Journal article Open Access

Understanding Cyber Victimization: Digital Architectures and the Disinhibition Effect

Agustina, Jose R.

Researchers in the fields of sociology, psychology, behavioural sciences and law are trying to comprehend the radical rise of a new relational paradigm derived from the current proliferation of ICT. Crime dynamics and victimisation are not alien to the set of changes wrought by the digital era. The way in which victims behave in cyber space decisively elevates their risk of victimization. In connexion with this, the design of digital architectures notably increases criminal opportunities and facilitates cyber victimisation i.e. the defining traits of cyber space affect people’s daily lives and incline them to adopt riskier lifestyles. Based on Routine Activity Theory and Lifestyle Theory, along with the interesting work of Suler (2004), the present article shows the importance of victimological perspective in explaining cyber criminal events and designing prevention strategies. Stemming from literature review, this analysis will focus on describing a set of psychological and sociological traits that comprise the profile of victims and explaining how the surroundings influence one’s thoughts, desires, and actions.

Files (744.0 kB)
Name Size
744.0 kB Download
  • Agustina, J. R. (2009). Arquitectura digital de Internet como factor criminógeno: Estrategias de prevención frente a la delincuencia virtual. International E-Journal of Criminal Sciences, num. 3 (2009).
  • Agustina, J. R. (2012). Analyzing Sexting from a Criminological Perspective. Beyond Child Pornography Issues: Sexting as a Threshold for Victimization. In Pauline C. Reich (Eds.), Cybercrime & Security, West, Thomson Reuters, Section 4:4, 64-96.
  • Agustina, J. R. (2013). ¿Cómo prevenir conductas abusivas y delitos tecnológicos en la empresa? Estudio interdisciplinar sobre políticas de uso de las TIC, prevención y gestión de “conflictos” en una muestra de empresas españolas. IDP. Revista de Internet, Derecho y Política (in press).
  • Antón Oneca, J. (1958). Term “Estafa” in Nueva Enciclopedia jurídica, Calos-E. Mascareñas (dir.), Tomo IX, Barcelona, Editorial Francisco Seix.
  • Bossler, A. M. & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38, 227–236.
  • Brantingham P. & Brantingham P. (1995). Criminality of place: Crime generators and crime attractors. European Journal on Criminal Policy and Research, 3(3), 5–26.
  • Cano Paños, M. A. (2013). El caso “Mohammed Merah” en el contexto actual del terrorismo islamista. Revista Electrónica de Ciencia Penal y Criminología RECPC 15-02 (2013).
  • Castells, M. (1997). La era de la información: Fin de milenio. Vol. 3. Madrid: Alianza.
  • Choclán Montalvo, J. A. (2006). Infracciones patrimoniales en los procesos de transferencia de datos. In C.M. Romeo Casabona (coord.) El cibercrimen. Nuevos retos jurídico-penales, nuevas respuestas político-criminales. Granada: Ed. Comares.
  • Choi, K. (2008). Computer Crime, Victimization and Integrated Theory: An Empirical Assessment. International Journal of Cyber Criminology, 2(1), 308-333.
  • Cohen, L. E., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44, 588-608.
  • Cornish, D., & Clarke, R.V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. In: M. J. Smith and D. Cornish (eds.) Theory for Practice in Situational Crime Prevention (pp. 41–96), Vol. 16. Monsey, NY: Criminal Justice Press.
  • Díaz Cortés, L.M. (2012). Aproximación criminológica y político criminal del contacto TICspreordenado a la actividad sexual con menores en el Código penal español-art. 183 bis CP. Revista De Derecho Penal y Criminología, 3rdPeriod, num. 8 (July 2012), 289-318.
