2023
DOI: 10.1016/j.teler.2023.100042
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the cyber-victimization of young people: A test of routine activities theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Today, there are many different types of illegal actions and unauthorised transactions involving online tools. In 90% of cases, they target personal information (obtaining confidential data directly from the victim)in such cases the amount of financial gain ranges from minimal to average, in the remaining 10% of cases -the crimes target organisations, businesses and other legal entities, causing substantial economic losses (Griffith et al, 2023). All illegal cyber activities are carried out using a computer (less often a telephone) and local networks and servers, using a variety of techniques and schemes (Table 1).…”
Section: Basic Concepts and Terms For Countering Internet Crimementioning
confidence: 99%
See 1 more Smart Citation
“…Today, there are many different types of illegal actions and unauthorised transactions involving online tools. In 90% of cases, they target personal information (obtaining confidential data directly from the victim)in such cases the amount of financial gain ranges from minimal to average, in the remaining 10% of cases -the crimes target organisations, businesses and other legal entities, causing substantial economic losses (Griffith et al, 2023). All illegal cyber activities are carried out using a computer (less often a telephone) and local networks and servers, using a variety of techniques and schemes (Table 1).…”
Section: Basic Concepts and Terms For Countering Internet Crimementioning
confidence: 99%
“…D. Chudasama and N. Rajput (2021) and C.E. Griffith et al (2023), on the contrary, believed that victimisation of society occurs precisely because of the large-scale application of information and communication technologies in all spheres of life and the context of collegial and sole management. Experts have identified restricting the free access of ordinary citizens to these technologies as the only way to slow the rate of cybercrime.…”
mentioning
confidence: 99%
“…Today, there are many different types of illegal actions and unauthorised transactions involving online tools. In 90% of cases, they target personal information (obtaining confidential data directly from the victim)in such cases the amount of financial gain ranges from minimal to average, in the remaining 10% of cases -the crimes target organisations, businesses and other legal entities, causing substantial economic losses (Griffith et al, 2023). All illegal cyber activities are carried out using a computer (less often a telephone) and local networks and servers, using a variety of techniques and schemes (Table 1).…”
Section: Basic Concepts and Terms For Countering Internet Crimementioning
confidence: 99%
“…D. Chudasama and N. Rajput (2021) and C.E. Griffith et al (2023), on the contrary, believed that victimisation of society occurs precisely because of the large-scale application of information and communication technologies in all spheres of life and the context of collegial and sole management. Experts have identified restricting the free access of ordinary citizens to these technologies as the only way to slow the rate of cybercrime.…”
Section: Conflict Of Interestmentioning
confidence: 99%