SlideShare una empresa de Scribd logo
1 de 26
‘CAN ENVIRONMENTAL CRIMINOLOGY
THEORIES CONCERNING THE PHYSICAL
ENVIRONMENT BE LINKED AND
RELATED TO CRIMINAL ACTIVITY IN A
CYBERSPACE ENVIRONMENT?’
BY REBECCA STICKLER
1
INTRODUCTION
‐ A central problem with ‘cybercrime’ is actually defining it, as ‘the lack of
definition clarity impacts every facet of prevention and remediation’
(Gordon and Ford, 2006),
‐ As it stands, criminology theories are put into place to better our
understanding,
‐ In order to mitigate against potential cyber threats, we need to
revolutionise our ways of thinking.
2
THEORETICAL APPROACHES
‐ Few crime theories that have the potential to work in a cyber environment
actually exist, and we are now questioning whether pre-existing theories
can be applied in a ‘cyberspace’ environment?
‐ Current crime theories are put into place to better our understanding as to
why people commit crimes and how they should be handled and prevented
in the future,
‐ Traditional approaches to modelling crime are limited by the simple fact
that they are unable to model individual actions and behaviours (Malleson
et al., 2010). 3
CONTINUED…
‐ ‘Cybercrime is not a victimless crime’ (Choo, 2011), and in many ways
almost anyone can be a victim.
‐ You would think that with an ever-changing relationship with technology
that ideas and theories about our online activities would change alongside
this relationship, however ‘crime prevention theories have no evolved to
account for how technology use affects criminal behaviours or
victimisation’ (Lewis & Lewis, 2011).
4
LITERATURE REVIEW
5
THE HISTORY OF CRIME PREVENTION
‐ 'Crime control' as opposed to 'crime prevention'
‐ The 1950-70's was an age of fast-moving technology, and it was believed
that this would significantly aid the Police,
‐ In the 1970-80's, there was the acceptance that the vast amount of crime
went unreported, resulting in the British Crime Survey,
‐ Crime Prevention is no longer a marginalised issue...
6
SIGNIFICANT EVENTS
‐ In the 1980's Home Office researchers developed the concept of viewing
crime as opportunity, which began a culture change...
‐ 'The 1980's, we can safely assert, has put crime prevention firmly on the
map' (Bottoms, 1990:5),
‐ Multi-agency workings led to a widening responsibility, increasing capacity
and focusing on local issues and geography,
7
ROUTINE ACTIVITY THEORY (RAT)
‐ Originally proposed by Cohen and Felson (1979), Routine
Activity Theory offers an account of how opportunities for
crime arise through the day-to-day activities carried out
by individuals,
‐ It has already been seen in work done by Choo (2011) that RAT can be
applied to mitigate against the risk of cyber threats by reducing
opportunities for crime to occur online.
8
CRIME PREVENTION THROUGH ENVIRONMENTAL
DESIGN (CPTED)
‐ ‘CPTED is a new approach that has an old background’ (Crowe, 1991),
‐ It is a crime prevention theory that focuses on tactical design and the
effective use of the built environment, which when applied, reduces both
crime and the fear of crime.
‐ ‘It is therefore considered that by re-designing such environments,
criminality is somewhat reduced’ (Johnson, Gibson, and McCabe, 2014);
could we re-design the online environment in same way?
9
RATIONAL CHOICE THEORY (RCT)
‐ In criminology, Rational Choice Theory ‘adopts a utilitarian belief that man
is a reasoning actor who weighs mean and ends, costs and benefits, and
makes a rational choice’ (Clarke, 1997),
‐ This method was designed to assist in thinking about situational crime
prevention,
‐ To some extent, these decisions are influenced by the environment in
which a crime may take place (presence of CPTED etc.) but would
this still be the case in a cyber environment?
10
CRIME PREVENTION THEORY AND GEOGRAPHICAL
IDEAS
‐ Territoriality can be defined as ‘an organisation of space in order to make
sense of it’ (Mayhew, 2009), and ideas about Crime Prevention can be
linked to this in the sense that these techniques are put in place to ‘control
actions, interactions, or access by assessing and attempting to enforce
control over a specific geographic area’ (Sack, 1983),
‐ In theory, ideas about place can be linked to Routine Activity Theory, as
how can you commit a crime in a location in which you have no
experience?
11
GEOGRAPHICAL IDEAS AND ‘CYBERSPACE’
‐ In the same way that spaces such as the workplace are seen as a part of our
everyday geographies, can ‘cyberspace’ be viewed in the same way?
‐ Current crime theories account for both temporal and spatial aspects, and
can be successfully applied in our everyday life and the spheres we occupy,
‐ However we now find ourselves wondering whether ‘everyday life is an
identifiable realm separate from other aspects of our life, or is it a container
for all experiences and knowledge?’ (Clayton, 2013).
12
‘CYBERSPACE’ AND ‘CYBERCRIME’
‐ Recently, it was revealed in a recent campaign that the Chancellor of the
Exchequer ‘was spending £1.9billion on a new National Cyber Security
Strategy, in order to deal with cyber attacks’,
‐ ‘If we do not have the ability to respond in ‘cyberspace’ to an attack, we
would be left with the impossible choice of turning the other cheek and
ignoring the devastating consequences, or resorting to a military response.
That is why we need to develop a full-functioning and operational cyber-
counter attack capability’ (ibid., 2016).
13
RESEARCH QUESTIONS
14
DOES ROUTINE ACTIVITY THEORY SYNTHESISE WITH
THE CONCEPT OF CRIME WITHIN 'CYBERSPACE' AS A
MEANS OF EXPLAINING THE OCCURRENCE OF
CRIME IN THE 'PLACE' OF 'CYBERSPACE'?
‐ In relation to Routine Activity Theory, it would be expected that one’s
offline behaviour could have influences on your online behaviour, as well as
the possibility of you victimisation, and vice versa (Van Wilsem, 2011),
‐ If this is the case, could other crime theories be applied in the same way,
mainly those aimed at mitigating against the potential risks of crime?
15
CAN THE CONCEPTS WITHIN CRIME PREVENTION
THROUGH ENVIRONMENTAL DESIGN BE APPLIED
AND EFFECTIVELY USED IN CYBERSPACE AS A PLACE-
BASED CRIME PREVENTION METHOD?
‐ New ways of thinking have come about in recent years along with the
development of the idea that 'cyberspace' could be an everyday geography,
‐ If this is the case, and 'cyberspace' is now classed as an environment
that we can occupy, then surely it must be possible to
implement theoretical ideas in the same way?
16
HOW CAN CRIME THEORIES SUCH AS RATIONAL
CHOICE THEORY BE LINKED TO GEOGRAPHICAL
THEORIES ABOUT SPACE AND PLACE?
