Risk Factors in Computer-Crime Victimization
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
El Paso
LFB Scholarly Pub. LLC
2010
|
Schriftenreihe: | Criminal justice (LFB Scholarly Publishing LLC)
|
Schlagworte: | |
Online-Zugang: | DE-1046 DE-1047 Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043069916 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2010 xx o|||| 00||| eng d | ||
020 | |a 1593326467 |9 1-59332-646-7 | ||
020 | |a 9781593326463 |9 978-1-59332-646-3 | ||
035 | |a (OCoLC)818818815 | ||
035 | |a (DE-599)BVBBV043069916 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 364.16/8 | |
082 | 0 | |a 364.168 | |
100 | 1 | |a Choi, Kyung-Shick |e Verfasser |4 aut | |
245 | 1 | 0 | |a Risk Factors in Computer-Crime Victimization |
264 | 1 | |a El Paso |b LFB Scholarly Pub. LLC |c 2010 | |
300 | |a 1 Online-Ressource (175 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Criminal justice (LFB Scholarly Publishing LLC) | |
500 | |a ACKNOWLEDGMENTS; CHAPTER 1: Introduction and Overview of Computer Crime; Purpose and Scope; Computer Crime and Victimization; Criminological Foundations on Computer Crime Victimization; CHAPTER 2: Computer Crime Victimization andCriminological Perspectives; Routine Activities Theory and Nature of Cyberspace; Spatiality and Temporality in Cyberspace; Three Core Concepts: Routine Activities Theory; Motivated Offender: Computer Criminal; Suitable Target in Cyberspace; Capable Guardianship in Cyberspace; Target Suitability Revisited: Lifestyle-Exposure Theory | ||
500 | |a Potential Theoretical ExpansionCHAPTER 3: Methodological Approach: Digital Guardian, Online Life Style, and Computer Crime Victimization; Sample and Procedure; Research Hypotheses and Measures; Digital Guardian Measure; Online Lifestyle Measure; Computer-Crime Victimization Measure; Convergence of Two Latent Variables Measure; CHAPTER 4: SEM Assessment: Cyber-Routine ActivitiesTheoretical Model; Sample; Properties of Measures; Digital Guardian; CFA on Digital-Capable Guardianship; Online Lifestyle; CFA on Online Lifestyle; Computer-Crime Victimization; Measurement Model; Structural Model | ||
500 | |a Relationship Between Demographic Variables and RiskFactors of Computer Crime VictimizationDemographic Variables vs. Fear of Cybercrime; Demographic Variables vs. Main Factors in ComputerCrime Victimization; CHAPTER 5: Managing Computer Crime and Future Research; Policy Implications; Limitations and Directions for Future Research; Future Directions on Computer Crime Prevention Program; APPENDIX A: Presurvey Guideline; APPENDIX B: Computer Crime Victimization Survey; REFERENCES; INDEX. | ||
500 | |a Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer crimes | |
650 | 7 | |a TRUE CRIME / White Collar Crime |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 4 | |a Computer crimes | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 1-59332-401-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-59332-401-8 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028494108 | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525 |l DE-1046 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525 |l DE-1047 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1819295349686140930 |
---|---|
any_adam_object | |
author | Choi, Kyung-Shick |
author_facet | Choi, Kyung-Shick |
author_role | aut |
author_sort | Choi, Kyung-Shick |
author_variant | k s c ksc |
building | Verbundindex |
bvnumber | BV043069916 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)818818815 (DE-599)BVBBV043069916 |
dewey-full | 364.16/8 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 364.168 |
dewey-search | 364.16/8 364.168 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04061nam a2200481zc 4500</leader><controlfield tag="001">BV043069916</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2010 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593326467</subfield><subfield code="9">1-59332-646-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593326463</subfield><subfield code="9">978-1-59332-646-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)818818815</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043069916</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Choi, Kyung-Shick</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Risk Factors in Computer-Crime Victimization</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">El Paso</subfield><subfield code="b">LFB Scholarly Pub. LLC</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (175 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Criminal justice (LFB Scholarly Publishing LLC)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">ACKNOWLEDGMENTS; CHAPTER 1: Introduction and Overview of Computer Crime; Purpose and Scope; Computer Crime and Victimization; Criminological Foundations on Computer Crime Victimization; CHAPTER 2: Computer Crime Victimization andCriminological Perspectives; Routine Activities Theory and Nature of Cyberspace; Spatiality and Temporality in Cyberspace; Three Core Concepts: Routine Activities Theory; Motivated Offender: Computer Criminal; Suitable Target in Cyberspace; Capable