Although cybercrime has rapidly evolved and become a significant criminological issue, research reveals that academia has developed a few significant empirical assessments regarding computer-crime victimization and the potential contribution to this victimization by online users’ characteristics combined with their lack of computer security components. Therefore, the main purpose of this chapter is to discuss two traditional victimization theories, routine activities theory (Cohen & Felson, 1979) and lifestyle-exposure (Hindelang, Gottfredson, & Garofalo, 1978) theory, and their potential application to computer-crime victimization by examining the theoretical core concepts within these theories. Arguably, these two theories are actually on...
Routine Activity Theory (RAT) and the general theory of crime have been widely employed to understan...
The proliferation of digital technologies in the past years has seen the adaptation of lifestyles me...
This study investigates the relationships between users' routine activities and socio-economic chara...
Using a sample of online consumers, an examination of routine activities theory and the general theo...
Lifestyle and routine activities models are often used in criminological research to examine crime v...
Using a sample of college students, we apply the general theory of crime and the lifestyle/routine a...
The central question of this article is whether routine activity theory (RAT) can be used as an anal...
The aim of this study was to investigate cyber-crime victimization among Internet users in the Unite...
This chapter will focus on cyber-dependent crimes (i.e., malicious hacking). Of all crimes that coul...
Abstract Researchers in the fields of sociology, psychology, behavioural sciences and law are trying...
The current study provides an empirical testing of the victim-offender overlap in online platforms d...
Building upon Eck and Clarke’s (2003) ideas for explaining crimes in which there is no face-to-face ...
This article introduces and applies an integrative model of cyberharassment victimization. The model...
Routine Activity Theory (RAT) and the general theory of crime have been widely employed to understan...
The proliferation of digital technologies in the past years has seen the adaptation of lifestyles me...
Routine Activity Theory (RAT) and the general theory of crime have been widely employed to understan...
The proliferation of digital technologies in the past years has seen the adaptation of lifestyles me...
This study investigates the relationships between users' routine activities and socio-economic chara...
Using a sample of online consumers, an examination of routine activities theory and the general theo...
Lifestyle and routine activities models are often used in criminological research to examine crime v...
Using a sample of college students, we apply the general theory of crime and the lifestyle/routine a...
The central question of this article is whether routine activity theory (RAT) can be used as an anal...
The aim of this study was to investigate cyber-crime victimization among Internet users in the Unite...
This chapter will focus on cyber-dependent crimes (i.e., malicious hacking). Of all crimes that coul...
Abstract Researchers in the fields of sociology, psychology, behavioural sciences and law are trying...
The current study provides an empirical testing of the victim-offender overlap in online platforms d...
Building upon Eck and Clarke’s (2003) ideas for explaining crimes in which there is no face-to-face ...
This article introduces and applies an integrative model of cyberharassment victimization. The model...
Routine Activity Theory (RAT) and the general theory of crime have been widely employed to understan...
The proliferation of digital technologies in the past years has seen the adaptation of lifestyles me...
Routine Activity Theory (RAT) and the general theory of crime have been widely employed to understan...
The proliferation of digital technologies in the past years has seen the adaptation of lifestyles me...
This study investigates the relationships between users' routine activities and socio-economic chara...