Law Enforcement Officers’ Reaction on Traditional Crimes to Fight Cybercrime Locally
DOI:
https://doi.org/10.18034/abcjar.v10i2.601Keywords:
Law Enforcement Officer, Traditional Crime, Cybercrime, Cybercrime FightAbstract
Cybercrime has become one of the fastest-growing concerns for law enforcement agencies at the federal, state, and municipal levels. This qualitative case study examined the perceptions of nine law enforcement officers from Texas regarding combating cybercrime at the local level. The study focuses on how do law enforcement officers who respond to traditional crimes describe law enforcement agencies’ preparedness to fight cybercrime locally. Data collection consisted of semistructured interviews, where member-checking helped to enhance trustworthiness. The results from this study helped fill the gap in the literature regarding the unknown perceptions of law enforcement officers responding to cybercrimes at the local level. This study also focused on the behaviors of the participants regarding responding to cybercrimes. Participants indicated that law enforcement agencies take cybercrime seriously; however, cybercrimes are not a high priority for law enforcement at the local level. Participants also provided challenges that local law enforcement agencies face in cybercrime investigations locally.
Downloads
References
Achar, S. (2018). Data Privacy-Preservation: A Method of Machine Learning. ABC Journal of Advanced Research, 7(2), 123-129. https://doi.org/10.18034/abcjar.v7i2.654
Achar, S. (2019). Behavioral and Perceptual Models for Secure Data Analysis and Management. Global Disclosure of Economics and Business, 8(2), 143-152. https://doi.org/10.18034/gdeb.v8i2.653
Achar, S., & Tisuela, N. L. (2020). A Review of Hosting Enterprise SaaS with IaC on Multi-cloud Platforms. International Journal of Reciprocal Symmetry and Physical Sciences, 7, 14–23. https://upright.pub/index.php/ijrsps/article/view/72
Aleem, A. (2019). Treading water: Why organisations are making no progress on cyber security. Network Security, 2019(11), 15–18. https://doi.org/10.1016/s1353-4858(19)30133-3
Ashiq, M., Rehman, S. U., & Mujtaba, G. (2020). Future challenges and emerging role of academic libraries in Pakistan: A phenomenology approach. Information Development, 37(1), 158–173. https://doi.org/10.1177/0266666919897410
Bayard, E. E. (2019). The rise of cybercrime and the need for state cybersecurity. Rutgers Computer & Technology Law Journal, 45(2), 69.
Belshaw, S. H. (2019). Investigating the new criminal neighborhood: The need for dark web education for law enforcement personnel. International Journal of Information Security and Cybercrime, 8(2), 27–38. https://doi.org/10.19107/ijisc.2019.02.03
Berghel, H. (2017). Oh, what a tangled web: Russian hacking, fake news, and the 2016 US presidential election. Computer, 50(9), 87–91. https://doi.org/10.1109/mc.2017.3571054
Boddy, M. (2018). Phishing 2.0: The new evolution in cybercrime. Computer Fraud & Security, 2018(11), 8–10. https://doi.org/10.1016/s1361-3723(18)30108-8
Bossler, A. M., Holt, T. J., Cross, C., & Burruss, G. W. (2019). Policing fraud in England and Wales: Examining constables’ and sergeants’ online fraud preparedness. Security Journal, 33(2). https://doi.org/10.1057/s41284-019-00187-5
Brunner, M. (2020). Challenges and opportunities in state and local cybercrime enforcement. Journal of National Security Law & Policy, 10(3), 1.
Burruss, G. W., Holt, T. J., & Wall-Parker, A. (2017). The hazards of investigating internet crimes against children: Digital evidence handlers’ experiences with vicarious trauma and coping behaviors. American Journal of Criminal Justice, 43(3), 433–447. https://doi.org/10.1007/s12103-017-9417-3
Burruss, G., Howell, C. J., Bossler, A., & Holt, T. J. (2019). Self-perceptions of English and Welsh constables and sergeants preparedness for online crime. Policing: An International Journal, 43(1), 105–119. https://doi.org/10.1108/pijpsm-08-2019-0142
Caneppele, S., & Aebi, M. F. (2017). Crime drop or police recording flop? On the relationship between the decrease of offline crime and the increase of online and hybrid crimes. Policing: A Journal of Policy and Practice, 13(1), 66–79. https://doi.org/10.1093/police/pax055
Cockcroft, T., Shan-A-Khuda, M., Schreuders, Z. C., & Trevorrow, P. (2018). Police cybercrime training: Perceptions, pedagogy, and policy. Policing: A Journal of Policy and Practice. https://doi.org/10.1093/police/pay078
Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). Sage.
Cunha, I., Cavalcante, J., & Patel, A. (2017). A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution. International Journal of Electronic Security and Digital Forensics, 9(3), 209. https://doi.org/10.1504/ijesdf.2017.085195
DeJonckheere, M., & Vaughn, L. M. (2019). Semistructured interviewing in primary care research: A balance of relationship and rigour. Family Medicine and Community Health, 7(2), e000057. https://doi.org/10.1136/fmch-2018-000057
Dodge, C., & Burruss, G. (2019). Policing cybercrime. The Human Factor of Cybercrime, 339–358. https://doi.org/10.4324/9780429460593-15
Dolliver, D. S., Collins, C., & Sams, B. (2017). Hybrid approaches to digital forensic investigations: A comparative analysis in an institutional context. Digital Investigation, 23, 124–137. https://doi.org/10.1016/j.diin.2017.10.005
Donaldson, L. (2001). The contingency theory of organizations (1st ed.). SAGE Publications.
Griffith, D. (2017, November 3). Fighting cybercrime at the local level. Police Magazine. https://www.policemag.com/342353/fighting-cybercrime-at-the-local-level
Harkin, D., Whelan, C., & Chang, L. (2018). The challenges facing specialist police cyber-crime units: An empirical analysis. Police Practice and Research, 19(6), 519–536. https://doi.org/10.1080/15614263.2018.1507889
Her Majesty’s Inspectorate of Constabulary and Fire & Rescue Services. (2018). State of policing: The annual Assessment of Policing in England and Wales. https://www.justiceinspectorates.gov.uk/hmicfrs/wp-content/uploads/state-of-policing-2017-2.pdf
Holt, T. J. (2018). Regulating cybercrime through law enforcement and industry mechanisms. The ANNALS of the American Academy of Political and Social Science, 679(1), 140–157. https://doi.org/10.1177/0002716218783679
Holt, T. J. (2019). Cybercrime subcultures. The Human Factor of Cybercrime, 159–172. https://doi.org/10.4324/9780429460593-7
Johnson, D., Faulkner, E., Meredith, G., & Wilson, T. J. (2020). Police functional adaptation to the digital or post digital age: Discussions with cybercrime experts. The Journal of Criminal Law, 84(5), 427–450. https://doi.org/10.1177/0022018320952559
Keeling, D., & Losavio, M. (2017). Public security & digital forensics in the United States: The continued need for expanded digital systems for security. The Journal of Digital Forensics, Security and Law, 12(3), 47–59. https://doi.org/10.15394/jdfsl.2017.1452
Koziarski, J., & Lee, J. (2020). Connecting evidence-based policing and cybercrime. Policing: An International Journal, 43(1), 198–211. https://doi.org/10.1108/pijpsm-07-2019-0107
Lawrence, P. R., & Lorsch, J. W. (1967). Differentiation and integration in complex organizations. Administrative Science Quarterly, 12(1), 1. https://doi.org/10.2307/2391211
Levi, M. (2017). Assessing the trends, scale and nature of economic cybercrimes: Overview and issues. Crime, Law and Social Change, 67(1), 3–20. https://doi.org/10.1007/s10611-016-9645-3
Levi, M., Doig, A., Gundur, R., Wall, D., & Williams, M. (2016). Cyberfraud and the implications for effective risk-based responses: Themes from UK research. Crime, Law and Social Change, 67(1), 77–96. https://doi.org/10.1007/s10611-016-9648-0
Levitt, H. M., Bamberg, M., Creswell, J. W., Frost, D. M., Josselson, R., & Suárez-Orozco, C. (2018). Journal article reporting standards for qualitative primary, qualitative meta-analytic, and mixed methods research in psychology: The APA Publications and Communications Board task force Report. American Psychologist, 73(1), 26–46. https://doi.org/10.1037/amp0000151
Loveday, B. (2017). Still plodding along? The police response to the changing profile of crime in England and Wales. International Journal of Police Science & Management, 19(2), 101–109. https://doi.org/10.1177/1461355717699634
Manavalan, M., & Chisty, N. M. A. (2019). Visualizing the Impact of Cyberattacks on Web-Based Transactions on Large-Scale Data and Knowledge-Based Systems. Engineering International, 7(2), 95-104. https://doi.org/10.18034/ei.v7i2.578
Manavalan, M., & Ganapathy, A. (2014). Reinforcement Learning in Robotics. Engineering International, 2(2), 113-124. https://doi.org/10.18034/ei.v2i2.572
Nouh, M., Nurse, J. R., Webb, H., & Goldsmith, M. (2019). Cybercrime investigators are users too: Understanding the socio-technical challenges faced by law enforcement [Workshop on Usable Security (USEC]. arXivLabs.
Novak, A. N., & Vilceanu, M. O. (2019). “The internet is not pleased”: Twitter and the 2017 Equifax data breach. The Communication Review, 22(3), 196–221. https://doi.org/10.1080/10714421.2019.1651595
Ntinda, K. (2019). Narrative research. Handbook of Research Methods in Health Social Sciences, 411–423. https://doi.org/10.1007/978-981-10-5251-4_79
Oltmann, S. (2016). Qualitative interviews: A methodological discussion the interviewer and respondent contexts. Qualitative Sociological Research, 17(2). https://doi.org/10.17169/fqs-17.2.2551
Peck, B., & Mummery, J. (2017). Hermeneutic constructivism: An ontology for qualitative research. Qualitative Health Research, 28(3), 389–407. https://doi.org/10.1177/1049732317706931
Poushter, J., & Manevich, D. (2017). Globally, people point to ISIS and climate change as leading security threats. Pew Research Center’s Global Attitudes Project. https://www.pewresearch.org/global/2017/08/01/globally-people-point-to-isis-and-climate-change-as-leading-security-threats/
Preis, B., & Susskind, L. (2020). Municipal cybersecurity: More work needs to be done. Urban Affairs Review, (1). https://doi.org/10.1177/1078087420973760
Promnick, G. (2017). Cyber economic espionage: Corporate theft and the new Patriot Act. Hastings Science & Technology Law Journal, 9(1), 89.
Rashid, Y., Rashid, A., Warraich, M. A., Sabir, S. s., & Wasseem, A. (2019). Case Study Method: A Step by-Step Guide for Business Researchers. International Journal of Qualiitative Methods, 18, 1-13. Sagepub. https://doi.org/10.1177/1609406919862424
Rubel, D., & Okech, J. (2017). Qualitative research in group work: Status, synergies, and implementation. The Journal for Specialists in Group Work, 42(1), 54–86. https://doi.org/10.1080/01933922.2016.1264522
Williams, R. T. (2018). Confidence Interventions: Do They Work?. Asian Journal of Humanity, Art and Literature, 5(2), 123-134. https://doi.org/10.18034/ajhal.v5i2.536
Williams, R. T. (2020). The Paradigm Wars: Is MMR Really a Solution?. American Journal of Trade and Policy, 7(3), 79-84. https://doi.org/10.18034/ajtp.v7i3.507
Willits, D., & Nowacki, J. (2016). The use of specialized cybercrime policing units: An organizational analysis. Criminal Justice Studies, 29(2), 105–124. https://doi.org/10.1080/1478601x.2016.1170282
Younies, H., & Al-Tawil, T. N. (2020). Effect of cybercrime laws on protecting citizens and businesses in the United Arab Emirates (UAE). Journal of Financial Crime, ahead-of-print (ahead-of-print), 1089–1105. https://doi.org/10.1108/jfc-04-2020-0055
--0--