Country Life in the Digital Era: Comparison of Technology Use and Cybercrime Victimization between Residents of Rural and Urban Environments in Slovenia
Abstract
:1. Introduction
2. Cybercrime Victimization
3. Cybervictimization in Rural and Urban Areas
4. Motivation
- RQ1
- Is there an association between the purpose of computers and other electronic device usage and the perceived cybercrime vulnerability?
- RQ2
- Are there differences in computer and other electronic device usage and perceived cybercrime vulnerability and victimization between urban and rural residents?
- RQ3
- Are there differences between residents of urban and rural areas in perceived cybercrime victimization?
5. Materials and Methods
5.1. Questionnaire Development
5.2. Data Collection
5.3. Instrument Validation
6. Results
7. Discussion
8. Limitations and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Verleysen, C. Cybercrime: A theoretical overview of the growing digital threat. EUCPN Theor. Pap. Ser. 2015, 1–39. Available online: https://eucpn.org/document/eucpn-thematic-paper-no-8-cybercrime-a-theoretical-overview-of-the-growing-digital-threat (accessed on 28 September 2022).
- Saunders, J. Tackling cybercrime—The UK response. J. Cyber Policy 2017, 2, 4–15. [Google Scholar] [CrossRef]
- Agustina, J.R. Understanding Cyber Victimization: Digital Architectures and the Disinhibition Effect. Int. J. Cyber Criminol. 2015, 9, 35–54. [Google Scholar] [CrossRef]
- Leukfeldt, E.R.; Yar, M. Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis. Deviant Behav. 2016, 37, 263–280. [Google Scholar] [CrossRef] [Green Version]
- Melander, L.A. College Students’ Perceptions of Intimate Partner Cyber Harassment. Cyberpsychol. Behav. Soc. Netw. 2010, 13, 263–268. [Google Scholar] [CrossRef] [Green Version]
- Welsh, A.; Lavoie, J.A.A. Risky eBusiness: An Examination of Risk-taking, Online Disclosiveness, and Cyberstalking Victimization. Cyberpsychol. J. Psychosoc. Res. Cyberspace 2012, 6, 1–13. [Google Scholar] [CrossRef]
- Reyns, B.W.; Henson, B.; Fisher, B.S. Being Pursued Online: Applying Cyberlifestyle–Routine Activities Theory to Cyberstalking Victimization. Crim. Justice Behav. 2011, 38, 1149–1169. [Google Scholar] [CrossRef]
- Henson, B.; Reyns, B.W.; Fisher, B.S. Fear of Crime Online? Examining the Effect of Risk, Previous Victimization, and Exposure on Fear of Online Interpersonal Victimization. J. Contemp. Crim. Justice 2013, 29, 475–497. [Google Scholar] [CrossRef]
- Roberts, L.D.; Indermaur, D.; Spiranovic, C. Fear of Cyber-Identity Theft and Related Fraudulent Activity. Psychiatry Psychol. Law 2013, 20, 315–328. [Google Scholar] [CrossRef] [Green Version]
- Kurebwa, J.; Tanhara, J.R. Cybercrime as a Threat to Zimbabwe’s Peace and Security. In Global Cyber Security Labor Shortage and International Business Risk; Christiansen, B., Piekarz, A., Eds.; IGI Global: Hershey, PA, USA, 2019; pp. 365–380. [Google Scholar] [CrossRef]
- Broadhurst, R.; Choo, K.-K.R. Cybercrime and On-Line Safety in Cyberspace. In International Handbook of Criminology; Routledge: New York, NY, USA, 26 July 2009; Available online: https://papers.ssrn.com/abstract=2171559 (accessed on 26 September 2022).
- Poonia, A.S. Cyber Crime: Challenges and its Classification. Int. J. Emerg. Trends Technol. Comput. Sci. 2014, 3, 119–121. [Google Scholar]
- Brown, C.S.D. Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice. J. Cyber Criminol. 2015, 9, 55–119. [Google Scholar] [CrossRef]
- Brunton-Smith, I. Fear 2.0: Worry about cybercrime in England and Wales. In The Routledge International Handbook on Fear of Crime; Lee, M., Mythen, G., Eds.; Routledge: London, UK, 2017. [Google Scholar]
- Tsakalidis, G.; Vergidis, K. A Systematic Approach toward Description and Classification of Cybercrime Incidents. IEEE Trans. Syst. Man Cybern. Syst. 2017, 49, 710–729. [Google Scholar] [CrossRef]
- Bishop, L.M.; Morgan, P.L.; Asquith, P.M.; Raywood-Burke, G.; Wedgbury, A.; Jones, K. Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design. In HCI for Cybersecurity, Privacy and Trust; Springer: Cham, Switzerland, 2020; pp. 51–66. [Google Scholar] [CrossRef]
- Chang, F.-C.; Miao, N.-F.; Chiu, C.-H.; Chen, P.-H.; Lee, C.-M.; Chiang, J.-T.; Chuang, H.-Y. Urban–rural differences in parental Internet mediation and adolescents’ Internet risks in Taiwan. Health Risk Soc. 2016, 18, 188–204. [Google Scholar] [CrossRef]
- Drew, J.M. A study of cybercrime victimisation and prevention: Exploring the use of online crime prevention behaviours and strategies. J. Criminol. Res. Policy Pract. 2020, 6, 17–33. [Google Scholar] [CrossRef]
- Shan-A-Khuda, M.; Schreuders, C. Understanding Cybercrime Victimisation: Modelling the Local Area Variations in Routinely Collected Cybercrime Police Data Using Latent Class Analysis. Undefined. 2019. Available online: https://www.semanticscholar.org/paper/Understanding-Cybercrime-Victimisation-%3A-Modelling-Shan-A.-Khuda-Schreuders/2fc441e1ecdf99dbe394ee5e0ce014bde66f43fa (accessed on 26 September 2022).
- Van De Weijer, S.G.; Leukfeldt, R.; Bernasco, W. Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking. Eur. J. Criminol. 2018, 16, 486–508. [Google Scholar] [CrossRef]
- Statista. Cyber Threat Encounter Rate by Country 2021; Statista: Hamburg, Germany, 2022; Available online: https://www.statista.com/statistics/194133/cybercrime-rate-in-selected-countries/ (accessed on 26 September 2022).
- Pereira, F.; Spitzberg, B.H.; Matos, M. Cyber-harassment victimization in Portugal: Prevalence, fear and help-seeking among adolescents. Comput. Hum. Behav. 2016, 62, 136–146. [Google Scholar] [CrossRef]
- Ronis, S.; Slaunwhite, A. Gender and Geographic Predictors of Cyberbullying Victimization, Perpetration, and Coping Modalities among Youth. Can. J. Sch. Psychol. 2017, 34, 3–21. [Google Scholar] [CrossRef]
- Bidgoli, M.; Knijnenburg, B.P.; Grossklags, J. When cybercrimes strike undergraduates. In Proceedings of the 2016 APWG Symposium on Electronic Crime Research (eCrime), Toronto, ON, Canada, 1–3 June 2016; pp. 1–10. [Google Scholar] [CrossRef]
- Al-Ali, A.A.H.; Al-Nemrat, A. Cyber Victimization: UAE as a Case Study. In Proceedings of the 2017 Cybersecurity and Cyberforensics Conference (CCC), London, UK, 21–23 November 2017; pp. 19–24. [Google Scholar] [CrossRef]
- Doane, A.N.; Boothe, L.G.; Pearson, M.R.; Kelley, M.L. Risky electronic communication behaviors and cyberbullying victimization: An application of Protection Motivation Theory. Comput. Hum. Behav. 2016, 60, 508–513. [Google Scholar] [CrossRef]
- De Kimpe, L.; Ponnet, K.; Walrave, M.; Snaphaan, T.; Pauwels, L.; Hardyns, W. Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. Comput. Hum. Behav. 2020, 108, 106310. [Google Scholar] [CrossRef]
- Saridakis, G.; Benson, V.; Ezingeard, J.-N.; Tennakoon, H. Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users. Technol. Forecast. Soc. Chang. 2016, 102, 320–330. [Google Scholar] [CrossRef] [Green Version]
- Wachs, S.; Michelsen, A.; Wright, M.F.; Gámez-Guadix, M.; Almendros, C.; Kwon, Y.; Na, E.-Y.; Sittichai, R.; Singh, R.; Biswal, R.; et al. A Routine Activity Approach to Understand Cybergrooming Victimization among Adolescents from Six Countries. Cyberpsychol. Behav. Soc. Netw. 2020, 23, 218–224. [Google Scholar] [CrossRef]
- AlBladi, S.M.; Weir, G.R.S. User characteristics that influence judgment of social engineering attacks in social networks. Hum.-Cent. Comput. Inf. Sci. 2018, 8, 5. [Google Scholar] [CrossRef]
- Louderback, E.R.; Antonaccio, O. New Applications of Self-Control Theory to Computer-Focused Cyber Deviance and Victimization: A Comparison of Cognitive and Behavioral Measures of Self-Control and Test of Peer Cyber Deviance and Gender as Moderators. Crime Delinq. 2020, 67, 366–398. [Google Scholar] [CrossRef]
- Van Wilsem, J. Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. Eur. J. Criminol. 2011, 8, 115–127. [Google Scholar] [CrossRef]
- Levesque, F.L.; Fernandez, J.M.; Somayaji, A. Risk prediction of malware victimization based on user behavior. In Proceedings of the 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE), Fajardo, PR, USA, 28–30 October 2014; pp. 128–134. [Google Scholar] [CrossRef]
- Oksanen, A.; Keipi, T. Young people as victims of crime on the internet: A population-based study in Finland. Vulnerable Child. Youth Stud. 2013, 8, 298–309. [Google Scholar] [CrossRef]
- Reep-van den Bergh, C.M.M.; Junger, M. Victims of cybercrime in Europe: A review of victim surveys. Crime Sci. 2018, 7, 5. [Google Scholar] [CrossRef]
- Mihelič, A.; Jevšček, M.; Vrhovec, S.; Bernik, I. Testing the Human Backdoor: Organizational Response to a Phishing Campaign. J. Univers. Comput. Sci. 2019, 25, 1458–1477. [Google Scholar] [CrossRef]
- Wall, D. Cybercrime and the Culture of Fear. Inf. Commun. Soc. 2008, 11, 861–884. [Google Scholar] [CrossRef]
- United Nations Office on Drugs and Crime. Comprehensive Study on Cybercrime; United Nations Office on Drugs and Crime: Vienna, Austria, 2013. [Google Scholar]
- European Commission. Special Eurobarometer 499: Europeans’ Attitudes towards Cyber Security. Directorate-General for Communication. 2020. Available online: https://data.europa.eu/data/datasets/s2249_92_2_499_eng?locale=en (accessed on 26 September 2022).
- Akdemir, N.; Lawless, C.J. Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: A lifestyle routine activities approach: Perceptions of the police in a rural county of England. Internet Res. 2020, 30, 1665–1687. [Google Scholar] [CrossRef]
- Mawby, R. Myth and reality in rural policing. Polic. Int. J. Police Strateg. Manag. 2004, 27, 431–446. [Google Scholar] [CrossRef]
- European Commission. Cybercrime. In Migration and Home Affairs; 2022; Available online: https://home-affairs.ec.europa.eu/policies/internal-security/cybercrime_en (accessed on 26 September 2022).
- Bissell, K.; LaSalle, R.; Cin, P.D. The Cost of Cybercrime. Accenture Security. 2019. Available online: https://www.accenture.com/_acnmedia/PDF-96/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#zoom=50 (accessed on 26 September 2022).
- Pupillo, L. EU Cybersecurity and the Paradox of Progress; Centre for European Policy Studies: Brussels, Belgium, 2018. [Google Scholar]
- Furnell, S. Cybercrime: Vandalizing the Information Society. In Web Engineering; Springer: Berlin, Heidelberg, Germany, 2003; pp. 8–16. [Google Scholar] [CrossRef] [Green Version]
- Halder, D.; Jaishankar, K.; Periyar, E.E.; Sivakumar, R. Cyber Victimization in India: Preliminary Study. In Global Criminology; Routledge: London, UK, 2013. [Google Scholar]
- Raskauskas, J.; Stoltz, A.D. Involvement in traditional and electronic bullying among adolescents. Dev. Psychol. 2007, 43, 564–575. [Google Scholar] [CrossRef]
- Statista. Online Adult Cyber Crime Victimization 2017. 2018. Available online: https://www.statista.com/statistics/294684/online-adult-cyber-crime-victimization/ (accessed on 26 September 2022).
- Meško, G.; Bernik, I. Internet study of familiarity with cyber threats and fear of cybercrime [Internetna študija poznavanja kibernetskih groženj in strahu pred kibernetsko kriminaliteto]. Rev. Krim. Kriminol. 2011, 62, 242–252. [Google Scholar]
- Australian Bureau of Statistics. Personal Fraud, 2020–21 Financial Year. 2022. Available online: https://www.abs.gov.au/statistics/people/crime-and-justice/personal-fraud/latest-release (accessed on 26 September 2022).
- Bakhshi, T. Social engineering: Revisiting end-user awareness and susceptibility to classic attack vectors. In Proceedings of the 2017 13th International Conference on Emerging Technologies (ICET), Islamabad, Pakistan, 27–28 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Musuva, P.M.; Getao, K.W.; Chepken, C.K. A new approach to modelling the effects of cognitive processing and threat detection on phishing susceptibility. Comput. Hum. Behav. 2019, 94, 154–175. [Google Scholar] [CrossRef]
- Li, Q. Cyberbullying in Schools: A Research of Gender Differences. Sch. Psychol. Int. 2006, 27, 157–170. [Google Scholar] [CrossRef]
- Marret, M.J.; Choo, W.Y. Factors associated with online victimisation among Malaysian adolescents who use social networking sites: A cross-sectional study. BMJ Open 2017, 7, e014959. [Google Scholar] [CrossRef] [Green Version]
- Shabnam, N.; Faruk, O. Kamruzzaman Underlying Causes of Cyber-Criminality and Victimization: An Empirical Study on Students. Soc. Sci. 2016, 5, 1–6. [Google Scholar] [CrossRef]
- Tynes, B.M.; Rose, C.A.; Williams, D.R. The Development and Validation of the Online Victimization Scale for Adolescents. Cyberpsychol. J. Psychosoc. Res. Cyberspace 2022, 4, 2. Available online: https://cyberpsychology.eu/article/view/4237 (accessed on 26 September 2022).
- Berson, I.R.; Berson, M.J.; Ferron, J.M. Emerging Risks of Violence in the Digital Age. J. Sch. Violence 2002, 1, 51–71. [Google Scholar] [CrossRef]
- Cassidy, W.; Jackson, M.; Brown, K.N. Sticks and Stones Can Break My Bones, But How Can Pixels Hurt Me? Sch. Psychol. Int. 2009, 30, 383–402. [Google Scholar] [CrossRef] [Green Version]
- Hinduja, S.; Patchin, J.W. Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization. Deviant Behav. 2008, 29, 129–156. [Google Scholar] [CrossRef]
- Dodel, M.; Mesch, G. Cyber-victimization preventive behavior: A health belief model approach. Comput. Hum. Behav. 2017, 68, 359–367. [Google Scholar] [CrossRef]
- Näsi, M.; Danielsson, P.; Kaakinen, M. Cybercrime Victimisation and Polyvictimisation in Finland—Prevalence and Risk Factors. Eur. J. Crim. Policy Res. 2021, 1–19. [Google Scholar] [CrossRef]
- Berg, M.T.; Lauritsen, J.L. Telling a Similar Story Twice? NCVS/UCR Convergence in Serious Violent Crime Rates in Rural, Suburban, and Urban Places (1973–2010). J. Quant. Criminol. 2015, 32, 61–87. [Google Scholar] [CrossRef]
- United States Department Of Justice. Office of Justice Programs. Bureau of Justice Statistics, National Crime Victimization Survey, Concatenated File, 1992–2015: Version 1; ICPSR—Interuniversity Consortium for Political and Social Research: Ann Arbor, MI, USA, 2016; Available online: https://www.icpsr.umich.edu/web/NACJD/studies/36456/versions/V1 (accessed on 27 September 2022).
