Vulnerability to Internet Crime and Gender Issues

Author(s):  
Tejaswini Herath ◽  
S. Bagchi-Sen ◽  
H. R. Rao

A tremendous growth in the use of the Internet has been observed in the past two decades. More than 75% of Americans participate in online activities (University of Southern California Annenberg School Center for the Digital Future, 2004) such as e-mail, Web browsing, working from home, accessing news stories, seeking information, instant messaging, using the Internet in lieu of the library for school work, playing games, and managing personal finance. For professionals, the Internet is an important medium for networking and building social capital. However, along with all positive impacts, there are also negative outcomes. One such negative outcome includes Internet crimes. Dowland, Furnell, Illingworth, and Reynolds (1999) state that “with society’s widespread use of and, in some cases, reliance upon technology, significant opportunities now exist for both mischievous and malicious abuse via IT systems” (p. 715). Internet crimes (cyber crimes) consist of specific crimes dealing with computers and networks (such as hacking, spreading of viruses, and worms) and the facilitation of traditional crime through the use of computers on the Internet (such as child pornography, hate crimes, telemarketing/Internet fraud). This article focuses on Internet crimes, especially those affecting individual users, and offers a discussion of issues regarding Internet crimes and gender.

2020 ◽  
Vol 3 (2) ◽  
pp. 342-350
Author(s):  
Suparna Parwodiwiyono

Abstrak: Bagi generasi pasca milenial penggunaan internet sangat akrab tetapi dengan berbagai tujuan penggunaan. Penelitian ini ingin melihat keterkaitan penggunaan internet oleh penduduk yang sedang sekolah untuk kepentingan penyelesaian tugas sekolah di Indonesia untuk mendapatkan hasil belajar yang baik. Analisis berdasarkan data sekunder dari Survei Sosial Ekonomi Nasional tahun 2018. Hanya saja data yang didapatkan tidak simetris dengan adanya pencilan. Regresi kuantil digunakan untuk meminimumkan pengaruh dari pencilan yang ada. Penelitian mendapatkan hasil bahwa terdapat kaitan yang erat antara akses internet dari penduduk yang sedang sekolah dengan penyelesaian tugas sekolah.  Hasil regresi kuantil menunjukkan bahwa proporsi akses internet untuk penyelesaian tugas sekolah berbeda antar golongan proporsi penggunaan internet. Proporsi penggunaan internet yang tinggi akan digunakan untuk penyelesaian tugas sekolah yang lebih tinggi pula. Abstract: For the post millennial generation the use of the internet is very familiar but with various purposes of use. This study wants to look at the relationship between the use of the internet by residents who are currently in school for the sake of completing school work in Indonesia to get good learning outcomes. Analysis based on secondary data from the 2018 National Socio-Economic Survey. It's just that the data obtained is not symmetrical with outliers. Quantile regression is used to minimize the effect of outliers. The study found that there was a close relationship between internet access from residents who were in school and completion of school work. The quantile regression results show that the proportion of internet access for completing school work differs between groups of proportions of internet use. A high proportion of internet use will be used for completing higher school work.


Cyber Crime ◽  
2013 ◽  
pp. 1-13
Author(s):  
Tejaswini Herath ◽  
H. Raghav Rao ◽  
Shambhu Upadhyaya

It is estimated that over 1 billion people now have access to the Internet. This unprecedented access and use of Internet by individuals around the world, however, is accompanied by malicious and mischievous activities online. With the traditional crimes such as fraud, identity theft, and harassment now being committed with the use of the Internet, and networked home computers being exploited to carry out attacks such as denial of service, spamming, phishing and virus/worm propagation, it has become important to investigate security and privacy issues as they pertain to individual Internet users. To date very little is known about what characteristics of internet users affect their computing and on-line behaviors as they relate to security online. While some attention has been paid to understand the security issues affecting corporations, research investigating security issues as they relate to home users is still in infancy. Drawing from disciplines such as criminology, sociology, consumer fraud, and information security, this study seeks to find the role of computing skills and computer training, social influence, and gender on person’s vulnerability to Internet crimes. Our findings are significant and shed light in this important area of Internet crime contributing to the information security literature.


Author(s):  
Amin Ibrahim

The sexual exploitation of children remains a very serious problem and is rapidly increasing globally through the use of the Internet. This chapter focuses on the child pornography and IT, and the various methods to combat this problem. The ease of acquiring IT and digital equipments, the global reach of Internet and freely available peer-to-peer services have made child pornography a very complex issue to undertake. The borderless nature of the Internet and the lack of unified criminal code among nations further escalated the complexity of law enforcement against child pornography.


