Search results

21 – 30 of over 1000
Article
Publication date: 25 June 2020

Naci Akdemir and Christopher James Lawless

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes…

4074

Abstract

Purpose

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes victimisation and to test the applicability of lifestyle routine activities theory (LRAT) to cybercrime victimisation.

Design/methodology/approach

A mixed methods research paradigm was applied to address the research questions and aims. The data set of Crime Survey of England and Wales (CSEW) 2014/2015 and 42 semi-structured interviews conducted with victims of cybercrime and non-victim control group participants were analysed via binary logistic regression and content analyses methods.

Findings

This research illustrated that Internet users facilitated their victimisation through their online activities. Additionally, using insecure Internet connections and public access computers emerged as risk factors for both cyber-enabled and cyber-dependent crime victimisation. Voluntary and involuntary personal information disclosure through social networking sites and online advertisement websites increased the likelihood of being a target of phishing. Deviant online activities such as free streaming or peer-to-peer sharing emerged to increase the risk of cyber-dependent crime victimisation.

Research limitations/implications

The binary logistic regression analysis results suggested LRAT as a more suitable theoretical framework for cyber-dependent crime victimisation. Future research may test this result with models including more macro variables.

Practical implications

Policymakers may consider implementing regulations regarding limiting the type of information required to login to free Wi-Fi connections. Checking trust signs and green padlocks may be effective safeguarding measures to lessen the adverse impacts of impulsive buying.

Originality/value

This study empirically illustrated that, besides individual-level factors, macro-level factors such as electronic devices being utilised to access the Internet and data breaches of large companies also increased the likelihood of becoming the victim of cyber-enabled and cyber-dependent crime.

Details

Internet Research, vol. 30 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 13 April 2020

Norman Mugarura and Emma Ssali

The purpose of this paper is to decipher the law relating to cybercrimes regulation and benchmarking best practices that could be adopted to address regulatory weaknesses in some…

1113

Abstract

Purpose

The purpose of this paper is to decipher the law relating to cybercrimes regulation and benchmarking best practices that could be adopted to address regulatory weaknesses in some countries. In many countries, cybercrimes regulation is undermined by a lack of robust regulatory regimes. The few regimes that are available are fragmented with no coherent global strategy to deal with these offences across countries and regions. There is a lot of scholarly literature to corroborate the fact that lack of requisite laws on cyber and financial crimes has rendered states lame ducks when faced with well-organized and resourced criminal organizations.

Design/methodology/approach

This paper articulates intricacies of regulating money laundering and cybercrimes using data from selected African countries and beyond. Generic issues on financial crimes, cybercrimes, case law and policy documents drawn from different jurisdictions have been examined based on the objectives of the study. Cybercrime activities and anti-money laundering (AML) regulatory models have been evaluated drawing on experiences of selected countries in Africa and other countries. Questions whether suspicious activity reports are appropriate as a model to counter incidences of cybercrime activities or whether other options should be considered were also examined. Most notably, the risk-based assessment model such as profiling of high-risk clients rather than reporting every transaction will be compared and possibly suggested as a suitable alternative in financial crimes regulation. The authors have evaluated the data and AML regulatory approaches and other policy measures to curtail the foregoing threats. There is a possibility that AML tools used by financial institutions and banking activities could be used to prevent the growing threat of cybercrimes. The paper has also been enriched by case studies of tenuous legal systems and fragmentation of laws on cybercrimes and financial crimes and how these gaps have been exploited to fuel incidences of illicit criminal activities around the globe. The paper has also used empirical data including visits to banks and financial institutions on the nexus between the threat of cybercrimes and money laundering prevention. The authors have been selective, evaluating cases from 2000s to date. This timeline was particularly important because of the increased incidences of computers and money laundering threats globally. After analysing the data, the authors were able to delineate that there is a close connection between the foregoing two crimes, how they operate in practice, differences and similarities in the counter-measures used to mitigate their negative effect globally. Thus, in the authors’ contention, this is a novel study that is likely to spur farther research on law and policy against cyber and AML crimes not only in Uganda but also in other jurisdictions. At the same time, the findings of the study could complement, and perhaps also complete, the work of scholars who have written papers on cybercrimes to advocate for regulatory changes fight against these offences. The study will also complement the work of other researchers who have challenged the segregation of cybercrimes and financial crimes in local and international regulatory discourses. This research aims to make a significant contribution to the study of cybercrimes and how they are regulated in international law.

