Publication Cover
Victims & Offenders
An International Journal of Evidence-based Research, Policy, and Practice
Volume 17, 2022 - Issue 6
1,818
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Convergence of Traditional and Online Property Crime Victimization in a City with Little Offline Crime

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon

ABSTRACT

This paper analyzes the correlates of traditional (burglary, vehicle theft, theft from vehicles, and pickpocketing) and online property crime (data theft and online fraud), with particular attention given to the relation between them and the risk of multiple victimizations. Data are gathered from a large and representative victimization survey conducted in a Swiss city (N = 7,885). The findings suggest that both traditional and online property victimization are related positively to the participants’ lifestyle routines, physical and online protection measures, and educational level. Men, young persons, those employed actively, and university graduates are overrepresented among the multiple victims of online-offline property victimization.

Introduction

The dichotomy between everyday life in the physical and digital worlds has become obsolete in the population of highly industrialized countries, as both worlds coexist. For example, by 2019, all inhabitants of Switzerland aged 15 to 55 years had an Internet connection at home, and 80% of them had access to the Internet from their smartphones. In addition, approximately 75% had purchased goods online in the previous three months and, among those, 87% paid at least once by credit card, while 55% paid at least once via e-banking (Office fédéral de la statistique, Citation2019). This physical and digital coexistence affects people’s lifestyles and daily activities, which in turn is known to be related to their risk of crime victimization. However, the interactions between crime, lifestyles, and daily activities in the physical and digital world are less well known and, to the best of our knowledge, have not been the object of specific study in Switzerland.

From that perspective, this study uses a victimization survey to investigate the correlates of traditional and online property crime victimization and provide the sociodemographic profile of multiple victims of online-offline property crimes. The analysis focuses on traditional offenses, such as burglary, vehicle theft, theft of objects from vehicles, and pickpocketing, as well as such cybercrimes as online fraud and unauthorized use of personal data. The victimization survey was preferred to official measures of crime, such as police and conviction statistics, because the latters’ limitations are well known and appear to be particularly relevant in the field of cybercrimes. Nonetheless, from 2011 to 2016, cyber-fraud recorded by the police increased in the majority of European countries that collect data on it, while traditional patrimony crimes, such as theft, aggravated theft, vehicle theft, and burglary, showed decreasing trends in nearly all countries, with the exception of domestic burglary, which has a trend that presents a less clear pattern (Aebi et al., Citation2021). However, cross-national comparisons of levels of police-recorded crimes are biased fundamentally because of differences in the way in which data are registered in national statistics (Aebi, Citation2010). For example, this explains why the Swiss police recorded “only” 57.5 cyber-frauds per 100,000 inhabitants in 2015, while the Swedish police recorded 1,100. At the same time, by 2020, 70% of police-recorded frauds in Switzerland had a cyber component (Office Fédéral de la Statistique, Citation2021).

These figures corroborate the notion that the technological revolution that led to contemporary societies’ digitalization has provided breaches (in the sense of Killias, Citation2006) for new types of crime as well as updated forms of traditional crimes. Hence, the risk of becoming a crime victim, which entails numerous negative consequences, has multiplied (Notté et al., Citation2021; Reyns & Randa, Citation2020). These breaches also lead to repeated and multiple victimizations. Repeat victims are those who suffer the same offenses regularly (e.g., robbery or cyber-fraud), while multiple victims, or multivictims, are those who suffer consecutive crimes of a different nature – for example, robbery and cyber-fraud. Several authors have investigated repeated victimization in both the material and cyber world (e.g., Everson, Citation2003; Farrell, Citation1993; Matthews et al., Citation2001; Milani et al., Citation2020; Moneva et al., Citation2022, Citation2020; Whitty, Citation2019), while few have addressed multiple cyber-victimizations (Correia, Citation2020; Drew, Citation2020). With respect to prevalence, Correia (Citation2020) found that among the 11,844 participants in the Crime Survey for England and Wales, 8.5% had been victims of both fraud and computer misuse, 7% of fraud only, and 1.8% of computer misuse only. In addition, multiple cyber-victimizations had a greater incidence rate (10.2 crimes per 1,000 respondents) than that of both crimes separately. Drew (Citation2020) studied multiple cyber-victimizations in Australia (N = 595) and found that 27% of the sample had experienced two or more different cybercrimes, including identity theft, fraud, phishing, computer hacking, malware or ransomware attacks, online shopping scams, online dating and romance scams, password theft, and unauthorized access of cards or bank accounts.

Research on multiple victimizations in both the traditional environment and cyberspace has focused on bullying (see, Trajtenberg et al., Citation2021; Turner et al., Citation2010; Wang et al., Citation2010) or has linked cyber and traditional forms of peer victimization to the internalization of symptoms – such as depression, anxiety, and sadness – in adolescents (e.g., Andrea & Álvarez-García, Citation2021; Fales et al., Citation2018; Gini et al., Citation2019). At the same time, we are unaware of any studies that have investigated the prevalence and correlates of other types of traditional and cyber forms of multiple victimizations. From a practical perspective, this lack of research is particularly regrettable, as it is well known that the Pareto law (vulgarly known as the 20/80 law) also applies to the distribution of crime, in the sense that a small group of victims suffers a large proportion of crime (e.g., Farrell, Citation1992). This indicates that by focusing crime prevention strategies on that group, one could achieve a noteworthy decrease in the total amount of crime.

The lifestyle-routine theory: theoretical framework and prior literature

Several criminologists – although not necessarily their respective authors – consider the Routine activities approach [RAT] (Cohen & Felson, Citation1979), and lifestyle theory (Hindelang et al., Citation1978) as complementary theories that help explain the historical evolution and social distribution of the risk of victimization (Garofalo, Citation1987). For example, Killias et al. (Citation2019) grouped them together under the common label of the situational approach, which may be seen as a theoretical paradigm. According to this paradigm, crime is the result of an opportunity and it can be prevented by reducing the opportunities to engage in crime rather than by changing human behavior (for details, see, Killias et al., Citation2019). Similarly, RAT and lifestyle theory have also been combined in the lifestyle-routine theory [LRAT] (Reyns et al., Citation2011), given opportunity theories’ appropriateness to explain the trends in criminality and shift in cybercrime (Linde & Aebi, Citation2020).

In the original version of the RAT, a predatory crime requires the convergence in time and space of a motivated offender, a suitable target, and the absence of a capable guardian (Cohen & Felson, Citation1979). This approach was developed to explain the increase in crime between 1947 and 1977 in the US. In particular, the increase in burglaries defied the classic prediction that property crime would diminish if socioeconomic indicators – such as life quality, purchasing power, education – improved. Cohen and Felson (Citation1979) postulated that the unpredicted increase in property crime was attributable to greater opportunities that emerged with the social and technological changes of the epoch, e.g., the increase in single-person households, women’s integration in the workforce, the augmentation of outdoor leisure, and the miniaturization of electronic devices that rendered household appliances lighter, easier to transport, and consequently, steal. This theory has evolved and been updated progressively, but its core remains similar to the original (Eck & Madensen, Citation2015).

Lifestyle theory (Hindelang et al., Citation1978) addresses the risk that an individual will become a victim of a personal crime. This theory emerged in part as an attempt to explain the divergence of crime victimization among demographic groups in early US victimization surveys. In that respect, Hindelang et al. (Citation1978) postulated that a person’s risky lifestyle was correlated positively with their risk of becoming the victim of a crime. In particular, they found that the risk of victimization was higher for young men than for women and the elderly, and explained that the difference was attributable to the greater amount of time men spent away from home that led to the increased likelihood of encountering risks (Hindelang et al., Citation1978).

Empirical research has tested and corroborated these theories to some extent. According to several studies, RAT demonstrates adequate power to explain traditional property crime (Argun & Dağlar, Citation2016; Corcoran et al., Citation2020; Johnson et al., Citation2010; Wickes et al., Citation2017), even if other research has refuted or found mixed support for this result (Massey et al., Citation1989; Moriarty & Williams, Citation1996). For instance, Massey et al. (Citation1989) found that only the amount of crime in the neighborhood and participants’ type of housing were related to victimization, but that was not the case for many guardianship measures (e.g., from spending time away from the household to having friends and relatives in the neighborhood) except having a job. Massey et al. (Citation1989) interpreted this finding by hypothesizing that people who experienced victimization would consequently tend to stay at home more and reduce their exposure to risky situations thereby. Nevertheless, the cross-sectional character of their study did not allow the causal and temporal order of such associations to be determined. At the same time, Wickes et al. (Citation2017) showed that other factors, such as neighborhood diversity, disadvantage, and residential instability, moderate the relation between guardianship and victimization. From a similar perspective, Moriarty and Williams (Citation1996) found greater support for RAT in socially disorganized areas than in low-crime zones. With respect to the demographic distribution of property victimization, most studies have found that victims are predominantly men and younger people (Massey et al., Citation1989; Mustaine & Tewksbury, Citation1998; Wickes et al., Citation2017). For an exception, see, Moriarty and Williams (Citation1996), who found no significant gender or age differences among the victims, while Van Dijk et al. (Citation1990) demonstrated that a high education level and high income are related to a greater risk of property victimization.

RAT was tested in cyberspace with specific cyber-offenses with promising outcomes, but also interesting nuances and differences from its application to traditional crime (Bossler & Holt, Citation2009; Choi & Lee, Citation2017; Holt & Bossler, Citation2008; Leukfeldt & Yar, Citation2016; Milani et al., Citation2020; Navarro & Jasinski, Citation2012; Reyns et al., Citation2011; Weulen Kranenbarg et al., Citation2019; Williams et al., Citation2019). For example, Leukfeldt and Yar (Citation2016) analyzed RAT’s applicability (N = 9,161) to six cybercrimes and found that the visibility of the target played a fundamental role in cybercrime victimization, while accessibility and personal capable guardianship showed varying results, and valuable and technical capable guardianship had no effects on the victimization outcome. Other studies have found a positive association between different forms of digital protection (e.g., antivirus) and online victimization, and this correlation may suggest that the absence of security software on personal devices could leave targets unaware of threats and actual victimization (Milani et al., Citation2020). With respect to the victims’ characteristics, they differ sometimes from the traditional profile of a young man; for example, Reyns (Citation2013) and Reyns et al. (Citation2019) found that older men and persons with a high income were the groups most at risk of experiencing cyber victimization by identity theft.

Finally, the application of lifestyle-routine activity theory to various forms of traditional crime (Estrada & Nilsson, Citation2008; McNeeley, Citation2015) and cyber offenses (Guerra & Ingram, Citation2020; Holt & Bossler, Citation2008; Ngo & Paternoster, Citation2011; Suh et al., Citation2020; Vakhitova et al., Citation2016) has also yielded mixed empirical findings, particularly vis-à-vis cybercrime. In cyberspace, online exposure usually enhances the risk of becoming the victim of a virus attack, computer hacking, online identity theft, or fraud (Guerra & Ingram, Citation2020; Holt et al., Citation2020; Reyns, Citation2013; Reyns & Randa, Citation2020; Reyns et al., Citation2016). However, Holt and Bossler (Citation2013) found no relation between online activities (e.g., online shopping; playing video games; checking e-mail; using chatrooms) and malware infection. Further, target suitability is not generally applicable to all types of cyber-offenses. In particular, clicking or opening links was related to virus infection (Ngo & Paternoster, Citation2011) and posting personal information to phishing, hacking, and malware victimization (Reyns, Citation2015). Nevertheless, some researchers have found results that contradict the theory (Guerra & Ingram, Citation2020; Holt & Bossler, Citation2013; Ngo & Paternoster, Citation2011; Reyns et al., Citation2011). In general, the most pivotal deviation concerns the presence of guardianship, which should decrease victimization theoretically, but whose direction in cyberspace is often the converse. Again, this weak negative association between guardianship and victimization is the result of the lack of temporal dependency in cross-sectional studies (Guerra & Ingram, Citation2020).

Research questions

In this study, the lifestyle-routine activity theory mentioned above provides the baseline for the empirical investigation of the correlates of traditional and online property crime victimization and the sociodemographic profile of multiple victims of online-offline property crimes, an under-studied population from this perspective. In this respect, this study seeks to answer the following research questions:

  1. What factors predict exposure to traditional and online property victimization?

  2. What sociodemographic characteristics do multiple victims of online-offline property crime share?

By answering these questions, we provide a first look at multivictims of property crime in both the material and virtual world and, while profiling vulnerable victims, we establish a framework with which to design specific preventive strategies.

Data and methods

To answer the research questions, this study relies on a large representative, stratified random sample of citizens aged 16 to 84 years old living in Lugano, Switzerland (for details on the survey, see, Caneppele et al., Citation2019). The survey was conducted from January to April 2019 by the Criminology Research Unit of the School of Criminal Justice at the University of Lausanne, and asked citizens about their past victimization experiences, including several property crime-related offenses. A total of 7,885 of 14,717 citizens participated in the survey: a response rate of 53%.

Operationalization of variables

Traditional and online property crime

The survey asked respondents about different types of traditional and online victimization episodes over the last five years. Traditional property crime victimization (hereinafter, TPC) comprised the following offenses: (1) burglary; (2) vehicle theft; (3) theft of objects from vehicles, and (4) pickpocketing. 7% of the total number of participants were victims of burglary, 5% of vehicle theft and theft of objects from vehicles, and 4% of pickpocketing over the previous five years. Hence, 17% were victims of traditional property crimes over that period.Footnote1 These figures reveal a lack of accentuated overlap between victims, and thus, heterogeneity among the profiles of the victims of the four offenses. On the other hand, online property crime victimization (hereinafter, OPC) involves (1) online fraud and (2) unauthorized use of personal data. Approximately 25% of the respondents were a victim of (at least) one of the two offenses over the last five years, particularly online fraud (18%), followed by unauthorized use of personal data (13%). The TPC and OPC indicators represent the dependent variables of this study. summarizes the descriptive statistics.

Table 1. Victimization rates.

Lifestyle-routine activities

Consistent with the previous research presented, this study investigates the lifestyle-routine activities of respondents over a range of traditional and online practices that reflect the most popular activities in which individuals engage regularly. To account for offline activities, we consider the time spent outdoors measured as the number of hours spent away from home daily and the number of evenings spent outside weekly. We generate two dummy variables in which we code as 1 those respondents who reported that they spend five or more hours away from home daily or go out three or more evenings weekly. In the digital environment, participants’ routine activities concern (1) the frequency of daily social media use, and (2) the frequency of online shopping, ordered on a scale from 1 “I do not do it” to 4 “I do it very often.” For each activity, increases in frequency should result in greater exposure to motivated offenders and thus, a greater likelihood of being a victim of crime.

Self-Guardianship

We consider several forms of self-guardianship, conceptualized as tools or behaviors that may prevent or protect a person from crimes, or self-guardianship attitudes that reveal a certain degree of risk awareness of the potential to be a victim of property crime. To cope with the heterogeneity of the offenses contained in the TPC indicator, we generate a single proxy of protection measure as the sum of a variety of tools and behaviors, as exhibited in the following statements: (1) I always keep my windows and doors locked; (2) I ask my neighbors to collect the correspondence when I am on holiday; (3) I leave the light on in my home when going out; (4) I have a burglar alarm system installed; (5) I get free advice from police security consultants on how to reduce the risk of burglary; (6) I am careful not to leave any valuable objects in my car; (7) I always lock my bag, and (8) I have purchased a car camera (dash cam). The result is a count variable with a maximum value of eight for respondents who take the utmost precautions. With respect to online behaviors, we consider the presence of the following protection measures as proof of self-guardianship: (1) I have installed an antivirus software on personal laptops; (2) I have activated a personal identification number (PIN) code (e.g., a PIN, fingerprint, or facial recognition) on a personal smartphone to prevent unauthorized access, and (3) I have noted the bank’s emergency telephone number to block a credit card in case of theft or loss. Once again, we generate a count variable with a maximum value of three if respondents adopt all of the protection measures mentioned above.

Perception of security/risk awareness

The perception of security can also affect the likelihood and frequency of certain activities and behaviors that minimize the risk of becoming a victim of crime. To cover this concept’s multidimensionality, we measure the perception of security by combining a set of variables related to (1) respondents’ feeling of safety, (2) concerns about crime and deviance in the neighborhood (e.g., worry about burglary, vehicle theft, pickpocketing, but also drug dealing and drug consumption, or vandalism and littering), and (3) witnessing crime and deviance in the neighborhood (e.g., drug dealing and drug consumption, alcohol consumption, vandalism, littering)Footnote2 into a composite indicator that ranges from (0) low perception of security to (1) high perception of security. With respect to OPC, the perception of security is a simple average of four categorical variables that target the respondents’ sense of security in (1) using the Internet, (2) browsing social media, (3) purchasing online goods, and (4) consulting their finances and/or making financial transactions using their e-banking account. Values range from 0 “I do not do it” to 4 “I feel perfectly safe doing it.”

