Routine Activity Theory

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 2094 Experts worldwide ranked by ideXlab platform

Kimkwang Raymond Choo - One of the best experts on this subject based on the ideXlab platform.

  • NCS - Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach.
    Advances in Intelligent Systems and Computing, 2019
    Co-Authors: Alan Roder, Kimkwang Raymond Choo
    Abstract:

    With the evolution of technology in today’s modern society comes the global success of unmanned aerial vehicles (UAVs; also known as drones). There are, however, opportunities for UAVs to be abused in criminal or nefarious activities. The aim of this paper is to outline the opportunities for UAVs to be used in criminal activities, and explore the potential countermeasures and their effectiveness. This paper will seek to apply Routine Activity Theory to reduce the opportunities for UAV related crime and theorise strategies to increase accountability. Finally, this paper will attempt to forecast the threat of a criminal act within 2019.

  • unmanned aerial vehicles uavs threat analysis and a Routine Activity Theory based mitigation approach
    National Cyber Summit, 2019
    Co-Authors: Alan Roder, Kimkwang Raymond Choo
    Abstract:

    With the evolution of technology in today’s modern society comes the global success of unmanned aerial vehicles (UAVs; also known as drones). There are, however, opportunities for UAVs to be abused in criminal or nefarious activities. The aim of this paper is to outline the opportunities for UAVs to be used in criminal activities, and explore the potential countermeasures and their effectiveness. This paper will seek to apply Routine Activity Theory to reduce the opportunities for UAV related crime and theorise strategies to increase accountability. Finally, this paper will attempt to forecast the threat of a criminal act within 2019.

  • implications of emerging technologies to incident handling and digital forensic strategies a Routine Activity Theory
    Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
    Co-Authors: Kimkwang Raymond Choo, N Ab H Rahman, Gary C Kessler
    Abstract:

    Abstract A changing cyber threat landscape may impact incident handling and digital forensic practitioners in providing the best mitigation and response strategies. This study seeks to understand the challenges of emerging threats to incident handling and digital forensic by utilizing the Routine Activity Theory, which comprises three main factors—motivation, opportunities, and guardianship. Data were collected using an open-ended questionnaire completed by respondents from 20 organizations. Our findings suggest that the emerging technologies pose significant motivations and opportunities to cybercriminals, and thus, increase the challenges in incident handling and digital forensics to provide effective guardianship.

  • Are You Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps
    IEEE Transactions on Sustainable Computing, 1
    Co-Authors: Rushank Shetty, George Grispos, Kimkwang Raymond Choo
    Abstract:

    In today's age of instant gratification, dating apps provide the comfort of meeting new people at the swipe of a finger. However, recent high profile incidents have raised privacy-related concerns with the use of these apps. The level of harm inflicted on a victim can be either physical (e.g. murder, stalking, sexual assault) or non-physical (e.g. identity theft, harassment and cyberstalking). In this paper, we study ten popular Android dating apps. Using an adversary model, we demonstrate how one can trivially conduct a man-in-the-middle attack against these apps. We then explain how the Routine Activity Theory can be applied to design mitigation strategies for dating apps.

Bradford W Reyns - One of the best experts on this subject based on the ideXlab platform.

  • the thief with a thousand faces and the victim with none identifying determinants for online identity theft victimization with Routine Activity Theory
    International Journal of Offender Therapy and Comparative Criminology, 2016
    Co-Authors: Bradford W Reyns, Billy Henson
    Abstract:

    Available evidence suggests that identity theft is a growing problem that has significant consequences for victims, not the least of which is billions of dollars in financial losses. However, very little is known about the correlates or causes of identity theft victimization. Utilizing a nationally representative sample of individuals from the Canadian General Social Survey, the current study attempts to address this deficiency by examining the link between victims’ online Routine activities and their online identity theft victimization. It was found that certain Routine activities directly influence the likelihood of experiencing identity theft. Potential research and policy implications also are discussed.

  • guardians of the cyber galaxy an empirical and theoretical analysis of the guardianship concept from Routine Activity Theory as it applies to online forms of victimization
    Journal of Contemporary Criminal Justice, 2016
    Co-Authors: Bradford W Reyns, Billy Henson, Bonnie S Fisher
    Abstract:

    The present study examines the guardianship concept from Routine Activity Theory with respect to its utility in reducing the risk for cyberstalking victimization. Offline guardianship is examined as a possible protective factor against online victimization, along with individuals’ online Routine activities. Data were collected from a large sample of students from an urban university in the Midwest through a self-report web-based victimization survey. Results suggest that offline guardianship does not protect individuals from cyberstalking victimization and that online target hardening may yield greater prevention benefits. Study findings are discussed in light of the current state of the body of online Routine Activity research, particularly regarding how to define and operationalize guardians and guardianship against online victimization.

  • from wwii to the world wide web a research note on social changes online places and a new online Activity ratio for Routine Activity Theory
    Journal of Contemporary Criminal Justice, 2016
    Co-Authors: Patrick Q Brady, Ryan Randa, Bradford W Reyns
    Abstract:

    From online banking to social networking sites, the advent of the Internet has revolutionized the manner in which society carries out their online Routine activities. Although the Internet continues to be an invaluable resource, it also provides a unique medium for offenders to engage in crime and delinquency. Although criminologists have begun to explore the application of traditional theories into virtual environments, less is known about trends in the application and growth of cybercrime at the macro-level. Expanding on the core elements of Cohen and Felson’s seminal work, we hypothesize that increases in rates of cybercrime are the result of technological social changes occurring post-commercialization of the Internet. A variety of data are presented to substantiate our hypothesis, along with a discussion of an online household Activity ratio that holds promise in explaining trends in financial cybercrime victimization.

  • online Routines and identity theft victimization further expanding Routine Activity Theory beyond direct contact offenses
    Journal of Research in Crime and Delinquency, 2013
    Co-Authors: Bradford W Reyns
    Abstract:

    Objectives: The purpose of the current study was to extend recent work aimed at applying Routine Activity Theory to crimes in which the victim and offender never come into physical proximity. To that end, relationships between individuals' online Routines and identity theft victimization were examined. Method: Data from a subsample of 5,985 respondents from the 2008 to 2009 British Crime Survey were analyzed. Utilizing binary logistic regression, the relationships between individuals' online Routine activities (e.g., banking, shopping, downloading), individual characteristics (e.g., gender, age, employment), and perceived risk of victimization on identity theft victimization were assessed. Results: The results suggest that individuals who use the Internet for banking and/or e-mailing/instant messaging are about 50 percent more likely to be victims of identity theft than others. Similarly, online shopping and downloading behaviors increased victimization risk by about 30 percent. Males, older persons, and ...

  • gender adolescent lifestyles and violent victimization implications for Routine Activity Theory
    Victims & Offenders, 2010
    Co-Authors: Billy Henson, Pamela Wilcox, Bradford W Reyns, Francis T Cullen
    Abstract:

    Using data from 541 high school students, we examine the associations between structured and unstructured Routine activities and adolescent violent victimization in light of gender's influence. In particular, we focused on whether such Activity-victimization relationships explained any effect of gender or, in contrast, were perhaps contingent upon gender. The results showed that gender's effect on both minor and serious victimization was substantially mediated by one measured lifestyle, in particular the delinquent lifestyle. In addition, there was only modest evidence of gender moderating the effects of certain lifestyles on victimization; the effects of most activities were consistent across male and female subjects. Implications of our findings for a contemporary age-graded and gendered Routine Activity Theory are discussed.

Zuzana Podana - One of the best experts on this subject based on the ideXlab platform.

Alan Roder - One of the best experts on this subject based on the ideXlab platform.

  • NCS - Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach.
    Advances in Intelligent Systems and Computing, 2019
    Co-Authors: Alan Roder, Kimkwang Raymond Choo
    Abstract:

    With the evolution of technology in today’s modern society comes the global success of unmanned aerial vehicles (UAVs; also known as drones). There are, however, opportunities for UAVs to be abused in criminal or nefarious activities. The aim of this paper is to outline the opportunities for UAVs to be used in criminal activities, and explore the potential countermeasures and their effectiveness. This paper will seek to apply Routine Activity Theory to reduce the opportunities for UAV related crime and theorise strategies to increase accountability. Finally, this paper will attempt to forecast the threat of a criminal act within 2019.

