Home > Research > Publications & Outputs > Applying routine activity theory to cybercrime

Associated organisational unit

Links

Text available via DOI:

View graph of relations

Applying routine activity theory to cybercrime: A theoretical and empirical analysis

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Applying routine activity theory to cybercrime: A theoretical and empirical analysis. / Leukfeldt, Eric; Yar, Majid.
In: Deviant Behavior, Vol. 37, No. 3, 03.03.2016, p. 263-280.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Leukfeldt E, Yar M. Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior. 2016 Mar 3;37(3):263-280. Epub 2016 Jan 19. doi: 10.1080/01639625.2015.1012409

Author

Leukfeldt, Eric ; Yar, Majid. / Applying routine activity theory to cybercrime : A theoretical and empirical analysis. In: Deviant Behavior. 2016 ; Vol. 37, No. 3. pp. 263-280.

Bibtex

@article{ca985ac0626541a4867009702291e288,
title = "Applying routine activity theory to cybercrime: A theoretical and empirical analysis",
abstract = "The central question of this article is whether routine activity theory (RAT) can be used as an analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of empirical studies have thus far failed to provide a clear answer. The multivariate analysis presented in this article tries to avoid some of the limitations of other RAT-based studies. Based on a large sample (N= 9,161), the effects of value, visibility, accessibility, and guardianship on victimization of six cybercrimes have been studied. Analysis shows some RAT elements are more applicable than others. Visibility clearly plays a role within cybercrime victimization. Accessibility and personal capable guardianship show varying results. Value and technical capable guardianship show almost no effects on cybercrime victimization.",
author = "Eric Leukfeldt and Majid Yar",
year = "2016",
month = mar,
day = "3",
doi = "10.1080/01639625.2015.1012409",
language = "English",
volume = "37",
pages = "263--280",
journal = "Deviant Behavior",
issn = "0163-9625",
publisher = "Taylor and Francis Inc.",
number = "3",

}

RIS

TY - JOUR

T1 - Applying routine activity theory to cybercrime

T2 - A theoretical and empirical analysis

AU - Leukfeldt, Eric

AU - Yar, Majid

PY - 2016/3/3

Y1 - 2016/3/3

N2 - The central question of this article is whether routine activity theory (RAT) can be used as an analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of empirical studies have thus far failed to provide a clear answer. The multivariate analysis presented in this article tries to avoid some of the limitations of other RAT-based studies. Based on a large sample (N= 9,161), the effects of value, visibility, accessibility, and guardianship on victimization of six cybercrimes have been studied. Analysis shows some RAT elements are more applicable than others. Visibility clearly plays a role within cybercrime victimization. Accessibility and personal capable guardianship show varying results. Value and technical capable guardianship show almost no effects on cybercrime victimization.

AB - The central question of this article is whether routine activity theory (RAT) can be used as an analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of empirical studies have thus far failed to provide a clear answer. The multivariate analysis presented in this article tries to avoid some of the limitations of other RAT-based studies. Based on a large sample (N= 9,161), the effects of value, visibility, accessibility, and guardianship on victimization of six cybercrimes have been studied. Analysis shows some RAT elements are more applicable than others. Visibility clearly plays a role within cybercrime victimization. Accessibility and personal capable guardianship show varying results. Value and technical capable guardianship show almost no effects on cybercrime victimization.

U2 - 10.1080/01639625.2015.1012409

DO - 10.1080/01639625.2015.1012409

M3 - Journal article

VL - 37

SP - 263

EP - 280

JO - Deviant Behavior

JF - Deviant Behavior

SN - 0163-9625

IS - 3

ER -