Next Article in Journal
Ceramsite Facilitated Microbial Degradation of Pollutants in Domestic Wastewater
Next Article in Special Issue
Bullying Experience among Adolescents with a Turkish Migration Background in Germany: Ethnic Class Composition, Integration, and Religiosity as Protective Factors?
Previous Article in Journal
Mindfulness-Based Interventions for People with Schizophrenia: A Systematic Review and Meta-Analysis
Previous Article in Special Issue
Risk and Protective Factors for Bullying at 11 Years of Age in a Spanish Birth Cohort Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Development of the Cybercrime Rapid Identification Tool for Adolescents

Department of Social and Behavioural Sciences, City University of Hong Kong, Hong Kong, China
*
Author to whom correspondence should be addressed.
Int. J. Environ. Res. Public Health 2020, 17(13), 4691; https://0-doi-org.brum.beds.ac.uk/10.3390/ijerph17134691
Submission received: 13 May 2020 / Revised: 21 June 2020 / Accepted: 25 June 2020 / Published: 30 June 2020

Abstract

:
Two studies were conducted to support the development of an eight-item Cybercrime Rapid Identification Tool (CRIT) and evaluate the psychometric properties of the proposed scale on samples of secondary school and university students. The CRIT was developed and evaluated in two cross-sectional studies with 2044 respondents from Hong Kong and China. Study 1 recruited 1533 secondary school students from Hong Kong with a mean age of 14.91 (SD = 1.77) years, and Study 2 recruited 511 university students from mainland China with a mean age of 20.41 (SD = 2.49) years. A stepwise confirmatory factor analytical approach was taken with further verification by exploratory factor analysis based on different samples. Factorial validity was further verified using confirmatory factor analysis. The analyses supported an eight-item scale with a two-factor structure. The eight-item CRIT was found to possess good internal consistency and concurrent validity. The studies offer promising support for the CRIT. It has the potential to advance epistemological methods and clinical research related to cybercrime prevention.

1. Introduction

According to the International Telecommunication Union [1], there are an estimated 4.1 billion internet users worldwide, equating to approximately 53.6% of the global population at the end of 2019. With the growing popularity of the internet, increasing attention has been paid to some of the negative issues surrounding internet usage [2,3,4,5]. In the United States, 95% of teenagers own a smartphone that allows for internet access, of which 59% have reported experience of cyberbullying in various forms, such as offensive name-calling and the spreading of false rumours [6,7]. In Hong Kong, according to a survey conducted by the Department of Health [8], over two-thirds of primary and secondary school students are spending up to three hours a day online. Studies have found that adolescents who spend a great deal of time on the internet are prone to having more negative online experiences [9,10]. Hence, this explorative study develops and evaluates a universal rapid identification tool to screen adolescents who may have a tendency to engage in deviant behaviour online, including the violation of internet rules and norms, illegal cyber-activities, cyberbullying, online harassment, hacking and trolling [11,12,13]. This tool will be particularly useful for frontline practitioners developing intervention programmes and for researchers designing epistemological surveys.
The rapid growth of cybercrime and deviant online subcultures can be mainly attributed to the accessibility and efficiency of the internet [14], with deviant online behaviour among adolescents having increased rapidly in the past decade in line with greater access to the internet [15,16,17]. The bogus identities and anonymity often permitted in virtual spaces further favour crime proliferation [14]. Compared to the consequences arising from performing traditional forms of crime, such as assault, those arising from deviant online behaviours are less apparent to young people [13].
With reference to the literature on social-cognitive effects [18], social learning theory [19,20] and self-control theory [21,22], a wide variety of risk factors contribute to cyber-deviance. Aggressive behaviour stimulus by socialisation can be predicted by an individual’s normative beliefs about aggression [23]. For instance, compared to the victim and uninvolved peer groups, bullies in traditional forms of bullying held significantly stronger normative beliefs about aggression [24]. Pornari and Wood [25] reported that students who participated in more severe or frequent aggressive behaviour had distorted thought patterns that grounded their aggressive behaviour through a tendency to justify or rationalise harmful acts to reduce self-censure [26,27]. Moral disengagement – legitimising an action by selectively applying moral censure—is more readily exercised by online perpetrators because there is a lower likelihood of consequences and any consequences are likely to be delayed; this is reinforced by the online feature of anonymity [9,28]. Baek [16] suggested that low self-control was a strong predictor of deviant online behaviour among adolescents. Other studies have also linked a lower level of self-control with participation in various forms of deviant and illegal online behaviour, including hacking [13,29,30], watching pornography [30], online harassment [13,31], and the unauthorised use of personal information [29,30,32].
The literature also suggests that engagement in deviant online behaviour is closely related to various measures of wellbeing and interpersonal relationships. For example, perceived self-esteem has an effect on online interactions [33]. A recent study also found that strengthening one’s resilience may deter the incidence of cybercrime [34]. In terms of interpersonal relationships, Zhang [35] explored the relationship between online culture, interpersonal relationships and cybercrime. Another study highlighted the adverse effect of social networking sites on forms of interpersonal intrusion, such as offline dating violence and cyberbullying [36]. Payne, et al. [37] also identified interpersonal support and digital skills as related to the risk of committing cyber-dependent crime. The above literature has provided insights into the potential threats presented by deviant online behaviour and the factors contributing to online deviance.
In short, we conceptualise cybercrime as the use of an internet access device as an instrument to further illegal ends. Measuring deviant online behaviour is a challenging task in at least two ways. First, the pace of technology is changing rapidly and it is difficult to find a measure that can fully explain netizens’ behaviour related to the latest information technology in the virtual world. Second, there are many existing internet addictive scales, which merely focus on measuring individual negative computing behaviours on a specific internet platform, such as an online game and social networking site [3]. To the best of our knowledge, however, there is no existing scale for identifying the risk of cybercrime among adolescents at an emergent stage. This paper is inspired by the criminology and social psychological literature discussed above with particular focus on the following two dimensions: 1) deviant online behaviour; 2) risk factors for engaging in cybercrime, namely general normative beliefs about aggression and moral disengagement. Hence, this paper reports on the development of a Cybercrime Rapid Identification Tool (CRIT) and the evaluation of its psychometric properties, including factorial validity, internal consistency and concurrent validity, using the latest psychometric evaluation tools and well-established construal-level scales.
To verify the validity of the CRIT, it was hypothesised that the proposed measure possesses a two-factor structure with good factorial validity (Hypothesis 1). The scale was expected to hold positive relationship with problematic internet usage and negative relationship satisfaction (Hypothesis 2). CRIT was also expected to demonstrate negative relationship with self-esteem, resilience and positive relationship satisfaction (Hypothesis 3).

2. Materials and Methods

2.1. Participants

Two cross-sectional studies were conducted, one in Hong Kong and one in mainland China, with a total of 2044 valid respondents. Study 1 was conducted from March to June 2018, with 1739 participants recruited. Among the participants were 1591 students from eight secondary schools in Hong Kong and 148 students recruited from the Hong Kong Federation of Youth Groups Crime Prevention Centre. There were two inclusive criteria for selecting the schools and respondents. First, all the respondents were full time school students. Second, we selected the schools according to the official government reported school banding, ranging from one to three. Band one indicates the top students in Hong Kong, while band three signifies the students with learning difficulties under the current steaming system. We recruited the students who were roughly equally distributed from band one, two and three schools. The gender distribution was 58.6% male and 41.4% female, with 99.1% of respondents in Form 1 to 6 (Form 1 = 19.0%, Form 2 = 21.3%, Form 3 = 20.6%, Form 4 = 18.1%, Form 5 = 19.0%, and Form 6 = 1.1%). After incomplete questionnaires were removed, Study 1 arrived at a valid sample of 1533, with a mean age of 14.91 (SD = 1.77) years. To ensure the proposed scale is not only applicable to the secondary school students in Hong Kong, Study 2 took place in April and May 2019. The research team recruited 511 undergraduate students with a mean age of 20.41 (SD = 2.49) years from a university in Guangzhou, China. The recruited sample comprised 85.5% female and 14.5% male respondents, which matched the demographic profile of the university’s student population.

2.2. Procedure

In Study 1, anonymous paper-and-pencil questionnaires were distributed by the research team members, with the participants assured that their responses would be confidential. While completing the questionnaire, participants were not allowed to discuss it with others. They were also required to personally submit the questionnaire upon completion. In Study 2, students were invited to participate in this study on a voluntary basis through the university’s intranet system, with the questionnaire appended to a self-report smartphone-based application. The research process strictly adhered to international ethical standards, with written consent obtained from all the participants, including parental consent of the minors. The project was endorsed by the research ethics committee of the university.
The research team deployed a questionnaire based on 13 well-established measures related to time spent on the internet and online behaviour, attitude and habits, making up 97 items (in Study 1, n = 1533). The measures included time spent online [38], deviant online behaviours [15], cyber-safety awareness [39], cyber-security precautions [39], knowledge of illegal cyber-activities [39], cyber-victimisation [38], parent-child relationships [15], self-control [29], empathy [40], anger management [41], moral disengagement [28], proactive aggression [26] and general normative belief about aggression [27]. The questionnaires used in this study were translated into Chinese in adherence with the back-translation procedure and verified by the research team members, with particular attention paid to cross-cultural differences [42,43].
Several steps were taken in developing the CRIT and evaluating its factorial validity. To avoid the potential problem for over-fitting highlighted in the structural equation modelling (SEM) literature [44,45], the exploratory factor analysis (EFA) and confirmatory factor analysis (CFA) were computed based on different datasets obtained by randomly stratifying Study 1 (n = 1533) into two datasets (Sample 1, n = 767; Sample 2, n = 766). Each of the samples reflected the original sex ratio of the participants [46]. Sample 1 (n = 767) was then used to select the items for the CRIT using a stepwise confirmatory factor analytical (SCOFA) approach [47]. We used the SCOFA together with reference to the correlation between the items and by cross-checking the alpha if item was deleted value. We kept at least three items per factor to avoid the issue of model misidentification [48,49]. Then we further evaluated the proposed measure with the standard scale development procedure using EFA [50]. To evaluate the factor structure of the proposed scale, EFA was performed using principal component analysis with oblimin rotation [50,51,52]. The cut-off values adopted for the Kaiser-Mayer-Olkin (KMO) and Bartlett’s tests were >0.70 and p < 0.01, respectively. The identified factors possessed an eigenvalue greater than 1 and items had a factor loading of over 0.50 [48,53]. In addition, we also computed the McDonald’s omega hierarchical subscale with an observed value over 0.30 for each identified latent factor structure of the scale [54,55,56,57].
CFA was then performed to further evaluate the factorial validity of the eight-item CRIT based on Study 1 (Sample 2, n = 766) and Study 2 (Sample 3, n = 511) [58,59]. Diagonally weighted least squares (DWLS) was used as the estimation method due to the ordinal nature of the scale items [60,61,62]. The model fit and cut-off criteria were evaluated based on standard practices in SEM: model fit was considered good with a comparative fit index (CFI) and Tucker–Lewis index (TLI) of over 0.950, a standardised root mean square residual (SRMR) of under 0.08 and a root mean square error of approximation (RMSEA) of under 0.06 [58,63,64,65]. In addition to the above criteria, an acceptable model could also be indicated by χ2/df ≤ 3 [66,67].
Based on the data from Study 1 (n = 1533), the internal consistency of the eight-item CRIT was evaluated by Cronbach’s alpha and Cronbach’s alpha if-item-deleted [68], the corrected item-total correlation between the eight items [48,69], and the total McDonald’s omega [55,56,57].
Convergent validity was assessed based on the data from Study 2 (n = 511) with other construal-level scales reported. Based on the existing literature on cybercrime and cyberbullying, we expected the CRIT to be positively related to problematic internet usage [3,35,70] and negative relationship satisfaction [35,71,72]. Hence, the following well-established measures were used: the Problematic Internet Use Questionnaire (PIUQ) [73,74,75,76] and the Negative Semantic Dimension (NSD) from the Positive and Negative Semantic Dimensions of Relationship Satisfaction (PN-SMD) scale [77]. Again based on the literature, we expected the eight-item CRIT to be negatively related to self-esteem [33,78], resilience [79,80,81] and positive relationship satisfaction [35,71,72]. The following construal-level measures were used: the Rosenberg Self-esteem (RSE) scale [82,83,84,85], the Brief Resilience Scale (BRS) [86,87] and the Positive Semantic Dimension (PSD) from the PN-SMD scale [77]. The above analyses were conducted with IBM SPSS version 26.0 and the lavaan package version 0.6-5 [88] in R (3.6.3).

2.3. Measures

2.3.1. Brief Resilience Scale

The BRS comprises six items using a 5-point Likert-type scale (from 1 = does not describe me at all to 5 = describes me very well) for the respondents to report how well each statement describes their behaviour and actions. Items 2, 4 and 6 are reversed in valence, such as ‘I have a hard time making it through stressful events.’ and ‘It is hard for me to snap back when something bad happens.’ Higher scores refer to high levels of resilience [87]. The Cronbach’s alpha of this measure was 0.71.

