首页 > 最新文献

International Journal of Cyber Criminology最新文献

英文 中文
The Role of Love Stories in Romance Scams: A Qualitative Analysis of Fraudulent Profiles 爱情故事在浪漫诈骗中的作用:对欺诈资料的定性分析
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2015-07-01 DOI: 10.5281/ZENODO.56227
Christian Kopp, R. Layton, J. Sillitoe, I. Gondal
IntroductionThe internet offers consumers and businesses a global marketplace which is both accessible and convenient for a wide range of services. In this space, one such service is online dating, which has evolved very quickly from its beginnings as a site of marginal interest to now become a mainstream social practice. Surveys indicate that whilst in 2003 there were an estimated 29 million Americans (two out of five singles) who used an online dating service, this would increase by 2004 to 40 million unique visitors to online dating sites each month (Edelson, 2003). Currently, it has been found that the 'online personals category' is one of the most lucrative forms of paid content on the web in the United States, with the market being worth $642 million in 2008 and $1.9 billion in 2012 (Edelson, 2003). The total profit of online dating services is estimated to be $1.4 billion per year (Rege, 2009). These revenues are said to be growing at a rate of 10 percent each year (Bridges, 2012), and it has been claimed that social networking of this kind has now become the fourth most popular strategy in finding a date or a romantic partner (Valkenburg & Peter, 2007).Unscrupulous individuals have recognized the monetizing potential of cyberspace, and the similar scams and frauds that have traditionally been conducted by mail and phone can now be found on the web, email, and social networking sites. Of considerable concern here is that the extent of these cyber scams appears to be growing (Bergiel, Bergiel, & Balsmeier, 2008). Indeed, given the popularity of the online dating market and the significant economic implications of the area, it is perhaps not surprising that this has become a key focus of fraudsters and scammers (Fair, Tully, Ekdale, & Asante, 2009; Rathinaraj & Chendroyaperumal, 2010). Because of the universal availability of the internet, countries other than the United States are not immune to this practice. In one Australian state alone, it has been estimated that Queenslanders are losing over $500K per month to "Nigerian" scammers, a figure that is growing at about 15% per year. In addition, the Melbourne Herald Sun reports that Australians lost $21 million to online dating scams in 2011 (Herald Sun, 2011).Adding to the concern regarding this practice, it is becoming apparent that financial loss is not the only damage caused by romance scams. It also has a serious social and psychological side (Ross & Smith, 2011). These romance scams target vulnerable, romantic or lonely people (Buchanan & Whitty, 2014) looking for love and companionship, and scammers employ several tactics to make the victim develop strong personal feelings for them. The victims are encouraged to build an intimate virtual personal relationship with the scammer, during which they show normal temporal relationship behaviour patterns such as sharing emotions, revealing personal information as secrets and wishes, and also providing personal support. Persons who were involv
互联网为消费者和企业提供了一个全球市场,这个市场既方便又方便,可以提供各种各样的服务。在这个领域,在线约会就是这样一种服务,它从一开始的边缘兴趣网站发展到现在的主流社会实践,发展得非常快。调查显示,2003年估计有2900万美国人(五分之二的单身人士)使用在线约会服务,到2004年,这一数字将增加到每月4000万在线约会网站的独立访问者(埃德尔森,2003年)。目前,已经发现“在线个人类别”是美国网络上最赚钱的付费内容形式之一,2008年市场价值为6.42亿美元,2012年为19亿美元(Edelson, 2003)。在线约会服务的总利润估计为每年14亿美元(Rege, 2009)。据说这些收入每年以10%的速度增长(Bridges, 2012),并且据说这种社交网络现在已经成为寻找约会或浪漫伴侣的第四大最受欢迎的策略(Valkenburg & Peter, 2007)。肆无忌惮的个人已经认识到网络空间的货币化潜力,传统上通过邮件和电话进行的类似骗局和欺诈行为现在可以在网络、电子邮件和社交网站上找到。这里值得关注的是,这些网络诈骗的范围似乎正在增长(Bergiel, Bergiel, & Balsmeier, 2008)。事实上,考虑到在线约会市场的普及和该领域的重大经济影响,这可能并不奇怪,它已经成为骗子和骗子的重点(Fair, Tully, Ekdale, & Asante, 2009;Rathinaraj & Chendroyaperumal, 2010)。由于互联网的普遍可用性,除了美国以外的国家也不能幸免于这种做法。据估计,仅在澳大利亚的一个州,昆士兰人每月就因“尼日利亚”骗子而损失超过50万美元,这一数字每年以15%的速度增长。此外,墨尔本先驱太阳报报道,澳大利亚人在2011年因在线约会骗局损失了2100万美元(先驱太阳报,2011)。人们对这种行为的担忧越来越多,因为经济损失显然不是爱情骗局造成的唯一损失。它还具有严重的社会和心理方面(Ross & Smith, 2011)。这些浪漫骗局的目标是脆弱的、浪漫的或孤独的人(布坎南和惠蒂,2014)寻找爱和陪伴,骗子采用几种策略,使受害者对他们产生强烈的个人感情。受害者被鼓励与骗子建立一种亲密的虚拟个人关系,在此期间,他们表现出正常的暂时关系行为模式,如分享情感,透露个人信息,如秘密和愿望,并提供个人支持。卷入浪漫骗局的人经常将自己描述为“受害者”,即使他们没有遭受任何经济损失(Whitty, 2013)。在这一地区发生的事件中,只有在建立了深厚的信任之后,骗子才会发出求救和需要钱的电话。这种对经济支持的明显需求在受害者信任虚拟关系期间持续存在。在此期间,受害者将牺牲相当大的经济资源,当所有这些经济资源都用尽时,受害者将开始提出不同的帮助方法,这并不罕见。然而,因为骗子通常对其他援助方式不感兴趣,因为这不会产生经济利益,所以这些建议被拒绝了,正是在这个时候,大多数受害者意识到这段关系是一个骗局,并由受害者或骗子终止。在这一点上,一个重要的观察是,尽管诈骗关系可能被受害者识别并终止,但这并不意味着问题的结束。…
{"title":"The Role of Love Stories in Romance Scams: A Qualitative Analysis of Fraudulent Profiles","authors":"Christian Kopp, R. Layton, J. Sillitoe, I. Gondal","doi":"10.5281/ZENODO.56227","DOIUrl":"https://doi.org/10.5281/ZENODO.56227","url":null,"abstract":"IntroductionThe internet offers consumers and businesses a global marketplace which is both accessible and convenient for a wide range of services. In this space, one such service is online dating, which has evolved very quickly from its beginnings as a site of marginal interest to now become a mainstream social practice. Surveys indicate that whilst in 2003 there were an estimated 29 million Americans (two out of five singles) who used an online dating service, this would increase by 2004 to 40 million unique visitors to online dating sites each month (Edelson, 2003). Currently, it has been found that the 'online personals category' is one of the most lucrative forms of paid content on the web in the United States, with the market being worth $642 million in 2008 and $1.9 billion in 2012 (Edelson, 2003). The total profit of online dating services is estimated to be $1.4 billion per year (Rege, 2009). These revenues are said to be growing at a rate of 10 percent each year (Bridges, 2012), and it has been claimed that social networking of this kind has now become the fourth most popular strategy in finding a date or a romantic partner (Valkenburg & Peter, 2007).Unscrupulous individuals have recognized the monetizing potential of cyberspace, and the similar scams and frauds that have traditionally been conducted by mail and phone can now be found on the web, email, and social networking sites. Of considerable concern here is that the extent of these cyber scams appears to be growing (Bergiel, Bergiel, & Balsmeier, 2008). Indeed, given the popularity of the online dating market and the significant economic implications of the area, it is perhaps not surprising that this has become a key focus of fraudsters and scammers (Fair, Tully, Ekdale, & Asante, 