204
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Risky digital behavior or risky digital places? Victimization risk perception and evaluation on the internet

ORCID Icon &
Received 20 Sep 2022, Accepted 29 Jun 2023, Published online: 15 Aug 2023

References

  • Anson, I. G. 2018. “Taking the Time? Explaining Effortful Participation Among Low-Cost Online Survey Participants.” Research & Politics 5 (3): 205316801878548. https://doi.org/10.1177/2053168018785483.
  • Brands, J., and J. Van Doorn. 2022. “The Measurement, Intensity and Determinants of Fear of Cybercrime: A Systematic Review.” Computers in Human Behavior 127:107082. https://doi.org/10.1016/j.chb.2021.107082.
  • Brantingham, P., and P. Brantingham. 1995. “Criminality of Place: Crime Generators and Crime Attractors.” European Journal on Criminal Policy and Research 3 (3): 5–26. https://doi.org/10.1007/BF02242925.
  • Chataway, M. L., T. C. Hart, R. Coomber, and C. Bond. 2017. “The Geography of Crime Fear: A Pilot Study Exploring Event-Based Perceptions of Risk Using Mobile Technology.” Applied Geography 86:300–307. https://doi.org/10.1016/j.apgeog.2017.06.010.
  • Coffey, J. W. 2017. “Ameliorating Sources of Human Error in Cybersecurity: Technological and Human-Centered Approaches.” The 8th International Multi-Conference on Complexity, Informatics, and Cybernetics, Pensacola, 85–88. https://www.iiis.org/CDs2017/CD2017Spring/papers/ZA253LY.pdf.
  • Cohen, L. E., and M. Felson. 1979. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44 (4): 588–608. https://doi.org/10.2307/2094589.
  • Creese, S., D. Hodges, S. Jamison-Powell, and M. Whitty. 2013. “Relationships Between Password Choices, Perceptions of Risk and Security Expertise.” In Human Aspects of Information Security, Privacy, and Trust, edited by L. Marinos and I. Askoxylakis, Vol. 8030 80–89. Berlin, Germany: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-39345-7_9.
  • Dodel, M., and G. Mesch. 2017. “Cyber-Victimization Preventive Behavior: A Health Belief Model Approach.” Computers in Human Behavior 68:359–367. https://doi.org/10.1016/j.chb.2016.11.044.
  • Downs, J. S., M. B. Holbrook, S. Sheng, and L. F. Cranor 2010. “Are Your Participants Gaming the System? Screening Mechanical Turk Workers.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, GA, 2399–2402.
  • Dupont, B. 2020. “The Ecology of Cybercrime.” In The Human Factor of Cybercrime, edited by E. R. Leukfeldt and T. J. Holt, 389–407. Routledge. https://doi.org/10.4324/9780429460593-17.
  • Edwards, S., A. Nolan, M. Henderson, A. Mantilla, L. Plowman, and H. Skouteris. 2018. “Young Children’s Everyday Concepts of the Internet: A Platform for Cyber-Safety Education in the Early Years: Young Children’s Everyday Concepts About the Internet.” British Journal of Educational Technology 49 (1): 45–55. https://doi.org/10.1111/bjet.12529.
  • Federal Trade Commission. (2021, May 27). How to Recognize, Remove, and Avoid Malware. Consumer Information. https://www.consumer.ftc.gov/articles/how-recognize-remove-and-avoid-malware.
  • Fisher, B., and J. L. Nasar. 1995. “Fear Spots in Relation to Microlevel Physical Cues: Exploring the Overlooked.” Journal of Research in Crime and Delinquency 32 (2): 214–239. https://doi.org/10.1177/0022427895032002005.
  • Gainey, R., M. Alper, and A. T. Chappell. 2011. “Fear of Crime Revisited: Examining the Direct and Indirect Effects of Disorder, Risk Perception, and Social Capital.” American Journal of Criminal Justice 36 (2): 120–137. https://doi.org/10.1007/s12103-010-9089-8.
  • Garofalo, J. 1979. “Victimization and the Fear of Crime.” Journal of Research in Crime and Delinquency 16 (1): 80–97. https://doi.org/10.1177/002242787901600107.
  • Golladay, K., and K. Holtfreter. 2017. “The Consequences of Identity Theft Victimization: An Examination of Emotional and Physical Health Outcomes.” Victims & Offenders 12 (5): 741–760. https://doi.org/10.1080/15564886.2016.1177766.
  • Greszki, R., M. Meyer, and H. Schoen. 2014. “The Impact of Speeding on Data Quality in Nonprobability and Freshly Recruited Probability-Based Online Panels.” In Online Panel Research, edited by M. Callegaro, R. Baker, J. Bethlehem, A. S. Göritz, J. A. Krosnick, and P. J. Lavrakas, 238–262. John Wiley & Sons, Ltd. https://doi.org/10.1002/9781118763520.ch11.
  • Hale, C. 1996. “Fear of Crime: A Review of the Literature.” International Review of Victimology 4 (2): 79–150. https://doi.org/10.1177/026975809600400201.
  • Hargittai, E., and A. Shaw. 2020. “Comparing Internet Experiences and Prosociality in Amazon Mechanical Turk and Population-Based Survey Samples.” Sociological Research for a Dynamic World 6:237802311988983. https://doi.org/10.1177/2378023119889834.
  • Hauser, D. J., and N. Schwarz. 2016. “Attentive Turkers: MTurk Participants Perform Better on Online Attention Checks Than Do Subject Pool Participants.” Behavior Research Methods 48 (1): 400–407. https://doi.org/10.3758/s13428-015-0578-z.
  • Hayward, K. J., and M. M. Maas. 2020. “Artificial Intelligence and Crime: A Primer for Criminologists.” Crime Media Culture 17 (2): 209–233. https://doi.org/10.1177/1741659020917434.
  • Henson, B., B. W. Reyns, and B. S. Fisher. 2013. “Fear of Crime Online? Examining the Effect of Risk, Previous Victimization, and Exposure on Fear of Online Interpersonal Victimization.” Journal of Contemporary Criminal Justice 29 (4): 475–497. https://doi.org/10.1177/1043986213507403.
  • Hipp, J. R. 2016. “General Theory of Spatial Crime Patterns.” Criminology 54 (4): 653–679. https://doi.org/10.1111/1745-9125.12117.
  • IBM. (2022, August). Cost of a Data Breach 2022. https://www.ibm.com/reports/data-breach.
  • Ife, C. C., T. Davies, S. J. Murdoch, and G. Stringhini. 2019. “Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime.” https://doi.org/10.48550/ARXIV.1910.06380.
  • Internet Crime Complaint Center. (2022). Federal Bureau of Investigation Internet Crime Report 2022. https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf.
  • Jackson, J., N. Allum, and G. Gaskell. 2004. “Perceptions of Risk in Cyberspace.” Foresight Directorate 24.
  • Kaspersky. (2023, April 19). Top 10 Internet Safety Rules & What Not to Do Online. Usa.Kaspersky.Com. https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do-online.
  • LaGrange, R. L., K. F. Ferraro, and M. Supancic. 1992. “Perceived Risk and Fear of Crime: Role of Social and Physical Incivilities.” Journal of Research in Crime and Delinquency 29 (3): 311–334. https://doi.org/10.1177/0022427892029003004.
  • Linting, M., J. J. Meulman, P. J. F. Groenen, and A. J. Van Der Koojj. 2007. “Nonlinear Principal Components Analysis: Introduction and Application.” Psychological Methods 12 (3): 336–358. https://doi.org/10.1037/1082-989X.12.3.336.
  • Maddison, J., and D. Jeske. 2014. “Fear and Perceived Likelihood of Victimization in Traditional and Cyber Settings.” International Journal of Cyber Behavior, Psychology and Learning 4 (4): 23–40. https://doi.org/10.4018/ijcbpl.2014100103.
  • Miró Llinares, F., and S. D. Johnson. 2018. “Cybercrime and Place: Applying Environmental Criminology to Crimes in Cyberspace.“ In The Oxford Handbook of Environmental Criminology, Oxford Handbooks, edited by G. J. N. Bruinsma and S. D. Johnson, (online edn, Oxford Academic, 5 Feb.). https://doi.org/10.1093/oxfordhb/9780190279707.013.39.
  • Nikolovska, M., and V. Topalli 2020. The Future of Crime: How Crime Exponentiation Will Change Our Field. 45.
  • Peer, E., J. Vosgerau, and A. Acquisti. 2014. “Reputation as a Sufficient Condition for Data Quality on Amazon Mechanical Turk.” Behavior Research Methods 46 (4): 1023–1031. https://doi.org/10.3758/s13428-013-0434-y.
  • Pereira, F., and M. Matos. 2016. “Cyber-Stalking Victimization: What Predicts Fear Among Portuguese Adolescents?” European Journal on Criminal Policy and Research 22 (2): 253–270. https://doi.org/10.1007/s10610-015-9285-7.
  • Powell, A., G. Stratton, and R. Cameron. 2018. Digital Criminology: Crime and Justice in Digital Society. Routledge.
  • Quillian, L., and D. Pager. 2010. “Estimating Risk: Stereotype Amplification and the Perceived Risk of Criminal Victimization.” Social Psychology Quarterly 73 (1): 79–104. https://doi.org/10.1177/0190272509360763.
  • Rader, N. 2004. “The Threat of Victimization: A Theoretical Reconceptualization of Fear of Crime.” Sociological Spectrum 24 (6): 689–704. https://doi.org/10.1080/02732170490467936.
  • Rader, N. 2017. “Fear of Crime.” In Oxford Research Encyclopedia of Criminology and Criminal Justice, edited by N. Rader. Oxford University Press, https://doi.org/10.1093/acrefore/9780190264079.013.10.
  • Randa, R., and B. W. Reyns. 2019. “The Physical and Emotional Toll of Identity Theft Victimization: A Situational and Demographic Analysis of the National Crime Victimization Survey.” Deviant Behavior 41 (10): 1290–1304. https://doi.org/10.1080/01639625.2019.1612980.
  • Redmiles, E. M., S. Kross, and M. L. Mazurek 2019. “How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples.” 2019 IEEE Symposium on Security and Privacy (SP), 1326–1343. https://doi.org/10.1109/SP.2019.00014
  • Reisig, M. D., T. C. Pratt, and K. Holtfreter. 2009. “Perceived Risk of Internet Theft Victimization: Examining the Effects of Social Vulnerability and Financial Impulsivity.” Criminal Justice and Behavior 36 (4): 369–384. https://doi.org/10.1177/0093854808329405.
  • Roberts, L. D., D. Indermaur, and C. Spiranovic. 2013a. “Fear of Cyber-Identity Theft and Related Fraudulent Activity.” Psychiatry, Psychology & Law 20 (3): 315–328. https://doi.org/10.1080/13218719.2012.672275.
  • Roberts, L. D., D. Indermaur, and C. Spiranovic. 2013b. “Fear of Cyber-Identity Theft and Related Fraudulent Activity.” Psychiatry, Psychology & Law 20 (3): 315–328. https://doi.org/10.1080/13218719.2012.672275.
  • Rountree, P. W., and K. C. Land. 1996. “Burglary Victimization, Perceptions of Crime Risk, and Routine Activities: A Multilevel Analysis Across Seattle Neighborhoods and Census Tracts.” Journal of Research in Crime and Delinquency 33 (2): 147–180. https://doi.org/10.1177/0022427896033002001.
  • Russo, S., M. Roccato, and A. Vieno. 2013. “Criminal Victimization and Crime Risk Perception: A Multilevel Longitudinal Study.” Social Indicators Research 112 (3): 535–548. https://doi.org/10.1007/s11205-012-0050-8.
  • Schonlau, M., and V. Toepoel. 2015. “Straightlining in Web Survey Panels Over Time.” Survey Research Methods 9 (2): 125–137.
  • Sheehan, K. B. 2018. “Crowdsourcing Research: Data Collection with Amazon’s Mechanical Turk.” Communication Monographs 85 (1): 140–156. https://doi.org/10.1080/03637751.2017.1342043.
  • Sheehan, K. B., and M. Pittman. 2016. Amazon’s Mechanical Turk for Academics: The HIT Handbook for Social Science Research. Melvin & Leigh, Publishers.
  • Swartz, K., B. W. Reyns, B. Henson, and P. Wilcox. 2011. “Fear of In-School Victimization: Contextual, Gendered, and Developmental Considerations.” Youth Violence and Juvenile Justice 9 (1): 59–78. https://doi.org/10.1177/1541204010374606.
  • Telang, R. 2018. “Does Online Piracy Make Computers Insecure? Evidence from Panel Data.” SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3139240.
  • van Schaik, P., D. Jeske, J. Onibokun, L. Coventry, J. Jansen, and P. Kusev. 2017. “Risk Perceptions of Cyber-Security and Precautionary Behaviour.” Computers in Human Behavior 75:547–559. https://doi.org/10.1016/j.chb.2017.05.038.
  • Virtanen, S. M. 2017. “Fear of Cybercrime in Europe: Examining the Effects of Victimization and Vulnerabilities.” Psychiatry, Psychology & Law 24 (3): 323–338. https://doi.org/10.1080/13218719.2017.1315785.
  • Weinberg, J., J. Freese, and D. McElhattan. 2014. “Comparing Data Characteristics and Results of an Online Factorial Survey Between a Population-Based and a Crowdsource-Recruited Sample.” Sociological Science 1:292–310. https://doi.org/10.15195/v1.a19.
  • Wellman, B. 2001a. “Computer Networks as Social Networks.” Science: Advanced Materials and Devices 293 (5537): 2031–2034. https://doi.org/10.1126/science.1065547.
  • Wellman, B. 2001b. “Physical Place and Cyberplace: The Rise of Personalized Networking.” International Journal of Urban and Regional Research 25 (2): 227–252. https://doi.org/10.1111/1468-2427.00309.
  • Wilcox, P., N. Quisenberry, and S. Jones. 2003. “The Built Environment and Community Crime Risk Interpretation.” Journal of Research in Crime and Delinquency 40 (3): 322–345. https://doi.org/10.1177/0022427803253801.
  • Yar, M. 2005. “The Novelty of ‘Cybercrime’ an Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2 (4): 407–427. https://doi.org/10.1177/147737080556056.
  • Yu, S. 2014. “Fear of Cyber Crime Among College Students in the United States: An Exploratory Study.“ International Journal of Cyber Criminology 8 (1): 11.
  • Zhang, C., and F. Conrad. 2014. “Speeding in Web Surveys: The Tendency to Answer Very Fast and Its Association with Straightlining.” Survey Research Methods 8 (2): 127–135.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.