{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:16:47Z","timestamp":1740118607026,"version":"3.37.3"},"reference-count":80,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100014440","name":"Ministerio de Ciencia, Innovaci\u00f3n y Universidades","doi-asserted-by":"publisher","award":["EST18\/00043","FPU16\/01671"],"id":[{"id":"10.13039\/100014440","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1016\/j.chb.2021.106984","type":"journal-article","created":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T17:15:57Z","timestamp":1629306957000},"page":"106984","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective"],"prefix":"10.1016","volume":"126","author":[{"given":"Asier","family":"Moneva","sequence":"first","affiliation":[]},{"given":"E. Rutger","family":"Leukfeldt","sequence":"additional","affiliation":[]},{"given":"Steve G.A.","family":"Van De Weijer","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Mir\u00f3-Llinares","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.chb.2021.106984_bib1","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1177\/1477370808095124","article-title":"Them again?: Same-offender involvement in repeat and near repeat burglaries","volume":"5","author":"Bernasco","year":"2008","journal-title":"European Journal of Criminology"},{"key":"10.1016\/j.chb.2021.106984_bib2","series-title":"The human factor of cybercrime","first-page":"29","article-title":"Contributions of criminological theory to the understanding of cybercrime offending and victimization","author":"Bossler","year":"2020"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib3","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1057\/palgrave.cpcs.8140079","article-title":"Small business crime: The evaluation of a crime prevention initiative","volume":"3","author":"Bowers","year":"2001","journal-title":"Crime Prevention and Community Safety"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib4","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1177\/1477370805048631","article-title":"Domestic burglary repeats and space-time clusters: The dimensions of risk","volume":"2","author":"Bowers","year":"2005","journal-title":"European Journal of Criminology"},{"issue":"3","key":"10.1016\/j.chb.2021.106984_bib5","doi-asserted-by":"crossref","DOI":"10.1002\/cl2.1046","article-title":"Hot spots policing of small geographic areas effects on crime","volume":"15","author":"Braga","year":"2019","journal-title":"Campbell Systematic Reviews"},{"issue":"4","key":"10.1016\/j.chb.2021.106984_bib6","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1177\/0022427818821716","article-title":"Street gangs, gun violence, and focused deterrence: Comparing place-based and group-based evaluation methods to estimate direct and spillover deterrent effects","volume":"56","author":"Braga","year":"2019","journal-title":"Journal of Research in Crime and Delinquency"},{"key":"10.1016\/j.chb.2021.106984_bib7","series-title":"Environmental criminology","first-page":"27","article-title":"Notes on the geometry of crime","author":"Brantingham","year":"1981"},{"year":"2018","series-title":"The oxford handbook of environmental criminology","key":"10.1016\/j.chb.2021.106984_bib8"},{"key":"10.1016\/j.chb.2021.106984_bib9","series-title":"JDiBrief series","first-page":"1","article-title":"Repeat victimisation","author":"Chainey","year":"2012"},{"issue":"4","key":"10.1016\/j.chb.2021.106984_bib10","doi-asserted-by":"crossref","first-page":"588","DOI":"10.2307\/2094589","article-title":"Social change and crime rate trends: A routine activity approach","volume":"44","author":"Cohen","year":"1979","journal-title":"American Sociological Review"},{"year":"1986","series-title":"The reasoning criminal: Rational choice perspectives on offending","key":"10.1016\/j.chb.2021.106984_bib11"},{"issue":"10","key":"10.1016\/j.chb.2021.106984_bib12","doi-asserted-by":"crossref","first-page":"12521","DOI":"10.1016\/j.eswa.2011.04.038","article-title":"Anomaly detection techniques for a web defacement monitoring service","volume":"38","author":"Davanzo","year":"2011","journal-title":"Expert Systems with Applications"},{"year":"1994","series-title":"Drug markets and drug places: A case-control study of the spatial structure of illicit drug dealing","author":"Eck","key":"10.1016\/j.chb.2021.106984_bib13"},{"issue":"5","key":"10.1016\/j.chb.2021.106984_bib14","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1177\/0011128708321322","article-title":"Repeat offending and repeat victimization: Assessing similarities and differences in psychosocial risk factors","volume":"57","author":"Fagan","year":"2011","journal-title":"Crime & Delinquency"},{"key":"10.1016\/j.chb.2021.106984_bib15","series-title":"Handbook of crime prevention and community safety","first-page":"145","article-title":"Progress and prospects in the prevention of repeat victimization","author":"Farrell","year":"2005"},{"key":"10.1016\/j.chb.2021.106984_bib16","series-title":"Home office, police research group","first-page":"1","article-title":"Once bitten, twice bitten: Repeat victimisation and its implications for crime prevention","author":"Farrell","year":"1993"},{"key":"10.1016\/j.chb.2021.106984_bib17","series-title":"Handbook of crime prevention and community safety","first-page":"626","article-title":"Preventing repeat and near repeat crime concentrations","author":"Farrell","year":"2017"},{"key":"10.1016\/j.chb.2021.106984_bib18","series-title":"Encyclopedia of criminology and criminal justice","first-page":"4371","article-title":"Repeat victimization","author":"Farrell","year":"2018"},{"issue":"3","key":"10.1016\/j.chb.2021.106984_bib19","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1057\/palgrave.cpcs.8140221","article-title":"Repeat victimization in the ICVS and the NCVS","volume":"7","author":"Farrell","year":"2005","journal-title":"Crime Prevention and Community Safety"},{"key":"10.1016\/j.chb.2021.106984_bib20","series-title":"Cross-national longitudinal research on human development and criminal behavior","first-page":"65","article-title":"Criminal careers in London and Stockholm: A cross-national comparative study","author":"Farrington","year":"1994"},{"key":"10.1016\/j.chb.2021.106984_bib21","first-page":"22","article-title":"Predicting online extremism, content adopters, and interaction reciprocity","volume":"Vol. 10047","author":"Ferrara","year":"2016"},{"issue":"3","key":"10.1016\/j.chb.2021.106984_bib22","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/BF01072453","article-title":"A measure of skewness in offense distributions","volume":"4","author":"Fox","year":"1988","journal-title":"Journal of Quantitative Criminology"},{"issue":"4","key":"10.1016\/j.chb.2021.106984_bib23","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1057\/sj.2013.25","article-title":"Curtailing cyber and information security vulnerabilities through situational crime prevention","volume":"26","author":"Hinduja","year":"2013","journal-title":"Security Journal"},{"key":"10.1016\/j.chb.2021.106984_bib24","series-title":"Cyber infrastruture protection","first-page":"159","article-title":"The attack dynamics of political and religiously motivated hackers","author":"Holt","year":"2011"},{"key":"10.1016\/j.chb.2021.106984_bib25","series-title":"The palgrave handbook of international cybercrime and cyberdeviance","first-page":"1","article-title":"Computer hacking and the hacker subculture","author":"Holt","year":"2019"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib26","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1080\/01639625.2013.822209","article-title":"An assessment of the current state of cybercrime scholarship","volume":"35","author":"Holt","year":"2014","journal-title":"Deviant Behavior"},{"year":"2017","series-title":"Cybercrime in progress: Theory and prevention of technology-enabled offenses","author":"Holt","key":"10.1016\/j.chb.2021.106984_bib27"},{"key":"10.1016\/j.chb.2021.106984_bib28","first-page":"1","article-title":"An exploratory analysis of the characteristics of ideologically motivated cyberattacks","author":"Holt","year":"2020","journal-title":"Terrorism and Political Violence"},{"issue":"4","key":"10.1016\/j.chb.2021.106984_bib29","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1177\/0093854819900322","article-title":"An examination of motivation and routine activity theory to account for cyberattacks against Dutch web sites","volume":"47","author":"Holt","year":"2020","journal-title":"Criminal Justice and Behavior"},{"key":"10.1016\/j.chb.2021.106984_bib30","first-page":"1","article-title":"Website defacement and routine activities: Considering the importance of hackers' valuations of potential targets","author":"Howell","year":"2019","journal-title":"Journal of Crime and Justice"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib31","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1080\/17440572.2016.1197123","article-title":"The online stolen data market: Disruption and intervention approaches","volume":"18","author":"Hutchings","year":"2017","journal-title":"Global Crime"},{"issue":"3","key":"10.1016\/j.chb.2021.106984_bib32","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s11292-008-9055-3","article-title":"Repeat burglary victimisation: A tale of two theories","volume":"4","author":"Johnson","year":"2008","journal-title":"Journal of Experimental Criminology"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib33","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1093\/bjc\/44.1.55","article-title":"The stability of space-time clusters of burglary","volume":"44","author":"Johnson","year":"2004","journal-title":"British Journal of Criminology"},{"issue":"2","key":"10.1016\/j.chb.2021.106984_bib34","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1177\/1477370804041252","article-title":"The burglary as clue to the future: The beginnings of prospective hot-spotting","volume":"1","author":"Johnson","year":"2004","journal-title":"European Journal of Criminology"},{"issue":"2","key":"10.1016\/j.chb.2021.106984_bib35","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1093\/oxfordjournals.bjc.a014156","article-title":"New insights into the spatial and temporal distribution of repeat victimization","volume":"37","author":"Johnson","year":"1997","journal-title":"British Journal of Criminology"},{"issue":"2","key":"10.1016\/j.chb.2021.106984_bib36","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10940-008-9060-8","article-title":"Offender as forager? A direct test of the boost account of victimization","volume":"25","author":"Johnson","year":"2009","journal-title":"Journal of Quantitative Criminology"},{"year":"2012","series-title":"Deterrence and crime prevention: Reconsidering the prospect of sanction","author":"Kennedy","key":"10.1016\/j.chb.2021.106984_bib37"},{"issue":"4","key":"10.1016\/j.chb.2021.106984_bib38","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1177\/0894439311422689","article-title":"Routine activity theory and the determinants of high cybercrime countries","volume":"30","author":"Kigerl","year":"2012","journal-title":"Social Science Computer Review"},{"issue":"3","key":"10.1016\/j.chb.2021.106984_bib39","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1111\/1745-9125.12071","article-title":"Biting once, twice: The influence of prior on subsequent crime location choice","volume":"53","author":"Lammers","year":"2015","journal-title":"Criminology"},{"author":"Leukfeldt","key":"10.1016\/j.chb.2021.106984_bib40"},{"year":"2017","series-title":"The human factor in cybercrime and cybersecurity: Research agenda","key":"10.1016\/j.chb.2021.106984_bib41"},{"year":"2020","series-title":"The human factor of cybercrime","key":"10.1016\/j.chb.2021.106984_bib42"},{"key":"10.1016\/j.chb.2021.106984_bib43","series-title":"The human factor of cybercrime","first-page":"216","article-title":"Financial cybercrimes and situational crime prevention","author":"Leukfeldt","year":"2020"},{"issue":"3","key":"10.1016\/j.chb.2021.106984_bib44","first-page":"704","article-title":"Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks","volume":"57","author":"Leukfeldt","year":"2017","journal-title":"British Journal of Criminology"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib45","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s10611-016-9662-2","article-title":"A typology of cybercriminal networks: From low-tech all-rounders to high-tech specialists","volume":"67","author":"Leukfeldt","year":"2017","journal-title":"Crime, Law and Social Change"},{"issue":"11","key":"10.1016\/j.chb.2021.106984_bib46","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.1177\/0002764217734267","article-title":"The use of online crime markets by cybercriminal networks: A view from within","volume":"61","author":"Leukfeldt","year":"2017","journal-title":"American Behavioral Scientist"},{"issue":"3","key":"10.1016\/j.chb.2021.106984_bib47","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1080\/01639625.2015.1012409","article-title":"Applying routine activity theory to cybercrime: A theoretical and empirical analysis","volume":"37","author":"Leukfeldt","year":"2016","journal-title":"Deviant Behavior"},{"issue":"3","key":"10.1016\/j.chb.2021.106984_bib48","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1007\/s10940-016-9332-7","article-title":"The law of crime concentration: An application and recommendations for future research","volume":"33","author":"Levin","year":"2017","journal-title":"Journal of Quantitative Criminology"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib49","first-page":"1","article-title":"Hackers' motivations: Testing Schwartz\u2019S theory of motivational types of values in A sample of