2009; Rathinaraj & Chendroyaperumal, 2010). Because of the universal availability of the internet, countries other than the United States are not immune to this practice. In one Australian state alone, it has been estimated that Queenslanders are losing over $500K per month to \"Nigerian\" scammers, a figure that is growing at about 15% per year. In addition, the Melbourne Herald Sun reports that Australians lost $21 million to online dating scams in 2011 (Herald Sun, 2011).Adding to the concern regarding this practice, it is becoming apparent that financial loss is not the only damage caused by romance scams. It also has a serious social and psychological side (Ross & Smith, 2011). These romance scams target vulnerable, romantic or lonely people (Buchanan & Whitty, 2014) looking for love and companionship, and scammers employ several tactics to make the victim develop strong personal feelings for them. The victims are encouraged to build an intimate virtual personal relationship with the scammer, during which they show normal temporal relationship behaviour patterns such as sharing emotions, revealing personal information as secrets and wishes, and also providing personal support. Persons who were involv","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"9 1","pages":"205-217"},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Organizations and Cybercrime 组织与网络犯罪
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2013-10-11 DOI: 10.2139/SSRN.2345525
R. Broadhurst, P. Grabosky, M. Alazab, Brigitte Bouhours, Steve Chon
This paper explores the nature of groups engaged in cybercrime. It briefly outlines the definition and scope of cybercrime, theoretical and empirical challenges in addressing what is known about cyber offenders, and the likely role of organized crime groups (OCG). We give examples of known cases that illustrate individual and group behaviour, and motivations of typical offenders, including state actors. Different types of cybercrime and different forms of criminal organisation are described drawing on the typology suggested by McGuire (2012). It is apparent that a wide variety of organisational structures are involved in cybercrime. Enterprise or profit-oriented activities, and especially cybercrime committed by state actors, appear to require leadership, structure, and specialisation. By contrast, protest activity tends to be less organized, with weak (if any) chain of command.
本文探讨了从事网络犯罪的群体的性质。它简要概述了网络犯罪的定义和范围,解决已知网络罪犯的理论和经验挑战,以及有组织犯罪集团(OCG)可能发挥的作用。我们给出了一些已知的案例来说明个人和群体的行为,以及典型罪犯(包括国家行为者)的动机。根据McGuire(2012)提出的类型学,描述了不同类型的网络犯罪和不同形式的犯罪组织。很明显,涉及网络犯罪的组织结构多种多样。企业或以利润为导向的活动,特别是由国家行为者实施的网络犯罪,似乎需要领导、结构和专业化。相比之下,抗议活动往往缺乏组织性,指挥系统薄弱(如果有的话)。
{"title":"Organizations and Cybercrime","authors":"R. Broadhurst, P. Grabosky, M. Alazab, Brigitte Bouhours, Steve Chon","doi":"10.2139/SSRN.2345525","DOIUrl":"https://doi.org/10.2139/SSRN.2345525","url":null,"abstract":"This paper explores the nature of groups engaged in cybercrime. It briefly outlines the definition and scope of cybercrime, theoretical and empirical challenges in addressing what is known about cyber offenders, and the likely role of organized crime groups (OCG). We give examples of known cases that illustrate individual and group behaviour, and motivations of typical offenders, including state actors. Different types of cybercrime and different forms of criminal organisation are described drawing on the typology suggested by McGuire (2012). It is apparent that a wide variety of organisational structures are involved in cybercrime. Enterprise or profit-oriented activities, and especially cybercrime committed by state actors, appear to require leadership, structure, and specialisation. By contrast, protest activity tends to be less organized, with weak (if any) chain of command.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2013-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.2139/SSRN.2345525","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68126537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Establishing a Theory of Cyber Crimes 建立网络犯罪理论
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2008-07-01 DOI: 10.5281/ZENODO.18792
K. Jaishankar
I have developed a theory called ‘Space Transition Theory’ in order to explain the causation of crimes in the cyberspace. I felt the need for a separate theory of cyber crimes because the general theoretical explanations were found to be inadequate as an overall explanation for the phenomenon of cyber crimes (Jaishankar 2008). I have published this theory as a chapter in a book titled “Crimes of the Internet” edited by Frank Schmalleger & Michael Pittaro, published by Prentice Hall (2008: 283-301). "Space Transition Theory” is an explanation about the nature of the behavior of the persons who bring out their conforming and non-conforming behavior in the physical space and cyberspace (Jaishankar 2008). Space transition involves the movement of persons from one space to another (e.g., from physical space to cyberspace and vice versa). Space transition theory argues that, people behave differently when they move from one space to another. The postulates of the theory are: 1. Persons, with repressed criminal behavior (in the physical space) have a propensity to commit crime in cyberspace, which, otherwise they would not commit in physical space, due to their status and position. 2. Identity Flexibility, Dissociative Anonymity and lack of deterrence factor in the cyberspace provides the offenders the choice to commit cyber crime 3. Criminal behavior of offenders in cyberspace is likely to be imported to Physical space which, in physical space may be exported to cyberspace as well. 4. Intermittent ventures of offenders in to the cyberspace and the dynamic spatio-temporal nature of cyberspace provide the chance to escape. 5. (a) Strangers are likely to unite together in cyberspace to commit crime in the physical space. (b) Associates of physical space are likely to unite to commit crime in cyberspace. 6. Persons from closed society are more likely to commit crimes in cyberspace than persons from open society. 7. The conflict of Norms and Values of Physical Space with the Norms and Values of cyberspace may lead to cyber crimes. Since criminology has started viewing the emergence of cyberspace as a new locus of criminal activity, a new theory is needed to explain why cyber crime occurs. The space transition theory presented above provides an explanation for the criminal behavior in the cyberspace. There is a need to test the Space Transition Theory to see if it explains cyber criminal activity (Jaishankar 2008).
为了解释网络空间犯罪的原因,我提出了一个叫做“空间转移理论”的理论。我觉得需要一个单独的网络犯罪理论,因为一般的理论解释被发现不足以作为网络犯罪现象的整体解释(Jaishankar 2008)。我已经将这一理论作为一章发表在了由Frank Schmalleger和Michael Pittaro编辑的《互联网的罪行》一书中,该书由Prentice Hall出版(2008:283-301)。“空间过渡理论”是对人们在物理空间和网络空间中表现出符合和不符合行为的行为本质的解释(Jaishankar 2008)。空间过渡涉及人从一个空间到另一个空间的移动(例如,从物理空间到网络空间,反之亦然)。空间转移理论认为,当人们从一个空间移动到另一个空间时,他们的行为会有所不同。该理论的假设是:1。犯罪行为被压抑的人(在物理空间)有在网络空间犯罪的倾向,否则他们不会在物理空间犯罪,因为他们的地位和地位。2. 网络空间的身份灵活性、解离性匿名性和威慑因素的缺乏为网络犯罪提供了选择。罪犯在网络空间的犯罪行为有可能被输入到实体空间,而实体空间又有可能被输出到网络空间。4. 罪犯在网络空间的间歇性冒险和网络空间的动态时空性质提供了逃跑的机会。5. (a)陌生人很可能在网络空间联合起来,在实体空间实施犯罪。(b)物理空间的同伙很可能联合起来在网络空间犯罪。6. 封闭社会的人比开放社会的人更容易在网络空间犯罪。7. 物理空间的规范和价值观与网络空间的规范和价值观的冲突可能导致网络犯罪。由于犯罪学已经开始将网络空间的出现视为一种新的犯罪活动场所,因此需要一种新的理论来解释网络犯罪发生的原因。上述空间转移理论为网络空间中的犯罪行为提供了一种解释。有必要测试空间过渡理论,看看它是否解释了网络犯罪活动(Jaishankar 2008)。
{"title":"Establishing a Theory of Cyber Crimes","authors":"K. Jaishankar","doi":"10.5281/ZENODO.18792","DOIUrl":"https://doi.org/10.5281/ZENODO.18792","url":null,"abstract":"I have developed a theory called ‘Space Transition Theory’ in order to explain the causation of crimes in the cyberspace. I felt the need for a separate theory of cyber crimes because the general theoretical explanations were found to be inadequate as an overall explanation for the phenomenon of cyber crimes (Jaishankar 2008). I have published this theory as a chapter in a book titled “Crimes of the Internet” edited by Frank Schmalleger & Michael Pittaro, published by Prentice Hall (2008: 283-301). \"Space Transition Theory” is an explanation about the nature of the behavior of the persons who bring out their conforming and non-conforming behavior in the physical space and cyberspace (Jaishankar 2008). Space transition involves the movement of persons from one space to another (e.g., from physical space to cyberspace and vice versa). Space transition theory argues that, people behave differently when they move from one space to another. The postulates of the theory are: 1. Persons, with repressed criminal behavior (in the physical space) have a propensity to commit crime in cyberspace, which, otherwise they would not commit in physical space, due to their status and position. 2. Identity Flexibility, Dissociative Anonymity and lack of deterrence factor in the cyberspace provides the offenders the choice to commit cyber crime 3. Criminal behavior of offenders in cyberspace is likely to be imported to Physical space which, in physical space may be exported to cyberspace as well. 4. Intermittent ventures of offenders in to the cyberspace and the dynamic spatio-temporal nature of cyberspace provide the chance to escape. 5. (a) Strangers are likely to unite together in cyberspace to commit crime in the physical space. (b) Associates of physical space are likely to unite to commit crime in cyberspace. 6. Persons from closed society are more likely to commit crimes in cyberspace than persons from open society. 7. The conflict of Norms and Values of Physical Space with the Norms and Values of cyberspace may lead to cyber crimes. Since criminology has started viewing the emergence of cyberspace as a new locus of criminal activity, a new theory is needed to explain why cyber crime occurs. The space transition theory presented above provides an explanation for the criminal behavior in the cyberspace. There is a need to test the Space Transition Theory to see if it explains cyber criminal activity (Jaishankar 2008).","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"7-9"},"PeriodicalIF":1.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71046102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Online Child Sex Solicitation: Exploring the Feasibility of a Research ‘Sting’ 网络儿童性引诱:探索研究“刺”的可行性
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2008-05-25 DOI: 10.2139/SSRN.2137390
Kasun P. Jayawardena, R. Broadhurst
A small scale test of the integrity of Internet Web 2.0 social network sites was undertaken over several weeks in 2007. The fictional identities of four female underage children where posted on three network sites and later introduced to relay chat forums in order to explore the impact of apparent vulnerability on potential selection of Internet victims. Only one of the three social network sites in the study recognized that the postings violated child protection policies and subsequently closed down the underage postings. Two basic identities were created: one that engendered a needy and vulnerable characterization of a child while the other identity was created to represent a happy and attached child character. The number of contacts and suspicious contacts were monitored to test assumptions about child ‘vulnerability’ and risks of unwanted sexual solicitations. The characters created also included either an avatar and/or contact details. These variants of the experiment showed that the inclusion of an image or access details increased the likelihood of contacts, including suspicious contact regardless of ‘vulnerability’. This small experiment noted that although vulnerable children with additional cues maybe at more risk all children who posted details about themselves on social network sites faced the risk of contact by predators. The need for further research and better means of regulating such sites was suggested.
2007年,对互联网Web 2.0社交网站的完整性进行了一项小规模的测试,耗时数周。通过在三个网络站点上发布四名未成年女性的虚构身份,随后将其引入中继聊天论坛,以探讨明显的漏洞对网络受害者潜在选择的影响。在研究的三个社交网站中,只有一个承认这些帖子违反了儿童保护政策,并随后关闭了未成年人的帖子。两种基本身份被创造出来:一种产生了一个需要和脆弱的孩子的特征,而另一种身份被创造出来代表一个快乐和依恋的孩子的角色。监测接触者和可疑接触者的数量,以检验关于儿童“脆弱性”和不受欢迎的性要求风险的假设。所创建的角色还包括化身和/或联系方式。实验的这些变体表明,包含图像或访问细节增加了接触的可能性,包括可疑的接触,而不管“脆弱性”如何。这个小实验指出,虽然有额外线索的脆弱儿童可能面临更大的风险,但所有在社交网站上发布自己详细信息的儿童都面临被捕食者接触的风险。有人建议需要进一步的研究和管理这些场址的更好方法。
{"title":"Online Child Sex Solicitation: Exploring the Feasibility of a Research ‘Sting’","authors":"Kasun P. Jayawardena, R. Broadhurst","doi":"10.2139/SSRN.2137390","DOIUrl":"https://doi.org/10.2139/SSRN.2137390","url":null,"abstract":"A small scale test of the integrity of Internet Web 2.0 social network sites was undertaken over several weeks in 2007. The fictional identities of four female underage children where posted on three network sites and later introduced to relay chat forums in order to explore the impact of apparent vulnerability on potential selection of Internet victims. Only one of the three social network sites in the study recognized that the postings violated child protection policies and subsequently closed down the underage postings. Two basic identities were created: one that engendered a needy and vulnerable characterization of a child while the other identity was created to represent a happy and attached child character. The number of contacts and suspicious contacts were monitored to test assumptions about child ‘vulnerability’ and risks of unwanted sexual solicitations. The characters created also included either an avatar and/or contact details. These variants of the experiment showed that the inclusion of an image or access details increased the likelihood of contacts, including suspicious contact regardless of ‘vulnerability’. This small experiment noted that although vulnerable children with additional cues maybe at more risk all children who posted details about themselves on social network sites faced the risk of contact by predators. The need for further research and better means of regulating such sites was suggested.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"228-248"},"PeriodicalIF":1.0,"publicationDate":"2008-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.2139/SSRN.2137390","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67939168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Identity Related Crime in the Cyberspace: Examining Phishing and Its Impact 网络空间中与身份相关的犯罪:网络钓鱼及其影响研究
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2008-01-01 DOI: 10.5281/ZENODO.18800
K. Jaishankar
Last November/December 2007, I was invited to two prestigious events of Cyber Criminology. The POLCYB International Summit on Policing Cyberspace, 2007, Bangkok, Thailand and the UNODC core group meeting of Experts on Identity related Crime and ISPAC Conference at Courmeyeur, Italy. I was also entrusted the task of preparing the Bangkok Declaration of the International summit on Cyberspace by the Society for the Policing of Cyberspace (POLCYB), Canada and that is published as a special paper in this issue. Hence in this editorial I would like to focus about identity related crime and its impact in the cyberspace.Identity is a holistic term to portray "an individual's comprehension of him or herself as a discrete, separate entity" (Identity, 2008, para 1). Finch (2007, pp.29-31) provides a brief typology of identity:"Identity is a complex and multi-faceted concept ... and it can be divided in to three categories: personal, social and legal. Personal identity relates to the self as experienced by the individual... social identity is the identity that is perceived by others; it is the external view of the self as viewed by others in society... Legal identity is ...the way in which an accumulation of information distinguishes one individual from all others....".The importance of identity gains greater significance in this wired era. The use of identity in the cyberspace is greater nowadays. People tend to shop, bank, sell, and have relationship in internet. In these processes their identity plays a superior role, which, however, is being misused by the miscreants. The perpetrators try to misuse the identity of a person for personal gain. This criminal misuse of identity is called identity related crime, which the United Nations Office of Drugs and Crime (UNODC), Vienna, Austria prefers to use and as a member of the core group of experts on Identity-related crime, UNODC1, I also advocate the use of this term.Koops & Leenes (2006) were the first to "propose to use the term 'identity-related crime' as an umbrella term. This covers all punishable activities having identity as a target or a principal tool." However, there is no universal definition of identity related crime, as it invariably comprises of many types of crimes such as identity theft, identity fraud, intellectual property abuse and other related crimes (UNODC, 2007a, 2007b). Though, Koops & Leenes (2006) have defined Identity-related crime, as the one that "concerns all punishable activities that have identity as a target or a principal tool", it is not recognized as a final definition of Identity related crime.Identity related cyber crime is on the rise, both in developed and developing countries. In this decade alone millions of people around the world are victimized of identity related cyber crime. The identity related cyber crime is perpetrated with ease when compared to the identity related crime in the physical space (Smith, 2007). It should be noted that the impact of identity related
2007年11月至12月,我应邀参加了两场著名的网络犯罪学活动。2007年在泰国曼谷举行的网络空间警务国际首脑会议和在意大利Courmeyeur举行的毒品和犯罪问题办公室身份相关犯罪问题专家核心小组会议。我还受加拿大网络空间警务协会(POLCYB)委托编写《网络空间问题国际首脑会议曼谷宣言》,该宣言已作为特刊发表在本期。因此,在这篇社论中,我想重点讨论与身份有关的犯罪及其对网络空间的影响。身份是一个整体术语,用来描述“一个人对他或她自己作为一个离散的、独立的实体的理解”(Identity, 2008,第1段)。Finch (2007, pp.29-31)提供了一个简短的身份类型:“身份是一个复杂的、多方面的概念……它可以分为三类:个人、社会和法律。个人同一性与个体所经历的自我有关。社会认同是他人感知到的认同;它是社会上其他人对自我的外部看法……法定身份是……信息的积累使一个人有别于其他所有人....”。在这个网络时代,身份的重要性变得更加重要。如今,在网络空间中使用身份的情况越来越多。人们倾向于在互联网上购物,银行,销售和建立关系。在这些进程中,他们的身份发挥着优越的作用,然而,这种作用正被不法分子滥用。犯罪者试图滥用一个人的身份来谋取个人利益。这种滥用身份的犯罪行为被称为与身份有关的犯罪,奥地利维也纳的联合国毒品和犯罪问题办公室(毒品和犯罪问题办公室)倾向于使用这一术语,作为与身份有关的犯罪问题核心专家小组(毒品和犯罪问题办公室)的一员,我也主张使用这一术语。Koops和Leenes(2006)是第一个“建议使用‘身份相关犯罪’作为总括术语”的人。这包括所有作为目标或主要工具的应受惩罚的活动。”然而,对与身份有关的犯罪没有一个普遍的定义,因为它总是包括许多类型的犯罪,如身份盗窃、身份欺诈、滥用知识产权和其他相关犯罪(毒品和犯罪问题办公室,2007年a, 2007年b)。虽然Koops & Leenes(2006)将身份相关犯罪定义为“涉及以身份为目标或主要工具的所有应受惩罚的活动”,但这并不是身份相关犯罪的最终定义。无论是在发达国家还是发展中国家,与身份相关的网络犯罪都呈上升趋势。仅在这十年里,全世界就有数百万人成为身份相关网络犯罪的受害者。与物理空间中的身份相关犯罪相比,与身份相关的网络犯罪更容易实施(Smith, 2007)。需要注意的是,与身份相关的网络犯罪的影响更大。跨国犯罪的性质、速度及其与欺诈、有组织犯罪、洗钱和恐怖主义等其他犯罪活动的关系使这种犯罪更加独特。毒品和犯罪问题办公室(2008a,第30段)将与身份有关的犯罪描述为21世纪的犯罪:“在严重的案件中,数百万美元被使用假身份被盗。数以百万计的小案件给受害者带来了个人损失和沮丧。由于报告不足、缺乏共同定义和立法不足,这可能只是冰山一角。代价也不仅仅是经济上的:与身份相关的盗窃可能对安全构成重大威胁。这个问题很严重,而且还在不断恶化。难怪它被称为“21世纪的罪行”。当我们探讨与身份相关的网络犯罪时,我们无法避免分析网络钓鱼。网络钓鱼是与身份相关的主要网络犯罪,虽然恶意软件在一定程度上可以被解释为与个人身份相关的网络犯罪,但主要是网络钓鱼者也使用恶意软件。…
{"title":"Identity Related Crime in the Cyberspace: Examining Phishing and Its Impact","authors":"K. Jaishankar","doi":"10.5281/ZENODO.18800","DOIUrl":"https://doi.org/10.5281/ZENODO.18800","url":null,"abstract":"Last November/December 2007, I was invited to two prestigious events of Cyber Criminology. The POLCYB International Summit on Policing Cyberspace, 2007, Bangkok, Thailand and the UNODC core group meeting of Experts on Identity related Crime and ISPAC Conference at Courmeyeur, Italy. I was also entrusted the task of preparing the Bangkok Declaration of the International summit on Cyberspace by the Society for the Policing of Cyberspace (POLCYB), Canada and that is published as a special paper in this issue. Hence in this editorial I would like to focus about identity related crime and its impact in the cyberspace.Identity is a holistic term to portray \"an individual's comprehension of him or herself as a discrete, separate entity\" (Identity, 2008, para 1). Finch (2007, pp.29-31) provides a brief typology of identity:\"Identity is a complex and multi-faceted concept ... and it can be divided in to three categories: personal, social and legal. Personal identity relates to the self as experienced by the individual... social identity is the identity that is perceived by others; it is the external view of the self as viewed by others in society... Legal identity is ...the way in which an accumulation of information distinguishes one individual from all others....\".The importance of identity gains greater significance in this wired era. The use of identity in the cyberspace is greater nowadays. People tend to shop, bank, sell, and have relationship in internet. In these processes their identity plays a superior role, which, however, is being misused by the miscreants. The perpetrators try to misuse the identity of a person for personal gain. This criminal misuse of identity is called identity related crime, which the United Nations Office of Drugs and Crime (UNODC), Vienna, Austria prefers to use and as a member of the core group of experts on Identity-related crime, UNODC1, I also advocate the use of this term.Koops & Leenes (2006) were the first to \"propose to use the term 'identity-related crime' as an umbrella term. This covers all punishable activities having identity as a target or a principal tool.\" However, there is no universal definition of identity related crime, as it invariably comprises of many types of crimes such as identity theft, identity fraud, intellectual property abuse and other related crimes (UNODC, 2007a, 2007b). Though, Koops & Leenes (2006) have defined Identity-related crime, as the one that \"concerns all punishable activities that have identity as a target or a principal tool\", it is not recognized as a final definition of Identity related crime.Identity related cyber crime is on the rise, both in developed and developing countries. In this decade alone millions of people around the world are victimized of identity related cyber crime. The identity related cyber crime is perpetrated with ease when compared to the identity related crime in the physical space (Smith, 2007). It should be noted that the impact of identity related","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"2 1","pages":"10-15"},"PeriodicalIF":1.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71046657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cyber stalking: An Analysis of Online Harassment and Intimidation 网络跟踪:网络骚扰和恐吓分析
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-07-01 DOI: 10.5281/ZENODO.18794
Michael L. Pittaro
Our society has come to rely on the sheer size, technological power, and lightening fast speed of the Internet to seek out immeasurable pages of information, explore the unknown, and communicate with virtually anyone, anywhere, and at anytime across the globe. Conversely, the Internet has opened windows of previously unknown criminal opportunities that not only challenge, but also transcend all physical boundaries, borders, and limitations to detect, punish, and diminish what appears to be a mounting problem of global proportion. As such, the Internet has literally become a fertile breeding ground for an entirely new and unique type of criminal offender hereafter known as the cyber stalker – an offender who uses the Internet as a tool or weapon of sorts to prey upon, harass, threaten, and generate immense fear and trepidation in its victims through sophisticated stalking tactics. This paper presents a glimpse into the deviant behaviors and tactics associated with cyber stalking crimes, legislative intervention measures, and preventative initiatives created specifically to curtail this emerging global crime.
我们的社会已经开始依赖互联网的庞大规模、技术力量和闪电般的速度来寻找不可估量的信息页面,探索未知的领域,并在全球任何地方、任何时间与几乎任何人进行交流。相反,互联网打开了以前未知的犯罪机会的窗口,不仅挑战,而且超越了所有物理边界,边界和限制,以发现,惩罚和减少似乎是全球比例日益增加的问题。因此,互联网实际上已经成为一种全新的、独特类型的犯罪分子的肥沃滋生地,这些罪犯后来被称为网络跟踪者——他们利用互联网作为各种工具或武器,通过复杂的跟踪策略来捕食、骚扰、威胁并在受害者中制造巨大的恐惧和恐慌。本文介绍了与网络跟踪犯罪相关的越轨行为和策略,立法干预措施,以及专门为遏制这一新兴的全球犯罪而制定的预防措施。
{"title":"Cyber stalking: An Analysis of Online Harassment and Intimidation","authors":"Michael L. Pittaro","doi":"10.5281/ZENODO.18794","DOIUrl":"https://doi.org/10.5281/ZENODO.18794","url":null,"abstract":"Our society has come to rely on the sheer size, technological power, and lightening fast speed of the Internet to seek out immeasurable pages of information, explore the unknown, and communicate with virtually anyone, anywhere, and at anytime across the globe. Conversely, the Internet has opened windows of previously unknown criminal opportunities that not only challenge, but also transcend all physical boundaries, borders, and limitations to detect, punish, and diminish what appears to be a mounting problem of global proportion. As such, the Internet has literally become a fertile breeding ground for an entirely new and unique type of criminal offender hereafter known as the cyber stalker – an offender who uses the Internet as a tool or weapon of sorts to prey upon, harass, threaten, and generate immense fear and trepidation in its victims through sophisticated stalking tactics. This paper presents a glimpse into the deviant behaviors and tactics associated with cyber stalking crimes, legislative intervention measures, and preventative initiatives created specifically to curtail this emerging global crime.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"2 1","pages":"180-197"},"PeriodicalIF":1.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71046195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Are We Protecting Our Youth Online? An Examination of Programs Keeping Youth Safe and Analysis of Policy Vacuum 我们在网上保护我们的青少年吗?青少年安全保障项目考察与政策真空分析
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-07-01 DOI: 10.5281/ZENODO.18795
Catherine D. Marcum
Gibson’s (1984) cyberspace did not become a popular facet in American homes until the 1990s, so in the grand scheme of technology, the Internet is still considered to be in its adolescence. However, despite its young age, approximately 87% of American youth use the Internet on a regular basis (Raine, 2006). While these youth are spending substantial amounts of time online, many of them are becoming victims of criminal activity. The range of crimes committed online, otherwise known as cyber crimes, is quite substantial; however, the particular focus of this study is to examine the preventative programs and policies developed to curb the online victimization of youth (i.e., sexual solicitation, unwanted harassment, and unwanted exposure to sexual material). While several attempts at passing legislation have been unsuccessful, a few attempts by the federal government to protect America’s youth have been successfully implemented and will be reviewed. While there are only few evaluations of strategies to prevent online victimization of youth to examine, suggestions of strategies that could be applied to cyberspace based on situational-based crime prevention strategy evaluations of other parallel programs in different arenas are discussed.
吉布森(1984)的网络空间直到20世纪90年代才在美国家庭中流行起来,所以在技术的宏伟计划中,互联网仍被认为处于青春期。然而,尽管年轻,大约87%的美国年轻人定期使用互联网(Raine, 2006)。虽然这些年轻人在网上花费了大量时间,但他们中的许多人却成为了犯罪活动的受害者。网络犯罪的范围相当广泛,也被称为网络犯罪;然而,本研究的特别重点是检查为遏制青少年在线受害(即,性引诱,不受欢迎的骚扰和不受欢迎的性材料暴露)而制定的预防方案和政策。虽然通过立法的几次尝试都没有成功,但联邦政府保护美国青年的几次尝试已经成功实施,并将得到审查。虽然只有很少的评估策略,以防止网上受害的青少年进行审查,战略建议,可应用于网络空间基于情境的犯罪预防策略评估其他平行项目在不同领域进行了讨论。
{"title":"Are We Protecting Our Youth Online? An Examination of Programs Keeping Youth Safe and Analysis of Policy Vacuum","authors":"Catherine D. Marcum","doi":"10.5281/ZENODO.18795","DOIUrl":"https://doi.org/10.5281/ZENODO.18795","url":null,"abstract":"Gibson’s (1984) cyberspace did not become a popular facet in American homes until the 1990s, so in the grand scheme of technology, the Internet is still considered to be in its adolescence. However, despite its young age, approximately 87% of American youth use the Internet on a regular basis (Raine, 2006). While these youth are spending substantial amounts of time online, many of them are becoming victims of criminal activity. The range of crimes committed online, otherwise known as cyber crimes, is quite substantial; however, the particular focus of this study is to examine the preventative programs and policies developed to curb the online victimization of youth (i.e., sexual solicitation, unwanted harassment, and unwanted exposure to sexual material). While several attempts at passing legislation have been unsuccessful, a few attempts by the federal government to protect America’s youth have been successfully implemented and will be reviewed. While there are only few evaluations of strategies to prevent online victimization of youth to examine, suggestions of strategies that could be applied to cyberspace based on situational-based crime prevention strategy evaluations of other parallel programs in different arenas are discussed.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"198-212"},"PeriodicalIF":1.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71046240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Book Review of Cybercrime – The Reality of the Threat 网络犯罪书评-威胁的现实
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-07-01 DOI: 10.5281/ZENODO.18798
Nicholas Chantler
If you're looking for introductory text on what cyber crime is, then this is the one! But don't expect and in-depth academic text. This self-published book is very much a book for the operational practitioner. An easy to read text that provides a broad overview relating to Federal Agent Nigel Phair’s experience whilst working at the Australian High Tech Crime Centre in Canberra and as a member of the Australian Federal Police. Some comments may seem to appear rather glib, along with several assumptions, but don't be put off; the book has merit and Phair provides a good insight for the newcomer wishing to learn about the domain of cyber crime. The introduction, I presume in an effort to allay our fears, states "The Internet is not of the Wild West, as was once portrayed in American Western movies. It is just another public place and Internet users need to use real-world sensibilities when operating in the online environment." Phew, thank goodness for that! But his statement is quickly followed by a darker one of impending doom; "the communities trusting e-commerce activities, will slowly erode over time as personal users either become victims of online crime or know someone who has." He then briefly mentions ‘the profile of cyber crime criminals’ and how the hacking the counterculture has completely changed into wellorganized and hierarchical groups of criminal syndicates that have realized there is substantial money to be made by criminal activity online. A geographical overview of the cyber crime elements are presented as the only real risk from Eastern Europe, Asia and West Africa. This is just too brief. His Eastern European perspective focuses only on the Russian Mafia and one incident involving a Romanian National. Asia, primarily relates to issues in China, although Singapore and Korea do get a mention. West Africa, primarily focuses on Nigeria and Kenya; with the Nigerian activity relating to the infamous "Nigerian letters." The rest of the book addresses the cyber crime activities under the broad headings of: o Unwanted Software; o Identity Crime; o Phishing;
如果你正在寻找关于什么是网络犯罪的介绍性文章,那么这就是它!但不要期望有深入的学术文本。这本自行出版的书是一本非常适合操作实践者的书。一个易于阅读的文本,提供了有关联邦探员Nigel Phair的经验,而在堪培拉的澳大利亚高科技犯罪中心工作,并作为澳大利亚联邦警察的一员的广泛概述。有些评论可能看起来相当油嘴滑舌,还有一些假设,但不要推迟;这本书有优点,Phair为希望了解网络犯罪领域的新手提供了很好的见解。我认为引言是为了减轻我们的恐惧,它说:“互联网并不像美国西部电影中曾经描绘的那样是狂野的西部。它只是另一个公共场所,互联网用户在网络环境中操作时需要使用现实世界的敏感性。”呸,谢天谢地!但他的声明之后很快就出现了一个更黑暗的即将到来的厄运;“随着时间的推移,信任电子商务活动的社区将慢慢受到侵蚀,因为个人用户要么成为网络犯罪的受害者,要么认识遭受网络犯罪的人。”然后,他简要地提到了“网络犯罪分子的概况”,以及反主流文化的黑客是如何完全转变为组织良好、等级分明的犯罪集团的,这些犯罪集团意识到网络犯罪活动可以赚到大量的钱。网络犯罪要素的地理概况呈现为东欧,亚洲和西非的唯一真正的风险。这太简短了。他的东欧视角只关注俄罗斯黑手党和一起涉及罗马尼亚国民的事件。亚洲,主要涉及中国的问题,尽管新加坡和韩国也被提及。西非,主要集中在尼日利亚和肯尼亚;与臭名昭著的“尼日利亚信件”有关的尼日利亚活动有关。本书的其余部分在以下几个大标题下讨论了网络犯罪活动:o不需要的软件;o身份罪行;o钓鱼;
{"title":"Book Review of Cybercrime – The Reality of the Threat","authors":"Nicholas Chantler","doi":"10.5281/ZENODO.18798","DOIUrl":"https://doi.org/10.5281/ZENODO.18798","url":null,"abstract":"If you're looking for introductory text on what cyber crime is, then this is the one! But don't expect and in-depth academic text. This self-published book is very much a book for the operational practitioner. An easy to read text that provides a broad overview relating to Federal Agent Nigel Phair’s experience whilst working at the Australian High Tech Crime Centre in Canberra and as a member of the Australian Federal Police. Some comments may seem to appear rather glib, along with several assumptions, but don't be put off; the book has merit and Phair provides a good insight for the newcomer wishing to learn about the domain of cyber crime. The introduction, I presume in an effort to allay our fears, states \"The Internet is not of the Wild West, as was once portrayed in American Western movies. It is just another public place and Internet users need to use real-world sensibilities when operating in the online environment.\" Phew, thank goodness for that! But his statement is quickly followed by a darker one of impending doom; \"the communities trusting e-commerce activities, will slowly erode over time as personal users either become victims of online crime or know someone who has.\" He then briefly mentions ‘the profile of cyber crime criminals’ and how the hacking the counterculture has completely changed into wellorganized and hierarchical groups of criminal syndicates that have realized there is substantial money to be made by criminal activity online. A geographical overview of the cyber crime elements are presented as the only real risk from Eastern Europe, Asia and West Africa. This is just too brief. His Eastern European perspective focuses only on the Russian Mafia and one incident involving a Romanian National. Asia, primarily relates to issues in China, although Singapore and Korea do get a mention. West Africa, primarily focuses on Nigeria and Kenya; with the Nigerian activity relating to the infamous \"Nigerian letters.\" The rest of the book addresses the cyber crime activities under the broad headings of: o Unwanted Software; o Identity Crime; o Phishing;","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"249-251"},"PeriodicalIF":1.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71046343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA 教训拒绝吗?网络音乐盗版者对RIAA法律起诉的反应
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-07-01 DOI: 10.5281/ZENODO.18796
Michael Bachmann
In 2003, the Recording Industry Association of America (RIAA) initiated a surge of lawsuits against peer-topeer (P2P) network users to stop them from illegally sharing music files. The main goal of this new strategy was not to dissuade individual persons from violating copyright laws, but to educate the general public about the illegality of this behavior and to deter the mass of Internet users from using the ever-emerging P2P networks to share music files (RIAA, 2003). Despite these legal efforts, the few studies conducted on online music file sharing suggest that the majority of music downloaders show little awareness of wrongdoing and that a large gap exists between the self-perception of P2P users and the deviant label assigned to them by the recording industry. This study uses recent data from the PEW Internet and American Life Project to analyze the latest shifts in the population of P2P users. Results show that the popularity of P2P networks has been steadily increasing since the sharp decline in 2003 and that the sociodemographics of file-sharing communities are changing. P2P users appear to be largely unimpressed by the legal prosecutions. Implications for the music and video industry as well as future research are discussed.
