Understanding cyber victimization: digital architectures and the disinhibition effect
Autor/a
Agustina, José R.
Fecha de publicación
2015ISSN
0973-5089
Resumen
Researchers in the fields of sociology, psychology, behavioural sciences and law are trying to comprehend the radical rise of a new relational paradigm derived from the current proliferation of ICT. Crime dynamics and victimisation are not alien to the set of changes wrought by the digital era. The way in which victims behave in cyber space decisively elevates their risk of victimization. In connexion with this, the design of digital architectures notably increases criminal opportunities and facilitates cyber victimisation i.e. the defining traits of cyber space affect people’s daily lives and incline them to adopt riskier lifestyles. Based on Routine Activity Theory and Lifestyle Theory, along with the interesting work of Suler (2004), the present article shows the importance of victimological perspective in explaining cyber criminal events and designing prevention strategies. Stemming from literature review, this analysis will focus on describing a set of psychological and sociological traits that comprise the profile of victims and explaining how the surroundings influence one’s thoughts, desires, and actions.
Tipo de documento
Artículo
Versión del documento
Versión aceptada
Lengua
English
Materias (CDU)
343 - Derecho penal. Delitos
Palabras clave
Tecnologia de la informació
Víctimes
Delictes informàtics
Criminologia
Tecnologías de la información y de la comunicación
Víctimas
Delitos informáticos
Criminología
Information technology
Victims
Computer crimes
Criminology
Páginas
20
Publicado por
K. Jaishankar
Colección
9; 1
Publicado en
International Journal of Cyber Criminology
Citación
Agustina Sanllehí, Jose Ramón. Understanding cyber victimization: digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 2015, 9(1), p. 35-54. Disponible en: <https://zenodo.org/record/22239#.XuDqi6ZS_IV>. Fecha de acceso: 10 jun. 2020. DOI: 10.5281/zenodo.22239.
Este ítem aparece en la(s) siguiente(s) colección(ones)
- Dret [121]
Derechos
© 2015 International Journal of Cyber Criminology (IJCC). This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC-BY-NC-SA 4.0) LicenseUTH, Twhich permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission.
Excepto si se señala otra cosa, la licencia del ítem se describe como https://creativecommons.org/licenses/by-nc-sa/4.0/