IDEAS home Printed from https://ideas.repec.org/a/gam/jijerp/v18y2021i7p3763-d530050.html
   My bibliography  Save this article

Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization

Author

Listed:
  • Juan Herrero

    (Department of Psychology, Universidad de Oviedo, 33000 Oviedo, Spain)

  • Andrea Torres

    (Department of Psychology, Universidad de Oviedo, 33000 Oviedo, Spain)

  • Pep Vivas

    (Department of Psychology, Universitat Oberta de Catalunya (UOC), Rambla del Poblenou, 156, 08018 Barcelona, Spain)

  • Antonio Hidalgo

    (Departamento de Ingeniería de Organización, Administración de Empresas y Estadística ETSI Industriales José Gutiérrez Abascal, Universidad Politécnica de Madrid (UPM), 2. 28006-Madrid, Spain)

  • Francisco J. Rodríguez

    (Department of Psychology, Universidad de Oviedo, 33000 Oviedo, Spain)

  • Alberto Urueña

    (Departamento de Ingeniería de Organización, Administración de Empresas y Estadística ETSI Industriales José Gutiérrez Abascal, Universidad Politécnica de Madrid (UPM), 2. 28006-Madrid, Spain)

Abstract

(1) Background: This paper combines lifestyle-routine activities (L-RAT) and self-control (SCT) theories along with the literature on smartphone addiction in a joint model that addresses the multiple vulnerabilities that make the smartphone user a potential victim of cybercrime. This model, which we call the dual vulnerability model of cybercrime victimization, was subjected to empirical testing on a nationally representative sample of smartphone users. (2) Methods: Data from 2837 participants from a nationally representative sample of Spanish smartphone users were modeled using Mplus causal modeling software. (3) Results: The results of the study confirm the predictions of L-RAT and SCT in explaining cybercrime victimization (higher cybercrime victimization under conditions of high exposure, proximity, and suitability, relative absence of capable guardian, and low self-control). A significant effect of smartphone addiction on cybercrime victimization was also observed above and beyond L-RAT and SCT predictors. (4) Conclusions: The potential victim of cybercrime presents a double vulnerability, on the one hand, those identified by criminological theories such as L-RAT and SCT, and on the other hand, those derived from the deregulated-addicted use of the Internet access device (smartphone in our work).

Suggested Citation

  • Juan Herrero & Andrea Torres & Pep Vivas & Antonio Hidalgo & Francisco J. Rodríguez & Alberto Urueña, 2021. "Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization," IJERPH, MDPI, vol. 18(7), pages 1-11, April.
  • Handle: RePEc:gam:jijerp:v:18:y:2021:i:7:p:3763-:d:530050
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1660-4601/18/7/3763/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1660-4601/18/7/3763/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Herrero, Juan & Rodríguez, Francisco J. & Urueña, Alberto, 2023. "Use of smartphone apps for mobile communication and social digital pressure: A longitudinal panel study," Technological Forecasting and Social Change, Elsevier, vol. 188(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jijerp:v:18:y:2021:i:7:p:3763-:d:530050. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.