A3.ThecyberpsychologyofInternet
facilitatedorganisedcrime
Introduc ontocyberpsychology
Cyberpsychology is a ield within applied psychology, focusing on the
impact of emerging technology on human behaviour.
Cyberpsychologists study Internet psychology, virtual environments,
arti icial intelligence, intelligence ampli ication, gaming, digital
convergence, social media, mobile and networking devices. There are
now 30 peerreviewed journals, publishing in this area and over 1000
articlesnowgeneratedperannum[267] .Astherecentlypublishedthree
volumeEncyclopaediaofCyberBehaviournotes,itispredictedthatasa
discipline cyberpsychology will enjoy exponential growth due to the
continued rapid acceleration of Internet technologies and the
unprecedentedly pervasive and profound in luence of the Internet on
humanbeings[268] .
Mul disciplinaryapproach
Arguably, academic investigation of criminal behaviour in cyberspace
requires interdisciplinary efforts in a practical sense, and
transdisciplinarytheoreticalperspectivesinanexploratorycontext[269] .
Cyberpsychologyisanexempli icationofhowthiscombinationcan,and
indeed must, be achieved, requiring input from psychology and
computerscience,butalsosimilarlyrecententerprisessuchasnetwork
science, data visualisation and digital humanities. At the same time,
academics in this context need to be open to a number of possibilities,
acrossthefullspectrumofacademicendeavour,rangingfromthehard
metricsofcomputationalsciencestothequalitativeinterrogationsofthe
social sciences. This approach will necessitate methodological and
ideologicalopennessonthepartoftheresearcher.
Behaviourincyberspace
Regarding behavioural characteristics in cyber space, the online
disinhibition effect, Suler [272] maintains that people may do things in
thevirtualworldthattheymaynotdointherealworld,withorwithout
anonymity.Thereisaneedtoconceptualisetechnologyinanewway,a
need to think about cyberspace as an environment, as a place, as
cyberspace. Furthermore there is a need to consider the impact of this
environment on vulnerable populations (such as developing youth),
criminal and deviant populations. This is required in order to
understandmodusoperandiinthisspace.Cyberpsychologycanassistin
thisregard,deliveringinsightatthehuman/technologyinterface[273] .
Thecriticaltaskforcyberpsychologyasadisciplineistobuildupabody
ofestablished indingsofhowhumanbeingsexperiencetechnology,the
critical task in forensic cyberpsychology is to focus on how criminal
populationspresentincyberenvironments.Formanyyearseffortshave
focused on technology solutions to intrusive behaviour, arguably
without consideration of how that behaviour mutates, ampli ies or
acceleratesincyberdomains.ThisviewissupportedbyMaughan:
discussing the cyber security threat space, and the consideration of this
fromatechnicalanglebutalsofromahumanangle,ashumansarepartof
the threat, this needs more thinking. From a Department of Homeland
Security (DHS) perspective, as a large agency, it is concerned about
globalisation, borders, extremists, natural disasters. In cyber space,
criminals, hackers, insider threats, the use of malware etc. and social
engineering, all de ine the threat landscape The consideration of the
impact of people in cyber security is important. The White House 2009
cyber space de inition talks about equipment, but is missing people. With
regard to threats in cyber security, the user is the weakest link and cyber
criminalsarepeople.[283]
Anonymityandselfdisclosure[288]
Cyberimmersion[289] /presence[290]
Selfpresentationonline[291]
Pseudoparadoxicalprivacy[292] [293]
Escalationonline[294]
ImpulsivityandproblematicInternetuse[295]
Darktetradofpersonality[296] .
Inadditiontotheabovecyberpsychologicalconstructs,attentionshould
also be paid to the impact of technology on clinical psychological
conditions. For example, disruptive, impulsecontrol and conduct
disorders are known to have real world of line forensic implications
[297] , but research is required to further our understanding of their
onlinemanifestations.
Classica onofcybercrime
New technologies present everincreasing numbers of cybercrime
opportunities from geotagging apps, to information harvested from
social networking platforms. Schlinder [298] observes that computer
networksdone for criminals the same thing theyve done for legitimate
computersusers:madethejobeasierandmoreconvenient.
Prolingcybercriminals
In 1956, James Brussel provided one of the best known and accurate
pro iles,thatoftheNewYorkBomber,GeorgeMetesky.Criminalpro iler
Paul Britton [301] expanded on pro iling literature in the 1990s, as did
Douglas and Olshaker [302] . Canter has contributed to the science of
pro iling over two decades. Bednarz labelled criminal pro iling as a
promisingbutimmaturescience [303] ,howeverinthelasttwodecades
substantial progress has been made. Findings range from a
psychoanalytic approach describing hacking behaviour as a psycho
sexual urge in young men, a cathartic outlet [304] , to Investigative
Psychologysstatisticalinterpretationregardinggeographicalpro ilingof
criminalpatterns[305] .
Allison and Kebbell [306] maintain that there are two assumptions that
informcriminalpro ilingmethodology,theconsistencyassumption(i.e.
behaviour of an offender will remain reasonably consistent) and the
homology assumption (offence style will re lect offender
characteristics). However Kirwan and Power [307] point out that as
technology changes therefore there may also be changes in criminal
behaviour,thuspresentingachallengetotheconsistencyassumption.In
termsofthehomologyassumption,giventheroleofanonymityincyber
contexts can we be certain that offender characteristics will remain
uniform,notonlybetweenrealworldsandvirtualworldsbutessentially
between one cybercrime and another? Again, this is an area in which
anthropological work may prove useful (e.g. the work of Gabriella
anthropological work may prove useful (e.g. the work of Gabriella
Coleman with regard to the hacking community [308] ). According to
Professor Rogers, the real challenge is to understand behavioural
motivation concerning cybercrime "Like in traditional crimes try to
understand what motivates these people to get involved in computer
crimes in the irst place, how they choose their targets and what keeps
theminthisdeviantbehaviorafterthe irstinitialthrill.[309]
Giventhecomplexandchangingnatureofboththetechnologyandthe
legal landscape, it is dif icult to pro ile the typical cyber criminal.
However,wecanpointtocertainbehaviouralandpsychologicalfactors
which are of interest. Former police of icer and criminal justice
instructor,Shinder[313] ,forexample,notesin2010thatweshouldbear
in mind at least some degree of technical knowledge (ranging from
scriptkiddieswhouseothersmaliciouscode,toverytalentedhackers),
thoughagainthisbarrierislikelytocontinuetofall.Inaddition,Shinder
notes a certain disregard for the law or rationalisations about why
particular laws are invalid or should not apply to them, a certain
tolerance for risk, the possibility of a control freak nature, and
enjoyment in manipulating or outsmarting others. In terms of motive,
Shinderlistsmonetarygain,emotion,politicalorreligiousbeliefs,sexual
impulses, or even boredom or the desire for a little fun. While these
factors are obviously linked to traditional or real world crime, what is
not yet clear is whether cybercrime has the same associations or
etiology. What is interesting from a cyberpsychological perspective are
the behavioural, experiential, and developmental aspects of individual
motive. There is a considerable gap in our knowledge regarding the
cyberpsychological evolution of how individuals (who may or may not
have a criminal history) become incorporated into organised
cybercrime. Critical in this regard is the understanding of motive:
transition from initial motive to sustaining motive, overlapping motives,
and the prediction of evolving motives, along with an understanding of
primaryandsecondarygains.
Futuretrendsandthreatassessment
Oneofthemosturgentareasrequiringresearchandinvestigationisthe
classi icationofcybercrime;todatetherehasbeenatendencytosimply
name apparent 2.0 versions by simply adding the pre ix cyber. Are
bullying and cyber bullying the same underlying condition, and
importantlyistheliteratureoncyberbullyingpriortotheadventofthe
smartphone still relevant? Do real world stalkers and cyberstalkers
sharethesamedevianttendencies?Iscyberstalkingsimplyfacilitatedby
technology,orisitanewanddifferentiatedformofcriminalbehaviour?
In the latter, observed differences are as follows; emergence of more
female stalkers, stalking of multiple victims simultaneously, and the
ability of the stalker to access more personal data of the victim [314] .
Current problems regarding cybercrime are well established; hacking,
malware production, identity theft, online fraud, child abuse material,
online child solicitation, cyberstalking, cyberbullying, IP theft/software
piracy, botnets, data breaches, organised cybercrime, ransomware and
sextortionhowevergiventhedynamicnatureoftheenvironmentitis
important to consider future trends and put in place a strategy to deal
with them. Some future trends, threats and developments for
considerationarebrie lydiscussedbelow:
Cyberne ccrimeevolu on
From a technical perspective, we can expect that there will be an
increasedvolume of attacks in comparison to defence capabilities. As
Maughanstates:
the volume of traf ic used in DDoS attacks is currently about 400 Gbits
persecond,butthisisincreasingrapidly,anincreaseto4Tbitspersecond
couldhappenandcurrentsecuritysolutionscannothandlethis.Thereisa
needtodevelopnewdefencesandtoolsforDDoSattacks,thebestproduct
is15yearsold.[315]
Cyberpsychologicalinsight
As discussed, a key perspective is to consider cyber space as an
immersive,asopposedtotransactionalentity,toconsidercyberspaceas
an actual environment, and address the minimisation and status of
authorityonline[323] .Thechallengefortechnologyisperhapstocreate
an impression that there are consequences for the criminal use of
technologies,andtodevelopdigitaldeterrentstargetingcybercriminals,
and digital outreach protocols supporting victims. In that light, it is
advisableforlawenforcementauthoritiestohaveincreasedvisibilityor
presence online. The most promising areas for multidisciplinary
cyberpsychologicallyinformed research to provide insight to law
enforcement organisations tackling Internetfacilitated organised crime
areasfollows:
Alia ons
MaryAiken,DirectorRCSICyberPsychologyResearchCentre
SensemakingFelllowIBMNetworkScienceResearchCenter
FellowMiddlesexUniversitySchoolofLaw
Ciara
n Mc Mahon, Ph.D., Research & Development Coordinator, RCSI
CyberPsychologyResearchCentre