‐ This will be explored in light of being a sub-question to research question 2,
‐ In human geography, a place can be seen as a space that has no
meaning, 'space' can be a location with no social connections for a human
being; no added value. 'Place' is more than just a location; it is a location
created by human experience (Tuan, 1977),
‐ How might one's beliefs about space and belonging influence the 'rational
choice' to offend or not?
17
METHODOLOGY
18
DATA ANALYSIS
‐ 3 case studies of cybercrimes will be analysed, and crime theories will be
applied to them to answer my research questions,
‐ I will be using a clear, rigid method to analyse them so that the case studies
are comparable, and this method will be explained fully in my write-up,
‐ Looking for academic write-ups or in-depth media reports, and case studies
won’t use unless all the necessary details are present (Lewis and Lewis,
2011).
19
DATA COLLECTION: SECONDARY DATA
‐ Data will be gathered from sources such as the National Crime Statistics
website, grey literature, articles, and academic journals,
‐ This will include published texts on potential case studies and the like so I
am able to synthesise them with my knowledge of environmental
criminology theories,
‐ Qualitative, and on a variety of levels of seriousness (Geers, 2010; Lewis
and Lewis, 2011)
20
DIRECTED CONTENT ANALYSIS
‐ This is a widely used qualitative research technique that will allow me to
use existing theories to aid my research and the discussion of my findings,
‐ 'The goal of this directed approach to content analysis is to validate or
extend conceptually a theoretical framework or theory' (Hsieh and
Shannon, 2005),
‐ The main strength of this is that the theory is already rooted in the
research by way of the search methods.
21
LIMITATIONS OF SECONDARY DATA
‐ One of the main constraints of collecting data in this manner is there is no
control over the quality of the data. However this will be mitigated against
with the search strategy and criteria I use,
‐ There is also the possibility that data might not be specific enough for my
needs as the researcher; key details may be missing, as well as it
potentially being incomplete,
‐ However, this can be avoided by closely examining only cases which
I have found published in full, and taking just extracts from
partially-published cases. 22
DATA COLLECTION: FOCUS GROUPS
‐ ‘The group process can help people to explore and clarify their views in
ways that would be less easily accessible in a one to one interview’
(Kitzinger, 1995),
‐ I will conduct these sessions with various groups of people: geography
and non-geography students; people of different ages; different
year groups within the discipline etc.,
‐ They will be groups of 6-10 participants, and I will conduct approximately
5 focus groups of different people.
23
IN SUMMARY…
‐ In today's society, social interactions between people occur not just in the
physical world, but also online in 'cyberspace'. This is often with the same
people, or at least with people with common connections one meets in the
physical domain (Wellman et al., 2002),
‐ As a collective group, we as humans have evolved with new technological
advancements, and some may be naïve in thinking that this doesn't apply
to committing criminal acts, but unfortunately it does.
24
BIBLIOGRAPHY
‐ Anon (2013). Routine Activity Theory. Available at: https://upload.wikimedia.org/wikipedia/commons/thumb/0/0f/Routine_activity_theory.png/300px-Routine_activity_theory.png [Accessed on November 3, 2016].
‐ Anon (2016). The Growth of Crime Prevention: Democracy and Policing. Available at: http://www.psi.org.uk/publications/archivepdfs/Democracy/DEMPOL2.pdf [Accessed on October 31, 2016].
‐ Choo, K.-K.R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), pp.719-731.
‐ Clarke, R.V. (1997) Situational Crime Prevention: Successful Case Studies. 2nd edn. Boulder: Lynee Rienner Publishers.
‐ Clayton, J. (2013). Geography and Everyday Life B. Warf, ed. Oxford University Press.
‐ Crowe, T.D., The National Crime Institute and National Crime Prevention Institute Staff (1991) Crime prevention through environmental design: Applications of architectural design and space management concepts. Boston: Butterworth-Heinemann.
‐ Deacon, M. (2016). Don’t panic... but the Chancellor says cybercrime could lead us into war. Available at: http://www.telegraph.co.uk/news/2016/11/01/dont-panic-but-the-chancellor-says-cyber-crime-could-lead-us-int/ - Philip Hammond, Chancellor of the
Exchequer [Accessed on November 2, 2016].
‐ Geers, K. (2010). The challenge of cyber-attack deterrence. Computer Law & Security Review, 26(3), pp.298-303.
‐ Gordon, S. and Ford, R. (2006) 'On the definition and classification of cybercrime', Springer-Verlag France, 2:13(20). doi: 10.1007/s11416-006-0015-z.
‐ Hsieh, H.-F. and Shannon, S.E. (2005) 'Three Approaches to Qualitative Content Analysis', QUALITATIVE HEALTH RESEARCH, 15(9), pp. 1277-1288.
‐ Johnson, D., Gibson, V. and McCabe, M. (2014) “Designing in crime prevention, designing out ambiguity: Practice issues with the CPTED knowledge framework available to professionals in the field and its potentially ambiguous nature”, Crime Prevention and
Community Safety, 16(3), pp. 147-768. doi: 10.1057/cpcs.2014.3.
‐ Kitzinger, J. (1995) “Qualitative Research: Introducing Focus Groups,” BMJ, 311, pp. 299-302.
‐ Lewis, S. & Lewis, D.A. (2011). Digitalizing Crime Prevention Theories: How Technology Affects Victim and Offender Behaviour. International Journal of Criminology and Sociological Theory, 4(2), pp.765-769.
‐ Maguire, M., Morgan, R. and Reiner, R. (eds.) (2012) The Oxford handbook of criminology. 5th edn. New York, NY: Oxford University Press, USA.
‐ Malleson, N., Heppenstall, A. & See, L. (2010). Crime reduction through simulation: An agent-based model of burglary. Computers, Environment and Urban Systems, 34(3), pp.236-250.
‐ Mayhew, S. (2009) Oxford dictionary of geography. 4th edn. New York: Oxford University Press.
‐ Sack, R.D. (1983) Human Territoriality: A Theory. (73 Vols.) Taylor & Francis, Ltd.
‐ TNS (2015). Crime Survey for England and Wales. Available at: http://www.crimesurvey.co.uk/ [Accessed on October 31, 2016].
‐ Tuan, Y. (1977). Space and place: The perspective of experience 2nd ed., Minneapolis: University of Minnesota Press.
‐ Van Wilsem, J. (2011). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8(2), pp.115-127.
‐ Wasburn, P.C. & Meyrowitz, J. (1988). No Sense of Place: The impact of electronic media on social behaviour. Contemporary Sociology, 47(6), p.820.
25
ANY QUESTIONS?
26

