Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 26

How do Undergraduate students construct their view of cybercrime?

Exploring

definitions of cybercrime, perceptions of online risk and victimisation.

Abstract

While cybercrime is recognised as an increasing problem in society, it is unclear how users

perceive cybercrime and online risks. This qualitative study explored how undergraduate

students in England, a group who are at relatively high risk of victimisation, viewed language

and concepts associated with cybercrime. Three focus groups were conducted with a total of

sixteen 18 to 21 year old undergraduate students, and data was analysed inductively and

thematically. The themes explored in this article include: the physical world versus the virtual

world; confusion regarding the law (including a perceived lack of police interest in

responding to cybercrime); the normalisation of risky or harmful online behaviour; and

victimisation. The themes also point towards a variety of misconceptions about cybercrime

alongside an ambivalence towards the potential risk of becoming a victim. The data provides

a potential step towards tailoring education packages and awareness programmes to ensure at

risk groups are equipped with actionable mechanisms to protect themselves. Further research

is suggested in terms of exploring how such perceptions differ across different societal

groups and cultures.

Keywords cybercrime; focus groups; qualitative; risk; students; victimisation; youth

1. Introduction

Over the past decade, the increasing threats to national infrastructure from potential cyber-

attacks have positioned the issue at the highest tier of concern for the UK government

(National Cyber Security Strategy, 2016). A critical issue is how to convey information about

1
such threats to a wider audience, a point hindered by the lack of agreement in the terminology

being used (Wall, 2008a, 2008b). In the Cyber Crime Strategy (2010) it was suggested that

crime should not be defined by the medium through which it is conducted but should aim to

‘raise public confidence in the safety and security of the internet’ (p.17). Despite this, a

tendency to look at cybercrime through a traditional lens persists, not only hindering aspects

of investigation and prosecution, but also effective communication (Gottschalk, 2010).

Despite official guidance, the general public’s behaviour regarding cyber-security still falls

sort of the ‘best practice’ presented in numerous government led cyber-security campaigns

(Furnell & Moore, 2014). This may be due to strategies focusing on narrow, technological

definitions of cybercrime that largely ignore aspects of human factors (Mittu & Lawless,

2015). Human factors are the most exploited in cybercrime and seen as the weakest link in

cyber-security (Happ, Melzer, & Steffgen, 2016; Oltramari, Henshel, Cains, & Hoffman,

2015). For example, research by Happ, Melzer and Steffgan (2016) found that when given a

small incentive, people were willing to divulge their passwords to strangers. Therefore, it

could be argued that weaknesses in cybersecurity are a result of limited relevant information

rather that lack of good practice.

One of the key barriers to providing individuals with targeted information is a lack of

understanding of how individuals view their risk from cybercrime (Wall, 2008a). By gaining

a clearer and more detailed insight into how individuals define and understand cybercrime,

mechanisms for the development of more targeted and developed communication packages

can be designed (Hadlington & Chivers, 2018). However, studies exploring the experiences

and perceptions of at risk populations are severely limited, making the development of such

packages difficult. It is from this perspective that the current research is presented, with a key

2
focus on one specific at risk group, that of undergraduate students (Bidgoli, Knijnenburg, &

Grossklags, 2016; Hadlington & Chivers, 2018).

1.1 Definitions and classifications of cybercrime

The topic of cybercrime has become a critical focus for many, including researchers, law

enforcement, and those developing government policies. Despite this, cybercrime lacks a

universally accepted definition (Gordon & Ford, 2006; McQuade, 2007). This lack of

agreement regarding the definition of cybercrime has been linked to public confusion in

relation to which behaviours or actions fall under the category (Wall, 2008a; Wall, 2008b).

The term is often used to describe crimes involving computers (McQuade, 2007), but can be

used to refer to a much broader set of crimes. Cybercrime does not only refer to the use of

the Internet to commit crime but can be viewed as existing on a continuum (Gordon and

Ford, 2006). This can range from aspects of ‘technological crime’ (also referred to as cyber-

dependent crime; NCA, 2016) that can only existing within a system such as the Internet, or

hardware and software. At the other end of the spectrum there is ‘people crime’ (or cyber-

enabled crime; NCA, 2016), in which technology or the use of the Internet is only a minor

part of the crime. It is clear that there are a number of overlapping and competing terms

prevalent in the literature, which in turn proliferate confusion for users, which in turn may

influence the way in which cybercrime is perceived.

1.2 Public perceptions of cybercrime

News articles on the topic of cybercrime are often given top priority due to the pervasiveness

of digital technology in modern life. However, commentators have noted that this may serve

to reflect an unrealistic level of cybercrime victimisation (Wall, 2008a). The over-exuberant

reporting of cybercrime by the mass media may lead to an assumption that cybercrime is

3
extremely prevalent, in turn creating undue fear amongst the public (Wall, 2008b; Yu, 2014).

