Skip to main content

Combating Cyber Victimisation: Cybercrime Prevention

  • Chapter
  • First Online:
Cyber Criminology

Abstract

The global penetration of networked communications has exposed different areas of society to the threats of cybercrimes. These levels of society include, but are not limited to, nations and communities. Today, individual organisations and governments are significantly more likely to be victimised through the use of information and communications technologies than experience conventional forms of victimisation (UNODC 2013).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Agate, J., & Ledward, J. (2013). Social media: How the net is closing in on cyber bullies. Entertainment Law Review, 24(8), 263–268.

    Google Scholar 

  • Agustina, J. R. (2015). Understanding cyber victimisation: Digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 9(1), 35.

    Google Scholar 

  • Akhgar, B., & Yates, S. (Eds.). (2013). Strategic intelligence management: National security imperatives and information and communications technologies. Waltham: Butterworth-Heinemann.

    Google Scholar 

  • Barker, R. A. (2012). An examination of organizational ethics. Human Relations, 55(9), 1097–1116.

    Article  Google Scholar 

  • Baxter, A. (2014). Improving responses to cyber victimisation in South Australia. http://www.victimsa.org/files/cybercrime-report-2014.pdf.

  • Bonanno, R. A., & Hymel, S. (2013). Cyber bullying and internalizing difficulties: Above and beyond the impact of traditional forms of bullying. Journal of Youth and Adolescence, 42(5), 685–697.

    Article  Google Scholar 

  • Cénat, J. M., Hébert, M., Blais, M., Lavoie, F., Guerrier, M., & Derivois, D. (2014). Cyberbullying, psychological distress and self-esteem among youth in Quebec schools. Journal of Affective Disorders, 169, 7–9. https://doi.org/10.1016/j.jad.2014.07.019.

    Article  Google Scholar 

  • Chawki, M. (2005). A critical look at the regulation of cybercrime. The ICFAI Journal of Cyberlaw, IV(4), 1–56.

    Google Scholar 

  • CNNMoney. (2015). Cybercrime costs the average U.S. firm $15 million a year. CNN. [Online]. Available at: http://money.cnn.com/2015/10/08/technology/cybercrime-cost-business/index.html. Accessed 3 Apr 2017.

  • Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588–608.

    Article  Google Scholar 

  • Dredge, R., Gleeson, J., & de la Piedad Garcia, X. (2014). Cyberbullying in social networking sites: An adolescent victim’s perspective. Computers in Human Behavior, 36(0), 13–20.

    Article  Google Scholar 

  • Edwards, L. (2012). Defining the ‘object’ of public relations research: A new starting point. Public Relations Inquiry, 1(1), 7–30.

    Article  Google Scholar 

  • Emm, D. (2009). Cybercrime and the law: A review of UK computer crime legislation [Online]. Available at: http://www.securelist.com/en/analysis/204792064/Cybercrime_and_the_law_a_review_of_UK_computer_crime_legislation. Accessed 3 Apr 2017.

  • Forte, D. (2002). Analyzing the difficulties in backtracing onion router traffic. International Journal of Digital Evidence, 1(3), 1–7.

    Google Scholar 

  • Frith, U., & Frith, C. D. (2003). Development and neuropsychology of mentalizing. Philosophical Transactions of the Royal Society. Biological Sciences, 358, 459–473.

    Article  Google Scholar 

  • Gercke, M. (2007). Cyberterrorism. How terrorists use the internet (p. 62). Computer und Recht.

    Google Scholar 

  • Giordano, S. M. (2004). Electronic evidence and the law. Information Systems Frontiers, 6(2), 161–174.

    Article  Google Scholar 

  • Goodno, N. H. (2007). CS, a new crime: Evaluating the effectiveness of current state and federal laws. Missouri Law Review, 72, 125–197.

    Google Scholar 

  • Hazelwood, S. D., & Koon-Magnin, S. (2013). Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology, 7(2), 155.

    Google Scholar 

  • ICT Regulation Toolkit, Privacy and Data Retention Policies in Selected Countries [Online]. Available at: www.ictregulationtoolkit.org/en/PracticeNote.aspx?id=2026. Accessed 18 Sept 2014.

  • Izak, J. (2013). Cyberharassment Is a true danger: Is the solution found in copyright law? Doctoral dissertation, Michigan State University.

