• Title/Summary/Keyword: routine activity theory

Search Result 7, Processing Time 0.012 seconds

A Lifestyle-Routine Activity Theory (LRAT) Approach to Cybercrime Victimization: An Empirical Assessment of SNS Lifestyle Exposure Activities

  • Jihae Suh;Jiseon Choe;Jinsoo Park
    • Asia pacific journal of information systems
    • /
    • v.30 no.1
    • /
    • pp.53-71
    • /
    • 2020
  • The Internet and all of its possibilities and applications have changed individuals' lifestyles in relation to socializing, working, and how they spend their leisure time. Social networking sites (SNSs), such as Facebook or Instagram, are ideal settings for interacting with others but, unfortunately, they are also ideal settings for motivated offenders to commit cybercrimes. Thus SNS users may be more vulnerable to cybercrime. The purpose of this study is to investigate the occurrence of cybercrime victimization, specifically cyber-harassment, cyber-impersonation, and hacking. Self-report surveys collected from a sample of 147 respondents were examined using the moderated multiple regression analysis and a logistic regression analysis to determine possible relationships between SNS lifestyle exposure activities and cybercrime victimization. The results indicate moderate support for the application of lifestyle-routine activity theory (LRAT) to cybercrime victimization. Possible educational and managerial implications, as well as suggestions for future research, are discussed.

Are Online and Offline Delinquency Mutually Exclusive? Blurred Boundaries between Cyber Space and the Real-World

  • Ko, Nayoung;Hong, Myeonggi;Hwang, Jeeseon;Chang, Jeonghyeon;Hwang, EuiGab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.3048-3067
    • /
    • 2021
  • This study examines the similarities and differences between the causes of juvenile delinquency in online and offline environments and in personal characteristics. The study utilizes data from the '2014 Survey on Juvenile Victimization in Korea'. The population of this survey is students attending middle and high schools across the country. While this paper is based on the Self-Control theory, opportunity factors based on the Routine Activity theory and the Situational Action theory are also applied. Results show that the causes of offline delinquency are low self-control, routine activity and frequent gaming and SNS use. The causes of online delinquency are high self-control, existence of communication with unknown persons and the spectrum of personal information online. The common element of offline and online delinquency was the presence of delinquent peers. These results show that while online and offline delinquency cannot be explained with the same methodology, at the same time they are not mutually exclusive.

An Analysis of Online Black Market: Using Data Mining and Social Network Analysis (온라인 해킹 불법 시장 분석: 데이터 마이닝과 소셜 네트워크 분석 활용)

  • Kim, Minsu;Kim, Hee-Woong
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.221-242
    • /
    • 2020
  • Purpose This study collects data of the recently activated online black market and analyzes it to present a specific method for preparing for a hacking attack. This study aims to make safe from the cyber attacks, including hacking, from the perspective of individuals and businesses by closely analyzing hacking methods and tools in a situation where they are easily shared. Design/methodology/approach To prepare for the hacking attack through the online black market, this study uses the routine activity theory to identify the opportunity factors of the hacking attack. Based on this, text mining and social network techniques are applied to reveal the most dangerous areas of security. It finds out suitable targets in routine activity theory through text mining techniques and motivated offenders through social network analysis. Lastly, the absence of guardians and the parts required by guardians are extracted using both analysis techniques simultaneously. Findings As a result of text mining, there was a large supply of hacking gift cards, and the demand to attack sites such as Amazon and Netflix was very high. In addition, interest in accounts and combos was in high demand and supply. As a result of social network analysis, users who actively share hacking information and tools can be identified. When these two analyzes were synthesized, it was found that specialized managers are required in the areas of proxy, maker and many managers are required for the buyer network, and skilled managers are required for the seller network.

A Study on the Development of Integrated Chaos Analysis System for EEG (뇌파신호의 카오스 특징 추출을 위한 통합 시스템의 개발)

  • Woo, Yong-Ho;Kim, Hyun-Sool;Kim, Taek-Soo;Choi, Yoon-Ho;Park, Sang-Hui
    • Proceedings of the KIEE Conference
    • /
    • 1995.07b
    • /
    • pp.962-964
    • /
    • 1995
  • In this paper, an integrated chaos analysis system for EEG (ICASE) is designed for the analysis of brain functions based on the chaos theory. Nonlinear dynamic characteristics of EEG such as 3-D attractor, Poincare section, correlation dimension, Lyapunov exponents and power spectrum are extracted by this system. The results show that chaotic attractors which indicate the presence of deterministic, dynamics of complex nature could be identified from a routine EEG recording for normal and pathological activity. This proves that the chaotic analysis of EEG may be an appropriate tool in the classification of brain activity and thus a possible diagnostic tool.

