What We Do in the Shadows: How does Experiencing Cybercrime Affect Response Actions & Protective Practices?

Magdalene Ng, Maria Bada, Kovila P. L. Coopamootoo
{"title":"What We Do in the Shadows: How does Experiencing Cybercrime Affect Response Actions & Protective Practices?","authors":"Magdalene Ng, Maria Bada, Kovila P. L. Coopamootoo","doi":"10.1109/EuroSPW59978.2023.00077","DOIUrl":null,"url":null,"abstract":"Despite the increasing prevalence of cybercrimes, there is limited understanding of the response strategies and protective (privacy, security) practices of individuals who have experienced at least one attempted or successful cybercrime incident. To address this gap, we conduct an online survey across an N=605 sample from the UK, eliciting firsthand accounts of cybercrime experiences, actions taken in response to such incidents, as well as their level of engagement with security and privacy (SP) methods and technologies. We identify the occurrence of 8 distinct types of cybercrime and 9 corresponding response strategies amongst 319 cybercrime reports, encompassing IT and protective themes. We depict the association between the experience of cybercrime and the utilisation of response strategies through visual representation. In parallel with IT-related or protective SP theme response strategies, we find that the type of cybercrime experienced (e.g., malware) and the frequency of experiences (e.g., multiple cybercrimes or repeated experiences of the same cybercrime type) influence the engagement with SP technologies. This paper provides empirical insights into experiences of different types of cybercrimes, including their multiple occurrences, and (protective) actions. We also provide recommendations for research and practical implementation, emphasising the importance of addressing the specific needs of individuals who have experienced multiple or repeat cybercrimes. Our paper suggests the adoption of a de-responsibiling cyber-strategy that complements individual guardianship — while promoting infrastructure that caters to the diverse range of users.","PeriodicalId":220415,"journal":{"name":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EuroSPW59978.2023.00077","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Despite the increasing prevalence of cybercrimes, there is limited understanding of the response strategies and protective (privacy, security) practices of individuals who have experienced at least one attempted or successful cybercrime incident. To address this gap, we conduct an online survey across an N=605 sample from the UK, eliciting firsthand accounts of cybercrime experiences, actions taken in response to such incidents, as well as their level of engagement with security and privacy (SP) methods and technologies. We identify the occurrence of 8 distinct types of cybercrime and 9 corresponding response strategies amongst 319 cybercrime reports, encompassing IT and protective themes. We depict the association between the experience of cybercrime and the utilisation of response strategies through visual representation. In parallel with IT-related or protective SP theme response strategies, we find that the type of cybercrime experienced (e.g., malware) and the frequency of experiences (e.g., multiple cybercrimes or repeated experiences of the same cybercrime type) influence the engagement with SP technologies. This paper provides empirical insights into experiences of different types of cybercrimes, including their multiple occurrences, and (protective) actions. We also provide recommendations for research and practical implementation, emphasising the importance of addressing the specific needs of individuals who have experienced multiple or repeat cybercrimes. Our paper suggests the adoption of a de-responsibiling cyber-strategy that complements individual guardianship — while promoting infrastructure that caters to the diverse range of users.
我们在阴影中做什么:经历网络犯罪如何影响响应行动和保护措施?
尽管网络犯罪越来越普遍,但人们对至少经历过一次未遂或成功的网络犯罪事件的个人的响应策略和保护(隐私、安全)实践的理解有限。为了解决这一差距,我们对来自英国的N=605个样本进行了在线调查,收集了网络犯罪经历的第一手资料,针对此类事件采取的行动,以及他们对安全和隐私(SP)方法和技术的参与程度。我们在319份网络犯罪报告中确定了8种不同类型的网络犯罪和9种相应的应对策略,包括IT和保护主题。我们描述了网络犯罪的经验和通过视觉表现利用响应策略之间的联系。与it相关或保护性SP主题响应策略并行,我们发现所经历的网络犯罪类型(例如,恶意软件)和经历的频率(例如,多次网络犯罪或重复经历相同类型的网络犯罪)影响SP技术的参与。本文提供了不同类型的网络犯罪的经验,包括他们的多次发生和(保护)行动的经验见解。我们还为研究和实际实施提供建议,强调解决经历多次或重复网络犯罪的个人的特定需求的重要性。我们的论文建议采用一种不负责任的网络战略,以补充个人监护——同时促进满足不同用户范围的基础设施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信