Routine activities theory and food fraud victimization

被引:2
|
作者
Lee, Byung [1 ]
Fenoff, Roy [2 ]
Spink, John [3 ]
机构
[1] Cent Connecticut State Univ, Dept Criminol & Criminal Justice, New Britain, CT 06050 USA
[2] The Citadel, Mil Coll South Carolina, Dept Criminal Justice, Charleston, SC 29409 USA
[3] Michigan State Univ, Eli Broad Coll Business, Dept Supply Chain Management, E Lansing, MI 48824 USA
关键词
Routine activities theory; Food fraud; Food safety; Online victimization; Financial crime; IDENTITY THEFT VICTIMIZATION; RISK; CRIME; PREVENTION; STRATEGIES; CYBERCRIME; QUALITY; AUTHENTICATION; VULNERABILITY; DETERMINANTS;
D O I
10.1057/s41284-021-00287-1
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Food fraud is a widespread problem that involves the act of defrauding consumers for economic gain. Food fraud incidents pose a considerable threat to the economic stability of agri-food industry as well as the health and welfare of consumers. With the increasing use of online grocery shopping, the Internet has facilitated deceptive and fraudulent practices by criminals. Using a sample of U.S. consumers, the current study explores the applicability of routine activities theory in the context of food fraud. The findings show that online routine activities, online target suitability, exposure to food ads, and perceived risk are significantly linked to food fraud victimization. Our study demonstrates that the routine activities theory is a useful framework to understand the vulnerabilities associated with food fraud. Implications for research and policy are discussed.
引用
收藏
页码:506 / 530
页数:25
相关论文
共 50 条
  • [21] Applying Routine Activities Theory to Assess On and Offline Bullying Victimization among Australian Youth
    Malinski, Rebecca
    Holt, Thomas J.
    Cale, Jesse
    Brewer, Russell
    Goldsmith, Andrew
    [J]. JOURNAL OF SCHOOL VIOLENCE, 2023, 22 (01) : 1 - 13
  • [22] BEING PURSUED ONLINE Applying Cyberlifestyle-Routine Activities Theory to Cyberstalking Victimization
    Reyns, Bradford W.
    Henson, Billy
    Fisher, Bonnie S.
    [J]. CRIMINAL JUSTICE AND BEHAVIOR, 2011, 38 (11) : 1149 - 1169
  • [23] Sexual Harassment Victimization During Emerging Adulthood A Test of Routine Activities Theory and a General Theory of Crime
    Clodfelter, Tammatha A.
    Turner, Michael G.
    Hartman, Jennifer L.
    Kuhns, Joseph B.
    [J]. CRIME & DELINQUENCY, 2010, 56 (03) : 455 - 481
  • [24] Cyber-harassment victimization of Portuguese adolescents: A lifestyle-routine activities theory approach
    Vale, Maria
    Pereira, Filipa
    Spitzberg, Brian H.
    Matos, Marlene
    [J]. BEHAVIORAL SCIENCES & THE LAW, 2022, 40 (05) : 604 - 618
  • [25] Assessing the Relationship between Lifestyle Routine Activities Theory and Online Victimization Using Panel Data
    Guerra, Chris
    Ingram, Jason R.
    [J]. DEVIANT BEHAVIOR, 2022, 43 (01) : 44 - 60
  • [26] Routine Activities and Criminal Victimization: The Significance of Gendered Spaces
    Savard, Dennis M.
    Kelley, Thomas M.
    Merolla, David M.
    [J]. JOURNAL OF INTERPERSONAL VIOLENCE, 2020, 35 (23-24) : 5425 - 5447
  • [27] Victimization from terrorist attacks: Randomness or routine activities?
    Canetti-Nisim, Daphna
    Mesch, Gustavo
    Pedahzur, Ami
    [J]. TERRORISM AND POLITICAL VIOLENCE, 2006, 18 (04) : 485 - 501
  • [28] STREET CODES, ROUTINE ACTIVITIES, NEIGHBOURHOOD CONTEXT AND VICTIMIZATION
    McNeeley, Susan
    Wilcox, Pamela
    [J]. BRITISH JOURNAL OF CRIMINOLOGY, 2015, 55 (05): : 921 - 943
  • [29] Under the Corporate Radar: Examining Insider Business Cybercrime Victimization through an Application of Routine Activities Theory
    Williams, Matthew L.
    Levi, Michael
    Burnap, Pete
    Gundur, R., V
    [J]. DEVIANT BEHAVIOR, 2019, 40 (09) : 1119 - 1131
  • [30] Assessing risk of victimization through epidemiological concepts: An alternative analytic strategy applied to routine activities theory
    Arnold, R
    Keane, C
    Baron, S
    [J]. CANADIAN REVIEW OF SOCIOLOGY AND ANTHROPOLOGY-REVUE CANADIENNE DE SOCIOLOGIE ET D ANTHROPOLOGIE, 2005, 42 (03): : 345 - 364