  • Eberstatd, M. y Layden, M.A., Witherspoon Institute (ed.) (2011).Los costes sociales de la pornografía. Una exposición de hallazgos y recomendaciones, in La pornografía y sus efectos sociales y criminógenos. Una aproximación multidisciplinar, J.R. Agustina (dir.), Social TrendsInstitute (ed.), Colección Actualidad Criminológica y Penal, BdeF–Edisofer.
  • Ebert, “VerbrechensbekämpfungdurchOpferbestrafung?”, Juristenzeitung (JZ) 1983, 633-643.
  • Etzioni, A. (2012). Los límites de la privacidad (trans. A. López Lobo y J.R. Agustina). Montevideo, Uruguay: BdeF.
  • Felson, M. (1994). Crime and Everyday Life (1st ed.). Thousand Oaks, CA: Pine Forge Press.
  • Felson, M. (1997).Technology, Business and Crime. In Felson, M. & Clarke, R.V. (ed.), Business and Crime Prevention, Monsey, NT: Willow Tree Press, 81–96.
  • Furnell, S. (2002).Cyber crime: Vandalizing the information society. London: Addison Wesley.
  • Gordon, M. P., Loef, M. P., Lucyshyn, W., & Richardson, R. (2004). CSI/FBI computer crime and security survey. Los Angeles: Computer Security Institute.
  • Gottfredson, M. R. & Hirschi, T. (1990). A General Theory of Crime. Stanford, CA: Stanford University Press.
  • Grabosky, P. (2001). Virtual Criminality: Old Wine in New Bottles? Social & Legal Studies 10, 243–9.
  • Grabosky, P., & Smith, R. (2001). Telecommunication fraud in the digital age: The convergence of technologies. In D. Wall (Ed.) Crime and the Internet (pp. 23-45). London: Routledge.
  • Green, S.P. (2013). Mentir, hacer trampas y apropiarse de lo ajeno. Una teoría moral de los delitos de cuello blanco (trans. JR. Agustina, M. Amorós e I. Ortiz de Urbina). Madrid: Marcial Pons.
  • Herrero Moreno, M. (1996). La hora de la víctima. Compendio de Victimología. Publicaciones del Instituto de Criminología de la Universidad Complutense. Madrid: Edersa.
  • Herrero Moreno, M. (2006). Victimización: aspectosgenerales. In E. Baca, E. Echeburúa y J.M. Tamarit (coords.), Manual de Victimología, Valencia: Tirant lo Blanch, 79-128.
  • Hindelang, M., Gottfredson, M. & Garofalo, J. (1978). Victims of Personal Crime: an Empirical Foundation for a Theory of Personal Victimization. Cambridge MA: Ballinger.
  • Hurd, H. M. (2005). Blaming the Victim: A Response to the Proposal that Criminal Law Recognize a General Defense of Contributory Responsibility, 8 Buff. Crim. L. Rev. 504, 5.
  • Jaishankar, K. (2008). Space transition theory of cyber crimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 283−301). Upper Saddle River, NJ: Prentice Hall.
  • Katyal, N.K. (2003). Digital Architecture as Crime Control, 111 Yale Law Journal 1039.
  • Lenhart, A. (2009). Teens and Sexting. How and why minor teens are sending sexually suggestive nude or nearly nude images via text messaging. Pew Internet & American Life Project. Washington: Pew Research Center.
  • Lessig, L. (1999). Code and Other Laws of Cyber space. NY: Basic Books.
  • Marcum, C. D. (2011). Adolescent Online Victimization and Constructs of Routine Activities Theory. In Jaishankar, K (Ed.), Cyber Criminology: Exploring internet crimes and criminal behavior (pp. 253-276). Boca Raton: CRC Press.
  • Mendelsohn, B. (1956). The Victimology. In Etudes Internationales de Psycho-Sociologie Criminelle 1 (1956).
  • Miró Llinares, F. (2011). La oportunidad criminal en el ciberespacio. Aplicación y desarrollo de la teoría de las actividades cotidianas para la prevención del cibercrimen. Revista Electrónica de Ciencia Penal y Criminología, num. 13-07.
  • Miró Llinares, F. (2012). El cibercrimen. Fenomenología y criminología de la delincuencia en el ciberespacio, Madrid, Marcial Pons.
  • Miró Llinares, F. (2013). La respuesta penal al ciberfraude. Especial atención a la responsabilidad de los muleros del phishing. Revista Electrónica de Ciencia Penal y Criminología (in press).
  • Ngo, F. & Paternoster, R. (2011). Cyber crime Victimization: An Examination of Individual and Situational level factors. International Journal of Cyber Criminology, 5(1), 773-793.
