{"title":"网络空间中与身份相关的犯罪:网络钓鱼及其影响研究","authors":"K. Jaishankar","doi":"10.5281/ZENODO.18800","DOIUrl":null,"url":null,"abstract":"Last November/December 2007, I was invited to two prestigious events of Cyber Criminology. The POLCYB International Summit on Policing Cyberspace, 2007, Bangkok, Thailand and the UNODC core group meeting of Experts on Identity related Crime and ISPAC Conference at Courmeyeur, Italy. I was also entrusted the task of preparing the Bangkok Declaration of the International summit on Cyberspace by the Society for the Policing of Cyberspace (POLCYB), Canada and that is published as a special paper in this issue. Hence in this editorial I would like to focus about identity related crime and its impact in the cyberspace.Identity is a holistic term to portray \"an individual's comprehension of him or herself as a discrete, separate entity\" (Identity, 2008, para 1). Finch (2007, pp.29-31) provides a brief typology of identity:\"Identity is a complex and multi-faceted concept ... and it can be divided in to three categories: personal, social and legal. Personal identity relates to the self as experienced by the individual... social identity is the identity that is perceived by others; it is the external view of the self as viewed by others in society... Legal identity is ...the way in which an accumulation of information distinguishes one individual from all others....\".The importance of identity gains greater significance in this wired era. The use of identity in the cyberspace is greater nowadays. People tend to shop, bank, sell, and have relationship in internet. In these processes their identity plays a superior role, which, however, is being misused by the miscreants. The perpetrators try to misuse the identity of a person for personal gain. This criminal misuse of identity is called identity related crime, which the United Nations Office of Drugs and Crime (UNODC), Vienna, Austria prefers to use and as a member of the core group of experts on Identity-related crime, UNODC1, I also advocate the use of this term.Koops & Leenes (2006) were the first to \"propose to use the term 'identity-related crime' as an umbrella term. This covers all punishable activities having identity as a target or a principal tool.\" However, there is no universal definition of identity related crime, as it invariably comprises of many types of crimes such as identity theft, identity fraud, intellectual property abuse and other related crimes (UNODC, 2007a, 2007b). Though, Koops & Leenes (2006) have defined Identity-related crime, as the one that \"concerns all punishable activities that have identity as a target or a principal tool\", it is not recognized as a final definition of Identity related crime.Identity related cyber crime is on the rise, both in developed and developing countries. In this decade alone millions of people around the world are victimized of identity related cyber crime. The identity related cyber crime is perpetrated with ease when compared to the identity related crime in the physical space (Smith, 2007). It should be noted that the impact of identity related cyber crime is larger. The transnational nature, velocity and its relationship with other criminal activities such as fraud, organized crime, money-laundering and terrorism makes this crime more unique. UNODC (2008a, para 30) describes Identity related crime as the crime of the 21st Century:\"In serious cases, millions of dollars are stolen using false ID. Millions of smaller cases result in personal loss and frustration for victims. Because of under reporting, lack of common definitions, and insufficient legislation, this is probably just the tip of the iceberg. Nor are the costs purely economic: identity-related theft can pose a major threat to security. The problem is serious, and it is growing. No wonder it has been called \"the crime of the 21st century\".While we explore identity related cyber crime, we cannot avoid analyzing Phishing. Phishing is the main identity related cyber crime, though, malware to a certain extent, can be construed as an individual identity-related cyber crime, but predominantly Phishers also use malware. …","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"2 1","pages":"10-15"},"PeriodicalIF":0.7000,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Identity Related Crime in the Cyberspace: Examining Phishing and Its Impact\",\"authors\":\"K. Jaishankar\",\"doi\":\"10.5281/ZENODO.18800\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Last November/December 2007, I was invited to two prestigious events of Cyber Criminology. The POLCYB International Summit on Policing Cyberspace, 2007, Bangkok, Thailand and the UNODC core group meeting of Experts on Identity related Crime and ISPAC Conference at Courmeyeur, Italy. I was also entrusted the task of preparing the Bangkok Declaration of the International summit on Cyberspace by the Society for the Policing of Cyberspace (POLCYB), Canada and that is published as a special paper in this issue. Hence in this editorial I would like to focus about identity related crime and its impact in the cyberspace.Identity is a holistic term to portray \\\"an individual's comprehension of him or herself as a discrete, separate entity\\\" (Identity, 2008, para 1). Finch (2007, pp.29-31) provides a brief typology of identity:\\\"Identity is a complex and multi-faceted concept ... and it can be divided in to three categories: personal, social and legal. Personal identity relates to the self as experienced by the individual... social identity is the identity that is perceived by others; it is the external view of the self as viewed by others in society... Legal identity is ...the way in which an accumulation of information distinguishes one individual from all others....\\\".The importance of identity gains greater significance in this wired era. The use of identity in the cyberspace is greater nowadays. People tend to shop, bank, sell, and have relationship in internet. In these processes their identity plays a superior role, which, however, is being misused by the miscreants. The perpetrators try to misuse the identity of a person for personal gain. This criminal misuse of identity is called identity related crime, which the United Nations Office of Drugs and Crime (UNODC), Vienna, Austria prefers to use and as a member of the core group of experts on Identity-related crime, UNODC1, I also advocate the use of this term.Koops & Leenes (2006) were the first to \\\"propose to use the term 'identity-related crime' as an umbrella term. This covers all punishable activities having identity as a target or a principal tool.