{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T07:22:18Z","timestamp":1770448938325,"version":"3.49.0"},"reference-count":57,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cybersa.2017.8073391","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:19:08Z","timestamp":1508959148000},"page":"1-8","source":"Crossref","is-referenced-by-count":14,"title":["Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe"],"prefix":"10.1109","author":[{"given":"Marianne","family":"Junger","sequence":"first","affiliation":[]},{"given":"Lorena","family":"Montoya","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"Hartel","sequence":"additional","affiliation":[]},{"given":"Maliheh","family":"Heydari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518951"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.12.009"},{"key":"ref33","year":"2014","journal-title":"European Commission"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663749"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_16"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/01639625.2011.584050"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.23"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1177\/0022427811425539"},{"key":"ref35","article-title":"Special Eurobarometer 243. Europeans and their languages","year":"2006","journal-title":"European Commission"},{"key":"ref34","article-title":"Eurobarometer 58.2. The mental health status of the European population","year":"2003","journal-title":"The European Opinion Research Group"},{"key":"ref28","author":"grove","year":"2011","journal-title":"Repeat victimization"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1991.tb01067.x"},{"key":"ref29","article-title":"Preventing repeat victimization: A systematic review.","author":"grove","year":"2012","journal-title":"National Crime Prevention Council"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118517390.wbetc077"},{"key":"ref1","author":"wall","year":"2007","journal-title":"Cybercrime The Transformation of Crime in the Information Age"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/1043986213507401"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/a017405"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/01639625.2013.822209"},{"key":"ref24","year":"2014","journal-title":"Internet World Stats"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/14786011003634415"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/41.4.595"},{"key":"ref25","article-title":"Demographic characteristics and victimization risk: Testing the mediating effects of routine acivities","author":"bunch","year":"2012","journal-title":"Crime & Delinquency"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1086\/449115"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1998.tb01267.x"},{"key":"ref57","article-title":"Rational choice perspective","author":"cornish","year":"2008","journal-title":"Environmental Criminology and Crime Analysis"},{"key":"ref56","author":"seybert","year":"2013","journal-title":"Internet use statistics - individuals Statistics in Focus Industry Trade and Services"},{"key":"ref55","first-page":"45","article-title":"Offenders in a digitized society","author":"jansen","year":"2013","journal-title":"Cybercrime and the Police"},{"key":"ref54","author":"junger","year":"2013","journal-title":"Modus Operandi onderzoek naar door Informatie en Communicatie Technologie (ICT) gefaciliteerde criminaliteit (Modus Operandi study of Information and Communication Technology (ICT) facilitated crime"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/44.1.66"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1891\/0886-6708.7.2.91","article-title":"Conventional and delinquent activities: implications for the prevention of violent victimization among adolescents","volume":"7","author":"lauritsen","year":"1992","journal-title":"Violence and Victims"},{"key":"ref10","first-page":"481","article-title":"White collar crime: What it is and where it's going","volume":"28","author":"cliff","year":"2014","journal-title":"Notre Dame Journal of Law Ethics & Public Policy"},{"key":"ref11","article-title":"Opportunity makes the thief practical theory for crime prevention","author":"felson","year":"1998","journal-title":"Home Office"},{"key":"ref40","year":"2008","journal-title":"Payment News"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/9781118513217.ch21"},{"key":"ref13","first-page":"308","volume":"2","author":"choi","year":"2008","journal-title":"Computer crime victimization and integrated theory An empirical assessment International Journal of Cyber Criminology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/esr\/jcr053"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/01639620701876577"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/1043986213507402"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/0022427810365903"},{"key":"ref18","first-page":"306624","article-title":"The thief with a thousand faces and the victim with none identifying determinants for online identity theft victimization with routine activity theory","author":"reyns","year":"2015","journal-title":"International Journal of Offender Therapy and Comparative Criminology"},{"key":"ref19","author":"ngo","year":"2011","journal-title":"Cybercrime Victimization An examination of Individual and Situational level factors International Journal of Cyber Criminology 5"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.4324\/9781315777870","author":"holt","year":"2015","journal-title":"Cybercrime and digital forensics An introduction"},{"key":"ref3","article-title":"Convention on cybercrime","year":"2001","journal-title":"Council of Europe"},{"key":"ref6","article-title":"Fraud, the facts 2015","year":"2013","journal-title":"FFA"},{"key":"ref5","first-page":"52","article-title":"Cyberextortion: an overview of distributed denial of service attacks against online gaming companies","volume":"7","author":"paulson","year":"2006","journal-title":"Issues in Information Systems"},{"key":"ref8","first-page":"43","article-title":"Phishing, pharming and identity theft","volume":"11","author":"brody","year":"2007","journal-title":"Academy of Accounting and Financial Studies Journal"},{"key":"ref7","first-page":"3","volume":"1","author":"milletary","year":"2005","journal-title":"Technical Trends in Phishing Attacks"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijlcj.2011.05.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1086\/502670"},{"key":"ref46","author":"button","year":"2009","journal-title":"Fraud typologies and the victims of fraud Literature review"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2004.7.479"},{"key":"ref48","author":"button","year":"2009","journal-title":"Support for the victims of fraud an assessment of the current infrastructure in England and Wales"},{"key":"ref47","article-title":"The National Fraud Strategy. A new approach to combating fraud 2009-2011","year":"2009","journal-title":"National Fraud Authority"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"16","DOI":"10.5553\/TvV\/2010009004002","article-title":"Gekocht, maar niet gekregen: Slachtofferschap van online oplichting nader onderzocht","volume":"9","author":"wilsem","year":"2010","journal-title":"Tijdschrift voor Veiligheid"},{"key":"ref41","author":"taylor","year":"2006","journal-title":"Crime against businesses in two ethnically diverse communities"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2012.6207742"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0008"}],"event":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","location":"London, United Kingdom","start":{"date-parts":[[2017,6,19]]},"end":{"date-parts":[[2017,6,20]]}},"container-title":["2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055134\/8073382\/08073391.pdf?arnumber=8073391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T18:52:50Z","timestamp":1750963970000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8073391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2017.8073391","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}