메뉴 건너뛰기




Volumn 30, Issue 1, 2009, Pages 1-25

Examining the applicability of lifestyle-routine activities theory for cybercrime victimization

Author keywords

[No Author keywords available]

Indexed keywords


EID: 57649120953     PISSN: 01639625     EISSN: 15210456     Source Type: Journal    
DOI: 10.1080/01639620701876577     Document Type: Article
Times cited : (288)

References (36)
  • 1
    • 0034469994 scopus 로고    scopus 로고
    • An Empirical Study of Stalking Victimization
    • Bjerregaard, Beth. 2000. "An Empirical Study of Stalking Victimization." Violence and Victims 15:389-406.
    • (2000) Violence and Victims , vol.15 , pp. 389-406
    • Bjerregaard, B.1
  • 3
    • 0000204509 scopus 로고
    • Social Change and Crime Rate Trends: A Routine Activity Approach
    • Cohen, Lawrence E. and Marcus Felson. 1979. "Social Change and Crime Rate Trends: A Routine Activity Approach." American Sociological Review 44:588-608.
    • (1979) American Sociological Review , vol.44 , pp. 588-608
    • Cohen, L.E.1    Felson, M.2
  • 4
    • 3242808612 scopus 로고    scopus 로고
    • Computer Security Institute, Retrieved June 3, 2007, from
    • Computer Security Institute. 2007. "Computer Crime and Security Survey." Retrieved June 3, 2007, from (http://www.cybercrime.gov/FBI2006. pdf).
    • (2007) Computer Crime and Security Survey
  • 7
    • 1842424381 scopus 로고    scopus 로고
    • A Survey of Online Harassment at a University Campus
    • Finn, Jerry. 2004. "A Survey of Online Harassment at a University Campus." Journal of Interpersonal Violence 19(4):468-483.
    • (2004) Journal of Interpersonal Violence , vol.19 , Issue.4 , pp. 468-483
    • Finn, J.1
  • 8
    • 57649140097 scopus 로고    scopus 로고
    • Fisher, Bonnie S., Francis T. Cullen, and Michael G. Turner. 2002. Being Pursued: Stalking Victimization in a National Study of College Women. Criminology and Public Policy 1(2):257-308.
    • Fisher, Bonnie S., Francis T. Cullen, and Michael G. Turner. 2002. "Being Pursued: Stalking Victimization in a National Study of College Women." Criminology and Public Policy 1(2):257-308.
  • 9
    • 55149099320 scopus 로고    scopus 로고
    • the Information Society. Boston, MA: Addison-Wesley
    • Furnell, Steven. 2002. Cybercrime: Vandalizing the Information Society. Boston, MA: Addison-Wesley.
    • (2002) Cybercrime: Vandalizing
    • Furnell, S.1
  • 10
    • 11344279136 scopus 로고    scopus 로고
    • Elites, Lamers, Nares and Whores: Exploring the Computer Underground
    • Pp, edited by L. Cherny and E. R. Weise. Seattle, WA: Seal Press
    • Gilboa, N. 1996. "Elites, Lamers, Nares and Whores: Exploring the Computer Underground." Pp. 98-113. In Wired Women: Gender and New Realities in Cyberspace, edited by L. Cherny and E. R. Weise. Seattle, WA: Seal Press.
    • (1996) Wired Women: Gender and New Realities in Cyberspace , pp. 98-113
    • Gilboa, N.1
  • 11
    • 0035381384 scopus 로고    scopus 로고
    • Virtual Criminality: Old Wine in New Bottles?
    • Grabosky, Peter N. 2001. "Virtual Criminality: Old Wine in New Bottles?" Social and Legal Studies 10:243-249.
    • (2001) Social and Legal Studies , vol.10 , pp. 243-249
    • Grabosky, P.N.1
  • 12
    • 85140541591 scopus 로고    scopus 로고
    • Telecommunication Fraud in the Digital Age: The Convergence of Technologies
    • Pp, edited by D. Wall. New York: Routledge