2.3.2. Rosenberg Self-Esteem Scale

The RSE scale comprises 10 items to measure the participants’ self-esteem using a 4-point Likert-type scale (from 0 = strongly disagree to 3 = strongly agree). Five items (3, 5, 8, 9 and 10) were reverse-coded, e.g., ‘I feel I do not have much to be proud of.’, ‘I certainly feel useless at times.’ and ‘I wish I could have more respect for myself.’ Higher scores indicate a high level of self-esteem [82,83]. The Cronbach’s alpha for the RSE scale in this study was 0.76.

2.3.3. Positive and Negative Semantic Dimensions of Relationship Satisfaction Scale

The PN-SMD comprises 14 items using an 8-point Likert-type scale (from 0 = not at all to 7 = completely) to measure two dimensions related to Positive Semantic Dimension (PSD) (items 1 to 7, α = 0.90), e.g., positive qualities like ‘enjoyable’ and ‘friendly’, and Negative Semantic Dimension (NSD) (items 8 to 14, α = 0.92), i.e., negative qualities like ‘discouraging’ and ‘miserable’. Higher scores indicate high levels of positive and negative relationship satisfaction, respectively [77].

2.3.4. Problematic Internet Use Questionnaire

The PIUQ is evaluated on a 5-point Likert-type scale (from 1 = never to 5 = always) with 18 questions related to being obsessed with internet activities, (e.g., ‘How often do you daydream about the Internet?’), neglecting non-internet activities (e.g., ‘How often do you spend time online when you’d rather sleep?’), and being unable to stop using the internet (e.g., ‘How often do you try to conceal the amount of time spent online?’). High scores indicate a high level of problematic internet usage [73]. There were controversies related to the dimensionality of the scale. However, this was fully addressed in the recent studies [74,89,90]. Cronbach’s alpha for this measure was 0.86.

3. Results

3.1. Development of the Cybercrime Rapid Identification Tool and Its Factorial Validity

The items for constructing the CRIT were selected using SCOFA [47]. This was based on data collected from the online behaviour among adolescents questionnaire (Study 1), which comprised 97 items from well-established measures. Eight items with a two latent factor structure were identified based on the conceptual themes related to deviant online behaviour (Items 1 to 4) [15], general normative belief about aggression (Item 5) [27], moral disengagement (Item 6) [28], self-control (Item 7) [41] and proactive aggression (Item 8) [26]. The identified items were further verified based on the EFA results. Factor analysis showed a KMO value of 0.86 (χ2 =2458.88, p < 0.001) for the 8-item CRIT from the data from Study 1 (Sample 1, n = 767). Table 1 shows the results of EFA using principal component analysis with oblimin rotation extracting two factors. The CRIT accounted for 66.36% of the total variance. The explanatory power of the factors in relation to the total variance was as follows. The first factor, related to deviant online behaviour (DOB), comprised four items with factor loadings ranging from 0.71 to 0.83 and explanatory power of 18.84% (eigenvalue = 1.51). The second factor, related to morality, control and aggression (MCA), comprised four items with factor loadings ranging from 0.80 to 0.87 and explained 47.52% of the variance (eigenvalue = 3.80). The McDonald’s omega results replicated the EFA findings: ωhs.DOB and ωhs.MCA showed relatively large omega hierarchical subscale values of 0.44 and 0.46, respectively [54]. Overall, a two latent factor structure was indicated.
The CFA results for the 8-item CRIT using data from Sample 2 (n = 766) and Sample 3 (n = 511) are presented in Table 2 (see Figure 1 for the estimated model). The CFA results indicated that all models fulfilled the criteria for good model fit. As such, the CFA results in Sample 2 (n = 766) replicated the factor structure suggested by the above EFA results derived from Sample 1 (n = 767), χ2 (30.22)/19 = 1.59, SRMR = 0.03, CFI = 0.99, TLI = 0.99 and RMSEA = 0.03. The CFA results for the whole sample in Study 1 (n = 1533) yielded similar outcomes. The results from Study 2 (Sample 3, n = 511) also indicated good model fit, χ2 (21.23)/19 = 1.12, SRMR = 0.03, CFI = 0.99, TLI = 0.99 and RMSEA = 0.02. In short, the results indicated that the eight-item CRIT with a two-factor structure possessed good factorial validity.

3.2. Internal Consistency.

Table 3 shows the means, standard deviations, skewness, kurtosis, correlations, corrected item-total correlations and Cronbach’s alpha if-item-deleted for the proposed eight items of the CRIT from the data obtained from Study 1 (n = 1533). The mean score of CRIT was 15.16 (SD = 5.21). The corrected item-to-total correlations in the eight-item CRIT ranged from 0.47 to 0.66, suggesting appropriateness for constructing a scale. The Cronbach’s alpha and McDonald’s omega total of the scale were 0.85 and 0.88, respectively, indicating a measure with high internal consistency.

3.3. Concurrent Validity

Table 4 shows the correlation coefficients between CRIT and the selected well-established scales for testing concurrent validity, using the data from Study 2 (n = 511). The results supported the expectation that CRIT would display significant weak-to-moderate positive relationships with the Problematic Internet Use Questionnaire (PIQU) (r = 0.27, p < 0.001) and NSD (r = 0.39, p < 0.001), and significant weak-to-moderate negative relationships with PSD (r = −0.29, p < 0.001), RSE (r = −0.15, p < 0.001) and BRS (r = −0.18, p < 0.001). The results therefore indicate good concurrent validity for the 8-item CRIT.

4. Discussion

This study pioneers the development of a rapid identification tool that may connect to actual cybercrime at an emergent stage. The proposed eight-item CRIT was found to possess good psychometric properties which supporting the hypothesis 1. The scale returned alpha coefficient and omega total value above the acceptable range in both Study 1 (α = 0.85; ω = 0.88) and Study 2 (α = 0.88; ω = 0.90) [50,55,56,57]. The EFA and CFA results supported a measure with a two latent factor structure, with the factors being involvement in deviant online behaviour (DOB) and personal traits related to morality, control and aggression (MCA). All models in the CFA suggested good model fit for the CRIT with a two factor structure, fulfilling the standard criteria used in the SEM literature [58,64,67]. The scale also demonstrated good concurrent validity, with significant positive relationships with problematic internet usage and negative relationship satisfaction and significant negative relationships with resilience, self-esteem and positive relationship satisfaction. Thus, hypotheses 2 and 3 are accepted. Those findings are consistent with the normative arguments and epistemological findings highlighted in the existing literature related to internet-based deviant behaviours, such as cyber-loafing [78], cyberbullying [72,79], racial typification [70], and cyber-ostracism [81].
The scale can provide a handy identification tool not only for Chinese populations, but also for people in different cultures and societies. The scale was developed mainly from the Study 1 (n = 1533) sample of secondary school students in Hong Kong [91]. Due to the unique historical context, Hong Kong students are mostly bilingual with proficiency in Chinese and English. This distinctive cultural pattern of ‘East meets West’ and the high rate of internet use makes Hong Kong an ideal research setting for studying online behaviour [92,93,94]. In addition, this pioneering study also used two versions of the CRIT, one written in traditional Chinese (Study 1) and one written in simplified Chinese (Study 2). The simplified Chinese characters are commonly used in mainland China, whereas traditional Chinese is the written language used in Hong Kong, Taiwan and among other Chinese diasporas. This research design are commonly used in many cyber-behaviour studies using the same language in different societies [95,96]. Hence, this study provides evidence supporting the use of the CRIT in different societies.
This study also contributes to the application of the CRIT in the following ways. The identified two latent factor structure of the scale, comprising involvement in deviant online behaviour (DOB) and traits related to morality, control and aggression (MCA), can be adjusted through socialisation by different agencies operating specific intervention programmes in school [26] using a reactive-proactive model [97].
The study also takes a step forward in validating two less commonly recognised risk factors for engaging in cybercrime and cyber-deviance, namely general normative beliefs about aggression and moral disengagement. Early intervention targeting these factors could be made by institutions and caregivers (e.g., schools, parents and social workers) to reduce the risk of adolescents engaging in cybercrime and victimisation [98,99,100].
The findings should be considered alongside the following three potential limitations. First, the use of self-report questionnaires could have resulted in underreporting of deviant behaviour and misunderstandings of some items. Second, the current study does not contain enough empirical data to recommend any cut-off values in this proposed tool. Also, samples from Study 1 and 2 differ significantly in age. Further study is required to obtain normative data with a large and representative sample from the wider population. Third, there is currently lack of intervention programmes, external validation criteria, and clinical data to evaluate the effectiveness and sensitivity of the rapid identification tool. Although the eight items are certainly of paramount significance to identifying at-risk adolescents, the practical effectiveness of the tool requires examination.

5. Conclusions

This initial study strived to provide early data on a detailed way of developing a measure to identify adolescents at risk for cybercrime. For a more in-depth analysis of the risks, future research may consider conducting mediation or moderation analyses to assess the validity of the rapid identification tool on samples differing from those used here on various characteristics, such as age and gender. To validate the self-reported findings, other forms of deviant online behaviour assessment, such as behavioural observations of adolescents by parents and teachers, could be simultaneously carried out in future research. A longitudinal study could also be adopted to measure the effectiveness of the rapid identification tool.

Author Contributions

D.S.-w.W. was responsible for the funding acquisition, project administration, data collection and writing of the manuscript. S.-f.F. contributed in study concept, design, data analysis, data interpretation and writing of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

The project is partially supported by a contract research sponsored by the Hong Kong Federation of Youth Groups (grant number: CityU/9231276). The funding body had no influence on the content of the paper and the publication process.

Conflicts of Interest

The authors declare that they have no competing interests.

Ethics Approval and Consent to Participate

The research has gone through proper research ethical approval procedures specified by City University of Hong Kong. Its procedure was in compliance with the Declaration of Helsinki guidelines. All of the participants gave written consent prior to the study.

