TOWARDS AN UNDERSTANDING OF CYBER CRIME: USERS’ PERSPECTIVES CASE STUDY OF DEVELOPING COUNTRIES IN SOUTH EAST ASIA
Mathews Z. NKHOMA
Business Information Systems RMIT International University Vietnam
Ho Chi Minh City, Vietnam
Duy P. T. DANG
Business Information Systems RMIT International University Vietnam
Ho Chi Minh City, Vietnam
Kudakwashe Appolo ShamuSoftware Engineering FTMS College
Bukit Jalil Kuala LumpurMalaysia
AGENDA
WHAT IS CYBER CRIME?
WHAT IS USER AWARENESS?
USER AWARNESS VS CYBER CRIME
RESEARCH METHODOLOGY
FINDINGSCLOSING REMARKS
WHAT IS CYBER CRIME?
• Internet has eventually become a tool for criminals utilized for malicious purposes.
• crimes committed by abusing the Internet with malicious tools and methods is recognized widely as ‘cyber-crime
• common cyber crime’s activities that affect directly general Internet users
• related and not related to financial motives
CYBER CRIME
WHAT IS USER AWARENESS?
• referred to the level of attention and knowledge that allows general Internet users to understand the internet and its environment.
• This will enable users to predict the results of their actions, create awareness of the risks that may make them victims of cyber crime and determine proper course of actions
• User’s awareness can be gained through experience or education
USER AWARENESS
CYBER CRIMEUSER AWARNES
RESEARCH METHODOLOGY
• The survey accumulated total of 397 respondents
• Impact of user awareness on Cybercrime
• First stage used a 34-item Likert-type questionnaire
• Second phase we contacted participants via email to expand on themes in the questionnaire.
METHODOLOGY
RESEARCH FINDINGS
• Users from general management and network security specialist have different perception towards Cyber crime.
• 88% of respondents are aware of risk associated with the internet.
• But 80% of respondents approved the act of giving pirated copy of software.
FINDINGS
Internet Fraud: Internet action fraud and unsolicited e-mail
Identity Theft: stealing your social security number, credit card numbers, messenger / social network account or mailbox
Hacking: virus infections and penetration of computer systems
Online stalking
Cyber-harassment
Other
0 20 40 60 80 100
120
140
160
180
200
Series1
• Question 8 9 10 and 11
• Indicate that users are aware of Cyber-crimes and willing to report to the authorities.
• indicates a sharp disparity between users of the internet and their willing to report to the authorities.
FINDINGS
• Question 32. Could you name any of Computer or IT laws?
Believe the law enforcement could not help
Unaware of law enforcement's in-terests
Do not know where to go
Feel embarassed
Others
Blank
LIMITATIONS
LIMITATIONS
• No two persons identify and frame Cybercrime in an identical manner.
• This creates potential conflict of interest when the participants present their arguments as to how to best identify and respond to cybercrime risk
• literature in the field of network security
• To make sure that the fundamental definitions of Cybercrime are clearly defined and are as free from bias as possible.
CONCLUSION
• Our study has integrated the literature on Cybercrime, policies, perception into a case study method in which the perceptions of subjects currently studying in South East Asia are assessed.
• The first stage was a qualitative 34-item Likert-type survey which assessed common themes and shared themes among the population.
• Because it incorporates the needs of understanding Cybercrimes into perception of how, why and to what extent these crimes need to be managed
CONCLUSION
FUTURE RESEARCH
• Assess the degree of conflict and how decision-making processes are made in respect to the Cybercrime awareness initiatives.
FUTURE RESEARCH
THANK YOU!