An Empirical Test of The Space Transition Theory of Cyber Criminality: Investigating Cybercrime Causation Factors in Ghana

نویسنده

  • P. Danquah
چکیده

The Space Transition Theory (Jaishankar 2008) presupposes that people behave differently in the cyber world from the physical world amongst other postulates that seek to explain cyber criminal behavioural patterns. (Wall 2001) categorized cyber crime into the four main types of cyber trespass, cyber deception and theft, cyber pornography and cyber violence. This research sought test the postulates of the theory to determine if they form a viable and reliable basis for predicting or determining the occurrence of cyber crime. This was done by identifying the causal relationships between the first six postulates of the Space Transition Theory and the various categories of cyber crime. Primary data from Ghana was used together with secondary data from other parts of the world to test the theory. Findings from the research showed some limitations in the variety of cyber crimes perpetrated and experienced in Ghana. Our research also established that fact that the Space Transition theory’s postulates are not absolutely applicable to all categories of cyber crime. These outcomes serves as a significant reference point for both researchers, policy makers and anti cyber crime researchers. KeywordsCyber crime, Ghana, Africa, Behaviour, Security, Cyber Criminals.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Crime and Criminality in Ghana: Its Forms and Implications

This paper investigates the prevalence of cyber crimes in Ghana and its impact on ICT adoption. Through a qualitative approach, we explore efforts by organizations and organs of government in Ghana towards curtailing cyber crimes in terms of apprehension, prosecution, reporting, and law enforcement. Findings from our research showed that although awareness of cyber crimes is on the increase, th...

متن کامل

Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic

The COVID-19 pandemic was a remarkable and unprecedented event that changed the lives of billions of citizens around the world and resulted in what is known as a new term in terms of social norms and lifestyles. In addition to the tremendous impact on society and business in general, the epidemic created a unique set of cybercrime circumstances that also affected society and business. Increased...

متن کامل

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

An analytic overview on the rise of cyber spaces and the Islamic Society: An urban challenge or natural transition of cities?

Moving toward third millennium is characterized by capabilities in transforming human life. Specially, development of information technologies in everyday life lead to great changes in communication tools andour current understanding ofurban social life. Indeed, telecommunications because of independency from time—space constraints, provide a new unlimited space for social interactions in globa...

متن کامل

Global Mapping of Cyber Attacks

Identifying factors behind countries’ weakness to cyber-attacks is an important step towards addressing these weaknesses at the root level. For example, identifying factors why some countries become cybercrime safe heavens can inform policy actions about how to reduce the attractiveness of these countries to cyber-criminals. Currently, however, identifying these factors is mostly based on exper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011