Skip to main content

Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2012)

Abstract

Countries have employed the Internet proxy as a censorship mechanism for various reasons. Concurrently, cyber criminal activities continue to rise. This research explores peoples’ engagement in bypassing the Internet proxy and if it is related to cyber criminal engagement. Through an experimental design, participants were randomly assigned to three groups. Using manipulation paragraphs, in the first group (Group 1), a positive view on the Internet proxy was presented. In the second group (Group 2), a negative view on the Internet proxy was presented. The third group (Group 3) was used as the control group, where the participants’ view of the Internet proxy was not manipulated. All three groups were asked to self-report their rate of proxy bypass (SRPBE) and cybercrime engagement (CCI). The results indicated a significant positive correlation between self-reported cyber criminal engagement and self-reported proxy bypass engagement. The results also showed that individuals with more knowledge in computers are more likely to bypass the Internet proxy. However, individuals with better knowledge in computers are not necessarily the ones that are more likely to commit cyber criminal activities. The results were inconclusive on whether or not the manipulation paragraphs used had an effect on the participants’ view of the Internet Proxy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Internet World Stats: Middle East Internet Usage Statistics, Population, Facebook and Telecommunications Reports (2009), http://www.internetworldstats.com/stats5.htm

  2. OpenNet Initiative: Internet Filtering in the United Arab Emirates (2005), http://opennet.net/sites/opennet.net/files/ONI_UAE_2009.pdf

  3. Olsen, E.: Rare Criticism of Gulf State Internet Censorship (2002), http://blogcritics.org/culture/article/rare-criticism-of-gulf-state-internet/

  4. Day, N.: Censorship: Or Freedom of Expression. Learner Publishing Group (2001)

    Google Scholar 

  5. Kwong, M.: Reports High Website Censorship. The National Newspaper (2009), http://www.thenational.ae/news/uae-news/uae-reports-high-website-censorship

  6. Nick: Top 10 Countries Censoring the Web (2008), http://www.dailybits.com/top-10-countries-censoring-the-web/

  7. Vandergrift, K.E.: Intellectual Freedom, and Youth (1997), http://comminfo.rutgers.edu/professional-development/childlit/censorship.html

  8. Day, N.: Censorship: Or Freedom of Expression. Learner Publishing Group (2001)

    Google Scholar 

  9. Cortes, M.V.: Internet Censorship Around the World, University of Chile, Chile (2000), http://www.isoc.org/inet2000/cdproceedings/8k/8k_4.htm

  10. Schrader, P.: An Obsolete Honor: A Story of the German Resistance to Hitler. iUniverse (2008)

    Google Scholar 

  11. Kenney, K.: Prohibitions in the 1920s (2009), http://kim-kenney.suite101.com/prohibition-in-the-1920s-a90037

  12. 1920-30.com: Prohibition in the United States (2005), http://www.1920-30.com/prohibition/

  13. Hesketh, T., Lu, L., Xiang, Z.W.: The Effect of China’s One-Child Family Policy after 25 years. The New England Journal of Medicine (2005), http://www.nejm.org/doi/full/10.1056/NEJMhpr051833

  14. Macartney, J.: Factfile: China’s one-child policy. TimesOnline (2008), http://uyghuramerican.org/old/articles/1458/1/Factfile-Chinas-one-child-policy/index.html

  15. CNN: China to keep one-child policy. CNN (2008), http://articles.cnn.com/2008-03-10/world/china.onechild_1_preference-for-male-heirs-traditional-preference-gender-imbalance?_s=PM:WORLD

  16. Hall, A.T.: China’s one policy and male surplus as a source of demand for sex trafficking in China (2010), http://nfsacademy.org/wp-content/uploads/2011/02/Hall-Chinas-One-Child-Policy.pdf

  17. Feminist.com: History of Abortion. Touchstone Publishing (1998), http://www.feminist.com/resources/ourbodies/abortion.html

  18. NARAL Foundation: Choices: Women Speak Out About Abortion (2009), http://www.prochoiceamerica.org/media/fact-sheets/abortion-distorting-science-safety-legal-abortion.pdf

  19. Thierer, A.D.: Regulating Video Games: Parents or Uncle Sam? CATO Institute (2003), http://www.cato.org/publications/commentary/regulating-video-games-parents-or-uncle-sam

