Skip to main content

2022 | OriginalPaper | Buchkapitel

Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities

verfasst von : Karabo Pilane, Zainab Ruhwanya, Irwin Brown

Erschienen in: Human Aspects of Information Security and Assurance

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cybercrime may destabilise organisations and society due to the social, financial, emotional, psychological, and physical impacts. The purpose of this paper was to investigate cybercrime reporting behaviour and the factors that influence it. South African state-owned entities were the focus of attention given their strategic role, which requires that attention be given to improving their cybersecurity practices, such as cybercrime reporting in an increasingly digital society. The conceptual framework was developed using themes from the cybercrime literature, and the Theory of Planned Behaviour (TPB) as a lens. The study used a quantitative method, and data was collected online using a questionnaire survey. One hundred and three complete responses were received from employees working in South African state-owned entities. Factors that were identified as influencing cybercrime reporting behaviour were self-efficacy and facilitating conditions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Abdullah, A.T.M., Jahan, I.: Causes of cybercrime victimization: a systematic literature review. Int. J. Res. Rev. 7(5), 89–98 (2020) Abdullah, A.T.M., Jahan, I.: Causes of cybercrime victimization: a systematic literature review. Int. J. Res. Rev. 7(5), 89–98 (2020)
2.
Zurück zum Zitat Ahmad, A., Ahmad, R., Hashim, K.F.: Innovation traits for business intelligence successful deployment. J. Theor. Appl. Inf. Technol. 89(1), 96 (2016) Ahmad, A., Ahmad, R., Hashim, K.F.: Innovation traits for business intelligence successful deployment. J. Theor. Appl. Inf. Technol. 89(1), 96 (2016)
3.
Zurück zum Zitat Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179–211 (1991)CrossRef Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179–211 (1991)CrossRef
4.
Zurück zum Zitat Al-Khater, W.A., Al-Maadeed, S., Ahmed, A.A., Sadiq, A.S., Khan, M.K.: Comprehensive review of cybercrime detection techniques. IEEE Access 8, 137293–137311 (2020)CrossRef Al-Khater, W.A., Al-Maadeed, S., Ahmed, A.A., Sadiq, A.S., Khan, M.K.: Com­prehensive review of cybercrime detection techniques. IEEE Access 8, 137293–137311 (2020)CrossRef
5.
Zurück zum Zitat Almazkyzy, K., Esteusizov, Y.N.: The essence and content of cybercrime in modern times. J. Adv. Res. Law Econ. 9, 834 (2018)CrossRef Almazkyzy, K., Esteusizov, Y.N.: The essence and content of cybercrime in modern times. J. Adv. Res. Law Econ. 9, 834 (2018)CrossRef
6.
Zurück zum Zitat Alotaibi, N.B.: Cyberbullying and the expected consequences on the students’ academic achievement. IEEE Access 7, 153417–153431 (2019)CrossRef Alotaibi, N.B.: Cyberbullying and the expected consequences on the students’ academic achievement. IEEE Access 7, 153417–153431 (2019)CrossRef
7.
Zurück zum Zitat Alrwais, O., Alhodaib, E.: What derives people to use reporting functions on social networks? Int. J. Appl. Inf. Syst. 12(25), 10–16 (2019) Alrwais, O., Alhodaib, E.: What derives people to use reporting functions on social networks? Int. J. Appl. Inf. Syst. 12(25), 10–16 (2019)
8.
Zurück zum Zitat Apau, R., Koranteng, F.N.: Impact of cybercrime and trust on the use of ecommerce technologies: an application of the theory of planned behavior. Int. J. Cyber Criminol. 13(2), 228–254 (2019) Apau, R., Koranteng, F.N.: Impact of cybercrime and trust on the use of e­commerce technologies: an application of the theory of planned behavior. Int. J. Cyber Criminol. 13(2), 228–254 (2019)
9.
Zurück zum Zitat Baror, S.O., Ikuesan, R.A., Venter, H.S.: A defined digital forensic criteria for cybercrime reporting. In: International Conference on Cyber Warfare and Security, pp. 617 626. Academic Conferences International Limited (2020). https://doi.org/10.34190/ICCWS.20.056 Baror, S.O., Ikuesan, R.A., Venter, H.S.: A defined digital forensic criteria for cybercrime reporting. In: International Conference on Cyber Warfare and Security, pp. 617 626. Academic Conferences International Limited (2020). https://​doi.​org/​10.​34190/​ICCWS.​20.​056
11.
Zurück zum Zitat Bhattacherjee, A.: Social Science Research: Principles, Methods, and Practices. University of South Florida (2012) Bhattacherjee, A.: Social Science Research: Principles, Methods, and Practices. University of South Florida (2012)
12.
Zurück zum Zitat Bidgoli, M., Grossklags, J.: End-user cybercrime reporting: what we know and what we can do to improve it. In: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), pp. 1–6. IEEE (2016) Bidgoli, M., Grossklags, J.: End-user cybercrime reporting: what we know and what we can do to improve it. In: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), pp. 1–6. IEEE (2016)
14.
Zurück zum Zitat Cheng, C., Chan, L., Chau, C.L.: Individual differences in susceptibility to cyber-crime victimization and its psychological aftermath. Comput. Hum. Behav. 108, 106311 (2020)CrossRef Cheng, C., Chan, L., Chau, C.L.: Individual differences in susceptibility to cyber-crime victimization and its psychological aftermath. Comput. Hum. Behav. 108, 106311 (2020)CrossRef
15.
Zurück zum Zitat Christou, G.: The challenges of cybercrime governance in the European Union. Eur. Polit. Soc. 19(3), 355–375 (2018)CrossRef Christou, G.: The challenges of cybercrime governance in the European Union. Eur. Polit. Soc. 19(3), 355–375 (2018)CrossRef
16.
Zurück zum Zitat Collier, B., Thomas, D.R., Clayton, R., Hutchings, A., Chua, Y.T.: Influence, infrastructure, and recentering cybercrime policing: evaluating emerging approaches to online law enforcement through a market for cybercrime services. Policing Soc. 32(1), 103–124 (2021)CrossRef Collier, B., Thomas, D.R., Clayton, R., Hutchings, A., Chua, Y.T.: Influence, infrastructure, and recentering cybercrime policing: evaluating emerging approaches to online law enforcement through a market for cybercrime services. Policing Soc. 32(1), 103–124 (2021)CrossRef
17.
Zurück zum Zitat Cross, C.: Expectations vs reality: responding to online fraud across the fraud justice network. Int. J. Law Crime Justice 55, 1–12 (2018)CrossRef Cross, C.: Expectations vs reality: responding to online fraud across the fraud justice network. Int. J. Law Crime Justice 55, 1–12 (2018)CrossRef
18.
Zurück zum Zitat DeKimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L., Hardyns, W.: Help, I need somebody: examining the antecedents of social support seeking among cybercrime victims. Comput. Hum. Behav. 108, 106310 (2020)CrossRef DeKimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L., Hardyns, W.: Help, I need somebody: examining the antecedents of social support seeking among cybercrime victims. Comput. Hum. Behav. 108, 106310 (2020)CrossRef
19.
Zurück zum Zitat Dlamini, S., Mbambo, C.: Understanding policing of cybercrime in South Africa: the phenomena, challenges and effective responses. Cogent Soc. Sci. 5(1), 1675404 (2019) Dlamini, S., Mbambo, C.: Understanding policing of cybercrime in South Africa: the phenomena, challenges and effective responses. Cogent Soc. Sci. 5(1), 1675404 (2019)
20.
Zurück zum Zitat Dremliuga, R.I., Korobeev, A.I., Mamychev, A.Y., Miroshnichenko, O.I.: Trends and methods of fighting cybercrime in the Russian Federation in terms of the transition to a digital economy. Laplage em Rev. 7(2), 191–200 (2021)CrossRef Dremliuga, R.I., Korobeev, A.I., Mamychev, A.Y., Miroshnichenko, O.I.: Trends and methods of fighting cybercrime in the Russian Federation in terms of the transition to a digital economy. Laplage em Rev. 7(2), 191–200 (2021)CrossRef
21.
Zurück zum Zitat Eboibi, F.E.: Concerns of cybercriminality in South Africa, Ghana, Ethiopia and Nigeria: rethinking cybercrime policy implementation and institutional accountability. Commonw. Law Bull. 46(1), 78–109 (2020)CrossRef Eboibi, F.E.: Concerns of cybercriminality in South Africa, Ghana, Ethiopia and Nigeria: rethinking cybercrime policy implementation and institutional accountability. Commonw. Law Bull. 46(1), 78–109 (2020)CrossRef
22.
Zurück zum Zitat FBI IC3: Internet Crime Report 2021. Technical report I, FBI Internet Crime Complaint Center (IC3) (2021) FBI IC3: Internet Crime Report 2021. Technical report I, FBI Internet Crime Complaint Center (IC3) (2021)
23.
Zurück zum Zitat Fissel, E.R.: The reporting and help-seeking behaviors of cyberstalking victims. J. Interpers. Violence 36(11–12), 5075–5100 (2021)CrossRef Fissel, E.R.: The reporting and help-seeking behaviors of cyberstalking victims. J. Interpers. Violence 36(11–12), 5075–5100 (2021)CrossRef
24.
Zurück zum Zitat Hadlington, L.: Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon 3(7), e00346 (2017)CrossRef Hadlington, L.: Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon 3(7), e00346 (2017)CrossRef
25.
Zurück zum Zitat Hall, T., Sanders, B., Bah, M., King, O., Wigley, E.: Economic geographies of the illegal: the multiscalar production of cybercrime. Trends Organized Crime 24(2), 282–307 (2021)CrossRef Hall, T., Sanders, B., Bah, M., King, O., Wigley, E.: Economic geographies of the illegal: the multiscalar production of cybercrime. Trends Organized Crime 24(2), 282–307 (2021)CrossRef
26.
Zurück zum Zitat Hite, D.M., Voelker, T., Robertson, A.: Measuring perceived anonymity: the development of a context-independent instrument. J. Methods Meas. Soc. Sci. 5(1), 22–39 (2014) Hite, D.M., Voelker, T., Robertson, A.: Measuring perceived anonymity: the development of a context-independent instrument. J. Methods Meas. Soc. Sci. 5(1), 22–39 (2014)
27.
Zurück zum Zitat Humaidi, N., Balakrishnan, V.: Indirect effect of management support on users’ compliance behaviour towards information security policies. Health Inf. Manag. J. 47(1), 17–27 (2018) Humaidi, N., Balakrishnan, V.: Indirect effect of management support on users’ compliance behaviour towards information security policies. Health Inf. Manag. J. 47(1), 17–27 (2018)
28.
Zurück zum Zitat Ibrahim, S.: Social and contextual taxonomy of cybercrime: socioeconomic theory of Nigerian cybercriminals. Int. J. Law Crime Justice 47, 44–57 (2016)CrossRef Ibrahim, S.: Social and contextual taxonomy of cybercrime: socioeconomic theory of Nigerian cybercriminals. Int. J. Law Crime Justice 47, 44–57 (2016)CrossRef
29.
Zurück zum Zitat Internet live stats: internet live stats-internet usage social media statistics (2020) Internet live stats: internet live stats-internet usage social media statistics (2020)
30.
Zurück zum Zitat Jadoon, A.K., Iqbal, W., Amjad, M.F., Afzal, H., Bangash, Y.A.: Forensic analysis of Tor browser: a case study for privacy and anonymity on the web. Forensic Sci. Int. 299, 59–73 (2019)CrossRef Jadoon, A.K., Iqbal, W., Amjad, M.F., Afzal, H., Bangash, Y.A.: Forensic analysis of Tor browser: a case study for privacy and anonymity on the web. Forensic Sci. Int. 299, 59–73 (2019)CrossRef
31.
Zurück zum Zitat Jerome, B.: Criminal investigation and criminal intelligence: example of adaptation in the prevention and repression of cybercrime. Risks 8(3), 99 (2020)CrossRef Jerome, B.: Criminal investigation and criminal intelligence: example of adaptation in the prevention and repression of cybercrime. Risks 8(3), 99 (2020)CrossRef
32.
Zurück zum Zitat Jhaveri, M.H., Cetin, O., Gaiian, C., Moore, T., Eeten, M.V.: Abuse reporting and the fight against cybercrime. ACM Comput. Surv. (CSUR) 49(4), 1–27 (2017)CrossRef Jhaveri, M.H., Cetin, O., Gaiian, C., Moore, T., Eeten, M.V.: Abuse reporting and the fight against cybercrime. ACM Comput. Surv. (CSUR) 49(4), 1–27 (2017)CrossRef
33.
Zurück zum Zitat Kemp, S.: Fraud reporting in Catalonia in the Internet era: determinants and motives. Eur. J. Criminol. 1477370820941405 (2020) Kemp, S.: Fraud reporting in Catalonia in the Internet era: determinants and motives. Eur. J. Criminol. 1477370820941405 (2020)
34.
Zurück zum Zitat Kshetri, N.: The simple economics of cybercrimes. IEEE Secur. Priv. 4(1), 33–39 (2006)CrossRef Kshetri, N.: The simple economics of cybercrimes. IEEE Secur. Priv. 4(1), 33–39 (2006)CrossRef
35.
