Search results

1 – 10 of over 2000
Article
Publication date: 25 June 2020

Naci Akdemir and Christopher James Lawless

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes

3813

Abstract

Purpose

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes victimisation and to test the applicability of lifestyle routine activities theory (LRAT) to cybercrime victimisation.

Design/methodology/approach

A mixed methods research paradigm was applied to address the research questions and aims. The data set of Crime Survey of England and Wales (CSEW) 2014/2015 and 42 semi-structured interviews conducted with victims of cybercrime and non-victim control group participants were analysed via binary logistic regression and content analyses methods.

Findings

This research illustrated that Internet users facilitated their victimisation through their online activities. Additionally, using insecure Internet connections and public access computers emerged as risk factors for both cyber-enabled and cyber-dependent crime victimisation. Voluntary and involuntary personal information disclosure through social networking sites and online advertisement websites increased the likelihood of being a target of phishing. Deviant online activities such as free streaming or peer-to-peer sharing emerged to increase the risk of cyber-dependent crime victimisation.

Research limitations/implications

The binary logistic regression analysis results suggested LRAT as a more suitable theoretical framework for cyber-dependent crime victimisation. Future research may test this result with models including more macro variables.

Practical implications

Policymakers may consider implementing regulations regarding limiting the type of information required to login to free Wi-Fi connections. Checking trust signs and green padlocks may be effective safeguarding measures to lessen the adverse impacts of impulsive buying.

Originality/value

This study empirically illustrated that, besides individual-level factors, macro-level factors such as electronic devices being utilised to access the Internet and data breaches of large companies also increased the likelihood of becoming the victim of cyber-enabled and cyber-dependent crime.

Details

Internet Research, vol. 30 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 October 2008

Esharenana E. Adomi and Stella E. Igun

The purpose of this paper is to describe cyber crime and techniques adopted for combating it in Nigeria.

4886

Abstract

Purpose

The purpose of this paper is to describe cyber crime and techniques adopted for combating it in Nigeria.

Design/methodology/approach

Reviews the state of cyber crime in Nigeria, and how it is being stemmed in the country.

Findings

The types of cyber crime in Nigeria are revealed together with the efforts geared towards combating/preventing cyber crime in the country. The paper also draws attention to the possibility of libraries that offer public internet access service being victims of cyber crime as well as unknown perpetrators. The paper recommends how cyber crime can be brought under control.

Originality/value

It reveals factors that contribute to perpetration of cyber crime in Nigeria and efforts being made to combat it. This will enable various countries, in developing and developed world, to be sensitized to the menace of cyber crime and take relevant steps to fight against it.

Details

The Electronic Library, vol. 26 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 14 January 2019

Steven Furnell and Samantha Dowling

The purpose of this paper is to review current evidence in relation to scale and impacts of cyber crime, including various approaches to defining and measuring the problem.

2509

Abstract

Purpose

The purpose of this paper is to review current evidence in relation to scale and impacts of cyber crime, including various approaches to defining and measuring the problem.

Design/methodology/approach

A review and analysis of survey evidence is used to enable an understanding of the scope and scale of the cyber crime problem, and its effect upon those experiencing it.

Findings

The analysis evidences that cyber crime exists in several dimensions, with costs and harms that can be similarly varied. There is also a sense that, moving forward, the “cyber” label will become somewhat redundant as many crimes have the potential to have a technology component.

Research limitations/implications

The key evidence in this particular discussion has some geographic limitations, with much of the discussion focussed upon data drawn from the Crime Survey for England and Wales, as well as other UK-based sources. However, many of the broader points still remain more widely relevant.

Practical implications

This study helps in: better understanding the range and scale of cyber crime threats; understanding how the cyber element fits into the wider context of crime; improving the appreciation of what cyber crime can mean for potential victims; and recognising the cost dimensions, and the implications for protection and response.

Social implications

The discussion will help businesses and individuals to have a better appreciation of the cyber crime threat, and what ought to be considered in response to it.

Originality/value

The discussion is based upon recent evidence, and therefore represents a more up-to-date view of the cyber crime landscape than reviews already available in earlier literature.

Details

Journal of Criminological Research, Policy and Practice, vol. 5 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 1 July 2006

Roderic Broadhurst

Addresses the rapid expansion of computer connectivity and the opportunities provided for criminals to exploit security vulnerabilities in the online environment.

20411

Abstract

Purpose

Addresses the rapid expansion of computer connectivity and the opportunities provided for criminals to exploit security vulnerabilities in the online environment.

Design/methodology/approach

International efforts to combat cybercrime are reviewed by evaluating the forms of mutual legal assistance (MLA) now in place.

Findings

Cybercrime is often traditional crime (e.g. fraud, identify theft, child pornography) albeit executed swiftly and to vast numbers of potential victims, as well as unauthorised access, damage and interference to computer systems. Most detrimental are malicious and exploit codes that interrupt computer operations on a global scale and along with other cybercrimes threaten e‐commerce. The cross‐national nature of most computer‐related crimes have rendered many time‐honoured methods of policing both domestically and in cross‐border situations ineffective even in advanced nations, while the “digital divide” provides “safe havens” for cyber‐criminals. In response to the threat of cybercrime there is an urgent need to reform methods of MLA and to develop trans‐national policing capability.

