L. Conradie, Melanie Pitchford, Ellie Myers, James Barnes, E. Short
{"title":"Cyberharassment Awareness Course (Cybac): influences from domestic abuse perpetrator programmes for its design and function","authors":"L. Conradie, Melanie Pitchford, Ellie Myers, James Barnes, E. Short","doi":"10.5281/ZENODO.3750140","DOIUrl":"https://doi.org/10.5281/ZENODO.3750140","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42272738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud","authors":"M. Abdulai","doi":"10.5281/ZENODO.3749468","DOIUrl":"https://doi.org/10.5281/ZENODO.3749468","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rising Trend of Phishing Attacks on Corporate Organisations in Cross River State, Nigeria","authors":"J. T. Okpa, B. O. Ajah, Joseph Egidi Igbe","doi":"10.5281/ZENODO.4770111","DOIUrl":"https://doi.org/10.5281/ZENODO.4770111","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71084130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes","authors":"F. Miró-Llinares, Jacqueline M. Drew, M. Townsley","doi":"10.5281/ZENODO.3744874","DOIUrl":"https://doi.org/10.5281/ZENODO.3744874","url":null,"abstract":"Economic forms of cybercrime affect millions of people around the world. Preparatory crimes such as spam, scam and malware are increasingly enacted by cybercriminals. However, literature has shown that some people are more vulnerable than others to these types of attacks and this may be a circumstance that varies cross-nationally. Using a comparative research design, behaviors that are associated with a higher probabUity of victimization by economic preparatory crimes are identified. The results obtained ffom two samples, one Spanish and one Australian, show that despite similar victimization prevalence, the correlates of routine activities vary substantially. While 6 of the 11 behaviors analyzed were similar, other substantial differences were found. The greatest risk for Spanish participants is online shopping, while for Australians it is downloading files. Differences were also found for use of antivirus, pirated software, contacting strangers and taking part in video conferences. Based on the current research, it is concluded that cyber victimization should locus on identifying nuances in the daily activities performed by online users, rather than on broader constructs such as interaction or visibility. Further, preventive strategies must take into account differences in routine behaviors across different geographical areas.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harmful discourse on social triggering factors of persecution truth era","authors":"Bagus Sudarmanto, A. Meliala","doi":"10.5281/ZENODO.3752537","DOIUrl":"https://doi.org/10.5281/ZENODO.3752537","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Project Leaked: research on non-consensual sharing of intimate images in Brazil","authors":"Leandro Ayres França, Jéssica Veleda Quevedo","doi":"10.5281/ZENODO.3766654","DOIUrl":"https://doi.org/10.5281/ZENODO.3766654","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack","authors":"Anna Leppänen, Tero Toiviainen, T. Kankaanranta","doi":"10.5281/ZENODO.3740361","DOIUrl":"https://doi.org/10.5281/ZENODO.3740361","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Tejeiro, Laurence Alison, Emma L. Hendricks, S. Giles, Matthew L. Long, David Shipley
{"title":"Sexual behaviours in indecent images of children: A content analysis","authors":"R. Tejeiro, Laurence Alison, Emma L. Hendricks, S. Giles, Matthew L. Long, David Shipley","doi":"10.5281/ZENODO.3743390","DOIUrl":"https://doi.org/10.5281/ZENODO.3743390","url":null,"abstract":"Whilst research on indecent image of children (HOC) offenders is increasing, litde is known about HOC content. This paper presents a content analysis on the sexual actions depicted in a sample of 729 HOC ffom 26 offenders. Victims were most often White females aged around 95 years, with most offenders in the 18-24 age range, male and White. Most images show erotic posing with no sexual activity, with 13.4% presenting sexual activity by an adult on a child and 12.8%presenting sexual activity by a child on an adult. ExpUcit portrayals of physical aggression, humih'ation or overt physical suffering were conspicuously rare. Few images depicted attempts to display pseudo affection towards the victim. Interactions were found in several variables between victims' age and gender and offenders' age and gender. The need to more fully understand the nature and content of HOC and their psychological significance are discussed.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delineating victims from perpetrators: Prosecuting self-produced child pornography in Youth Criminal Justice Systems","authors":"B. Westlake","doi":"10.5281/ZENODO.1467907","DOIUrl":"https://doi.org/10.5281/ZENODO.1467907","url":null,"abstract":"Video recording technology advancements and accessibility has been paralleled by a growth in selfproduced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce nonsexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad punishment, education, and counseling response from youth criminal justice systems (YCJS). Recommendations are meant as a starting point, framed with multiple YCJS structures, the duality of victim and perpetrator, the justice and welfare approaches to juvenile justice, and the United Nations Convention on the Rights of the Child in mind. _____________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71025235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Shadmanfaat, C. J. Howell, Caitlyn N. Muniz, John K. Cochran, Saeed Kabiri, D. Richardson
{"title":"The Predictive Ability of Self-Control and Differential Association on Sports Fans’ Decision to Engage in Cyber Bullying Perpetration against Rivals","authors":"S. Shadmanfaat, C. J. Howell, Caitlyn N. Muniz, John K. Cochran, Saeed Kabiri, D. Richardson","doi":"10.5281/ZENODO.3365618","DOIUrl":"https://doi.org/10.5281/ZENODO.3365618","url":null,"abstract":"A sample of 318 students from two Iranian universities was employed to conduct a test of Gottfredson and Hirschi’s self-control theory and elements of Akers’ social learning theory. Specifically, we sought to determine whether these theories are capable of explaining the decision to cyber bully members and fans of rival sports teams. Structural equation modeling was used to analyze these data. Findings suggest that individuals with low levels of self-control are more likely to engage in cyber bullying perpetration. Similarly, those who associate with delinquent peers are more likely to engage in cyber bullying perpetration. Additionally, we found that ineffective parenting has an indirect effect on cyber bullying perpetration through its direct effect on self-control and differential association. Lastly, we found that self-control and differential association interact to more fully explain cyber bullying perpetration. Theoretical implications are discussed. _____________________________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71073383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}