Javascript must be enabled to continue!
A Systematic Literature Review of Routine Activity Theory’s Applicability in Cybercrimes
View through CrossRef
Cybercrimes are increasing at an alarming rate and cause detrimental effects to the victims. Routine Activity Theory (RAT) is commonly used to understand the factors influencing cybercrime victimization. However, there have been inconsistent findings on the applicability of RAT theory. This study performs a Systematic Literature Review analysis to consolidate and provide a coherent analysis of the related studies employing RAT theory for cybercrime victimization. The articles were also differentiated based on the cybercrimes topologies being investigated; (a) cybercrime dependent (hacking and malware) and (b) cybercrime enabled (phishing, fraud and identity theft). The findings suggest that a refined specification and operationalization of RAT’S construct tailoring to the types of cybercrimes can arguably yield more accurate application and interpretation of RAT Theory in cybercrimes. Consequently, this will address the inaccurate measurement issues of some of the RATS’s constructs, leading to inconclusive effects on cybercrime victimization. In addition, there is a need for more longitudinal studies to disentangle the effect of RAT’s construct during pre and post cybercrimes. Security advocates can apply the findings of this research to formulate relevant cybercrime awareness programs. The findings also shed some insights into which groups should be targeted for different cybercrime educational and awareness programs. This study can increase the awareness among citizens in terms of their online activities, their attributes and the types of protection from becoming cybercrime victims.
Title: A Systematic Literature Review of Routine Activity Theory’s Applicability in Cybercrimes
Description:
Cybercrimes are increasing at an alarming rate and cause detrimental effects to the victims.
Routine Activity Theory (RAT) is commonly used to understand the factors influencing cybercrime victimization.
However, there have been inconsistent findings on the applicability of RAT theory.
This study performs a Systematic Literature Review analysis to consolidate and provide a coherent analysis of the related studies employing RAT theory for cybercrime victimization.
The articles were also differentiated based on the cybercrimes topologies being investigated; (a) cybercrime dependent (hacking and malware) and (b) cybercrime enabled (phishing, fraud and identity theft).
The findings suggest that a refined specification and operationalization of RAT’S construct tailoring to the types of cybercrimes can arguably yield more accurate application and interpretation of RAT Theory in cybercrimes.
Consequently, this will address the inaccurate measurement issues of some of the RATS’s constructs, leading to inconclusive effects on cybercrime victimization.
In addition, there is a need for more longitudinal studies to disentangle the effect of RAT’s construct during pre and post cybercrimes.
Security advocates can apply the findings of this research to formulate relevant cybercrime awareness programs.
The findings also shed some insights into which groups should be targeted for different cybercrime educational and awareness programs.
This study can increase the awareness among citizens in terms of their online activities, their attributes and the types of protection from becoming cybercrime victims.
Related Results
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
This review summarizes the evidence from six randomized controlled trials that judged the effectiveness of systematic review summaries on policymakers' decision making, or the most...
Criminal Procedure for Computer Crimes
Criminal Procedure for Computer Crimes
Work on criminalistic procedures for computer crimes that must be undertaken for data protection. In the paper, cybercrimes are researched throughout history until today, the categ...
The Effect of Physical Activity on Children's Logical-Mathematical Intelligence
The Effect of Physical Activity on Children's Logical-Mathematical Intelligence
Research between physical activity and cognitive work in children is still relatively rare and inconsistent, even though children's motor development and cognitive learning are rel...
Giant Sacrococcygeal Teratoma in Infant: Systematic Review
Giant Sacrococcygeal Teratoma in Infant: Systematic Review
Abstract
Introduction
Sacrococcygeal teratoma (SCT) is a rare embryonal tumor that occurs in the sacrococcygeal region, with an incidence of about 1 in 35,000 to 40,000 live births...
Cybercrimes Act in Nigeria: Experimenting Compliance With Internationally Recognized Human Rights Provisions
Cybercrimes Act in Nigeria: Experimenting Compliance With Internationally Recognized Human Rights Provisions
The occurrence of criminal activities has increased owing to the advent of internet or computer technology. Access to internet has posed serious challenges to the existing legal re...
Cybercrimes in Islamic Jurisprudence and Afghan Penal Code
Cybercrimes in Islamic Jurisprudence and Afghan Penal Code
In light of the rapid developments in the field of technology and the spread of digital spaces, cybercrimes are one of the main challenges facing society in the current era. These ...

