International Journal of Cyber Criminology最新文献

筛选
英文 中文
Cloaked by cyber space: A legal response to the risks of cyber stalking in Malaysia 被网络空间遮蔽:马来西亚对网络跟踪风险的法律回应
IF 1
International Journal of Cyber Criminology Pub Date : 2018-01-01 DOI: 10.5281/ZENODO.1467931
Z. Hamin, Wan Rosalili Wan Rosli
{"title":"Cloaked by cyber space: A legal response to the risks of cyber stalking in Malaysia","authors":"Z. Hamin, Wan Rosalili Wan Rosli","doi":"10.5281/ZENODO.1467931","DOIUrl":"https://doi.org/10.5281/ZENODO.1467931","url":null,"abstract":"Cyber stalking generally involves unwarranted, repeated and threatening conduct of the offender via the Internet or social media platforms, which causes fear, distress or alarm to the victim. A qualitative study on the perception of cyber stalking and the adequacy of the anti-stalking law to regulate such crime in Malaysia is somewhat scarce. Hence, this paper seeks to examine cyber stalking risks and the sufficiency of laws to govern such crime and the legal protection afforded to victims. This paper adopts a qualitative methodology, where the data is obtained from eighteen semi-structured interviews conducted with various stakeholders, including the regulators and enforcement officers. Secondary data involves cyber legislation, the Penal Code, and online sources. The findings suggest that cyber stalking risks are often manufactured by the victims, which lead to individual responsibility towards managing and mitigating such risks. The findings have significant implications for lawmakers to either enact specific laws on cyber stalking or amend the Penal Code to include such crime. ________________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71025352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adults Who Sext: Exploring Differences In Self-Esteem, Moral Foundations, And Personality 发性短信的成年人:探索自尊、道德基础和个性的差异
IF 1
International Journal of Cyber Criminology Pub Date : 2017-07-01 DOI: 10.5281/ZENODO.1037378
Danielle M. Crimmins, Kathryn C. Seigfried-Spellar
{"title":"Adults Who Sext: Exploring Differences In Self-Esteem, Moral Foundations, And Personality","authors":"Danielle M. Crimmins, Kathryn C. Seigfried-Spellar","doi":"10.5281/ZENODO.1037378","DOIUrl":"https://doi.org/10.5281/ZENODO.1037378","url":null,"abstract":"This study assessed the prevalence of sexting behaviors among adults, and the relationship between sexting and moral foundations, self-esteem, and individual differences. Additionally, this study examined differences in the methods used to send sext messages (mobile applications vs. text messages) and image content (e.g., face, masturbating). Respondents solicited through Amazon’s Mechanical Turk completed the anonymous survey measuring “attitudes toward sexting.” The final sample included 508 adult participants; 68% of adults reported sexting behaviors, and both mobile applications and traditional text messages were used to send sext messages. In general, individuals who scored higher on extraversion and lower on conscientiousness, agreeableness, harm, and fairness were more likely to engage in sexting behaviors. Self-esteem was not associated with any sexting behaviors. Results also found significant differences between individuals who send semi-nude and nude sext messages. Limitations and future research suggestions are discussed.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43629153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory 美国大学生网络骚扰与网络犯罪模式:例行活动理论的检验
IF 1
International Journal of Cyber Criminology Pub Date : 2017-01-01 DOI: 10.5281/ZENODO.495770
S. Wick, C. Nagoshi, R. Basham, C. Jordan, Y. Kim, Anh P. Nguyen, Peter Lehmann
{"title":"Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory","authors":"S. Wick, C. Nagoshi, R. Basham, C. Jordan, Y. Kim, Anh P. Nguyen, Peter Lehmann","doi":"10.5281/ZENODO.495770","DOIUrl":"https://doi.org/10.5281/ZENODO.495770","url":null,"abstract":"A sample of 298 college students at a large southwestern state university (female 68.8%) completed an online survey about their experiences of being victimized by and engaging in perpetration of cyber-harassment of romantic partners. The findings partially supported the application of Routine Activities Theory to understand the predictors of cyber-harassment for victims and victimizers. Victimization for women was associated with greater general risk-taking propensity and reported online exposure and disclosure. For both men and women, greater risk propensity and online disclosure were associated with greater reports of perpetrating such harassment. ________________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71084872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Where do beliefs about music piracy come from and how are they shared 人们对音乐盗版的看法从何而来,又是如何分享的
IF 1
International Journal of Cyber Criminology Pub Date : 2016-07-24 DOI: 10.5281/ZENODO.58518
S. Brown
{"title":"Where do beliefs about music piracy come from and how are they shared","authors":"S. Brown","doi":"10.5281/ZENODO.58518","DOIUrl":"https://doi.org/10.5281/ZENODO.58518","url":null,"abstract":"Research suggests that those individuals engaging in music piracy have little concern for the potentially negative consequences of engaging in this illegal activity. This study aims to build on previous research which finds that sub-cultural piracy knowledge is effectively transmitted online. Explicitly, this study aims to observe the various justifications people forward to rationalise engagement in music piracy, in accordance with Sykes and Matza’s (1957) widely researched neutralization theory, and if techniques used to rationalize behaviours are shared amongst those individuals found to be discussing and engaging in music piracy online. The research examines naturally occurring discourse across three online settings, finding a widespread perception that there is ‘no harm done’ and that tips to work around web-blocking are exchanged online, including in public spaces such as Twitter. However, differences were found in the beliefs and attitudes of the sample. The study raises key conceptual issues about the theory used.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2016-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization 针对荷兰网上银行客户的网络钓鱼和恶意软件攻击:导致受害因素的定性分析
IF 1
International Journal of Cyber Criminology Pub Date : 2016-01-01 DOI: 10.5281/ZENODO.58523
J. Jansen, R. Leukfeldt
{"title":"Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization","authors":"J. Jansen, R. Leukfeldt","doi":"10.5281/ZENODO.58523","DOIUrl":"https://doi.org/10.5281/ZENODO.58523","url":null,"abstract":"IntroductionThis paper describes an in-depth analysis into the behaviour and characteristics of bank customers leading to victimization caused by phishing and malware attacks, the most common crimes involving online banking fraud in the Netherlands (NVB, 2013). Phishing is \"a scalable act of deception whereby impersonation is used to obtain information from a target\" (Lastdrager 2014, 8). Malware is the infection of a computer by malicious software, which includes viruses, worms, Trojan horses and spyware. In both cases, the aim of the fraudsters is to deceive the customer or the system used for online banking in order to obtain user credentials and/or to gain control over customers' devices. Fraudster use user credentials to access a victim's online bank account and to validate money transfers on behalf of the victim. Phishing and malware scams, however, are significant across the world and go beyond the online banking context. The Anti-Phishing Working Group reported in their Phishing Activities Trends Report of Q4 2014 that nearly 200,000 unique phishing reports were submitted to them and that an average of 255,000 new malware threats (including variants) emerged each day (APWG, 2015).A number of recent studies try to shed light on how and why people fall victim to these crimes and others do not (Bossler & Holt, 2009; Ngo & Paternoster, 2011; Vishwanath, Herath, Chen, Wang, & Rao, 2011). Jansen and Leukfeldt (2015), for example, carried out an exploratory study into how customers become victims of online banking fraud and demonstrate that customers have a specific role in their own victimization. Customers provide fraudsters with information, such as credentials, which fraudsters can use to steal money from their bank accounts. A study into phishing victimization shows that everybody is at risk when it comes to this type of crime (Leukfeldt, 2014). Additionally, Leukfeldt (2015) claims that this also largely holds for malware victimization; merely spending more time online, carrying out various kinds of activities, increased the risk of a malware infection.Both of Leukfeldt's studies (2014, 2015) - which are based on an online survey - conclude that in-depth studies are necessary to increase knowledge about why customers are victimized. It is not sufficiently clear if certain individuals are more prone to being at risk for online banking fraud than others, and how it can be explained. Therefore, this study qualitatively explores, by means of interviews, what factors explain online banking fraud victimization. Crossler et al. (2013) mention, that, the interview is a valuable method to better understand the actual motivations and behaviour of individuals.Theoretical backgroundFor this study, two theoretical perspectives are in place. First, we take a routine activity approach (Cohen & Felson, 1979) to study victim characteristics and behaviours that influence victimization. This approach is also central to the studies of Leukfeldt (2014, 2015) m","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis 尼日利亚国家网络安全政策与战略:定性分析
IF 1
International Journal of Cyber Criminology Pub Date : 2015-08-02 DOI: 10.5281/ZENODO.22390
Oluwafemi Osho, Agada David Onoja
