Identity Related Crime in the Cyberspace: Examining Phishing and Its Impact

IF 0.7 Q4 CRIMINOLOGY & PENOLOGY International Journal of Cyber Criminology Pub Date : 2008-01-01 DOI:10.5281/ZENODO.18800
K. Jaishankar
{"title":"Identity Related Crime in the Cyberspace: Examining Phishing and Its Impact","authors":"K. Jaishankar","doi":"10.5281/ZENODO.18800","DOIUrl":null,"url":null,"abstract":"Last November/December 2007, I was invited to two prestigious events of Cyber Criminology. The POLCYB International Summit on Policing Cyberspace, 2007, Bangkok, Thailand and the UNODC core group meeting of Experts on Identity related Crime and ISPAC Conference at Courmeyeur, Italy. I was also entrusted the task of preparing the Bangkok Declaration of the International summit on Cyberspace by the Society for the Policing of Cyberspace (POLCYB), Canada and that is published as a special paper in this issue. Hence in this editorial I would like to focus about identity related crime and its impact in the cyberspace.Identity is a holistic term to portray \"an individual's comprehension of him or herself as a discrete, separate entity\" (Identity, 2008, para 1). Finch (2007, pp.29-31) provides a brief typology of identity:\"Identity is a complex and multi-faceted concept ... and it can be divided in to three categories: personal, social and legal. Personal identity relates to the self as experienced by the individual... social identity is the identity that is perceived by others; it is the external view of the self as viewed by others in society... Legal identity is ...the way in which an accumulation of information distinguishes one individual from all others....\".The importance of identity gains greater significance in this wired era. The use of identity in the cyberspace is greater nowadays. People tend to shop, bank, sell, and have relationship in internet. In these processes their identity plays a superior role, which, however, is being misused by the miscreants. The perpetrators try to misuse the identity of a person for personal gain. This criminal misuse of identity is called identity related crime, which the United Nations Office of Drugs and Crime (UNODC), Vienna, Austria prefers to use and as a member of the core group of experts on Identity-related crime, UNODC1, I also advocate the use of this term.Koops & Leenes (2006) were the first to \"propose to use the term 'identity-related crime' as an umbrella term. This covers all punishable activities having identity as a target or a principal tool.\" However, there is no universal definition of identity related crime, as it invariably comprises of many types of crimes such as identity theft, identity fraud, intellectual property abuse and other related crimes (UNODC, 2007a, 2007b). Though, Koops & Leenes (2006) have defined Identity-related crime, as the one that \"concerns all punishable activities that have identity as a target or a principal tool\", it is not recognized as a final definition of Identity related crime.Identity related cyber crime is on the rise, both in developed and developing countries. In this decade alone millions of people around the world are victimized of identity related cyber crime. The identity related cyber crime is perpetrated with ease when compared to the identity related crime in the physical space (Smith, 2007). It should be noted that the impact of identity related cyber crime is larger. The transnational nature, velocity and its relationship with other criminal activities such as fraud, organized crime, money-laundering and terrorism makes this crime more unique. UNODC (2008a, para 30) describes Identity related crime as the crime of the 21st Century:\"In serious cases, millions of dollars are stolen using false ID. Millions of smaller cases result in personal loss and frustration for victims. Because of under reporting, lack of common definitions, and insufficient legislation, this is probably just the tip of the iceberg. Nor are the costs purely economic: identity-related theft can pose a major threat to security. The problem is serious, and it is growing. No wonder it has been called \"the crime of the 21st century\".While we explore identity related cyber crime, we cannot avoid analyzing Phishing. Phishing is the main identity related cyber crime, though, malware to a certain extent, can be construed as an individual identity-related cyber crime, but predominantly Phishers also use malware. …","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"2 1","pages":"10-15"},"PeriodicalIF":0.7000,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Criminology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5281/ZENODO.18800","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
引用次数: 11

