全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Enhancing Police Officers’ Cybercrime Investigation Skills Using a Checklist Tool

DOI: 10.4236/jdaip.2023.112008, PP. 121-143

Keywords: Cybercrimes, Cyber Security, Digital Forensic, Police Officer, Skills, Checklist

Full-Text   Cite this paper   Add to My Lib

Abstract:

This paper addressed the current state of police officers’ capabilities, skills, and their readiness to deal with the developments of cybercrime. This study discussed definition of cybercrime, cybercrime categories as well as comparison between traditional criminal techniques and cybercrime. As the abilities and skills required for detectives to investigate cybercrime have been discussed. Additionally, literature review and related work, was addressed challenges role of the police in combating cybercrime and facing cybercrime policing. We proposed the main tool in the study which is “Checklist of essential skills for a cybercrime investigator”. Thus, to gain the ability to Identify technical and practical requirements in terms of skills, programs, and equipment to achieve effective and professional results in fight cybercrimes.

References

[1]  Kaur, A.M. (2017) A Study on Awareness of Cyber Crime and Security. Research Journal of Humanities and Social Sciences, 8, 459-464.
https://doi.org/10.5958/2321-5828.2017.00067.5
[2]  Bossler, A.M. and Berenblum, T. (2019) Introduction: New Directions in Cybercrime Research. Journal of Crime and Justice, 42, 495-499.
https://doi.org/10.1080/0735648X.2019.1692426
https://www.tandfonline.com/doi/pdf/10.1080/0735648X.2019.1692426?needAccess=true
[3]  Furnell, S. (2003) Cybercrime: Vandalizing the Information Society. Proceedings of the International Conference on Web Engineering, ICWE 2003, Oviedo, 14-18 July 2003, 8-16.
https://link.springer.com/content/pdf/10.1007/3-540-45068-8_2.pdf
[4]  McGuire, M. and Dowling, S. (2013) Cyber Crime: A Review of the Evidence.
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/246749/horr75-summary.pdf
[5]  Brenner, S.W. (2001) Is There Such a Thing as ‘Virtual Crime’? California Criminal Law Review, 4, Article 1.
https://www.researchgate.net/publication/228199325_Is_There_Such_a_Thing_as_%27Virtual_Crime%27
[6]  Brenner, S.W. (2004) Cybercrime Metrics: Old Wine, New Bottles? Virginia Journal of Law & Technology, 9, 1-52.
[7]  Black, A., Lumsden, K. and Hadlington, L. (2019) ‘Why Don’t You Block Them?’ Police Officers’ Constructions of the Ideal Victim when Responding to Reports of Interpersonal Cybercrime.
http://shura.shu.ac.uk/27803/3/Black-WhyDon%27tYou%28AM%29.pdf
[8]  Viano, E.C. (2017) Cybercrime: Definition, Typology, and Criminalization. In: Viano, E.C., Ed., Cybercrime, Organized Crime and Societal Responses, Springer International Publishing, Cham, 3-22.
https://www.mdpi.com/2673-6756/2/2/28
https://doi.org/10.1007/978-3-319-44501-4_1
[9]  Paoli, L., Visschers, J., Verstraete, C. and Van Hellemont, E. (2018) The Impact of Cybercrime on Belgian Businesses. Intersentia, Cambridge.
https://doi.org/10.1017/9781780687742
https://intersentia.com/en/the-impact-of-cybercrime-on-belgian-businesses.html
[10]  Sarre, R., Lau, L.Y.C. and Chang, L.Y. (2018) Responding to Cybercrime: Current Trends. Police Practice and Research, 19, 515-518.
https://doi.org/10.1080/15614263.2018.1507888
[11]  Donalds, C. and Osei-Bryson, K.-M. (2019) Toward a Cybercrime Classification Ontology: A Knowledge-Based Approach. Computers in Human Behavior, 92, 403-418.
https://doi.org/10.1016/j.chb.2018.11.039
[12]  Broadhead, S. (2018) The Contemporary Cybercrime Ecosystem: A Multi-Disciplinary Overview of the State of Affairs and Developments. Computer Law & Security Review, 34, 1180-1196.
https://doi.org/10.1016/j.clsr.2018.08.005
[13]  Akdemir, N., Sungur, B. and Başaranel, B.U. (2020) Examining the Challenges of Policing Economic Cybercrime in the UK. Güvenlik Bilimleri Dergisi, UGK Özel Sayısı, 113-134.
http://fr.jsga.edu.tr/kurumlar/fr.jsga/IcSite/sciencesdesecurite/GuvenlikBilimleriDergisi/Arsiv/2020/Mayis/8makale-_6--_.pdf
[14]  Gillespie, A.A. (2015) Cybercrime: Key Issues and Debates. Routledge, New York.
https://doi.org/10.4324/9781315884202
[15]  UN Congress Crimes Related to Computer Networks (2017) 10th United Nations Congress on the Prevention of Crime and the Treatment of Offenders; United Nations: Vienna, Austria, 2000.
https://www.unodc.org/documents/congress/Previous_Congresses/10th_Congress_2000/017_ACONF.187.10_Crimes_Related_to_Computer_Networks.pdf
[16]  Council of Europe (2001) Convention on Cybercrime. European Treaty Series-No. 185, Council of Europe, 1-22.
https://rm.coe.int/1680081561
[17]  Commission of the European Communities (2007) Communication from the Commission to the European Parliament, the Council and the Committee of the Regions: Towards a General Policy on the Fight against Cyber Crime. Commission of the European Communities, Brussels.
https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2007:0267:FIN:EN:PDF
[18]  European Commission (2013) Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. European Commission, Brussels.
https://edps.europa.eu/data-protection/our-work/publications/opinions/cyber-security-strategy-european-union-open-safe-and_en
[19]  Akhgar, B., Choraś, M., Brewster, B., Bosco, F., Veermeersch, E., Luda, V., Puchalski, D. and Wells, D. (2016) Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism. In: Akhgar, B. and Brewster, B., Eds., Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities, Advanced Sciences and Technologies for Security Applications, Springer, Cham, 295-321.
https://nottingham-repository.worktribe.com/output/3774756
https://doi.org/10.1007/978-3-319-38930-1_16
[20]  US Government Accountability Office (2007) Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats. US Government Accountability Office, Washington, DC.
https://www.gao.gov/new.items/d07705.pdf
[21]  Perera, P. and Mahanamahewa, P. (2017) Analysis of Dependencies & Legal Barriers on Digital Forensic Investigations in Sri Lanka.
http://ir.kdu.ac.lk/bitstream/handle/345/1733/028.pdf?sequence=1&isAllowed=y
[22]  HMIC (2015) Real Lives, Real Crimes: A Study of Digital Crime and Policing. Technical Report, Her Majesty’s Inspectorate of Constabulary, London.
https://www.justiceinspectorates.gov.uk/hmicfrs/wp-content/uploads/real-lives-real-crimes-a-study-of-digital-crime-and-policing.pdf
[23]  Hunton, P. (2012) Managing the Technical Resource Capability of Cybercrime Investigation: A UK Law Enforcement Perspective. Public Money & Management, 32, 225-232.
https://www.tandfonline.com/doi/abs/10.1080/09540962.2012.676281
https://doi.org/10.1080/09540962.2012.676281
[24]  Harichandran, V.S., Breitinger, F., Baggili, I. and Marrington, A. (2016) A Cyber Forensics Needs Analysis Survey: Revisiting the Domain’s Needs a Decade Later. Computers & Security, 57, 1-13.
https://doi.org/10.1016/j.cose.2015.10.007
https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?referer=&
httpsredir=1&article=1036&context=electricalcomputerengineering-facpubs
[25]  Bossler, A.M. and Holt, T.J. (2012) Patrol Officers’ Perceived Role in Responding to Cybercrime. Policing, 35, 165-181.
https://doi.org/10.1108/13639511211215504
https://www.emerald.com/insight/content/doi/10.1108/13639511211215504/full/html
[26]  Holt, T.J. and Bossler, A.M. (2012) Predictors of Patrol Officer Interest in Cybercrime Training and Investigation in Selected United States Police Departments. Cyberpsychology, Behavior and Social Networking, 15, 464-472.
https://pubmed.ncbi.nlm.nih.gov/22817769/
https://doi.org/10.1089/cyber.2011.0625
[27]  Senjo, S.R. (2004) An Analysis of Computer-Related Crime: Comparing Police Officer Perceptions with Empirical Data. Security Journal, 17, 55-71.
https://doi.org/10.1057/palgrave.sj.8340168
https://www.ojp.gov/ncjrs/virtual-library/abstracts/analysis-computer-related-crime-comparing-police-officer
[28]  Button, M. (2020) Editorial: Economic and Industrial Espionage. Security Journal, 33, 1-5.
https://link.springer.com/content/pdf/10.1057/s41284-019-00195-5.pdf
https://doi.org/10.1057/s41284-019-00195-5
[29]  Luciano, L., Baggili, I., Topor, M., Casey, P. and Breitinger, F. (2018) Digital Forensics in the Next Five Years. Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, 27-30 August 2018, 1-14.
https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1080&context=electricalcomputerengineering-facpubs
https://doi.org/10.1145/3230833.3232813
[30]  Federal Bureau of Investigation (2019) 2019 Internet Crime Report.
https://www.ic3.gov/Media/PDF/AnnualReport/2019_IC3Report.pdf
[31]  Tcherni-Buzzeo, M., Davies, A., Lopes, G. and Lizotte, A. (2016) The Dark Figure of Online Property Crime: Is Cyberspace Hiding a Crime Wave? Justice Quarterly, 33, 890-911.
https://doi.org/10.1080/07418825.2014.994658
https://digitalcommons.newhaven.edu/cgi/viewcontent.cgi?article=1045&context=criminaljustice-facpubs
[32]  Hinduja, S. (2004) Perceptions of Local and State Law Enforcement Concerning the Role of Computer Crime Investigative Teams. Policing, 27, 341-357.
https://doi.org/10.1108/13639510410553103
https://www.researchgate.net/profile/Sameer-Hinduja/publication/240602047_Percetions_of_local_and_state_law_enforcement_concerning_the_role_of_computer_crime_investigative_teams/links/55dddbcb08ae45e825d39208/Perceptions-of-local-and-state-law-enforcement-concerning-the-role-of-computer-crime-investigative-teams.pdf
[33]  Lee, J.R., Holt, T.J., Burruss, G.W. and Bossler, A.M. (2021) Examining English and Welsh Detectives’ Views of Online Crime. International Criminal Justice Review, 31, 20-39.
https://doi.org/10.1177/1057567719846224
https://journals.sagepub.com/doi/epub/10.1177/1057567719846224
[34]  Skogan, W.G. and Hartnett, S.M. (1997) Community Policing, Chicago Style. Oxford University Press, New York.
https://www.ojp.gov/ncjrs/virtual-library/abstracts/community-policing-chicago-style.
[35]  (2022) Global Digital Population as of October.
https://www.statista.com/statistics/617136/digital-populationworldwide/
[36]  Cohen, L.E. and Felson, M. (1979) Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44, 588-608.
http://faculty.washington.edu/matsueda/courses/587/readings/Cohen%20and%20Felson%201979%20Routine%20Activities.pdf
https://doi.org/10.2307/2094589
[37]  Grabosky, P.N. (2001) Virtual Criminality: Old Wine in New Bottles? Social & Legal Studies, 10, 243-249.
https://journals.sagepub.com/doi/10.1177/a017405
https://doi.org/10.1177/a017405
[38]  Wall, D.S. (1998) Policing and the Regulation of the Internet. In: Walker, C. and Ashworth, A., Eds., Criminal Law Review, Sweet & Maxwell, London, 79-91.
[39]  Navarro, J.N. and Jasinski, J.L. (2012) Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences. Sociology Spectrum, 32, 81-94.
https://stars.library.ucf.edu/facultybib2010/3072/
https://doi.org/10.1080/02732173.2012.628560
[40]  Kennedy, J., Holt, T. and Cheng, B. (2019) Automotive Cybersecurity: Assessing a New Platform for Cybercrime and Malicious Hacking. Journal of Crime and Justice, 42, 632-645.
https://www.tandfonline.com/doi/full/10.1080/0735648X.2019.1692425
https://doi.org/10.1080/0735648X.2019.1692425
[41]  Goodman, M.D. (1997) Why the Police Don’t Care About Computer Crime. Harvard Journal of Law & Technology, 10, 465-494.
http://jolt.law.harvard.edu/articles/pdf/v10/10HarvJLTech465.pdf
[42]  Hadlington, L., Lumsden, K., Black, A. and Ferra, F. (2018) A Qualitative Exploration of Police Officers’ Experiences, Challenges, and Perceptions of Cybercrime. Policing, 15, 34-43.
https://doi.org/10.1093/police/pay090
https://shura.shu.ac.uk/23755/3/Black_qualitative_exploration_police_%28AM%29.pdf
[43]  Holt, T.J., Blevins, K.R. and Burkert, N. (2010) Considering the Pedophile Subculture Online. Sexual Abuse, 22, 3-24.
https://doi.org/10.1177/1079063209344979
https://journals.sagepub.com/doi/10.1177/1079063209344979
[44]  Bond, E. and Tyrrell, K. (2018) Understanding Revenge Pornography: A National Survey of Police Officers and Staff in England and Wales. Journal of Interpersonal Violence, 36, 2166-2181.
https://doi.org/10.1177/0886260518760011
https://journals.sagepub.com/doi/abs/10.1177/0886260518760011
[45]  Hou, T. and Wang, V. (2020) Industrial Espionage—A Systematic Literature Review (SLR). Computers & Security, 98, Article ID: 102019.
https://www.sciencedirect.com/science/article/pii/S0167404820302923
https://doi.org/10.1016/j.cose.2020.102019
[46]  Dupont, B. (2004) Security in the Age of Networks. Policing and Society, 14, 76-91.
https://www.tandfonline.com/doi/abs/10.1080/1043946042000181575
https://doi.org/10.1080/1043946042000181575
[47]  Etzioni, A. (2011) Cybersecurity in the Private Sector. Issues in Science and Technology, 28, 58-62.
https://cspri.seas.gwu.edu/sites/g/files/zaxdzs4106/f/downloads/etzioni_0.pdf
[48]  Holt, T.J. and Bossler, A.M. (2012) Police Perceptions of Computer Crimes in Two Southeastern Cities: An Examination from the Viewpoint of Patrol Officers. American Journal of Criminal Justice, 37, 396-412.
https://doi.org/10.1007/s12103-011-9131-5
https://www.academia.edu/23673247/Police_Perceptions_of_Computer_Crimes_in_Two_Southeastern_Cities_An_Examination_from_the_Viewpoint_of_Patrol_Officers
[49]  Bossler, A.M., Holt, T.J., Cross, C. and Burruss, G.W. (2020) Policing Fraud in England and Wales: Examining Constables’ and Sergeants’ Online Fraud Preparedness. Security Journal, 33, 311-328.
https://doi.org/10.1057/s41284-019-00187-5
https://link.springer.com/article/10.1057/s41284-019-00187-5
[50]  Burruss, G., Howell, C.J., Bossler, A. and Holt, T.J. (2019) Self-Perceptions of English and Welsh Constables and Sergeants Preparedness for Online Crime: A Latent Class Analysis. Policing, 43, 105-119.
https://ouci.dntb.gov.ua/works/9Go8QAx9/
https://doi.org/10.1108/PIJPSM-08-2019-0142

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133