In this article, Smith takes an objective view of cyberspace’s impact and
how that has affected cybersecurity and its effectiveness. They review how
cyberspace has “unique characteristics” that make evaluating the activity
different than in traditional spaces (Smith, 2024). By using an objective way to
deliver their investigation on human and cyber behaviors, it makes sense to
connect their message with mitigation, because they are trying to understand
the vulnerabilities and how they will impact communities, and they do this by
looking at the patterns and history of cyber vulnerabilities.
Although the format of these crimes has evolved, the motives of the crimes
are derived from the same interpersonal motives that have been discovered and
studied. Psychology and criminology have paved the way for discovering and
evolving an interdisciplinary understanding of cybersecurity, and “encapsulates
the complexity of cybercrime” (Smith, 2024). Because of the psychological
reasoning and understanding of crime, we can apply social learning theory (SLT)
and routine activities theory (RAT) when evaluating the motives and patterns of
cybercrime, retracing the steps that lead to the crime.
The challenges the research found were that both theories had limits that
didn’t cover the full individual being’s behavioral complexities. They look into
gratification theory to shed light on this neglect because it would give an
explanation to “the desire” that comes along with many crime motives (Smith,
2024). In the boy of the article, they review different personality types like
narcissism and anti-social behavior found that they all feel a ned for gratification
of some kind. Because gratification comes in different forms for different people,
it acknowledges the complexity of an individual’s behavior and how every person
will require different incentives that lead to different motives, such as money or
peer approval.
Conclusion
In Trot Smith’s article, they take horse law, or psychology and criminology
principles, when discussing crimes, and suggest applying it to cyber crimes.
Their plan for finding a method that proves this theory is through “synthesizing
concepts” that would allow full coverage of an individual’s personality, which will
give reason to motive for crime, and applies to the cyber world where crime is
made more accessible and allows for more complex motives (Smith, 2024).
Smith, T. PhD (2024). Integrated Model of Cybercrime Dynamics: A Comprehensive Framework
for Understanding Offending and Victimization in the Digital Realm. International Journal of
Cybersecurity Intelligence & Cybercrime, 7(2), – . DOI: https://doi.org/10.52306/2578-3289.1163
https://vc.bridgew.edu/ijcic/vol7/iss2/4