center for victim research repository

Not Everyone Is a Target: An Analysis of Online Identity Crime Victimization Using Routine Activities Theory

Show simple item record

dc.contributor.author Zaslawski, Zinaida
dc.date.accessioned 2018-08-31T20:16:56Z
dc.date.available 2018-08-31T20:16:56Z
dc.date.issued 2017
dc.identifier.citation Zaslawski, Zinaida. (2017). Not Everyone Is a Target: An Analysis of Online Identity Crime Victimization Using Routine Activities Theory [Thesis]. Queen's University, 108 pgs. en_US
dc.identifier.uri https://qspace.library.queensu.ca/jspui/bitstream/handle/1974/15688/Zaslawski_Zinaida_201704_MA.pdf?sequence=3&isAllowed=y
dc.identifier.uri http://hdl.handle.net/20.500.11990/925
dc.description.abstract This study examines online identity theft, consumer fraud and phishing victimization using data from a national survey of Canadians. The goal is to answer the following questions: (1) Is everyone equally likely to be a target of online crime? and (2) What factors might lead to online victimization? This research utilizes Routine Activity Theory (Cohen and Felson 1979) and an extension proposed by Eck and Clarke (2003). This approach specifies that crime is facilitated by an offender’s motivation, the absence of effective guardians, and the availability of suitable targets online. This research draws on the 2009 General Social Survey (GSS). Logistic regression is used to analyze the relationships between demographic variables, perceptions of risk and online routine activities on identity theft, consumer fraud, and phishing victimization. Findings reveal that education has a consistent effect on all three types of victimization when taking into account routine activities. Men are less likely to change passwords regularly and to delete emails on a regular basis compared with women. Men, compared with women, are also more likely to be victims of consumer fraud and phishing. Results show that perceptions of risk are correlated with victimization. Several forms of routine activities (using the internet for banking, making reservations or bookings, and belonging to online social network websites) increase all three types of victimization. In addition, using the internet for purchasing goods or services or using online chat services increases victimization for consumer fraud and phishing. The results also reveal that those who deal with known websites, enter misleading information online, regularly change their passwords and delete emails are more likely to be victims of online consumer fraud and phishing. This could be explained by other ‘risky’ online activities that moderate relationships. Findings provide support for Routine Activities Theory as an explanation for online identity theft, consumer fraud, and phishing victimization. Further research should explore additional causes, such as ‘risky’ online activities that lead to online victimization. Research should also focus on prevention measures aimed at those most at risk of victimization. [CVRL Note: see pages 90-92 for policy and research implications. ] (Author Abstract) en_US
dc.language.iso en_US en_US
dc.publisher Queen's University en_US
dc.subject Data Analysis en_US
dc.subject Demographics en_US
dc.subject High-risk Behavior en_US
dc.subject Routine Activities Theory en_US
dc.subject Theoretical Model en_US
dc.subject Risk Factors en_US
dc.subject Identity Theft en_US
dc.subject Consumer Crimes en_US
dc.subject Phishing en_US
dc.subject Financial Crime en_US
dc.subject Economic Crimes en_US
dc.subject Nonviolent Crime en_US
dc.subject Deception en_US
dc.subject Scams en_US
dc.subject Cyberfraud en_US
dc.subject Cyber Crime en_US
dc.subject Online Crime en_US
dc.subject Gambling en_US
dc.subject Cross-sectional Studies en_US
dc.subject Internet Crime en_US
dc.subject Older Adults en_US
dc.subject Older Persons en_US
dc.subject Youth en_US
dc.subject Children en_US
dc.subject International
dc.subject Canada
dc.title Not Everyone Is a Target: An Analysis of Online Identity Crime Victimization Using Routine Activities Theory en_US
dc.type Thesis en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search


Browse

My Account