a criminological perspective on the illicit use of the
play

A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF - PowerPoint PPT Presentation

A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF THINGS GEORGE W. BURRUSS DEPARTMENT OF CRIMINOLOGY Why would a criminologist be interested in IoT? IoT used as a vector for hacking, causing harm: Expose user data


  1. A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF THINGS GEORGE W. BURRUSS DEPARTMENT OF CRIMINOLOGY

  2. Why would a criminologist be interested in IoT? • IoT used as a vector for hacking, causing harm: –Expose user data –Privacy violations/surveillance –Denial of service attacks • Hackers using IoT likely involved in other illegal activities

  3. Areas of interest to a criminologist regarding IoT • Offender motivations • Victims’ routine activities • Criminal opportunity structure • Legal response (laws & regulations) • Law enforcement (Cybersecurity) response

  4. Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence

  5. Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence

  6. Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence

  7. Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence

  8. Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence

  9. Victim’s online activities expose them to offenders • Routine activities theory explores how daily patterns increase likelihood of victimization • We can examine the self-protective actions people take and why? Suitable Target Lack of Guardianship Motivated Offender

  10. Victim’s online activities expose them to offenders • Routine activities theory explores how daily patterns increase likelihood of victimization WWW • We can examine the self-protective actions people take and why? Password1!

  11. The legal, law enforcement, and cybersecurity response • Criminologists examine the impact of laws and regulations on behavior • Examine how criminal justice agencies respond (or not) to cybercrime • Need to understand how cybersecurity fits within traditional response to criminal behavior

  12. Criminologists study cybercrime through various methods • Quantitative Analysis of available usage data • Surveys of users, victims, and offenders • Qualitative interviews of victims and offenders • Natural experiments on policies and practices

  13. In sum: • IoT is but one aspect of cybercrime and cybersecurity that presents an opportunity to study deviant and harmful online behaviors. • Criminologist would benefit for partnering with computer scientists and other technology experts to help develop theories and empirical studies of online behavior.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend