Sie sind auf Seite 1von 12

Author/year Main objectives methodology Result/conclution

Divya Kalia and Sheema The present work aims The sample comprised Strong evidences have
Aleem/2010 to extend this theory to of 200 adolescents been found for the
cyber victimization and (Male=120, Female=80; application of RAT in
understand if online Mean age=16.89, studying cyber
activities or the online SD=0.653) within the victimization (Miethe &
environment itself age range 16-18 years Meier, 1990; Reyns,
provides opportunities studying in grades 11th Henson, and Fisher,
for crime to occur and 12th. The one’s 2011). The first research
online. And also, how who were internet question asked if a
certain individuals are users, fluent in English significant difference
at a greater risk for language and were able existed between victims
being victimized online to provide consent for and non-victims of cyber
in the hands of the study were included victimization on parental
predators (Cohen, for the study supervision; target
Lawrence & Marcus suitability and its
Felson, 1979).The first dimensions. Nonvictims
variable is a given scored higher on parental
inclination as per the supervision and the
theory and hence, is not victims scored higher on
put to test. By means of target suitability and all
three questionnaires its four dimensions. This
developed for the result justified the
study, first, the victims application of routine
activity theory for
studying cyber
victimization, in the
Indian context.

PAUL M. KLENOWSKI Sherman and his The SMS has become Based on this
KEITH J. BELL KIMBERLY colleagues recommend one of the most widely comprehensive review of
D. DODSON /2010 that the accepted tools for the relatively strong
implementation and assessing scholarly empirical research (i.e., 8
continuation of any works in the criminal of the 12 studies
crime prevention justice field. In reviewed an SMS score of
program should be particular, this scale four or above) of the
evidence-based enables criminologists juvenile awareness
(Sherman, Farrington, the opportunity to programs, we conclude
Welsh, & MacKenzie, critically evaluate the that these programs are
2002). That is, the effectiveness of various not working. That is,
effectiveness of crime types of justice-related these programs do not
prevention programs programs including appear to have the
should be evaluated those focusing on crime intended deterrent effect
using rigorous scientific prevention strategies. that proponents claim.
standards to determine The scale originates Most of the evaluations
which programs are in from the work of Cook reviewed found that
fact ‘‘working.’’ The and Campbell (1979) juvenile awareness
purpose of this study is and allows for a rank programs have no
to determine whether method based on statistically significant
there is sufficient methodological criteria impact on at-risk juvenile
empirical evidence to (Sherman et al., 2002). offender attitudes
suggest that juvenile The primary purpose of towards crime or their
awareness programs the SMS is to give propensity to commit
reduce recidivism or scholars, policymakers, further criminal acts.
deter criminal behavior and practitioners ‘‘a Furthermore, some of
among at-risk youth simple scale measuring these programs suggest
the internal validity’’ of that participation in these
various types of studies programs may actually
(Sherman et al., 2002, increase the likelihood of
p. 16). The SMS is a 5- future offending (Buckner
point scale that uses & Chesney-Lind, 1983;
specific criteria to Finckenauer, 1979; 1982;
evaluate (or score) the Lewis, 1983).
methodological rigor of
a study based on its
internal validity. The
scale rates the
methodological quality
of the studies ranging
from Level 1 (least
rigorous) to Level 5
(most rigorous). Some
of the criteria used to
evaluate the quality of a
particular study include
the use of pretests and
posttests,
randomization of the
experiments, the use of
comparison and control
groups, history,
selection bias, causal
order, evaluation of
measurement error,
statistical power,
research design, and
assessments of internal
and external validity
(Sherman, Gottfredson,
MacKenzie, Eck, Reuter,
& Bushway, 1998;
Sherman et al., 2002;
see Appendix). If the
studies have sufficient
methodological quality
(i.e., Level 3 or higher),
researchers can classify
the effectiveness of a
program into one of
four categories: ‘‘what
works, what does not
work, what is
promising, and what is
unknown’’ (Sherman et
al., 2002, p. 18)

