Raian Ali
Mitigating circumstances in cybercrime: a position paper.
Ali, Raian; McAlaney, John; Faily, Shamal; Phalp, Keith; Katos, Vasilios
Authors
John McAlaney
Shamal Faily
Keith Phalp
Vasilios Katos
Contributors
Yulei Wu
Editor
Geyong Min
Editor
Nektarios Georgalas
Editor
Jia Hu
Editor
Luigi Atzori
Editor
Xiaolong Jin
Editor
Stephen Jarvis
Editor
Lei Liu
Editor
Ram�n Ag�ero Calvo
Editor
Abstract
This paper argues the need for considering mitigating circumstances in cybercrime. Mitigating circumstances are conditions which moderate the culpability of an offender of a committed offence. Our argument is based on several observations. The cyberspace introduces a new family of communication and interaction styles and designs which could facilitate, make available, deceive, and in some cases persuade, a user to commit an offence. User's lack of awareness could be a valid mitigation when using software features introduced without a proper management of change and enough precautionary mechanisms, e.g. warning messages. The cyber behaviour of users may not be necessarily a reflection of their real character and intention. Their irrational and unconscious actions may result from their immersed and prolonged presence in a particular cyber context. Hence, the consideration of the cyberspace design, the "cyber psychological" status of an offender and their inter-relation could form a new family of mitigating circumstances inherent and unique to cybercrime. This paper elaborates on this initial argument from different perspectives including software engineering, cyber psychology, digital forensics, social responsibility and law.
Citation
ALI, R., MCALANEY, J., FAILY, S., PHALP, K. and KATOS, V. 2015. Mitigating circumstances in cybercrime: a position paper. In Wu, Y., Min, G., Georgalas, N., Hu, J., Atzori, L., Jin, X., Jarvis, S., Liu, L. and Agüero Calvo, R. (eds.) CIT/IUCC/DASC/PICom 2015: proceedings of the 3rd International workshop on cybercrimes and emerging web environments (CEWE 2015), part of the 13th IEEE international conference on dependable, autonomic and secure computing (DASC 2015), co-located with the 15th IEEE international conference on computer and information technology (CIT 2015), the 14th IEEE international conference on ubiquitous computing and communications (IUCC 2015), and the 13th IEEE international conference on pervasive intelligence and computing (PICom 2015), 26-28 October 2015, Liverpool, UK. Los Alamitos: IEEE Computer Society [online], pages 1972-1976. Available from: https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.292
Conference Name | 3rd International workshop on cybercrimes and emerging web environments (CEWE 2015), part of the 13th IEEE international conference on dependable, autonomic and secure computing (DASC 2015), co-located with the 15th IEEE international conference on comput |
---|---|
Conference Location | Liverpool, UK |
Start Date | Oct 26, 2015 |
End Date | Oct 28, 2015 |
Acceptance Date | Aug 18, 2015 |
Online Publication Date | Dec 28, 2015 |
Publication Date | Dec 31, 2015 |
Deposit Date | Dec 8, 2021 |
Publicly Available Date | Dec 8, 2021 |
Publisher | IEEE Computer Society |
Pages | 1972-1976 |
Book Title | CIT/IUCC/DASC/PICom 2015 |
DOI | https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.292 |
Keywords | Cybercrime; Cybercriminals; Hacking; Computing law; User behaviour; Access and authorisation |
Public URL | https://rgu-repository.worktribe.com/output/1446655 |
Files
ALI 2015 Mitigating circumstances in cybercrime
(428 Kb)
PDF
Copyright Statement
© IEEE
You might also like
Programming language evaluation criteria for safety-critical software in the air domain.
(2022)
Conference Proceeding
Privacy goals for the data lifecycle.
(2022)
Journal Article
Automation and cyber security risks on the railways: the human factors implications.
(2022)
Presentation / Conference
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Integrated design framework for facilitating systems-theoretic process analysis.
(2022)
Conference Proceeding
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search