Abstract
The extensive use of information technology systems and networks has delivered undoubted benefits to both individuals and organizations. Unfortunately, at the same time, it offers new opportunities for abuse and criminal activities. This chapter examines the nature of the problem, looking at the different guises that cybercrime can take, and the factors that are influencing its growth. Specific focus is then given to the threat of phishing, which has risen to become one of the most frequently encountered forms of technology abuse, in both personal and workplace contexts. The discussion then moves to consider the increasing breadth of threats that users are actually facing from the increasing array of devices and services that they use, with the rise of the Internet of Things being used to exemplify the issue. All of this leads to consideration of the effect that cybercrime has upon public perceptions, with discussion of how it affects usage and what it should mean in terms of protection. The chapter concludes with recognition of the inevitability of technology-related abuse but the equal recognition that there are actions that can be taken to safeguard against it.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
APWG. (2018). Phishing activity trends report, 1st Quarter 2018. Anti-Phishing Working Group, 31 July 2018. Retrieved from http://docs.apwg.org/reports/apwg_trends_report_q1_2018.pdf
Bursztein, E., Benko, B., Margolis, D., Pietraszek, T., Archer, A., Aquino, A., Pitsillidis, A., & Savage, S. (2014). Handcrafted fraud and extortion: Manual account hijacking in the wild, Proceedings of the 2014 Conference on Internet Measurement Conference (IMC’14), Vancouver, 5–7 November 2014, 347–358.
California Legislature (2018). SB-327 Information privacy: Connected devices. Senate Bill No. 327. Chapter 886. 28 September 2018. Retrieved from https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180SB327
DCMS. (2018). Code of practice for consumer IoT security. Department for Digital, Culture, Media and Sport, 14 October 2018. Retrieved from https://www.gov.uk/government/publications/secure-by-design/code-of-practice-for-consumer-iot-security
Dowland, P. S., Furnell, S. M., Illingworth, H. M., & Reynolds, P. L. (2000). Computer crime and abuse: A survey of public attitudes and awareness. Computers & Security, 18(8), 715–726.
Dunn, J. E. (2017). 22 of the most infamous data breaches affecting the UK. Retrieved from http://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/
Ensor, C. (2017). A brief history of Cyber Essentials. Retrieved from https://www.cyberessentials.ncsc.gov.uk/2017/11/27/a-brief-history-of-cyber-essentials
European Commission. (2017). Europeans’ attitudes towards cyber security. Special Eurobarometer 464a, September 2017. Retrieved from https://data.europa.eu/euodp/data/dataset/S2171_87_4_464A_ENG
Fortinet. (2017). Threat landscape report Q2 2017. 15 August 2017. Retrieved from https://www.fortinet.com/blog/threat-research/dissecting-our-q2-threat-landscape-report.html
FTC. (2002). OECD launches guidelines for the security of information systems and networks: Towards a culture of security. Press Release, Federal Trade Commission, 23 August 2002.
Furnell, S. (2001). Cybercrime: Vandalizing the information society. London: Addison Wesley Professional.
Get Safe Online. (2018). Britain is a nation of digital over-sharers. Retrieved from https://www.getsafeonline.org/news/britain-is-a-nation-of-digital-over-sharers/
Home Office. (2013). Serious and organised crime strategy. Cm 8715, October 2013. ISBN 9780101871525.
Home Office. (2018). A call to action: The cyber aware perception gap. 1 March 2018. Retrieved from https://www.gov.uk/government/publications/cyber-aware-perception-gap-report
Huawei. (2017). Digital spillover: Measuring the true impact of the digital economy. Huawei Technologies Co., Ltd. Retrieved from https://www.huawei.com/minisite/gci/en/digital-spillover/index.html
IHS Markit. (2017). The internet of things: A movement, not a market. HIS Markit e-Book. Retrieved from https://cdn.ihs.com/www/pdf/IoT_ebook.pdf
ITU. (2018). The state of broadband: Broadband catalysing sustainable development, September 2018. Broadband Commission for Sustainable Development, International Telecommunication Union, Geneva, Switzerland. Retrieved from https://www.itu.int/dms_pub/itu-s/opb/pol/S-POL-BROADBAND.19-2018-PDF-E.pdf
Jones, R. (2018, January 22). Think you can spot scammers? Just 9% of Britons really can. The Guardian. Retrieved from https://www.theguardian.com/money/2018/jan/22/spot-scammers-home-office-fraud
Kuzin, M., Shmelev, Y., & Kuskov, V. (2018). New trends in the world of IoT threats. Retrieved from https://securelist.com/new-trends-in-the-world-of-iot-threats/87991/
Lacohee, H., Phippen, A. D., & Furnell, S. M. (2006). Risk and restitution: Assessing how users establish online trust. Computers & Security, 25(7), 486–493.
Laughlin, A. (2017). Safety alert: see how easy it is for almost anyone to hack your child’s connected toys. Retrieved from https://www.which.co.uk/news/2017/11/safety-alert-see-how-easy-it-is-for-almost-anyone-to-hack-your-childs-connected-toys/
Libeau, F. (2018). Phishing via social media up 100 percent, now a preferred vector. Retrieved from https://www.informationsecuritybuzz.com/articles/phishing-via-social-media-100-percent-now-preferred-vector/
OTA. (2018). Cyber incident & breach trends report – Review and analysis of 2017 cyber incidents, trends and key issues to address. Online Trust Alliance, The Internet Society. 25 January 2018. Retrieved from https://otalliance.org/system/files/files/initiative/documents/ota_cyber_incident_trends_report_jan2018.pdf
Spafford, E. H. (1989). The internet worm program: An analysis. ACM SIGCOMM Computer Communication Review, 19(1), 17–57.
UK Safer Internet Centre. (2019). Our internet our choice – Understanding consent in a digital world. Retrieved from https://www.saferinternet.org.uk/safer-internet-day/safer-internet-day-2019/our-internet-our-choice-report
Wall, D. S. (2007). Cybercrime. Cambridge, UK: Polity Press.
Williams, C. (2018, October 21). IoT gadgets flooded DNS biz Dyn to take down big name websites. Retrieved from https://www.theregister.co.uk/2016/10/21/dyn_dns_ddos_explained/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Furnell, S. (2020). Technology Use, Abuse, and Public Perceptions of Cybercrime. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_9
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences