References
- Allison, Paul D. 2001. Missing Data. Thousand Oaks, CA: Sage Publications.
- Anderson, Ross., Chris Barton, Rainer Böhme, Richard Clayton, Carlos Gañán, Tom Grasso, Michael Levi, Tyler Moore, and Marie Vasek. 2019. “Measuring the Changing Cost of Cybercrime.” The 18th Annual Workshop on the Economics of Information Security. doi:https://doi.org/10.17863/CAM.41598.
- Bossler, Adam M. and Thomas J. Holt. 2009. “On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory.” International Journal of Cyber Criminology 3 (1):400–20.
- Butcher, Mike. 2010. “Dutch Social Network Hyves Sold to Media Group, as European-based Networks Feel the Facebook Heat.” Retrieved January 01, 2020 (https://techcrunch.com/2010/11/01/dutch-social-network-hyves-sold-to-media-group-as-european-based-feel-the-facebook-heat/).
- Claes, L., H. Vertommen, and N. Braspenning. 2000. “Psychometric Properties of the Dickman Impulsivity Inventory.” Personality and Individual Differences 29 (1):27–35. doi:https://doi.org/10.1016/S0191-8869(99)00172-5.
- Cohen, Lawrence E. and Marcus Felson. 1979. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44 (4):588–608. doi:https://doi.org/10.2307/2094589.
- Collins, Linda M., Joseph L. Schafer, and Chi-Ming Kam. 2001. “A Comparison of Inclusive and Restrictive Strategies in Modern Missing Data Procedures.” Psychological Methods 6 (4):330. doi:https://doi.org/10.1037//1082-989X.6.4.330.
- d’Haenens, Leen., Joyce Koeman, and Frieda Saeys. 2007. “Digital Citizenship among Ethnic Minority Youths in the Netherlands and Flanders.” New Media & Society 9 (2):278–99. doi:https://doi.org/10.1177/1461444807075013.
- Dickman, S J. 1990. “Functional and Dysfunctional Impulsivity: Personality and Cognitive Correlates.” Journal of Personality and Social Psychology 58 (1):95–102. doi:https://doi.org/10.1037/0022-3514.58.1.95.
- Eck, John E. and Ronald V. Clarke. 2003. “Classifying Common Police Problems: A Routine Activity Approach.” Pp. 7–39 in Theory for Practice in Situational Crime Prevention, edited by M. J. Smith and D B. Cornish. Monsey, NY: Criminal Justice Press.
- Garofalo, James. 1987. “Reassessing the Lifestyle Model of Criminal Victimization.” Pp. 23–42 in Positive Criminology, edited by M. R. Gottfredson and T. Hirschi. Thousand Oaks, CA: Sage Publications.
- Garofalo, James, Leslie Siegel, and John Laub. 1987. “School-Related Victimizations among Adolescents: An Analysis of National Crime Survey (NCS) Narratives.” Journal of Quantitative Criminology 3 (4):321–38. doi:https://doi.org/10.1007/BF01066834.
- Golladay, Katelyn and Kristy Holtfreter. 2017. “The Consequences of Identity Theft Victimization: An Examination of Emotional and Physical Health Outcomes.” Victims & Offenders 12 (5):741–60. doi:https://doi.org/10.1080/15564886.2016.1177766.
- Graham, John W. 2009. “Missing Data Analysis: Making It Work in the Real World.” Annual Review of Psychology 60 (1):549–76. doi:https://doi.org/10.1146/annurev.psych.58.110405.085530.
- Harrell, Erika. 2019. Victims of Identity Theft, 2016. Washington, DC: Bureau of Justice Statistics. Retrieved January 1, 2020 (https://www.bjs.gov/content/pub/pdf/vit16.pdf).
- Higgins, George E., Scott E. Wolfe, and Catherine D. Marcum. 2008. “Music Piracy and Neutralization: A Preliminary Trajectory Analysis from Short-Term Longitudinal Data.” International Journal of Cyber Criminology 2 (2):324–36.
- Hindelang, Michael J., Michael R. Gottfredson, and James. Garofalo. 1978. Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization. Cambridge, MA: Ballinger.
- Holt, Thomas J. and Adam M. Bossler. 2008. “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” Deviant Behavior 30 (1):1–25. doi:https://doi.org/10.1080/01639620701876577.
- Holt, Thomas J. and Adam M. Bossler. 2013. “Examining the Relationship between Routine Activities and Malware Infection Indicators.” Journal of Contemporary Criminal Justice 29 (4):420–36. doi:https://doi.org/10.1177/1043986213507401.
- Holt, Thomas J., Johan van Wilsem, Steve van de Weijer, and Rutger Leukfeldt. 2018. “Testing an Integrated Self-Control and Routine Activities Framework to Examine Malware Infection Victimization.” Social Science Computer Review. doi:https://doi.org/10.1177/0894439318805067.
- Internet Crime Complaint Center (IC3). 2018. 2017 Internet Crime Report (IC3). Retrieved January 1, 2020 (https://pdf.ic3.gov/2017_IC3Report.pdf).
- Kline, Rex B. 2016. Principles and Practice of Structural Equation Modeling. 4th ed. New York: NY: The Guilford Press.
- Lauritsen, Janet L. and Kenna F. Davis Quinet. 1995. “Repeat Victimization among Adolescents and Young Adults.” Journal of Quantitative Criminology 11 (2):143–66. doi:https://doi.org/10.1007/BF02221121.
- Leukfeldt, Eric R. and Majid Yar. 2016. “Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis.” Deviant Behavior 37 (3):263–80. doi:https://doi.org/10.1080/01639625.2015.1012409.
