scholarly journals Understanding the Expertise Required by Law Enforcement Investigating Cybercrime: An Exploration of Social Engineering Techniques

2021 ◽  
Author(s):  
◽  
Grace Nock

<p>Cybercrime represents a significant threat for the 21st century, a threat that traditional methods of policing cannot adequately manage. Consequently, new ways of policing utilising specialised teams have been implemented to address cybercrime proactively. One method of policing that has been relatively unexplored within academic literature is covert online investigations, wherein law enforcement creates false identities to interact with offenders from. Existing research has not comprehensively explored what tactics, techniques, and procedures law enforcement use when conducting these investigations. Accordingly, selection and training of employees presents unique challenges. Therefore, this study aims to provide a detailed evaluation of what skills are needed by law enforcement. This information can then inform future training and selection. This study examines in-depth semi-structured interviews with eight New Zealand Police investigators using Applied Cognitive Task Analysis. Data was analysed using thematic analysis. Results revealed three themes with 18 sub-themes. The first theme explored operational pre-planning, the second theme explored social engineering techniques used to gather information, and the third theme explored the wide-ranging external considerations. Finally, the discussion outlines the implications for theories of social engineering, applications for law enforcement training and recruitment, and potential future research opportunities within social engineering and police psychology.</p>

2021 ◽  
Author(s):  
◽  
Grace Nock

<p>Cybercrime represents a significant threat for the 21st century, a threat that traditional methods of policing cannot adequately manage. Consequently, new ways of policing utilising specialised teams have been implemented to address cybercrime proactively. One method of policing that has been relatively unexplored within academic literature is covert online investigations, wherein law enforcement creates false identities to interact with offenders from. Existing research has not comprehensively explored what tactics, techniques, and procedures law enforcement use when conducting these investigations. Accordingly, selection and training of employees presents unique challenges. Therefore, this study aims to provide a detailed evaluation of what skills are needed by law enforcement. This information can then inform future training and selection. This study examines in-depth semi-structured interviews with eight New Zealand Police investigators using Applied Cognitive Task Analysis. Data was analysed using thematic analysis. Results revealed three themes with 18 sub-themes. The first theme explored operational pre-planning, the second theme explored social engineering techniques used to gather information, and the third theme explored the wide-ranging external considerations. Finally, the discussion outlines the implications for theories of social engineering, applications for law enforcement training and recruitment, and potential future research opportunities within social engineering and police psychology.</p>


2020 ◽  
Vol 35 (4) ◽  
pp. 221-233 ◽  
Author(s):  
Kirsten S. Railey ◽  
Abigail M. A. Love ◽  
Jonathan M. Campbell

Although research confirms the effectiveness of training to improve law enforcement officers’ (LEOs) awareness and knowledge of people with intellectual disability and learning disabilities, review of the efficacy of autism-specific law enforcement training is needed. To provide up-to-date information regarding training for LEOs related to autism spectrum disorder (ASD), a systematic review of the literature was conducted. Adhering to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses for Protocols (PRISMA), we conducted a search of 13 professional databases and 28 journals using search terms related to both ASD and law enforcement training. From 606 articles identified during the initial search, only two articles met inclusion criteria, which suggests that limited research exists that explores ASD and law enforcement training. Included studies were summarized in terms of participants as well as training format, content, and outcomes. Limitations of the current literature, directions for future research, and current implications for practice are discussed.


1989 ◽  
Vol 33 (19) ◽  
pp. 1348-1352 ◽  
Author(s):  
Richard E. Redding

This study presents a critical analysis of the state of current technologies, methods, and tools used in cognitive task-analysis. Methods for cognitive task-analysis, derived from methods used in cognitive science, are relatively new and have not been systematized. Current methodologies demand considerable time and expertise to conduct properly and often yield data which is difficult to readily translate into practical application. This paper examines these problems and proposes some directions for future research and training program development.


2010 ◽  
Vol 09 (04) ◽  
pp. 329-339 ◽  
Author(s):  
Stefania Mariano

This paper investigates the impact of blogging on knowledge processes and proposes a way to manage collective knowledge. Qualitative methods are used to collect data through individual semi-structured interviews, think-aloud protocols, focus groups, and document analysis. Data analysis is pursued with the use of the qualitative software package Atlas.ti®. This qualitative research contributes to our understanding of how a self-organised group of individuals involved in a temporary joint project in the Kingdom of Bahrain creates, transfers, retains and shares knowledge in a blog and provides insights into the knowledge management processes. It reveals the impact of blogging on knowledge management and examines issues concerned with the individual, the groups, and the organisation. It also suggests strategies on how to improve the management of an effective blog. Findings contribute to the debate on knowledge management processes and provide insights for academics and practitioners who are interested in a new theoretical approach connecting individual knowledge to collective knowledge, as well as to those studying online repositories and new information technology tools for the management of organisational knowledge. Future research should be conducted on how blogs may impact the effectiveness of organisational communication. Empirical research should also be conducted to explain how internal and external bloggers contribute to the development of organisational expertise.


Author(s):  
Soraya Gigentika ◽  
Tri Wiji Nurani ◽  
Sugeng Hari Wisudo ◽  
John Haluan

<div class="WordSection1"><p align="center"><strong><em>ABSTRACT</em></strong></p><p><em>Competition of tuna utilization in Nusa Tenggara has resulted in the inclining toward irresponsible utilization</em><em>,</em><em> which causes various issuess of tuna utilization system in Nusa Tenggara. The objectives of this research </em><em>are</em><em> to identif</em><em>y</em><em> the issues of tuna utilization system in Nusa Tenggara and the root of  issues. Analysis data used three steps of Soft System Methodology (SSM), there were understanding</em><em> of</em><em> the issues situation, establish</em><em>ed</em><em> issues situation, and establish the issues definition. The results showed the issues in tuna utilization system  in Nusa Tenggara are illegal installation of FADs; the depleted productivity of tuna fishing unit; inefficient fishing capacity utilization and over-input production input on tuna fishing units, fishermen catch baby tuna (undersized tuna), in</em><em> </em><em>optimal quality of landed tuna and conflicts related to FADs utilization. </em><em> </em><em>The solution that can be performed for these problems are</em><em>:</em><em> 1) Strict and effective law enforcement for illegal FADs and ideal allocated number of FAD's; 2) determining of optimum allocation number for tuna fishing unit (effort) and the right time for close session; 3) determining the size of the ship which is efficient and determining the optimum amount of effort;</em><em> 4) Establishing the regulations related to baby tuna fishing, developing the fishing technology which minimizes the catch of baby tuna and controlling the season and the location of the tuna fishing activities; 5) facilitating and training the fishermen and tuna fishing companies or trader for cold-chain handling; and 6) strict and effective law enforcement for fishermen trespassing the fishing area.</em><em></em></p><p class="TubuhTulisanAll"><strong><em>Keywords:</em></strong><strong><em> </em></strong><em>Nusa Tenggara, root definition, tuna utilization system, Soft System Methodology</em><em></em></p><p align="center"><strong>ABSTRAK</strong></p><p class="Abstrakisi">Persaingan dalam pemanfaatan ikan tuna di Nusa Tenggara mengakibatkan kegiatan pemanfaatan tersebut menjadi cenderung ke arah yang tidak bertanggungjawab, sehingga muncul berbagai permasalahan pada sistem pemanfaatan ikan tuna. Tujuan dari penelitian ini adalah mengidentifikasi permasalahan  sistem pemanfaatan ikan tuna di Nusa Tenggara dan upaya yang diperlukan untuk menyelesaikan permasalahan tersebut. Analisis data pada penelitian ini menggunakan tiga tahapan <em>Soft System Methodology</em> (SSM), yaitu memahami situasi permasalahan, menyusun situasi permasalahan, dan menyusun definisi permasalahan. Hasil penelitian menunjukkan bahwa permasalahan pada sistem pemanfaatan ikan tuna di Nusa Tenggara adalah pemasangan rumpon tanpa ijin, penurunan produktivitas unit penangkapan ikan tuna, belum efisiennya pemanfaatan kapasitas dan berlebihnya <em>input</em> produksi pada unit penangkapan ikan tuna, penangkapan <em>baby tuna</em>, belum optimalnya mutu ikan tuna yang didaratkan, serta adanya konflik penggunaan rumpon. Upaya penyelesaian yang dapat dilakukan untuk permasalahan-permasalahan tersebut adalah: 1) penegakkan hukum yang tegas dan efektif untuk rumpon yang tidak berijin serta penentuan alokasi jumlah rumpon yang ideal; 2) penentuan alokasi jumlah <em>effort </em>optimum untuk unit penangkapan ikan tuna dan waktu yang tepat untuk <em>close session</em>; 3) penentuan ukuran kapal yang efisien dan jumlah <em>effort</em> yang optimal; 4) pembuatan regulasi terkait penangkapan <em>baby tuna</em>, pengembangan teknologi penangkapan yang meminimalkan hasil tangkapan<em> baby tuna</em>, serta pengaturan musim dan lokasi penangkapan ikan tuna; 5) penyediaan fasilitas serta pelatihan kepada nelayan dan perusahaan perikanan tuna atau pengumpul ikan tuna untuk penanganan rantai dingin; serta 6) penegakkan hukum yang tegas dan efektif untuk nelayan yang melanggar jalur penangkapan ikan.</p><p class="TubuhTulisanAll" align="left"><strong>Kata kunci:</strong>  Nusa Tenggara, <em>root definition</em>, sistem pemanfaatan ikan  tuna, <em>Soft System Methodology</em></p></div>


2019 ◽  
Author(s):  
Enzo Yaksic ◽  
Clare Allely ◽  
Raneesha De Silva ◽  
Melissa Smith-Inglis ◽  
Daniel Konikoff ◽  
...  

Objectives: The likelihood that serial murderers are responsible for most unresolved homicides and missing persons was examined by investigating the accounting of the phenomenon in the context of a declining prevalence. Methods: A mixed methods approach was used, consisting of a review of a sample of unresolved homicides, a comparative analysis of the frequency of known serial homicide series and unresolved serial homicide series, and semi-structured interviews of experts.Results: The past decade contained almost half the cases (13%) that existed at the 1980s peak of serial homicide (27%). Only 282 (1.3%) strangled females made up the 22,444 unresolved homicides reviewed. Most expert respondents thought it unreasonable that any meaningful proportion of missing persons cases are victims of serial homicide. Conclusions: Technology, shifts in offending behavior, proactive law enforcement action, and vigilance of society have transformed serial killing and aids in viewing offenders as people impacted by societal shifts and cultural norms. The absence of narrative details inhibited some aspects of the review. An exhaustive list of known unresolved serial homicide series remained elusive as some missing persons are never reported. Future research should incorporate those intending to murder serially, but whose efforts were stalled by arrest, imprisonment, or death.


Author(s):  
Navin Sewberath Misser ◽  
◽  
Joris Jaspers ◽  
Bas van Zaane ◽  
Hein Gooszen ◽  
...  

Digitization of activities in hospitals receives more attention, due to Covid-19 related regulations. The use of ehealth to support patient care is increasing and efficient ways to implement digitization of processes and other technological equipment are needed. We constructed a protocol for implementation and in this study, we evaluate this protocol based on a case to implement a device in the OR. We used various data sources to evaluate this protocol: semi-structured interviews, questionnaires, and project documents. Based on these findings, this protocol, including identified implementation activities and implementation instructions can be used for implementations of other devices. Implementation activities include setting up a project plan, organizational and technological preparation, maintenance, and training. In future research, these activities and instructions need to be evaluated in more complex projects and a flexible tool needs to be developed to select relevant activities and instructions for implementations of information systems or devices.


Sign in / Sign up

Export Citation Format

Share Document