John L. McMullan & David the main elements This paper utilizes a Compliance methods
C. Perrier/2007 explaining computer case study approach. were ineffective in
crime and its We adopt Orum, preventing the cyber-
organization may be Feagin, and Sjoberg’s attacks that we studied.
found within the illegal (1991, p. 2) definition of Several standards were
activity and the socio- a case study as ‘an in- compromised and
legal problems depth, multifaceted technical functions of the
confronted there. This investigation using machines did not operate
explanatory approach qualitative research according to code. The
emphasizes: (a) that at methods of a single following violations on
a given stage of social phenomenon.’ gambling machines were
technological Our objective is to not detected by the
development, a given document a continuous regulators’ security
illegal act presents picture of how one systems: (a) play button
certain technical and cyber-crime network manipulations allowed
social problems which was able to effectively games to continue after
must be negotiated for mediate law as a field of the regulator had
its successful rules, regulations, and requested the machines
completion; (b) that we sanctions (Denzin, be disabled, suggesting
can identify the most 1970; Orum et al., that the host did not have
efficient types of 1991). Compared to a complete control over
organizations for quantitative them; (b) rules or bet
managing those methodology that buttons, when held
problems; and (c) that describes behaviors in down, interrupted the
the existence of these statistical terms, our reporting of machine
kinds of organizations approach emphasizes door entries to the
are explained in terms the social dynamics, regulator. VLTs could
of their technical organizational remain offline and
efficiency in the rationality, and undetected by the
situations at hand and interactive relationships authorities. Moreover,
in their ability to avoid, between criminal and audible alarms protecting
evade, and neutralize non-criminal segments logic area doors were not
the efforts of law of society. Our study reliable and the terminals
enforcement (McIntosh, adds to a growing body did not always reset to
1975) of literature that the operational
emphasizes similarities conditions prior to the
in criminal technologies doors’ openings, thus
Police Practice and facilitating cyber-fraud;
Research: An (c) the machines did not
International Journal automatically compel
433 for fraud (i.e., bank cash payouts at the
fraud, welfare fraud, $1,000 maximum limit.
credit card fraud, They permitted payouts
insurance fraud, retail far greater than those
fraud) and to a second specified under existing
body of literature that legislation thus
recognizes that law and encouraging those in the
law enforcement may know to defraud
sometimes operate as machines and even
ironic facilitative forms double their winnings; (d)
to that which they seek the products did not
to regulate and control respond appropriately to
(Chambliss, 1989; the signature checking
Grimshaw & Jefferson, processes when they
1987; McBarnet, 1978, were activated and
1993; Rosoff, Pontell, & enrolled. Machines
Tillman, 2002). ignored continuations of
442 J. L. McMullan & D. C.
Perrier the Random
Operating Memory
(ROM) checks and
functioned
independently, thus
subverting their own
software and security
measures; (e) VLTs did
not always operate
correctly after one
EPROM was replaced
with another. Signature
checks were not
adequately performed by
the software and it failed
to detect important
storage and protocol
information, thus
permitting cyber-crime to
occur without the
regulator’s knowledge; (f)
the machines did not
recognize critical memory
when it was corrupted
after each game and did
not always perform the
appropriate memory
validity checks, thus
undercutting security and
enabling fraud; (g) hard
meter connections were
not enclosed in sealed
environments to prevent
tampering as required by
product specifications.
They were easily accessed
without discovery and
frauds could occur
without security
prevention; and finally (h)
computer chips failed
randomness testing in
two ways: they did not
meet the 99% confidence
level with regard to
producing recurring
patterns of symbol
occurrences and they did
not meet the 99%
confidence level with
regard to the
independence of number
positions from one game
to the next.

MelissaDearey,Be The main aim of this Students were aware of The crux of the matter
thaniePetty,Brett essay is to explore a range of critical, may simply be that true
Thompson,Clinton prisoner life writing theoretical, and crime texts, prisoner life
R.Lear,Stephanie within the specific, methodological issues writing, and criminology
GadsbyandDonna richly and multiply pertaining to prisoner are doing different things,
Gibbs/2003 dependent context of life writing, such as the performing different
teaching and learning nature of the stories functions via their own
undergraduate and identities distinctive discourses,
criminology at an represented in prisoner epistemologies, and
English university, from life writings published etymologies. This would
the authorial viewpoint in the true crime genre be consistent with the
of a teacher and her and the sorts of crimes conventional situation in
students as budding and criminals that tend which various genres
criminologists and to feature and, just as have their more or less
coauthors. This article importantly, not feature discrete place and more
seeks to redress a in these texts. The or less keep to it, for
continuing resistance to undergraduates example, in policymaking,
life history approaches considered the academic, and popular
in criminology, despite limitations of the forums on crime and
the discipline being generic tendency in punishment. However,
formally devoted to the offender life writing to perhaps true crime,
understanding of the concentrate on the life prisoner life writing, and
meaning and of a single individual criminology are doing the
experience of (notwithstanding the same thing (providing
imprisonment in all its commonplace use of explanations of crime and
forms and diegesis, or the telling criminality) in different,
consequences. of the life stories of yet more or less
others, within these life accessible ways, in line
writings).29 Even so, with the cultural values
students were more and moral landscapes
often than not quite they inhabit.
amenable to, if not
openly positive about,
prisoner life writing in
its potential to inform
or enhance criminology
and to provide a critical
perspective on the
discipline.
Demonstrating self-
reflexivity and a critical
practitioner
perspective, students
recognised current
criminological trends
‘from qualitative
research towards
quantitative research’
as an ‘effort to
legitimise criminology
as a science’ [student
collective].

Varun Dutt To determine the Different model types Based upon model
Cleotilde Gonzalez, effects of an adversary’s representing a predictions, a
Young-Suk Ahn behavior on the defender, based on defender’s prior threat
2013 defender’s accurate and Instance-Based Learning experiences and his or
timely detection of Theory (IBLT), faced her tolerance to threats
network threats different adversarial are likely to predict
behaviors. A defender’s detection accuracy; but
model was defined by considering the nature
experience of threats: of adversarial behavior
threat-prone (90% is also important
threats and 10%
nonthreats) and
nonthreat-prone (10%
threats and 90%
nonthreats); and
different tolerance
levels to threats: risk-
averse (model declares
a cyber attack after
perceiving one threat
out of eight total) and
riskseeking (model
declares a cyber attack
after perceiving seven
threats out of eight
total). Adversarial
behavior is simulated by
considering different
attack strategies:
patient (threats occur
late) and impatient
(threats occur early).

Catherine D. Marcum† , The purpose of this The study involved Table 1 presents the
George E. Higgins§ , paper is to add to the mailing a one-page, descriptive statistics for
Tina L. Freiburger¥ and small amount of double-sided survey to this sample. This table
Melissa L. Ricketts‡ literature investigating law enforcement shows that 30 per cent
2010 law enforcement agencies for cities with of the sample has a
agency reaction to the a population of 50,000 designated cyber crime
growing occurrence of or more. Our original task force and that 41
cyber crime. This study population was chosen per cent of the sample
will investigate the from the listing of cities has departmental
prevalence of online in the United States training on cyber
child pornography provided by the 2000 crimes. The average
possession United States Census. department was in the
investigations and The letters were Southwest region of the
arrests by law directed to the head country and 93 per cent
enforcement agencies law enforcement agent of the departments
in the United States, as of the department, such have an educational
well as the training and as the chief or sheriff. requirement. In 2007,
resources dedicated to Although an online 48 per cent of the
investigating cyber survey would be less departments conducted
crimes in general. More expensive, they possession of child
specifically, the current generally have a much pornography
research examines 2008: possession of investigations, and that
whether the presence child pornography’. rose to 51 per cent in
of a specialised task Because the items cover 2008. In 2007, 31 per
force and training 2007 and 2008 the two cent of the
programmes focused on items result into four departments arrested
the investigation of items. The respondents for possession of child
cyber crimes increases indicated the number of pornography, and the
the number of occurrences percentage rose to 34
investigations and investigated and arrests per cent in 2008.
arrests for cyber crime. made, for each year, Table 1 also shows
It is expected that the using a 3-point Likert- that two of the items
additional use of a type indicator (i.e., 0 = are non-normally
special task force and 0–5, 1 = 6–10, and 2 = distributed. The
specialised training will 11+). We dichotomised openended response to
increase departments’ these measures so that the item that addresses
abilities to detect we might be able to the number of sworn
incidences of child porn capture better whether officers is nonnormal.
violations, leading to a an investigation or an We would expect this
higher number of incident took place. item to be non-normal
investigations and given that the answer
arrests. choice is open-ended.
To avoid cumbersome
interpretations based
on transformations, we
retained the item as the
respondents indicated.
In addition, the
responses to the
educational
requirement are non-
normal as well. Today,
most police agencies
have an educational
requirement; thus, we
would expect nearly the
non-normality as the
responses are over 90
per cent. We retained
this item in its current
form.

Laurel G. Borgia Jill In light of the severity While there is a wide Students have always
Joline Myers Western of the problem and selection of literature and will always bully
2010 these significant fiction tities that one another, say
statistics, it is important address bullying, the offensive things, and
that teachers number of titles that test the limits of their
understand all forms of address cyber bullying is teachers' patience while
bullying and know how much smaller. After learning to express
to teach prevention in conducting an extensive themselves and develop
their own classrooms. search through the into adults. The manner
Teachers need to be Illinois university of their inappropriate
aware of students who system, I Share, which behavior has changed
are at risk of being a includes 76 academic with the advent of
victim of a cyber research libraries; a technology; thus,
bullying. search of 46 public schools, too, must
libraries; a search of 46 change to meet the
school districts covering new challenges. Erom
13 Illinois counties that the courts we have
are members of the learned that some
Rolling Prairie Library forms of harassing
System; and a perusal speech or cyber bullying
of several publishing do not warrant First
company sites, only Amendment protection
nine fiction literature or school sanctions. Yet,
titles and one play were doing nothing is not an
found. While one title option. Cyber bullying
was published in 1999, aflFects students'
the rest were published reputations and their
between 2006 and futures, disrupts the
2009. Each title is listed educational process,
below with a short and causes serious
synopsis: health concerns. So
then, what must be
done? Again, courts
have provided the
answer. The school's
proper response is to
educate the audience
rather than squelch the
speaker. The use of
literature to address
cyber bullying provides
the means to educate.
Through literature,
schools can lead by
example, providing civil,
proper, and positive
ways to use technology
to communicate and
learn.

