首页 > 最新文献

International Journal of Cyber Criminology最新文献

英文 中文
Cloaked by cyber space: A legal response to the risks of cyber stalking in Malaysia 被网络空间遮蔽:马来西亚对网络跟踪风险的法律回应
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2018-01-01 DOI: 10.5281/ZENODO.1467931
Z. Hamin, Wan Rosalili Wan Rosli
Cyber stalking generally involves unwarranted, repeated and threatening conduct of the offender via the Internet or social media platforms, which causes fear, distress or alarm to the victim. A qualitative study on the perception of cyber stalking and the adequacy of the anti-stalking law to regulate such crime in Malaysia is somewhat scarce. Hence, this paper seeks to examine cyber stalking risks and the sufficiency of laws to govern such crime and the legal protection afforded to victims. This paper adopts a qualitative methodology, where the data is obtained from eighteen semi-structured interviews conducted with various stakeholders, including the regulators and enforcement officers. Secondary data involves cyber legislation, the Penal Code, and online sources. The findings suggest that cyber stalking risks are often manufactured by the victims, which lead to individual responsibility towards managing and mitigating such risks. The findings have significant implications for lawmakers to either enact specific laws on cyber stalking or amend the Penal Code to include such crime. ________________________________________________________________________
网络跟踪通常涉及犯罪者通过互联网或社交媒体平台进行无根据的、重复的和威胁性的行为,这些行为会给受害者带来恐惧、痛苦或惊慌。在马来西亚,对网络跟踪的认知和反跟踪法是否足够规范此类犯罪的定性研究有些稀缺。因此,本文试图检验网络跟踪的风险和法律的充分性,以管理这类犯罪和提供给受害者的法律保护。本文采用定性方法,其中数据来自与各种利益相关者(包括监管机构和执法人员)进行的18次半结构化访谈。二手数据包括网络立法、刑法典和在线资源。研究结果表明,网络跟踪风险往往是由受害者制造的,这导致个人有责任管理和减轻这种风险。这一发现对立法者制定有关网络跟踪的具体法律或修改刑法以将此类犯罪纳入其中具有重要意义。________________________________________________________________________
{"title":"Cloaked by cyber space: A legal response to the risks of cyber stalking in Malaysia","authors":"Z. Hamin, Wan Rosalili Wan Rosli","doi":"10.5281/ZENODO.1467931","DOIUrl":"https://doi.org/10.5281/ZENODO.1467931","url":null,"abstract":"Cyber stalking generally involves unwarranted, repeated and threatening conduct of the offender via the Internet or social media platforms, which causes fear, distress or alarm to the victim. A qualitative study on the perception of cyber stalking and the adequacy of the anti-stalking law to regulate such crime in Malaysia is somewhat scarce. Hence, this paper seeks to examine cyber stalking risks and the sufficiency of laws to govern such crime and the legal protection afforded to victims. This paper adopts a qualitative methodology, where the data is obtained from eighteen semi-structured interviews conducted with various stakeholders, including the regulators and enforcement officers. Secondary data involves cyber legislation, the Penal Code, and online sources. The findings suggest that cyber stalking risks are often manufactured by the victims, which lead to individual responsibility towards managing and mitigating such risks. The findings have significant implications for lawmakers to either enact specific laws on cyber stalking or amend the Penal Code to include such crime. ________________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"12 1","pages":"316-332"},"PeriodicalIF":1.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71025352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adults Who Sext: Exploring Differences In Self-Esteem, Moral Foundations, And Personality 发性短信的成年人:探索自尊、道德基础和个性的差异
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2017-07-01 DOI: 10.5281/ZENODO.1037378
Danielle M. Crimmins, Kathryn C. Seigfried-Spellar
This study assessed the prevalence of sexting behaviors among adults, and the relationship between sexting and moral foundations, self-esteem, and individual differences. Additionally, this study examined differences in the methods used to send sext messages (mobile applications vs. text messages) and image content (e.g., face, masturbating). Respondents solicited through Amazon’s Mechanical Turk completed the anonymous survey measuring “attitudes toward sexting.” The final sample included 508 adult participants; 68% of adults reported sexting behaviors, and both mobile applications and traditional text messages were used to send sext messages. In general, individuals who scored higher on extraversion and lower on conscientiousness, agreeableness, harm, and fairness were more likely to engage in sexting behaviors. Self-esteem was not associated with any sexting behaviors. Results also found significant differences between individuals who send semi-nude and nude sext messages. Limitations and future research suggestions are discussed.
本研究评估了成人中性短信行为的流行程度,以及性短信与道德基础、自尊和个体差异之间的关系。此外,该研究还调查了发送性短信(手机应用程序与短信)和图像内容(例如,面部、手淫)的方法差异。通过亚马逊的土耳其机器人征集的受访者完成了这项衡量“对色情短信态度”的匿名调查。最终样本包括508名成年参与者;68%的成年人报告有发色情短信的行为,手机应用和传统短信都被用来发送色情短信。一般来说,外向性得分较高而尽责性、宜人性、伤害性和公平性得分较低的人更有可能从事性短信行为。自尊与任何性短信行为无关。研究结果还发现,发送半裸和裸体色情短信的人之间存在显著差异。讨论了局限性和未来的研究建议。
{"title":"Adults Who Sext: Exploring Differences In Self-Esteem, Moral Foundations, And Personality","authors":"Danielle M. Crimmins, Kathryn C. Seigfried-Spellar","doi":"10.5281/ZENODO.1037378","DOIUrl":"https://doi.org/10.5281/ZENODO.1037378","url":null,"abstract":"This study assessed the prevalence of sexting behaviors among adults, and the relationship between sexting and moral foundations, self-esteem, and individual differences. Additionally, this study examined differences in the methods used to send sext messages (mobile applications vs. text messages) and image content (e.g., face, masturbating). Respondents solicited through Amazon’s Mechanical Turk completed the anonymous survey measuring “attitudes toward sexting.” The final sample included 508 adult participants; 68% of adults reported sexting behaviors, and both mobile applications and traditional text messages were used to send sext messages. In general, individuals who scored higher on extraversion and lower on conscientiousness, agreeableness, harm, and fairness were more likely to engage in sexting behaviors. Self-esteem was not associated with any sexting behaviors. Results also found significant differences between individuals who send semi-nude and nude sext messages. Limitations and future research suggestions are discussed.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"11 1","pages":"169"},"PeriodicalIF":1.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43629153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory 美国大学生网络骚扰与网络犯罪模式:例行活动理论的检验
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2017-01-01 DOI: 10.5281/ZENODO.495770
S. Wick, C. Nagoshi, R. Basham, C. Jordan, Y. Kim, Anh P. Nguyen, Peter Lehmann
A sample of 298 college students at a large southwestern state university (female 68.8%) completed an online survey about their experiences of being victimized by and engaging in perpetration of cyber-harassment of romantic partners. The findings partially supported the application of Routine Activities Theory to understand the predictors of cyber-harassment for victims and victimizers. Victimization for women was associated with greater general risk-taking propensity and reported online exposure and disclosure. For both men and women, greater risk propensity and online disclosure were associated with greater reports of perpetrating such harassment. ________________________________________________________________________
西南一所大型州立大学的298名大学生(女性占68.8%)完成了一项关于他们遭受恋人网络骚扰和实施网络骚扰的经历的在线调查。研究结果部分支持了日常活动理论在理解网络骚扰受害者和加害者的预测因素方面的应用。受害妇女与更大的冒险倾向和报告的网上曝光和披露有关。对于男性和女性来说,更大的风险倾向和在线披露与更多的此类骚扰报告有关。________________________________________________________________________
{"title":"Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory","authors":"S. Wick, C. Nagoshi, R. Basham, C. Jordan, Y. Kim, Anh P. Nguyen, Peter Lehmann","doi":"10.5281/ZENODO.495770","DOIUrl":"https://doi.org/10.5281/ZENODO.495770","url":null,"abstract":"A sample of 298 college students at a large southwestern state university (female 68.8%) completed an online survey about their experiences of being victimized by and engaging in perpetration of cyber-harassment of romantic partners. The findings partially supported the application of Routine Activities Theory to understand the predictors of cyber-harassment for victims and victimizers. Victimization for women was associated with greater general risk-taking propensity and reported online exposure and disclosure. For both men and women, greater risk propensity and online disclosure were associated with greater reports of perpetrating such harassment. ________________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"11 1","pages":"24-38"},"PeriodicalIF":1.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71084872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Where do beliefs about music piracy come from and how are they shared 人们对音乐盗版的看法从何而来,又是如何分享的
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2016-07-24 DOI: 10.5281/ZENODO.58518
S. Brown
Research suggests that those individuals engaging in music piracy have little concern for the potentially negative consequences of engaging in this illegal activity. This study aims to build on previous research which finds that sub-cultural piracy knowledge is effectively transmitted online. Explicitly, this study aims to observe the various justifications people forward to rationalise engagement in music piracy, in accordance with Sykes and Matza’s (1957) widely researched neutralization theory, and if techniques used to rationalize behaviours are shared amongst those individuals found to be discussing and engaging in music piracy online. The research examines naturally occurring discourse across three online settings, finding a widespread perception that there is ‘no harm done’ and that tips to work around web-blocking are exchanged online, including in public spaces such as Twitter. However, differences were found in the beliefs and attitudes of the sample. The study raises key conceptual issues about the theory used.
研究表明,那些从事音乐盗版的人很少关心从事这种非法活动的潜在负面后果。本研究的目的是在前人研究的基础上,发现亚文化盗版知识在网络上有效传播。明确地说,本研究旨在观察人们根据Sykes和Matza(1957)广泛研究的中和理论,为音乐盗版行为合理化所提出的各种理由,以及用于合理化行为的技术是否在那些被发现正在讨论和参与在线音乐盗版的个人之间共享。该研究调查了三种网络环境中自然发生的话语,发现人们普遍认为“不会造成伤害”,并且在网上(包括推特等公共场所)交换了解决网络封锁的技巧。然而,在样本的信念和态度上发现了差异。该研究提出了关于所使用理论的关键概念问题。
{"title":"Where do beliefs about music piracy come from and how are they shared","authors":"S. Brown","doi":"10.5281/ZENODO.58518","DOIUrl":"https://doi.org/10.5281/ZENODO.58518","url":null,"abstract":"Research suggests that those individuals engaging in music piracy have little concern for the potentially negative consequences of engaging in this illegal activity. This study aims to build on previous research which finds that sub-cultural piracy knowledge is effectively transmitted online. Explicitly, this study aims to observe the various justifications people forward to rationalise engagement in music piracy, in accordance with Sykes and Matza’s (1957) widely researched neutralization theory, and if techniques used to rationalize behaviours are shared amongst those individuals found to be discussing and engaging in music piracy online. The research examines naturally occurring discourse across three online settings, finding a widespread perception that there is ‘no harm done’ and that tips to work around web-blocking are exchanged online, including in public spaces such as Twitter. However, differences were found in the beliefs and attitudes of the sample. The study raises key conceptual issues about the theory used.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"10 1","pages":"21-39"},"PeriodicalIF":1.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization 针对荷兰网上银行客户的网络钓鱼和恶意软件攻击:导致受害因素的定性分析
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2016-01-01 DOI: 10.5281/ZENODO.58523
J. Jansen, R. Leukfeldt
IntroductionThis paper describes an in-depth analysis into the behaviour and characteristics of bank customers leading to victimization caused by phishing and malware attacks, the most common crimes involving online banking fraud in the Netherlands (NVB, 2013). Phishing is "a scalable act of deception whereby impersonation is used to obtain information from a target" (Lastdrager 2014, 8). Malware is the infection of a computer by malicious software, which includes viruses, worms, Trojan horses and spyware. In both cases, the aim of the fraudsters is to deceive the customer or the system used for online banking in order to obtain user credentials and/or to gain control over customers' devices. Fraudster use user credentials to access a victim's online bank account and to validate money transfers on behalf of the victim. Phishing and malware scams, however, are significant across the world and go beyond the online banking context. The Anti-Phishing Working Group reported in their Phishing Activities Trends Report of Q4 2014 that nearly 200,000 unique phishing reports were submitted to them and that an average of 255,000 new malware threats (including variants) emerged each day (APWG, 2015).A number of recent studies try to shed light on how and why people fall victim to these crimes and others do not (Bossler & Holt, 2009; Ngo & Paternoster, 2011; Vishwanath, Herath, Chen, Wang, & Rao, 2011). Jansen and Leukfeldt (2015), for example, carried out an exploratory study into how customers become victims of online banking fraud and demonstrate that customers have a specific role in their own victimization. Customers provide fraudsters with information, such as credentials, which fraudsters can use to steal money from their bank accounts. A study into phishing victimization shows that everybody is at risk when it comes to this type of crime (Leukfeldt, 2014). Additionally, Leukfeldt (2015) claims that this also largely holds for malware victimization; merely spending more time online, carrying out various kinds of activities, increased the risk of a malware infection.Both of Leukfeldt's studies (2014, 2015) - which are based on an online survey - conclude that in-depth studies are necessary to increase knowledge about why customers are victimized. It is not sufficiently clear if certain individuals are more prone to being at risk for online banking fraud than others, and how it can be explained. Therefore, this study qualitatively explores, by means of interviews, what factors explain online banking fraud victimization. Crossler et al. (2013) mention, that, the interview is a valuable method to better understand the actual motivations and behaviour of individuals.Theoretical backgroundFor this study, two theoretical perspectives are in place. First, we take a routine activity approach (Cohen & Felson, 1979) to study victim characteristics and behaviours that influence victimization. This approach is also central to the studies of Leukfeldt (2014, 2015) m
本文深入分析了银行客户的行为和特征,导致网络钓鱼和恶意软件攻击造成的受害,这是荷兰最常见的涉及网上银行欺诈的犯罪(NVB, 2013)。网络钓鱼是“一种可扩展的欺骗行为,通过模仿从目标获取信息”(Lastdrager 2014, 8)。恶意软件是由恶意软件感染计算机,包括病毒、蠕虫、特洛伊木马和间谍软件。在这两种情况下,欺诈者的目的都是欺骗客户或用于网上银行的系统,以获得用户凭证和/或控制客户的设备。欺诈者使用用户凭证访问受害者的在线银行账户,并代表受害者验证汇款。然而,网络钓鱼和恶意软件诈骗在全球范围内都很严重,并且超出了网上银行的范围。反网络钓鱼工作组在其2014年第四季度网络钓鱼活动趋势报告中报告称,他们收到了近20万份独特的网络钓鱼报告,平均每天出现25.5万个新的恶意软件威胁(包括变种)(APWG, 2015)。最近的一些研究试图揭示人们如何以及为什么会成为这些犯罪的受害者,而其他人却不会(Bossler & Holt, 2009;Ngo & Paternoster, 2011;Vishwanath, Herath, Chen, Wang, & Rao, 2011)。例如,Jansen和Leukfeldt(2015)对客户如何成为网上银行欺诈的受害者进行了探索性研究,并证明客户在自己的受害过程中起着特定的作用。客户向欺诈者提供证件等信息,欺诈者可以利用这些信息从他们的银行账户中窃取资金。一项关于网络钓鱼受害的研究表明,当涉及到这种类型的犯罪时,每个人都处于危险之中(Leukfeldt, 2014)。此外,Leukfeldt(2015)声称,这在很大程度上也适用于恶意软件受害;仅仅是花更多的时间上网,进行各种各样的活动,就增加了感染恶意软件的风险。这两个Leukfeldt的研究(2014年,2015年)-这是基于在线调查-得出结论,深入的研究是必要的,以增加了解为什么客户受害。目前尚不清楚是否某些个人比其他人更容易面临网上银行欺诈的风险,以及如何解释这一点。因此,本研究通过访谈的方式定性地探讨了哪些因素解释了网上银行欺诈受害。Crossler等人(2013)提到,访谈是更好地了解个人实际动机和行为的一种有价值的方法。对于本研究,有两个理论视角。首先,我们采用常规活动方法(Cohen & Felson, 1979)来研究受害者的特征和影响受害的行为。这种方法也是Leukfeldt(2014, 2015)研究的核心,使我们有可能评估我们的定性研究是否为这种情况下的定量研究增加了价值。常规活动方法认为,受害行为受到有动机的犯罪者、合适的目标和缺乏有能力的监护人在时间和空间趋同的综合影响。我们研究了常规活动方法的后两个方面,即目标的适宜性和其监护人的能力。例如,监护人可以是防病毒软件等技术安全措施。随着时间的推移,关于适用性的元素被添加到日常活动方法中。经常出现的两个缩写词是:crave,代表可隐藏的、可移动的、可用的、有价值的、愉快的和一次性的;VIVA,代表价值、惯性、可见性和可访问性。Sutton(2009)比较了这两个缩略词,并得出结论,它们处理相同的属性。此外,他认为VIVA元素与吸引注意力的特征有关,而crave的附加元素与使物体对罪犯具有吸引力的特征有关。…
{"title":"Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization","authors":"J. Jansen, R. Leukfeldt","doi":"10.5281/ZENODO.58523","DOIUrl":"https://doi.org/10.5281/ZENODO.58523","url":null,"abstract":"IntroductionThis paper describes an in-depth analysis into the behaviour and characteristics of bank customers leading to victimization caused by phishing and malware attacks, the most common crimes involving online banking fraud in the Netherlands (NVB, 2013). Phishing is \"a scalable act of deception whereby impersonation is used to obtain information from a target\" (Lastdrager 2014, 8). Malware is the infection of a computer by malicious software, which includes viruses, worms, Trojan horses and spyware. In both cases, the aim of the fraudsters is to deceive the customer or the system used for online banking in order to obtain user credentials and/or to gain control over customers' devices. Fraudster use user credentials to access a victim's online bank account and to validate money transfers on behalf of the victim. Phishing and malware scams, however, are significant across the world and go beyond the online banking context. The Anti-Phishing Working Group reported in their Phishing Activities Trends Report of Q4 2014 that nearly 200,000 unique phishing reports were submitted to them and that an average of 255,000 new malware threats (including variants) emerged each day (APWG, 2015).A number of recent studies try to shed light on how and why people fall victim to these crimes and others do not (Bossler & Holt, 2009; Ngo & Paternoster, 2011; Vishwanath, Herath, Chen, Wang, & Rao, 2011). Jansen and Leukfeldt (2015), for example, carried out an exploratory study into how customers become victims of online banking fraud and demonstrate that customers have a specific role in their own victimization. Customers provide fraudsters with information, such as credentials, which fraudsters can use to steal money from their bank accounts. A study into phishing victimization shows that everybody is at risk when it comes to this type of crime (Leukfeldt, 2014). Additionally, Leukfeldt (2015) claims that this also largely holds for malware victimization; merely spending more time online, carrying out various kinds of activities, increased the risk of a malware infection.Both of Leukfeldt's studies (2014, 2015) - which are based on an online survey - conclude that in-depth studies are necessary to increase knowledge about why customers are victimized. It is not sufficiently clear if certain individuals are more prone to being at risk for online banking fraud than others, and how it can be explained. Therefore, this study qualitatively explores, by means of interviews, what factors explain online banking fraud victimization. Crossler et al. (2013) mention, that, the interview is a valuable method to better understand the actual motivations and behaviour of individuals.Theoretical backgroundFor this study, two theoretical perspectives are in place. First, we take a routine activity approach (Cohen & Felson, 1979) to study victim characteristics and behaviours that influence victimization. This approach is also central to the studies of Leukfeldt (2014, 2015) m","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"26 1","pages":"79"},"PeriodicalIF":1.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis 尼日利亚国家网络安全政策与战略:定性分析
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2015-08-02 DOI: 10.5281/ZENODO.22390
Oluwafemi Osho, Agada David Onoja
With advancements in modernization came the infiltration of information and communication technologies across the world, Nigeria inclusive. Several benefits are obtainable from these but also prevalent are some associated risks. Communication exists massively in cyberspace and as such poses a myriad of threats to a nation. This can be addressed on a national spectrum by the implementation of cyber security policies and strategies. This research involves making a qualitative analysis of the current Nigerian National Cyber Security Policy and Strategy. The documents were analyzed in the light of selected harmonized strategy developmental frameworks and subsequently comparatively evaluated with similar documents of selected countries. After the analysis, the national documents were found to have met majority of the requirements in terms of content, but failed to address certain elements of concern to cyber security in the Nigerian environment.
随着现代化的进步,信息和通信技术渗透到世界各地,尼日利亚包括在内。从这些中可以获得一些好处,但也普遍存在一些相关风险。通信大量存在于网络空间,因此对一个国家构成了无数的威胁。这可以通过实施网络安全政策和战略在国家范围内解决。本研究涉及对当前尼日利亚国家网络安全政策和战略进行定性分析。根据选定的协调战略发展框架对这些文件进行分析,然后与选定国家的类似文件进行比较评价。经过分析,发现国家文件在内容方面满足了大部分要求,但未能解决尼日利亚环境中网络安全问题的某些因素。
{"title":"National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis","authors":"Oluwafemi Osho, Agada David Onoja","doi":"10.5281/ZENODO.22390","DOIUrl":"https://doi.org/10.5281/ZENODO.22390","url":null,"abstract":"With advancements in modernization came the infiltration of information and communication technologies across the world, Nigeria inclusive. Several benefits are obtainable from these but also prevalent are some associated risks. Communication exists massively in cyberspace and as such poses a myriad of threats to a nation. This can be addressed on a national spectrum by the implementation of cyber security policies and strategies. This research involves making a qualitative analysis of the current Nigerian National Cyber Security Policy and Strategy. The documents were analyzed in the light of selected harmonized strategy developmental frameworks and subsequently comparatively evaluated with similar documents of selected countries. After the analysis, the national documents were found to have met majority of the requirements in terms of content, but failed to address certain elements of concern to cyber security in the Nigerian environment.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"9 1","pages":"120-143"},"PeriodicalIF":1.0,"publicationDate":"2015-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71048189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Consumer Perceptions of Mobile and Traditional Point-of-Sale Credit/Debit Card Systems in the United States: A Survey 美国消费者对移动和传统销售点信用卡/借记卡系统的看法:一项调查
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2015-07-01 DOI: 10.5281/ZENODO.56201
Nitish Saxena, D. Schwebel, Jacinta Cai, J. Sloan, K. Jaishankar, Jun Yu, M. Godbole, Olive Nick Harper, Michael Goergescu
IntroductionPoint-Of-Sale (POS) systems are used globally to accept payment from consumers using credit or debit cards to purchase goods or services. The most popular form of POS reader, especially in the United States (US), involves swiping a credit or debit card through a magnetic scanner (Smart Card Alliance, 2011). This "traditional" POS (TPOS) system requires a dedicated, standalone card reader deployed solely for the purpose of processing transactions using credit/debit cards. Such systems have been used for many years and most consumers are familiar with them.Recently, a new POS system was introduced to the market, the mobile POS (MPOS) system (Johnson, 2012). Manufactured by several venders, including Square®, Intuit GoPayment® and Paypal Here®, MPOS systems take two forms. One type, hardware-based MPOS systems, consists of a small reader that plugs into a mobile device such as a smart phone or tablet. Consumers swipe their credit/debit cards through the device to make a payment. Merchants typically use the mobile device not just to accept payments but also for various other personal or business purposes. Payments are processed through software apps stored on the device. The other type of MPOS system is software based and usually requires manual entry of card information onto the phone or tablet. In some cases, the merchant can photograph the credit/debit card instead of entering data found on the card (www.card.io).A large body of research suggests consumers may have anxiety, fear, or concern about their personal safety and security when using new technology, especially when they are sharing personal or secure information such as credit or debit card numbers using that technology (Liu, 2012; Meuter et al., 2003; Perea y Monsuwe, Dellaert, & de Ruyter, 2004). Such anxiety was reported by consumers, for example, when making Internet-based credit card purchases a decade ago (Perea y Monsuwe et al, 2004) and more recently in using self-service bank machines (Liu, 2012). Given recent mass media publicity about cyber-crime and the potential for personal data to be stolen electronically (e.g., Whitaker, 2014), MPOS systems may introduce particular concern about crime victimization among consumers for several reasons. These include: (a) the electronic devices are used for multiple purposes by merchants, including personal matters, which may introduce greater risk of consumer information being stolen or misused; (b) they are small, mobile devices connected wirelessly and often insecurely to the Internet, which may raise fear of ready access by criminals to personal information; (c) third-party apps are both easily and typically stored on MPOS host devices and may contain malware; and (d) credit card theft has been featured prominently by national US media outlets in recent years.Given the rapid increase recently in the use of MPOS systems, the potential for high levels of consumer anxiety about crime victimization while using them based on resear
销售点(POS)系统在全球范围内用于接受消费者使用信用卡或借记卡购买商品或服务的付款。最流行的POS读卡器形式,特别是在美国(US),涉及通过磁性扫描仪刷信用卡或借记卡(智能卡联盟,2011)。这种“传统的”POS (TPOS)系统需要一个专用的、独立的读卡器,专门用于处理使用信用卡/借记卡的交易。这种系统已经使用了很多年,大多数消费者都很熟悉。最近,一种新的POS系统被引入市场,移动POS (MPOS)系统(约翰逊,2012)。MPOS系统由包括Square®,Intuit GoPayment®和Paypal Here®在内的几家供应商制造,采用两种形式。一种是基于硬件的MPOS系统,它包括一个插入智能手机或平板电脑等移动设备的小型读卡器。消费者通过该设备刷信用卡/借记卡进行支付。商家通常不仅使用移动设备接受付款,而且还用于各种其他个人或商业目的。支付通过存储在设备上的软件应用程序进行处理。另一种类型的MPOS系统是基于软件的,通常需要在手机或平板电脑上手动输入卡片信息。在某些情况下,商家可以拍摄信用卡/借记卡,而不是输入卡上的数据(www.card.io)。大量的研究表明,消费者在使用新技术时可能会对他们的人身安全和保障感到焦虑、恐惧或担忧,特别是当他们使用该技术共享个人或安全信息时,如信用卡或借记卡号码(Liu, 2012;Meuter et al., 2003;Perea y Monsuwe, Dellaert, & de Ruyter, 2004)。例如,消费者在十年前进行基于互联网的信用卡购物时(Perea y Monsuwe等人,2004年)以及最近在使用自助银行机器时(Liu, 2012年)都报告了这种焦虑。鉴于最近大众媒体对网络犯罪和个人数据被电子窃取的可能性的宣传(例如,Whitaker, 2014), MPOS系统可能会引起消费者对犯罪受害的特别关注,原因有几个。这些问题包括:(a)电子设备被商家用于多种目的,包括个人事务,这可能会增加消费者信息被盗用或被滥用的风险;(b)它们是小型的移动设备,以无线方式连接,通常与互联网不安全,这可能会引起对犯罪分子随时获取个人信息的担忧;(c)第三方应用程序容易且通常存储在MPOS主机设备上,并且可能包含恶意软件;(4)信用卡盗窃近年来一直是美国全国性媒体的重点报道。鉴于最近MPOS系统的使用迅速增加,基于类似技术的研究,消费者在使用MPOS系统时对犯罪受害的潜在高度焦虑,以及缺乏关于消费者对MPOS系统周围犯罪和个人安全的焦虑以及这种焦虑对行业的影响的实证研究,本研究旨在评估消费者在当地商家使用MPOS设备时的恐惧、焦虑和不适。具体来说,我们测试了四个假设:(a)消费者通常会对使用MPOS或TPOS系统感到舒适,但(b)消费者报告使用TPOS系统比使用MPOS系统更少担心;(c)消费者将报告对TPOS系统比MPOS系统更信任;(d)消费者会发现TPOS系统和MPOS系统一样方便。为了验证这些假设,我们进行了一项聚集病例与对照调查研究。消费者在两家小店购物时进行了调查,一家是使用TPOS读卡器的冰淇淋店,另一家是使用MPOS读卡器的三明治店。方法研究地点选择的研究地点符合以下标准:(a)消费者人口多而多样;(b)高峰时段消费者流量高;(c)地理位置(
{"title":"Consumer Perceptions of Mobile and Traditional Point-of-Sale Credit/Debit Card Systems in the United States: A Survey","authors":"Nitish Saxena, D. Schwebel, Jacinta Cai, J. Sloan, K. Jaishankar, Jun Yu, M. Godbole, Olive Nick Harper, Michael Goergescu","doi":"10.5281/ZENODO.56201","DOIUrl":"https://doi.org/10.5281/ZENODO.56201","url":null,"abstract":"IntroductionPoint-Of-Sale (POS) systems are used globally to accept payment from consumers using credit or debit cards to purchase goods or services. The most popular form of POS reader, especially in the United States (US), involves swiping a credit or debit card through a magnetic scanner (Smart Card Alliance, 2011). This \"traditional\" POS (TPOS) system requires a dedicated, standalone card reader deployed solely for the purpose of processing transactions using credit/debit cards. Such systems have been used for many years and most consumers are familiar with them.Recently, a new POS system was introduced to the market, the mobile POS (MPOS) system (Johnson, 2012). Manufactured by several venders, including Square®, Intuit GoPayment® and Paypal Here®, MPOS systems take two forms. One type, hardware-based MPOS systems, consists of a small reader that plugs into a mobile device such as a smart phone or tablet. Consumers swipe their credit/debit cards through the device to make a payment. Merchants typically use the mobile device not just to accept payments but also for various other personal or business purposes. Payments are processed through software apps stored on the device. The other type of MPOS system is software based and usually requires manual entry of card information onto the phone or tablet. In some cases, the merchant can photograph the credit/debit card instead of entering data found on the card (www.card.io).A large body of research suggests consumers may have anxiety, fear, or concern about their personal safety and security when using new technology, especially when they are sharing personal or secure information such as credit or debit card numbers using that technology (Liu, 2012; Meuter et al., 2003; Perea y Monsuwe, Dellaert, & de Ruyter, 2004). Such anxiety was reported by consumers, for example, when making Internet-based credit card purchases a decade ago (Perea y Monsuwe et al, 2004) and more recently in using self-service bank machines (Liu, 2012). Given recent mass media publicity about cyber-crime and the potential for personal data to be stolen electronically (e.g., Whitaker, 2014), MPOS systems may introduce particular concern about crime victimization among consumers for several reasons. These include: (a) the electronic devices are used for multiple purposes by merchants, including personal matters, which may introduce greater risk of consumer information being stolen or misused; (b) they are small, mobile devices connected wirelessly and often insecurely to the Internet, which may raise fear of ready access by criminals to personal information; (c) third-party apps are both easily and typically stored on MPOS host devices and may contain malware; and (d) credit card theft has been featured prominently by national US media outlets in recent years.Given the rapid increase recently in the use of MPOS systems, the potential for high levels of consumer anxiety about crime victimization while using them based on resear","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"9 1","pages":"162-172"},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber Bullying in the Netherlands: A Criminological Perspective 荷兰的网络欺凌:犯罪学视角
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2015-07-01 DOI: 10.5281/ZENODO.55055
Joyce Kerstens, K. Jaishankar, S. Veenstra
IntroductionThe internet has become a common and indispensable phenomenon in our society. At the same time, cyber crime generates a lot of media attention. Furthermore, reports on the prevalence of cyber crime appear regularly and the Dutch government prioritizes the tracking and prevention of cyber crime. The term 'cyber crime' refers to criminal and deviant behaviour through the use of online technologies (Wall, 2001; Yar, 2012). Cyber crime is, either implicitly or explicitly, conceptualized as the contemporary counterpart of traditional crime, i.e., crimes that occur only in the offline world (Taylor, Fritsch, Liederbach, & Holt, 2010). Studies on cyber crime predominantly focus on identifying the types and prevalence of cyber crimes and often lack a theoretical base. Studies on the applicability of criminological theories to cyber crime are scarce (McQuade, 2006; Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Anyone who studies cyber crime will eventually have to look in to theories in order to find an explanation for the findings. At the same time, research is necessary to test the applicability of criminological theories to cyber crime or, to further develop theoretical approaches (e.g., Bernard, 2002; Bottoms, 2000). Lately, criminologists have been debating whether existing criminological theories are useful for the explanation of cyber crime or whether the phenomenon requires novel theoretical explanations (Jaishankar, 2008). In essence, the question is whether cyber crime constitutes a new category of criminal behaviour (Yar, 2005; Jaishankar, 2008; Holt, 2013; Yar, 2012).The Offline-Online dichotomy in relation to Cyber CrimeResearchers, politicians, and policy makers see the offline and online worlds as two separate worlds. The two are regarded as opposites, and characteristics attributed to the online world do not apply to the offline world: the transformation of time-space relationships, (perceived) anonymity, and the relative ease with which social identities can be manipulated (Yar, 2006). Of these characteristics, (perceived) anonymity is particularly connected with online disinhibition: in the online world people behave with fewer restrictions and inhibitions than in the offline world (Suler, 2004). With the arrival of the internet, a new world seems to have emerged: the online world, or cyber space. The question is, however, whether the offline-online dichotomy does justice to the complexity and interrelatedness of offline and online interactions. Subrahmanyam and Smahel (2011) call attention to the immense development in the use of online technologies since the arrival of the internet and argue that the offline and online worlds are interwoven. Research also shows that online interactions of youth occur predominantly in the context of existing relationships (Livingstone, Haddon, Gorzig, & Olafsson, 2011) and that young people increasingly see their offline and online interactions as a coherent experience (Livingstone, 200
互联网已经成为我们社会中一个普遍而不可或缺的现象。与此同时,网络犯罪也引起了媒体的广泛关注。此外,关于网络犯罪流行的报告定期出现,荷兰政府优先考虑跟踪和预防网络犯罪。“网络犯罪”一词指的是通过使用在线技术进行的犯罪和越轨行为(Wall, 2001;纱线,2012)。网络犯罪或隐或显地被定义为传统犯罪的当代对应,即只发生在线下世界的犯罪(Taylor, Fritsch, Liederbach, & Holt, 2010)。对网络犯罪的研究主要集中在识别网络犯罪的类型和流行程度,往往缺乏理论基础。关于犯罪学理论在网络犯罪中的适用性的研究很少(McQuade, 2006;Taylor, Caeti, Loper, Fritsch & Liederbach, 2006)。任何研究网络犯罪的人最终都将不得不研究理论,以便为这些发现找到解释。同时,研究是必要的,以测试犯罪学理论对网络犯罪的适用性,或进一步发展理论方法(例如,Bernard, 2002;底部,2000)。最近,犯罪学家一直在争论现有的犯罪学理论是否有助于解释网络犯罪,或者这种现象是否需要新的理论解释(Jaishankar, 2008)。本质上,问题是网络犯罪是否构成一种新的犯罪行为类别(亚尔,2005;Jaishankar, 2008;霍尔特,2013;纱线,2012)。与网络犯罪相关的离线-在线二分法研究人员、政治家和政策制定者将离线和在线世界视为两个独立的世界。这两者被认为是对立的,网络世界的特征并不适用于线下世界:时空关系的转变,(可感知的)匿名性,以及相对容易操纵的社会身份(Yar, 2006)。在这些特征中,(可感知的)匿名性与在线去抑制特别相关:在网络世界中,人们的行为比在线下世界中受到更少的限制和抑制(Suler, 2004)。随着互联网的到来,一个新的世界似乎已经出现:在线世界,或网络空间。然而,问题是,离线-在线的二分法是否公正地反映了离线和在线互动的复杂性和相互关联性。Subrahmanyam和Smahel(2011)呼吁关注自互联网出现以来在线技术使用的巨大发展,并认为离线和在线世界是交织在一起的。研究还表明,年轻人的在线互动主要发生在现有关系的背景下(Livingstone, Haddon, Gorzig, & Olafsson, 2011),年轻人越来越多地将他们的离线和在线互动视为一种连贯的体验(Livingstone, 2009)。研究人员、政治家和政策制定者在犯罪问题上也使用二分法。传统犯罪发生在线下世界,而网络犯罪是利用在线技术实施的(Wall, 2001;纱线,2012)。网络犯罪没有统一的定义;这是一个包罗万象的术语,包括新形式的犯罪行为-如黑客攻击-以及传统犯罪的数字形式(Stol, 2012)此外,网络越轨行为——尽管不会受到惩罚——也被视为网络犯罪的一部分;一个经常被引用的例子是网络欺凌(Yar, 2012)。例如,在荷兰安全监测中,四种被调查的网络犯罪之一是网络欺凌(Veiligheidsmonitor 2013, p. 75)。技术一直被用于犯罪活动,但基于技术的大量犯罪和越轨行为的定义和分类是新的(McGuire, 2007)。问题是网络犯罪是否与传统犯罪有根本区别,或者互联网的到来是否仅仅为犯罪行为提供了新的选择(Leukfeldt, Domenie, & Stol, 2010)。…
{"title":"Cyber Bullying in the Netherlands: A Criminological Perspective","authors":"Joyce Kerstens, K. Jaishankar, S. Veenstra","doi":"10.5281/ZENODO.55055","DOIUrl":"https://doi.org/10.5281/ZENODO.55055","url":null,"abstract":"IntroductionThe internet has become a common and indispensable phenomenon in our society. At the same time, cyber crime generates a lot of media attention. Furthermore, reports on the prevalence of cyber crime appear regularly and the Dutch government prioritizes the tracking and prevention of cyber crime. The term 'cyber crime' refers to criminal and deviant behaviour through the use of online technologies (Wall, 2001; Yar, 2012). Cyber crime is, either implicitly or explicitly, conceptualized as the contemporary counterpart of traditional crime, i.e., crimes that occur only in the offline world (Taylor, Fritsch, Liederbach, & Holt, 2010). Studies on cyber crime predominantly focus on identifying the types and prevalence of cyber crimes and often lack a theoretical base. Studies on the applicability of criminological theories to cyber crime are scarce (McQuade, 2006; Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Anyone who studies cyber crime will eventually have to look in to theories in order to find an explanation for the findings. At the same time, research is necessary to test the applicability of criminological theories to cyber crime or, to further develop theoretical approaches (e.g., Bernard, 2002; Bottoms, 2000). Lately, criminologists have been debating whether existing criminological theories are useful for the explanation of cyber crime or whether the phenomenon requires novel theoretical explanations (Jaishankar, 2008). In essence, the question is whether cyber crime constitutes a new category of criminal behaviour (Yar, 2005; Jaishankar, 2008; Holt, 2013; Yar, 2012).The Offline-Online dichotomy in relation to Cyber CrimeResearchers, politicians, and policy makers see the offline and online worlds as two separate worlds. The two are regarded as opposites, and characteristics attributed to the online world do not apply to the offline world: the transformation of time-space relationships, (perceived) anonymity, and the relative ease with which social identities can be manipulated (Yar, 2006). Of these characteristics, (perceived) anonymity is particularly connected with online disinhibition: in the online world people behave with fewer restrictions and inhibitions than in the offline world (Suler, 2004). With the arrival of the internet, a new world seems to have emerged: the online world, or cyber space. The question is, however, whether the offline-online dichotomy does justice to the complexity and interrelatedness of offline and online interactions. Subrahmanyam and Smahel (2011) call attention to the immense development in the use of online technologies since the arrival of the internet and argue that the offline and online worlds are interwoven. Research also shows that online interactions of youth occur predominantly in the context of existing relationships (Livingstone, Haddon, Gorzig, & Olafsson, 2011) and that young people increasingly see their offline and online interactions as a coherent experience (Livingstone, 200","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"9 1","pages":"144-161"},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71090575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cyber Criminal Networks and Money Mules: An Analysis of Low-Tech and High-Tech Fraud Attacks in the Netherlands 网络犯罪网络和金钱骡子:对荷兰低技术和高技术欺诈攻击的分析
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2015-07-01 DOI: 10.5281/ZENODO.56210
R. Leukfeldt, J. Jansen
IntroductionMoney mules can be seen as a crucial part of the criminal network. They are of great importance for the core members of these networks because money mules are used to interrupt the trail that may lead law enforcement agencies to the top of the network. Money mules, for example, register bank accounts or businesses under their names, which are actually exploited by the criminal network.Several studies acknowledge the important role of money mules in the diversion of money stolen by cyber criminals who are engaged in financial cyber crimes, such as carding3 or phishing4 attacks (Choo, 2008; Moore & Clayton, 2009; McCombie, 2011;Aston et al., 2009; Soudijn & Zegers, 2012; Leukfeldt, 2014; Leukfeldt et al., 2016b, 2016c). Most of these studies, however, concentrate primarily on the core group of the criminal networks and only focus indirectly on money mules. Empirical studies into characteristics of internet money mules are lacking. Only Aston et al. and McCombie carried out some exploratory analyses of money mules used in Australian phishing attacks.In order to fill this knowledge gap, this paper focuses on money mules who are used by cyber criminal groups that carry out attacks on financial institutions. To gain insight into this group of criminals, which we believe plays a vital role in the crime process; we analyzed unique data from a fraud registration system of a major Dutch bank. We obtained 600 fraud incidents from the period 2011-2013. Based on these data, this paper provides insight into the characteristics of money mules and the way in which this group is used by criminal networks to transfer money from victim bank accounts. More specifically, we present background characteristics, the socioeconomic status of money mules, and the value and number of transactions to money mules.Review of LiteratureThe present study advances the work of Leukfeldt et al. (2016a, 2016b, 2016c). These studies provide