- Government Statistical Service. Statistical Digest of Rural England; Department for Environment, Food & Rural Affairs: London, UK, 2020. Available online: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1002698/04_Statistical_Digest_of_Rural_England_2020_August_edition.pdf (accessed on 27 September 2022).
- Glaeser, E.L.; Sacerdote, B. Why is There More Crime in Cities? J. Politi-Econ. 1999, 107, S225–S258. [Google Scholar] [CrossRef] [Green Version]
- Hacin, R.; Eman, K. Police Officers Perception of Threats in Urban and Rural Environments. Rev. Krim. Kriminol. 2019, 70, 455–468. [Google Scholar]
- Donnermeyer, J. The Importance of Place: Safety and Security of Rural Peoples and Communities in an Urbanising World. Rev. Krim. Kriminol. 2019, 70, 399–408. [Google Scholar]
- Crime in Urban & Rural Areas—Safe Places. Säkraplatser: 2022. Available online: https://www.sakraplatser.abe.kth.se/crime-in-urban-rural-areas/ (accessed on 27 September 2022).
- The World Bank. Rural Population (% of Total Population)|Data; The World Bank: Washington, DC, USA, 2022; Available online: https://data.worldbank.org/indicator/SP.RUR.TOTL.ZS (accessed on 27 September 2022).
- Donnermeyer, J.; DeKeseredy, W. Rural Criminology, 1st ed.; Routledge: Abingdon, Oxon, UK, 2013. [Google Scholar]
- Näsi, M.; Oksanen, A.; Keipi, T.; Räsänen, P. Cybercrime victimization among young people: A multi-nation study. J. Scand. Stud. Criminol. Crime Prev. 2015, 16, 203–210. [Google Scholar] [CrossRef]
- Symantec. Internet Security Threat Report. 2016. Available online: https://docs.broadcom.com/doc/istr-21-2016-en (accessed on 27 September 2022).
- Roberts, L.D.; Indermaur, D.; Pietsch, J.; Aarons, H. Are Neighbourhood Incivilities Associated with Fear of Crime. In Australia: Identity, Fear and Governance in the 21st Century; ANU Press: Canberra, Australia, 2012; pp. 61–78. Available online: https://www.jstor.org/stable/j.ctt24hbqz.10 (accessed on 27 September 2022).
- Meško, G.; Šifrer, J.; Vošnjak, L. Fear of Crime in Urban and Rural Environments in Slovenia. J. Crim. Justice Secur. 2012, 3, 259–276. [Google Scholar]
- Kim, H.-Y. Statistical notes for clinical researchers: Assessing normal distribution (2) using skewness and kurtosis. Restor. Dent. Endod. 2013, 38, 52–54. [Google Scholar] [CrossRef]
- Madden, M.; Lenhart, A.; Cortesi, S.; Gasser, U.; Duggan, M.; Smith, A.; Beaton, M. Part 2: Information Sharing, Friending, and Privacy Settings on Social Media. Pew Res. Cent. Internet Sci. Tech. 21 May 2013. Available online: https://www.pewresearch.org/internet/2013/05/21/part-2-information-sharing-friending-and-privacy-settings-on-social-media/ (accessed on 7 September 2022).
- Perrin, A. Social Media Usage: 2005–2015. Pew Res. Cent. Internet Sci. Tech. 8 October 2015. Available online: https://www.pewresearch.org/internet/2015/10/08/social-networking-usage-2005-2015/ (accessed on 27 September 2022).
