• Indexed in

  • Latest News

    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2022
    Volume 11, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2022
    Volume 11, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research

    Author(s): STAMATAKIS, Nikolaos; SMITH, Troy

    Quick view | Full article | Citations | Views: 299

    Author(s) keywords: , , ,

    Reference keywords: ,


    In the last years, Caribbean countries have become attractive targets for cybercrime due to increased economic success and online presence with a low level of cyber resilience. The available data on cybersecurity and critical infrastructure shows that cyber-attacks and -incidents, particularly those carried out with criminal intent, have been increasing in frequency and sophistication. This study examines the variables or more specifically the online-related activities in Trinidad and Tobago that affect cybercrime victimization by using the Routine Activity Theory. Using Bayesian classifiers and Facebook as a data collection instrument, the analysis of the quantitative data demonstrates that the use of only the accuracy measures to judge model performance or compare models could be misleading. It also shows that awareness and education related to cybercrime is necessary to persons of all ages, suggesting that in order to move forward as a digital economy, the region must secure the trust of users by providing an open, stable, and secure environment.


    [1]. Alkaabi, A., Mohay, G., McCullagh, A., & Chantler, A. (2010). Dealing with the Problem of Cybercrime. 2nd International ICST Conference on Digital Forensics & Cyber Crime. Abu Dhabi.

    [2]. Álvarez-García, D., Pérez, J. C. N., González, A. D., & Pérez, C. R. (2015). Risk Factors Associated with Cybervictimization in Adolescence. International Journal of Clinical and Health Psychology, 15, 226–235.

    [3]. Arachchilage, N. A. G., & Love, S. (2014). Security Awareness of Computer Users: A Phishing Threat Avoidance Perspective. Computers in Human Behavior, 38, 304–312.

    [4]. Awan, I. (2014). Islamophobia and Twitter: A Typology of Online Hate Against Muslims on Social Media. Policy & Internet, 6(2), 133–150.

    [5]. Barrett, K.A. (2013). Cyber Security in Trinidad and Tobago- A Public Sector Perspective. Committee on Hemispheric Security.

    [6]. Beaujean, A. A. (2014). Latent Variable Modeling Using R: A Step-by-Step Guide. New York: Routledge.

    [7]. Bossler, A. M., Holt, T. J., & May, D. C. (2012). Predicting Online Harassment Victimization Among a Juvenile Population. Youth and Society, 44(4), 500–523.

    [8]. Bossler, A. M., & Holt, T. J. (2010). The Effect of Self-Control on Victimization in the Cyberworld. Journal of Criminal Justice, 38(3), 227–236.

    [9]. Bryan, C. (2015, June 7). Cybercrime - An Emergent Global Phenomenon with Implications for the Caribbean. The Jamaica Observer. Retrieved from: http://www.jamaicaobserver.com/columns/Cybercrime---An-emergent-global-phenomenon-with- implications-for-the-Caribbean_18719905

    [10]. Bynoe, J. (2015, August 22). Caribbean is Losing Millions to Cyber Criminals! St. Kitts and Nevis Observer. Retrieved from: http://stkittsandnevisobserver.com/2015/08/22/caribbean-businesses-governments-and-people-losing- millions-to-cyber-criminals/

    [11]. Calvo-Armengol, A., & Zenou, Y. (2003). Social Networks and Crime Decisions: The Role of Social Structure in Facilitating Delinquent Behaviour. London: Centre for Economic Policy Research.

    [12]. Caribbean Cyber Security Center. (n.d.). Caribbean Cyber Security. 2019.

    [13]. CARICOM IMPACS. (2016). Cybersecurity and the CARICOM Environment.

    [14]. Central Statistical Office. (2019). Mid-Year Estimates of Population. Retrieved April 22, 2017. Retrieved from: http://cso.gov.tt/data/?productID=32-Mid-Year-Estimates-of-Population-by-Age-Group

    [15]. Cheung, C. M. K., Liu, I. L. B., & Lee, M. K. O. (2015). How Online Social Interactions Influence Customer Information Contribution Behavior in Online Social Shopping Communities: A Social Learning Theory Perspective. Journal of the Association for Information Science and Technology, 66(12), 2511–2521.

