Abstract
Countries have employed the Internet proxy as a censorship mechanism for various reasons. Concurrently, cyber criminal activities continue to rise. This research explores peoples’ engagement in bypassing the Internet proxy and if it is related to cyber criminal engagement. Through an experimental design, participants were randomly assigned to three groups. Using manipulation paragraphs, in the first group (Group 1), a positive view on the Internet proxy was presented. In the second group (Group 2), a negative view on the Internet proxy was presented. The third group (Group 3) was used as the control group, where the participants’ view of the Internet proxy was not manipulated. All three groups were asked to self-report their rate of proxy bypass (SRPBE) and cybercrime engagement (CCI). The results indicated a significant positive correlation between self-reported cyber criminal engagement and self-reported proxy bypass engagement. The results also showed that individuals with more knowledge in computers are more likely to bypass the Internet proxy. However, individuals with better knowledge in computers are not necessarily the ones that are more likely to commit cyber criminal activities. The results were inconclusive on whether or not the manipulation paragraphs used had an effect on the participants’ view of the Internet Proxy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Internet World Stats: Middle East Internet Usage Statistics, Population, Facebook and Telecommunications Reports (2009), http://www.internetworldstats.com/stats5.htm
OpenNet Initiative: Internet Filtering in the United Arab Emirates (2005), http://opennet.net/sites/opennet.net/files/ONI_UAE_2009.pdf
Olsen, E.: Rare Criticism of Gulf State Internet Censorship (2002), http://blogcritics.org/culture/article/rare-criticism-of-gulf-state-internet/
Day, N.: Censorship: Or Freedom of Expression. Learner Publishing Group (2001)
Kwong, M.: Reports High Website Censorship. The National Newspaper (2009), http://www.thenational.ae/news/uae-news/uae-reports-high-website-censorship
Nick: Top 10 Countries Censoring the Web (2008), http://www.dailybits.com/top-10-countries-censoring-the-web/
Vandergrift, K.E.: Intellectual Freedom, and Youth (1997), http://comminfo.rutgers.edu/professional-development/childlit/censorship.html
Day, N.: Censorship: Or Freedom of Expression. Learner Publishing Group (2001)
Cortes, M.V.: Internet Censorship Around the World, University of Chile, Chile (2000), http://www.isoc.org/inet2000/cdproceedings/8k/8k_4.htm
Schrader, P.: An Obsolete Honor: A Story of the German Resistance to Hitler. iUniverse (2008)
Kenney, K.: Prohibitions in the 1920s (2009), http://kim-kenney.suite101.com/prohibition-in-the-1920s-a90037
1920-30.com: Prohibition in the United States (2005), http://www.1920-30.com/prohibition/
Hesketh, T., Lu, L., Xiang, Z.W.: The Effect of China’s One-Child Family Policy after 25 years. The New England Journal of Medicine (2005), http://www.nejm.org/doi/full/10.1056/NEJMhpr051833
Macartney, J.: Factfile: China’s one-child policy. TimesOnline (2008), http://uyghuramerican.org/old/articles/1458/1/Factfile-Chinas-one-child-policy/index.html
CNN: China to keep one-child policy. CNN (2008), http://articles.cnn.com/2008-03-10/world/china.onechild_1_preference-for-male-heirs-traditional-preference-gender-imbalance?_s=PM:WORLD
Hall, A.T.: China’s one policy and male surplus as a source of demand for sex trafficking in China (2010), http://nfsacademy.org/wp-content/uploads/2011/02/Hall-Chinas-One-Child-Policy.pdf
Feminist.com: History of Abortion. Touchstone Publishing (1998), http://www.feminist.com/resources/ourbodies/abortion.html
NARAL Foundation: Choices: Women Speak Out About Abortion (2009), http://www.prochoiceamerica.org/media/fact-sheets/abortion-distorting-science-safety-legal-abortion.pdf
Thierer, A.D.: Regulating Video Games: Parents or Uncle Sam? CATO Institute (2003), http://www.cato.org/publications/commentary/regulating-video-games-parents-or-uncle-sam
Gentile, D.A., Anderson, C.A.: Violent Video Games: The Effects on Youth, and Public Policy Implications. Handbook of Children, Culture, and Violence. Thousand Oaks (2006), http://www.psychology.iastate.edu/faculty/caa/abstracts/2005-2009/05ga2.pdf
Wagner, M.A., Wagner, J.: Should We Censor Violence in the Media? (2002), http://www.yellodyno.com/pdf/Violence_in_the_media.pdf
Rhodes, R.: Hollow Claims About Fantasy Violence. The New York Times (2000), http://www.nytimes.com/2000/09/17/opinion/hollow-claims-about-fantasy-violence.html?pagewanted=all&src=pm
Castillo, F.: Banned and Controversial Books (2008), http://banned-books.com/bblist.html
Banned Books Week (2009), http://bannedbooksweek.org/about
Flanagan: The Futility of Censorship. Yahoo! News (2009), http://business.maktoob.com/20090000404858/The_futility_of_censorship/Article.htm
Furnell, S.: Cybercrime: vandalizing the Information Society. Addison-Wesley Professional Publishers (2001)
Shinder, D.: Scene of the cybercrime: computer forensics handbook (2002), http://www.google.com/books?hl=ar&lr=&id=nQyucKKH6RgC&oi=fnd&pg=PR25&dq=cyber+crime+&ots=WVbXcJB81-&sig=Oszwa45V1PaTUTneqKDE9UuvX-I#v=onepage&q=cyber%20crime&f=false
(Stocks, n.d.)
Heffner, C.: Introduction to Sensation and Perception (2004), http://allpsych.com/psychology101/sensation_perception.html
Wikia: Perception: Perception and Reality (2001), http://psychology.wikia.com/wiki/Experimental:Perception
Lacasse, M.: How the industry manipulated public opinion: Why you believe what you believe (2009), http://www.healingdaily.com/beliefs.htm
Bernay, E.L.: Propaganda. Kennikat Press (1972)
Budd, R.W., Ruben, B.D.: Beyond Media: New Approaches to Mass Communication. Transaction Publishers (1987)
Thayer, L.: On the Mass Media and Mass Communication: Notes Toward a Theory. Oxford University Press (1986)
Ball-Rokeach, S.J., DeFleur, M.L.: A dependency model of mass media effects. Communication Research 3, 3–21 (1976)
Johnson, B.K.: Dawn of the Cognetic Age: Fighting Ideological War by Putting Thought in Motion with Impact (2007), http://www.airpower.maxwell.af.mil/airchronicles/apj/apj07/win07/johnson.html
Reis, H.T., Judd, C.M.: Handbook of Research: Methods in Social and Personality Psychology. Cambridge University Press, Cambridge (2000)
Bland, E.: Magnets can manipulate morality: study (2010), http://www.abc.net.au/science/articles/2010/03/30/2859767.htm
Amaral, J.R., Sabbatini, R.M.: Placebo Effect: The Power of the Sugar Pill (1999), http://www.cerebromente.org.br/n09/mente/placebo1_i.htm
Rogers, M.: A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. University of Manitoba, Canada (2001)
Baggili, I.M.: Effects of Anonymity, Pre-Employment Integrity and Antisocial Behavior on Self-Reported Cyber Crime Engagement: An Exploratory Study. Doctoral dissertation, Purdue University, USA (2009), http://dl.acm.org/citation.cfm?id=1834973
Baggili, I.M., Rogers, M.: Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity. Zayed University, UAE, Purdue University, USA (2009), http://www.cybercrimejournal.com/ibrahimmarcusIJCCJuly2009.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Baggili, I., Al Shamlan, M., Al Jabri, B., Al Zaabi, A. (2013). Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. In: Rogers, M., Seigfried-Spellar, K.C. (eds) Digital Forensics and Cyber Crime. ICDF2C 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39891-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-39891-9_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39890-2
Online ISBN: 978-3-642-39891-9
eBook Packages: Computer ScienceComputer Science (R0)