Search results

21 – 30 of over 1000
Article
Publication date: 5 February 2020

Jacqueline M. Drew

The evolution of digital technology has changed the way in which we, as a global society, socialise and conduct business. This growth has led to an increasing reliance on…

2991

Abstract

Purpose

The evolution of digital technology has changed the way in which we, as a global society, socialise and conduct business. This growth has led to an increasing reliance on technology, much more interconnectedness and in turn, an expansion of criminal opportunities, known now as “cybercrime”. This study aims to explore the experience of victimisation, perceptions of cybercrime and use of online crime prevention strategies.

Design/methodology/approach

The study involved a survey of a representative sample of the adult Australian population. The study sample was made up of 595 Australian adult participants. The study seeks to better understand how previous victimisation, perception of cybercrime prevalence and perception of harm caused by cybercrime are related to the use of online crime prevention strategies. It seeks to contribute to a body of work that has found that crime prevention education focused on increasing knowledge is limited in its effectiveness in reducing victimisation.

Findings

This study identifies key levers, in particular perceived prevalence and harm of cybercrime, as critical in the use of online crime prevention strategies by potential victims.

Research limitations/implications

As such, this study provides an important evidence base on which to develop more effective online crime prevention education and awareness campaigns to reduce cybervictimisation.

Practical implications

The practical implications include the relationship between cybervictimisation and self-protective online strategies of potential victims and the development of more effective online crime prevention programmes.

Originality/value

The research takes a different perspective from much of the previous research, seeking to better understand how attitudinal factors (perceived prevalence of cybercrime and perceived harm of cybercrime) might motivate or influence the use of online crime prevention strategies by potential victims.

Details

Journal of Criminological Research, Policy and Practice, vol. 6 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 2 March 2012

Adam M. Bossler and Thomas J. Holt

Little empirical research exists regarding how local law enforcement has responded to cybercrime. This paper aims to understand: the law enforcement agencies that line officers…

4073

Abstract

Purpose

Little empirical research exists regarding how local law enforcement has responded to cybercrime. This paper aims to understand: the law enforcement agencies that line officers believe should be primarily responsible for investigating cybercrime cases; their perceptions about their agency's current ability to respond to these offenses; and their beliefs regarding the best ways to improve the social response to cybercrime.

Design/methodology/approach

The authors surveyed patrol officers in the Charlotte‐Mecklenburg and Savannah‐Chatham Metropolitan police departments.

Findings

The authors found that officers do not believe that local law enforcement should be primarily responsible for handling cybercrime cases and they have little information on how upper management is addressing cybercrime. Officers indicated that the best strategies to deal with cybercrime were greater care taken by citizens online and improvements to the legal system.

Research limitations/implications

Local law enforcement agencies feel they are unable to fully address cybercrime. Although the findings were generally consistent across demographic and experiential characteristics and cities, two cities in the southeastern United States were surveyed.

Practical implications

According to these officers, they want citizens to be more careful online and for clarification of cybercrime laws and increased prosecutions. They do not favor local cybercrime units and additional computer training for line officers as much as scholars and police administrators advocate.

Originality/value

This paper studied the perceptions of patrol officers, who are the first responders to most crime scenes, on local law enforcement responses to cybercrime and the strategies they view to be most effective in combating cybercrime.

Details

Policing: An International Journal of Police Strategies & Management, vol. 35 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 2 March 2020

Jacek Koziarski and Jin Ree Lee

This paper explores the various challenges associated with policing cybercrime, arguing that a failure to improve law enforcement responses to cybercrime may negatively impact…

3435

Abstract

Purpose

This paper explores the various challenges associated with policing cybercrime, arguing that a failure to improve law enforcement responses to cybercrime may negatively impact their institutional legitimacy as reliable first responders. Further, the paper makes preliminary links between cybercrime and the paradigm of evidence-based policing (EBP), providing suggestions on how the paradigm can assist, develop, and improve a myriad of factors associated with policing cybercrime.

Design/methodology/approach

Three examples of prominent cybercrime incidents will be explored under the lens of institutional theory: the cyberextortion of Amanda Todd; the hacking of Ashley Madison; and the 2013 Target data breach.

Findings

EBP approaches to cybercrime can improve the effectiveness of existing and future approaches to cybercrime training, recruitment, as well as officers' preparedness and awareness of cybercrime.

Research limitations/implications

Future research will benefit from determining what types of training work at the local, state/provincial, and federal level, as well as evaluating both current and new cybercrime policing programs and strategies.

