Internal Controls, Routine Activity Theory (RAT), and Sustained Online Auction Deception: A Longitudinal Analysis

2014 ◽  
Vol 28 (1) ◽  
pp. 311-337 ◽  
Author(s):  
Alexei N. Nikitkov ◽  
Dan N. Stone ◽  
Timothy C. Miller

ABSTRACT This paper adapts and extends routine activity theory (RAT) to investigate the co-evolution of eBay's controls with mundane crime in the rapidly growing auction market of 1997–2005. A suspected deceptive seller's eight-year account history indicates the presence of the three market characteristics that RAT identifies as essential for deception: (1) a motivated offender, (2) suitable targets, and (3) an absence of capable guardians (i.e., regulation and eBay controls). The results document the co-evolution of a deceptive seller's tactics with eBay's controls. The investigation introduces (1) a new market, i.e., the early online auctions, (2) a new theory, i.e., RAT, and (3) new data, i.e., of a long-term deceptive seller, to the accounting controls literature. Contributions include tracing the evolving eBay control system, considering eBay's feedback system as an emergent form of continuous monitoring, and investigating the potential of RAT as an alternative theory for understanding control violations and informing accounting control analysis and design. Data Availability: The archival data are available from public sources. The primary data are available to scholars willing to sign agreements that protect the confidentiality of the sources.

2021 ◽  
pp. 088626052199743
Author(s):  
Dana Aizenkot

Cyberbullying has been pervading worldwide with negative implications for victims. Therefore, there is an urgent need to better understand this phenomenon and the factors that predict it, as the basis for effective prevention and intervention efforts. The current research aims to examine routine activity theory (RAT) as a theoretical framework predictive of cyberbullying victimization (CV) among children and youth. It was hypothesized that each of the RAT measures and the convergence of all measures predict CV. Data were collected from 5,719 primary, middle, and high school Israeli students (51.9% females) during the 2019–2020 school year via online questionnaires. Regression and moderation analyses were conducted to assess the predictability of CV from RAT measures, separately and converged. All RAT measures, separately and converged, predict CV. While off-line trust negatively predicts CV, other control variables, that is, online trust, educational institution phase, and gender, do not. Implications for school programs and guidelines for parents address the risk and protective factors of CV found. This study provides support for the predictability of CV from RAT and expands the knowledge of risk and protective factors predictive of CV.


2020 ◽  
Vol 21 ◽  
pp. 1552-1593
Author(s):  
Xin (Robert) Luo ◽  
◽  
Han Li ◽  
Qing Hu ◽  
Heng Xu ◽  
...  

2022 ◽  
Vol 40 (1) ◽  
pp. 265-291
Author(s):  
Solbey Morillo Puente ◽  
Iván Neftalí Ríos Hernández

This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians. The interdependence of these three elements revealed that 3.9% of students are at risk due to their routine activities, which had a significant influence on cyber victimization. It is proposed that these findings should be considered in the design of communicative and educational policies aimed at a responsible use of technologies.


2020 ◽  
Vol 4 (4) ◽  
Author(s):  
Zahrati Fadhilah Taufiq

AbstrakArtikel ini membahas tentang angka kriminalitas di Indonesia pada masa pandemic Covid 19 dengan menganalisis beberapa teori-teori kriminologi. Metode penelitian yang digunakan adalah metode penelitian  yuridis empiris. Hasil penelitian ini adalah terdapat (3) teori yang digunakan sebagai alat untuk menganalisis adanya kejahatan pada masa pandemic, yaitu Opportunity Theory, Teori Kontrol Sosial, Routine Activity Theory. Teori ini dapat digunakan untuk mengetahui penyebab terjadinya kejahatan selama pandemi, dan akhirnya memperhitungkan kebijakan-kebijakan yang akan diambil untuk kedepannya.  Kata Kunci : Covid 19, Angka Kejahatan, Teori Kriminologi.


Author(s):  
Dillon Glasser ◽  
Aakash Taneja

Since the government began tackling the problems of cybercrime, many laws have been enacted. A lack of a comprehensive definition and taxonomy of cybercrime makes it difficult to accurately identify report and monitor cybercrime trends. There is not just a lack of international agreement on what cybercrime is; there are different laws in every state within the United States, reflecting the inconsistency of dealing with cybercrime. There is also concern that many times lawyers and information technology professions are unable to understand each other well. The deficiency of cyber laws is an obvious problem and development of effective laws is emerging as an important issue to deal with cybercrime. This research uses the routine activity theory to develop a unified framework by including the motivation of the offender to use a computer as a tool/target, suitability of the target, and the presence (or absence) of guardian. It could help states that want to update their existing laws and cover areas that were previously uncovered.


Author(s):  
David Weisburd ◽  
Sean Wire

Hot spots of crime, and the criminology of place more generally, deviate from the traditional paradigm of criminology, in which the primary assumption and goal is to explain who is likely to commit crime and their motivations, and to explore interventions aimed at reducing individual criminality. Alternatively, crime hot spots account for the “where” of crime, specifically referring to the concentration of crime in small geographic areas. The criminology of place demands a rethinking in regard to how we understand the crime problem and offers alternate ways to predict, explain, and prevent crime. While place, as large geographic units, has been important since the inception of criminology as a discipline, research examining crime concentrations at a micro-geographic level has only recently begun to be developed. This approach has been facilitated by improvements to data availability, technology, and the understanding of crime as a function of the environment. The new crime and place paradigm is rooted in the past three decades of criminological research centered on routine activity theory, crime concentrations, and hot spots policing. The focus on crime hot spots has led to several core empirical findings. First, crime is meaningfully concentrated, such that a large proportion of crime events occur at relatively few places within larger geographies like cities. This may be termed the law of crime concentration at places (see Weisburd, 2015). Additionally, most hot spots of crime are stable over time, and thus present promising opportunities for crime prevention. Crime hot spots vary within higher geographic units, suggesting both that there is a loss of information at higher levels of aggregation and that there are clear “micro communities” within the larger conceptualization of a neighborhood. Finally, crime at place is predictable, which is important for being able to understand why crime is concentrated in one place and not another, as well as to develop crime prevention strategies. These empirical characteristics of crime hot spots have led to the development of successful police interventions to reduce crime. These interventions are generally termed hot spots policing.


Sign in / Sign up

Export Citation Format

Share Document