hackers","volume":"11","author":"Madarie","year":"2017","journal-title":"International Journal of Cyber Criminology"},{"key":"10.1016\/j.chb.2021.106984_bib50","series-title":"On the relevance of social media platforms in predicting the volume and patterns of web defacement attacks","first-page":"4668","author":"Maimon","year":"2017"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib51","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1146\/annurev-criminol-032317-092057","article-title":"Cyber-dependent crimes: An interdisciplinary review","volume":"2","author":"Maimon","year":"2019","journal-title":"Annual Review of Criminology"},{"key":"10.1016\/j.chb.2021.106984_bib52","series-title":"No. 75; cyber crime: A review of the evidence","first-page":"1","article-title":"Cyber-dependent crimes","author":"McGuire","year":"2013"},{"issue":"7","key":"10.1016\/j.chb.2021.106984_bib53","first-page":"1","article-title":"La oportunidad criminal en el ciberespacio. Aplicaci\u00f3n y desarrollo de la teor\u00eda de las actividades cotidianas para la prevenci\u00f3n del cibercrimen","volume":"13","author":"Mir\u00f3-Llinares","year":"2011","journal-title":"Revista Electr\u00f3nica de Ciencia Penal y Criminolog\u00eda"},{"key":"10.1016\/j.chb.2021.106984_bib54","series-title":"The oxford handbook of environmental criminology","first-page":"883","article-title":"Cybercrime and place: Applying environmental criminology to crimes in cyberspace","author":"Mir\u00f3-Llinares","year":"2018"},{"key":"10.1016\/j.chb.2021.106984_bib55","series-title":"The palgrave handbook of international cybercrime and cyberdeviance","first-page":"1","article-title":"Environmental criminology and cybercrime: Shifting focus from the wine to the bottles","author":"Mir\u00f3-Llinares","year":"2019"},{"issue":"15","key":"10.1016\/j.chb.2021.106984_bib56","first-page":"1","article-title":"Hate is in the air! But where? Introducing an algorithm to detect hate speech in digital microenvironments","volume":"7","author":"Mir\u00f3-Llinares","year":"2018","journal-title":"Crime Science"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib57","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/S0167-4048(04)00067-7","article-title":"An empirical investigation of network attacks on computer systems","volume":"23","author":"Moitra","year":"2004","journal-title":"Computers & Security"},{"year":"2020","series-title":"Cyber places, crime patterns, and cybercrime prevention: An environmental Criminology and crime Analysis approach through data science [Doctoral thesis]","author":"Moneva","key":"10.1016\/j.chb.2021.106984_bib58"},{"key":"10.1016\/j.chb.2021.106984_bib59","article-title":"Hunter or prey? Exploring the situational profiles that define repeated online harassment victims and offenders","volume":"1\u201316","author":"Moneva","year":"2020","journal-title":"Deviant Behavior"},{"issue":"2","key":"10.1016\/j.chb.2021.106984_bib60","doi-asserted-by":"crossref","first-page":"239","DOI":"10.3138\/cjccj.2012.E18","article-title":"Questioning Canadian criminal incidence rates: A Re-analysis of the 2004 Canadian victimization survey","volume":"55","author":"Nazaretian","year":"2013","journal-title":"Canadian Journal of Criminology and Criminal Justice"},{"year":"2003","series-title":"Superhighway robbery preventing e-commerce crime","author":"Newman","key":"10.1016\/j.chb.2021.106984_bib61"},{"issue":"4","key":"10.1016\/j.chb.2021.106984_bib62","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1080\/15564886.2013.814612","article-title":"Understanding the random effect on victimization distributions: A statistical analysis of random repeat victimizations","volume":"8","author":"Park","year":"2013","journal-title":"Victims and Offenders"},{"key":"10.1016\/j.chb.2021.106984_bib63","series-title":"Repeat vicimisation: Taking stock (No. 90; crime detection and prevention series","first-page":"1","author":"Pease","year":"1998"},{"issue":"3","key":"10.1016\/j.chb.2021.106984_bib64","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/s10940-007-9026-2","article-title":"Understanding the role of repeat victims in the production of annual US victimization rates","volume":"23","author":"Planty","year":"2007","journal-title":"Journal of Quantitative Criminology"},{"issue":"2","key":"10.1016\/j.chb.2021.106984_bib65","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1057\/cpcs.2009.22","article-title":"A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers","volume":"12","author":"Reyns","year":"2010","journal-title":"Crime Prevention and Community