Skip to main content

Understanding the Cyber-Victimisation of People with Long Term Conditions and the Need for Collaborative Forensics-Enabled Disease Management Programmes

  • Chapter
  • First Online:
Cyber Criminology

Abstract

Research shows that people with long term conditions and disabilities are frequently labelled as vulnerable, and commonly victimised online. They require instrumental support to understand their conditions and empower them to manage their own treatment in everyday life. However, additional short and long term consequences related to cyber-victimisation could intensify existing psychological and health complications. For instance, ‘distress’ as a commonly reported impact of cyber-victimisation could theoretically lead to neurohormonal changes in the blood, increasing cortisol, catecholamine and insulin secretion resulting in increased blood glucose, heartbeat, blood pressure, urination and other changes. Therefore, in this study we demonstrate the need and explain the means towards extending support and risk assessment systems and procedures to cover the collection and preservation of incidents reported by individuals. This can be used to support third-party interventions such as taking a legal action in cases where the impact of cyber-victimisation is seen to escalate and worsen. As such, we first define vulnerable groups with long term conditions and provide a review of the impact of various types of cyber-victimisation on their health management. Then, we discuss how Disease Management Programmes (DMP) developed over time to include web-based applications as an example of existing cost-effective approaches to improve the quality of healthcare provided to people with long term conditions. We then demonstrate the added value of incorporating forensics readiness to enable Police intervention, support the victim’s eligibility for extended instrumental support from national health services. Finally, this level of documentation offers an opportunity to implement more accurate methods to assess risk associated with victimisation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Aetna. (2016). Disease management. Available from: https://www.aetnabetterhealth.com/pennsylvania/health-wellness/special/disease-management.

  • Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5(3), 279.

    Article  Google Scholar 

  • Algtewi, E. E., Owens, J., & Baker, S. R. (2015). Analysing people with head and neck cancers’ use of online support groups. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 9(4).

    Google Scholar 

  • Alhaboby, Z. A. (2018). Written evidence on the impact of cyber-victimisation on people with long term conditions. Online abuse and the experience of disabled people. Available from: http://data.parliament.uk/writtenevidence/committeeevidence.svc/evidencedocument/petitions-committee/online-abuse-and-the-experience-of-disabled-people/written/77961.pdf.

  • Alhaboby, Z. A., Barnes, J., Evans, H., & Short, E. (2016a). Cyber-victimisation of people with disabilities: Challenges facing online research. Cyberpsychology: Journal of Psychosocial Research on Cyberspace.

    Google Scholar 

  • Alhaboby, Z. A., Al-Khateeb, H. M., Barnes, J., & Short, E. (2016b). ‘The language is disgusting and they refer to my disability’: The cyberharassment of disabled people. Disability & Society, 31(8), 1138–1143.

    Article  Google Scholar 

  • Alhaboby, Z. A., Barnes, J., Evans, H., & Short, E. (2017a). Cyber victimisation of people with chronic conditions and disabilities: A systematic review of scope and impact. Trauma, Violence & Abuse: A Review Journal. 1524838017717743.

    Google Scholar 

  • Alhaboby, Z. A., Barnes, J., Evans, H., & Short, E. (2017b). Cyber-victimisation of people with disabilities: Challenges facing online research. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 11(1).

    Google Scholar 

  • Al-Khateeb, H. M., Epiphaniou, G., Alhaboby, Z. A., Barnes, J., & Short, E. (2017). Cyberstalking: Investigating formal intervention and the role of corporate social responsibility. Telematics and Informatics, 34(4), 339–349.

    Article  Google Scholar 

  • Alliance, C. C. (2012). Implementation and evaluation: A population health guide for primary care models. Washington, DC: Care Continuum Alliance.

    Google Scholar 

  • Anastasiou, D., & Kauffman, J. M. (2013). The social model of disability: Dichotomy between impairment and disability. Journal of Medicine and Philosophy, 38(4), 441–459.

    Article  Google Scholar 

  • Anderson, J., Bresnahan, M., & Musatics, C. (2014). Combating weight-based cyberbullying on Facebook with the dissenter effect. Cyberpsychology, Behavior and Social Networking, 17(5), 281–286.

    Article  Google Scholar 

  • Annalijn Conklin, E. N. (2010). Disease management evaluation. A comprehensive review of current state of the art. Available from: http://www.rand.org/pubs/technical_reports/TR894.html.

  • Annerbäck, E.-M., Sahlqvist, L., & Wingren, G. (2014). A cross-sectional study of victimisation of bullying among schoolchildren in Sweden: Background factors and self-reported health complaints. Scandinavian Journal of Public Health, 42(3), 270–277.

    Article  Google Scholar 

  • Barr, M. S., Foote, S. M., Krakauer, R., & Mattingly, P. H. (2010). Lessons for the new CMS innovation center from the Medicare health support program. Health Affairs, 29(7), 1305–1309.

    Article  Google Scholar 

  • Bocij, P., & McFarlane, L. (2003). Cyberstalking: The technology of hate. The Police Journal, 76(3), 204–221.

    Article  Google Scholar 

  • Boynton, P. M., & Greenhalgh, T. (2004). Selecting, designing, and developing your questionnaire. BMJ, 328(7451), 1312–1315.

    Article  Google Scholar 

  • Briant, E., Watson, N., & Philo, G. (2013). Reporting disability in the age of austerity: The changing face of media representation of disability and disabled people in the United Kingdom and the creation of new ‘folk devils’. Disability & Society, 28(6), 874–889.

    Article  Google Scholar 

  • CDC. (2003). Costs of intimate partner violence against women in the US. National Center for Injury Prevention and Control.

    Google Scholar 

  • Chen, P.-Y., & Schwartz, I. S. (2012). Bullying and victimization experiences of students with autism spectrum disorders in elementary schools. Focus on Autism and Other Developmental Disabilities, 27(4), 200–212.

    Article  Google Scholar 

  • CPS. (2016). Impact and dynamics of stalking and harassment. 2–2–2016. Available from: http://www.cps.gov.uk/legal/s_to_u/stalking_and_harassment/#a05a.

  • Davis, K. E., Coker, A. L., & Sanderson, M. (2002). Physical and mental health effects of being stalked for men and women. Violence and Victims, 17(4), 429–443.

    Article  Google Scholar 

  • DDA. (1995). Disability discrimination act 1995.

    Google Scholar 

  • DH. (2012). Long term conditions compendium of information. London: Department of Health.

    Google Scholar 

  • Didden, R., Scholte, R. H. J., Korzilius, H., de Moor, J. M., Vermeulen, A., O’Reilly, M., Lang, R., & Lancioni, G. E. (2009). Cyberbullying among students with intellectual and developmental disability in special education settings. Developmental Neurorehabilitation, 12(3), 146–151 6p.

    Article  Google Scholar 

  • Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior and Social Networking, 17(2), 61–67.

    Article  Google Scholar 

  • EA. (2010). Guidance on matters to be taken into account in determining questions relating to the definition of disability. In Equality act 2010.

    Google Scholar 

  • Emerson, E., & Roulstone, A. (2014). Developing an evidence base for violent and disablist hate crime in Britain: Findings from the life opportunities survey. Journal of Interpersonal Violence, 29, 3086–3104.

    Article  Google Scholar 

  • Fazio, L. D., & Galeazzi, G. M. (2004). Women victims of stalking and helping professions: Recognition and intervention in the Italian context. Slovenia: Faculty of Criminal Justice, Univeristy of Maribor.

    Google Scholar 

  • Fisher, B. S., Cullen, F. T., & Turner, M. G. (2002). Being pursued: Stalking victimization in a national study of college women. Criminology & Public Policy, 1(2), 257–308.

    Article  Google Scholar 

  • Forhan, M. (2009). An analysis of disability models and the application of the ICF to obesity. Disability and Rehabilitation, 31(16), 1382–1388.

    Article  Google Scholar 

  • Fridh, M., Lindström, M., & Rosvall, M. (2015). Subjective health complaints in adolescent victims of cyber harassment: Moderation through support from parents/friends – a Swedish population-based study. BMC Public Health, 15(1), 949–949.

    Article  Google Scholar 

  • Galeazzi, G. M., Bučar-Ručman, A., DeFazio, L., & Groenen, A. (2009). Experiences of stalking victims and requests for help in three European countries. A survey. European Journal on Criminal Policy and Research, 15(3), 243–260.

    Article  Google Scholar 

  • Gemmill, M. (2008). Research note: Chronic disease management in Europe, European Commission Directorate-General “Employment, Social Affairs and Equal Opportunities” Unit E1-Social and Demographic Analysis. London: London School of Economics and Political Science.

    Google Scholar 

  • Gibson-Young, L., Martinasek, M. P., Clutter, M., & Forrest, J. (2014). Are students with asthma at increased risk for being a victim of bullying in school or cyberspace? Findings from the 2011 Florida youth risk behavior survey. Journal of School Health, 84(7), 429–434.

    Article  Google Scholar 

  • Greenhalgh, T. (2009). Chronic illness: Beyond the expert patient. BMJ: British Medical Journal, 338, 629–631.

    Google Scholar 

  • Gulley, S. P., Rasch, E. K., & Chan, L. (2011). The complex web of health: Relationships among chronic conditions, disability, and health services. Public Health Reports, 126(4), 495–507.

    Article  Google Scholar 

  • Haegele, J. A., & Hodge, S. (2016). Disability discourse: Overview and critiques of the medical and social models. Quest, 68(2), 193–206.

    Article  Google Scholar 

  • Hamiwka, L. D., Cara, G. Y., Hamiwka, L. A., Sherman, E. M., Anderson, B., & Wirrell, E. (2009). Are children with epilepsy at greater risk for bullying than their peers? Epilepsy & Behavior, 15(4), 500–505.

    Article  Google Scholar 

  • Hugh-Jones, S., & Smith, P. K. (1999). Self-reports of short- and long-term effects of bullying on children who stammer. British Journal of Educational Psychology, 69(2), 141–158.

    Article  Google Scholar 

  • Humpage, L. (2007). Models of disability, work and welfare in Australia. Social Policy and Administration, 41(3), 215–231.

    Article  Google Scholar 

  • Irshad, M., Al-Khateeb, H. M., Mansour, A., Ashawa, M., & Hamisu, M. (2018). Effective methods to detect metamorphic malware: A systematic review. International Journal of Electronic Security and Digital Forensics, 10(2), 138–154.

    Article  Google Scholar 

  • Johansson, T., Keller, S., Winkler, H., Ostermann, T., Weitgasser, R., Sönnichsen, A. C. (2015). Effectiveness of a peer support programme versus usual care in disease management of diabetes mellitus type 2 regarding improvement of metabolic control: A cluster-randomised controlled trial. Journal of Diabetes Research, 2016.

    Google Scholar 

  • Joseph, D. H., Griffin, M., Hall, R. F., & Sullivan, E. D. (2001). Peer coaching: An intervention for individuals struggling with diabetes. The Diabetes Educator, 27(5), 703–710.

    Article  Google Scholar 

  • Kamphuis, J. H., Galeazzi, G. M., De Fazio, L., Emmelkamp, P. M., Farnham, F., Groenen, A., James, D., & Vervaeke, G. (2005). Stalking—perceptions and attitudes amongst helping professions. An EU cross-national comparison. Clinical Psychology & Psychotherapy, 12(3), 215–225.

    Article  Google Scholar 

  • King-Ries, A. (2010). Teens, technology, and cyberstalking: The domestic violence wave of the future. Texas Journal of Women and the Law, 20, 131.

    Google Scholar 

  • Kivelä, K., Elo, S., Kyngäs, H., & Kääriäinen, M. (2014). The effects of health coaching on adult patients with chronic diseases: A systematic review. Patient Education and Counseling, 97(2), 147–157.

    Article  Google Scholar 

  • Kouwenberg, M., Rieffe, C., Theunissen, S. C. P. M., & de Rooij, M. (2012). Peer victimization experienced by children and adolescents who are deaf or hard of hearing. PLoS One, 7(12), e52174–e52174.

    Article  Google Scholar 

  • Kowalski, R. M., & Fedina, C. (2011). Cyber bullying in ADHD and Asperger syndrome populations. Research in Autism Spectrum Disorders, 5(3), 1201–1208.

    Article  Google Scholar 

  • Krahn, G. L., Reyes, M., & Fox, M. (2014). Toward a conceptual model for national policy and practice considerations. Disability and Health Journal, 7(1), 13–18.

    Article  Google Scholar 

  • Kropp, P. R., Hart, S. D., Lyon, D. R., & Storey, J. E. (2011). The development and validation of the guidelines for stalking assessment and management. Behavioral Sciences & the Law, 29(2), 302–316.

    Article  Google Scholar 

  • Levine, C., Faden, R., Grady, C., Hammerschmidt, D., Eckenwiler, L., & Sugarman, J. (2004). The limitations of “vulnerability” as a protection for human research participants. The American Journal of Bioethics, 4(3), 44–49.

    Article  Google Scholar 

  • Lorig, K. R., Ritter, P. L., Laurent, D. D., & Plant, K. (2006). Internet-based chronic disease self-management: A randomized trial. Medical Care, 44(11), 964–971.

    Article  Google Scholar 

  • Maple, C., Short, E., & Brown, A. (2011). Cyberstalking in the United Kingdom: An analysis of the ECHO pilot survey. Bedfordshire: University of Bedfordshire: National Centre for Cyberstalking Research.

    Google Scholar 

  • Mattke, S., Seid, M., & Ma, S. (2007). Evidence for the effect of disease management: Is $1 billion a year a good investment? American Journal of Managed Care, 13(12), 670.

    Google Scholar 

  • McEwan, T. E., MacKenzie, R. D., Mullen, P. E., & James, D. V. (2012). Approach and escalation in stalking. Journal of Forensic Psychiatry & Psychology, 23(3), 392–409.

    Article  Google Scholar 

  • McKemmish, R. (2008). When is digital evidence forensically sound? In IFIP international conference on digital forensics. Springer.

    Google Scholar 

  • Merolli, M., Gray, K., & Martin-Sanchez, F. (2013). Health outcomes and related effects of using social media in chronic disease management: A literature review and analysis of affordances. Journal of Biomedical Informatics, 46(6), 957–969.

    Article  Google Scholar 

  • Moskowitz, D., Thom, D. H., Hessler, D., Ghorob, A., & Bodenheimer, T. (2013). Peer coaching to improve diabetes self-management: Which patients benefit most? Journal of General Internal Medicine, 28(7), 938–942.

    Article  Google Scholar 

  • Mueller-Johnson, K., Eisner, M. P., & Obsuth, I. (2014). Sexual victimization of youth with a physical disability: An examination of prevalence rates, and risk and protective factors. Journal of Interpersonal Violence, 29(17), 3180–3206.

    Article  Google Scholar 

  • Nolte, E., Knai, C., & McKee, M. (2008). Managing chronic conditions: Experience in eight countries. Copenhagen: WHO Regional Office Europe.

    Google Scholar 

  • Norris, S. L., Engelgau, M. M., & Narayan, K. V. (2001). Effectiveness of self-management training in type 2 diabetes a systematic review of randomized controlled trials. Diabetes Care, 24(3), 561–587.

    Article  Google Scholar 

  • Norris, S. L., Lau, J., Smith, S. J., Schmid, C. H., & Engelgau, M. M. (2002). Self-management education for adults with type 2 diabetes a meta-analysis of the effect on glycemic control. Diabetes Care, 25(7), 1159–1171.

    Article  Google Scholar 

  • ONS. (2014). Internet access – households and individuals 2014. 2–12–2014. Available from: http://www.ons.gov.uk/peoplepopulationandcommunity/householdcharacteristics/homeinter netandsocialmediausage/bulletins/internetaccesshouseholdsandindividuals/2014-08-07.

  • Oxford. (2015). Definition of chronic. 20–5–2015. Available from: http://www. oxforddictionaries.com/definition/english/chronic.

  • Pinel, J. P. (2009). Biopsychology of emotion, stress and health. Pearson Education, 468–475.

    Google Scholar 

  • Pope, J. E., Hudson, L. R., & Orr, P. M. (2005). Case study of American Healthways’ diabetes disease management program. Health Care Financing Review, 27(1), 47.

    Google Scholar 

  • Reyns, B. W., & Englebrecht, C. M. (2014). Informal and formal help-seeking decisions of stalking victims in the United States. Criminal Justice and Behavior, 41(10), 1178–1194.

    Article  Google Scholar 

  • Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25.

    Article  Google Scholar 

  • Rula, E. Y., Pope, J. E., & Stone, R. E. (2011). A review of healthways’ medicare health support program and final results for two cohorts. Population Health Management, 14(S1), S-3–S-10.

    Article  Google Scholar 

  • Salomaa, A. (2013). Public-key cryptography. Springer.

    Google Scholar 

  • Seale, J., & Chadwick, D. (2017). How does risk mediate the ability of adolescents and adults with intellectual and developmental disabilities to live a normal life by using the Internet? Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 11(1).

    Google Scholar 

  • Sekhri, N. K. (2000). Managed care: The US experience. Bulletin of the World Health Organization, 78(6), 830–844.

    Google Scholar 

  • Sentenac, M., Gavin, A., Arnaud, C., Molcho, M., Godeau, E., & Gabhainn, S. N. (2011a). Victims of bullying among students with a disability or chronic illness and their peers: A cross-national study between Ireland and France. Journal of Adolescent Health, 48(5), 461–466.

    Article  Google Scholar 

  • Sentenac, M., Arnaud, C., Gavin, A., Molcho, M., Gabhainn, S. N., & Godeau, E. (2011b). Peer victimization among school-aged children with chronic conditions. Epidemiologic Reviews, mxr024.

    Google Scholar 

  • Sentenac, M., Gavin, A., Gabhainn, S. N., Molcho, M., Due, P., Ravens-Sieberer, U., de Matos, M. G., Malkowska-Szkutnik, A., Gobina, I., Vollebergh, W., Arnaud, C., & Godeau, E. (2013). Peer victimization and subjective health among students reporting disability or chronic illness in 11 Western countries. European Journal of Public Health, 23(3), 421–426.

    Article  Google Scholar 

  • Sheridan, L. (2005). University of Leicester supported by network for surviving stalking: Stalking survey. 13–5–2015. Available from: http://www.le.ac.uk/press/stalkingsurvey.htm.

  • Sheridan, L. P., & Grant, T. (2007). Is cyberstalking different? Psychology, Crime & Law, 13(6), 627–640.

    Article  Google Scholar 

  • Sheridan, L., Blaauw, E., & Davies, G. (2003). Stalking knowns and unknowns. Trauma, Violence & Abuse, 4(2), 148–162.

    Article  Google Scholar 

  • Short, E., Linford, S., Wheatcroft, J. M., & Maple, C. (2014). The impact of cyberstalking: The lived experience – a thematic analysis. Studies in Health Technology and Informatics, 199, 133–137.

    Google Scholar 

  • Stefan Brandt, P. J. H., & Hehner, S. (2010). How to design a successful disease-management program.

    Google Scholar 

  • Super, N. (2004). Medicare’s chronic care improvement pilot program: What is its potential? Washington, DC: National Health Policy Forum.

    Google Scholar 

  • Sutherland, I., Spyridopoulos, T., Read, H., Jones, A., Sutherland, G., & Burgess, M. (2015). Applying the ACPO guidelines to building automation systems. In International conference on human aspects of information security, privacy, and trust. Springer.

    Google Scholar 

  • Tang, P. C., Overhage, J. M., Chan, A. S., Brown, N. L., Aghighi, B., Entwistle, M. P., Hui, S. L., Hyde, S. M., Klieman, L. H., & Mitchell, C. J. (2013). Online disease management of diabetes: Engaging and motivating patients online with enhanced resources-diabetes (EMPOWER-D), a randomized controlled trial. Journal of the American Medical Informatics Association, 20(3), 526–534.

    Article  Google Scholar 

  • Taylor, L. A., Saylor, C., Twyman, K., & Macias, M. (2010). Adding insult to injury: Bullying experiences of youth with attention deficit hyperactivity disorder. Children’s Health Care, 39(1), 59–72.

    Article  Google Scholar 

  • Todd, W. E. (2009). Disease management: A look back & ahead. International Disease Management Alliance.

    Google Scholar 

  • van Lente, E. J. (2012). In E. J. van Lente (Ed.), Analysis of documentation data by Infas, Bonn on diabetes type 2 of all AOK – no control group. Brussels, May 23rd., 2012. Berlin: AOK.

    Google Scholar 

  • Wallace, P. J. (2005). Physician involvement in disease management as part of the CCM. Health Care Financing Review, 27(1), 19.

    Google Scholar 

  • Webster. (2015). Medical definition of CHRONIC. 20–5–2015. Available from: http://www.merriam-webster.com/medical/chronic.

  • Weingarten, S. R., Henning, J. M., Badamgarav, E., Knight, K., Hasselblad, V., Gano, A., Jr., & Ofman, J. J. (2002). Interventions used in disease management programmes for patients with chronic illnesswhich ones work? Meta-analysis of published reports. BMJ, 325(7370), 925.

    Article  Google Scholar 

  • Wells, M., & Mitchell, K. J. (2014). Patterns of internet use and risk of online victimization for youth with and without disabilities. The Journal of Special Education, 48(3), 204–213.

    Article  Google Scholar 

  • WHO. (2015). The impact of chronic diseases in the United Kingdom.

    Google Scholar 

  • Yen, C.-F., Chou, W.-J., Liu, T.-L., Ko, C.-H., Yang, P., & Hu, H.-F. (2014). Cyberbullying among male adolescents with attention-deficit/hyperactivity disorder: Prevalence, correlates, and association with poor mental health status. Research in Developmental Disabilities, 35(12), 3543–3553.

    Article  Google Scholar 

  • Zinner, S. H., Conelea, C. A., Glew, G. M., Woods, D. W., & Budman, C. L. (2012). Peer victimization in youth with Tourette syndrome and other chronic tic disorders. Child Psychiatry and Human Development, 43(1), 124–136.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haider M. Al-Khateeb .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alhaboby, Z.A. et al. (2018). Understanding the Cyber-Victimisation of People with Long Term Conditions and the Need for Collaborative Forensics-Enabled Disease Management Programmes. In: Jahankhani, H. (eds) Cyber Criminology. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-97181-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-97181-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-97180-3

  • Online ISBN: 978-3-319-97181-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics