Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft

Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft

Paul Danquah, Olumide Babatope Longe, Jojo Desmond Lartey, Peter Ebo Tobbin
DOI: 10.4018/978-1-7998-3149-5.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Socially engineered cyber deception and theft seems to have gained prominence in cybercrime. Given the contextual background of inadequate theoretical explanations of socially engineered cyber deception and theft cybercrime, there is the need for theory to better explain and possibly predict activities involved in socially engineered cyber deception and theft. This chapter proposes a theory of socially engineered cyber deception and theft (SECT), with routine activity theory, crime displacement theory, the space transition theory, and empirical review as its foundation. It iteratively combines deductive and inductive approaches to infer the occurrence of socially engineered cyber deception and theft. While the deductive approach serves the deduction leading to the inference, the inductive approach extracts and suggests empirical evidence for a deterministic prediction of the crime occurrence. It is recommended that the theory is further validated to test its applicability.
Chapter Preview
Top

Introduction

Cybercrime is a generic terminology used for all sorts of crimes committed with computers (Katyal, 2001). Srinivasan (2008) defines cybercrime as criminal activities that are executed by the use of communication networks such as the Internet, satellite, mobile networks, telephone and wireless networks. Service interruption, virus transmission, and denial-of-service attack are a number of ways in which cyber criminals can invade systems and cause damage. Yar (2005) categorizes cybercrime into four different types, namely cyber deception and theft, Cyber trespass, cyber violence and cyber pornography. Cyber-trespass occurs when a perpetrator intentionally intrudes or enter computer resource, asset or property belonging to other people, without their expressed approved authorization or authentication, in order to gain right of access and privileges available on the computer with a motive to harm or steal (Reynolds, 2015; Yar, 2005). Typical examples are website defacement, spread of viruses and hacking. Cyber-deception and Theft also involves the use of computer technology to deceive and steal, usually electronically, and typical examples are theft of assets or money, such as intellectual property (IP) breach or violation, IP piracy and credit card fraud (Reynolds, 2015). Cyber-pornography refers to activities that breach laws on obscenity and decency. An example is child pornography. Cyber violence on the other hand involves the use of the Internet and related technologies to cause psychological harm or incites physical injury against others, thereby breaking laws relating to the protection of the individual. Typical instances of cyber violence are hated-speech, denial of service attack and cyber mistreatment and bullying (Reynolds, 2015).

Ngo and Jaishankar (2017) further highlighted Wall (2005, revised in 2010, p. 82) which addressed cybercrime from four perspectives. These include crime against machines, crimes using machines, and crimes within computer/system, content-related crimes, which may encourage viciousness and further stimulate relatively traditional crimes like stalking and personal pestering.

These different crimes, arguably, bear striking resemblances that are characteristically different from other known crimes. Among the unique characteristics of such cybercrimes include transnational, through the Internet, whereby the attack originates from a different country to another than that of the victims with clearly different jurisdiction, laws and perhaps culture (Brenner 2004; Reynolds, 2015). “Such modus operendi from foreign lands makes it difficult to detect and consequently retaliate them” (Reynolds, 2015). Also, these crimes do not require proximity, and neither are they limited by physical constraints; it has the potential to scale at a high velocity with multiple victimization, while the perpetuator may possibly maintain perfect anonymity. It was identified by Assarut, Bunaramrueang and Kowpatanakit (2019) that freedom and anonymity are key factors in the behavioural intention to commit cybercrime. Al-Suwaidi, Haitham and Jabeen (2018) argued the need for collaboration of space tradition theory and criminal opportunity theory to explain cybercrime since they incorporate not only cyber space but also population characteristics in different countries.

Key Terms in this Chapter

Social engineering: The manipulation of victims to obtain trust for exploitation.

Abductive Reasoning: Reasoning is used to obtain tacit knowledge to explain motives for orientations and actions. This relies on deductive and inductive iteration to arrive at theory.

Deductive Reasoning: Reasoning based on theories or models, reasoning commences from premises contained in the theories or models and then draws conclusions.

Theory: A proposition intended to explain a phenomenon or principles for a practice.

Cyber Deception and Theft: A form of cybercrime that involves a perpetrator using computer system to gain trust from a victim and subsequently fraudulently exploiting the victim.

SET: A well define collection of objects.

Complete Chapter List

Search this Book:
Reset