Lifestyles and routine activities: Do they enable different types of cyber abuse?
Autor: | Danielle M. Reynald, Michael Kenneth Townsley, Zarina I. Vakhitova, Clair L. Alston-Knox, Julianne Webster |
---|---|
Rok vydání: | 2019 |
Předmět: |
Research design
education Applied psychology Population ComputingMilieux_LEGALASPECTSOFCOMPUTING 050801 communication & media studies Sample (statistics) 0508 media and communications Arts and Humanities (miscellaneous) Information system health care economics and organizations General Psychology education.field_of_study business.industry 05 social sciences 050301 education Activity theory social sciences humanities Human-Computer Interaction The Internet business Cyberspace Psychology 0503 education |
Zdroj: | Computers in Human Behavior. 101:225-237 |
ISSN: | 0747-5632 |
DOI: | 10.1016/j.chb.2019.07.012 |
Popis: | Background The emergence of new technology-facilitated types of crime following the advent of the Internet necessitated the re-examination of the utility of traditional theories such as lifestyle-routine activity theory to explain crimes that occur in the new and unique environment of cyberspace. Reason for study The objective of this study was to investigate whether victims’ lifestyles and routine activities can help explain the risk of victimization from direct, indirect and mixed types of cyber abuse. Research design To achieve this objective, the data from a large nationwide (US) crowd-sourced sample (N = 1463) of adult members of an online labour portal Mechanical Turk was collected using an online survey platform Qualtrics and then analyzed using Bayesian Profile Regression to identify clusters of lifestyles and routine activities of victims associated with victimization from different types of cyber abuse. Findings Our analyses were able to distinguish between victims and non-victims as well as between victims of different sub-classifications of cyber abuse. Specifically, we have identified five population subgroups based on their lifestyles and routine activities in terms of the associated risk of personal victimization from different types of cyber abuse. This paper discusses the differences in lifestyles and routine activities between the identified groups. Conclusions Our findings generally support the empirical utility of lifestyle-routine activity theory to explain cyber abuse victimization; as with other traditional types of crime (e.g. robbery or assault), victims’ lifestyles and routine activities play a significant role in their risk of various types of cyber abuse victimization. |
Databáze: | OpenAIRE |
Externí odkaz: |