{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T02:12:46Z","timestamp":1777601566197,"version":"3.51.4"},"reference-count":62,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T00:00:00Z","timestamp":1739404800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T00:00:00Z","timestamp":1739404800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["European Journal of Criminology"],"published-print":{"date-parts":[[2025,7]]},"abstract":"<jats:p>\n                    Fear of crime is a hot topic in the criminological field, yet differentiation between fears associated with various types of cybercrimes remains underexplored. This study (\n                    <jats:italic toggle=\"yes\">N<\/jats:italic>\n                    \u2009=\u2009726) conducted in the Portuguese context via an online survey investigates the distinct determinants of fear for two main categories of cybercrime: interpersonal (cyberbullying and cyberstalking) and property-related (online consumer fraud, identity theft, and malware discovery). The findings reveal that while offline fears strongly predict both types of cybercrime fears, the specific variables influencing them differ significantly. Property cybercrime fear is primarily driven by economic insecurity, while interpersonal cybercrime fear is less influenced by socioeconomic factors and more by the fear of offline interpersonal crimes. Additionally, the study highlights that traditional factors from Routine Activity Theory, such as capable guardianship and target suitability, play a minimal role in explaining the variance in cybercrime fears. These insights not only contribute to our understanding of the multifaceted nature of cybercrime fears but also underscore the need for tailored preventative strategies that address the unique drivers of each type of fear.\n                  <\/jats:p>","DOI":"10.1177\/14773708241312820","type":"journal-article","created":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T01:39:56Z","timestamp":1739497196000},"page":"578-602","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["Explaining fear of cybercrime: A focus on interpersonal and property cybercrime differences"],"prefix":"10.1177","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4804-9394","authenticated-orcid":false,"given":"In\u00eas Sousa","family":"Guedes","sequence":"first","affiliation":[{"name":"University of Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9453-1608","authenticated-orcid":false,"given":"Jos\u00e9","family":"Martins","sequence":"additional","affiliation":[{"name":"University of Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6873-492X","authenticated-orcid":false,"given":"Samuel","family":"Moreira","sequence":"additional","affiliation":[{"name":"University of Porto, Portugal"},{"name":"University Lus\u00edada, Portugal"}]}],"member":"179","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260521997433"},{"key":"e_1_3_2_3_1","volume-title":"Cyber-Crime Fear and Victimization: An Analysis of a National Survey","author":"Al-Shalan A","year":"2006","unstructured":"Al-Shalan A (2006) Cyber-Crime Fear and Victimization: An Analysis of a National Survey. Mississippi State University."},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.107082"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1477370819839619"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/0735648X.2011.631399"},{"issue":"1","key":"e_1_3_2_7_1","first-page":"308","article-title":"Computer crime victimization and integrated theory: An empirical assessment","volume":"2","author":"Choi K","year":"2008","unstructured":"Choi K (2008) Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology 2(1): 308\u2013333.","journal-title":"International Journal of Cyber Criminology"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/10439862211001627"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/0306624X14551257"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azac021"},{"key":"e_1_3_2_12_1","first-page":"1","article-title":"The reporting experiences and support needs of victims of online fraud","volume":"518","author":"Cross C","year":"2016","unstructured":"Cross C, Richards K, Smith RG (2016) The reporting experiences and support needs of victims of online fraud. Trends and Issues in Crime and Criminal Justice 518: 1\u201314.","journal-title":"Trends and Issues in Crime and Criminal Justice"},{"key":"e_1_3_2_13_1","unstructured":"European Commission (2020) Special Eurobarometer 499: Europeans\u2019 attitudes towards cyber security (report). Available at: https:\/\/data.europa.eu\/data\/datasets\/s2249_92_2_499_eng?locale=en."},{"key":"e_1_3_2_14_1","volume-title":"Fear of Crime: Interpreting the Victimization Risk","author":"Ferraro K","year":"1995","unstructured":"Ferraro K (1995) Fear of Crime: Interpreting the Victimization Risk. New York: University of New York Press."