Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe

This study investigates the relationships between users' routine activities and socio-economic characteristics and three forms of cybercrime victimization of 1) online shopping fraud, 2) online banking fraud and 3) cyber-attacks (i.e. DDoS attacks). Data from the Eurobarometer, containing a sample of 17,811 online European citizens was analyzed. The results generally support the Routine Activities Theory. There were few differences by sex. Younger respondents were more at risk of online purchase fraud, but older respondents more of online banking fraud. Few economic characteristics were related to victimization. The three forms of victimization were interrelated relatively strongly. The characteristic of victims of online crime differ from those of traditional crime. We propose that digitalization leads to a ‘normalization of victims’ of cybercrime.

[1]  Elizabeth V. Mulig,et al.  PHISHING, PHARMING AND IDENTITY THEFT , 2007 .

[2]  R. Clarke,et al.  The Rational Choice Perspective 1 , 2013 .

[3]  Guido Schryen,et al.  The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis , 2007, Comput. Secur..

[4]  Kyung-shick Choi Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .

[5]  Stefan Savage,et al.  Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild , 2014, Internet Measurement Conference.

[6]  T. Holt,et al.  Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .

[7]  Routine Activities and Opportunity Theory , 2015 .

[8]  M. Felson,et al.  Opportunity Makes the Thief Practical theory for crime prevention , 1998 .

[9]  Thomas J. Holt,et al.  Examining the Relationship Between Routine Activities and Malware Infection Indicators , 2013 .

[10]  T. Holt,et al.  Exploring stolen data markets online: products and market forces , 2010 .

[11]  Tim Hope,et al.  The Phenomena of Multiple Victimization. The Relationship between Personal and Property Crime Risk , 2001 .

[12]  Stina Nylander,et al.  At home and with computer access: why and where people use cell phones to access the internet , 2009, CHI.

[13]  K. Wittebrood,et al.  Burglary Victimization in England and Wales, the United States and the Netherlands: A Cross-National Comparative Test of Routine Activities and Lifestyle Theories , 2004 .

[14]  Jason Milletary,et al.  Technical Trends in Phishing Attacks , 1969 .

[15]  Chris Lewis,et al.  Fraud typologies and the victims of fraud literature review , 2009 .

[16]  J. G. Mohebzada,et al.  Phishing in a university community: Two large scale phishing experiments , 2012, 2012 International Conference on Innovations in Information Technology (IIT).

[17]  cyberdetective Convention on Cybercrime , 2007 .

[18]  Fawn T. Ngo,et al.  Cybercrime Victimization: An Examination of Individual and Situational Level Factors , 2011 .

[19]  Bradford W Reyns,et al.  Online Routines and Identity Theft Victimization , 2013 .

[20]  P. Grabosky Virtual Criminality: Old Wine in New Bottles? , 2001 .

[21]  N. Taylor Crime against Businesses in Two Ethnically Diverse Communities , 2006 .

[22]  Michael G. Turner,et al.  Examining Risks and Protective Factors of On-Line Identity Theft , 2012 .

[23]  Shane D. Johnson,et al.  Preventing repeat victimization: a systematic review , 2012 .

[24]  Michael R. Gottfredson Substantive Contributions of Victimization Surveys , 1986, Crime and Justice.

[25]  Bradford W Reyns,et al.  The Thief With a Thousand Faces and the Victim With None , 2016, International journal of offender therapy and comparative criminology.

[26]  Mark D. Griffiths,et al.  Demographic Factors and Playing Variables in Online Computer Gaming , 2004, Cyberpsychology Behav. Soc. Netw..

[27]  Michael D. Reisig,et al.  Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .

[28]  Mark D. Button,et al.  Support for the victims of fraud: an assessment of the current infrastructure in England and Wales , 2009 .

[29]  A. Aleem,et al.  Internet auction fraud: The evolving nature of online auctions criminality and the mitigating framework to address the threat , 2011 .

[30]  Tyler Moore,et al.  Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.

[31]  E. Rutger Leukfeldt,et al.  Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization , 2014, Cyberpsychology Behav. Soc. Netw..

[32]  M. Lei,et al.  Demographic Characteristics and Victimization Risk , 2015 .

[33]  Johan van Wilsem,et al.  ‘Bought it, but Never Got it’ Assessing Risk Factors for Online Consumer Fraud Victimization , 2013 .

[34]  J. V. Wilsem,et al.  Hacking and Harassment—Do They Have Something in Common? Comparing Risk Factors for Online Victimization , 2013 .

[35]  Jonathan Clough 1 Cybercrime , 2011 .

[36]  D. Wall Cybercrime: The Transformation of Crime in the Information Age , 2007 .

[37]  G. Cliff,et al.  White Collar Crime: What It Is and Where It's Going , 2014 .

[38]  Richard Tewksbury,et al.  PREDICTING RISKS OF LARCENY THEFT VICTIMIZATION: A ROUTINE ACTIVITY ANALYSIS USING REFINED LIFESTYLE MEASURES , 1998 .

[39]  Zinta S. Byrne,et al.  The Psychology of Security for the Home Computer User , 2012, 2012 IEEE Symposium on Security and Privacy.

[40]  J. Lynch Problems and Promise of Victimization Surveys for Cross‐National Research , 2006, Crime and Justice.

[41]  M. Junger,et al.  Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit , 2013 .

[42]  Janet L. Lauritsen,et al.  Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents , 1992, Violence and Victims.

[43]  T. Holt,et al.  An Assessment of the Current State of Cybercrime Scholarship , 2014 .

[44]  Janet L. Lauritsen,et al.  THE LINK BETWEEN OFFENDING AND VICTIMIZATION AMONG ADOLESCENTS , 1991 .