van de Weijer, 2019 - Google Patents
Predictors of cybercrime victimization: Causal effects or biased associations?van de Weijer, 2019
View PDF- Document ID
- 4181535678203072733
- Author
- van de Weijer S
- Publication year
- Publication venue
- The human factor of cybercrime
External Links
Snippet
In line with self-control theory and routine activities theory, several previous studies have shown that low self-control and involvement in certain online activities are associated with cybercrime victimization. However, these studies were based on cross-sectional …
- 230000001364 causal effect 0 title abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0251—Targeted advertisement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0202—Market predictions or demand forecasting
- G06Q30/0203—Market surveys or market polls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Stoycheff et al. | Privacy and the Panopticon: Online mass surveillance’s deterrence and chilling effects | |
Saridakis et al. | Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users | |
Cheng et al. | Individual differences in susceptibility to cybercrime victimization and its psychological aftermath | |
Mitchell et al. | Trends in youth reports of sexual solicitations, harassment and unwanted exposure to pornography on the Internet | |
Kang et al. | Privacy Attitudes of Mechanical Turk Workers and the {US}. Public | |
Prichard et al. | Effects of automated messages on internet users attempting to access “barely legal” pornography | |
Chen et al. | Understanding third-person perception about Internet privacy risks | |
Nthala et al. | Informal support networks: an investigation into home data security practices | |
Vishwanath et al. | How people protect their privacy on Facebook: A cost‐benefit view | |
Xiong et al. | Embedding training within warnings improves skills of identifying phishing webpages | |
Conway et al. | A qualitative investigation of bank employee experiences of information security and phishing | |
Yadav et al. | Exploring the synergy between nano-influencers and sports community: behavior mapping through machine learning | |
Canham et al. | Phishing for long tails: Examining organizational repeat clickers and protective stewards | |
Marret et al. | Victimization after meeting with online acquaintances: A cross-sectional survey of adolescents in Malaysia | |
Chang et al. | Cybersecurity for children: an investigation into the application of social media | |
Vakhitova et al. | Offender–victim relationship and offender motivation in the context of indirect cyber abuse: A mixed-method exploratory analysis | |
Lee et al. | Typology of cybercrime victimization in Europe: A multilevel latent class analysis | |
Herbert et al. | Digital Security—A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups | |
Patel et al. | Perceptual representation of spam and phishing emails | |
Van’t Hoff-de Goede et al. | Explaining cybercrime victimization using a longitudinal population-based survey experiment. Are personal characteristics, online routine activities, and actual self-protective online behavior related to future cybercrime victimization? | |
Lowry et al. | Understanding and predicting cyberstalking in social media: Integrating theoretical perspectives on shame, neutralization, self-control, rational choice, and social learning | |
van de Weijer | Predictors of cybercrime victimization: Causal effects or biased associations? | |
Boothroyd | Older Adults' Perceptions of Online Risk | |
Ahmad et al. | Understanding phishing in mobile instant messaging: a study into user behaviour toward shared links | |
Kumar et al. | The dark side of social networking sites: A review of cybercrime research |