References

  1. International Telecommunication Union Statistics. Available online: https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx (accessed on 20 April 2020).
  2. Borzekowski, D.L.; Rickert, V.I. Adolescents, the Internet, and health: Issues of access and content. J. Appl. Dev. Psychol. 2001, 22, 49–59. [Google Scholar] [CrossRef]
  3. Fung, S.-F. Cross-cultural validation of the Social Media Disorder scale. Psychol. Res. Behav. Manag. 2019, 12, 683–690. [Google Scholar] [CrossRef] [Green Version]
  4. Ji, S.; Yu, C.P.; Fung, S.-F.; Pan, S.; Long, G. Supervised Learning for Suicidal Ideation Detection in Online User Content. Complex 2018, 2018, 1–10. [Google Scholar] [CrossRef] [Green Version]
  5. Prichard, J.; Spiranovic, C.; Watters, P.; Lueg, C. Young people, child pornography, and subcultural norms on the Internet. J. Am. Soc. Inf. Sci. Technol. 2013, 64, 992–1000. [Google Scholar] [CrossRef]
  6. Pew Research Center A Majority of Teens Have Been the Target of Cyberbullying. Available online: https://www.pewinternet.org/2018/09/27/a-majority-of-teens-have-experienced-some-form-of-cyberbullying/pi_2018-09-27_teens-and-cyberbullying_0-01/ (accessed on 20 April 2020).
  7. Pew Research Center Teens, Social Media & Technology 2018. Available online: https://www.pewinternet.org/2018/05/31/teens-social-media-technology-2018/ (accessed on 20 April 2020).
  8. Department of Health Report of Advisory Group on Health Effects of Use of Internet and Electronic Screen Products. Available online: https://www.studenthealth.gov.hk/english/internet/report/files/e_report.pdf (accessed on 20 April 2020).
  9. Park, S.; Na, E.-Y.; Kim, E.-M. The relationship between online activities, netiquette and cyberbullying. Child. Youth Serv. Rev. 2014, 42, 74–81. [Google Scholar] [CrossRef]
  10. Shin, N.; Ahn, H. Factors Affecting Adolescents’ Involvement in Cyberbullying: What Divides the 20% from the 80%? Cyberpsychology Behav. Soc. Netw. 2015, 18, 393–399. [Google Scholar]
  11. Udris, R. Psychological and Social Factors as Predictors of Online and Offline Deviant Behavior among Japanese Adolescents. Deviant Behav. 2016, 38, 792–809. [Google Scholar] [CrossRef]
  12. Udris, R. Cyber Deviance among Adolescents and the Role of Family, School, and Neighborhood: A Cross-National Study. Int. J. Cyber. Criminol. 2016, 10, 127–146. [Google Scholar]
  13. Lee, B. Explaining Cyber Deviance among School-Aged Youth. Child Indic. Res. 2017, 11, 563–584. [Google Scholar] [CrossRef]
  14. Stalans, L.J.; Finn, M.A. Understanding How the Internet Facilitates Crime and Deviance Introduction. Victims Offenders 2016, 11, 501–508. [Google Scholar] [CrossRef] [Green Version]
  15. Kong, J.; Lim, J. The longitudinal influence of parent–child relationships and depression on cyber delinquency in South Korean adolescents: A latent growth curve model. Child. Youth Serv. Rev. 2012, 34, 908–913. [Google Scholar] [CrossRef]
  16. Baek, H. Computer-Specific Parental Management and Online Deviance across Gender in South Korea: A Test of Self-Control Theory. Int. J. Cyber. Criminol. 2018, 12, 68–83. [Google Scholar]
  17. Wang, C.-W.; Musumari, P.M.; Techasrivichien, T.; Suguimoto, S.P.; Tateyama, Y.; Chan, C.-C.; Ono-Kihara, M.; Kihara, M.; Nakayama, T. Overlap of traditional bullying and cyberbullying and correlates of bullying among Taiwanese adolescents: A cross-sectional study. BMC Public Health 2019, 19, 1756. [Google Scholar] [CrossRef] [PubMed]
  18. The Metropolitan Area Child Study Research Group. Changing the way children "think" about aggression: Social-cognitive effects of a preventive intervention. J. Consult. Clin. Psychol. 2007, 75, 160–167. [Google Scholar] [CrossRef] [Green Version]
  19. Bandura, A.; Ross, D.; Ross, S.A. Transmission of aggression through imitation of aggressive models. J. Abnorm. Soc. Psychol. 1961, 63, 575–582. [Google Scholar] [CrossRef] [Green Version]
  20. Pierce, W.D.; Bandura, A. Social Learning Theory. Can. J. Sociol. Cah. Can. de Sociol. 1977, 2, 321. [Google Scholar] [CrossRef]
  21. Hirschi, T. Causes of Delinquency; Transaction Publishers: New Brunswick, NJ, USA, 2002. [Google Scholar]
  22. Sampson, R.J.; Gottfredson, M.R.; Hirschi, T. A General Theory of Crime. Soc. Forces 1992, 71, 545. [Google Scholar] [CrossRef]
  23. Lim, S.H.; Ang, R.P. Relationship between boys’ normative beliefs about aggression and their physical, verbal, and indirect aggressive behaviors. Adolescence 2009, 44, 635–650. [Google Scholar]
  24. Burton, K.A.; Florell, D.; Wygant, D.B. The Role of Peer Attachment and Normative Beliefs about Aggression on Traditional Bullying and Cyberbullying. Psychol. Sch. 2012, 50, 103–115. [Google Scholar] [CrossRef]
  25. Pornari, C.D.; Wood, J. Peer and cyber aggression in secondary school students: The role of moral disengagement, hostile attribution bias, and outcome expectancies. Aggress. Behav. 2009, 36, 81–94. [Google Scholar] [CrossRef]
  26. Fandrem, H.; Strohmeier, D.; Roland, E. Bullying and Victimization Among Native and Immigrant Adolescents in Norway The Role of Proactive and Reactive Aggressiveness. J. Early Adolesc. 2009, 29, 898–923. [Google Scholar] [CrossRef]
  27. Huesmann, L.R.; Guerra, N.G. Children’s normative beliefs about aggression and aggressive behavior. J. Personal. Soc. Psychol. 1997, 72, 408–419. [Google Scholar] [CrossRef]
  28. Kollerová, L.; Soukup, P.; Gini, G. Classroom Collective Moral Disengagement Scale: Validation in Czech adolescents. Eur. J. Dev. Psychol. 2017, 15, 184–191. [Google Scholar] [CrossRef]
  29. Donner, C.M.; Marcum, C.D.; Jennings, W.G.; Higgins, G.E.; Banfield, J. Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Comput. Hum. Behav. 2014, 34, 165–172. [Google Scholar] [CrossRef]
  30. Holt, T.J.; Bossler, A.; May, D.C. Low Self-Control, Deviant Peer Associations, and Juvenile Cyberdeviance. Am. J. Crim. Justice 2011, 37, 378–395. [Google Scholar] [CrossRef]
  31. Lee, C.; Shin, N. Prevalence of cyberbullying and predictors of cyberbullying perpetration among Korean adolescents. Comput. Hum. Behav. 2017, 68, 352–358. [Google Scholar] [CrossRef]
