TAXONOMY AND RELATIONSHIP OF CYBERCRIMES AND SECURITY MEASURES BEFORE AND DURING COVID-19: A SEM APPROACH

Authors

  • Dr. (Ms.) Tarannum Mohan

Keywords:

cybercrime, cyber security, girl students, SEM, covid-19.

Abstract

The aim of this study was to understand how most vulnerable section that is girl students classifies cybercrimes and security measures before and after advent of pandemic. In qualitative aspect, types of cybercrime and corresponding security measures were judged through personal interview of experts. The quantitative aspect used deduced dimensions to collect data from randomly selected 510 girl students from under-graduate colleges of nine major cities of Punjab. SEM analysis was applied to examine responses to latent dimensions. Four attributes of cybercrimes were classified, namely, stalking, privacy violation, financial risks and pornography. To counter these crimes three cyber security measures of general security, password protection and awareness about attacks were categorized. Lastly, significant difference was found between understanding of various cybercrimes and application of various security measures before and during pandemic.

Downloads

Download data is not yet available.

References

Ali, L. (2019) Cyber Crimes-A Constant Threat For The Business Sectors And Its Growth (A Study of the Online Banking Sectors In GCC) The Journal of Developing Areas, 53(1)

Anesa, P. (2020) Lovextortion: Persuasion strategies in romance cybercrime. Discourse, Context and Media, 35, 100398.

Boddy, M. (2018) Phishing 2.0: the new evolution in cybercrime. Computer Fraud and Security, 2018(11), 8-10.

Chaithanya, B. N., and Veena, R. (2019) Emerging trends and challenges in advanced technologies on cyber security. IJO-International Journal of Computer Science and Engineering, 2(1), 01-16.

Chandra, A., and Snowe, M. J. (2020) A taxonomy of cybercrime: Theory and design.

International Journal of Accounting Information Systems, 38, 100467.

Chang, L. Y., and Coppel, N. (2020) Building cyber security awareness in a developing country: lessons from Myanmar. Computers and Security, 97, 101959.

Chang, W. J. (2020) Cyberstalking and Law Enforcement. Procedia Computer Science, 176, 1188-1194.

Cheng, C., Chan, L., and Chau, C. L. (2020) Individual differences in susceptibility to cybercrime victimization and its psychological aftermath. Computers in Human Behavior, 108, 106311.

Cobb, M. J. (2018) Plugging the skills gap: The vital role that women should play in cyber- security. Computer Fraud and Security, 2018(1), 5-8.

Conteh, N. Y., and Schmick, P. J. (2016) Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31.

Donalds, C., and Osei-Bryson, K. M. (2019) Toward a cybercrime classification ontology: A knowledge-based approach. Computers in Human Behavior, 92, 403-418.

De Kimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L., and Hardyns, W. (2020) Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. Computers in Human Behavior, 108, 106310.

Dinev, T. (2006) Why spoofing is serious internet fraud. Communications of the ACM, 49(10), 76-82.

Dombrowski, S. C., Gischlar, K. L., and Durst, T. (2007) Safeguarding young people from cyber pornography and cyber sexual predation: A major dilemma of the Internet. Child Abuse Review: Journal of the British Association for the Study and Prevention of Child Abuse and Neglect, 16(3), 153-170.

-8.

Eddolls, M. (2016) Making cybercrime prevention the highest priority. Network Security, 8,

Epps, C. (2017) Best practices to deal with top cybercrime activities. Computer Fraud and

Security, 4, 13-15.

Fernandez, D. P., Tee, E. Y., and Fernandez, E. F. (2017) Do Cyber Pornography Use Inventory-9 scores reflect actual compulsivity in internet pornography use? Exploring the role of abstinence effort. Sexual Addiction and Compulsivity, 24(3), 156-179.

Geetha, B., and Pagutharivu, R. (2010) Internet–A Dangerous Web for Women. The Indian Police Journal, Vol. LVII-No. 4, (October – December), 55-62.

Geetha, S., and Phamila, A. V. (Eds.) (2016) Combating security breaches and criminal activity in the digital sphere. IGI Global.

Griffiths, M. (2010) Internet abuse and internet addiction in the workplace. Journal of Workplace Learning. 22 (7), 463-472.

Grubbs, J. B., Sessoms, J., Wheeler, D. M., and Volk, F. (2010) The Cyber-Pornography Use Inventory: The development of a new assessment instrument. Sexual Addiction and Compulsivity, 17(2), 106-126.

Gunjan, V. K., Kumar, A., and Avdhanam, S. (2013, September) A survey of cyber crime in India. In 2013 15th International Conference on Advanced Computing Technologies (ICACT) (pp. 1-6) IEEE.

Halder, D., and Jaishankar, K. (2011) Cyber gender harassment and secondary victimization: A comparative analysis of the United States, the UK, and India. Victims and Offenders, 6(4), 386- 398.

Halder, D., and Jaishankar, K. (2012) Cyber Crime Against Women and Regulations in Australia. In Cyber Crime: Concepts, Methodologies, Tools and Applications 757-764, IGI Global.

Ibrahim, S. (2016) Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47, 44-57.

Kaiser, H. F. (1974) An index of factorial simplicity. Psychometrika, 39(1), 31-36. Kandpal, V., and Singh, R. K. (2013) Latest face of cybercrime and its prevention in India.

International Journal of Basic and Applied Sciences, 2(4), 150-156.

Karnold, S. (2000) The cyber world of child pornography and the child pornography act of 1996: Thoughts on morphing, virtual imaging, and the first amendment. Journal of Information Ethics, 9(2), 60.

Kethineni, S., and Cao, Y. (2020) The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review, 30(3), 325-344.

Konradt, C., Schilling, A., and Werners, B. (2016) Phishing: An economic analysis of cybercrime perpetrators. Computers and Security, 58, 39-46.

Lallie, H. S., Shepherd, L. A., Nurse, J. R., Erola, A., Epiphaniou, G., Maple, C., and Bellekens, X. (2021) Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers and Security, 105, 102248.

Li, Z. (2015) Does power make us mean? An investigation of empowerment and revenge behaviors in the cyberspace (Doctoral dissertation, University of Miami)

Lloyd, G. (2020) The business benefits of cyber security for SMEs. Computer Fraud and Security, 2, 14-17.

Martens, M., De Wolf, R., and De Marez, L. (2019) Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior, 92, 139-150.

Math, S. B., Viswanath, B., Maroky, A. S., Kumar, N. C., Cherian, A. V., and Nirmala, M. C. (2014) Sexual crime in India: is it influenced by pornography? Indian Journal of Psychological Medicine, 36(2), 147.

Obar, J.A. and Wildman, S.(2015) Social media definition and the governance challenge: An introduction to the special issue. Telecommunications policy, 39(9), 745-750.

Ottis, R., and Lorents, P. (2010, April) Cyberspace: Definition and implications. In International Conference on Cyber Warfare and Security (p. 267) Academic Conferences International Limited.

Pandove, K., Jindal, A., and Kumar, R. (2010) Email spoofing. International Journal of Computer Applications, 5(1), 27-30.

Powell, A., Henry, N., Flynn, A., and Scott, A. J. (2019) Image-based sexual abuse: The extent, nature, and predictors of perpetration in a community sample of Australian residents.

Computers in Human Behavior, 92, 393-402.

Reyns, B. W., Henson, B., and Fisher, B. S. (2012) Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1-25.

Sahoo, G. P. (2018) Legal Framework of Information Technology in India: With Special Reference to Cyber Obscenity. In Contemporary Issues in International Law, 475-500, Springer, Singapore.

Sankhwar, S., and Chaturvedi, A. (2018) Woman harassment in digital space in India.

International Journal of Pure and Applied Mathematics, 118(20), 595-607.

Sethi, D., and Ghatak, S. (2018) Mitigating cyber sexual harassment: An Insight from India.

Asian Themes in Social Sciences Research, 1(2), 34-43.

Sheridan, L. P., and Grant, T. (2007) Is cyberstalking different? Psychology, crime and law, 13(6), 627-640.

Tabachnick, B.G. and Fidell, L.S. (2001) Using Multivariate Statistics. Fourth Edition.

Needham Heights, MA: Allyn and Bacon.

Umadevi, K. S., Amali, G. B., and Subramanian, L. (2019) An Indian and Global Perspective on Cybercrime. In Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems. 45-63, IGI Global.

Verma, A. (2012) Cyber pornography in India and its implication on cyber cafe operators.

Computer Law and Security Review, 28(1), 69-76.

Venter, I. M., Blignaut, R. J., Renaud, K., and Venter, M. A. (2019) Cyber security education is as essential as “the three R's”. Heliyon, 5(12), e02855.

Weil, T., and Murugesan, S. (2020) IT Risk and Resilience—Cybersecurity Response to COVID-19. IEEE Computer Architecture Letters, 22(03), 4-10.

Wright, M. F., Aoyama, I., Kamble, S. V., Li, Z., Soudi, S., Lei, L., and Shu, C. (2015) Peer attachment and cyber aggression involvement among Chinese, Indian, and Japanese adolescents.

Societies, 5(2), 339-353.

Downloads

Published

2022-12-31

How to Cite

Mohan, D. (Ms.) T. . (2022). TAXONOMY AND RELATIONSHIP OF CYBERCRIMES AND SECURITY MEASURES BEFORE AND DURING COVID-19: A SEM APPROACH. The Journal of Contemporary Issues in Business and Government, 28(4), 1913–1929. Retrieved from https://cibgp.com/au/index.php/1323-6903/article/view/2729