3,759 research outputs found

    Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders

    No full text
    The distinct setting in which cyber-dependent crime takes place may reduce the similarity in the deviance of social network members. We test this assumption by analysing the deviance of the most important social contacts of cyber-dependent offenders and traditional offenders in the Netherlands (N = 344 offenders; N = 1131 social contacts). As expected, similarity in deviance is weaker for cyber-dependent crime. Because this is a strong predictor of traditional offending, this has important implications for criminological research and practice. Additionally, for both crime types the offending behaviour of a person is more strongly linked to the deviance of social ties if those ties are of the same gender and age, and if the offender has daily contact with them. Implications and future criminological research suggestions are discussed

    Public opinion and policy on crime prevention in Europe

    Get PDF
    In this second monitor report the focus is put on people’s perceptions and attitudes on the one hand, and on priorities in crime prevention policies across Europe on the other hand. What does the general public think about the police: their relationship with the communities, their effectiveness in preventing crime, their fairness with which they wield their authoritative power, their integrity,...? What do Europeans think of the effectiveness of policies on the different levels (national vs. European)? What do they believe to be the challenges to the security in the prevention and fight against crime? These are some questions approached in this report. The information and data used to answer these questions come from the Trust in the Police & Courts Module of the European Social Survey and from the Eurobarometer surveys conducted by the European Commission. Besides these existing survey data, the EUCPN Secretariat collected some additional data from the EUCPN members on the priorities in the crime prevention policies in their countries. More specifically, questions were asked about the country’s top three priorities in crime prevention policy/strategy and compared to the country’s three most prominent crime problems based on crime statistics. Also, it was examined whether or not the top three priorities in the country’s crime prevention policy were based on statistical or recorded data, or – if not – what other basis was used to pick these priorities. And finally, some questions were added about any remarkable or new developments in the Member States over the past five years

    Cybersecurity Workforce Development in Nigeria: Transforming the Cybercrime Gangs into Cybersecurity Specialists

    Get PDF
    This paper addresses the issue of cybercrime in Nigeria and the possibility of creating a cybersecurity workforce development program for cyber criminals to develop their skills for the cybersecurity profession, which may facilitate Nigeria’s economic development

    Cybercrime: a theoretical overview of the growing digital threat

    Get PDF
    This theoretical paper is published by the EUCPN Secretariat in connection with the theme of the Luxembourgian presidency which was cybercrime. Cybercrime is a global definition which characterizes many different criminal forms committed in the virtual world. This means the phenomenon covers a very wide scope of activities. This theoretical paper is written as an overview to help understand the definition of cybercrime and its forms. We concentrate on the variety of consequences as a result of the phenomenon. Moreover, this paper also has attention to the current European law and legislative actions against cybercrime

    Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework

    Get PDF
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, cyber‐fraud, revenge porn, and cyber‐stalking to demonstrate that who is victimised, why, and to what effect are the critical starting points for the analysis of the connections between gender and crimes. In turn, it uses the lens of intersectionality to acknowledge that, while conceptions of gender and crime interact, they intersect with other categories (e.g., sexuality) to provide additional layers of explanation. To nuance the utilitarian value of the synergy between the TCF and the feminist perspectives, the focus shifts to a recent case study (which compared socioeconomic and psychosocial cybercrimes). The article concludes that, while online and offline lives are inextricably intertwined, the victimisations in psychosocial cybercrimes may be more gendered than in socioeconomic cybercrimes. These contributions align the TCF to the feminist epistemology of crime in their attempt to move gender analysis of digital crimes “from margin to centre”

    Crime scripting: A systematic review

    Get PDF
    The file attached to this record is the author's final peer reviewed version.More than two decades after the publication of Cornish’s seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been applied in our community. The study provides evidence confirming that the approach is increasingly popular; and takes stock of crime scripting practices through a systematic review of over one hundred scripts published between 1994 and 2018. The results offer the first comprehensive picture of this approach, and highlights new directions for those interested in using data from cyber-systems and the Internet of Things to develop effective situational crime prevention measures

    Understanding cybercrime in Malaysia: an overview

    Get PDF
    Rapid developments of internet technology and cyber world have created new opportunities for irresponsible people to take advantage of internet users. Millions of internet users across globe have fallen victim to cybercrime. However, many issues regarding cybercrime are not fully understood yet. It is important to thoroughly understand many aspects of cybercrime for better decision making. This paper provides an overview of cybercrime in Malaysia including current state and statistics of cybercrime, common types of cybercrime, brief description of Malaysian cyber laws and describes the role of Malaysian government in responding to cyber security incidents. Hopefully, this paper will enrich current scenarios of cybercrime in Malaysia. Finally, the directions for future research were discussed

    Cyber Crime and Cyber Law’s In India: A Comprehensive Study with Special Reference to Information Technology

    Get PDF
    The rapid evolution of information technology has brought about significant advancements in various sectors, but it has also given rise to new challenges, particularly in the realm of cyber security. This study aims to provide a comprehensive overview of cybercrime and cyber laws in India, with a special emphasis on the Information Technology Act, 2000. The research begins by defining cybercrime and elucidating its various forms, including hacking, identity theft, phishing, and other malicious activities conducted in the digital domain. A detailed examination of the cyber threat landscape in India is presented, highlighting the increasing frequency and sophistication of cyber-attacks and their impact on individuals, businesses, and the government. The study then delves into the legislative framework governing cyber activities in India, primarily focusing on the Information Technology Act, 2000, and its subsequent amendments. It explores the legal definitions of cybercrimes, jurisdictional issues, and the powers conferred upon law enforcement agencies to investigate and prosecute offenders. Special attention is given to recent legal developments and case studies that illustrate the application of cyber laws in real-world scenarios. Furthermore, the research scrutinizes the role of government agencies, such as the Cyber Crime Cells, in combating cyber threats and promoting cyber security awareness. The study also assesses the effectiveness of international collaborations and treaties in addressing transnational cybercrimes, considering the borderless nature of cyber threats. The research investigates the role of Information Technology policies, standards, and best practices in India. It analyses the measures adopted by organizations to safeguard their digital assets and sensitive information, highlighting the importance of cyber security awareness and education. The study synthesizes the findings to provide recommendations for strengthening the existing cyber laws, enhancing cyber security infrastructure, and fostering a collaborative approach among stakeholders to mitigate the challenges posed by cybercrime. The research aims to contribute to the understanding of the dynamic landscape of cyber threats in India and serve as a valuable resource for policymakers, legal professionals, and academia involved in the field of information technology and cyber security

    Assessing the trends, scale and nature of economic cybercrimes: overview and issues

    Get PDF
    Trends in police-recorded and (where they exist) household survey-measured cybercrimes for economic gain are reviewed in a range of developed countries – Australia, Canada, Germany, Hong Kong, the Netherlands, Sweden, the UK and the US - and their implications for criminal policy are considered. The datasets indicate a substantial rise in online fraud – though one that is lower than the rise in online shopping and other ‘routine activity’ indicators - but it is not obvious whether this is just displacement for the fall in household and automobile property crime, nor how much overlap there is between the offenders and past ‘offline’ offenders. Nor do the data indicate whether the frauds result from insiders or outsiders, or are collusive. The direct and indirect costs of cyberfrauds are examined, and it is concluded that there is no satisfactory basis for the larger estimates of cost, but it is undeniable that those costs are large enough to merit concern. There remains a problem of what metrics are appropriate for judging the threat and harm from cybercrimes, and their impact on national and human security. There is not a sharp division between these larger national security issues and cyber attacks on banks, businesses, and the spear phishing of individuals with important knowledge of system vulnerabilities in the public or the private sector. Rather there is a punctuated continuum in the interplay between private, corporate governmental and wider social risks
    corecore