  32. Moon, B.; McCluskey, J.D.; McCluskey, C.P. A general theory of crime and computer crime: An empirical test. J. Crim. Justice 2010, 38, 767–772. [Google Scholar] [CrossRef]
  33. Schwarzer, R.; Mueller, J.; Greenglass, E. Assessment of perceived general self-efficacy on the internet: Data collection in cyberspace. Anxiety Stress. Coping 1999, 12, 145–161. [Google Scholar] [CrossRef]
  34. Cheng, C.; Chan, L.; Chau, C.-l. Individual differences in susceptibility to cybercrime victimization and its psychological aftermath. Comput. Hum. Behav. 2020, 108, 106311. [Google Scholar] [CrossRef]
  35. Zhang, X.H. The Influence of Internet Culture on Adolescents’ Physical and Psychological Health and the Countermeasure; World Acad Union-World Acad Press: Liverpool, UK, 2010; pp. 74–77. [Google Scholar]
  36. Caridade, S.; Braga, T.; Borrajo, E. Cyber dating abuse (CDA): Evidence from a systematic review. Aggress. Violent Behav. 2019, 48, 152–168. [Google Scholar] [CrossRef]
  37. Payne, K.-L.; Russell, A.; Mills, R.; Maras, K.; Rai, D.; Brosnan, M. Is There a Relationship Between Cyber-Dependent Crime, Autistic-Like Traits and Autism? J. Autism Dev. Disord. 2019, 49, 4159–4169. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  38. Ngo, F.T.; Paternoster, R. Cybercrime Victimization: An examination of Individual and Situational level factors. Int. J. Cyber. Criminol. 2011, 5, 773–793. [Google Scholar]
  39. Avais, M.; Wassan, A.; Narijo, H.; Khan, J. Awareness regarding cyber victimization among students of University of Sindh, Jamshoro. Int. J. Asian Soc. Sci. 2014, 4, 632–641. [Google Scholar]
  40. Bryant, B.K. An index of empathy for children and adolescents. Child Dev. 1982, 53, 413–425. [Google Scholar] [CrossRef]
  41. Stith, S.M.; Hamby, S. The Anger Management Scale: Development and Preliminary Psychometric Properties. Violence Vict. 2002, 17, 383–402. [Google Scholar] [CrossRef] [PubMed]
  42. Cha, E.; Kim, K.H.; Erlen, J.A. Translation of scales in cross-cultural research: Issues and techniques. J. Adv. Nurs. 2007, 58, 386–395. [Google Scholar] [CrossRef]
  43. Brislin, R.W. Back-Translation for Cross-Cultural Research. J. Cross-Cult. Psychol. 1970, 1, 185–216. [Google Scholar] [CrossRef]
  44. Fokkema, M.; Greiff, S. How Performing PCA and CFA on the Same Data Equals Trouble Overfitting in the Assessment of Internal Structure and Some Editorial Thoughts on It. Eur. J. Psychol. Assess. 2017, 33, 399–402. [Google Scholar] [CrossRef]
  45. Babyak, M.A. What you see may not be what you get: A brief, nontechnical introduction to overfitting in regression-type models. Psychosom. Med. 2004, 66, 411–421. [Google Scholar]
  46. Fung, S.-F.; Fung, A.L.C. Development and evaluation of the psychometric properties of a brief parenting scale (PS-7) for the parents of adolescents. PLoS ONE 2020, 15, e0228287. [Google Scholar] [CrossRef]
  47. Schroeders, U.; Wilhelm, O.; Olaru, G. Meta-Heuristics in Short Scale Construction: Ant Colony Optimization and Genetic Algorithm. PLoS ONE 2016, 11, e0167110. [Google Scholar] [CrossRef] [PubMed]
  48. Hair, J.F. Multivariate Data Analysis, 7 ed.; Prentice Hall: Upper Saddle River, NJ, USA, 2010. [Google Scholar]
  49. Fung, S.-F.; Chow, E.O.-W.; Cheung, C.-K. Development and Evaluation of the Psychometric Properties of a Brief Wisdom Development Scale. Int. J. Environ. Res. Public Health 2020, 17, 2717. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  50. Loewenthal, K.; Lewis, C.A. An Introduction to Psychological Tests and Scales; Informa UK Limited: London, UK, 2018. [Google Scholar]
  51. Jennrich, R.I.; Sampson, P.F. Rotation for simple loadings. Psychometrika 1966, 31, 313–323. [Google Scholar] [CrossRef] [PubMed]
  52. Fabrigar, L.R.; Wegener, D.T.; MacCallum, R.C.; Strahan, E.J. Evaluating the use of exploratory factor analysis in psychological research. Psychol. Methods 1999, 4, 272–299. [Google Scholar] [CrossRef]
  53. Field, A.P. Discovering Statistics Using IBM SPSS Statistics, 5th ed.; SAGE Publications: Los Angeles, CA, USA, 2018. [Google Scholar]
  54. Gignac, G.E.; Kretzschmar, A. Evaluating dimensional distinctness with correlated-factor models: Limitations and suggestions. Intelligence 2017, 62, 138–147. [Google Scholar] [CrossRef]
  55. Revelle, W.; Zinbarg, R.E. Coefficients Alpha, Beta, Omega, and the glb: Comments on Sijtsma. Psychom. 2008, 74, 145–154. [Google Scholar] [CrossRef]
  56. Zinbarg, R.E.; Revelle, W.; Yovel, I.; Li, W. Cronbach’s α, Revelle’s β, and Mcdonald’s ωH: Their relations with each other and two alternative conceptualizations of reliability. Psychometrika 2005, 70, 123–133. [Google Scholar] [CrossRef]
  57. Zwick, R.; McDonald, R.P. Test Theory: A Unified Treatment. J. Am. Stat. Assoc. 2000, 95, 1012. [Google Scholar] [CrossRef]
  58. Brown, T.A. Confirmatory Factor Analysis for Applied Research, 2nd ed.; Guilford Publications: New York, NY, USA, 2014. [Google Scholar]
  59. Joreskog, K.G. A general approach to confirmatory maximum likelihood factor analysis. Psychometrika 1969, 34, 183–202. [Google Scholar] [CrossRef]
  60. Distefano, C.; Morgan, G.B. A Comparison of Diagonal Weighted Least Squares Robust Estimation Techniques for Ordinal Data. Struct. Equ. Model. A Multidiscip. J. 2014, 21, 425–438. [Google Scholar] [CrossRef]
  61. Li, C.-H. Confirmatory factor analysis with ordinal data: Comparing robust maximum likelihood and diagonally weighted least squares. Behav. Res. Methods 2015, 48, 936–949. [Google Scholar] [CrossRef] [Green Version]
  62. Lionetti, F.; Keijsers, L.; Dellagiulia, A.; Pastore, M. Evidence of Factorial Validity of Parental Knowledge, Control and Solicitation, and Adolescent Disclosure Scales: When the Ordered Nature of Likert Scales Matters. Front. Psychol. 2016, 7, 238. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  63. Browne, M.W.; Cudeck, R. Alternative Ways of Assessing Model Fit. Sociol. Methods Res. 1992, 21, 230–258. [Google Scholar] [CrossRef]
  64. Hu, L.; Bentler, P.M.; Li-tze Hu Department of Psychology University of California Santa Cruz CA; Peter, M. Bentler Department of Psychology University of California Los Angeles Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Struct. Equ. Model. A Multidiscip. J. 1999, 6, 1–55. [Google Scholar] [CrossRef]