Zurück zum Zitat Kwak, Y., Lee, S., Damiano, A., Vishwanath, A.: Why do users not report spear-phishing emails? Telematics Inform. 48, 101343 (2020)CrossRef Kwak, Y., Lee, S., Damiano, A., Vishwanath, A.: Why do users not report spear-phishing emails? Telematics Inform. 48, 101343 (2020)CrossRef
36.
Zurück zum Zitat Lagazio, M., Sherif, N., Cushman, M.: A multi-level approach to understanding the impact of cybercrime on the financial sector. Comput. Secur. 45, 58–74 (2014)CrossRef Lagazio, M., Sherif, N., Cushman, M.: A multi-level approach to understanding the impact of cybercrime on the financial sector. Comput. Secur. 45, 58–74 (2014)CrossRef
37.
Zurück zum Zitat MacDermott, A., Baker, T., Buck, P., Iqbal, F., Shi, Q.: The Internet of Things: challenges and considerations for cybercrime investigations and digital forensics. Int. J. Digital Crime Forensics 12(1), 1–13 (2020)CrossRef MacDermott, A., Baker, T., Buck, P., Iqbal, F., Shi, Q.: The Internet of Things: challenges and considerations for cybercrime investigations and digital forensics. Int. J. Digital Crime Forensics 12(1), 1–13 (2020)CrossRef
39.
Zurück zum Zitat Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P.C., Glenn, T.: Increasing cybercrime since the pandemic: concerns for psychiatry. Curr. Psychiatry Rep. 23(4), 1–9 (2021)CrossRef Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P.C., Glenn, T.: Increasing cybercrime since the pandemic: concerns for psychiatry. Curr. Psychiatry Rep. 23(4), 1–9 (2021)CrossRef
40.
Zurück zum Zitat Riek, M., Bohme, R.: The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates. J. Cybersecurity 4(1), tyy004 (2018)CrossRef Riek, M., Bohme, R.: The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates. J. Cybersecurity 4(1), tyy004 (2018)CrossRef
41.
Zurück zum Zitat Robinson, M., Jones, K., Janicke, H., Maglaras, L.: Developing cyber-peacekeeping: observation, monitoring and reporting. Gov. Inf. Q. 36(2), 276–293 (2019)CrossRef Robinson, M., Jones, K., Janicke, H., Maglaras, L.: Developing cyber-peacekeeping: observation, monitoring and reporting. Gov. Inf. Q. 36(2), 276–293 (2019)CrossRef
43.
Zurück zum Zitat Saunders, M.: Research Methods for Business Students. Pearson (2014) Saunders, M.: Research Methods for Business Students. Pearson (2014)
44.
Zurück zum Zitat Stratton, G., Powell, A., Cameron, R.: Crime and justice in digital society: towards a ‘digital criminology’? Int. J. Crime Justice Soc. Democr. 6(2), 17 (2017)CrossRef Stratton, G., Powell, A., Cameron, R.: Crime and justice in digital society: towards a ‘digital criminology’? Int. J. Crime Justice Soc. Democr. 6(2), 17 (2017)CrossRef
45.
Zurück zum Zitat Straub, D., Boudreau, M.C., Gefen, D.: Validation guidelines for IS positivist research. Commun. Assoc. Inf. Syst. 13(1), 24 (2004) Straub, D., Boudreau, M.C., Gefen, D.: Validation guidelines for IS positivist research. Commun. Assoc. Inf. Syst. 13(1), 24 (2004)
46.
Zurück zum Zitat Tan, M.T., Teo, T.S.: Factors influencing the adoption of Internet banking. J. Assoc. Inf. Syst. 1(1), 5 (2000) Tan, M.T., Teo, T.S.: Factors influencing the adoption of Internet banking. J. Assoc. Inf. Syst. 1(1), 5 (2000)
47.
Zurück zum Zitat Touhill, G.: New study reveals cybercrime may be widely underreported even when laws mandate disclosure (2019) Touhill, G.: New study reveals cybercrime may be widely underreported even when laws mandate disclosure (2019)
48.
Zurück zum Zitat Umlauf, M.G., Mochizuki, Y.: Predatory publishing and cybercrime targeting academics. Int. J. Nurs. Pract. 24, e12656 (2018)CrossRef Umlauf, M.G., Mochizuki, Y.: Predatory publishing and cybercrime targeting academics. Int. J. Nurs. Pract. 24, e12656 (2018)CrossRef
Metadaten
Titel
Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities
verfasst von
Karabo Pilane
Zainab Ruhwanya
Irwin Brown
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-031-12172-2_23

Premium Partner