The Experts below are selected from a list of 2094 Experts worldwide ranked by ideXlab platform
Kimkwang Raymond Choo - One of the best experts on this subject based on the ideXlab platform.
-
NCS - Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach.
Advances in Intelligent Systems and Computing, 2019Co-Authors: Alan Roder, Kimkwang Raymond ChooAbstract:With the evolution of technology in today’s modern society comes the global success of unmanned aerial vehicles (UAVs; also known as drones). There are, however, opportunities for UAVs to be abused in criminal or nefarious activities. The aim of this paper is to outline the opportunities for UAVs to be used in criminal activities, and explore the potential countermeasures and their effectiveness. This paper will seek to apply Routine Activity Theory to reduce the opportunities for UAV related crime and theorise strategies to increase accountability. Finally, this paper will attempt to forecast the threat of a criminal act within 2019.
-
unmanned aerial vehicles uavs threat analysis and a Routine Activity Theory based mitigation approach
National Cyber Summit, 2019Co-Authors: Alan Roder, Kimkwang Raymond ChooAbstract:With the evolution of technology in today’s modern society comes the global success of unmanned aerial vehicles (UAVs; also known as drones). There are, however, opportunities for UAVs to be abused in criminal or nefarious activities. The aim of this paper is to outline the opportunities for UAVs to be used in criminal activities, and explore the potential countermeasures and their effectiveness. This paper will seek to apply Routine Activity Theory to reduce the opportunities for UAV related crime and theorise strategies to increase accountability. Finally, this paper will attempt to forecast the threat of a criminal act within 2019.
-
implications of emerging technologies to incident handling and digital forensic strategies a Routine Activity Theory
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017Co-Authors: Kimkwang Raymond Choo, N Ab H Rahman, Gary C KesslerAbstract:Abstract A changing cyber threat landscape may impact incident handling and digital forensic practitioners in providing the best mitigation and response strategies. This study seeks to understand the challenges of emerging threats to incident handling and digital forensic by utilizing the Routine Activity Theory, which comprises three main factors—motivation, opportunities, and guardianship. Data were collected using an open-ended questionnaire completed by respondents from 20 organizations. Our findings suggest that the emerging technologies pose significant motivations and opportunities to cybercriminals, and thus, increase the challenges in incident handling and digital forensics to provide effective guardianship.
-
Are You Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps
IEEE Transactions on Sustainable Computing, 1Co-Authors: Rushank Shetty, George Grispos, Kimkwang Raymond ChooAbstract:In today's age of instant gratification, dating apps provide the comfort of meeting new people at the swipe of a finger. However, recent high profile incidents have raised privacy-related concerns with the use of these apps. The level of harm inflicted on a victim can be either physical (e.g. murder, stalking, sexual assault) or non-physical (e.g. identity theft, harassment and cyberstalking). In this paper, we study ten popular Android dating apps. Using an adversary model, we demonstrate how one can trivially conduct a man-in-the-middle attack against these apps. We then explain how the Routine Activity Theory can be applied to design mitigation strategies for dating apps.
Bradford W Reyns - One of the best experts on this subject based on the ideXlab platform.
-
the thief with a thousand faces and the victim with none identifying determinants for online identity theft victimization with Routine Activity Theory
International Journal of Offender Therapy and Comparative Criminology, 2016Co-Authors: Bradford W Reyns, Billy HensonAbstract:Available evidence suggests that identity theft is a growing problem that has significant consequences for victims, not the least of which is billions of dollars in financial losses. However, very little is known about the correlates or causes of identity theft victimization. Utilizing a nationally representative sample of individuals from the Canadian General Social Survey, the current study attempts to address this deficiency by examining the link between victims’ online Routine activities and their online identity theft victimization. It was found that certain Routine activities directly influence the likelihood of experiencing identity theft. Potential research and policy implications also are discussed.
-
guardians of the cyber galaxy an empirical and theoretical analysis of the guardianship concept from Routine Activity Theory as it applies to online forms of victimization
Journal of Contemporary Criminal Justice, 2016Co-Authors: Bradford W Reyns, Billy Henson, Bonnie S FisherAbstract:The present study examines the guardianship concept from Routine Activity Theory with respect to its utility in reducing the risk for cyberstalking victimization. Offline guardianship is examined as a possible protective factor against online victimization, along with individuals’ online Routine activities. Data were collected from a large sample of students from an urban university in the Midwest through a self-report web-based victimization survey. Results suggest that offline guardianship does not protect individuals from cyberstalking victimization and that online target hardening may yield greater prevention benefits. Study findings are discussed in light of the current state of the body of online Routine Activity research, particularly regarding how to define and operationalize guardians and guardianship against online victimization.
