1. How does cyber technology impact interactions between offenders and victims?
2. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
Cybercrimes tend to be committed in a different context than traditional crimes, which may lead to different risk factors for both offending and victimization. In cybercrime there is no physical convergence in space and time of offenders and victims. Previous research suggests that victims and offenders eventually interact with one another in order for cybercrime to occur, even it occurs asynchronously. This may account for the association identified between cybercrime offending and the increased risk of victimization. Research examining the association between cybercrime offending and victimization has largely focused on forms of cybercrime that do not require technical expertise or are dependent on technology, such as fraud, bullying, or piracy. New and more technical computer-dependent crimes, cyber-trespass have received less attention from researchers. Research on malware victimization found individuals with malicious software infections were more likely to engage in online deviance. I think we should approach the development of cyber-policy and infrastructure like how we should treat anything else we care about. It should be approached as being secured as possible. As technology continues to evolve so are threats and risks and because of that we should be on constant alert and never get too comfortable as these threats are far more dangerous than they have been before. We should constantly be attempting to find new and creative ways to mitigate risks even the there is a “short arm” of perspective knowledge. It is better to have something in place that you know stands a chance than to have nothing at all and risk information being breached causing a whole new set of problems to resolve. This is something that needs to be addressed carefully as very valuable and sensitive information could be at risk. These things should be taken into consideration as there are always going to be new threats and attacks set ahead with the intent of taking information and the constant development of cyber-policy and infrastructure should stop it in its tracks for the safety of the internet and those who may fall victim to it.
https://www.tandfonline.com/doi/full/10.1080/01639625.2017.1411030