用户名: 密码: 验证码:
Demographic variables and risk factors in computer-crime: an empirical assessment
详细信息    查看全文
  • 作者:Kyung-shick Choi ; Kyungseok Choo ; Yong-eun Sung
  • 关键词:Routine activity theory ; Online lifestyle ; Digital ; capable guardianship ; Computer security management ; Computer crime victimization ; Computer ; crime
  • 刊名:Cluster Computing
  • 出版年:2016
  • 出版时间:March 2016
  • 年:2016
  • 卷:19
  • 期:1
  • 页码:369-377
  • 全文大小:699 KB
  • 参考文献:1.Bernburg, J.G., Thorlindsson, T.: Routine activities in social context: a closer look at the role of opportunity in deviant behavior. Justice Q. 18(3), 543–567 (2001)
    2.Castells, M.: The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford University Press, New York (2002)
    3.Choi, K.: An empirical assessment of an integrated theory of computer crime victimization. Int. J. Cyber Criminol. 2(1), 308–333 (2008)
    4.Cohen, L.E., Cantor, D.: Residential burglary in the United States: life-style and demographic factors associated with the probability of victimization. J. Res. Crime Delinq. 18(1), 113–127 (1981)CrossRef
    5.Cohen, L.E., Felson, M.: Social change and crime rate trends: a routine activity approach. Am. Sociol. Rev. 44, 588–608 (1979)CrossRef
    6.Cullen, F.T., Agnew, R.: Criminological Theory: Past to Present, 3rd edn. Roxbury Publishing Company, Los Angeles (2006)
    7.Garofalo, J.: Reassessing the lifestyle model of criminal victimization. In: Gottfredson, M., Hirschi, T. (eds.) Positive Criminology, pp. 23–42. Sage, Newbury Park (1987)
    8.Hidelang, M.J., Gottfredson, M.R., Gaffalo, J.: Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization. Ballinger, Cambridge (1978)
    9.Kennedy, L.W., Forde, D.R.: Routine activities and crime: an analysis of victimization in Canada. Criminology 28, 137–151 (1990)CrossRef
    10.McMullan, J.L., Perrier, D.C.: Controlling cyber-crime and gambling: problems and paradoxes in the mediation of law and criminal organization. Police Pract. Res. 8(5), 431–444 (2007)CrossRef
    11.McQuade, S.C.: Understanding and Managing Cybercrime. Pearson Education Inc., Upper Saddle River (2006)
    12.Meier, R., Miethe, T.: Understanding theories of criminal victimization. Crime Justice 17, 459–499 (1993)CrossRef
    13.Mishna, F., McLuckie, A., Saint, M.: Real-world dangers in an online reality: examining online relationships and cyber abuse. Soc. Work Res. 33(2), 107–118 (2009)CrossRef
    14.Moon, B., McCluskey, J.D., McCluskey, C.P., Lee, S.: Gender, general theory of crime and computer crime: an empirical test. Int. J. Offender Ther. Comp. Criminol. 57(4), 460–478 (2012)CrossRef
    15.Mustaine, E., Tewksbury, R.: Predicting risks of larceny theft victimization: a routine activity analysis using refined lifestyle measures. Criminology 36, 829–857 (1998)CrossRef
    16.Piazza, P.: Technofile: antisocial networking sites. Secur. Manag. 1–5 (2006)
    17.Sampson, R.J., Lauritsen, J.L.: Deviant lifestyles, proximity to crime, and the offender-victim link in personal violence. J. Res. Crime Delinq. 27(2), 110–139 (1990)CrossRef
    18.Sampson, R.J., Wooldridge, J.D.: Linking the micro-and macro-level dimension of lifestyle-routine activity and opportunity models of predatory victimization. J. Quan. Criminol. 3, 371–391 (1987)CrossRef
    19.Swan, S.C., Gambone, L.J., Horn, M.L., Snow, D.L., Sullivan, T.P.: Factor structures for aggression and victimization among women who used aggression against male. Partn. Violence Against Women 18(9), 1045–1066 (2012)CrossRef
    20.Tak, S., Park, Y., Kim, U.: Cyber delinquency of high school students focusing on human relationship, psychological and behavior characteristics. J. Juv. Study 14(4), 233–258 (2007)
    21.Taylor, R.W., Eric, J.F., Liederbach, F., Holt, T.J.: Digital Crime and Digital Terrorism, 2nd edn. Pearson Education Inc., Upper Saddle River (2011)
    22.2005 FBI Computer Crime Survey (2006). http://​www.​fbi.​gov/​publications/​ccs2005.​pdf (2006). Accessed 19 Feb 2013
    23.Yar, M.: The novelty of ‘cybercrime’: an assessment in light of routine activity theory. Eur. Soc. Criminol. 2, 407–427 (2005)CrossRef
  • 作者单位:Kyung-shick Choi (1) (2)
    Kyungseok Choo (3) (4)
    Yong-eun Sung (5)

    1. Department of Criminal Justice, Bridgewater State University, Bridgewater, USA
    2. Boston University, Boston, USA
    3. School of Business and Justice Studies, Utica College, New York, USA
    4. Justice and Prevention Research Center, WestEd, San Francisco, USA
    5. Department of Police Administration, Far East University, Gamgok-myeon, Korea
  • 刊物类别:Computer Science
  • 刊物主题:Processor Architectures
    Operating Systems
    Computer Communication Networks
  • 出版者:Springer Netherlands
  • ISSN:1573-7543
文摘
The purpose of this research is to examine how demographics variables interact with factors such as online lifestyle, digital-capable guardianship, computer security management, and levels of individual computer crime victimization. The current study used a secondary data which was a self-report survey (\(N=204\)) contained items intended to measure the major constructs of routine activities theory. The findings of SEM (structural equation modeling) analysis showed that: (1) gender did not substantially influence on digital guardian factor and computer crime victimization. However, males are more likely to be engaging in online risky leisure activities such as visiting unknown Web sites, downloading free games, free music, and free movies than females. Simultaneously, males tended to update computer security, change the passwords for e-mail account, search for more effective computer security software, check the operation of computer security online, and use different passwords and user IDs for their Internet accounts than females; (2) individuals with older age are less likely to equip the number of computer security software with less duration; (3) race does not have any statistically significant impact on computer crime victimization. Lastly, the policy implications and the limitations of the current research were discussed at the last part of this study.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700