Safety"},{"key":"10.1016\/j.chb.2021.106984_bib66","series-title":"The palgrave handbook of international cybercrime and cyberdeviance","first-page":"1","article-title":"Hacktivism: Conceptualization, techniques, and historical view","author":"Romagna","year":"2019"},{"key":"10.1016\/j.chb.2021.106984_bib67","series-title":"Hacktivism and website defacement: Motivations, capabilities and potential threats","first-page":"1","author":"Romagna","year":"2017"},{"key":"10.1016\/j.chb.2021.106984_bib68","series-title":"IEEE conference on computer communications workshops","first-page":"952","article-title":"Discriminating DDoS attack traffic from flash crowd through packet arrival patterns","author":"Thapngam","year":"2011"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib69","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s10940-016-9334-5","article-title":"Structural constraints, risky lifestyles, and repeat victimization","volume":"34","author":"Turanovic","year":"2018","journal-title":"Journal of Quantitative Criminology"},{"key":"10.1016\/j.chb.2021.106984_bib81","doi-asserted-by":"crossref","DOI":"10.1016\/j.chbr.2021.100113","article-title":"Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements","volume":"4","author":"van de Weijer","year":"2021","journal-title":"Computers in Human Behavior Reports"},{"issue":"2","key":"10.1016\/j.chb.2021.106984_bib71","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1111\/1745-9125.12070","article-title":"The law of crime concentration and the criminology of place","volume":"53","author":"Weisburd","year":"2015","journal-title":"Criminology"},{"key":"10.1016\/j.chb.2021.106984_bib72","series-title":"Analyzing repeat victimization","first-page":"1","author":"Weisel","year":"2005"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib73","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/01639625.2017.1411030","article-title":"Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap","volume":"40","author":"Weulen Kranenbarg","year":"2019","journal-title":"Deviant Behavior"},{"issue":"3","key":"10.1016\/j.chb.2021.106984_bib74","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s40865-018-0087-8","article-title":"Cyber-offending and traditional offending over the life-course: An empirical comparison","volume":"4","author":"Weulen Kranenbarg","year":"2018","journal-title":"Journal of Developmental and Life-Course Criminology"},{"year":"2017","series-title":"Tidyverse: Easily install and load the \u2018tidyverse\u2019","author":"Wickham","key":"10.1016\/j.chb.2021.106984_bib75"},{"issue":"2","key":"10.1016\/j.chb.2021.106984_bib76","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1093\/bjc\/azv059","article-title":"Cyberhate on social media in the aftermath of woolwich: A case study in computational criminology and big data","volume":"56","author":"Williams","year":"2016","journal-title":"British Journal of Criminology"},{"key":"10.1016\/j.chb.2021.106984_bib77","doi-asserted-by":"crossref","DOI":"10.1038\/s41562-019-0688-1","article-title":"Reducing gunshot victimization in high-risk social networks through direct and spillover effects","author":"Wood","year":"2019","journal-title":"Nature Human Behaviour"},{"issue":"1","key":"10.1016\/j.chb.2021.106984_bib78","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1207\/s1532785xmep0601_3","article-title":"Hackers: Militants or merry pranksters? A content analysis of defaced web","volume":"6","author":"Woo","year":"2004","journal-title":"Media Psychology"},{"year":"2017","series-title":"Environmental criminology and crime analysis","key":"10.1016\/j.chb.2021.106984_bib79"},{"issue":"4","key":"10.1016\/j.chb.2021.106984_bib80","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1177\/147737080556056","article-title":"The novelty of \u2018cybercrime\u2019: An assessment in light of routine activity theory","volume":"2","author":"Yar","year":"2005","journal-title":"European Journal of Criminology"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563221003071?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563221003071?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T20:24:00Z","timestamp":1720815840000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563221003071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":80,"alternative-id":["S0747563221003071"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2021.106984","relation":{},"ISSN":["0747-5632"],"issn-type":[{"type":"print","value":"0747-5632"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2021.106984","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"106984"}}