    • Grabosky P. N. and Smith R. 2001. "Telecommunication Fraud in the Digital Age: The Convergence of Technologies." Pp. 29-43. In Crime and the Internet, edited by D. Wall. New York: Routledge.
    • (2001) Crime and the Internet , pp. 29-43
    • Grabosky, P.N.1    Smith, R.2
  • 13
    • 0033240629 scopus 로고    scopus 로고
    • The Rhetorical Dynamics of Gender Harassment Online
    • Herring, S. C. 1999. "The Rhetorical Dynamics of Gender Harassment Online." The Information Society 15(3):151 -167.
    • (1999) The Information Society , vol.15 , Issue.3 , pp. 151-167
    • Herring, S.C.1
  • 14
    • 11144230997 scopus 로고    scopus 로고
    • Can Low Self-Control Help with the Understanding of the Software Piracy Problem?
    • Higgins, George E. 2005. "Can Low Self-Control Help with the Understanding of the Software Piracy Problem?" Deviant Behavior 26(1 ):1 -24.
    • (2005) Deviant Behavior , vol.26 , Issue.1 , pp. 1-24
    • Higgins, G.E.1
  • 15
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures
    • Holt, Thomas J. 2007. "Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures." Deviant Behavior 28(2):171-198.
    • (2007) Deviant Behavior , vol.28 , Issue.2 , pp. 171-198
    • Holt, T.J.1
  • 16
    • 57649125022 scopus 로고    scopus 로고
    • Internet Crime Complaint Center, Retrieved on April 25, 2007 from
    • Internet Crime Complaint Center. 2007. "Internet Crime Report." Retrieved on April 25, 2007 from (http://www.ic3.gov/media/annual-report/2006- IC3Report.pdf).
    • (2007) Internet Crime Report
  • 17
    • 0022732592 scopus 로고    scopus 로고
    • Jensen, Gary F. and David Brownfield. 1986. Gender, Lifestyles, and Victimization: Beyond Routine Activity. Violence and Victims 1:85-99.
    • Jensen, Gary F. and David Brownfield. 1986. "Gender, Lifestyles, and Victimization: Beyond Routine Activity." Violence and Victims 1:85-99.
  • 18
    • 0042855099 scopus 로고    scopus 로고
    • A Sociology of Hackers
    • Jordan, Tim and Paul Taylor. 1998. "A Sociology of Hackers." The Sociological Review 46(4): 757-780.
    • (1998) The Sociological Review , vol.46 , Issue.4 , pp. 757-780
    • Jordan, T.1    Taylor, P.2
  • 19
    • 0026440771 scopus 로고
    • Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents
    • Lauritsen, Janet L., John H. Laub, and Robert J. Sampson. 1992. "Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents." Violence and Victims 7:91-108.
    • (1992) Violence and Victims , vol.7 , pp. 91-108
    • Lauritsen, J.L.1    Laub, J.H.2    Sampson, R.J.3
  • 20
    • 0033843057 scopus 로고    scopus 로고
    • Stalking as a Variant of Intimate Violence: Implications from a Young Adult Sample
    • Logan, T. K., Carl Leukefeld, and Robert Walker. 2000. "Stalking as a Variant of Intimate Violence: Implications from a Young Adult Sample." Violence and Victims 15:91 -111.
    • (2000) Violence and Victims , vol.15 , pp. 91-111
    • Logan, T.K.1    Leukefeld, C.2    Walker, R.3
  • 21
    • 57649117736 scopus 로고    scopus 로고
    • Miethe, Terance D. and Robert F. Meier. 1994. Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations. Albany: SUNY Press.
    • Miethe, Terance D. and Robert F. Meier. 1994. Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations. Albany: SUNY Press.
  • 22
    • 0040676527 scopus 로고    scopus 로고
    • Predicting Risk of Larceny Theft Victimization: A Routine Activity Analysis Using Refined Lifestyle Measures
    • Mustaine, Elizabeth Ehrhardt, and Richard Tewksbury. 1998. "Predicting Risk of Larceny Theft Victimization: A Routine Activity Analysis Using Refined Lifestyle Measures." Criminology 36:829-857.
