords.), Derecho penal y persona (pp. 609-644). Perú: Ideas.
Aiken, M. (2017). The Cyber Effect: An Expert in Cyberpsychology Explains how Tech-
nology is Shaping Our Children, Our Behavior, and Our Value and what We Can Do
about it. Nueva York: Spiegel & Grau.
Aiken, M., Moran, M., y Berry, M. J. (2011). Child abuse material and the Internet:
Cyberpsychology of online child related sex offending. 29.º encuentro de la INTER-
POL Specialist Group on Crimes against Children. Lyon.
Almendros, C., Gámez-Guadix, M., Carrobles, J. A., Rodríguez-Carballeira, Á., y
­Porrúa, C. (2009). Abuso psicológico en la pareja: aportaciones recientes, concepto
y medición.  Psicología Conductual, 17, 433-452.

1
Cibercriminología y victimización online

Alter, A. (2017). Irresistible: The rise of addictive technology and the business of kee­
ping us hooked. Nueva York: Penguin.
American Psychological Association (2007). Report of the APA task force on the sexua­
lization of girls. Washington D. C.: American Psychological Association. Disponible
en https://goo.gl/vCGJcF
Anderson, C. A., y Bushman, B. J. (2002). Human aggression. Annual Review of Psy-
chology, 53, 27-51.
Antoniadou, N., y Kokkinos, C. M. (2015). Cyber and school bullying: Same or diffe­
rent phenomena? Aggression and Violent Behavior, 25, 363-372.
Arnett, J. (1992). Reckless behavior in adolescence: A developmental perspective. De-
velopmental Review, 12, 339-373.
Babchishin, K. M., Hanson, R. K., y Hermann, C. A. (2011). The characteristics of online
sex offenders: A meta-analysis. Sexual Abuse: a Journal of Research and Treatment,
23(1), 92-123.
Babchishin, K., Hanson, R., y VanZuylen, H. (2015). Online child pornography offend-
ers are different: a meta-analysis of the characteristics of online and offline sex of-
fenders against children. Archives of sexual behavior, 44(1), 45-66.
Bachmann, M. (2010). The Risk Propensity and Rationality of Computer Hackers. In-
ternational Journal of Cyber Criminology, 4.
Bailey, R. (2011). Letting children be children: Report of an independent review of the
commercialisation and sexualisation of childhood. Gran Bretaña: The Stationery
Office.
Baker, W. E., y Faulkner, R. R. (2003). Diffusion of fraud: Intermediate economic crime
and investor dynamics. Criminology, 41(4), 1173-1206.
Balakrishnan, J., y Griffiths, M. D. (2018). An Exploratory Study of “Selfitis” and the
Development of the Selfitis Behavior Scale. International journal of mental health
and addiction, 16(3), 722-736.
Ballester, L., Orte, C., y Pozo Gordaliza, R. (2019). Nueva pornografía y cambios en
las relaciones interpersonales de adolescentes y jóvenes. En M. C. Orte, L. Ballester
y R. Pozo (coords.), Vulnerabilidad y resistencia: Experiencias investigadoras en
comercio sexual y prostitución (pp. 249-284). Palma: Universitat de les Illes Balears.
Bandura, A. (1978). Social learning theory of aggression. Journal of Communication,
28(3), 12-29.
Bandura, A. (2001). Social cognitive theory: An agentic perspective. Annual Review of
Psychology, 52(1), 1-26.
Barrense-Dias, Y., Berchtold, A., Suris, J. C., y Akre, C. (2017). Sexting and the Defini-
tion Issue. Journal of Adolescent Health, 61(5), 544-554.
Barter, C., Stanley, N., Wood, M., Lanau, A., Aghtaie, N., Larkins, C., y Øverlien, C.
(2017). Young people’s online and face-to-face experiences of interpersonal violence

2
Referencias y bibliografía complementaria

and abuse and their subjective impact across five European countries. Psychology of
Violence, 7(3), 375-384.
Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental
health effects of revenge porn on female survivors. Feminist Criminology, 12(1),
22-42.
Baumgartner, S. E., Sumter, S. R., Peter, J., y Valkenburg, P. M. (2012). Identifying Teens
at Risk: Developmental Pathways of Online and Offline Sexual Risk Behavior. Pe-
diatrics, 130(6), e1489-1496.
Beech, A. R., Elliott, I. A., Birgden, A., y Findlater, D. (2008). The internet and child sex-
ual offending: A criminal review. Aggression and Violent Behavior, 13(3), 216-228.
Beier, K. M., Grundmann, D., Kuhle, L. F., Scherner, G., Konrad, A., y Amelung, T.
(2015). The German Dunkelfeld Project: A Pilot Study to Prevent Child Sexual
Abuse and the Use of Child Abusive Images. The Journal of Sexual Medicine, 12(2),
529-542.
Berson, I. R. (2003). Grooming cybervictims: The psychosocial effects of online ex-
ploitation for youth. Journal of School Violence, 2, 5-18.
Black, P. J., Wollis, M., Woodworth, M., y Hancock, J. T. (2015). A linguistic analysis of
grooming strategies of online child sex offenders: Implications for our understand-
ing of predatory sexual behavior in an increasingly computer-mediated world. Child
Abuse and Neglect, 44, 140-149.
Blaya, C., y Audrin, C. (2019). Toward an Understanding of the Characteristics of Se­
condary School Cyberhate Perpetrators. Frontier in Education, 4.
Blythe, J. M., y Johnson, S. D. (2019). A systematic review of crime facilitated by the
consumer Internet of Things. Security Journal, 1-29.
Bolimos, I. A., y Choo, K. R. (2017). Online fraud offending within an Australian juris-
diction. Journal of Financial Crime, 24(2), 277-308.
Borghello, C., y Temeprini, M. G. I. (2016). Suplantación de identidad digital como deli-
to informático. En D. Dupuy (dir.), y M. Kiefer (coord.), Cibercrimen (pp. 517-546).
Buenos Aires: Editorial B de f.
Borrajo, E., y Gámez-Guadix, M. (2016). Abuso online en el noviazgo: relación con
depresión, ansiedad y ajuste diádico. Psicología Conductual, 24, 221-235. 
Borrajo, E., Gámez-Guadix, M., y Calvete, E. (2015). Cyber dating abuse: prevalence,
context, and relationship with offline dating aggression. Psychological Reports, 16,
565-585.
Borrajo, E., Gámez-Guadix, M., Pereda, N., y Calvete, E. (2015). The development and
validation of the cyber dating abuse questionnaire among young couples. Compu­
ters in Human Behavior, 48, 358-365.
Bossler, A. M., y Holt, T. J. (2010). The effect of self-control on victimization in the
cyberworld. Journal of Criminal Justice, 38, 227-236.

3
Cibercriminología y victimización online

Branch, K., Hilinski-Rosick, C. M., Johnson, E., y Solano, G. (2017). Revenge porn
victimization of college students in the United States: An exploratory analysis. In-
ternational Journal of Cyber Criminology, 11, 128-142.
Brand, M., Young, K. S., y Laier, C. (2014). Prefrontal control and Internet addiction:
a theoretical model and review of neuropsychological and neuroimaging findings.
Frontiers in human neuroscience, 8, 375.
Brantingham P., y Brantingham P. (1995). Criminality of place: Crime generators and
crime attractors. European Journal on Criminal Policy and Research, 3(3), 5-26.
Brewer, G., y Kerslake, J. (2015). Cyberbullying, self-esteem, empathy and loneliness.
Computers in Human Behavior, 48, 255-260.
Bronfenbrenner, U. (1979). The ecology of human development. EE. UU.: Harvard Uni-
versity Press.
Button, M., Lewis, C., y Tapley, J. (2014). Not a victimless crime: The impact of fraud
on individual victims and their families. Security Journal, 27(1), 36-54.
Calvete, E., Gámez-Guadix, M., y Borrajo, E. (2018). Cyber Abuse in Romantic Rela-
tionships: Measurement and Characteristics from an International Perspective. En
G. Giumetti y R. M. Kowalski (ed.), Cyberbullying in Schools, Workplaces, and
Romantic Relationships: The Many Lenses and Perspectives of Electronic Measure-
ment. Londres: Taylor & Francis Routledge.
Calvete, E., Orue, I., Estévez, A., Villardón, L., y Padilla, P. (2010). Cyberbullying in
adolescents: Modalities and aggressors’ profile. Computers in Human Behavior,
26(5), 1128-1135.
Caneppele, S., y Aebi, M. F. (2017). Crime drop or police recording flop? On the rela-
tionship between the decrease of offline crime and the increase of online and hybrid
crimes. Policing: A Journal of Policy and Practice, 13(1), 66-79.
Cano Paños, M. A. (2008). Internet y terrorismo islamista. Aspectos criminológicos y
legales. Eguzkilore, 22, 67-68.
Casas, J. A., Del Rey, R., y Ortega-Ruiz, R. (2013). Bullying and cyberbullying: Con-
vergent and divergent predictor variables. Computers in Human Behavior, 29(3),
580-587.
Child Exploitation and Online Protection Centre (CEOPC) (2012). A picture of abuse.
A thematic assessment of the risk of contact child sexual abuse posed by those who
possess indecent images of children. Londres: CEOPC.
Child Exploitation and Online Protection Centre (CEOPC) (2013). Threat Assessment
of child sexual exploitation and abuse. Londres: CEOPC. Disponible en http://ceop.
police.uk/Documents/ceopdocs/CEOP_TACSEA2013_240613%20FINAL.pdf
Cleemput, K. V., Vandebosch, H., y Pabian, S. (2014). Personal characteristics and con-
textual factors that determine “helping,” “joining in,” and “doing nothing” when
witnessing cyberbullying. Aggressive Behavior, 40(5), 383-396.

