Abstract
This study examines whether macro-level opportunity indicators affect cyber-theft victimization. Based on the arguments from criminal opportunity theory, exposure to risk is measured by state-level patterns of internet access (where users access the internet). Other structural characteristics of states were measured to determine if variation in social structure impacted cyber-victimization across states. The current study found that structural conditions such as unemployment and non-urban population are associated with where users access the internet. Also, this study found that the proportion of users who access the internet only at home was positively associated with state-level counts of cyber-theft victimization. The theoretical implications of these findings are discussed.
Similar content being viewed by others
Notes
Regarding the effects of structural variables on cyber-space, Yar (2005) discussed that websites or online services frequently used can be influenced by structural contexts because the virtual spaces are “physically rooted and produced in ‘real space’” (p.416). In other words, individual’s patterns of internet use (e.g., kinds of online service frequently used, spent hours of internet) vary depending on culture, language, gender, ethnicity, and class etc. If the individual’s patterns of internet use affect cyber-victimization, accordingly, structural characteristics indirectly affect cyber-victimization.
The rate of cyber-theft victimization was rounded to the nearest whole number to apply a regression model for count data. Both the rate of male and GDP per capita were significantly skewed (p < .01) so that the log transformation was applied to them for normality.
To examine mediated effects, Fritz and MacKinnon (2007) recommended that ample sample sizes be obtained to guarantee more than .8 of statistical power.
Alaska has 256 per 100,000 population of cyber-theft victimization, which is six standard deviations away from the average, 76.12 per 100,000 (See Table 1). Since the sample size of the data is small, one outlier can have a significant effect on estimation. Hilbe (2007) conducted a simulation to examine effects of outliers on overdispersion and found that 0.1 percentage of outliers increased 30 percentage of the Pearson dispersion statistic. Accordingly, the outlier in the dependent variable, which is estimated as 2 % in the current study may have an influential effect on estimation.
References
Anderson, T. L., & Bennett, R. R. (1996). Development, gender, and crime: The scope of the routine activities approach. Justice Quarterly, 13, 31–56.
Ang, R. P., Huan, V. S., & Florell, D. (2014). Understanding the relationship between proactive and reactive aggression, and cyberbullying across United States and Singapore adolescent samples. Journal of Interpersonal Violence, 29, 237–254.
Bennett, R. R. (1991). Routine activities: A cross-national assessment of a criminological perspective. Social Forces, 70, 147–163.
Birkbeck, C., & LaFree, G. D. (1993). The situational analysis of crime and deviance. Annual Review of Sociology, 19, 113–137.
Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3, 400–420.
Choi, K. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308–333.
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588–608.
Cohen, L. E., Kluegel, J. R., & Land, K. C. (1981). Social inequality and predatory criminal victimization: An exposition and test of a formal theory. American Sociological Review, 46, 505–524.
Dowdell, E. B. (2011). Risky Internet behaviors of middle-school students: Communication with online strangers and offline contact. CIN: Computers, Informatics, Nursing, 29, 352–359.
Dowdell, E. B. (2013). Use of the Internet by parents of middle school students: Internet rules, risky behaviours and online concerns. Journal of Psychiatric & Mental Health Nursing, 20, 9–16.
Dowell, E. B., Burgess, A. W., & Cavanaugh, D. J. (2009). Clustering of internet risk behaviors in a middle school student population. Journal of School Health, 79, 547–553.
Felson, M., & Santos, R. B. (2009). Crime and everyday life (4th ed.). Thousand Oaks, CA: Sage.
File, T. (2013). Computer and internet use in the United States. Washington, DC: U.S. Census Bureau.
Fritz, M. S., & MacKinnon, D. P. (2007). Required sample size to detect the mediated effect. Psychological Science, 18, 233–239.
Gaquin, D. A., & Dunn, G. W. (2013). State and metropolitan area data book. Lanham, MD: Bernan.
Hemphill, S. A., & Heerde, J. A. (2014). Adolescent predictors of young adult cyberbullying perpetration and victimization among australian youth. Journal of Adolescent Health, 55, 580–587.
Higgins, G. E. (2007). Digital piracy: An examination of low self-control and motivation using short-term longitudinal data. Cyberpsychology & Behavior, 10, 523–529.
Higgins, G. E., Hughes, T., Ricketts, M. L., & Wolfe, S. E. (2008). Identity theft complaints: Exploring the state-level correlates. Journal of Financial Crime, 15, 295–307.
