Journal articles on the topic 'Cyber-Routine Activities Theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 39 journal articles for your research on the topic 'Cyber-Routine Activities Theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Navarro, Jordana N., and Jana L. Jasinski. "Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences." Sociological Spectrum 32, no. 1 (2011): 81–94. http://dx.doi.org/10.1080/02732173.2012.628560.
Full textChoi, Kyung-Shick, and Jin Ree Lee. "Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory." Computers in Human Behavior 73 (August 2017): 394–402. http://dx.doi.org/10.1016/j.chb.2017.03.061.
Full textMelander, Lisa, and Vivian Hughes. "College Partner Violence in the Digital Age: Explaining Cyber Aggression Using Routine Activities Theory." Partner Abuse 9, no. 2 (2018): 158–80. http://dx.doi.org/10.1891/1946-6560.9.2.158.
Full textMing-Li, Hsieh, and Kevin Wang Shun-Yung. "Routine Activities in a Virtual Space: A Taiwanese Case of an ATM Hacking Spree." International Journal of Cyber Criminology 12, no. 1 (2018): 333–52. https://doi.org/10.5281/zenodo.1467935.
Full textMorillo Puente, Solbey, and Iván Neftalí Ríos Hernández. "Cyber victimization within the Routine Activity Theory Framework in the Digital Age." Revista de Psicología 40, no. 1 (2022): 265–91. http://dx.doi.org/10.18800/psico.202201.009.
Full textGriffith, Candace E., Melissa Teztlaff-Bemiller, and Lance Y. Hunter. "Understanding the cyber-victimization of young people: A test of routine activities theory." Telematics and Informatics Reports 9 (March 2023): 100042. http://dx.doi.org/10.1016/j.teler.2023.100042.
Full textAkdemir, Naci, and Christopher James Lawless. "Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: a lifestyle routine activities approach." Internet Research 30, no. 6 (2020): 1665–87. http://dx.doi.org/10.1108/intr-10-2019-0400.
Full textVan Ouytsel, Joris, Koen Ponnet, and Michel Walrave. "Cyber Dating Abuse Victimization Among Secondary School Students From a Lifestyle-Routine Activities Theory Perspective." Journal of Interpersonal Violence 33, no. 17 (2016): 2767–76. http://dx.doi.org/10.1177/0886260516629390.
Full textRodríguez, Juan Antonio, Jesús Oduber, and Endira Mora. "Actividades rutinarias y cibervictimización en Venezuela/ Routine activities and cyber-victimization in Venezuela." URVIO - Revista Latinoamericana de Estudios de Seguridad, no. 20 (June 29, 2017): 63. http://dx.doi.org/10.17141/urvio.20.2017.2583.
Full textBaek, Sinchul, Yongeun sUNG, and Cruz Erik. "Capable Guardianship and CRISIS of Identity Theft in the United States: Expanding Cyber-Routine Activities Theory." J-Institute 2, no. 1 (2017): 16–24. http://dx.doi.org/10.22471/crisis.2017.2.1.16.
Full textMunir, Abdul, and Riki Harianto. "REALITAS PENYIMPANGAN SOSIAL DALAM KONTEKS CYBER SEXUAL HARRASMENT PADA JEJARING SOSIAL LIVE STREAMING BIGO LIVE." SISI LAIN REALITA 4, no. 2 (2020): 21–39. http://dx.doi.org/10.25299/sisilainrealita.2019.vol4(2).4825.
Full textOlofinbiyi, Sogo Angel. "Cyber insecurity in the wake of COVID-19: a reappraisal of impacts and global experience within the context of routine activity theory." ScienceRise: Juridical Science, no. 1(19) (March 31, 2022): 37–45. http://dx.doi.org/10.15587/2523-4153.2022.253820.
Full textSogo, Angel Olofinbiyi. "Cyber insecurity in the wake of COVID-19: a reappraisal of impacts and global experience within the context of routine activity theory." ScienceRise: Juridical Science, no. 1(19) (March 31, 2022): 37–45. https://doi.org/10.15587/2523-4153.2022.253820.
Full textCheng, Yu. "The Impact of social media on Deviance and Crime." Journal of Education, Humanities and Social Sciences 22 (November 26, 2023): 873–77. http://dx.doi.org/10.54097/ehss.v22i.14555.
Full textChoi, Kyung-Shick, Kevin Earl, Jin Ree Lee, and Sujung Cho. "Diagnosis of cyber and non-physical bullying victimization: A lifestyles and routine activities theory approach to constructing effective preventative measures." Computers in Human Behavior 92 (March 2019): 11–19. http://dx.doi.org/10.1016/j.chb.2018.10.014.
Full textSTAMATAKIS, Nikolaos, and Troy SMITH. "Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research." International Journal of Information Security and Cybercrime 8, no. 2 (2019): 53–88. http://dx.doi.org/10.19107/ijisc.2019.02.05.
Full textUlo, Edafe, Mathias Oghenetejiri Obire, Collins Emudiaga Akpumuvie, and Helen Eloho Ogbeide. "Motivational Analysis Behind Cyber Criminal Behaviour in Nigeria." European Journal of Arts, Humanities and Social Sciences 1, no. 5 (2024): 61–71. http://dx.doi.org/10.59324/ejahss.2024.1(5).03.
Full textUlo, Edafe, Mathias Oghenetejiri Obire, Collins Emudiaga Akpumuvie, and Helen Eloho Ogbeide. "Motivational Analysis Behind Cyber Criminal Behaviour in Nigeria." European Journal of Arts, Humanities and Social Sciences 1, no. 5 (2024): 61–71. https://doi.org/10.59324/ejahss.2024.1(5).03.
Full textKharisma, Rikha Ayu Minda, and Rahmawati Zulfiningrum. "REPRESENTASI CYBER SOCIETY DALAM FILM “SEARCHING”." Jurnal Audience 3, no. 2 (2020): 250–72. http://dx.doi.org/10.33633/ja.v3i2.4066.
Full textJonathan Baan Naab and Opeolu Amusa. "Mitigating security risks in global supply chains: The role of strategic communication and criminological approaches in countering illicit trade and cyber threats." Computer Science & IT Research Journal 5, no. 9 (2024): 2197–215. http://dx.doi.org/10.51594/csitrj.v5i9.1579.
Full textParti, Katalin. "Explaining Online Fraud Victimization of Older Adults via Cyber Routines and Lifestyles." Innovation in Aging 5, Supplement_1 (2021): 765–66. http://dx.doi.org/10.1093/geroni/igab046.2835.
Full textChoi, Kyung-Shick, Sujung Cho, and Jin Ree Lee. "Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine activities theory with latent class analysis." Computers in Human Behavior 100 (November 2019): 1–10. http://dx.doi.org/10.1016/j.chb.2019.06.007.
Full textHorgan, Shane, Ben Collier, Richard Jones, and Lynsay Shepherd. "Re-territorialising the policing of cybercrime in the post-COVID-19 era: towards a new vision of local democratic cyber policing." Journal of Criminal Psychology 11, no. 3 (2021): 222–39. http://dx.doi.org/10.1108/jcp-08-2020-0034.
Full textPraveen, Yashna, Mijin Kim, and Kyung-Shick Choi. "Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT)." International Journal of Cybersecurity Intelligence & Cybercrime 7, no. 2 (2024). http://dx.doi.org/10.52306/2578-3289.1186.
Full textVale, Maria, Filipa Pereira, Brian H. Spitzberg, and Marlene Matos. "Cyber‐harassment victimization of Portuguese adolescents: A lifestyle‐routine activities theory approach." Behavioral Sciences & the Law, September 14, 2022. http://dx.doi.org/10.1002/bsl.2596.
Full textAkgül, Gülendam. "Routine Activities Theory in cyber victimization and cyberbullying experiences of Turkish adolescents." International Journal of School & Educational Psychology, October 1, 2021, 1–10. http://dx.doi.org/10.1080/21683603.2021.1980475.
Full textChoi, KS, TM Scott, and DP LeClair. "Ransomware Against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory." July 23, 2016. https://doi.org/10.19070/2332-287X-1600061.
Full textGriffith, Candace E., Melissa Tetzlaff-Bemiller, and Lance Y. Hunter. "Understanding the Cyber-Victimization of Young People: A Test of Routine Activities Theory." SSRN Electronic Journal, 2022. http://dx.doi.org/10.2139/ssrn.4226850.
Full textLin, Kai, Yuning Wu, Ivan Y. Sun, and Jia Qu. "Telecommunication and cyber fraud victimization among Chinese college students: An application of routine activity theory." Criminology & Criminal Justice, January 4, 2023, 174889582211461. http://dx.doi.org/10.1177/17488958221146144.
Full textKS, Choi, Scott TM, and LeClair DP. "Ransomware Against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory." International Journal of Forensic Science & Pathology, July 23, 2016, 253–58. http://dx.doi.org/10.19070/2332-287x-1600061.
Full textWick, S. Elizabeth, Craig Nagoshi, Randy Basham, et al. "Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory." International Journal of Cyber Criminology 11, no. 1 (2017). https://doi.org/10.5281/zenodo.495770.
Full textRege, Aunshul. "A Criminological Perspective on Power Grid Cyber attacks: Using Routine Activities Theory to Rational Choice Perspective to Explore Adversarial Decision-Making." Journal of Homeland Security and Emergency Management 11, no. 4 (2014). http://dx.doi.org/10.1515/jhsem-2013-0061.
Full textLee, Yi Yong, Chin Lay Gan, and Tze Wei Liew. "Phishing victimization among Malaysian young adults: cyber routine activities theory and attitude in information sharing online." Journal of Adult Protection, August 31, 2022. http://dx.doi.org/10.1108/jap-06-2022-0011.
Full textSmith, Troy, and Nikolaos Stamatakis. "Cyber-victimization Trends in Trinidad & Tobago: The Results of An Empirical Research." International Journal of Cybersecurity Intelligence and Cybercrime, April 5, 2021, 46–63. http://dx.doi.org/10.52306/04010421jine3509.
Full textHo, Heemeng, John Gilmour, Lorraine Mazerolle, and Ryan Ko. "Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study." Security Journal, March 21, 2023. http://dx.doi.org/10.1057/s41284-023-00371-8.
Full textGan, Chin Lay, Yi Yong Lee, and Tze Wei Liew. "Fishing for phishy messages: predicting phishing susceptibility through the lens of cyber-routine activities theory and heuristic-systematic model." Humanities and Social Sciences Communications 11, no. 1 (2024). http://dx.doi.org/10.1057/s41599-024-04083-1.
Full textKayser, Christopher S., Mary Ellen Mastrorilli, and Robert Cadigan. "Preventing cybercrime: A framework for understanding the role of human vulnerabilities." Cyber Security: A Peer-Reviewed Journal, December 1, 2019. http://dx.doi.org/10.69554/sfox9866.
Full textWelsh, Andrew, and Jennifer A. A. Lavoie. "Risky eBusiness: An Examination of Risk-taking, Online Disclosiveness, and Cyberstalking Victimization." Cyberpsychology: Journal of Psychosocial Research on Cyberspace 6, no. 1 (2012). http://dx.doi.org/10.5817/cp2012-1-4.
Full textHazra, Ummaha, and Asad Karim Khan Priyo. "Unethical practices in online classes during COVID-19 pandemic: an analysis of affordances using routine activity theory." Journal of Information, Communication and Ethics in Society, August 10, 2022. http://dx.doi.org/10.1108/jices-10-2021-0102.
Full text