Explaining Fear of Identity Theft Victimization Using a Routine Activity Approach

Article Properties
  • Language
    English
  • Publication Date
    2021/03/24
  • Indian UGC (journal)
  • Refrences
    48
  • Citations
    12
  • Jaeyong Choi Angelo State University, San Angelo, TX, USA
  • Nathan E. Kruis Pennsylvania State University, Altoona, PA, USA
  • Kyung-Seok Choo Utica College, NY, USA
Abstract
Cite
Choi, Jaeyong, et al. “Explaining Fear of Identity Theft Victimization Using a Routine Activity Approach”. Journal of Contemporary Criminal Justice, vol. 37, no. 3, 2021, pp. 406-2, https://doi.org/10.1177/10439862211001627.
Choi, J., Kruis, N. E., & Choo, K.-S. (2021). Explaining Fear of Identity Theft Victimization Using a Routine Activity Approach. Journal of Contemporary Criminal Justice, 37(3), 406-426. https://doi.org/10.1177/10439862211001627
Choi, Jaeyong, Nathan E. Kruis, and Kyung-Seok Choo. “Explaining Fear of Identity Theft Victimization Using a Routine Activity Approach”. Journal of Contemporary Criminal Justice 37, no. 3 (2021): 406-26. https://doi.org/10.1177/10439862211001627.
Choi J, Kruis NE, Choo KS. Explaining Fear of Identity Theft Victimization Using a Routine Activity Approach. Journal of Contemporary Criminal Justice. 2021;37(3):406-2.
Refrences
Title Journal Journal Categories Citations Publication Date
10.52306/02020219SVZL9707 2019
10.52306/02020219SVZL9707 2014
10.52306/02020219SVZL9707 2014
10.52306/02020219SVZL9707 2008
10.52306/02020219SVZL9707 2003
Citations
Title Journal Journal Categories Citations Publication Date
Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives Computers & Security
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2024
The influence and role of cryptoculture on target congruence in cryptocurrency investment behavior: a theoretical model Crime, Law and Social Change
  • Social Sciences: Social pathology. Social and public welfare. Criminology
  • Social Sciences: Sociology (General)
  • Social Sciences: Industries. Land use. Labor
  • Social Sciences
2023
Migration stress, risky Internet uses, and scam victimization: An empirical study among Chinese migrant workers Telematics and Informatics
  • Bibliography. Library science. Information resources
  • Bibliography. Library science. Information resources: Information resources (General)
  • Social Sciences
2023
Constructing an Investment Scam Detection Model Based on Emotional Fluctuations Throughout the Investment Scam Life Cycle Deviant Behavior
  • Social Sciences: Social pathology. Social and public welfare. Criminology
  • Philosophy. Psychology. Religion: Psychology
  • Social Sciences: Sociology (General)
  • Social Sciences: Sociology (General)
  • Social Sciences
2023
How victims perceive fear of cybercrime: importance of informed risk Criminal Justice Studies
  • Technology: Manufactures: Production management. Operations management
2023
Citations Analysis
The category Social Sciences 8 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled Examining Personal and Altruistic Fear of Ransomware and was published in 2022. The most recent citation comes from a 2024 study titled Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives. This article reached its peak citation in 2023, with 7 citations. It has been cited in 12 different journals. Among related journals, the Computers & Security cited this research the most, with 1 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year