Más contenido relacionado

Destacado

Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentationsarahj6
 
81-220-1 Chapter 14
81-220-1 Chapter 1481-220-1 Chapter 14
81-220-1 Chapter 14mpalaro
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Professor Mary Aiken
 

Destacado (6)

Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
81-220-1 Chapter 14
81-220-1 Chapter 1481-220-1 Chapter 14
81-220-1 Chapter 14
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
 

Similar a Dissertation Presentation - Final Copy

INTRODUCTION This chapter will focus on the causes o.docx
     INTRODUCTION  This chapter will focus on the causes o.docx     INTRODUCTION  This chapter will focus on the causes o.docx
INTRODUCTION This chapter will focus on the causes o.docxhallettfaustina
 
An Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine LearningAn Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine LearningSonali Chawla
 
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docxDiscussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docxduketjoy27252
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Turner Sparks
 
Routine_activity_theory_CRIM_SOC_1 (1).pptx
Routine_activity_theory_CRIM_SOC_1 (1).pptxRoutine_activity_theory_CRIM_SOC_1 (1).pptx
Routine_activity_theory_CRIM_SOC_1 (1).pptxCDTESTAC
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docxdrennanmicah
 
Crime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataCrime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataValerii Klymchuk
 
A Two-Stage Model Of Situational Crime Prevention
A Two-Stage Model Of Situational Crime PreventionA Two-Stage Model Of Situational Crime Prevention
A Two-Stage Model Of Situational Crime PreventionAlicia Buske
 
Insights of Engineering Technology and Organizational Leadership on Human Tra...
Insights of Engineering Technology and Organizational Leadership on Human Tra...Insights of Engineering Technology and Organizational Leadership on Human Tra...
Insights of Engineering Technology and Organizational Leadership on Human Tra...Pablo Villa-Martinez
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionThe Rockefeller Foundation
 
Predictive analysis of crime forecasting
Predictive analysis of crime forecastingPredictive analysis of crime forecasting
Predictive analysis of crime forecastingFrank Smilda
 
What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin eraser Juan José Calderón
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticseSAT Journals
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp PosterTurner Sparks
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 

Similar a Dissertation Presentation - Final Copy (19)