In this context cybercrime is viewed as an emotive construct, where the primary emotion

being evoked is that of fear (Wall, 2007; Burrows, 1997). In contrast, academic literature and

government policy focuses on the scientific definitions, explanations and strategies involving

cybercrime (Wall, 2007). This discrepancy may impact on the successful communication of

information from academic and legislative resources to the public, in turn explaining why

there is a heavy reliance on other sources such as the mass media (Wall, 2008a; Hasan,

Rahman Abillah & Omar, 2015).

Previous research has noted that information on cybercrime comes from misleading sources,

for example, popular television and film (Penfold-Mounce, Beer & Burrows, 2011). Wall

(2008b) noted a heavy reliance on aspects he terms as “social science fiction”, a branch of

science fiction that explores societal issues against a backdrop of technical change and

technical possibilities. This aspect then becomes intertwined with both cybercrime and

technology growth, permeating an image of cybercrime that is both unrealistic and

apprehensive (Burrows, 1997; Wall, 2008b). Fiction has also created stereotypical

descriptions of cybercrime and the perpetrators. Cybercriminals are stereotypically described

as hackers and loners who are immersed in cyberspace and living in a dystopic future (Wall,

2008b). From this perspective, the public perception of cybercrime is often masked in hype

and unrealistic portrayals, making the issue of communicating prevention packages difficult.

1.3 Undergraduate students’ risk of victimisation from cybercrime

Those who use digital technology frequently are most at risk of being a victim of cybercrime,

and are in turn less likely to be aware of the risks associated with digital technology and the

Internet (Hargittai & Hinnant, 2008; Friemel, 2016; Riek, Bohmo & Moore, 2016). One

4
particular group that has a heightened risk of susceptibility to cybercrime is undergraduate

students. Research by Bidgoli et al., (2016) noted that undergraduate students in particular are

more vulnerable to cybercrimes due to an heightened engagement with technology, newfound

financial, and social independence. Bidgoli et al., (2016) noted that over half of their sample

had experienced at least one form of cybercrime whilst studying. It was also noted that this

group rely heavily on the media and people they know personally for their information about

cybercrime and cybersecurity. Bidgoli et al., (2016) also found that the majority of students

lacked the relevant knowledge on how to officially report a cybercrime.

This perspective is placed in stark contrast to the stereotypical view that it is those in the over

60 age bracket who are more likely to be the victims of cybercrime (Experian, 2017; Cifas,

2017). In a report produced by the credit agency Experian (2017), those in the 20-29 age

bracket had experienced a 5.7% rise in fraudulent attacks since 2014. Shared accommodation,

a lack of monitoring financial statements, and living their lives online all served to increase

young people’s susceptibility to online crimes. Cifas (2017) also highlighted that individuals

in there 30s were at greater risk of identity theft, again challenging the notion that it is the

elderly who are more vulnerable to such attacks. Therefore, this article contributes to

literature on cybercrime victimisation by offering a contextual understanding of

undergraduate students’ perceptions of cybercrime via qualitative research involving focus

groups with students in England.

1.4 Aims and Objectives

The current study aims to explore how a group of undergraduate students perceived and

construct their view of cybercrime and cybersecurity. Researchers have noted that more effort

needs to be focused on educating young adults as to the potential risks presented by

cybercrime (McQuade, 2007). By doing so, an enhanced level of digital security can be

5
established through tailored educational programmes, providing a potential mechanism for

decreasing the risk of victimisation (Wiederhold, 2014). In order to achieve this, there is a

need to gain a clearer understanding of how young adults formulate their definitions of

cybercrime as well as their understanding of key terms aligned to this. It is also important to

assess how they perceive risk online, with previous research also noting that this age group is

particularly prone to engaging in activities that could leave them open to victimisation

(McQuade, 2007). In this qualitative study, the following research questions were explored:

‘what does the term cyber mean to young people?’; ‘how do young people perceive

cybercrime?’; and ‘who do you think is most at risk to threats online?’

2. Methods

Three focus groups were conducted with undergraduate students from one university in

England. 16 participants (7 males and 9 females) aged between 18 - 21 years of age took part

in the focus groups. Students were offered an incentive to participate in the study via the

award of course credits for their participation where appropriate. Focus groups consisted of

three mixed-sex focus groups of between four and seven participants.

Focus group questions were developed through a review of the literature in addition to

consultations with specialist police officers in the area of cybercrime. They covered topics.

such as how individuals defined the concept of ‘cyber’ and cybercrime, who they thought

was most at risk from cybercrime, where they get there information about cybercrime and

cybersecurity from Each focus group lasted between approximately 40 minutes in duration

and was recorded on a Dictaphone and a digital camcorder. The recordings were then

transcribed verbatim.

6
Data were analysed using inductive thematic analysis, following the steps outlined by Braun

and Clarke (2006) which include: familiarisation with the data; generation of initial codes;

searching for and creating themes; reviewing themes; and, refining and naming the themes.