  • PDF

A Factor having Influence on Housebreaking Victimization (주거침입 피해에 영향을 미치는 요인)

  • Lee, Yoo-Na;Jeong, Dae-Gwan
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.137-161
    • /
    • 2014
  • The aim of this study was to investigate the factors influencing on housebreaking victimization in South Korea. It is important that a resident, police officer, and policy makers use Routine activities/lifestyle theory in order to explore whether proximity and exposure to offenders or presence of guardianships affect the resident's risk of being victimized. In this context, the current study utilizes proximity variables: disorder of residence, exposure variables: hours of empty house and guardianship variables: social networks, security equipment. The study employs secondary data(Korean Crime Victim Survey in 2008) responses from a sample of 4, 710 resident. and Logistic regression analysis was used to examine whether the likelihoods of housebreaking victimization was associated with the measures of proximity and exposure and the lack of guardianship. The result of the study showed that proximity(disorder of residence) and guardianship (security equipment) are statistically significant predictors that is associated with an enhanced risk of school violence victimization while controlling for other variables. Further policy implications of the study will be discussed.

  • PDF

Juvenile Cyber Deviance Factors and Predictive Model Development Using a Mixed Method Approach (사이버비행 요인 파악 및 예측모델 개발: 혼합방법론 접근)

  • Shon, Sae Ah;Shin, Woo Sik;Kim, Hee Woong
    • The Journal of Information Systems
    • /
    • v.30 no.2
    • /
    • pp.29-56
    • /
    • 2021
  • Purpose Cyber deviance of adolescents has become a serious social problem. With a widespread use of smartphones, incidents of cyber deviance have increased in Korea and both quantitative and qualitative damages such as suicide and depression are increasing. Research has been conducted to understand diverse factors that explain adolescents' delinquency in cyber space. However, most previous studies have focused on a single theory or perspective. Therefore, this study aims to comprehensively analyze motivations of juvenile cyber deviance and to develop a predictive model for delinquent adolescents by integrating four different theories on cyber deviance. Design/methodology/approach By using data from Korean Children & Youth Panel Survey 2010, this study extracts 27 potential factors for cyber deivance based on four background theories including general strain, social learning, social bonding, and routine activity theories. Then this study employs econometric analysis to empirically assess the impact of potential factors and utilizes a machine learning approach to predict the likelihood of cyber deviance by adolescents. Findings This study found that general strain factors as well as social learning factors have positive effects on cyber deviance. Routine activity-related factors such as real-life delinquent behaviors and online activities also positively influence the likelihood of cyber diviance. On the other hand, social bonding factors such as community commitment and attachment to community lessen the likelihood of cyber deviance while social factors related to school activities are found to have positive impacts on cyber deviance. This study also found a predictive model using a deep learning algorithm indicates the highest prediction performance. This study contributes to the prevention of cyber deviance of teenagers in practice by understanding motivations for adolescents' delinquency and predicting potential cyber deviants.

Behavioral Theory-Based Risk Node Judgment Algorithm for Evaluating the Crime Risk Level in Restrooms (화장실의 범죄위험도 평가를 위한 행동이론 기반 리스크 노드 판정 알고리즘)

  • Shin-Sook Yoon;Jeong-Hwa Song
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1197-1206
    • /
    • 2023
  • To assess the risk level of a public restroom implemented in virtual reality, we sought to evaluate the spatial elements present in the restroom. To provide the theoretical foundation for the evaluation subjects and criteria, we introduced prior research that proposed a checklist to entance the safety of public restroom. To set up evaluation criteria, we analyzed and established based on the theories of Paul J. Brantingham and Patricia L. Brantingham, focusing on the interaction between space and criminals. Ronald V. Clarke's "Routine Activity Theory" was also introduced and incorporated into the evaluation approach. We analyzed based on the correlation between the criminal, user, and spatial elements of the public restroom in terms of the criminal's actions, the spatial relevance to crime, and user exposure during use. Using these criteria, we developed an algorithm to evaluate th spatial elements of public restroom. Based on this, we created an application, demonstrating the feasibility of developing on evaluation tool.