INTRODUCTION This chapter will focus on the causes o.docx
     INTRODUCTION  This chapter will focus on the causes o.docx     INTRODUCTION  This chapter will focus on the causes o.docx
INTRODUCTION This chapter will focus on the causes o.docx
 
ACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdfACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdf
 
An Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine LearningAn Experimental Study of Crime Investigation using Machine Learning
An Experimental Study of Crime Investigation using Machine Learning
 
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docxDiscussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
Discussion 1In Chapter 7 of Crime Prevention, Robinson states th.docx
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
 
Routine_activity_theory_CRIM_SOC_1 (1).pptx
Routine_activity_theory_CRIM_SOC_1 (1).pptxRoutine_activity_theory_CRIM_SOC_1 (1).pptx
Routine_activity_theory_CRIM_SOC_1 (1).pptx
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx
 
Criminology Essays
Criminology EssaysCriminology Essays
Criminology Essays
 
Crime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataCrime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation Data
 
A Two-Stage Model Of Situational Crime Prevention
A Two-Stage Model Of Situational Crime PreventionA Two-Stage Model Of Situational Crime Prevention
A Two-Stage Model Of Situational Crime Prevention
 
Insights of Engineering Technology and Organizational Leadership on Human Tra...
Insights of Engineering Technology and Organizational Leadership on Human Tra...Insights of Engineering Technology and Organizational Leadership on Human Tra...
Insights of Engineering Technology and Organizational Leadership on Human Tra...
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for Action
 
Predictive analysis of crime forecasting
Predictive analysis of crime forecastingPredictive analysis of crime forecasting
Predictive analysis of crime forecasting
 
What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp Poster
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
Crime Prevention Essay
Crime Prevention EssayCrime Prevention Essay
Crime Prevention Essay
 
