Abstract
With the increased of use of the internet as a means of sharing information, the need to protect and preserve the confidentiality and integrity of data is ever more evident. The digital age provides not only established criminals with new ways of committing, but also has empowered previously non deviant individuals, into new cyber criminal behaviour. Many individuals are unaware of online threats and many fail to take advantage of precautionary measures to protect themselves from risks when they are online. Therefore, individuals consistently underestimate their risk of becoming victims or underestimate the punishment that may face if they are engaged on online deviant behaviour. This ongoing research has found that there is a relationship between individual’s perception of cybercrime law and cybercrime victimisation and/or criminalisation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ainsworth, P.B.: Offender Crime Profiling and Crime Analysis. Willan Publishing, USA and Canada (2001)
Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Chapman & Hall, New York (1984)
Boss, et al.: Familiarity Breeds Content: How Fear of Cybercrime Influences Individual Precaution-Taking Behaviour. In: IFIP TC 8 International Workshop on Information Systems Security Research (2009)
EURIM: Working Paper 1: Reporting Methods and Structures; IPPR E-Crime Study. Partnership Policing for the Information Society (2003), http://www.eurim.org/consult/ecrime/dec03/ECS_WP1_web_031209.htm
GSO. GetSafeOnline (2009a), http://www.getsafeonline.org/nqcontent.cfm?a_id=1143
GSO. GetSafeOnline (2009b), http://www.getsafeonline.org/nqcontent.cfm?a_id=1499
Holt, J.T., Bossler, A.M.: Examining the applicability of Lifestyle- routine activities theory for cybercrime victimisation. Deviant Behaviour 30, 1–25 (2009)
Hunt, D.: Preventing Criminal Victimisation: The case for an Intersectoral Response to Victimisationa South Australian Perspective (1994), http://www.aic.gov.au/publications/proceedings/27/hunt.pdf
Ivanova, P.: cybercrime & cyber security. Information & Security, an international Journal 18(1) (2006)
Justickis, V.: Criminal data Mining. In: Jahankhani, H., et al. (eds.) Handbook of electronic security and digital forensics. World Scientific, London (2010)
Kabay, M.E., Bosworth, S.: Computer security Handbook. John Wiley & Sons, Inc., New York (2005)
NCL’s Fraud Centre Survey (2007), http://www.fraud.org/internet/intstat.htm
Pease, K.: Crime Future and foresight. In: Wall, D.S. (ed.) Crime and the Internet. Routledge, London
Rogers, M., et al.: Self-reported computer criminal behaviour: a psychological analysis. Digital Investigation Journal (2006), www.elsevier.com/locate/diin
Trend Micro: Securing your web (2008), http://us.trendmicro.com/imperia/md/content/us/pdf/threats/securitylibrary/1h_2008_threat_report_final.pdf
Williams, M.: Cybercrime. In: Miller, M. (ed.) Encyclopaedia of criminology. Routledge, London (2005)
Williams, K.S.: Using title control balance theory to understand computer crime and deviance. International review of Law Computers & Technology 22(1), 145–155 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Al-Nemrat, A., Jahankhani, H., Preston, D.S. (2010). Cybercrime Victimisations/Criminalisation and Punishment. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-15717-2_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15716-5
Online ISBN: 978-3-642-15717-2
eBook Packages: Computer ScienceComputer Science (R0)