Understanding cyber victimization: digital architectures and the disinhibition effect
Author
Agustina, José R.
Publication date
2015ISSN
0973-5089
Abstract
Researchers in the fields of sociology, psychology, behavioural sciences and law are trying to comprehend the radical rise of a new relational paradigm derived from the current proliferation of ICT. Crime dynamics and victimisation are not alien to the set of changes wrought by the digital era. The way in which victims behave in cyber space decisively elevates their risk of victimization. In connexion with this, the design of digital architectures notably increases criminal opportunities and facilitates cyber victimisation i.e. the defining traits of cyber space affect people’s daily lives and incline them to adopt riskier lifestyles. Based on Routine Activity Theory and Lifestyle Theory, along with the interesting work of Suler (2004), the present article shows the importance of victimological perspective in explaining cyber criminal events and designing prevention strategies. Stemming from literature review, this analysis will focus on describing a set of psychological and sociological traits that comprise the profile of victims and explaining how the surroundings influence one’s thoughts, desires, and actions.
Document Type
Article
Document version
Accepted version
Language
English
Subject (CDU)
343 - Dret penal. Delictes
Keywords
Tecnologia de la informació
Víctimes
Delictes informàtics
Criminologia
Tecnologías de la información y de la comunicación
Víctimas
Delitos informáticos
Criminología
Information technology
Victims
Computer crimes
Criminology
Pages
20
Publisher
K. Jaishankar
Collection
9;1
Is part of
International Journal of Cyber Criminology
Citation
Agustina Sanllehí, Jose Ramón. Understanding cyber victimization: digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 2015, 9(1), p. 35-54. Disponible en: <https://zenodo.org/record/22239#.XuDqi6ZS_IV>. Fecha de acceso: 10 jun. 2020. DOI: 10.5281/zenodo.22239.
This item appears in the following Collection(s)
- Dret [112]
Rights
© 2015 International Journal of Cyber Criminology (IJCC). This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC-BY-NC-SA 4.0) LicenseUTH, Twhich permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission.
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by-nc-sa/4.0/