CRIM 218 Lecture Notes - Lecture 4: Routine Activity Theory, Logistic Regression, Email Fraud

64 views8 pages

Document Summary

Perpetrators of fraud have been making increasing use of the internet, to reach a larger pool of potential victims (called suitable targets in routine activity theory). At the time of the article, two-thirds of american adults with online access were making online purchases. In countries with high densities of internet access, it was estimated that one-quarter to one- fth of incidents of general consumer fraud were initiated via the internet or email (van wilsem, 2013). Phishing alone costs the us . 6 billion a year (kirgel, 2012). Today"s reading focusses on the bought it but never got it phenomenon, as it applies to online shopping. Utilizes cohen and felson"s routine activity theory and gottfredson and hirshi"s low self-control theory. 2008 sample of 6,373 dutch respondents who used a computer and/or the internet. 2. 5% indicated they had been a victim of internet consumer fraud in the preceding year.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers