Digital Forensics and Cyber Crime. 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers

Research Article

Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study

Download
587 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-39891-9_7,
        author={Ibrahim Baggili and Moza Shamlan and Bedoor Jabri and Ayesha Zaabi},
        title={Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study},
        proceedings={Digital Forensics and Cyber Crime. 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers},
        proceedings_a={ICDF2C},
        year={2013},
        month={10},
        keywords={Cybercrime psychology censorship Internet proxy UAE},
        doi={10.1007/978-3-642-39891-9_7}
    }
    
  • Ibrahim Baggili
    Moza Shamlan
    Bedoor Jabri
    Ayesha Zaabi
    Year: 2013
    Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study
    ICDF2C
    Springer
    DOI: 10.1007/978-3-642-39891-9_7
Ibrahim Baggili1,*, Moza Shamlan2,*, Bedoor Jabri2,*, Ayesha Zaabi2,*
  • 1: University of New Haven
  • 2: Zayed University
*Contact email: Ibrahim.Baggili@zu.ac.ae, m80001612@zu.ac.ae, budur44@hotmail.com, ayesha.alzaabi@hotmail.com

Abstract

Countries have employed the Internet proxy as a censorship mechanism for various reasons. Concurrently, cyber criminal activities continue to rise. This research explores peoples’ engagement in bypassing the Internet proxy and if it is related to cyber criminal engagement. Through an experimental design, participants were randomly assigned to three groups. Using manipulation paragraphs, in the first group (Group 1), a positive view on the Internet proxy was presented. In the second group (Group 2), a negative view on the Internet proxy was presented. The third group (Group 3) was used as the control group, where the participants’ view of the Internet proxy was not manipulated. All three groups were asked to self-report their rate of proxy bypass (SRPBE) and cybercrime engagement (CCI). The results indicated a significant positive correlation between self-reported cyber criminal engagement and self-reported proxy bypass engagement. The results also showed that individuals with more knowledge in computers are more likely to bypass the Internet proxy. However, individuals with better knowledge in computers are not necessarily the ones that are more likely to commit cyber criminal activities. The results were inconclusive on whether or not the manipulation paragraphs used had an effect on the participants’ view of the Internet Proxy.