Journal article Open Access

Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes

Fernando Miró-Llinares; Jacqueline Drew; Michael Townsley


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/063e99d2-251a-47a5-9f0d-73f7a67c2c9f/Mir%C3%B3-LlinaresetalVol14Issue1IJCC2020.pdf"
      }, 
      "checksum": "md5:33697acd3869e61c3fab385c0afc6610", 
      "bucket": "063e99d2-251a-47a5-9f0d-73f7a67c2c9f", 
      "key": "Mir\u00f3-LlinaresetalVol14Issue1IJCC2020.pdf", 
      "type": "pdf", 
      "size": 11368255
    }
  ], 
  "owners": [
    29221
  ], 
  "doi": "10.5281/zenodo.3744874", 
  "stats": {
    "version_unique_downloads": 21.0, 
    "unique_views": 123.0, 
    "views": 125.0, 
    "version_views": 125.0, 
    "unique_downloads": 21.0, 
    "version_unique_views": 123.0, 
    "volume": 261469865.0, 
    "version_downloads": 23.0, 
    "downloads": 23.0, 
    "version_volume": 261469865.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.3744874", 
    "conceptdoi": "https://doi.org/10.5281/zenodo.3744873", 
    "bucket": "https://zenodo.org/api/files/063e99d2-251a-47a5-9f0d-73f7a67c2c9f", 
    "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.3744873.svg", 
    "html": "https://zenodo.org/record/3744874", 
    "latest_html": "https://zenodo.org/record/3744874", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.3744874.svg", 
    "latest": "https://zenodo.org/api/records/3744874"
  }, 
  "conceptdoi": "10.5281/zenodo.3744873", 
  "created": "2021-05-08T12:14:44.097148+00:00", 
  "updated": "2021-05-08T13:48:08.732789+00:00", 
  "conceptrecid": "3744873", 
  "revision": 2, 
  "id": 3744874, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.3744874", 
    "description": "<p><em>Economic forms of cybercrime affect millions of people around the world. Preparatory crimes such as spam, scam and malware are increasingly enacted by cybercriminals. However, literature has shown that some people are more vulnerable than others to these types of attacks and this may be a circumstance that varies cross-nationally. Using a comparative research design, behaviors that are associated with a higher probability of victimization by economic preparatory crimes are identified. The results obtained from two samples, one Spanish and one Australian, show that despite similar victimization prevalence, the correlates of routine activities vary substantially. While 6 of the 11 behaviors analyzed were similar, other substantial differences were found. The greatest risk for Spanish participants is online shopping, while for Australians it is downloading files. Differences were also found for use of antivirus, pirated software, contacting strangers and taking part in videoconferences. Based on the current research, it is concluded that cyber victimization should focus on identifying nuances in the daily activities performed by online users, rather than on broader constructs such as interaction or visibility. Further, preventive strategies must take into account differences in routine behaviors across different geographical areas.</em></p>", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "title": "Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes", 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3744873"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3744874"
          }
        }
      ]
    }, 
    "publication_date": "2020-04-08", 
    "creators": [
      {
        "affiliation": "Miguel Hernandez University of Elche, Spain", 
        "name": "Fernando Mir\u00f3-Llinares"
      }, 
      {
        "name": "Jacqueline Drew"
      }, 
      {
        "name": "Michael Townsley"
      }
    ], 
    "access_right": "open", 
    "resource_type": {
      "subtype": "article", 
      "type": "publication", 
      "title": "Journal article"
    }, 
    "related_identifiers": [
      {
        "scheme": "doi", 
        "identifier": "10.5281/zenodo.3744873", 
        "relation": "isVersionOf"
      }
    ]
  }
}
125
23
views
downloads
All versions This version
Views 125125
Downloads 2323
Data volume 261.5 MB261.5 MB
Unique views 123123
Unique downloads 2121

Share

Cite as