Acknowledgement
This study was supported by the Institute of Management Research at Seoul National University.
References
- Aguinis, H. (2004). Regression analysis for categorical moderators. Guilford Press.
- Alshalan, A. (2006). Cyber-crime fear and victimization: An analysis of a national survey. Mississippi.
- Back, S. (2016). Empirical assessment of cyber harassment victimization via cyber-routine activities theory. Master of Criminal Justice. Bridgewater State University.
- Berry, W. D. (1993). Understanding regression assumptions. London: Sage.
- Buglass, S. L., Binder, J. F., Betts, L. R., and Underwood, J. D. (2017). Motivators of online vulnerability: The impact of social network site use and FOMO. Computers in Human Behavior, 66, 248-255. https://doi.org/10.1016/j.chb.2016.09.055
- Cappadocia, M. C., Craig,W., and Pepler, D. (2013). Cyberbullying: Prevalence, stability, and risk factors during adolescence. Canadian Journal of School Psychology, 28, 171-192. https://doi.org/10.1177/0829573513491212
- Cho, S., and Lee, J. M. (2018). Explaining physical, verbal, and social bullying among bullies, victims of bullying, and bully-victims: Assessing the integrated approach between social control and lifestyles-routine activities theories. Children and Youth Services Review, 91, 372-382. https://doi.org/10.1016/j.childyouth.2018.06.018
- Choi, K. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308-333.
- Choi, K., and Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. Computers in Human Behavior, 73, 394-402. https://doi.org/10.1016/j.chb.2017.03.061
- Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731. https://doi.org/10.1016/j.cose.2011.08.004
- Cohen, L. E., and Felson, M. (1979). Social change and crime rate trends: A routine activities approach. American Sociological Review, 44(4), 588-608. https://doi.org/10.2307/2094589
- Cohen, L. E., Kluegel, J. R., and Land, K. C. (1981). Social inequality and predator victimization: An exposition and test of a formal theory. American Sociological Review, 46, 505-524. https://doi.org/10.2307/2094935
- Dashora, K. (2011). Cyber crime in the society: Problems and preventions. Journal of Alternative Perspectives in the Social Sciences, 3(1), 240-259.
- Dredge, R., Gleeson, J., and de la Piedad Garcia, X. (2014). Presentation on Facebook and risk of cyberbullying victimisation. Computers in Human Behavior, 40, 16-22. https://doi.org/10.1016/j.chb.2014.07.035
- Eck, J. E., and Clarke, R. V. (2003). Classifying common police problems: A routine activity theory approach. Theory and Practice in Situational Crime Prevention, Crime Prevention Studies, 16, 7-39.
- Elias, R. (1986). The politics of victimization: victims, victimology, and huma rights. New York: Oxford Press.
- Gross, R., and Acquisti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the Electronic Society, 71-80. New York, NY: ACM. November 2005.
- Halder, D., and Jaishankar, K. (2011). Cyber crime and the victimization of women: Laws, rights and regulations. India: Manonmaniam Sundaranar University.
- Henson, B., Reyns, B. W., and Fisher, B. S. (2011). Security in the 21st century examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review, 36(3), 253-268. https://doi.org/10.1177/0734016811399421
- Hindelang, M. J., Gottfredson, M. R., and Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization. Cambridge, Mass: Ballinger Pub. Co.
- Hinduja, S., and Patchin, J. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29, 129-156. https://doi.org/10.1080/01639620701457816
- Holt, T. J., and Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1-25. https://doi.org/10.1080/01639620701876577
- Holtfreter, K., Reisig, M. D., and Pratt, T. C. (2008). Low self-control, routine activities, and fraud victimization. Criminology, 46, 189-220. https://doi.org/10.1111/j.1745-9125.2008.00101.x
- Jaishankar, K. (2018). Cyber criminology as an academic disipline: History, contribution and impact. International Journal of Cyber Criminology, 12(1), 1-8.
- Kim, Y., Park, Y., Lee, Y., and Park, K. (2018). Do we always adopt Facebook friends' eWOM postings? The role of social identity and threat. International Journal of Advertising, 37(1), 86-104. https://doi.org/10.1080/02650487.2017.1386410
- Kokkinos, C. M., and Saripanidis, I. (2017). A lifestyle exposure perspective of victimization through Facebook among university students. Do individual differences matter? Computers in Human Behavior, 74, 235-245. https://doi.org/10.1016/j.chb.2017.04.036
- Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., and Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140, 1073.
