首页 > 最新文献

The International Journal of Cybersecurity Intelligence and Cybercrime最新文献

英文 中文
North Korean Cyber Attacks and Policy Responses: An Interdisciplinary Theoretical Framework 朝鲜网络攻击与政策应对:一个跨学科的理论框架
Pub Date : 2021-08-01 DOI: 10.52306/04020221nhpz9033
Jeeseon Hwang, Kyung-shick Choi
Study conducts a qualitative analysis of the objectives, forms, current trends, and characteristics of North Korean cyber terror attacks and suggests a way to ensure further progress towards a successful international policy response. Despite the capricious changes that have recently occurred within the international political atmosphere, North Korea continues to constitute a threat to international stability through its ongoing advancement of nuclear weapons and long-range ballistic missiles. The difficulty of attribution and the relatively low costs associated with launching cyber offensives make cyber terrorism an attractive option for North Korea. In an effort to direct attention to these circumstances, this study aims to share explicit experts’ perspectives in the field of cyberterrorism in South Korea. Consequently, the study purports to contribute to existing academic discussion and practices on cyber terror and cybercrime. Furthermore, this study adopts perspectives from criminological theoretical frameworks and the network theory of world politics to substantiate a more comprehensive view of North Korea’s cyberterrorism which considers the multifaceted and asymmetrical nature of cyberterrorism within the context of postmodern international politicsfections.
该研究对朝鲜网络恐怖袭击的目标、形式、当前趋势和特征进行了定性分析,并提出了一种确保进一步取得成功的国际政策反应的方法。尽管最近国际政治气氛发生了反复无常的变化,但朝鲜通过不断发展核武器和远程弹道导弹,继续对国际稳定构成威胁。网络攻击难以识别,成本相对较低,这使得网络恐怖主义成为朝鲜的一个诱人选择。为了引起人们对这些情况的关注,本研究旨在分享韩国网络恐怖主义领域专家的明确观点。因此,该研究旨在为现有的关于网络恐怖和网络犯罪的学术讨论和实践做出贡献。此外,本研究采用犯罪学理论框架和世界政治网络理论的视角,在后现代国际政治背景下考虑网络恐怖主义的多面性和不对称性,以证实对朝鲜网络恐怖主义的更全面的看法。
{"title":"North Korean Cyber Attacks and Policy Responses: An Interdisciplinary Theoretical Framework","authors":"Jeeseon Hwang, Kyung-shick Choi","doi":"10.52306/04020221nhpz9033","DOIUrl":"https://doi.org/10.52306/04020221nhpz9033","url":null,"abstract":"Study conducts a qualitative analysis of the objectives, forms, current trends, and characteristics of North Korean cyber terror attacks and suggests a way to ensure further progress towards a successful international policy response. Despite the capricious changes that have recently occurred within the international political atmosphere, North Korea continues to constitute a threat to international stability through its ongoing advancement of nuclear weapons and long-range ballistic missiles. The difficulty of attribution and the relatively low costs associated with launching cyber offensives make cyber terrorism an attractive option for North Korea. In an effort to direct attention to these circumstances, this study aims to share explicit experts’ perspectives in the field of cyberterrorism in South Korea. Consequently, the study purports to contribute to existing academic discussion and practices on cyber terror and cybercrime. Furthermore, this study adopts perspectives from criminological theoretical frameworks and the network theory of world politics to substantiate a more comprehensive view of North Korea’s cyberterrorism which considers the multifaceted and asymmetrical nature of cyberterrorism within the context of postmodern international politicsfections.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Malware Infections in the U.S. during the COVID-19 Pandemic: An Empirical Study COVID-19大流行期间美国恶意软件感染:一项实证研究
Pub Date : 2021-08-01 DOI: 10.52306/04020321crbh5596
Sydney Gero, S. back, J. LaPrade, Joonggon Kim
The COVID-19 pandemic has changed the world in many ways, especially in the landscape of cyber threats. The pandemic has pro-vided cybercriminals with more opportunities to commit crimes due to more people engaging in online activities, along with the increased use of computers for school, work, and social events. The current study seeks to explore cybercrime trends, in particular malware infections, during the COVID-19 pandemic. Thus, this study examines the relationship between the number of malware in-fections, COVID-19 positive cases, closed non-essential businesses, and closed K-12 public schools in the United States. Data utilized in this study derives from (1) Kaspersky Cyberthreat Real-Time Map, (2) Centers for Disease Control and Prevention (CDC), and (3) COVID-19 US State Policy Database over the course of six months from January of 2020 to June of 2020. The findings of this study reveal that there are associations between the number of malware infections, COVID-19 positive cases, and closed non-essential busi-nesses. However, interestingly, there is no link between the number of malware infections and closed K-12 public schools. Policy impli-cations and the limitations of this study are also discussed.
