Cyber victimization within the Routine Activity Theory Framework in the Digital Age
Descripción del Articulo
This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used...
| Autores: | , |
|---|---|
| Formato: | artículo |
| Fecha de Publicación: | 2022 |
| Institución: | Pontificia Universidad Católica del Perú |
| Repositorio: | Revistas - Pontificia Universidad Católica del Perú |
| Lenguaje: | inglés |
| OAI Identifier: | oai:revistaspuc:article/24619 |
| Enlace del recurso: | http://revistas.pucp.edu.pe/index.php/psicologia/article/view/24619 |
| Nivel de acceso: | acceso abierto |
| Materia: | Cyber victimization Routine activity theory Exposure to motivated offender Suitable target Capable guardian Cibervictimization Teoría de actividades rutinarias Exposición a un delincuente motivado Objetivo adecuado Guardián capaz Victimisation cybernétique Théorie des activités Rutinaires Exposition à un délinquant motivé Objectif adéquat Gardian capable Ciber-vitimização Teoria de atividades rotineiras Exposto a um criminoso motivado Objetivo adequado Guardião capaz |
| Sumario: | This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians. The interdependence of these three elements revealed that 3.9% of students are at risk due to their routine activities, which had a significant influence on cyber victimization. It is proposed that these findings should be considered in the design of communicative and educational policies aimed at a responsible use of technologies. |
|---|
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).