Skip to main content

2018 | OriginalPaper | Buchkapitel

Combating Cyber Victimisation: Cybercrime Prevention

verfasst von : Abdelrahman Abdalla Al-Ali, Amer Nimrat, Chafika Benzaid

Erschienen in: Cyber Criminology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The global penetration of networked communications has exposed different areas of society to the threats of cybercrimes. These levels of society include, but are not limited to, nations and communities. Today, individual organisations and governments are significantly more likely to be victimised through the use of information and communications technologies than experience conventional forms of victimisation (UNODC 2013).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Agate, J., & Ledward, J. (2013). Social media: How the net is closing in on cyber bullies. Entertainment Law Review, 24(8), 263–268. Agate, J., & Ledward, J. (2013). Social media: How the net is closing in on cyber bullies. Entertainment Law Review, 24(8), 263–268.
Zurück zum Zitat Agustina, J. R. (2015). Understanding cyber victimisation: Digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 9(1), 35. Agustina, J. R. (2015). Understanding cyber victimisation: Digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 9(1), 35.
Zurück zum Zitat Akhgar, B., & Yates, S. (Eds.). (2013). Strategic intelligence management: National security imperatives and information and communications technologies. Waltham: Butterworth-Heinemann. Akhgar, B., & Yates, S. (Eds.). (2013). Strategic intelligence management: National security imperatives and information and communications technologies. Waltham: Butterworth-Heinemann.
Zurück zum Zitat Barker, R. A. (2012). An examination of organizational ethics. Human Relations, 55(9), 1097–1116.CrossRef Barker, R. A. (2012). An examination of organizational ethics. Human Relations, 55(9), 1097–1116.CrossRef
Zurück zum Zitat Bonanno, R. A., & Hymel, S. (2013). Cyber bullying and internalizing difficulties: Above and beyond the impact of traditional forms of bullying. Journal of Youth and Adolescence, 42(5), 685–697.CrossRef Bonanno, R. A., & Hymel, S. (2013). Cyber bullying and internalizing difficulties: Above and beyond the impact of traditional forms of bullying. Journal of Youth and Adolescence, 42(5), 685–697.CrossRef
Zurück zum Zitat Chawki, M. (2005). A critical look at the regulation of cybercrime. The ICFAI Journal of Cyberlaw, IV(4), 1–56. Chawki, M. (2005). A critical look at the regulation of cybercrime. The ICFAI Journal of Cyberlaw, IV(4), 1–56.
Zurück zum Zitat Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588–608.CrossRef Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588–608.CrossRef
Zurück zum Zitat Dredge, R., Gleeson, J., & de la Piedad Garcia, X. (2014). Cyberbullying in social networking sites: An adolescent victim’s perspective. Computers in Human Behavior, 36(0), 13–20.CrossRef Dredge, R., Gleeson, J., & de la Piedad Garcia, X. (2014). Cyberbullying in social networking sites: An adolescent victim’s perspective. Computers in Human Behavior, 36(0), 13–20.CrossRef
Zurück zum Zitat Edwards, L. (2012). Defining the ‘object’ of public relations research: A new starting point. Public Relations Inquiry, 1(1), 7–30.CrossRef Edwards, L. (2012). Defining the ‘object’ of public relations research: A new starting point. Public Relations Inquiry, 1(1), 7–30.CrossRef
Zurück zum Zitat Forte, D. (2002). Analyzing the difficulties in backtracing onion router traffic. International Journal of Digital Evidence, 1(3), 1–7. Forte, D. (2002). Analyzing the difficulties in backtracing onion router traffic. International Journal of Digital Evidence, 1(3), 1–7.
Zurück zum Zitat Frith, U., & Frith, C. D. (2003). Development and neuropsychology of mentalizing. Philosophical Transactions of the Royal Society. Biological Sciences, 358, 459–473.CrossRef Frith, U., & Frith, C. D. (2003). Development and neuropsychology of mentalizing. Philosophical Transactions of the Royal Society. Biological Sciences, 358, 459–473.CrossRef
Zurück zum Zitat Gercke, M. (2007). Cyberterrorism. How terrorists use the internet (p. 62). Computer und Recht. Gercke, M. (2007). Cyberterrorism. How terrorists use the internet (p. 62). Computer und Recht.
Zurück zum Zitat Giordano, S. M. (2004). Electronic evidence and the law. Information Systems Frontiers, 6(2), 161–174.CrossRef Giordano, S. M. (2004). Electronic evidence and the law. Information Systems Frontiers, 6(2), 161–174.CrossRef
Zurück zum Zitat Goodno, N. H. (2007). CS, a new crime: Evaluating the effectiveness of current state and federal laws. Missouri Law Review, 72, 125–197. Goodno, N. H. (2007). CS, a new crime: Evaluating the effectiveness of current state and federal laws. Missouri Law Review, 72, 125–197.
Zurück zum Zitat Hazelwood, S. D., & Koon-Magnin, S. (2013). Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology, 7(2), 155. Hazelwood, S. D., & Koon-Magnin, S. (2013). Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology, 7(2), 155.
Zurück zum Zitat Izak, J. (2013). Cyberharassment Is a true danger: Is the solution found in copyright law? Doctoral dissertation, Michigan State University. Izak, J. (2013). Cyberharassment Is a true danger: Is the solution found in copyright law? Doctoral dissertation, Michigan State University.
Zurück zum Zitat Jahankhani, H. (2013). Developing a model to reduce and/or prevent cybercrime victimization among the user individuals. In: B. Akhgar & S. Yates (Eds.), Strategic intelligence management: National security imperatives and information and communications technologies. Butterworth-Heinemann. Jahankhani, H. (2013). Developing a model to reduce and/or prevent cybercrime victimization among the user individuals. In: B. Akhgar & S. Yates (Eds.), Strategic intelligence management: National security imperatives and information and communications technologies. Butterworth-Heinemann.
Zurück zum Zitat Jahankhani, H., & Al-Nemrat, A. (2010). Examination of cyber-criminal behaviour. International Journal of Information Science and Management, 2010, 41–48. Jahankhani, H., & Al-Nemrat, A. (2010). Examination of cyber-criminal behaviour. International Journal of Information Science and Management, 2010, 41–48.
Zurück zum Zitat Jahankhani, H., & Al-Nemrat, A. (2011). Cybercrime profiling and trend analysis. Intelligence Management, 181–197. Jahankhani, H., & Al-Nemrat, A. (2011). Cybercrime profiling and trend analysis. Intelligence Management, 181–197.
Zurück zum Zitat Jansen, J., & Leukfeldt, R. (2016). Phishing and malware attacks on online banking customers in the Netherlands: A qualitative analysis of factors leading to victimization. International Journal of Cyber Criminology, 10(1), 79. Jansen, J., & Leukfeldt, R. (2016). Phishing and malware attacks on online banking customers in the Netherlands: A qualitative analysis of factors leading to victimization. International Journal of Cyber Criminology, 10(1), 79.
Zurück zum Zitat Kshetri, N. (2009). Positive externality, increasing returns, and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144.CrossRef Kshetri, N. (2009). Positive externality, increasing returns, and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144.CrossRef
Zurück zum Zitat Lee, H. K. (2011). Cultural consumer and copyright: A case study of anime fansubbing. Creative Industries Journal, 3(3), 237–252.CrossRef Lee, H. K. (2011). Cultural consumer and copyright: A case study of anime fansubbing. Creative Industries Journal, 3(3), 237–252.CrossRef
Zurück zum Zitat Levin, A. M., Dato-on, M. C., & Manolis, C. (2007). Deterring illegal downloading: The effects of threat appeals, past behavior, subjective norms, and attributions of harm. Journal of Consumer Behaviour, 6(2-3), 111–122.CrossRef Levin, A. M., Dato-on, M. C., & Manolis, C. (2007). Deterring illegal downloading: The effects of threat appeals, past behavior, subjective norms, and attributions of harm. Journal of Consumer Behaviour, 6(2-3), 111–122.CrossRef
Zurück zum Zitat Liechti, O., & Sumi, Y. (2002). Editorial: Awareness and the WWW. International Journal of Human-Computer Studies, 56(1), 1–5.CrossRef Liechti, O., & Sumi, Y. (2002). Editorial: Awareness and the WWW. International Journal of Human-Computer Studies, 56(1), 1–5.CrossRef
Zurück zum Zitat Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26(2), 1103–1155. Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26(2), 1103–1155.
Zurück zum Zitat Marczak, M., & Coyne, I. (2010). Cyberbullying at school: Good practice and legal aspects in the United Kingdom. Australian Journal of Guidance & Counselling, 20(2), 182–193.CrossRef Marczak, M., & Coyne, I. (2010). Cyberbullying at school: Good practice and legal aspects in the United Kingdom. Australian Journal of Guidance & Counselling, 20(2), 182–193.CrossRef
Zurück zum Zitat Netanel, N. W. (2000). Cyberspace self-governance: A skeptical view from liberal democratic theory. California Law Review, 88(2), 395–498.CrossRef Netanel, N. W. (2000). Cyberspace self-governance: A skeptical view from liberal democratic theory. California Law Review, 88(2), 395–498.CrossRef
Zurück zum Zitat Recupero, R. P., Harms, S. E., & Noble, M. J. (2006). Googling suicide: Surfing for suicide information on the Internet. The Journal of Clinical Psychiatry, 69(6), 878–888.CrossRef Recupero, R. P., Harms, S. E., & Noble, M. J. (2006). Googling suicide: Surfing for suicide information on the Internet. The Journal of Clinical Psychiatry, 69(6), 878–888.CrossRef
Zurück zum Zitat Roberts L. (2008). Cyber victimisationin Australia: Extent, impact on individuals and responses. Tasmanian Institute of Law Enforcement Studies, (6), 1–12. Roberts L. (2008). Cyber victimisationin Australia: Extent, impact on individuals and responses. Tasmanian Institute of Law Enforcement Studies, (6), 1–12.
Zurück zum Zitat Trim, P. R. J., & Lee, Y. I. (2015). Issues that managers need to consider when undertaking research relating to the cyber environment. In P. R. J. Trim & H. Y. Youm (Eds.), Korea-uk initiatives in cyber security research: Government, University and Industry collaboration (pp. 66–79). Republic of Korea: British Embassy Seoul. Trim, P. R. J., & Lee, Y. I. (2015). Issues that managers need to consider when undertaking research relating to the cyber environment. In P. R. J. Trim & H. Y. Youm (Eds.), Korea-uk initiatives in cyber security research: Government, University and Industry collaboration (pp. 66–79). Republic of Korea: British Embassy Seoul.
Metadaten
Titel
Combating Cyber Victimisation: Cybercrime Prevention
verfasst von
Abdelrahman Abdalla Al-Ali
Amer Nimrat
Chafika Benzaid
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-97181-0_16

Premium Partner