},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-682X.1987.tb01181.x"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/00111287221096374"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/43.3.600"},{"key":"e_1_3_2_18_1","doi-asserted-by":"crossref","unstructured":"Garcia E Francisco JP Caliso RAC (2017) Reassessing fear of crime: The role of broad insecurities. RSN-PCC Working Paper No. 17-001. Available at SSRN: https:\/\/ssrn.com\/abstract=2895837 or http:\/\/dx.doi.org\/10.2139\/ssrn.2895837.","DOI":"10.2139\/ssrn.2895837"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/1477370808090834"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/1477370817749500"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41284-022-00350-5"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/026975809600400201"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/1477370812474545"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986213507403"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/15564886.2022.2053256"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2014.10.001"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/1057567712475307"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986213507401"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022427810395146"},{"key":"e_1_3_2_30_1","doi-asserted-by":"crossref","unstructured":"Jansen J Kop N Stol W (2017) Internetbankieren: Veiligheidspercepties van gebruikers. Tijdschrift voor Veiligheid 16(1): 36\u201351.","DOI":"10.5553\/TvV\/187279482017016001003"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.2478\/orga-2018-0007"},{"key":"e_1_3_2_32_1","first-page":"157","article-title":"Malware attacks: Dimensions, impact, and defenses","author":"Kumar A","year":"2021","unstructured":"Kumar A, Choi BJ, Kuppusamy KS, et al. (2021) Malware attacks: Dimensions, impact, and defenses. In: Advances in Nature-Inspired Cyber Security and Resilience. Cham: Springer International Publishing, 157\u2013179.","journal-title":"In: Advances in Nature-Inspired Cyber Security and Resilience. Cham: Springer International Publishing"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/07418825.2011.574642"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/1478601X.2023.2254099"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.52306\/02020219SVZL9707"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/01639625.2015.1012409"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/2579577"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/00111287231180108"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/01639620903004903"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/016396200266379"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/026975800701400304"},{"issue":"1","key":"e_1_3_2_42_1","first-page":"773","article-title":"Cybercrime victimization: An examination of individual and situational level factors","volume":"5","author":"Ngo FT","year":"2011","unstructured":"Ngo FT, Paternoster R (2011) Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology 5(1): 773\u2013793.","journal-title":"International Journal of Cyber Criminology"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.52306\/04020421TERZ5728"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11205-013-0489-2"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10610-015-9285-7"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.03.039"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcrimjus.2012.02.003"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2013.22"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093854808329405"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022427811425539"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/0306624X15572861"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/13218719.2012.672275"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcrimjus.2006.03.003"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/0735648X.2023.2222719"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/13218719.2017.1315785"},{"issue":"6","key":"e_1_3_2_57_1","first-page":"81","article-title":"Fear of victimization: Why are women and the elderly more afraid?","volume":"65","author":"Warr M","year":"1984","unstructured":"Warr M (1984) Fear of victimization: Why are women and the elderly more afraid? Social Science Quarterly 65(6): 81\u2013702.","journal-title":"Social Science Quarterly"},{"key":"e_1_3_2_58_1","first-page":"451","article-title":"Fear of crime in the United States: Avenues for research and policy","volume":"4","author":"Warr M","year":"2000","unstructured":"Warr M (2000) Fear of crime in the United States: Avenues for research and policy. Measurement and Analysis of Crime and Justice 4: 451\u2013489.","journal-title":"Measurement and Analysis of Crime and Justice"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2017.0652"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azv011"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986213507402"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/147737080556056"},{"issue":"1","key":"e_1_3_2_63_1","first-page":"36","article-title":"Fear of cybercrime among college students in the United States: An exploratory study","volume":"8","author":"Yu S","year":"2014","unstructured":"Yu S (2014) Fear of cybercrime among college students in the United States: An exploratory study. International Journal of Cyber Criminology 8(1): 36\u201346.","journal-title":"International Journal of Cyber Criminology"}],"container-title":["European Journal of Criminology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14773708241312820","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14773708241312820","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14773708241312820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T20:55:56Z","timestamp":1777409756000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14773708241312820"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,13]]},"references-count":62,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["10.1177\/14773708241312820"],"URL":"https:\/\/doi.org\/10.1177\/14773708241312820","relation":{},"ISSN":["1477-3708","1741-2609"],"issn-type":[{"value":"1477-3708","type":"print"},{"value":"1741-2609","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,13]]}}}