scholarly journals Routine Activity Theory and Farm Equipment Theft: A Macro-Level Approach

2021 ◽  
Vol 6 (1) ◽  
pp. 1-18
Author(s):  
Dustin L. Osborne ◽  
Kristin Swartz

Though a handful of studies have explored the relationship between farm characteristics and theft of farm equipment, all have been focused at the micro level. Put differently, they have sought to determine whether a relationship exists between likelihood of theft victimization and the characteristics (e.g., size, location) of individual farming operations. The current study builds upon this work by seeking to determine whether county-level factors (in line with the routine activity theory framework) serve to influence the incidence of farm equipment theft within counties. Data are derived from the National Incident-Based Reporting System, the Census of Agriculture and the United States Census of the Population.  Results are on the whole supportive of the theory's application to the problem and suggest that macro-level investigations constitute a worthwhile approach to better understanding agricultural victimization.

2022 ◽  
Vol 40 (1) ◽  
pp. 265-291
Author(s):  
Solbey Morillo Puente ◽  
Iván Neftalí Ríos Hernández

This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians. The interdependence of these three elements revealed that 3.9% of students are at risk due to their routine activities, which had a significant influence on cyber victimization. It is proposed that these findings should be considered in the design of communicative and educational policies aimed at a responsible use of technologies.


Author(s):  
Dillon Glasser ◽  
Aakash Taneja

Since the government began tackling the problems of cybercrime, many laws have been enacted. A lack of a comprehensive definition and taxonomy of cybercrime makes it difficult to accurately identify report and monitor cybercrime trends. There is not just a lack of international agreement on what cybercrime is; there are different laws in every state within the United States, reflecting the inconsistency of dealing with cybercrime. There is also concern that many times lawyers and information technology professions are unable to understand each other well. The deficiency of cyber laws is an obvious problem and development of effective laws is emerging as an important issue to deal with cybercrime. This research uses the routine activity theory to develop a unified framework by including the motivation of the offender to use a computer as a tool/target, suitability of the target, and the presence (or absence) of guardian. It could help states that want to update their existing laws and cover areas that were previously uncovered.


2016 ◽  
pp. 69-78
Author(s):  
Dillon Glasser ◽  
Aakash Taneja

Since the government began tackling the problems of cybercrime, many laws have been enacted. A lack of a comprehensive definition and taxonomy of cybercrime makes it difficult to accurately identify report and monitor cybercrime trends. There is not just a lack of international agreement on what cybercrime is; there are different laws in every state within the United States, reflecting the inconsistency of dealing with cybercrime. There is also concern that many times lawyers and information technology professions are unable to understand each other well. The deficiency of cyber laws is an obvious problem and development of effective laws is emerging as an important issue to deal with cybercrime. This research uses the routine activity theory to develop a unified framework by including the motivation of the offender to use a computer as a tool/target, suitability of the target, and the presence (or absence) of guardian. It could help states that want to update their existing laws and cover areas that were previously uncovered.


2020 ◽  
Vol 47 (4) ◽  
pp. 487-505 ◽  
Author(s):  
Thomas J. Holt ◽  
Rutger Leukfeldt ◽  
Steve van de Weijer

This study provides a partial test of the relationship between actor motivations and target suitability using a routine activity framework to understand a form of cybercrime called web defacements. Specifically, the relationships between the visibility, inertia, value, and accessibility of the target in online spaces relative to the unique nonmonetary motivations of the attacker were examined. This study utilized a sample of 138,361 web defacements performed against websites hosted within the Netherlands IP space from January 2011 to April 2017. Seven multinomial logistic regression models were conducted for each self-identified motive for the attack, clustered by attacker to minimize the size of standard errors. The findings demonstrated partial support for aspects of routine activity theory to account for differences in offender motivation, suggesting web defacements are similar to other forms of cybercrime. At the same time, motivations differentially shape target selection.


2021 ◽  
pp. 088626052199743
Author(s):  
Dana Aizenkot

Cyberbullying has been pervading worldwide with negative implications for victims. Therefore, there is an urgent need to better understand this phenomenon and the factors that predict it, as the basis for effective prevention and intervention efforts. The current research aims to examine routine activity theory (RAT) as a theoretical framework predictive of cyberbullying victimization (CV) among children and youth. It was hypothesized that each of the RAT measures and the convergence of all measures predict CV. Data were collected from 5,719 primary, middle, and high school Israeli students (51.9% females) during the 2019–2020 school year via online questionnaires. Regression and moderation analyses were conducted to assess the predictability of CV from RAT measures, separately and converged. All RAT measures, separately and converged, predict CV. While off-line trust negatively predicts CV, other control variables, that is, online trust, educational institution phase, and gender, do not. Implications for school programs and guidelines for parents address the risk and protective factors of CV found. This study provides support for the predictability of CV from RAT and expands the knowledge of risk and protective factors predictive of CV.


Sign in / Sign up

Export Citation Format

Share Document