Routine Activities Theory in cyber victimization and cyberbullying experiences of Turkish adolescents

Author(s):  
Gülendam Akgül
2021 ◽  
pp. 026839622110278
Author(s):  
Sixuan Zhang ◽  
Dorothy Leidner ◽  
Xin Cao ◽  
Ning Liu

Extant research on the antecedents of workplace cyberbullying pays little attention to the role of perpetrator traits in influencing workplace cyberbullying, as well as the unique occurrence context that distinguishes workplace cyberbullying with juvenile cyberbullying, workplace bullying, and adult cyberbullying in general. To fill these gaps, we consider the antecedents of workplace cyberbullying under the theoretical lens of the general theory of crime and routine activities theory. We build a model incorporating low self-control, a widely discussed perpetrator trait in criminology theories, with three types of routine activities representing the unique occurrence context for workplace cyberbullying--mWork, boundary spanning in ESM, and proactive email checking. We tested our model with 2025 employees in the U.S.. Our findings demonstrate that low self-control and the three routine activities are strong motivators for workplace cyberbullying. Our findings further show that the effect of low self-control on workplace cyberbullying is amplified by the three routine activities. The study contributes to our understanding of why workplace cyberbullying occurs and offers potential implications for managers interested in reducing incidences of workplace cyberbullying in their organization.


2020 ◽  
pp. 135481662094904
Author(s):  
Yang Yang ◽  
Nan Hua

Hotel guests are more likely to be targeted by criminals than local residents, and the hotel business is particularly vulnerable to various crimes. This study investigates whether guests prefer to stay at luxury hotels when in insecure neighborhoods to reduce the risk of victimization. Using monthly property-level data from 352 hotels between 2010 and 2014 in Houston, Texas, we estimate a series of econometric models to investigate the impact of crime. Results suggest that hotel class moderates the effect of crime on lodging performance, and high-end hotels are less influenced by crime incidents. For luxury hotels, this effect is further moderated by the lodging market structure of vicinity such that the effect is smaller for luxury hotels in a more concentrated market. Lastly, this study carefully addresses theoretical implications that confirm the routine activities theory framework as well as practical implications that suggest measures and strategies handling various impacts related to crime and hotel class studied herein.


2022 ◽  
Vol 40 (1) ◽  
pp. 265-291
Author(s):  
Solbey Morillo Puente ◽  
Iván Neftalí Ríos Hernández

This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians. The interdependence of these three elements revealed that 3.9% of students are at risk due to their routine activities, which had a significant influence on cyber victimization. It is proposed that these findings should be considered in the design of communicative and educational policies aimed at a responsible use of technologies.


2018 ◽  
Vol 55 (4) ◽  
pp. 466-492 ◽  
Author(s):  
Ajima Olaghere ◽  
Cynthia Lum

Objectives: Routine activities theory attempts to link the intersection of individuals’ everyday routine activities to crime events at particular places. This study examines crime events not just as the product of intersecting macroroutine activities but also microroutines (similar to crime “scripts”) that occur immediately before, during, and after a crime event occurs. Method: Closed-circuit television (CCTV) footage was accessed through Baltimore City Police Department from 2010 to 2011. Ethnographic techniques and systematic social observation of CCTV footage were used to categorize the microroutines of 74 street-level illicit drug transactions. Results: The findings illuminate eight microroutines of drug crime events that classify behaviors associated with illicit drug activity. Conclusions: This study advances our understanding of the link between routine activities and drug crime by examining how illicit transactions unfold from microroutines using a rarely employed, but fruitful source of data (CCTV footage).


Sign in / Sign up

Export Citation Format

Share Document