Cargando…
Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization
(1) Background: This paper combines lifestyle-routine activities (L-RAT) and self-control (SCT) theories along with the literature on smartphone addiction in a joint model that addresses the multiple vulnerabilities that make the smartphone user a potential victim of cybercrime. This model, which we...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8038488/ https://www.ncbi.nlm.nih.gov/pubmed/33916541 http://dx.doi.org/10.3390/ijerph18073763 |
_version_ | 1783677387027775488 |
---|---|
author | Herrero, Juan Torres, Andrea Vivas, Pep Hidalgo, Antonio Rodríguez, Francisco J. Urueña, Alberto |
author_facet | Herrero, Juan Torres, Andrea Vivas, Pep Hidalgo, Antonio Rodríguez, Francisco J. Urueña, Alberto |
author_sort | Herrero, Juan |
collection | PubMed |
description | (1) Background: This paper combines lifestyle-routine activities (L-RAT) and self-control (SCT) theories along with the literature on smartphone addiction in a joint model that addresses the multiple vulnerabilities that make the smartphone user a potential victim of cybercrime. This model, which we call the dual vulnerability model of cybercrime victimization, was subjected to empirical testing on a nationally representative sample of smartphone users. (2) Methods: Data from 2837 participants from a nationally representative sample of Spanish smartphone users were modeled using Mplus causal modeling software. (3) Results: The results of the study confirm the predictions of L-RAT and SCT in explaining cybercrime victimization (higher cybercrime victimization under conditions of high exposure, proximity, and suitability, relative absence of capable guardian, and low self-control). A significant effect of smartphone addiction on cybercrime victimization was also observed above and beyond L-RAT and SCT predictors. (4) Conclusions: The potential victim of cybercrime presents a double vulnerability, on the one hand, those identified by criminological theories such as L-RAT and SCT, and on the other hand, those derived from the deregulated-addicted use of the Internet access device (smartphone in our work). |
format | Online Article Text |
id | pubmed-8038488 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-80384882021-04-12 Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization Herrero, Juan Torres, Andrea Vivas, Pep Hidalgo, Antonio Rodríguez, Francisco J. Urueña, Alberto Int J Environ Res Public Health Article (1) Background: This paper combines lifestyle-routine activities (L-RAT) and self-control (SCT) theories along with the literature on smartphone addiction in a joint model that addresses the multiple vulnerabilities that make the smartphone user a potential victim of cybercrime. This model, which we call the dual vulnerability model of cybercrime victimization, was subjected to empirical testing on a nationally representative sample of smartphone users. (2) Methods: Data from 2837 participants from a nationally representative sample of Spanish smartphone users were modeled using Mplus causal modeling software. (3) Results: The results of the study confirm the predictions of L-RAT and SCT in explaining cybercrime victimization (higher cybercrime victimization under conditions of high exposure, proximity, and suitability, relative absence of capable guardian, and low self-control). A significant effect of smartphone addiction on cybercrime victimization was also observed above and beyond L-RAT and SCT predictors. (4) Conclusions: The potential victim of cybercrime presents a double vulnerability, on the one hand, those identified by criminological theories such as L-RAT and SCT, and on the other hand, those derived from the deregulated-addicted use of the Internet access device (smartphone in our work). MDPI 2021-04-04 /pmc/articles/PMC8038488/ /pubmed/33916541 http://dx.doi.org/10.3390/ijerph18073763 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Herrero, Juan Torres, Andrea Vivas, Pep Hidalgo, Antonio Rodríguez, Francisco J. Urueña, Alberto Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization |
title | Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization |
title_full | Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization |
title_fullStr | Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization |
title_full_unstemmed | Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization |
title_short | Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization |
title_sort | smartphone addiction and cybercrime victimization in the context of lifestyles routine activities and self-control theories: the user’s dual vulnerability model of cybercrime victimization |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8038488/ https://www.ncbi.nlm.nih.gov/pubmed/33916541 http://dx.doi.org/10.3390/ijerph18073763 |
work_keys_str_mv | AT herrerojuan smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization AT torresandrea smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization AT vivaspep smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization AT hidalgoantonio smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization AT rodriguezfranciscoj smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization AT uruenaalberto smartphoneaddictionandcybercrimevictimizationinthecontextoflifestylesroutineactivitiesandselfcontroltheoriestheusersdualvulnerabilitymodelofcybercrimevictimization |