Law Enforcement Officers’ Reaction on Traditional Crimes to Fight Cybercrime Locally

Authors

  • Coleman McKoy Parker University

DOI:

https://doi.org/10.18034/abcjar.v10i2.601

Keywords:

Law Enforcement Officer, Traditional Crime, Cybercrime, Cybercrime Fight

Abstract

Cybercrime has become one of the fastest-growing concerns for law enforcement agencies at the federal, state, and municipal levels. This qualitative case study examined the perceptions of nine law enforcement officers from Texas regarding combating cybercrime at the local level. The study focuses on how do law enforcement officers who respond to traditional crimes describe law enforcement agencies’ preparedness to fight cybercrime locally. Data collection consisted of semistructured interviews, where member-checking helped to enhance trustworthiness. The results from this study helped fill the gap in the literature regarding the unknown perceptions of law enforcement officers responding to cybercrimes at the local level. This study also focused on the behaviors of the participants regarding responding to cybercrimes. Participants indicated that law enforcement agencies take cybercrime seriously; however, cybercrimes are not a high priority for law enforcement at the local level. Participants also provided challenges that local law enforcement agencies face in cybercrime investigations locally.

Downloads

Download data is not yet available.

Author Biography

  • Coleman McKoy, Parker University

    Department of Computer Information Systems, Parker University, 2540 Walnut Hill Ln, Dallas, TX 75229, USA

References

Achar, S. (2018). Data Privacy-Preservation: A Method of Machine Learning. ABC Journal of Advanced Research, 7(2), 123-129. https://doi.org/10.18034/abcjar.v7i2.654

Achar, S. (2019). Behavioral and Perceptual Models for Secure Data Analysis and Management. Global Disclosure of Economics and Business, 8(2), 143-152. https://doi.org/10.18034/gdeb.v8i2.653

Achar, S., & Tisuela, N. L. (2020). A Review of Hosting Enterprise SaaS with IaC on Multi-cloud Platforms. International Journal of Reciprocal Symmetry and Physical Sciences, 7, 14–23. https://upright.pub/index.php/ijrsps/article/view/72

Aleem, A. (2019). Treading water: Why organisations are making no progress on cyber security. Network Security, 2019(11), 15–18. https://doi.org/10.1016/s1353-4858(19)30133-3

Ashiq, M., Rehman, S. U., & Mujtaba, G. (2020). Future challenges and emerging role of academic libraries in Pakistan: A phenomenology approach. Information Development, 37(1), 158–173. https://doi.org/10.1177/0266666919897410

Bayard, E. E. (2019). The rise of cybercrime and the need for state cybersecurity. Rutgers Computer & Technology Law Journal, 45(2), 69.

Belshaw, S. H. (2019). Investigating the new criminal neighborhood: The need for dark web education for law enforcement personnel. International Journal of Information Security and Cybercrime, 8(2), 27–38. https://doi.org/10.19107/ijisc.2019.02.03

Berghel, H. (2017). Oh, what a tangled web: Russian hacking, fake news, and the 2016 US presidential election. Computer, 50(9), 87–91. https://doi.org/10.1109/mc.2017.3571054

Boddy, M. (2018). Phishing 2.0: The new evolution in cybercrime. Computer Fraud & Security, 2018(11), 8–10. https://doi.org/10.1016/s1361-3723(18)30108-8

Bossler, A. M., Holt, T. J., Cross, C., & Burruss, G. W. (2019). Policing fraud in England and Wales: Examining constables’ and sergeants’ online fraud preparedness. Security Journal, 33(2). https://doi.org/10.1057/s41284-019-00187-5

Brunner, M. (2020). Challenges and opportunities in state and local cybercrime enforcement. Journal of National Security Law & Policy, 10(3), 1.

Burruss, G. W., Holt, T. J., & Wall-Parker, A. (2017). The hazards of investigating internet crimes against children: Digital evidence handlers’ experiences with vicarious trauma and coping behaviors. American Journal of Criminal Justice, 43(3), 433–447. https://doi.org/10.1007/s12103-017-9417-3

Burruss, G., Howell, C. J., Bossler, A., & Holt, T. J. (2019). Self-perceptions of English and Welsh constables and sergeants preparedness for online crime. Policing: An International Journal, 43(1), 105–119. https://doi.org/10.1108/pijpsm-08-2019-0142

Caneppele, S., & Aebi, M. F. (2017). Crime drop or police recording flop? On the relationship between the decrease of offline crime and the increase of online and hybrid crimes. Policing: A Journal of Policy and Practice, 13(1), 66–79. https://doi.org/10.1093/police/pax055

Cockcroft, T., Shan-A-Khuda, M., Schreuders, Z. C., & Trevorrow, P. (2018). Police cybercrime training: Perceptions, pedagogy, and policy. Policing: A Journal of Policy and Practice. https://doi.org/10.1093/police/pay078

Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). Sage.

Cunha, I., Cavalcante, J., & Patel, A. (2017). A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution. International Journal of Electronic Security and Digital Forensics, 9(3), 209. https://doi.org/10.1504/ijesdf.2017.085195

DeJonckheere, M., & Vaughn, L. M. (2019). Semistructured interviewing in primary care research: A balance of relationship and rigour. Family Medicine and Community Health, 7(2), e000057. https://doi.org/10.1136/fmch-2018-000057

Dodge, C., & Burruss, G. (2019). Policing cybercrime. The Human Factor of Cybercrime, 339–358. https://doi.org/10.4324/9780429460593-15

Dolliver, D. S., Collins, C., & Sams, B. (2017). Hybrid approaches to digital forensic investigations: A comparative analysis in an institutional context. Digital Investigation, 23, 124–137. https://doi.org/10.1016/j.diin.2017.10.005

Donaldson, L. (2001). The contingency theory of organizations (1st ed.). SAGE Publications.

Griffith, D. (2017, November 3). Fighting cybercrime at the local level. Police Magazine. https://www.policemag.com/342353/fighting-cybercrime-at-the-local-level

Harkin, D., Whelan, C., & Chang, L. (2018). The challenges facing specialist police cyber-crime units: An empirical analysis. Police Practice and Research, 19(6), 519–536. https://doi.org/10.1080/15614263.2018.1507889

Her Majesty’s Inspectorate of Constabulary and Fire & Rescue Services. (2018). State of policing: The annual Assessment of Policing in England and Wales. https://www.justiceinspectorates.gov.uk/hmicfrs/wp-content/uploads/state-of-policing-2017-2.pdf

Holt, T. J. (2018). Regulating cybercrime through law enforcement and industry mechanisms. The ANNALS of the American Academy of Political and Social Science, 679(1), 140–157. https://doi.org/10.1177/0002716218783679

Holt, T. J. (2019). Cybercrime subcultures. The Human Factor of Cybercrime, 159–172. https://doi.org/10.4324/9780429460593-7

Johnson, D., Faulkner, E., Meredith, G., & Wilson, T. J. (2020). Police functional adaptation to the digital or post digital age: Discussions with cybercrime experts. The Journal of Criminal Law, 84(5), 427–450. https://doi.org/10.1177/0022018320952559

Keeling, D., & Losavio, M. (2017). Public security & digital forensics in the United States: The continued need for expanded digital systems for security. The Journal of Digital Forensics, Security and Law, 12(3), 47–59. https://doi.org/10.15394/jdfsl.2017.1452

Koziarski, J., & Lee, J. (2020). Connecting evidence-based policing and cybercrime. Policing: An International Journal, 43(1), 198–211. https://doi.org/10.1108/pijpsm-07-2019-0107

Lawrence, P. R., & Lorsch, J. W. (1967). Differentiation and integration in complex organizations. Administrative Science Quarterly, 12(1), 1. https://doi.org/10.2307/2391211

Levi, M. (2017). Assessing the trends, scale and nature of economic cybercrimes: Overview and issues. Crime, Law and Social Change, 67(1), 3–20. https://doi.org/10.1007/s10611-016-9645-3

Levi, M., Doig, A., Gundur, R., Wall, D., & Williams, M. (2016). Cyberfraud and the implications for effective risk-based responses: Themes from UK research. Crime, Law and Social Change, 67(1), 77–96. https://doi.org/10.1007/s10611-016-9648-0

Levitt, H. M., Bamberg, M., Creswell, J. W., Frost, D. M., Josselson, R., & Suárez-Orozco, C. (2018). Journal article reporting standards for qualitative primary, qualitative meta-analytic, and mixed methods research in psychology: The APA Publications and Communications Board task force Report. American Psychologist, 73(1), 26–46. https://doi.org/10.1037/amp0000151

Loveday, B. (2017). Still plodding along? The police response to the changing profile of crime in England and Wales. International Journal of Police Science & Management, 19(2), 101–109. https://doi.org/10.1177/1461355717699634

Manavalan, M., & Chisty, N. M. A. (2019). Visualizing the Impact of Cyberattacks on Web-Based Transactions on Large-Scale Data and Knowledge-Based Systems. Engineering International, 7(2), 95-104. https://doi.org/10.18034/ei.v7i2.578

Manavalan, M., & Ganapathy, A. (2014). Reinforcement Learning in Robotics. Engineering International, 2(2), 113-124. https://doi.org/10.18034/ei.v2i2.572

Nouh, M., Nurse, J. R., Webb, H., & Goldsmith, M. (2019). Cybercrime investigators are users too: Understanding the socio-technical challenges faced by law enforcement [Workshop on Usable Security (USEC]. arXivLabs.

Novak, A. N., & Vilceanu, M. O. (2019). “The internet is not pleased”: Twitter and the 2017 Equifax data breach. The Communication Review, 22(3), 196–221. https://doi.org/10.1080/10714421.2019.1651595

Ntinda, K. (2019). Narrative research. Handbook of Research Methods in Health Social Sciences, 411–423. https://doi.org/10.1007/978-981-10-5251-4_79

Oltmann, S. (2016). Qualitative interviews: A methodological discussion the interviewer and respondent contexts. Qualitative Sociological Research, 17(2). https://doi.org/10.17169/fqs-17.2.2551

Peck, B., & Mummery, J. (2017). Hermeneutic constructivism: An ontology for qualitative research. Qualitative Health Research, 28(3), 389–407. https://doi.org/10.1177/1049732317706931

Poushter, J., & Manevich, D. (2017). Globally, people point to ISIS and climate change as leading security threats. Pew Research Center’s Global Attitudes Project. https://www.pewresearch.org/global/2017/08/01/globally-people-point-to-isis-and-climate-change-as-leading-security-threats/

Preis, B., & Susskind, L. (2020). Municipal cybersecurity: More work needs to be done. Urban Affairs Review, (1). https://doi.org/10.1177/1078087420973760

Promnick, G. (2017). Cyber economic espionage: Corporate theft and the new Patriot Act. Hastings Science & Technology Law Journal, 9(1), 89.

Rashid, Y., Rashid, A., Warraich, M. A., Sabir, S. s., & Wasseem, A. (2019). Case Study Method: A Step by-Step Guide for Business Researchers. International Journal of Qualiitative Methods, 18, 1-13. Sagepub. https://doi.org/10.1177/1609406919862424

Rubel, D., & Okech, J. (2017). Qualitative research in group work: Status, synergies, and implementation. The Journal for Specialists in Group Work, 42(1), 54–86. https://doi.org/10.1080/01933922.2016.1264522

Williams, R. T. (2018). Confidence Interventions: Do They Work?. Asian Journal of Humanity, Art and Literature, 5(2), 123-134. https://doi.org/10.18034/ajhal.v5i2.536

Williams, R. T. (2020). The Paradigm Wars: Is MMR Really a Solution?. American Journal of Trade and Policy, 7(3), 79-84. https://doi.org/10.18034/ajtp.v7i3.507

Willits, D., & Nowacki, J. (2016). The use of specialized cybercrime policing units: An organizational analysis. Criminal Justice Studies, 29(2), 105–124. https://doi.org/10.1080/1478601x.2016.1170282

Younies, H., & Al-Tawil, T. N. (2020). Effect of cybercrime laws on protecting citizens and businesses in the United Arab Emirates (UAE). Journal of Financial Crime, ahead-of-print (ahead-of-print), 1089–1105. https://doi.org/10.1108/jfc-04-2020-0055

--0--

Downloads

Published

2021-12-04

How to Cite

McKoy, C. (2021). Law Enforcement Officers’ Reaction on Traditional Crimes to Fight Cybercrime Locally. ABC Journal of Advanced Research, 10(2), 159-174. https://doi.org/10.18034/abcjar.v10i2.601

Similar Articles

11-19 of 19

You may also start an advanced similarity search for this article.