-
from wwii to the world wide web a research note on social changes online places and a new online Activity ratio for Routine Activity Theory
Journal of Contemporary Criminal Justice, 2016Co-Authors: Patrick Q Brady, Ryan Randa, Bradford W ReynsAbstract:From online banking to social networking sites, the advent of the Internet has revolutionized the manner in which society carries out their online Routine activities. Although the Internet continues to be an invaluable resource, it also provides a unique medium for offenders to engage in crime and delinquency. Although criminologists have begun to explore the application of traditional theories into virtual environments, less is known about trends in the application and growth of cybercrime at the macro-level. Expanding on the core elements of Cohen and Felson’s seminal work, we hypothesize that increases in rates of cybercrime are the result of technological social changes occurring post-commercialization of the Internet. A variety of data are presented to substantiate our hypothesis, along with a discussion of an online household Activity ratio that holds promise in explaining trends in financial cybercrime victimization.
-
online Routines and identity theft victimization further expanding Routine Activity Theory beyond direct contact offenses
Journal of Research in Crime and Delinquency, 2013Co-Authors: Bradford W ReynsAbstract:Objectives: The purpose of the current study was to extend recent work aimed at applying Routine Activity Theory to crimes in which the victim and offender never come into physical proximity. To that end, relationships between individuals' online Routines and identity theft victimization were examined. Method: Data from a subsample of 5,985 respondents from the 2008 to 2009 British Crime Survey were analyzed. Utilizing binary logistic regression, the relationships between individuals' online Routine activities (e.g., banking, shopping, downloading), individual characteristics (e.g., gender, age, employment), and perceived risk of victimization on identity theft victimization were assessed. Results: The results suggest that individuals who use the Internet for banking and/or e-mailing/instant messaging are about 50 percent more likely to be victims of identity theft than others. Similarly, online shopping and downloading behaviors increased victimization risk by about 30 percent. Males, older persons, and ...
-
gender adolescent lifestyles and violent victimization implications for Routine Activity Theory
Victims & Offenders, 2010Co-Authors: Billy Henson, Pamela Wilcox, Bradford W Reyns, Francis T CullenAbstract:Using data from 541 high school students, we examine the associations between structured and unstructured Routine activities and adolescent violent victimization in light of gender's influence. In particular, we focused on whether such Activity-victimization relationships explained any effect of gender or, in contrast, were perhaps contingent upon gender. The results showed that gender's effect on both minor and serious victimization was substantially mediated by one measured lifestyle, in particular the delinquent lifestyle. In addition, there was only modest evidence of gender moderating the effects of certain lifestyles on victimization; the effects of most activities were consistent across male and female subjects. Implications of our findings for a contemporary age-graded and gendered Routine Activity Theory are discussed.
Zuzana Podana - One of the best experts on this subject based on the ideXlab platform.
-
violent victimization of youth from a cross national perspective an analysis inspired by Routine Activity Theory
International Review of Victimology, 2017Co-Authors: Zuzana PodanaAbstract:The article analyses cross-national variation in violent victimization of youth using data from the second sweep of the International Self-Report Delinquency Study. A multi-level approach is applie...
Alan Roder - One of the best experts on this subject based on the ideXlab platform.
-
NCS - Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach.
Advances in Intelligent Systems and Computing, 2019Co-Authors: Alan Roder, Kimkwang Raymond ChooAbstract:With the evolution of technology in today’s modern society comes the global success of unmanned aerial vehicles (UAVs; also known as drones). There are, however, opportunities for UAVs to be abused in criminal or nefarious activities. The aim of this paper is to outline the opportunities for UAVs to be used in criminal activities, and explore the potential countermeasures and their effectiveness. This paper will seek to apply Routine Activity Theory to reduce the opportunities for UAV related crime and theorise strategies to increase accountability. Finally, this paper will attempt to forecast the threat of a criminal act within 2019.
