Limit search to available items
Book Cover
E-book
Author Choi, Kyung-shick, 1973-

Title Risk factors in computer-crime victimization / Kyung-shick Choi
Published El Paso [Tex.] : LFB Scholarly Pub., 2010

Copies

Description 1 online resource (vii, 167 pages) : illustrations
Series Criminal justice: recent scholarship
Criminal justice (LFB Scholarly Publishing LLC)
Contents ACKNOWLEDGMENTS; CHAPTER 1: Introduction and Overview of Computer Crime; Purpose and Scope; Computer Crime and Victimization; Criminological Foundations on Computer Crime Victimization; CHAPTER 2: Computer Crime Victimization and Criminological Perspectives; Routine Activities Theory and Nature of Cyberspace; Spatiality and Temporality in Cyberspace; Three Core Concepts: Routine Activities Theory; Motivated Offender: Computer Criminal; Suitable Target in Cyberspace; Capable Guardianship in Cyberspace; Target Suitability Revisited: Lifestyle-Exposure Theory
Potential Theoretical ExpansionCHAPTER 3: Methodological Approach: Digital Guardian, Online Life Style, and Computer Crime Victimization; Sample and Procedure; Research Hypotheses and Measures; Digital Guardian Measure; Online Lifestyle Measure; Computer-Crime Victimization Measure; Convergence of Two Latent Variables Measure; CHAPTER 4: SEM Assessment: Cyber-Routine ActivitiesTheoretical Model; Sample; Properties of Measures; Digital Guardian; CFA on Digital-Capable Guardianship; Online Lifestyle; CFA on Online Lifestyle; Computer-Crime Victimization; Measurement Model; Structural Model
Relationship Between Demographic Variables and RiskFactors of Computer Crime VictimizationDemographic Variables vs. Fear of Cybercrime; Demographic Variables vs. Main Factors in ComputerCrime Victimization; CHAPTER 5: Managing Computer Crime and Future Research; Policy Implications; Limitations and Directions for Future Research; Future Directions on Computer Crime Prevention Program; APPENDIX A: Presurvey Guideline; APPENDIX B: Computer Crime Victimization Survey; REFERENCES; INDEX
Summary Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer crimes.
TRUE CRIME -- White Collar Crime.
Computer crimes
Form Electronic book
ISBN 1593326467
9781593326463