- Fujs, D.; Vrhovec, S.; Vavpotic, D. Know Your Enemy: User Segmentation Based on Human Aspects of Information Security. IEEE Access 2021, 9, 157306–157315. [Google Scholar] [CrossRef]
- Meško, G.; Areh, I. Fear of Crime in Urban Environment [Strah pred kriminaliteto v urbanih okoljih]. Rev. Za Kriminalistiko Kriminol. 2003, 54, 144–152. [Google Scholar]
Variable | Frequency | Share (%) | |
---|---|---|---|
Gender | Female | 668 | 52.8 |
Male | 596 | 47.1 | |
Not specified | 2 | 0.2 | |
Age | 18–30 | 273 | 21.6 |
31–45 | 344 | 27.2 | |
46–60 | 334 | 26.4 | |
61– | 313 | 24.7 | |
Not specified | 2 | 0.2 | |
Education | Elementary school (not finished) | 11 | 0.9 |
Elementary school (finished) | 159 | 12.6 | |
High school | 587 | 46.7 | |
2-year college | 131 | 10.3 | |
University degree | 291 | 23 | |
Specialization, master’s degree | 61 | 4.8 | |
Doctorate | 16 | 1.3 | |
Not specified | 10 | 0.8 | |
Status | Employed in the industry | 349 | 27.6 |
Employed (not in the industry) | 289 | 22.8 | |
Self-employed | 76 | 6 | |
Farmer/Housewife | 16 | 1.3 | |
Retired | 311 | 24.6 | |
Student | 157 | 12.4 | |
Unemployed | 53 | 4.2 | |
Other | 11 | 0.9 | |
Not specified | 4 | 0.3 | |
Size of the residence area | Village or settlement with school, post office, shop | 541 | 42.7 |
Suburb or town | 712 | 56.3 | |
Not specified | 13 | 1 |
Activity | PurUse | PerVul | ||
---|---|---|---|---|
Mean | SD | Mean | SD | |
accessing social networks | 2.89 *** | 1.38 | 3.40 * | 1.19 |
online banking | 2.44 *** | 1.48 | 3.16 *** | 1.25 |
online shopping | 2.15 *** | 1.19 | 3.31 *** | 1.19 |
web browsing | 3.32 ** | 1.33 | 3.11 *** | 1.18 |
downloading music and video content | 2.32 *** | 1.34 | 3.18 *** | 1.26 |
e-mail exchange | 3.16 *** | 1.40 | 3.12 *** | 1.15 |
data analysis | 2.22 *** | 1.27 | 2.71 *** | 1.17 |
gaming | 1.77 *** | 1.07 | 2.76 *** | 1.29 |
playing music and videos, reading e-books and articles | 2.77 *** | 1.34 | 2.61 *** | 1.19 |
Activity | Linear Regression | Robust Regression | ||||
---|---|---|---|---|---|---|
Std. Error | t | R2 | Beta | Std. Error | t | |
accessing social networks | 0.025 | 5.94 | 0.029 | 0.169 *** | 0.026 | 5.53 |
online banking | 0.024 | 1.20 | 0.001 | 0.035 | 0.026 | 0.94 |
online shopping | 0.029 | 1.82 | 0.003 | 0.053 | 0.031 | 1.10 |
web browsing | 0.025 | 6.61 | 0.035 | 0.187 *** | 0.027 | 6.67 |
downloading music and video content | 0.027 | 3.47 | 0.010 | 0.100 ** | 0.029 | 3.21 |
e-mail exchange | 0.023 | 9.03 | 0.066 | 0.257 *** | 0.025 | 8.98 |
data analysis | 0.027 | 2.14 | 0.004 | 0.062 * | 0.028 | 2.24 |
gaming | 0.035 | 0.85 | 0.001 | 0.025 | 0.038 | 0.86 |
playing music and video, reading e-books and articles | 0.026 | 2.03 | 0.003 | 0.059 * | 0.027 | 2.11 |
Activity | Location | PurUse | PerVul | ||||
---|---|---|---|---|---|---|---|
Mean | SD | t | Mean | SD | t | ||
accessing social networks | rural | 2.77 | 1.40 | −2.673 ** | 3.30 | 1.21 | −2.452 * |
urban | 2.98 | 1.37 | 3.47 | 1.17 | |||
online banking | rural | 2.34 | 1.46 | −1.867 | 3.05 | 1.25 | −2.822 ** |
urban | 2.51 | 1.50 | 3.25 | 1.25 | |||
