Risk Factors in Computer-Crime Victimization

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Choi, Kyung-Shick (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: El Paso LFB Scholarly Pub. LLC 2010
Schriftenreihe:Criminal justice (LFB Scholarly Publishing LLC)
Schlagworte:
Online-Zugang:DE-1046
DE-1047
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV043069916
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151126s2010 xx o|||| 00||| eng d
020 |a 1593326467  |9 1-59332-646-7 
020 |a 9781593326463  |9 978-1-59332-646-3 
035 |a (OCoLC)818818815 
035 |a (DE-599)BVBBV043069916 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 364.16/8 
082 0 |a 364.168 
100 1 |a Choi, Kyung-Shick  |e Verfasser  |4 aut 
245 1 0 |a Risk Factors in Computer-Crime Victimization 
264 1 |a El Paso  |b LFB Scholarly Pub. LLC  |c 2010 
300 |a 1 Online-Ressource (175 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Criminal justice (LFB Scholarly Publishing LLC) 
500 |a ACKNOWLEDGMENTS; CHAPTER 1: Introduction and Overview of Computer Crime; Purpose and Scope; Computer Crime and Victimization; Criminological Foundations on Computer Crime Victimization; CHAPTER 2: Computer Crime Victimization andCriminological Perspectives; Routine Activities Theory and Nature of Cyberspace; Spatiality and Temporality in Cyberspace; Three Core Concepts: Routine Activities Theory; Motivated Offender: Computer Criminal; Suitable Target in Cyberspace; Capable Guardianship in Cyberspace; Target Suitability Revisited: Lifestyle-Exposure Theory 
500 |a Potential Theoretical ExpansionCHAPTER 3: Methodological Approach: Digital Guardian, Online Life Style, and Computer Crime Victimization; Sample and Procedure; Research Hypotheses and Measures; Digital Guardian Measure; Online Lifestyle Measure; Computer-Crime Victimization Measure; Convergence of Two Latent Variables Measure; CHAPTER 4: SEM Assessment: Cyber-Routine ActivitiesTheoretical Model; Sample; Properties of Measures; Digital Guardian; CFA on Digital-Capable Guardianship; Online Lifestyle; CFA on Online Lifestyle; Computer-Crime Victimization; Measurement Model; Structural Model 
500 |a Relationship Between Demographic Variables and RiskFactors of Computer Crime VictimizationDemographic Variables vs. Fear of Cybercrime; Demographic Variables vs. Main Factors in ComputerCrime Victimization; CHAPTER 5: Managing Computer Crime and Future Research; Policy Implications; Limitations and Directions for Future Research; Future Directions on Computer Crime Prevention Program; APPENDIX A: Presurvey Guideline; APPENDIX B: Computer Crime Victimization Survey; REFERENCES; INDEX. 
500 |a Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of 
500 |a Includes bibliographical references and index 
650 4 |a Computer crimes 
650 7 |a TRUE CRIME / White Collar Crime  |2 bisacsh 
650 7 |a Computer crimes  |2 fast 
650 4 |a Computer crimes 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe, Hardcover  |z 1-59332-401-4 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe, Hardcover  |z 978-1-59332-401-8 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028494108 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525  |l DE-1046  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525  |l DE-1047  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1819295349686140930
any_adam_object
author Choi, Kyung-Shick
author_facet Choi, Kyung-Shick
author_role aut
author_sort Choi, Kyung-Shick
author_variant k s c ksc
building Verbundindex
bvnumber BV043069916
collection ZDB-4-EBA
ctrlnum (OCoLC)818818815
(DE-599)BVBBV043069916
dewey-full 364.16/8
364.168
dewey-hundreds 300 - Social sciences
dewey-ones 364 - Criminology
dewey-raw 364.16/8
364.168
dewey-search 364.16/8
364.168
dewey-sort 3364.16 18
dewey-tens 360 - Social problems and services; associations
discipline Rechtswissenschaft
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04061nam a2200481zc 4500</leader><controlfield tag="001">BV043069916</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2010 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593326467</subfield><subfield code="9">1-59332-646-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593326463</subfield><subfield code="9">978-1-59332-646-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)818818815</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043069916</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Choi, Kyung-Shick</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Risk Factors in Computer-Crime Victimization</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">El Paso</subfield><subfield code="b">LFB Scholarly Pub. LLC</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (175 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Criminal justice (LFB Scholarly Publishing LLC)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">ACKNOWLEDGMENTS; CHAPTER 1: Introduction and Overview of Computer Crime; Purpose and Scope; Computer Crime and Victimization; Criminological Foundations on Computer Crime Victimization; CHAPTER 2: Computer Crime Victimization andCriminological Perspectives; Routine Activities Theory and Nature of Cyberspace; Spatiality and Temporality in Cyberspace; Three Core Concepts: Routine Activities Theory; Motivated Offender: Computer Criminal; Suitable Target in Cyberspace; Capable