The central question of this article is whether routine activity theory (RAT) can be used as an analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of empirical studies have thus far failed to provide a clear answer. The multivariate analysis presented in this article tries to avoid some of the limitations of other RAT-based studies. Based on a large sample (N = 9,161), the effects of value, visibility, accessibility, and guardianship on victimization of six cybercrimes have been studied. Analysis shows some RAT elements are more applicable than others. Visibility clearly plays a role within cybercrime victimization. Accessibility and personal capable guardianship show varying results. Value and technical capable guardianship show almost no effects on cybercrime victimization.
General rightsCopyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights.• Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ?
Take down policyIf you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.
This article investigates phishing victims, especially the increased or decreased risk of victimization, using data from a cybercrime victim survey in the Netherlands (n=10,316). Routine activity theory provides the theoretical perspective. According to routine activity theory, several factors influence the risk of victimization. A multivariate analysis was conducted to assess which factors actually lead to increased risk of victimization. The model included background and financial data of victims, their Internet activities, and the degree to which they were "digitally accessible" to an offender. The analysis showed that personal background and financial characteristics play no role in phishing victimization. Among eight Internet activities, only "targeted browsing" led to increased risk. As for accessibility, using popular operating systems and web browsers does not lead to greater risk, while having up-to-date antivirus software as a technically capable guardian has no effect. The analysis showed no one, clearly defined group has an increased chance of becoming a victim. Target hardening may help, but opportunities for prevention campaigns aimed at a specific target group or dangerous online activities are limited. Therefore, situational crime prevention will have to come from a different angle. Banks could play the role of capable guardian.
General rightsCopyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights.• Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ?
Take down policyIf you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.
Criminological research over the last couple of decades has improved our understanding of cybercrimes. However, this body of research is regarded as still theoretically thin and not fully developed; more knowledge on the actors involved, their characteristics, and modus operandi is needed. Some publications recently suggested that organised crime is or might be involved in cybercrimes, which would have important policing implications, but evidence-based research on this point is still scarce and inconclusive. This article seeks to further this path of inquiry by providing a systematic analysis of 40 cases from The Netherlands, Germany, UK, and USA where criminal networks were involved in financial cybercrimes affecting the banking sector. It also assesses whether and to what extent these criminal networks meet the definitions of organised crime and discusses the theoretical and policing implications of our findings.
General rightsCopyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights.• Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ?
Take down policyIf you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.
This study provides a partial test of the relationship between actor motivations and target suitability using a routine activity framework to understand a form of cybercrime called web defacements. Specifically, the relationships between the visibility, inertia, value, and accessibility of the target in online spaces relative to the unique nonmonetary motivations of the attacker were examined. This study utilized a sample of 138,361 web defacements performed against websites hosted within the Netherlands IP space from January 2011 to April 2017. Seven multinomial logistic regression models were conducted for each self-identified motive for the attack, clustered by attacker to minimize the size of standard errors. The findings demonstrated partial support for aspects of routine activity theory to account for differences in offender motivation, suggesting web defacements are similar to other forms of cybercrime. At the same time, motivations differentially shape target selection.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.