Skip to main content

That Cyber Routine, That Cyber Victimization: Profiling Victims of Cybercrime

  • Chapter
Cybercrime Risks and Responses

Abstract

Beyond the discussion of the most appropriate term to refer to crimes perpetrated on the Internet, and even the question of the different defining characteristics for each type of crime (Furnell 2002; Clough 2010; Wall 2007), today it is generally accepted that the term “cyber-crime” also encompasses a set of crimes that affect basic personal interests such as privacy, dignity, honor, liberty, and sexual liberty (Clough 2010) within the framework of cyberspace use as a new environment for social intercommunication. Some of these that we can call “social cybercrimes” are cyber bullying (Smith et al. 2008), cyber stalking (Basu and Jones 2007), online child grooming (Berson 2003; McAlinde 2006), and different types of cyber harassment (Henson 2011). Although these types of crimes may be understood as transpositions of crimes committed in physical space, it is universally accepted among scholars that such crimes display multiple characteristics related to the profile of the offender, the victim, and the way the crime is expressed that are different from physical crimes because they are perpetrated in “a new space.” The reason for this is obvious but bears repeating: the Internet is a new space for communication that is different from physical space, and this fact changes the way in which social events are expressed as well as the crime committed within this new space.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  • Alshalan, A. (2006) Cyber-crime Fear and Victimization: An Analysis of a National Survey, Starkville, MS: Mississippi State University.

    Google Scholar 

  • Basu, S. and Jones, R. (2007) “Regulating Cyberstalking,” Journal of Information, Law and Technology 2 (1): 1–30.

    Google Scholar 

  • Berson, I. R. (2003) “Grooming Cybervictims: The Psychosocial Effects of Online Exploitation for Youth,” Journal of School Violence 2 (10): 5–18.

    Article  Google Scholar 

  • Bocij, P. (2003) “Victims of Cyberstalking: An Exploratory Study of Harassment Perpetrated Via the Internet,” First Monday, 8(10), http://www.firstmonday.org (accessed 12 February 2015).

  • Bossler, A. and Holt, T. (2009) “On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory,” International Journal of Cyber Criminology 3(1): 400–20.

    Google Scholar 

  • Choi, K. (2008) “Computer Crime Victimization and Integrated Theory: An Empirical Assessment,” International Journal of Cyber Criminology 2(1): 308–33.

    Google Scholar 

  • Clough, J. (2010) Principles of Cybercrime, Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Cohen, L. E., Kluegel, J. R. and Land, K. C. (1981) “Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory,” American Sociological Review 46 (5): 505–24.

    Article  Google Scholar 

  • Cohen, L. and Felson, M. (1979) “Social Change and Crime Rate Trends: A Rou-tine Activity Approach,” American Sociological Review 44: 588–608.

    Article  Google Scholar 

  • Felson, M. (1998) Crime and Everyday Life 2nd edn, Thousand Oaks, CA: Pine Forge Press.

    Google Scholar 

  • Finn, J. (2004) “A Survey of Online Harassment at a University Campus,” Journal of Interpersonal Violence 19 (4): 468–83.

    Article  Google Scholar 

  • Furnell, S. (2003) “Cybercrime: Vandalizing the Information Society,” LNCS 2722: 8–16.

    Google Scholar 

  • Grabosky, P. (2001) “Virtual Criminality: Old Wine in New Bottles?,” Social & Legal Studies 10: 243–9.

    Google Scholar 

  • Hinduja, S. and Patchin, J. (2008) “Cyberbullying: An Exploratory Analysis of Fac- tors Related to Offending and Victimization,” Deviant Behavior 29 (2): 129–56.

    Article  Google Scholar 

  • Holt, T. and Bossler, A. (2009) “Examining the Applicability of Lifestyle-routine Activities Theory for Cybercrime Victimization,” Deviant Behavior 30 (1): 1–25.

    Article  Google Scholar 

  • Marcum, C. (2008) “Identifying Potential Factors of Adolescent Online Victimization for High School Seniors,” International Journal of Cyber Criminology 2 (2): 346–67.

    Google Scholar 

  • Marcum, C., Ricketts, M. and Higgins, G. (2010) “Assessing Sex Experiences of Online Victimization: An Examination of Adolescent Online Behaviors Using Routine Activity Theory,” Criminal Justice Review 35 (4): 412–37.

    Article  Google Scholar 

  • McAlinden, A. M. (2006) “‘Setting Em Up’: Personal, Familial and Institutional Grooming in the Sexual Abuse of Children,” Social and Legal Studies 15 (3): 339–62.

    Article  Google Scholar 

  • Miró, F. (2012) El Cibercrimen. Fenomenología y Criminología de la Delincuencia en el Ciberespacio, Madrid: Marcial Pons.

    Google Scholar 

  • Mitchell, K., Wolak, J. and Finkelhor D. (2008) “Are Blogs Putting Youth at Risk for Online Sexual Solicitation or Harassment?,” Child Abuse and Neglect 32 (2): 277–94.

    Article  Google Scholar 

  • Ngo, F. and Paternoster, R. (2011) “Cybercrime Victimization: An examination of Individual and Situational Level Factors,” International Journal of Cyber Criminology 5 (1): 773–93.

    Google Scholar 

  • Peter, J. and Valkenburg, P. (2006) “Adolescents’ Exposure to Sexually Explicit Material on the Internet,” Communication Research 33 (2): 178–204.

    Article  Google Scholar 

  • Pratt, T. C., Holtfreter, K. and Reisig, M. D. (2010) “Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory,” Journal of Research in Crime and Delinquency 47 (3): 267–96.

    Article  Google Scholar 

  • Prensky, M. (2001) “Digital Natives, Digital Immigrants,” On the Horizon 9 (5): 1–6.

    Article  Google Scholar 

  • Reyns, B. (2010) Being Pursued Online: Extent and Nature of Cyberstalking Victimiza-tion from a Lifestyle/Routine Activities Perspective, doctoral dissertation submitted to the Graduate School of the University of Cincinnati.

    Google Scholar 

  • Reyns, B., Henson, B. and Fisher, B. (2011) “Being Pursued Online: Applying Cyberlifestyle–Routine Activities Theory to Cyberstalking Victimization,” Criminal Justice and Behavior 38 (11): 1149–69.

    Article  Google Scholar 

  • Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008) “Cyberbullying: Its Nature and Impact in Secondary School Pupils,” Journal of Child Psychology and Psychiatry 49 (4): 376–85.

    Article  Google Scholar 

  • Wall, D. (2007) Cybercrime: The Transformation of Crime in the Information Age, Cambridge, UK: Polity Press.

    Google Scholar 

  • Yar, M. (2005) “The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory,” European Journal of Criminology 4 (2): 407–27.

    Article  Google Scholar 

  • Ybarra, M., Espelage, D. L., and Mitchell, K. (2007) “The Co-Occurrence of Internet Harassment and Unwanted Sexual Solicitation Victimization and Perpetration: Associations with Psychosocial Indicators.” Journal of Adolescent Health 41 (6,Suppl): S31–S41.

    Article  Google Scholar 

  • Ybarra, M. and Mitchell, K. (2007) “Prevalence and Frequency of Internet Harassment Instigation: Implications for Adolescent Health,” Journal of Adolescent Health 41 (2): 189–95.

    Article  Google Scholar 

  • Yucedal, B. (2010) “Victimization in Cyberspace: An Applicaiton of Routine Activity and Lifestyle Exposure Theories.” Electronic Thesis or Dissertation. Kent State University, 2010. https://etd.ohiolink.edu/.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2015 Fernando Miró Llinares

About this chapter

Cite this chapter

Llinares, F.M. (2015). That Cyber Routine, That Cyber Victimization: Profiling Victims of Cybercrime. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_4

Download citation

Publish with us

Policies and ethics