Author(s):  
Tejaswini Herath

It is estimated that over 1 billion people now have access to the Internet. This unprecedented access and use of Internet by individuals around the world, however, is accompanied by malicious and mischievous activities online. With the traditional crimes such as fraud, identity theft, and harassment now being committed with the use of the Internet, and networked home computers being exploited to carry out attacks such as denial of service, spamming, phishing and virus/worm propagation, it has become important to investigate security and privacy issues as they pertain to individual Internet users. To date very little is known about what characteristics of internet users affect their computing and on-line behaviors as they relate to security online. While some attention has been paid to understand the security issues affecting corporations, research investigating security issues as they relate to home users is still in infancy. Drawing from disciplines such as criminology, sociology, consumer fraud, and information security, this study seeks to find the role of computing skills and computer training, social influence, and gender on person’s vulnerability to Internet crimes. Our findings are significant and shed light in this important area of Internet crime contributing to the information security literature.


Author(s):  
Kai Zheng ◽  
Akhilesh Bajaj ◽  
Beth Osborne Daponte ◽  
John B. Engberg

How people use the Internet is an intriguing question to researchers, computer educators, Internet content providers (ICPs), and marketing practitioners. With the expansion of online information resources and the improvement of connection bandwidth, Internet users have been offered more and more choices, at the same time, faced with more and more dilemmas on how to allocate their time and energy online. How much time do people spend on surfing the Internet? What do they do? Are there any traceable patterns to interpret the Internet behavior and to predict future use based on people’s demographic, social, or psychological characteristics? These are all interesting questions that researchers attempt to answer. In 1995, the HomeNet project conducted at the Human Computer Interaction Institute, Carnegie Mellon University, launched a series of field studies to examine the residential Internet behavior. It has found that social demographics—generation, race and gender, rather than socioeconomic factors—income, education—and psychological factors—like social extraversion and attitude toward computing—were major influences on use (Kraut, Scherlis, Mukhopadhyay, Manning, & Kiesler, 1996). Following the HomeNet project’s initial attempt, many empirical studies have been conducted globally to study the Internet behavior and its driving factors. Among these efforts, a noticeable focus is to resolve the long-lasting controversy, inherited from the similar debate of computer behavior studies, on how gender differences influence the way people use the Internet. Many researchers believe that females are less technology-inclined, less motivated, and therefore less competent in the masculine computer and Internet culture; on the other hand, some other researchers argue females have the ability to be proficient in use of the Internet. The present study is thereby conducted to provide more empirical evidence of gender effects on Internet usage and task preferences. In particular, we are interested in examining gender influences when users’ computer proficiency is controlled for. We believe that the results of this study can provide valuable insights into effective online content delivery, targeted marketing strategies, and customized computer education to encourage use. The close examination of people’s actual surfing data can also contribute to a better understanding of how the Internet is actually utilized. The next section describes the debate about how women and men respond in different ways to computers and the Internet. This is followed by a presentation of our study design: the monitoring software, the content classification schema and method, and the user population that we studied. The findings are presented next, followed by concluding remarks.


2016 ◽  
Vol 3 (1) ◽  
pp. 161
Author(s):  
Arifuddin Arifuddin

<div><p>The development of information technology (IT), particularly the internet, has benefited people throughout the world in many fields. Considering the advantages offered by the internet, the da’i (Islamic preachers) may utilize such product of IT advancement for disseminating Islamic messages and knowledge (dakwah). This literature review explores the challenges and opportunities of the internet utilization for such religious purpose, by extracting views and research findings from a range of publications, including books and journal articles from several databases. It found that the internet can be utilized as contemporary media for dakwah endeavor as it has many advantages in terms of efficiency, accessibility, scoping, and openness. Some recent global issues including Islamophobia, extremist activities including Islam-related terrorism, and gender equity are seen as challenges to the contemporary Islam. On one hand, these concerns may challenge the use of the internet for dakwah practice, but on the other hand, such issues has opened opportunities for da’i to remedy the situation through valid views described in many forms of dakwah in the internet, educating mad’u for better understanding of Islam. It is further recommended that da’i in Indonesia can consider the internet as media for da’wah. Further research is essential whether to explore the da’i’ interests and acceptance in the use of internet for dakwah as well as the social impacts of such approach.</p></div><strong>Keywords:</strong>