Guardianship in Cyberspace; Target Suitability Revisited: Lifestyle-Exposure Theory</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Potential Theoretical ExpansionCHAPTER 3: Methodological Approach: Digital Guardian, Online Life Style, and Computer Crime Victimization; Sample and Procedure; Research Hypotheses and Measures; Digital Guardian Measure; Online Lifestyle Measure; Computer-Crime Victimization Measure; Convergence of Two Latent Variables Measure; CHAPTER 4: SEM Assessment: Cyber-Routine ActivitiesTheoretical Model; Sample; Properties of Measures; Digital Guardian; CFA on Digital-Capable Guardianship; Online Lifestyle; CFA on Online Lifestyle; Computer-Crime Victimization; Measurement Model; Structural Model</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Relationship Between Demographic Variables and RiskFactors of Computer Crime VictimizationDemographic Variables vs. Fear of Cybercrime; Demographic Variables vs. Main Factors in ComputerCrime Victimization; CHAPTER 5: Managing Computer Crime and Future Research; Policy Implications; Limitations and Directions for Future Research; Future Directions on Computer Crime Prevention Program; APPENDIX A: Presurvey Guideline; APPENDIX B: Computer Crime Victimization Survey; REFERENCES; INDEX.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">1-59332-401-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-59332-401-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=520525</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028494108</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=520525</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=520525</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043069916
illustrated Not Illustrated
indexdate 2024-12-24T04:40:48Z
institution BVB
isbn 1593326467
9781593326463
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028494108
oclc_num 818818815
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 Online-Ressource (175 pages)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2010
publishDateSearch 2010
publishDateSort 2010
publisher LFB Scholarly Pub. LLC
record_format marc
series2 Criminal justice (LFB Scholarly Publishing LLC)
spelling Choi, Kyung-Shick Verfasser aut
Risk Factors in Computer-Crime Victimization
El Paso LFB Scholarly Pub. LLC 2010
1 Online-Ressource (175 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Criminal justice (LFB Scholarly Publishing LLC)
ACKNOWLEDGMENTS; CHAPTER 1: Introduction and Overview of Computer Crime; Purpose and Scope; Computer Crime and Victimization; Criminological Foundations on Computer Crime Victimization; CHAPTER 2: Computer Crime Victimization andCriminological Perspectives; Routine Activities Theory and Nature of Cyberspace; Spatiality and Temporality in Cyberspace; Three Core Concepts: Routine Activities Theory; Motivated Offender: Computer Criminal; Suitable Target in Cyberspace; Capable Guardianship in Cyberspace; Target Suitability Revisited: Lifestyle-Exposure Theory
Potential Theoretical ExpansionCHAPTER 3: Methodological Approach: Digital Guardian, Online Life Style, and Computer Crime Victimization; Sample and Procedure; Research Hypotheses and Measures; Digital Guardian Measure; Online Lifestyle Measure; Computer-Crime Victimization Measure; Convergence of Two Latent Variables Measure; CHAPTER 4: SEM Assessment: Cyber-Routine ActivitiesTheoretical Model; Sample; Properties of Measures; Digital Guardian; CFA on Digital-Capable Guardianship; Online Lifestyle; CFA on Online Lifestyle; Computer-Crime Victimization; Measurement Model; Structural Model
Relationship Between Demographic Variables and RiskFactors of Computer Crime VictimizationDemographic Variables vs. Fear of Cybercrime; Demographic Variables vs. Main Factors in ComputerCrime Victimization; CHAPTER 5: Managing Computer Crime and Future Research; Policy Implications; Limitations and Directions for Future Research; Future Directions on Computer Crime Prevention Program; APPENDIX A: Presurvey Guideline; APPENDIX B: Computer Crime Victimization Survey; REFERENCES; INDEX.
Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of
Includes bibliographical references and index
Computer crimes
TRUE CRIME / White Collar Crime bisacsh
Computer crimes fast
Erscheint auch als Druck-Ausgabe, Hardcover 1-59332-401-4
Erscheint auch als Druck-Ausgabe, Hardcover 978-1-59332-401-8
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525 Aggregator Volltext
spellingShingle Choi, Kyung-Shick
Risk Factors in Computer-Crime Victimization
Computer crimes
TRUE CRIME / White Collar Crime bisacsh
Computer crimes fast
title Risk Factors in Computer-Crime Victimization
title_auth Risk Factors in Computer-Crime Victimization
title_exact_search Risk Factors in Computer-Crime Victimization
title_full Risk Factors in Computer-Crime Victimization
title_fullStr Risk Factors in Computer-Crime Victimization
title_full_unstemmed Risk Factors in Computer-Crime Victimization
title_short Risk Factors in Computer-Crime Victimization
title_sort risk factors in computer crime victimization
topic Computer crimes
TRUE CRIME / White Collar Crime bisacsh
Computer crimes fast
topic_facet Computer crimes
TRUE CRIME / White Collar Crime
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=520525
work_keys_str_mv AT choikyungshick riskfactorsincomputercrimevictimization