References
- Akdemir, N., & Yenal, S. (2021). How phishers exploit the Coronavirus pandemic: A content analysis of COVID-19 themed phishing emails. SAGE Open, 11(3), 215824402110318. https://doi.org/https://doi.org/10.1177/21582440211031879
- Anderson, K. B. (2013). Consumer fraud in the United States, 2011: The third FTC survey. Federal Trade Commission.
- Arneklev, B. J., Grasmick, H. G., Tittle, C. R., & Bursik, R. J. (1993). Low self control and imprudent behavior. Journal of Quantitative Criminology, 9(3), 225–247. https://doi.org/https://doi.org/10.1007/BF01064461
- Bergh, C. M., & Junger, M. (2018). Victims of cybercrime in Europe: A review of victim surveys. Crime Science, 7(1), 1–15. https://doi.org/https://doi.org/10.1186/s40163-017-0076-y
- Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420. https://www.proquest.com/scholarly-journals/on-line-activities-guardianship-malware-infection/docview/89069444/se-2.
- Bossler, A. M., & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38(3), 227–236. https://doi.org/https://doi.org/10.1016/j.jcrimjus.2010.03.001
- Bowles, R., Reyes, M. G., & Garoupa, N. (2009). Crime reporting decisions and the costs of crime. European Journal on Criminal Policy and Research, 15(4), 365–377. https://doi.org/https://doi.org/10.1007/s10610-009-9109-8
- Button, M., Johnston, L., & Frimpong, K. (2008). The fraud review and the policing of fraud: Laying the foundations for a centralized fraud police or counter fraud executive? Policing: A Journal of Policy and Practice, 2(2), 241–250. https://doi.org/https://doi.org/10.1093/police/pan027
- Button, M., Lewis, C., & Tapley, J. (2009). Fraud typologies and the victims of fraud literature review.
- Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, 47(3), 391–408. https://doi.org/https://doi.org/10.1177/0004865814521224
- Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291–302. https://doi.org/https://doi.org/10.1016/j.chb.2017.01.003
- Choi, K. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308–333. https://www.proquest.com/scholarly-journals/computer-crime-victimization-integrated-theory/docview/89216682/se-2
- Christie, N. (1986). The ideal victim. In E. Fattah (Ed.), From crime policy to victim policy (pp. 17–30). St Martins Press.
- Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. https://doi.org/https://doi.org/10.2307/2094589
- Cross, C., & Blackshaw, D. (2015). Improving the police response to online fraud. Policing: A Journal of Policy and Practice, 9(2), 119–128. https://doi.org/https://doi.org/10.1093/police/pau044
- Cross, C., Richards, K., & Smith, R. G. (2016). The reporting experiences and support needs of victims of online fraud. Trends and Issues in Crime and Criminal Justice, 518, 1–14. https://www.aic.gov.au/publications/tandi/tandi518
- Cross, C., & Richards, K. (2015). The ‘ACA effect’: Examining how current affairs programs shape victim understandings and responses to online fraud. Current Issues in Criminal Justice, 27(2), 163–178. https://doi.org/https://doi.org/10.1080/10345329.2015.12036039
- Cross, C., Smith, R. G., & Richards, K. (2014). Challenges of responding to online fraud victimisation in Australia. Trends and Issues in Crime and Criminal Justice, 474, 1–6. https://www.aic.gov.au/publications/tandi/tandi474
- Cross, C. (2013). ‘Nobody’s holding a gun to your head … ’: Examining current discourses surrounding victims of online fraud. In Crime, Justice And Social Democracy: Proceedings of the 2nd International Conference, Brisbane, Australia (Vol. 1, pp. 25–32). Crime and Justice Research Centre, Queensland University of Technology.
- Cross, C. (2018a). Expectations vs reality: Responding to online fraud across the fraud justice network. International Journal of Law, Crime and Justice, 55, 1–12. https://doi.org/https://doi.org/10.1016/j.ijlcj.2018.08.001
- Cross, C. (2018b). Victims’ motivations for reporting to the ‘fraud justice network.’ Police Practice and Research, 19(6), 550–564. https://doi.org/https://doi.org/10.1080/15614263.2018.1507891
- Cross, C. (2019). Is online fraud just fraud? Examining the efficacy of the digital divide. Journal of Criminological Research, Policy and Practice, 5(2), 120–131. https://doi.org/https://doi.org/10.1108/JCRPP-01-2019-0008
- DeLiema, M., Mottola, G. R., & Deevy, M. (2017). Findings from a pilot study to measure financial fraud in the United States. https://doi.org/http://dx.doi.org/10.2139/ssrn.2914560
- Dickman S. J. (1990). Functional and dysfunctional impulsivity: personality and cognitive correlates. Journal of Personality and Social Psychology, 58(1), 95–102. https://doi.org/https://doi.org/10.1037//0022-3514.58.1.95
- Emami, C., Smith, R., & Jorna, P. (2019). Predicting online fraud victimisation in Australia. In Trends & Issues in Crime and Criminal Justice. Australian Institute of Criminology, 577, 1-20. https://www.aic.gov.au/publications/tandi/tandi577
- European Commission. (2020). Special Eurobarometer 499: Europeans’ attitudes towards cyber security (Report). https://op.europa.eu/en/publication-detail/-/publication/468848fa-49bb-11ea-8aa5-01aa75ed71a1/language-en/format-PDF
- Felson, M., & Cohen, L. E. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8(4), 389–406. https://doi.org/https://doi.org/10.1007/BF01561001
- Fox, K., Lane, J., & Akers, R. (2010). Understanding gang membership and crime victimization among jail inmates: Testing the effects of self-control. Crime & Delinquency, 59(5), 764–787. https://doi.org/https://doi.org/10.1177/0011128710392003
- Gottfredson, M., & Hirschi, T. (1990). A general theory of crime. Stanford University Press.
- Graham, A., Kulig, T. C., & Cullen, F. T. (2019). Willingness to report crime to the police: Traditional crime, cybercrime, and procedural justice. Policing: An International Journal of Police Strategies and Management, 43(1), 1–16. https://doi.org/https://doi.org/10.1108/PIJPSM-07-2019-0115
- Grasmick, H. G., Tittle, C. R., Bursik, R. J., Jr., & Arneklev, B. J. (1993). Testing the core empirical implications of Gottfredson and Hirschi’s general theory of crime. Journal of Research in Crime and Delinquency, 30(1), 5–29. https://doi.org/https://doi.org/10.1177/0022427893030001002
- Heinonen, J. A., Holt, T. J., & Wilson, J. M. (2012). Product counterfeits in the online environment: An empirical assessment of victimization and reporting characteristics. International Criminal Justice Review, 22(4), 353–371. https://doi.org/https://doi.org/10.1177/1057567712465755
- Higgins, G. E. (2004). Can low self-control help with the understanding of the software piracy problem? Deviant Behavior, 26(1), 1–24. https://doi.org/https://doi.org/10.1080/01639620490497947
- Holt, T. J., & Bossler, A. M. (2013). Examining the relationship between routine activities and malware infection indicators. Journal of Contemporary Criminal Justice, 29(4), 420–436. https://doi.org/https://doi.org/10.1177/1043986213507401
- Holtfreter, K., Reisig, M. D., & Blomberg, T. G. (2006). Consumer fraud victimization in Florida: An empirical study. Economic crime in the 21st century. Paper presented at Consumer Fraud Victimization in Florida: An Empirical Study. Economic Crime in the 21st Century, Miami Gardens, Florida.
- Holtfreter, K., Reisig, M. D., Leeper Piquero, N., & Piquero, A. R. (2010). Low self-control and fraud: Offending, victimization, and their overlap. Criminal Justice and Behavior, 37(2), 188–203. https://doi.org/https://doi.org/10.1177/0093854809354977
- Holtfreter, K., Reisig, M., & Pratt, T. (2008). Low self-control, routine activities, and fraud victimization. Criminology, 46(1), 189–220. https://doi.org/https://doi.org/10.1111/j.1745-9125.2008.00101.x
- Kääriäinen, J., & Sirén, R. (2011). Trust in the police, generalized trust and reporting crime. European Journal of Criminology, 8(1), 65–81. https://doi.org/https://doi.org/10.1177/1477370810376562
- Kemp, S., Miró-Llinares, F., & Moneva, A. (2020). The dark figure and the cyber fraud rise in Europe: Evidence from Spain. European Journal on Criminal Policy and Research, 26(3), 293–312. https://doi.org/https://doi.org/10.1007/s10610-020-09439-2
- Kemp, S. (2020). Fraud reporting in Catalonia in the Internet era: Determinants and motives. European Journal of Criminology, 147737082094140. Advance online publication. https://doi.org/https://doi.org/10.1177/1477370820941405
- Kerstens, J., & Jansen, J. (2016). The victim–perpetrator overlap in financial cybercrime: Evidence and reflection on the overlap of youth’s on-line victimization and perpetration. Deviant Behavior, 37(5), 585–600. https://doi.org/https://doi.org/10.1080/01639625.2015.1060796
- Kosinski, M., Matz, S. C., Gosling, S. D., Popov, V., & Stillwell, D. (2016). Facebook as a research tool. Monitor on Psychology, 70–75. https://www.apa.org/education/ce/facebook-research.pdf
- Leukfeldt, E. R., van de Weijer, S. G. A., & Van Der Zee, S. (2020). Reporting cybercrime victimization: Determinants, motives, and previous experience. Policing: An International Journal of Police Strategies & Management, 43(1), 17–34. https://doi.org/https://doi.org/10.1108/PIJPSM-07-2019-0122
- Leukfeldt, E. R., & Yar, M. (2014). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. https://doi.org/https://doi.org/10.1080/01639625.2015.1012409
- Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 1–18. https://doi.org/https://doi.org/10.1080/01639625.2015.1012409
- Marcum, C., Higgins, G., & Ricketts, M. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410. https://doi.org/https://doi.org/10.1080/01639620903004903
- Mesch, G. S., & Dodel, M. (2018). Low self-control, information disclosure, and the risk of online fraud. American Behavioral Scientist, 62(10), 1356–1371. https://doi.org/https://doi.org/10.1177/0002764218787854
- Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5 (1) , 773–739. https://www.cybercrimejournal.com/ngo2011ijcc.pdf
- Ngo, F. T., Piquero, A. R., LaPrade, J., & Duong, B. (2020). Victimization in cyberspace: Is it how long we spend online, what we do online, or what we post online? Criminal Justice Review, 45(4), 430–451. https://doi.org/https://doi.org/10.1177/0734016820934175
- Oesterle, S., Epstein, M., Haggerty, K. P., & Moreno, M. A. (2018). Using Facebook to recruit parents to participate in a family program to prevent teen drug use. Prevention Science, 19(4), 559–569. https://doi.org/https://doi.org/10.1007/s11121-017-0844-7
- Piquero, A., MacDonald, J., Dobrin, A., Daigle, L., & Cullen, F. (2005). Self-control, violent offending, and homicide victimization: Assessing the general theory of crime. Journal of Quantitative Criminology, 21(1), 55–71. https://doi.org/https://doi.org/10.1007/s10940-004-1787-2
- Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296. https://doi.org/https://doi.org/10.1177/0022427810365903
- Pratt, T. C., & Turanovic, J. J. (2016). Lifestyle and routine activity theories revisited: The importance of “risk” to the study of victimization. Victims & Offenders, 11(3), 335–354. https://doi.org/https://doi.org/10.1080/15564886.2015.1057351
- Pratt, T., & Cullen, F. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38(3), 931–964. https://doi.org/https://doi.org/10.1111/j.1745-9125.2000.tb00911.x
- Pratt, T., Turanovic, J., Fox, K., & Wright, K. (2014). Self-control and victimization: A meta-analysis. Criminology, 52(1), 87–116. https://doi.org/https://doi.org/10.1111/1745-9125.12030
- Reisig, M., & Holtfreter, K. (2007). Fraud victimization and confidence in Florida’s legal authorities. Journal of Financial Crime, 14(2), 113–125. https://doi.org/https://doi.org/10.1108/13590790710742618
- Reisig, M., & Holtfreter, K. (2013). Shopping fraud victimization among the elderly. Journal of Financial Crime, 20(3), 324–337. https://doi.org/https://doi.org/10.1108/JFC-03-2013-0014
- Reyns, B. W., & Henson, B. (2015). The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with routine activity theory. International Journal of Offender Therapy and Comparative Criminology, 60(10), 1119–1139. https://doi.org/https://doi.org/10.1177/0306624X15572861
- Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238. https://doi.org/https://doi.org/10.1177/0022427811425539
- Reyns, B. W. (2015). A routine activity perspective on online victimization: Results from the Canadian General Social Survey. Journal of Financial Crime, 22(4), 396–411. https://doi.org/https://doi.org/10.1108/JFC-06-2014-0030
- Schoepfer, A., & Piquero, N. L. (2009). Studying the correlates of fraud victimization and reporting. Journal of Criminal Justice, 37(2), 209–215. https://doi.org/https://doi.org/10.1016/j.jcrimjus.2009.02.003
- Schreck, C., Stewart, E., & Fisher, B. (2006). Self-control, victimization and their influence on risky lifestyles: A longitudinal analysis using panel data. Journal of Quantitative Criminology, 22(4), 319–340. https://doi.org/https://doi.org/10.1007/s10940-006-9014-y
- Schreck, C. (1999). Criminal victimization and low self-control: An extension and test of a general theory of crime. Justice Quarterly, 16(3), 633–654. https://doi.org/https://doi.org/10.1080/07418829900094291
- Shaver, L. G., Khawer, A., Yi, Y., Aubrey-Bassler, K., Etchegary, H., Roebothan, B., Asghari, S., & Wang, P. P. (2019). Using Facebook advertising to recruit representative samples: Feasibility assessment of a cross-sectional survey. Journal of Medical Internet Research, 21(8), e14021. https://doi.org/https://doi.org/10.2196/14021
- Skogan, W. G. (1984). Reporting crimes to the police: The status of world research. Journal of Research in Crime and Delinquency, 21(2), 113–137. https://doi.org/https://doi.org/10.1177/0022427884021002003
- Smith, R. G., & Akman, T. (2008). Raising public awareness of consumer fraud in Australia. Trends and Issues in Crime and Criminal Justice, 349, 1–6. https://www.aic.gov.au/publications/tandi/tandi349
- Titus, R. M., Heinzelmann, F., & Boyle, J. M. (1995). Victimization of persons by fraud. Crime & Delinquency, 41(1), 54–72. https://doi.org/https://doi.org/10.1177/0011128795041001004
- Tolsma, J., Blaauw, J., & Te Grotenhuis, M. (2012). When do people report crime to the police? Results from a factorial survey design in the Netherlands, 2010. Journal of Experimental Criminology, 8(2), 117–134. https://doi.org/https://doi.org/10.1007/s11292-011-9138-4
- Torrente, D., Gallo, P., & Oltra, C. (2017). Comparing crime reporting factors in EU countries. European Journal on Criminal Policy and Research, 23(2), 153–174. https://doi.org/https://doi.org/10.1007/s10610-016-9310-5
- Turanovic, J J., & Pratt, T C. (2014). “Can’t Stop, Won’t Stop”: Self-Control, Risky Lifestyles, and Repeat Victimization. Journal of Quantitative Criminology, 30(1), 29–56. https://doi.org/https://doi.org/10.1007/s10940-012-9188-4
- Van Wilsem, J. (2011). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8(2), 115–127. https://doi.org/https://doi.org/10.1177/1477370810393156
- Van Wilsem, J. (2013). ‘Bought it, but never got it’assessing risk factors for online consumer fraud victimization. European Sociological Review, 29(2), 168–178. https://doi.org/https://doi.org/10.1093/esr/jcr053
- Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183–205. https://doi.org/https://doi.org/10.1080/15614260701377729
- Wall, D. S. (2008). Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime. International Review of Law, Computers & Technology, 22(1–2), 45–63. https://doi.org/https://doi.org/10.1080/13600860801924907
- Weijer, S. G., Leukfeldt, R., & Bernasco, W. (2019). Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking. European Journal of Criminology, 16(4), 486–508. https://doi.org/https://doi.org/10.1177/1477370818773610
- Weijer, S., & Leukfeldt, R. (2017). Big five personality traits of cybercrime victims. Cyberpsychology, Behavior, and Social Networking, 20(7), 1–6. https://doi.org/https://doi.org/10.1089/cyber.2017.0028
- Whitty, M. T. (2019). Predicting susceptibility to cyber-fraud victimhood. Journal of Financial Crime, 26(1), 277–292. https://doi.org/https://doi.org/10.1108/JFC-10-2017-0095
- Williams, M. L. (2016). Guardians upon high: An application of routine activities theory to online identity theft in Europe at the country and individual level. British Journal of Criminology, 56(1), 21–48. https://doi.org/https://doi.org/10.1093/bjc/azv011
- Wyk, J. H., & Benson, M. L. (1997). Fraud victimization: Risky business or just bad luck? American Journal of Criminal Justice, 21(2), 163–179. https://doi.org/https://doi.org/10.1007/BF02887448
- Wyk, J., & Mason, K. A. (2001). Investigating vulnerability and reporting behavior for consumer fraud victimization: Opportunity as a social aspect of age. Journal of Contemporary Criminal Justice, 17(4), 328–345. https://doi.org/https://doi.org/10.1177/1043986201017004003
- Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427. https://doi.org/https://doi.org/10.1177/147737080556056
- Yar, M. (2006). Cybercrime and society. Sage Publications.