{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:23:37Z","timestamp":1764174217394,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,1,13]],"date-time":"2016-01-13T00:00:00Z","timestamp":1452643200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10586-015-0519-8","type":"journal-article","created":{"date-parts":[[2016,1,13]],"date-time":"2016-01-13T05:43:28Z","timestamp":1452663808000},"page":"369-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Demographic variables and risk factors in computer-crime: an empirical assessment"],"prefix":"10.1007","volume":"19","author":[{"given":"Kyung-shick","family":"Choi","sequence":"first","affiliation":[]},{"given":"Kyungseok","family":"Choo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0047-4532","authenticated-orcid":false,"given":"Yong-eun","family":"Sung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,13]]},"reference":[{"key":"519_CR1","doi-asserted-by":"crossref","unstructured":"Bernburg, J.G., Thorlindsson, T.: Routine activities in social context: a closer look at the role of opportunity in deviant behavior. Justice Q. 18(3), 543\u2013567 (2001)","DOI":"10.1080\/07418820100095011"},{"key":"519_CR2","doi-asserted-by":"crossref","unstructured":"Castells, M.: The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford University Press, New York (2002)","DOI":"10.1093\/acprof:oso\/9780199255771.001.0001"},{"issue":"1","key":"519_CR3","first-page":"308","volume":"2","author":"K Choi","year":"2008","unstructured":"Choi, K.: An empirical assessment of an integrated theory of computer crime victimization. Int. J. Cyber Criminol. 2(1), 308\u2013333 (2008)","journal-title":"Int. J. Cyber Criminol."},{"issue":"1","key":"519_CR4","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1177\/002242788101800107","volume":"18","author":"LE Cohen","year":"1981","unstructured":"Cohen, L.E., Cantor, D.: Residential burglary in the United States: life-style and demographic factors associated with the probability of victimization. J. Res. Crime Delinq. 18(1), 113\u2013127 (1981)","journal-title":"J. Res. Crime Delinq."},{"key":"519_CR5","doi-asserted-by":"crossref","first-page":"588","DOI":"10.2307\/2094589","volume":"44","author":"LE Cohen","year":"1979","unstructured":"Cohen, L.E., Felson, M.: Social change and crime rate trends: a routine activity approach. Am. Sociol. Rev. 44, 588\u2013608 (1979)","journal-title":"Am. Sociol. Rev."},{"key":"519_CR6","volume-title":"Criminological Theory: Past to Present","author":"FT Cullen","year":"2006","unstructured":"Cullen, F.T., Agnew, R.: Criminological Theory: Past to Present, 3rd edn. Roxbury Publishing Company, Los Angeles (2006)","edition":"3"},{"key":"519_CR7","first-page":"23","volume-title":"Positive Criminology","author":"J Garofalo","year":"1987","unstructured":"Garofalo, J.: Reassessing the lifestyle model of criminal victimization. In: Gottfredson, M., Hirschi, T. (eds.) Positive Criminology, pp. 23\u201342. Sage, Newbury Park (1987)"},{"key":"519_CR8","volume-title":"Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization","author":"MJ Hidelang","year":"1978","unstructured":"Hidelang, M.J., Gottfredson, M.R., Gaffalo, J.: Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization. Ballinger, Cambridge (1978)"},{"key":"519_CR9","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1111\/j.1745-9125.1990.tb01321.x","volume":"28","author":"LW Kennedy","year":"1990","unstructured":"Kennedy, L.W., Forde, D.R.: Routine activities and crime: an analysis of victimization in Canada. Criminology 28, 137\u2013151 (1990)","journal-title":"Criminology"},{"issue":"5","key":"519_CR10","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1080\/15614260701764298","volume":"8","author":"JL McMullan","year":"2007","unstructured":"McMullan, J.L., Perrier, D.C.: Controlling cyber-crime and gambling: problems and paradoxes in the mediation of law and criminal organization. Police Pract. Res. 8(5), 431\u2013444 (2007)","journal-title":"Police Pract. Res."},{"key":"519_CR11","volume-title":"Understanding and Managing Cybercrime","author":"SC McQuade","year":"2006","unstructured":"McQuade, S.C.: Understanding and Managing Cybercrime. Pearson Education Inc., Upper Saddle River (2006)"},{"key":"519_CR12","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1086\/449218","volume":"17","author":"R Meier","year":"1993","unstructured":"Meier, R., Miethe, T.: Understanding theories of criminal victimization. Crime Justice 17, 459\u2013499 (1993)","journal-title":"Crime Justice"},{"issue":"2","key":"519_CR13","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1093\/swr\/33.2.107","volume":"33","author":"F Mishna","year":"2009","unstructured":"Mishna, F., McLuckie, A., Saint, M.: Real-world dangers in an online reality: examining online relationships and cyber abuse. Soc. Work Res. 33(2), 107\u2013118 (2009)","journal-title":"Soc. Work Res."},{"issue":"4","key":"519_CR14","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1177\/0306624X11433784","volume":"57","author":"B Moon","year":"2012","unstructured":"Moon, B., McCluskey, J.D., McCluskey, C.P., Lee, S.: Gender, general theory of crime and computer crime: an empirical test. Int. J. Offender Ther. Comp. Criminol. 57(4), 460\u2013478 (2012)","journal-title":"Int. J. Offender Ther. Comp. Criminol."},{"key":"519_CR15","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1111\/j.1745-9125.1998.tb01267.x","volume":"36","author":"E Mustaine","year":"1998","unstructured":"Mustaine, E., Tewksbury, R.: Predicting risks of larceny theft victimization: a routine activity analysis using refined lifestyle measures. Criminology 36, 829\u2013857 (1998)","journal-title":"Criminology"},{"key":"519_CR16","unstructured":"Piazza, P.: Technofile: antisocial networking sites. Secur. Manag. 1\u20135 (2006)"},{"issue":"2","key":"519_CR17","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1177\/0022427890027002002","volume":"27","author":"RJ Sampson","year":"1990","unstructured":"Sampson, R.J., Lauritsen, J.L.: Deviant lifestyles, proximity to crime, and the offender-victim link in personal violence. J. Res. Crime Delinq. 27(2), 110\u2013139 (1990)","journal-title":"J. Res. Crime Delinq."},{"key":"519_CR18","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/BF01066837","volume":"3","author":"RJ Sampson","year":"1987","unstructured":"Sampson, R.J., Wooldridge, J.D.: Linking the micro-and macro-level dimension of lifestyle-routine activity and opportunity models of predatory victimization. J. Quan. Criminol. 3, 371\u2013391 (1987)","journal-title":"J. Quan. Criminol."},{"issue":"9","key":"519_CR19","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1177\/1077801212461429","volume":"18","author":"SC Swan","year":"2012","unstructured":"Swan, S.C., Gambone, L.J., Horn, M.L., Snow, D.L., Sullivan, T.P.: Factor structures for aggression and victimization among women who used aggression against male. Partn. Violence Against Women 18(9), 1045\u20131066 (2012)","journal-title":"Partn. Violence Against Women"},{"issue":"4","key":"519_CR20","first-page":"233","volume":"14","author":"S Tak","year":"2007","unstructured":"Tak, S., Park, Y., Kim, U.: Cyber delinquency of high school students focusing on human relationship, psychological and behavior characteristics. J. Juv. Study 14(4), 233\u2013258 (2007)","journal-title":"J. Juv. Study"},{"key":"519_CR21","volume-title":"Digital Crime and Digital Terrorism","author":"RW Taylor","year":"2011","unstructured":"Taylor, R.W., Eric, J.F., Liederbach, F., Holt, T.J.: Digital Crime and Digital Terrorism, 2nd edn. Pearson Education Inc., Upper Saddle River (2011)","edition":"2"},{"key":"519_CR22","unstructured":"2005 FBI Computer Crime Survey (2006). http:\/\/www.fbi.gov\/publications\/ccs2005.pdf (2006). Accessed 19 Feb 2013"},{"key":"519_CR23","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1177\/147737080556056","volume":"2","author":"M Yar","year":"2005","unstructured":"Yar, M.: The novelty of \u2018cybercrime\u2019: an assessment in light of routine activity theory. Eur. Soc. Criminol. 2, 407\u2013427 (2005)","journal-title":"Eur. Soc. Criminol."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0519-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-015-0519-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0519-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T07:37:45Z","timestamp":1559288265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-015-0519-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,13]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["519"],"URL":"https:\/\/doi.org\/10.1007\/s10586-015-0519-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2016,1,13]]}}}