Cyber Criminology
Cyber Criminology
Cyber Criminology
Cyber Criminology
What is criminology?
Thus, criminology deals with the legal psychiatric aspect or the medico-
psychological, biological, pedagogical or socio-legal aspect of criminality and the factors
related therewith. Dr. Kenny defines criminology as a branch of criminal service which deals
with crime causation, analysis and prevention of crime. And this can be accepted as the most
simple and workable definition of criminology.
Cyber Criminology:
Computers and the Internet play an increasingly pivotal role in daily life, making it
vitally important to understand the dynamics of cybercrime and those victimized by it. The
anthology Cybercrime and Criminological Theory: Fundamental Readings on Hacking,
Piracy, Theft, and Harassment explores the predictors for participation in various forms of
cybercrime and deviance, from common problems like media piracy, to more distinct
offenses such as computer hacking. Most criminological theories were developed to account
for street crimes, so it is unclear how these theories may apply to virtual offending. This text
provides critical insight into the utility of multiple theories to account for cybercrimes.
Cybercrime and Criminological Theory gives direct insight into the rates and
prevalence of cybercrime offenses using data sets from populations across the United States.
It gives readers a fundamental understanding of, and appreciation for various forms of
cybercrime, and outlines prospective predictors of both offending and victimization. The
selected readings identify research questions that must be addressed in order to improve the
legal, technical, and policy responses to cybercrimes.
Cybercrime and the threat it creates are growing in its reach, in accordance with
similar growth in information technology. Some countries account for more of the variation
in cybercrime activity than others, which affects less criminally involved nations as well,
considering that cybercrime does not respect national borders over the Internet. Routine
activity theory (RAT) has been used to explain cybercrime at the individual level, but not at
the national level. Much research has focused on high cybercrime countries, but this research
is often conducted by cyber security firms and is exclusively descriptive, making no
inferences. This research sought to determine what characteristics predict whether a nation is
high in either spamming activity or phishing activity. In a sample of 132 countries, it was
found that wealthier nations with more Internet users per capita had higher cybercrime
activity. Unemployment was also found to interact with Internet users such that the effect of
the proportion of Internet users on spam was strongest in nations with higher unemployment.
A great deal of criminological research has attempted to understand and identify the
causes of victimization using the lifestyle-routine activities theory. Recent researchers have
argued that the lifestyle-routine activities theory may be able to explain the increasingly
significant phenomenon of computer and cybercrime. This claim has been contested by Yar
(2005), however, who argues that routine activities theory is limited in explaining
cybercrime. Few empirical tests exist to address this important issue. Thus, this study
attempts to explore this gap in the research literature by examining a specific form of
cybercrime, on-line harassment. Using a sample of students at a south eastern university, this
analysis found some support for elements of lifestyle-routine activities theory. Individual and
peer involvement in computer crime and deviance also significantly increased the risk of
victimization.
Deterrent Theory:
While American cyber security is already benefitting from the strength of government
relationships with the private sector, focus on improving these vital partnerships must remain
a priority. Of course, in order for the United States to become the most capable cyber power
in the world, it is also necessary that it invest in the training of a skilled cyber workforce.
Finally, it is paramount for America’s leaders to use these emerging assets to create an
environment in which this nation and its interests are not only secure from cyber attacks but
can also benefit from a robust strategy of cyber deterrence.
Unlike most criminology theories that purport to explain why people offend, control
theory offers the justification for why people obey rules. Control theory provides an
explanation for how behaviour conforms to that which is generally expected in society. Some
control theories emphasize the developmental processes during childhood by which internal
constraints develop. Social control theories, however, focus primarily on external factors and
the processes by which they become effective. Deviance and crime occur because of
inadequate constraints. For social control theory, the underlying view of human nature
includes the conception of free will, thereby giving offenders the capacity of choice, and
responsibility for their behavior. As such, social control theory is aligned more with the
classical school of criminology than with positivist or determinist perspectives. For the most
part, social control theory postulates a shared value or belief in social norms. Even those who
break laws or violate social norms are likely to share the general belief that those rules should
be followed. Crime and deviance are considered predictable behaviours that society has not
curtailed.
Cyberspace presents an exciting new frontier for criminologists. Virtual reality and
computer mediated communications challenge the traditional discourse of criminology,
introducing new forms of deviance, crime, and social control. Since the 1990s, academics
have observed how the cyberspace has emerged as a new locus of criminal activity, but in
general, criminology has been remiss in its research into the phenomena of cyber crime and
has been slow to recognize the importance of cyberspace in changing the nature and scope of
offending and victimization. As such, very few theoretical explanations of cyber crime exist.
Space-transition theory;
1. Individuals who repress their desire to engage in crime in the real world due to either
status or position have a propensity to engage in crimes online.
2. Offenders may be more likely to engage in cybercrime because of the ability to utilize
various identities, hide their location, and the lack of deterrence in online spaces.
3. Crime in online spaces is likely to move into physical space, and vice versa.
4. Cyber criminals may have the opportunity to desist because of the temporary nature
of the internet and its spatio-temporal disconnect from the real world.
5. The nature of technology allows strangers to come together in cyberspace in order to
plan and commit offences in real world, and those who know one another in real
world may partner in order to engage in cyber crimes.
6. Closed societies may produce greater level of cybercrime than open societies due to
repressive nature of government regime.
7. The disconnect between norms and values of a society in real world and those of the
internet may lead some individuals to engage in cybercrime.
Although several of the propositions are sensible and are supported by basic
characteristics of the internet, other propositions are somewhat difficult to test and may
be contrary to either the current research on cyber crime, or be specific to a certain form
of cyber crime.
Prevention will be always your best line of defense against cyber criminals. Like any
other criminal activity, those most vulnerable tend to be the first targeted. Ideally, you’ll want
to work with a IT security expert to assess your specific needs and vulnerabilities, but there
are certainly some universal steps you can take that will greatly reduce your likelihood of
attack.
Keep your computer current with the latest patches and updates.
One of the best ways to keep attackers away from your computer is to apply patches andother
software fixes when they become available. By regularly updating your computer, you block
attackers from being able to take advantage of software flaws (vulnerabilities) that they could
otherwise use to break into your system.
While keeping your computer up-to-date will not protect you from all attacks, it
makes it much more difficult for hackers to gain access to your system, blocks many basic
and automated attacks completely, and might be enough to discourage a less-determined
attacker to look for a more vulnerable computer elsewhere.
Keep in mind that a newly purchased computer may not have the right level of security for
you. When you are installing your computer at home, pay attention not just to making your
new system function, but also focus on making it work securely.
Selecting a password that cannot be easily guessed is the first step toward keeping
passwords secure and away from the wrong hands. Strong passwords have eight characters
or more and use a combination of letters, numbers and symbols Avoid using any of the
following as your password: your login name, anything based on your personal
information such as your last name, and words that can be found in the dictionary. Try to
select especially strong, unique passwords for protecting activities like online banking.
Keep your passwords in a safe place and try not to use the same password for every service
you use online.
Change passwords on a regular basis, at least every 90 days. This can limit the damage
caused by someone who has already gained access to your account. If you notice
something suspicious with one of your online accounts, one of the first steps you can take
is to change your password.
Several types of security software are necessary for basic online security. Security
software essentials include firewall and antivirus programs. A firewall is usually your
computer's first line of defense-it controls who and what can communicate with your
computer online. You could think of a firewall as a sort of "policeman" that watches all the
data attempting to flow in and out of your computer on the Internet, allowing
communications that it knows are safe and blocking "bad" traffic such as attacks from ever
reaching your computer.
Exercise caution when sharing personal information such as your name, home address, phone
number, and email address online. To take advantage of many online services, you will
inevitably have to provide personal information in order to handle billing and shipping of
purchased goods. Since not divulging any personal information is rarely possible, the
following list contains some advice for how to share personal information safely online:
Don't respond to email messages that ask for personal information. Legitimate
companies will not use email messages to ask for your personal information. When in
doubt, contact the company by phone or by typing in the company Web address into your
Web browser. Don't click on the links in these messages as they make take you to a
fraudulent, malicious Web sites.
Pay attention to privacy policies on Web sites and in software. It is important to
understand how an organization might collect and use your personal information before
you share it with them.
Guard your email address. Spammers and phishers sometimes send millions of messages
to email addresses that may or may not exist in hopes of finding a potential victim.
Responding to these messages or even downloading images ensures you will be added to
their lists for more of the same messages in the future. Also be careful when posting your
email address online in newsgroups, blogs or online communities.
The old saying "there's no such thing as a free lunch" still rings true today.
Supposedly "free" software such as screen savers or smileys, secret investment tricks sure to
make you untold fortunes, and contests that you've surprisingly won without entering are the
enticing hooks used by companies to grab your attention.
While you may not directly pay for the software or service with money, the free
software or service you asked for may have been bundled with advertising software
("adware") that tracks your behaviour and displays unwanted advertisements. You may have
to divulge personal information or purchase something else in order to claim your supposed
content winnings. If an offer looks so good it's hard to believe, ask for someone else's
opinion, read the fine print, or even better, simply ignore it.
The impact of identity theft and online crimes can be greatly reduced if you can catch
it shortly after your data is stolen or when the first use of your information is attempted. One
of the easiest ways to get the tip-off that something has gone wrong is by reviewing the
monthly statements provided by your bank and credit card companies for anything out of the
ordinary.
In concluding remarks we can say cyber crimes are increasing day by day all over the
world. Advances in information and communications technologies have created a range of
new crime problems that did not exist two decades ago. Opportunities for various criminal
activities to pervade the Internet have led to the growth and development of cyber
criminology as a distinct discipline within the criminology framework.
Computers and the Internet play an increasingly pivotal role in daily life, making it
vitally important to understand the dynamics of cybercrime and those victimized by it. It’s
high time to understand that what are the causes of these crimes and how we can prevent
ourselves from being the victim of cyber attacks.