Telecommunication and cyber fraud victimization among Chinese college students: An application of routine activity theory
Analyzing survey data from 1037 college students in China, a country with the world’s largest number of Internet users and the world’s largest e-commerce market, the current study demonstrates that consistent with previous research, some routine telecom/cyber activities of Chinese college students p...
Autor principal: | |
---|---|
Otros Autores: | ; |
Tipo de documento: | Electrónico Artículo |
Lenguaje: | Inglés |
Publicado: |
2025
|
En: |
Criminology & criminal justice
Año: 2025, Volumen: 25, Número: 3, Páginas: 717-735 |
Acceso en línea: |
Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Verificar disponibilidad: | HBZ Gateway |
Palabras clave: |
MARC
LEADER | 00000naa a22000002c 4500 | ||
---|---|---|---|
001 | 1929300506 | ||
003 | DE-627 | ||
005 | 20250628054812.0 | ||
007 | cr uuu---uuuuu | ||
008 | 250628s2025 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1177/17488958221146144 |2 doi | |
035 | |a (DE-627)1929300506 | ||
035 | |a (DE-599)KXP1929300506 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Lin, Kai |e VerfasserIn |4 aut | |
109 | |a Lin, Kai | ||
245 | 1 | 0 | |a Telecommunication and cyber fraud victimization among Chinese college students: An application of routine activity theory |
264 | 1 | |c 2025 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Analyzing survey data from 1037 college students in China, a country with the world’s largest number of Internet users and the world’s largest e-commerce market, the current study demonstrates that consistent with previous research, some routine telecom/cyber activities of Chinese college students predict higher odds of being targeted for telecom/cyber fraud, but online routines do not seem to predict the odds of completed victimization resulting in a financial loss. In contrast, the perceived presence of effective formal guardianship and target suitability exert a greater influence. These findings suggest that those previously and commonly used measures of routine activity theory are better suited for explaining attempted telecom/cyber fraud victimization, whereas completed victimization is chiefly predicted by target suitability such as risky/deviant online behaviors and low self-control. | ||
650 | 4 | |a Victimization | |
650 | 4 | |a routine activity | |
650 | 4 | |a Fraud | |
650 | 4 | |a cyber crime | |
650 | 4 | |a China | |
700 | 1 | |a Wu, Yuning |e VerfasserIn |0 (DE-588)1162500638 |0 (DE-627)1026595711 |0 (DE-576)507432940 |4 aut | |
700 | 1 | |a Sun, Ivan Y. |e VerfasserIn |0 (DE-588)1051690463 |0 (DE-627)786593059 |0 (DE-576)304613207 |4 aut | |
700 | 1 | |a Lin, Kai |e VerfasserIn |0 (DE-588)1313646199 |0 (DE-627)1876242213 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Criminology & criminal justice |d London [u.a.] : Sage, 2006 |g 25(2025), 3, Seite 717-735 |h Online-Ressource |w (DE-627)337806837 |w (DE-600)2063005-0 |w (DE-576)096290994 |x 1748-8966 |7 nnas |
773 | 1 | 8 | |g volume:25 |g year:2025 |g number:3 |g pages:717-735 |
856 | 4 | 0 | |u https://doi.org/10.1177/17488958221146144 |x Resolving-System |z lizenzpflichtig |3 Volltext |
935 | |a mkri | ||
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4739404893 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1929300506 | ||
LOK | |0 005 20250628043607 | ||
LOK | |0 008 250628||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)KrimDok#2025-06-27#AA0E9E9DDA433253CC4CE16A2B63B7AD28F4E4E9 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a zota | ||
ORI | |a WA-MARC-krimdoka001.raw |