Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/10609/137127
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Herrero Olaizola, Juan | - |
dc.contributor.author | Torres, Andrea | - |
dc.contributor.author | Vivas i Elias, Pep | - |
dc.contributor.author | Hidalgo, Antonio | - |
dc.contributor.author | Rodriguez, Francisco J. | - |
dc.contributor.author | Urueña, Alberto | - |
dc.contributor.other | Universitat Oberta de Catalunya (UOC) | - |
dc.contributor.other | Universidad de Oviedo | - |
dc.contributor.other | Universidad Politécnica de Madrid | - |
dc.date.accessioned | 2022-01-07T11:52:13Z | - |
dc.date.available | 2022-01-07T11:52:13Z | - |
dc.date.issued | 2021-04-01 | - |
dc.identifier.citation | Herrero, J., Torres, A., Vivas, P., Hidalgo, A., Rodríguez, F. J., & Urueña, A. (2021). Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User's Dual Vulnerability Model of Cybercrime Victimization. International Journal of Environmental Research and Public Health, 18(7), 3763. doi:10.3390/ijerph18073763 | - |
dc.identifier.issn | 1660-4601MIAR | - |
dc.identifier.uri | http://hdl.handle.net/10609/137127 | - |
dc.description.abstract | (1) Background: This paper combines lifestyle-routine activities (L-RAT) and self-control (SCT) theories along with the literature on smartphone addiction in a joint model that addresses the multiple vulnerabilities that make the smartphone user a potential victim of cybercrime. This model, which we call the dual vulnerability model of cybercrime victimization, was subjected to empirical testing on a nationally representative sample of smartphone users. (2) Methods: Data from 2837 participants from a nationally representative sample of Spanish smartphone users were modeled using Mplus causal modeling software. (3) Results: The results of the study confirm the predictions of L-RAT and SCT in explaining cybercrime victimization (higher cybercrime victimization under conditions of high exposure, proximity, and suitability, relative absence of capable guardian, and low self-control). A significant effect of smartphone addiction on cybercrime victimization was also observed above and beyond L-RAT and SCT predictors. (4) Conclusions: The potential victim of cybercrime presents a double vulnerability, on the one hand, those identified by criminological theories such as L-RAT and SCT, and on the other hand, those derived from the deregulated-addicted use of the Internet access device (smartphone in our work). | en |
dc.language.iso | eng | - |
dc.publisher | International Journal of Environmental Research and Public Health | - |
dc.rights.uri | http://creativecommons.org/licenses/by/3.0/es/ | - |
dc.subject | cybercrime victimization | en |
dc.subject | lifestyle-routine activities theory | en |
dc.subject | self-control theory | en |
dc.subject | smartphone addiction | en |
dc.subject | national sample | en |
dc.subject | dual vulnerabilities model of cybercrime victimization | en |
dc.title | Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User's Dual Vulnerability Model of Cybercrime Victimization | - |
dc.type | info:eu-repo/semantics/article | - |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | - |
dc.identifier.doi | 10.3390/ijerph18073763 | - |
dc.gir.id | AR/0000008873 | - |
Aparece en las colecciones: | Articles cientÍfics Articles |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories. The User's Dual Vulnerability Model of Cybercrime Victimization.pdf | 616,71 kB | Adobe PDF | Visualizar/Abrir |
Comparte:
Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons