Theories of cybercrime pdf

The nature, causes and consequences of cyber crime in. All content in this area was uploaded by jaishankar karuppannan on jun 20, 2017. Cybercrimes can be easily placed into two categories. Theories and managing in this unit, i learned that cybercrime refers to activities in which computers, telephones, cellular equipment and other technological devices are used for illicit purposes. Criminologists have used two primary theories to examine cybercrime. I felt the need for a separate theory of cyber crimes because the general theoretical explanations were found to be inadequate as an overall explanation for the. The theories rely on logic to explain why a person commits a crime and whether the criminal act is the result of a rational decision, internal predisposition or external aspects. Driven by constant and remarkable technological innovation, the internet has increasingly changed the routine activities of americans. Some researchers have tried to explain cyber crimes with traditional theories such as social learning theory skinner and fream 1997. To examine why criminals prefer to commit crimes in cyberspace. Cyber criminology as an academic discipline international journal. A theoretical and empirical analysis eric rutger leukfeldta and majid yarb aopen university of the netherlands, heerlen, the netherlands, nhl university of applied sciences, leeuwarden, the netherlands, dutch police academy, apeldoorn, the netherlands. Ethnicity is a key to the alien conspiracy theory of the organized crime phenomenon. Future studies of cybercrime victimization may draw benefit from using a combination of these theories to explore the problem.

There are numerous theories of crime, and the video lessons presented here outline many of. Our initial concern will therefore be the analysis of article 22 of the convention on cybercrime, first discussing general jurisdiction theories and then the theories applied by the convention, together with other issues dealt with in the article. Cyber criminology and space transition theory international. They form an integral part of sociological research as it is a general principle that explains or predict facts, observation or events. I felt the need for a separate theory of cyber crimes because the general theoretical explanations were found to be inadequate as an overall explanation for the phenomenon of cyber crimes. A social learning theory analysis of computer crime among. Listed in prevalence of cybercrime perpetrators, nigeria, the uk and the usa in ascending order of significance are on top of the league table iccc, 2006, iccc, 2008, iccc, 2009, iccc, 2010. Abstract page 183 the internet and the criminal behaviour it transforms cybercrime pose. Many theories have emerged over the years, and they continue to be explored, individually and in combination, as criminologists seek the best solutions in ultimately reducing types and levels of crime. Textbook that covers different forms of cybercrime separate chapters on each form of cybercrime, cyber legislation, and the challenges that domestic and international law enforcement have in responding to cybercrime. Psychological theories of crime and delinquency 229 that behavior is determined by the person and their environmentin time and space, the thrust of this theory focused on how behavior is shaped by experience. Since criminology has started viewing the emergence of cyberspace as a new locus of criminal activity, a new theory is needed to explain why cyber crime occurs. Theories and causes of crime introduction there is no one cause of crime.

Cyber crime and cyber terrorism 330 hudson street, ny ny 100 fourth edition robert w. This paper explains theories of crime and tells the causes of deviation and also the way of treatment and setting right the deviation. The space transition theory presented above provides an explanation for the criminal behavior in the cyberspace. Computer crime the general heading of computer crime can potentially cover an array of offenses. A general theory of crime and patterns of crime in nigeria 503 trol on crime reporting and crime control by stating, it is clear that the informal procedure of crime control is applied in most cases, ex cept in the serious cases or in case of strang ers who are in no relationship with their victim. Specific examples of online crime such as hacking, malware, identity theft, child pornography and cyberbullying are dealt with in some detail in later chapters. In criminology, examining why people commit crime is very important in the ongoing debate of how crime should be handled and prevented. Computer crime has become a global issue and continues to rapidly grow.

By examining several existing definitions of computer crime, as well as elements suggested as essential to a uniform definition, a better understanding of what computer crime entails will be created. Using a panel of 2,751 korean youths, the current study examined whether low selfcontrol theory can. Gottfredson and hirschis1990 general theory of crime and akers 1998 social learning theory. Connecting with friends and family, shopping, banking, media consumption, and other daily activities of individuals. Functionalism theory, marxian theory, routine activity theory and technology enabled crime theory were all found to be relevant to nigerian cybercrime. Pdf some researchers have tried to explain cyber crimes with traditional theories such as social learning theory skinner and fream 1997. Jason was requested by the dod to examine the theory and practice of cybersecurity, and evaluate whether there are underlying fundamental principles that would make it possible to adopt a more scientific approach, identify what is needed in creating a science of cybersecurity, and recommend specific ways in which scientific methods can be. Low selfcontrol, deviant peer associations, and juvenile. Wall, criminology, sass, durham university, 32 old elvet, durham, dh1 3hn, uk. His friend downloads the latest version of an antivirus software program, which. At the level of existing laws, the study established that there are no existing laws in the nigerian statues that. There are many scholars who attempted to address the causation of cyber crimes with traditional theories such as social learning theory, routine activities theory and drift and neutralization theory. Theories of crime and deviance boundless sociology. The authors also examine the etiology of computer crime by testing the ability of social learning theory to explain these behaviors.

To examine the space transition theory of cyber crimes. Theories of crime chapter summary and learning objectives. The discussion of the two theories contributes to the understanding of frauds especially by forensic accountants, auditors, fraud examiners and other antifraud bodies. Cybercrime research will be important to our understanding of crime as our society becomes more and more dependent on technology. Bandura 1969 discussed the principles of modifying behavior using social learning theory. Theoretical perspective in sociological analysis, theories are indispensable. Pdf space transition theory of cyber crimes researchgate.

Choice theory 49 routine activities 50 deterrence theory 52 psychological theories 53 moral development and crime 53 personality disorders 54. I felt the need for a separate theory of cyber crimes because the general theoretical explanations were found to be inadequate as an overall explanation for the phenomenon of cyber crimes jaishankar 2008. The central question of this article is whether routine activity theory rat can be used as an analytical framework to study cybercrimes. Many people may think that cybercrime is too technical to understand. International journal of cyber criminology james bowers, jr. The study also serves as guidance for further fraud related research. The growing global threat of economic and cyber crime the national fraud center, inc. Gottfredson and hirschi 1990 argue that those with low selfcontrol tend to be impulsive, insensitive, short sighted, risk takers who are. Speer 2000, states that computers are the most predominant form of information and communication technology used to commit cybercrime. I have developed a theory called space transition theory in order to explain the causation of crimes in the cyberspace. To understand how people behave differently when they move from physical space to cyber space. The term crime does not, in modern criminal law, have any simple and universally accepted definition,1 though statutory definitions have been provided for certain purposes. The core of the psychology of cybercrime seeks to address both the theory of crime and the question of forensic psychologys contribution to the understanding of cybercrime.

The title cybercrime in progress captures the essence of cybercrime. Pdf i have developed a theory called space transition theory in order to explain the causation of crimes in the cyberspace. The law and judicial system is structured around use of these theories. Claims that people are influenced to not commit crime by external environmental factors combines with internal factors. Many criminologists argue, however, that available empirical.

People are contained from committing cybercrime by organizational and social factors governing ethical and legal use of it. This paper sets out with the aim of developing and improving upon existing taxonomies used in cybercrime scholarship. Cybercrime is first and foremost a crime and hence, possesses the very fundamental genetics of traditional crime. Most of the cybercrimes are nonviolent offenses, because of the fact that. At the level of existing laws, the study established that there are no existing laws in the nigerian statues that directly address cybercrime. Routine activity theory and the determinants of high cybercrime. Policing cybercrime criminology oxford bibliographies. Cybercrime and criminological theory cognella most criminological theories were developed to account for street cybercrime and criminological theory gives direct insight into the rates and prevalence of cybercrime offenses using data sets from populations cybercrime and criminological theory can be used in courses in criminology. Using multiple regression procedures, they demonstrate that measures of differential association, differential reinforcement and punishment, definitions, and sources of imitation are significantly related to. A sociotechnological analysis of cybercrime and cyber.

Crime is a highly complex phenomenon that changes across cultures and across time. Chapter 2 theories of organized criminal behavior 61 commission exists whose function is to arbitrate disputes between families and assign territory discussed later in the chapter. Pdf establishing a theory of cyber crimes researchgate. Social learning theory, selfcontrol theory, and subcultural theories have garnered much empirical attention and support. The growing global threat of economic and cyber crime. Jurisdiction in cyberspace century and a half to include more of jus cogens. An examination of the impact of criminological theory on. Sociological theories of deviance are those that use social context and social pressures to explain deviance. This theory, which integrates elements from existing criminological theories, also describes why online offenders continue and escalate their behaviours, and why they stop. Key words fraud, fraud diamond theory, fraud triangle theory, forensic accounting. In their interpretation, computer crime is the re sult of offenders perceiving opportunities to in vade computer systems to achiev e criminal ends or use computers as instruments of crime. Using a panel of 2,751 korean youths, the current study examined whether low selfcontrol theory can be useful as a theoretical framework for explaining. Situating the public police in networks of security within cyberspace revised feb.

1047 793 1498 132 576 193 1460 1067 1123 638 1623 983 1438 954 537 874 1066 1021 849 1194 1490 213 62 1537 196 1271 1313 1432 198 1099 1366 360 604 1258 1410 597