Vulnerability of the potential victim

Another set of factors comprises an array of characteristics that describe the living and socioeconomic conditions of the potential targets of property crimes. We consider three different aspects of respondents’ lives. First, we asked respondents about the perception of their self-defense ability and digital literacy to verify whether a strong sense of self can reduce the likelihood of victimization. A dummy variable for self-defense ability indicates respondents who believe that they are fully capable of defending themselves physically against a person of their size. In the digital environment, citizens are classified dichotomously based upon their ability to solve smartphones problems without asking for help. Second, the type of dwelling and presence of cohabitants also provide or reduce opportunities for victimization.Footnote3 We include a dummy variable (and an interaction term) to account for the household type (dummy variable: 0 = living in a residential building; 1 = living in a single-family house) and composition (dummy variable: 0 = living in a family; 1 = living alone). Finally, we include fixed effects for gender (dummy variable: 0 = men; 1 = women), age (continuous), education (categorical variable: 1 = any school title; 2 = high school diploma; 3 = university degree), and employment status (categorical variable: 1 = employed, 2 = unemployed; 3 = inactive; 4 = students). The statistics of the independent variables are displayed in .

Table 2. Summary statistics of the independent variables.

Testing strategy

Given the dependent variables’ binary nature, logistic regression is used to model the effect of the aforementioned independent variables on the likelihood of TPC and OPC victimization. We run two different specifications, including the offline- or online-related variables mentioned in the previous section. The goodness-of-fit tests indicate that the data fit the two models (the Hosmer-Lemeshow Chi-squared test has p-values higher than 0.05), and the regression is specified appropriately (the Link test rejects the null hypothesis of model misspecification). Nonetheless, the set of independent variables explains the models’ observed variation marginally (Pseudo-R2 = 0.04 for the TPC model, 0.08 for the OPC model). As a robustness check, we estimate a bivariate probit regression, which allows two binary dependent variables to be modeled jointly as a function of several explanatory variables. The principal caveat is the presence of a significant correlation between the two dichotomous dependent variables, which, in our case, are correlated positively (rho = 0.18, p = .000).Footnote4 The results of the bivariate probit analysis are presented in the appendix ().

In addition, the individual characteristics of victims of multiple victimizations are associated with victims of one of the two indicators and persons who have not been victims of any property crime. In total, 390 individuals are victims of traditional and online property crimes. In this respect, we adopt both parametric and nonparametric tests to assess whether these groups’ individual characteristics differ statistically. For the variable age, we run the nonparametric Wilcoxon rank-sum test on the unmatched data (also known as the Mann-Whitney two-sample statistic), the non-parametric k-sample test on the equality of medians, and a t-test on the equality of means. For gender, education, and employment status, we perform the Chi2 test and Fisher’s exact test.

Results

The results of the logistic regressions are presented first. Given this study’s cross-sectional nature, the interpretation of the results is oriented solely to the identification of correlates rather than cause-effect relations between the independent and dependent variables. Then, we focus on the profiles of multiple victims of both TPC and OPC.

Correlates of traditional and online property crime victimization

In general, TPC victimization is related positively to participants’ lifestyle routines and protection measures, as well as their education level, and negatively to their perception of security (). In this respect, the probability of being a victim of TPC when the time spent outdoors is greater than three days or evenings weekly is 1.4 times higher than when more evenings are spent at home. Nonetheless, there is no correlation between the time spent outdoors during the day and TPC victimization.Footnote5 Further, an increase in the number of security measures adopted increases the likelihood of suffering property crime victimization slightly (OR = 1.1). High levels of perceived security in the close environment are associated with a lower likelihood of victimization (OR = 0.1). Participants’ perception of their self-defense ability or their housing composition are unrelated to TPC victimization. With respect to sociodemographic characteristics, a higher level of education increases the likelihood of being a victim of a property crime (OR = 1.4). However, neither gender, age, nor employment situation appear to play a role in participants’ TPC victimization.

Table 3. Binary logistic regression of traditional property crime victimization.

OPC victimization is related positively to participants’ lifestyle routines, online protection measures, housing composition, and educational level, while it is correlated negatively with the perception of online security and age (). Therefore, OPC correlates do not differ substantially from those presented in , and reveal similar patterns between traditional and online property crime victimization. In this sense, an increase in routine online activities is related to an increase in the likelihood of OPC victimization: The daily use of social media (OR = 1.2) and the frequent purchase of online goods (OR = 1.6) are related statistically significantly to OPC (p < .01). Installing security measures on personal devices is associated slightly (OR = 1.1) with increased online victimization. Participants’ high perception of online security is related negatively to their probability of victimization (OR = 0.8). Interestingly, living in a single-family house increases participants’ risk of suffering OPC victimization slightly (OR = 1.2). With respect to individual characteristics, we find statistically significant associations between both age and education and OPC victimization.Footnote6 The elderly generally browsed social media and used credit cards to purchase goods online less often than adolescents and adults, and thus have lower odds of victimization (OR = 0.99). Similarly, users who hold a university degree show a greater probability of victimization (OR = 2.1). However, this was not the case for gender or employment status, which seemed unrelated to the OPC victimization.

Table 4. Binary logistic regression of online property crime victimization.

Profiles of victims of TPC and OPC victimization

In this subsection, we compare the individual characteristics of targets of multiple victimizations of both TPC and OPC together with victims of only one TPC or OPC, as well as persons who have not been victims of any property crime. presents the differences in the age distribution across groups. According to the Wilcoxon rank-sum test, the age distributions between the groups differ significantly, and have a 58% probability that a random draw from the population of nonvictims returns an older respondent than a random draw from the population of victims who experience multiple victimizations. Similarly, the mean t-test and the medians’ test yields the same conclusions. According to the t-test, the mean age of a respondent who has not been a victim of any property crime is significantly higher than that of multiple victims (50.72 vs. 46.25, p < .01). Similar (but less striking) results are obtained when single victims vs. multiple victims are compared.

Table 5. Age distribution across groups of victims.