  65. Schreiber, J.; Nora, A.; Stage, F.K.; Barlow, E.A.; King, J. Reporting Structural Equation Modeling and Confirmatory Factor Analysis Results: A Review. J. Educ. Res. 2006, 99, 323–338. [Google Scholar] [CrossRef]
  66. Bentler, P.M.; Bonett, D.G. Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin 1980, 88, 588–606. [Google Scholar] [CrossRef]
  67. Kline, R.B. Principles and Practice of Structural Equation Modeling, 2nd ed.; Guilford Press: New York, NY, USA, 2005. [Google Scholar]
  68. Cronbach, L.J. Coefficient alpha and the internal structure of tests. Psychometrika 1951, 16, 297–334. [Google Scholar] [CrossRef] [Green Version]
  69. Tabachnick, B.G. Using Multivariate Statistics, 6th ed.; Pearson Education: Boston, IL, USA, 2013. [Google Scholar]
  70. Intravia, J.; Pickett, J.T. Stereotyping Online? Internet News, Social Media, and the Racial Typification of Crime. Sociol. Forum 2019, 34, 616–642. [Google Scholar] [CrossRef]
  71. Rühs, F.; Greve, W.; Kappes, C. Coping with criminal victimization and fear of crime: The protective role of accommodative self-regulation. Leg. Criminol. Psychol. 2017, 22, 359–377. [Google Scholar] [CrossRef]
  72. Lianos, H.; McGrath, A. Can the General Theory of Crime and General Strain Theory Explain Cyberbullying Perpetration? Crime Delinq. 2018, 64, 674–700. [Google Scholar] [CrossRef] [Green Version]
  73. Demetrovics, Z.; Szeredi, B.; Rózsa, S. The three-factor model of Internet addiction: The development of the Problematic Internet Use Questionnaire. Behav. Res. Methods 2008, 40, 563–574. [Google Scholar] [CrossRef] [Green Version]
  74. Koronczai, B.; Kökönyei, G.; Urbán, R.; Király, O.; Nagygyörgy, K.; Felvinczi, K.; Griffiths, M.D.; Huang, Z.; Demetrovics, Z. Confirmation of the Chinese Version of the Problematic Internet Use Questionnaire Short Form (PIUQ-SF). Int. J. Ment. Health Addict. 2016, 15, 191–197. [Google Scholar] [CrossRef] [Green Version]
  75. Demetrovics, Z.; Király, O.; Koronczai, B.; Griffiths, M.D.; Nagygyörgy, K.; Elekes, Z.; Tamás, D.; Kun, B.; Kökönyei, G.; Urbán, R. Psychometric Properties of the Problematic Internet Use Questionnaire Short-Form (PIUQ-SF-6) in a Nationally Representative Sample of Adolescents. PLoS ONE 2016, 11, e0159409. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  76. Kelley, K.J.; Gruber, E.M. Psychometric properties of the Problematic Internet Use Questionnaire. Comput. Hum. Behav. 2010, 26, 1838–1845. [Google Scholar] [CrossRef]
  77. Mattson, R.E.; Rogge, R.D.; Johnson, M.; Davidson, E.K.B.; Fincham, F.D. The positive and negative semantic dimensions of relationship satisfaction. Pers. Relatsh. 2012, 20, 328–355. [Google Scholar] [CrossRef]
  78. Gökçearslan, Ş.; Mumcu, F.K.; Haşlaman, T.; Çevik, Y.D. Modelling smartphone addiction: The role of smartphone usage, self-regulation, general self-efficacy and cyberloafing in university students. Comput. Hum. Behav. 2016, 63, 639–649. [Google Scholar] [CrossRef]
  79. Hinduja, S.; Patchin, J.W. Cultivating youth resilience to prevent bullying and cyberbullying victimization. Child Abus. Negl. 2017, 73, 51–62. [Google Scholar] [CrossRef] [PubMed]
  80. Gianesini, G.; Brighi, A.; Blair, S.L.; Claster, P.N.; Claster, S.M. Cyberbullying in the Era of Digital Relationships: The Unique Role of Resilience and Emotion Regulation on Adolescents’ Adjustment; Emerald: Bingley, UK, 2015; Volume 19, pp. 1–46. [Google Scholar]
  81. Niu, G.-F.; Zhou, Z.-K.; Sun, X.-J.; Yu, F.; Xie, X.-C.; Liu, Q.-Q.; Lian, S.-L. Cyber-ostracism and its relation to depression among Chinese adolescents: The moderating role of optimism. Pers. Individ. Differ. 2018, 123, 105–109. [Google Scholar] [CrossRef]
  82. Rosenberg, M.; Schooler, C.; Schoenbach, C. Self-Esteem and Adolescent Problems: Modeling Reciprocal Effects. Am. Sociol. Rev. 1989, 54, 1004. [Google Scholar] [CrossRef]
  83. Rosenberg, M. Society and the Adolescent Self-Image; Princeton University Press: Princeton, NJ, USA, 1965. [Google Scholar]
  84. Wu, Y.; Zuo, B.; Wen, F.; Yan, L. Rosenberg Self-Esteem Scale: Method Effects, Factorial Structure and Scale Invariance Across Migrant Child and Urban Child Populations in China. J. Pers. Assess. 2016, 99, 1–11. [Google Scholar] [CrossRef] [PubMed]
  85. Schwarzer, R.; Bäßler, J.; Kwiatek, P.; Schröder, K.; Zhang, J.X. The Assessment of Optimistic Self-beliefs: Comparison of the German, Spanish, and Chinese Versions of the General Self-efficacy Scale. Appl. Psychol. 1997, 46, 69–88. [Google Scholar] [CrossRef]
  86. Fung, S.-F. Validity of the Brief Resilience Scale and Brief Resilient Coping Scale in a Chinese Sample. Int. J. Environ. Res. Public Health 2020, 17, 1265. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  87. Smith, B.W.; Dalen, J.; Wiggins, K.; Tooley, E.; Christopher, P.; Bernard, J. The brief resilience scale: Assessing the ability to bounce back. Int. J. Behav. Med. 2008, 15, 194–200. [Google Scholar] [CrossRef]
  88. Rosseel, Y. lavaan: An R Package for Structural Equation Modeling. J. Stat. Softw. 2012, 48, 36. [Google Scholar] [CrossRef] [Green Version]
  89. Lin, M.; Kim, Y. The reliability and validity of the 18-item long form and two short forms of the Problematic Internet Use Questionnaire in three Japanese samples. Addict. Behav. 2020, 101, 105961. [Google Scholar] [CrossRef] [PubMed]
  90. Langher, V.; Caputo, A.; Giacchetta, A.; Nannini, V.; Sollazzo, F.; Medde, P.; Orsi, G.; Piccinini, N. Which affects affect the use of new technologies? Italian adaptation of the internet motive questionnaire for adolescents (IMQ-A) and criterion validity with problematic use and body dissatisfaction. Psihologija 2019, 52, 217–233. [Google Scholar] [CrossRef] [Green Version]
  91. Wong, D.S.W. A Study on Cyber Deviant Behaviour and Criminal Activities among Youth in Hong Kong; Department of Social and Behavioural Sciences, City University of Hong Kong: Hong Kong, China, 2018. [Google Scholar]
  92. Ford, D.; Chui, W.H. Where East Meets West: Fieldwork Instruction in Hong Kong and England. Asia Pac. J. Soc. Work. Dev. 2000, 10, 19–39. [Google Scholar] [CrossRef]
  93. Wong, Y.L.R. When East meets West—Nation, colony, and Hong Kong women’s subjectivities in gender and China development. Mod. China 2004, 30, 259–292. [Google Scholar] [CrossRef]
  94. Beattie, P.; Bettache, K.; Chong, K.C.Y. Who is the Neoliberal? Exploring Neoliberal Beliefs across East and West. J. Soc. Issues 2019, 75, 20–48. [Google Scholar] [CrossRef]
  95. López, H.M.H.; Casas, J.A.; Romera, E.M.; Ortega-Ruiz, R.; Del Rey, R.; Romera, E.M. Validation of the European Cyberbullying Intervention Project Questionnaire for Colombian Adolescents. Cyberpsychology Behav. Soc. Netw. 2017, 20, 117–125. [Google Scholar] [CrossRef]
  96. Romera, E.M.; López, H.M.H.; Casas, J.A.; Ruiz, R.O.; Del Rey, R. How Much Do Adolescents Cybergossip? Scale Development and Validation in Spain and Colombia. Front. Psychol. 2018, 9, 126. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  97. Fung, A.L.C.; Raine, A.; Gao, Y. Cross-Cultural Generalizability of the Reactive–Proactive Aggression Questionnaire (RPQ). J. Pers. Assess. 2009, 91, 473–479. [Google Scholar] [CrossRef] [PubMed]
  98. Garaigordobil, M.; Machimbarrena, J.M. Victimization and Perpetration of Bullying/Cyberbullying: Connections with Emotional and Behavioral Problems and Childhood Stress. Psychosoc. Interv. 2019, 28, 67–73. [Google Scholar] [CrossRef] [Green Version]
  99. Teng, Z.; Nie, Q.; Zhu, Z.; Guo, C. Violent video game exposure and (Cyber)bullying perpetration among Chinese youth: The moderating role of trait aggression and moral identity. Comput. Hum. Behav. 2020, 104, 106193. [Google Scholar] [CrossRef]
  100. Fernández-González, L.; Calvete, E.; Sánchez-Álvarez, N. Efficacy of a Brief Intervention Based on an Incremental Theory of Personality in the Prevention of Adolescent Dating Violence: A Randomized Controlled Trial. Psychosoc. Interv. 2020, 29, 9–18. [Google Scholar] [CrossRef]
Figure 1. Final standardised model of the 8-item Cybercrime Rapid Identification Tool; DOB = deviant online behaviour; MCA = moral, control and aggression.
Figure 1. Final standardised model of the 8-item Cybercrime Rapid Identification Tool; DOB = deviant online behaviour; MCA = moral, control and aggression.
Ijerph 17 04691 g001
Table 1. Factor loading resulted from exploratory factor analysis.
Table 1. Factor loading resulted from exploratory factor analysis.
ItemDOBMCA
1. I have downloaded illegal software.0.77−0.05
2. I have spread false information in an Internet board.0.820.01
3. I have hacked other people’s computers or websites.0.830.01
4. I have used other people’s Internet ID or resident registration number without permission.0.710.06
5. In general, it is OK to take your anger out on others by using physical force.0.030.85
6. Teasing someone does not really hurt them.−0.010.84
7. If things I do upset people, it’s their problem, not mine.−0.070.87
8. I threaten others because then it’s me who decide.0.070.80
DOB = deviant online behaviour; MCA = moral, control and aggression.
Table 2. Factor loadings and fit indices in confirmatory factor analysis (CFA) for the Cybercrime Rapid Identification Tool (CRIT), by study (see Figure 1).
Table 2. Factor loadings and fit indices in confirmatory factor analysis (CFA) for the Cybercrime Rapid Identification Tool (CRIT), by study (see Figure 1).
Factor/Question Number Study 1Study 1Study 2
(Sample 2)(Combo)Sample 3
DOB
1λ10.700.710.56
2λ20.810.850.89
3λ30.900.890.96
4λ40.770.760.86
MCA
5λ50.850.860.67
6λ60.770.790.94
7λ70.760.780.80
8λ80.810.840.85
Latent factor covariance
DOB ~ MCAφd,m0.610.610.87
Model fit
n 7661533511
RMSEA 0.030.020.02
RMSEA 90% CI 0.02–0.05 0.01–0.03 0.00–0.04
SRMR 0.030.020.03
χ2 (df = 19) 30.2236.2421.23
χ2/df 1.591.911.12
CFI 0.990.990.99
TLI 0.990.990.99
Combo = sample 1 plus sample 2 from Study 1 (n = 1533); DOB = deviant online behaviour; MCA = moral, control and aggression.
Table 3. Descriptive statistics and items correlations for the CRIT items.
Table 3. Descriptive statistics and items correlations for the CRIT items.
Item12345678
10.470.480.450.280.230.220.27
20.540.640.500.350.300.270.36
30.530.640.500.390.290.270.36
40.480.530.530.340.300.270.34
50.310.350.360.360.610.590.64
60.270.320.300.340.630.580.56
70.240.290.280.300.590.580.58
80.300.370.370.370.650.580.59
Mean1.841.581.441.722.092.202.272.03
SD1.100.850.810.940.950.990.950.94
Skewness1.171.441.901.230.520.450.310.50
Kurtosis0.461.783.390.99−0.20−0.23−0.20−0.35
rit0.470.580.590.540.660.590.570.64
aiid0.870.860.860.860.850.850.850.85
All correlations are significant at the 0.001 level (2-tailed); Lower triangle for Spearman correlations; upper triangle for Pearson correlations; rit = Corrected item-total correlations; aiid = Cronbach’s alpha, if item deleted.
Table 4. Correlations between CRIT and its latent factor structure in relation to other construct-related scales.
Table 4. Correlations between CRIT and its latent factor structure in relation to other construct-related scales.
ScaleCRITCRIT: DOBCRIT: MCA
Problematic Internet Use Questionnaire0.270.230.26
Negative Semantic Dimension0.390.340.37
Positive Semantic Dimension−0.29−0.24−0.29
Rosenberg Self-esteem−0.15−0.13−0.15
Brief Resilience Scale−0.18−0.17−0.16
All correlations are significant at the 0.001 level (2-tailed); PIUQ = Problematic Internet Use Questionnaire; NSD = Negative Semantic Dimension; PSD = Positive Semantic Dimension; RSE = Rosenberg Self-esteem; BRS = Brief Resilience Scale; DOB = deviant online behaviour; MCA = moral, control and aggression.

Share and Cite

MDPI and ACS Style

Wong, D.S.-w.; Fung, S.-f. Development of the Cybercrime Rapid Identification Tool for Adolescents. Int. J. Environ. Res. Public Health 2020, 17, 4691. https://0-doi-org.brum.beds.ac.uk/10.3390/ijerph17134691

AMA Style

Wong DS-w, Fung S-f. Development of the Cybercrime Rapid Identification Tool for Adolescents. International Journal of Environmental Research and Public Health. 2020; 17(13):4691. https://0-doi-org.brum.beds.ac.uk/10.3390/ijerph17134691

Chicago/Turabian Style

Wong, Dennis Sing-wing, and Sai-fu Fung. 2020. "Development of the Cybercrime Rapid Identification Tool for Adolescents" International Journal of Environmental Research and Public Health 17, no. 13: 4691. https://0-doi-org.brum.beds.ac.uk/10.3390/ijerph17134691

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop