{"title":"Book Review of Sexual Predators: How to Recognize Them on the Internet and on the Street - How to Keep Your Kids Away","authors":"Catherine D. Marcum","doi":"10.5281/ZENODO.18283","DOIUrl":"https://doi.org/10.5281/ZENODO.18283","url":null,"abstract":"“Before all this, I thought a predator is someone who lurks in the bushes. I didn’t think I was one. But then I realized the computer monitor was my bushes.” The above-referenced quote was made by serial child predator Jake Matthew Clawson in regards to his recognition of his online obsession. It was referenced as a demonstration of the common misconception many of us have regarding the tactics used by child pedophiles to stalk children. The stereotype of the dirty old man hanging out at the school playground in a dingy van waiting and watching for unsuspecting little girls and boys is being replaced by a different type of predator. This is the predator that hides behind false identities and personalities in chat room, instant messages or emails to gain the trust of the same unsuspecting, but now computer-savvy children. The book “Sexual Predators: How to Recognize Them on the Internet and on the Street – How to Keep Your Kids Away,” written by Stephen Dean, is the latest book that provides a wealth of information on these new types of predators and the tactics that they use on the technologically confident youth. Award-winning, investigative journalist Stephen Dean has had years of experience working with authorities investigating crimes against children. His current passion has led him to immerse himself in the world of Internet predators. He has posed as a child in chat rooms during multiple Internet investigations with the Houston Police Department and federal authorities to apprehend online predators. His work has been featured on ABC, NBC, CBS and CNN, as well as many local news stations. With these experiences, he describes in detail in his","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"155-160"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber bullying: Clarifying Legal Boundaries for School Supervision in Cyberspace","authors":"S. Shariff, Dianne L. Hoff","doi":"10.5281/ZENODO.18279","DOIUrl":"https://doi.org/10.5281/ZENODO.18279","url":null,"abstract":"Abstract Cyber bullying is a psychologically devastating form of social cruelty among adolescents. This paper reviews the current policy vacuum of the legal obligations and expectations of schools to monitor and supervise online discourse, while balancing student safety, education, and interaction in virtual space. The paper opens with a profile and conditions of cyber bullying using an analogy to Golding’s (1954), Lord of the Flies. The anarchy and deterioration of unsupervised adolescent relationships depicted in the book are compared to the deterioration of social relationships among adolescents in virtual space. A discussion of the institutional responses to cyber bullying follows. Finally, emerging and established law is highlighted to provide guidelines to help schools reduce cyber bullying through educational means that protect students and avoid litigation.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Crime Investigations in the United States: Leveraging Knowledge from the Past to Address the Future","authors":"S. Hinduja","doi":"10.5281/ZENODO.18275","DOIUrl":"https://doi.org/10.5281/ZENODO.18275","url":null,"abstract":"Many traditional crimes are now being aided or abetted through the use of computers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing amount of their efforts toward successfully identifying, apprehending, and assisting in the successful prosecution of perpetrators. In the following text, key research findings in the area of traditional American criminal investigations are summarized. Similarities and differences between traditional and computer crime investigations are then presented, and consequent implications are discussed. Pragmatic suggestions as to how American computer crime investigative task forces can most competently fulfill their intended objectives are given in conclusion via a hypothetical example of a specialized unit. It is hoped that past knowledge can be assimilated with current observations of computer-related criminality to inform and guide the science of police investigations in the future.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"1-26"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Offshore Internet Gambling and the World Trade Organization: Is it Criminal Behavior or a Commodity?","authors":"H. Pontell, G. Geis, Gregory C. Brown","doi":"10.5281/ZENODO.18280","DOIUrl":"https://doi.org/10.5281/ZENODO.18280","url":null,"abstract":"Internet gambling possesses an array of attractive attributes. For one thing, there is no necessity to leave home, with the associated outlay for lodging and meals, and the expenditure for transportation costs. For another, gambling at home avoids the noise and confusion of crowded confines, the distractions of seductive servers, the windowless gaming rooms, with no wall clocks to make customers aware of the time. Internet gambling is an industry that is growing exponentially and its perception as criminal is a matter of intense debate. On the transnational scene it has emerged as a public policy issue of significant ideological interest and of massive financial importance. This paper traces the development of the WTO case and attempts at its resolution and also offers a view of what is regarded as the most sensible, and probably the inevitable path that the trajectory of Internet gambling should and will take.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"119-136"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value","authors":"George E. Higgins","doi":"10.5281/ZENODO.18277","DOIUrl":"https://doi.org/10.5281/ZENODO.18277","url":null,"abstract":"To date, several researchers have shown that attitudes, low self-control, social learning theory and deterrence theory to explain digital piracy. However, no study examined whether rational choice theory mediated the link between low self-control and digital piracy. Further, no study in digital piracy or criminological literature had considered the role of value in such an examination. Therefore, the purpose of the present study was to contribute to the literature by examining the links between low self-control, rational choice, value, and digital piracy. This study built on the mediating model presented by Piquero and Tibbetts (1996). That is, this study assumed that rational choice theory mediated the link between low self-control and digital piracy. Further, this study assumed that some situational factors would mediate the effect of other situational factors","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"5 1","pages":"33-55"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Qualitative Analysis of Advance Fee Fraud E-mail Schemes","authors":"T. Holt, D. C. Graves","doi":"10.5281/ZENODO.18282","DOIUrl":"https://doi.org/10.5281/ZENODO.18282","url":null,"abstract":"Criminals utilize the Internet to perpetrate all manner of fraud, with the largest dollar losses attributed to advance fee fraud e-mail messages. These messages come from individuals who claim to need assistance moving a large sum of money out of their country. Individuals who respond to the messages often become victims of fraud and identity theft. Few criminologists have examined this type of fraud, thus this study explores the mechanisms employed by scammers through a qualitative analysis of 412 fraudulent e-mail messages. The findings demonstrate that multiple writing techniques are used to generate responses and information from victims. Half of all the messages also request that the recipient forward their personal information to the sender, thereby enabling identity theft. The implications of this study for law enforcement and computer security are also discussed.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"137-154"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Criminology: Evolving a novel discipline with a new journal","authors":"K. Jaishankar","doi":"10.5281/ZENODO.18276","DOIUrl":"https://doi.org/10.5281/ZENODO.18276","url":null,"abstract":"Cyberspace presents an exciting new frontier for criminologists. Virtual reality and computer mediated communications challenge the traditional discourse of criminology, introducing new forms of deviance, crime, and social control (McKenzie 1996). Since the 1990s, academics have observed how the cyberspace has emerged as a new locus of criminal activity (Thomas and Loader 2000; Littlewood 2003; Yar 2005), but in general, criminology has been remiss in its research into the phenomena of cyber crime and has been slow to recognize the importance of cyberspace in changing the nature and scope of offending and victimization (Mann and Sutton 1998; Jewkes 2006). A new, radical discipline named cyber criminology is the need of the hour to explain and analyze the crimes in the internet. The field of cyber criminology crystallizes for many Scientists and Social scientists an area of research at the interface between Computer Science, Internet Science and Criminology. I define cyber criminology as ʺthe study of causation of crimes that occur in the cyberspace and its impact in the physical space”. For a year or so, the word cyber criminology has slowly appeared in the internet. Also, McAfee has used an alternate word “Virtual Criminology” in their report published in 2006. The first conference devoted entirely to this area was the “Cyber Criminology and Digital Forensics Initiative Conference” which took place in Spokane Valley, WA, USA in October 2006. This was also a new direction to segregate cyber‐ forensics and cyber criminology. Quite often, cyber criminology is merged with cyber‐forensics. There is a need to identify the differences between cyber criminology and cyber‐forensics. Cyber‐forensics deals exclusively with the investigation of cyber crimes, whereas, cyber criminology deals with the causation of cyber crimes.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"1-6"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Book Review of Net crimes & misdemeanors: Outmaneuvering webspammers, stalkers and con artists","authors":"Mari B. Pierce","doi":"10.5281/ZENODO.18284","DOIUrl":"https://doi.org/10.5281/ZENODO.18284","url":null,"abstract":"When asking for an example of a criminal, it is fair to assume that few will describe those who commit unlawful acts using the computer. Rather, most will give an instance of violent crimes committed against individuals or crimes involving personal invasion of property. If someone actually used an example of a crime focusing around technology, it is likely they will use an Internet pedophile or a hacker for their illustration. Although an increase of media attention and community awareness has been brought to a few types of Internet crimes, the reality is that the magnitude of this problem is not known to the general public nor how we, computer users, should protect ourselves from potential victimization or obtain help if we become a target of these crimes. “Net crimes and misdemeanors are committed against more than 200,000 a year and the numbers are growing every day” (Hitchcock 2006, 2). With this quantity of victims, computer users need to know how to protect themselves. However, the average computer user is not technologically savvy. J.A. Hitchcock understands the limitations of technical knowledge of the average computer user. Her revised edition of “Net Crimes and Misdemeanors: Outmaneuvering Webspammers, Stalkers and Con Artists” (2006) explains various types of Internet and computer based crimes, and provides definitions and tips applicable to the novice and experienced computer user. One of the nation’s leading authority on cybercrime, Hitchcock has years of experience working with computers and technology. She has taught various college level courses, written for magazines and newspapers, gives lectures, appears","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"161-166"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}