Understanding Cyber Crime And Social Behavior in the Digital Age
Introduction:
The article explores how cybercrime is influenced by human behavior, social structures, and
technological access. The main takeaway (BLUF) is that cybercrime is not just a technical issue,
but heavily shaped by social science factors like environment, opportunity, and behavior
patterns.
Relation/Connection to Social Science Principles:
The article connects to several social science principles. First, it reflects rational choice theory,
showing how people make calculated decisions to commit cybercrime based on risk vs. reward.
Second, it relates to social learning theory, where people learn cybercriminal behavior through
online communities and peer influence. Third, the article highlights routine activity theory,
explaining that cybercrime occurs when a motivated offender, a suitable target, and the lack of
guardianship exist online. These principles help explain why cybercrime continues to grow as
technology becomes more accessible.
Research Question/Hypothesis/Independent Variable/Dependent Variable:
The main research question focuses on how social and environmental factors influence
cybercriminal behavior. The hypothesis suggests that people exposed to certain online
environments and opportunities are more likely to engage in cybercrime. The independent
variables include factors like access to technology, social exposure to cybercrime, and online
environments. The dependent variable is the likelihood or occurrence of cybercriminal behavior.
Types of Research Methods Used:
The study primarily uses qualitative research methods, including analysis of existing literature
and case studies related to cybercrime. It may also incorporate some quantitative elements, such
as statistical data on cybercrime trends. Data is collected through academic sources, reports, and
documented cybercrime cases.
Types of Data Analysis Used:
The authors use thematic analysis to identify patterns in cybercriminal behavior and trends
across different cases. They also rely on comparative analysis to examine how different social
factors influence cybercrime. This allows them to connect behavior patterns with broader social
science theories.
Connections to Other Course Concepts:
This study connects to several concepts discussed in class. For example, it reinforces the idea of
security fatigue, where users become careless online, increasing vulnerability. It also relates to
social engineering, as cybercriminals exploit human behavior rather than just technical
weaknesses. Additionally, the article supports the concept of risk perception, showing that people
often underestimate cybersecurity threats, making them easier targets.
Connections to the Concerns or Contributions of Marginalized Groups:
The article highlights that marginalized group maybe more vulnerable to cybercrime due to
limited access to cybersecurity education and resources. For example, individuals from lower
income backgrounds may lack awareness of online threats, making them easier targets. At the
same time, these groups can also contribute to cybersecurity solutions by bringing diverse
perspectives and experiences that improve threat detection and prevention strategies.
Conclusion to Societal Contributions of the Study:
In conclusion, the study contributes to society by emphasizing that cybersecurity is not just about
technology, but also about understanding human behavior. It helps improve awareness of how
social factors influence cybercrime and encourages better education and prevention strategies.
The research advances our understanding of the relationship between cybersecurity and social
sciences, making it easier to develop more effective solutions to cyber threats.
References:
Vishing and Smishing Perpetrators and Their Victims in Nigerian Slums. Lateef J Adeyemo,
Tirimisiyu Y Olabulo, and Idenyi G. Peter


