Downloads provided by UsageCounts
doi: 10.5281/zenodo.22239
handle: 20.500.12328/1574
{"references": ["Agustina, J. R. (2009). Arquitectura digital de Internet como factor crimin\u00f3geno: Estrategias de prevenci\u00f3n frente a la delincuencia virtual. International E-Journal of Criminal Sciences, num. 3 (2009).", "Agustina, J. R. (2012). Analyzing Sexting from a Criminological Perspective. Beyond Child Pornography Issues: Sexting as a Threshold for Victimization. In Pauline C. Reich (Eds.), Cybercrime & Security, West, Thomson Reuters, Section 4:4, 64-96.", "Agustina, J. R. (2013). \u00bfC\u00f3mo prevenir conductas abusivas y delitos tecnol\u00f3gicos en la empresa? Estudio interdisciplinar sobre pol\u00edticas de uso de las TIC, prevenci\u00f3n y gesti\u00f3n de \u201cconflictos\u201d en una muestra de empresas espa\u00f1olas. IDP. Revista de Internet, Derecho y Pol\u00edtica (in press).", "Ant\u00f3n Oneca, J. (1958). Term \u201cEstafa\u201d in Nueva Enciclopedia jur\u00eddica, Calos-E. Mascare\u00f1as (dir.), Tomo IX, Barcelona, Editorial Francisco Seix.", "Bossler, A. M. & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38, 227\u2013236.", "Brantingham P. & Brantingham P. (1995). Criminality of place: Crime generators and crime attractors. European Journal on Criminal Policy and Research, 3(3), 5\u201326.", "Cano Pa\u00f1os, M. A. (2013). El caso \u201cMohammed Merah\u201d en el contexto actual del terrorismo islamista. Revista Electr\u00f3nica de Ciencia Penal y Criminolog\u00eda RECPC 15-02 (2013).", "Castells, M. (1997). La era de la informaci\u00f3n: Fin de milenio. Vol. 3. Madrid: Alianza.", "Chocl\u00e1n Montalvo, J. A. (2006). Infracciones patrimoniales en los procesos de transferencia de datos. In C.M. Romeo Casabona (coord.) El cibercrimen. Nuevos retos jur\u00eddico-penales, nuevas respuestas pol\u00edtico-criminales. Granada: Ed. Comares.", "Choi, K. (2008). Computer Crime, Victimization and Integrated Theory: An Empirical Assessment. International Journal of Cyber Criminology, 2(1), 308-333.", "Cohen, L. E., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44, 588-608.", "Cornish, D., & Clarke, R.V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley\u2019s critique of situational crime prevention. In: M. J. Smith and D. Cornish (eds.) Theory for Practice in Situational Crime Prevention (pp. 41\u201396), Vol. 16. Monsey, NY: Criminal Justice Press.", "D\u00edaz Cort\u00e9s, L.M. (2012). Aproximaci\u00f3n criminol\u00f3gica y pol\u00edtico criminal del contacto TICspreordenado a la actividad sexual con menores en el C\u00f3digo penal espa\u00f1ol-art. 183 bis CP. Revista De Derecho Penal y Criminolog\u00eda, 3rdPeriod, num. 8 (July 2012), 289-318.", "Eberstatd, M. y Layden, M.A., Witherspoon Institute (ed.) (2011).Los costes sociales de la pornograf\u00eda. Una exposici\u00f3n de hallazgos y recomendaciones, in La pornograf\u00eda y sus efectos sociales y crimin\u00f3genos. Una aproximaci\u00f3n multidisciplinar, J.R. Agustina (dir.), Social TrendsInstitute (ed.), Colecci\u00f3n Actualidad Criminol\u00f3gica y Penal, BdeF\u2013Edisofer.", "Ebert, \u201cVerbrechensbek\u00e4mpfungdurchOpferbestrafung?\u201d, Juristenzeitung (JZ) 1983, 633-643.", "Etzioni, A. (2012). Los l\u00edmites de la privacidad (trans. A. L\u00f3pez Lobo y J.R. Agustina). Montevideo, Uruguay: BdeF.", "Felson, M. (1994). Crime and Everyday Life (1st ed.). Thousand Oaks, CA: Pine Forge Press.", "Felson, M. (1997).Technology, Business and Crime. In Felson, M. & Clarke, R.V. (ed.), Business and Crime Prevention, Monsey, NT: Willow Tree Press, 81\u201396.", "Furnell, S. (2002).Cyber crime: Vandalizing the information society. London: Addison Wesley.", "Gordon, M. P., Loef, M. P., Lucyshyn, W., & Richardson, R. (2004). CSI/FBI computer crime and security survey. Los Angeles: Computer Security Institute.", "Gottfredson, M. R. & Hirschi, T. (1990). A General Theory of Crime. Stanford, CA: Stanford University Press.", "Grabosky, P. (2001). Virtual Criminality: Old Wine in New Bottles? Social & Legal Studies 10, 243\u20139.", "Grabosky, P., & Smith, R. (2001). Telecommunication fraud in the digital age: The convergence of technologies. In D. Wall (Ed.) Crime and the Internet (pp. 23-45). London: Routledge.", "Green, S.P. (2013). Mentir, hacer trampas y apropiarse de lo ajeno. Una teor\u00eda moral de los delitos de cuello blanco (trans. JR. Agustina, M. Amor\u00f3s e I. Ortiz de Urbina). Madrid: Marcial Pons.", "Herrero Moreno, M. (1996). La hora de la v\u00edctima. Compendio de Victimolog\u00eda. Publicaciones del Instituto de Criminolog\u00eda de la Universidad Complutense. Madrid: Edersa.", "Herrero Moreno, M. (2006). Victimizaci\u00f3n: aspectosgenerales. In E. Baca, E. Echebur\u00faa y J.M. Tamarit (coords.), Manual de Victimolog\u00eda, Valencia: Tirant lo Blanch, 79-128.", "Hindelang, M., Gottfredson, M. & Garofalo, J. (1978). Victims of Personal Crime: an Empirical Foundation for a Theory of Personal Victimization. Cambridge MA: Ballinger.", "Hurd, H. M. (2005). Blaming the Victim: A Response to the Proposal that Criminal Law Recognize a General Defense of Contributory Responsibility, 8 Buff. Crim. L. Rev. 504, 5.", "Jaishankar, K. (2008). Space transition theory of cyber crimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 283\u2212301). Upper Saddle River, NJ: Prentice Hall.", "Katyal, N.K. (2003). Digital Architecture as Crime Control, 111 Yale Law Journal 1039.", "Lenhart, A. (2009). Teens and Sexting. How and why minor teens are sending sexually suggestive nude or nearly nude images via text messaging. Pew Internet & American Life Project. Washington: Pew Research Center.", "Lessig, L. (1999). Code and Other Laws of Cyber space. NY: Basic Books.", "Marcum, C. D. (2011). Adolescent Online Victimization and Constructs of Routine Activities Theory. In Jaishankar, K (Ed.), Cyber Criminology: Exploring internet crimes and criminal behavior (pp. 253-276). Boca Raton: CRC Press.", "Mendelsohn, B. (1956). The Victimology. In Etudes Internationales de Psycho-Sociologie Criminelle 1 (1956).", "Mir\u00f3 Llinares, F. (2011). La oportunidad criminal en el ciberespacio. Aplicaci\u00f3n y desarrollo de la teor\u00eda de las actividades cotidianas para la prevenci\u00f3n del cibercrimen. Revista Electr\u00f3nica de Ciencia Penal y Criminolog\u00eda, num. 13-07.", "Mir\u00f3 Llinares, F. (2012). El cibercrimen. Fenomenolog\u00eda y criminolog\u00eda de la delincuencia en el ciberespacio, Madrid, Marcial Pons.", "Mir\u00f3 Llinares, F. (2013). La respuesta penal al ciberfraude. Especial atenci\u00f3n a la responsabilidad de los muleros del phishing. Revista Electr\u00f3nica de Ciencia Penal y Criminolog\u00eda (in press).", "Ngo, F. & Paternoster, R. (2011). Cyber crime Victimization: An Examination of Individual and Situational level factors. International Journal of Cyber Criminology, 5(1), 773-793.", "Nieto Mart\u00edn, A. & Maroto Calatayud, M. (2013). Las redes sociales en Internet como instrumento de control penal: tendencias y l\u00edmites. In A. Rallo Lombarte y R. Mart\u00ednez Mart\u00ednez (eds.), Derecho y redes sociales (2\u00aa ed.). Pamplona: Civitas, 427-484.", "Ogburn, W. F. (1964). On Culture and Social Change: Selected Papers (Ed. Otis Dudley Duncan). Chicago: University of Chicago Press.", "Palfrey, J. & Gasser, U. (2008). Born Digital: Understanding the First Generation of Digital Natives. New York: Basic Books.", "Pereda, N., Abad, J. & Guilera, G. (in press). Victimizaci\u00f3n de menores a trav\u00e9s de internet: descripci\u00f3n y caracter\u00edsticas de las v\u00edctimas de online grooming, in Delito, Pena, Pol\u00edtica Criminal y Tecnolog\u00edas de la Informaci\u00f3n y la Comunicaci\u00f3n en las modernas Ciencias Penales. Ediciones Universidad de Salamanca, Salamanca.", "Puppe, I. (1995). In Neumann/Schild (Gesamtred.), Nomos Kommentarzum Strafgesetzbuch, Band 2, BesondererTeil, Baden-Baden num. marg. 4, cited in Silva S\u00e1nchez (1999) op. cit.", "Quayle, E., Jonsson, L., & L\u00f6\u00f6f, L. (2012). Online behaviour related to child sexual abuse: Interviews with affected young people. Council of the Baltic Sea States, Stockholm: ROBERT project.", "Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety, 12, 99-118.", "Reyns, B. W., Henson, B., & Fisher, B. S. (2011a). Being pursued online: applying cyberlifestyle-routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38, 1149\u20131169.", "Reyns, B. W., Burek, M. W., Henson, B., & Fisher, B. S. (2011b). The unintended consequences of digital technology: exploring the relationship between sexting and cyber-victimisation. Journal of Crime and Justice, 1\u201317.", "Schafer, S. (1977). Victimology: The Victim and His Criminal. Reston, Va: Reston Pub. Co.", "Silva S\u00e1nchez, J.M. (1989) Consideraciones victimol\u00f3gicas en la teor\u00eda jur\u00eddica del delito? Introducci\u00f3n al debate sobre la victimodogm\u00e1tica, in Criminolog\u00eda y derecho penal al servicio de la persona: libro homenaje al profesor Antonio Beristain, (coord. by Enrique Echebur\u00faa Odriozola, Jos\u00e9 Luis de la Cuesta Arzamendi, I\u00f1aki Dendaluce Segurola), 633-646.", "Standler, B.R. (2002). Computer crime. Retrieved on 12th October 2014 from http://www.rbs2.com/ccrime.htm.", "Tapscott, D. (2008). Grown Up Digital: How the Net Generation is Changing Your World. McGraw-Hill.", "Tonry, M., Farrington, D. P. (1995). Strategic Approaches to Crime Prevention. 19 Crime & Justice 1.", "Valkenburg, P. M & Peter, J. (2011). Online communication among adolescents: An integrated model on its attraction, opportunities, and risks. Journal of Adolescent Health, 48, 121-127.", "Villacampa Estiarte, C. (2010). La respuesta jur\u00eddico-penal frente al stalking en Espa\u00f1a: presente y futuro. ReCRIM: Revista de l'InstitutUniversitarid'Investigaci\u00f3 en Criminologia i Ci\u00e8nciesPenals de la UV, 4, 33-57.", "Wokstr\u00f6m, P.-O. (2006). Individuals, settings, and acts of crime: situational mechanisms and the explanation of crime. In P.-O. H. Wikstr\u00f6m y R.J. Sampson, The Explanation of Crime. Cambridge: Cambridge University Press.", "Wolak, J., Finkelhor, D., & Mitchell, K.J. (2004). Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study. Journal of Adolescent Health, 35, 424.e11\u2013 424.e20.", "Wolak, J., Finkelhor, D., Mitchell, K. J. & Ybarra, M. L. (2008), 'Online \u201cpredators\u201d and their victims'. American Psychologist, 63(7) 111-126.", "Wortley, R. & Smallbone, S. (2012). Internet Child Pornography: Causes, Investigation, and Prevention. Praeger: California, Colorado, England.", "Yar, M. (2005). The novelty of \u2018cyber crime\u2019: An assessment in light of routine activity theory. European Journal of Criminology, 2, 407-427."]}
Abstract Researchers in the fields of sociology, psychology, behavioural sciences and law are trying to comprehend the radical rise of a new relational paradigm derived from the current proliferation of ICT. Crime dynamics and victimisation are not alien to the set of changes wrought by the digital era. The way in which victims behave in cyber space decisively elevates their risk of victimization. In connexion with this, the design of digital architectures notably increases criminal opportunities and facilitates cyber victimisation i.e. the defining traits of cyber space affect people’s daily lives and incline them to adopt riskier lifestyles. Based on Routine Activity Theory and Lifestyle Theory, along with the interesting work of Suler (2004), the present article shows the importance of victimological perspective in explaining cyber criminal events and designing prevention strategies. Stemming from literature review, this analysis will focus on describing a set of psychological and sociological traits that comprise the profile of victims and explaining how the surroundings influence one’s thoughts, desires, and actions.
Delictes informàtics, Delitos informáticos, Victims, Tecnologia de la informació, Criminología, Information technology, Criminology, Criminologia, Tecnologías de la información y de la comunicación, 343, Computer crimes, Víctimas, Cyber Victimization, Digital Architecture, Disinhibition Effect., Víctimes
Delictes informàtics, Delitos informáticos, Victims, Tecnologia de la informació, Criminología, Information technology, Criminology, Criminologia, Tecnologías de la información y de la comunicación, 343, Computer crimes, Víctimas, Cyber Victimization, Digital Architecture, Disinhibition Effect., Víctimes
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 7 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 86 | |
| downloads | 46 |

Views provided by UsageCounts
Downloads provided by UsageCounts