14 research outputs found

    Toward Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks

    Get PDF
    Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately address such challenges using college student samples and nationally representative samples, as well as a framework through which cybersecurity can be better managed. Theoretically speaking, these studies use traditional criminological theories to explore different types of cybercrimes and cybersecurity while enhancing our understandings of both. The issue is concluded with a book review of a work about computer crime that was published before the Internet age and offers useful insights for current and future cybercrime studies

    The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity

    Get PDF
    Cybercriminology combines knowledge from criminology, psychology, sociology, computer science, and cybersecurity to provide an in-depth understanding of cybercrime. Cybercrime and cybersecurity are interconnected across many places, platforms, and actors. Cybercrime issues are continuously and expeditiously changing and developing, especially with the advent of new technologies. The International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) aims to contribute to the growing field of cybercriminology and cybersecurity. The IJCIC is eager to work with scholars, policy analysts, practitioners, and others to enhance theory, methods, and practice within cybercrime and cybersecurity at the regional, national, and international levels

    Spreading Propaganda in Cyberspace: Comparing Cyber-Resource Usage of Al Qaeda and ISIS

    Get PDF
    Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recruit new members, and justify terrorist attacks and actions. This study explores the ways in which types of social media, message contents, and motives for spreading propaganda take shape in cyberspace. In order to empirically test these relations, we created a dataset with annual terrorism reports from 2011 to 2016. In our global cyberterrorism dataset, we used and connected cyber-resources (Facebook, online forum, Twitter mentions, websites, and YouTube videos) and legal documents of individual cases that were mentioned in the reports. The results show that YouTube videos were used primarily for propagating certain ideologies and for recruiting members for Al Qaeda and ISIS. Al Qaeda-affiliated cyberterrorists used YouTube videos as both individual sources and embedded sources for Facebook and Twitter, whereas ISIS-affiliated cyberterrorists predominantly used YouTube videos and Twitter posts

    Dynamics of Dark Web Financial Marketplaces: An Exploratory Study of Underground Fraud and Scam Business

    Get PDF
    The number of Dark Web financial marketplaces where Dark Web users and sellers actively trade illegal goods and services anonymously has been growing exponentially in recent years. The Dark Web has expanded illegal activities via selling various illicit products, from hacked credit cards to stolen crypto accounts. This study aims to delineate the characteristics of the Dark Web financial market and its scams. Data were derived from leading Dark Web financial websites, including Hidden Wiki, Onion List, and Dark Web Wiki, using Dark Web search engines. The study combines statistical analysis with thematic analysis of Dark Web content. Offering promotions and customer services with the payment methods of cryptocurrencies were prevalent, similar to the Surface Web\u27s e-commerce market. The findings suggest that the Dark Web financial market is likely to harbor scams targeting Dark Web buyers. Dark Web sellers construct a website to sell scam products and recommend purchasing Escrow services to ensure safe transactions as an additional scam. The results from this study provided empirical support for the components of the routine activity theory of the Dark Web financial market to substantiate a more comprehensive view of patterns of fraud/ scams. Enhancing law enforcement capabilities of investigating financial marketplaces and promoting public awareness and consumer safety programs are discussed as effective preventive measures

    Living on the Sino-Indian border: the story of the Mishmis in Arunachal Pradesh, Northeast India

    Get PDF
    In northeast India, there are several indigenous peoples who reside along theSino-Indian border about whom there is very little academic research. Somecommunities are present on either side of the border, making research verydi cult. The Mishmi is one such indigenous group living in the northeastregion of India bordering southern Tibet. Out of four Mishmi clans, threereside on the Indian side and one on the Chinese side of the internationalborder. After the Sino-Indian War, movement of Mishmi people acrossthe border was restricted, impacting social ties and trade-related activities. Wediscuss relations between the Mishmi and the British, followed by their interactionswith the Indian administration. We document how people used theborders before the war and how development on the border has impactedMishmi lives. This research is a first attempt to document information aboutthe Mishmis in India and China. In this article, we present our preliminaryobservations based on anthropological fieldwork in Arunachal Pradesh, India.Secondary information was gathered from websites, archives, and reports.by Ambika Aiyadurai and Claire Seungeun Le
    corecore