A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF - PowerPoint PPT Presentation
A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF THINGS GEORGE W. BURRUSS DEPARTMENT OF CRIMINOLOGY Why would a criminologist be interested in IoT? IoT used as a vector for hacking, causing harm: Expose user data
A CRIMINOLOGICAL PERSPECTIVE ON THE ILLICIT USE OF THE INTERNET OF THINGS GEORGE W. BURRUSS DEPARTMENT OF CRIMINOLOGY
Why would a criminologist be interested in IoT? • IoT used as a vector for hacking, causing harm: –Expose user data –Privacy violations/surveillance –Denial of service attacks • Hackers using IoT likely involved in other illegal activities
Areas of interest to a criminologist regarding IoT • Offender motivations • Victims’ routine activities • Criminal opportunity structure • Legal response (laws & regulations) • Law enforcement (Cybersecurity) response
Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence
Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence
Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence
Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence
Offender Motivations and IoT • Techniques of Neutralizations –Deny the victim –Denial of injury • Subcultural theory –Hacker norms and expectations • Social Learning –Define use of IoT for crime as normative –Imitation and reinforcement • Rational Choice and Deterrence
Victim’s online activities expose them to offenders • Routine activities theory explores how daily patterns increase likelihood of victimization • We can examine the self-protective actions people take and why? Suitable Target Lack of Guardianship Motivated Offender
Victim’s online activities expose them to offenders • Routine activities theory explores how daily patterns increase likelihood of victimization WWW • We can examine the self-protective actions people take and why? Password1!
The legal, law enforcement, and cybersecurity response • Criminologists examine the impact of laws and regulations on behavior • Examine how criminal justice agencies respond (or not) to cybercrime • Need to understand how cybersecurity fits within traditional response to criminal behavior
Criminologists study cybercrime through various methods • Quantitative Analysis of available usage data • Surveys of users, victims, and offenders • Qualitative interviews of victims and offenders • Natural experiments on policies and practices
In sum: • IoT is but one aspect of cybercrime and cybersecurity that presents an opportunity to study deviant and harmful online behaviors. • Criminologist would benefit for partnering with computer scientists and other technology experts to help develop theories and empirical studies of online behavior.
Recommend
More recommend
Explore More Topics
Stay informed with curated content and fresh updates.