Kathryn DePaolis • The purpose of the A total of 660 3rd–5th The results of the
Anne Williford present study was to grade students in six present study suggest
2014 examine the prevalence schools completed an the need for
and nature of cyber online survey on developmentally
victimization among a measures of traditional appropriate prevention
sample of elementary and cyber bullying and and intervention
school students and victimization. programs implemented
determine whether Descriptive statistics at the elementary
significant differences were used to determine school level if efforts to
existed between cyber prevalence, mechanism address this complex
victimized and non- (e.g., social media), problem are to be
cyber victimized identity of the successful.
students. perpetrator, and
whether incidents were
reported to others.
Fixed effects regression
models, including
dummy coded school
variables to control for
nesting, were run to
assess group
differences.

Jemal Abawajy* The main goal of a The aim of this study is In this paper, we
2012 security awareness not to generalise, but to studied two information
programme is to raise interpret some users’ security awareness
employee information experiences of programme-related
security awareness in information security issues: (i) what delivery
an organisation. As with delivery methods. This approaches are
any programme, the is an exploratory study effective in raising
success of information which seeks to find new information security
security awareness insights, as there is no awareness level of
programme will rely large and firm people; and (ii) which
heavily on how the theoretical background delivery method is
awareness information on the subject of preferred by users. We
is delivered. There are information security looked at three
many information awareness delivery information security
security awareness methods. By comparing awareness delivery
delivery models. These three different delivery methods (i.e. text-
models are capable of models through based, game-based and
raising the awareness of conducting video-based) in terms of
employees about a experiments, data were their effectiveness in
wide array of cyber collected and subjected raising information
security problems that to analyses. The design security awareness and
ranges from spam and and analysis of this user preferences of the
phishing to well study draws on delivery method. Our
organised attacks methodological results suggest
intended to corrupt or experiences from those information security
disable systems. In this used in Sheng et al. awareness training is a
section, we will review (2007). This research powerful means of
the various information method enabled us to empowering people
security awareness manipulate different with knowledge on
delivery methods delivery methods and focused topics. After
commonly used to to assess their influence completing the training
provide a context for on the effectiveness of almost all of the
subsequent discussion learning security participants had the
of our work. awareness concepts correct idea about
and skills. phishing and the
dangers it poses both to
the individual and to an
organisation. Although
the results suggest that
video presentation to
be the most preferred
security awareness
training delivery
method, the training
provided through the
use of the various
delivery methods used
appear to have been
mostly successful in
aiding the participants
with a clearer
understanding of what
phishing is and how to
best minimise its
dangers.

Ming-Shinn Lee1 *, Wu : This study aimed to : The study adopted the The intervention
Zi-Pei1 , Leif Svanstro¨ explore the quasi-experimental through this pilot study
m2 , Koustuv Dalal3 effectiveness of the design with two classes was effective and
2013 cyber bullying made up of a total of 61 positive for cyber
prevention WebQuest junior high school bulling prevention. It
course implementation. students of seventh was with small number
grade. The study of students. Therefore,
subjects comprised of studies with large
30 students from the number of students and
experimental group and long experimental
31 students from the times, in different areas
control group. The and countries are
experimental group warranted.
received eight sessions
(total 360 minutes) of
the teaching
intervention for four
consecutive weeks,
while the control group
did not engage in any
related courses. The
self-compiled
questionnaire for the
student’s knowledge,
attitudes, and
intentions toward cyber
bullying prevention was
adopted. Data were
analysed through
generalized estimating
equations to
understand the
immediate results on
the student’s
knowledge, attitudes,
and intentions after the
intervention. The
results show that the
WebQuest course
immediately and
effectively enhanced
the knowledge of cyber
bullying, reduced the
intentions, and retained
the effects after the
learning. But it
produced no significant
impact on the attitude
toward cyber bullying.

Das könnte Ihnen auch gefallen