Mitigating circumstances in cybercrime: A position paper

Authors: Ali, R., McAlaney, J., Faily, S., Phalp, K. and Katos, V.

Journal: Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015

Pages: 1972-1976

ISBN: 9781509001545

DOI: 10.1109/CIT/IUCC/DASC/PICOM.2015.292

Abstract:

This paper argues the need for considering mitigating circumstances in cybercrime. Mitigating circumstances are conditions which moderate the culpability of an offender of a committed offence. Our argument is based on several observations. The cyberspace introduces a new family of communication and interaction styles and designs which could facilitate, make available, deceive, and in some cases persuade, a user to commit an offence. User's lack of awareness could be a valid mitigation when using software features introduced without a proper management of change and enough precautionary mechanisms, e.g. warning messages. The cyber behaviour of users may not be necessarily a reflection of their real character and intention. Their irrational and unconscious actions may result from their immersed and prolonged presence in a particular cyber context. Hence, the consideration of the cyberspace design, the "cyber psychological" status of an offender and their inter-relation could form a new family of mitigating circumstances inherent and unique to cybercrime. This paper elaborates on this initial argument from different perspectives including software engineering, cyber psychology, digital forensics, social responsibility and law.

http://eprints.bournemouth.ac.uk/22517/

Source: Scopus

Mitigating Circumstances in Cybercrime: a Position Paper

Authors: Ali, R., McAlaney, J., Faily, S., Phalp, K. and Katos, V.

Journal: CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING

Pages: 1973-1977

DOI: 10.1109/CIT/IUCC/DASC/PICOM.2015.292

http://eprints.bournemouth.ac.uk/22517/

Source: Web of Science (Lite)

Mitigating Circumstances in Cybercrime: a Position Paper

Authors: Ali, R., McAlaney, J., Faily, S., Phalp, K. and Katos, V.

Conference: 3rd International Workshop on Cybercrimes and Emerging Web Environments

Dates: 26-28 October 2015

http://eprints.bournemouth.ac.uk/22517/

Source: Manual

Mitigating Circumstances in Cybercrime: A Position Paper.

Authors: Ali, R., McAlaney, J., Faily, S., Phalp, K. and Katos, V.

Editors: Wu, Y., Min, G., Georgalas, N., Hu, J., Atzori, L., Jin, X., Jarvis, S.A., Liu, L.C. and Calvo, R.A.

Journal: CIT/IUCC/DASC/PICom

Pages: 1972-1976

Publisher: IEEE

ISBN: 978-1-5090-0154-5

http://eprints.bournemouth.ac.uk/22517/

http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7361821

Source: DBLP