4
Referencias y bibliografía complementaria

Clough, J. (2015). Principles of cybercrime. Cambridge: Cambridge University Press.


Choo, K. K. R. (2009). Online child grooming: A literature review on the misuse of so-
cial networking sites for grooming children for sexual offences. Research and public
policy, 103. Canberra: Australian Institute of Criminology.
Cohen, L. E., y Felson, M. (1979). Social change and crime rate trends: A routine activ-
ity approach. American sociological review, 44(4), 588-608.
Conteh, N. Y., y Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities and counter-
measures to prevent social engineering attacks. International Journal of Advanced
Computer Research, 6(23), 31.
Cooper, K., Quayle, E., Jonsson, L., y Svedin, C. (2016). Adolescents and self-taken
sexual images: A review of the literature. Computers in Human Behavior, 55, 706-
716.
Cornish, D. B., y Clarke, R. V. (2003). Opportunities, precipitators and criminal deci-
sions: A reply to Wortley’s critique of situational crime prevention. En M. J. Smith y
D. Cornish (eds.), Theory for Practice in Situational Crime Prevention (pp. 41-96).
Monsey: Criminal Justice Press,
Cornish, D. B., y Clarke, R. V. (2014). The reasoning criminal: Rational choice perspec-
tives on offending. Nueva Jersey: Transaction Publishers.
Cross, C., Richards, K., y Smith, R. (2016). Improving the Response to Online Fraud
Victims: An Examination of Reporting and Support. Disponible en http://crg.aic.gov.
au/reports/1617/29-1314-FinalReport.pdf
Davidson, J., y Martellozzo, E. (2008). Protecting children in cyberspace. En G. Le-
therby, P. Birch, M. Cain y K. Williams (eds.), Sex as crime? Abingdom: Wilan
Publishers.
De Graaf, H., y Vanwesenbeeck, I. (2006). Sex is a game. Wanted and unwanted sexual
experiences of youth on the Internet (Project No. SGI014). Utrecht: Rutgers Nisso
Groep.
DeKeseredy, W. S., y Schwartz, M. D. (2016). Thinking sociologically about im-
age-based sexual abuse: The contribution of male peer support theory. Sexualiza-
tion, Media, & Society, 2(4), 1-8.
De Miranda Vázquez, C. (2012). Introducción. En. C. de Miranda Vázquez, y E. Rillo
Peralta (ed.), Probática penal: La prueba de los delitos contra la administración de
justicia. Madrid: La Ley.
De Santisteban, P., y Gámez-Guadix, M. (2017). Estrategias de persuasión en groom-
ing online de menores: Un análisis cualitativo con agresores en prisión. Psychoso-
cial Intervention, 26, 139-146. 
De Santisteban, P., y Gámez-Guadix, M. (2018). Prevalence and risk factors among
­minors for online sexual solicitations and interactions with adults. The Journal of
Sex Research, 55(7), 939-950.

5
Cibercriminología y victimización online

Del Rey, R., Casas, J. A., y Ortega-Ruiz, R. (2012). The ConRed Program, an evi-
dence-based practice. Comunicar: Revista Científica de Comunicación y Edu-
cación, 20(39), 129-138.
Del Rey, R., Mora-Merchán, J. A., Casas, J. A., Ortega-Ruiz, R., y Elipe, P. (2018). Pro-
grama “Asegúrate”: Efectos en ciberagresión y sus factores de riesgo [en linea].
Comunicar: Revista Científica de Comunicación y Educación, XXVI(56), 39-48.
Disponible en https://recyt.fecyt.es/index.php/comunicar/article/view/66328
Dobash, R. E., y Dobash, R. (1979). Violence against wives: A case against the patriar­
chy (pp. 179-206). Nueva York: Free Press.
Dobash, R. E., y Dobash, R. P. (2003). Women, violence and social change. Abingdon:
Routledge.
Dodge, K. A., Laird, R., Lochman, J. E., y Zelli, A. (2002). Multidimensional latent-­
construct analysis of children’s social information processing patterns: Correla-
tions with aggressive behavior problems. Psychological Assessment, 14, 60-73.
Doran, K. (2014). Tamaño, medida y costes sociales de la industria. En R. James, J. R.
Stoner, y D. M. Hugues (eds.), Los costes sociales de la pornografía (pp. 221-240).
Madrid: Rialp.
Döring, N. (2014). Consensual sexting among adolescents: Risk prevention through
abstinence education or safer sexting? Cyberpsychology: Journal of Psychosocial
Research on Cyberspace, 8(1), article 1.
Döring, N., y Mohseni, M. R. (2018). Are Online Sexual Activities and Sexting Good for
Adults’ Sexual Well-Being? Results From a National Online Survey. International
Journal of Sexual Health, 30(3), 250-263.
Drouin, M., Ross, J., y Tobin, E. (2015). Sexting: a new, digital vehicle for intimate
partner aggression? Computers in Human Behavior, 50, 197-204.
ECPAT Internacional (2016a). Orientaciones terminológicas para la protección de ni-
ños, niñas y adolescentes contra la explotación y el abuso sexual. Luxemburgo. Dis-
ponible en http://www.ecpat.org/wp-content/uploads/2016/12/Terminology-guide-
lines_SPA.pdf
Eke, A. W., Seto, M. C., y Williams, J. (2011). Examining the criminal history and future
offending of Child pornography offenders: An extended prospective followup study.
Law and Human Behavior, 35, 466-478.
Elkind, D. (1967). Egocentrism in adolescence. Child Development, 38, 1025-1034.
Elliott, I. A., y Beech, A. R. (2009). Understanding online child pornography use:
­Applying sexual offense theory to internet offenders. Aggression and Violent Be-
havior, 14(3), 180-193.
Englander, E. (2015). Coerced sexting and revenge porn among teens. Bullying, Teen
Aggression & Social Media, 1, 19-21.
Etzioni, A. (1999). The Limits of Privacy. Nueva York: Basic Books.

6
Referencias y bibliografía complementaria

Europol (2018). The Internet Organised Crime Threat Assessment (IOCTA). Euro­pean
Cybercrime Center. Disponible en https://www.europol.europa.eu/activities-ser-
vices/main-reports/internet-organised-crime-threat-assessment-iocta-2018
Eynon, R., y Malmberg, L. E. (2011). A typology of young people’s Internet use: impli-
cations for education. Computers and Education, 56(3), 585-595.
Felson, M. (1995). Those who discourage crime. Crime and place, 4, 53-66.
Felson, M. (1997). Technology, Business and Crime. En M. Felson y R. V. Clarke (eds.),
Business and Crime Prevention (pp. 81-96). Nueva York: Willow Tree Press.
Festl, R., Reer, F., y Quandt, T. (2019). Online sexual engagement and psychosocial
well-being: The mediating role of sexual victimization experiences. Computers in
Human Behavior, 98, 102-110.
Finkelhor, D. (2007). Developmental victimology: The comprehensive study of child-
hood victimization. En R. C. Davis, A. J. Lurigio y S. Herman (eds.), Victims of
crime (3.ª ed.) (pp. 9-34). Thousand Oaks: Sage Publications.
Fiscalía General del Estado (2015-2019). Memorias [en línea]. Madrid: Fiscalía General
del Estado. Disponible en https://www.fiscal.es/fiscal/publico/ciudadano/documen-
tos/memorias_fiscalia_general_estado/
Foshee, V. A., Benefield, T., Suchindran, C., Ennett, S. T., Bauman, K. E., Karriker-Jaffe,
K. J. et al. (2009). The development of four types of adolescent dating abuse and se-
lected demographic correlates. Journal of Research on Adolescence, 19(3), 380-400.
Fox, J., y Warber, K. (2013). Social Networking sites in romantic relationships: Attach-
ment, uncertainty, and partner surveillance on Facebook. Cyberpsychology, Behav-
ior, and Social Networking, 17, 3-7.
Fritz, P. A. T., y O’Leary, K. D. (2004). Physical and psychological partner aggression
across a decade: A growth curve analysis. Violence and victims, 19(1), 3.
Galbreath, N. W., Berlin, F. S., y Sawyer, D. (2002). Paraphilias and the Internet. En
A. Cooper (ed.), Sex and the Internet: A guidebook for clinicians (pp. 187-205).
Filadelfia: Brunner-Routledge.
Gallagher, B., Fraser, C., Christmann, K., y Hodgson, B. (2006). International and In-
ternet child sexual abuse and exploitation: Project Report. Huddersfield: Centre
for Applied Childhood Studies, University of Huddersfield. Disponible en http://
eprints.hud.ac.uk/461/1/GallagherInt.pdf
Gámez-Guadix, M. (2017). Escuela de padres 3.0. Madrid: Ediciones Pirámide.
Gámez-Guadix, M., Almendros, C., Borrajo, E., y Calvete, E. (2015). Prevalence and
association of sexting and online sexual victimization among Spanish adults. Sexua­
lity Research and Social Policy, 12(2), 145-154.
Gámez-Guadix, M., Almendros, C., Calvete, E., y De Santisteban, P. (2018). Persuasion
strategies and sexual solicitations and interactions in online sexual grooming of ado-
lescents: Modeling direct and indirect pathways. Journal of Adolescence, 63, 11-18.

7
Cibercriminología y victimización online

Gámez-Guadix, M., y De Santisteban, P. (2018a). “Sex Pics?”: Longitudinal Predictors


of Sexting Among Adolescents. Journal of Adolescent Health, 63(5), 608-614.
Gámez-Guadix, M., y De Santisteban, P. (2018b). Nuevos retos de la sociedad digital: sexting y
online grooming entre adolescentes. Madrid: Consejo General de la Psicología de España.
Gámez-Guadix, M., De Santisteban, P., y Resett, S. A. (2017). Sexting among Spanish
adolescents: Prevalence and personality profiles. Revista, 29(1), 29-34.
Gámez-Guadix, M., Borrajo, E., y Calvete, E. (2018). Abuso, control y violencia en
la pareja a través de internet y los smartphones: características, evaluación y pre-
vención. Papeles del Psicólogo, 39, 218-237.
Gámez-Guadix, M., y Gini, G. (2016). Individual and class justification of cyberbul-
lying and cyberbullying perpetration: A longitudinal analysis among adolescents.
Journal of Applied Developmental Psychology, 44, 81-89.
Gámez-Guadix, M., Gini, G., y Calvete, E. (2015). Stability of cyberbullying victimiza-
tion among adolescents: Prevalence and association with bully-victim status and
psychosocial adjustment. Computers in Human Behavior, 53, 140-148.
Gámez-Guadix, M., y Mateos-Pérez, E. (2019). Longitudinal and reciprocal relation-
ships between sexting, online sexual solicitations, and cyberbullying among minors.
Computers in Human Behavior, 94, 70-76.
Gámez-Guadix, M., Orue, I., Smith, P. K., y Calvete, E. (2013). Longitudinal and re-
ciprocal relations of cyberbullying with depression, substance use, and problematic
internet use among adolescents. Journal of Adolescent Health, 53(4), 446-452.
Garaigordobil, M. (2011). Prevalencia y consecuencias del cyberbullying: Una revisión.
International Journal of Psychology and Psychological Therapy, 11(2), 233-254.
Garaigordobil, M., y Martínez-Valderrey, V. (2015). Effects of Cyberprogram 2.0 on
“face-to-face” bullying, cyberbullying, and empathy. Psicothema, 27, 45-51.
García Guilabert, N. (2017). El ciberacoso. Análisis de la victimización en menores en el
ciberespacio desde la teoría de las actividades cotidianas. Madrid: Editorial B de f.
Garland, D. (2001). The culture of control: Crime and social order in contemporary
society. Chicago: Chicago University Press.
Gassó, A. M., Klettke, B., Agustina, J. R., y Montiel, I. (2019). Sexting, mental health,
and victimization among adolescents: a literature review. International journal of
environmental research and public health, 16(13), 1-16.
Gassó, A. M., Fernández-Cruz, V., Montiel, I., Martin-Fumadó, C., y Agustina, J. R.
(2018). Retos forenses ante la cibercriminalidad social en menores. Revista Españo-
la de Medicina Legal, 45(2), 73-76.
Gillespie, A. A. (2016). Cybercrime: key issues and debates (1.ª ed). Abingdon: Routledge.
Golladay, K., y Holtfreter, K. (2017). The Consequences of Identity Theft Victimization:
An Examination of Emotional and Physical Health Outcomes. Victims y Offen­
ders, 12(5), 741-760.

8
Referencias y bibliografía complementaria

Goller, A., Jones, R., Dittmann, V., Taylor, P., y Graf, M. (2016). Criminal recidivism
of illegal pornography offenders in the overall population - a national cohort study of
4612 offenders in Switzerland. Sci Res, 6(2), 48-56.
Gómez Cruz, E. (2012). De la cultura Kodak a la imagen en red: una etnografía so-
bre fotografía digital (vol. 23). Cataluña: Editorial UOC. Colección Comunicación.
Gómez-Hermoso, M. R., Muñoz, J. M., Vázquez-Mezquita, B., Gómez, R., y Mateos, N.
(2012). Guía de buenas prácticas para la evaluación psicológica forense del riesgo
de violencia contra la mujer en las relaciones de pareja (VCMP). Madrid: Colegio
Oficial de Psicólogos de Madrid.
González Tascón, M.ª M. (2011). El nuevo delito de acceso a niños con fines sexuales a
través de las TIC. Estudios Penales y Criminológicos, 31, 207-258.
Gordo-López, A. J. (1999). La Ciberpsicología: in/disciplina cibercultural. Revista
­AVEPSO, Asociación Venezolana de Psicología Social, XXII(2), 29-50.
Goodboy, A. K., y Martin, M. M. (2015). The personality profile of a cyberbully: Exa­
mining the Dark Triad. Computers in Human Behavior, 49, 1-4.
Goodman, M. (2015). Los delitos del futuro. Barcelona: Ariel.
Gottfredson, M. R., y Hirschi, T. (1990). A general theory of crime. California: Stanford
University Press.
Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal
Studies, 10(2), 243-249.
Grabosky, P. (2004). The global dimension of cybercrime. Global Crime, 6(1), 146-157.
Grande-López, V. (2019). La hipersexualización femenina en los medios de comunica-
ción como escaparate de belleza y éxito. Communication papers. Media Literacy
and gender studies, 8(16), 21-32.
Greenfield, D. (2011). The addictive properties of Internet usage. En K. S. Young y C. N.
de Arbeu (eds.), Internet addiction: a handbook and guide to evaluation and treat-
ment (pp. 135-53). Hoboken: John Wiley.
Hamby, S. L. (2006). The who, what, when, where, and how of partner violence preven-
tion research. Journal of Aggression, Maltreatment & Trauma, 13, 179-201.
Hamby, S. L., y Grych, J. (2013). The web of violence: Exploring connections among
different forms of interpersonal violence and abuse. Nueva York: Springer.
Hamilton-Giachritsis, C., Hanson, E., Whittle, H. C., y Beech, A. R. (2017). Everyone
deserves to be happy and safe: A mixed methods study exploring how online and
offline child sexual abuse impact young people and how professionals respond to it.
Londres: National Society for the Prevention of Cruelty to Children.
Hampson, N. C. (2012). Hacktivism: A new breed of protest in a networked world. BC
Int’l & Comp. L. Rev., 35, 511.
Han, B. (2014). Psicopolítica: neoliberalismo y nuevas técnicas de poder. Barcelona:
Herder Editorial.

9
Cibercriminología y victimización online

Harned, M. S. (2001). Abused women or abused men? An examination of the context
and outcomes of dating violence. Violence and Victims, 16, 269-285.
Hawdon, J., Oksanen, A., y Räsänen, P. (2015). Online extremism and online hate: Ex-
posure among adolescents and young adults in four nations. Nordicom Information:
Medie-och kommunikationsforskning i Norden, 37(3-4), 29-37.
Henry, N., Flynn, A., y Powell, A. (2019). Responding to ‘revenge pornography’: Pre­
valence, nature and impacts. Report to the Criminology Research Advisory Council.
Henry, N., y Powell, A. (2015). Beyond the ‘sext’: Technology-facilitated sexual vio-
lence and harassment against adult women. Australian & New Zealand Journal of
Criminology, 48(1), 104-118.
Henry, N., y Powell, A. (2016). Sexual violence in the digital age: The scope and limits
of criminal law. Social & Legal Studies, 25, 397-418.
Henry, N., y Powell, A. (2018). Technology-facilitated sexual violence: A literature re-
view of empirical research. Trauma, violence y abuse, 19(2), 195-208.
Herrera Moreno, M. (2014). Construcción cultural y prevención criminal publicista:
Una revisión de casos conflictivos. Revista Electrónica de Ciencia Penal y Crimi­
nología, 16(10), 1-48.
Herrera Moreno, M. (2006). Victimización: aspectos generales. En E. Baca, E. Eche-
burúa y J. M. Tamarit (coords.), Manual de Victimología (pp. 79-128). Valencia:
Tirant lo Blanch.
Herrera Moreno, M. (1996). La hora de la víctima. Compendio de Victimología. Publica-
ciones del Instituto de Criminología de la Universidad Complutense. Madrid: Edersa.
Herrero, O., Negredo, L., Lila, M., García, A., Pedrón, V., y Terreros, E. (2015). Fuera
de la Red: Programa de Intervención frente a la delincuencia sexual con menores en
la Red. Madrid: Ministerio del Interior. Secretaría General Técnica.
Hindelang, M. J., Gottfredson, M. R., y Garofalo, J. (1978). Victims of personal crime: An
empirical foundation for a theory of personal victimization. Cambridge: Ballin­ger.
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on-and off-line
experiences on deviant subcultures. Deviant Behavior, 28(2), 171-198.
Holt, T. J., Bossler, A. M., y Seigfried-Spellar, K. C. (2015). Cybercrime and digital fo-
rensics: An introduction. Abingdon: Routledge.
Holt, T. J., Smirnova, O., y Chua, Y. T. (2016). Data thieves in action: Examining the
international market for stolen personal information. Reino Unido: Palgrave Mac-
Millan.
INCIBE (2017). Glosario de términos de ciberseguridad. Una guía de aproximación
para el empresario. Madrid: Instituto Nacional de Ciberseguridad, Ministerio de
Energía, Turismo y Agenda digital.
Interpol (2003). Guía de Interpol para uso de los encargados de las investigaciones sobre
delitos sexuales contra menores. Lyon: Secretaría General de Interpol.

10
Referencias y bibliografía complementaria

Jaishankar, K. (2007). Establishing a theory of cyber crimes. International Journal of


Cyber Criminology, 1(2), 7-9.
Jaishankar, K. (ed.) (2011). Cyber criminology: exploring internet crimes and criminal
behavior. CRC Press.
Jasso, J. L., López, F., y Gámez-Guadix, M. (2018). Assessing the links of sexting, cy-
bervictimization, depression, and suicidal ideation among university students. Ar-
chives of Suicide Research, 22, 153-164.
Jessor, R. (1987). Problem-behavior theory, psychosocial development, and adolescent
problem drinking. British Journal of Addiction, 82(4), 331-342.
Jiménez, E., Garmendia, M., y Casado, M. A. (2018). Entre selfies y whatsapps.
Oportunidades y riesgos para la infancia y la adolescencia conectadas. España:
Gedisa.
Jiménez-Ribera, A. y Garrido, V. (2017). El perfil del pedófilo online. En V. Garrido
(coord.), Tratado de criminología forense: la criminología y el informe criminológi-
co forense (vol. 1). Valencia: Tirant lo Blanch.
Jones, A. (2005). Cyber terrorism: fact or fiction. Computer Fraud & Security, 6, 4-7.
Jones, L. M., Mitchell, K. J., y Finkelhor, D. (2012). Trends in Youth Internet Victim-
ization: Findings From Three Youth Internet Safety Surveys 2000–2010. Journal of
Adolescent Health, 50(2), 179-186.
Jonsson, L. S., Fredlund, C., Priebe, G., Wadsby, M., y Svedin, C. G. (2019). Online se­
xual abuse of adolescents by a perpetrator met online: A cross-sectional study. Child
and Adolescent Psychiatry and Mental Health, 13(1), 1-10.
Junger, M., Montoya, L., Hartel, P., y Heydari, M. (2017). Towards the normalization
of cybercrime victimization: A routine activities analysis of cybercrime in Europe.
International Conference On Cyber Situational Awareness, Data Analytics And
­Assessment (Cyber SA), 1-8.
Juvonen, J., y Gross, E. F. (2008). Extending the school grounds? Bullying experiences
in cyberspace. Journal of School Health, 78(9), 496-505.
Katyal, N. K. (2002). Digital architecture as crime control. Yale Law Journal, 112, 2261.
Katz, C. (2013). Internet-related child sexual abuse: What children tell us in their testi-
monies. Children and Youth Services Review, 35, 1536-1542.
Klain, E. J., Davies, H. J., y Hicks, M. A. (2001). Child pornography: The criminal-­
justice-system response. Alexandria: American Bar Association Center on Children
and the Law for the National Center for Missing & Exploited Children.
Klettke, B., Hallford, D. J., y Mellor, D. J. (2014). Sexting prevalence and correlates: A
systematic literature review. Clinical psychology review, 34(1), 44-53.
Klettke, B., Hallford, D., Clancy, E., Mellor, D., y Toumbourou, J. (2019). Sexting and
Psychological Distress: The role of unwanted and coerced sexts. Cyberpsychology,
Behavior and social networking, 22(4), 237-242. DOI: 10.1089/cyber.2018.0291

11
Cibercriminología y victimización online

Knapp, T. J. (1976). A functional analysis of gambling behavior. En W. R. Eding-


ton (ed.), Gambling and society (pp. 276-294). Springfield: Charles C. Thomas.
Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., y Lattanner, M. R. (2014). ­Bullying
in the digital age: A critical review and meta-analysis of cyberbullying research
among youth. Psychological Bulletin, 140(4), 1073-1137.
Kowalski, R. M., y Limber, S. P. (2007). Electronic Bullying Among Middle School Stu-
dents. Journal of Adolescent Health, 41(6), 22-30.
Krebs, B. (2011). Are megabreaches out? E-thefts downsized in 2010. Krebs on Securi-
ty. Disponible en https://krebsonsecurity.com/heartland--payment-systems/
Krone, T. (2005). Queensland police stings in online chat rooms. Trends & Issues in
Crime and Criminal Justice, 301(1), 1-6.
Kurzweil, R. (2005). The singularity is near: When humans transcend biology. Nueva
York: Penguin.
Lanning, K. V. (2005). Compliant Child Victims: Confronting an Uncomfortable Re-
ality. En E. Quayle y M. Taylor (eds.), Viewing Child Pornography on the Internet
(pp. 49-60). Reino Unido: Russell House Publishing.
Leisring, P. A., y Giumetti, G. W. (2014). Sticks and stones may break my bones, but
abusive text messages also hurt: Development and validation of Cyber Psychologi-
cal Abuse Scale. Partner Abuse, 5, 323-341.
Lenhart, A. (2009). Teens and sexting: How and why minor teens are sending sexually sug-
gestive nude or nearly nude images via text messaging. Washington: Millenials: a por-
trait of generation next, Pew Internet & American Life Project, PEW Research Center.
Lin, X., Zhou, H., Dong, G., y Du, X. (2015). Impaired risk evaluation in people with
Internet gaming disorder: fMRI evidence from a probability discounting task. Prog-
ress in Neuro-Psychopharmacology and Biological Psychiatry, 56, 142-148.
Livingstone, S., Haddon, L., Görzig, A., y Ólafsson, K. (2011). EU Kids Online II: Fi-
nal Report. Londres: EU Kids Online. Disponible en http://eprints.lse.ac.uk/39351/
Livingstone, S., y Görzig, A. (2012). Sexting: the exchange of sexual messages online
among European youth. En S. Livingstone, L. Haddon y A. Görzig (eds.), Children,
risk and safety on the internet (pp. 151-164). Bristol: The Policy Press.
Livingstone, S., y Smith, P. K. (2014). Annual Research Review: Harms experienced by
child users of online and mobile technologies: the nature, prevalence and manage-
ment of sexual and aggressive risks in the digital age. Journal of Child Psychology
and Psychiatry, 20.
Loh, K. K., y Kanai, R. (2014). How has the Internet Reshaped human cognition. Neu-
roscientist, 22(5), 506-520.
Long, M. L., Alison, L. J., y McManus, M. A. (2013). Child pornography and likelihood
of contact abuse: A comparison between contact child sexual offenders and noncon-
tact offenders. Sexual Abuse: A Journal of Research and Treatment, 25, 370-395.

12
Referencias y bibliografía complementaria

Machimbarrena, J. M., Calvete, E., Fernández-González, L., Álvarez-Bardón, A., Ál-


varez-Fernández, L., y González-Cabrera, J. (2018). Internet Risks: An Overview
of Victimization in Cyberbullying, Cyber Dating Abuse, Sexting, Online Grooming
and Problematic Internet Use. International Journal of Environmental Research and
Public Health, 15(11), 1-15.
Maimon, D., Alper, M., Sobesto, B., y Cukier, M. (2014). Restrictive deterrent effects
of a warning banner in an attacked computer system. Criminology, 52(1), 33-59.
Manganello, J. A. (2008). Teens, dating violence, and media use: A review of the literature
and conceptual model for future research. Trauma, Violence, & Abuse, 9(1), 3-18.
Marshall, T. (2012). Facebook surveillance of former romantic partners: associations
with post-breakup recovery and personal growth. Cyberpsychology, Behavior, and
Social Networking, 10, 521-526.
Martellozzo, E., Nehring, D., y Taylor, H. (2010). Online child sexual abuse by fe-
male offenders: An exploratory study. International Journal of Cyber Criminology
(IJCC), 4(1/2), 592-609.
Mata Mayrand, L. (2017). Aspectos jurídicos del acoso y ciberacoso escolar. Revista de
Estudios de Juventud, 115, 13-29.
McDevitt, J., Levin, J., y Bennett, S. (2002). Hate crime offenders: An expanded typo­
logy. Journal of Social Issues, 58(2), 303-317.
McGlynn, C., y Rackley, E. (2017). Image-based sexual abuse. Oxford Journal of Legal
Studies, 37(3), 534-561.
McManus, M. A., Long, M. L., Alison, L., y Almond, L. (2015). Factors associated
with contact child sexual abuse in a sample of indecent image offenders. Journal of
­Sexual Aggression, 21, 368-384.
Méndiz, A. (2018). La representación del menor en la publicidad infantil. De la inocen-
cia a la sexualización. Methaodos.revista de ciencias sociales, 6(1), 125-137.
Middleton, D., Beech, A., y Mandeville-Norden, R. (2005). What Sort of a Person Could
Do That? Psychological Profiles of Internet Pornography Users. En E. Quayle y
M. Taylor (eds.), Viewing Child Pornography on the Internet: Understanding the
Offence, Managing the Offender, Helping the Victim. Lyme Regis: Russell House
Publishing.
Middleton, D., Mandeville-Norden, R., y Hayes, E. (2009). Does treatment work with
internet sex offenders? Emerging findings from the Internet Sex Offender Treatment
Programme (i-SOTP). Journal of Sexual Aggression, 15, 5-19.
Miller, D. (2018). Digital anthropology. Cambridge Encyclopedia of Anthropology. Dis-
ponible en https://www.anthroencyclopedia.com/entry/digital-anthropology
Ministerio del Interior (2016-2018). Informes de cibercriminalidad. Madrid: Go-
bierno de España, Ministerio del Interior, Gabinete de Coordinación y Es-
tudios, Secretaría de Estado de Seguridad. Disponible en https://www.

13
Cibercriminología y victimización online

interior.gob.es/documents/10180/8859844/Informe+2017+sobre+Cibercriminali-
dad+en+Espa%C3%B1a.pdf/a9f61ddb-3fcf-4722-b9d8-802a424a1a70.
Miró, F. (2011). La oportunidad criminal en el ciberespacio. Aplicación y desarrollo de
la teoría de las actividades cotidianas para la prevención del cibercrimen. Revista
electrónica de Ciencia Penal y Criminología, 13(7), 1-55.
Miró, F. (2012). El cibercrimen. Fenomenología y criminología de la delincuencia en el
ciberespacio. Madrid: Marcial Pons.
Miró, F. (2013a). La victimización por cibercriminalidad social. Un estudio a partir de
la teoría de las actividades cotidianas en el ciberespacio. Revista Española de Inves-
tigación Criminológica: REIC, 11, artículo 5.
Miró, F. (2013b). Derecho penal, cyberbullying y otras formas de acoso (no sexual) en
el ciberespacio. IDP. Revista de internet, Derecho y Política, 16, 61-75.
Miró, F. (2013c). La respuesta penal al ciberfraude. Especial atención a la responsab-
ilidad de los muleros del phishing. Revista Electrónica de Ciencia Penal y Crimi-
nología, 15-12, 1-56.
Miró, F. (2016). Taxonomía de la comunicación violenta y el discurso del odio en Inter-
net. IDP. Revista de Internet, Derecho y Política, 22, 82-107.
Miró, F. (2017). Derecho Penal y 140 caracteres. Hacia una exégesis restrictiva de los
delitos de expresión. En F. Miró (dir.), Cometer delitos en 140 caracteres: el dere-
cho penal ante el odio y la radicalización en Internet (pp. 21-65). Marcial Pons.
Miró, F., y García, N. (2014). CiberApp: Aprender, Prevenir, Proteger. Estudio sobre el
alcance de la cibercriminalidad contra menores de la provincia de Alicante. Elche:
Centro Crímina.
Mitchell, K., Finkelhor, D., y Wolak, J. (2007). Youth internet users at risk for the most
serious online sexual solicitations. American Journal of Preventive Medicine, 32,
532-537.
Mitchell, K., Finkelhor, D., Wolak, J., Ybarra, M., y Turner, H. (2011). Youth Internet
Victimization in a Broader Victimization Context. Journal of Adolescent Health, 48,
128-134.
Mitchell, K., Ybarra, M., y Finkelhor, D. (2007). The relative importance of online
­victimization in understanding depression, delinquency, and substance use. Child
Maltreatment, 12(4), 314-324.
Modecki, K. L., Minchin, J., Harbaugh, A. G., Guerra, N. G., y Runions, K. C. (2014).
Bullying prevalence across contexts: A meta-analysis measuring cyber and tradi-
tional bullying. Journal of Adolescent Health, 55(5), 602-611.
Montiel, I. (2016). Cibercriminalidad social juvenil: la cifra negra. Revista de Internet,
Derecho y Política, 22, 119-131.
Montiel, I. (2018). Ciberacoso sexual en adolescentes: creencias erróneas. Revista
Iberoamenricana de Psicología, 11(3), 19-30.