Inductive thematic analysis is data-driven; hence an existing coding framework or the

researcher’s preconceptions did not restrict the development of themes.

Pseudonyms have been utilised in order to protect the anonymity of the participants.

Following university ethical approval, detailed information sheets were provided to

participants outlining their right to withdraw and informed consent. After the focus group,

participants were provided with a debrief sheet and invited to ask any questions they had

before leaving.

3. Results

The analysis of the transcripts revealed a number of key themes. The first one was the

physical world versus the real world, and details various perceptions that participants viewed

the crimes conducted online as being very distinct and different to those occurring offline. A

related subtheme, lack of confidence in the police to tackle cybercrime, includes the

perception that the police lack the relevant technical skills and are disinterested in

cybercrime. The second main theme that is presented here is that of an awareness of online

risks, in which participants explore the key risks they perceive online. Aligned with this is the

subtheme of perceived safety through app use, outlining a preconception on the behalf of

some participants that interactions conducted through smartphone-based applications were

safer and offered more protection. The final theme is that of victim blaming and the

perceptions of victimisation of cybercrime, in which participants explore the notion that

7
victims of cybercrime are in some way at fault. This latter theme also includes a discussion

related to who the participants felt were most at risk of becoming victims of cybercrime.

3.1 The physical world versus the virtual world

A common theme throughout the focus groups was the view that cyberspace as being

separate from the physical world. For example, one participant presents the view that the

online environment is:

A virtual reality, like it’s not exactly physical but parts of it are and it branches out.

(Jack, FG1)

Similarly, Mona makes reference to the fact that the term ‘cyber’ conjures up the notion of:

Cyber Men ((laugh)) yeah (.) and things that aren’t really like real technology that’s

advanced beyond the years. (Mona, FG2)

This view that concepts associated with the terminology of cyber as ‘things that aren’t really

like real’ was prominent throughout the focus groups. The reference to ‘Cyber Men’ also

serves to reiterate the public’s reliance on social science fiction (Wall, 2008b) as a source of

information, particularly in understanding unfamiliar language such as the term ‘cyber’

(Penfold-Mounce, Beer & Burrows, 2011). It demonstrates the belief that for many, the

cyber-world represents a distinct and non-physical environment to that of the ‘real world’.

The perception of the cyber-environment as not being real may in turn result in individuals

treating the threat of risk from such as limited or less serious to the risks in the offline world.

8
Participants also drew on their knowledge of traditional crime to anchor their understandings

of cybercrime. Mona outlines her belief that the online environment could be used as a

potential training mechanism for criminals to practice before engaging in a physical crime:

I think as well for like other types of crime like you can use it as like a practice

simulator kind of thing, so if you’re going to break into a bank (.) I know people don’t

really do that anymore ((laughing)) but like to do that you could like make a game

where you’ve got to try and get into a bank. (Mona, FG2)

Cyberspace is viewed as a ‘practice simulator’, but there is no real acknowledgement of the

risk posed by cyber-dependent crimes. The participant appears to believe that in order to

perpetrate a crime, the actual crime still has to be physically conducted and is only simulated

in the online environment. The participant also notes that, ‘people don’t really do that

anymore’, in reference to physically robbing a bank, suggesting that crimes of this nature

have shifted totally online.

The distinction between the physical world and cyberspace is more telling in the context of

how participants viewed the concept of their finances. Kelly presents a more focused view of

money in cyberspace against the physical possession of such:

It’s not money is it really? ……. cause it’s connected all I have to do is press okay and

it’s not money you just don’t think of it as money (.) (Kelly, FG3)

Kelly’s first remark is telling, where she states that paying for things online, particularly in

relation to mobile applications, is not really viewed of as money. This belief also links to the

9
ease of excessive spending online, where Kelly states that: ‘all I have to do is press okay and

it’s not money you just don’t think of it as money’..

The key aspect that underpins this theme is the view that cyberspace is viewed as separate

from the physical world. Participants anchor their understanding of cybercrime in their

experience and knowledge of traditional crime, in turn leading to gaps in knowledge and

confusion (Ngo & Paternoster, 2011). Scholars, government, and law enforcement often use

the term ‘cyber’ as a descriptive concept, and it is taken for granted that the general public are

fully aware of what such a term refers to. This theme highlights the potential for confusion,

with many participants viewing the term in the context of social science fiction and virtual

reality (Burrows, 1997; Wall, 2007, 2008a).

3.1.1 Lack of confidence in the Police to tackle cybercrime

Participants also demonstrated a widely held belief that the police are ill-equipped to deal

with the growing threat posed by cybercrime. For example, Xander explains:

Sometimes policing organisations may not be the best people to look at it sometimes

because we’re also catching up because its new. There’s things happening in the

cyberworld and offences taking place or not we’re trying to catch up on it and we’re

trying to say well is that an offence? How do we investigate that? (Xander, FG1)

Xander claims that the police may not be the most effective organisation to deal with

cybercrime, in part due to the newness of such technologies. There is the associated belief

that legislators are slow to react to developments in cybercrime, making the process of

reporting such even more difficult. This is a particularly salient issue and presents a critical

10
area for further exploration. If the public believes that both the police and the legal system are

ineffective when it comes to dealing with aspects of cybercrime, confidence will be lost and

under-reporting will continue.

The notion that cybercrime was not being taken as seriously as crimes which have a clear

‘offline’ element was evident in further extracts from participants:

I think as well especially if you’re reporting to the police, it’s very hot right now only

report emergencies and you feel like ah is this is this a real emergency because it’s not

face-to-face it’s not a physical crime do they class it as a real emergency? (Ellie, FG2)

Or they maybe feel like it’s not real enough for to like nobody’s come and sort of

punched you in the face, it’s over the internet it’s not.(Jo, FG3)

Both of these participants express the belief that because cybercrime is ‘not real enough’, as

it is not physical and does not represent an emergency, it is not taken as seriously as offline,

traditional crimes.

3.2 Awareness of online risks

Participants discussed a variety of situations in which they or people they knew had engaged

in risky or harmful online behaviour. Although this behaviour potentially placed them at

increased risk of becoming a victim of cybercrime, their behaviour was justified for a number

of reasons. Xander discussed the notion that many young people become immersed in the

online digital environment, therefore are often unaware of the risks associated with being

online:

11
I think certainly even though it’s within a lot of young people’s lives I think

interestingly a lot might not be as aware of the actual danger involved in these things

(.) it’s so, so normal as part of their lives to have these things they may not see the risks

associated with each platform that they’re on online so they’re probably more likely to

be at risk from those things. (Xander, FG1)

Greg also highlights what he believes to be the current risks from being online, particularly

when young people are spending a lot of time watching video bloggers:

What they see on these vlogs isn’t always real life cos I think a lot of young people

watch those and think ah yeah this is what we need to do have all these accounts and

everything’s great and it’s all a big happy life and then they feel if they’re not part of

that that’s what can make them vulnerable to a lot of other issues. (Greg, FG1)

Greg indicates that the views and lifestyles that younger children are being exposed to via

online media can make them ‘vulnerable to a lot of other issues’.

Jo also points to the risks of having and sharing information online:

I think everything is a risk [Mike: everything is a risk] you give so much information

about yourself online and Facebook you can like tag your location you can tag where

you’ve been where you’re going who you’re going with. (Jo, FG3)

There is an element of acceptance here that risk is an accepted part of being online, and is the

by-product of activities involving aspects such as social networking.

12
3.2.1 A Perception of safety through app use

A further subtheme emerged, relating to dating sites and applications such as Tinder and

Grindr. Tinder and Grindr are both applications that show users in the nearby locations in

order for users to be able to meet in person (Farnden, Martini & Choo, 2015). It is often the

case that the use of these applications appears to encourage risky behaviour by presenting an

illusion of safety through the use of an app. Mona demonstrates this point:

I think as well the apps kind of make you feel safer about it (.) I know I’ve met people

off those kind of apps and just kind of like wandered into their house because well…

yeah they were nice. (Mona FG2)

Mona appears to negate the potential risks of meeting a complete stranger and visiting their

home as the interaction is mediated through the use of an app. This behaviour is justified

through the feeling of safety the mobile application creates: ‘I think as well the apps make

you feel safer about it’.

However, other participants were aware of the potential risks of meeting individuals that they

have only conversed with online. For example, Tilly recounts the experience of a friend:

‘My friend met somebody on tinder and like he was proper forward and we’ll book a

hotel room and whatever I was like she was like completely up for it and I was like NO

do not do not …….. she’s in that mindset she uses it all the time and all of her friends at

uni do she didn’t think twice about…..’. (Tilly, FG3).

13
Tilly’s friend is unaware of the potential risks such a meeting poses. The willingness to

engage in the action of meeting a potential stranger in a hotel room appears to be governed by

accepted social norms, with Tilly describing the impression that ‘all of her friends at uni’ do

it, so it was perceived to be safe.

3.3 Victim blaming and the perceptions of victimisation for cybercrime.

A further element that came through was the prevalence of victim blaming in the context of

cybercrime. For example, Greg stated:

There’s also a lot of victim blaming (.) and self-blame sometimes they think you know

they don’t want to report it because they think they might have done something wrong

…… they think maybe I’ve done something wrong and they feel like if I report it they

might blame me so there’s kind of reluctance-y to go and get that reported cause they

don’t know where they stand with the law. (Greg, FG1)

Greg suggests that aspects of victim blaming and self-blaming are commonplace. Alongside

this is the assertion that a lack of understanding of the law has a role to play in the under-

reporting of cybercrimes, particularly in terms of ‘they don’t know where they stand with the

law’.

A variety of perspectives were presented as to why individuals become victims in the first

instance. For example, Jack states that the older generation, who have had limited exposure to

digital technology, are more vulnerable to being victims of cybercrimes due to being less

technically savvy:

14
[I] think it does come down to awareness and (.) teaching people especially the older

generation that haven’t had it growing up with them and might not know about these

kind of scams and stuff and what can happen and don’t quite realise that the whole

cyberspace is quite open. (Jack, FG1)

Other participants used the term ‘vulnerable’ but failed to follow this up with a clear

description of who they thought fell into this grouping. One participant mentioned that ‘the

older people that get targeted by spam emails and stuff…’ (Jo, FG3).

Victim blaming also resurfaced, with many participants referring to potential deficiencies in

the knowledge or general awareness of victims. These aspects are displayed in the following

extracts. For example:

I think it just all comes down to the naivety of it and the comfort and how big the

cyberworld is. (Jack, FG1)

I think it’s more of a thing where they don’t think it’ll happen to them so they’re naïve

as to the fact yeah it’s out there and other people can be victims but it won’t happen to

me. (Greg, FG1)

“so that they get the gullible people in order to like continue the process” (Jo, FG3)

“yeah and they find out who’s who’s sort of the weakest and then people do just fall in

love with the concept they’re like ah someone’s always there to talk to me” (Kelly,

FG3)

15
Concepts such as gullibility, weakness, and naivety are all mentioned in the context of

cybercrime victimisation. For many of the participants, the potential to become a victim of

cybercrime was the result of an individuals’ failure to exercise self-awareness about the

potential risks of being online.

4. Discussion

This article explored a number of key aspects related to the perceptions and attitudes towards

cybercrime in a group of undergraduate students in England via qualitative research

consisting of focus groups. Themes which were explored included: the physical world versus

the virtual world; confusion regarding the law (including a perceived lack of police interest in

responding to cybercrime); the normalisation of risky or harmful online behaviour and; their

perceptions of victimisation.

4.1 Defining and Understanding Cybercrime – ‘Cyber men’ and ‘Virtual Reality’.

Many of the participants drew on aspects and ideas from science fiction to shape their

understanding of the term ‘cyber’. References made to concepts such as ‘cyber men’ and

‘virtual reality’ illustrate that the participants placed a heavy reliance on science fiction in

order to frame an understanding of concepts associated with the term ‘cyber’. This tendency

has been noted in previous research, particularly when individuals come into contact with

terms they find unfamiliar (Penfold-Mounce, Beer, & Burrows, 2011). Reliance on concepts

that are rooted in fiction rather than reality demonstrates one of the key issues that policy

makers and law enforcement have to overcome when addressing critical points about cyber-

safety.

Participants also viewed concepts associated with the word ‘cyber’ as being on a distinct and

different level to physical constructs in the ‘offline world’. This relationship between

16
‘cyber’ / ‘things that aren’t really real’, and the ‘offline’ ‘physical world’ demonstrates an

additional gap in the language that is being used by official sources and the public

understanding of such concepts (Wall, 2008a, b). This is further exacerbated by confusion

regarding the nature of cyberspace, and whether it can be viewed as a further extension of the

physical environment or acts as one that is separate and distinct (Yar, 2005). If this confusion

exists alongside the belief that the cyber domain lacks physicality, there is a risk that aspects

of cybercrime are viewed as less serious. This may result in individuals having a more

relaxed attitude towards their online safety and security, thus increasing their potential

susceptibility to cybercrime.

Many participants also used concepts taken from aspects of traditional crime to shape their

understanding of cybercrime, a tendency that has been noted in previous research (Howarth,

2006). In this instance, many participants already have existing and well-established

knowledge or perceptions of the aspects of traditional crime, and so they anchor their

understanding of the newer concept of cybercrime within this framework (Moscovici, 1988).

For many individuals, there is a failure to recognise that many cybercrimes can be carried out

only through the use of the Internet and digital technology, with existing preconceptions often

leading to the bias that for a ‘crime’ to occur there needs to be an aspect of physical

interaction.

4.2 The Police are Ill Equipped to deal with Cybercrime

Many of the participants in this study expressed the view that the police were ill-equipped to

deal with cybercrime. The most frequently presented reason for this was the belief that the

police are in a constant state of ‘catch-up’ as newer and more sophisticated forms of

cybercrime emerge. This resonates with research conducted by Hadlington (2017) who found

that many employees held the opinion that police lack the capacity to deal with cybercrime

17
effectively. Similarly, Wall (2007) points to the long history of members of law enforcement

voicing their concern about a lack of facilities which would enable them to keep track of

newer offences. Wall also noted that there are a number of institutional barriers to the

adoption of newer practices and technology, in particular the deep conservatism that govern

their operations. It is therefore no surprise that the public perception of the police as being

unable to respond in an agile and effective way to new threats, such as cybercrime, is

common-place. One of the consequences for such beliefs is that many individuals fail to

report such crimes believing that the police lack the capacity to deal with them (Wall, 2007).

4.3 Victimisation and Cybercrime

In focus groups, discussion of who is most likely to be a victim of cybercrime relayed

commonly held stereotypes. The often presented notion of a digital divided between ‘digital

natives’ (who have never known a world without the Internet) and ‘digital immigrants’ (who

have adopted digital technology later on in life) is often widely viewed as a reason for such

differences in susceptibility to cybercrimes (Prensky, 2007). However, such a perspective

may serve to create an illusion of safety for the younger generation who believe that they

have the required expertise in aspects of digital literacy, and are therefore less likely to be

targeted by cybercriminals. It has conversely been shown that it is more frequent Internet

users who are more likely to become victims of cybercrime (Riek, Bohmo, & Moore). The

recent data from both Experian (2017) and Cifas (2017) on online fraud and identify theft

also point towards a rise in attacks perpetrated against younger adults, suggesting that more

preventative work needs to be done. All of the participants in the present study belonged to

this age group, but did not recognise that they are at high risk of online victimisation. Instead,

they chose to direct higher risk of victimisation towards the very young and the elderly.

18
Participants also discussed the concept of victim blaming. The concept of victim blaming has

been noted as a common aspect in all crimes, but it appears that there is a significantly more

victim blaming in the case of cybercrimes (Cross, 2015). For some participants, fears related

to being unfamiliar with specific laws governing their activities online led them to believe

that they might be blamed for falling foul to cybercrime. Other participants assumed that

victims of cybercrime were ill equipped to deal with the activities they were engaged in

online, and were gullible, silly, weak, and naïve.

5. Conclusion

It is evident that communicating the potential risks to the public, including the younger

generations at risk of online victimisation, about the risks from online crime, is fraught with

difficulties. There appears to be a mismatch between the advice and information that is being

sent out by government and law enforcement and individual awareness of the seriousness of

online crime. It is acknowledged that this is a small-scale study, however the results provide

an important insight into the contextual factors shaping young people’s views of cybercrime.

As noted, this particular group is at high risk of online victimisation (including online fraud

and theft), but the participants overlooked this fact due to their assumption that as ‘digital

natives’ they were sufficiently technologically-savvy and aware of the risks of online

engagement. The results demonstrate that these participants tended to embed their

understandings of cyber-related concepts in popular science fiction. They also express

notions of cybercrime being taken less seriously by the authorities, in contrast to traditional

aspects of crime which were viewed as occurring in the physical/offline world.

19
References

Acquisti, A. (2004). Privacy and security of personal information. Economics of Information

Security, 179-186.

Alberts, A., Elkind, D., & Ginsberg, S. (2006). The personal fable and risk-taking in early

adolescence. Journal of Youth And Adolescence, 36(1), 71-76.

http://dx.doi.org/10.1007/s10964-006-9144-4

Anti-Cyber Bullying Legislative Matters in the UK. (2017). Nobullying.com. Retrieved 23

March 2017, from https://nobullying.com/anti-cyber-bullying-legislative-matters-in-the-

uk/

Baumgartner, S. E., Valkenburg, P. M., & Peter, J. (2010). Assessing causality in the

relationship between adolescents’ risky sexual online behavior and their perceptions of

this behavior. Journal of youth and adolescence, 39(10), 1226-1239.

Bougaardt, G., & Kyobe, M. (2011). Investigating the factors inhibiting SMEs from

recognizing and measuring losses from cyber crime in South Africa. The Electronic

Journal Information Systems Evaluation, 14(2), 167-178.

Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research

in Psychology, 3, 77-101.

British Psychological Society. (2006). Code of ethics and conduct. BPS.

Broadhurst, R. (2006). Developments in the global law enforcement of cyber‐crime. Policing:

An International Journal of Police Strategies & Management, 29(3), 408-433.

http://dx.doi.org/10.1108/13639510610684674

Burrows, R. (1997). Virtual culture, urban polarisation and social science fiction. In B.

Loader (ed.), The Governance of Cyberspace: Politics, Technology and Global

Restructuring (1st ed., pp. 38-45). London: Routledge.

20
Butavicius, M., Parsons, K., Pattinson, M., & McCormac, A. (2016). Breaching the human

firewall: Social engineering in phishing and spear-phishing Emails. arXiv preprint

arXiv:1606.00887.

Chawki, M. (2005). A critical look at the regulation of cybercrime. Journal of Cyberlaw,

4(4).

Choi, K. (2008). Computer crime victimization and integrated theory: An empirical

assessment. International Journal of Cyber Criminology, 2(1), 308-333.

Cialdini, R., & Trost, M. (1998). Social influence: Social norms, conformity and compliance.

In D. Gilbert, S. Fiske & L. Gardner (eds.), The handbook of social psychology (4th

ed., pp. 151-192). New York: McGraw-Hill.

Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International

Review of Victimology, 21(2), 187-204.

Cyber Aware. (2017). Cyberaware.gov.uk. Retrieved 23 March 2017, from

https://cyberaware.gov.uk/passwords

DiCicco‐Bloom, B., & Crabtree, B. F. (2006). The qualitative research interview. Medical

education, 40(4), 314-321.

DiMaggio, P., & Hargittai, E. (2001). From the ‘digital divide’ to ‘digital inequality’:

Studying internet use as penetration increases. Princeton: Center for Arts and Cultural

Policy Studies, Woodrow Wilson School, Princeton University, 4(1), 4-27.

Egelman, S., Harbach, M., & Peer, E. (2016, May). Behavior ever follows intention?: A

validation of the security behavior intentions scale (SeBIS). In Proceedings of the

2016 CHI Conference on Human Factors in Computing Systems (pp. 5257-5261).

ACM

Farnden, J., Martini, B., & Choo, K. K. R. (2015). Privacy risks in mobile dating apps. arXiv

preprint arXiv:1505.02906.

21
Ferdinando, L. (2016). Cybersecurity: How Safe are we as a Nation (Masters Thesis). George

Town University.

Friemel, T. N. (2016). The digital divide has grown old: Determinants of a digital divide

among seniors. New Media & Society, 18(2), 313-331.

Furnell, S., & Moore, L. (2014). Security literacy: The missing link in today's online society?

Computer Fraud & Security, 2014(5), 12-18.

http://dx.doi.org/http://dx.doi.org/10.1016/S1361-3723(14)70491-9

Gibbs, J., Ellison, N., & Lai, C. (2011). First comes love, then comes Google: An

investigation of uncertainty reduction strategies and self-disclosure in online dating.

Communication Research, 38(1), 70-100. http://dx.doi.org/10.1177/0093650210377091

Gill, P., Stewart, K., Treasure, E., & Chadwick, B. (2008). Methods of data collection in

qualitative research: Interviews and focus groups. British Dental Journal, 204(6), 291-

295.

Gordijn, E., Wigboldus, D., & Yzerbyt, V. (2001). Emotional consequences of categorizing

victims of negative outgroup behavior as ingroup or outgroup. Group Processes &

Intergroup Relations, 4(4), 317-326. http://dx.doi.org/10.1177/1368430201004004002

Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in

Computer Virology, 2(1), 13-20. http://dx.doi.org/10.1007/s11416-006-0015-z

Gottschalk, P. (2010). Policing Cyber Crime. Bookboon.

Guest, G., Namey, E., & McKenna, K. (2017). How many focus groups are enough? Building

an evidence base for nonprobability sample sizes. Field Methods, 29(1), 3-22.

Happ, C., Melzer, A., & Steffgen, G. (2016). Trick with treat–reciprocity increases the

willingness to communicate personal data. Computers in Human Behavior, 61, 372-377.

Hargittai, E., & Hinnant, A. (2008). Digital inequality differences in young adults' use of the

Internet. Communication Research, 35(5), 602-621.

22
Hasan, S., Rahman, R., Abdillah, S., & Omar, N. (2015). Perception and awareness of young

internet users towards cybercrime: Evidence from Malaysia. Journal of Social Sciences,

11(4), 395-404.

Home Office. (2010). Cyber Crime Strategy. Home Office.

Hosseinmardi, H., Rafiq, R. I., Li, S., Yang, Z., Han, R., Mishra, S., & Lv, Q. (2014). A

comparison of common users across Instagram and Ask.fm to better understand

cyberbullying. arXiv preprint arXiv:1408.4882.

Howarth, C. (2006). A social representation is not a quiet thing: Exploring the critical

potential of social representations theory. British Journal of Social Psychology, 45(1),

65-86. http://dx.doi.org/10.1348/014466605x43777

Janoff-Bulman, R., Timko, C., & Carli, L. (1985). Cognitive biases in blaming the victim.

Journal of Experimental Social Psychology, 21(2), 161-177.

http://dx.doi.org/10.1016/0022-1031(85)90013-7

Jefferson, G. (2004). Glossary of transcript symbols with an introduction. In G. H. Lerner

(ed.), Conversation Analysis: Studies from the First Generation. (pp: 13-31).

Amsterdam: John Benjamins.

Joiner, R., Gavin, J., Brosnan, M., Cromby, J., Gregory, H., & Guiller, J. et al. (2013).

Comparing first and second generation digital natives' internet use, internet anxiety, and

internet identification. Cyberpsychology, Behavior, And Social Networking, 16(7), 549-

552. http://dx.doi.org/10.1089/cyber.2012.0526

Kitzinger, J. (1995). Qualitative research. Introducing focus groups. BMJ: British Medical

Journal, 311(7000), 299.

Liau, A., Khoo, A., & Hwaang, P. (2005). Factors influencing adolescents engagement in

risky internet behavior. Cyberpsychology & Behavior, 8(6), 513-520.

http://dx.doi.org/10.1089/cpb.2005.8.513

23
McQuade, S. C. (2007). We must educate young people about cybercrime before they start

college. Chronicle of Higher Education, 53(18), B29-B31.

Miller, C., & Bartlett, J. (2012). ‘Digital fluency’: Towards young people's critical use of the

internet. Journal of Information Literacy, 6(2). http://dx.doi.org/10.11645/6.2.1714

Miller, D. T., & Ross, M. (1975). Self-serving biases in the attribution of causality: Fact or

fiction. Psychological bulletin, 82(2), 213-225.

Mittu, R., & Lawless, W. F. (2015, March). Human factors in cybersecurity and the role for

ai. In 2015 AAAI Spring Symposium Series.

Miura, A., & Yamashita, K. (2007). Psychological and social influences on blog writing: An

online survey of blog authors in Japan. Journal of Computer-Mediated Communication,

12(4), 1452-1471. http://dx.doi.org/10.1111/j.1083-6101.2007.00381.x

Morgan, D. L. (1997). The Focus Group Guidebook (Vol. 1). London: Sage.

Moscovici, S. (1988). Notes towards a description of social representations. European

Journal of Social Psychology, 18(3), 211-250.

http://dx.doi.org/10.1002/ejsp.2420180303

National Crime Agency. (2016). Cyber Crime Assessment 2016. NCA Strategic Cyber

Industry Group.

National Cyber Security Strategy. (2016). National Cyber Security Strategy. UK

Government.

Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual

and situational level factors. International Journal of Cyber Criminology, 5(1), 773.

Norton. (2017). Uk.norton.com. Retrieved 23 March 2017, from

https://uk.norton.com/dangers-of-public-wifi/promo

24
Oksanen, A., & Keipi, T. (2013). Young people as victims of crime on the internet: A

population-based study in Finland. Vulnerable Children and Youth Studies, 8(4), 298-

309. http://dx.doi.org/10.1080/17450128.2012.752119

Penfold-Mounce, R., Beer, D., & Burrows, R. (2011). The Wire as social science-fiction?

Sociology, 45(1), 152-167. http://dx.doi.org/10.1177/0038038510387199

Pereira, F., Spitzberg, B. H., & Matos, M. (2016). Cyber-harassment victimization in

Portugal: Prevalence, fear and help-seeking among adolescents. Computers in Human

Behavior, 62, 136-146.

Riek, M., Bohme, R., & Moore, T. (2016). Measuring the influence of perceived cybercrime

risk on online service avoidance. IEEE Transactions on Dependable and Secure

Computing, 13(2), 261-273.

Vaismoradi, M., Jones, J., Turunen, H., & Snelgrove, S. (2016). Theme development in

qualitative content analysis and thematic analysis. Journal of Nursing Education and

Practice, 6(5), 100.

Vaismoradi, M., Turunen, H., & Bondas, T. (2013). Content analysis and thematic analysis:

Implications for conducting a qualitative descriptive study. Nursing & Health

Sciences, 15(3), 398-405.

Wall, D. (2008a). Cybercrime, media and insecurity: The shaping of public perceptions of

cybercrime. International Review of Law, Computers & Technology, 22(1-2), 45-63.

http://dx.doi.org/10.1080/13600860801924907

Wall, D. (2007). Cybercrime: The Transformation of Crime in the Information Age (Vol. 4).

Cambridge: Polity.

Wall, D. (2008b). Cybercrime and the Culture of Fear. Information, Communication &

Society, 11(6), 861-884. http://dx.doi.org/10.1080/13691180802007788

25
Wang, S., & Chuan‐Chuan Lin, J. (2011). The effect of social influence on bloggers' usage

intention. Online Information Review, 35(1), 50-65.

http://dx.doi.org/10.1108/14684521111113588

Wiederhold, B. (2014). The role of psychology in enhancing cybersecurity. Cyberpsychology,

Behavior, and Social Networking, 17(3), 131-132.

http://dx.doi.org/10.1089/cyber.2014.1502

Xia, F., Yang, L., Wang, L., & Vinel, A. (2012). Internet of things. International Journal of

Communication Systems, 25(9), 1101-1102. http://dx.doi.org/10.1002/dac.2417

Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity

theory. European Journal of Criminology, 2(4), 407-427.

http://dx.doi.org/10.1177/147737080556056

Yu, S. (2014). Fear of cyber crime among college students in the United States: An

exploratory study. International Journal of Cyber Criminology, 8(1), 36-46.

26

You might also like