{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:06:58Z","timestamp":1760058418022,"version":"build-2065373602"},"reference-count":35,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"],"award-info":[{"award-number":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"],"award-info":[{"award-number":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Philosophy and Social Science Planning Programme of Guangdong Province","award":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"],"award-info":[{"award-number":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"]}]},{"name":"Guangdong-Hong Kong-Macao Cultural and Tourism Research Base","award":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"],"award-info":[{"award-number":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"]}]},{"name":"Key Educational Reform Projects of Guangzhou Panyu Polytechnic","award":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"],"award-info":[{"award-number":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"]}]},{"name":"Guangzhou Research Base for Collaborative Cultivation of High-Level Technical and Skilled Talents","award":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"],"award-info":[{"award-number":["42171218","42101246","2023A1515011462","GD22CSH07","2023WZJD019","2022JG06","2022SK04"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJGI"],"abstract":"<jats:p>In recent years, there has been a sharp increase in the number of online fraud cases. However, research on crime geography has paid little attention to online crimes, especially to the influencing factors behind their spatial distributions. Online fraud is closely related to people\u2019s daily internet use. The existing literature has explored the impact of internet use on online crimes based on small samples of individual interviews. There is a lack of large-scale studies from a community perspective. This study applies the routine activity theory to online activities to test the relationship between online fraud alert data and the usage durations of different types of mobile phone users\u2019 applications (apps) for communities in ZG City. It builds negative binomial regression models for analyzing the impact of the usage of different types of apps on the spatial distribution of online fraud. The results reveal that the online fraud crime rate and the online time spent on a financial management app share the most similar spatial distribution. While financial management, online education, transportation, and search engine app usages have a significant positive association with online fraud, the use of a financial management app has the greatest impact. Additionally, time spent on social media, online shopping and entertainment, and mobile reading apps have a significant negative association with online fraud. As not all online activities lead to cybercrime, crime prevention efforts should target specific types of apps, such as financial management, online education, transportation, and search engines.<\/jats:p>","DOI":"10.3390\/ijgi14040151","type":"journal-article","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T03:24:58Z","timestamp":1743477898000},"page":"151","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Impact of Residents\u2019 Daily Internet Activities on the Spatial Distribution of Online Fraud: An Analysis Based on Mobile Phone Application Usage"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0090-7118","authenticated-orcid":false,"given":"Guangwen","family":"Song","sequence":"first","affiliation":[{"name":"Center of Geo-Informatics for Public Security, School of Geography and Remote Sensing, Guangzhou University, Guangzhou 510006, China"}]},{"given":"Jiajun","family":"Liang","sequence":"additional","affiliation":[{"name":"Center of Geo-Informatics for Public Security, School of Geography and Remote Sensing, Guangzhou University, Guangzhou 510006, China"}]},{"given":"Linlin","family":"Wu","sequence":"additional","affiliation":[{"name":"Center of Geo-Informatics for Public Security, School of Geography and Remote Sensing, Guangzhou University, Guangzhou 510006, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7202-3418","authenticated-orcid":false,"given":"Lin","family":"Liu","sequence":"additional","affiliation":[{"name":"Center of Geo-Informatics for Public Security, School of Geography and Remote Sensing, Guangzhou University, Guangzhou 510006, China"},{"name":"Department of Geography and GIS, University of Cincinnati, Cincinnati, OH 45221, USA"}]},{"given":"Chunxia","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Tourism and Business, Guangzhou Panyu Polytechnic, Guangzhou 511483, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,3,31]]},"reference":[{"key":"ref_1","unstructured":"China Internet Network Information Center (2024, March 28). The 47th Statistical Report on Internet Development in China, Available online: https:\/\/www.cnnic.com.cn\/."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Chen, S., Gao, C., Jiang, D., Hao, M., Ding, F., Ma, T., Zhang, S., and Li, S. (2021). The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in China. ISPRS Int. J. Geo-Inf., 10.","DOI":"10.3390\/ijgi10120802"},{"key":"ref_3","first-page":"88","article-title":"The Status Quo, Problems and Reflection of China\u2019s Urban Community Governance","volume":"14","author":"Yungui","year":"2021","journal-title":"J. Shanghai Adm. Inst."},{"key":"ref_4","first-page":"244","article-title":"Communities, Crime and Social Capital in Contemporary China","volume":"14","author":"Zhang","year":"2010","journal-title":"Theor. Criminol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s10708-010-9342-1","article-title":"Geographies of identity theft in the U.S.: Understanding spatial and demographic patterns, 2002\u20132006","volume":"75","author":"Lane","year":"2010","journal-title":"GeoJournal"},{"key":"ref_6","first-page":"1079","article-title":"Spatial-temporal Distribution Characteristics of Cyber Fraud in China on County Scale","volume":"41","author":"Xiang","year":"2021","journal-title":"Sci. Geogr. Sin."},{"key":"ref_7","first-page":"315","article-title":"The spatial-temporal distribution and influencing factors of fraud crime in ZG city, China","volume":"72","author":"Liu","year":"2017","journal-title":"Acta Geogr. Sinica."},{"key":"ref_8","unstructured":"Shaw, C.R., and McKay, H.D. (2006). Juvenile Delinquency and Urban Areas: A Study of Rates of Delinquents in Relation To differential Characteristics of Local Communities in American Cities, University of Chicago Press."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"588","DOI":"10.2307\/2094589","article-title":"Social Change and Crime Rate Trends: A Routine Activity Approach","volume":"44","author":"Cohen","year":"2006","journal-title":"Am. Sociol. Rev."