Academic literature on the topic 'Cyber-Routine Activities Theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber-Routine Activities Theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber-Routine Activities Theory"
Navarro, Jordana N., and Jana L. Jasinski. "Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences." Sociological Spectrum 32, no. 1 (2011): 81–94. http://dx.doi.org/10.1080/02732173.2012.628560.
Full textChoi, Kyung-Shick, and Jin Ree Lee. "Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory." Computers in Human Behavior 73 (August 2017): 394–402. http://dx.doi.org/10.1016/j.chb.2017.03.061.
Full textMelander, Lisa, and Vivian Hughes. "College Partner Violence in the Digital Age: Explaining Cyber Aggression Using Routine Activities Theory." Partner Abuse 9, no. 2 (2018): 158–80. http://dx.doi.org/10.1891/1946-6560.9.2.158.
Full textMing-Li, Hsieh, and Kevin Wang Shun-Yung. "Routine Activities in a Virtual Space: A Taiwanese Case of an ATM Hacking Spree." International Journal of Cyber Criminology 12, no. 1 (2018): 333–52. https://doi.org/10.5281/zenodo.1467935.
Full textMorillo Puente, Solbey, and Iván Neftalí Ríos Hernández. "Cyber victimization within the Routine Activity Theory Framework in the Digital Age." Revista de Psicología 40, no. 1 (2022): 265–91. http://dx.doi.org/10.18800/psico.202201.009.
Full textGriffith, Candace E., Melissa Teztlaff-Bemiller, and Lance Y. Hunter. "Understanding the cyber-victimization of young people: A test of routine activities theory." Telematics and Informatics Reports 9 (March 2023): 100042. http://dx.doi.org/10.1016/j.teler.2023.100042.
Full textAkdemir, Naci, and Christopher James Lawless. "Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: a lifestyle routine activities approach." Internet Research 30, no. 6 (2020): 1665–87. http://dx.doi.org/10.1108/intr-10-2019-0400.
Full textVan Ouytsel, Joris, Koen Ponnet, and Michel Walrave. "Cyber Dating Abuse Victimization Among Secondary School Students From a Lifestyle-Routine Activities Theory Perspective." Journal of Interpersonal Violence 33, no. 17 (2016): 2767–76. http://dx.doi.org/10.1177/0886260516629390.
Full textRodríguez, Juan Antonio, Jesús Oduber, and Endira Mora. "Actividades rutinarias y cibervictimización en Venezuela/ Routine activities and cyber-victimization in Venezuela." URVIO - Revista Latinoamericana de Estudios de Seguridad, no. 20 (June 29, 2017): 63. http://dx.doi.org/10.17141/urvio.20.2017.2583.
Full textBaek, Sinchul, Yongeun sUNG, and Cruz Erik. "Capable Guardianship and CRISIS of Identity Theft in the United States: Expanding Cyber-Routine Activities Theory." J-Institute 2, no. 1 (2017): 16–24. http://dx.doi.org/10.22471/crisis.2017.2.1.16.
Full textDissertations / Theses on the topic "Cyber-Routine Activities Theory"
Leili, Jennifer A. "Bystander Intervention, Victimization, and Routine Activities Theory: An Examination of Feminist Routine Activities Theory in Cyber Space." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7843.
Full textBook chapters on the topic "Cyber-Routine Activities Theory"
Miró-Llinares, Fernando. "Crime Opportunities, Lockdowns, and Online Video Games: The Digital Leisure Hypothesis (and More on the Impact of Digitalization on Crime Trends)." In SpringerBriefs in Criminology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-72387-2_4.
Full textDanquah, Paul, Olumide Babatope Longe, Jojo Desmond Lartey, and Peter Ebo Tobbin. "Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft." In Modern Theories and Practices for Cyber Ethics and Security Compliance. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3149-5.ch003.
Full text"Adolescent Online Victimization and Constructs of Routine Activities Theory." In Cyber Criminology. Routledge, 2011. http://dx.doi.org/10.1201/b10718-21.
Full textConference papers on the topic "Cyber-Routine Activities Theory"
Saad, Mohd Ezri, and Siti Norul Huda Sheikh Abdullah. "Victimization Analysis Based On Routine Activitiy Theory for Cyber-Love Scam in Malaysia." In 2018 Cyber Resilience Conference (CRC). IEEE, 2018. http://dx.doi.org/10.1109/cr.2018.8626818.
Full textKotkova, Barbora. "CYBER SECURITY IN THE HEALTHCARE SECTOR - CURRENT THREATS." In 22nd SGEM International Multidisciplinary Scientific GeoConference 2022. STEF92 Technology, 2022. http://dx.doi.org/10.5593/sgem2022/2.1/s07.02.
Full text