12,266
Views
252
CrossRef citations to date
0
Altmetric
Original Articles

Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization

&
Pages 1-25 | Received 06 Sep 2007, Accepted 13 Nov 2007, Published online: 11 Dec 2008

REFERENCES

  • Bjerregaard , Beth. 2000 . “ An Empirical Study of Stalking Victimization. ” Violence and Victims 15 : 389 – 406 .
  • Bocij , Paul. 2004 . Cyberstalking: Harassment in the Internet Age and How to Protect Your Family . Westport , CT : Praeger .
  • Cohen , Lawrence E. and Marcus Felson. 1979 . “ Social Change and Crime Rate Trends: A Routine Activity Approach. ” American Sociological Review 44 : 588 – 608 .
  • Computer Security Institute . 2007 . “Computer Crime and Security Survey.” Retrieved June 3, 2007, from (http://www.cybercrime.gov/FBI2006.pdf) .
  • Daly , Kathleen and Lisa Maher. 1998 . Criminology at the Crossroads: Feminist Readings in Crime and Justice . Oxford : Oxford University Press .
  • Finkelhor , David , Kimberly J. Mitchell , and Janice Wolak . 2000 . Online Victimization: A Report on the Nation's Youth . Washington , DC : National Center for Missing and Exploited Children .
  • Finn , Jerry. 2004 . “ A Survey of Online Harassment at a University Campus. ” Journal of Interpersonal Violence 19 ( 4 ): 468 – 483 .
  • Fisher , Bonnie S. , Francis T. Cullen , and Michael G. Turner . 2002 . “ Being Pursued: Stalking Victimization in a National Study of College Women. ” Criminology and Public Policy 1 ( 2 ): 257 – 308 .
  • Furnell , Steven. 2002. Cybercrime: Vandalizing the Information Society . Boston , MA : Addison-Wesley.
  • Gilboa , N. 1996 . “Elites, Lamers, Narcs and Whores: Exploring the Computer Underground.” Pp. 98 – 113 . In Wired Women: Gender and New Realities in Cyberspace , edited by L. Cherny and E. R. Weise. Seattle , WA : Seal Press .
  • Grabosky , Peter N. 2001 . “ Virtual Criminality: Old Wine in New Bottles? ” Social and Legal Studies 10 : 243 – 249 .
  • Grabosky P. N. and Smith R. 2001 . “Telecommunication Fraud in the Digital Age: The Convergence of Technologies.” Pp. 29 – 43 . In Crime and the Interneti> , edited by D. Wall . New York : Routledge .
  • Herring , S. C. 1999 . “ The Rhetorical Dynamics of Gender Harassment Online. ” The Information Society 15 ( 3 ): 151 – 167 .
  • Higgins , George E. 2005 . “ Can Low Self-Control Help with the Understanding of the Software Piracy Problem? ” Deviant Behavior 26 ( 1 ): 1 – 24 .
  • Holt , Thomas J. 2007 . “ Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures. ” Deviant Behavior 28 ( 2 ): 171 – 198 .
  • Internet Crime Complaint Center . 2007 . “Internet Crime Report.” Retrieved on April 25, 2007 from(www.ic3.gov/media/annualreport/2006_IC3Report.pdf) .
  • Jensen , Gary F. and David Brownfield. 1986 . “ Gender, Lifestyles, and Victimization: Beyond Routine Activity. ” Violence and Victims 1 : 85 – 99 .
  • Jordan , Tim and Paul Taylor. 1998 . “ A Sociology of Hackers. ” The Sociological Review 46 ( 4 ): 757 – 780 .
  • Lauritsen , Janet L. , John H. Laub , and Robert J. Sampson . 1992 . “ Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents. ” Violence and Victims 7 : 91 – 108 .
  • Logan , T. K. , Carl Leukefeld , and Robert Walker . 2000 . “ Stalking as a Variant of Intimate Violence: Implications from a Young Adult Sample. ” Violence and Victims 15 : 91 – 111 .
  • Miethe , Terance D. and Robert F. Meier. 1994 . Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations . Albany : SUNY Press .
  • Mustaine , Elizabeth Ehrhardt , and Richard Tewksbury. 1998 . “ Predicting Risk of Larceny Theft Victimization: A Routine Activity Analysis Using Refined Lifestyle Measures. ” Criminology 36 : 829 – 857 .
  • Newman , Grame and Ronald Clarke. 2003 . Superhighway Robbery: Preventing E-Commerce Crime . Cullompton , UK : Willan Press.
  • Osgood , D. Wayne , Janet K. , Wilson , Patrick M. O'Malley , Jerald G. Bachman , and Lloyd D. Johnston . 1996 . “ Routine Activities and Individual Deviant Behavior. ” American Sociological Review 61 ( 4 ): 635 – 655 .
  • Patchin , Justin and Sameer Hinduja. 2007. “What Kids Do on MySpace.” Technology and Learning 27(7):7.
  • Pease , K. 2001 . “Crime Futures and Foresight: Challenging Criminal Behavior in the Information Age.” Pp. 18 – 28 . In Crime and the Internet , edited by D. Wall . New York : Routledge .
  • Rogers , Marcus K. 2001 . A Social Learning Theory and Moral Disengagement Analysis of Criminal Computer Behavior: An Exploratory Study. Unpublished doctoral dissertation. Manitoba University, Canada .
  • Sampson , Robert J. and Janet L. Lauritsen. 1990 . “ Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence. ” Journal of Research in Crime and Delinquency 27 : 110 – 139 .
  • Schwartz , Martin D. and Victoria L. Pitts. 1995 . “ Exploring a Feminist Routine Activities Approach to Explaining Sexual Assault. ” Justice Quarterly 12 : 9 – 31 .
  • Skinner , William F. and Anne M. Fream. 1997 . “ A Social Learning Theory Analysis of Computer Crime among College Students. ” Journal of Research in Crime and Delinquency 34 ( 4 ): 495 – 518 .
  • Taylor , Paul A. 2003 . “Maestros or Misogynists? Gender and the Social Construction of Hacking.” Pp. 126 – 146 . In Dot.cons: Crime, Deviance and Identity on the Internet , edited by Y. Jewkes . Portland , OR : Willan Publishing .
  • Taylor , Robert W. , Tory J. Caeti , D. Kall Loper , Eric J. Fritsch , and John Lieder bach . 2006 . Digital Crime and Digital Terrorism . Upper Saddle River , NJ : Pearson Prentice Hall .
  • Tjaden , Patricia and Nancy Thoenees. 1998 . Stalking in America: Findings from the National Violence Against Women Survey . US Department of Justice , Office of Justice Programs. Washington, DC : US Government Printing Office .
  • Wall , D. S. 2001 . “Cybercrimes and the Internet.” Pp. 1 – 17 . In Crime and the Internet , edited by D. S. Wall . New York : Routledge .
  • Yar , Majid. 2005 . “ The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory. ” European Journal of Criminology 2 ( 4 ): 407 – 427 .
  • Zhang , Lening, , John W. Welte , and William F. Wiecxorek. 2001. “Deviant Lifestyle and Crime Victimization.” Journal of Criminal Justice 29:133–143.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.