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.habitatint.2018.04.010","article-title":"Theft from the person in urban China: Assessing the diurnal effects of opportunity and social ecology","volume":"78","author":"Song","year":"2018","journal-title":"Habitat Int."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1108\/13590790810882883","article-title":"Identity theft complaints: Exploring the state-level correlates","volume":"15","author":"Higgins","year":"2008","journal-title":"J. Financ. Crime"},{"key":"ref_12","first-page":"1218","article-title":"Gender Difference on Relative Probability of Non-contact Fraud in ZG City","volume":"38","author":"Zhang","year":"2018","journal-title":"Sci. Geogr. Sin."},{"key":"ref_13","unstructured":"360 Mobile Security, 360 Government & Enterprise Security Group, and Tianshu Zhiku (2024, March 28). China Mobile Security Status Report 2021. Available online: https:\/\/www.360.cn\/n\/12069.html."},{"key":"ref_14","first-page":"7","article-title":"Classifying common police problems: A routine activity approach","volume":"16","author":"Eck","year":"2003","journal-title":"Crime Prev. Stud."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1177\/0093854811421448","article-title":"Being Pursued Online: Applying Cyberlifestyle\u2013Routine Activities Theory to Cyberstalking Victimization","volume":"38","author":"Reyns","year":"2011","journal-title":"Crim. Justice Behav."},{"key":"ref_16","first-page":"400","article-title":"On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory","volume":"3","author":"Bossler","year":"2009","journal-title":"Int. J. Cyber Criminol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1177\/0022427810365903","article-title":"Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory","volume":"47","author":"Pratt","year":"2010","journal-title":"J. Res. Crime Delinq."},{"key":"ref_18","first-page":"773","article-title":"Cybercrime Victimization: An examination of Individual and Situational level factors","volume":"5","author":"Ngo","year":"2011","journal-title":"Int. J. Cyber Criminol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1177\/0022427811425539","article-title":"Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory beyond Direct-Contact Offenses","volume":"50","author":"Reyns","year":"2011","journal-title":"J. Res. Crime Delinq."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1080\/01639625.2015.1012409","article-title":"Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis","volume":"37","author":"Leukfeldt","year":"2016","journal-title":"Deviant Behav."},{"key":"ref_21","unstructured":"China Internet Network Information Center (2024, March 28). The 44th Statistical Report on Internet Development in China, Available online: http:\/\/www.cac.gov.cn\/2019-08\/30\/c_1124939590.htm?from=singlemessage."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1023\/A:1007521427059","article-title":"Poisson-Based Regression Analysis of Aggregate Crime Rates","volume":"16","author":"Osgood","year":"2000","journal-title":"J. Quant. Criminol."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.future.2019.03.041","article-title":"Consumer-facing technology fraud: Economics, attack methods and potential solutions","volume":"100","author":"Ali","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zhang, T., Zhang, H., and Gao, F. (2013, January 28\u201329). A Malicious Advertising Detection Scheme Based on the Depth of URL Strategy. Proceedings of the 2013 Sixth International Symposium on Computational Intelligence and Design 2013, Hangzhou, China.","DOI":"10.1109\/ISCID.2013.128"},{"key":"ref_25","unstructured":"Nelen, H., Ritzen, L., Will, S., Handelman, S., and Brotherton, D.C. (2012). How They Still Try to Get Away with It: Crime in the Dutch Real Estate Sector Before and After the Crisis. How They Got Away with It: White Collar Criminals and the Financial Meltdown, Columbia University Press."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1292","DOI":"10.1111\/joes.12294","article-title":"FINANCIAL FRAUD: A LITERATURE REVIEW","volume":"32","author":"Reurink","year":"2018","journal-title":"J. Econ. Surv."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Frankel, T. (2012). The Ponzi Scheme Puzzle: A History and Analysis of Con Artists and Victims, Oxford University Press. [1st ed.].","DOI":"10.1093\/acprof:osobl\/9780199926619.001.0001"},{"key":"ref_28","unstructured":"Markopolos, H. (2010). No One Would Listen: A True Financial Thriller, John Wiley & Sons."},{"key":"ref_29","unstructured":"Will, S., Handelman, S., and Brotherton, D.C. (2013). How They Got Away with It: White Collar Criminals and the Financial Meltdown, Columbia University Press."},{"key":"ref_30","unstructured":"Christian, E., Kamlesh, K., and Dennis, P. (2019). Financial Literacy and Fraud Detection. SSRN Electron. J., 26."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.chb.2019.06.007","article-title":"Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine activities theory with latent class analysis","volume":"100","author":"Choi","year":"2019","journal-title":"Comput. Hum. Behav."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/01639620701876577","article-title":"Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization","volume":"30","author":"Holt","year":"2008","journal-title":"Deviant Behav."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1080\/02732173.2012.628560","article-title":"Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences","volume":"32","author":"Navarro","year":"2012","journal-title":"Sociol. Spectr."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Nandhakumar, N.K., Binu, A., and Paul, V. (2013, January 29\u201331). Non Repudiation for Internet Access by Using Browser Based User Authentication Mechanism. Proceedings of the 2013 Third International Conference on Advances in Computing and Communications, Kochi, India.","DOI":"10.1109\/ICACC.2013.62"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s12103-018-9447-5","article-title":"Opportunity and Self-Control: Do they Predict Multiple Forms of Online Victimization?","volume":"44","author":"Reyns","year":"2019","journal-title":"Am. J. Crim. Justice"}],"container-title":["ISPRS International Journal of Geo-Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2220-9964\/14\/4\/151\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:06:47Z","timestamp":1760029607000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2220-9964\/14\/4\/151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":35,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["ijgi14040151"],"URL":"https:\/\/doi.org\/10.3390\/ijgi14040151","relation":{},"ISSN":["2220-9964"],"issn-type":[{"type":"electronic","value":"2220-9964"}],"subject":[],"published":{"date-parts":[[2025,3,31]]}}}