Abstract
The global penetration of networked communications has exposed different areas of society to the threats of cybercrimes. These levels of society include, but are not limited to, nations and communities. Today, individual organisations and governments are significantly more likely to be victimised through the use of information and communications technologies than experience conventional forms of victimisation (UNODC 2013).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agate, J., & Ledward, J. (2013). Social media: How the net is closing in on cyber bullies. Entertainment Law Review, 24(8), 263–268.
Agustina, J. R. (2015). Understanding cyber victimisation: Digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 9(1), 35.
Akhgar, B., & Yates, S. (Eds.). (2013). Strategic intelligence management: National security imperatives and information and communications technologies. Waltham: Butterworth-Heinemann.
Barker, R. A. (2012). An examination of organizational ethics. Human Relations, 55(9), 1097–1116.
Baxter, A. (2014). Improving responses to cyber victimisation in South Australia. http://www.victimsa.org/files/cybercrime-report-2014.pdf.
Bonanno, R. A., & Hymel, S. (2013). Cyber bullying and internalizing difficulties: Above and beyond the impact of traditional forms of bullying. Journal of Youth and Adolescence, 42(5), 685–697.
Cénat, J. M., Hébert, M., Blais, M., Lavoie, F., Guerrier, M., & Derivois, D. (2014). Cyberbullying, psychological distress and self-esteem among youth in Quebec schools. Journal of Affective Disorders, 169, 7–9. https://doi.org/10.1016/j.jad.2014.07.019.
Chawki, M. (2005). A critical look at the regulation of cybercrime. The ICFAI Journal of Cyberlaw, IV(4), 1–56.
CNNMoney. (2015). Cybercrime costs the average U.S. firm $15 million a year. CNN. [Online]. Available at: http://money.cnn.com/2015/10/08/technology/cybercrime-cost-business/index.html. Accessed 3 Apr 2017.
Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588–608.
Dredge, R., Gleeson, J., & de la Piedad Garcia, X. (2014). Cyberbullying in social networking sites: An adolescent victim’s perspective. Computers in Human Behavior, 36(0), 13–20.
Edwards, L. (2012). Defining the ‘object’ of public relations research: A new starting point. Public Relations Inquiry, 1(1), 7–30.
Emm, D. (2009). Cybercrime and the law: A review of UK computer crime legislation [Online]. Available at: http://www.securelist.com/en/analysis/204792064/Cybercrime_and_the_law_a_review_of_UK_computer_crime_legislation. Accessed 3 Apr 2017.
Forte, D. (2002). Analyzing the difficulties in backtracing onion router traffic. International Journal of Digital Evidence, 1(3), 1–7.
Frith, U., & Frith, C. D. (2003). Development and neuropsychology of mentalizing. Philosophical Transactions of the Royal Society. Biological Sciences, 358, 459–473.
Gercke, M. (2007). Cyberterrorism. How terrorists use the internet (p. 62). Computer und Recht.
Giordano, S. M. (2004). Electronic evidence and the law. Information Systems Frontiers, 6(2), 161–174.
Goodno, N. H. (2007). CS, a new crime: Evaluating the effectiveness of current state and federal laws. Missouri Law Review, 72, 125–197.
Hazelwood, S. D., & Koon-Magnin, S. (2013). Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology, 7(2), 155.
ICT Regulation Toolkit, Privacy and Data Retention Policies in Selected Countries [Online]. Available at: www.ictregulationtoolkit.org/en/PracticeNote.aspx?id=2026. Accessed 18 Sept 2014.
Izak, J. (2013). Cyberharassment Is a true danger: Is the solution found in copyright law? Doctoral dissertation, Michigan State University.
Jahankhani, H. (2013). Developing a model to reduce and/or prevent cybercrime victimization among the user individuals. In: B. Akhgar & S. Yates (Eds.), Strategic intelligence management: National security imperatives and information and communications technologies. Butterworth-Heinemann.
Jahankhani, H., & Al-Nemrat, A. (2010). Examination of cyber-criminal behaviour. International Journal of Information Science and Management, 2010, 41–48.
Jahankhani, H., & Al-Nemrat, A. (2011). Cybercrime profiling and trend analysis. Intelligence Management, 181–197.
Jahankhani and Askerniya, I. (2012). How best to protect the user-individuals in Moscow from cyber crime attacks. [Online]. Available at: https://pdfs.semanticscholar.org/c0bc/ff81bad5282abfe1a4e2d4ab2d58a3b3471b.pdf. Accessed 31 March 2017.
Jansen, J., & Leukfeldt, R. (2016). Phishing and malware attacks on online banking customers in the Netherlands: A qualitative analysis of factors leading to victimization. International Journal of Cyber Criminology, 10(1), 79.
Kshetri, N. (2009). Positive externality, increasing returns, and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144.
KPMG. (2017). Cybercrime survey report: Insights and perspectives [Online]. Available at: https://assets.kpmg.com/content/dam/kpmg/in/pdf/2017/12/Cyber-Crime-Survey.pdf. Accessed 7 April 2015.
Lee, H. K. (2011). Cultural consumer and copyright: A case study of anime fansubbing. Creative Industries Journal, 3(3), 237–252.
Levin, A. M., Dato-on, M. C., & Manolis, C. (2007). Deterring illegal downloading: The effects of threat appeals, past behavior, subjective norms, and attributions of harm. Journal of Consumer Behaviour, 6(2-3), 111–122.
Liechti, O., & Sumi, Y. (2002). Editorial: Awareness and the WWW. International Journal of Human-Computer Studies, 56(1), 1–5.
Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26(2), 1103–1155.
Marczak, M., & Coyne, I. (2010). Cyberbullying at school: Good practice and legal aspects in the United Kingdom. Australian Journal of Guidance & Counselling, 20(2), 182–193.
Netanel, N. W. (2000). Cyberspace self-governance: A skeptical view from liberal democratic theory. California Law Review, 88(2), 395–498.
OSCE. (2005). Joint declaration by the UN special rapporteur on Freedom of opinion and expression, the OSCE representative on Freedom of the media and the OAS special rapporteur on Freedom of expression [Online]. Available at: https://www.osce.org/fom/27455?download=true. Accessed 31 March 2017.
Recupero, R. P., Harms, S. E., & Noble, M. J. (2006). Googling suicide: Surfing for suicide information on the Internet. The Journal of Clinical Psychiatry, 69(6), 878–888.
Roberts L. (2008). Cyber victimisationin Australia: Extent, impact on individuals and responses. Tasmanian Institute of Law Enforcement Studies, (6), 1–12.
Trim, P. R. J., & Lee, Y. I. (2015). Issues that managers need to consider when undertaking research relating to the cyber environment. In P. R. J. Trim & H. Y. Youm (Eds.), Korea-uk initiatives in cyber security research: Government, University and Industry collaboration (pp. 66–79). Republic of Korea: British Embassy Seoul.
UNODC. (2013). Cybercrime. Retrieved from United Nations office on drugs and crime website: https://www.unodc.org/documents/data-and-analysis/tocta/10.Cybercrime.pdf.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Al-Ali, A.A., Nimrat, A., Benzaid, C. (2018). Combating Cyber Victimisation: Cybercrime Prevention. In: Jahankhani, H. (eds) Cyber Criminology. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-97181-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-97181-0_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-97180-3
Online ISBN: 978-3-319-97181-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)