-
unmanned aerial vehicles uavs threat analysis and a Routine Activity Theory based mitigation approach
National Cyber Summit, 2019Co-Authors: Alan Roder, Kimkwang Raymond ChooAbstract:With the evolution of technology in today’s modern society comes the global success of unmanned aerial vehicles (UAVs; also known as drones). There are, however, opportunities for UAVs to be abused in criminal or nefarious activities. The aim of this paper is to outline the opportunities for UAVs to be used in criminal activities, and explore the potential countermeasures and their effectiveness. This paper will seek to apply Routine Activity Theory to reduce the opportunities for UAV related crime and theorise strategies to increase accountability. Finally, this paper will attempt to forecast the threat of a criminal act within 2019.
Elizabeth Ehrhardt Mustaine - One of the best experts on this subject based on the ideXlab platform.
-
College Students' Lifestyles and Self-Protective Behaviors: Further Considerations of the Guardianship Concept in Routine Activity Theory
Criminal Justice and Behavior, 2020Co-Authors: Richard Tewksbury, Elizabeth Ehrhardt MustaineAbstract:Routine Activity Theory has traditionally emphasized identifying victimization risks and suitable targets for crime. Assessments of the role of guardianship in criminal events are less emphasized. Explorations of who uses guardianship to attempt to reduce their chances for victimization have been developed only minimally, typically relying on demographics. This research goes further in assessing who uses self-protective strategies, considering lifestyles related to proximity to motivated offenders, the suitability of individuals as targets, and how these characteristics influence the use of self-protective devices. Results show the most influential lifestyle characteristics and behaviors on use of self-protective measures are exposure to potential offenders and neighborhood characteristics. Fear of crime, substance use, and individual demographics show only small relationships to guardianship.
-
lifestyle factors associated with the sexual assault of men a Routine Activity Theory analysis
The Journal of Men's Studies, 2001Co-Authors: Richard Tewksbury, Elizabeth Ehrhardt MustaineAbstract:This paper explores the role of lifestyle and Routine activities in the sexual assault of adult men. Little is known about the individual factors that are associated with the likelihood of male vic...
-
comparing the lifestyles of victims offenders and victim offenders a Routine Activity Theory assessment of similarities and differences for criminal incident participants
Sociological focus, 2000Co-Authors: Elizabeth Ehrhardt Mustaine, Richard TewksburyAbstract:Abstract Drawing on Routine Activity Theory, this paper examines a sample of college students involved in criminal assault to assess whether victims, offenders, and those who are both victims and offenders show similarities on demographic, social Activity, neighborhood, exposure, illegal activities, and alcohol and drug use variables. This research tests previous claims that criminal victims and offenders have numerous shared characteristics and behaviors. For all three groups a wide range of sophisticated measures of lifestyle are used to predict the likelihood of involvement in criminal incidents of assault. Victimization risks are primarily explained by indicators of individuals' exposure to offenders. Likelihood of offending is most usefully explained by demographics and participation in other illegal behaviors. Being both a victim and offender of assault is explained by a more complex set of indicators, encompassing a wide range of factors. Based on these results it appears that, for the crime of ass...
-
Routine activities and vandalism a theoretical and empirical study
Journal of Criminal Justice, 2000Co-Authors: Richard Tewksbury, Elizabeth Ehrhardt MustaineAbstract:ABSTRACT Using Routine Activity Theory this paper examines vandalism victimization rates among a sample of 1,513 American college students at nine institutions. Relying on a sophisticated set of measures of community structures, conditions, victims’ alcohol, drug and other illegal activities, lifestyle activities, and security precautions, there is strong support found for the Theory. Significant predictors of vandalism victimization risks include measures of target suitability, exposure to potential offenders, victim's offending behaviors, and measures of community structure, organization and cohesion.
-
a Routine Activity Theory explanation for women s stalking victimizations
Violence Against Women, 1999Co-Authors: Elizabeth Ehrhardt Mustaine, Richard TewksburyAbstract:Drawing on surveys administered to 861 university women in nine institutions, this article presents a Routine Activity Theory model for predicting stalking victimization likelihood for women. Using Routine Activity Theory, the model highlights lifestyle behaviors and interactions as predictors of stalking victimization. Whereas Routine Activity Theory often highlights the role of demographics and statuses as predictors, this analysis emphasizes the role of women's social interactions and substance use in victimization risk. Significant predictors of victimization likelihood include substance use variables, activities in public settings, and residence off campus.