Abstract
Previous studies on fighting computer-assisted frauds have attempted to assist law enforcement agencies (LEAs) to better understand important aspects of motivation, opportunity and deterrence. However, there have been few empirical studies on the profiles of convicted offenders, post detection. This paper examines characteristics of frauds and their associated respective law enforcement response with particular emphasis on frauds facilitated by information technology. The findings show how the prosecution and conviction of the offenders differ among commonly-seen types of computer assisted frauds, and bring new evidence to the common association of gender and crime, severity and punishment, etc. The findings may help LEAs and legislative bodies to evaluate their current practices from the point of restorative social justice.
Similar content being viewed by others
Notes
Federal Bureau of Investigation. “Ten-Year Arrest Trends, by Sex, 2003–2012”.
In Section 2.2, ‘Classifying Offenses’, under NIBRS User Manual.
The NIBRS User Manual contains detailed definition and examples of Group A offense and Group B offense.
SAS 9.2 User’s Guide, Second Edition
Note – Typically, offenders are above 14 years of age.
References
Agnew, R., & Brezina, T. (2001). Juvenile delinquency: Causes and control. Los Angeles: Roxbury Publishing Company.
Albrecht, W.S., Wernz, G.W., Williams, T.L. (1995). Fraud: Bringing light to the dark side of business. Irwin Professional Pub.
Albrechtsen, E. (2007). A qualitative study of users' view on information security. Computers & Security, 26(4), 276–289.
Allison, P.D. (2012). Logistic regression using SAS: Theory and application. SAS Institute.
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.
Atoum, I., Otoom, A., & Abu Ali, A. (2014). A holistic cyber security implementation framework. Information Management & Computer Security, 22(3), 251–264.
Baker, C. R. (1999). An analysis of fraud on the internet. International Rescuer, 9(5), 348–360.
Barker, K. J., D'Amato, J., & Sheridon, P. (2008). Credit card fraud: Awareness and prevention. Journal of financial crime, 15(4), 398–410.
Bequai, A. (1978). Computer crime. Citeseer.
Bequai, A. (1983). How to prevent computer crime: A guide for managers. Wiley.
Bequai, A. (2000). America’s internet commerce and the threat of fraud. Computers & Security, 19(8), 688–691.
Bernard, T. J., & Engel, R. S. (2001). Conceptualizing criminal justice theory. Justice Quarterly, 18(1), 1–30.
Brenner, S. W. (2004). US cybercrime law: Defining offenses. Information Systems Frontiers, 6(2), 115–132.
Brenner, S. W., & Schwerha, J. J. (2004). Introduction—Cybercrime: A note on international issues. Information Systems Frontiers, 6(2), 111–114.
Brown, C. S. (2015). Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology, 9(1), 55.
Burns, R. G., Whitworth, K. H., & Thompson, C. Y. (2004). Assessing law enforcement preparedness to address internet fraud. Journal of Criminal Justice, 32(5), 477–493.
Carter, D. L., & Katz, A. J. (1996). Computer crime: An emerging challenge for law enforcement. FBI Law Enforcement Bulletin, 65(12), 1–8.
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet: Academic press.
Chan, M., Woon, I., & Kankanhalli, A. (2005). Perceptions of information security in the workplace: Linking information security climate to compliant behavior. Journal of information privacy and security, 1(3), 18–41.
Choi, K.-S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308.
Chua, C. E. H., & Wareham, J. (2004). Fighting internet auction fraud: An assessment and proposal. Computer, 37(10), 31–37.
Clarke, R. V. G., & Felson, M. (1993). Routine activity and rational choice (Vol. 5): Transaction publishers.
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 588–608.
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90–101.
D'Alessio, S. J., & Stolzenberg, L. (2003). Race and the probability of arrest. Social Forces, 81(4), 1381–1397.
D'Arcy, J., & Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43(6), 1091–1124.
D'Arcy, J., & Hovav, A. (2004). The role of individual characteristics on the effectiveness of IS security countermeasures. AMCIS 2004 PRO, 176.
D’Arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89(1), 59–71.
Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 386.
Dodge, R. C., Carver, C., & Ferguson, A. J. (2007). Phishing for user security awareness. Computers & Security, 26(1), 73–80.
Dolan, K. M. (2004). Internet auction fraud: The silent victims. Journal of Economic Crime Management, 2(1), 1–22.
Farahmand, F., & Spafford, E. H. (2013). Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers, 15(1), 5–15.
Gottschalk, P. (2010). Knowledge management technology for organized crime risk assessment. Information Systems Frontiers, 12(3), 267–275.
Hansen, K. (2003). Education and the crime-age profile. British Journal of Criminology, 43(1), 141–168.
Heidensohn, F., Rock, P., McIntosh, M., Smart, C., & Smart, C. (1977). Women, crime and criminology. JSTOR.
Heinze, G. (1999). The application of Firth’s procedure to cox and logistic regression. In Technical report 10. Vienna: Department of Medical Computer Sciences, Section of Clinical Biometrics, Vienna University.
Heinze, G., & Puhr, R. (2010). Bias-reduced and separation-proof conditional logistic regression with small or sparse data sets. Statistics in Medicine, 29(7–8), 770–777.
Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165.
Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3–22.
Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization: Ballinger Cambridge.
Hittle, B. D. (2001). Uphill battle: The difficulty of deterring and detecting perpetrators of internet stock fraud. An. Fed. Comm. LJ, 54, 165.
Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25.
Howard, R. (2009). Cyber fraud: Tactics, techniques and procedures: CRC press.
Jackson, J. E. (1994). Fraud masters: Professional credit card offenders and crime. Criminal Justice Review, 19(1), 24–55.
Karmen, A. (2012). Crime victims: An introduction to victimology: Cengage learning.
Kauffman, R. J., & Wood, C. A. (2003). An investigation of premium bidding in online auctions. University of Minnesota MISRC Working Paper, 304.
Kellermann, T. (2010). Building a foundation for global cybercrime law enforcement. Computer Fraud & Security, 2010(5), 5–8.
King, G., & Zeng, L. (2001). Logistic regression in rare events data. Political Analysis, 9(2), 137–163.
Koops, B.-J., Leenes, R., Meints, M., Van der Meulen, N., & Jaquet-Chiffelle, D.-O. (2009). A typology of identity-related crime: Conceptual, technical, and legal issues. Information, Communication & Society, 12(1), 1–24.
Lee, S. M., Lee, S.-G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information Management, 41(6), 707–718.
Li, J., Wang, G. A., & Chen, H. (2011). Identity matching using personal and social identity features. Information Systems Frontiers, 13(1), 101–113.
Li, X. (2008). The criminal phenomenon on the internet: Hallmarks of criminals and victims revisited through typical cases prosecuted. University of Ottawa Law & Technology Journal, 5(1–2), 125–140.
McCarron, M. C. (2004). Management of Internet Fraud by law enforcement agencies. Canadian Journal of Police and Security Services, 2(4), 249.
McGuire, M. (2012). Organised crime in the digital age. London: John Grieve Centre for Policing and Security.
Messerschmidt, J. W. (1993). Masculinities and crime: Critique and reconceptualization of theory: Rowman & Littlefield Publishers.
Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767–772.
Neilson, W. S., & Winter, H. (1997). On criminals' risk attitudes. Economics Letters, 55(1), 97–102.
Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773.
Pahnila, S., Siponen, M., & Mahmood, A. Employees' behavior towards IS security policy compliance. In System sciences, 2007. HICSS 2007. 40Th annual hawaii international conference on, 2007 (pp. 156b-156b): IEEE
Peduzzi, P., Concato, J., Kemper, E., Holford, T. R., & Feinstein, A. R. (1996). A simulation study of the number of events per variable in logistic regression analysis. Journal of Clinical Epidemiology, 49(12), 1373–1379.