  • unmanned aerial vehicles uavs threat analysis and a Routine Activity Theory based mitigation approach
    National Cyber Summit, 2019
    Co-Authors: Alan Roder, Kimkwang Raymond Choo
    Abstract:

    With the evolution of technology in today’s modern society comes the global success of unmanned aerial vehicles (UAVs; also known as drones). There are, however, opportunities for UAVs to be abused in criminal or nefarious activities. The aim of this paper is to outline the opportunities for UAVs to be used in criminal activities, and explore the potential countermeasures and their effectiveness. This paper will seek to apply Routine Activity Theory to reduce the opportunities for UAV related crime and theorise strategies to increase accountability. Finally, this paper will attempt to forecast the threat of a criminal act within 2019.

Elizabeth Ehrhardt Mustaine - One of the best experts on this subject based on the ideXlab platform.

  • College Students' Lifestyles and Self-Protective Behaviors: Further Considerations of the Guardianship Concept in Routine Activity Theory
    Criminal Justice and Behavior, 2020
    Co-Authors: Richard Tewksbury, Elizabeth Ehrhardt Mustaine
    Abstract:

    Routine Activity Theory has traditionally emphasized identifying victimization risks and suitable targets for crime. Assessments of the role of guardianship in criminal events are less emphasized. Explorations of who uses guardianship to attempt to reduce their chances for victimization have been developed only minimally, typically relying on demographics. This research goes further in assessing who uses self-protective strategies, considering lifestyles related to proximity to motivated offenders, the suitability of individuals as targets, and how these characteristics influence the use of self-protective devices. Results show the most influential lifestyle characteristics and behaviors on use of self-protective measures are exposure to potential offenders and neighborhood characteristics. Fear of crime, substance use, and individual demographics show only small relationships to guardianship.

  • lifestyle factors associated with the sexual assault of men a Routine Activity Theory analysis
    The Journal of Men's Studies, 2001
    Co-Authors: Richard Tewksbury, Elizabeth Ehrhardt Mustaine
    Abstract:

    This paper explores the role of lifestyle and Routine activities in the sexual assault of adult men. Little is known about the individual factors that are associated with the likelihood of male vic...

  • comparing the lifestyles of victims offenders and victim offenders a Routine Activity Theory assessment of similarities and differences for criminal incident participants
    Sociological focus, 2000
    Co-Authors: Elizabeth Ehrhardt Mustaine, Richard Tewksbury
    Abstract:

    Abstract Drawing on Routine Activity Theory, this paper examines a sample of college students involved in criminal assault to assess whether victims, offenders, and those who are both victims and offenders show similarities on demographic, social Activity, neighborhood, exposure, illegal activities, and alcohol and drug use variables. This research tests previous claims that criminal victims and offenders have numerous shared characteristics and behaviors. For all three groups a wide range of sophisticated measures of lifestyle are used to predict the likelihood of involvement in criminal incidents of assault. Victimization risks are primarily explained by indicators of individuals' exposure to offenders. Likelihood of offending is most usefully explained by demographics and participation in other illegal behaviors. Being both a victim and offender of assault is explained by a more complex set of indicators, encompassing a wide range of factors. Based on these results it appears that, for the crime of ass...

  • Routine activities and vandalism a theoretical and empirical study
    Journal of Criminal Justice, 2000
    Co-Authors: Richard Tewksbury, Elizabeth Ehrhardt Mustaine
    Abstract:

    ABSTRACT Using Routine Activity Theory this paper examines vandalism victimization rates among a sample of 1,513 American college students at nine institutions. Relying on a sophisticated set of measures of community structures, conditions, victims’ alcohol, drug and other illegal activities, lifestyle activities, and security precautions, there is strong support found for the Theory. Significant predictors of vandalism victimization risks include measures of target suitability, exposure to potential offenders, victim's offending behaviors, and measures of community structure, organization and cohesion.

  • a Routine Activity Theory explanation for women s stalking victimizations
    Violence Against Women, 1999
    Co-Authors: Elizabeth Ehrhardt Mustaine, Richard Tewksbury
    Abstract:

    Drawing on surveys administered to 861 university women in nine institutions, this article presents a Routine Activity Theory model for predicting stalking victimization likelihood for women. Using Routine Activity Theory, the model highlights lifestyle behaviors and interactions as predictors of stalking victimization. Whereas Routine Activity Theory often highlights the role of demographics and statuses as predictors, this analysis emphasizes the role of women's social interactions and substance use in victimization risk. Significant predictors of victimization likelihood include substance use variables, activities in public settings, and residence off campus.