0
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual World

, , ORCID Icon, , &

References

  • Akdemir, N., & Lawless, C. J. (2020). Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: A lifestyle routine activities approach. Internet Research, 30(6), 1665–1687. https://doi.org/10.1108/INTR-10-2019-0400
  • Baki, S., & Verma, R. (2021). Sixteen years of phishing user studies: What have we learned? arXiv preprint arXiv:2109.04661
  • Beran, M., Hrdina, F., Kouřil, D., Ošlejšek, R., & Zákopčanová, K. (2020, October). Exploratory analysis of file system metadata for rapid investigation of security incidents. In 2020 IEEE Symposium on Visualization for Cyber Security (VizSec) (pp. 11–20). IEEE. https://doi.org/10.1109/VizSec51108.2020.00008
  • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1): 400–420.
  • Bossler, A. M., Holt, T. J., & May, D. C. (2012). Predicting online harassment victimization among a juvenile population. Youth & Society, 44(4), 500–523. https://doi.org/10.1177/0044118X11407525
  • Cappers, B. C., Meessen, P. N., Etalle, S., & Van Wijk, J. J. (2018., October). Eventpad: Rapid malware analysis and reverse engineering using visual analytics. In 2018 IEEE Symposium on Visualization for Cyber Security (VizSec) (pp. 1–8). IEEE. https://doi.org/10.1109/VIZSEC.2018.8709230
  • Cohen, L. E., & Felson, M. (2010). Social change and crime rate trends: A routine activity approach (1979). In Classics in environmental criminology (pp. 203–232). Routledge.
  • Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1): 308–333.
  • Choi, K. S., Cho, S., & Lee, J. R. (2019). Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine activities theory with latent class analysis. Computers in Human Behavior, 100, 1–10. https://doi.org/10.1016/j.chb.2019.06.007
  • Cui, X., Ge, Y., Qu, W., & Zhang, K. (2020). Effects of recipient information and urgency cues on phishing detection. In HCI International 2020-Posters: 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part III 22 (pp. 520–525). Springer International Publishing.
  • Culatta, E., Clay-Warner, J., Boyle, K. M., & Oshri, A. (2020). Sexual revictimization: A routine activity theory explanation. Journal of Interpersonal Violence, 35(15–16), 2800–2824. https://doi.org/10.1177/0886260517704962
  • Furnell, S., Millet, K., & Papadaki, M. (2019). Fifteen years of phishing: Can technology save us? Computer Fraud & Security, 2019(7), 11–16. https://doi.org/10.1016/S1361-3723(19)30074-0
  • Ghazi-Tehrani, A. K., & Pontell, H. N. (2021). Phishing evolves: Analyzing the enduring cybercrime. Victims & Offenders, 16(3), 316–342. https://doi.org/10.1080/15564886.2020.1829224
  • Griffin, S. E., & Rackley, C. C. (2008, September). Vishing. In Proceedings of the 5th Annual Conference on Information Security Curriculum Development (pp. 33–35). https://doi.org/10.1145/1456625.1456635
  • Guerra, C., & Ingram, J. R. (2022). Assessing the relationship between lifestyle routine activities theory and online victimization using panel data. Deviant Behavior, 43(1), 44–60. https://doi.org/10.1080/01639625.2020.1774707
  • Hawdon, J., Costello, M., Ratliff, T., Hall, L., & Middleton, J. (2017). Conflict management styles and cybervictimization: Extending routine activity theory. Sociological Spectrum, 37(4), 250–266. https://doi.org/10.1080/02732173.2017.1334608
  • Henson, B., Wilcox, P., Reyns, B. W., & Cullen, F. T. (2010). Gender, adolescent lifestyles, and violent victimization: Implications for routine activity theory. Victims & Offenders, 5(4), 303–328. https://doi.org/10.1080/15564886.2010.509651
  • Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25. https://doi.org/10.1080/01639620701876577
  • Holtfreter, K., Reisig, M. D., & Pratt, T. C. (2008). Low self‐control, routine activities, and fraud victimization. Criminology, 46(1), 189–220. https://doi.org/10.1111/j.1745-9125.2008.00101.x
  • Hutchings, A., & Hayes, H. (2009). Routine activity theory and phishing victimisation: Who gets caught in the ‘net’? Current Issues in Criminal Justice, 20(3), 433–452. https://doi.org/10.1080/10345329.2009.12035821
  • Jansson, K., & von Solms, R. (2013). Phishing for phishing awareness. Behaviour & Information Technology, 32(6), 584–593. https://doi.org/10.1080/0144929X.2011.632650
  • Leukfeldt, E. R. (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior and Social Networking, 17(8), 551–555. https://doi.org/10.1089/cyber.2014.0008
  • Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. https://doi.org/10.1080/01639625.2015.1012409
  • Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410. https://doi.org/10.1080/01639620903004903
  • Marty, R. (2008). Applied security visualization. Addison-Wesley Professional.
  • McClain, J., Silva, A., Emmanuel, G., Anderson, B., Nauer, K., Abbott, R., & Forsythe, C. (2015). Human performance factors in cyber security forensic analysis. Procedia Manufacturing, 3, 5301–5307. https://doi.org/10.1016/j.promfg.2015.07.621
  • McNeeley, S. (2015). Lifestyle-routine activities and crime events. Journal of Contemporary Criminal Justice, 31(1), 30–52. https://doi.org/10.1177/1043986214552607
  • Mustaine, E. E., & Tewksbury, R. (1998). Predicting risks of larceny theft victimization: A routine activity analysis using refined lifestyle measures. Criminology, 36(4), 829–858. https://doi.org/10.1111/j.1745-9125.1998.tb01267.x
  • Näsi, M., Räsänen, P., Kaakinen, M., Keipi, T., & Oksanen, A. (2017). Do routine activities help predict young adults’ online harassment: A multi-nation study. Criminology & Criminal Justice, 17(4), 418–432. https://doi.org/10.1177/1748895816679866
  • Navarro, J. N., & Jasinski, J. L. (2013). Why girls? Using routine activities theory to predict cyberbullying experiences between girls and boys. Women & Criminal Justice, 23(4), 286–303. https://doi.org/10.1080/08974454.2013.784225
  • Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773.
  • Ngo, F. T., Piquero, A. R., LaPrade, J., & Duong, B. (2020). Victimization in cyberspace: Is it how long we spend online, what we do online, or what we post online? Criminal Justice Review, 45(4), 430–451. https://doi.org/10.1177/0734016820934175
  • Nguyen, V. T., Namin, A. S., & Dang, T. (2018, July). MalViz: An interactive visualization tool for tracing malware . In Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis (pp. 376–379). https://doi.org/10.1145/3213846.3229501
  • Payne, B. K., & Hadzhidimova, L. (2020). Disciplinary and interdisciplinary trends in cybercrime research: An examination. International Journal of Cyber Criminology, 14(1), 81–105.
  • Ramzan, Z. (2010). Phishing attacks and countermeasures. In Handbook of information and communication security (pp. 433–448). Springer.
  • Räsänen, P., Hawdon, J., Holkeri, E., Keipi, T., Näsi, M., & Oksanen, A. (2016). Targets of online hate: Examining determinants of victimization among young Finnish Facebook users. Violence and Victims, 31(4), 708–726. https://doi.org/10.1891/0886-6708.VV-D-14-00079
  • Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296. https://doi.org/10.1177/0022427810365903
  • Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238. https://doi.org/10.1177/0022427811425539
  • Reyns, B. W., Henson, B., & Fisher, B. S. (2016). Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. Journal of Contemporary Criminal Justice, 32(2), 148–168. https://doi.org/10.1177/1043986215621378
  • Schreck, C. J., & Fisher, B. S. (2004). Specifying the influence of family and peers on violent victimization: Extending routine activities and lifestyles theories. Journal of Interpersonal Violence, 19(9), 1021–1041. https://doi.org/10.1177/0886260504268002
  • Shaw, S.-L., & Sui, D. (2020). Understanding the new human dynamics in smart spaces and places: Towards a splatial framework. Annals of the American Association of Geographers, 110(2), 339–348. https://doi.org/10.1080/24694452.2019.1631145
  • Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2011). A survey of visualization systems for network security. IEEE Transactions on Visualization and Computer Graphics, 18(8), 1313–1329. https://doi.org/10.1109/TVCG.2011.144
  • Tuma, K., Calikli, G., & Scandariato, R. (2018). Threat analysis of software systems: A systematic literature review. Journal of Systems and Software, 144, 275–294. https://doi.org/10.1016/j.jss.2018.06.073
  • Ulmer, A., Sessler, D., & Kohlhammer, J. (2019, October). Netcapvis: Web-based progressive visual analytics for network packet captures. In 2019 IEEE Symposium on Visualization for Cyber Security (Vizsec) (pp. 1–10). IEEE. https://doi.org/10.1109/Vizsec48167.2019.9161633
  • Vakhitova, Z. I., Reynald, D. M., & Townsley, M. (2016). Toward the adaptation of routine activity and lifestyle exposure theories to account for cyber abuse victimization. Journal of Contemporary Criminal Justice, 32(2), 169–188. https://doi.org/10.1177/1043986215621379
  • Van Ouytsel, J., Ponnet, K., & Walrave, M. (2018). Cyber dating abuse victimization among secondary school students from a lifestyle-routine activities theory perspective. Journal of Interpersonal Violence, 33(17), 2767–2776. https://doi.org/10.1177/0886260516629390
  • Wilsem, J. V. (2011). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8(2), 115–127. https://doi.org/10.1177/1477370810393156
  • Wick, S. E., Nagoshi, C., Basham, R., Jordan, C., Kim, Y. K., Nguyen, A. P., & Lehmann, P. (2017). Patterns of cyber harassment and perpetration among college students in the United States: A test of routine activities theory. International Journal of Cyber Criminology, 11(1), 24–38.
  • Williams, M. L., Levi, M., Burnap, P., & Gundur, R. V. (2019). Under the corporate radar: Examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior, 40(9), 1119–1131. https://doi.org/10.1080/01639625.2018.1461786
  • Wilsem, J. V. (2013). Hacking and harassment—do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice, 29(4), 437–453. https://doi.org/10.1177/1043986213507402
  • Wu, L., Peng, Q., Lemke, M., Hu, T., & Gong, X. (2022). Spatial social network research: A bibliometric analysis. Computational Urban Science, 2(1), 21. https://doi.org/10.1007/s43762-022-00045-y
  • Wu, L., Peng, Q., & Lembke, M. (2023). Research trends in cybercrime and cybersecurity: A review based on web of science core collection database. International Journal of Cybersecurity Intelligence & Cybercrime, 6(1), 5–28. https://doi.org/10.52306/2578-3289.1154
  • Yeboah-Boateng, E. O., & Amanor, P. M. (2014). Phishing, SMiShing & Vishing: an assessment of threats against mobile devices. Journal of Emerging Trends in Computing and Information Sciences, 5(4), 297–307.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.