{"id":"https://openalex.org/W4414873939","doi":"https://doi.org/10.1093/cybsec/tyaf026","title":"Unmasking the silent threat: understanding cybercrimes targeting female students of Kashmir university\u2014a mixed-method analysis","display_name":"Unmasking the silent threat: understanding cybercrimes targeting female students of Kashmir university\u2014a mixed-method analysis","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414873939","doi":"https://doi.org/10.1093/cybsec/tyaf026"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaf026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf026","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1093/cybsec/tyaf026","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108745513","display_name":"Sonia Yaqoob","orcid":"https://orcid.org/0009-0009-4153-3325"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Syed Shubeena Yaqoob","raw_affiliation_strings":["University of Kashmir Department of Sociology, , Hazratbal, Srinagar, 190006 ,"],"raw_orcid":"https://orcid.org/0009-0009-4153-3325","affiliations":[{"raw_affiliation_string":"University of Kashmir Department of Sociology, , Hazratbal, Srinagar, 190006 ,","institution_ids":["https://openalex.org/I135388327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034325991","display_name":"Anees A. Sheikh","orcid":"https://orcid.org/0009-0008-6731-5943"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Aasif Hussain Sheikh","raw_affiliation_strings":["University of Kashmir Department of Sociology, , Hazratbal, Srinagar, 190006 ,"],"raw_orcid":"https://orcid.org/0009-0008-6731-5943","affiliations":[{"raw_affiliation_string":"University of Kashmir Department of Sociology, , Hazratbal, Srinagar, 190006 ,","institution_ids":["https://openalex.org/I135388327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108745513"],"corresponding_institution_ids":["https://openalex.org/I135388327"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39111089,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.7186999917030334},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.7055000066757202},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6464999914169312},{"id":"https://openalex.org/keywords/digital-literacy","display_name":"Digital literacy","score":0.5374000072479248},{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.48260000348091125},{"id":"https://openalex.org/keywords/psychological-intervention","display_name":"Psychological intervention","score":0.4684000015258789},{"id":"https://openalex.org/keywords/psychological-resilience","display_name":"Psychological resilience","score":0.4059999883174896},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.35659998655319214}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.7186999917030334},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.7055000066757202},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6464999914169312},{"id":"https://openalex.org/C2777646416","wikidata":"https://www.wikidata.org/wiki/Q242069","display_name":"Digital literacy","level":2,"score":0.5374000072479248},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.48399999737739563},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.48260000348091125},{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.4684000015258789},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4643999934196472},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.4059999883174896},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.3774999976158142},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.36329999566078186},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.35659998655319214},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3158999979496002},{"id":"https://openalex.org/C547764534","wikidata":"https://www.wikidata.org/wiki/Q8236","display_name":"Literacy","level":2,"score":0.31279999017715454},{"id":"https://openalex.org/C109778625","wikidata":"https://www.wikidata.org/wiki/Q796573","display_name":"Computer-mediated communication","level":3,"score":0.301800012588501},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.30149999260902405},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2955000102519989},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.289900004863739},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.288100004196167},{"id":"https://openalex.org/C2777433830","wikidata":"https://www.wikidata.org/wiki/Q7551332","display_name":"Social protection","level":2,"score":0.2766999900341034},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.2694000005722046},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.2653000056743622},{"id":"https://openalex.org/C2778087770","wikidata":"https://www.wikidata.org/wiki/Q2297111","display_name":"Social support","level":2,"score":0.2596000134944916},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.25529998540878296}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyaf026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf026","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaf026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf026","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1565519764","https://openalex.org/W1604711681","https://openalex.org/W1866291711","https://openalex.org/W1979290264","https://openalex.org/W1989454713","https://openalex.org/W2000453371","https://openalex.org/W2013820082","https://openalex.org/W2027846741","https://openalex.org/W2068705826","https://openalex.org/W2089112285","https://openalex.org/W2109534971","https://openalex.org/W2125550117","https://openalex.org/W2162523803","https://openalex.org/W2346240712","https://openalex.org/W2391352928","https://openalex.org/W2483850428","https://openalex.org/W2500955212","https://openalex.org/W2518957864","https://openalex.org/W2524768073","https://openalex.org/W2541290007","https://openalex.org/W2558872038","https://openalex.org/W2580494519","https://openalex.org/W2721338650","https://openalex.org/W2726492935","https://openalex.org/W2732379274","https://openalex.org/W2754832586","https://openalex.org/W2776427122","https://openalex.org/W2799850053","https://openalex.org/W2803359028","https://openalex.org/W2888599410","https://openalex.org/W3010401207","https://openalex.org/W3013171296","https://openalex.org/W3025452344","https://openalex.org/W3039550386","https://openalex.org/W3109005250","https://openalex.org/W3120825596","https://openalex.org/W3123259895","https://openalex.org/W3167878368","https://openalex.org/W3169084189","https://openalex.org/W3180285145","https://openalex.org/W3186191131","https://openalex.org/W3195111485","https://openalex.org/W4233669390","https://openalex.org/W4236004739","https://openalex.org/W4243195753","https://openalex.org/W4312496966","https://openalex.org/W4317627599","https://openalex.org/W4405170838","https://openalex.org/W4406636991"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Technological":[1],"advancements":[2],"of":[3,63,82,104,126,137,148,153,170,257],"the":[4,59,100,117,135,140,146,186,204,211,252],"20th":[5],"century":[6],"have":[7,19],"not":[8,143],"only":[9],"expanded":[10],"women\u2019s":[11,162],"access":[12],"to":[13,22,39,89,164,189,199,217,248],"information":[14],"and":[15,30,58,75,94,102,156,178,196,221,234],"virtual":[16],"interaction":[17],"but":[18],"also":[20],"contributed":[21],"a":[23,114,242],"rise":[24],"in":[25,111,139,175,203,227,251],"cybercrimes.":[26],"Cybercrime":[27],"involves":[28],"intentional":[29],"often":[31,68],"repeated":[32],"aggressive":[33],"behaviour":[34],"enacted":[35],"through":[36],"digital":[37,158,181,206,231,253],"technologies":[38],"inflict":[40],"psychological,":[41,93],"emotional,":[42],"or":[43,48,259],"social":[44],"harm":[45],"on":[46],"individuals":[47],"groups.":[49],"These":[50],"acts":[51],"are":[52],"frequently":[53],"amplified":[54],"by":[55,73,107],"power":[56],"imbalances":[57],"persistent,":[60],"far-reaching":[61],"nature":[62,101],"online":[64,165,244],"platforms.":[65],"Female":[66],"users,":[67],"perceived":[69],"as":[70],"more":[71],"vulnerable":[72],"legal":[74,194],"societal":[76],"systems,":[77,238],"face":[78],"disproportionately":[79],"higher":[80],"risks":[81],"cyber":[83,154,191,219],"victimization.":[84],"Such":[85],"offences":[86],"can":[87,240],"lead":[88],"severe":[90],"physical,":[91],"sexual,":[92],"economic":[95],"consequences.":[96],"This":[97,208],"study":[98,184,209],"explores":[99],"impact":[103],"cybercrimes":[105,138],"experienced":[106],"female":[108,124,201,224],"university":[109,225],"students":[110,226],"Kashmir.":[112,228],"Using":[113],"mixed-methods":[115],"approach,":[116],"research":[118],"collected":[119],"quantitative":[120],"data":[121],"from":[122,180],"250":[123],"students,":[125],"whom":[127],"15":[128],"were":[129,172],"selected":[130],"for":[131,214],"qualitative":[132],"interviews.":[133],"Although":[134],"prevalence":[136],"region":[141],"is":[142],"alarmingly":[144],"high,":[145],"lack":[147],"computer":[149],"literacy,":[150],"limited":[151],"awareness":[152,233],"laws,":[155],"minimal":[157],"protection":[159],"mechanisms":[160],"increase":[161],"vulnerability":[163],"threats.":[166],"The":[167,183],"psychological":[168],"consequences":[169],"cybercrime":[171],"profound,":[173],"manifesting":[174],"depression,":[176],"anxiety,":[177],"withdrawal":[179],"spaces.":[182],"underscores":[185],"urgent":[187,212],"need":[188,213],"enhance":[190],"safety":[192,232],"education,":[193],"protections,":[195],"support":[197,237],"systems":[198],"safeguard":[200],"users":[202],"region\u2019s":[205],"landscape.":[207],"highlights":[210],"targeted":[215],"interventions":[216],"bolster":[218],"literacy":[220],"resilience":[222],"among":[223],"By":[229],"fostering":[230],"strengthening":[235],"institutional":[236],"stakeholders":[239],"create":[241],"safer":[243],"environment,":[245],"empowering":[246],"women":[247],"engage":[249],"confidently":[250],"sphere":[254],"without":[255],"fear":[256],"exploitation":[258],"harm.":[260]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
