Raian Ali
Mitigating circumstances in cybercrime: a position paper.
Ali, Raian; McAlaney, John; Faily, Shamal; Phalp, Keith; Katos, Vasilios
Authors
John McAlaney
Shamal Faily
Keith Phalp
Vasilios Katos
Contributors
Yulei Wu
Editor
Geyong Min
Editor
Nektarios Georgalas
Editor
Jia Hu
Editor
Luigi Atzori
Editor
Xiaolong Jin
Editor
Stephen Jarvis
Editor
Lei Liu
Editor
Ram�n Ag�ero Calvo
Editor
Abstract
This paper argues the need for considering mitigating circumstances in cybercrime. Mitigating circumstances are conditions which moderate the culpability of an offender of a committed offence. Our argument is based on several observations. The cyberspace introduces a new family of communication and interaction styles and designs which could facilitate, make available, deceive, and in some cases persuade, a user to commit an offence. User's lack of awareness could be a valid mitigation when using software features introduced without a proper management of change and enough precautionary mechanisms, e.g. warning messages. The cyber behaviour of users may not be necessarily a reflection of their real character and intention. Their irrational and unconscious actions may result from their immersed and prolonged presence in a particular cyber context. Hence, the consideration of the cyberspace design, the "cyber psychological" status of an offender and their inter-relation could form a new family of mitigating circumstances inherent and unique to cybercrime. This paper elaborates on this initial argument from different perspectives including software engineering, cyber psychology, digital forensics, social responsibility and law.
Citation
ALI, R., MCALANEY, J., FAILY, S., PHALP, K. and KATOS, V. 2015. Mitigating circumstances in cybercrime: a position paper. In Wu, Y., Min, G., Georgalas, N., Hu, J., Atzori, L., Jin, X., Jarvis, S., Liu, L. and Agüero Calvo, R. (eds.) CIT/IUCC/DASC/PICom 2015: proceedings of the 3rd International workshop on cybercrimes and emerging web environments (CEWE 2015), part of the 13th IEEE international conference on dependable, autonomic and secure computing (DASC 2015), co-located with the 15th IEEE international conference on computer and information technology (CIT 2015), the 14th IEEE international conference on ubiquitous computing and communications (IUCC 2015), and the 13th IEEE international conference on pervasive intelligence and computing (PICom 2015), 26-28 October 2015, Liverpool, UK. Los Alamitos: IEEE Computer Society [online], pages 1972-1976. Available from: https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.292
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 3rd International workshop on cybercrimes and emerging web environments (CEWE 2015), part of the 13th IEEE international conference on dependable, autonomic and secure computing (DASC 2015), co-located with the 15th IEEE international conference on comput |
Start Date | Oct 26, 2015 |
End Date | Oct 28, 2015 |
Acceptance Date | Aug 18, 2015 |
Online Publication Date | Dec 28, 2015 |
Publication Date | Dec 31, 2015 |
Deposit Date | Dec 8, 2021 |
Publicly Available Date | Dec 8, 2021 |
Publisher | IEEE Computer Society |
Peer Reviewed | Peer Reviewed |
Pages | 1972-1976 |
Book Title | CIT/IUCC/DASC/PICom 2015 |
DOI | https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.292 |
Keywords | Cybercrime; Cybercriminals; Hacking; Computing law; User behaviour; Access and authorisation |
Public URL | https://rgu-repository.worktribe.com/output/1446655 |
Files
ALI 2015 Mitigating circumstances in cybercrime
(428 Kb)
PDF
Copyright Statement
© IEEE
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search