理解网络空间中的目标适宜性:网络受害过程的国际比较

IF 0.7 Q4 CRIMINOLOGY & PENOLOGY International Journal of Cyber Criminology Pub Date : 2020-01-01 DOI:10.5281/ZENODO.3744874
F. Miró-Llinares, Jacqueline M. Drew, M. Townsley
{"title":"理解网络空间中的目标适宜性:网络受害过程的国际比较","authors":"F. Miró-Llinares, Jacqueline M. Drew, M. Townsley","doi":"10.5281/ZENODO.3744874","DOIUrl":null,"url":null,"abstract":"Economic forms of cybercrime affect millions of people around the world. Preparatory crimes such as spam, scam and malware are increasingly enacted by cybercriminals. However, literature has shown that some people are more vulnerable than others to these types of attacks and this may be a circumstance that varies cross-nationally. Using a comparative research design, behaviors that are associated with a higher probabUity of victimization by economic preparatory crimes are identified. The results obtained ffom two samples, one Spanish and one Australian, show that despite similar victimization prevalence, the correlates of routine activities vary substantially. While 6 of the 11 behaviors analyzed were similar, other substantial differences were found. The greatest risk for Spanish participants is online shopping, while for Australians it is downloading files. Differences were also found for use of antivirus, pirated software, contacting strangers and taking part in video conferences. Based on the current research, it is concluded that cyber victimization should locus on identifying nuances in the daily activities performed by online users, rather than on broader constructs such as interaction or visibility. Further, preventive strategies must take into account differences in routine behaviors across different geographical areas.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":0.7000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes\",\"authors\":\"F. Miró-Llinares, Jacqueline M. Drew, M. Townsley\",\"doi\":\"10.5281/ZENODO.3744874\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Economic forms of cybercrime affect millions of people around the world. Preparatory crimes such as spam, scam and malware are increasingly enacted by cybercriminals. However, literature has shown that some people are more vulnerable than others to these types of attacks and this may be a circumstance that varies cross-nationally. Using a comparative research design, behaviors that are associated with a higher probabUity of victimization by economic preparatory crimes are identified. The results obtained ffom two samples, one Spanish and one Australian, show that despite similar victimization prevalence, the correlates of routine activities vary substantially. While 6 of the 11 behaviors analyzed were similar, other substantial differences were found. The greatest risk for Spanish participants is online shopping, while for Australians it is downloading files. Differences were also found for use of antivirus, pirated software, contacting strangers and taking part in video conferences. Based on the current research, it is concluded that cyber victimization should locus on identifying nuances in the daily activities performed by online users, rather than on broader constructs such as interaction or visibility. Further, preventive strategies must take into account differences in routine behaviors across different geographical areas.\",\"PeriodicalId\":46103,\"journal\":{\"name\":\"International Journal of Cyber Criminology\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cyber Criminology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5281/ZENODO.3744874\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"CRIMINOLOGY & PENOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Criminology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5281/ZENODO.3744874","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
引用次数: 3

摘要

经济形式的网络犯罪影响着全世界数百万人。网络罪犯越来越多地实施垃圾邮件、诈骗和恶意软件等预备犯罪。然而,文献表明,有些人比其他人更容易受到这些类型的攻击,这可能是一个不同国家的情况。采用比较研究设计,确定了与经济预备犯罪受害可能性较高相关的行为。从两个样本(一个是西班牙人,一个是澳大利亚人)获得的结果表明,尽管受害的普遍程度相似,但日常活动的相关关系却大不相同。虽然分析的11种行为中有6种相似,但发现了其他实质性差异。西班牙人面临的最大风险是网上购物,而澳大利亚人面临的最大风险是下载文件。在使用杀毒软件、盗版软件、联系陌生人和参加视频会议方面也发现了差异。基于目前的研究,得出的结论是,网络受害应该集中在识别在线用户日常活动中的细微差别,而不是更广泛的结构,如互动或可见性。此外,预防战略必须考虑到不同地理区域日常行为的差异。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes
Economic forms of cybercrime affect millions of people around the world. Preparatory crimes such as spam, scam and malware are increasingly enacted by cybercriminals. However, literature has shown that some people are more vulnerable than others to these types of attacks and this may be a circumstance that varies cross-nationally. Using a comparative research design, behaviors that are associated with a higher probabUity of victimization by economic preparatory crimes are identified. The results obtained ffom two samples, one Spanish and one Australian, show that despite similar victimization prevalence, the correlates of routine activities vary substantially. While 6 of the 11 behaviors analyzed were similar, other substantial differences were found. The greatest risk for Spanish participants is online shopping, while for Australians it is downloading files. Differences were also found for use of antivirus, pirated software, contacting strangers and taking part in video conferences. Based on the current research, it is concluded that cyber victimization should locus on identifying nuances in the daily activities performed by online users, rather than on broader constructs such as interaction or visibility. Further, preventive strategies must take into account differences in routine behaviors across different geographical areas.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
2.60
自引率
40.00%
发文量
0
审稿时长
16 weeks
期刊介绍: International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy. IJCC is an unique Diamond open access, not for profit international journal, where the author(s) need not pay article processing charges / page charges and it is totally free for both the authors and the audience. IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, Developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety, Human Factor of Cyber Crime and Cyber Security and Policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes primarily from a social science perspective to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.
期刊最新文献
Cyberharassment Awareness Course (Cybac): influences from domestic abuse perpetrator programmes for its design and function Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud Harmful discourse on social triggering factors of persecution truth era Project Leaked: research on non-consensual sharing of intimate images in Brazil
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1