Search results

1 – 10 of over 1000
Article
Publication date: 18 January 2021

Shane Horgan, Ben Collier, Richard Jones and Lynsay Shepherd

The purpose of this study is to develop the theorisation of cybercrime in the context of the pandemic, and to sketch out a vision of how law enforcement might respond to a…

2850

Abstract

Purpose

The purpose of this study is to develop the theorisation of cybercrime in the context of the pandemic, and to sketch out a vision of how law enforcement might respond to a transformed landscape of online crime and offending.

Design/methodology/approach

This conceptual paper draws on empirical evidence from a range of sources (including official statistics) and the existing research literature, and revisits routine activities theory to illuminate the way that cybercrime patterns are being transformed by the pandemic.

Findings

The pandemic is reshaping the routine activities of societies en masse, leading to changes in the ecology of risk and opportunity for cybercrime. There is evidence of a large increase in the prevalence of cybercrime as a result, yet much of this has a paradoxically “local” character.

Practical implications

The authors identify specific practical implications for law enforcement, namely, that the role of local police in policing cybercrime should be re-envisioned, with a democratic, community-oriented approach at its heart.

Originality/value

The theoretical perspective outlined is a novel and critical development of a well-established framework, opening up new paths to the theorisation of cybercrime and cybercrime policing. The authors’ suggestions for practitioners have the potential for direct impact, both at the level of practice and in terms of broader imaginaries and organisation of police and policing.

Details

Journal of Criminal Psychology, vol. 11 no. 3
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 11 December 2019

Dale C. Spencer, Rosemary Ricciardelli, Dale Ballucci and Kevin Walby

Digital evidence is now infused in many (or arguably most) cases of sexual assault, which has refigured investigative tools, policing strategies and sources of cynicism for those…

Abstract

Purpose

Digital evidence is now infused in many (or arguably most) cases of sexual assault, which has refigured investigative tools, policing strategies and sources of cynicism for those working in sex crime units. Although cynicism, both its sources and affects, is widely studied among scholars of work and policing, little is known about how police working in sex crime units experience, mitigate and express cynicism. The purpose of this paper is to fill this gap in understanding and explore the role of cynicism amongst investigators working in sex crime units.

Design/methodology/approach

To address this research gap, the authors conducted 70 semi-structured in-depth interviews and two focus groups with members of police services organizations across Canada working in sex crime units.

Findings

Examining sources of cynicism and emotional experiences, the authors reveal that officers in these units normalize and neutralize organizational and intra-organizational sources of cynicism, and cope with the potentially traumatizing and emotionally draining realities of undertaking this form of “dirty work.” The authors show that officer cynicism extends beyond offenders into organizational and operational aspects of their occupations and their lived experiences outside of work, which has implications for literature on police work, cynicism and digital policing.

Originality/value

The authors contribute to the literature on cyber policing by, first, examining sex crimes unit member’s sources of cynicism in relation to sex crimes and the digital world and, second, by exploring sources of cynicism in police organizations and other branches in the criminal justice system. The authors examine how such cynicism seeps into relationships outside of the occupation. The authors’ contribution is in showing that cynicism related to police dirty work is experienced in relation to “front” and “back” regions (Dick, 2005) but also in multiple organizational and social spheres. The authors contribute to the extant literature on dirty work insofar as it addresses the underexplored dirty work associated with policing cyber environments and the morally tainted elements of such policing tasks.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 12 August 2022

Neha Chhabra Roy and Sreeleakha Prabhakaran

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian…

1303

Abstract

Purpose

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.

Design/methodology/approach

The methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking business through the machine learning–based k-nearest neighbor (K-NN) approach and prioritized and predicted the future of cyber fraud. The predicted future revealing dominance of a few specific cyber frauds will help to get an appropriate fraud prevention model, using an associated parties centric (victim and offender) root-cause approach. The study uses correlation analysis and maps frauds with their respective drivers to determine the resource specific effective mitigation plan.

Findings

Finally, the paper concludes with a conceptual framework for preventing internal-led cyber fraud within the scope of the study. A cyber fraud mitigation ecosystem will be helpful for policymakers and fraud investigation officers to create a more robust environment for banks through timely and quick detection of cyber frauds and prevention of them.

Research limitations/implications

Additionally, the study supports the Reserve Bank of India and the Government of India's launched cyber security initiates and schemes which ensure protection for the banking ecosystem i.e. RBI direct scheme, integrated ombudsman scheme, cyber swachhta kendra (botnet cleaning and malware analysis centre), National Cyber Coordination Centre (NCCC) and Security Monitoring Centre (SMC).

Practical implications

Structured and effective internal-led plans for cyber fraud mitigation proposed in this study will conserve banks, employees, regulatory authorities, customers and economic resources, save bank authorities’ and policymakers’ time and money, and conserve resources. Additionally, this will enhance the reputation of the Indian banking industry and extend its lifespan.

Originality/value

The innovative insider-led cyber fraud mitigation approach quickly identifies cyber fraud, prioritizes it, identifies its prominent root causes, map frauds with respective root causes and then suggests strategies to ensure a cost-effective and time-saving bank ecosystem.

Details

Aslib Journal of Information Management, vol. 75 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 2 December 2019

Jeffrey Nowacki and Dale Willits

The purpose of this paper is to use Maguire’s (2003) theory of police organizations to explain whether police agencies dedicate specific personnel to cybercrime response.

1461

Abstract

Purpose

The purpose of this paper is to use Maguire’s (2003) theory of police organizations to explain whether police agencies dedicate specific personnel to cybercrime response.

Design/methodology/approach

Data from this study come from the 2013 Law Enforcement Management and Statistics survey. Maguire’s (2003) theory of the organizational structure of police organizations is used to measure organizational variables related to context, complexity and control. Logistic regression is used to examine whether these organizational characteristics are related to cybercrime response.

Findings

The results suggest that organizational context, complexity and control are related to cybercrime response. Specifically, in terms of context, larger agencies, agencies whose officers engage in more non-routine tasks, and agencies governed by an active collective bargaining agreement are more likely to dedicate specific resources to cybercrime. In terms of complexity, agencies with more hierarchical layers, agencies that utilize more specialization and agencies that make greater use of civilian employees are more likely to dedicate specific personnel to cybercrime. Finally, regarding control, agencies that assign non-sworn personnel to administrative tasks are more likely to dedicate resources to cybercrime response.

Originality/value

This study is one of the first to use this framework to examine the relationship between organizational characteristics and cybercrime response. It shows that this perspective can be useful for understanding police organizations and police policies, programs and strategies.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 10 February 2020

Justin W. Patchin, Joseph Schafer and John P. Jarvis

Cyberbullying – using technology to intentionally and repeatedly engage in bullying behaviors – has gained considerable public attention over the last decade. Parents and…

1411

Abstract

Purpose

Cyberbullying – using technology to intentionally and repeatedly engage in bullying behaviors – has gained considerable public attention over the last decade. Parents and educators regularly instruct students about appropriate online behaviors and threaten consequences for misbehaviors. The role and responsibility of law enforcement officers in preventing and responding to cyberbullying incidents remains uncertain. While clear violations of the law (e.g. threats of physical harm) most directly implicate the police, other – more common behaviors – such as rumor spreading or hurtful online commenting do not. The paper aims to discuss this issue.

Design/methodology/approach

The current study surveyed 1,596 law enforcement supervisors attending the Federal Bureau of Investigation’s National Academy (NA) program. The survey instrument assessed perceptions of law enforcement responsibility in cyberbullying incidents. Data were collected in three waves over a nine-year period, allowing the measurement of attitudinal changes over time.

Findings

The authors find that certain officer characteristics are associated with a greater interest in responding to different types of cyberbullying (including having children at home and having previous experience dealing with cyberbullying) and that these perceptions have evolved over time.

Research limitations/implications

The data are specific to law enforcement leaders who participated in the NA and are therefore not generalizable to all officers. Nevertheless, implications for explaining variance and law enforcement involvement in cyberbullying incidents are discussed.