Findings

The findings of the paper have confirmed that the high incidences of money laundering and cybercrimes today are partly fuelled by inherent weaknesses in the global regulatory system and partly fuelled by weaknesses at an individual state level. Many countries have enacted a raft of anti-cyber and AML legislation but this notwithstanding, these laws have not been used to stem cross-border crimes globally. This is partly explained by the fact that many enforcement institutions lack the requisite capacity to institute measures through which to implement engendered laws and policies easily. The regulatory capacity of many countries has been eviscerated by deficiencies in infrastructure and systems.

Details

Journal of Money Laundering Control, vol. 24 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 7 January 2019

Muhammad Shoukat Malik and Urooj Islam

The purpose of this study is to gain more insight into the impact of cybercrime incidents in the banking sector of Pakistan. This study investigates the significant contribution…

2076

Abstract

Purpose

The purpose of this study is to gain more insight into the impact of cybercrime incidents in the banking sector of Pakistan. This study investigates the significant contribution of information security awareness on the relationship of cybercrimes and organizational performance.

Design/methodology/approach

The impact of cybercrime incidents on organizational performance is investigated by further exploring the moderating effects of information security awareness. A sample of 302 employees in the banking industry of Pakistan was studied by using survey design.

Findings

Cybercrime incidents have negative impact on organizational performance, but information security awareness weakens the negative impact of cybercrimes on organizational performance.

Research limitations/implications

The present study focuses on the banking sector so its finding cannot be generalized in other sectors. Further, in-depth comparative studies in other sectors with different cultural settings will help to authenticate the research findings.

Practical implications

Information security awareness weakens the negative impact of cybercrimes on organizational performance; therefore, it is important for banks’ HR managers to set up more security training courses to increase employees’ awareness on cybercrimes.

Originality/value

This study explores the impact of cybercrimes on banks’ performance with the moderating role of employees’ information security awareness. Linking these topics has created a new study within the cybercrimes discipline. The present study also enhances the understanding of employees’ role to combat the impact of cybercrimes on organizational performance.

Details

Journal of Financial Crime, vol. 26 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 February 2020

Jacqueline M. Drew

The evolution of digital technology has changed the way in which we, as a global society, socialise and conduct business. This growth has led to an increasing reliance on…

3218

Abstract

Purpose

The evolution of digital technology has changed the way in which we, as a global society, socialise and conduct business. This growth has led to an increasing reliance on technology, much more interconnectedness and in turn, an expansion of criminal opportunities, known now as “cybercrime”. This study aims to explore the experience of victimisation, perceptions of cybercrime and use of online crime prevention strategies.

Design/methodology/approach

The study involved a survey of a representative sample of the adult Australian population. The study sample was made up of 595 Australian adult participants. The study seeks to better understand how previous victimisation, perception of cybercrime prevalence and perception of harm caused by cybercrime are related to the use of online crime prevention strategies. It seeks to contribute to a body of work that has found that crime prevention education focused on increasing knowledge is limited in its effectiveness in reducing victimisation.

Findings

This study identifies key levers, in particular perceived prevalence and harm of cybercrime, as critical in the use of online crime prevention strategies by potential victims.

Research limitations/implications

As such, this study provides an important evidence base on which to develop more effective online crime prevention education and awareness campaigns to reduce cybervictimisation.

Practical implications

The practical implications include the relationship between cybervictimisation and self-protective online strategies of potential victims and the development of more effective online crime prevention programmes.