Practical implications

The international response is briefly outlined in the context of the United Nations (UN) Transnational Organised Crime Convention (in force from September 2003) and the Council of Europe's innovative Cybercrime Convention (in force from July 2004). In addition, the role of the UN, Interpol, other institutions and bi‐lateral, regional and other efforts aimed a creating a seamless web of enforcement against cyber‐criminals are described.

Originality/value

The potential for potent global enforcement mechanisms are discussed.

Details

Policing: An International Journal of Police Strategies & Management, vol. 29 no. 3
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 29 May 2009

Da‐Yu Kao and Shiuh‐Jeng Wang

Cyber technology is an extremely complicated field and the internet is being increasingly used as a place to commit crimes using personal computers, as well as network‐based…

3858

Abstract

Purpose

Cyber technology is an extremely complicated field and the internet is being increasingly used as a place to commit crimes using personal computers, as well as network‐based computers. Although cyber investigation is still in the early stages of its development, the burgeoning use of the internet has increased the necessity for digital investigations. The purpose of this paper is to increase awareness of the latest in digital comparison for cybercrime investigation with the studies of IP‐address and time in computer systems.

Design/methodology/approach

The approach to improving a cybercrime investigation is proposed in three stages: independent verification of digital clues, corresponding information from different sources, and preparation of a valid argument.

Findings

If the police and other authorities do not stay on top of this problem, they may lose the battle to control this cybercrime explosion. The paper discusses how Taiwanese police investigate cybercrime and the experience is able to propagate when analyzing IP‐address and time with crime‐case. It is believed that this proposed approach creates a comprehensive guide that provides support and assistance to crime investigators.

Practical implications

IP‐address and time, both indicated in this paper, are the key ingredients to identify the suspect in the beginning of investigation works. As the study shows: there is no guarantee that there always will be the “right” evidence to prove everything; investigators should try their utmost to avoid making mistakes; criminal investigators must find additional clues and proof to validate their suspicions.

Originality/value

This paper illustrates an approach to the investigation of cybercrime in the case of studying IP‐address and time. It is believed that the research can efficiently assist law enforcement officials in dealing with ever‐increasing cybercrime by using effective digital evidence.

Details

Policing: An International Journal of Police Strategies & Management, vol. 32 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 15 May 2007

Nigel Fletcher

This paper seeks to examine the problem of cyber fraud, a situation created by online financial transactions.

3643

Abstract

Purpose

This paper seeks to examine the problem of cyber fraud, a situation created by online financial transactions.

Design/methodology/approach

Examines the challenges to regulating financial fraud in cyberspace, e.g. those responsible for the fraud; the possibility of prosecution; and the position of cyberspace in the light of jurisdiction and control.

Findings

Finds that the introduction of internet specific regulation would be useful in combating cyberspace fraud.

Originality/value

This paper arguably breaks new ground in recommending measures to combat financial fraud in cyberspace.

Details

Journal of Financial Crime, vol. 14 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 11 September 2009

Mohammad Mahabubur Rahman, Mohammad Aktaruzzaman Khan, Nour Mohammad and Mohammad Osiur Rahman

The purpose of this paper is to focus on existing law, the legal system and jurisprudence circling round territorial concepts.

Abstract

Purpose

The purpose of this paper is to focus on existing law, the legal system and jurisprudence circling round territorial concepts.

Design/methodology/approach

This paper is an opinion piece based on current and recent analysis of legal principle.

Findings

After the emergence of the internet as well as cyberspace, human activities are not confined solely to the physical world. They have been extended to a very different and peculiar non‐physical world. This world is everywhere and at the same time it is nowhere; and necessarily it is difficult to prescribe rules and enforce the same regarding cyberspace for its everywhere and nowhere proposition. The elementary concept of jurisprudence e.g. title, ownership and possession, etc. cannot be considered in the way we usually understand in case of real world. However, cyberspace has to be controlled by a legal framework that involves new ideas, leading to a new challenge in existing legal philosophy exclusively based on territorial concept.

Originality/value

Traditional territorial jurisprudence has to be revised in the light of cyber necessities arising out of high technological development. Moreover, certain new institutions have to be established in order to apply new principles in dispute settlement of cyber matters. This paper both identifies the need and options for the future.

Details

International Journal of Law and Management, vol. 51 no. 5
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 6 July 2012

Sundaresh Menon and Teo Guan Siew

The purpose of this paper is to identify the key challenges in tackling modern economic and cyber crimes, evaluate the existing legal and enforcement mechanisms in place, and…

2835

Abstract

Purpose

The purpose of this paper is to identify the key challenges in tackling modern economic and cyber crimes, evaluate the existing legal and enforcement mechanisms in place, and propose a way forward to address these challenges.

Design/methodology/approach

The paper analyses the main difficulties posed by the borderless, complex and rapidly evolving nature of modern economic and cyber crimes. This allows the key shortcomings of the present legal and enforcement infrastructure to be identified. By examining different models, ranging from vertical supranational structures such as the International Criminal Court and the proposed European Public Prosecutor, to soft‐law regimes such as the intergovernmental network the Financial Action Task Force, as well as intermediate approaches like Eurojust, a hybrid model incorporating elements from these various regimes is proposed.

Findings

A transnational approach must be adopted to address the phenomenon of modern economic and cyber crimes which are cross‐border, complex, profit‐driven and rapidly evolving. A suitable multilateral platform needs to be created to facilitate international co‐operation in a more coordinated and sustained fashion, and for the development of a set of common standards and principles to be enforced through a process of mutual assessments and periodic peer review.

Originality/value

The paper advocates the establishment of a hybrid multilateral regime which incorporates both elements of a “vertical” supranational structure as well as a “horizontal” state‐centric framework. This will inject the institutional focus to facilitate international co‐operation and also provide the platform for the promulgation of common standards and principles in fighting cross‐border economic and cyber crimes. The paper will be of interest to law enforcement agencies, prosecutorial authorities and national policy makers.

Details

Journal of Money Laundering Control, vol. 15 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 25 May 2012

Justin T. Davis

The purpose of this study is to examine the perceived needs of local law enforcement investigating crimes characterized by a cyber component.

2074

Abstract

Purpose

The purpose of this study is to examine the perceived needs of local law enforcement investigating crimes characterized by a cyber component.

Design/methodology/approach

A total of 263 surveys were mailed to local law enforcement from across the state of North Carolina. Responses were received from 127 agencies – municipal police departments and county sheriffs' offices – comprising 71 of 100 North Carolina counties being represented.

Findings

Results indicate that local law enforcement continues to lack adequate training, personnel, and equipment to investigate crimes with a cyber component. Additionally, perceived levels of preparation and police agency size are positively related. Data also confirm a significant association between an agency's jurisdiction population size and the number of investigations for these crimes.

Research limitations/implications

In a snapshot manner, this study solely examines the perceived investigative needs of law enforcement in the state of North Carolina. Additional data is needed to determine not only the prevalence of computer‐related crimes in other jurisdictions, but levels of preparedness. The lack of a universal definition of computer crime has implications on the data within as they are often estimated or perceived by respondents.

Practical implications

With numerous issues in need of attention, leadership from both government and law enforcement must begin to recognize the problems associated with computers and crime to effectively implement strategies that will enhance computer crime control.

Originality/value

This study is valuable as prior studies have largely been conducted at the national level and have predominantly discounted smaller agencies from their research. This research adds empirical evidence to the issue of law enforcement preparedness in investigating crimes with a cyber component.

Details

Policing: An International Journal of Police Strategies & Management, vol. 35 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 2 May 2017

Damla Kuru and Sema Bayraktar

Previous studies generally focused on the definition of cybercrime and its effect on the market. Following Kesan’s study, this paper aims to analyse the relationship between cyber

1490

Abstract

Purpose

Previous studies generally focused on the definition of cybercrime and its effect on the market. Following Kesan’s study, this paper aims to analyse the relationship between cyber insurance and social welfare and compare it among three countries, namely, USA, UK and Turkey. The paper also discusses the main obstacles that the cyber insurer has to deal with and its effect on social welfare. This paper answers two questions related to cyber insurance at an aggregate level. First, “what kind of contribution does cyber insurance make to social welfare?” Second,“What kind of problems do insurers and insured have to face?” Although the findings are similar to Kesan’s study, this study gives an opportunity to make a country-based study and interpret the results with a different perspective.

Design/methodology/approach

The calculation of utility is also important for interpreting social welfare in the market. Consumer behaviour under uncertainty constructs the background for this paper because the risks of malicious attacks are contingent and independent, which means that consumers have to make their decisions under uncertainty. Von-Neumann-Morgenstern utility function is used for interpreting consumer’s behaviour.

Findings

Basically, there are two important conclusions that can derive for cyber insurance. First, cyber insurance can be defined as a higher security investment when coupled with increased levels of safety and a robust IT infrastructure. Second, cyber insurance, as a high-security investment, would have a positive impact on social welfare by making the internet safer for all users. The results show that the problems that lead to market failure can be virtually eliminated with an accurate risk assessment that leads to appropriate premium levels for insured. These results are consistent with those of study by Kesan et al. (2006).

Research limitations/implications

Data availability for different industries have limited the ability to compare the impact of cyber-crime to different sectors.

Originality/value

Technological devices have become part of our daily life. Although they have brought us increasing access to all types of information, including opportunities for business, they have also increased the risk of malicious attacks and the risk of e-crime. By replicating the economic model used by Kesan et al. (2006), social welfare losses and insurance premiums are calculated for three countries: USA, UK and Turkey. Questions pertaining to contribution of cyber insurance to social welfare and problems faced by insurers and insured are addressed.

Details

Journal of Financial Crime, vol. 24 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of over 2000