Uploaded by Shazia Saif

final paper cybercrime in canada

advertisement
1
Social Learning Theory & Cybercrime
Cybercrime in Canada: Development & Prevention
A Theoretical Perspective
Student Name
Student I.D.
Course
Date
2
Social Learning Theory & Cybercrime
The modern world organizations place cybercrime at the top of the list of economic
crimes. Cybercrimes are transgressions committed by using a computer, the networks, or other
forms of ICT for example formation and distribution of viruses/malwares (McGuire & Dowling,
2013). The major trepidation to all the stakeholders is how to make the cyber world safer as
traditional territorial barriers or boundaries are of no significance to Cybercrime threats and
invasions. Consequently; every country now has its own Cyber or Internet law to manage the
cybercrimes in their countries. Less developed countries are a preferred target of the cyber
criminals who are mostly exploited as a result of their weak security controls these exploitations
are in turn used to target more developed countries to get access to big multinational companies.
Since inception and under normal circumstances Canada is always described as a fireproof house owing to its advantageous geographic situation nevertheless; the new boundary-less
cyberspace is negating this conventional thinking. A natural result is an inundation of policies to
tackle the problem (Platt, 2012). Victor Platt believes that Canada must address the importance
of international cooperation in order to deal with globalized threats of cyberspace. This paper is
an attempt to use a theoretical perspective of criminology and how the modern day cybercrime
evolved in Canada and the prevention strategies used on public and private levels.
Sophisticated and technically complex cybercrime is expanding in the Canadian digital
landscape it is not slowing rather becoming difficult to measure. A complex culture of
networking and information governs the present Canadian society and the result of these new
social changes is the birth of new cultural traits into the Canadian society for instance the
reliance on technology for a number of needs. However, risks mar the emergence of virtual
society as the instant communication involves anonymity, deception and disguise.
Social Learning Theory & Cybercrime
3
Cybercrimes are transgressions committed by using a computer, the networks, or other
forms of ICT for example formation and distribution of viruses/malwares (McGuire & Dowling,
2013). Cyber crime is an umbrella term easily divided into two types: technology-as-target and
technology-as-instrument; whereby the former targets via unauthorized accesses to computers
and the later works in the area where the Internet and information technologies are instrumental
in the commission of a crime, like intellectual property infringements, fraud, identity theft,
money laundering, human trafficking, organized crime activities, drug trafficking, cyber bullying
or child sexual exploitation (Rcmp-grc.gc.ca, 2014) .
(Rcmp-grc.gc.ca, 2014)
Canada's society and economy has reshaped under the influence of the Internet and
related technologies; another thing they have changed is Canada's criminal landscape. The
internet devices offer legitimate businesses abundant opportunities and benefits which somehow
are used equally easily by the criminals expanding their reach, facilitating entirely new crimes,
and creating new ways to redo old crimes. As the mandatory know-how is more accessible and
easy availability of ready-made malware tools offer criminals with simple yet innovative means
Social Learning Theory & Cybercrime
4
to embezzle personal information resulting in monetary losses to Canadian businesses and
citizens. Today it has gone a step further with the use of cyber technologies for other detrimental
purposes, for instance, cyber bullying and online child sexual exploitation. Police reported
27,829 cybercrime cases in 2017 (Rcmp-grc.gc.ca, 2014) whereas in 2016 practically 24,000
cybercrime-related cases were reported to Canadian police, up 58 % over 2014 (CBC.ca, 2018).
Canada ranked third after the United States and the U.K. for the number of data breaches
reported in 2018 and it is only because Canada is an attractive country for cybercriminals and
cyber threat actors (Cpacanada.ca, 2019). Businesses are not entirely prepared for cyber attacks
which are getting stronger day after day even with spending $14 billion to avert, classify and
recover from cyber security incidents of stolen personal and commercial information via fraud,
and extortion. Out of which $8 billion were given to cyber security consultants and contractors as
salaries, while $4 billion was invested in cyber security software and hardware (statcan.gc.ca,
2019). Vulnerabilities in software, hardware and human behavior online are the main reasons for
cybercrimes and the consequences are in the costly forms of damage and destruction of data,
stolen money, theft of personal and financial data, theft of intellectual property, embezzlement,
lost productivity, fraud, restoration and deletion of hacked data and systems, and reputational
harm.
