Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminology and Criminal Justice

PDF

USF Tampa Graduate Theses and Dissertations

Cybercrime

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Social and Behavioral Sciences

The Ring Of Gyges 2.0: How Anonymity Providing Behaviors Affect Willingness To Participate In Online Deviance, Cassandra E. Dodge Jun 2021

The Ring Of Gyges 2.0: How Anonymity Providing Behaviors Affect Willingness To Participate In Online Deviance, Cassandra E. Dodge

USF Tampa Graduate Theses and Dissertations

Anonymity has long been discussed as a source of disinhibition. The myth of the Ring of Gyges illustrates how a person may act immorally solely because they know they will not be caught (Plato, 375/2017). Incorporating perspectives of rational choice and deterrence, anonymity serves as a form of risk reduction within hedonistic calculus (Beccaria, 1764/1963; Bentham, 1781/2000). Analogous to the myth of the Ring of Gyges (Plato, 375/2017), techniques of anonymity “hide” users from others while online. These techniques serve as a form of risk reduction, reducing the certainty of punishment (Becarria 1764/1963). Additionally, there are many ways by which …


Self-Protection In Cyberspace: Assessing The Processual Relationship Between Thoughtfully Reflective Decision Making, Protection Motivation Theory, Cyber Hygiene, And Victimization, C. Jordan Howell Mar 2021

Self-Protection In Cyberspace: Assessing The Processual Relationship Between Thoughtfully Reflective Decision Making, Protection Motivation Theory, Cyber Hygiene, And Victimization, C. Jordan Howell

USF Tampa Graduate Theses and Dissertations

The current study, using structural equation modeling, assesses the processual relationship between thoughtfully reflective decision making (TRDM), theoretical constructs derived from protection motivation theory (PMT), cyber hygiene, and online victimization to determine the cognitive decision-making process that leads to the adoption of online self-protective behaviors, which reduces the occurrence of victimization experiences. Findings, derived from a general sample of Internet users in the United States, reveal: (1) engagement in cyber hygiene practices, as a form of target hardening, decreases Internet users’ experiences with online victimization; (2) thoughtfully reflective decision makers, in the face of cyber threats, develop higher threat appraisals …


An Exploratory Study Of Macro-Social Correlates Of Online Property Crime, Hyojong Song Jul 2017

An Exploratory Study Of Macro-Social Correlates Of Online Property Crime, Hyojong Song

USF Tampa Graduate Theses and Dissertations

Despite the recent decreasing trend of most traditional types of crime, online property crime (OPC), referring to crime committed online with a financial orientation such as online frauds, scams, and phishing, continues to increase. According to the Internet Crime Complaint Center, the number of reported complaints about OPC have increased by approximately sixteen fold from 16,838 cases in 2000 to 288,012 cases in 2015, and referred financial losses have also increased about sixty times from $17.8 million in 2001 to $1 billion in 2015. The increase in OPC might be directly related to advanced online accessibility due to the accelerated …


The Restrictive Deterrent Effect Of Warning Banners In A Compromised Computer System, Christian Jordan-Michael Howell Jun 2016

The Restrictive Deterrent Effect Of Warning Banners In A Compromised Computer System, Christian Jordan-Michael Howell

USF Tampa Graduate Theses and Dissertations

System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystroke commands to determine if some keystroke commands are used as a tactical skill to avoid …