Originality/value

This is the first study to survey law enforcement leaders over time to assess their evolving perceptions of law enforcement’s role in addressing cyberbullying among youth.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 2 March 2020

Jacek Koziarski and Jin Ree Lee

This paper explores the various challenges associated with policing cybercrime, arguing that a failure to improve law enforcement responses to cybercrime may negatively impact…

3600

Abstract

Purpose

This paper explores the various challenges associated with policing cybercrime, arguing that a failure to improve law enforcement responses to cybercrime may negatively impact their institutional legitimacy as reliable first responders. Further, the paper makes preliminary links between cybercrime and the paradigm of evidence-based policing (EBP), providing suggestions on how the paradigm can assist, develop, and improve a myriad of factors associated with policing cybercrime.

Design/methodology/approach

Three examples of prominent cybercrime incidents will be explored under the lens of institutional theory: the cyberextortion of Amanda Todd; the hacking of Ashley Madison; and the 2013 Target data breach.

Findings

EBP approaches to cybercrime can improve the effectiveness of existing and future approaches to cybercrime training, recruitment, as well as officers' preparedness and awareness of cybercrime.

Research limitations/implications

Future research will benefit from determining what types of training work at the local, state/provincial, and federal level, as well as evaluating both current and new cybercrime policing programs and strategies.

Practical implications

EBP approaches to cybercrime have the potential to improve police responses to cybercrime calls for service, save police resources, improve police–public relations during calls for service, and improve police legitimacy.

Originality/value

This paper links cybercrime policing to the paradigm of EBP, highlighting the need for evaluating and implementing effective evidence-based approaches to policing cybercrime.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 2 May 2017

Ioannis A. Bolimos and Kim-Kwang Raymond Choo

This paper aims to determine the level of online fraud offending within an Australian jurisdiction and how to best apply resources to combat it.

1640

Abstract

Purpose

This paper aims to determine the level of online fraud offending within an Australian jurisdiction and how to best apply resources to combat it.

Design/methodology/approach

Empirical data were provided by an Australian law enforcement agency, and qualitative responses were obtained from the parties involved in the crimes themselves (the victims, the offenders and the nominated law enforcement agency).

Findings

Although there was variance between the ages of the online fraud victims, there was a slightly higher chance of an older member of the population falling victim to an offender than that of a younger person. The number of a particular gender reporting an instance of cybercrime in a given area can be higher if the total number of participants in that area was also high. Older victims were more likely to lose larger amounts of money to online fraud. Furthermore, it was found that when the non-gender identifiable data were removed, this increased to over 80 per cent.

Originality/value

Existing literature on online fraud and criminal offending generally focused on the quantitative aspects of measuring offending, which does not give an indication into the “why” component of the study: why are these offences being committed; why do these offenders pick particular victims; and why do the victims fall for such ruses? In this paper, the authors combined the qualitative responses obtained from those parties involved in the crimes themselves (the victims, the offenders and the nominated law enforcement agency) with a quantitative examination of the crime figures provided by an Australian law enforcement agency.

Details

Journal of Financial Crime, vol. 24 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 30 October 2023

Suhans Bansal, Naval Garg and Jagvinder Singh

Cyberbullying has become one of the reasons behind the increase in psychological and medical problems. A need to prevent recurrences of cyberbullying incidents and discourage…

Abstract

Purpose

Cyberbullying has become one of the reasons behind the increase in psychological and medical problems. A need to prevent recurrences of cyberbullying incidents and discourage bullies from further bullying the victims has risen. This problem has attracted the attention of all stakeholders across the globe. Various researchers have developed theories and interventions to detect and stop bullying behavior. Previously, researchers focused on helping victims, but as the times have changed, so has the focus of researchers. This study aims to analyze scientific research articles and review papers to understand the development of the knowledge base on the topic.

Design/methodology/approach

This study analyzes the performance of literature on cyberbullying perpetration (CBP) using the widely accepted bibliometric analysis techniques: performance analysis and science mapping. The study is based on a dataset extracted from the Web of Science database. Initially, 2,792 articles between 2007 and 2022 were retrieved, which were filtered down to 441. The filter was based on various criteria, but primarily on CBP. VOSViewer and MS Excel were used to analyze the data. In addition, VOSViewer was used to create “bibliometric citations, co-citations, and co-word maps.”

Findings

The findings include publication and citation quantum and trends, the top 20 active countries, the most significant research articles and leading journals in this domain. Major themes or clusters identified were “Cyberbullying and victim behavior,” bullying behavior, adolescents and intervention, “cyberbullying associations,” and “cyberbullying personality associations.”

Originality/value

The study is unique because it analyses research articles based on cyberbullies, whereas past studies explored only the victims' side. Further, the present study used the Web of Science database, whereas most studies use the Scopus database.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 July 2006

Roderic Broadhurst

Addresses the rapid expansion of computer connectivity and the opportunities provided for criminals to exploit security vulnerabilities in the online environment.

20708

Abstract

Purpose

Addresses the rapid expansion of computer connectivity and the opportunities provided for criminals to exploit security vulnerabilities in the online environment.

Design/methodology/approach

International efforts to combat cyber‐crime are reviewed by evaluating the forms of mutual legal assistance (MLA) now in place.

Findings

Cyber‐crime is often traditional crime (e.g. fraud, identify theft, child pornography) albeit executed swiftly and to vast numbers of potential victims, as well as unauthorised access, damage and interference to computer systems. Most detrimental are malicious and exploit codes that interrupt computer operations on a global scale and along with other cyber‐crimes threaten e‐commerce. The cross‐national nature of most computer‐related crimes have rendered many time‐honoured methods of policing both domestically and in cross‐border situations ineffective even in advanced nations, while the “digital divide” provides “safe havens” for cyber‐criminals. In response to the threat of cyber‐crime there is an urgent need to reform methods of MLA and to develop trans‐national policing capability.

Practical implications

The international response is briefly outlined in the context of the United Nations (UN) Transnational Organised Crime Convention (in force from September 2003) and the Council of Europe's innovative Cyber‐crime Convention (in force from July 2004). In addition, the role of the UN, Interpol, other institutions and bi‐lateral, regional and other efforts aimed a creating a seamless web of enforcement against cyber‐criminals are described.

Originality/value

The potential for potent global enforcement mechanisms are discussed.

Details

Policing: An International Journal of Police Strategies & Management, vol. 29 no. 3
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 19 June 2019

Cassandra Cross

Fraud is not a new offence. However, the recent evolution and proliferation of technologies (predominantly the internet) has seen offenders increasingly use virtual environments…

2224

Abstract

Purpose

Fraud is not a new offence. However, the recent evolution and proliferation of technologies (predominantly the internet) has seen offenders increasingly use virtual environments to target and defraud victims worldwide. Several studies have examined the ways that fraud is perpetrated with a clear demarcation between terrestrial and cyber offences. However, with moves towards the notion of a “digital society” and recognition that technology is increasingly embedded across all aspects of our lives, it is important to consider if there is any advantage in categorising fraud against the type of environment it is perpetrated in. This paper aims to discuss these issues.

Design/methodology/approach

This paper examines the perceived utility of differentiating online and offline fraud offences. It is based upon the insights of thirty-one professionals who work within the “fraud justice network” across London, UK and Toronto, Canada.

Findings

It highlights both the realities faced by professionals in seeking to ether maintain or collapse such a differentiation in their everyday jobs and the potential benefits and challenges that result.

Practical implications

Overall, the paper argues that the majority of professionals did not feel a distinction was necessary and instead felt that an arbitrary divide was instead a hindrance to their activities. However, while not useful on a practical front, there was perceived benefit regarding government, funding and the media. The implications of this moving forward are considered.

Originality/value

This paper provides new insights into how fraud justice network professionals understand the distinction between fraud offences perpetrated across both online and offline environments.

Details

Journal of Criminological Research, Policy and Practice, vol. 5 no. 2
Type: Research Article
ISSN: 2056-3841

Keywords

1 – 10 of over 1000