Manuscript
ManuscriptManuscript
Manuscript
 

Dissertation Presentation - Final Copy

  • 1. ‘CAN ENVIRONMENTAL CRIMINOLOGY THEORIES CONCERNING THE PHYSICAL ENVIRONMENT BE LINKED AND RELATED TO CRIMINAL ACTIVITY IN A CYBERSPACE ENVIRONMENT?’ BY REBECCA STICKLER 1
  • 2. INTRODUCTION ‐ A central problem with ‘cybercrime’ is actually defining it, as ‘the lack of definition clarity impacts every facet of prevention and remediation’ (Gordon and Ford, 2006), ‐ As it stands, criminology theories are put into place to better our understanding, ‐ In order to mitigate against potential cyber threats, we need to revolutionise our ways of thinking. 2
  • 3. THEORETICAL APPROACHES ‐ Few crime theories that have the potential to work in a cyber environment actually exist, and we are now questioning whether pre-existing theories can be applied in a ‘cyberspace’ environment? ‐ Current crime theories are put into place to better our understanding as to why people commit crimes and how they should be handled and prevented in the future, ‐ Traditional approaches to modelling crime are limited by the simple fact that they are unable to model individual actions and behaviours (Malleson et al., 2010). 3
  • 4. CONTINUED… ‐ ‘Cybercrime is not a victimless crime’ (Choo, 2011), and in many ways almost anyone can be a victim. ‐ You would think that with an ever-changing relationship with technology that ideas and theories about our online activities would change alongside this relationship, however ‘crime prevention theories have no evolved to account for how technology use affects criminal behaviours or victimisation’ (Lewis & Lewis, 2011). 4
  • 6. THE HISTORY OF CRIME PREVENTION ‐ 'Crime control' as opposed to 'crime prevention' ‐ The 1950-70's was an age of fast-moving technology, and it was believed that this would significantly aid the Police, ‐ In the 1970-80's, there was the acceptance that the vast amount of crime went unreported, resulting in the British Crime Survey, ‐ Crime Prevention is no longer a marginalised issue... 6
  • 7. SIGNIFICANT EVENTS ‐ In the 1980's Home Office researchers developed the concept of viewing crime as opportunity, which began a culture change... ‐ 'The 1980's, we can safely assert, has put crime prevention firmly on the map' (Bottoms, 1990:5), ‐ Multi-agency workings led to a widening responsibility, increasing capacity and focusing on local issues and geography, 7
  • 8. ROUTINE ACTIVITY THEORY (RAT) ‐ Originally proposed by Cohen and Felson (1979), Routine Activity Theory offers an account of how opportunities for crime arise through the day-to-day activities carried out by individuals, ‐ It has already been seen in work done by Choo (2011) that RAT can be applied to mitigate against the risk of cyber threats by reducing opportunities for crime to occur online. 8
  • 9. CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED) ‐ ‘CPTED is a new approach that has an old background’ (Crowe, 1991), ‐ It is a crime prevention theory that focuses on tactical design and the effective use of the built environment, which when applied, reduces both crime and the fear of crime. ‐ ‘It is therefore considered that by re-designing such environments, criminality is somewhat reduced’ (Johnson, Gibson, and McCabe, 2014); could we re-design the online environment in same way? 9
  • 10. RATIONAL CHOICE THEORY (RCT) ‐ In criminology, Rational Choice Theory ‘adopts a utilitarian belief that man is a reasoning actor who weighs mean and ends, costs and benefits, and makes a rational choice’ (Clarke, 1997), ‐ This method was designed to assist in thinking about situational crime prevention, ‐ To some extent, these decisions are influenced by the environment in which a crime may take place (presence of CPTED etc.) but would this still be the case in a cyber environment? 10
  • 11. CRIME PREVENTION THEORY AND GEOGRAPHICAL IDEAS ‐ Territoriality can be defined as ‘an organisation of space in order to make sense of it’ (Mayhew, 2009), and ideas about Crime Prevention can be linked to this in the sense that these techniques are put in place to ‘control actions, interactions, or access by assessing and attempting to enforce control over a specific geographic area’ (Sack, 1983), ‐ In theory, ideas about place can be linked to Routine Activity Theory, as how can you commit a crime in a location in which you have no experience? 11
  • 12. GEOGRAPHICAL IDEAS AND ‘CYBERSPACE’ ‐ In the same way that spaces such as the workplace are seen as a part of our everyday geographies, can ‘cyberspace’ be viewed in the same way? ‐ Current crime theories account for both temporal and spatial aspects, and can be successfully applied in our everyday life and the spheres we occupy, ‐ However we now find ourselves wondering whether ‘everyday life is an identifiable realm separate from other aspects of our life, or is it a container for all experiences and knowledge?’ (Clayton, 2013). 12
  • 13. ‘CYBERSPACE’ AND ‘CYBERCRIME’ ‐ Recently, it was revealed in a recent campaign that the Chancellor of the Exchequer ‘was spending £1.9billion on a new National Cyber Security Strategy, in order to deal with cyber attacks’, ‐ ‘If we do not have the ability to respond in ‘cyberspace’ to an attack, we would be left with the impossible choice of turning the other cheek and ignoring the devastating consequences, or resorting to a military response. That is why we need to develop a full-functioning and operational cyber- counter attack capability’ (ibid., 2016). 13
  • 15. DOES ROUTINE ACTIVITY THEORY SYNTHESISE WITH THE CONCEPT OF CRIME WITHIN 'CYBERSPACE' AS A MEANS OF EXPLAINING THE OCCURRENCE OF CRIME IN THE 'PLACE' OF 'CYBERSPACE'? ‐ In relation to Routine Activity Theory, it would be expected that one’s offline behaviour could have influences on your online behaviour, as well as the possibility of you victimisation, and vice versa (Van Wilsem, 2011), ‐ If this is the case, could other crime theories be applied in the same way, mainly those aimed at mitigating against the potential risks of crime? 15
  • 16. CAN THE CONCEPTS WITHIN CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN BE APPLIED AND EFFECTIVELY USED IN CYBERSPACE AS A PLACE- BASED CRIME PREVENTION METHOD? ‐ New ways of thinking have come about in recent years along with the development of the idea that 'cyberspace' could be an everyday geography, ‐ If this is the case, and 'cyberspace' is now classed as an environment that we can occupy, then surely it must be possible to implement theoretical ideas in the same way? 16