{"title":"National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis","authors":"Oluwafemi Osho, Agada David Onoja","doi":"10.5281/ZENODO.22390","DOIUrl":"https://doi.org/10.5281/ZENODO.22390","url":null,"abstract":"With advancements in modernization came the infiltration of information and communication technologies across the world, Nigeria inclusive. Several benefits are obtainable from these but also prevalent are some associated risks. Communication exists massively in cyberspace and as such poses a myriad of threats to a nation. This can be addressed on a national spectrum by the implementation of cyber security policies and strategies. This research involves making a qualitative analysis of the current Nigerian National Cyber Security Policy and Strategy. The documents were analyzed in the light of selected harmonized strategy developmental frameworks and subsequently comparatively evaluated with similar documents of selected countries. After the analysis, the national documents were found to have met majority of the requirements in terms of content, but failed to address certain elements of concern to cyber security in the Nigerian environment.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2015-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71048189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Consumer Perceptions of Mobile and Traditional Point-of-Sale Credit/Debit Card Systems in the United States: A Survey 美国消费者对移动和传统销售点信用卡/借记卡系统的看法:一项调查
IF 1
International Journal of Cyber Criminology Pub Date : 2015-07-01 DOI: 10.5281/ZENODO.56201
Nitish Saxena, D. Schwebel, Jacinta Cai, J. Sloan, K. Jaishankar, Jun Yu, M. Godbole, Olive Nick Harper, Michael Goergescu
{"title":"Consumer Perceptions of Mobile and Traditional Point-of-Sale Credit/Debit Card Systems in the United States: A Survey","authors":"Nitish Saxena, D. Schwebel, Jacinta Cai, J. Sloan, K. Jaishankar, Jun Yu, M. Godbole, Olive Nick Harper, Michael Goergescu","doi":"10.5281/ZENODO.56201","DOIUrl":"https://doi.org/10.5281/ZENODO.56201","url":null,"abstract":"IntroductionPoint-Of-Sale (POS) systems are used globally to accept payment from consumers using credit or debit cards to purchase goods or services. The most popular form of POS reader, especially in the United States (US), involves swiping a credit or debit card through a magnetic scanner (Smart Card Alliance, 2011). This \"traditional\" POS (TPOS) system requires a dedicated, standalone card reader deployed solely for the purpose of processing transactions using credit/debit cards. Such systems have been used for many years and most consumers are familiar with them.Recently, a new POS system was introduced to the market, the mobile POS (MPOS) system (Johnson, 2012). Manufactured by several venders, including Square®, Intuit GoPayment® and Paypal Here®, MPOS systems take two forms. One type, hardware-based MPOS systems, consists of a small reader that plugs into a mobile device such as a smart phone or tablet. Consumers swipe their credit/debit cards through the device to make a payment. Merchants typically use the mobile device not just to accept payments but also for various other personal or business purposes. Payments are processed through software apps stored on the device. The other type of MPOS system is software based and usually requires manual entry of card information onto the phone or tablet. In some cases, the merchant can photograph the credit/debit card instead of entering data found on the card (www.card.io).A large body of research suggests consumers may have anxiety, fear, or concern about their personal safety and security when using new technology, especially when they are sharing personal or secure information such as credit or debit card numbers using that technology (Liu, 2012; Meuter et al., 2003; Perea y Monsuwe, Dellaert, & de Ruyter, 2004). Such anxiety was reported by consumers, for example, when making Internet-based credit card purchases a decade ago (Perea y Monsuwe et al, 2004) and more recently in using self-service bank machines (Liu, 2012). Given recent mass media publicity about cyber-crime and the potential for personal data to be stolen electronically (e.g., Whitaker, 2014), MPOS systems may introduce particular concern about crime victimization among consumers for several reasons. These include: (a) the electronic devices are used for multiple purposes by merchants, including personal matters, which may introduce greater risk of consumer information being stolen or misused; (b) they are small, mobile devices connected wirelessly and often insecurely to the Internet, which may raise fear of ready access by criminals to personal information; (c) third-party apps are both easily and typically stored on MPOS host devices and may contain malware; and (d) credit card theft has been featured prominently by national US media outlets in recent years.Given the rapid increase recently in the use of MPOS systems, the potential for high levels of consumer anxiety about crime victimization while using them based on resear","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber Bullying in the Netherlands: A Criminological Perspective 荷兰的网络欺凌:犯罪学视角
IF 1
International Journal of Cyber Criminology Pub Date : 2015-07-01 DOI: 10.5281/ZENODO.55055
Joyce Kerstens, K. Jaishankar, S. Veenstra
