Academic literature on the topic 'Cyber-Routine Activities Theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber-Routine Activities Theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber-Routine Activities Theory"

1

Navarro, Jordana N., and Jana L. Jasinski. "Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences." Sociological Spectrum 32, no. 1 (2011): 81–94. http://dx.doi.org/10.1080/02732173.2012.628560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Choi, Kyung-Shick, and Jin Ree Lee. "Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory." Computers in Human Behavior 73 (August 2017): 394–402. http://dx.doi.org/10.1016/j.chb.2017.03.061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Melander, Lisa, and Vivian Hughes. "College Partner Violence in the Digital Age: Explaining Cyber Aggression Using Routine Activities Theory." Partner Abuse 9, no. 2 (2018): 158–80. http://dx.doi.org/10.1891/1946-6560.9.2.158.

Full text
Abstract:
Partner violence is prevalent in contemporary society, and certain groups of individuals such as college students are particularly at high risk for becoming involved in aggressive relationships. Cyber aggression is an emerging area of societal concern; however, little is known about the prevalence of these online behaviors between romantic partners. Because of the dearth of literature on cyber aggression among current and former intimate partners, this study examines the correlates of partner cyber aggression using the routine activities theoretical perspective among a sample of undergraduate
APA, Harvard, Vancouver, ISO, and other styles
4

Ming-Li, Hsieh, and Kevin Wang Shun-Yung. "Routine Activities in a Virtual Space: A Taiwanese Case of an ATM Hacking Spree." International Journal of Cyber Criminology 12, no. 1 (2018): 333–52. https://doi.org/10.5281/zenodo.1467935.

Full text
Abstract:
<em>Routine activity theory (RAT) was initially proposed to explain shifts in urban crime rates in the late 1970s, and has subsequently been applied to predictions of predatory criminal or victimization events. Despite a number of studies attempting to apply RAT to the vast array of crimes now taking place in a virtual environment such as phishing, fraud, malware infection, identify theft, computer viruses and cyber stalking on the Internet in Western countries, little is known about whether RAT could address automatic teller machine (ATM) hacking in an Asian setting. The current study applies
APA, Harvard, Vancouver, ISO, and other styles
5

Morillo Puente, Solbey, and Iván Neftalí Ríos Hernández. "Cyber victimization within the Routine Activity Theory Framework in the Digital Age." Revista de Psicología 40, no. 1 (2022): 265–91. http://dx.doi.org/10.18800/psico.202201.009.

Full text
Abstract:
This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians.
APA, Harvard, Vancouver, ISO, and other styles
6

Griffith, Candace E., Melissa Teztlaff-Bemiller, and Lance Y. Hunter. "Understanding the cyber-victimization of young people: A test of routine activities theory." Telematics and Informatics Reports 9 (March 2023): 100042. http://dx.doi.org/10.1016/j.teler.2023.100042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Akdemir, Naci, and Christopher James Lawless. "Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: a lifestyle routine activities approach." Internet Research 30, no. 6 (2020): 1665–87. http://dx.doi.org/10.1108/intr-10-2019-0400.

Full text
Abstract:
PurposeThe purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes victimisation and to test the applicability of lifestyle routine activities theory (LRAT) to cybercrime victimisation.Design/methodology/approachA mixed methods research paradigm was applied to address the research questions and aims. The data set of Crime Survey of England and Wales (CSEW) 2014/2015 and 42 semi-structured interviews conducted with victims of cybercrime and non-victim control group participants were ana
APA, Harvard, Vancouver, ISO, and other styles
8

Van Ouytsel, Joris, Koen Ponnet, and Michel Walrave. "Cyber Dating Abuse Victimization Among Secondary School Students From a Lifestyle-Routine Activities Theory Perspective." Journal of Interpersonal Violence 33, no. 17 (2016): 2767–76. http://dx.doi.org/10.1177/0886260516629390.

Full text
Abstract:
Controlling one’s romantic partner through digital media is a form of cyber dating abuse. To design effective educational campaigns, a deeper understanding of how some young people become victim of this type of abuse within their romantic relationships is warranted. This study is the first to adopt a lifestyle-routine activities theory perspective toward online romantic partner monitoring, by looking at whether secondary school students’ risky digital lifestyle and their digital media use are linked to a higher chance of being controlled by a romantic partner, taking into account gender, age,
APA, Harvard, Vancouver, ISO, and other styles
9

Rodríguez, Juan Antonio, Jesús Oduber, and Endira Mora. "Actividades rutinarias y cibervictimización en Venezuela/ Routine activities and cyber-victimization in Venezuela." URVIO - Revista Latinoamericana de Estudios de Seguridad, no. 20 (June 29, 2017): 63. http://dx.doi.org/10.17141/urvio.20.2017.2583.

Full text
Abstract:
El ciberdelito ha aumentado significativamente a nivel mundial en estas últimas décadas. En tal sentido, la investigación sobre este fenómeno en Venezuela ha sido escasa, específicamente en lo que respecta a los factores asociados con la victimización en línea. En consecuencia, este estudio busca promover el análisis de los condicionantes del delito y la victimización en línea en la región. Para ello, se investiga un conjunto de variables derivadas de la Teoría de las actividades rutinarias. El propósito es observar su relación con la victimización por hackeo y acoso online en una muestra de 3
APA, Harvard, Vancouver, ISO, and other styles
10

Baek, Sinchul, Yongeun sUNG, and Cruz Erik. "Capable Guardianship and CRISIS of Identity Theft in the United States: Expanding Cyber-Routine Activities Theory." J-Institute 2, no. 1 (2017): 16–24. http://dx.doi.org/10.22471/crisis.2017.2.1.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber-Routine Activities Theory"

1

Leili, Jennifer A. "Bystander Intervention, Victimization, and Routine Activities Theory: An Examination of Feminist Routine Activities Theory in Cyber Space." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7843.

Full text
Abstract:
Routine Activities Theory (RAT) is one of the most widely used theories to explain victimization. It has been applied to a wide range of criminal victimizations, such as property crimes (Miethe, Stafford, & Long, 1987) and urban murder (Messner & Tardiff, 1985). While traditional RAT has been used to explain violence against women, the feminist perspective of RAT developed by Schwartz and Pitts (1995) provides a better explanation by incorporating cultural factors that shape the conditions that give rise to offending. The current study draws on feminist RAT in order to explore three different
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyber-Routine Activities Theory"

1

Miró-Llinares, Fernando. "Crime Opportunities, Lockdowns, and Online Video Games: The Digital Leisure Hypothesis (and More on the Impact of Digitalization on Crime Trends)." In SpringerBriefs in Criminology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-72387-2_4.

Full text
Abstract:
Abstract This chapter examines the complex relationship between digital leisure activities and crime patterns through the development and testing of a "digital leisure hypothesis." Drawing on routine activity theory and empirical data from multiple sources, the author argues that increased engagement with digital entertainment, particularly among youth, has contributed to significant shifts in criminal opportunities by altering how people spend their time. The study presents evidence of strong negative correlations between time spent on digital leisure activities and youth crime rates, particu
APA, Harvard, Vancouver, ISO, and other styles
2

Danquah, Paul, Olumide Babatope Longe, Jojo Desmond Lartey, and Peter Ebo Tobbin. "Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft." In Modern Theories and Practices for Cyber Ethics and Security Compliance. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3149-5.ch003.

Full text
Abstract:
Socially engineered cyber deception and theft seems to have gained prominence in cybercrime. Given the contextual background of inadequate theoretical explanations of socially engineered cyber deception and theft cybercrime, there is the need for theory to better explain and possibly predict activities involved in socially engineered cyber deception and theft. This chapter proposes a theory of socially engineered cyber deception and theft (SECT), with routine activity theory, crime displacement theory, the space transition theory, and empirical review as its foundation. It iteratively combines
APA, Harvard, Vancouver, ISO, and other styles
3

"Adolescent Online Victimization and Constructs of Routine Activities Theory." In Cyber Criminology. Routledge, 2011. http://dx.doi.org/10.1201/b10718-21.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber-Routine Activities Theory"

1

Saad, Mohd Ezri, and Siti Norul Huda Sheikh Abdullah. "Victimization Analysis Based On Routine Activitiy Theory for Cyber-Love Scam in Malaysia." In 2018 Cyber Resilience Conference (CRC). IEEE, 2018. http://dx.doi.org/10.1109/cr.2018.8626818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kotkova, Barbora. "CYBER SECURITY IN THE HEALTHCARE SECTOR - CURRENT THREATS." In 22nd SGEM International Multidisciplinary Scientific GeoConference 2022. STEF92 Technology, 2022. http://dx.doi.org/10.5593/sgem2022/2.1/s07.02.

Full text
Abstract:
Information technology is a common part of human activities today. In most countries of the world, the security, health, and industrial sectors can be established here. The dependence of these sectors on information technology has been significantly strengthened by the global covid-19 pandemic and the current war in Ukraine. Data digitization has brought positives such as availability, fast transmission, and processing of necessary information. As well as negatives as constant attempts to steal, destroy or abuse them. Health care is one of the sectors where it is the target of not only enrichm
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!