    [16]. Choi, K. (2008). Computer Crime Victimization and Integrated Theory: An Empirical Assessment. International Journal of Cyber Criminology, 2(1), 308–333.

    [17]. Dusek, G. A., Yurova, Y. Y. V., Ruppel, C. P., & P. Ruppel, C. (2015). Using Social Media and Targeted Snowball Sampling to Survey a Hard-to-Reach Population: A Case Study. International Journal of Doctoral Studies, 10, 279–299.

    [18]. Garson, D. (2014). Statistical Associates Library of Statistics Books. Asheboro: Statistical Associates Publishers.

    [19]. Garson, G. D. (2015). Missing values analysis and data imputation. Statistical Associates Publishers, 1–26. Retrieved from www.statisticalassociates.com

    [20]. Gordon, S., & Ford, R. (2006). On the Definition and Classification of Cybercrime. Journal in Computer Virology. Retrieved from: https://doi.org/10.1007/s11416-006-0015-z

    [21]. Holt, T. J., & Bossler, A. M. (2009). Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization. Deviant Behavior, 30(1), 1–25.

    [22]. Holt, T. J., & Bossler, A. M. (2013). Examining the Relationship Between Routine Activities and Malware Infection Indicators. Journal of Contemporary Criminal Justice, 29(4), 420-436.

    [23]. Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low Self-Control, Deviant Peer Associations and Juvenile Cyberdeviance. Justice American Journal of Criminal Justice, 37(3), 378–395.

    [24]. Holt, T. J., & Bossler, A. M. (2014). An Assessment of the Current State of Cybercrime Scholarship. Deviant Behavior, 35(1), 20–40.

    [25]. Holtfreter, K., Reisig, M. D., & Blomberg, T. G. (2006). Consumer Fraud victimization in Florida: An Empirical Study. St. Thomas Law Review, 18, 761–879.

    [26]. Inter-American Development Bank, & Organization of American States. (2016). Cybersecurity: Are we Ready in Latin America and the Caribbean?: 2016 Cybersecurity Report. Retrieved from https://publications.iadb.org/bitstream/handle/11319/7449/Cybersecurity-Are-We-Prepared-in-Latin-America-and-the-Caribbean.pdf?sequence=1

    [27]. Inter-Ministerial Committee for Cyber Security. (2012). National Cyber Security Strategy. Port of Spain: Government of the Republic of Trinidad & Tobago.

    [28]. Isaac, S., & Michael, W. B. (1995). Handbook in Research and Evaluation: A Collection of Principles, Methods, and Strategies Useful in the Planning, Design and Evaluation of Studies in Education and the Behavioral Sciences. San Diego, Calif.: EDITS Publishers.

    [29]. Jessop, D. (2016). Action Needed to Address Caribbean Cybersecurity. Retrieved April 11, 2017, from Trinidad Express Newspaper website: http://www.caribbean-council.org/action-needed-address-caribbean-cyber-security/

    [30]. Johanson, G. A., & Brooks, G. P. (2010). Initial Scale Development: Sample Size for Pilot Studies. Educational and Psychological Measurement, 70(3), 394–400.

    [31]. Julious, S. A. (2005). Sample Size of 12 per Group Rule of Thumb for a Pilot Study. Pharmaceutical Statistics, 4(4), 287–291.

    [32]. Kosinski, M., Matz, S. C., Gosling, S. D., Popov, V., & Stillwell, D. (2016). Facebook as a Research Tool: A Look at How to Recruit Participants Using Facebook and the Ethical Concerns That Come with Social Media Research. 70(6): 543-556.

    [33]. Kranenbarg, M., Ruiter, S., & van Gelder, J. L. (2019). Do Cyber-Birds Flock Together? Comparing Deviance Among Social Network Members of Cyber-Dependent Offenders and Traditional Offenders. European Journal of Criminology. Retrieved from: https://doi.org/10.1177/1477370819849677

    [34]. Kshetri, N. (2013a). Cybercrime and Cybersecurity in Latin American and Caribbean Economies BT - Cybercrime and Cybersecurity in the Global South (N. Kshetri, Ed.). Retrieved from: https://doi.org/10.1057/9781137021946_7

    [35]. Kshetri, N. (2013b). Reliability, Validity, Comparability and Practical Utility of Cybercrime-Related Data, Metrics and Information. Information (Switzerland), 4(1), 117–123.