  • Nieto Martín, A. & Maroto Calatayud, M. (2013). Las redes sociales en Internet como instrumento de control penal: tendencias y límites. In A. Rallo Lombarte y R. Martínez Martínez (eds.), Derecho y redes sociales (2ª ed.). Pamplona: Civitas, 427-484.
  • Ogburn, W. F. (1964). On Culture and Social Change: Selected Papers (Ed. Otis Dudley Duncan). Chicago: University of Chicago Press.
  • Palfrey, J. & Gasser, U. (2008). Born Digital: Understanding the First Generation of Digital Natives. New York: Basic Books.
  • Pereda, N., Abad, J. & Guilera, G. (in press). Victimización de menores a través de internet: descripción y características de las víctimas de online grooming, in Delito, Pena, Política Criminal y Tecnologías de la Información y la Comunicación en las modernas Ciencias Penales. Ediciones Universidad de Salamanca, Salamanca.
  • Puppe, I. (1995). In Neumann/Schild (Gesamtred.), Nomos Kommentarzum Strafgesetzbuch, Band 2, BesondererTeil, Baden-Baden num. marg. 4, cited in Silva Sánchez (1999) op. cit.
  • Quayle, E., Jonsson, L., & Lööf, L. (2012). Online behaviour related to child sexual abuse: Interviews with affected young people. Council of the Baltic Sea States, Stockholm: ROBERT project.
  • Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety, 12, 99-118.
  • Reyns, B. W., Burek, M. W., Henson, B., & Fisher, B. S. (2011b). The unintended consequences of digital technology: exploring the relationship between sexting and cyber-victimisation. Journal of Crime and Justice, 1–17.
  • Reyns, B. W., Henson, B., & Fisher, B. S. (2011a). Being pursued online: applying cyberlifestyle-routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38, 1149–1169.
  • Schafer, S. (1977). Victimology: The Victim and His Criminal. Reston, Va: Reston Pub. Co.
  • Silva Sánchez, J.M. (1989) Consideraciones victimológicas en la teoría jurídica del delito? Introducción al debate sobre la victimodogmática, in Criminología y derecho penal al servicio de la persona: libro homenaje al profesor Antonio Beristain, (coord. by Enrique Echeburúa Odriozola, José Luis de la Cuesta Arzamendi, Iñaki Dendaluce Segurola), 633-646.
  • Standler, B.R. (2002). Computer crime. Retrieved on 12th October 2014 from
  • Tapscott, D. (2008). Grown Up Digital: How the Net Generation is Changing Your World. McGraw-Hill.
  • Tonry, M., Farrington, D. P. (1995). Strategic Approaches to Crime Prevention. 19 Crime & Justice 1.
  • Valkenburg, P. M & Peter, J. (2011). Online communication among adolescents: An integrated model on its attraction, opportunities, and risks. Journal of Adolescent Health, 48, 121-127.
  • Villacampa Estiarte, C. (2010). La respuesta jurídico-penal frente al stalking en España: presente y futuro. ReCRIM: Revista de l'InstitutUniversitarid'Investigació en Criminologia i CiènciesPenals de la UV, 4, 33-57.
  • Wokström, P.-O. (2006). Individuals, settings, and acts of crime: situational mechanisms and the explanation of crime. In P.-O. H. Wikström y R.J. Sampson, The Explanation of Crime. Cambridge: Cambridge University Press.
  • Wolak, J., Finkelhor, D., & Mitchell, K.J. (2004). Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study. Journal of Adolescent Health, 35, 424.e11– 424.e20.
  • Wolak, J., Finkelhor, D., Mitchell, K. J. & Ybarra, M. L. (2008), 'Online “predators” and their victims'. American Psychologist, 63(7) 111-126.
  • Wortley, R. & Smallbone, S. (2012). Internet Child Pornography: Causes, Investigation, and Prevention. Praeger: California, Colorado, England.
  • Yar, M. (2005). The novelty of ‘cyber crime’: An assessment in light of routine activity theory. European Journal of Criminology, 2, 407-427.
All versions This version
Views 9595
Downloads 22
Data volume 1.5 MB1.5 MB
Unique views 9494
Unique downloads 22


Cite as