- Kshetri, N. (2016). Cybercrime and cybersecurity in India: Causes, consequences and implications for the future. Crime, Law and Social Change, 66(3), 313-338. https://doi.org/10.1007/s10611-016-9629-3
- Leukfeldt, E. R., Kleemans, E. R., and Stol, W. P. (2017). Origin, growth and criminal capabilities of cybercriminal networks: An international empirical analysis. Crime, Law and Social Change, 67(1), 39-53. https://doi.org/10.1007/s10611-016-9663-1
- Long, S. J., Long, J. S., and Freese, J. (2006). Regression models for categorical dependent variables using Stata. Stata Press.
- Messner, S. F., and Blau, J. R. (1987). Routine leisure activities and rates of crime: A macro-level analysis. Social Forces, 65(4), 1035-1052. https://doi.org/10.2307/2579022
- Miethe, T. D., and Meier, R. F. (1994). Crime and its social context : toward an integrated theory of offenders, victims, and situations. Albany: State University of New York Press.
- Ngo, F. T., and Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773.
- Peluchette, J. V., Karl, K., Wood, C., and Williams, J. (2015). Cyberbullying victimization: Do victims' personality and risky social network behaviors contribute to the problem? Computers in Human Behavior, 52, 424-435. https://doi.org/10.1016/j.chb.2015.06.028
- Pereira, F., Spitzberg, B. H., and Matos, M. (2016). Cyber-harassment victimization in Portugal: Prevalence, fear and help-seeking among adolescents. Computers in Human Behavior, 62, 136-146. https://doi.org/10.1016/j.chb.2016.03.039
- Phillips, E. (2015). Empirical assessment of lifestyle-routine activity and social learning theory on cybercrime offending. Master of Criminal Justice. Bridgewater State University.
- Pratt, T. C., Holtfreter, K., and Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267-296. https://doi.org/10.1177/0022427810365903
- Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428-438. https://doi.org/10.1016/j.intcom.2010.05.001
- Spitzberg, B. H., and Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 71-92. https://doi.org/10.1177/14614440222226271
- Staksrud, E., Olafsson, K., and Livingstone, S. (2013). Does the use of social networking sites increase children's risk of harm? Computers in Human Behavior, 29, 40-50. https://doi.org/10.1016/j.chb.2012.05.026
- Suh, J., Park, J., Kim, B., and Rahman, H. A. (2018). How practitioners perceive a ternary relationship in ER conceptual modeling. Asia Pacific Journal of Information Systems, 1(1), 75-92. https://doi.org/10.14329/apjis.2018.28.2.75
- Svensson, R., and Pauwels, L. (2010). Is a risky lifestyle always "risky"? The interaction between individual propensity and lifestyle risk in adolescent offending: A test in two urban samples. Crime & Delinquency, 56(4), 608-626. https://doi.org/10.1177/0011128708324290
- Vakhitova, Z. I., Alston-Knox, C. L., Reynald, D. M., Townsley, M. K., and Webster, J. L. (2019). Lifestyles and routine activities: Do they enable different types of cyber abuse? Computers in Human Behavior, 101, 225-237. https://doi.org/10.1016/j.chb.2019.07.012
- Wall, D. (2001). Cybercrimes and the internet. In D. Wall (ed.) Crime and the internet. London: Routledge.
- Walrave, M., and Heirman, W. (2011). Cyberbullying: Predicting victimization and perpetration. Children & Society, 25, 59-72. https://doi.org/10.1111/j.1099-0860.2009.00260.x
- Wearesocial. (2017). Digital in 2017: Global overview. Retrieved from https://wearesocial.com/special-reports/digital-in-2017-global-overview
- Wilson, R. E., Gosling, S. D., and Graham, L. T. (2012). A review of Facebook research in the social sciences. Perspectives on Psychological Science, 7, 203-220. https://doi.org/10.1177/1745691612442904
- Yar, M. (2005). The novelty of 'cybercrime' an assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407-427. https://doi.org/10.1177/147737080556056
- Yucedal, B. (2010). Victimization in cyberspace: An application of routine activity and lifestyle exposure theories. Doctor of Philosophy. Kent State University.