Abstract
A significant percentage of the populace do not consider or understand “what and how” cybercrime is committed, nor how they might be a victim of it, and many fear they might unconsciously be part of the process, i.e. they don’t understand how to behave online. Reducing the opportunities for cybercrime is not a simple task. It will require co-operation between many players, and fundamental changes in common attitudes and practices. When considering legal implications of the misuse of technologies, it is worth noting that crossing national borders results in a change in the laws that people are subject to. Some countries do not consider hacking and online identity theft as high priority crimes. Similarly, the technological divide leaves gaps in the laws in those countries that are less technologically advanced. The aim of this chapter is to examine the relationship between online behaviour and computer victimisation. Understanding the trends of cybercrime and the strategies employed by cyber criminals in order to commit cybercrime will help to identify the steps that needs be taken to prevent such criminal activities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
APPG, 2007.” Identity_ Fraud Report12. Available online: http://www.idfraud.org.uk [Access Oct.2010].
BBC, Thursday, 21 January 2010 “Young Facing online Fraud Risks http://news.bbc.co.uk/1/hi/business/8470631.stm. [Accessed March 2011]
Bennett, Richard R. 1991. Routine Activities: A Cross- National Assessment of a Criminological Perspective. Social Forces, 70: pp 147–163.
Bainbridge, D., (2007).”Criminal law tackles computer fraud and misuse”. Computer Law & Security Report. 23(3) pp. 276–281.
Brantingham, P.L., and Brantingham, P.J,. (1991). Notes on the geometry of crime, in Environmental Criminology, USA: Wavelend Press Inc.
Brantingham, P.J., and Brantingham, P.L. (1984) Patterns in crime. New York: Macmillan.
Castells, M. (2002). The internet galaxy: Reflections on the Internet, business, and society. Oxford, United Kingdom: Oxford University Press.
Calson Analytics (2004). cybercafés and telecentres. (http://www.calson.com.au/cafenote.htm. [Accessed Feb. 2011]
Chance, T., (2005), The Hacker Ethic and Meaningful Work. MA Philosophy candidate University of Reading
Choi, Choi-shick Computer Crime Victimization and Integrated Theory: An Empirical Assessment, International Journal of Cyber Criminology, 0974 – 2891 January-June 2008, Vol 2 (1): 308–333
Cohen, L. E., & Felson, M., (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, pp 588–608
Cohen, L. E., Felson, M., & Land, K, (1981). Social inequality and predatory criminal victimisation: An exposition and a test of a formal theory. American Sociological Review, 46, pp 505–524.
Fafinski S. &Minassian N.; (2009) “UK Cybercrime Report”. Invenio Research. Garlic powerful stuff.
http://www.garlik.com/press.php?id=613-GRLK_PRD [Accessed Feb 2010]
Fafinski, S. & Minassian, N., (2008). UK Cybercrime Report. Garlik Power Stuff. London. http://www.garlik.com/static_pdfs/cybercrime_report_2008.pdf {Accessed May 2011]
Farrell, G. et al. 2005 “Of Targets and Supertargets: A routine Activity Theory of High Crime Rates” Internet Journal of Criminology(IJC). http://www.internetjournalofcriminology.com/Farrell,%20Clark,%20Ellingworth%20&%20Pease%20-%20Supertargets [Accessed April 2011]
Holt et al, (2009). Examining the applicability of lifestyle-routine activity theory for cybercrime victimisation. Deviant Behaviour, 30: pp 1–25.
Hamid Jahankhani, Ameer Al-Nemrat, Cybercrime victimisations/ criminalisation and Punishment, 6th International Conference on Global Security, Safety and Sustainability, Communications in Computer and Information Science, CCIS, Springer Proceedings of the 6th ICGS3- 10, 1–3 September 10, Braga, Portual.
Leyden, J. (2007). UK.gov lambasted for ignoring peers’ cybercrime report”, Channel & Register. http://m.channelregister.co.uk/2007/10/30/ukgov_cybercrime_response [Accessed March 2011]
Miethe, Terance; Stafford, Mark C.; and Long, J. Scott. 1987. Social Differentiation in Criminal Victimisation: A Test of Routine Activities/ Life style Theories. American Sociological Review, 52:pp 184–194.
McConnell Report, (2000). Cyber Crime and Punishment? Archaic Laws Threaten Global Information. www.mcconnellinternational.com [Accessed March 2011]
Mohammad L.; A, (2008). Cybercafé Systems Security. Security and Software for cybercafé, 1–17. Ed. Esharenana E. Adomi. IGI Global
Pease, K. (2001).” Crime future and foresight”, In Wall, D.S. (Ed) Crime and the Internet. London, Routledge.
Piazza, P. (2006). Technofile:Antisocial networking sites. Security Management, 1–5.
Rowlingston, R., 2007. Towards A Strategy for E-Crime Prevention. IN ICGeS Global e Security. 3rd edn. London
Rosenblatt, K. S. (1996), High-technology crime. San Jose, CA: KSK.
Sukhai N. B, 2004, “ Hacking and Cybercrime”, Information Security Curriculum Development. 1(1): 128–132.
Sommer, P., (2004). The future for the policing cybercrime. Computer Fraud & Security. 2004(1):pp 8–12.
Symantec Global Internet Security Threat Report Trends for 2008 (A); Volume XIV, Published April 2009 http://eval.symantec.com/mktginfo/enterprise/white_papers/bwhitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf [Accessed May 2011]
Symantec Report on Rogue Security Software, July 08 – June 09 (B), Published October 2009 http://eval.symantec.com/mktginfo/enterprise/white_papers/bsymc_report_on_rogue_security_software_WP_20100385.en-us.pdf [Accessed Jan 2011]
Tiernan, B. (2000). E-tailing. Chicago: Dearborn.
Wall, D. (2007), Hunting Shooting, and Phishing: New Cybercrime Challenges for Cybercanadians in The 21st Century. The ECCLES Centre for American Studies.http://bl.uk/ ecclescentre 2009
Waren, P., (2007).”Lack of concern over growing cybercrime angers UK Businesses”, The Guardian, Thursday July 19. 2007. Available at: www.guardian.co.uk/technology/2007/jul/19/crime.gurdianweeklytechnologysection
Williams, K.S., (2008). “Using Title’s Control Balance Theory to understand computer crime and deviance”, International Review of Law Computers & Technology. 22(1), pp. 145–155.
Willison, R., (2006). Understanding the offender/environment dynamic for computer crimes. Information technology and people, 19 (2), pp. 170–186.
Willison, R., (2006). Understanding the perpetration of employee computer crime in the organizational context.http://ir.lib.cbs.dk/downloaded/ISBN/x656517364.pdf [Accessed March
2011]
Yar, M. (2006). Cybercrime And Society. Sage Publication Ltd. London
Yar, M (2005). The Novelty of “Cybercrime”: An Assessment in Light of Routine Activity Theory. European Journal of Criminology 2005; 2; 407
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag London Limited
About this chapter
Cite this chapter
Jahankhani, H., Al-Nemrat, A. (2011). Cybercrime Profiling and Trend Analysis. In: Akhgar, B., Yates, S. (eds) Intelligence Management. Advanced Information and Knowledge Processing. Springer, London. https://doi.org/10.1007/978-1-4471-2140-4_12
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2140-4_12
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-2139-8
Online ISBN: 978-1-4471-2140-4
eBook Packages: Computer ScienceComputer Science (R0)