A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF - - PowerPoint PPT Presentation

a criminological perspective on the illicit use of the
SMART_READER_LITE
LIVE PREVIEW

A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF - - PowerPoint PPT Presentation

A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF THINGS GEORGE W. BURRUSS DEPARTMENT OF CRIMINOLOGY Why would a criminologist be interested in IoT? IoT used as a vector for hacking, causing harm: Expose user data


slide-1
SLIDE 1

A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF THINGS

GEORGE W. BURRUSS DEPARTMENT OF CRIMINOLOGY

slide-2
SLIDE 2

Why would a criminologist be interested in IoT?

  • IoT used as a vector for hacking, causing harm:

–Expose user data –Privacy violations/surveillance –Denial of service attacks

  • Hackers using IoT likely involved in other illegal

activities

slide-3
SLIDE 3

Areas of interest to a criminologist regarding IoT

  • Offender motivations
  • Victims’ routine activities
  • Criminal opportunity structure
  • Legal response (laws & regulations)
  • Law enforcement (Cybersecurity) response
slide-4
SLIDE 4

Offender Motivations and IoT

  • Techniques of Neutralizations

–Deny the victim –Denial of injury

  • Subcultural theory

–Hacker norms and expectations

  • Social Learning

–Define use of IoT for crime as normative –Imitation and reinforcement

  • Rational Choice and Deterrence
slide-5
SLIDE 5

Offender Motivations and IoT

  • Techniques of Neutralizations

–Deny the victim –Denial of injury

  • Subcultural theory

–Hacker norms and expectations

  • Social Learning

–Define use of IoT for crime as normative –Imitation and reinforcement

  • Rational Choice and Deterrence
slide-6
SLIDE 6

Offender Motivations and IoT

  • Techniques of Neutralizations

–Deny the victim –Denial of injury

  • Subcultural theory

–Hacker norms and expectations

  • Social Learning

–Define use of IoT for crime as normative –Imitation and reinforcement

  • Rational Choice and Deterrence
slide-7
SLIDE 7

Offender Motivations and IoT

  • Techniques of Neutralizations

–Deny the victim –Denial of injury

  • Subcultural theory

–Hacker norms and expectations

  • Social Learning

–Define use of IoT for crime as normative –Imitation and reinforcement

  • Rational Choice and Deterrence
slide-8
SLIDE 8

Offender Motivations and IoT

  • Techniques of Neutralizations

–Deny the victim –Denial of injury

  • Subcultural theory

–Hacker norms and expectations

  • Social Learning

–Define use of IoT for crime as normative –Imitation and reinforcement

  • Rational Choice and Deterrence
slide-9
SLIDE 9

Victim’s online activities expose them to offenders

  • Routine activities theory explores how daily patterns increase

likelihood of victimization

  • We can examine the self-protective actions

people take and why?

Suitable Target Motivated Offender Lack of Guardianship

slide-10
SLIDE 10

Victim’s online activities expose them to offenders

WWW

Password1!

  • Routine activities theory explores how daily patterns increase

likelihood of victimization

  • We can examine the self-protective actions

people take and why?

slide-11
SLIDE 11

The legal, law enforcement, and cybersecurity response

  • Criminologists examine the impact of laws and regulations
  • n behavior
  • Examine how criminal justice agencies respond (or not) to

cybercrime

  • Need to understand how cybersecurity fits within traditional

response to criminal behavior

slide-12
SLIDE 12

Criminologists study cybercrime through various methods

  • Quantitative Analysis of available usage data
  • Surveys of users, victims, and offenders
  • Qualitative interviews of victims and offenders
  • Natural experiments on policies and practices
slide-13
SLIDE 13

In sum:

  • IoT is but one aspect of cybercrime and

cybersecurity that presents an opportunity to study deviant and harmful online behaviors.

  • Criminologist would benefit for partnering with

computer scientists and other technology experts to help develop theories and empirical studies of online behavior.