[go: up one dir, main page]

van de Weijer, 2019 - Google Patents

Predictors of cybercrime victimization: Causal effects or biased associations?

van de Weijer, 2019

View PDF
Document ID
4181535678203072733
Author
van de Weijer S
Publication year
Publication venue
The human factor of cybercrime

External Links

Snippet

In line with self-control theory and routine activities theory, several previous studies have shown that low self-control and involvement in certain online activities are associated with cybercrime victimization. However, these studies were based on cross-sectional …
Continue reading at imp.dayawisesa.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0251Targeted advertisement
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0202Market predictions or demand forecasting
    • G06Q30/0203Market surveys or market polls
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run

Similar Documents

Publication Publication Date Title
Stoycheff et al. Privacy and the Panopticon: Online mass surveillance’s deterrence and chilling effects
Saridakis et al. Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users
Cheng et al. Individual differences in susceptibility to cybercrime victimization and its psychological aftermath
Mitchell et al. Trends in youth reports of sexual solicitations, harassment and unwanted exposure to pornography on the Internet
Kang et al. Privacy Attitudes of Mechanical Turk Workers and the {US}. Public
Prichard et al. Effects of automated messages on internet users attempting to access “barely legal” pornography
Chen et al. Understanding third-person perception about Internet privacy risks
Nthala et al. Informal support networks: an investigation into home data security practices
Vishwanath et al. How people protect their privacy on Facebook: A cost‐benefit view
Xiong et al. Embedding training within warnings improves skills of identifying phishing webpages
Conway et al. A qualitative investigation of bank employee experiences of information security and phishing
Yadav et al. Exploring the synergy between nano-influencers and sports community: behavior mapping through machine learning
Canham et al. Phishing for long tails: Examining organizational repeat clickers and protective stewards
Marret et al. Victimization after meeting with online acquaintances: A cross-sectional survey of adolescents in Malaysia
Chang et al. Cybersecurity for children: an investigation into the application of social media
Vakhitova et al. Offender–victim relationship and offender motivation in the context of indirect cyber abuse: A mixed-method exploratory analysis
Lee et al. Typology of cybercrime victimization in Europe: A multilevel latent class analysis
Herbert et al. Digital Security—A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups
Patel et al. Perceptual representation of spam and phishing emails
Van’t Hoff-de Goede et al. Explaining cybercrime victimization using a longitudinal population-based survey experiment. Are personal characteristics, online routine activities, and actual self-protective online behavior related to future cybercrime victimization?
Lowry et al. Understanding and predicting cyberstalking in social media: Integrating theoretical perspectives on shame, neutralization, self-control, rational choice, and social learning
van de Weijer Predictors of cybercrime victimization: Causal effects or biased associations?
Boothroyd Older Adults' Perceptions of Online Risk
Ahmad et al. Understanding phishing in mobile instant messaging: a study into user behaviour toward shared links
Kumar et al. The dark side of social networking sites: A review of cybercrime research