2019冠状病毒病大流行在许多方面改变了世界,特别是在网络威胁方面。新冠肺炎疫情给网络犯罪分子提供了更多的犯罪机会,因为越来越多的人参与网络活动,以及越来越多的人在学校、工作和社交活动中使用电脑。本研究旨在探讨2019冠状病毒病大流行期间的网络犯罪趋势,特别是恶意软件感染。因此,本研究考察了美国恶意软件感染数量、COVID-19阳性病例、关闭非必要企业和关闭K-12公立学校之间的关系。本研究中使用的数据来自(1)卡巴斯基网络威胁实时地图,(2)疾病控制和预防中心(CDC)和(3)2019冠状病毒病美国国家政策数据库,时间为2020年1月至2020年6月,为期六个月。研究结果表明,恶意软件感染数量、COVID-19阳性病例数量与关闭的非必要业务之间存在关联。然而,有趣的是,恶意软件感染的数量与关闭的K-12公立学校之间没有联系。本文还讨论了本研究的政策含义和局限性。
{"title":"Malware Infections in the U.S. during the COVID-19 Pandemic: An Empirical Study","authors":"Sydney Gero, S. back, J. LaPrade, Joonggon Kim","doi":"10.52306/04020321crbh5596","DOIUrl":"https://doi.org/10.52306/04020321crbh5596","url":null,"abstract":"The COVID-19 pandemic has changed the world in many ways, especially in the landscape of cyber threats. The pandemic has pro-vided cybercriminals with more opportunities to commit crimes due to more people engaging in online activities, along with the increased use of computers for school, work, and social events. The current study seeks to explore cybercrime trends, in particular malware infections, during the COVID-19 pandemic. Thus, this study examines the relationship between the number of malware in-fections, COVID-19 positive cases, closed non-essential businesses, and closed K-12 public schools in the United States. Data utilized in this study derives from (1) Kaspersky Cyberthreat Real-Time Map, (2) Centers for Disease Control and Prevention (CDC), and (3) COVID-19 US State Policy Database over the course of six months from January of 2020 to June of 2020. The findings of this study reveal that there are associations between the number of malware infections, COVID-19 positive cases, and closed non-essential busi-nesses. However, interestingly, there is no link between the number of malware infections and closed K-12 public schools. Policy impli-cations and the limitations of this study are also discussed.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116271553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Editorial introduction to the special issue: Supporting future scholarship on cybercrime 特刊编辑导言:支持未来网络犯罪学术研究
Pub Date : 2021-08-01 DOI: 10.52306/04020121yrsy7883
Jaeyong Choi, Brandon C. Dulisse, Richard Wentling, Nathan E. Kruis
This editorial introduction will present an overview of the three papers published in this special issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The winners of the student paper competition during the 2021 Whitehat Conference have prepared their papers for this special issue. Their research directs our attention to key issues regarding cybercrime that have often been overlooked in the literature ranging from North Korean cyberterrorism to the relationship between COVID-19 and cybercrime and to fear of online victimization.
这篇社论的介绍将概述发表在本期《国际网络安全情报与网络犯罪杂志》特刊上的三篇论文。在2021年白帽会议期间,学生论文比赛的获胜者为本期特刊准备了论文。他们的研究将我们的注意力引向了朝鲜网络恐怖主义、新冠病毒与网络犯罪的关系、对网络受害的恐惧等在文献中经常被忽视的网络犯罪关键问题。
{"title":"Editorial introduction to the special issue: Supporting future scholarship on cybercrime","authors":"Jaeyong Choi, Brandon C. Dulisse, Richard Wentling, Nathan E. Kruis","doi":"10.52306/04020121yrsy7883","DOIUrl":"https://doi.org/10.52306/04020121yrsy7883","url":null,"abstract":"This editorial introduction will present an overview of the three papers published in this special issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The winners of the student paper competition during the 2021 Whitehat Conference have prepared their papers for this special issue. Their research directs our attention to key issues regarding cybercrime that have often been overlooked in the literature ranging from North Korean cyberterrorism to the relationship between COVID-19 and cybercrime and to fear of online victimization.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Level of Engagement with Social Networking Services and Fear of Online Victimization: The Role of Online Victimization Experiences 社交网络服务参与水平与网络受害恐惧:网络受害经历的作用
Pub Date : 2021-08-01 DOI: 10.52306/04020421terz5728
Yeon-ok Park, Lynne M. Vieraitis
Prior research indicates that fear of crime may lessen a person’s quality of life by leading them to avoid participating in social activities. The current study explores the relationship between fear of online victimization and participants’ levels of engagement with social networking services (SNS). Using data from a survey of 1,000 adolescents and adults aged 14 to 59 years, the direct relationship between the level of engagement on SNS and fear of online victimization and the indirect relationship through prior victimization were assessed. Findings show that the direct effect of the level of engagement on SNS on victimization experience was significant. In addition, the relationship between the level of engagement and the fear of victimization on SNS was significantly mediated through prior victimization experiences on SNS. These findings support the hypothesis that greater exposure on SNS increases online victimization, leading to a greater fear of victimization on SNS. Considering the large role SNS play in social activities and relationships, the findings are important for understanding how victimization impacts fear and may help inform policymakers how to help people stay engaged freely in socializing in a safer online environment.
先前的研究表明,对犯罪的恐惧可能会降低一个人的生活质量,导致他们避免参加社会活动。目前的研究探讨了对网络受害的恐惧与参与者对社交网络服务(SNS)的参与程度之间的关系。利用对1000名14 - 59岁的青少年和成年人的调查数据,我们评估了社交网络参与水平与在线受害恐惧之间的直接关系,以及通过先前受害而产生的间接关系。研究结果表明,社交网络的参与程度对受害体验有显著的直接影响。此外,参与水平与社交网络受害恐惧之间的关系通过之前的社交网络受害经历显著中介。这些发现支持了一个假设,即更多的社交网络曝光增加了在线受害,导致更大的社交网络受害恐惧。考虑到社交网络在社交活动和人际关系中扮演的重要角色,这些发现对于理解受害如何影响恐惧非常重要,并可能帮助决策者了解如何帮助人们在更安全的网络环境中自由地参与社交活动。
{"title":"Level of Engagement with Social Networking Services and Fear of Online Victimization: The Role of Online Victimization Experiences","authors":"Yeon-ok Park, Lynne M. Vieraitis","doi":"10.52306/04020421terz5728","DOIUrl":"https://doi.org/10.52306/04020421terz5728","url":null,"abstract":"Prior research indicates that fear of crime may lessen a person’s quality of life by leading them to avoid participating in social activities. The current study explores the relationship between fear of online victimization and participants’ levels of engagement with social networking services (SNS). Using data from a survey of 1,000 adolescents and adults aged 14 to 59 years, the direct relationship between the level of engagement on SNS and fear of online victimization and the indirect relationship through prior victimization were assessed. Findings show that the direct effect of the level of engagement on SNS on victimization experience was significant. In addition, the relationship between the level of engagement and the fear of victimization on SNS was significantly mediated through prior victimization experiences on SNS. These findings support the hypothesis that greater exposure on SNS increases online victimization, leading to a greater fear of victimization on SNS. Considering the large role SNS play in social activities and relationships, the findings are important for understanding how victimization impacts fear and may help inform policymakers how to help people stay engaged freely in socializing in a safer online environment.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132656367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Challenges of Identifying Dangers Online and Predictors of Victimization 识别网络危险的挑战和受害的预测因素
Pub Date : 2021-04-01 DOI: 10.52306/04010121QNFW5915
Catherine D. Marcum
This short paper will provide an overview of the impressive pieces included in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. This issue includes articles on the following pertinent topic, utilizing a range of approaches and methodologies: 1) online credibility; 2) cyberbullying; and 3) unauthorized access of information. An emphasis on the importance of policy development and better protection of potential victims is a common thread throughout the issue.
这篇短文将概述本期《国际网络安全情报与网络犯罪杂志》中令人印象深刻的文章。本期包括以下相关主题的文章,采用了一系列的方法和方法:1)在线信誉;2)网络欺凌;3)未经授权的信息访问。强调制定政策和更好地保护潜在受害者的重要性是贯穿整个问题的一个共同主线。
{"title":"The Challenges of Identifying Dangers Online and Predictors of Victimization","authors":"Catherine D. Marcum","doi":"10.52306/04010121QNFW5915","DOIUrl":"https://doi.org/10.52306/04010121QNFW5915","url":null,"abstract":"This short paper will provide an overview of the impressive pieces included in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. This issue includes articles on the following pertinent topic, utilizing a range of approaches and methodologies: 1) online credibility; 2) cyberbullying; and 3) unauthorized access of information. An emphasis on the importance of policy development and better protection of potential victims is a common thread throughout the issue.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129402946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effects of Self-control on the Cyber Victim-Offender Overlap 自我控制对网络加害人重叠的影响
Pub Date : 2020-11-03 DOI: 10.52306/03020220ONXT9834
Brooke Nodeland
Increasingly, the overlap between victims and offenders has received empirical attention with regard to traditional forms of deviance. More recently, the growth of cyber offending has led to a need to examine whether traditional criminological theories can be used to explain these crimes in the same manner as traditional offenses. However, limited attention has been given to victim-offender overlap in cyber-offending. The current study uses a sample of American college students to examine the influence of self-control on cyber offending, cyber victimization, and the cyber victim-offender overlap. The results indicate that low self-control significantly predicts participation in cyber offending as well as cyber victim-offending, but has a weak relationship with cyber victimization. Interestingly, associating with deviant cyber peers was a significant predictor across all models. Results are discussed in the context of the existing literature.
在传统形式的越轨行为方面,受害者和罪犯之间的重叠越来越受到经验主义的关注。最近,网络犯罪的增长导致需要研究传统犯罪学理论是否可以像传统犯罪一样用来解释这些犯罪。然而,对网络犯罪中受害者-罪犯重叠的关注有限。本研究以美国大学生为研究对象,探讨自我控制对网络犯罪、网络受害和网络受害者-犯罪者重叠的影响。结果表明,低自我控制显著预测网络犯罪的参与以及网络受害者-犯罪,但与网络受害者的关系不明显。有趣的是,与不正常的网络同伴交往在所有模型中都是显著的预测因子。结果在现有文献的背景下进行了讨论。
{"title":"The Effects of Self-control on the Cyber Victim-Offender Overlap","authors":"Brooke Nodeland","doi":"10.52306/03020220ONXT9834","DOIUrl":"https://doi.org/10.52306/03020220ONXT9834","url":null,"abstract":"Increasingly, the overlap between victims and offenders has received empirical attention with regard to traditional forms of deviance. More recently, the growth of cyber offending has led to a need to examine whether traditional criminological theories can be used to explain these crimes in the same manner as traditional offenses. However, limited attention has been given to victim-offender overlap in cyber-offending. The current study uses a sample of American college students to examine the influence of self-control on cyber offending, cyber victimization, and the cyber victim-offender overlap. The results indicate that low self-control significantly predicts participation in cyber offending as well as cyber victim-offending, but has a weak relationship with cyber victimization. Interestingly, associating with deviant cyber peers was a significant predictor across all models. Results are discussed in the context of the existing literature.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Toward Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks 减轻、减少和预防网络犯罪和网络安全风险
Pub Date : 2020-11-03 DOI: 10.52306/03020120JOFX1754
C. S. Lee
Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately address such challenges using college student samples and nationally representative samples, as well as a framework through which cybersecurity can be better managed. Theoretically speaking, these studies use traditional criminological theories to explore different types of cybercrimes and cybersecurity while enhancing our understandings of both. The issue is concluded with a book review of a work about computer crime that was published before the Internet age and offers useful insights for current and future cybercrime studies.
网络犯罪和网络安全是新兴的研究领域,受到技术发展的影响。这些相互关联的领域的学者研究了不同类型的网络犯罪以及受害和犯罪。越来越多的学者开始关注如何减轻、最小化甚至预防网络犯罪。然而,由于网络犯罪的人为因素和技术因素,这些策略在现实中往往难以实现。在本期的《国际网络安全情报与网络犯罪杂志》上,三篇论文利用大学生样本和具有全国代表性的样本,以及一个可以更好地管理网络安全的框架,充分解决了这些挑战。从理论上讲,这些研究使用传统的犯罪学理论来探索不同类型的网络犯罪和网络安全,同时增强我们对两者的理解。这期的最后一篇文章是对一本在互联网时代之前出版的关于电脑犯罪的著作的书评,为当前和未来的网络犯罪研究提供有用的见解。
{"title":"Toward Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks","authors":"C. S. Lee","doi":"10.52306/03020120JOFX1754","DOIUrl":"https://doi.org/10.52306/03020120JOFX1754","url":null,"abstract":"Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately address such challenges using college student samples and nationally representative samples, as well as a framework through which cybersecurity can be better managed. Theoretically speaking, these studies use traditional criminological theories to explore different types of cybercrimes and cybersecurity while enhancing our understandings of both. The issue is concluded with a book review of a work about computer crime that was published before the Internet age and offers useful insights for current and future cybercrime studies.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121352908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-victimization Trends in Trinidad & Tobago: The Results of An Empirical Research 特立尼达和多巴哥的网络受害趋势:一项实证研究结果
Pub Date : 2019-12-27 DOI: 10.19107/IJISC.2019.02.05
N. Stamatakis, Troy A. Smith
Cybertechnology has brought benefits to the Caribbean in the form of new regional economic and social growth. In the last years, Caribbean countries have also become attractive targets for cybercrime due to increased economic success and online presence with a low level of cyber resilience. This study examines the online-related activities that affect cybercrime victimization by using the Routine Activity Theory (RAT). The present study seeks to identify activities that contribute to different forms of cybercrime victimization and develop risk models for these crimes, particularly the understudied cyber-dependent crimes of Hacking and Malware. It also aims to explore if there are similarities or differences in factors leading to victimization, which correlate to the classification of crimes as either cyber-dependent or cyber-enabled. The data analysis suggests that there is significant applicability for RAT in explaining Online Harassment victimization, while the usability of the RAT for predicting Malware victimization proved to be minimal, with only two significant variables being identified, with both being associated with Capable Guardianship.
网络技术以新的区域经济和社会增长的形式给加勒比地区带来了好处。在过去的几年里,加勒比国家也成为网络犯罪的诱人目标,因为这些国家在经济上取得了越来越大的成功,而网络恢复能力却很低。本研究运用常规活动理论探讨网络相关活动对网络犯罪受害的影响。本研究旨在确定导致不同形式的网络犯罪受害的活动,并为这些犯罪开发风险模型,特别是未被充分研究的黑客和恶意软件的网络依赖犯罪。它还旨在探讨导致受害的因素是否存在相似或不同之处,这些因素与网络依赖或网络启用的犯罪分类有关。数据分析表明,RAT在解释在线骚扰受害方面具有重要的适用性,而RAT在预测恶意软件受害方面的可用性被证明是最小的,只有两个重要的变量被确定,两者都与有能力的监护有关。
{"title":"Cyber-victimization Trends in Trinidad & Tobago: The Results of An Empirical Research","authors":"N. Stamatakis, Troy A. Smith","doi":"10.19107/IJISC.2019.02.05","DOIUrl":"https://doi.org/10.19107/IJISC.2019.02.05","url":null,"abstract":"Cybertechnology has brought benefits to the Caribbean in the form of new regional economic and social growth. In the last years, Caribbean countries have also become attractive targets for cybercrime due to increased economic success and online presence with a low level of cyber resilience. This study examines the online-related activities that affect cybercrime victimization by using the Routine Activity Theory (RAT). The present study seeks to identify activities that contribute to different forms of cybercrime victimization and develop risk models for these crimes, particularly the understudied cyber-dependent crimes of Hacking and Malware. It also aims to explore if there are similarities or differences in factors leading to victimization, which correlate to the classification of crimes as either cyber-dependent or cyber-enabled. The data analysis suggests that there is significant applicability for RAT in explaining Online Harassment victimization, while the usability of the RAT for predicting Malware victimization proved to be minimal, with only two significant variables being identified, with both being associated with Capable Guardianship.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"61 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113987899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Exploratory Perception Analysis of Consensual and Nonconsensual Image Sharing 合意与非合意图像分享的探索性感知分析
Pub Date : 2019-09-06 DOI: 10.52306/02020319cicb2462
J. R. Lee, S. Downing
Limited research has considered individual perceptions of moral distinctions between consensual and nonconsensual intimate image sharing, as well as decision making parameters around why others might engage in such behavior. The current study conducted a perception analysis using mixed-methods online surveys administered to 63 participants, inquiring into their perceptions of why individuals engage in certain behaviors surrounding the sending of intimate images from friends and partners. The study found that respondents favored the concepts of (1) sharing images with romantic partners over peers; (2) sharing non-intimate images over intimate images; and (3) sharing images with consent rather than without it. Furthermore, participants were more willing to use their own devices to show both intimate and non-intimate images rather than posting on social media or directly sending others the image files. Drawing on descriptive quantitative and thematic qualitative analysis, the findings suggest that respondents perceive nonconsensual image sharing as being motivated by the desire to either bully, “show off,” or for revenge. In addition, sharing intimate digital images of peers and romantic partners without consent was perceived to be troubling because it is abusive and/or can lead to abuse (when involving peers) and a violation of trust (when involving romantic partners).
有限的研究考虑了个人对自愿和非自愿的亲密图像共享之间的道德区别的看法,以及为什么其他人可能会参与这种行为的决策参数。目前的研究对63名参与者进行了一项感知分析,使用混合方法进行在线调查,询问他们对为什么个人会在发送朋友和伴侣的亲密照片时做出某些行为的看法。研究发现,受访者更喜欢(1)与恋人分享照片的概念;(2)以非亲密形象代替亲密形象分享的;(3)在征得同意的情况下分享图片,而不是未经同意。此外,参与者更愿意使用自己的设备来展示亲密和非亲密的照片,而不是在社交媒体上发布或直接将照片文件发送给其他人。通过描述性定量分析和主题定性分析,研究结果表明,受访者认为未经同意分享照片的动机要么是欺凌,要么是“炫耀”,要么是报复。此外,未经同意分享同伴和恋人的亲密数字图像被认为是令人不安的,因为这是虐待和/或可能导致虐待(当涉及同伴时)和违反信任(当涉及恋人时)。
{"title":"An Exploratory Perception Analysis of Consensual and Nonconsensual Image Sharing","authors":"J. R. Lee, S. Downing","doi":"10.52306/02020319cicb2462","DOIUrl":"https://doi.org/10.52306/02020319cicb2462","url":null,"abstract":"Limited research has considered individual perceptions of moral distinctions between consensual and nonconsensual intimate image sharing, as well as decision making parameters around why others might engage in such behavior. The current study conducted a perception analysis using mixed-methods online surveys administered to 63 participants, inquiring into their perceptions of why individuals engage in certain behaviors surrounding the sending of intimate images from friends and partners. The study found that respondents favored the concepts of (1) sharing images with romantic partners over peers; (2) sharing non-intimate images over intimate images; and (3) sharing images with consent rather than without it. Furthermore, participants were more willing to use their own devices to show both intimate and non-intimate images rather than posting on social media or directly sending others the image files. Drawing on descriptive quantitative and thematic qualitative analysis, the findings suggest that respondents perceive nonconsensual image sharing as being motivated by the desire to either bully, “show off,” or for revenge. In addition, sharing intimate digital images of peers and romantic partners without consent was perceived to be troubling because it is abusive and/or can lead to abuse (when involving peers) and a violation of trust (when involving romantic partners).","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129507012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence 网络犯罪预防策略的未来:人为因素和网络智能的整体方法
Pub Date : 2019-09-06 DOI: 10.52306/02020119kdhz8339
S. back, J. LaPrade
New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior. Unfortunately, humans can be vulnerable and easily deceived making technological advances alone inadequate in the cybercrime fight. Instead, we must take a more holistic approach by using technology and better understanding the human factors that make cybercrime possible. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective comprehensive cybercrime prevention strategies can be developed.
新技术正在迅速涌现,以应对日益增加的网络犯罪威胁,然而,网络犯罪的一个重要组成部分,技术并不总是影响,那就是人类的行为。不幸的是,人类是脆弱的,很容易被欺骗,使得技术进步本身在打击网络犯罪方面是不够的。相反,我们必须采取更全面的方法,利用技术,更好地了解使网络犯罪成为可能的人为因素。在本期的《国际网络安全情报与网络犯罪杂志》中,三项研究有助于我们了解人为因素和新兴的网络犯罪技术,以便制定更有效的综合网络犯罪预防策略。
{"title":"The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence","authors":"S. back, J. LaPrade","doi":"10.52306/02020119kdhz8339","DOIUrl":"https://doi.org/10.52306/02020119kdhz8339","url":null,"abstract":"New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior. Unfortunately, humans can be vulnerable and easily deceived making technological advances alone inadequate in the cybercrime fight. Instead, we must take a more holistic approach by using technology and better understanding the human factors that make cybercrime possible. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective comprehensive cybercrime prevention strategies can be developed.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
The International Journal of Cybersecurity Intelligence and Cybercrime
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1