Volume 5, Issue 1, February 2016, Page: 1-6
Underlying Causes of Cyber-Criminality and Victimization: An Empirical Study on Students
Naznin Shabnam, Department of Criminology, Faculty of Social Science, University of Dhaka, Dhaka, Bangladesh
Md. Omar Faruk, Department of Criminology and Police Science, Faculty of Life Science, Mawlana Bhashani Science and Technology University, Santosh, Tangail, Bangladesh
Md. Kamruzzaman, Department of Criminology and Police Science, Faculty of Life Science, Mawlana Bhashani Science and Technology University, Santosh, Tangail, Bangladesh
Received: Feb. 13, 2016;       Accepted: Feb. 21, 2016;       Published: Mar. 4, 2016
DOI: 10.11648/j.ss.20160501.11      View  4128      Downloads  66
Abstract
In Bangladesh, like all other countries of the world the frequency of cyber-crime is increasing over the time. Generally, crime is defined by law as a territorial phenomenon in the way the law is territorial in nature. However, due to the global connectivity and online activities cyber crime has become a global matter, not a territorial one and is spreading in a terrific volume. Many of the students who study in the university level also without knowing the furiousness about the nature of cyber crime are being involved in such crime in various ways. This study therefore, is an effort to understand the involvement of students in cyber crime with or without their knowledge regarding the malicious sides of it. Mawlana Bhashani Science and Technology University was selected as the study area for the present study and a number of 175 undergraduate students have been interviewed during the time frame of June to October, 2014 to know their involvement as stakeholders in the same. This study has yielded some interesting findings about cyber criminality and victimization status of the students as like nature of victimization, way of victimization, victim offender relationships, types of cc, nature of cc criminal etc. Most of the studied respondents have a little or no knowledge regarding cyber crime and they are involved in such crime as offender just for mere interest and not for the illegal monetary gain; most of the respondents have also encountered one or many of the cyber crimes in their online activities. Psychological motivation is one of the main causes behind cyber-criminality of such youths and it is pertinent from the study that a very few of them is aware about the Information and Communication Technology (Amendment) Act, 2013 of Bangladesh.
Keywords
Cyber-Criminality, Causes, Victimization, Students
To cite this article
Naznin Shabnam, Md. Omar Faruk, Md. Kamruzzaman, Underlying Causes of Cyber-Criminality and Victimization: An Empirical Study on Students, Social Sciences. Vol. 5, No. 1, 2016, pp. 1-6. doi: 10.11648/j.ss.20160501.11
Copyright
Copyright © 2016 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Reference
[1]
Power, R., 2001, 2001 CSI/FBI Computer Crime and Security Survey, Computer Security Issues and Trends, 7(1): 1-18.
[2]
Gordon, L. A. et al., 2003, A Framework for Using Insurance for Cyber-Risk Management, Communications of the ACM, 46(3): 81-85.
[3]
Jaishankar K., (2008).Space Transition Theory of Cyber Crimes.
[4]
Baskerville, R., 1991, Risk Analysis: An Interpretive Feasibility Tool in Justifying Information Systems Security, European Journal of Information Systems, 1 (2): 121-130.
[5]
Hoffer, J.A., and D.W. Straub, 1989, The 9 to 5 Underground: Are You Policing Computer Crimes? Sloan Management Review (Summer1989): 35-43.
[6]
Furnell, S. (2002). Cyber crime: Vandalizing the information society. Boston, MA: Addison-Wesley.
[7]
Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588-608.
[8]
Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Society of Criminology, 2, 407-427.
[9]
Robert Bohm, Keith Haley (2007), Introduction to Criminal Justice, McGraw-Hill press.
[10]
Casey, E. (2000). Digital evidence and computer crime. London: Academic Press.
[11]
Ramasastry, A. (2004). Cable News Network (CNN). com. Can Utah’s new antispyware law work? Retrieved January16, 2016, from http://www.cnn.com/2004/LAW/06/03/ramasastry.spyware/index.html.
Browse journals by subject