Hilbe, J. M. (2007). Negative binomial regression. New York: Cambridge University Press.
Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization. Cambridge, MA: Ballinger.
Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1–25.
Holt, T. J., & Bossler, A. M. (2013). Examining the relationship between routine activities and malware infection indicators. Journal of Contemporary Criminal Justice, 29, 420–436.
Holt, T. J., & Turner, M. G. (2012). Examining risks and protective factors of on-line identity theft. Deviant Behavior, 33, 308–323.
Holtfreter, K., Reisig, M., & Pratt, T. (2008). Low self-control, routine activities, and fraud victimization. Criminology, 46, 189–220.
Internet Crime Complaint Center. (2012). 2011 Internet Crime Report. Retrieved June 15, 2015, from http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf
Internet Crime Complaint Center. (2013). 2012 Internet Crime Report. Retrieved June 15, 2015, from http://www.ic3.gov/media/annualreport/2012_IC3Report.pdf
Internet Crime Complaint Center. (2014). 2013 Internet Crime Report. Retrieved June 15, 2015, from http://www.ic3.gov/media/annualreport/2013_IC3Report.pdf
Jang, H., Song, J., & Kim, R. (2014). Does the offline bully-victimization influence cyberbullying behavior among youths? application of general strain theory. Computers in Human Behavior, 31, 85–93.
Kaufman, R. L. (2013). Heteroskedasticity in regression: Detection and correction. Thousand Oaks, CA: Sage.
Kennedy, L. W., & Forde, D. R. (1990). Routine activities and crime: An analysis of victimization in Canada. Criminology, 28, 137–152.
Kigerl, A. (2012). Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30, 470–486.
Land, K. C., McCall, P. L., & Cohen, L. E. (1990). Structural covariates of homicide rates: Are there any invariances across time and social space? American Journal of Sociology, 95, 922–963.
Liau, A. K., Khoo, A., & Ang, P. H. (2005). Factors influencing adolescents engagement in risky internet behavior. Cyberpsychology & Behavior, 8, 513–520.
Liu, C., Ang, R. P., & Lwin, M. O. (2013). Cognitive, personality, and social factors associated with adolescents’ online personal information disclosure. Journal of Adolescence, 36, 629–638.
Long, J. S. (1997). Regression models for categorical and limited dependent variables. Thousand Oaks, CA: Sage.
Long, J. S., & Ervin, L. H. (2000). Using heteroscedasticity consistent standard errors in the linear regression model. The American Statistician, 54, 217–224.
Long, J. S., & Freese, J. (2014). Regression models for categorical dependent variables using stata (3rd ed.). College Station, TX: Stata Press.
Lynch, J. P. (1987). Routine activity and victimization at work. Journal of Quantitative Criminology, 3, 283–300.
MacKinnon, J. G., & White, H. (1985). Some heteroskedasticity-consistent covariance matrix estimators with improved finite sample properties. Journal of Econometrics, 29, 305–325.
Madero-Hernandez, A., & Fisher, B. S. (2012). Routine activity theory. In F. Cullen & P. Wilcox (Eds.), The Oxford handbook of criminological theory (pp. 513–534). New York: Oxford University Press.
Maimon, D., Kamerdze, A., Cukier, M., & Sobesto, B. (2013). Daily trends and origin of computer-focused crimes against a large university computer network: An application of the routine-activities and lifestyle perspective. British Journal of Criminology, 53, 319–343.
Maimon, D., Wilson, T., Ren, W., & Berenblum, T. (2015). On the relevance of spatial and temporal dimensions in assessing computer susceptibility to system trespassing incidents. British Journal of Criminology, 55, 615–634.
Maume, D. J. (1989). Inequality and metropolitan rape rates: A routine activity approach. Justice Quarterly, 6, 513–527.
Marcum, C., Higgins, G., Freiburger, T., & Ricketts, M. (2014). Exploration of the cyberbullying victim/offender overlap by sex. American Journal of Criminal Justice, 39, 538–548.
Marcum, C. D., Ricketts, M. L., & Higgins, G. E. (2010). Assessing sex experiences of online victimization: An examination of adolescent online behaviors using routine activity theory. Criminal Justice Review, 35, 412–437.
Maxfield, M. G. (1987). Household composition, routine activity, and victimization: A comparative analysis. Journal of Quantitative Criminology, 3, 301–320.
Menard, S. (1995). Applied logistic regression analysis. Thousand Oaks, CA: Sage.
Messner, S. F., & Blau, J. R. (1987). Routine leisure activities and rates of crime: A macro-level analysis. Social Forces, 65, 1035–1052.
Messner, S. F., Lu, Z., Zhang, L., & Liu, J. (2007). Risks of criminal victimization in contemporary Urban China: An application of lifestyle/routine activities theory. Justice Quarterly, 24, 496–522.
Miethe, T. D., Hughes, M., & McDowall, D. (1991). Social change and crime rates: An evaluation of alternative theoretical approaches. Social Forces, 70, 165–185.
Miethe, T. D., & McDowall, D. (1993). Contextual effects in models of criminal victimization. Social Forces, 71, 741–759.
Miethe, T. D., & Meier, R. F. (1990). Opportunity, choice, and criminal victimization: A test of a theoretical model. Journal of Research in Crime and Delinquency, 27, 243–266.
Miethe, T. D., Stafford, M. C., & Long, J. S. (1987). Social differentiation in criminal victimization: A test of routine activities/lifestyle theories. American Sociological Review, 52, 184–194.
Moon, B., McCluskey, J., & McCluskey, C. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38, 767–772.
Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5, 773–793.
Oksanen, A., & Keipi, T. (2013). Young people as victims of crime on the internet: A population-based study in Finland. Vulnerable Children and Youth Studies: An International Interdisciplinary Journal for Research, Policy and Care, 8, 298–309.
Osgood, D. W. (2000). Poisson-based regression analysis of aggregate crime rates. Journal of Quantitative Criminology, 16, 21–43.
Patchin, J. W., & Hinduja, S. (2011). Traditional and nontraditional bullying among youth: A test of general strain theory. Youth & Society, 43, 727–751.
Pew Research Center. (2014). Internet use over time. Retrieved June 10, 2015, from http://www.pewInternet.org/data-trend/Internet-use/Internet-use-over-time
Pratt, T., Holtfreter, K., & Reisig, M. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47, 267–296.
Ren, F., Kwan, M., & Schwanen, T. (2013). Investigating the temporal dynamics of internet activities. Time & Society, 22, 186–215.
Reyns, B. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50, 216–238.
Reyns, B., Burek, M., Henson, B., & Fisher, B. S. (2013). The unintended consequences of digital technology: Exploring the relationship between sexting and cybervictimization. Journal of Crime and Justice, 36, 1–17.
Reyns, B., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle-routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38, 1149–1169.
Sampson, R. J., & Wooldredge, J. D. (1987). Linking the micro- and macro-level dimensions of lifestyle—Routine activity and opportunity models of predatory victimization. Journal of Quantitative Criminology, 3, 371–393.
Shapka, J. D., & Law, D. M. (2013). Does one size fit all? Ethnic differences in parenting behaviors and motivations for adolescent engagement in cyberbullying. Journal of Youth and Adolescence, 42, 723–738.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495–518.
StataCorp. (2011). Stata statistical software: Release 12. College Station, TX: StataCorp LP.
Tseloni, A., Wittebrood, K., Farrell, G., & Pease, K. (2004). Burglary victimization in England and wales, the United States and the Netherlands: A cross-national comparative test of routine activities and lifestyle theories. British Journal of Criminology, 44, 66–91.
van Wilsem, J. (2011). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8, 115–127.
van Wilsem, J. (2013a). ‘Bought it, but never got it’ assessing risk factors for online consumer fraud victimization. European Sociological Review, 29, 168–178.
van Wilsem, J. (2013b). Hacking and harassment—Do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice, 29, 437–453.
White, H. L. (1980). A heteroskedasticity-consistent covariance matrix estimator and a direct test for heteroskedasticity. Econometrica, 48, 817–838.
Yar, M. (2005). The novelty of ‘cybercrime’. European Journal of Criminology, 2, 407–427.
Ybarra, M. L., Finkelhor, D., Mitchell, K. J., & Wolak, J. (2009). Associations between blocking, monitoring, and filtering software on the home computer and youth-reported unwanted exposure to sexual material online. Child Abuse & Neglect, 33, 857–869.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Song, H., Lynch, M.J. & Cochran, J.K. A Macro-Social Exploratory Analysis of the Rate of Interstate Cyber-Victimization. Am J Crim Just 41, 583–601 (2016). https://doi.org/10.1007/s12103-015-9308-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12103-015-9308-4