Practical implications

EBP approaches to cybercrime have the potential to improve police responses to cybercrime calls for service, save police resources, improve police–public relations during calls for service, and improve police legitimacy.

Originality/value

This paper links cybercrime policing to the paradigm of EBP, highlighting the need for evaluating and implementing effective evidence-based approaches to policing cybercrime.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 2 December 2019

Jeffrey Nowacki and Dale Willits

The purpose of this paper is to use Maguire’s (2003) theory of police organizations to explain whether police agencies dedicate specific personnel to cybercrime response.

1346

Abstract

Purpose

The purpose of this paper is to use Maguire’s (2003) theory of police organizations to explain whether police agencies dedicate specific personnel to cybercrime response.

Design/methodology/approach

Data from this study come from the 2013 Law Enforcement Management and Statistics survey. Maguire’s (2003) theory of the organizational structure of police organizations is used to measure organizational variables related to context, complexity and control. Logistic regression is used to examine whether these organizational characteristics are related to cybercrime response.

Findings

The results suggest that organizational context, complexity and control are related to cybercrime response. Specifically, in terms of context, larger agencies, agencies whose officers engage in more non-routine tasks, and agencies governed by an active collective bargaining agreement are more likely to dedicate specific resources to cybercrime. In terms of complexity, agencies with more hierarchical layers, agencies that utilize more specialization and agencies that make greater use of civilian employees are more likely to dedicate specific personnel to cybercrime. Finally, regarding control, agencies that assign non-sworn personnel to administrative tasks are more likely to dedicate resources to cybercrime response.

Originality/value

This study is one of the first to use this framework to examine the relationship between organizational characteristics and cybercrime response. It shows that this perspective can be useful for understanding police organizations and police policies, programs and strategies.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 5 June 2020

Hassan Younies and Tareq Na'el Al-Tawil

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax…

1642

Abstract

Purpose

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax regulatory environment and incomprehensible cybersecurity policies have influenced the discussions.

Design/methodology/approach

This paper will first offer a global outlook of cybersecurity laws and legislation. The global outlook will present the basis for examining best practices that the UAE could emulate. The paper will then examine the legislative landscape of cyber laws in the UAE, including cross-country comparisons. The comparisons are critical, as the country’s cybercrime laws are in their infancy phase.

Findings

The UAE has taken decisive and proactive measures to deter the threat of cybercrimes and cyberattacks. The UAE strategy comprehensive strategy has been effective in protecting the economy and populations from the adverse effects of cybercrimes. The success lies in the enactment of comprehensive and streamlines laws and regulations with harsher penalties. The stringent legal measures, including longer jail terms, stiffer fines and deportation of foreigners, have ensured robust deterrence to cybercriminals.

Originality/value

The analysis has shown that the UAE has a higher score of preparedness against cybercrimes and cyberattacks. The UAE has specifically crafted a broader and effective legislative framework of cybercrime laws. Although the UAE has comprehensive cybercrime laws, the remarkable level of technological advances in the country makes citizens and businesses lucrative targets. The UAE now has the burden of doubling down its legal efforts to deter emerging cybersecurity risks.

Details

Journal of Financial Crime, vol. 27 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 17 December 2018

Sheshadri Chatterjee, Arpan Kumar Kar, Yogesh K. Dwivedi and Hatice Kizgin

The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.

1526

Abstract

Purpose

The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.

Design/methodology/approach

A conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares.

Findings

The study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent cybercrimes in Smart Cities of India. The study reveals that government initiative (GI) and legal awareness are less influential in spreading of the awareness of cybercrimes (AOC) to the citizens of the proposed smart cities.

Research limitations/implications

The conceptual model utilizes two constructs from the technology adoption model, namely, perceived usefulness and ease of use. The study employs other factors such as social media, word of mouth, GIs, legal awareness and organizations constituting entities spreading awareness from different related literature works. Thereby, a comprehensive theoretical conceptual model has been proposed which helps to identify the factors that may help in preventing cybercrimes.

Practical implications

This study provides an insight to the policy maker to understand several factors influencing the AOC of the citizens of the proposed Smart Cities of India for the prevention of cybercrimes.

Originality/value

There are few existing studies analyzing the effect of AOC to mitigate cybercrimes. Thus, this study offers a novel contribution.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

This chapter explores the laws and unique challenges associated with the investigation and prosecution of cybercrime. Crimes that involve the misuse of computers (e.g., hacking…

Abstract

This chapter explores the laws and unique challenges associated with the investigation and prosecution of cybercrime. Crimes that involve the misuse of computers (e.g., hacking, denial of service, and ransomware attacks) and criminal activity that uses computers to commit the act are both covered (e.g., fraud, theft, and money laundering). This chapter also describes the roles of the various federal agencies involved in investigating cybercrime, common cybercrime terms and trends, the statutes frequently used to prosecute cybercrimes, and the challenges and complexity of investigating cybercrime.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Article
Publication date: 6 September 2022

Ibrahim Arpaci and Ersin Ateş

Cybercrimes increase day by day in parallel to cyber-attacks and cyber-threats. Due to such an increase, required cybersecurity precautions against all kinds of cyber-attacks and…

Abstract

Purpose

Cybercrimes increase day by day in parallel to cyber-attacks and cyber-threats. Due to such an increase, required cybersecurity precautions against all kinds of cyber-attacks and cyber-threats should be taken by both organizations and individuals. This study aims to develop a reliable and valid measurement tool to measure cybercrime awareness levels of individuals.

Design/methodology/approach

In this study, a scale named as Cybercrime Awareness Scale (CAS) has been developed and psychometric properties of the scale have been tested by two separate studies.

Findings

The first study included a total of 500 respondents (294 female and 206 male). In the first study, factor structure of the proposed scale has been determined through an exploratory factor analysis. The results revealed a three-factor structure (i.e. information systems crimes, personal data crimes, and privacy and security). Cronbach's alpha reliability coefficients for the subdimensions were 0.95, 0.92, and 0.90, respectively. The sample of the second study consisted of 494 respondents (281 female and 213 male). The confirmatory-factor-analysis results revealed that three-factor structure is valid and optimal model. Further, the proposed scale demonstrated moderate concurrent validity results in relation to the Digital Data Security Awareness Scale.

Originality/value

Findings indicated that the CAS is a valid and reliable measurement tool to measure individuals' cybercrime awareness level. This study makes a novel contribution to the existing cybersecurity literature by providing the CAS, which is developed by following rigorous methodological standards.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-01-2022-0023/

Details

Online Information Review, vol. 47 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 31 August 2022

Yi Yong Lee, Chin Lay Gan and Tze Wei Liew

The purpose of this paper is to understand the influence of exposure to motivated offenders who may alter the vulnerability levels to phishing victimization. This is particularly…

Abstract

Purpose

The purpose of this paper is to understand the influence of exposure to motivated offenders who may alter the vulnerability levels to phishing victimization. This is particularly focused on explaining the influences of individuals’ online lifestyles and attitudes toward information sharing online on phishing susceptibility.

Design/methodology/approach

This conceptual paper explores the risk of phishing victimization using criminological theories. The authors draw on empirical evidence from existing cybercrime literature and revisit routine activities theory (RAT) and lifestyle RAT (LRAT) to elucidate the risk of phishing victimization. This paper proposes that cyber-RAT, which was developed from RAT and LRAT, could interpret phishing victimization. Grounded on the intervention-based theory against cybercrime phishing, this study suggests that an attitude toward precautionary behavior (information sharing online) is essential to mitigate the phishing victimization risk.

Findings

This paper aims to provide a clear insight into the understanding of phishing victimization risk using theoretical and empirical evidence.

Originality/value

The theoretical perspective outlined provides the understanding of the impacts of online routine activities on a phishing attack which in turn will increase the awareness of phishing threats. The important role of the precautionary countermeasure, that is, attitudes toward information sharing online is highlighted to reconcile the phishing victimization risk.

Details

The Journal of Adult Protection, vol. 24 no. 3/4
Type: Research Article
ISSN: 1466-8203

Keywords

Article
Publication date: 7 August 2007

Emmanuel Babatunde Ajala

The purpose of this paper is to examine cybercrime detection and prevention.

5705

Abstract

Purpose

The purpose of this paper is to examine cybercrime detection and prevention.

Design/Methodology/approach

The paper looks at the problem of cybercrime with a view to identifying the main problem and the best methods for detecting, eradicating and preventing illegal activites.

Findings

Fighting cybercrime requires a holistic opportunist not just addressing alone.

Originality/value

The paper advocates international comprehensive cybercrime coordinated by an international coalition body

Details

Library Hi Tech News, vol. 24 no. 7
Type: Research Article
ISSN: 0741-9058

Keywords

21 – 30 of over 1000