  20. Gentile, D.A., Anderson, C.A.: Violent Video Games: The Effects on Youth, and Public Policy Implications. Handbook of Children, Culture, and Violence. Thousand Oaks (2006), http://www.psychology.iastate.edu/faculty/caa/abstracts/2005-2009/05ga2.pdf

  21. Wagner, M.A., Wagner, J.: Should We Censor Violence in the Media? (2002), http://www.yellodyno.com/pdf/Violence_in_the_media.pdf

  22. Rhodes, R.: Hollow Claims About Fantasy Violence. The New York Times (2000), http://www.nytimes.com/2000/09/17/opinion/hollow-claims-about-fantasy-violence.html?pagewanted=all&src=pm

  23. Castillo, F.: Banned and Controversial Books (2008), http://banned-books.com/bblist.html

  24. Banned Books Week (2009), http://bannedbooksweek.org/about

  25. Flanagan: The Futility of Censorship. Yahoo! News (2009), http://business.maktoob.com/20090000404858/The_futility_of_censorship/Article.htm

  26. Furnell, S.: Cybercrime: vandalizing the Information Society. Addison-Wesley Professional Publishers (2001)

    Google Scholar 

  27. Shinder, D.: Scene of the cybercrime: computer forensics handbook (2002), http://www.google.com/books?hl=ar&lr=&id=nQyucKKH6RgC&oi=fnd&pg=PR25&dq=cyber+crime+&ots=WVbXcJB81-&sig=Oszwa45V1PaTUTneqKDE9UuvX-I#v=onepage&q=cyber%20crime&f=false

  28. (Stocks, n.d.)

    Google Scholar 

  29. Heffner, C.: Introduction to Sensation and Perception (2004), http://allpsych.com/psychology101/sensation_perception.html

  30. Wikia: Perception: Perception and Reality (2001), http://psychology.wikia.com/wiki/Experimental:Perception

  31. Lacasse, M.: How the industry manipulated public opinion: Why you believe what you believe (2009), http://www.healingdaily.com/beliefs.htm

  32. Bernay, E.L.: Propaganda. Kennikat Press (1972)

    Google Scholar 

  33. Budd, R.W., Ruben, B.D.: Beyond Media: New Approaches to Mass Communication. Transaction Publishers (1987)

    Google Scholar 

  34. Thayer, L.: On the Mass Media and Mass Communication: Notes Toward a Theory. Oxford University Press (1986)

    Google Scholar 

  35. Ball-Rokeach, S.J., DeFleur, M.L.: A dependency model of mass media effects. Communication Research 3, 3–21 (1976)

    Article  Google Scholar 

  36. Johnson, B.K.: Dawn of the Cognetic Age: Fighting Ideological War by Putting Thought in Motion with Impact (2007), http://www.airpower.maxwell.af.mil/airchronicles/apj/apj07/win07/johnson.html

  37. Reis, H.T., Judd, C.M.: Handbook of Research: Methods in Social and Personality Psychology. Cambridge University Press, Cambridge (2000)

    Google Scholar 

  38. Bland, E.: Magnets can manipulate morality: study (2010), http://www.abc.net.au/science/articles/2010/03/30/2859767.htm

  39. Amaral, J.R., Sabbatini, R.M.: Placebo Effect: The Power of the Sugar Pill (1999), http://www.cerebromente.org.br/n09/mente/placebo1_i.htm

  40. Rogers, M.: A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. University of Manitoba, Canada (2001)

    Google Scholar 

  41. Baggili, I.M.: Effects of Anonymity, Pre-Employment Integrity and Antisocial Behavior on Self-Reported Cyber Crime Engagement: An Exploratory Study. Doctoral dissertation, Purdue University, USA (2009), http://dl.acm.org/citation.cfm?id=1834973

  42. Baggili, I.M., Rogers, M.: Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity. Zayed University, UAE, Purdue University, USA (2009), http://www.cybercrimejournal.com/ibrahimmarcusIJCCJuly2009.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Baggili, I., Al Shamlan, M., Al Jabri, B., Al Zaabi, A. (2013). Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. In: Rogers, M., Seigfried-Spellar, K.C. (eds) Digital Forensics and Cyber Crime. ICDF2C 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39891-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39891-9_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39890-2

  • Online ISBN: 978-3-642-39891-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics