Abstract. Cybercrime is a pervasive threat for today’s Internet-dependent society. While the real extent and economic impact is hard to quantify, scien-tists and officials agree that cybercrime is a huge and still growing problem. A substantial fraction of cybercrime’s overall costs to society can be traced to indirect opportunity costs, resulting from unused online services. This paper presents a theoretically derived model that utilizes technology acceptance research and insights from Criminology to identify factors that reduce Inter-net users ’ intention to use online services. We hypothesize that avoidance of online banking, online shopping and online social networking is increased by prior cybercrime victimization and media reports. Th...
Prior research on cybercrime victimization has generally emphasized the linkage between the frequenc...
Despite the increasing prevalence of cybercrime and its study by criminologists, very little researc...
This study tests the assumptions of the routine activity theory on three online forms of victimizati...
Abstract—We conduct a secondary analysis of data collected to survey EU citizens ’ experiences and c...
Cybercrime issues across many economies are increasing at a faster rate. The rapid diffusion and pen...
Cybercrime has evolved into a serious global problem with considerable social and economic impact. A...
This study investigates the relationships between users' routine activities and socio-economic chara...
Increased internet use has created opportunities for criminality. Internet penetration is soaring a...
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. U...
Economic forms of cybercrime affect millions of people around the world. Preparatory crimes such as ...
E-Commerce technology is a business mechanism that works electronically by focusing on online busine...
Each day cybercrime attacks are getting more frequent, dangerous and sophisticated. In 2016 the FBI’...
“This paper explores different relationships among various cybersecurity aspects and online transact...
Cyberspace in general, and cybercrime in particular, are relatively new phenomena. As technological ...
The internet is used increasingly as a platform both for free expression and e-commerce. The interne...
Prior research on cybercrime victimization has generally emphasized the linkage between the frequenc...
Despite the increasing prevalence of cybercrime and its study by criminologists, very little researc...
This study tests the assumptions of the routine activity theory on three online forms of victimizati...
Abstract—We conduct a secondary analysis of data collected to survey EU citizens ’ experiences and c...
Cybercrime issues across many economies are increasing at a faster rate. The rapid diffusion and pen...
Cybercrime has evolved into a serious global problem with considerable social and economic impact. A...
This study investigates the relationships between users' routine activities and socio-economic chara...
Increased internet use has created opportunities for criminality. Internet penetration is soaring a...
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. U...
Economic forms of cybercrime affect millions of people around the world. Preparatory crimes such as ...
E-Commerce technology is a business mechanism that works electronically by focusing on online busine...
Each day cybercrime attacks are getting more frequent, dangerous and sophisticated. In 2016 the FBI’...
“This paper explores different relationships among various cybersecurity aspects and online transact...
Cyberspace in general, and cybercrime in particular, are relatively new phenomena. As technological ...
The internet is used increasingly as a platform both for free expression and e-commerce. The interne...
Prior research on cybercrime victimization has generally emphasized the linkage between the frequenc...
Despite the increasing prevalence of cybercrime and its study by criminologists, very little researc...
This study tests the assumptions of the routine activity theory on three online forms of victimizati...