Skip to main content
Log in

Preventing crime online: Identifying determinants of online preventive behaviors using structural equation modeling and canonical correlation analysis

  • Original Article
  • Published:
Crime Prevention and Community Safety Aims and scope

Abstract

The purpose of the present research was to identify determinants of online crime prevention behaviors by examining the relationships between online victimization, online exposure, online communication behaviors and online prevention within an opportunity framework. Utilizing a large national sample of residents of Canada from the General Social Survey, structural equation modeling and canonical correlation analysis were used to assess the effects of opportunity-based routines upon preventive behaviors as well as the effects of individual elements of each construct on the relationship between the constructs. Results from the structural equation models indicate that there is a positive and significant relationship between online victimization and the adoption of online preventative routines, while the canonical correlation analyses suggest that these relationships are complex and that specific types of victimization are related to particular prevention efforts. The present research provides early evidence that online lifestyles influence the theorized cycle of online victimization and preventative efforts. We find that indicators of online exposure and communications routines were positive predictors of online victimization, and that online victimization is positively associated with taking precautionary measures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1

Similar content being viewed by others

Notes

  1. For example, if a relationship between the construct’s ‘exposure’ and ‘victimization’ were established, each individual item used to build ‘exposure’ may have a unique impact on the higher order relationship between ‘exposure’ and ‘victimization.’ The resulting information may help guide future research by identifying particularly impactful behaviors.

  2. The number of email users in the sample was so great that little variability existed that would benefit CCA.

  3. ‘Canonical correlation analysis can accommodate any metric variable without the strict assumption of normality. However, normality is desirable because it allows for the highest correlation among the variables. Indeed, canonical correlation analysis can accommodate non-normal variables if the distributional form (e.g., highly skewed) does not decrease the correlation with other variables. This allows for transformed non-metric data (in the form of dummy variables) to be used as well … Thus, although normality is not strictly require, it is highly recommended that all variables be evaluated for normality and transformed if possible’ (Hair et al, 2010, p. 15).

References

  • Bollen, K.A. and Barb, K.H. (1981) Person’s R and coarsely categorized measures. American Sociological Review 46 (2): 232–239.

    Article  Google Scholar 

  • Bossler, A.M. and Holt, T.J. (2009) On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology 3 (1): 400–420.

    Google Scholar 

  • Bossler, A.M. and Holt, T.J. (2010) The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice 38 (3): 227–236.

    Article  Google Scholar 

  • Bossler, A.M., Holt, T.J. and May, D.C. (2012) Predicting online harassment victimization among a juvenile population. Youth and Society 44 (4): 500–523.

    Article  Google Scholar 

  • Choi, K. (2008) Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology 2 (1): 308–333.

    Google Scholar 

  • Clarke, R.V. (1995) Situational crime prevention. Crime and Justice 19: 91–150.

    Article  Google Scholar 

  • Cohen, L.E. and Felson, M. (1979) Social change and crime rate trends: A routine activity approach. American Sociological Review 44 (4): 588–608.

    Article  Google Scholar 

  • Cook, P.J. (1986) The demand and supply of criminal opportunities. Crime and Justice 7: 1–27.

    Article  Google Scholar 

  • Cornish, D.B. and Clarke, R.V. (2003) Opportunities, precipitators and criminal decisions: A reply to wortley’s critique of situational crime prevention. Crime Prevention Studies 16: 41–96.

    Google Scholar 

  • Dinev, T., Hart, P. and Mullen, M.R. (2008) Internet privacy concerns and beliefs about government surveillance – An empirical investigation. Strategic Information Systems 17 (3): 214–233.

    Article  Google Scholar 

  • Ekblom, P. (1999) Can we make crime prevention adaptive by learning from other evolutionary struggles? Studies on Crime and Crime Prevention 8: 27–51.

    Google Scholar 

  • Farrell, G. (1995) Preventing repeat victimization. Crime and Justice 19: 469–534.

    Article  Google Scholar 

  • Fattah, E.A. (2000) Victimology: Past, present and future. Criminologie 33 (1): 17–46.

    Article  Google Scholar 

  • Felson, M. and Boba, R. (2010) Crime and Everyday Life. Thousand Oaks, CA: Sage.

    Book  Google Scholar 

  • Felson, M. and Clarke, R.V. (1998) Opportunity Makes the Thief: Practical Theory for Crime Prevention. London: Home Office.

    Google Scholar 

  • Fisher, B.S., Daigle, L.E. and Cullen, F.T. (2010) What distinguishes single from recurrent sexual victims? The role of lifestyle-routine activities and first-incident characteristics. Justice Quarterly 27 (1): 102–129.

    Article  Google Scholar 

  • Hair, J.F., Black, W.C., Babin, B.J. and Anderson, R.E. (2010) Canonical Correlation: A Supplement to Multivariate Data Analysis. Multivariate data analysis: a global perspective. 7th edn. Pearson Prentice Hall Publishing, Upper Saddle River.

  • Henson, B., Reyns, B.W. and Fisher, B.S. (2011) Security in the 21st century: Examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review 36 (3): 253–268.

    Article  Google Scholar 

  • Henson, B., Reyns, B.W. and Fisher, B.S. (2013) Does gender matter in the virtual world? Examining the effect of gender on the link between online social network activity, security and interpersonal victimization. Security Journal 26 (4): 315–330.

    Article  Google Scholar 

  • Hindelang, M.J. (1976) Criminal victimization in eight American cities: A descriptive analysis of common theft and assaul. Cambridge, MA: Ballinger Publishing Co.

  • Hindelang, M.J., Gottfredson, M.R. and Garofalo, J. (1978) Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization. Cambridge, MA: Ballinger Publishing Company.

    Google Scholar 

  • Hinduja, S. and Kooi, B. (2013) Curtailing cyber and information security vulnerabilities through situational crime prevention. Security Journal 26 (4): 383–402.

    Article  Google Scholar 

  • Hollis-Peel, M.E., Reynald, D.M., Van Bavel, M., Elffers, H. and Welsh, B.C. (2011) Guardianship for crime prevention: A critical review of the literature. Crime, Law and Social Change 56 (1): 53–70.

    Article  Google Scholar 

  • Hollis-Peel, M.E. and Welsh, B.C. (2014) What makes a guardian capable? A test of guardianship in action. Security Journal 27 (3): 320–337.

    Article  Google Scholar 

  • Holt, T.J. and Bossler, A.M. (2009) Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior 30 (1): 1–25.

    Article  Google Scholar 

  • Holt, T.J. and Bossler, A.M. (2013) Examining the relationship between routine activities and malware infection indicators. Journal of Contemporary Criminal Justice 29 (4): 420–436.

    Article  Google Scholar 

  • Holt, T.J. and Bossler, A.M. (2014) An assessment of the current state of cybercrime scholarship. Deviant Behavior 35 (1): 20–40.

    Article  Google Scholar 

  • Kelley, K. and Preacher, K.J. (2012) On effect size. Psychological Methods 17 (2): 137–152.

    Article  Google Scholar 

  • Marcum, C.D., Higgins, G.E. and Ricketts, M.L. (2010) Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior 31 (5): 381–410.

    Article  Google Scholar 

  • Milne, G.R., Rohm, A.J. and Bahl, S. (2004) Consumers’ protection of online privacy and identity. The Journal of Consumer Affairs 38 (2): 217–232.

    Article  Google Scholar 

  • Mustaine, E.E. and Tewksbury, R. (1999) A routine activity theory explanation for women’s stalking victimizations. Violence Against Women 5 (1): 43–62.

    Article  Google Scholar 

  • Navarro, J.N. and Jasinski, J.L. (2012) Going cyber: Using routine activities theory to predict cyberbullying experiences. Sociological Spectrum 32 (1): 81–94.

    Article  Google Scholar 

  • Ngo, F.T. and Paternoster, R. (2011) Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology 5 (1): 773–793.

    Google Scholar 

  • Pease, K. (1998) Repeat Victimization: Taking Stock. London: Home Office.

    Google Scholar 

  • Pratt, T.C., Holtfreter, K. and Reisig, M.D. (2010) Routine online activity and Internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency 47 (3): 267–296.

    Article  Google Scholar 

  • Pratt, T.C. and Turanovic, J.J. (forthcoming) Lifestyle and routine activity theories revisited: The importance of ‘risk’ to the study of victimization. Victims and Offenders.

  • Pratt, T.C., Turanovic, J.J., Fox, K.A. and Wright, K.A. (2014) Self-control and victimization: A meta-analysis. Criminology 52 (1): 87–116.

    Article  Google Scholar 

  • Randa, R. (2013) The influence of the cyber-social environment on fear of victimization: Cyberbullying and school. Security Journal 26 (4): 331–348.

    Article  Google Scholar 

  • Reynald, D.M. (2009) Guardianship in action: Developing a new tool for measurement. Crime Prevention and Community Safety 11 (1): 1–20.

    Article  Google Scholar 

  • Reynald, D.M. (2010) Guardians on guardianship: Factors affecting the willingness to supervise, the ability to detect potential offenders, and the willingness to intervene. Journal of Research in Crime and Delinquency 47 (3): 358–390.

    Article  Google Scholar 

  • Reyns, B.W. (2010) A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety 12 (2): 99–118.

    Article  Google Scholar 

  • Reyns, B.W. (2013) Online routine and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency 50 (2): 216–238.

    Article  Google Scholar 

  • Reyns, B.W. (2015) A routine activity perspective on online victimization: Results from the Canadian general social survey. Journal of Financial Crime 22 (4): 396–411.

    Article  Google Scholar 

  • Reyns, B.W., Henson, B. and Fisher, B.S. (2011) Being pursued online: Applying cyberlifestyle- routine activities theory to cyberstalking victimization. Criminal Justice and Behavior 38 (11): 1149–1169.

    Article  Google Scholar 

  • Reyns, B.W., Henson, B., Fisher, B.S., Fox, K.A. and Nobles, M.R. (2015) A gendered lifestyle-routine activity approach to explaining stalking victimization in Canada. Journal of Interpersonal Violence, doi: 10.1177/0886260515569066.

  • Schafer, S. (1977) Victimology: The Victim and His Criminal. Reston, VA: Reston Publishing Company.

    Google Scholar 

  • Smith, H.J., Dinev, T. and Xu, H. (2011) Information privacy research: An interdisciplinary review. MIS Quarterly 35 (4): 989–1015.

    Google Scholar 

  • Stahura, J. and Sloan, J. III (1988) Urban stratification of places, routine activities, and suburban crime rates. Social Forces 66 (4): 1102–1118.

    Article  Google Scholar 

  • Tseloni, A. and Pease, K. (2003) Repeat personal victimization: ‘Boosts’ or ‘flags’? British Journal of Criminology 43 (1): 196–212.

    Article  Google Scholar 

  • Tseloni, A., Wittebrood, K., Farrell, G. and Pease, K. (2004) Burglary victimization in England and Wales, the United States and the Netherlands: A cross-national comparative test of routine activities and lifestyle theories. The British Journal of Criminology 44 (1): 66–91.

    Article  Google Scholar 

  • Turanovic, J.J. and Pratt, T.C. (2014) ‘Can’t stop, won’t stop’: Self-control, risky lifestyles, and repeat victimization. Journal of Quantitative Criminology 30 (1): 29–56.

    Article  Google Scholar 

  • Van Wilsem, J. (2011) Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology 8 (2): 115–127.

    Article  Google Scholar 

  • Van Wilsem, J. (2013) Hacking and harassment – Do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice 29 (4): 437–453.

    Article  Google Scholar 

  • Von Hentig, H. (1948) The Criminal and His Victim: Studies in the Sociobiology of Crime. New York: Schocken, Books.

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank Marcus Felson for his insights in the development of this article. This analysis is based on the Statistics Canada General Social Survey, Cycle 23, 2009. All computations, use and interpretation of these data are entirely those of the authors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bradford W Reyns.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Reyns, B., Randa, R. & Henson, B. Preventing crime online: Identifying determinants of online preventive behaviors using structural equation modeling and canonical correlation analysis. Crime Prev Community Saf 18, 38–59 (2016). https://doi.org/10.1057/cpcs.2015.21

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/cpcs.2015.21

Keywords

Navigation