With respect to gender, education attainment, and employment status, we perform the Chi2 test and Fisher’s exact test (). Before running the tests, we convert education (1 = university degree; 0 = otherwise) and employment status (1 = active; 0 = otherwise) into dummy variables. According to the two tests, the number of men is higher than women and this difference is statistically significant (p < .01): the man-woman ratio among multiple victims is 1.27 compared to 0.95 in the groups of nonvictims and single victims. Differences in education (university graduates vs. undergraduates) are also statistically significant when the profile of multiple victims is compared with that of nonvictims (0.45 vs. 0.78, p < .01), indicating a higher proportion of victims with a high level of education in the group of multiple victims. As noted above, university graduates are exposed more to both traditional and online victimization. Therefore, the difference between multiple victims and victims of a single crime is less sharp and statistically significant only at p < .10. Lastly, the active-inactive ratio indicates a higher percentage of active workers within the population of multiple victims than the population of nonvictims (2.11 vs. 1.44) and single victims (2.11 vs. 1.70).

Table 6. Differences in individual characteristics across groups of victims.

Discussion

This article documents the correlation between offline and online property victimization and presents the sociodemographic profile of multiple victims of online-offline property crimes. In this context, the five-year prevalence of multiple victims of offline-online property crimes is extremely low in our sample: only 5% of participants reported multiple property victimizations. These figures are much lower than those in previous studies (Correia, Citation2020; Drew, Citation2020), although given that none of them compared multiple victimizations online-offline, the differences are contingent on the different phenomena considered. It is also worth mentioning that Swiss cities have experienced a low level of traditional crime since the 1970s, as noted in Clinard’s (Citation1978) classic book, Cities with little crime: The case of Switzerland. If we focus on multiple victims of property crimes, our results suggest that, in comparison with single-victims and nonvictims, multivictims are younger, in higher proportion men, highly educated, and actively employed.

Considering TPC and OPC separately, both indicators of property crime are correlated with an increase in crime prevention measures and a lifestyle that includes greater exposure to crime victimization. The latter implies that the longer the time spent online or outside the household at night, the greater the risk of victimization. The finding for traditional crimes coincides with the original version of lifestyle theory (Hindelang et al., Citation1978), and for online crimes, coincides with previous research on that topic (Guerra & Ingram, Citation2020; Holt et al., Citation2020; Reyns, Citation2013; Reyns et al., Citation2011; Reyns & Randa, Citation2020; Reyns et al., Citation2016). In contrast, the time spent away from home during the day is not correlated with the risk of property victimization, despite the fact that one of the offenses studied is burglary, a finding that is not completely consistent with the predictions of routine activities theory (Cohen & Felson, Citation1979), and thus warrants further research in a world in which telework is increasing rapidly.

Consistent with previous victimization surveys (for a review, see, Castro-Toledo, Citation2019), victims of property crimes had a lower perception of security than nonvictims. Contextual awareness may serve as a significant guardian in both the traditional world and cyberspace, and deter citizens and users from engaging in hazardous or prohibited behaviors that can expose them to (cyber) threats. Further, educational attainment is associated with a higher risk of crime victimization. According to previous research, the level of education influences a person’s lifestyle given the increased availability of, and access to, resources (Van Dijk et al., Citation1990; Van Kesteren et al., Citation2000). Our findings match these results for both traditional and online victimization. The latter may be attributable to the fact that a high level of education seldom implies manual work, and respondents with higher educational levels usually use IT more frequently, which increases their time spent online and hence the risk of that form of victimization. However, other individual variables affect neither TPC nor OPC victimization. Concretely, employment status and perception of self-defense ability or IT skills are not related to victimization, in contrast with theoretical expectations (Hindelang et al., Citation1978; Massey et al., Citation1989; Mustaine & Tewksbury, Citation1998; Wickes et al., Citation2017). Vis-à-vis the latter, it seems plausible to consider that self-defense perception (which corresponds to vulnerability perception, in the sense of Killias & Clerici, Citation2000) affects violent crimes more than property crimes.

The previous sections imply some degree of causal reasoning, which is the Achilles’ heel of cross-sectional research: This is particularly troublesome when trying to explain the correlation between the use of crime prevention measures and the risk of crime victimization, a result that is consistent with previous research (Guerra & Ingram, Citation2020; Massey et al., Citation1989; Milani et al., Citation2020; Ngo & Paternoster, Citation2011). The lack of a retrospective question – which Van Dijk et al. (Citation1990) introduced in this kind of questionnaire first – about the moment in which respondents adopted these measures does not allow us to conclude whether prevention failed or whether some protective measures (e.g., installing a burglar alarm system or a security software) were adopted in a response to previous victimization to avoid repeated episodes in the future. In addition, persons who do not apply strong protective measures in the online world may become victims of personal data breaches without even realizing it, and therefore, be unable to disclose that event in a victimization survey.

Other limitations are of importance and relate to (1) the design of the questionnaire and (2) modeling choices. The victimization survey was not designed to measure all of the theoretical principles in opportunity theories. For example, to avoid a lengthy questionnaire, we did not include any elements from the general theory of crime (Gottfredson & Hirschi, Citation1990) – which combines opportunities with self-control – and according to previous research, increases the offending and victimization risk (Pratt et al., Citation2014) and the cyber-victimization risk in part (Pratt et al., Citation2014; Reyns et al., Citation2019). In addition, the criminological literature suggests that online fraud may be related to specific web browsers and operating systems, which constitute variables that are often beyond individuals’ knowledge and control (Maimon et al., Citation2015). Hence, in this study, we did not ask the respondents for technical details of their Internet connections and devices. Further, while participants would probably know if they were victims of robbery, burglary, pickpocketing, or car theft, it is less clear whether they noticed whether they were victims of data breaches, for example. The latter poses a problem of validity and reliability that is inherent to cybercrime research. Accordingly, researchers are trying currently to adapt the questionnaires to the victims’ technical knowledge (Junger & Hartel, Citation2022), but we did not engage in that kind of development. The last challenge concerns the composite indicator of property crimes, the use of which was inevitable because of the low prevalence of property crimes that the interviewees reported. This choice imposed the risk of an aggregation bias attributable to combining different crimes (house theft vs. pickpocketing), and reduced the ability to identify any differences in the correlates of each offense. The low Pseudo-R2 value of the main specification is a partial effect of this limitation. Future research should consider these shortcomings to obtain reliable results.

Conclusion

This study investigated the relation between lifestyle, routine activities, and traditional and online property crime victimization with a sample of Swiss respondents. The evidence suggests that the frequency with which individuals expose themselves to potential victimization influences their likelihood of becoming a victim of patrimony crimes, including burglary, theft, pickpocketing, unauthorized use of personal data, and online fraud. Policymakers should attend to this association and develop prevention strategies and law enforcement programs tailored to multiple victims – i.e., a small group of victims that endures a large proportion of crime – without discouraging the everyday activities of millions of people. We recommend that prevention strategies should protect against repeated episodes of victimization, support victims of repeated crimes over time, and increase awareness of those offenses that might be imperceptible, and therefore difficult to address and prevent (e.g., unauthorized use of personal data). Increasing awareness of the risks associated with certain routine activities is crucial to reduce people’s feelings of insecurity and their fear of experiencing repeated forms of victimization in the future. This is even more important for those victims whose exposure to property crime victimization is higher, particularly men, young persons, those employed actively, and university graduates, who, according to this study, are at greater risk of multiple victimizations in both the traditional world and cyberspace.

Acknowledgments

The authors would like to acknowledge the Municipality of Lugano and the City of Lugano Police (Switzerland) for supporting the project LOSAI - “La Sicurezza a Lugano nel 2019.”

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

The data presented in this study have been collected from the LOSAI survey, which was financially supported by the Municipality of Lugano and the City of Lugano Police (Switzerland).

Notes

1. The low rates of self-reported victimization do not allow each offense to be investigated individually.

2. The composite indicator is the result of a principal component analysis (PCA), the factors in which meet the PCA assumptions (eigenvalue>1, explained 70% of the variance overall, each component explained at least 10% of the total model variability) and are aggregated based upon the proportion of variance each component explains (Jolliffe, Citation2002).

3. Reyns et al. (Citation2016) examined the effect of personal-based guardianship (e.g., the type of living arrangement or the presence of a romantic partner or roommates) in deterring Internet users from engaging in deviant or risky behaviors online.

4. The tetrachoric correlation is used to measure the correlation between the two binary variables.

5. In the bivariate probit regression, the relation between spending five or more hours away from home daily and TPC victimization is significant (p < 0.05).

6. In the bivariate probit regression, being a woman correlates negatively with OPC victimization (p < 0.10).

References

  • Aebi, M. F. (2010). Methodological issues in the comparison of police-recorded crime rates. In S. G. Shoham, P. Knepper, & M. Kett (Eds.), International handbook of criminology (pp. 237–254). Routledge.
  • Aebi, M. F., Caneppele, S., Harrendorf, S., Hashimoto, Y., Jehle, J.-M., Khan, T. S., Kühn, O., Lewis, C., Molnar, L., Þórisdóttir, R., & Smit, P. (2021). European sourcebook of crime and criminal justice statistics 2021. UNILCRIM 1 (2021). University of Lausanne. https://wp.unil.ch/europeansourcebook/files/2021/08/ESB_Final_210731.pdf
  • Andrea, N., & Álvarez-García, D. (2021). Anxiety and self-esteem in cyber-victimization profiles of adolescents. Comunicar, 29(67), 47–59. https://doi.org/10.3916/C67-2021-04
  • Argun, U., & Dağlar, M. (2016). Examination of routine activities theory by the property crime. International Journal of Human Sciences, 13(1), 1188–1198. https://doi.org/10.14687/ijhs.v13i1.3665
  • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420. http://www.cybercrimejournal.com/bosslerholtijcc2009.pdf
  • Caneppele, S., Milani, R., Burkhardt, C., & Aebi, M. F. (2019). La sicurezza a Lugano nel 2019: Sintesi dei risultati. UNILCRIM 1 (6). Université de Lausanne. https://serval.unil.ch/resource/serval:BIB_38F0E096D894.P001/REF.pdf
  • Castro-Toledo, F. J. (2019). Sociedad tecnológica y miedo al crimen. Edisofer.
  • Choi, K.-S., & Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. Computers in Human Behavior, 73, 394–402. https://doi.org/10.1016/j.chb.2017.03.061
  • Clinard, M. B. (1978). Cities with little crime: The case of Switzerland. Cambridge University Press.
  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589
  • Corcoran, K. E., Scheitle, C. P., & Hudnall, E. B. (2020). Organizational activities and property-crime victimization. The Sociological Quarterly, 61(1), 164–186. https://doi.org/10.1080/00380253.2019.1583047
  • Correia, S. G. (2020). Patterns of online repeat victimisation and implications for crime prevention [Paper presentation]. 2020 APWG Symposium on Electronic Crime Research (ECrime). https://doi.org/10.1109/eCrime51433.2020.9493258
  • Drew, J. M. (2020). A study of cybercrime victimisation and prevention: Exploring the use of online crime prevention behaviours and strategies. Journal of Criminological Research, Policy and Practice, 6(1), 17–33. https://doi.org/10.1108/JCRPP-12-2019-0070
  • Eck, J. E., & Madensen, T. D. (2015). Meaningfully and artfully reinterpreting crime for useful science: An essay on the value of building with simple theory. In M. A. Andresen & G. Farrell (Eds.), The criminal act: The role and influence of routine activity theory (pp. 5–18). Palgrave Macmillan UK.
  • Estrada, F., & Nilsson, A. (2008). Segregation and victimization: Neighbourhood resources, individual risk factors and exposure to property crime. European Journal of Criminology, 5(2), 193–216. https://doi.org/10.1177/1477370807087642
  • Everson, S. (2003). Repeat victimisation and prolific offending: Chance or choice? International Journal of Police Science & Management, 5(3), 180–194. https://doi.org/10.1350/ijps.5.3.180.16068
  • Fales, J. L., Rice, S., Aaron, R. V., & Palermo, T. M. (2018). Traditional and cyber-victimization among adolescents with and without chronic pain. Health Psychology, 37(3), 291–300. https://doi.org/10.1037/hea0000569
  • Farrell, G. (1992). Multiple victimisation: Its extent and significance. International Review of Victimology, 2(2), 85–102. https://doi.org/10.1177/026975809200200201
  • Farrell, G. (1993). Repeated criminal victimisation. The University of Manchester.
  • Garofalo, J. (1987). Reassessing the lifestyle model of criminal victimization. In M. R. Gottfredson & T. Hirschi (Eds.), Positive criminology (pp. 23–42). Sage.
  • Gini, G., Marino, C., Xie, J. Y., Pfetsch, J., & Pozzoli, T. (2019). Associations of traditional and peer cyber-victimization with adolescents’ Internet use: A latent profile analysis. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 13(4), 1–20. https://doi.org/10.5817/CP2019-4-1
  • Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford University Press.
  • Guerra, C., & Ingram, J. R. (2020). Assessing the relationship between lifestyle routine activities theory and online victimization using panel data. Deviant Behavior, 43(1), 1–17. https://doi.org/10.1080/01639625.2020.1774707
  • Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization. Ballinger Pub. Co.
  • Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25. https://doi.org/10.1080/01639620701876577
  • Holt, T. J., & Bossler, A. M. (2013). Examining the relationship between routine activities and malware infection indicators. Journal of Contemporary Criminal Justice, 29(4), 420–436. https://doi.org/10.1177/1043986213507401
  • Holt, T. J., van Wilsem, J., van de Weijer, S., & Leukfeldt, R. (2020). Testing an integrated self-control and routine activities framework to examine malware infection victimization. Social Science Computer Review, 38(2), 187–206. https://doi.org/10.1177/0894439318805067
  • Johnson, B. R., Yalda, C. A., & Kierkus, C. A. (2010). Property crime at O’Hare international airport: An examination of the routine activities approach. Journal of Applied Security Research, 5(1), 42–63. https://doi.org/10.1080/19361610903407814
  • Jolliffe, I. (2002). Principal Component Analysis. Springer-Verlag.
  • Junger, M., & Hartel, P. (2022). Crime survey & cybercrime: The state-of-the-art. In M. F. Aebi, S. Caneppele, & L. Molnar (Eds.), Measuring cybercrime in the time of Covid-19: The role of crime and criminal justice statistics. Eleven.
  • Killias, M. (2006). The opening and closing of breaches: A theory on crime waves, law creation and crime prevention. European Journal of Criminology, 3(1), 11–31. https://doi.org/10.1177/1477370806059079
  • Killias, M., Aebi, M. F., & Kuhn, A. (2019). Précis de criminologie (3rd ed.). Stämpfli Verlag AG.
  • Killias, M., & Clerici, C. (2000). Different measures of vulnerability in their relation to different dimensions of fear of crime. British Journal of Criminology, 40(3), 437–450. https://doi.org/10.1093/bjc/40.3.437
  • Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. https://doi.org/10.1080/01639625.2015.1012409
  • Linde, A., & Aebi, M. F. (2020). La criminologie comparée à l’heure de la société numérique: Les théories traditionnelles peuvent-elles expliquer les tendances de la cyber-délinquance? Revue Internationale de Criminologie et de Police Technique et Scientifique, 73, 387–414. https://www.polymedia.ch/fr/criminologie-comparee-societe-numerique-cyber-delinquance/
  • Maimon, D., Wilson, T., Ren, W., & Berenblum, T. (2015). On the relevance of spatial and temporal dimensions in assessing computer susceptibility to system trespassing incidents. The British Journal of Criminology, 55(3), 615–634. https://doi.org/10.1093/bjc/azu104
  • Massey, J. L., Krohn, M. D., & Bonati, L. M. (1989). Property crime and the routine activities of individuals. Journal of Research in Crime and Delinquency, 26(4), 378–400. https://doi.org/10.1177/0022427889026004004
  • Matthews, R., Pease, C., & Pease, K. (2001). Repeated bank robbery: Theme and variations. Crime Prevention Studies, 12, 153–164. https://repository.lboro.ac.uk/articles/journal_contribution/Repeated_bank_robbery_themes_and_variations/9580787
  • McNeeley, S. (2015). Lifestyle-routine activities and crime events. Journal of Contemporary Criminal Justice, 31(1), 30–52. https://doi.org/10.1177/1043986214552607
  • Milani, R., Caneppele, S., & Burkhardt, C. (2020). Exposure to cyber victimization: Results from a swiss survey. Deviant Behavior, 43(2), 1–13. https://doi.org/10.1080/01639625.2020.1806453
  • Moneva, A., Leukfeldt, E. R., Van De Weijer, S. G. A., & Miró-Llinares, F. (2022). Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective. Computers in Human Behavior, 126, 1–11. https://doi.org/10.1016/j.chb.2021.106984
  • Moneva, A., Miró-Llinares, F., & Hart, T. C. (2020). Hunter or prey? Exploring the situational profiles that define repeated online harassment victims and offenders. Deviant Behavior, 42(11), 1366–1381. https://doi.org/10.1080/01639625.2020.1746135
  • Moriarty, L. J., & Williams, J. E. (1996). Examining the relationship between routine activities theory and social disorganization: An analysis of property crime victimization. American Journal of Criminal Justice, 21(1), 43–59. https://doi.org/10.1007/BF02887429
  • Mustaine, E. E., & Tewksbury, R. (1998). Predicting risks of larceny theft victimization: A routine activity analysis using refined lifestyle measures. Criminology, 36(4), 829–858. https://doi.org/10.1111/j.1745-9125.1998.tb01267.x
  • Navarro, J. N., & Jasinski, J. L. (2012). Going cyber: Using routine activities theory to predict cyberbullying experiences. Sociological Spectrum, 32(1), 81–94. https://doi.org/10.1080/02732173.2012.628560
  • Ngo, F., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773–793. https://www.cybercrimejournal.com/ngo2011ijcc.pdf
  • Notté, R., Leukfeldt, E. R., & Malsch, M. (2021). Double, triple or quadruple hits? Exploring the impact of cybercrime on victims in the Netherlands. International Review of Victimology, 27(3), 272–294. https://doi.org/10.1177/02697580211010692
  • Office fédéral de la statistique. (2019). Utilisation d’internet. https://www.bfs.admin.ch/bfs/fr/home/statistiken/kultur-medien-informationsgesellschaft-sport/informationsgesellschaft/gesamtindikatoren/haushalte-bevoelkerung/internetnutzung.html
  • Office Fédéral de la Statistique. (2021). Criminalité numérique. https://www.bfs.admin.ch/bfs/fr/home/statistiken/kriminalitaet-strafrecht/polizei/digitale-kriminalitaet.html
  • Pratt, T. C., Turanovic, J. J., Fox, K. A., & Wright, K. A. (2014). Self-control and victimization: A meta-analysis. Criminology, 52(1), 87–116. https://doi.org/10.1111/1745-9125.12030
  • Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238. https://doi.org/10.1177/0022427811425539
  • Reyns, B. W. (2015). A routine activity perspective on online victimisation: Results from the Canadian general social survey. Journal of Financial Crime, 22(4), 396–411. https://doi.org/10.1108/JFC-06-2014-0030
  • Reyns, B. W., Fisher, B. S., Bossler, A. M., & Holt, T. J. (2019). Opportunity and self-control: Do they predict multiple forms of online victimization? American Journal of Criminal Justice, 44(1), 63–82. https://doi.org/10.1007/s12103-018-9447-5
  • Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle–routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149–1169. https://doi.org/10.1177/0093854811421448
  • Reyns, B. W., & Randa, R. (2020). No honor among thieves: Personal and peer deviance as explanations of online identity fraud victimization. Security Journal, 33(2), 228–243. https://doi.org/10.1057/s41284-019-00182-w
  • Reyns, B. W., Randa, R., & Henson, B. (2016). Preventing crime online: Identifying determinants of online preventive behaviors using structural equation modeling and canonical correlation analysis. Crime Prevention and Community Safety, 18(1), 38–59. https://doi.org/10.1057/cpcs.2015.21
  • Suh, J., Choe, J., & Park, J. (2020). A lifestyle-routine activity theory (LRAT) approach to cybercrime victimization: An empirical assessment of SNS lifestyle exposure activities. Asia Pacific Journal of Information Systems, 30(1), 53–71. https://doi.org/10.14329/apjis.2020.30.1.53
  • Trajtenberg, N., Dodel, M., De Ribera, S., Cabello, O., & Claro, M. (2021). Online and offline victimisation: A cluster analysis of adolescent victims of bullying and cyber-bullying in Chile. Journal of Children and Media, 15(4), 1–20. https://doi.org/10.1080/17482798.2021.1902358
  • Turner, H. A., Finkelhor, D., & Ormrod, R. (2010). Poly-victimization in a national sample of children and youth. American Journal of Preventive Medicine, 38(3), 323–330. https://doi.org/10.1016/j.amepre.2009.11.012
  • Vakhitova, Z. I., Reynald, D. M., & Townsley, M. (2016). Toward the adaptation of routine activity and lifestyle exposure theories to account for cyber abuse victimization. Journal of Contemporary Criminal Justice, 32(2), 169–188. https://doi.org/10.1177/1043986215621379
  • Van Dijk, J. J., Mayhew, P., & Killias, M. (1990). Experiences of crime across the world: Key findings from the 1989 international crime survey. Kluwer Law and Taxation Publishers.
  • van Kesteren, J., Mayhew, P., & Nieuwbeerta, P. (2000). Criminal victimisation in seventeen industrialised countries: Key findings from the 2000 international crime victims survey. WODC Publications.
  • Wang, J., Iannotti, R. J., Luk, J. W., & Nansel, T. R. (2010). Co-occurrence of victimization from five subtypes of bullying: Physical, verbal, social exclusion, spreading rumors, and cyber. Journal of Pediatric Psychology, 35(10), 1103–1112. https://doi.org/10.1093/jpepsy/jsq048
  • Weulen Kranenbarg, M., Holt, T. J., & van Gelder, J. L. (2019). Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap. Deviant Behavior, 40(1), 40–55. https://doi.org/10.1080/01639625.2017.1411030
  • Whitty, M. T. (2019). Predicting susceptibility to cyber-fraud victimhood. Journal of Financial Crime, 26(1), 277–292. https://doi.org/10.1108/JFC-10-2017-0095
  • Wickes, R., Zahnow, R., Schaefer, L., & Sparkes-Carroll, M. (2017). Neighborhood guardianship and property crime victimization. Crime and Delinquency, 63(5), 519–544. https://doi.org/10.1177/0011128716655817
  • Williams, M. L., Levi, M., Burnap, P., & Gundur, R. V. (2019). Under the corporate radar: Examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior, 40(9), 1119–1131. https://doi.org/10.1080/01639625.2018.1461786

Appendix

Table A1. Bivariate probit regression.