Sophisticated cybercriminals operating globally use both cyber tools and social
engineering to target Canadians and know it fully well that the Canadian law enforcement
agencies will not be able to reach them. They may pose as legal organizations, for example
service providers, government agencies tempting Canadians to download malware onto their
devices. Prevalence of internet-connected devices, prioritizing ease over security is responsible
Social Learning Theory & Cybercrime
5
for the augmented exposure to cyber threats as 43.5 hours per month are spent online by each
Canadian (Public Safety Canada, 2018).
Crime is an uneven construction of assorted behaviors that a society finds it fit to
criminalize however; to propose that crime is socially constructed does not necessarily mean that
there is a particular view of the ways in which it takes place because a crime in one society is
easily an act of honor in another society (Lee, 2017). Different theoretical perspectives offer an
answer to the ever increasing rise to cyber crime. Modern science and technology and emergence
of crime correlate by the classical theorists whereas; the modern theorists characterize the
contemporary society as risk society encouraging anomie and dehumanization. As per the post
modern theorists the world is ‘hyper real’ and ‘virtual’, where simulations and technological
intensities facilitate spatial interactions and offer obscurity to cyber crime. Cultural theories of
crime offer distinctive frameworks to value the influence of human agency, social forces, and
peers on behavior (Holt, 2009).
Demeau and Parent studied the effect of more than a few types of facilities, commonly
recognized in the literature as attractors and generators of crime, theft, robbery, on assault, and
motor vehicle theft in Montreal and found that all the facilities assessed had a deep impact on
one or more types of crime (Demeau & Parent, 2018). This cements the notion that socio-cultural
impacts are more than significant in criminology. Though the history of crime is bound to a
series of theoretical and methodological questions (Srebnick & Lévy, 2016) the world is moving
on and one has to understand that cyber space as a sociological realm is entirely different from
face to face environment with transcended geographical boundaries and no privacy creating
network society; one like Canada.
Social Learning Theory & Cybercrime
6
This paper is using Ronald L. Akers’ Social Learning Theory from “Deviant Behavior: A
Social Learning Approach” published in 1973 (Akers & Sellers, 2012). The theory is arguably
the most tested contemporary theory of crime used to explicate a diverse assortment of criminal
behaviors and its empirical validity has been constantly supported by the existing research
literature (Cochran, Maskaly, Jones & Sellers, 2016). Social learning theory is based on the idea
that “individuals develop motivations and skills to commit crime through the association with or
exposure to others who are involved in crime (i.e., associating with deviant peers)” (Akers &
Sellers, 2012). Akers’s proposed theory works well with cybercrime; the ease and accessibility
of both soft and hardware along with the matured players who find it exhilarating to divulge in
cyberspace criminology, lead to a quick understanding of the relation between peer deviant
behavior and personal motivations. This is easily explained by a study by Burruss, Bossler and
Holt (2013) established that individuals who connect with peers involved in software piracy
learn and later accept the deviant behavior. A particular skill set is needed for Software piracy
and deviant peers; who usually experience positive reinforcement for their participation; to learn
these skills from. Such associations foster a network connecting with and teaching other
individuals (Burruss, Bossler & Holt, 2013). Consequently, the major rationale behind social
learning theory of a person becoming what they are based on their surroundings and associations
can be used to explain cybercrime.
New ways of policing are crucial for tackling Cybercrime in a digital era as criminal
activities are complex and transnational and the potential evidence is ephemeral involving
multiple jurisdictions. Nations today need to address these challenges using collaborated
domestic and international laws, integrating new technical skills and tools with conventional
methods and the cooperation of public and private sector organizations is a must. The internet is
Social Learning Theory & Cybercrime
7
a key enabler of cyberspace and a useful cyber security strategy is needed to balance customary
norms of a country with the opportunities offered by the internet. This condition may have
significant implications for the country’s future whilst stability is ensured by a strict security
policy the potential benefits of the information age might mitigate (Klaic, 2016).
Many believe that it is the obligation of a state to scrutinize, penalize and extradite
highlighting the “Responsibility to Protect” as it is the primary responsibility of the state to care
for the populations from crimes against humanity (Martins, 2018). Law enforcement agencies’
efforts to tackle cybercrime while protecting privacy in cyberspace are both lauded and
supported by Canadians who are concerned by the mounting threat of cybercrime for individuals,
private and public sector organizations, and governments. In this context both individual and
public efforts are needed. At a personal level every person who goes online must learn to be
responsible with passwords and downloads. On a national level the responsibility lies with the
federal Government of Canada to foster both national and international collaborations and
compel investments while facilitating information sharing and safeguarding rights and freedoms
of the Canadian citizens. The federal government must work with the private sector, provinces,
and territories to help identify prerequisites for protecting the digital infrastructure.
A lot of existing literature points out the fact that technology creates new opportunities
for criminals by offering organized criminal networks the same opportunities and benefits as it
offer legitimate businesses. Secondly, cybercrime is expanding as the needed skills and tools are
more accessible. These facts lead to the conclusion that cybercrime entails new ways of
policing. The criminal utilization of new and emerging technologies like the anonymous online
networks, cloud computing, social media platforms, and virtual currency schemes necessitate
new policing actions to keep pace in a digital era. Canada needs to find ways to collaborate both
Social Learning Theory & Cybercrime
8
internationally and locally with public and private sectors to fight the organized cybercrime
assaults.
References
Akers, R., & Sellers, C. (2012). Criminological theories (6th ed.). Oxford University
Press;.
Burruss, G., Bossler, A., & Holt, T. (2013). Assessing the Mediation of a Fuller Social
Learning Model on Low Self-Control’s Influence on Software Piracy. Crime &
Delinquency, 59(8), 1157-1184. doi: 10.1177/0011128712437915
CBC.ca. (2018). New RCMP commissioner warned about the RCMP's waning ability
to police digital world | CBC News. Retrieved from
https://www.cbc.ca/news/politics/lucki-briefing-binde-cybercrime-1.4831340
Cochran, J., Maskaly, J., Jones, S., & Sellers, C. (2016). Using Structural Equations to
Model Akers’ Social Learning Theory With Data on Intimate Partner
Violence. Crime & Delinquency, 63(1), 39-60. doi: 10.1177/0011128715597694
Cpacanada.ca. (2019). 66% of global cyber breaches hit business sector in 2018.
Retrieved from https://www.cpacanada.ca/en/news/canada/2019-04-01cybersecurity-canada
Demeau, E., & Parent, G. (2018). Impacts of Crime Attractors and Generators on
Criminality in Montreal. Canadian Journal Of Criminology And Criminal
Justice, 60(3), 387-412. doi: 10.3138/cjccj.2017-0028.r1
Holt, T. (2009). Cultural Theories. Oxford Bibliographies Online Datasets. doi:
10.1093/obo/9780195396607-0009
Klaic, A. (2016). A Method for the Development of Cyber Security
Strategies. Information & Security: An International Journal, 34, 37-55. doi:
10.11610/isij.3403
Martins, D. (2018). On human rights – particularly crimes against
Humanity. JANUS.NET, E-Journal Of International Relation, 9(1). doi:
10.26619/1647-7251.9.1.5
McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence Summary
of key findings and implications. UK.
Social Learning Theory & Cybercrime
Public Safety Canada. (2018). National Cyber Security Strategy Canada's Vision for
Security and Prosperity in the Digital Age. Ottawa, Ontario: Government of
Canada.
Rcmp-grc.gc.ca. (2014). Cybercrime: an overview of incidents and issues in Canada |
Royal Canadian Mounted Police. Retrieved from http://www.rcmpgrc.gc.ca/en/cybercrime-an-overview-incidents-and-issues-canada#sec1
Srebnick, A., & Lévy, R. (2016). Crime and culture. Ashgate.
statcan.gc.ca. (2019). The Daily — Impact of cybercrime on Canadian businesses,
2017. Retrieved from https://www150.statcan.gc.ca/n1/dailyquotidien/181015/dq181015a-eng.htm
statcan.gc.ca. (2019). Retrieved from
https://www150.statcan.gc.ca/t1/tbl1/en/tv.action?pid=3510000101
9
Download