References
- Biberstein, Lorenz, Martin Killias, Severin Walser, Sandro Iadanza, and Andrea Pfammatter. 2016. Sondage au Sujet des Expériences et Opinions sur la Criminalité en Suisse. Analyses dans le Cadre du Sondage National de Sécurité 2015. Lenzburg, Switzerland: Killias Research & Consulting.
- Caneppele, Stefano, Riccardo Milani, Christine Burkhardt, and Marcelo F. Aebi. 2019a. La sicurezza a Lugano nel 2019: Sintesi dei risultati. UNILCRIM 1 (6). Lausanne, Switzerland: Université de Lausanne.
- Caneppele, Stefano, Riccardo Milani, Christine Burkhardt, Amandine Da Silva, and Marcelo F. Aebi. 2019b. La sicurezza a Lugano nel 2019. Nuove tecnologie e vittimizzazione online. UNILCRIM 1 (4). Lausanne, Switzerland: Université de Lausanne.
- Chen, Hongliang, Christopher E. Beaudoin, and Traci Hong. 2017. “Securing Online Privacy: An Empirical Test on Internet Scam Victimization, Online Privacy Concerns, and Privacy Protection Behaviors.” Computers in Human Behavior 70:291–302. doi:https://doi.org/10.1016/j.chb.2017.01.003.
- Cohen, Lawrence E. and Marcus Felson. 1979. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44:588–608. doi:https://doi.org/10.2307/2094589.
- Felson, Marcus. 1994. Crime and Everyday Life: Insights and Implications for Society. Thousand Oaks, CA, United States: Pine Forge Press.
- Graham, Roderick and Ruth Triplett. 2017. “Capable Guardians in the Digital Environment: The Role of Digital Literacy in Reducing Phishing Victimization.” Deviant Behavior 38 (12):1371–82. doi:https://doi.org/10.1080/01639625.2016.1254980.
- Henson, Billy, Bradford W. Reyns, and Bonnie S. Fisher. 2013. “Does Gender Matter in the Virtual World? Examining the Effect of Gender on the Link between Online Social Network Activity, Security and Interpersonal Victimization.” Security Journal 26 (4):315–30. doi:https://doi.org/10.1057/sj.2013.21.
- Holt, Thomas J. and Adam M. Bossler. 2008. “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” Deviant Behavior 30 (1):1–25. doi:https://doi.org/10.1080/01639620701876577.
- Jolliffe, Ian. 2002. Principal Component Analysis. New York, NY, United States: Springer-Verlag New York.
- Kennedy, Peter. 2003. A Guide to Econometrics. Cambridge, MA, United Stated: MIT press.
- Labs, Arkose. 2019. “Fraud and Abuse Report. Q3 2019”. Accessed November 15, 2019, from https://www.arkoselabs.com/blog/q3-fraud-report-reveals-startling-facts-about-fraud/.
- Leukfeldt, Eric Rutger. 2014. “Phishing for Suitable Targets in the Netherlands: Routine Activity Theory and Phishing Victimization.” Cyberpsychology, Behavior and Social Networking 17:551–55. doi:https://doi.org/10.1089/cyber.2014.0008.
- Leukfeldt, Eric Rutger and Majid Yar. 2016. “Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis.” Deviant Behavior 37:263–80. doi:https://doi.org/10.1080/01639625.2015.1012409.
- Näsi, Matti, Pekka Räsänen, Markus Kaakinen, Teo Keipi, and Atte Oksanen. 2017. “Do Routine Activities Help Predict Young Adults’ Online Harassment: A Multi-Nation Study.” Criminology & Criminal Justice 17 (4):418–32. doi:https://doi.org/10.1177/1748895816679866.
- Ngo, Fawn T. and Raymond Paternoster. 2011. “Cybercrime Victimization: An Examination of Individual and Situational Level Factors.” International Journal of Cyber Criminology 5 (1):773–93.
- Reynald, Danielle. 2009. “Guardianship in Action: Developing a New Tool for Measurement.” Crime Prevention and Community Safety 11 (1):1–20. doi:https://doi.org/10.1057/cpcs.2008.19.
- Reyns, Bradford W. 2013. “Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory beyond Direct-Contact Offenses.” Journal of Research in Crime and Delinquency 50 (2):216–38. doi:https://doi.org/10.1177/0022427811425539.
- Reyns, Bradford W., Bonnie S. Fisher, Adam M. Bossler, and Thomas J. Holt. 2019. “Opportunity and Self-Control: Do They Predict Multiple Forms of Online Victimization?” American Journal of Criminal Justice 44 (1):63–82. doi:https://doi.org/10.1007/s12103-018-9447-5.
- Reyns, Bradford W. and Billy Henson. 2016. “The Thief with a Thousand Faces and the Victim with None: Identifying Determinants for Online Identity Theft Victimization with Routine Activity Theory.” International Journal of Offender Therapy and Comparative Criminology 60 (10):1119–39. doi:https://doi.org/10.1177/0306624X15572861.
- Reyns, Bradford W., Billy Henson, and Bonnie S. Fisher. 2016. “Guardians of the Cyber Galaxy: An Empirical and Theoretical Analysis of the Guardianship Concept from Routine Activity Theory as It Applies to Online Forms of Victimization.” Journal of Contemporary Criminal Justice 32 (2):148–68. doi:https://doi.org/10.1177/1043986215621378.
- Vakhitova, Zarina and Danielle Reynald. 2014. “Australian Internet Users and Guardianship against Cyber Abuse: An Empirical Analysis.” International Journal of Cyber Criminology 8 (2):156–71.
- Van Wilsem, Johan. 2011a. “‘Bought It, but Never Got It’. Assessing Risk Factors for Online Consumer Fraud Victimization.” European Sociological Review 29 (2):168–78. doi:https://doi.org/10.1093/esr/jcr053.
- Van Wilsem, Johan. 2011b. “Worlds Tied Together? Online and Non-Domestic Routine Activities and Their Impact on Digital and Traditional Threat Victimization.” European Journal of Criminology 8:115–27. doi:https://doi.org/10.1177/1477370810393156.
- Weiser, Eric B. 2000. “Gender Differences in Internet Use Patterns and Internet Application Preferences: A Two-Sample Comparison.” Cyberpsychology and Behavior 3 (2):167–78. doi:https://doi.org/10.1089/109493100316012.
- Weulen Kranenbarg, Marleen, Thomas J. Holt, and Jean-Louis van Gelder. 2019. “Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-only and the Victimization-Offending Overlap.” Deviant Behavior 40 (1):40–55. doi:https://doi.org/10.1080/01639625.2017.1411030.
- Yar, Majid. 2005. “The Novelty of ‘Cybercrime’ an Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2:407–27. doi:https://doi.org/10.1177/147737080556056.