Skip to main content

Advertisement

Log in

Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

Previous studies on fighting computer-assisted frauds have attempted to assist law enforcement agencies (LEAs) to better understand important aspects of motivation, opportunity and deterrence. However, there have been few empirical studies on the profiles of convicted offenders, post detection. This paper examines characteristics of frauds and their associated respective law enforcement response with particular emphasis on frauds facilitated by information technology. The findings show how the prosecution and conviction of the offenders differ among commonly-seen types of computer assisted frauds, and bring new evidence to the common association of gender and crime, severity and punishment, etc. The findings may help LEAs and legislative bodies to evaluate their current practices from the point of restorative social justice.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. http://www.telegraph.co.uk/news/2016/07/21/one-in-people-now-victims-of-cyber-crime/

  2. https://www.theguardian.com/technology/2013/oct/30/online-fraud-costs-more-than-100-billion-dollars

  3. https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion

  4. https://www.scamwatch.gov.au/types-of-scams/unexpected-money/nigerian-scams

  5. https://www.ali.org/publications/show/model-penal-code

  6. Federal Bureau of Investigation. “Ten-Year Arrest Trends, by Sex, 2003–2012”.

  7. In Section 2.2, ‘Classifying Offenses’, under NIBRS User Manual.

  8. The NIBRS User Manual contains detailed definition and examples of Group A offense and Group B offense.

  9. SAS 9.2 User’s Guide, Second Edition

  10. Note – Typically, offenders are above 14 years of age.

References

  • Agnew, R., & Brezina, T. (2001). Juvenile delinquency: Causes and control. Los Angeles: Roxbury Publishing Company.

    Google Scholar 

  • Albrecht, W.S., Wernz, G.W., Williams, T.L. (1995). Fraud: Bringing light to the dark side of business. Irwin Professional Pub.

  • Albrechtsen, E. (2007). A qualitative study of users' view on information security. Computers & Security, 26(4), 276–289.

    Article  Google Scholar 

  • Allison, P.D. (2012). Logistic regression using SAS: Theory and application. SAS Institute.

  • Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.

    Google Scholar 

  • Atoum, I., Otoom, A., & Abu Ali, A. (2014). A holistic cyber security implementation framework. Information Management & Computer Security, 22(3), 251–264.

    Article  Google Scholar 

  • Baker, C. R. (1999). An analysis of fraud on the internet. International Rescuer, 9(5), 348–360.

    Google Scholar 

  • Barker, K. J., D'Amato, J., & Sheridon, P. (2008). Credit card fraud: Awareness and prevention. Journal of financial crime, 15(4), 398–410.

    Article  Google Scholar 

  • Bequai, A. (1978). Computer crime. Citeseer.

    Google Scholar 

  • Bequai, A. (1983). How to prevent computer crime: A guide for managers. Wiley.

  • Bequai, A. (2000). America’s internet commerce and the threat of fraud. Computers & Security, 19(8), 688–691.

    Article  Google Scholar 

  • Bernard, T. J., & Engel, R. S. (2001). Conceptualizing criminal justice theory. Justice Quarterly, 18(1), 1–30.

    Article  Google Scholar 

  • Brenner, S. W. (2004). US cybercrime law: Defining offenses. Information Systems Frontiers, 6(2), 115–132.

    Article  Google Scholar 

  • Brenner, S. W., & Schwerha, J. J. (2004). Introduction—Cybercrime: A note on international issues. Information Systems Frontiers, 6(2), 111–114.

    Article  Google Scholar 

  • Brown, C. S. (2015). Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology, 9(1), 55.

    Google Scholar 

  • Burns, R. G., Whitworth, K. H., & Thompson, C. Y. (2004). Assessing law enforcement preparedness to address internet fraud. Journal of Criminal Justice, 32(5), 477–493.

    Article  Google Scholar 

  • Carter, D. L., & Katz, A. J. (1996). Computer crime: An emerging challenge for law enforcement. FBI Law Enforcement Bulletin, 65(12), 1–8.

    Google Scholar 

  • Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet: Academic press.

  • Chan, M., Woon, I., & Kankanhalli, A. (2005). Perceptions of information security in the workplace: Linking information security climate to compliant behavior. Journal of information privacy and security, 1(3), 18–41.

    Article  Google Scholar 

  • Choi, K.-S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308.

    Google Scholar 

  • Chua, C. E. H., & Wareham, J. (2004). Fighting internet auction fraud: An assessment and proposal. Computer, 37(10), 31–37.

    Article  Google Scholar 

  • Clarke, R. V. G., & Felson, M. (1993). Routine activity and rational choice (Vol. 5): Transaction publishers.

  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 588–608.

  • Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90–101.

    Article  Google Scholar 

  • D'Alessio, S. J., & Stolzenberg, L. (2003). Race and the probability of arrest. Social Forces, 81(4), 1381–1397.

    Article  Google Scholar 

  • D'Arcy, J., & Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43(6), 1091–1124.

    Article  Google Scholar 

  • D'Arcy, J., & Hovav, A. (2004). The role of individual characteristics on the effectiveness of IS security countermeasures. AMCIS 2004 PRO, 176.

  • D’Arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89(1), 59–71.

    Article  Google Scholar 

  • Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 386.

    Google Scholar 

  • Dodge, R. C., Carver, C., & Ferguson, A. J. (2007). Phishing for user security awareness. Computers & Security, 26(1), 73–80.

    Article  Google Scholar 

  • Dolan, K. M. (2004). Internet auction fraud: The silent victims. Journal of Economic Crime Management, 2(1), 1–22.

    Google Scholar 

  • Farahmand, F., & Spafford, E. H. (2013). Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers, 15(1), 5–15.

    Article  Google Scholar 

  • Gottschalk, P. (2010). Knowledge management technology for organized crime risk assessment. Information Systems Frontiers, 12(3), 267–275.

    Article  Google Scholar 

  • Hansen, K. (2003). Education and the crime-age profile. British Journal of Criminology, 43(1), 141–168.

    Article  Google Scholar 

  • Heidensohn, F., Rock, P., McIntosh, M., Smart, C., & Smart, C. (1977). Women, crime and criminology. JSTOR.

  • Heinze, G. (1999). The application of Firth’s procedure to cox and logistic regression. In Technical report 10. Vienna: Department of Medical Computer Sciences, Section of Clinical Biometrics, Vienna University.

    Google Scholar 

  • Heinze, G., & Puhr, R. (2010). Bias-reduced and separation-proof conditional logistic regression with small or sparse data sets. Statistics in Medicine, 29(7–8), 770–777.

    Article  Google Scholar 

  • Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165.

    Article  Google Scholar 

  • Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3–22.

    Article  Google Scholar 

  • Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization: Ballinger Cambridge.

  • Hittle, B. D. (2001). Uphill battle: The difficulty of deterring and detecting perpetrators of internet stock fraud. An. Fed. Comm. LJ, 54, 165.

    Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25.

    Article  Google Scholar 

  • Howard, R. (2009). Cyber fraud: Tactics, techniques and procedures: CRC press.

  • Jackson, J. E. (1994). Fraud masters: Professional credit card offenders and crime. Criminal Justice Review, 19(1), 24–55.

    Article  Google Scholar 

  • Karmen, A. (2012). Crime victims: An introduction to victimology: Cengage learning.

    Google Scholar 

  • Kauffman, R. J., & Wood, C. A. (2003). An investigation of premium bidding in online auctions. University of Minnesota MISRC Working Paper, 304.

  • Kellermann, T. (2010). Building a foundation for global cybercrime law enforcement. Computer Fraud & Security, 2010(5), 5–8.

    Article  Google Scholar 

  • King, G., & Zeng, L. (2001). Logistic regression in rare events data. Political Analysis, 9(2), 137–163.

    Article  Google Scholar 

  • Koops, B.-J., Leenes, R., Meints, M., Van der Meulen, N., & Jaquet-Chiffelle, D.-O. (2009). A typology of identity-related crime: Conceptual, technical, and legal issues. Information, Communication & Society, 12(1), 1–24.

    Article  Google Scholar 

  • Lee, S. M., Lee, S.-G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information Management, 41(6), 707–718.

    Article  Google Scholar 

  • Li, J., Wang, G. A., & Chen, H. (2011). Identity matching using personal and social identity features. Information Systems Frontiers, 13(1), 101–113.

    Article  Google Scholar 

  • Li, X. (2008). The criminal phenomenon on the internet: Hallmarks of criminals and victims revisited through typical cases prosecuted. University of Ottawa Law & Technology Journal, 5(1–2), 125–140.

    Google Scholar 

  • McCarron, M. C. (2004). Management of Internet Fraud by law enforcement agencies. Canadian Journal of Police and Security Services, 2(4), 249.

    Google Scholar 

  • McGuire, M. (2012). Organised crime in the digital age. London: John Grieve Centre for Policing and Security.

    Google Scholar 

  • Messerschmidt, J. W. (1993). Masculinities and crime: Critique and reconceptualization of theory: Rowman & Littlefield Publishers.

  • Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767–772.

    Article  Google Scholar 

  • Neilson, W. S., & Winter, H. (1997). On criminals' risk attitudes. Economics Letters, 55(1), 97–102.

    Article  Google Scholar 

  • Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773.

    Google Scholar 

  • Pahnila, S., Siponen, M., & Mahmood, A. Employees' behavior towards IS security policy compliance. In System sciences, 2007. HICSS 2007. 40Th annual hawaii international conference on, 2007 (pp. 156b-156b): IEEE

  • Peduzzi, P., Concato, J., Kemper, E., Holford, T. R., & Feinstein, A. R. (1996). A simulation study of the number of events per variable in logistic regression analysis. Journal of Clinical Epidemiology, 49(12), 1373–1379.

    Article  Google Scholar 

  • Pfleeger, C. P., & Pfleeger, S. L. (2002). Security in computing: Prentice hall Professional technical reference.

    Google Scholar 

  • Post, G. V., & Kagan, A. (2007). Evaluating information security tradeoffs: Restricting access can interfere with user tasks. Computers & Security, 26(3), 229–237.

    Article  Google Scholar 

  • Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296.

    Article  Google Scholar 

  • Ryan, K. V., & Krotoski, M. L. (2012). Caution advised: Avoid undermining the legitimate needs of law enforcement to solve crimes involving the internet in amending the electronic communications privacy act. USFL Rev., 47, 291.

    Google Scholar 

  • Smith, G. P., & Urbas, G. (2004). Cyber criminals on trial. Criminal Justice Matters, 58(1), 22–23.

    Article  Google Scholar 

  • Smith, D. A., Visher, C. A., & Davidson, L. A. (1984). Equity and discretionary justice: The influence of race on police arrest decisions. The Journal of Criminal Law and Criminology (1973-), 75(1), 234–249.

    Article  Google Scholar 

  • Soper, D. S., Demirkan, H., & Goul, M. (2007). An interorganizational knowledge-sharing security model with breach propagation detection. Information Systems Frontiers, 9(5), 469–479.

    Article  Google Scholar 

  • Standler, R. B. (2002). Computer crime. Retrieved February, 6, 2005.

    Google Scholar 

  • Stanton, J. M., Stam, K. R., Guzman, I., & Caledra, C. Examining the linkage between organizational commitment and information security. In Systems, Man and Cybernetics, 2003. IEEE International Conference on, 2003 (Vol. 3, pp. 2501–2506): IEEE

  • Stevenson. (2000). Computer fraud: Detection and prevention. Computer Fraud & Security, 2000(11), 13–15.

    Article  Google Scholar 

  • Stevenson. (2005). Plugging the" phishing" hole: Legislation versus technology. Duke L. & Tech. Rev., 2005, 6–26.

    Google Scholar 

  • Sullivan, R. J. (2010). The changing nature of US card payment fraud: Industry and public policy options. Economic Review-Federal Reserve Bank of Kansas City, 95(2), 101.

    Google Scholar 

  • Thornton, D., Gunningham, N. A., & Kagan, R. A. (2005). General deterrence and corporate environmental behavior. Law & Policy, 27(2), 262–288.

    Article  Google Scholar 

  • Wall, D. (2003). 1 cybercrimes and the internet. Crime and the Internet, 1.

  • Wang, J., Gupta, M., & Rao, H. R. (2015). Insider threats in a financial institution: Analysis of attack-proneness of information systems applications. MIS Quarterly, 39(1), 91–112.

    Google Scholar 

  • Weisheit, R., & Mahan, S. (1988). Women, crime, and criminal justice: Anderson Cincinnati.

    Google Scholar 

  • Williams, K. R., & Hawkins, R. (1986). Perceptual research on general deterrence: A critical review. Law and Society Review, 545–572.

  • Willison, R. (2006). Understanding the offender/environment dynamic for computer crimes. Information Technology & People, 19(2), 170–186.

    Article  Google Scholar 

  • Willison, R., & Backhouse, J. (2006). Opportunities for computer crime: Considering systems risk from a criminological perspective. European Journal of Information Systems, 15(4), 403–414.

    Article  Google Scholar 

  • Yar, M. (2005). The novelty of ‘cybercrime’ an assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruochen Liao.

Ethics declarations

Funding

This research has been funded in part by the National Science Foundation under grants # 1523174, #1554373, 1,227,353 and # 1419856. We acknowledge the comments of the guest editors and referees that have considerably increased the clarity of the paper.

Appendix

Appendix

We tested Spearman rank correlation for characteristics of the offender and characteristics of the offense. Including the dependent variable (probability of arrest), all independent variables are binary except for age. The result listed here indicate all other variables are well below the .5 threshold for multicollinearity problem to run regression except for centered age and centered age square. Having a high multicollinearity is normal between a variable and its quadratic term, and by employing centering, multicollinearity is brought down to .5, which is considered to be an acceptable level (Allison 2012).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liao, R., Balasinorwala, S. & Raghav Rao, H. Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests. Inf Syst Front 19, 443–455 (2017). https://doi.org/10.1007/s10796-017-9752-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-017-9752-4

Keywords

Navigation