    [36]. Leukfeldt, E. R., & Yar, M. (2016). Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis. Deviant Behavior, 37(3), 263-280.

    [37]. Little, T. D., Jorgensen, T. D., Lang, K. M., & Moore, E. W. G. (2014). On the Joys of Missing Data. Journal of Pediatric Psychology, 39(2), 151–162.

    [38]. Marcum, C., Ricketts, M., & Higgins, G. (2010). Assessing Sex Experiences of Online Victimization: An Examination of Adolescent Online Behaviors Using Routine Activity Theory. Criminal Justice Review, 35(4), 412–437.

    [39]. Marshall, G., Shroyer, A. L. W., Grover, F. L., & Hammermeister, K. E. (1994). Bayesian-Logit Model for Risk Assessment in Coronary Artery Bypass Grafting. The Annals of Thoracic Surgery, 57(6), 1492–1500.

    [40]. McGuire, M., & Dowling, S. (2013). Cyber Crime: A Review of the Evidence. Research Report 75. Retrieved from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/

    [41]. Mercado, M. (2019). How Many Women Have Received " Dick Pics "? According to Research, Over Half of Millennial Women Have. Retrieved October 15, 2019, from Bustle website: https://www.bustle.com/p/how-many-women-have-received-dick-pics-according-to-research-over-half-of-millennial-women-have-2893328

    [42]. Moore, R., Guntupalli, N., & Lee, T. (2010). Parental Regulation and Online Activities: Examining Factors that Influence a Youth’s Potential to Become a Victim of Online Harassment. International Journal of Cyber Criminology, 4, 685–698.

    [43]. Nasi, M., Oksanen, A., Keipi, T., & Rasanen, P. (2015). Cybercrime Victimization Among Young People: A Multi-Nation Study. Journal of Scandinavian Studies in Criminology and Crime Prevention. 16(2), 203-210.

    [44]. Navarro, J. N., & Jasinski, J. L. (2012). Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences. Sociological Spectrum, 32(1), 81–94.

    [45]. Ngo, F. T., & Paternoster, R. (2011). Cybercrime Victimization: An Examination of Individual and Situational Level Factors. International Journal of Cyber Criminology, 5(1), 773–793.

    [46]. Organisation of American States. (2014). Latin American and Caribbean Cyber Security Trends. Washington (D.C.).

    [47]. Pasian, N., & Dunning, T. (2009). Developing and Validating a Questionnaire to Measure Spirituality: A Psychometric Process. Retrieved from: http://hdl.handle.net/10536/DRO/DU:30019516

    [48]. Queensland Government Statistician Office. (2017). Survey Methods. Retrieved from: http://www.qgso.qld.gov.au/about-statistics/survey-methods/index.php

    [49]. Ranganathan, P., Pramesh, C., & Aggarwal, R. (2017). Common Pitfalls in Statistical Analysis: Logistic Regression. Perspectives in Clinical Research, 6, 37–39.

    [50]. Reyns, B. W. (2013). Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory Beyond Direct-Contact Offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238.

    [51]. Reyns, B. W. (2015). A Routine Activity Perspective on Online Victimization. Journal of Financial Crime, 22(4), 396–411.

    [52]. Reyns, B. W., Fisher, B. S., Bossler, A. M., Holt, T. J., & Holt, T. J. (2018). Opportunity and Self-Control: Do they Predict Multiple Forms of Online Victimization?. American Journal of Criminal Justice. Retrieved from: https://doi.org/10.1007/s12103-018-9447-5

    [53]. Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being Pursued Online. Criminal Justice and Behavior, 38(11), 1149–1169.

    [54]. Samuels, D. J., & Zucco, C. (2012). Using Facebook as a Subject Recruitment Tool for Survey-Experimental Research. SSRN Electronic Journal. Retrieved from: https://doi.org/10.2139/ssrn.2101458

    [55]. Scandlbauer, A. (2016). Latin America and the Caribbean: Climbing the Cybersecurity Ladder. Retrieved from https://www.thegfce.com/news/news/2016/06/20/climbing-the-cybersecurity-ladder

    [56]. Shearmur, J. F. (2015). The Gift Relationship Revisited. HEC Forum, 27(4), 301–317.

    [57]. Sijtsma, K. (2009). On the Use, the Misuse and the Very Limited Usefulness of Cronbach’s Alpha. Psychometrika, 74(1), 107–120.

    [58]. Taber, K. S. (2018). The Use of Cronbachs Alpha When Developing and Reporting Research Instruments in Science Education. Research in Science Education, 48(6), 1273–1296.

    [59]. Taber, K. S. (2017). The Use of Cronbach’s Alpha When Developing and Reporting Research Instruments in Science Education. Research in Science Education, 48(6), 1273–1296.

    [60]. Tavani, H. T. (2011). Ethics and technology: Controversies, Questions and Strategies for Ethical Computing. Hoboken, N.J.: Wiley.

    [61]. Tavani, H. T. (2001). The State of Computer Ethics as a Philosophical Field of Inquiry: Some Contemporary Perspectives, Future Projections and Current Resources. Ethics and Information Technology, 3(2), 97–108.

    [62]. Teclaw, R., Price, M. C., & Osatuke, K. (2012). Demographic Question Placement: Effect on Item Response Rates and Means of a Veterans Health Administration Survey. Journal of Business and Psychology. 27, 281-290.

    [63]. van Griethuijsen, R. A. L. F., van Eijck, M. W., Haste, H., den Brok, P. J., Skinner, N. C., Mansour, N., & BouJaoude, S. B. (2015). Global Patterns in Students’ Views of Science and Interest in Science. Research in Science Education, 45(4), 581–603.

    [64]. van Ouytsel, J., Ponnet, K., & Walrave, M. (2018). Cyber Dating Abuse Victimization Among Secondary School Students from a Lifestyle-Routine Activities Theory Perspective. Journal of Interpersonal Violence, 33(17), 2767–2776.

    [65]. van Teijlingen, E. R., Rennie, A.-M., Hundley, V., & Graham, W. (2001). The Importance of Conducting and Reporting Pilot Studies: The Example of the Scottish Births Survey. Journal of Advanced Nursing, 34(3), 289–295.

    [66]. van Wilsem, J. (2013). Hacking and Harassment-Do They Have Something in Common? Comparing Risk Factors for Online Victimization. Journal of Contemporary Criminal Justice, 29(4), 437–453.

    [67]. Voo, T. (2011). The Social Rationale of the Gift Relationship. Journal of Medical Ethics, 37(11), 663–667.

    [68]. Wolak, J., Mitchell, K., Finkelhor, D., (U.S.), N. C. for M. & E. C., Hampshire., U. of N., Center., C. A. C. R., … Prevention., O. of J. J. and D. (2006). Online victimization of Youth: Five Years Later. Retrieved from http://www.missingkids.com/en_US/publications/NC167.pdf

    [69]. Yucedal, B. (2010). Victimization in Cyberspace: An Application of Routine Activity and Lifestyle Exposure Theories. Kent State University. Retrieved from: http://rave.ohiolink.edu/etdc/view?acc_num=kent1279290984.

    [70]. Zhang, H. (2004). The Optimality of Naive Bayes. University of New Brunswick. Retrieved from: http://www.cs.unb.ca/~hzhang/publications/FLAIRS04ZhangH.pdf

    [71]. Zucco, C., Luna, J. P., & Baykal, G. (2017). Are Conditional Government Transfers a Politically Acceptable form of Redistribution?. Retrieved from: https://pdfs.semanticscholar.org/f83c/0caa7b0ccf6ca9eb72083deb476044ce6085.pdf

    Additional Information

    Article Title: Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research
    Author(s): STAMATAKIS, Nikolaos; SMITH, Troy
    Date of Publication: 2019-12-27
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2019.02.05
    Issue: Volume 8, Issue 2, Year 2019
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 53-88 (36 pages)

    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.