{"title":"Cyber Bullying in the Netherlands: A Criminological Perspective","authors":"Joyce Kerstens, K. Jaishankar, S. Veenstra","doi":"10.5281/ZENODO.55055","DOIUrl":"https://doi.org/10.5281/ZENODO.55055","url":null,"abstract":"IntroductionThe internet has become a common and indispensable phenomenon in our society. At the same time, cyber crime generates a lot of media attention. Furthermore, reports on the prevalence of cyber crime appear regularly and the Dutch government prioritizes the tracking and prevention of cyber crime. The term 'cyber crime' refers to criminal and deviant behaviour through the use of online technologies (Wall, 2001; Yar, 2012). Cyber crime is, either implicitly or explicitly, conceptualized as the contemporary counterpart of traditional crime, i.e., crimes that occur only in the offline world (Taylor, Fritsch, Liederbach, & Holt, 2010). Studies on cyber crime predominantly focus on identifying the types and prevalence of cyber crimes and often lack a theoretical base. Studies on the applicability of criminological theories to cyber crime are scarce (McQuade, 2006; Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Anyone who studies cyber crime will eventually have to look in to theories in order to find an explanation for the findings. At the same time, research is necessary to test the applicability of criminological theories to cyber crime or, to further develop theoretical approaches (e.g., Bernard, 2002; Bottoms, 2000). Lately, criminologists have been debating whether existing criminological theories are useful for the explanation of cyber crime or whether the phenomenon requires novel theoretical explanations (Jaishankar, 2008). In essence, the question is whether cyber crime constitutes a new category of criminal behaviour (Yar, 2005; Jaishankar, 2008; Holt, 2013; Yar, 2012).The Offline-Online dichotomy in relation to Cyber CrimeResearchers, politicians, and policy makers see the offline and online worlds as two separate worlds. The two are regarded as opposites, and characteristics attributed to the online world do not apply to the offline world: the transformation of time-space relationships, (perceived) anonymity, and the relative ease with which social identities can be manipulated (Yar, 2006). Of these characteristics, (perceived) anonymity is particularly connected with online disinhibition: in the online world people behave with fewer restrictions and inhibitions than in the offline world (Suler, 2004). With the arrival of the internet, a new world seems to have emerged: the online world, or cyber space. The question is, however, whether the offline-online dichotomy does justice to the complexity and interrelatedness of offline and online interactions. Subrahmanyam and Smahel (2011) call attention to the immense development in the use of online technologies since the arrival of the internet and argue that the offline and online worlds are interwoven. Research also shows that online interactions of youth occur predominantly in the context of existing relationships (Livingstone, Haddon, Gorzig, & Olafsson, 2011) and that young people increasingly see their offline and online interactions as a coherent experience (Livingstone, 200","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71090575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cyber Criminal Networks and Money Mules: An Analysis of Low-Tech and High-Tech Fraud Attacks in the Netherlands 网络犯罪网络和金钱骡子:对荷兰低技术和高技术欺诈攻击的分析
IF 1
International Journal of Cyber Criminology Pub Date : 2015-07-01 DOI: 10.5281/ZENODO.56210
R. Leukfeldt, J. Jansen
{"title":"Cyber Criminal Networks and Money Mules: An Analysis of Low-Tech and High-Tech Fraud Attacks in the Netherlands","authors":"R. Leukfeldt, J. Jansen","doi":"10.5281/ZENODO.56210","DOIUrl":"https://doi.org/10.5281/ZENODO.56210","url":null,"abstract":"IntroductionMoney mules can be seen as a crucial part of the criminal network. They are of great importance for the core members of these networks because money mules are used to interrupt the trail that may lead law enforcement agencies to the top of the network. Money mules, for example, register bank accounts or businesses under their names, which are actually exploited by the criminal network.Several studies acknowledge the important role of money mules in the diversion of money stolen by cyber criminals who are engaged in financial cyber crimes, such as carding3 or phishing4 attacks (Choo, 2008; Moore & Clayton, 2009; McCombie, 2011;Aston et al., 2009; Soudijn & Zegers, 2012; Leukfeldt, 2014; Leukfeldt et al., 2016b, 2016c). Most of these studies, however, concentrate primarily on the core group of the criminal networks and only focus indirectly on money mules. Empirical studies into characteristics of internet money mules are lacking. Only Aston et al. and McCombie carried out some exploratory analyses of money mules used in Australian phishing attacks.In order to fill this knowledge gap, this paper focuses on money mules who are used by cyber criminal groups that carry out attacks on financial institutions. To gain insight into this group of criminals, which we believe plays a vital role in the crime process; we analyzed unique data from a fraud registration system of a major Dutch bank. We obtained 600 fraud incidents from the period 