14
Referencias y bibliografía complementaria

Montiel, I., y Agustina, J. R. (2018a). Cibervíctimas con discapacidad: cuestiones victi-
mológicas y retos forenses. Revista española de medicina legal, 45(1), 1-3.
Montiel, I., y Agustina, J. R. (2018b). Victimización sexual online de menores. En D.
Dupuy (coord.), Cibercrimen II. Nuevas conductas penales y contravencionales. In-
teligencia artificial aplicada al Derecho penal y procesal penal. Novedosos medios
probatorios para recolectar evidencia digital. Cooperación internacional y victi-
mología (pp. 405-439). Buenos Aires: Editorial B de f.
Montiel, I., y Agustina, J. R. (2019). Retos educativos ante los riesgos emergentes en
el ciberespacio: claves para una adecuada prevención de la cibervictimización en
menores. Revista Española de Pedagogía, 77(273), 277-294.
Montiel, I., y Carbonell, E. (2016). Vulnerabilidad y riesgo en los adolescentes: Perfil del
jugador de azar online. En E. Echeburúa (coord.), Abuso de Internet. ¿Antesala para
la adicción al juego de azar on-line? (pp. 169-189). España: Ediciones Pirámide.
Montiel, I., Carbonell, E., y Pereda, N. (2016). Multiple online victimization of Spanish
adolescents: Results from a community sample. Child Abuse & Neglect, 52, 124-127.
Montiel, I., Carbonell, E., y Salom, M. (2014). Victimización infantil sexual online: on-
line grooming, ciber-abuso y ciber-acoso sexual. En M. Lameiras y E. Orts (coords.),
Delitos sexuales contra menores. Abordaje psicológico, jurídico y policial (pp. 203-
224). Valencia: Tirant Lo Blanch.
Montiel, I., y Pereda, N. (2017). Victimización sexual de menores: aproximación teórica
y estado actual de la investigación. En J. M. Tamarit (coord.), La victimización sexu-
al de menores y la respuesta del sistema de justicia penal (pp. 1-30). Buenos Aires/
Montevideo/Madrid: Editorial Edisofer B de f.
Mowry, N. L., y Giumetti, G. W. (2019). Cyberbullying in the Workplace. En G. Giu-
metti y R. M. Kowalski (eds.), Cyberbullying in Schools, Workplaces, and Romantic
Relationships: The Many Lenses and Perspectives of Electronic Measurement. Nue-
va York: Taylor & Francis Routledge.
Muñoz, J. M. (2013). La evaluación psicológica forense del daño psíquico: propuesta
de un protocolo de actuación pericial. Anuario de Psicología Jurídica, 23, 61-69.
Mustaine, E. E., y Tewksbury, R. (1999). A routine activity theory explanation for wo­
men’s stalking victimizations. Violence Against Women, 5(1), 43-62.
Ngo, F., Jaishankar, K., y Agustina, J. R. (2017). Sexting: Current Research Gaps and
Legislative Issues. International Journal of Cyber Criminology, 11(2), 161-168.
Niveau, G. (2010). Cyber-pedocriminality: Characteristics of a sample of internet child
pornography offenders. Child Abuse and Neglect, 34, 570-575.
O’Connell, R. (2003). A typology of cyber sexploitation and online grooming practices.
Preston: University of Central Lancashire.
Ogburn, W. F. (1964). On culture and social change: selected papers. Chicago: Univer-
sity of Chicago Press.

15
Cibercriminología y victimización online

Olenik-Shemesh, D., Heiman, T., y Eden, S. (2017). Bystanders’ behavior in cyberbully-


ing episodes: Active and passive patterns in the context of personal-socio-emotional
factors. Journal of Interpersonal Violence, 32(1), 23-48.
Oliva, A., Antolín-Suárez, L., Ramos, P., Jiménez, L., Jiménez-Iglesias, A., Moreno,
M. C., y Hidalgo, M. V. (2014). Adicciones con y sin sustancia: paralelismo. En
M. T. Laespada y A. Estévez (eds.), ¿Existen las adicciones sin sustancia? (pp. 87-
99). Bilbao: Universidad de Deusto.
Organización Mundial de la Salud (OMS) (2003). Informe mundial sobre la violencia y
la salud. Ginebra: Organización Mundial de la Salud.
Orozco, D. (2017). Dos de cada tres chicas siente presión por parecer ´perfectas´
en redes sociales. Tecnoxplora. Disponible en https://www.lasexta.com/tecnolo-
gia-dos-cada-tres-chicas-siente-presion-parecer-%E2%80%98perfectas%563f.
html
Ortega-Ruiz, R., Del Rey, R., y Casas, J. A. (2013). Redes sociales y cyberbullying: El
proyecto ConRed. Convives, 3, 34-44.
Ospina, M., Harstall, C., y Dennet, L. (2010). Sexual Exploitation of Children and Youth
Over the Internet: A Rapid Review of the Scientific Literature. Alberta: Ins­titute of
Health Economics.
Pabian, S., Vandebosch, H., Poels, K., Van Cleemput, K., y Bastiaensens, S. (2016).
Exposure to cyberbullying as a bystander: An investigation of desensitization effects
among early adolescents. Computers in Human Behavior, 62, 480-487.
Parlamento Europeo (2012). Proyecto de informe sobre la sexualización de las niñas
(2012/2047(INI)). Comisión de Derechos de la Mujer e Igualdad de Género.
Pascual, A., Giménez-Salinas, A., e Igual, C. (2017). Propuesta de una Clasificación
española sobre imágenes de pornografía infantil. Revista Española de Investigación
Criminológica REIC, 15, 1-27.
Patchin, J. W., y Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary
look at cyberbullying. Youth Violence and Juvenile Justice, 4(2), 148-169.
Patchin, J. W., y Hinduja, S. (2012). Cyberbullying Prevention and Response: Expert
Perspectives. Nueva York: Routledge.
Peluchette, J. V., Karl, K., Wood, C., y Williams, J. (2015). Cyberbullying victimization:
Do victims’ personality and risky social network behaviors contribute to the pro­
blem? Computers in Human Behavior, 52, 424-435.
Pereda, N., Abad, J., y Guilera, G. (2012). Victimología del desarrollo. Incidencia y
repercusiones de la victimización y la polivictimización en jóvenes catalanes. Bar-
celona: Centro de Estudios Jurídicos y Formación Especializada.
Pereda, N., Abad, J., y Guilera, G. (2014). Victimización en jóvenes de protección a la
infancia y la adolescencia y de justicia juvenil. Barcelona: Centro de Estudios Jurí-
dicos y Formación Especializada.

16
Referencias y bibliografía complementaria

Pereda, N., Guilera, G., y Abad, J. (2014). Victimization and polyvictimization of Span-
ish children and youth: Results from a community sample. Child Abuse & Neglect,
38, 640-649.
Pérez, M., Herrero, O., Negredo, L., Pascual, A., Giménez-Salinas, A., y De Juan, M.
(2017). Informe sobre consumidores de pornografía infantil. Revista de Estudios
Penitenciarios, 260, 105-150.
Pittaro, M. L. (2007). Cyber stalking: An analysis of online harassment and intimida-
tion. International Journal of Cyber Criminology, 1(2), 180-197.
Powell, A., Henry, N., Flynn, A., y Scott, A. (2019). Image-based sexual abuse: The
extent, nature, and predictors of perpetration in a community sample of Australian
residents. Computers in Human Behavior, 92, 393-402.
Pratt, T. C., Holtfreter, K., y Reisig, M. D. (2010). Routine Online Activity and Internet
Fraud Targeting: Extending the Generality of Routine Activity Theory. Journal of
Research in Crime and Delinquency, 47(3), 267-296.
Prieto, J. M. (1999). Una nueva disciplina: Ciberpsicología. INFOCOP, Suplemento In-
formativo de Papeles del Psicológo, 74, 23-24.
Quayle, S., Allegro, L., Hutton, L., Sheath, M., y Lööf, L. (2014). Rapid skill acquisition
and online sexual grooming of children. Computers in Human Behavior, 39, 368-375.
Quayle, E., y Jones, T. (2011). Sexualized Images of Children on the Internet. Sexual
Abuse: a Journal of Research and Treatment, 23(1), 7-21.
Quayle, E., Lööf, L., Soo, K., y Ainsaar, M. (2011). Methodological issues. En M. Ain-
saar y L. Lööf (eds.), Online behaviour related to child sexual abuse: Literature
report (pp. 9-16). Council of the Baltic Sea States, Stockholm: ROBERT project.
Quayle, E., y Taylor, M. (2003). Model of problematic Internet use in people with sexual
interest in children. CyberPsychology & Behavior, 6(1), 93-106.
Quayle, E., y Taylor, M. (2005). Viewing child pornography on the internet. Under-
standing the offence, managing the offender, helping the victims. Lyme Regis: Rus-
sell House Publishing.
Reno, J. (1999). Cyberstalking: A new challenge for law enforcement and industry. Es-
tados Unidos: Department of Justice.
Resett, S., y Gámez-Guadix, M. (2017). Traditional bullying and cyberbullying: Dif-
ferences in emotional problems, and personality. Are cyberbullies more Machiavel-
lians? Journal of Adolescence, 61, 113-116.
Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victim-
ization: Preventive tactics for Internet users and online place managers. Crime Pre-
vention and Community Safety, 12, 99-118.
Reyns, B. W., Henson, B., y Fisher, B. S. (2011a). Being pursued online: applying cy-
berlifestyle-routine activities theory to cyberstalking victimization. Criminal Justice
and Behavior, 38, 1149-1169.

