5. Felson, M., & Cohen, L. E. (1980). Human ecology and crime: A routine activity approach. Human
Ecology, 8, 389–406.
6. Hadlington, L., & Murphy, K. (2018). Is Media Multitasking Good for Cybersecurity? Exploring the
Relationship Between Media Multitasking and Everyday Cognitive Failures on Self-Reported Risky
Cybersecurity Behaviors. Cyberpsychology, Behavior, and Social Networking, 21(3), 168–172.
https://doi.org/10.1089/cyber.2017.0524.
7. Hawdon, J. (2021). Cybercrime: Victimization, perpetration, and techniques. American Journal of
Criminal Justice, 46(6), 837–842.
8. Herrero, J., Torres, A., Vivas, P., Hidalgo, A., Rodríguez, F. J., & Urueña, A. (2021). Smartphone
addiction and cybercrime victimization in the context of lifestyles routine activities and self-control
theories: The user’s dual vulnerability model of cybercrime victimization. International Journal of
Environmental Research and Public Health, 18(7), 3763.
9. Hirschi, T. (2004). Self-control and crime. Handbook of Self-Regulation, 537–552.
10. Jansen, J., &Leukfeldt, R. (2018). Coping with cybercrime victimization: An exploratory study into
impact and change. Journal of Qualitative Criminal Justice and Criminology, 6(2), 205–228.
11. Kaakinen, M., Keipi, T., Räsänen, P., & Oksanen, A. (2018). Cybercrime victimization and subjective
well-being: An examination of the buffering effect hypothesis among adolescents and young adults.
Cyberpsychology, Behavior, and Social Networking, 21(2), 129–137.
12. Kaur, E. N. (2018). Introduction of cybercrime and its type. International Research Journal of
Computer Science, 7(4), 71-89.
13. Kwak, H., & Kim, E.-K. (2022). The role of low self-control and risky lifestyles in criminal
victimization: A study of adolescents in South Korea. International Journal of Environmental Research
and Public Health, 19(18), 11500.
14. Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and
empirical analysis. Deviant Behavior, 37(3), 263–280.
15. Kranenbarg, M., Holt, T. J., & Van Gelder, J.-L. (2019). Offending and victimization in the digital age:
Comparing correlates of cybercrime and traditional offending-only, victimization-only and the
victimization-offending overlap. Deviant Behavior, 40(1), 40–55.
16. Levi, M., Doig, A., Gundur, R., Wall, D., & Williams, M. (2017). Cyberfraud and the implications for
effective risk-based responses: themes from UK research. Crime, Law and Social Change, 67, 77–96.
17. Mikkola, M., Oksanen, A., Kaakinen, M., Miller, B. L., Savolainen, I., Sirola, A., Zych, I., & Paek,
H.J. (2020). Situational and individual risk factors for cybercrime victimization in a cross-national
context. International Journal of Offender Therapy and Comparative Criminology,
0306624X20981041.
18. Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and
situational level factors. International Journal of Cyber Criminology, 5(1), 773.
19. Nodeland, B. (2020). The effects of self-control on the cyber victim-offender overlap. International
Journal of Cybersecurity Intelligence & Cybercrime, 3(2), 4–24.
20. Ogbonnaya, M. (2020). Cybercrime in Nigeria demands public-private action-ISS Africa. 2, 6-16.
21. Omaojor, O. (2020). Population Density and Crime Rate in the Federal Capital Territory: The Role of
the Nigerian Police Force [Thesis Dissertation, Nigerian Defence Academy].
Https://Www.Academia.Edu/64117225/Population_Density_And_Crime_Rate_In_The_Federal_Capit
al_Territory_The_Role_Of_The_Nigerian_Police_Force.
22. Payne, B., May, D. C., &Hadzhidimova, L. (2019). America’s most wanted criminals: Comparing
cybercriminals and traditional criminals. Criminal Justice Studies, 32(1), 1–15.
23. Peker, A. (2017). An examination of the relationship between self-control and cyber victimization in
adolescents. Eurasian Journal of Educational Research, 16(67).
24. Peluchette, J. V., Karl, K., Wood, C., & Williams, J. (2015). Cyberbullying victimization: Do victims’
personality and risky social network behaviors contribute to the problem? Computers in Human
Behavior, 52, 424–435.
25. Rauf, A. (2019). The Importance of Human Factor in Cyber security. Journal of Security, 9, 91-98.
26. Rokven, J. J., Weijters, G., Beerthuizen, M. G., & van der Laan, A. M. (2018). Juvenile Delinquency in
the Virtual World: Similarities and Differences between Cyber-Enabled, Cyber-Dependent and Offline
Delinquents in the Netherlands. International Journal of Cyber Criminology, 4(7), 450-479.