Author(s):  
Kareena McAloney ◽  
Joanne E. Wilson

Young people can potentially be exposed to sexual material from a variety of sources, both accidentally and purposefully. One such source, the internet, plays host to a vast array of information and imagery, among which sexually explicit material and pornography are in high concentration. Indeed within this virtual catalogue of material it is possible to find both adult and child pornography, particularly if one is aware of the correct methods of accessing such content. This chapter provides an in-depth overview of current knowledge regarding young people’s exposure to and experiences of sexual material and sexual predators online, including those particular aspects of young people’s online interactions that make them vulnerable to receive unwanted sexual material and solicitation. The authors then discuss the use of the Internet for the sexual exploitation of children and young people both in the nature of sexual material to which they are exposed to online including the transmission of images of child pornography and molestation, the processes by which young people access sexual material online, the solicitation of children by sexual predators in targeting young people and how young people in turn come to interact with sexual predators online. Finally they address current mechanisms designed to protect children and young people as they engage in online activities.


Author(s):  
Tanja Carstensen ◽  
Gabriele Winker

Both Internet studies and women’s and gender studies formulated various hopes and fears for the effects of the Internet on gender relations at an early point. Whereas some scholars saw it as a male domain, others pinned hopes for overcoming dichotomous gender constructions to the new technology. The Internet was also seen as an opportunity to network women’s policy activists and to strengthen women’s policy issues from the very beginning. There have, however, been few studies of how women specifically use the Internet to further feminist issues. This article addresses this question of Internet use in women’s policy networks based on an empirical study, which examined the democratizing use of the Internet for German women’s networks. We start off by signifying the importance of the Internet within the developments of the women’s movement and giving an overview of the existing research findings. We then analyze the use of the Internet within women’s policy networks, using the three dimensions “information”, “interaction,” and “political action”. We wind up the article by outlining an idea that could be used to better concentrate and structure existing Internet services, possibly strengthening women’s public political spaces.


2021 ◽  
Vol 5 (2) ◽  
pp. 23
Author(s):  
Talal Alharbi ◽  
Asifa Tassaddiq

Information exchange has become increasingly faster and efficient through the use of recent technological advances, such as instant messaging and social media platforms. Consequently, access to information has become easier. However, new types of cybersecurity threats that typically result in data loss and information misuse have emerged simultaneously. Therefore, maintaining data privacy in complex systems is important and necessary, particularly in organizations where the vast majority of individuals interacting with these systems is students. In most cases, students engage in data breaches and digital misconduct due to the lack of knowledge and awareness of cybersecurity and the consequences of cybercrime. The aim of this study was to investigate and evaluate the level of cybersecurity awareness and user compliance among undergraduate students at Majmaah University using a scientific questionnaire based on several safety factors for the use of the Internet. We quantitatively evaluated the knowledge of cybercrime and protection among students to show the need for user education, training, and awareness. In this study, we used a quantitative research methodology and conducted different statistical tests, such as ANOVA, Kaiser–Meyer–Olkin (KMO), and Bartlett’s tests, to evaluate and analyze the hypotheses. Safety concerns for electronic emails, computer viruses, phishing, forged ads, popup windows, and supplementary outbreaks on the Internet were well-examined in this study. Finally, we present recommendations based on the collected data to deal with this common problem.


CNS Spectrums ◽  
2009 ◽  
Vol 14 (11) ◽  
pp. 623-631 ◽  
Author(s):  
Richard B. Krueger ◽  
Meg S. Kaplan ◽  
Michael B. First

ABSTRACTObjective: This study was conducted to describe Axis I sexual diagnoses of 60 males arrested for possession of child pornography obtained via the Internet and/or attempting to meet children via the Internet.Methods: Data was obtained from a chart review of evaluations conducted on 60 males referred for a psychosexual evaluation following an arrest for possession of child pornography and/or attempting to meet children. All crimes involved use of the Internet. Information obtained from the chart review was entered into SAS. All diagnoses were made according to the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision. Simple descriptive statistics were computed and cross tabulations were tested for significance using χ2 or Fisher's Exact test.Results: Of the total sample, 40% had at least one paraphilia. Thirty-one percent had a diagnosis of pedophilia and 18% of a paraphilia not otherwise specified (NOS). Thirty-three percent had a sexual disorder NOS, characterized by hypersexuality. Seventy percent of the total sample had an Axis I disorder that antedated and was judged to be contributory to the behavior leading to their arrest.Conclusions: This sample of men arrested for committing crimes against children and adolescents via the Internet has a high incidence of lifetime sexual and other psychopathology.


Sign in / Sign up

Export Citation Format

Share Document