Lifestyles and routine activities: Do they enable different types of cyber abuse?

Loading...
Thumbnail Image
File version

Accepted Manuscript (AM)

Author(s)
Vakhitova, Zarina I
Alston-knox, Clair L
Reynald, Danielle M
Townsley, Michael K
Webster, Julianne L
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2019
Size
File type(s)
Location
Abstract

Background: The emergence of new technology-facilitated types of crime following the advent of the Internet necessitated the re-examination of the utility of traditional theories such as lifestyle-routine activity theory to explain crimes that occur in the new and unique environment of cyberspace. Reason for study: The objective of this study was to investigate whether victims’ lifestyles and routine activities can help explain the risk of victimization from direct, indirect and mixed types of cyber abuse. Research design: To achieve this objective, the data from a large nationwide (US) crowd-sourced sample (N = 1463) of adult members of an online labour portal Mechanical Turk was collected using an online survey platform Qualtrics and then analyzed using Bayesian Profile Regression to identify clusters of lifestyles and routine activities of victims associated with victimization from different types of cyber abuse. Findings: Our analyses were able to distinguish between victims and non-victims as well as between victims of different sub-classifications of cyber abuse. Specifically, we have identified five population subgroups based on their lifestyles and routine activities in terms of the associated risk of personal victimization from different types of cyber abuse. This paper discusses the differences in lifestyles and routine activities between the identified groups. Conclusions: Our findings generally support the empirical utility of lifestyle-routine activity theory to explain cyber abuse victimization; as with other traditional types of crime (e.g. robbery or assault), victims’ lifestyles and routine activities play a significant role in their risk of various types of cyber abuse victimization.

Journal Title

Computers in Human Behavior

Conference Title
Book Title
Edition
Volume

101

Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© 2019 Elsevier. Licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Licence (http://creativecommons.org/licenses/by-nc-nd/4.0/) which permits unrestricted, non-commercial use, distribution and reproduction in any medium, providing that the work is properly cited.

Item Access Status
Note
Access the data
Related item(s)
Subject

Criminology

Human-centred computing

Applied and developmental psychology

Cognitive and computational psychology

Persistent link to this record
Citation

Vakhitova, ZI; Alston-Knox, CL; Reynald, DM; Townsley, MK; Webster, JL, Lifestyles and routine activities: Do they enable different types of cyber abuse?, Computers in Human Behavior, 2019, 101, pp. 225-237

Collections