insight into the composition, origin and growth, and criminal capabilities of criminal networks carrying out financial cyber crimes. Forty cyber criminal networks were analyzed in the Netherlands, Germany, UK and the US. The Dutch cases provided the authors with information about cyber criminal networks and their members largely as a result of investigative methods such as wiretaps, IP taps, observations, undercover policing and house searches. The authors reviewed the financial cyber crime cases systematically using an analytical framework. In the other three countries, the authors relied on interviews with case officers and public prosecutors involved in the criminal investigations against cyber criminal networks since no police files were available to them. This section briefly describes the main results of these three studies.Criminal CapabilitiesAll networks that were analyzed by Leukfeldt et al. are involved in attacks on online banking. The crime scripts of the Dutch networks have many similarities. Step one is obtaining login cr
钱骡可以被看作是犯罪网络的重要组成部分。他们对这些网络的核心成员非常重要,因为金钱骡子被用来中断可能导致执法机构到达网络顶端的线索。例如,“钱骡”以自己的名义注册银行账户或企业,这些账户或企业实际上被犯罪网络所利用。几项研究承认,金钱骡子在转移从事金融网络犯罪的网络罪犯所窃取的资金方面发挥了重要作用,这些网络犯罪包括诈骗或网络钓鱼攻击(Choo, 2008;Moore & Clayton, 2009;McCombie, 2011;Aston et al., 2009;Soudijn & Zegers, 2012;Leukfeldt, 2014;Leukfeldt et al., 2016b, 2016c)。然而,这些研究大多集中在犯罪网络的核心群体上,而只间接地关注“钱骡”。缺乏对互联网货币骡子特征的实证研究。只有Aston et al.和McCombie对澳大利亚网络钓鱼攻击中使用的金钱骡子进行了一些探索性分析。为了填补这一知识空白,本文将重点放在网络犯罪集团使用的对金融机构进行攻击的钱骡子上。为了深入了解这群犯罪分子,我们认为他们在犯罪过程中起着至关重要的作用;我们分析了荷兰一家大银行欺诈登记系统的独特数据。我们获得了2011-2013年期间的600起欺诈事件。基于这些数据,本文深入了解了钱骡的特征,以及犯罪网络利用这个群体从受害者的银行账户转移资金的方式。更具体地说,我们呈现了背景特征,货币骡子的社会经济地位,以及货币骡子的交易价值和数量。本研究推进了Leukfeldt et al. (2016a, 2016b, 2016c)的工作。这些研究对实施金融网络犯罪的犯罪网络的构成、起源和发展以及犯罪能力提供了深入的了解。研究人员分析了荷兰、德国、英国和美国的40个网络犯罪网络。荷兰的案件为作者提供了有关网络犯罪网络及其成员的信息,这在很大程度上是通过窃听、IP窃听、观察、卧底警察和房屋搜查等调查方法获得的。本文运用分析框架对金融网络犯罪案例进行了系统回顾。在其他三个国家,由于没有警方档案,作者依靠对参与网络犯罪网络刑事调查的案件官员和检察官的采访。本节简要介绍了这三项研究的主要结果。犯罪能力Leukfeldt等人分析的所有网络都涉及对网上银行的攻击。荷兰电视台的犯罪剧本有很多相似之处。第一步是从受害者那里获取登录凭证。网络犯罪分子使用网络钓鱼电子邮件、网络钓鱼网站和恶意软件拦截这些凭证。但是,为了从受害者的账户中转移资金,需要所谓的“一次性交易认证码”。因此,第二步是获取这些代码。获取这些代码的方法多种多样。在某些情况下,犯罪分子冒充银行职员给受害者打电话。在其他情况下,恶意软件在受害者不知道或无法看到的情况下修改了他们的交易。第三步与本研究的主题有关,即将资金转移到钱骡账户。受害者账户中的钱不会直接转入核心成员的账户。相反,为了掩盖核心成员的踪迹,他们使用了钱骡银行账户一旦钱被转移到钱骡账户,钱就会尽快以现金形式取出,并通过各种链接提供给核心成员。…
{"title":"Cyber Criminal Networks and Money Mules: An Analysis of Low-Tech and High-Tech Fraud Attacks in the Netherlands","authors":"R. Leukfeldt, J. Jansen","doi":"10.5281/ZENODO.56210","DOIUrl":"https://doi.org/10.5281/ZENODO.56210","url":null,"abstract":"IntroductionMoney mules can be seen as a crucial part of the criminal network. They are of great importance for the core members of these networks because money mules are used to interrupt the trail that may lead law enforcement agencies to the top of the network. Money mules, for example, register bank accounts or businesses under their names, which are actually exploited by the criminal network.Several studies acknowledge the important role of money mules in the diversion of money stolen by cyber criminals who are engaged in financial cyber crimes, such as carding3 or phishing4 attacks (Choo, 2008; Moore & Clayton, 2009; McCombie, 2011;Aston et al., 2009; Soudijn & Zegers, 2012; Leukfeldt, 2014; Leukfeldt et al., 2016b, 2016c). Most of these studies, however, concentrate primarily on the core group of the criminal networks and only focus indirectly on money mules. Empirical studies into characteristics of internet money mules are lacking. Only Aston et al. and McCombie carried out some exploratory analyses of money mules used in Australian phishing attacks.In order to fill this knowledge gap, this paper focuses on money mules who are used by cyber criminal groups that carry out attacks on financial institutions. To gain insight into this group of criminals, which we believe plays a vital role in the crime process; we analyzed unique data from a fraud registration system of a major Dutch bank. We obtained 600 fraud incidents from the period 2011-2013. Based on these data, this paper provides insight into the characteristics of money mules and the way in which this group is used by criminal networks to transfer money from victim bank accounts. More specifically, we present background characteristics, the socioeconomic status of money mules, and the value and number of transactions to money mules.Review of LiteratureThe present study advances the work of Leukfeldt et al. (2016a, 2016b, 2016c). These studies provide insight into the composition, origin and growth, and criminal capabilities of criminal networks carrying out financial cyber crimes. Forty cyber criminal networks were analyzed in the Netherlands, Germany, UK and the US. The Dutch cases provided the authors with information about cyber criminal networks and their members largely as a result of investigative methods such as wiretaps, IP taps, observations, undercover policing and house searches. The authors reviewed the financial cyber crime cases systematically using an analytical framework. In the other three countries, the authors relied on interviews with case officers and public prosecutors involved in the criminal investigations against cyber criminal networks since no police files were available to them. This section briefly describes the main results of these three studies.Criminal CapabilitiesAll networks that were analyzed by Leukfeldt et al. are involved in attacks on online banking. The crime scripts of the Dutch networks have many similarities. Step one is obtaining login cr","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"78 1","pages":"173-184"},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Regulation of Cyber Space: An Analysis of Chinese Law on Cyber Crime 网络空间规制:中国网络犯罪法分析
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2015-07-01 DOI: 10.5281/ZENODO.56225
Xingan Li, K. Jaishankar
IntroductionRecent two decades witnessed a swift transforming of human and social landscape due to the pervasive use of digital networks, which connect individuals, institutions, businesses and agencies spreading over the world. The growing convenience for creating, depositing, processing, transmitting, and retrieving of information increased the quantity of data in both static and dynamic processes, improved virtual communication, developed social networks, and at the same time, risks, threats and dangers have also been un-ignorable problems.Naturally, it was not strange that information systems in the background of Chinese history had been regarded as a modern instrument in an ancient territory. In fact, many countries were confronted with similar challenge at the dawn of the information age, when they were perplexed for how to benefit from the pervasive use of information systems while avoiding negative political and legal impact of unmonitored users, uncensored information, unchecked communications, uncontrolled activities and unsolicited visits. Such potentialities were also eroding footstones of the Chinese Great Wall.Additionally, migration of criminal phenomena into information systems-facilitated cyber space has attracted increasing attention due to its high pace of expansion (Li, 2008; Li, 2009). The 1997 Penal Law of China (which was usually translated as Criminal Law, but, Penal Law should be more exact translation) provided fundamental criteria and guidelines for convicting and sentencing cyber criminals. With assistance of a series of other statutory laws and administrative regulations, a legal and regulatory system has been taking shape to suppress the spread of cyber crime of multiple forms, the so-called new century's pestilence, in cyberspace. The explosion of new and pertinent laws and regulations over the past two decades reflected society's concerns on the ancient phenomenon in a modernized context, and efforts to wrestle with it. Yet, it remained uncertain whether the current approach to deter and redress cyber crime would prove to be successful.In the following sections, this article will review the process of establishing the legal framework on cyber crime in China, examine the features of Chinese laws and regulations tackling cyber crime, and analyze the policy for preventing cyber crime through control over cyber space in China. The article will also analyze the subject, the means, the mechanism and the main purpose of control over cyberspace, with review of its actual effects and defects.1. Criminalization and Penalization of Cyber CrimeThe "chance encounter" of communist China based on its ancient land and people with the information network had multiple potentialities of changing the politico-social order, which were unexpected and unprepared events in the late 20th century. According to official statistics, to the end of 2014, the number of Internet users in China reached 649 million and the number of mobile Internet
近二十年来,由于数字网络的广泛使用,人类和社会景观发生了迅速的变化,数字网络将遍布世界各地的个人、机构、企业和机构联系在一起。信息的创建、存储、处理、传输和检索日益便利,使静态和动态过程中的数据量增加,虚拟通信得到改善,社交网络得到发展,同时风险、威胁和危险也成为不容忽视的问题。中国历史背景下的信息系统被视为古代领土上的现代工具,这自然不足为奇。事实上,许多国家在信息时代开始时都面临着类似的挑战,当时它们困惑于如何从信息系统的普遍使用中获益,同时避免不受监测的用户、不受审查的信息、不受检查的通讯、不受控制的活动和未经请求的访问所产生的消极的政治和法律影响。这种潜力也侵蚀着中国长城的基石。此外,犯罪现象向信息系统支持的网络空间的迁移由于其高速扩张而引起了越来越多的关注(Li, 2008;李,2009)。1997年的《中国刑法》(通常被翻译为《刑法》,但更准确的翻译应该是《刑法》)为网络犯罪定罪量刑提供了基本的标准和准则。在一系列法律法规和行政法规的辅助下,初步形成了遏制多种形式网络犯罪在网络空间蔓延的法律法规体系,形成了“新世纪瘟疫”。在过去的二十年里,新的和相关的法律法规的爆炸式增长反映了社会在现代化背景下对这一古老现象的关注,以及与之斗争的努力。然而,目前阻止和纠正网络犯罪的方法是否成功仍不确定。在接下来的章节中,本文将回顾中国建立网络犯罪法律框架的过程,考察中国应对网络犯罪的法律法规的特点,并分析中国通过控制网络空间来预防网络犯罪的政策。文章还分析了网络空间管制的主体、手段、机制和主要目的,并对网络空间管制的实际效果和缺陷进行了评述。基于古老土地和人民的共产主义中国与信息网络的“偶遇”具有改变政治社会秩序的多重可能性,这是20世纪后期的意外和未准备事件。据官方统计,截至2014年底,中国互联网用户数达到6.49亿,移动互联网用户数达到5.57亿(中国互联网络信息中心,2015)。移动即时通讯应用稳步增长,吸引了91.2%的移动互联网用户(同上)。网络安全事故和网络犯罪案件都在持续增长(国家计算机网络应急技术小组/中国协调中心,2014)。互联网上的犯罪和罪犯种类繁多,从灾难性的到仅仅令人讨厌的都有(Icove et al., 1995)。因此,从广义上定义,“网络犯罪”一词可以合理地涵盖各种各样的刑事犯罪、活动或问题。在中国,这个词从一开始就是一样的,发音为“电脑犯罪”。现在,更常用的术语是“网络犯罪”。然而,它从来没有一个正式的术语。中国刑法中所公布的罪行更为复杂,因为刑法本身并没有对任何罪行给予简化的名称。…
{"title":"Regulation of Cyber Space: An Analysis of Chinese Law on Cyber Crime","authors":"Xingan Li, K. Jaishankar","doi":"10.5281/ZENODO.56225","DOIUrl":"https://doi.org/10.5281/ZENODO.56225","url":null,"abstract":"IntroductionRecent two decades witnessed a swift transforming of human and social landscape due to the pervasive use of digital networks, which connect individuals, institutions, businesses and agencies spreading over the world. The growing convenience for creating, depositing, processing, transmitting, and retrieving of information increased the quantity of data in both static and dynamic processes, improved virtual communication, developed social networks, and at the same time, risks, threats and dangers have also been un-ignorable problems.Naturally, it was not strange that information systems in the background of Chinese history had been regarded as a modern instrument in an ancient territory. In fact, many countries were confronted with similar challenge at the dawn of the information age, when they were perplexed for how to benefit from the pervasive use of information systems while avoiding negative political and legal impact of unmonitored users, uncensored information, unchecked communications, uncontrolled activities and unsolicited visits. Such potentialities were also eroding footstones of the Chinese Great Wall.Additionally, migration of criminal phenomena into information systems-facilitated cyber space has attracted increasing attention due to its high pace of expansion (Li, 2008; Li, 2009). The 1997 Penal Law of China (which was usually translated as Criminal Law, but, Penal Law should be more exact translation) provided fundamental criteria and guidelines for convicting and sentencing cyber criminals. With assistance of a series of other statutory laws and administrative regulations, a legal and regulatory system has been taking shape to suppress the spread of cyber crime of multiple forms, the so-called new century's pestilence, in cyberspace. The explosion of new and pertinent laws and regulations over the past two decades reflected society's concerns on the ancient phenomenon in a modernized context, and efforts to wrestle with it. Yet, it remained uncertain whether the current approach to deter and redress cyber crime would prove to be successful.In the following sections, this article will review the process of establishing the legal framework on cyber crime in China, examine the features of Chinese laws and regulations tackling cyber crime, and analyze the policy for preventing cyber crime through control over cyber space in China. The article will also analyze the subject, the means, the mechanism and the main purpose of control over cyberspace, with review of its actual effects and defects.1. Criminalization and Penalization of Cyber CrimeThe \"chance encounter\" of communist China based on its ancient land and people with the information network had multiple potentialities of changing the politico-social order, which were unexpected and unprepared events in the late 20th century. According to official statistics, to the end of 2014, the number of Internet users in China reached 649 million and the number of mobile Internet","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"9 1","pages":"185-204"},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
International Journal of Cyber Criminology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1