Understanding the state of criminological scholarship on cybercrimes

TJ Holt - Computers in Human Behavior, 2023 - Elsevier
Understanding the state of criminological scholarship on cybercrimes - ScienceDirect Skip to
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View PDF …

A systematic literature review of routine activity theory's applicability in cybercrimes

R Ahmad, R Thurasamy - Journal of Cyber Security …, 2022 - journals.riverpublishers.com
A Systematic Literature Review of Routine Activity Theory’s Applicability in Cybercrimes |
Journal of Cyber Security and Mobility ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print …

A multi-level influence model of COVID-19 themed cybercrime

R Naidoo - European Journal of Information Systems, 2020 - Taylor & Francis
The recent severity and frequency of cybercrime has been dominated by a single theme–the
COVID-19 pandemic. This research develops a multi-level influence model to explore how …

Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: A lifestyle routine activities approach

N Akdemir, CJ Lawless - Internet Research, 2020 - emerald.com
Purpose The purpose of this study was to explore human factors as the possible facilitator of
cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes …

Towards the psychological profile of cryptocurrency early adopters: Overconfidence and self-control as predictors of cryptocurrency use

F Sudzina, M Dobes, A Pavlicek - Current Psychology, 2023 - Springer
There is a growing interest in cryptocurrencies. While for the first several years, it was
virtually only tech-savvy enthusiasts who used cryptocurrencies mostly mined by …

Victimization in cyberspace: Is it how long we spend online, what we do online, or what we post online?

FT Ngo, AR Piquero, J LaPrade… - Criminal Justice …, 2020 - journals.sagepub.com
Prior research on cybercrime victimization has generally emphasized the linkage between
the frequency or actual length of time individuals spend online engaging in certain activities …

Exploring the determinants of victimization and fear of online identity theft: An empirical study

I Guedes, M Martins, CS Cardoso - Security Journal, 2023 - Springer
The present study aims at understanding what factors contribute to the explanation of online
identity theft (OIT) victimization and fear, using the Routine Activity Theory (RAT) …

In their own words: deception detection by victims and near victims of fraud

M Junger, L Koning, P Hartel, B Veldkamp - Frontiers in psychology, 2023 - frontiersin.org
Aim Research on deception detection has usually been executed in experimental settings in
the laboratory. In contrast, the present research investigates deception detection by actual …

Automotive cybersecurity: Assessing a new platform for cybercrime and malicious hacking

J Kennedy, T Holt, B Cheng - Journal of Crime and Justice, 2019 - Taylor & Francis
The push for technological enhancement and Internet connectivity in all aspects of modern
life is radically transforming our use of devices and equipment that was not designed with …

Convenience theory and cybercrime opportunity: An analysis of online cyber offending

TE Dearden, P Gottschalk - Deviant Behavior, 2024 - Taylor & Francis
The private nature of business creates opportunities for financial crimes. Convenience
theory suggests that opportunity, accompanied by a willingness and motive, explains …