45 research outputs found

    Victimization by Deepfake in the Metaverse: Building a Practical Management Framework

    Get PDF
    Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework and provide solutions to mitigate deepfake-related victimization in the metaverse. This study identifies and further suggests a framework for advocacy of deepfake crime victimization in the metaverse through the application of the routine activities theory, as well as offender motivation and potential explanation of criminal behavior through Eysenck’s theory of criminality

    The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity

    Get PDF
    Cybercriminology combines knowledge from criminology, psychology, sociology, computer science, and cybersecurity to provide an in-depth understanding of cybercrime. Cybercrime and cybersecurity are interconnected across many places, platforms, and actors. Cybercrime issues are continuously and expeditiously changing and developing, especially with the advent of new technologies. The International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) aims to contribute to the growing field of cybercriminology and cybersecurity. The IJCIC is eager to work with scholars, policy analysts, practitioners, and others to enhance theory, methods, and practice within cybercrime and cybersecurity at the regional, national, and international levels

    Illegal Gambling and Its Operation via the Darknet and Bitcoin: An Application of Routine Activity Theory

    Get PDF
    The Darknet and Bitcoins have been widely utilized by those who wish to anonymously perform illegal activities in cyberspace. Restricted in many countries, gambling websites utilize Bitcoin payments that allow users to freely engage in illegal gambling activities with the absence of a formal capable guardian. Despite the urgency and limited knowledge available to law enforcement regarding this issue, few empirical studies have focused on illegal gambling websites. The current study attempts to examine the characteristics and operations of online gambling websites on both the Darknet and Surface Web, which allow Bitcoin payments. The findings suggest that both websites on the Surface Web and Darknet have similar and distinctive features that attract and encourage online users to engage in extensive illegal gambling activities and potentially other illegal activities as well. The study concludes with policy recommendations to remedy the issue of online gambling

    Spreading Propaganda in Cyberspace: Comparing Cyber-Resource Usage of Al Qaeda and ISIS

    Get PDF
    Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recruit new members, and justify terrorist attacks and actions. This study explores the ways in which types of social media, message contents, and motives for spreading propaganda take shape in cyberspace. In order to empirically test these relations, we created a dataset with annual terrorism reports from 2011 to 2016. In our global cyberterrorism dataset, we used and connected cyber-resources (Facebook, online forum, Twitter mentions, websites, and YouTube videos) and legal documents of individual cases that were mentioned in the reports. The results show that YouTube videos were used primarily for propagating certain ideologies and for recruiting members for Al Qaeda and ISIS. Al Qaeda-affiliated cyberterrorists used YouTube videos as both individual sources and embedded sources for Facebook and Twitter, whereas ISIS-affiliated cyberterrorists predominantly used YouTube videos and Twitter posts

    A Test of Structural Model for Fear of Crime in Social Networking Sites

    Get PDF
    This study constructed a structural model which consists of social demographic factors, experience of victimization, opportunity factors, and social context factors to explain the public’s fear of crime on social networking sites (SNS). The model is based on the risk interpretation model, which predicts that these factors influence users’ fear of crime victimization. Using data from 486 university students in South Korea, an empirically-tested model suggests that sex and age have direct and significant effects on fear of victimization, supporting the vulnerability hypothesis. Among opportunity factors, the level of personal information and the number of offending peers have significant effects on fear of victimization through the medium of the perceived victimization risk, although the effect of SNS usage time is not significant. In addition, it was revealed that experience of victimization has a direct effect on fear of victimization. Furthermore, findings indicate that bridging social network has a direct and indirect positive effect on fear of victimization, and collective efficacy has an indirect effect on fear of victimization. Results show that incidents in SNS have the strongest effect on fear of victimization among various factors in this model without being mediated by the perceived victimization risk. Overall, this study supports a structural model for the fear of victimization

    Ransomware against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory

    Get PDF
    Technologically advanced hackers are able to commit a crime and leave undiscovered by the authorities. Recent increases in cyber-attacks utilizing technology known as ransomware are leaving police departments and other institutions in the serious situation of having to pay ransom to cybercriminals. The present study employs a Cyber-Routine Theoretical approach in explaining why ransomware victimization has become a viral phenomenon. Data were derived from the recent reported cases of ransomware attacks towards police departments in the U.S. and analyzed in order to build a victim profile. This study shows that online lifestyle and cybersecurity are the salient factors that contribute to the ransomware victimization. Future potential preventive measures and policies will be discussed

    Mobile Phone Technology and Online Sexual Harassment among Juveniles in South Korea: Effects of Self-control and Social Learning

    Get PDF
    Mobile phones are increasingly developing into a technology-based device that everyone is dependent on. While previous research has been extensive in examining different theoretical explanations for interpreting juvenile delinquency, research on mobile induced online sexual harassment among juvenile populations have been rather scarce and limited. As a result of this dearth, the present study employs a theoretical approach in rationalizing why juveniles commit online sexual harassment using their mobile phones. Elements from both social learning and self-control theories are used to assess the causes for online sexual harassment using mobile phones. By conducting binomial logistic regression analyses, this study finds that both social learning and low self-control components are salient factors in determining the causes of juvenile sexual harassment in cyberspace. From these findings, policies will be introduced to address the major causes of juvenile online sexual harassment using mobile phones

    Dynamics of Dark Web Financial Marketplaces: An Exploratory Study of Underground Fraud and Scam Business

    Get PDF
    The number of Dark Web financial marketplaces where Dark Web users and sellers actively trade illegal goods and services anonymously has been growing exponentially in recent years. The Dark Web has expanded illegal activities via selling various illicit products, from hacked credit cards to stolen crypto accounts. This study aims to delineate the characteristics of the Dark Web financial market and its scams. Data were derived from leading Dark Web financial websites, including Hidden Wiki, Onion List, and Dark Web Wiki, using Dark Web search engines. The study combines statistical analysis with thematic analysis of Dark Web content. Offering promotions and customer services with the payment methods of cryptocurrencies were prevalent, similar to the Surface Web\u27s e-commerce market. The findings suggest that the Dark Web financial market is likely to harbor scams targeting Dark Web buyers. Dark Web sellers construct a website to sell scam products and recommend purchasing Escrow services to ensure safe transactions as an additional scam. The results from this study provided empirical support for the components of the routine activity theory of the Dark Web financial market to substantiate a more comprehensive view of patterns of fraud/ scams. Enhancing law enforcement capabilities of investigating financial marketplaces and promoting public awareness and consumer safety programs are discussed as effective preventive measures

    Vaccination with a Human Papillomavirus (HPV)-16/18 AS04-Adjuvanted Cervical Cancer Vaccine in Korean Girls Aged 10-14 Years

    Get PDF
    The human papillomavirus (HPV)-16/18 AS04-adjuvanted cervical cancer vaccine has been demonstrated to be highly efficacious and immunogenic with a favorable safety profile. This study assessed the immunogenicity and safety of the HPV-16/18 AS04-adjuvanted vaccine in healthy Korean girls aged 10-14 yr. This multi-center, observer-blind trial randomly assigned 321 healthy girls to receive three doses (0, 1, 6-month schedule) of HPV-16/18 AS04-adjuvanted vaccine or hepatitis A vaccine. Immunogenicity against vaccine antigens was assessed one month post-Dose 3. Solicited and unsolicited adverse events (AEs) and serious AEs (SAEs) were recorded. In the according-to-protocol analysis, all initially seronegative subjects vaccinated with the HPV-16/18 AS04-adjuvanted vaccine had seroconverted at Month 7, with a peak geometric mean titer (GMT) that was 600-fold higher than the natural infection titer of 29.8 EU/mL for HPV-16 and a peak GMT that was 400-fold higher than the natural infection titer of 22.6 EU/mL for HPV-18. The vaccine was well tolerated with no increase in reactogenicity with subsequent doses and no reports of vaccine-related SAEs. In conclusion, the HPV-16/18 AS04-adjuvanted vaccine is shown to be highly immunogenic and generally well-tolerated in Korean girls aged 10-14 yr
    corecore