    • (1998) Criminology , vol.36 , pp. 829-857
    • Mustaine, E.E.1    Tewksbury, R.2
  • 26
    • 85140545116 scopus 로고    scopus 로고
    • Crime Futures and Foresight: Challenging Criminal Behavior in the Information Age
    • Pp, edited by D. Wall. New York: Routledge
    • Pease, K. 2001. "Crime Futures and Foresight: Challenging Criminal Behavior in the Information Age." Pp. 18-28. In Crime and the Internet, edited by D. Wall. New York: Routledge.
    • (2001) Crime and the Internet , pp. 18-28
    • Pease, K.1
  • 28
    • 0025310742 scopus 로고
    • Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence
    • Sampson, Robert J. and Janet L. Lauritsen. 1990. "Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence." Journal of Research in Crime and Delinquency 27:110-139.
    • (1990) Journal of Research in Crime and Delinquency , vol.27 , pp. 110-139
    • Sampson, R.J.1    Lauritsen, J.L.2
  • 29
    • 84946310687 scopus 로고
    • Exploring a Feminist Routine Activities Approach to Explaining Sexual Assault
    • Schwartz, Martin D. and Victoria L. Pitts. 1995. "Exploring a Feminist Routine Activities Approach to Explaining Sexual Assault." Justice Quarterly' 12:9-31.
    • (1995) Justice Quarterly , vol.12 , pp. 9-31
    • Schwartz, M.D.1    Pitts, V.L.2
  • 30
    • 0030668250 scopus 로고    scopus 로고
    • A Social Learning Theory Analysis of Computer Crime among College Students
    • Skinner, William F. and Anne M. Fream. 1997. "A Social Learning Theory Analysis of Computer Crime among College Students." Journal of Research in Crime and Delinquency 34(4):495-518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , Issue.4 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 31
    • 84925740654 scopus 로고    scopus 로고
    • Maestros or Misogynists? Gender and the Social Construction of Hacking
    • Pp, edited by Y. Jewkes. Portland, OR: Willan Publishing
    • Taylor, Paul A. 2003. "Maestros or Misogynists? Gender and the Social Construction of Hacking." Pp. 126-146. In Dot.cons: Crime, Deviance and Identity on the Internet, edited by Y. Jewkes. Portland, OR: Willan Publishing.
    • (2003) Dot.cons: Crime, Deviance and Identity on the Internet , pp. 126-146
    • Taylor, P.A.1
  • 32
    • 57649127720 scopus 로고    scopus 로고
    • Taylor, Robert W. Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John Lieder bach. 2006. Digital Crime and Digital Terrorism. Upper Saddle River, NJ: Pearson Prentice Hall.
    • Taylor, Robert W. Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John Lieder bach. 2006. Digital Crime and Digital Terrorism. Upper Saddle River, NJ: Pearson Prentice Hall.
  • 34
    • 85140528371 scopus 로고    scopus 로고
    • Cybercrimes and the Internet
    • Pp, edited by D. S. Wall. New York: Routledge
    • Wall, D. S. 2001. "Cybercrimes and the Internet." Pp. 1-17. In Crime and the Internet, edited by D. S. Wall. New York: Routledge.
    • (2001) Crime and the Internet , pp. 1-17
    • Wall, D.S.1
  • 35
    • 34247657469 scopus 로고    scopus 로고
    • The Novelty of 'Cybercrime': An Assessment in Light of Routine Activity Theory
    • Yar, Majid. 2005. "The Novelty of 'Cybercrime': An Assessment in Light of Routine Activity Theory." European Journal of Criminology 2(4):407-427.
    • (2005) European Journal of Criminology , vol.2 , Issue.4 , pp. 407-427
    • Yar, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.