2003年,美国唱片工业协会(RIAA)发起了一场针对P2P网络用户的诉讼,以阻止他们非法共享音乐文件。这种新策略的主要目的不是劝阻个人违反版权法,而是教育公众这种行为的非法性,并阻止大量互联网用户使用不断出现的P2P网络共享音乐文件(RIAA, 2003)。尽管有这些法律上的努力,但对在线音乐文件共享进行的少数研究表明,大多数音乐下载者对不法行为几乎没有意识到,而且P2P用户的自我认知与唱片行业给他们贴上的越轨标签之间存在着很大的差距。这项研究使用了皮尤互联网和美国生活项目的最新数据来分析P2P用户人口的最新变化。结果表明,自2003年急剧下降以来,P2P网络的普及一直在稳步增长,文件共享社区的社会人口结构正在发生变化。P2P用户似乎基本上对法律起诉无动于衷。对音乐和视频产业的启示以及未来的研究进行了讨论。
{"title":"Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA","authors":"Michael Bachmann","doi":"10.5281/ZENODO.18796","DOIUrl":"https://doi.org/10.5281/ZENODO.18796","url":null,"abstract":"In 2003, the Recording Industry Association of America (RIAA) initiated a surge of lawsuits against peer-topeer (P2P) network users to stop them from illegally sharing music files. The main goal of this new strategy was not to dissuade individual persons from violating copyright laws, but to educate the general public about the illegality of this behavior and to deter the mass of Internet users from using the ever-emerging P2P networks to share music files (RIAA, 2003). Despite these legal efforts, the few studies conducted on online music file sharing suggest that the majority of music downloaders show little awareness of wrongdoing and that a large gap exists between the self-perception of P2P users and the deviant label assigned to them by the recording industry. This study uses recent data from the PEW Internet and American Life Project to analyze the latest shifts in the population of P2P users. Results show that the popularity of P2P networks has been steadily increasing since the sharp decline in 2003 and that the sociodemographics of file-sharing communities are changing. P2P users appear to be largely unimpressed by the legal prosecutions. Implications for the music and video industry as well as future research are discussed.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"213-227"},"PeriodicalIF":1.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71046445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Book Review of How to avoid becoming a victim 书评《如何避免成为受害者》
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-07-01 DOI: 10.5281/ZENODO.18799
J. Bowers
The book, Cybercrime: How to avoid becoming a victim, written by H. Thomas Milhorn, MD, Ph.D. sets out to educate its readers about the many different types of cyber crimes and ways in which internet users can protect themselves from becoming victims. According to the author, cyber crime is identified as “any type of activity that uses the Internet to commit a crime (p.1)”. A broad area of cyber crime is covered throughout the book with special emphasis given to defining what constitutes each type of crime, poignant examples of actual crimes, and finally, useful tips for protecting yourself from each type of crime. Indeed, there are 36 chapters in the book, covering almost every conceivable area of cyber crime, areas such cyber bullying and immigration fraud, as well as the more popular predator and credit card fraud. Appendix A provides the readers with information on how to report cyber crimes, specifically which office they should contact. Appendix B provides an essential glossary for cyber terminology. The purpose of this review is to provide readers with an overview as to what to expect from it. Milhorn is a retired professor who has penned over 150 papers (both research and education) as well as four books (three nonfiction and one fiction). He taught for the University of Mississippi Medical Center, where he was a professor of Physiology and Biophysics, as well as an associate professor of Psychiatry and Human Behavior. He holds several certifications and is educated in other areas above and beyond his medical training including: mental health counselor, addictions counseling coursework, and theology. Milhorn’s interests include web design and teaching computer classes for adult students. Although is areas of expertise are not cyber crimes, he does provide a thorough examination of the particular areas. Milhorn’s Curriculum Vitae can be found on his own webpage: http://www.milhorn1.netfirms.com/. Computers are now in every country, and are accessible by a vast majority of persons in industrialized countries. Internet-connected people must know how to protect themselves from the online dangers. Milhorn’s goal with this book is to provide a vast repository of protective measures, both for the novice and the veteran in computer use.
《网络犯罪:如何避免成为受害者》这本书是由医学博士托马斯·米尔霍恩(H. Thomas Milhorn)撰写的,旨在教育读者了解许多不同类型的网络犯罪,以及互联网用户保护自己免受成为受害者的方法。根据提交人的说法,网络犯罪被定义为“利用互联网实施犯罪的任何类型的活动(第1页)”。网络犯罪的广泛领域覆盖了整个书,特别强调了定义什么构成了每一种类型的犯罪,实际犯罪的尖锐的例子,最后,保护自己免受每一种类型的犯罪的有用提示。事实上,这本书有36章,涵盖了几乎所有可以想象到的网络犯罪领域,比如网络欺凌和移民欺诈,以及更流行的捕食者和信用卡欺诈。附录A为读者提供了如何报告网络犯罪的信息,特别是他们应该联系哪个办公室。附录B提供了网络术语的基本词汇表。这篇评论的目的是为读者提供一个概述,以了解从它可以期待什么。米尔霍恩是一名退休教授,发表了150多篇论文(既有研究论文,也有教育论文),并出版了四本书(三本非虚构类书籍和一本虚构类书籍)。他曾任教于密西西比大学医学中心,在那里他是生理学和生物物理学教授,以及精神病学和人类行为学副教授。他持有多个证书,并在他的医疗培训之外的其他领域接受教育,包括:心理健康咨询师,成瘾咨询课程和神学。米尔霍恩的兴趣包括网页设计和为成人学生教授计算机课程。虽然他的专业领域不是网络犯罪,但他确实对特定领域进行了彻底的检查。米尔霍恩的简历可以在他自己的网页上找到:http://www.milhorn1.netfirms.com/。现在每个国家都有计算机,工业化国家的绝大多数人都可以使用计算机。联网的人必须知道如何保护自己免受网络危险。米尔霍恩写这本书的目的是为电脑新手和老手提供大量的保护措施。
{"title":"Book Review of How to avoid becoming a victim","authors":"J. Bowers","doi":"10.5281/ZENODO.18799","DOIUrl":"https://doi.org/10.5281/ZENODO.18799","url":null,"abstract":"The book, Cybercrime: How to avoid becoming a victim, written by H. Thomas Milhorn, MD, Ph.D. sets out to educate its readers about the many different types of cyber crimes and ways in which internet users can protect themselves from becoming victims. According to the author, cyber crime is identified as “any type of activity that uses the Internet to commit a crime (p.1)”. A broad area of cyber crime is covered throughout the book with special emphasis given to defining what constitutes each type of crime, poignant examples of actual crimes, and finally, useful tips for protecting yourself from each type of crime. Indeed, there are 36 chapters in the book, covering almost every conceivable area of cyber crime, areas such cyber bullying and immigration fraud, as well as the more popular predator and credit card fraud. Appendix A provides the readers with information on how to report cyber crimes, specifically which office they should contact. Appendix B provides an essential glossary for cyber terminology. The purpose of this review is to provide readers with an overview as to what to expect from it. Milhorn is a retired professor who has penned over 150 papers (both research and education) as well as four books (three nonfiction and one fiction). He taught for the University of Mississippi Medical Center, where he was a professor of Physiology and Biophysics, as well as an associate professor of Psychiatry and Human Behavior. He holds several certifications and is educated in other areas above and beyond his medical training including: mental health counselor, addictions counseling coursework, and theology. Milhorn’s interests include web design and teaching computer classes for adult students. Although is areas of expertise are not cyber crimes, he does provide a thorough examination of the particular areas. Milhorn’s Curriculum Vitae can be found on his own webpage: http://www.milhorn1.netfirms.com/. Computers are now in every country, and are accessible by a vast majority of persons in industrialized countries. Internet-connected people must know how to protect themselves from the online dangers. Milhorn’s goal with this book is to provide a vast repository of protective measures, both for the novice and the veteran in computer use.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"69 1","pages":"252-255"},"PeriodicalIF":1.0,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71046628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cyber Criminology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1