Routine Activity Theory and the Determinants of High Cybercrime Countries

被引:50
作者
Kigerl, Alex [1 ]
机构
[1] Washington State Univ, Pullman, WA 99163 USA
关键词
routine activity theory; cybercrime; spam; phishing; unemployment; Internet; convention on cybercrime; SELF-CONTROL; LIFE-STYLES; VICTIMIZATION; POISSON; RATES; RISK;
D O I
10.1177/0894439311422689
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cybercrime and the threat it creates are growing in its reach, in accordance with similar growth in information technology. Some countries account for more of the variation in cybercrime activity than others, which affects less criminally involved nations as well, considering that cybercrime does not respect national borders over the Internet. Routine activity theory (RAT) has been used to explain cybercrime at the individual level, but not at the national level. Much research has focused on high cybercrime countries, but this research is often conducted by cybersecurity firms and is exclusively descriptive, making no inferences. This research sought to determine what characteristics predict whether a nation is high in either spamming activity or phishing activity. In a sample of 132 countries, it was found that wealthier nations with more Internet users per capita had higher cybercrime activity. Unemployment was also found to interact with Internet users such that the effect of the proportion of Internet users on spam was strongest in nations with higher unemployment. The implications these findings have for policy and suggestions for future research are discussed.
引用
收藏
页码:470 / 486
页数:17
相关论文
共 47 条
[1]   Network topologies and virtual place [J].
Adams, P .
ANNALS OF THE ASSOCIATION OF AMERICAN GEOGRAPHERS, 1998, 88 (01) :88-106
[2]  
Akers R., 2004, Criminological theories: Introduction, evaluation, and application, V4th, P33
[3]  
Alganandam H., 2005, CYBERCRIMINAL ACTIVI
[4]  
[Anonymous], 2005, P 2005 ASS BUS COMM
[5]  
[Anonymous], 2007, Academy of Accounting Financial Studies Journal
[6]  
[Anonymous], 2010, SOPHOS, P11
[7]  
Bachmann M, 2010, INT J CYBER CRIMINOL, V4, P643
[8]  
Balkin J., 2007, Cybercrime: Digital Cops in a Networked Environment
[9]  
Barham John, 2008, Security Management, V52
[10]  
Bookman E., 2010, GLOBAL THREAT REPORT