Cibervictimización en el marco de la Teoría de Actividades Rutinarias en la era digital

Descripción del Articulo

This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used...

Descripción completa

Detalles Bibliográficos
Autores: Morillo Puente, Solbey, Ríos Hernández, Iván Neftalí
Formato: artículo
Fecha de Publicación:2022
Institución:Pontificia Universidad Católica del Perú
Repositorio:PUCP-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.pucp.edu.pe:20.500.14657/193461
Enlace del recurso:https://revistas.pucp.edu.pe/index.php/psicologia/article/view/24619/23371
https://repositorio.pucp.edu.pe/index/handle/123456789/193461
https://doi.org/10.18800/psico.202201.009
Nivel de acceso:acceso abierto
Materia:Cyber victimization
Routine activity theory
Exposure to motivated offender
Suitable target
Capable guardian
Victimisation cybernétique
Théorie des activités Rutinaires
Exposition à un délinquant motivé
objectif adéquat
gardian capable
Ciber-vitimização
Teoria de atividades rotineiras
Exposto a um criminoso motivado
objetivo adequado
guardião capaz
Cibervictimization
Teoría de actividades rutinarias
Exposición a un delincuente motivado
Objetivo adecuado
Guardián capaz
https://purl.org/pe-repo/ocde/ford#5.01.00
Descripción
Sumario:This quantitative-based research determined whether the routine activity theory influences cyber victimization. To measure the dimensions of the theory, defined as exposure to a motivated offender, suitable online target, and absence of a capable guardian, a valid and reliable questionnaire was used. The cyber victimization questionnaire developed by Álvarez-García, Dobarro, and Núñez was applied to 1,285 students selected at random from schools in Colombia. Findings: 46% are identified as exposed to a motivated offender, 37.5% are suitable online targets, and 29.8% have no capable guardians. The interdependence of these three elements revealed that 3.9% of students are at risk due to their routine activities, which had a significant influence on cyber victimization. It is proposed that these findings should be considered in the design of communicative and educational policies aimed at a responsible use of technologies.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).