    Google Scholar 

  • Jahankhani, H. (2013). Developing a model to reduce and/or prevent cybercrime victimization among the user individuals. In: B. Akhgar & S. Yates (Eds.), Strategic intelligence management: National security imperatives and information and communications technologies. Butterworth-Heinemann.

    Google Scholar 

  • Jahankhani, H., & Al-Nemrat, A. (2010). Examination of cyber-criminal behaviour. International Journal of Information Science and Management, 2010, 41–48.

    Google Scholar 

  • Jahankhani, H., & Al-Nemrat, A. (2011). Cybercrime profiling and trend analysis. Intelligence Management, 181–197.

    Google Scholar 

  • Jahankhani and Askerniya, I. (2012). How best to protect the user-individuals in Moscow from cyber crime attacks. [Online]. Available at: https://pdfs.semanticscholar.org/c0bc/ff81bad5282abfe1a4e2d4ab2d58a3b3471b.pdf. Accessed 31 March 2017.

  • Jansen, J., & Leukfeldt, R. (2016). Phishing and malware attacks on online banking customers in the Netherlands: A qualitative analysis of factors leading to victimization. International Journal of Cyber Criminology, 10(1), 79.

    Google Scholar 

  • Kshetri, N. (2009). Positive externality, increasing returns, and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144.

    Article  Google Scholar 

  • KPMG. (2017). Cybercrime survey report: Insights and perspectives [Online]. Available at: https://assets.kpmg.com/content/dam/kpmg/in/pdf/2017/12/Cyber-Crime-Survey.pdf. Accessed 7 April 2015.

  • Lee, H. K. (2011). Cultural consumer and copyright: A case study of anime fansubbing. Creative Industries Journal, 3(3), 237–252.

    Article  Google Scholar 

  • Levin, A. M., Dato-on, M. C., & Manolis, C. (2007). Deterring illegal downloading: The effects of threat appeals, past behavior, subjective norms, and attributions of harm. Journal of Consumer Behaviour, 6(2-3), 111–122.

    Article  Google Scholar 

  • Liechti, O., & Sumi, Y. (2002). Editorial: Awareness and the WWW. International Journal of Human-Computer Studies, 56(1), 1–5.

    Article  Google Scholar 

  • Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26(2), 1103–1155.

    Google Scholar 

  • Marczak, M., & Coyne, I. (2010). Cyberbullying at school: Good practice and legal aspects in the United Kingdom. Australian Journal of Guidance & Counselling, 20(2), 182–193.

    Article  Google Scholar 

  • Netanel, N. W. (2000). Cyberspace self-governance: A skeptical view from liberal democratic theory. California Law Review, 88(2), 395–498.

    Article  Google Scholar 

  • OSCE. (2005). Joint declaration by the UN special rapporteur on Freedom of opinion and expression, the OSCE representative on Freedom of the media and the OAS special rapporteur on Freedom of expression [Online]. Available at: https://www.osce.org/fom/27455?download=true. Accessed 31 March 2017.

  • Recupero, R. P., Harms, S. E., & Noble, M. J. (2006). Googling suicide: Surfing for suicide information on the Internet. The Journal of Clinical Psychiatry, 69(6), 878–888.

    Article  Google Scholar 

  • Roberts L. (2008). Cyber victimisationin Australia: Extent, impact on individuals and responses. Tasmanian Institute of Law Enforcement Studies, (6), 1–12.

    Google Scholar 

  • Trim, P. R. J., & Lee, Y. I. (2015). Issues that managers need to consider when undertaking research relating to the cyber environment. In P. R. J. Trim & H. Y. Youm (Eds.), Korea-uk initiatives in cyber security research: Government, University and Industry collaboration (pp. 66–79). Republic of Korea: British Embassy Seoul.

    Google Scholar 

  • UNODC. (2013). Cybercrime. Retrieved from United Nations office on drugs and crime website: https://www.unodc.org/documents/data-and-analysis/tocta/10.Cybercrime.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdelrahman Abdalla Al-Ali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Al-Ali, A.A., Nimrat, A., Benzaid, C. (2018). Combating Cyber Victimisation: Cybercrime Prevention. In: Jahankhani, H. (eds) Cyber Criminology. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-97181-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-97181-0_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-97180-3

  • Online ISBN: 978-3-319-97181-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics