To see the other types of publications on this topic, follow the link: Cyber-Routine Activities Theory.

Journal articles on the topic 'Cyber-Routine Activities Theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 39 journal articles for your research on the topic 'Cyber-Routine Activities Theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Navarro, Jordana N., and Jana L. Jasinski. "Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences." Sociological Spectrum 32, no. 1 (2011): 81–94. http://dx.doi.org/10.1080/02732173.2012.628560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Choi, Kyung-Shick, and Jin Ree Lee. "Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory." Computers in Human Behavior 73 (August 2017): 394–402. http://dx.doi.org/10.1016/j.chb.2017.03.061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Melander, Lisa, and Vivian Hughes. "College Partner Violence in the Digital Age: Explaining Cyber Aggression Using Routine Activities Theory." Partner Abuse 9, no. 2 (2018): 158–80. http://dx.doi.org/10.1891/1946-6560.9.2.158.

Full text
Abstract:
Partner violence is prevalent in contemporary society, and certain groups of individuals such as college students are particularly at high risk for becoming involved in aggressive relationships. Cyber aggression is an emerging area of societal concern; however, little is known about the prevalence of these online behaviors between romantic partners. Because of the dearth of literature on cyber aggression among current and former intimate partners, this study examines the correlates of partner cyber aggression using the routine activities theoretical perspective among a sample of undergraduate
APA, Harvard, Vancouver, ISO, and other styles
4

Ming-Li, Hsieh, and Kevin Wang Shun-Yung. "Routine Activities in a Virtual Space: A Taiwanese Case of an ATM Hacking Spree." International Journal of Cyber Criminology 12, no. 1 (2018): 333–52. https://doi.org/10.5281/zenodo.1467935.

Full text
Abstract:
<em>Routine activity theory (RAT) was initially proposed to explain shifts in urban crime rates in the late 1970s, and has subsequently been applied to predictions of predatory criminal or victimization events. Despite a number of studies attempting to apply RAT to the vast array of crimes now taking place in a virtual environment such as phishing, fraud, malware infection, identify theft, computer viruses and cyber stalking on the Internet in Western countries, little is known about whether RAT could address automatic teller machine (ATM) hacking in an Asian setting. The current study applies
APA, Harvard, Vancouver, ISO, and other styles
5

Morillo Puente, Solbey, and Iván Neftalí Ríos Hernández. "Cyber victimization within the Routine Activity Theory Framework in the Digital Age." Revista de Psicología 40, no. 1 (2022): 265–91. http://dx.doi.org/10.18800/psico.202201.009.

Full text
Abstract:
This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians.
APA, Harvard, Vancouver, ISO, and other styles
6

Griffith, Candace E., Melissa Teztlaff-Bemiller, and Lance Y. Hunter. "Understanding the cyber-victimization of young people: A test of routine activities theory." Telematics and Informatics Reports 9 (March 2023): 100042. http://dx.doi.org/10.1016/j.teler.2023.100042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Akdemir, Naci, and Christopher James Lawless. "Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: a lifestyle routine activities approach." Internet Research 30, no. 6 (2020): 1665–87. http://dx.doi.org/10.1108/intr-10-2019-0400.

Full text
Abstract:
PurposeThe purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes victimisation and to test the applicability of lifestyle routine activities theory (LRAT) to cybercrime victimisation.Design/methodology/approachA mixed methods research paradigm was applied to address the research questions and aims. The data set of Crime Survey of England and Wales (CSEW) 2014/2015 and 42 semi-structured interviews conducted with victims of cybercrime and non-victim control group participants were ana
APA, Harvard, Vancouver, ISO, and other styles
8

Van Ouytsel, Joris, Koen Ponnet, and Michel Walrave. "Cyber Dating Abuse Victimization Among Secondary School Students From a Lifestyle-Routine Activities Theory Perspective." Journal of Interpersonal Violence 33, no. 17 (2016): 2767–76. http://dx.doi.org/10.1177/0886260516629390.

