Content deleted Content added
Aadirulez8 (talk | contribs) m v2.05 - Auto / Fix errors for CW project (Link equal to linktext) |
Aadirulez8 (talk | contribs) m v2.05 - Fix errors for CW project (Spelling and typography) |
||
Line 34:
In ''A Routine Activity Theory Explanation for Women's Stalking Victimizations'', criminologists {{harvp|Mustaine|Tewksbury|1999}} conducted a self-administered study in the third quarter of 1996 to 861 college or university female students from nine postsecondary institutes from eight states of the US. The study reveals that women's victimization risk of stalking can be explained by individual lifestyle behaviors, including employment, ___location of residence, substance use (drug and alcohol) and self-protection.<ref>{{cite journal|last1=Mustaine|first1=Elizabeth Ehrhardt|last2=Tewksbury|first2=Richard|date=1999|title=A Routine Activity Theory Explanation for Women's Stalking Victimizations|journal=Violence Against Women|volume=5|issue=1|pages=43–62|doi=10.1177/10778019922181149|pmid=31454870|s2cid=73067179}}</ref>
{{harvp|Felson|Cohen|1980}} establishes that those who live alone are more likely to be out alone and to have little help in guarding their property, they probably face higher rates of victimization for both personal and property crimes. The 30.6% increase in employed and married
{{harvp|Pratt|Holtfreter|Reisig|2010}} using a sample of 922 adults in Florida show that one's online routine activities, shaped by one's sociodemographic characteristics, strongly shape the person's risk of falling victim of Internet fraud.<ref>{{Cite journal|last1=Pratt|first1=Travis C.|last2=Holtfreter|first2=Kristy|last3=Reisig|first3=Michael D.|year=2010|title=Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory|journal=Journal of Research in Crime and Delinquency|volume=47|issue=3|pages=267–296|doi=10.1177/0022427810365903|s2cid=146182010}}</ref> Their findings clearly shed light on the validity of routine activities theory on crimes that targeted Internet users. Using university computer attack data, {{harvp|Maimon|Kamerdze|Cukier|Sobesto|2013}} reveal evidence supporting routine activity theory. They find that the risk of computer attacks increases during university official business hours and that foreign-origin attacks are substantially attributed to the number of foreign network users.<ref>{{Cite journal|last1=Maimon|first1=D.|last2=Kamerdze|first2=A.|last3=Cukier|first3=M.|last4=Sobesto|first4=B.|date=2013-03-01|title=Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective|journal=British Journal of Criminology|language=en|volume=53|issue=2|pages=319–343|doi=10.1093/bjc/azs067|issn=0007-0955}}</ref>
|