Araştırma Makalesi
BibTex RIS Kaynak Göster

Unauthorised Access to Computer Information: The Motives for Committing a Crime

Yıl 2024, Cilt: 12 Sayı: 1, 16 - 24, 08.07.2024
https://doi.org/10.26650/JPLC2023-1367714

Öz

The purpose of this study is to identify the main internal motives that led to the commission of illegal access to computer information. The motive in the study is defined as the internal motivation of a person to achieve a specific result, due to needs, and causing the determination to commit a crime. To conduct the study, 300 acts of the courts of the Russian Federation were analysed, they were issued in connexion with committing unauthorised access to computer information. It was revealed that in most of the considered cases, there was no relationship between the criminal and the victim, but 17.6% of the victims were not accidental. The study of judicial acts revealed the most common motives: desire to commit further theft; desire to get payment for the received information; personal discountenance; desire to get secure data; revenge. At the same time, more than 80% of acts of unauthorised access are committed for reasons directly related to money and property. The material being studied made it possible to divide them into two categories: "interested in financial gain" and "non-interested in financial gain". Depending on the category, different preventive measures are proposed.

Kaynakça

  • Al-Ali, A. A. H., & Al-Nemrat, A. (2017). Cyber victimization: UAE as a case study. 2017 Cybersecurity and Cyberforensics Conference (CCC): 19-24. London, United Kingdom. https://doi.org/10.1109/CCC.2017.14. google scholar
  • Ali, L., Ali, F., Surendran, P., & Thomas, B. (2017). The effects of cyber threats on customer’s behaviour in e-Banking services. International Journal of e-Education, e-Business, e-Management and e-Learning 7(1): 70-78. https://doi.org/10.17706/ijeeee.2017.7.1.70-78 google scholar
  • Azad, M. M., Mazid, K. N., & Sharmin, S. S. (2017). Cyber crime problem areas, legal areas and the cyber crime law. International Journal of New Technology and Research 3(5): 1-6. google scholar
  • Backes, B. L., Fedina, L., & Holmes, J. L. (2020). The criminal justice system response to intimate partner stalking: A systematic review of quantitative and qualitative research. Journal of Family Violence 35(7): 665-678. https://doi.org/10.1007/s10896-020-00139-3 google scholar
  • Chiesa, A. E., Kallechey, L., Harlaar, N., Ford, C. R., Garrido, E. F., Betts, W. R. et al. (2018). Intimate partner violence victimization and parenting: A systematic review. Child abuse & neglect 80: 285-300. https://doi.org/10.1016/j.chiabu.2018.03.028 google scholar
  • Duff, L., & Gardiner, S. (1996). Computer crime in the global village: strategies for control and regulation — in defence of the hacker. International Journal of the Sociology of Law 24(2): 211-228. google scholar
  • Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2018). A Stalker’s Paradise” How Intimate Partner Abusers Exploit Technology. Proceedings of the 2018 CHI conference on human factors in computing systems: 1-13. Montreal, Canada. https://doi.org/10.1145/3173574.3174241 google scholar
  • Gladkikh, V. I., & Mosechkin, I. N. (2021). Problems of improving criminal law measures of counteracting crimes in the sphere of computer information. Russian Journal of Criminology 15(2): 229-237. https://doi.org/10.17150/2500-4255.2021.15(2).229-237 google scholar
  • Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies 10(2): 243-249. https://doi.org/10.1177/a017405 google scholar
  • Ho, H. T. N. & Luong, H. T. (2022). Research trends in cybercrime victimization during 2010-2020: a bibliometric analysis. SN Social Sciences 2(1): 1-32. https://doi.org/10.1007/s43545-021-00305-4 google scholar
  • Ismail, M., & Aamar, O. (2019). Unauthorized access crime in Jordanian law (comparative study). Digital Investigation 28: 104-111. https://doi.org/10.1016/j.diin.2019.01.006 google scholar
  • Jiang, M. (2021). Cybersecurity policies in China. In CyberBRICS, edited by L. Belli, 183-226. Cham: Springer. https://doi.org/10.1007/978-3-030-56405-6 google scholar
  • Jordan, T., & Taylor, P. A. (1998). Sociology of Hackers. Sociological Review 46 (4): 757-781. google scholar
  • Junger, M., Montoya, L., Hartel, P., & Heydari, M. (2017). Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in Europe. 2017 international conference on cyber situational awareness, data analytics and assessment (Cyber SA): 1-8. London, United Kingdom. https://doi.org/10.1109/CyberSA.2017.8073391 google scholar
  • Kremen, H. (1998). Apprehending the computer hacker: The collection and use of evidence. http://www.shk-dplc.com/cfo/articles/hack.htm google scholar
  • Lazarov, A. D., & Petrova, P. (2022). Modelling Activity of a Malicious User in Computer Networks. Cybernetics and Information Technologies 22(2), 86-95. https://doi.org/10.2478/cait-2022-0018 google scholar