  • 17. HOW CAN CRIME THEORIES SUCH AS RATIONAL CHOICE THEORY BE LINKED TO GEOGRAPHICAL THEORIES ABOUT SPACE AND PLACE? ‐ This will be explored in light of being a sub-question to research question 2, ‐ In human geography, a place can be seen as a space that has no meaning, 'space' can be a location with no social connections for a human being; no added value. 'Place' is more than just a location; it is a location created by human experience (Tuan, 1977), ‐ How might one's beliefs about space and belonging influence the 'rational choice' to offend or not? 17
  • 19. DATA ANALYSIS ‐ 3 case studies of cybercrimes will be analysed, and crime theories will be applied to them to answer my research questions, ‐ I will be using a clear, rigid method to analyse them so that the case studies are comparable, and this method will be explained fully in my write-up, ‐ Looking for academic write-ups or in-depth media reports, and case studies won’t use unless all the necessary details are present (Lewis and Lewis, 2011). 19
  • 20. DATA COLLECTION: SECONDARY DATA ‐ Data will be gathered from sources such as the National Crime Statistics website, grey literature, articles, and academic journals, ‐ This will include published texts on potential case studies and the like so I am able to synthesise them with my knowledge of environmental criminology theories, ‐ Qualitative, and on a variety of levels of seriousness (Geers, 2010; Lewis and Lewis, 2011) 20
  • 21. DIRECTED CONTENT ANALYSIS ‐ This is a widely used qualitative research technique that will allow me to use existing theories to aid my research and the discussion of my findings, ‐ 'The goal of this directed approach to content analysis is to validate or extend conceptually a theoretical framework or theory' (Hsieh and Shannon, 2005), ‐ The main strength of this is that the theory is already rooted in the research by way of the search methods. 21
  • 22. LIMITATIONS OF SECONDARY DATA ‐ One of the main constraints of collecting data in this manner is there is no control over the quality of the data. However this will be mitigated against with the search strategy and criteria I use, ‐ There is also the possibility that data might not be specific enough for my needs as the researcher; key details may be missing, as well as it potentially being incomplete, ‐ However, this can be avoided by closely examining only cases which I have found published in full, and taking just extracts from partially-published cases. 22
  • 23. DATA COLLECTION: FOCUS GROUPS ‐ ‘The group process can help people to explore and clarify their views in ways that would be less easily accessible in a one to one interview’ (Kitzinger, 1995), ‐ I will conduct these sessions with various groups of people: geography and non-geography students; people of different ages; different year groups within the discipline etc., ‐ They will be groups of 6-10 participants, and I will conduct approximately 5 focus groups of different people. 23
  • 24. IN SUMMARY… ‐ In today's society, social interactions between people occur not just in the physical world, but also online in 'cyberspace'. This is often with the same people, or at least with people with common connections one meets in the physical domain (Wellman et al., 2002), ‐ As a collective group, we as humans have evolved with new technological advancements, and some may be naïve in thinking that this doesn't apply to committing criminal acts, but unfortunately it does. 24
  • 25. BIBLIOGRAPHY ‐ Anon (2013). Routine Activity Theory. Available at: https://upload.wikimedia.org/wikipedia/commons/thumb/0/0f/Routine_activity_theory.png/300px-Routine_activity_theory.png [Accessed on November 3, 2016]. ‐ Anon (2016). The Growth of Crime Prevention: Democracy and Policing. Available at: http://www.psi.org.uk/publications/archivepdfs/Democracy/DEMPOL2.pdf [Accessed on October 31, 2016]. ‐ Choo, K.-K.R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), pp.719-731. ‐ Clarke, R.V. (1997) Situational Crime Prevention: Successful Case Studies. 2nd edn. Boulder: Lynee Rienner Publishers. ‐ Clayton, J. (2013). Geography and Everyday Life B. Warf, ed. Oxford University Press. ‐ Crowe, T.D., The National Crime Institute and National Crime Prevention Institute Staff (1991) Crime prevention through environmental design: Applications of architectural design and space management concepts. Boston: Butterworth-Heinemann. ‐ Deacon, M. (2016). Don’t panic... but the Chancellor says cybercrime could lead us into war. Available at: http://www.telegraph.co.uk/news/2016/11/01/dont-panic-but-the-chancellor-says-cyber-crime-could-lead-us-int/ - Philip Hammond, Chancellor of the Exchequer [Accessed on November 2, 2016]. ‐ Geers, K. (2010). The challenge of cyber-attack deterrence. Computer Law & Security Review, 26(3), pp.298-303. ‐ Gordon, S. and Ford, R. (2006) 'On the definition and classification of cybercrime', Springer-Verlag France, 2:13(20). doi: 10.1007/s11416-006-0015-z. ‐ Hsieh, H.-F. and Shannon, S.E. (2005) 'Three Approaches to Qualitative Content Analysis', QUALITATIVE HEALTH RESEARCH, 15(9), pp. 1277-1288. ‐ Johnson, D., Gibson, V. and McCabe, M. (2014) “Designing in crime prevention, designing out ambiguity: Practice issues with the CPTED knowledge framework available to professionals in the field and its potentially ambiguous nature”, Crime Prevention and Community Safety, 16(3), pp. 147-768. doi: 10.1057/cpcs.2014.3. ‐ Kitzinger, J. (1995) “Qualitative Research: Introducing Focus Groups,” BMJ, 311, pp. 299-302. ‐ Lewis, S. & Lewis, D.A. (2011). Digitalizing Crime Prevention Theories: How Technology Affects Victim and Offender Behaviour. International Journal of Criminology and Sociological Theory, 4(2), pp.765-769. ‐ Maguire, M., Morgan, R. and Reiner, R. (eds.) (2012) The Oxford handbook of criminology. 5th edn. New York, NY: Oxford University Press, USA. ‐ Malleson, N., Heppenstall, A. & See, L. (2010). Crime reduction through simulation: An agent-based model of burglary. Computers, Environment and Urban Systems, 34(3), pp.236-250. ‐ Mayhew, S. (2009) Oxford dictionary of geography. 4th edn. New York: Oxford University Press. ‐ Sack, R.D. (1983) Human Territoriality: A Theory. (73 Vols.) Taylor & Francis, Ltd. ‐ TNS (2015). Crime Survey for England and Wales. Available at: http://www.crimesurvey.co.uk/ [Accessed on October 31, 2016]. ‐ Tuan, Y. (1977). Space and place: The perspective of experience 2nd ed., Minneapolis: University of Minnesota Press. ‐ Van Wilsem, J. (2011). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8(2), pp.115-127. ‐ Wasburn, P.C. & Meyrowitz, J. (1988). No Sense of Place: The impact of electronic media on social behaviour. Contemporary Sociology, 47(6), p.820. 25

Notas del editor

  1. A central problem with ‘cybercrime’ is actually defining it, as ‘the lack of definition clarity impacts every facet of prevention’ (Gordon and Ford, 2006), As it stands, criminology theories are put into place to better our understanding as to why people commit crimes and how it should be handled and prevented in the future, but how can this be done if we don’t fully understand the spheres in which some of these crimes are committed? ‘Advances in technology are normally evolutionary, but they can be revolutionary’ (Geers, 2010), and in order to mitigate against these potential cyber threats we now face due to living a large proportion of our lives online, we need to revolutionise our ways of thinking.
  2. Few crime theories that have the potential to work in a cyber environment actually exist. Along with this, and experiments done on pre-existing criminology theories, we are now questioning whether pre-existing theories can be applied to criminal activity in a ‘cyberspace’ environment? Current crime theories account for both temporal and spatial aspects, however traditional approaches to modelling crime are limited by the simple fact that they are unable to model individual actions and behaviours (Malleson et al., 2010).
  3. ‘Cybercrime is not a victimless crime’ (Choo, 2011), and in many ways almost anyone can be a victim. As a result of an increase in our interconnectedness and globalisation, more and more people are becoming victims of something which up until recently wasn’t even considered a threat, You would think that with an ever-changing relationship with technology that ideas and theories about our online activities would change alongside this relationship, and although technology has changed societies information and communication practices (Wasburn & Meyrowitz, 1988), ‘crime prevention theories have not evolved to account for how technology use affects criminal behaviours or victimisation’ (Lewis & Lewis, 2011).
  4. In the early 1900’s, the focus was more so about 'crime control' as opposed to 'crime prevention'​, and Police prevention activity was seen as patrols and arrests, with the penal system being seen as ‘preventative’, The 1950-70's was an age of fast-moving technology, and it was believed that this would significantly aid the Police, which was significantly understaffed at the time, This led to the acceptance that the vast amount of crime went unreported, which resulted in the British Crime Survey. This is now seen as ‘an important monitor of the extent of crime in England and Wales. It is used by the Government to evaluate and develop crime reduction policies as well as providing vital information about the changing levels of crime over the last 30 years’ – Crime Survey, 2015, As a result, crime prevention is no longer a marginalised issue, it is a politicised issue and one that has become of significant concern to governments.
  5. In the 1980’s Home Office researchers developed the concept of viewing crime as an opportunity, which kick-started a culture change. This led to working groups beginning to think in a problem-solving way rather than a practice-orientated way, ‘The 1980’s, we can safely assert, has put crime prevention firmly on the map’ – Bottoms, 1990:5, Multi-agency workings have led to a widening responsivity, increasing capacity and focusing on local issues and geography, which has arguably led to the development of modern-day crime prevention theories. Gone are the days when one agency was responsible for delivery of a service, now several agencies may be responsible.
  6. Originally proposed by Cohen and Felson, Routine Activity Theory offers an account for how opportunities for crime arise through the day-to-day activities carried out by individuals, Individuals have different routines of life – travelling to and from work, going to school, recreating, communicating via various electronic technologies etc. – and these variations determine the likelihood of when and where a crime will be committed, and who or what is the victim, In reference to the diagram, if all of these three elements are present, then the opportunity for crime is also present, and these three elements come up in everyone’s daily routines. However if one is missing, then the opportunity is lost, or the risk is higher, It has already been seen in work done by Choo (2011) that Routine Activity Theory can be applied to mitigate against the risk of cyber threats by reducing opportunities for crime to occur online in relation to these three elements.
  7. ‘Crime prevention through environmental design is a new approach that has an old background’ (Crowe, 1991), and is one theory that has the potential to work in this new space which is seeing an increase in criminal activity, It is a crime prevention theory that focuses on tactical design and the effective use of the built environment, which when applied, reduces both crime and the fear of crime, ‘CPTED is based upon the straightforward belief that crime results in part from the opportunities presented by the physical environment in which we operate. It is therefore considered that by re-designing such environments, criminality is somewhat reduced’ (Johnson, Gibson, and McCabe, 2014); could we re-design the online environment in the same ay considering we now spend a large amount of our time here as well?
  8. In criminology, Rational Choice Theory 'adopts a utilitarian belief that man is a reasoning actor who weighs means and ends, costs and benefits, and makes a rational choice’ (Clarke, 1997), This methods was designed to assist in thinking about situational crime prevention, To some extent, these decisions are influences by the environment in which a crime may take place, for example the presence of CPTED, the time of day, how easy it may have been to commit a crime here in the past, but would this still be the case in a cyber environment? One of the ideas that I aim to explore is whether a cyber-criminal would still have the same reaction towards cyber-defences in the same way an everyday criminal would in the physical environment?
  9. Crime Prevention can be linked to ideas about territoriality, in the sense that they are put in place to ‘control actions, interactions, or access by assessing and attempting to enforce control over a specific geographic area’ (Sack, 1983), In theory, ideas about place can be linked to Routine Activity Theory, as how can you commit a crime in a location in which you have no experience? If you’re unfamiliar with a space it’s near impossible to establish a daily routine in which the opportunities for crime can occur, The same can be said about Rational Choice Theory and ideas around space, as you might be more likely to commit a crime in a location in which you have no experience, and thus no social or emotional connections.
  10. In the same way that spaces such as the workplace are seen as a part of our everyday geographies, can ‘cyberspace’ be viewed in the same way? Current crime theories account for both temporal and spatial aspects, and can be successfully applied in our everyday life and the sphere we occupy, However, we now find ourselves wondering whether ‘everyday life is an identifiable realm separate from other aspects of our life, or is it a container for all experiences and knowledge?’ (Clayton, 2013). In some ways there is confusion about what an everyday geography consists of, meaning that this new idea of ‘cyberspace’ could potentially play a more significant role in our lives than originally thought.
  11. Recently it was revealed that the Chancellor of the Exchequer ‘was spending £1.9billion on a New Cyber Security Strategy, in order to deal with cyber attacks’, In the same campaign he also said that ‘if we do not have the ability to respond in ‘cyberspace’ to an attack, we would be left with the impossible choice of turning the other cheek and ignoring the devastating consequences, or resorting to a military response. That is why we need to develop a fully-functioning and operational cyber-counter attack capability’, but looking back on the history of crime prevention, wouldn’t it be money better spent preventing crime rather than controlling it? This can be done by either adapting pre-existing criminology theories to work in ‘cyberspace’, or by developing new ones entirely bearing current threats in mind. My dissertation aims to explore one of these options further.
  12. In relation to Routine Activity Theory, it would be expected that one’s offline behaviour could have influences on your online behaviour, as well as the possibility of your victimisation, and vice versa (Van Wilsem, 2011), If this is the case, could other crime theories be applied in the same way, mainly those aimed at mitigating against the potential risks of crime? If not, does this provide an insight into the type of theories which need to be constructed to ensure these new threats do not meet or exceed their potentials.
  13. New ways of thinking have come about in recent years along with the development of the idea that ‘cyberspace’ could be an everyday geography, If this is the case, and ‘cyberspace’ is now classed as an environment that we can occupy, then surely it must be possible to implement theoretical ideas in the same way?
  14. This will be explored in light of being a sub-question to research question 2, In human geography, a place can be seen as a space that has no meaning, ‘space’ can be a location with no social connections for a human being; no added value. ‘Place’ is more than just a location, it is a location created by human experience (Tuan, 1977), With this, and the previously explained crime theories in mind, how might one’s beliefs about space and belonging influence the ‘rational choice’ to offend or not? Is an individual more or less likely to offend in a ‘space’ or ‘place' in which they feel they do or do not belong?
  15. 3 case studies of cybercrimes will be analysed, and crime theories will be applied to them to enable me to answer my research questions. This will allow me to link together the three criminology theories that I am researching. I will be using a clear, rigid method to analyse them so that the case studies are comparable when it comes to drawing my final conclusions. The method that I will use for this will be explained fully in my final write-up and will be dictated by the particular case studies I am able to find. I will looking for academic write-ups or in-depth media reports, and case studies won’t be used unless all the necessary details are present (Lewis and Lewis, 2011).
  16. The vast majority of the data collected for analysis will be from a variety of secondary sources, such as the National Crime Statistics Website, grey literature, and academic journals surrounding my subject. These will include published texts on potential case studies and the like so that I am able to synthesise them with my knowledge of environmental criminology theories, This data will be qualitative, and will range from crimes such as cyber bullying or blackmailing, much like Lewis and Lewis (2011) examined when they were looking at the relationship between online and offline behaviour, up to potential military attack and cyber warfare like Geers (2010) examines, if I’m able to find such data.
  17. This is a widely used qualitative research technique that will allow me to use existing theories to aid my research and the discussion of my findings, ‘The goal of this directed approach to content analysis is to validate or extend conceptually a theoretical framework or theory’ (Hsieh and Shannon, 2005), which is ultimately the goal of my dissertation, The main strength of this is that the theory is already rooted in the research by way of the search methods, and ‘in addition, as research in an area grows, a directed approach makes explicit the reality that researchers are unlikely to be working from a naïve perspective’ (ibid., 2005), This will aid me in turning my work into a research dissertation and not just a literature review.
  18. One of the main constraints of collecting data in this manner is there is no control over the quality of the data, which may ultimately impact the quality of my results. However, this will be mitigated against with the search strategy and criteria I use, such as directed content analysis which I previously explained, There is also the possibility that data might not be specific enough for my needs as the researcher; key details may be missing, as well as it potentially being incomplete. Both of these factors may lead to the results being ultimately useless when analysing my case studies, However, this can be avoided by closely examining only cases which I have found published in full, and taking just extracts from partially-published cases. Even then, the partially-published cases must be significant to my research in order for them to be used.
  19. After I’ve done the theory work and data analysis, and drawn my conclusions, I will conduct further research by way of focus groups, This method is particularly useful for asking more in-depth questions about my theories and findings because ‘the groups process can help people to explore and clarify their views in ways that would be less easily accessible in a one to one interview’ (Kitzinger, 1995), thus enabling me to collect more valuable data, I will conduct these sessions with various groups of people: geography and non-geography students; people of different ages; different year groups within the discipline etc. This will be determined by the conclusions that I reach in my data analysis. There will be groups of approximately 6-10 participants, and I’ll aim for around 5 groups of different people which will consist of my friends, family, course mates, and the people I work with.
  20. In today’s society, social interactions between people occur not just in the physical world, but also online in ‘cyberspace’. This is often with the same people, or at least with people with common connections one meets in the physical domain (Wellman et al., 2002), As a collective groups, we as humans have evolved with new technological advancements, and some may be naïve in thinking that this doesn’t apply to committing criminal acts, but unfortunately it does, In order to mitigate against these new potential threats we need to revolutionise our ways of thinking by developing new criminology theories that can be used in this new environment, or by adapting current theories so that they can be used in this new space that we now occupy.