Abstract
Beyond the discussion of the most appropriate term to refer to crimes perpetrated on the Internet, and even the question of the different defining characteristics for each type of crime (Furnell 2002; Clough 2010; Wall 2007), today it is generally accepted that the term “cyber-crime” also encompasses a set of crimes that affect basic personal interests such as privacy, dignity, honor, liberty, and sexual liberty (Clough 2010) within the framework of cyberspace use as a new environment for social intercommunication. Some of these that we can call “social cybercrimes” are cyber bullying (Smith et al. 2008), cyber stalking (Basu and Jones 2007), online child grooming (Berson 2003; McAlinde 2006), and different types of cyber harassment (Henson 2011). Although these types of crimes may be understood as transpositions of crimes committed in physical space, it is universally accepted among scholars that such crimes display multiple characteristics related to the profile of the offender, the victim, and the way the crime is expressed that are different from physical crimes because they are perpetrated in “a new space.” The reason for this is obvious but bears repeating: the Internet is a new space for communication that is different from physical space, and this fact changes the way in which social events are expressed as well as the crime committed within this new space.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Bibliography
Alshalan, A. (2006) Cyber-crime Fear and Victimization: An Analysis of a National Survey, Starkville, MS: Mississippi State University.
Basu, S. and Jones, R. (2007) “Regulating Cyberstalking,” Journal of Information, Law and Technology 2 (1): 1–30.
Berson, I. R. (2003) “Grooming Cybervictims: The Psychosocial Effects of Online Exploitation for Youth,” Journal of School Violence 2 (10): 5–18.
Bocij, P. (2003) “Victims of Cyberstalking: An Exploratory Study of Harassment Perpetrated Via the Internet,” First Monday, 8(10), http://www.firstmonday.org (accessed 12 February 2015).
Bossler, A. and Holt, T. (2009) “On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory,” International Journal of Cyber Criminology 3(1): 400–20.
Choi, K. (2008) “Computer Crime Victimization and Integrated Theory: An Empirical Assessment,” International Journal of Cyber Criminology 2(1): 308–33.
Clough, J. (2010) Principles of Cybercrime, Cambridge: Cambridge University Press.
Cohen, L. E., Kluegel, J. R. and Land, K. C. (1981) “Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory,” American Sociological Review 46 (5): 505–24.
Cohen, L. and Felson, M. (1979) “Social Change and Crime Rate Trends: A Rou-tine Activity Approach,” American Sociological Review 44: 588–608.
Felson, M. (1998) Crime and Everyday Life 2nd edn, Thousand Oaks, CA: Pine Forge Press.
Finn, J. (2004) “A Survey of Online Harassment at a University Campus,” Journal of Interpersonal Violence 19 (4): 468–83.
Furnell, S. (2003) “Cybercrime: Vandalizing the Information Society,” LNCS 2722: 8–16.
Grabosky, P. (2001) “Virtual Criminality: Old Wine in New Bottles?,” Social & Legal Studies 10: 243–9.
Hinduja, S. and Patchin, J. (2008) “Cyberbullying: An Exploratory Analysis of Fac- tors Related to Offending and Victimization,” Deviant Behavior 29 (2): 129–56.
Holt, T. and Bossler, A. (2009) “Examining the Applicability of Lifestyle-routine Activities Theory for Cybercrime Victimization,” Deviant Behavior 30 (1): 1–25.
Marcum, C. (2008) “Identifying Potential Factors of Adolescent Online Victimization for High School Seniors,” International Journal of Cyber Criminology 2 (2): 346–67.
Marcum, C., Ricketts, M. and Higgins, G. (2010) “Assessing Sex Experiences of Online Victimization: An Examination of Adolescent Online Behaviors Using Routine Activity Theory,” Criminal Justice Review 35 (4): 412–37.
McAlinden, A. M. (2006) “‘Setting Em Up’: Personal, Familial and Institutional Grooming in the Sexual Abuse of Children,” Social and Legal Studies 15 (3): 339–62.
Miró, F. (2012) El Cibercrimen. Fenomenología y Criminología de la Delincuencia en el Ciberespacio, Madrid: Marcial Pons.
Mitchell, K., Wolak, J. and Finkelhor D. (2008) “Are Blogs Putting Youth at Risk for Online Sexual Solicitation or Harassment?,” Child Abuse and Neglect 32 (2): 277–94.
Ngo, F. and Paternoster, R. (2011) “Cybercrime Victimization: An examination of Individual and Situational Level Factors,” International Journal of Cyber Criminology 5 (1): 773–93.
Peter, J. and Valkenburg, P. (2006) “Adolescents’ Exposure to Sexually Explicit Material on the Internet,” Communication Research 33 (2): 178–204.
Pratt, T. C., Holtfreter, K. and Reisig, M. D. (2010) “Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory,” Journal of Research in Crime and Delinquency 47 (3): 267–96.
Prensky, M. (2001) “Digital Natives, Digital Immigrants,” On the Horizon 9 (5): 1–6.
Reyns, B. (2010) Being Pursued Online: Extent and Nature of Cyberstalking Victimiza-tion from a Lifestyle/Routine Activities Perspective, doctoral dissertation submitted to the Graduate School of the University of Cincinnati.
Reyns, B., Henson, B. and Fisher, B. (2011) “Being Pursued Online: Applying Cyberlifestyle–Routine Activities Theory to Cyberstalking Victimization,” Criminal Justice and Behavior 38 (11): 1149–69.
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008) “Cyberbullying: Its Nature and Impact in Secondary School Pupils,” Journal of Child Psychology and Psychiatry 49 (4): 376–85.
Wall, D. (2007) Cybercrime: The Transformation of Crime in the Information Age, Cambridge, UK: Polity Press.
Yar, M. (2005) “The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory,” European Journal of Criminology 4 (2): 407–27.
Ybarra, M., Espelage, D. L., and Mitchell, K. (2007) “The Co-Occurrence of Internet Harassment and Unwanted Sexual Solicitation Victimization and Perpetration: Associations with Psychosocial Indicators.” Journal of Adolescent Health 41 (6,Suppl): S31–S41.
Ybarra, M. and Mitchell, K. (2007) “Prevalence and Frequency of Internet Harassment Instigation: Implications for Adolescent Health,” Journal of Adolescent Health 41 (2): 189–95.
Yucedal, B. (2010) “Victimization in Cyberspace: An Applicaiton of Routine Activity and Lifestyle Exposure Theories.” Electronic Thesis or Dissertation. Kent State University, 2010. https://etd.ohiolink.edu/.
Editor information
Editors and Affiliations
Copyright information
© 2015 Fernando Miró Llinares
About this chapter
Cite this chapter
Llinares, F.M. (2015). That Cyber Routine, That Cyber Victimization: Profiling Victims of Cybercrime. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_4
Download citation
DOI: https://doi.org/10.1057/9781137474162_4
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-55788-2
Online ISBN: 978-1-137-47416-2
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)