Abstract
The purpose of the present research was to identify determinants of online crime prevention behaviors by examining the relationships between online victimization, online exposure, online communication behaviors and online prevention within an opportunity framework. Utilizing a large national sample of residents of Canada from the General Social Survey, structural equation modeling and canonical correlation analysis were used to assess the effects of opportunity-based routines upon preventive behaviors as well as the effects of individual elements of each construct on the relationship between the constructs. Results from the structural equation models indicate that there is a positive and significant relationship between online victimization and the adoption of online preventative routines, while the canonical correlation analyses suggest that these relationships are complex and that specific types of victimization are related to particular prevention efforts. The present research provides early evidence that online lifestyles influence the theorized cycle of online victimization and preventative efforts. We find that indicators of online exposure and communications routines were positive predictors of online victimization, and that online victimization is positively associated with taking precautionary measures.
Similar content being viewed by others
Notes
For example, if a relationship between the construct’s ‘exposure’ and ‘victimization’ were established, each individual item used to build ‘exposure’ may have a unique impact on the higher order relationship between ‘exposure’ and ‘victimization.’ The resulting information may help guide future research by identifying particularly impactful behaviors.
The number of email users in the sample was so great that little variability existed that would benefit CCA.
‘Canonical correlation analysis can accommodate any metric variable without the strict assumption of normality. However, normality is desirable because it allows for the highest correlation among the variables. Indeed, canonical correlation analysis can accommodate non-normal variables if the distributional form (e.g., highly skewed) does not decrease the correlation with other variables. This allows for transformed non-metric data (in the form of dummy variables) to be used as well … Thus, although normality is not strictly require, it is highly recommended that all variables be evaluated for normality and transformed if possible’ (Hair et al, 2010, p. 15).
References
Bollen, K.A. and Barb, K.H. (1981) Person’s R and coarsely categorized measures. American Sociological Review 46 (2): 232–239.
Bossler, A.M. and Holt, T.J. (2009) On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology 3 (1): 400–420.
Bossler, A.M. and Holt, T.J. (2010) The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice 38 (3): 227–236.
Bossler, A.M., Holt, T.J. and May, D.C. (2012) Predicting online harassment victimization among a juvenile population. Youth and Society 44 (4): 500–523.
Choi, K. (2008) Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology 2 (1): 308–333.
Clarke, R.V. (1995) Situational crime prevention. Crime and Justice 19: 91–150.
Cohen, L.E. and Felson, M. (1979) Social change and crime rate trends: A routine activity approach. American Sociological Review 44 (4): 588–608.
Cook, P.J. (1986) The demand and supply of criminal opportunities. Crime and Justice 7: 1–27.
Cornish, D.B. and Clarke, R.V. (2003) Opportunities, precipitators and criminal decisions: A reply to wortley’s critique of situational crime prevention. Crime Prevention Studies 16: 41–96.
Dinev, T., Hart, P. and Mullen, M.R. (2008) Internet privacy concerns and beliefs about government surveillance – An empirical investigation. Strategic Information Systems 17 (3): 214–233.
Ekblom, P. (1999) Can we make crime prevention adaptive by learning from other evolutionary struggles? Studies on Crime and Crime Prevention 8: 27–51.
Farrell, G. (1995) Preventing repeat victimization. Crime and Justice 19: 469–534.
Fattah, E.A. (2000) Victimology: Past, present and future. Criminologie 33 (1): 17–46.
Felson, M. and Boba, R. (2010) Crime and Everyday Life. Thousand Oaks, CA: Sage.
Felson, M. and Clarke, R.V. (1998) Opportunity Makes the Thief: Practical Theory for Crime Prevention. London: Home Office.
Fisher, B.S., Daigle, L.E. and Cullen, F.T. (2010) What distinguishes single from recurrent sexual victims? The role of lifestyle-routine activities and first-incident characteristics. Justice Quarterly 27 (1): 102–129.
Hair, J.F., Black, W.C., Babin, B.J. and Anderson, R.E. (2010) Canonical Correlation: A Supplement to Multivariate Data Analysis. Multivariate data analysis: a global perspective. 7th edn. Pearson Prentice Hall Publishing, Upper Saddle River.
Henson, B., Reyns, B.W. and Fisher, B.S. (2011) Security in the 21st century: Examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review 36 (3): 253–268.
Henson, B., Reyns, B.W. and Fisher, B.S. (2013) Does gender matter in the virtual world? Examining the effect of gender on the link between online social network activity, security and interpersonal victimization. Security Journal 26 (4): 315–330.
Hindelang, M.J. (1976) Criminal victimization in eight American cities: A descriptive analysis of common theft and assaul. Cambridge, MA: Ballinger Publishing Co.
Hindelang, M.J., Gottfredson, M.R. and Garofalo, J. (1978) Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization. Cambridge, MA: Ballinger Publishing Company.
Hinduja, S. and Kooi, B. (2013) Curtailing cyber and information security vulnerabilities through situational crime prevention. Security Journal 26 (4): 383–402.
Hollis-Peel, M.E., Reynald, D.M., Van Bavel, M., Elffers, H. and Welsh, B.C. (2011) Guardianship for crime prevention: A critical review of the literature. Crime, Law and Social Change 56 (1): 53–70.
Hollis-Peel, M.E. and Welsh, B.C. (2014) What makes a guardian capable? A test of guardianship in action. Security Journal 27 (3): 320–337.
Holt, T.J. and Bossler, A.M. (2009) Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior 30 (1): 1–25.
Holt, T.J. and Bossler, A.M. (2013) Examining the relationship between routine activities and malware infection indicators. Journal of Contemporary Criminal Justice 29 (4): 420–436.
Holt, T.J. and Bossler, A.M. (2014) An assessment of the current state of cybercrime scholarship. Deviant Behavior 35 (1): 20–40.
Kelley, K. and Preacher, K.J. (2012) On effect size. Psychological Methods 17 (2): 137–152.
Marcum, C.D., Higgins, G.E. and Ricketts, M.L. (2010) Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior 31 (5): 381–410.
Milne, G.R., Rohm, A.J. and Bahl, S. (2004) Consumers’ protection of online privacy and identity. The Journal of Consumer Affairs 38 (2): 217–232.
Mustaine, E.E. and Tewksbury, R. (1999) A routine activity theory explanation for women’s stalking victimizations. Violence Against Women 5 (1): 43–62.
Navarro, J.N. and Jasinski, J.L. (2012) Going cyber: Using routine activities theory to predict cyberbullying experiences. Sociological Spectrum 32 (1): 81–94.
Ngo, F.T. and Paternoster, R. (2011) Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology 5 (1): 773–793.
Pease, K. (1998) Repeat Victimization: Taking Stock. London: Home Office.
Pratt, T.C., Holtfreter, K. and Reisig, M.D. (2010) Routine online activity and Internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency 47 (3): 267–296.
Pratt, T.C. and Turanovic, J.J. (forthcoming) Lifestyle and routine activity theories revisited: The importance of ‘risk’ to the study of victimization. Victims and Offenders.
Pratt, T.C., Turanovic, J.J., Fox, K.A. and Wright, K.A. (2014) Self-control and victimization: A meta-analysis. Criminology 52 (1): 87–116.
Randa, R. (2013) The influence of the cyber-social environment on fear of victimization: Cyberbullying and school. Security Journal 26 (4): 331–348.
Reynald, D.M. (2009) Guardianship in action: Developing a new tool for measurement. Crime Prevention and Community Safety 11 (1): 1–20.
Reynald, D.M. (2010) Guardians on guardianship: Factors affecting the willingness to supervise, the ability to detect potential offenders, and the willingness to intervene. Journal of Research in Crime and Delinquency 47 (3): 358–390.
Reyns, B.W. (2010) A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety 12 (2): 99–118.
Reyns, B.W. (2013) Online routine and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency 50 (2): 216–238.
Reyns, B.W. (2015) A routine activity perspective on online victimization: Results from the Canadian general social survey. Journal of Financial Crime 22 (4): 396–411.
Reyns, B.W., Henson, B. and Fisher, B.S. (2011) Being pursued online: Applying cyberlifestyle- routine activities theory to cyberstalking victimization. Criminal Justice and Behavior 38 (11): 1149–1169.
Reyns, B.W., Henson, B., Fisher, B.S., Fox, K.A. and Nobles, M.R. (2015) A gendered lifestyle-routine activity approach to explaining stalking victimization in Canada. Journal of Interpersonal Violence, doi: 10.1177/0886260515569066.
Schafer, S. (1977) Victimology: The Victim and His Criminal. Reston, VA: Reston Publishing Company.
Smith, H.J., Dinev, T. and Xu, H. (2011) Information privacy research: An interdisciplinary review. MIS Quarterly 35 (4): 989–1015.
Stahura, J. and Sloan, J. III (1988) Urban stratification of places, routine activities, and suburban crime rates. Social Forces 66 (4): 1102–1118.
Tseloni, A. and Pease, K. (2003) Repeat personal victimization: ‘Boosts’ or ‘flags’? British Journal of Criminology 43 (1): 196–212.
Tseloni, A., Wittebrood, K., Farrell, G. and Pease, K. (2004) Burglary victimization in England and Wales, the United States and the Netherlands: A cross-national comparative test of routine activities and lifestyle theories. The British Journal of Criminology 44 (1): 66–91.
Turanovic, J.J. and Pratt, T.C. (2014) ‘Can’t stop, won’t stop’: Self-control, risky lifestyles, and repeat victimization. Journal of Quantitative Criminology 30 (1): 29–56.
Van Wilsem, J. (2011) Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology 8 (2): 115–127.
Van Wilsem, J. (2013) Hacking and harassment – Do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice 29 (4): 437–453.
Von Hentig, H. (1948) The Criminal and His Victim: Studies in the Sociobiology of Crime. New York: Schocken, Books.
Acknowledgements
The authors would like to thank Marcus Felson for his insights in the development of this article. This analysis is based on the Statistics Canada General Social Survey, Cycle 23, 2009. All computations, use and interpretation of these data are entirely those of the authors.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Reyns, B., Randa, R. & Henson, B. Preventing crime online: Identifying determinants of online preventive behaviors using structural equation modeling and canonical correlation analysis. Crime Prev Community Saf 18, 38–59 (2016). https://doi.org/10.1057/cpcs.2015.21
Published:
Issue Date:
DOI: https://doi.org/10.1057/cpcs.2015.21