Abstract

Last November/December 2007, I was invited to two prestigious events of Cyber Criminology. The POLCYB International Summit on Policing Cyberspace, 2007, Bangkok, Thailand and the UNODC core group meeting of Experts on Identity related Crime and ISPAC Conference at Courmeyeur, Italy. I was also entrusted the task of preparing the Bangkok Declaration of the International summit on Cyberspace by the Society for the Policing of Cyberspace (POLCYB), Canada and that is published as a special paper in this issue. Hence in this editorial I would like to focus about identity related crime and its impact in the cyberspace.Identity is a holistic term to portray "an individual's comprehension of him or herself as a discrete, separate entity" (Identity, 2008, para 1). Finch (2007, pp.29-31) provides a brief typology of identity:"Identity is a complex and multi-faceted concept ... and it can be divided in to three categories: personal, social and legal. Personal identity relates to the self as experienced by the individual... social identity is the identity that is perceived by others; it is the external view of the self as viewed by others in society... Legal identity is ...the way in which an accumulation of information distinguishes one individual from all others....".The importance of identity gains greater significance in this wired era. The use of identity in the cyberspace is greater nowadays. People tend to shop, bank, sell, and have relationship in internet. In these processes their identity plays a superior role, which, however, is being misused by the miscreants. The perpetrators try to misuse the identity of a person for personal gain. This criminal misuse of identity is called identity related crime, which the United Nations Office of Drugs and Crime (UNODC), Vienna, Austria prefers to use and as a member of the core group of experts on Identity-related crime, UNODC1, I also advocate the use of this term.Koops & Leenes (2006) were the first to "propose to use the term 'identity-related crime' as an umbrella term. This covers all punishable activities having identity as a target or a principal tool." However, there is no universal definition of identity related crime, as it invariably comprises of many types of crimes such as identity theft, identity fraud, intellectual property abuse and other related crimes (UNODC, 2007a, 2007b). Though, Koops & Leenes (2006) have defined Identity-related crime, as the one that "concerns all punishable activities that have identity as a target or a principal tool", it is not recognized as a final definition of Identity related crime.Identity related cyber crime is on the rise, both in developed and developing countries. In this decade alone millions of people around the world are victimized of identity related cyber crime. The identity related cyber crime is perpetrated with ease when compared to the identity related crime in the physical space (Smith, 2007). It should be noted that the impact of identity related cyber crime is larger. The transnational nature, velocity and its relationship with other criminal activities such as fraud, organized crime, money-laundering and terrorism makes this crime more unique. UNODC (2008a, para 30) describes Identity related crime as the crime of the 21st Century:"In serious cases, millions of dollars are stolen using false ID. Millions of smaller cases result in personal loss and frustration for victims. Because of under reporting, lack of common definitions, and insufficient legislation, this is probably just the tip of the iceberg. Nor are the costs purely economic: identity-related theft can pose a major threat to security. The problem is serious, and it is growing. No wonder it has been called "the crime of the 21st century".While we explore identity related cyber crime, we cannot avoid analyzing Phishing. Phishing is the main identity related cyber crime, though, malware to a certain extent, can be construed as an individual identity-related cyber crime, but predominantly Phishers also use malware. …
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络空间中与身份相关的犯罪:网络钓鱼及其影响研究
2007年11月至12月,我应邀参加了两场著名的网络犯罪学活动。2007年在泰国曼谷举行的网络空间警务国际首脑会议和在意大利Courmeyeur举行的毒品和犯罪问题办公室身份相关犯罪问题专家核心小组会议。我还受加拿大网络空间警务协会(POLCYB)委托编写《网络空间问题国际首脑会议曼谷宣言》,该宣言已作为特刊发表在本期。因此,在这篇社论中,我想重点讨论与身份有关的犯罪及其对网络空间的影响。身份是一个整体术语,用来描述“一个人对他或她自己作为一个离散的、独立的实体的理解”(Identity, 2008,第1段)。Finch (2007, pp.29-31)提供了一个简短的身份类型:“身份是一个复杂的、多方面的概念……它可以分为三类:个人、社会和法律。个人同一性与个体所经历的自我有关。社会认同是他人感知到的认同;它是社会上其他人对自我的外部看法……法定身份是……信息的积累使一个人有别于其他所有人....”。在这个网络时代,身份的重要性变得更加重要。如今,在网络空间中使用身份的情况越来越多。人们倾向于在互联网上购物,银行,销售和建立关系。在这些进程中,他们的身份发挥着优越的作用,然而,这种作用正被不法分子滥用。犯罪者试图滥用一个人的身份来谋取个人利益。这种滥用身份的犯罪行为被称为与身份有关的犯罪,奥地利维也纳的联合国毒品和犯罪问题办公室(毒品和犯罪问题办公室)倾向于使用这一术语,作为与身份有关的犯罪问题核心专家小组(毒品和犯罪问题办公室)的一员,我也主张使用这一术语。Koops和Leenes(2006)是第一个“建议使用‘身份相关犯罪’作为总括术语”的人。这包括所有作为目标或主要工具的应受惩罚的活动。”然而,对与身份有关的犯罪没有一个普遍的定义,因为它总是包括许多类型的犯罪,如身份盗窃、身份欺诈、滥用知识产权和其他相关犯罪(毒品和犯罪问题办公室,2007年a, 2007年b)。虽然Koops & Leenes(2006)将身份相关犯罪定义为“涉及以身份为目标或主要工具的所有应受惩罚的活动”,但这并不是身份相关犯罪的最终定义。无论是在发达国家还是发展中国家,与身份相关的网络犯罪都呈上升趋势。仅在这十年里,全世界就有数百万人成为身份相关网络犯罪的受害者。与物理空间中的身份相关犯罪相比,与身份相关的网络犯罪更容易实施(Smith, 2007)。需要注意的是,与身份相关的网络犯罪的影响更大。跨国犯罪的性质、速度及其与欺诈、有组织犯罪、洗钱和恐怖主义等其他犯罪活动的关系使这种犯罪更加独特。毒品和犯罪问题办公室(2008a,第30段)将与身份有关的犯罪描述为21世纪的犯罪:“在严重的案件中,数百万美元被使用假身份被盗。数以百万计的小案件给受害者带来了个人损失和沮丧。由于报告不足、缺乏共同定义和立法不足,这可能只是冰山一角。代价也不仅仅是经济上的:与身份相关的盗窃可能对安全构成重大威胁。这个问题很严重,而且还在不断恶化。难怪它被称为“21世纪的罪行”。当我们探讨与身份相关的网络犯罪时,我们无法避免分析网络钓鱼。网络钓鱼是与身份相关的主要网络犯罪,虽然恶意软件在一定程度上可以被解释为与个人身份相关的网络犯罪,但主要是网络钓鱼者也使用恶意软件。…
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
2.60
自引率
40.00%
发文量
0
审稿时长
16 weeks
期刊介绍: International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy. IJCC is an unique Diamond open access, not for profit international journal, where the author(s) need not pay article processing charges / page charges and it is totally free for both the authors and the audience. IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, Developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety, Human Factor of Cyber Crime and Cyber Security and Policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes primarily from a social science perspective to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.
期刊最新文献
Cyberharassment Awareness Course (Cybac): influences from domestic abuse perpetrator programmes for its design and function Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud Harmful discourse on social triggering factors of persecution truth era Project Leaked: research on non-consensual sharing of intimate images in Brazil
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1