Skip to main content
Log in

Demographic variables and risk factors in computer-crime: an empirical assessment

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The purpose of this research is to examine how demographics variables interact with factors such as online lifestyle, digital-capable guardianship, computer security management, and levels of individual computer crime victimization. The current study used a secondary data which was a self-report survey (\(N=204\)) contained items intended to measure the major constructs of routine activities theory. The findings of SEM (structural equation modeling) analysis showed that: (1) gender did not substantially influence on digital guardian factor and computer crime victimization. However, males are more likely to be engaging in online risky leisure activities such as visiting unknown Web sites, downloading free games, free music, and free movies than females. Simultaneously, males tended to update computer security, change the passwords for e-mail account, search for more effective computer security software, check the operation of computer security online, and use different passwords and user IDs for their Internet accounts than females; (2) individuals with older age are less likely to equip the number of computer security software with less duration; (3) race does not have any statistically significant impact on computer crime victimization. Lastly, the policy implications and the limitations of the current research were discussed at the last part of this study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Bernburg, J.G., Thorlindsson, T.: Routine activities in social context: a closer look at the role of opportunity in deviant behavior. Justice Q. 18(3), 543–567 (2001)

  2. Castells, M.: The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford University Press, New York (2002)

  3. Choi, K.: An empirical assessment of an integrated theory of computer crime victimization. Int. J. Cyber Criminol. 2(1), 308–333 (2008)

    Google Scholar 

  4. Cohen, L.E., Cantor, D.: Residential burglary in the United States: life-style and demographic factors associated with the probability of victimization. J. Res. Crime Delinq. 18(1), 113–127 (1981)

    Article  Google Scholar 

  5. Cohen, L.E., Felson, M.: Social change and crime rate trends: a routine activity approach. Am. Sociol. Rev. 44, 588–608 (1979)

    Article  Google Scholar 

  6. Cullen, F.T., Agnew, R.: Criminological Theory: Past to Present, 3rd edn. Roxbury Publishing Company, Los Angeles (2006)

    Google Scholar 

  7. Garofalo, J.: Reassessing the lifestyle model of criminal victimization. In: Gottfredson, M., Hirschi, T. (eds.) Positive Criminology, pp. 23–42. Sage, Newbury Park (1987)

    Google Scholar 

  8. Hidelang, M.J., Gottfredson, M.R., Gaffalo, J.: Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization. Ballinger, Cambridge (1978)

    Google Scholar 

  9. Kennedy, L.W., Forde, D.R.: Routine activities and crime: an analysis of victimization in Canada. Criminology 28, 137–151 (1990)

    Article  Google Scholar 

  10. McMullan, J.L., Perrier, D.C.: Controlling cyber-crime and gambling: problems and paradoxes in the mediation of law and criminal organization. Police Pract. Res. 8(5), 431–444 (2007)

    Article  Google Scholar 

  11. McQuade, S.C.: Understanding and Managing Cybercrime. Pearson Education Inc., Upper Saddle River (2006)

    Google Scholar 

  12. Meier, R., Miethe, T.: Understanding theories of criminal victimization. Crime Justice 17, 459–499 (1993)

    Article  Google Scholar 

  13. Mishna, F., McLuckie, A., Saint, M.: Real-world dangers in an online reality: examining online relationships and cyber abuse. Soc. Work Res. 33(2), 107–118 (2009)

    Article  Google Scholar 

  14. Moon, B., McCluskey, J.D., McCluskey, C.P., Lee, S.: Gender, general theory of crime and computer crime: an empirical test. Int. J. Offender Ther. Comp. Criminol. 57(4), 460–478 (2012)

    Article  Google Scholar 

  15. Mustaine, E., Tewksbury, R.: Predicting risks of larceny theft victimization: a routine activity analysis using refined lifestyle measures. Criminology 36, 829–857 (1998)

    Article  Google Scholar 

  16. Piazza, P.: Technofile: antisocial networking sites. Secur. Manag. 1–5 (2006)

  17. Sampson, R.J., Lauritsen, J.L.: Deviant lifestyles, proximity to crime, and the offender-victim link in personal violence. J. Res. Crime Delinq. 27(2), 110–139 (1990)

    Article  Google Scholar 

  18. Sampson, R.J., Wooldridge, J.D.: Linking the micro-and macro-level dimension of lifestyle-routine activity and opportunity models of predatory victimization. J. Quan. Criminol. 3, 371–391 (1987)

    Article  Google Scholar 

  19. Swan, S.C., Gambone, L.J., Horn, M.L., Snow, D.L., Sullivan, T.P.: Factor structures for aggression and victimization among women who used aggression against male. Partn. Violence Against Women 18(9), 1045–1066 (2012)

    Article  Google Scholar 

  20. Tak, S., Park, Y., Kim, U.: Cyber delinquency of high school students focusing on human relationship, psychological and behavior characteristics. J. Juv. Study 14(4), 233–258 (2007)

    Google Scholar 

  21. Taylor, R.W., Eric, J.F., Liederbach, F., Holt, T.J.: Digital Crime and Digital Terrorism, 2nd edn. Pearson Education Inc., Upper Saddle River (2011)

    Google Scholar 

  22. 2005 FBI Computer Crime Survey (2006). http://www.fbi.gov/publications/ccs2005.pdf (2006). Accessed 19 Feb 2013

  23. Yar, M.: The novelty of ‘cybercrime’: an assessment in light of routine activity theory. Eur. Soc. Criminol. 2, 407–427 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong-eun Sung.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Choi, Ks., Choo, K. & Sung, Ye. Demographic variables and risk factors in computer-crime: an empirical assessment. Cluster Comput 19, 369–377 (2016). https://doi.org/10.1007/s10586-015-0519-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-015-0519-8

Keywords

Navigation