Cyber-Dependent Crime Victimization: The Same Risk for Everyone?

The Internet has simplified daily life activities. However, besides its comfortability, the Internet also presents the risk of victimization by several kinds of crimes. The present article addresses the question of which factors influence cyber-dependent crime and how they vary between three kinds of cyber-dependent offences: malware infection, ransomware infection, and misuse of personal data. According to the Routine Activity Approach, it is assumed that crime is determined by a motivated offender, the behavior of the Internet user, and the existence of prevention factors. Our analyses were based on a random sample of 26,665 Internet users in two federal states in Germany, aged 16 years and older; 16.6 percent of the respondents had experienced at least one form of cyber-dependent victimization during the year 2014. The results indicate that individual and household factors, as well as online and prevention behavior, influence the risk of cyber-dependent victimization. Furthermore, the effects differ between the three types of offences. In conclusion, the risk of being victimized by cyber-dependent crime is not the same for anyone, but depends on multivariate factors according to the idea of Routine Activity Approach. However, in view of the fact that crime-related factors also matter, studying different cybercrime offences separately seems to be an appropriate research approach.

[1]  Katrin Auspurg,et al.  Gruppenvergleiche bei Regressionen mit binären abhängigen Variablen – Probleme und Fehleinschätzungen am Beispiel von Bildungschancen im Kohortenverlauf / Group Comparisons for Regression Models with Binary Dependent Variables – Problems and Pitfalls Illustrated by Differences in Educational Opportu , 2011 .

[2]  J. V. Wilsem,et al.  Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization , 2011 .

[3]  Kyung-shick Choi Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .

[4]  Bradford W. Reyns,et al.  Preventing crime online: Identifying determinants of online preventive behaviors using structural equation modeling and canonical correlation analysis , 2016 .

[5]  Joav Merrick,et al.  Cyberbullying victimization prevalence and associations with internalizing and externalizing problems among adolescents in six European countries , 2015, Comput. Hum. Behav..

[6]  T. Holt,et al.  The Effect of Self-Control on Victimization in the Cyberworld , 2010 .

[7]  G. Kirwan,et al.  The psychology of cyber crime : concepts and principles , 2012 .

[8]  Michael D. Reisig,et al.  Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .

[9]  Alex Kigerl,et al.  Routine Activity Theory and the Determinants of High Cybercrime Countries , 2012 .

[10]  H. Vandebosch,et al.  Divergent Perspectives: Exploring a Multiple Informant Approach to Cyberbullying Victimization and Perpetration , 2016 .

[11]  Thomas J. Holt,et al.  On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory , 2009 .

[12]  E. R. Leukfeldt,et al.  Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis , 2016 .

[13]  Fawn T. Ngo,et al.  Cybercrime Victimization: An Examination of Individual and Situational Level Factors , 2011 .