Full text
Abstract:
Controlling one’s romantic partner through digital media is a form of cyber dating abuse. To design effective educational campaigns, a deeper understanding of how some young people become victim of this type of abuse within their romantic relationships is warranted. This study is the first to adopt a lifestyle-routine activities theory perspective toward online romantic partner monitoring, by looking at whether secondary school students’ risky digital lifestyle and their digital media use are linked to a higher chance of being controlled by a romantic partner, taking into account gender, age,
APA, Harvard, Vancouver, ISO, and other styles
9

Rodríguez, Juan Antonio, Jesús Oduber, and Endira Mora. "Actividades rutinarias y cibervictimización en Venezuela/ Routine activities and cyber-victimization in Venezuela." URVIO - Revista Latinoamericana de Estudios de Seguridad, no. 20 (June 29, 2017): 63. http://dx.doi.org/10.17141/urvio.20.2017.2583.

Full text
Abstract:
El ciberdelito ha aumentado significativamente a nivel mundial en estas últimas décadas. En tal sentido, la investigación sobre este fenómeno en Venezuela ha sido escasa, específicamente en lo que respecta a los factores asociados con la victimización en línea. En consecuencia, este estudio busca promover el análisis de los condicionantes del delito y la victimización en línea en la región. Para ello, se investiga un conjunto de variables derivadas de la Teoría de las actividades rutinarias. El propósito es observar su relación con la victimización por hackeo y acoso online en una muestra de 3
APA, Harvard, Vancouver, ISO, and other styles
10

Baek, Sinchul, Yongeun sUNG, and Cruz Erik. "Capable Guardianship and CRISIS of Identity Theft in the United States: Expanding Cyber-Routine Activities Theory." J-Institute 2, no. 1 (2017): 16–24. http://dx.doi.org/10.22471/crisis.2017.2.1.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Munir, Abdul, and Riki Harianto. "REALITAS PENYIMPANGAN SOSIAL DALAM KONTEKS CYBER SEXUAL HARRASMENT PADA JEJARING SOSIAL LIVE STREAMING BIGO LIVE." SISI LAIN REALITA 4, no. 2 (2020): 21–39. http://dx.doi.org/10.25299/sisilainrealita.2019.vol4(2).4825.

Full text
Abstract:
live streaming is a latest innovation for people to express themselves and exchange ideas. The current social media that is becoming a trend among the people and using live streaming as a means to interact is social media live streaming Bigo live. The existence of bigo live as an internet community forum (Cyber Community) certainly changes in the norms and values ​​adopted by these users, so it cannot be denied that in the internet community (Cyber Community) there are changes and rules that occur . One of them appears an interaction created virtually in the world, where the emergence of a for
APA, Harvard, Vancouver, ISO, and other styles
12

Olofinbiyi, Sogo Angel. "Cyber insecurity in the wake of COVID-19: a reappraisal of impacts and global experience within the context of routine activity theory." ScienceRise: Juridical Science, no. 1(19) (March 31, 2022): 37–45. http://dx.doi.org/10.15587/2523-4153.2022.253820.

Full text
Abstract:
Shortly after the enthronement of COVID-19 on the global continent, cyberspace became a dominant arena for social, economic, religious, educational, recreational and political activities across the world. This paper draws insights from the existing literature to illustrate how COVID-19 has provided situational opportunities for cyber criminals to strike and exploit people of their valuable resources through creating fraudulent websites as well as spreading of malware and ransomware to vulnerable users. To this end, routine activity theory becomes very dominant and crucial in understanding the
APA, Harvard, Vancouver, ISO, and other styles
13

Sogo, Angel Olofinbiyi. "Cyber insecurity in the wake of COVID-19: a reappraisal of impacts and global experience within the context of routine activity theory." ScienceRise: Juridical Science, no. 1(19) (March 31, 2022): 37–45. https://doi.org/10.15587/2523-4153.2022.253820.

Full text
Abstract:
Shortly after the enthronement of COVID-19 on the global continent, cyberspace became a dominant arena for social, economic, religious, educational, recreational and political activities across the world. This paper draws insights from the existing literature to illustrate how COVID-19 has provided situational opportunities for cyber criminals to strike and exploit people of their valuable resources through creating fraudulent websites as well as spreading of malware and ransomware to vulnerable users. To this end, routine activity theory becomes very dominant and crucial in understanding the
APA, Harvard, Vancouver, ISO, and other styles
14

Cheng, Yu. "The Impact of social media on Deviance and Crime." Journal of Education, Humanities and Social Sciences 22 (November 26, 2023): 873–77. http://dx.doi.org/10.54097/ehss.v22i.14555.