2011-2013. Based on these data, this paper provides insight into the characteristics of money mules and the way in which this group is used by criminal networks to transfer money from victim bank accounts. More specifically, we present background characteristics, the socioeconomic status of money mules, and the value and number of transactions to money mules.Review of LiteratureThe present study advances the work of Leukfeldt et al. (2016a, 2016b, 2016c). These studies provide insight into the composition, origin and growth, and criminal capabilities of criminal networks carrying out financial cyber crimes. Forty cyber criminal networks were analyzed in the Netherlands, Germany, UK and the US. The Dutch cases provided the authors with information about cyber criminal networks and their members largely as a result of investigative methods such as wiretaps, IP taps, observations, undercover policing and house searches. The authors reviewed the financial cyber crime cases systematically using an analytical framework. In the other three countries, the authors relied on interviews with case officers and public prosecutors involved in the criminal investigations against cyber criminal networks since no police files were available to them. This section briefly describes the main results of these three studies.Criminal CapabilitiesAll networks that were analyzed by Leukfeldt et al. are involved in attacks on online banking. The crime scripts of the Dutch networks have many similarities. Step one is obtaining login cr","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Regulation of Cyber Space: An Analysis of Chinese Law on Cyber Crime 网络空间规制:中国网络犯罪法分析
IF 1
International Journal of Cyber Criminology Pub Date : 2015-07-01 DOI: 10.5281/ZENODO.56225
Xingan Li, K. Jaishankar
{"title":"Regulation of Cyber Space: An Analysis of Chinese Law on Cyber Crime","authors":"Xingan Li, K. Jaishankar","doi":"10.5281/ZENODO.56225","DOIUrl":"https://doi.org/10.5281/ZENODO.56225","url":null,"abstract":"IntroductionRecent two decades witnessed a swift transforming of human and social landscape due to the pervasive use of digital networks, which connect individuals, institutions, businesses and agencies spreading over the world. The growing convenience for creating, depositing, processing, transmitting, and retrieving of information increased the quantity of data in both static and dynamic processes, improved virtual communication, developed social networks, and at the same time, risks, threats and dangers have also been un-ignorable problems.Naturally, it was not strange that information systems in the background of Chinese history had been regarded as a modern instrument in an ancient territory. In fact, many countries were confronted with similar challenge at the dawn of the information age, when they were perplexed for how to benefit from the pervasive use of information systems while avoiding negative political and legal impact of unmonitored users, uncensored information, unchecked communications, uncontrolled activities and unsolicited visits. Such potentialities were also eroding footstones of the Chinese Great Wall.Additionally, migration of criminal phenomena into information systems-facilitated cyber space has attracted increasing attention due to its high pace of expansion (Li, 2008; Li, 2009). The 1997 Penal Law of China (which was usually translated as Criminal Law, but, Penal Law should be more exact translation) provided fundamental criteria and guidelines for convicting and sentencing cyber criminals. With assistance of a series of other statutory laws and administrative regulations, a legal and regulatory system has been taking shape to suppress the spread of cyber crime of multiple forms, the so-called new century's pestilence, in cyberspace. The explosion of new and pertinent laws and regulations over the past two decades reflected society's concerns on the ancient phenomenon in a modernized context, and efforts to wrestle with it. Yet, it remained uncertain whether the current approach to deter and redress cyber crime would prove to be successful.In the following sections, this article will review the process of establishing the legal framework on cyber crime in China, examine the features of Chinese laws and regulations tackling cyber crime, and analyze the policy for preventing cyber crime through control over cyber space in China. The article will also analyze the subject, the means, the mechanism and the main purpose of control over cyberspace, with review of its actual effects and defects.1. Criminalization and Penalization of Cyber CrimeThe \"chance encounter\" of communist China based on its ancient land and people with the information network had multiple potentialities of changing the politico-social order, which were unexpected and unprepared events in the late 20th century. According to official statistics, to the end of 2014, the number of Internet users in China reached 649 million and the number of mobile Internet","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71091334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信