<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>absad</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Adli Bilimler ve Suç Araştırmaları</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2687-3397</issn>
                                                                                                        <publisher>
                    <publisher-name>Polis Akademisi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Cybercrime</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Siber suç</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Siber Suçların Rutin Aktiviteler Teorisi ile Açıklanabilirliği Üzerine Değerlendirme</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>Evaluation on the Explanability of Cyber Crimes with Routine Activities Theory</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0004-9579-4997</contrib-id>
                                                                <name>
                                    <surname>Gökmen</surname>
                                    <given-names>Zeynep Rüveyda</given-names>
                                </name>
                                                                    <aff>JANDARMA VE SAHİL GÜVENLİK AKADEMİSİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-3112-9371</contrib-id>
                                                                <name>
                                    <surname>Yılmaz</surname>
                                    <given-names>Vedat</given-names>
                                </name>
                                                                    <aff>JANDARMA VE SAHİL GÜVENLİK AKADEMİSİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20260417">
                    <day>04</day>
                    <month>17</month>
                    <year>2026</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>2026</issue>
                                        <fpage>1</fpage>
                                        <lpage>15</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250425">
                        <day>04</day>
                        <month>25</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20260407">
                        <day>04</day>
                        <month>07</month>
                        <year>2026</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2020, Adli Bilimler ve Suç Araştırmaları</copyright-statement>
                    <copyright-year>2020</copyright-year>
                    <copyright-holder>Adli Bilimler ve Suç Araştırmaları</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Dijitalleşmenin hız kazandığı çağdaş toplumlarda, suçun doğası ve mekânsal gerçekleşme biçimleri radikal bir dönüşüme uğramıştır. Fiziksel dünyada gerçekleşen geleneksel suç türlerinin yanı sıra, siber uzayda meydana gelen yeni nesil suç biçimleri, kriminolojik teori ve uygulamaların yeniden değerlendirilmesini gerekli kılmaktadır. Bu çalışma, Rutin Aktiviteler Teorisi’nin (RAT) siber suçları açıklama potansiyelini kuramsal düzeyde değerlendirmeyi amaçlamaktadır. Geleneksel suçlara yönelik olarak geliştirilen RAT, suçun meydana gelmesini motive olmuş failin varlığı, uygun hedefin bulunması ve yeterli koruyucuların yokluğu unsurlarıyla açıklar. Çalışmada, bu üç unsurun siber suç bağlamında nasıl kavramsallaştırılabileceği ve dijital ortamdaki karşılıklarının neler olduğu incelenmiştir. Bulgular, RAT’in siber suçların analizinde belirli bir açıklama gücüne sahip olduğunu ancak dijital ortamın anonimliği, mekânsızlığı ve bireysel dijital alışkanlıkların rolü gibi özgün unsurlar karşısında yetersiz kalabildiğini göstermektedir. Bu bağlamda RAT’in dijital ortama tamamen uyarlanabilmesi için bireysel davranış örüntülerini de içeren daha geniş kapsamlı kuramsal yaklaşımlara ihtiyaç duyulduğu sonucuna varılmıştır.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>In contemporary societies where digitalization is accelerating, the nature of crime and its spatial occurrence have undergone a radical transformation. In addition to traditional crime types that occur in the physical world, new generation crime types that occur in cyberspace necessitate the re evaluation of criminological theory and practices. This study aims to evaluate the explanatory potential of the Routine Activity Theory (RAT) in the context of cybercrime from a theoretical perspective. Originally developed for analyzing conventional crimes, RAT explains criminal events through three key elements: the presence of a motivated offender, the availability of a suitable target, and the absence of capable guardians. This paper examines how these components can be conceptualized in digital environments and identifies their cyber equivalents. Findings indicate that while RAT provides a certain explanatory value in analyzing cybercrime, it falls short in addressing the unique characteristics of digital environments, such as anonymity, spatial detachment, and the role of individual online behaviors. Accordingly, the study concludes that fully adapting RAT to the cyber realm requires the integration of broader theoretical frameworks that incorporate behavioral and lifestyle factors.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Siber Suçlar</kwd>
                                                    <kwd>  Rutin Aktiviteler Teorisi</kwd>
                                                    <kwd>  Dijital Güvenlik</kwd>
                                                    <kwd>  Kriminoloji</kwd>
                                                    <kwd>  Suç Teorileri</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="en">
                                                    <kwd>Cyber Crimes</kwd>
                                                    <kwd>  Routine Activities Theory</kwd>
                                                    <kwd>  Digital Security</kwd>
                                                    <kwd>  Criminology</kwd>
                                                    <kwd>  Crime Theories</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Akdemir, N., &amp; Yenal, S. (2021). How phishers exploit the coronavirus pandemic: A
content analysis of COVID-19 themed phishing emails. SAGE Open, 11(3). https://
doi.org/10.1177/21582440211031879</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Altun, A. (2022). Siber suçların kriminolojik analizi. Journal of Social, Humanities and
Administrative Sciences, 8(48), 91–99. https://doi.org/10.31589/JOSHAS.884</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Başar, Y. (2015). Siber suç soruşturmalarında adli bilişim incelemeleri [Yüksek lisans
tezi, Afyon Kocatepe Üniversitesi]. Ulusal Tez Merkezi.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Birceviz, F. (2019). Rutin aktiviteler teorisi bağlamında siber suç mağduriyetinin
incelenmesi [Yüksek lisans tezi, Milli Savunma Üniversitesi]. Ulusal Tez Merkezi.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Caravelli, J., &amp; Jones, N. (2019). Cyber security: Threats and responses for government
and business. Praeger.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Cohen, L. E., &amp; Felson, M. (1979). Social change and crime rate trends: A routine
activity approach. American Sociological Review, 44, 588-608. http://dx.doi.