  • Leka, Y. V. (2019). The Motive of Crime in Foreign Law: A Comparative Legal Analysis. Actual problems of improving of current legislation of Ukraine 51: 145-154. google scholar
  • Leukfeldt, E. R., Notte, R. J., & Malsch, M. (2020). Exploring the needs of victims of cyber-dependent and cyber-enabled crimes. Victims & Offenders 15(1): 60-77. https://doi.org/10.1080/15564886.2019.1672229 google scholar
  • Li, X. (2017). A Review of Motivations of illegal Cyber Activities. Kriminologja & socjalna integracija 25 (1): 110-126. https://doi.org/10.31299/ksi.25.1.4 google scholar
  • Liu, S., & Cheng, B. (2009). Cyberattacks: Why, what, who and how. IT professional 11 (3): 14-21. https://doi.org/10.1109/MITP.2009.46 Maiwald, E. (2003). Network Security: A Beginner’s Guide, second edition, California. USA: McGrawHill Osborne Media. google scholar
  • Marques, D., Guerreiro, T., Carriço, L., Beschastnikh, I., & Beznosov, K. (2019). Vulnerability & blame: Making sense of unauthorized access to smartphones. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems: 1-13. Glasgow, Scotland. google scholar
  • Marthala, H. (2018). Machine Learning in Hacking Attempts. International Engineering Journal for Research & Development 3 (1): 1-7. google scholar
  • Milani, R., Caneppele, S., & Burkhardt, C. (2022). Exposure to cyber victimization: Results from a Swiss survey. Deviant Behavior 43(2): 228-240. https://doi.org/10.1080/01639625.2020.1806453 google scholar
  • Miro-Llinares, F., Drew, J., & Townsley, M. (2020). Understanding target suitability in cyberspace: An international comparison of cyber victimization processes. International Journal of Cyber Criminology 14(1): 139-155. https://doi.org/10.5281/ZENODO.3744874 google scholar
  • Neufeld, D. (2023). Computer crime motives: Do we have it right? Sociology Compass: 1-42. https://doi.org/10.1111/soc4.13077 google scholar
  • Neufeld, D. J. (2010). Understanding cybercrime. 43rd Hawaii International Conference on System Sciences: 1-10. Koloa, Kauai, Hawaii. google scholar
  • Odunze, D. (2018). Cyber victimization by hackers: A criminological analysis. Public Policy and Administration 8(1): 8-15. google scholar
  • Oganesyan, B. (2012). The Concept of Motive of a Crime in the Theory of Criminal Law. Bulletin of the Saratov State Law Academy 89(6): 153-158. google scholar
  • Polyakov, V. V., & Shiryaev, A. V. (2018). Forensic aspects of the identity of victims of cybercrime. Criminal procedure and forensic readings in Altai: 165-172. Barnaul, Altai State University Publishing House. google scholar
  • Pusch, N., & Holtfreter, K. (2021). Individual and organizational predictors of white-collar crime: A meta-analysis. Journal of White Collar and Corporate Crime 2(1): 5-23. https://doi.org/10.1177/2631309X19901317 google scholar
  • Reyns, B. W., Fisher, B. S., Bossler, A. M., & Holt, T. J. (2019). Opportunity and self-control: Do they predict multiple forms of online victimization? American Journal of Criminal Justice 44(1): 63-82. https://doi.org/10.1007/s12103-018-9447-5 google scholar
  • RIA Novosti (2021, December 22) The expert assessed the damage from cybercrime in Russia in 2021. https://ria.ru/20211222/kiberprestupleniya-1764832102.html google scholar
  • Rorie, M. L. (2019). The handbook of white-collar crime. United Kingdom: John Wiley & Sons. https://doi.org/10.1002/9781118775004.ch16 google scholar
  • Smith, T., & Stamatakis, N. (2021). Cyber-victimization trends in Trinidad & Tobago: the results of an empirical research. International Journal of Cybersecurity Intelligence & Cybercrime 4(1): 46-63. https://doi.org/10.52306/04010421JINE3509 google scholar
  • Sturc, B., Gurova, T., & Chernov, S. (2022). The Specifics and Patterns of Cybercrime in the Field of Payment Processing. International Journal ofCrimmology and Sociology 9: 2021-2030. https://doi.org/10.6000/1929-4409.2020.09.237 google scholar
  • Trittin-Ulbrich, H., Scherer, A. G., Munro, I., & Whelan, G. (2021). Exploring the dark and unexpected sides of digitalization: Toward a critical agenda. Organization 28(1): 8-25. https://doi.org/10.1177/1350508420968184 google scholar
  • Case 1-63/2021 [2021] Crimean Garrison Military Court (Russian Federation) google scholar
  • Case 1-268/2017 [2017] Leninsky District Court of Cheboksary (Russian Federation) google scholar
  • Case 1-77/2020 [2020] Frunzensky District Court of Vladimir (Russian Federation) google scholar
  • Case 1-191/18 [2018] Novokuznetsk District Court (Russian Federation) google scholar
  • Case 1-44/2018 [2018] Leninsky District Court of Vladikavkaz (Russian Federation) google scholar
  • Case 1-212/18 [2018] Soviet District Court of Kazan google scholar
Yıl 2024, Cilt: 12 Sayı: 1, 16 - 24, 08.07.2024
https://doi.org/10.26650/JPLC2023-1367714

Öz

Kaynakça

  • Al-Ali, A. A. H., & Al-Nemrat, A. (2017). Cyber victimization: UAE as a case study. 2017 Cybersecurity and Cyberforensics Conference (CCC): 19-24. London, United Kingdom. https://doi.org/10.1109/CCC.2017.14. google scholar
  • Ali, L., Ali, F., Surendran, P., & Thomas, B. (2017). The effects of cyber threats on customer’s behaviour in e-Banking services. International Journal of e-Education, e-Business, e-Management and e-Learning 7(1): 70-78. https://doi.org/10.17706/ijeeee.2017.7.1.70-78 google scholar
  • Azad, M. M., Mazid, K. N., & Sharmin, S. S. (2017). Cyber crime problem areas, legal areas and the cyber crime law. International Journal of New Technology and Research 3(5): 1-6. google scholar
  • Backes, B. L., Fedina, L., & Holmes, J. L. (2020). The criminal justice system response to intimate partner stalking: A systematic review of quantitative and qualitative research. Journal of Family Violence 35(7): 665-678. https://doi.org/10.1007/s10896-020-00139-3 google scholar
  • Chiesa, A. E., Kallechey, L., Harlaar, N., Ford, C. R., Garrido, E. F., Betts, W. R. et al. (2018). Intimate partner violence victimization and parenting: A systematic review. Child abuse & neglect 80: 285-300. https://doi.org/10.1016/j.chiabu.2018.03.028 google scholar
  • Duff, L., & Gardiner, S. (1996). Computer crime in the global village: strategies for control and regulation — in defence of the hacker. International Journal of the Sociology of Law 24(2): 211-228. google scholar
  • Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2018). A Stalker’s Paradise” How Intimate Partner Abusers Exploit Technology. Proceedings of the 2018 CHI conference on human factors in computing systems: 1-13. Montreal, Canada. https://doi.org/10.1145/3173574.3174241 google scholar
  • Gladkikh, V. I., & Mosechkin, I. N. (2021). Problems of improving criminal law measures of counteracting crimes in the sphere of computer information. Russian Journal of Criminology 15(2): 229-237. https://doi.org/10.17150/2500-4255.2021.15(2).229-237 google scholar
  • Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies 10(2): 243-249. https://doi.org/10.1177/a017405 google scholar
  • Ho, H. T. N. & Luong, H. T. (2022). Research trends in cybercrime victimization during 2010-2020: a bibliometric analysis. SN Social Sciences 2(1): 1-32. https://doi.org/10.1007/s43545-021-00305-4 google scholar
  • Ismail, M., & Aamar, O. (2019). Unauthorized access crime in Jordanian law (comparative study). Digital Investigation 28: 104-111. https://doi.org/10.1016/j.diin.2019.01.006 google scholar
  • Jiang, M. (2021). Cybersecurity policies in China. In CyberBRICS, edited by L. Belli, 183-226. Cham: Springer. https://doi.org/10.1007/978-3-030-56405-6 google scholar
  • Jordan, T., & Taylor, P. A. (1998). Sociology of Hackers. Sociological Review 46 (4): 757-781. google scholar
  • Junger, M., Montoya, L., Hartel, P., & Heydari, M. (2017). Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in Europe. 2017 international conference on cyber situational awareness, data analytics and assessment (Cyber SA): 1-8. London, United Kingdom. https://doi.org/10.1109/CyberSA.2017.8073391 google scholar
  • Kremen, H. (1998). Apprehending the computer hacker: The collection and use of evidence. http://www.shk-dplc.com/cfo/articles/hack.htm google scholar
  • Lazarov, A. D., & Petrova, P. (2022). Modelling Activity of a Malicious User in Computer Networks. Cybernetics and Information Technologies 22(2), 86-95. https://doi.org/10.2478/cait-2022-0018 google scholar
  • Leka, Y. V. (2019). The Motive of Crime in Foreign Law: A Comparative Legal Analysis. Actual problems of improving of current legislation of Ukraine 51: 145-154. google scholar
  • Leukfeldt, E. R., Notte, R. J., & Malsch, M. (2020). Exploring the needs of victims of cyber-dependent and cyber-enabled crimes. Victims & Offenders 15(1): 60-77. https://doi.org/10.1080/15564886.2019.1672229 google scholar
  • Li, X. (2017). A Review of Motivations of illegal Cyber Activities. Kriminologja & socjalna integracija 25 (1): 110-126. https://doi.org/10.31299/ksi.25.1.4 google scholar
  • Liu, S., & Cheng, B. (2009). Cyberattacks: Why, what, who and how. IT professional 11 (3): 14-21. https://doi.org/10.1109/MITP.2009.46 Maiwald, E. (2003). Network Security: A Beginner’s Guide, second edition, California. USA: McGrawHill Osborne Media. google scholar
  • Marques, D., Guerreiro, T., Carriço, L., Beschastnikh, I., & Beznosov, K. (2019). Vulnerability & blame: Making sense of unauthorized access to smartphones. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems: 1-13. Glasgow, Scotland. google scholar
  • Marthala, H. (2018). Machine Learning in Hacking Attempts. International Engineering Journal for Research & Development 3 (1): 1-7. google scholar
  • Milani, R., Caneppele, S., & Burkhardt, C. (2022). Exposure to cyber victimization: Results from a Swiss survey. Deviant Behavior 43(2): 228-240. https://doi.org/10.1080/01639625.2020.1806453 google scholar
  • Miro-Llinares, F., Drew, J., & Townsley, M. (2020). Understanding target suitability in cyberspace: An international comparison of cyber victimization processes. International Journal of Cyber Criminology 14(1): 139-155. https://doi.org/10.5281/ZENODO.3744874 google scholar
  • Neufeld, D. (2023). Computer crime motives: Do we have it right? Sociology Compass: 1-42. https://doi.org/10.1111/soc4.13077 google scholar
  • Neufeld, D. J. (2010). Understanding cybercrime. 43rd Hawaii International Conference on System Sciences: 1-10. Koloa, Kauai, Hawaii. google scholar
  • Odunze, D. (2018). Cyber victimization by hackers: A criminological analysis. Public Policy and Administration 8(1): 8-15. google scholar
  • Oganesyan, B. (2012). The Concept of Motive of a Crime in the Theory of Criminal Law. Bulletin of the Saratov State Law Academy 89(6): 153-158. google scholar
  • Polyakov, V. V., & Shiryaev, A. V. (2018). Forensic aspects of the identity of victims of cybercrime. Criminal procedure and forensic readings in Altai: 165-172. Barnaul, Altai State University Publishing House. google scholar
  • Pusch, N., & Holtfreter, K. (2021). Individual and organizational predictors of white-collar crime: A meta-analysis. Journal of White Collar and Corporate Crime 2(1): 5-23. https://doi.org/10.1177/2631309X19901317 google scholar
  • Reyns, B. W., Fisher, B. S., Bossler, A. M., & Holt, T. J. (2019). Opportunity and self-control: Do they predict multiple forms of online victimization? American Journal of Criminal Justice 44(1): 63-82. https://doi.org/10.1007/s12103-018-9447-5 google scholar
  • RIA Novosti (2021, December 22) The expert assessed the damage from cybercrime in Russia in 2021. https://ria.ru/20211222/kiberprestupleniya-1764832102.html google scholar
  • Rorie, M. L. (2019). The handbook of white-collar crime. United Kingdom: John Wiley & Sons. https://doi.org/10.1002/9781118775004.ch16 google scholar
  • Smith, T., & Stamatakis, N. (2021). Cyber-victimization trends in Trinidad & Tobago: the results of an empirical research. International Journal of Cybersecurity Intelligence & Cybercrime 4(1): 46-63. https://doi.org/10.52306/04010421JINE3509 google scholar
  • Sturc, B., Gurova, T., & Chernov, S. (2022). The Specifics and Patterns of Cybercrime in the Field of Payment Processing. International Journal ofCrimmology and Sociology 9: 2021-2030. https://doi.org/10.6000/1929-4409.2020.09.237 google scholar
  • Trittin-Ulbrich, H., Scherer, A. G., Munro, I., & Whelan, G. (2021). Exploring the dark and unexpected sides of digitalization: Toward a critical agenda. Organization 28(1): 8-25. https://doi.org/10.1177/1350508420968184 google scholar
  • Case 1-63/2021 [2021] Crimean Garrison Military Court (Russian Federation) google scholar
  • Case 1-268/2017 [2017] Leninsky District Court of Cheboksary (Russian Federation) google scholar
  • Case 1-77/2020 [2020] Frunzensky District Court of Vladimir (Russian Federation) google scholar
  • Case 1-191/18 [2018] Novokuznetsk District Court (Russian Federation) google scholar
  • Case 1-44/2018 [2018] Leninsky District Court of Vladikavkaz (Russian Federation) google scholar
  • Case 1-212/18 [2018] Soviet District Court of Kazan google scholar
Toplam 42 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Kriminoloji (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Ilya Mosechkin 0000-0002-9724-9552

Yayımlanma Tarihi 8 Temmuz 2024
Gönderilme Tarihi 28 Eylül 2023
Yayımlandığı Sayı Yıl 2024 Cilt: 12 Sayı: 1

Kaynak Göster

APA Mosechkin, I. (2024). Unauthorised Access to Computer Information: The Motives for Committing a Crime. Ceza Hukuku Ve Kriminoloji Dergisi, 12(1), 16-24. https://doi.org/10.26650/JPLC2023-1367714
AMA Mosechkin I. Unauthorised Access to Computer Information: The Motives for Committing a Crime. Ceza Hukuku ve Kriminoloji Dergisi. Temmuz 2024;12(1):16-24. doi:10.26650/JPLC2023-1367714
Chicago Mosechkin, Ilya. “Unauthorised Access to Computer Information: The Motives for Committing a Crime”. Ceza Hukuku Ve Kriminoloji Dergisi 12, sy. 1 (Temmuz 2024): 16-24. https://doi.org/10.26650/JPLC2023-1367714.
EndNote Mosechkin I (01 Temmuz 2024) Unauthorised Access to Computer Information: The Motives for Committing a Crime. Ceza Hukuku ve Kriminoloji Dergisi 12 1 16–24.
IEEE I. Mosechkin, “Unauthorised Access to Computer Information: The Motives for Committing a Crime”, Ceza Hukuku ve Kriminoloji Dergisi, c. 12, sy. 1, ss. 16–24, 2024, doi: 10.26650/JPLC2023-1367714.
ISNAD Mosechkin, Ilya. “Unauthorised Access to Computer Information: The Motives for Committing a Crime”. Ceza Hukuku ve Kriminoloji Dergisi 12/1 (Temmuz 2024), 16-24. https://doi.org/10.26650/JPLC2023-1367714.
JAMA Mosechkin I. Unauthorised Access to Computer Information: The Motives for Committing a Crime. Ceza Hukuku ve Kriminoloji Dergisi. 2024;12:16–24.
MLA Mosechkin, Ilya. “Unauthorised Access to Computer Information: The Motives for Committing a Crime”. Ceza Hukuku Ve Kriminoloji Dergisi, c. 12, sy. 1, 2024, ss. 16-24, doi:10.26650/JPLC2023-1367714.
Vancouver Mosechkin I. Unauthorised Access to Computer Information: The Motives for Committing a Crime. Ceza Hukuku ve Kriminoloji Dergisi. 2024;12(1):16-24.