17
Cibercriminología y victimización online

Reyns, B. W., Burek, M. W., Henson, B., y Fisher, B. S. (2011b). The unintended conse-
quences of digital technology: exploring the relationship between sexting and cyber-
victimization. Journal of Crime and Justice, 36(1), 1-17.
Rodríguez González del Real, C. (2017). La jurisdicción de menores ante los casos de
bullying y ciberbullying. Revista de Estudios de Juventud, 115, 31-54.
Salt, M. (2016). Obtención de pruebas informáticas en extraña jurisdicción: los “conflic-
tos” del principio de territorialidad en un mundo virtual sin fronteras. En D. Dupuy
(dir.) y M. Kiefer (coord.), Cibercrimen (pp. 517-546). Buenos Aires: Editorial B de f.
Salom, J. (2007). Pornografía infantil en Internet. Cuadernos de la Guardia Civil: Re-
vista de seguridad pública, 36, 17-24.
Sargent, K. S., Krauss, A., Jouriles, E. N., y McDonald, R. (2016). Cyber victimization,
psychological intimate partner violence, and problematic mental health outcomes
among first-year college students. Cyberpsychology, Behavior, and Social Network-
ing, 19(9), 545-550.
Saris, P. B., et al. (2012). Federal child pornography offenses. Estados Unidos: Senten­
cing Commission.
Saunders, B. E. (2003). Understanding Children Exposed to Violence: Toward an Inte-
gration of Overlapping Fields. J Interpers Violence, 18(4), 356-376.
Save the Children (2019). Violencia viral, análisis de la violencia contra la infancia y la
adolescencia en el entorno digital. España: Save the Children.
Schermer, B. W., Georgieva, I., Van der Hof, S., y Koops, B.-J. (2016). Legal Aspects of
Sweetie 2.0. Leiden/Tilburg: TILT.
Seto, M. C. (2013). Internet Sex Offenders. Washington: American Psychological Association.
Seto, M. C., y Eke, A. W. (2015). Predicting Recidivism among Adult Male Child Por-
nography Offenders: Development of the Child Pornography Offender Risk Tool
(CPORT). Law and Human Behavior, 39, 416-429.
Seto, M. C., Reeves, L., y Jung, S. (2010). Explanations given by child pornography
offenders for their crimes. Journal of Sexual Aggression, 16(2), 169-180.
Shannon, D. (2008). Online Sexual Grooming in Sweden - Online and Offline Sex Of-
fences against Children as Described in Swedish Police Data. Journal of Scandina-
vian Studies in Criminology and Crime Prevention, 9(2), 160-180.
Sherman, L. E., Greenfield, P. M., Hernandez, L. M., y Dapretto, M. (2018). Peer influ-
ence via instagram: Effects on brain and behavior in adolescence and young adult-
hood. Child development, 89(1), 37-47.
Sherman, L. E., Payton, A. A., Hernandez, L. M., Greenfield, P. M., y Dapretto, M.
(2016). The power of the like in adolescence: Effects of peer influence on neural
and behavioral responses to social media. Psychological science, 27(7), 1027-1035.
Sibila, P. (2008). La intimidad como espectáculo. Buenos Aires: Fondo de Cultura
Económica.

18
Referencias y bibliografía complementaria

Schermer, B. W., Georgieva, I., Van der Hof, S., y Koops, B.-J. (2016). Legal Aspects
of Sweetie 2.0. Leiden University, Faculty of Law & Tilburg University, Faculty of
Law. Disponible en https://pure.uvt.nl/ws/portalfiles/portal/13318907/Sweetie20_
report_final_20161003.pdf
Schmitt, M. N. (ed.) (2013). Tallinn manual on the international law applicable to cyber
warfare. Cambridge: Cambridge University Press.
Slonje, R., y Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scan-
dinavian Journal of Psychology, 49(2), 147-154.
Smith, P. K. (2012). Cyberbullying and cyber aggression. En A. B. N. S. R. Jimerson,
M. J. Mayer y M. J. Furlong (eds.), Handbook of school violence and school safety:
International research and practice (2.ª ed.) (pp. 93 -103). Nueva York: Routledge.
Smith, P. K., Görzig, A., y Robinson, S. (2019). Cyberbullying in Schools. Cross-cultur-
al issues. En G. Giumetti y R. M. Kowalski (ed.), Cyberbullying in Schools, Work-
places, and Romantic Relationships: The Many Lenses and Perspectives of Elec-
tronic Measurement. Nueva York: Taylor & Francis Routledge.
Smith, P. K., y Livingstone, S. (2017). Child Users of Online and Mobile Technolo-
gies - Risks, Harms and Intervention. En D. Skuse, H. Bruce y L. Dowdney (eds.),
Child Psychology and Psychiatry: Frameworks for Clinical Training and Practice
(pp. 141-148). Hoboken: John Wiley & Sons, Inc.
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., y Tippett, N. (2008).
Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child
Psychology and Psychiatry, 49(4), 376-385.
Söderström, B. (2006). Experiences from and questions raised in clinical practice. En Swed-
ish Children’s Welfare Foundation y Working Group for Cooperation on Children at Risk
under the Council of the Baltic Sea States. Children and young persons with abusive and
violent experiences connected to cyberspace. Estocolmo: Expert Meeting at Sätra Bruk.
Sotoca-Plaza, A., Ramos-Romero, M., y Pascual-Franch, A. (2019). El perfil del consu-
midor de imágenes de abuso sexual infantil: semejanzas y diferencias con el agresor
offline y el delincuente dual. Anuario de Psicología Jurídica. Disponible en https://
doi.org/10.5093/apj2019a11
Stalans, L. J., y Donner, C. M. (2018). Explaining Why Cybercrime Occurs: Crimino-
logical and Psychological Theories. En H. Jahankhani (ed.), Cyber Criminology
(pp. 25-45). Cham: Springer.
Starcevic, V., Billieux, J., y Schimmenti, A. (2018). Selfitis, selfie addiction, twitteritis:
irresistible appeal of medical terminology for problematic behaviours in the digital
age. The Australian and New Zealand journal of psychiatry, 52(5), 408-409.
Steeves, V., y Webster, C. (2008). Closing the barn door: the effect of parental super-
vision on Canadian children’s online privacy. Bulletin of Science, Technology &
Society, 28(1), 4-19.

19
Cibercriminología y victimización online

Straus, M. A. (2011). Gender symmetry and mutuality in perpetration of clinical-level


partner violence: Empirical evidence and implications for prevention and treat-
ment. Aggression and Violent Behavior, 16(4), 279-288.
Suler, J. (2004). The Online Disinhibition Effect. Cyberpsychology & Behavior, 7(3),
321-326.
Suler, J. (2016). Psychology of the digtal age: Humans become electric. Nueva York:
Cambridge University Press.
Tamarit, J. M. (2018). ¿Son abuso sexual las interacciones sexuales en línea? Peculia-
ridades de la victimización sexual de menores a través de las TIC. IDP. Revista de
Internet, Derecho y Política, 26, 30-42.
Tate, T. (1990). Child Pornography: An Investigation. Londres: Methuen.
Taylor, M., Holland, G., y Quayle, E. (2001). Typology of paedophile picture collec-
tions. The Police Journal, 74, 97-107.
Taylor, M., y Quayle, E. (2003). Child Pornography: An Internet crime. Nueva York:
Brunner-Routledge.
Temple, J. R., Choi, H. J., Brem, M., Wolford-Clevenger, C., Stuart, G. L., Peskin, M. F.,
y Elmquist, J. (2016). The temporal association between traditional and cyber dating
abuse among adolescents. Journal of Youth and Adolescence, 45, 340-349.
Temple, J. R., Le, V. D., Van den Berg, P., Ling, Y., Paul, J. A., y Temple, B. W.
(2014). Brief report: Teen sexting and psychosocial health. Journal of Adolescence,
37(1), 33-36.
Temple, J. R., Paul, J. A., Van den Berg, P., Le, V. D., Mc Elhany, A., y Temple B. W.
(2012). Teen sexting and its association with sexual behaviors. Archives of Pedia-
trics and Adolescent Medicine, 166(9), 828-833.
Thompson, M. P., y Morrison, D. J. (2013). Prospective Predictors of Technology-Based
Sexual Coercion by College Males. Psychology of Violence, 3, 233-246.
Tokunaga, R. S. (2010). Following you home from school: A critical review and syn-
thesis of research on cyberbullying victimization. Computers in Human Behavior,
26(3), 277-287.
Turgeman-Goldschmidt, O. (2005). Hackers’ accounts: Hacking as a social entertain-
ment. Social Science Computer Review, 23(1), 8-23.
United States Sentencing Comission (2012). Report to congress: Federal Child Porno-
graphy Offenses. Federal Sentencing Reporter, 25(5), 334-344.
Van Geel, M., Vedder, P., y Tanilon, J. (2014). Relationship between peer victimization,
cyberbullying, and suicide in children and adolescents: a meta-analysis. JAMA Pe-
diatrics, 168(5), 435-442.
Van Ouytsel, J., Ponnet, K., y Walrave, M. (2016). Cyber Dating Abuse Victimization
Among Secondary School Students From a Lifestyle-Routine Activities Theory
Perspective. Journal of Interpersonal Violence, 33(17), 2767-2776.

20
Referencias y bibliografía complementaria

Velasco, J., Novo, M., y Seijo, D. (2014). Evaluación forense del acoso escolar. En S.
Souto, A. Souto-Gestal y F. Fariña (eds.), Salud y Bienestar. Granada: GEU Editorial.
Villacampa, C. (2015). El delito de online child grooming o propuesta sexual telemática
a menores. En C. Villacampa (coord.), Delitos contra la libertad e indemnidad se-
xual de los menores: adecuación del Derecho español a las demandas normativas
supranacionales de protección (pp. 139-188). Madrid: Thomson Reuters Aranzadi.
Villacampa, C. (2016). Sexting: prevalencia, características personales y conductuales
y efectos en una muestra de adolescentes en España. Revista General de Derecho
Penal, 25, 1-36.
Villacampa, C. (2017). Teen sexting: Prevalence, characteristics and legal treatment.
International Journal of Law, Crime and Justice, 49, 10-21.
Villacampa, C., y Gómez, M. J. (2016). Nuevas tecnologías y victimización sexual de meno-
res por online grooming. Revista electrónica de ciencia penal y criminología, 18(2), 1-27.
Villacampa, C., y Pujols, A. (2018). El delito de stalking en el Código Penal español. En
C. Villacampa Stiarte (coord.), Stalking: Análisis jurídico, fenomenológico y victi-
mológico (pp. 179-204). Madrid: Thomson Reuters Aranzadi.
Wall, D. S. (1998). Catching cybercriminals: policing the Internet. International Review
of Law, Computers & Technology, 12(2), 201-218.
Wall, D. S. (2001). Cybercrimes and the Internet. En D. S. Wall (ed.), Crime and the
Internet (pp. 1-17). Nueva York: Routledge.
Walrave, M., y Heirman, W. (2011). Cyberbullying: Predicting victimisation and perpe-
tration. Children & Society, 25(1), 59-72.
Ward, T., y Siegert, R. J. (2002). Toward a comprehensive theory of child sexual abuse:
A theory knitting perspective. Psychology, Crime & Law, 8(4), 319-351.
Webster, S., Davidson, J., Bifulco, A., Gottschalk, P., Caretti, V., Pham, T., y Graparo, G.
(2012). European online grooming project (final report). European Commission Saf-
er Internet Plus Programme. Disponible en http://image.guardian.co.uk/sys-files/
Society/documents/2003/07/17/Groomingreport.pdf
Wells, M., y Mitchell K. J. (2013). Patterns of Internet use and risk of online victimization
for youth with and without disabilities. Journal of Special Education, 48(3), 204-213.
Wells, M., y Mitchell, K. J. (2007). Youth sexual exploitation on the Internet: DSM-IV
diagnosis and gender differences in co-occurring mental health issues. Child and
Adolescent Social Work Journal, 24(3), 235-259.
Whittle, H., Hamilton-Giachritsis, C., Beech, A., y Collings, G. (2013). A review of
online grooming: Characteristics and concerns. Aggression and violent behavior,
18(1), 62-70.
Wikström P.-O. (2004). Crime as alternative: towards a cross-level situational action
theory of crime causation. En J. McCord (ed.), Beyond empiricism. Nuevo Bruns-
wick: Transaction Publishers.

21
Cibercriminología y victimización online

Wikström, P. O., y Treiber, K. H. (2010). La violencia como acción situacional. Revista
de Derecho Penal y Criminología, 3(4), pp. 333-374.
Willard, N. (2005). Cyberbullying and cyberthreats. Washington: US Departement of
Education.
Williams, R., Elliott, I., y Beech, A. R. (2013). Identifying Sexual Grooming Themes
Used by Internet Sex Offenders. Deviant Behavior, 34(2), 135-152.
Wolak, J., y Finkelhor, D. (2011). Sexting: a typology. Durham: University of New
Hampshire, Crimes against children Research Center.
Wolak, J., y Finkelhor, D. (2016). Sextortion: Findings from a survey of 1,631 victims.
Nuevo Hampshire: Crimes against Children Research Center.
Wolak, J., Finkelhor, D., y Mitchell, K. J. (2004). Internet-initiated Sex Crimes against
Minors: Implications for Prevention Based on Findings from a National Study. Jour-
nal of Adolescent Health, 35(5). DOI: 424.e11-424.e20.
Wolak, J., Finkelhor, D., y Mitchell, K. (2008). Is talking online to unknown people
always risky? Distinguishing online interaction styles in a national sample of youth
Internet users. Cyberpsychology & Behavior, 11(3), 340-343.
Wolak, J., Finkelhor, D., y Mitchell, K. J. (2009). Trends in arrests of “Online Pre
dators”. Durham: Crimes Against Children Research Center. Disponible en http://
www.unh.edu/ccrc/pdf/CV194.pdf
Wolak, J., Finkelhor, D., y Mitchell, K. J. (2012). How often are teens arrested for sex-
ting? Data from a national sample of police cases. Pediatrics, 129(1), 4-12.
Wolak, J., Finkelhor, D., Mitchell, K., e Ybarra, M. L. (2008). Online “predators” and
Their Victims. Myths, Realities, and Implications for Prevention an Treatment.
American Psychologist, 63(2), 111-128.
Wolak, J., Finkelhor, D., Walsh, W., y Treitman, L. (2018). Sextortion of Minors: Char-
acteristics and Dynamics. Journal of Adolescent Health, 62(1), 72-79.
Wolak, J., Mitchell, K., y Finkelhor, D. (2003). Escaping or connecting? Characteristics of
youth who form close online relationships. Journal of Adolescende, 26(1), 105-119.
Wolak, J., Mitchell, K., y Finkelhor, D. (2006). Online Victimization of Youth: Five
Years Later. Alexandria: National Center for Missing & Exploited Children. Dis-
ponible en http://www.unh.edu/ccrc/pdf/CV138.pdf
Wortley, R. K., y Smallbone, S. (2006). Child pornography on the internet. Washington,
D. C.: US Department of Justice, Office of Community Oriented Policing Services.
Wortley, R., y Smallbone, S. (2012). Internet Child Pornography: Causes, Investiga-
tion, and Prevention. California, Colorado, Inglaterra: Praeger.
Wright, M. F. (2015). Cyber aggression within adolescents’ romantic relationships:
Linkages to parental and partner attachment. Journal of Youth and Adolescence,
44(1), 37-47.

22
Referencias y bibliografía complementaria

Yahner, J., Dank, M., Zweig, J. M., y Lachman, P. (2015). The co-occurrence of phy­
sical and cyber dating violence and bullying among teens. Journal of Interpersonal
Violence, 30, 1079-1089.
Ybarra, M., Mitchell, K., y Korchmaros, J. (2011). National Trends in Exposure to
and Experiences of Violence on the Internet Among Children. Pediatrics, 128(6).
DOI: e1376-e1386.
Ybarra, M. L., Mitchell, K. J., Wolak, J., y Finkelhor, D. (2006). Examining characteris-
tics and associated distress related to Internet harassment: Findings from the Second
Youth Internet Safety Survey. Pediatrics, 118(4). DOI: e1169-e1177.
Yao, Y. W., et al. (2015). Decision-making for risky gains and losses among college stu-
dents with Internet gaming disorder. PloS one, 10(1). DOI: e0116471.
Yar, M. (2013). Cybercrime and Society (2.ª ed.). Londres: Sage.
Zickuhr, K. (2011). Generations Online in 2010. Pew Internet and American Life
Project. Disponible en https://www.pewinternet.org/2010/12/16/generations-2010/
Zweig, J. M., Lachman, P., Yahner, J., y Dank, M. (2014). Correlates of cyber dating
abuse among teens. Journal of Youth and Adolescence, 43(8), 1306-1321.
Zych, I., Ortega-Ruiz, R., y Del Rey, R. (2015). Systematic review of theoretical stud-
ies on bullying and cyberbullying: Facts, knowledge, prevention, and intervention.
Aggression and Violent Behavior, 23, 1-21.

23

También podría gustarte