Guardianship in Cyberspace; Target Suitability Revisited: Lifestyle-Exposure Theory</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Potential Theoretical ExpansionCHAPTER 3: Methodological Approach: Digital Guardian, Online Life Style, and Computer Crime Victimization; Sample and Procedure; Research Hypotheses and Measures; Digital Guardian Measure; Online Lifestyle Measure; Computer-Crime Victimization Measure; Convergence of Two Latent Variables Measure; CHAPTER 4: SEM Assessment: Cyber-Routine ActivitiesTheoretical Model; Sample; Properties of Measures; Digital Guardian; CFA on Digital-Capable Guardianship; Online Lifestyle; CFA on Online Lifestyle; Computer-Crime Victimization; Measurement Model; Structural Model</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Relationship Between Demographic Variables and RiskFactors of Computer Crime VictimizationDemographic Variables vs. Fear of Cybercrime; Demographic Variables vs. Main Factors in ComputerCrime Victimization; CHAPTER 5: Managing Computer Crime and Future Research; Policy Implications; Limitations and Directions for Future Research; Future Directions on Computer Crime Prevention Program; APPENDIX A: Presurvey Guideline; APPENDIX B: Computer Crime Victimization Survey; REFERENCES; INDEX.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">1-59332-401-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-59332-401-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028494108</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043069916 |
illustrated | Not Illustrated |
indexdate | 2024-12-24T04:40:48Z |
institution | BVB |
isbn | 1593326467 9781593326463 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028494108 |
oclc_num | 818818815 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (175 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | LFB Scholarly Pub. LLC |
record_format | marc |
series2 | Criminal justice (LFB Scholarly Publishing LLC) |
spelling | Choi, Kyung-Shick Verfasser aut Risk Factors in Computer-Crime Victimization El Paso LFB Scholarly Pub. LLC 2010 1 Online-Ressource (175 pages) txt rdacontent c rdamedia cr rdacarrier Criminal justice (LFB Scholarly Publishing LLC) ACKNOWLEDGMENTS; CHAPTER 1: Introduction and Overview of Computer Crime; Purpose and Scope; Computer Crime and Victimization; Criminological Foundations on Computer Crime Victimization; CHAPTER 2: Computer Crime Victimization andCriminological Perspectives; Routine Activities Theory and Nature of Cyberspace; Spatiality and Temporality in Cyberspace; Three Core Concepts: Routine Activities Theory; Motivated Offender: Computer Criminal; Suitable Target in Cyberspace; Capable Guardianship in Cyberspace; Target Suitability Revisited: Lifestyle-Exposure Theory Potential Theoretical ExpansionCHAPTER 3: Methodological Approach: Digital Guardian, Online Life Style, and Computer Crime Victimization; Sample and Procedure; Research Hypotheses and Measures; Digital Guardian Measure; Online Lifestyle Measure; Computer-Crime Victimization Measure; Convergence of Two Latent Variables Measure; CHAPTER 4: SEM Assessment: Cyber-Routine ActivitiesTheoretical Model; Sample; Properties of Measures; Digital Guardian; CFA on Digital-Capable Guardianship; Online Lifestyle; CFA on Online Lifestyle; Computer-Crime Victimization; Measurement Model; Structural Model Relationship Between Demographic Variables and RiskFactors of Computer Crime VictimizationDemographic Variables vs. Fear of Cybercrime; Demographic Variables vs. Main Factors in ComputerCrime Victimization; CHAPTER 5: Managing Computer Crime and Future Research; Policy Implications; Limitations and Directions for Future Research; Future Directions on Computer Crime Prevention Program; APPENDIX A: Presurvey Guideline; APPENDIX B: Computer Crime Victimization Survey; REFERENCES; INDEX. Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of Includes bibliographical references and index Computer crimes TRUE CRIME / White Collar Crime bisacsh Computer crimes fast Erscheint auch als Druck-Ausgabe, Hardcover 1-59332-401-4 Erscheint auch als Druck-Ausgabe, Hardcover 978-1-59332-401-8 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525 Aggregator Volltext |
spellingShingle | Choi, Kyung-Shick Risk Factors in Computer-Crime Victimization Computer crimes TRUE CRIME / White Collar Crime bisacsh Computer crimes fast |
title | Risk Factors in Computer-Crime Victimization |
title_auth | Risk Factors in Computer-Crime Victimization |
title_exact_search | Risk Factors in Computer-Crime Victimization |
title_full | Risk Factors in Computer-Crime Victimization |
title_fullStr | Risk Factors in Computer-Crime Victimization |
title_full_unstemmed | Risk Factors in Computer-Crime Victimization |
title_short | Risk Factors in Computer-Crime Victimization |
title_sort | risk factors in computer crime victimization |
topic | Computer crimes TRUE CRIME / White Collar Crime bisacsh Computer crimes fast |
topic_facet | Computer crimes TRUE CRIME / White Collar Crime |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525 |
work_keys_str_mv | AT choikyungshick riskfactorsincomputercrimevictimization |