Policing the Cyber Threat: Exploring the threat from Cyber Crime and the ability of local Law Enforcement to respond
AffiliationUniversity of Chester
MetadataShow full item record
AbstractThe landscape in which UK policing operates today is a dynamic one, and growing threats such as the proliferation of cyber crime are increasing the demand on police resources. The response to cyber crime by national and regional law enforcement agencies has been robust, with significant investment in mitigating against, and tackling cyber threats. However, at a local level, police forces have to deal with an unknown demand, whilst trying to come to terms with new crime types, terminology and criminal techniques which are far from traditional. This paper looks to identify the demand from cyber crime in one police force in the United Kingdom, and whether there is consistency in the recording of crime. As well as this, it looks to understand whether the force can deal with cyber crime from the point of view of the Police Officers and Police Staff in the organisation.
CitationHull, M., Eze, T. & Speakman, L. (2018). "Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond," 2018 European Intelligence and Security Informatics Conference (pp. 15-22). Karlskrona, Sweden: IEEE.
PublisherProceedings of the IEEE
The following license files are associated with this item:
- Creative Commons
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International
Showing items related by title, author, creator and subject.
A comparison of pre-service teachers’ responses to cyber versus traditional bullying scenarios: similarities and differences and implications for practiceBoulton, Michael J.; Hardcastle, Katryna; Down, James; Fowles, John; Simmonds, Jennifer A.; University of Chester (Sage, 2013-11-11)Prior studies indicate that teachers differ in how they respond to different kinds of traditional bullying, and that their beliefs predict their intervention intentions. The current study provided the first extension of this work into the realm of cyber bullying. Preservice teachers in the United Kingdom (N = 222) were presented with vignettes describing three subtypes of traditional bullying as well as cyber bullying, and the latter was directly compared with the former. Dependent variables were perceived seriousness, ability to cope, empathy, and intentions to intervene. Results showed that responses to cyber bullying were most similar to verbal traditional bullying, but distinct from physical and relational traditional bullying. For cyber bullying, willingness to intervene was significantly predicted from the other three dependent variables (collectively and each one uniquely). No gender differences were observed. The implications of the results concerning how teacher educators could help teachers to deal with cyber bullying were discussed
Towards Cyber-User Awareness: Design and EvaluationOyinloye, Toyosi; Eze, Thaddeus; Speakman, Lee; University of ChesterHuman reliance on interconnected devices has given rise to a massive increase in cyber activities. There are about 17 billion interconnected devices in our World of about 8 billion people. Like the physical world, the cyber world is not void of entities whose activities, malicious or not, could be detrimental to other users who remain vulnerable as a result of their existence within cyberspace. Developments such as the introduction of 5G networks which advances communication speed among interconnected devices, undoubtedly proffer solutions for human living as well as adversely impacting systems. Vulnerabilities in applications embedded in devices, hardware deficiencies, user errors, are some of the loopholes that are exploited. Studies have revealed humans as weakest links in the cyber-chain, submitting that consistent implementation of cyber awareness programs would largely impact cybersecurity. Cyber-active systems have goals that compete with the implementation of cyber awareness programs, within limited resources. It is desirable to have cyber awareness systems that can be tailored around specific needs and considerations for important factors. This paper presents a system that aims to promote user awareness through a flexible, accessible, and cost-effective design. The system implements steps in a user awareness cycle, that considers human-factor (HF) and HF related root causes of cyber-attacks. We introduce a new user testing tool, adaptable for administering cybersecurity test questions for varying levels and categories of users. The tool was implemented experimentally by engaging cyber users within UK. Schemes and online documentations by UK Cybersecurity organisations were harnessed for assessing and providing relevant recommendations to participants. Results provided us with values representing each participants’ notional level of awareness which were subjected to a paired-T test for comparison with values derived in an automated assessment. This pilot study provides valuable details for projecting the efficacy of the system towards improving human influence in cybersecurity.
Bystander behaviour in response to traditional/cyber bullying scenarios: a consideration of victimisation/perpetration, empathy and severityBoulton, Michael J.; Macaulay, Peter (University of Chester, 2016)The current study aimed to investigate bystander behaviour across traditional and cyber bullying scenarios that changed in severity: mild, moderate and severe. Participant’s victimisation/perpetration and emotional/cognitive traits were also measured and considered in respect to bystander behaviour. A total of 868 adolescent pupils’ (males: N = 458, females: N = 410) completed a self-report questionnaire comprising of three hypothetical traditional and cyber bullying scenarios respectively that increased in severity. Victimisation/perpetration and emotional/cognitive trait items were also included within the questionnaire. The findings showed that positive bystander behaviour was higher in cyber compared to traditional bullying, with females showing higher positive bystander behaviours in both traditional and cyber bullying scenarios. No relationship of age was found. A positive relationship was found between victimisation and perpetration experience in both types of bullying, although victimisation experience was not associated with positive bystander behaviour. With the exception of traditional perpetration, cyber perpetration was associated with negative bystander behaviour where males had higher perpetration scores compared to females in both types of bullying. No gender differences on victimisation were found. Findings to support previous literature on empathy were found. It was found that severity did have an effect on bystander behaviour with more severe scenarios leading to positive bystander behaviour in both types of bullying, although no difference between severe traditional or cyber were found. The practical application of these findings encourages educators and intervention developers to utilise adolescent’s bystander knowledge to reduce bullying acts in the school environment. Future research should examine the effect of bystander awareness training on adolescent’s positive bystander behaviour across two time periods.