|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn893707285 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
141022s2010 txua ob 001 0 eng d |
040 |
|
|
|a YDXCP
|b eng
|e pn
|c YDXCP
|d OCLCO
|d OCLCF
|d EBLCP
|d DEBSZ
|d E7B
|d N$T
|d OCLCQ
|d AZK
|d COCUF
|d AGLDB
|d CNNOR
|d MOR
|d PIFAG
|d OTZ
|d ZCU
|d MERUC
|d OCLCQ
|d JBG
|d OCLCQ
|d U3W
|d STF
|d WRM
|d VNS
|d OCLCQ
|d VTS
|d NRAMU
|d ICG
|d VT2
|d INT
|d OCLCQ
|d WYU
|d OCLCQ
|d A6Q
|d DKC
|d OCLCQ
|d M8D
|d OCLCQ
|d UKCRE
|d BOL
|d INARC
|d AJS
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 817561131
|a 818818815
|a 961489687
|a 962644758
|a 974770885
|a 974868461
|a 981900308
|a 988039636
|a 1018016937
|a 1043651818
|a 1066446924
|a 1081237741
|a 1083601950
|a 1114480795
|a 1153547940
|a 1176526268
|a 1228545728
|a 1285763120
|
020 |
|
|
|a 1593326467
|q (electronic bk.)
|
020 |
|
|
|a 9781593326463
|q (electronic bk.)
|
020 |
|
|
|z 9781593324018
|q (hbk. ;
|q alk. paper)
|
020 |
|
|
|z 1593324014
|q (hbk. ;
|q alk. paper)
|
029 |
1 |
|
|a AU@
|b 000050635455
|
029 |
1 |
|
|a AU@
|b 000053288722
|
029 |
1 |
|
|a DEBBG
|b BV043069916
|
029 |
1 |
|
|a DEBBG
|b BV043778690
|
029 |
1 |
|
|a DEBBG
|b BV044170397
|
029 |
1 |
|
|a DEBSZ
|b 397422113
|
029 |
1 |
|
|a DEBSZ
|b 421286733
|
029 |
1 |
|
|a NZ1
|b 14975074
|
035 |
|
|
|a (OCoLC)893707285
|z (OCoLC)817561131
|z (OCoLC)818818815
|z (OCoLC)961489687
|z (OCoLC)962644758
|z (OCoLC)974770885
|z (OCoLC)974868461
|z (OCoLC)981900308
|z (OCoLC)988039636
|z (OCoLC)1018016937
|z (OCoLC)1043651818
|z (OCoLC)1066446924
|z (OCoLC)1081237741
|z (OCoLC)1083601950
|z (OCoLC)1114480795
|z (OCoLC)1153547940
|z (OCoLC)1176526268
|z (OCoLC)1228545728
|z (OCoLC)1285763120
|
050 |
|
4 |
|a HV6773
|b .C4778 2010
|
072 |
|
7 |
|a TRU
|x 005000
|2 bisacsh
|
082 |
0 |
4 |
|a 364.16/8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Choi, Kyung-shick,
|d 1973-
|
245 |
1 |
0 |
|a Risk factors in computer-crime victimization /
|c Kyung-shick Choi.
|
260 |
|
|
|a El Paso [Tex.] :
|b LFB Scholarly Pub.,
|c 2010.
|
300 |
|
|
|a 1 online resource (vii, 167 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
340 |
|
|
|g polychrome.
|2 rdacc
|0 http://rdaregistry.info/termList/RDAColourContent/1003
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Criminal justice: recent scholarship
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a ACKNOWLEDGMENTS; CHAPTER 1: Introduction and Overview of Computer Crime; Purpose and Scope; Computer Crime and Victimization; Criminological Foundations on Computer Crime Victimization; CHAPTER 2: Computer Crime Victimization and Criminological Perspectives; Routine Activities Theory and Nature of Cyberspace; Spatiality and Temporality in Cyberspace; Three Core Concepts: Routine Activities Theory; Motivated Offender: Computer Criminal; Suitable Target in Cyberspace; Capable Guardianship in Cyberspace; Target Suitability Revisited: Lifestyle-Exposure Theory.
|
505 |
8 |
|
|a Potential Theoretical ExpansionCHAPTER 3: Methodological Approach: Digital Guardian, Online Life Style, and Computer Crime Victimization; Sample and Procedure; Research Hypotheses and Measures; Digital Guardian Measure; Online Lifestyle Measure; Computer-Crime Victimization Measure; Convergence of Two Latent Variables Measure; CHAPTER 4: SEM Assessment: Cyber-Routine ActivitiesTheoretical Model; Sample; Properties of Measures; Digital Guardian; CFA on Digital-Capable Guardianship; Online Lifestyle; CFA on Online Lifestyle; Computer-Crime Victimization; Measurement Model; Structural Model.
|
505 |
8 |
|
|a Relationship Between Demographic Variables and RiskFactors of Computer Crime VictimizationDemographic Variables vs. Fear of Cybercrime; Demographic Variables vs. Main Factors in ComputerCrime Victimization; CHAPTER 5: Managing Computer Crime and Future Research; Policy Implications; Limitations and Directions for Future Research; Future Directions on Computer Crime Prevention Program; APPENDIX A: Presurvey Guideline; APPENDIX B: Computer Crime Victimization Survey; REFERENCES; INDEX.
|
520 |
|
|
|a Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
7 |
|a TRUE CRIME
|x White Collar Crime.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes.
|2 fast
|0 (OCoLC)fst00872063
|
776 |
0 |
8 |
|i Print version:
|a Choi, Kyung-shick, 1973-
|t Risk factors in computer-crime victimization.
|d El Paso [Tex.] : LFB Scholarly Pub., 2010
|z 9781593324018
|z 1593324014
|w (DLC) 2010014561
|
830 |
|
0 |
|a Criminal justice (LFB Scholarly Publishing LLC)
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=520525
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1057793
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10622751
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 520525
|
938 |
|
|
|a Internet Archive
|b INAR
|n riskfac_cho_2010_00_8587
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9906804
|
994 |
|
|
|a 92
|b IZTAP
|