Actividades cotidianas en redes sociales Estudio del comportamiento habitual y las medidas protección de los usuarios de Facebook, Instagram y Twitter

  1. Solari-Merlo, Mariana N. 1
  1. 1 Universidad de Cádiz

    Universidad de Cádiz

    Cádiz, España


Revista de Derecho Penal y Criminología

ISSN: 1132-9955

Year of publication: 2021

Issue: 25

Pages: 305-340

Type: Article

DOI: 10.5944/RDPC.25.2021.29856 DIALNET GOOGLE SCHOLAR lock_openOpen access editor

More publications in: Revista de Derecho Penal y Criminología

Sustainable development goals


The increasing use of social networks leads to an increasing exposure of personal information that can be used for the commission of various types of crimes. This new space of crime has been analysed on different occasions in light of the Routine Activity Theory and Lifestyles Theory, placing special interest in the habitual routines of users of these platforms - online lifestyles - and in the self-protection measures that they establish - guardians - to avoid becoming a suitable target. Based on thesedevelopments, this work analyses the habitual behaviour of the users ofthe main social networks –Facebook, Instagram and Twitter– in order to determine their degree of self-exposure, their self-protection measures and the negative consequences experienced with their use.

Bibliographic References

  • A. BAILLON et al., “Informing, simulating experience, or both: A field experiment on phishing risks”, PLoS ONE 14(12): e0224216, 2019.
  • A. M. BOSSLER et al., “Predicting online harassment victimization among a juvenile population”, Youth & Society, 44 (4), 2012, 500–523.
  • K. S. CHOI, “Computer Crime Victimization and Integrated Theory: An Empirical Assessment”, International Journal of Cyber Criminology, 2 (1), 2008, 308–333.
  • K. S. CHOI et al., “Mobile Phone Technology and Online Sexual Harassment among Juveniles in South Korea: Effects of Self-control and Social Learning”, International Journal of Cyber Criminology, 11 (1), 2017, 110–127.
  • K. S. CHOI et al., “Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine activities theory with latent class analysis”, Computers in Human Behavior, 100, 2019, 1-10.
  • R. V. CLARKE, “Hot Products: Understanding, Anticipating and Reducing Demand for Stolen Goods”, Police Research Series, Paper 112, Policing and Reducing Crime Unit, Research Development and Statistics Directorate. Home Office, 1999.
  • L. E. COHEN y Marcus FELSON, “Social change and crime rate trends: A routine activity approach”, American Sociological Review, 44, 1979, 588-608.
  • L. E. COHEN et al., “Social inequality and predatory criminal victimization: An exposition and test of a formal theory”, American Sociological Review, 46, 1981, 505-524.
  • J. E. ECK y R. V. CLARKE, “Classifying Common Police Problems: A Routine Activity Theory Approach”, en M. J. SMITH y D. B. CORNISH (Eds.), Theory and Practice in Situational Crime Prevention. Crime Prevention Studies, vol. 16, Criminal Justice Press, Nueva York, 2003, 7-39.
  • M. FELSON y R. V. CLARKE, “Opportunity makes the thief: practical theory for crime prevention”, Police Research Series, Paper 98, Policing and Reducing Crime Unit, Research Development and Statistics Directorate. Home Office, 1998.
  • M. FELSON y M. A. ECKERT, Crime and Everyday Life A Brief Introduction, 6ª ed., SAGE Publications, California, 2018.
  • M. J. HINDELANG. et al., Victims of personal crime: An empirical foundation for a theory of personal victimization, Ballinger, Cambridge, 1978.
  • T. J. HOLT y A. M. BOSSLER, “Examining the applicability of lifestyle-routine activities theory for cyber crime victimization”, Deviant Behavior, 30, 2009, 1-25.
  • A. HUTCHINGS y H. HAYES, “Routine Activity Theory and Phishing Victimisation: Who Gets Caught in the ‘Net’?”, Current Issues In Criminal Justice, 20 (3), 2009, 433-451.
  • IAB, España, Estudio de Redes Sociales 2020. Accesible en [Fecha de consulta: 21/07/2020]
  • S. REDONDO ILLESCAS y V. GARRIDO GENOVÉS, Principios de Criminología, 4ª ed., Tirant lo Blanch, Valencia, 2013.
  • S. KEMP, Digital 2020: Global Digital Overview. Accesible en [Fecha de consulta: 21/07/2020]
  • B. LECLERC y M. FELSON, “Routine Activities Preceding Adolescent Sexual Abuse of Younger Children”, Sexual Abuse: A Journal of Research and Treatment, 28 (2), 2016, 116-131.
  • E. R. LEUKFELDT y M. YAR, “Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis”, Deviant Behavior, 37 (3), 2016, 263-280.
  • C. D. MARCUM et al., “Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory”, Deviant Behavior, 31 (5), 2010, 381-410.
  • MCGUIRE, M. y DOWLING, S., “Chapter 2: Cyber-enabled crimes fraud and theft”, Research Report 75, Home Office, 2013.
  • E. MCLAUGHLIN, “Routine Activities Theory”, en E. MCLAUGHLIN y J. MUNICE (Eds.), The Sage Dictionary of Criminology, SAGE Publications, Londres, 2006, 365-367.
  • J. MEDINA ARIZA, Políticas y estrategias de prevención del delito y seguridad ciudadana, Edisofer, Madrid, 2013.
  • F. MIRÓ LLINARES, “La oportunidad criminal en el ciberespacio. Aplicación y desarrollo de la teoría de las actividades cotidianas para la prevención del cibercrimen”, RECPC, 13-07, 2011.
  • F. MIRÓ LLINARES. “La victimización por cibercriminalidad social. Un estudio a partir de la teoría de las actividades cotidianas en el ciberespacio”, REIC, 5 (11), págs. 1-35.
  • J. N. NAVARRO y J. N. JASINSKI, “Going cyber: Using routine activities theory to predict cyberbullying experiences”. Sociological Spectrum, 32 (1), 2012, 81–94.
  • G. R. NEWMAN y R. V. CLARKE, Superhighway Robbery: Crime Prevention and E-commerce Crime (Crime Science Series), Willan, Cullompton, 2003.
  • F. T. NGO y R. PATERNOSTER, “Cybercrime Victimization: An examination of Individual and Situational level factors”, International Journal of Cyber Criminology, 5 (1), 2011, 773–793.
  • P. PÉREZ SAN-JOSÉ (Dir.), Guía para usuarios: identidad digital y reputación online, Instituto Nacional de Tecnologías de la Comunicación (INTECO), 2012.
  • T. C. PRATT et al., “Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory”, Journal of Research in Crime and Delinquency, 47 (3), 2010, 267-296.
  • B. W. REYNS, “A routine activity perspective on online victimisation”, Journal of Financial Crime, 22 (4), 2015, 396 – 411.
  • B. W. REYNS et al., “Being Pursued Online: Applying Cyberlifestyle-Routine Activities Theory to Cyberstalking Victimization”, Criminal Justice and Behavior, 38 (11), 2011, 1149-1169.
  • Z. I. VAKHITOVA et al., “Lifestyles and routine activities: Do they enable different types of cyber abuse?”, Computers in Human Behavior, 101, 2019, 225–237.
  • J. van WILSEM, “‘Bought it, but never got it’: Assessing risk factors for online consumer fraud victimization”, European Sociological Review, 29 (2), 2013, 168-178.
  • M. T. WHITTY, “Predicting susceptibility to cyber-fraud victimhood”, Journal of Financial Crime, 26 (1), 2019, 277-292.
  • M. YAR, “The novelty of ‘cybercrime’: An assessment in light of routine activity theory”, European Journal of Criminology, 2, 2005, 407-427.
  • M. L. YBARRA y K. J. MITCHELL, “How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs”, Pediatrics, 121 (2), 2008, 350-357.