Nothing Special   »   [go: up one dir, main page]

Yar, 2005 - Google Patents

The Novelty of 'Cybercrime' An Assessment in Light of Routine Activity Theory

Yar, 2005

View PDF
Document ID
14502026491978862546
Author
Yar M
Publication year
Publication venue
European Journal of Criminology

External Links

Snippet

Recent discussions of 'cybercrime'focus upon the apparent novelty or otherwise of the phenomenon. Some authors claim that such crime is not qualitatively different from 'terrestrial crime', and can be analysed and explained using established theories of crime …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Yar The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory
Stoycheff et al. Privacy and the Panopticon: Online mass surveillance’s deterrence and chilling effects
Sharkey et al. Community and the crime decline: The causal effect of local nonprofits on violent crime
Reyns Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses
Holt et al. Testing an integrated self-control and routine activities framework to examine malware infection victimization
Das et al. Rethinking fake news: Disinformation and ideology during the time of COVID-19 global pandemic
Braga et al. The effects of focused deterrence strategies on crime: A systematic review and meta-analysis of the empirical evidence
Morselli Assessing vulnerable and strategic positions in a criminal network
Tyler Policing in black and white: Ethnic group differences in trust and confidence in the police
Holt et al. An assessment of the current state of cybercrime scholarship
Michael et al. Privacy, data rights and cybersecurity: Technology for good in the achievement of sustainable development goals
Ngo et al. Victimization in cyberspace: Is it how long we spend online, what we do online, or what we post online?
Chandra et al. A taxonomy of cybercrime: Theory and design
Lee et al. Mapping global cyberterror networks: an empirical study of al-Qaeda and ISIS cyberterrorism events
Beldad et al. Shall I tell you where I live and who I am? Factors influencing the behavioral intention to disclose personal data for online government transactions
Gainsbury et al. Identifying risky Internet use: Associating negative online experience with specific online behaviours
Choi et al. Explaining fear of identity theft victimization using a routine activity approach
Levi Thinking about organised crime: structure and threat
Zhang et al. Workplace cyberbullying: A criminological and routine activity perspective
Leeuw et al. Cyber society and digital policies: Challenges to evaluation?
Dupont et al. Enhancing relationships between criminology and cybersecurity
Milani et al. Exposure to cyber victimization: Results from a Swiss survey
Howell et al. Risk avoidance behavior on darknet marketplaces
Louderback et al. New applications of self-control theory to computer-focused cyber deviance and victimization: A comparison of cognitive and behavioral measures of self-control and test of peer cyber deviance and gender as moderators
Jakobi Non-state actors and global crime governance: Explaining the variance of public-private interaction