\\\" However, there is no universal definition of identity related crime, as it invariably comprises of many types of crimes such as identity theft, identity fraud, intellectual property abuse and other related crimes (UNODC, 2007a, 2007b). Though, Koops & Leenes (2006) have defined Identity-related crime, as the one that \\\"concerns all punishable activities that have identity as a target or a principal tool\\\", it is not recognized as a final definition of Identity related crime.Identity related cyber crime is on the rise, both in developed and developing countries. In this decade alone millions of people around the world are victimized of identity related cyber crime. The identity related cyber crime is perpetrated with ease when compared to the identity related crime in the physical space (Smith, 2007). It should be noted that the impact of identity related cyber crime is larger. The transnational nature, velocity and its relationship with other criminal activities such as fraud, organized crime, money-laundering and terrorism makes this crime more unique. UNODC (2008a, para 30) describes Identity related crime as the crime of the 21st Century:\\\"In serious cases, millions of dollars are stolen using false ID. Millions of smaller cases result in personal loss and frustration for victims. Because of under reporting, lack of common definitions, and insufficient legislation, this is probably just the tip of the iceberg. Nor are the costs purely economic: identity-related theft can pose a major threat to security. The problem is serious, and it is growing. No wonder it has been called \\\"the crime of the 21st century\\\".While we explore identity related cyber crime, we cannot avoid analyzing Phishing. Phishing is the main identity related cyber crime, though, malware to a certain extent, can be construed as an individual identity-related cyber crime, but predominantly Phishers also use malware. …\",\"PeriodicalId\":46103,\"journal\":{\"name\":\"International Journal of Cyber Criminology\",\"volume\":\"2 1\",\"pages\":\"10-15\"},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2008-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cyber Criminology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5281/ZENODO.18800\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"CRIMINOLOGY & PENOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Criminology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5281/ZENODO.18800","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
Identity Related Crime in the Cyberspace: Examining Phishing and Its Impact
Last November/December 2007, I was invited to two prestigious events of Cyber Criminology. The POLCYB International Summit on Policing Cyberspace, 2007, Bangkok, Thailand and the UNODC core group meeting of Experts on Identity related Crime and ISPAC Conference at Courmeyeur, Italy. I was also entrusted the task of preparing the Bangkok Declaration of the International summit on Cyberspace by the Society for the Policing of Cyberspace (POLCYB), Canada and that is published as a special paper in this issue. Hence in this editorial I would like to focus about identity related crime and its impact in the cyberspace.Identity is a holistic term to portray "an individual's comprehension of him or herself as a discrete, separate entity" (Identity, 2008, para 1). Finch (2007, pp.29-31) provides a brief typology of identity:"Identity is a complex and multi-faceted concept ... and it can be divided in to three categories: personal, social and legal. Personal identity relates to the self as experienced by the individual... social identity is the identity that is perceived by others; it is the external view of the self as viewed by others in society... Legal identity is ...the way in which an accumulation of information distinguishes one individual from all others....".The importance of identity gains greater significance in this wired era. The use of identity in the cyberspace is greater nowadays. People tend to shop, bank, sell, and have relationship in internet. In these processes their identity plays a superior role, which, however, is being misused by the miscreants. The perpetrators try to misuse the identity of a person for personal gain. This criminal misuse of identity is called identity related crime, which the United Nations Office of Drugs and Crime (UNODC), Vienna, Austria prefers to use and as a member of the core group of experts on Identity-related crime, UNODC1, I also advocate the use of this term.Koops & Leenes (2006) were the first to "propose to use the term 'identity-related crime' as an umbrella term. This covers all punishable activities having identity as a target or a principal tool." However, there is no universal definition of identity related crime, as it invariably comprises of many types of crimes such as identity theft, identity fraud, intellectual property abuse and other related crimes (UNODC, 2007a, 2007b). Though, Koops & Leenes (2006) have defined Identity-related crime, as the one that "concerns all punishable activities that have identity as a target or a principal tool", it is not recognized as a final definition of Identity related crime.Identity related cyber crime is on the rise, both in developed and developing countries. In this decade alone millions of people around the world are victimized of identity related cyber crime. The identity related cyber crime is perpetrated with ease when compared to the identity related crime in the physical space (Smith, 2007). It should be noted that the impact of identity related cyber crime is larger. The transnational nature, velocity and its relationship with other criminal activities such as fraud, organized crime, money-laundering and terrorism makes this crime more unique. UNODC (2008a, para 30) describes Identity related crime as the crime of the 21st Century:"In serious cases, millions of dollars are stolen using false ID. Millions of smaller cases result in personal loss and frustration for victims. Because of under reporting, lack of common definitions, and insufficient legislation, this is probably just the tip of the iceberg. Nor are the costs purely economic: identity-related theft can pose a major threat to security. The problem is serious, and it is growing. No wonder it has been called "the crime of the 21st century".While we explore identity related cyber crime, we cannot avoid analyzing Phishing. Phishing is the main identity related cyber crime, though, malware to a certain extent, can be construed as an individual identity-related cyber crime, but predominantly Phishers also use malware. …
期刊介绍:
International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy. IJCC is an unique Diamond open access, not for profit international journal, where the author(s) need not pay article processing charges / page charges and it is totally free for both the authors and the audience. IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, Developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety, Human Factor of Cyber Crime and Cyber Security and Policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes primarily from a social science perspective to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.