- Nedelec, Joseph L. 2018. “Individual Differences and Co-occurring Victimization Online and Offline: The Role of Impulsivity.” Personality and Individual Differences 133:77–84. doi:https://doi.org/10.1016/j.paid.2016.11.028.
- Newsom, Jason T. 2015. Longitudinal Structural Equation Modeling: A Comprehensive Introduction. New York, NY: Routledge.
- Ngo, Fawn T. and Raymond Paternoster. 2011. “Cybercrime Victimization: An Examination of Individual and Situational Level Factors.” International Journal of Cyber Criminology 5 (1):773–93.
- Pratt, Travis C., Kristy Holtfreter, and Michael D. Reisig. 2010. “Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory.” Journal of Research in Crime and Delinquency 47 (3):267–96. doi:https://doi.org/10.1177/0022427810365903.
- Pratt, Travis C. and Jillian J. Turanovic. 2015. “Lifestyle and Routine Activity Theories Revisited: The Importance of “Risk” to the Study of Victimization.” Victims & Offenders 11 (3):335–54. doi:https://doi.org/10.1080/15564886.2015.1057351.
- Randa, Ryan and Bradford W. Reyns. 2019. “The Physical and Emotional Toll of Identity Theft Victimization: A Situational and Demographic Analysis of the National Crime Victimization Survey.” Deviant Behavior 1–15. doi:https://doi.org/10.1080/01639625.2019.1612980.
- Reyns, Bradford W. 2013. “Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory beyond Direct-Contact Offenses.” Journal of Research in Crime and Delinquency 50 (2):216–38. doi:https://doi.org/10.1177/0022427811425539.
- Reyns, Bradford W. 2015. “A Routine Activity Perspective on Online Victimisation: Results from the Canadian General Social Survey.” Journal of Financial Crime 22 (4):396–411. doi:https://doi.org/10.1108/JFC-06-2014-0030.
- Reyns, Bradford W., Billy Henson, and Bonnie S. Fisher. 2011. “Being Pursued Online: Applying Cyberlifestyle–Routine Activities Theory to Cyberstalking Victimization.” Criminal Justice and Behavior 38 (11):1149–69. doi:https://doi.org/10.1177/0093854811421448.
- Reyns, Bradford W. and Ryan Randa. 2019. “No Honor among Thieves: Personal and Peer Deviance as Explanations of Online Identity Fraud Victimization.” Security Journal 1–16. doi:https://doi.org/10.1057/s41284-019-00182-w.
- Reyns, Bradford W., Ryan Randa, and Billy Henson. 2016. “Preventing Crime Online: Identifying Determinants of Online Preventive Behaviors Using Structural Equation Modeling and Canonical Correlation Analysis.” Crime Prevention and Community Safety 18 (1):38–59. doi:https://doi.org/10.1057/cpcs.2015.21.
- Sanjeev., Dewan, Dale Ganley, and Kenneth L. Kraemer. 2010. “Complementarities in the Diffusion of Personal Computers and the Internet: Implications for the Global Digital Divide.” Information Systems Research 21 (4):925–40. doi:https://doi.org/10.1287/isre.1080.0219.
- Schreck, Christopher J., Eric A. Stewart, and Bonnie S. Fisher. 2006. “Self-control, Victimization, and Their Influence on Risky Lifestyles: A Longitudinal Analysis Using Panel Data.” Journal of Quantitative Criminology 22 (4):319–40. doi:https://doi.org/10.1007/s10940-006-9014-y.
- Tihomir, Asparouhov and Muthén. Bengt. 2010. “Weighted Least Squares Estimation with Missing Data.” Mplus Technical Appendix 2010:1–10.
- Turanovic, Jillian J. and Travis C. Pratt. 2014. ““Can’t Stop, Won’t Stop”: Self-Control, Risky Lifestyles, and Repeat Victimization.” Journal of Quantitative Criminology 30 (1):29–56. doi:https://doi.org/10.1007/s10940-012-9188-4.
- Turanovic, Jillian J., Travis C. Pratt, and Alex R. Piquero. 2018. “Structural Constraints, Risky Lifestyles, and Repeat Victimization.” Journal of Quantitative Criminology 34 (1):251–74. doi:https://doi.org/10.1007/s10940-016-9334-5.
- van Wilsem, Johan. 2011a. “‘Bought It, but Never Got It’ Assessing Risk Factors for Online Consumer Fraud Victimization.” European Sociological Review 29 (2):168–78. doi:https://doi.org/10.1093/esr/jcr053.
- van Wilsem, Johan. 2011b. “Worlds Tied Together? Online and Non-domestic Routine Activities and Their Impact on Digital and Traditional Threat Victimization.” European Journal of Criminology 8 (2):115–27. doi:https://doi.org/10.1177/1477370810393156.
- van Wilsem, Johan. 2013. “Hacking and Harassment—Do They Have Something in Common? Comparing Risk Factors for Online Victimization.” Journal of Contemporary Criminal Justice 29 (4):437–53. doi:https://doi.org/10.1177/1043986213507402.
- Wittebrood, Karin and Paul Nieuwbeerta. 2000. “Criminal Victimization during One’s Life Course: The Effects of Previous Victimization and Patterns of Routine Activities.” Journal of Research in Crime and Delinquency 37 (1):91–122. doi:https://doi.org/10.1177/0022427800037001004.
- Yar, Majid. 2005. “The Novelty of “Cybercrime”: An Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2:407–27. doi:https://doi.org/10.1177/147737080556056.