• myGriffith
    • Staff portal
    • Contact Us⌄
      • Future student enquiries 1800 677 728
      • Current student enquiries 1800 154 055
      • International enquiries +61 7 3735 6425
      • General enquiries 07 3735 7111
      • Online enquiries
      • Staff phonebook
    View Item 
    •   Home
    • Griffith Research Online
    • Journal articles
    • View Item
    • Home
    • Griffith Research Online
    • Journal articles
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

  • All of Griffith Research Online
    • Communities & Collections
    • Authors
    • By Issue Date
    • Titles
  • This Collection
    • Authors
    • By Issue Date
    • Titles
  • Statistics

  • Most Popular Items
  • Statistics by Country
  • Most Popular Authors
  • Support

  • Contact us
  • FAQs
  • Admin login

  • Login
  • Lifestyles and routine activities: Do they enable different types of cyber abuse?

    Thumbnail
    View/Open
    Embargoed until: 2021-12-01
    File version
    Accepted Manuscript (AM)
    Author(s)
    Vakhitova, Zarina I
    Alston-knox, Clair L
    Reynald, Danielle M
    Townsley, Michael K
    Webster, Julianne L
    Griffith University Author(s)
    Webster, Julianne
    Alston-Knox, Clair L.
    Reynald, Danielle M.
    Townsley, Michael K.
    Year published
    2019
    Metadata
    Show full item record
    Abstract
    Background: The emergence of new technology-facilitated types of crime following the advent of the Internet necessitated the re-examination of the utility of traditional theories such as lifestyle-routine activity theory to explain crimes that occur in the new and unique environment of cyberspace. Reason for study: The objective of this study was to investigate whether victims’ lifestyles and routine activities can help explain the risk of victimization from direct, indirect and mixed types of cyber abuse. Research design: To achieve this objective, the data from a large nationwide (US) crowd-sourced sample (N = 1463) of ...
    View more >
    Background: The emergence of new technology-facilitated types of crime following the advent of the Internet necessitated the re-examination of the utility of traditional theories such as lifestyle-routine activity theory to explain crimes that occur in the new and unique environment of cyberspace. Reason for study: The objective of this study was to investigate whether victims’ lifestyles and routine activities can help explain the risk of victimization from direct, indirect and mixed types of cyber abuse. Research design: To achieve this objective, the data from a large nationwide (US) crowd-sourced sample (N = 1463) of adult members of an online labour portal Mechanical Turk was collected using an online survey platform Qualtrics and then analyzed using Bayesian Profile Regression to identify clusters of lifestyles and routine activities of victims associated with victimization from different types of cyber abuse. Findings: Our analyses were able to distinguish between victims and non-victims as well as between victims of different sub-classifications of cyber abuse. Specifically, we have identified five population subgroups based on their lifestyles and routine activities in terms of the associated risk of personal victimization from different types of cyber abuse. This paper discusses the differences in lifestyles and routine activities between the identified groups. Conclusions: Our findings generally support the empirical utility of lifestyle-routine activity theory to explain cyber abuse victimization; as with other traditional types of crime (e.g. robbery or assault), victims’ lifestyles and routine activities play a significant role in their risk of various types of cyber abuse victimization.
    View less >
    Journal Title
    Computers in Human Behavior
    Volume
    101
    DOI
    https://doi.org/10.1016/j.chb.2019.07.012
    Copyright Statement
    © 2019 Elsevier. Licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Licence (http://creativecommons.org/licenses/by-nc-nd/4.0/) which permits unrestricted, non-commercial use, distribution and reproduction in any medium, providing that the work is properly cited.
    Subject
    Information Systems
    Psychology
    Cognitive Sciences
    Publication URI
    http://hdl.handle.net/10072/386693
    Collection
    • Journal articles

    Footer

    Disclaimer

    • Privacy policy
    • Copyright matters
    • CRICOS Provider - 00233E

    Tagline

    • Gold Coast
    • Logan
    • Brisbane - Queensland, Australia
    First Peoples of Australia
    • Aboriginal
    • Torres Strait Islander