Cyber victimization within the Routine Activity Theory Framework in the Digital Age

Descripción del Articulo

This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used...

Descripción completa

Detalles Bibliográficos
Autores: Morillo Puente, Solbey, Ríos Hernández, Iván Neftalí
Formato: artículo
Fecha de Publicación:2022
Institución:Pontificia Universidad Católica del Perú
Repositorio:Revistas - Pontificia Universidad Católica del Perú
Lenguaje:inglés
OAI Identifier:oai:revistaspuc:article/24619
Enlace del recurso:http://revistas.pucp.edu.pe/index.php/psicologia/article/view/24619
Nivel de acceso:acceso abierto
Materia:Cyber victimization
Routine activity theory
Exposure to motivated offender
Suitable target
Capable guardian
Cibervictimization
Teoría de actividades rutinarias
Exposición a un delincuente motivado
Objetivo adecuado
Guardián capaz
Victimisation cybernétique
Théorie des activités Rutinaires
Exposition à un délinquant motivé
Objectif adéquat
Gardian capable
Ciber-vitimização
Teoria de atividades rotineiras
Exposto a um criminoso motivado
Objetivo adequado
Guardião capaz
Descripción
Sumario:This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians. The interdependence of these three elements revealed that 3.9% of students are at risk due to their routine activities, which had a significant influence on cyber victimization. It is proposed that these findings should be considered in the design of communicative and educational policies aimed at a responsible use of technologies.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).