org/10.2307/2094589</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Delice, M. (2021). Evden hırsızlık suçuna etki eden faktörlerin rutin aktiviteler teorisi
perspektifinden incelenmesi. Academic Social Resources Journal, 6(25), 896–909.
https://doi.org/10.31569/ASRJOURNAL.228</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Gordon, S., &amp; Ford, R. (2006). On the definition and classification of cybercrime. Journal
in Computer Virology, 2(1), 13–20. https://doi.org/10.1007/s11416-006-0015-z</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Hagan, F. E. (2017). Introduction to criminology: Theories, methods, and criminal
behavior (9th ed.). SAGE Publications.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Holt, T. J., Bossler, A. M., &amp; Seigfried-Spellar, K. C. (2018). Cybercrime and digital
forensics: An introduction (2nd ed.). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Jahankhani, H. (Ed.). (2018). Cyber criminology. Springer.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Kökkaya, F. (2022). Siber suçlarla mücadelede Türkiye-Avrupa Birliği arasındaki işbirliği
[Yüksek lisans tezi, Fırat Üniversitesi]. Ulusal Tez Merkezi.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Lanier, M. M., &amp; Henry, S. (2009). Essential criminology (3rd ed.). Westview Press.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Leukfeldt, R., &amp; Yar, M. (2015). Applying Routine Activity Theory to Cybercrime: A
Theoretical and Empirical Analysis. Deviant Behavior, 37(3), 263–280. https://doi.org
/10.1080/01639625.2015.1012409</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Neumüller, A. S. (2017). Cybercrime centres: Analysis and recommendations based on
research and case study of police cybercrime centres in Ireland and Austria [Yüksek
lisans tezi, University College Dublin].</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Ngo, F. T., &amp; Paternoster, R. (2011). Cybercrime victimization: An examination of
individual and situational level factors. International Journal of Cyber Criminology,
5(1), 773–793.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Ron, M., Fuertes, W., Bonilla, M., Toulkeridis, T., &amp; Díaz, J. (2018). Cybercrime in
Ecuador, an exploration, which allows to define national cybersecurity policies.
Proceedings of the Multidisciplinary International Conference of Research Applied to
Defense and Security (MICRADS 2018), 27–40.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Schmalleger, F. (2017). Criminology today: An integrative introduction (8th ed.). Pearson.
Shaw, C. R., &amp; McKay, H. D. (1969). Juvenile delinquency and urban areas. University
of Chicago Press.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Siegel, L. J. (2019). Criminology: The core (7th ed.). Cengage Learning.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Statista. (2024). Internet usage worldwide- statistics &amp; facts. https://www.statista.com/
topics/1145/internet-usage-worldwide/</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Stalans, L. J., &amp; Donner, C. M. (2018). Explaining why cybercrime occurs: Criminological
and psychological theories. In H. Jahankhani (Ed.), Cyber criminology: Advanced
sciences and technologies for security applications (pp. 25–45).</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Vakhitova, Z. I., Alston-Knox, C. L., Reynald, D. M., Townsley, M. K., &amp; Webster, J.
L. (2019). Lifestyles and routine activities: Do they enable different types of cyber
abuse? Computers in Human Behavior, 101, 225–237. https://doi.org/10.1016/j.
chb.2019.07.012</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Weulen Kranenbarg, M., &amp; Leukfeldt, R. (Eds.). (2021). Cybercrime in context: The
human factor in victimization, offending, and policing. Springer.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine
activity theory. European Journal of Criminology, 2(4), 407–427. https://doi.
org/10.1177%2F147737080556056</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Yar, M., &amp; Steinmetz, K. F. (2019). Cybercrime and society (3rd ed.). SAGE Publications</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
