Yar, 2005 - Google Patents
The Novelty of 'Cybercrime' An Assessment in Light of Routine Activity TheoryYar, 2005
View PDF- Document ID
- 14502026491978862546
- Author
- Yar M
- Publication year
- Publication venue
- European Journal of Criminology
External Links
Snippet
Recent discussions of 'cybercrime'focus upon the apparent novelty or otherwise of the phenomenon. Some authors claim that such crime is not qualitatively different from 'terrestrial crime', and can be analysed and explained using established theories of crime …
- 230000000694 effects 0 title abstract description 59
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yar | The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory | |
Stoycheff et al. | Privacy and the Panopticon: Online mass surveillance’s deterrence and chilling effects | |
Sharkey et al. | Community and the crime decline: The causal effect of local nonprofits on violent crime | |
Reyns | Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses | |
Holt et al. | Testing an integrated self-control and routine activities framework to examine malware infection victimization | |
Das et al. | Rethinking fake news: Disinformation and ideology during the time of COVID-19 global pandemic | |
Braga et al. | The effects of focused deterrence strategies on crime: A systematic review and meta-analysis of the empirical evidence | |
Morselli | Assessing vulnerable and strategic positions in a criminal network | |
Tyler | Policing in black and white: Ethnic group differences in trust and confidence in the police | |
Holt et al. | An assessment of the current state of cybercrime scholarship | |
Michael et al. | Privacy, data rights and cybersecurity: Technology for good in the achievement of sustainable development goals | |
Ngo et al. | Victimization in cyberspace: Is it how long we spend online, what we do online, or what we post online? | |
Chandra et al. | A taxonomy of cybercrime: Theory and design | |
Lee et al. | Mapping global cyberterror networks: an empirical study of al-Qaeda and ISIS cyberterrorism events | |
Beldad et al. | Shall I tell you where I live and who I am? Factors influencing the behavioral intention to disclose personal data for online government transactions | |
Gainsbury et al. | Identifying risky Internet use: Associating negative online experience with specific online behaviours | |
Choi et al. | Explaining fear of identity theft victimization using a routine activity approach | |
Levi | Thinking about organised crime: structure and threat | |
Zhang et al. | Workplace cyberbullying: A criminological and routine activity perspective | |
Leeuw et al. | Cyber society and digital policies: Challenges to evaluation? | |
Dupont et al. | Enhancing relationships between criminology and cybersecurity | |
Milani et al. | Exposure to cyber victimization: Results from a Swiss survey | |
Howell et al. | Risk avoidance behavior on darknet marketplaces | |
Louderback et al. | New applications of self-control theory to computer-focused cyber deviance and victimization: A comparison of cognitive and behavioral measures of self-control and test of peer cyber deviance and gender as moderators | |
Jakobi | Non-state actors and global crime governance: Explaining the variance of public-private interaction |