CRIM 218 Lecture Notes - Lecture 4: Routine Activity Theory, Logistic Regression, Email Fraud
Document Summary
Perpetrators of fraud have been making increasing use of the internet, to reach a larger pool of potential victims (called suitable targets in routine activity theory). At the time of the article, two-thirds of american adults with online access were making online purchases. In countries with high densities of internet access, it was estimated that one-quarter to one- fth of incidents of general consumer fraud were initiated via the internet or email (van wilsem, 2013). Phishing alone costs the us . 6 billion a year (kirgel, 2012). Today"s reading focusses on the bought it but never got it phenomenon, as it applies to online shopping. Utilizes cohen and felson"s routine activity theory and gottfredson and hirshi"s low self-control theory. 2008 sample of 6,373 dutch respondents who used a computer and/or the internet. 2. 5% indicated they had been a victim of internet consumer fraud in the preceding year.