Full text
Abstract:
The popularity of social media platforms in the digital age has revolutionized how people engage with one another, share information, and interact with their environment. With the framework of social learning theory and routine activity theory, this article aims to summarize and analyze the impact of social media on deviance and crime. As a result, it is now clear how social media has an impact on a variety of societal issues, such as crime and deviance. Using information from a wide range of academic sources, this paper explores the complex connection between social media and crime or devianc
APA, Harvard, Vancouver, ISO, and other styles
15

Choi, Kyung-Shick, Kevin Earl, Jin Ree Lee, and Sujung Cho. "Diagnosis of cyber and non-physical bullying victimization: A lifestyles and routine activities theory approach to constructing effective preventative measures." Computers in Human Behavior 92 (March 2019): 11–19. http://dx.doi.org/10.1016/j.chb.2018.10.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

STAMATAKIS, Nikolaos, and Troy SMITH. "Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research." International Journal of Information Security and Cybercrime 8, no. 2 (2019): 53–88. http://dx.doi.org/10.19107/ijisc.2019.02.05.

Full text
Abstract:
In the last years, Caribbean countries have become attractive targets for cybercrime due to increased economic success and online presence with a low level of cyber resilience. The available data on cybersecurity and critical infrastructure shows that cyber-attacks and -incidents, particularly those carried out with criminal intent, have been increasing in frequency and sophistication. This study examines the variables or more specifically the online-related activities in Trinidad and Tobago that affect cybercrime victimization by using the Routine Activity Theory. Using Bayesian classifiers a
APA, Harvard, Vancouver, ISO, and other styles
17

Ulo, Edafe, Mathias Oghenetejiri Obire, Collins Emudiaga Akpumuvie, and Helen Eloho Ogbeide. "Motivational Analysis Behind Cyber Criminal Behaviour in Nigeria." European Journal of Arts, Humanities and Social Sciences 1, no. 5 (2024): 61–71. http://dx.doi.org/10.59324/ejahss.2024.1(5).03.

Full text
Abstract:
The invention of the cyberspace showcased in the use of internet, a necessary tool that has come to stay, defining how people interact and communicate on daily basis, defiling the phenomenon of time and space, thereby making the world a global community. The internet can be said to be a two edged sword that is advantageous and can be destructive depending on the application and user motivations. It’s on this note that the work analyzes the motivations behind cybercriminal behaviour in Nigeria, Identifying ‘anonymity in cyberspace, thrill-seeking, financial gain, revenge seeking, addiction, law
APA, Harvard, Vancouver, ISO, and other styles
18

Ulo, Edafe, Mathias Oghenetejiri Obire, Collins Emudiaga Akpumuvie, and Helen Eloho Ogbeide. "Motivational Analysis Behind Cyber Criminal Behaviour in Nigeria." European Journal of Arts, Humanities and Social Sciences 1, no. 5 (2024): 61–71. https://doi.org/10.59324/ejahss.2024.1(5).03.

Full text
Abstract:
The invention of the cyberspace showcased in the use of internet, a necessary tool that has come to stay, defining how people interact and communicate on daily basis, defiling the phenomenon of time and space, thereby making the world a global community. The internet can be said to be a two edged sword that is advantageous and can be destructive depending on the application and user motivations. It&rsquo;s on this note that the work analyzes the motivations behind cybercriminal behaviour in Nigeria, Identifying &lsquo;anonymity in cyberspace, thrill-seeking, financial gain, revenge seeking, ad
APA, Harvard, Vancouver, ISO, and other styles
19

Kharisma, Rikha Ayu Minda, and Rahmawati Zulfiningrum. "REPRESENTASI CYBER SOCIETY DALAM FILM “SEARCHING”." Jurnal Audience 3, no. 2 (2020): 250–72. http://dx.doi.org/10.33633/ja.v3i2.4066.

Full text
Abstract:
AbstrakMasyarakat cyber merupakan salah satu bentuk penciptaan budaya baru yang disebabkan oleh perkembangan teknologi informasi dan komunikasi. Teknologi saat ini memiliki banyak manfaat untuk membantu masyarakat dalam menyelesaikan aktivitas rutinnya, dimana digitalisasi telah terjadi di berbagai bidang dan menjadi kebiasaan baru masyarakat. Searching, salah satu film yang diproduksi tahun 2018 ini mengisahkan fenomena teknologi. Film tersebut menggambarkan bahwa menemukan orang hilang dengan rekam jejak digital adalah mungkin dan bisa menjadi jalan keluarnya. Lebih jauh, film ini tidak hany
APA, Harvard, Vancouver, ISO, and other styles
20

Jonathan Baan Naab and Opeolu Amusa. "Mitigating security risks in global supply chains: The role of strategic communication and criminological approaches in countering illicit trade and cyber threats." Computer Science & IT Research Journal 5, no. 9 (2024): 2197–215. http://dx.doi.org/10.51594/csitrj.v5i9.1579.

Full text
Abstract:
In the era of global commerce, the integrity and resilience of supply chains have become paramount. However, the increasing complexity of international supply networks has exposed them to a myriad of security risks, including both physical threats and cyberattacks. This paper explores the critical role of strategic communication and criminological approaches in mitigating security risks within global supply chains. It argues that a proactive approach to security—one that integrates effective communication strategies and criminological theories—can significantly enhance the ability of organizat
APA, Harvard, Vancouver, ISO, and other styles
21

Parti, Katalin. "Explaining Online Fraud Victimization of Older Adults via Cyber Routines and Lifestyles." Innovation in Aging 5, Supplement_1 (2021): 765–66. http://dx.doi.org/10.1093/geroni/igab046.2835.

Full text
Abstract:
Abstract The paper compares victim group characteristics: the differences between individuals under 55 and 55 and older, victimized by online fraud committed by a stranger. We test Cyber-Routine Activities Theory (cyber-RAT; Choi, 2008). In addition to active online lifestyle and computer familiarity, we include in the analysis independent variables such as living arrangements, occupation, and the willingness to report and ask for help. A representative sample of US citizens 18 or older was collected using a Dynata research panel in October 2020. We utilized one-way ANOVA on ranks for testing
APA, Harvard, Vancouver, ISO, and other styles
22

Choi, Kyung-Shick, Sujung Cho, and Jin Ree Lee. "Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine activities theory with latent class analysis." Computers in Human Behavior 100 (November 2019): 1–10. http://dx.doi.org/10.1016/j.chb.2019.06.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Horgan, Shane, Ben Collier, Richard Jones, and Lynsay Shepherd. "Re-territorialising the policing of cybercrime in the post-COVID-19 era: towards a new vision of local democratic cyber policing." Journal of Criminal Psychology 11, no. 3 (2021): 222–39. http://dx.doi.org/10.1108/jcp-08-2020-0034.

Full text
Abstract:
Purpose The purpose of this study is to develop the theorisation of cybercrime in the context of the pandemic, and to sketch out a vision of how law enforcement might respond to a transformed landscape of online crime and offending. Design/methodology/approach This conceptual paper draws on empirical evidence from a range of sources (including official statistics) and the existing research literature, and revisits routine activities theory to illuminate the way that cybercrime patterns are being transformed by the pandemic. Findings The pandemic is reshaping the routine activities of societies
APA, Harvard, Vancouver, ISO, and other styles
24

Praveen, Yashna, Mijin Kim, and Kyung-Shick Choi. "Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT)." International Journal of Cybersecurity Intelligence & Cybercrime 7, no. 2 (2024). http://dx.doi.org/10.52306/2578-3289.1186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Vale, Maria, Filipa Pereira, Brian H. Spitzberg, and Marlene Matos. "Cyber‐harassment victimization of Portuguese adolescents: A lifestyle‐routine activities theory approach." Behavioral Sciences & the Law, September 14, 2022. http://dx.doi.org/10.1002/bsl.2596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Akgül, Gülendam. "Routine Activities Theory in cyber victimization and cyberbullying experiences of Turkish adolescents." International Journal of School & Educational Psychology, October 1, 2021, 1–10. http://dx.doi.org/10.1080/21683603.2021.1980475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Choi, KS, TM Scott, and DP LeClair. "Ransomware Against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory." July 23, 2016. https://doi.org/10.19070/2332-287X-1600061.

Full text
Abstract:
Technologically advanced hackers are able to commit a crime and leave undiscovered by the authorities. Recent increases in cyber-attacks utilizing technology known as ransomware are leaving police departments and other institutions in the serious situation of having to pay ransom to cybercriminals. The present study employs a Cyber-Routine Theoretical approach in explaining why ransomware victimization has become a viral phenomenon. Data were derived from the recent reported cases of ransomware attacks towards police departments in the US. and analyzed in order to build a victim profile. This
APA, Harvard, Vancouver, ISO, and other styles
28

Griffith, Candace E., Melissa Tetzlaff-Bemiller, and Lance Y. Hunter. "Understanding the Cyber-Victimization of Young People: A Test of Routine Activities Theory." SSRN Electronic Journal, 2022. http://dx.doi.org/10.2139/ssrn.4226850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Lin, Kai, Yuning Wu, Ivan Y. Sun, and Jia Qu. "Telecommunication and cyber fraud victimization among Chinese college students: An application of routine activity theory." Criminology & Criminal Justice, January 4, 2023, 174889582211461. http://dx.doi.org/10.1177/17488958221146144.

Full text
Abstract:
Analyzing survey data from 1037 college students in China, a country with the world’s largest number of Internet users and the world’s largest e-commerce market, the current study demonstrates that consistent with previous research, some routine telecom/cyber activities of Chinese college students predict higher odds of being targeted for telecom/cyber fraud, but online routines do not seem to predict the odds of completed victimization resulting in a financial loss. In contrast, the perceived presence of effective formal guardianship and target suitability exert a greater influence. These fin
APA, Harvard, Vancouver, ISO, and other styles
30

KS, Choi, Scott TM, and LeClair DP. "Ransomware Against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory." International Journal of Forensic Science & Pathology, July 23, 2016, 253–58. http://dx.doi.org/10.19070/2332-287x-1600061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Wick, S. Elizabeth, Craig Nagoshi, Randy Basham, et al. "Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory." International Journal of Cyber Criminology 11, no. 1 (2017). https://doi.org/10.5281/zenodo.495770.

Full text
Abstract:
<em>A sample of 298 college students at a large southwestern state university (female 68.8%) completed an online survey about their experiences of being victimized by and engaging in perpetration of cyber-harassment of romantic partners. The findings partially supported the application of Routine Activities Theory to understand the predictors of cyber-harassment for victims and victimizers. Victimization for women was associated with greater general risk-taking propensity and reported online exposure and disclosure. For both men and women, greater risk propensity and online disclosure were ass
APA, Harvard, Vancouver, ISO, and other styles
32

Rege, Aunshul. "A Criminological Perspective on Power Grid Cyber attacks: Using Routine Activities Theory to Rational Choice Perspective to Explore Adversarial Decision-Making." Journal of Homeland Security and Emergency Management 11, no. 4 (2014). http://dx.doi.org/10.1515/jhsem-2013-0061.

Full text
Abstract:
AbstractThe US power grid has been identified by security experts as a prime target for terrorist-based and state-sponsored cyber attacks. In addition to downing the grid, cyber attacks can also destroy and manipulate data systems, obtain sensitive intellectual property and steal trade secrets. Existing research has addressed the technical factors, such as vulnerabilities and poor intrusion detection systems, which lead to cyber attacks. However, it remains silent on the human factors in the cyber attack equation. This study uses a criminological framework, specifically Routine Activities Theo
APA, Harvard, Vancouver, ISO, and other styles
33

Lee, Yi Yong, Chin Lay Gan, and Tze Wei Liew. "Phishing victimization among Malaysian young adults: cyber routine activities theory and attitude in information sharing online." Journal of Adult Protection, August 31, 2022. http://dx.doi.org/10.1108/jap-06-2022-0011.

Full text
Abstract:
Purpose The purpose of this paper is to understand the influence of exposure to motivated offenders who may alter the vulnerability levels to phishing victimization. This is particularly focused on explaining the influences of individuals’ online lifestyles and attitudes toward information sharing online on phishing susceptibility. Design/methodology/approach This conceptual paper explores the risk of phishing victimization using criminological theories. The authors draw on empirical evidence from existing cybercrime literature and revisit routine activities theory (RAT) and lifestyle RAT (LRA
APA, Harvard, Vancouver, ISO, and other styles
34

Smith, Troy, and Nikolaos Stamatakis. "Cyber-victimization Trends in Trinidad & Tobago: The Results of An Empirical Research." International Journal of Cybersecurity Intelligence and Cybercrime, April 5, 2021, 46–63. http://dx.doi.org/10.52306/04010421jine3509.

Full text
Abstract:
Cybertechnology has brought benefits to the Caribbean in the form of new regional economic and social growth. In the last years, Caribbean countries have also become attractive targets for cybercrime due to increased economic success and online presence with a low level of cyber resilience. This study examines the online-related activities that affect cybercrime victimization by using the Routine Activity Theory (RAT). The present study seeks to identify activities that contribute to different forms of cybercrime victimization and develop risk models for these crimes, particularly the understu
APA, Harvard, Vancouver, ISO, and other styles
35

Ho, Heemeng, John Gilmour, Lorraine Mazerolle, and Ryan Ko. "Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study." Security Journal, March 21, 2023. http://dx.doi.org/10.1057/s41284-023-00371-8.

Full text
Abstract:
AbstractPlace management is central to Routine Activities Theory and proactive utilization of place managers is one of 25 Situational Crime Prevention techniques. Yet little is known about the effectiveness of using place managers to prevent cybercrimes. This paper uses a vignette experimental survey of 213 cybersecurity professionals to explore their perceptions of cybercrime prevention. We find that organizations that partner with and proactively utilize cybersecurity professionals as place managers are perceived as more effective in controlling cybercrimes than those organizations that do n
APA, Harvard, Vancouver, ISO, and other styles
36

Gan, Chin Lay, Yi Yong Lee, and Tze Wei Liew. "Fishing for phishy messages: predicting phishing susceptibility through the lens of cyber-routine activities theory and heuristic-systematic model." Humanities and Social Sciences Communications 11, no. 1 (2024). http://dx.doi.org/10.1057/s41599-024-04083-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kayser, Christopher S., Mary Ellen Mastrorilli, and Robert Cadigan. "Preventing cybercrime: A framework for understanding the role of human vulnerabilities." Cyber Security: A Peer-Reviewed Journal, December 1, 2019. http://dx.doi.org/10.69554/sfox9866.

Full text
Abstract:
Cybercrime is the fastest growing form of crime in the world today. Currently, advancements in artificial intelligence (AI) and machine learning (ML) cannot accurately predict how humans will respond to cyberattacks, particularly those that incorporate social engineering (SEing) into their design. Cybercriminals have learned to utilise SEing as an effective means to dupe users of technology (UoT) to into being victimised by capitalising on known vulnerabilities related to human nature and human curiosity, which the authors collectively refer to as the human dimension. This paper introduces a n
APA, Harvard, Vancouver, ISO, and other styles
38

Welsh, Andrew, and Jennifer A. A. Lavoie. "Risky eBusiness: An Examination of Risk-taking, Online Disclosiveness, and Cyberstalking Victimization." Cyberpsychology: Journal of Psychosocial Research on Cyberspace 6, no. 1 (2012). http://dx.doi.org/10.5817/cp2012-1-4.

Full text
Abstract:
The expansion of online social networking sites and the relative accessibility to personal information provided by these sites has raised concerns about the risks for a variety of negative experiences, including cyberstalking. The present study investigated whether the theoretical concepts of Routine Activities Theory (RAT) could account for patterns of cyberstalking victimization among social networking site users. The study employed a self-report survey design using a convenience sample of 321 female undergraduate students. RAT was operationalized in the cyber context by measuring the level
APA, Harvard, Vancouver, ISO, and other styles
39

Hazra, Ummaha, and Asad Karim Khan Priyo. "Unethical practices in online classes during COVID-19 pandemic: an analysis of affordances using routine activity theory." Journal of Information, Communication and Ethics in Society, August 10, 2022. http://dx.doi.org/10.1108/jices-10-2021-0102.

Full text
Abstract:
Purpose While online classes have enabled many universities to carry out their regular academic activities, they have also given rise to new and unanticipated ethical concerns. We focus on the “dark side” of online class settings and attempt to illuminate the ethical problems associated with them. The purpose of this study is to investigate the affordances stemming from the technology-user interaction that can result in negative outcomes. We also attempt to understand the context in which these deleterious affordances are actualized. Design/methodology/approach We obtain the data from narrativ
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!