Cargando…

Risk factors in computer-crime victimization /

Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Choi, Kyung-shick, 1973-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: El Paso [Tex.] : LFB Scholarly Pub., 2010.
Colección:Criminal justice (LFB Scholarly Publishing LLC)
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn893707285
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 141022s2010 txua ob 001 0 eng d
040 |a YDXCP  |b eng  |e pn  |c YDXCP  |d OCLCO  |d OCLCF  |d EBLCP  |d DEBSZ  |d E7B  |d N$T  |d OCLCQ  |d AZK  |d COCUF  |d AGLDB  |d CNNOR  |d MOR  |d PIFAG  |d OTZ  |d ZCU  |d MERUC  |d OCLCQ  |d JBG  |d OCLCQ  |d U3W  |d STF  |d WRM  |d VNS  |d OCLCQ  |d VTS  |d NRAMU  |d ICG  |d VT2  |d INT  |d OCLCQ  |d WYU  |d OCLCQ  |d A6Q  |d DKC  |d OCLCQ  |d M8D  |d OCLCQ  |d UKCRE  |d BOL  |d INARC  |d AJS  |d OCLCO  |d OCLCQ 
019 |a 817561131  |a 818818815  |a 961489687  |a 962644758  |a 974770885  |a 974868461  |a 981900308  |a 988039636  |a 1018016937  |a 1043651818  |a 1066446924  |a 1081237741  |a 1083601950  |a 1114480795  |a 1153547940  |a 1176526268  |a 1228545728  |a 1285763120 
020 |a 1593326467  |q (electronic bk.) 
020 |a 9781593326463  |q (electronic bk.) 
020 |z 9781593324018  |q (hbk. ;  |q alk. paper) 
020 |z 1593324014  |q (hbk. ;  |q alk. paper) 
029 1 |a AU@  |b 000050635455 
029 1 |a AU@  |b 000053288722 
029 1 |a DEBBG  |b BV043069916 
029 1 |a DEBBG  |b BV043778690 
029 1 |a DEBBG  |b BV044170397 
029 1 |a DEBSZ  |b 397422113 
029 1 |a DEBSZ  |b 421286733 
029 1 |a NZ1  |b 14975074 
035 |a (OCoLC)893707285  |z (OCoLC)817561131  |z (OCoLC)818818815  |z (OCoLC)961489687  |z (OCoLC)962644758  |z (OCoLC)974770885  |z (OCoLC)974868461  |z (OCoLC)981900308  |z (OCoLC)988039636  |z (OCoLC)1018016937  |z (OCoLC)1043651818  |z (OCoLC)1066446924  |z (OCoLC)1081237741  |z (OCoLC)1083601950  |z (OCoLC)1114480795  |z (OCoLC)1153547940  |z (OCoLC)1176526268  |z (OCoLC)1228545728  |z (OCoLC)1285763120 
050 4 |a HV6773  |b .C4778 2010 
072 7 |a TRU  |x 005000  |2 bisacsh 
082 0 4 |a 364.16/8  |2 22 
049 |a UAMI 
100 1 |a Choi, Kyung-shick,  |d 1973- 
245 1 0 |a Risk factors in computer-crime victimization /  |c Kyung-shick Choi. 
260 |a El Paso [Tex.] :  |b LFB Scholarly Pub.,  |c 2010. 
300 |a 1 online resource (vii, 167 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
340 |g polychrome.  |2 rdacc  |0 http://rdaregistry.info/termList/RDAColourContent/1003 
347 |a data file 
490 1 |a Criminal justice: recent scholarship 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a ACKNOWLEDGMENTS; CHAPTER 1: Introduction and Overview of Computer Crime; Purpose and Scope; Computer Crime and Victimization; Criminological Foundations on Computer Crime Victimization; CHAPTER 2: Computer Crime Victimization and Criminological Perspectives; Routine Activities Theory and Nature of Cyberspace; Spatiality and Temporality in Cyberspace; Three Core Concepts: Routine Activities Theory; Motivated Offender: Computer Criminal; Suitable Target in Cyberspace; Capable Guardianship in Cyberspace; Target Suitability Revisited: Lifestyle-Exposure Theory. 
505 8 |a Potential Theoretical ExpansionCHAPTER 3: Methodological Approach: Digital Guardian, Online Life Style, and Computer Crime Victimization; Sample and Procedure; Research Hypotheses and Measures; Digital Guardian Measure; Online Lifestyle Measure; Computer-Crime Victimization Measure; Convergence of Two Latent Variables Measure; CHAPTER 4: SEM Assessment: Cyber-Routine ActivitiesTheoretical Model; Sample; Properties of Measures; Digital Guardian; CFA on Digital-Capable Guardianship; Online Lifestyle; CFA on Online Lifestyle; Computer-Crime Victimization; Measurement Model; Structural Model. 
505 8 |a Relationship Between Demographic Variables and RiskFactors of Computer Crime VictimizationDemographic Variables vs. Fear of Cybercrime; Demographic Variables vs. Main Factors in ComputerCrime Victimization; CHAPTER 5: Managing Computer Crime and Future Research; Policy Implications; Limitations and Directions for Future Research; Future Directions on Computer Crime Prevention Program; APPENDIX A: Presurvey Guideline; APPENDIX B: Computer Crime Victimization Survey; REFERENCES; INDEX. 
520 |a Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer crimes. 
650 6 |a Criminalité informatique. 
650 7 |a TRUE CRIME  |x White Collar Crime.  |2 bisacsh 
650 7 |a Computer crimes.  |2 fast  |0 (OCoLC)fst00872063 
776 0 8 |i Print version:  |a Choi, Kyung-shick, 1973-  |t Risk factors in computer-crime victimization.  |d El Paso [Tex.] : LFB Scholarly Pub., 2010  |z 9781593324018  |z 1593324014  |w (DLC) 2010014561 
830 0 |a Criminal justice (LFB Scholarly Publishing LLC) 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=520525  |z Texto completo 
936 |a BATCHLOAD 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1057793 
938 |a ebrary  |b EBRY  |n ebr10622751 
938 |a EBSCOhost  |b EBSC  |n 520525 
938 |a Internet Archive  |b INAR  |n riskfac_cho_2010_00_8587 
938 |a YBP Library Services  |b YANK  |n 9906804 
994 |a 92  |b IZTAP