online shopping | rural | 2.08 | 1.15 | −1.977 * | 3.17 | 1.20 | −3.667 *** |
urban | 2.21 | 1.21 | 3.42 | 1.17 | |||
web browsing | rural | 3.13 | 1.35 | −4.449 *** | 3.07 | 1.20 | −0.862 |
urban | 3.47 | 1.31 | 3.13 | 1.17 | |||
downloading music and video content | rural | 2.11 | 1.23 | −4.732 *** | 3.16 | 1.27 | −0.280 |
urban | 2.48 | 1.40 | 3.18 | 1.26 | |||
e-mail exchange | rural | 2.95 | 1.39 | −4.415 *** | 3.11 | 1.19 | −0.432 |
urban | 3.31 | 1.39 | 3.14 | 1.12 | |||
data analysis | rural | 2.06 | 1.19 | −3.721 *** | 2.68 | 1.15 | −0.866 |
urban | 2.34 | 1.33 | 2.74 | 1.19 | |||
gaming | rural | 1.66 | 0.99 | −3.272 ** | 2.78 | 1.30 | 0.232 |
urban | 1.86 | 1.12 | 2.76 | 1.29 | |||
playing music and video, reading e-books and articles | rural | 2.56 | 1.31 | −4.796 *** | 2.62 | 1.18 | 0.169 |
urban | 2.93 | 1.34 | 2.61 | 1.20 |
Victimization | Location | Never | Once | Twice or More | Not Specified | χ2 |
---|---|---|---|---|---|---|
cyber harassment | rural | 71.0 | 9.1 | 15.7 | 4.3 | 1.48 |
urban | 68.4 | 10.8 | 16.9 | 3.9 | ||
extortion in cyberspace | rural | 86.7 | 5.0 | 4.8 | 3.5 | 2.87 |
urban | 89.3 | 3.2 | 4.2 | 3.2 | ||
malware infection | rural | 61.9 | 17.0 | 17.9 | 3.1 | 3.79 |
urban | 58.0 | 21.3 | 17.6 | 3.1 | ||
impersonation/phishing | rural | 79.5 | 8.9 | 8.7 | 3.0 | 3.95 |
urban | 75.4 | 12.1 | 9.7 | 2.8 | ||
dissemination of indecent material | rural | 81.1 | 8.5 | 7.6 | 2.8 | 13.49 ** |
urban | 75.1 | 7.7 | 14.2 | 2.9 | ||
spreading hate speech | rural | 76.2 | 10.7 | 10.2 | 3.0 | 14.66 ** |
urban | 71.2 | 8.3 | 17.6 | 2.9 | ||
spreading rumors | rural | 76.2 | 10.4 | 10.7 | 2.8 | 17.23 *** |
urban | 68.8 | 9.0 | 19.2 | 2.9 | ||
online banking frauds | rural | 91.1 | 2.2 | 2.4 | 4.3 | 2.12 |
urban | 90.0 | 3.7 | 2.4 | 3.9 | ||
ransomware | rural | 90.4 | 3.5 | 2.8 | 3.3 | 2.24 |
urban | 91.0 | 3.4 | 1.5 | 4.1 | ||
wireless network interference | rural | 81.5 | 7.9 | 6.8 | 3.7 | 7.65 * |
urban | 75.6 | 10.5 | 10.3 | 3.7 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bernik, I.; Prislan, K.; Mihelič, A. Country Life in the Digital Era: Comparison of Technology Use and Cybercrime Victimization between Residents of Rural and Urban Environments in Slovenia. Sustainability 2022, 14, 14487. https://doi.org/10.3390/su142114487
Bernik I, Prislan K, Mihelič A. Country Life in the Digital Era: Comparison of Technology Use and Cybercrime Victimization between Residents of Rural and Urban Environments in Slovenia. Sustainability. 2022; 14(21):14487. https://doi.org/10.3390/su142114487
Chicago/Turabian StyleBernik, Igor, Kaja Prislan, and Anže Mihelič. 2022. "Country Life in the Digital Era: Comparison of Technology Use and Cybercrime Victimization between Residents of Rural and Urban Environments in Slovenia" Sustainability 14, no. 21: 14487. https://doi.org/10.3390/su142114487
APA StyleBernik, I., Prislan, K., & Mihelič, A. (2022). Country Life in the Digital Era: Comparison of Technology Use and Cybercrime Victimization between Residents of Rural and Urban Environments in Slovenia. Sustainability, 14(21), 14487. https://doi.org/10.3390/su142114487