Originality/value

The research takes a different perspective from much of the previous research, seeking to better understand how attitudinal factors (perceived prevalence of cybercrime and perceived harm of cybercrime) might motivate or influence the use of online crime prevention strategies by potential victims.

Details

Journal of Criminological Research, Policy and Practice, vol. 6 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 2 March 2012

Adam M. Bossler and Thomas J. Holt

Little empirical research exists regarding how local law enforcement has responded to cybercrime. This paper aims to understand: the law enforcement agencies that line officers…

4165

Abstract

Purpose

Little empirical research exists regarding how local law enforcement has responded to cybercrime. This paper aims to understand: the law enforcement agencies that line officers believe should be primarily responsible for investigating cybercrime cases; their perceptions about their agency's current ability to respond to these offenses; and their beliefs regarding the best ways to improve the social response to cybercrime.

Design/methodology/approach

The authors surveyed patrol officers in the Charlotte‐Mecklenburg and Savannah‐Chatham Metropolitan police departments.

Findings

The authors found that officers do not believe that local law enforcement should be primarily responsible for handling cybercrime cases and they have little information on how upper management is addressing cybercrime. Officers indicated that the best strategies to deal with cybercrime were greater care taken by citizens online and improvements to the legal system.

Research limitations/implications

Local law enforcement agencies feel they are unable to fully address cybercrime. Although the findings were generally consistent across demographic and experiential characteristics and cities, two cities in the southeastern United States were surveyed.

Practical implications

According to these officers, they want citizens to be more careful online and for clarification of cybercrime laws and increased prosecutions. They do not favor local cybercrime units and additional computer training for line officers as much as scholars and police administrators advocate.

Originality/value

This paper studied the perceptions of patrol officers, who are the first responders to most crime scenes, on local law enforcement responses to cybercrime and the strategies they view to be most effective in combating cybercrime.

Details

Policing: An International Journal of Police Strategies & Management, vol. 35 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 2 March 2020

Jacek Koziarski and Jin Ree Lee

This paper explores the various challenges associated with policing cybercrime, arguing that a failure to improve law enforcement responses to cybercrime may negatively impact…

3600

Abstract

Purpose

This paper explores the various challenges associated with policing cybercrime, arguing that a failure to improve law enforcement responses to cybercrime may negatively impact their institutional legitimacy as reliable first responders. Further, the paper makes preliminary links between cybercrime and the paradigm of evidence-based policing (EBP), providing suggestions on how the paradigm can assist, develop, and improve a myriad of factors associated with policing cybercrime.

Design/methodology/approach

Three examples of prominent cybercrime incidents will be explored under the lens of institutional theory: the cyberextortion of Amanda Todd; the hacking of Ashley Madison; and the 2013 Target data breach.

Findings

EBP approaches to cybercrime can improve the effectiveness of existing and future approaches to cybercrime training, recruitment, as well as officers' preparedness and awareness of cybercrime.

Research limitations/implications

Future research will benefit from determining what types of training work at the local, state/provincial, and federal level, as well as evaluating both current and new cybercrime policing programs and strategies.

Practical implications

EBP approaches to cybercrime have the potential to improve police responses to cybercrime calls for service, save police resources, improve police–public relations during calls for service, and improve police legitimacy.

Originality/value

This paper links cybercrime policing to the paradigm of EBP, highlighting the need for evaluating and implementing effective evidence-based approaches to policing cybercrime.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 2 December 2019

Jeffrey Nowacki and Dale Willits

The purpose of this paper is to use Maguire’s (2003) theory of police organizations to explain whether police agencies dedicate specific personnel to cybercrime response.

1461

Abstract

Purpose

The purpose of this paper is to use Maguire’s (2003) theory of police organizations to explain whether police agencies dedicate specific personnel to cybercrime response.

Design/methodology/approach

Data from this study come from the 2013 Law Enforcement Management and Statistics survey. Maguire’s (2003) theory of the organizational structure of police organizations is used to measure organizational variables related to context, complexity and control. Logistic regression is used to examine whether these organizational characteristics are related to cybercrime response.

Findings

The results suggest that organizational context, complexity and control are related to cybercrime response. Specifically, in terms of context, larger agencies, agencies whose officers engage in more non-routine tasks, and agencies governed by an active collective bargaining agreement are more likely to dedicate specific resources to cybercrime. In terms of complexity, agencies with more hierarchical layers, agencies that utilize more specialization and agencies that make greater use of civilian employees are more likely to dedicate specific personnel to cybercrime. Finally, regarding control, agencies that assign non-sworn personnel to administrative tasks are more likely to dedicate resources to cybercrime response.

Originality/value

This study is one of the first to use this framework to examine the relationship between organizational characteristics and cybercrime response. It shows that this perspective can be useful for understanding police organizations and police policies, programs and strategies.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 5 June 2020

Hassan Younies and Tareq Na'el Al-Tawil

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax…

1677

Abstract

Purpose

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax regulatory environment and incomprehensible cybersecurity policies have influenced the discussions.

Design/methodology/approach

This paper will first offer a global outlook of cybersecurity laws and legislation. The global outlook will present the basis for examining best practices that the UAE could emulate. The paper will then examine the legislative landscape of cyber laws in the UAE, including cross-country comparisons. The comparisons are critical, as the country’s cybercrime laws are in their infancy phase.

Findings

The UAE has taken decisive and proactive measures to deter the threat of cybercrimes and cyberattacks. The UAE strategy comprehensive strategy has been effective in protecting the economy and populations from the adverse effects of cybercrimes. The success lies in the enactment of comprehensive and streamlines laws and regulations with harsher penalties. The stringent legal measures, including longer jail terms, stiffer fines and deportation of foreigners, have ensured robust deterrence to cybercriminals.

Originality/value

The analysis has shown that the UAE has a higher score of preparedness against cybercrimes and cyberattacks. The UAE has specifically crafted a broader and effective legislative framework of cybercrime laws. Although the UAE has comprehensive cybercrime laws, the remarkable level of technological advances in the country makes citizens and businesses lucrative targets. The UAE now has the burden of doubling down its legal efforts to deter emerging cybersecurity risks.

Details

Journal of Financial Crime, vol. 27 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 17 December 2018

Sheshadri Chatterjee, Arpan Kumar Kar, Yogesh K. Dwivedi and Hatice Kizgin

The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.

1570

Abstract

Purpose

The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.

Design/methodology/approach

A conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares.

Findings

The study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent cybercrimes in Smart Cities of India. The study reveals that government initiative (GI) and legal awareness are less influential in spreading of the awareness of cybercrimes (AOC) to the citizens of the proposed smart cities.

Research limitations/implications

The conceptual model utilizes two constructs from the technology adoption model, namely, perceived usefulness and ease of use. The study employs other factors such as social media, word of mouth, GIs, legal awareness and organizations constituting entities spreading awareness from different related literature works. Thereby, a comprehensive theoretical conceptual model has been proposed which helps to identify the factors that may help in preventing cybercrimes.

Practical implications

This study provides an insight to the policy maker to understand several factors influencing the AOC of the citizens of the proposed Smart Cities of India for the prevention of cybercrimes.

Originality/value

There are few existing studies analyzing the effect of AOC to mitigate cybercrimes. Thus, this study offers a novel contribution.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

This chapter explores the laws and unique challenges associated with the investigation and prosecution of cybercrime. Crimes that involve the misuse of computers (e.g., hacking…

Abstract

This chapter explores the laws and unique challenges associated with the investigation and prosecution of cybercrime. Crimes that involve the misuse of computers (e.g., hacking, denial of service, and ransomware attacks) and criminal activity that uses computers to commit the act are both covered (e.g., fraud, theft, and money laundering). This chapter also describes the roles of the various federal agencies involved in investigating cybercrime, common cybercrime terms and trends, the statutes frequently used to prosecute cybercrimes, and the challenges and complexity of investigating cybercrime.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

21 – 30 of over 1000