Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 81

Full-Text Articles in Social and Behavioral Sciences

Cyberbullying: Its Social And Psychological Harms Among Schoolers, Hyeyoung Lim, Hannarae Lee Apr 2021

Cyberbullying: Its Social And Psychological Harms Among Schoolers, Hyeyoung Lim, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Criminal justice around the world has prioritized the prevention and protection of bullying and its victims due to the rapid increases in peer violence. Nevertheless, relatively few studies have examined what treatments or assistance are effective for peer victims to reduce and recover from their social and psychological suffering, especially in cyberbullying cases. Using data derived from the National Crime Victimization Survey-School Crime Supplement data in 2011 and 2013 (N=823), the current study examined the impact of two emotional support groups (i.e., adult and peer groups) on cyberbullying victims' social and psychological harm. The findings indicated that both adult and …


The Challenges Of Identifying Dangers Online And Predictors Of Victimization, Catherine D. Marcum Apr 2021

The Challenges Of Identifying Dangers Online And Predictors Of Victimization, Catherine D. Marcum

International Journal of Cybersecurity Intelligence & Cybercrime

This short paper will provide an overview of the impressive pieces included in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. This issue includes articles on the following pertinent topic, utilizing a range of approaches and methodologies: 1) online credibility; 2) cyberbullying; and 3) unauthorized access of information. An emphasis on the importance of policy development and better protection of potential victims is a common thread throughout the issue.


The Effects Of Self-Control On The Cyber Victim-Offender Overlap, Brooke Nodeland Nov 2020

The Effects Of Self-Control On The Cyber Victim-Offender Overlap, Brooke Nodeland

International Journal of Cybersecurity Intelligence & Cybercrime

Increasingly, the overlap between victims and offenders has received empirical attention with regard to traditional forms of deviance. More recently, the growth of cyber offending has led to a need to examine whether traditional criminological theories can be used to explain these crimes in the same manner as traditional offenses. However, limited attention has been given to victim-offender overlap in cyber-offending. The current study uses a sample of American college students to examine the influence of self-control on cyber offending, cyber victimization, and the cyber victim-offender overlap. The results indicate that low self-control significantly predicts participation in cyber offending as …


Cyber-Situational Crime Prevention And The Breadth Of Cybercrimes Among Higher Education Institutions, Sinchul Back, Jennifer Laprade Nov 2020

Cyber-Situational Crime Prevention And The Breadth Of Cybercrimes Among Higher Education Institutions, Sinchul Back, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

Academic institutions house enormous amounts of critical information from social security numbers of students to proprietary research data. Thus, maintaining up to date cybersecurity practices to protect academic institutions’ information and facilities against cyber-perpetrators has become a top priority. The purpose of this study is to assess common cybersecurity measures through a situational crime prevention (SCP) theoretical framework. Using a national data set of academic institutions in the United States, this study investigates the link between common cybersecurity measures, crime prevention activities, and cybercrimes. By focusing on the conceptualization of cybersecurity measures as SCP techniques, this study also offers the …


Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Saumya Ramarao, Jung Ah Yun, Bok Gyo Jeong Nov 2020

Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Saumya Ramarao, Jung Ah Yun, Bok Gyo Jeong

International Journal of Cybersecurity Intelligence & Cybercrime

This paper discusses and proposes the inclusion of a cyber or security risk assessment section during the course of public health initiatives involving the use of information and communication computer technology. Over the last decade, many public health research efforts have included information technologies such as Mobile Health (mHealth), Electronic Health (eHealth), Telehealth, and Digital Health to assist with unmet global development health needs. This paper provides a background on the lack of documentation on cybersecurity risks or vulnerability assessments in global public health areas. This study suggests existing frameworks and policies be adopted for public health. We also propose …


Book Review: Computer Capers: Tales Of Electronic Thievery, Embezzlement, And Fraud. By Thomas Whiteside, Brian Nussbaum Nov 2020

Book Review: Computer Capers: Tales Of Electronic Thievery, Embezzlement, And Fraud. By Thomas Whiteside, Brian Nussbaum

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Toward Mitigating, Minimizing, And Preventing Cybercrimes And Cybersecurity Risks, Claire Seungeun Lee Nov 2020

Toward Mitigating, Minimizing, And Preventing Cybercrimes And Cybersecurity Risks, Claire Seungeun Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately address such challenges using college student samples and nationally representative samples, as well as a framework through …


Illegal Gambling And Its Operation Via The Darknet And Bitcoin: An Application Of Routine Activity Theory, Sinyong Choi, Kyung-Shick Choi, Yesim Sungu-Eryilmaz, Hee-Kyung Park Feb 2020

Illegal Gambling And Its Operation Via The Darknet And Bitcoin: An Application Of Routine Activity Theory, Sinyong Choi, Kyung-Shick Choi, Yesim Sungu-Eryilmaz, Hee-Kyung Park

International Journal of Cybersecurity Intelligence & Cybercrime

The Darknet and Bitcoins have been widely utilized by those who wish to anonymously perform illegal activities in cyberspace. Restricted in many countries, gambling websites utilize Bitcoin payments that allow users to freely engage in illegal gambling activities with the absence of a formal capable guardian. Despite the urgency and limited knowledge available to law enforcement regarding this issue, few empirical studies have focused on illegal gambling websites. The current study attempts to examine the characteristics and operations of online gambling websites on both the Darknet and Surface Web, which allow Bitcoin payments. The findings suggest that both websites on …


An Empirical Study To Determine The Role Of File-System In Modification Of Hash Value, Kumarshankar Raychaudhuri, M. George Christopher Feb 2020

An Empirical Study To Determine The Role Of File-System In Modification Of Hash Value, Kumarshankar Raychaudhuri, M. George Christopher

International Journal of Cybersecurity Intelligence & Cybercrime

In digital forensics, maintaining the integrity of digital exhibits is an essential aspect of the entire investigation and examination process, which is established using the technique of hashing. Lack of knowledge, while handling digital exhibits, might lead to unintentional alteration of computed hash, rendering the exhibit unacceptable in the court of Law. The hash value of a physical drive does not solely depend upon the data files present in it but also its file-system. Therefore, any change to the file-system might result in the change of the disk hash, even when the data files within it remain untouched. In this …


A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson Feb 2020

A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson

International Journal of Cybersecurity Intelligence & Cybercrime

How individuals conceptualize their accountability related to digital technology. There may also be age-based vulnerabilities resulting from personal perceptions about the importance of engaging in best-practices. However, age may not be as critical as experience when it comes to implementation of these behaviors. Using the Cybersecurity Behaviors subscale of the Online Security Behaviors and Beliefs Questionnaire (OSBBQ), this study compared the self-reported cybersecurity attitudes and behaviors across college-aged individuals from Generation Y and Generation Z. Data were derived from a convenience sample of predominantly African-American and Caucasian respondents (N=593) recruited from two public universities in Virginia, USA. Four of the …


Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa Feb 2020

Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Review Of Fundamental To Know About The Future, Hannarae Lee Feb 2020

Review Of Fundamental To Know About The Future, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

What we consider fundamental elements can be easily overlooked or perceived as facts without the process of empirical testing. Especially in the field of cybercrime and cybersecurity, there are more speculations regarding the prevalence and the scope of harm carried out by wrongdoers than empirically tested studies. To fill the void, three articles included in the current issue addresses empirical findings of fundamental concerns and knowledge in the field of cybercrime and cybersecurity.


An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing Sep 2019

An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing

International Journal of Cybersecurity Intelligence & Cybercrime

Limited research has considered individual perceptions of moral distinctions between consensual and nonconsensual intimate image sharing, as well as decision making parameters around why others might engage in such behavior. The current study conducted a perception analysis using mixed-methods online surveys administered to 63 participants, inquiring into their perceptions of why individuals engage in certain behaviors surrounding the sending of intimate images from friends and partners. The study found that respondents favored the concepts of (1) sharing images with romantic partners over peers; (2) sharing non-intimate images over intimate images; and (3) sharing images with consent rather than without it. …


Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett Sep 2019

Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett

International Journal of Cybersecurity Intelligence & Cybercrime

The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack …


The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade Sep 2019

The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior. Unfortunately, humans can be vulnerable and easily deceived making technological advances alone inadequate in the cybercrime fight. Instead, we must take a more holistic approach by using technology and better understanding the human factors that make cybercrime possible. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective comprehensive cybercrime prevention strategies …


A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander Sep 2019

A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander

International Journal of Cybersecurity Intelligence & Cybercrime

This study constructed a structural model which consists of social demographic factors, experience of victimization, opportunity factors, and social context factors to explain the public’s fear of crime on social networking sites (SNS). The model is based on the risk interpretation model, which predicts that these factors influence users’ fear of crime victimization. Using data from 486 university students in South Korea, an empirically-tested model suggests that sex and age have direct and significant effects on fear of victimization, supporting the vulnerability hypothesis. Among opportunity factors, the level of personal information and the number of offending peers have significant effects …


Awareness And Perception Of Cybercrimes And Cybercriminals, Hannarae Lee, Hyeyoung Lim Feb 2019

Awareness And Perception Of Cybercrimes And Cybercriminals, Hannarae Lee, Hyeyoung Lim

International Journal of Cybersecurity Intelligence & Cybercrime

Awareness is a starting point to recognize, understand, or know a situation or fact, and the perception makes a difference in how to deal with it. Although the term cybercrime may not be new to the most public and the police, not all of them are well aware of the nature and extent of cybercrimes, cybercriminals, and cyber-victims, which in turn affects their perceptions of matters. The four papers in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime empirically examine these important topics and discuss policy implications.


Examining Perceptions Of Online Harassment Among Constables In England And Wales, Thomas J. Holt, Jin R. Lee, Roberta Liggett, Karen M. Holt, Adam Bossler Feb 2019

Examining Perceptions Of Online Harassment Among Constables In England And Wales, Thomas J. Holt, Jin R. Lee, Roberta Liggett, Karen M. Holt, Adam Bossler

International Journal of Cybersecurity Intelligence & Cybercrime

The ubiquity of the Internet and computer technology has enabled individuals to engage in bullying, threats, and harassing communications online. Limited research has found that local line officers may not view these offenses as serious compared to real world crimes despite their negative physical and emotional impact on victims. The perceptions of officers can produce poor interactions with victims during calls for service, particularly victim blaming, which can reduce citizens’ confidence in police agencies generally. However, local law enforcement agencies are increasingly mandated to respond to these cases, calling to question how their views may impact the community. This study …


The Profile Of The International Cyber Offender In The U.S., Lora I. Hadzhidimova, Brian K. Payne Feb 2019

The Profile Of The International Cyber Offender In The U.S., Lora I. Hadzhidimova, Brian K. Payne

International Journal of Cybersecurity Intelligence & Cybercrime

This study explores the characteristics of international cyber offenders prosecuted in the U.S. Our findings to a large extent correspond with general studies about cyber offenders with a few important exceptions. First, the average age of the offenders in our study is slightly higher than others that do not focus exclusively on international offenders. Second, while this research confirms that China is among the leading country in committing cybercrimes when it comes to committing particular types of cybercrimes, the offenders come from other countries as well such as Romania, Estonia, Ukraine, South Africa, and Nigeria. Third, our results show that …


Cybercrime And Digital Forensics: Bridging The Gap In Legislation, Investigation And Prosecution Of Cybercrime In Nigeria, Kabiru H. Mohammed, Yusuf D. Mohammed, Abiodun A. Solanke Feb 2019

Cybercrime And Digital Forensics: Bridging The Gap In Legislation, Investigation And Prosecution Of Cybercrime In Nigeria, Kabiru H. Mohammed, Yusuf D. Mohammed, Abiodun A. Solanke

International Journal of Cybersecurity Intelligence & Cybercrime

The advancement of Information and Communication Technologies (ICT) opens new avenues and ways for cybercriminals to commit crime. The primary goal of this paper is to raise awareness regarding gaps that exist with regards to Nigeria’s capabilities to adequately legislate, investigate and prosecute cases of cybercrimes. The major source of cybercrime legislation in Nigeria is an act of the National Assembly which is majorly a symbolic legislation rather than a full and active legislation. In perusing these avenues of inquiry, the authors seek to identify systemic impediments which hinder law enforcement agencies, prosecutors, and investigators from properly carrying out their …


Phishing And Cybercrime Risks In A University Student Community, Roderic Broadhurst, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias, Yuguang Ipsen Feb 2019

Phishing And Cybercrime Risks In A University Student Community, Roderic Broadhurst, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias, Yuguang Ipsen

International Journal of Cybersecurity Intelligence & Cybercrime

In an exploratory quasi-experimental observational study, 138 participants recruited during a university orientation week were exposed to social engineering directives in the form of fake email or phishing attacks over several months in 2017. These email attacks attempted to elicit personal information from participants or entice them into clicking links which may have been compromised in a real-world setting. The study aimed to determine the risks of cybercrime for students by observing their responses to social engineering and exploring attitudes to cybercrime risks before and after the phishing phase. Three types of scam emails were distributed that varied in the …


Welcoming Remarks From The Ijcic Honorary Editor, Peter Grabosky Aug 2018

Welcoming Remarks From The Ijcic Honorary Editor, Peter Grabosky

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Juvenile Hackers: An Empirical Test Of Self-Control Theory And Social Bonding Theory, Sinchul Back, Sadhika Soor, Jennifer Laprade Aug 2018

Juvenile Hackers: An Empirical Test Of Self-Control Theory And Social Bonding Theory, Sinchul Back, Sadhika Soor, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

In accordance with a similar growth in information technology, computer hacking has become a pervasive issue as a form of crime worldwide in recent years. Self-control theory and social bonding theory have frequently been employed to explain various types of crimes, but rarely to explore computer hacking. Drawing from Gottfredson and Hirschi’s (1990) self-control theory and Hirschi’s (1969) social bonding theory, the purpose of this study is to empirically examine the suitability of these two theories in explaining juvenile computer hacking offenses. The self-report survey data utilized for the present study was derived from middle school and high school students …


The Present And Future Of Cybercrime, Cyberterrorism, And Cybersecurity, Kyung-Shick Choi, Claire Seungeun Lee Aug 2018

The Present And Future Of Cybercrime, Cyberterrorism, And Cybersecurity, Kyung-Shick Choi, Claire Seungeun Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Cybercriminology combines knowledge from criminology, psychology, sociology, computer science, and cybersecurity to provide an in-depth understanding of cybercrime. Cybercrime and cybersecurity are interconnected across many places, platforms, and actors. Cybercrime issues are continuously and expeditiously changing and developing, especially with the advent of new technologies. The International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) aims to contribute to the growing field of cybercriminology and cybersecurity. The IJCIC is eager to work with scholars, policy analysts, practitioners, and others to enhance theory, methods, and practice within cybercrime and cybersecurity at the regional, national, and international levels.


A Failure To Regulate? The Demands And Dilemmas Of Tackling Illegal Content And Behaviour On Social Media, Majid Yar Aug 2018

A Failure To Regulate? The Demands And Dilemmas Of Tackling Illegal Content And Behaviour On Social Media, Majid Yar

International Journal of Cybersecurity Intelligence & Cybercrime

The proliferation and user uptake of social media applications has brought in its wake a growing problem of illegal and harmful interactions and content online. Recent controversy has arisen around issues ranging from the alleged online manipulation of the 2016 US presidential election by Russian hackers and ‘trolls’, to the misuse of users’ Facebook data by the political consulting firm Cambridge Analytica (Hall 2018; Swaine & Bennetts 2018). These recent issues notwithstanding, in the UK context, ongoing concern has focused in particular upon (a) sexually-oriented and abusive content about or directed at children, and (b) content that is racially or …


Spreading Propaganda In Cyberspace: Comparing Cyber-Resource Usage Of Al Qaeda And Isis, Kyung-Shick Choi, Claire Seungeun Lee, Robert Cadigan Aug 2018

Spreading Propaganda In Cyberspace: Comparing Cyber-Resource Usage Of Al Qaeda And Isis, Kyung-Shick Choi, Claire Seungeun Lee, Robert Cadigan

International Journal of Cybersecurity Intelligence & Cybercrime

Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recruit new members, and justify terrorist attacks and actions. This study explores the ways in which types of social media, message contents, and motives for spreading propaganda take shape in cyberspace. In order to empirically test these relations, we created a dataset with annual terrorism reports from 2011 to 2016. In our global cyberterrorism dataset, we used and connected cyber-resources (Facebook, online forum, Twitter mentions, websites, and YouTube videos) and legal documents of individual cases that were mentioned in the reports. The results show that YouTube videos were …


Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi Aug 2018

Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi

International Journal of Cybersecurity Intelligence & Cybercrime

In order to test whether and how violence is exacerbated in online social networking sites, we utilized the BryantSmith Aggression Scale (Bryant & Smith, 2001), and included examples in the questionnaire offering solutions for 7 different hypothetical cases occurring online (Kiss, 2017). The questionnaire was sent to social work and law school students in Hungary. Prevalence and levels of aggression and its manifestation as violence online proved to be not more severe than in offline social relations. Law students were more aware than students of social work that online hostile acts are discrediting. Students of social work were significantly more …


An Argument For Interdisciplinary Programs In Cybersecurity, Dennis Giever Aug 2018

An Argument For Interdisciplinary Programs In Cybersecurity, Dennis Giever

International Journal of Cybersecurity Intelligence & Cybercrime

In this commentary Dr. Giever presents a compelling argument for interdisciplinary programs in cybersecurity at the university level. He argues that we no longer have the luxury of allowing barriers to exist between those tasked with IT security and those who provide physical security. He recommends that any security program take an “all possible paths” or “balanced approach” to the protection of assets within an organization. Students in computer science, criminal justice, business, human resources, and others should work collaboratively within education programs learning these necessary skills. A team effort is needed to accomplish the myriad of tasks necessary to …


Van Oster V. Kansas And The Unconstitutionality Of Civil Forfeiture, Thomas Senst Jan 2017

Van Oster V. Kansas And The Unconstitutionality Of Civil Forfeiture, Thomas Senst

Undergraduate Review

The purpose of this paper is to illustrate the contradictory nature of civil forfeiture through a case analysis of Van Oster v. Kansas and compare the precedent established in this case to current civil forfeiture laws. This case has not received the proper attention that it deserves in civil forfeiture scholarly literature. Van Oster represents a case in which the Supreme Court upheld civil forfeiture, yet the internal logic of their justification suggests that civil forfeiture is unconstitutional. Additionally, this paper will conceptualize judicial dictions and opinions delivered by Justice Brandeis and Justice Holmes, who both served on the Supreme …


The Online Sex Sting, Michael Cryan Jan 2015

The Online Sex Sting, Michael Cryan

Undergraduate Review

The Youth Internet Safety Surveys are indicative of a small subset of minors who have had contact with sexual offenders in person. Internet sex stings serve to target these adults through the use of police deception, but their use has been on the decline. Sexual offenders are a heterogeneous group; laws often mistakenly lump these various members together. This paper discusses different sources that can take responsible action to prevent online predators from reaching minors and the issue of vigilantism against offenders. Our current laws on sexual predators do not reflect the deeper, more prevalent issue of acquaintance rape.