The application of routine activity theory in explaining victimization of child marriage

被引:1
|
作者
Valan, Michael L. [1 ]
Srinivasan, Murugesan [2 ]
机构
[1] DG Vaishnav Coll, Chennai, Tamil Nadu, India
[2] Univ Madras, Chennai, Tamil Nadu, India
关键词
Child marriage; routine activity theory; victimization; INTIMATE PARTNER VIOLENCE; REPRODUCTIVE HEALTH; DOMESTIC VIOLENCE; WOMEN; CHILDBEARING; TRANSITION; COUNTRIES; OUTCOMES; COUPLES; TRENDS;
D O I
10.1177/0269758020988218
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
The present research is an attempt to explain the problem of child marriage in light of routine activity theory, developed by Felson and Cohen in 1979. There is, however, no specific theory that exclusively addresses either children as victims of crime in general or victims of child marriage in particular. Unlike other crime victims, however, certain victims of child marriage do not view themselves as 'victims', given the underlying causative factors and the justification of the consequences of such victimization. Routine activity theory was initially intended to explain property crimes. In course of time, scholars of victimology began applying this theory to explain various kinds of victimization, including domestic violence in different contexts. In this connection, a study was conducted among victims of child marriage in the state of Tamil Nadu, India, to link the practice of child marriage with the routine activity theory. For the purpose of the present research, data were collected from 252 women who were married as children. The findings of the research have revealed that the practice of child marriage can be explained from two dimensions: the first explains the causes underlying its occurrence, and the second deals with how intimate partner violence plays out in such circumstances. The outcome of this research is expected to fill a gap in the literature in the field of victimology.
引用
收藏
页码:211 / 226
页数:16
相关论文
共 50 条
  • [1] Explaining Fear of Identity Theft Victimization Using a Routine Activity Approach
    Choi, Jaeyong
    Kruis, Nathan E.
    Choo, Kyung-Seok
    [J]. JOURNAL OF CONTEMPORARY CRIMINAL JUSTICE, 2021, 37 (03) : 406 - 426
  • [2] A Gendered Lifestyle-Routine Activity Approach to Explaining Stalking Victimization in Canada
    Reyns, Bradford W.
    Henson, Billy
    Fisher, Bonnie S.
    Fox, Kathleen A.
    Nobles, Matt R.
    [J]. JOURNAL OF INTERPERSONAL VIOLENCE, 2016, 31 (09) : 1719 - 1743
  • [3] Telecommunication and cyber fraud victimization among Chinese college students: An application of routine activity theory
    Lin, Kai
    Wu, Yuning
    Sun, Ivan Y.
    Qu, Jia
    [J]. CRIMINOLOGY & CRIMINAL JUSTICE, 2023,
  • [4] The Sexual Victimization of College Students: A Test of Routine Activity Theory
    Hayes, Brittany E.
    O'Neal, Eryn Nicole
    Hernandez, Cristal N.
    [J]. CRIME & DELINQUENCY, 2021, 67 (12) : 2043 - 2068
  • [5] Cyber victimization within the Routine Activity Theory Framework in the Digital Age
    Morillo Puente, Solbey
    Rios Hernandez, Ivan Neftali
    [J]. REVISTA DE PSICOLOGIA PUCP, 2022, 40 (01): : 265 - 291
  • [6] Gender, Adolescent Lifestyles, and Violent Victimization: Implications for Routine Activity Theory
    Henson, Billy
    Wilcox, Pamela
    Reyns, Bradford W.
    Cullen, Francis T.
    [J]. VICTIMS & OFFENDERS, 2010, 5 (04) : 303 - 328
  • [7] Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization
    Leukfeldt, E. Rutger
    [J]. CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING, 2014, 17 (08) : 551 - 555
  • [8] Journey to Crime and Victimization: An Application of Routine Activities Theory and Environmental Criminology to Homicide
    Pizarro, Jesenia M.
    Corsaro, Nicholas
    Yu, Sung-suk Violet
    [J]. VICTIMS & OFFENDERS, 2007, 2 (04) : 375 - 394
  • [9] Routine activities theory and food fraud victimization
    Byung Lee
    Roy Fenoff
    John Spink
    [J]. Security Journal, 2022, 35 : 506 - 530
  • [10] Routine activities theory and food fraud victimization
    Lee, Byung
    Fenoff, Roy
    Spink, John
    [J]. SECURITY JOURNAL, 2022, 35 (02) : 506 - 530