Pfleeger, C. P., & Pfleeger, S. L. (2002). Security in computing: Prentice hall Professional technical reference.
Post, G. V., & Kagan, A. (2007). Evaluating information security tradeoffs: Restricting access can interfere with user tasks. Computers & Security, 26(3), 229–237.
Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296.
Ryan, K. V., & Krotoski, M. L. (2012). Caution advised: Avoid undermining the legitimate needs of law enforcement to solve crimes involving the internet in amending the electronic communications privacy act. USFL Rev., 47, 291.
Smith, G. P., & Urbas, G. (2004). Cyber criminals on trial. Criminal Justice Matters, 58(1), 22–23.
Smith, D. A., Visher, C. A., & Davidson, L. A. (1984). Equity and discretionary justice: The influence of race on police arrest decisions. The Journal of Criminal Law and Criminology (1973-), 75(1), 234–249.
Soper, D. S., Demirkan, H., & Goul, M. (2007). An interorganizational knowledge-sharing security model with breach propagation detection. Information Systems Frontiers, 9(5), 469–479.
Standler, R. B. (2002). Computer crime. Retrieved February, 6, 2005.
Stanton, J. M., Stam, K. R., Guzman, I., & Caledra, C. Examining the linkage between organizational commitment and information security. In Systems, Man and Cybernetics, 2003. IEEE International Conference on, 2003 (Vol. 3, pp. 2501–2506): IEEE
Stevenson. (2000). Computer fraud: Detection and prevention. Computer Fraud & Security, 2000(11), 13–15.
Stevenson. (2005). Plugging the" phishing" hole: Legislation versus technology. Duke L. & Tech. Rev., 2005, 6–26.
Sullivan, R. J. (2010). The changing nature of US card payment fraud: Industry and public policy options. Economic Review-Federal Reserve Bank of Kansas City, 95(2), 101.
Thornton, D., Gunningham, N. A., & Kagan, R. A. (2005). General deterrence and corporate environmental behavior. Law & Policy, 27(2), 262–288.
Wall, D. (2003). 1 cybercrimes and the internet. Crime and the Internet, 1.
Wang, J., Gupta, M., & Rao, H. R. (2015). Insider threats in a financial institution: Analysis of attack-proneness of information systems applications. MIS Quarterly, 39(1), 91–112.
Weisheit, R., & Mahan, S. (1988). Women, crime, and criminal justice: Anderson Cincinnati.
Williams, K. R., & Hawkins, R. (1986). Perceptual research on general deterrence: A critical review. Law and Society Review, 545–572.
Willison, R. (2006). Understanding the offender/environment dynamic for computer crimes. Information Technology & People, 19(2), 170–186.
Willison, R., & Backhouse, J. (2006). Opportunities for computer crime: Considering systems risk from a criminological perspective. European Journal of Information Systems, 15(4), 403–414.
Yar, M. (2005). The novelty of ‘cybercrime’ an assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Funding
This research has been funded in part by the National Science Foundation under grants # 1523174, #1554373, 1,227,353 and # 1419856. We acknowledge the comments of the guest editors and referees that have considerably increased the clarity of the paper.
Appendix
Appendix
We tested Spearman rank correlation for characteristics of the offender and characteristics of the offense. Including the dependent variable (probability of arrest), all independent variables are binary except for age. The result listed here indicate all other variables are well below the .5 threshold for multicollinearity problem to run regression except for centered age and centered age square. Having a high multicollinearity is normal between a variable and its quadratic term, and by employing centering, multicollinearity is brought down to .5, which is considered to be an acceptable level (Allison 2012).
Rights and permissions
About this article
Cite this article
Liao, R., Balasinorwala, S. & Raghav Rao, H. Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests. Inf Syst Front 19, 443–455 (2017). https://doi.org/10.1007/s10796-017-9752-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-017-9752-4