a criminological perspective on the illicit use of the
play

A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF - PowerPoint PPT Presentation

A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF THINGS GEORGE W. BURRUSS DEPARTMENT OF CRIMINOLOGY Why would a criminologist be interested in IoT? IoT used as a vector for hacking, causing harm: Expose user data


  1. A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF THINGS GEORGE W. BURRUSS DEPARTMENT OF CRIMINOLOGY

  2. Why would a criminologist be interested in IoT? • IoT used as a vector for hacking, causing harm: –Expose user data –Privacy violations/surveillance –Denial of service attacks • Hackers using IoT likely involved in other illegal activities

  3. Areas of interest to a criminologist regarding IoT • Offender motivations • Victims’ routine activities • Criminal opportunity structure • Legal response (laws & regulations) • Law enforcement (Cybersecurity) response

  4. Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence

  5. Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence

  6. Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence

  7. Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence

  8. Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence

  9. Victim’s online activities expose them to offenders • Routine activities theory explores how daily patterns increase likelihood of victimization • We can examine the self-protective actions people take and why? Suitable Target Lack of Guardianship Motivated Offender

  10. Victim’s online activities expose them to offenders • Routine activities theory explores how daily patterns increase likelihood of victimization WWW • We can examine the self-protective actions people take and why? Password1!

  11. The legal, law enforcement, and cybersecurity response • Criminologists examine the impact of laws and regulations on behavior • Examine how criminal justice agencies respond (or not) to cybercrime • Need to understand how cybersecurity fits within traditional response to criminal behavior

  12. Criminologists study cybercrime through various methods • Quantitative Analysis of available usage data • Surveys of users, victims, and offenders • Qualitative interviews of victims and offenders • Natural experiments on policies and practices

  13. In sum: • IoT is but one aspect of cybercrime and cybersecurity that presents an opportunity to study deviant and harmful online behaviors. • Criminologist would benefit for partnering with computer scientists and other technology experts to help develop theories and empirical studies of online behavior.

Recommend


More recommend