Cargando…

Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization

(1) Background: This paper combines lifestyle-routine activities (L-RAT) and self-control (SCT) theories along with the literature on smartphone addiction in a joint model that addresses the multiple vulnerabilities that make the smartphone user a potential victim of cybercrime. This model, which we...

Descripción completa

Detalles Bibliográficos
Autores principales: Herrero, Juan, Torres, Andrea, Vivas, Pep, Hidalgo, Antonio, Rodríguez, Francisco J., Urueña, Alberto
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8038488/
https://www.ncbi.nlm.nih.gov/pubmed/33916541
http://dx.doi.org/10.3390/ijerph18073763
_version_ 1783677387027775488
author Herrero, Juan
Torres, Andrea
Vivas, Pep
Hidalgo, Antonio
Rodríguez, Francisco J.
Urueña, Alberto
author_facet Herrero, Juan
Torres, Andrea
Vivas, Pep
Hidalgo, Antonio
Rodríguez, Francisco J.
Urueña, Alberto
author_sort Herrero, Juan
collection PubMed
description (1) Background: This paper combines lifestyle-routine activities (L-RAT) and self-control (SCT) theories along with the literature on smartphone addiction in a joint model that addresses the multiple vulnerabilities that make the smartphone user a potential victim of cybercrime. This model, which we call the dual vulnerability model of cybercrime victimization, was subjected to empirical testing on a nationally representative sample of smartphone users. (2) Methods: Data from 2837 participants from a nationally representative sample of Spanish smartphone users were modeled using Mplus causal modeling software. (3) Results: The results of the study confirm the predictions of L-RAT and SCT in explaining cybercrime victimization (higher cybercrime victimization under conditions of high exposure, proximity, and suitability, relative absence of capable guardian, and low self-control). A significant effect of smartphone addiction on cybercrime victimization was also observed above and beyond L-RAT and SCT predictors. (4) Conclusions: The potential victim of cybercrime presents a double vulnerability, on the one hand, those identified by criminological theories such as L-RAT and SCT, and on the other hand, those derived from the deregulated-addicted use of the Internet access device (smartphone in our work).
format Online
Article
Text
id pubmed-8038488
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-80384882021-04-12 Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization Herrero, Juan Torres, Andrea Vivas, Pep Hidalgo, Antonio Rodríguez, Francisco J. Urueña, Alberto Int J Environ Res Public Health Article (1) Background: This paper combines lifestyle-routine activities (L-RAT) and self-control (SCT) theories along with the literature on smartphone addiction in a joint model that addresses the multiple vulnerabilities that make the smartphone user a potential victim of cybercrime. This model, which we call the dual vulnerability model of cybercrime victimization, was subjected to empirical testing on a nationally representative sample of smartphone users. (2) Methods: Data from 2837 participants from a nationally representative sample of Spanish smartphone users were modeled using Mplus causal modeling software. (3) Results: The results of the study confirm the predictions of L-RAT and SCT in explaining cybercrime victimization (higher cybercrime victimization under conditions of high exposure, proximity, and suitability, relative absence of capable guardian, and low self-control). A significant effect of smartphone addiction on cybercrime victimization was also observed above and beyond L-RAT and SCT predictors. (4) Conclusions: The potential victim of cybercrime presents a double vulnerability, on the one hand, those identified by criminological theories such as L-RAT and SCT, and on the other hand, those derived from the deregulated-addicted use of the Internet access device (smartphone in our work). MDPI 2021-04-04 /pmc/articles/PMC8038488/ /pubmed/33916541 http://dx.doi.org/10.3390/ijerph18073763 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Herrero, Juan
Torres, Andrea
Vivas, Pep
Hidalgo, Antonio
Rodríguez, Francisco J.
Urueña, Alberto
Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization
title Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization
title_full Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization
title_fullStr Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization
title_full_unstemmed Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization
title_short Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization
title_sort smartphone addiction and cybercrime victimization in the context of lifestyles routine activities and self-control theories: the user’s dual vulnerability model of cybercrime victimization
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8038488/
https://www.ncbi.nlm.nih.gov/pubmed/33916541
http://dx.doi.org/10.3390/ijerph18073763
work_keys_str_mv AT herrerojuan smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization
AT torresandrea smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization
AT vivaspep smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization
AT hidalgoantonio smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization
AT rodriguezfranciscoj smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization
AT uruenaalberto smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization