Repeat victimization has been widely studied from the perspective of environmental criminology for several decades. During this period, criminologists have identified a set of repeat victimization premises that are observed for many crimes; however, it is unknown whether these premises are also valid for cybercrime. In this study we rely on more than 9 million Zone-H data records from 2010 to 2017 to test whether these premises apply for the cybercrime of website defacement. We show that the phenomenon of repeat victimization is also observed in defaced cyber places (i.e. websites). In particular, we found that repeats contributed little to crime rates, that repeats occurred even several years after the original incident, that they were committed disproportionately by prolific offenders, and that few offenders returned to victimize previous targets. The results suggest that some traditional premises of repeat victimization may also be valid for understanding cybercrime events such as website defacement, implying that environmental criminology theories also constitute a useful framework for cybercrime analysis. The implications of these results in terms of criminological theory, cybercrime prevention, and the limitations derived from the use of Zone-H data are discussed
DOCUMENT
"Background: Victimization is highly prevalent in individuals with mild intellectual disability (MID) or borderline intellectual functioning (BIF) and is an important risk factor for mental health problems and violent behavior. Not much is known, however, about victimization history in women with MID-BIF admitted to forensic mental health care. Aims: The aim of this multicenter study is to gain insight into victimization histories and mental health problems of female forensic psychiatric patients with MID-BIF. Methods: File data were analyzed of 126 women with MID-BIF who have been admitted to one of five Dutch forensic psychiatric hospitals between 1990 and 2014 and compared to data of 76 female patients with average or above intellectual functioning and to a matched sample of 31 male patients with MID-BIF. Results: All forensic paients had high rates of victimization, but women with MID-BIF showed an even higher prevalence of victimization during both childhood and adulthood and more complex psychopathology compared to female patients without MID-BIF. Compared to male forensic patients with MID-BIF, women with MID-BIF were more often victim of sexual abuse during childhood. During adulthood, the victimization rate in these women was more than three times higher than in men. Conclusions: Victimization is a salient factor in female forensic patients with MID-BIF and more gender-responsive trauma-focused treatment is needed."
DOCUMENT
Repeat victimization has been widely studied from the perspective of environmental criminology for several decades. During this period, criminologists have identified a set of repeat victimization premises that are observed for many crimes; however, it is unknown whether these premises are also valid for cybercrime. In this study we rely on more than 9 million Zone-H data records from 2010 to 2017 to test whether these premises apply for the cybercrime of website defacement. We show that the phenomenon of repeat victimization is also observed in defaced cyber places (i.e. websites). In particular, we found that repeats contributed little to crime rates, that repeats occurred even several years after the original incident, that they were committed disproportionately by prolific offenders, and that few offenders returned to victimize previous targets. The results suggest that some traditional premises of repeat victimization may also be valid for understanding cybercrime events such as website defacement, implying that environmental criminology theories also constitute a useful framework for cybercrime analysis. The implications of these results in terms of criminological theory, cybercrime prevention, and the limitations derived from the use of Zone-H data are discussed.
DOCUMENT
While criminality is digitizing, a theory-based understanding of the impact of cybercrime on victims is lacking. Therefore, this study addresses the psychological and financial impact of cybercrime on victims, applying the shattered assumptions theory (SAT) to predict that impact. A secondary analysis was performed on a representative data set of Dutch citizens (N = 33,702), exploring the psychological and financial impact for different groups of cybercrime victims. The results showed a higher negative impact on emotional well-being for victims of person-centered cybercrime, victims for whom the offender was an acquaintance, and victims whose financial loss was not compensated and a lower negative impact on emotional well-being for victims with a higher income. The study led to novel scientific insights and showed the applicability of the SAT for developing hypotheses about cybercrime victimization impact. In this study, most hypotheses had to be rejected, leading to the conclusion that more work has to be done to test the applicability of the SAT in the field of cybercrime. Furthermore, policy implications were identified considering the prioritization of and approach to specific cybercrimes, treatment of victims, and financial loss compensation.
MULTIFILE
In order to find out whether victims adequately recover from cybercrime incidents, it is important to gain insight into its effects and impact on users. However, as it stands now, there is not much literature on the impact of cybercrime. We address this gap by qualitatively examining the impact of two types of cybercrime, namely phishing and malware attacks targeting online banking customers. We used the coping approach as a framework to study how victims deal with the negative events they have experienced. In order to study the impact of cybercrime and how victims cope with it, 30 cybercrime victims were interviewed. We observed that, next to financial damage, victims described different forms of psychological and emotional effects. Victims also reported various kinds of secondary impacts, such as time loss and not being treated properly when handling the incident. In addition, the interview data provided insight into cognitive and behavioral change, which potentially offers opportunities for cybercrime prevention. Our study demonstrates that the level of impact varies among cybercrime victims, ranging from little or no impact to severe impact. In addition, while some victims were only affected for a few days, some were still feeling the effects. The effects and impact of these fraudulent schemes on victims should therefore not be underestimated. We conclude that the coping approach provides a useful framework to study the effects and impact of cybercrime victimization and how victims recover from it. The results of our study provide a steppingstone for future studies on this topic. https://www.linkedin.com/in/rutgerleukfeldt/
DOCUMENT
Research shows that victimization rates in forensic mental health care are high for both female and male patients. However, gender differences have been found in types and patterns of victimization (more sexual abuse and more complex trauma for women), cognitive appraisal, and response to traumatic events. Gender-responsive treatments focusing on trauma have been designed to adhere to these gender differences; however, despite promising research results, these interventions are yet to be introduced in many settings. This study examined how trauma is addressed in current clinical practice in Dutch forensic mental health care, whether professionals are knowledgeable of gender differences in trauma, and how gender-responsive factors such as self-esteem, self-efficacy, social relations, and coping skills are considered in treatment for female patients. We used a mixed-method design consisting of an online survey and 33 semi-structured interviews with professionals and patients. The results suggested that Dutch forensic mental health care could address trauma more structurally, and professionals could be more aware of gender differences and gender-responsive factors. Early start of trauma treatment was deemed important but was not current practice according to patients. Based on this study, guidelines were developed for gender-responsive, trauma-informed work in forensic mental health care.
DOCUMENT
Entrepreneurs are likely to be victims of ransomware. Previous studies have found that entrepreneurs tend to adopt few preventive measures, thereby increasing their chances of victimization. Due to a lack of research, however, not much is known about why entrepreneurs lack self-protective behaviors and how they can be encouraged to change said behaviors. Therefore, the purpose of this study is to explain, by means of an extended model of the Protection Motivation Theory (PMT), the motivation for entrepreneurs using protective measures against ransomware in the future. The data for our study were collected thanks to a questionnaire that was answered by 1,020 Dutch entrepreneurs with up to 250 employees. Our Structural Equation Modelling (SEM) analysis revealed that entrepreneurs are more likely to take preventive measures against ransomware if they perceive the risk of ransomware as severe (perceived severity), if they perceive their company as being vulnerable (perceived vulnerability), if they are concerned about the risks (affective response), and if they think that the people and companies around them expect them to apply preventive measures (subjective norms). However, if entrepreneurs think that they are capable of handling the risk (self-efficacy) and are convinced that their adopted preventive measures are effective (response efficacy), they are less likely to take preventive measures. Furthermore, for entrepreneurs that outsource IT security, the significant effect of perceived vulnerability and subjective norms disappears. The likelihood of entrepreneurs protecting their business against ransomware is thus influenced by a complex interplay of various motivational factors and is partly dependent on the business’ characteristics. Based on these findings, we will discuss security professionals’ prospects for increasing the cyber resilience of entrepreneurs, thus preventing cybercrime victimization.
DOCUMENT
Gender differences in victimization were retrospectively examined in 218 male and 218 female patients who have been admitted to one of four Dutch forensic psychiatric hospitals between 1984 and 2014. Case files were studied and variables relating to victimization and psychopathology were coded. It was found that the prevalence rates of victimization were higher among female patients than among male patients, both during childhood and adulthood. Childhood sexual abuse was found to be more prevalent among women than men, however, no differences were found for emotional and physical abuse or neglect during childhood. Women with a history of emotional or sexual abuse were significantly more often diagnosed with borderline personality disorder than women without childhood victimization. Men with a history of physical abuse were significantly more often diagnosed with antisocial personality disorder than men without childhood victimization. Clinical and policy implications of this study for forensic practice are discussed.
LINK
The outbreak of the COVID-19 virus in December 2019 and the restrictive measures that were implemented to slow down the spread of the virus have had a significant impact on our way of life. The sudden shift from offline to online activities and work may have resulted in new cybersecurity risks. The present study therefore examined changes in the prevalence, nature and impact of cybercrime among Dutch citizens and SME owners, during the pandemic. Qualitative interviews with ten experts working at various public and private organizations in the Netherlands that have insights into cybercrime victimization and data from victim surveys administrated in 2019 and 2021 were analyzed. The results show that there was only a small, non-statistically significant increase in the prevalence of cybercrime during the pandemic among citizens and SME owners. Nevertheless, the COVID-19 pandemic did have an impact on the modus operandi of cybercriminals: victims indicated that a considerable proportion of the offenses was related to the COVID-19 pandemic, particularly in the case of online fraud. Moreover, the use of new applications and programs for work was associated with an increased risk of cybercrime victimization during the COVID-19 crisis. These results suggest that increases in rates of registered cybercrime that were found in previous studies might be the consequence of a reporting effect and that cybercriminals adapt their modus operandi to current societal developments.
DOCUMENT
This research adopts a social constructionist perspective and utilizes qualitative inquiry with a generative approach (McNamee, Gergen, Camargo-Borges, Rasera, 2020). The focus lies on collaborative efforts between the researcher and trafficking survivors, aiming to mutually shape and understand the experiences of trafficking, while fostering relational agency. The aim is to co-construct a relational space in which counter-narratives on victimization can be generated. Ten interviews were carried out with women survivors of trafficking at the Anti-Trafficking System of the N.A.Ve Project (Veneto Region AntiTrafficking Network). These women were from different nationalities and experiences of exploitation. We referred to the principles of Appreciative Inquiry, and formulated an episodic interview (Flick, 2023) composed by circular and reflexive questions, as well as generative questions inspired by the items of the Post Traumatic Growth Inventory(Romaioli, 2022). The critical reflexivity of the researcher and the research team was enhanced through an autoethnography and reflection work. A reflexive thematic analysis (Braun & Clarke, 2022) was performed on the gathered textual material, generating five themes: resources/strengths, relationships, future, helpful aspects, momentary feelings.This inquiry illustrates the potentials offered by a methodology inspired by a social constructionist perspective with a generative approach.
DOCUMENT