<?xml version="1.0" encoding="UTF-8"?>
<Item xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" Autonumber="false" id="X-DD802_1" TextType="CompleteItem" SchemaVersion="2.0" PageStartNumber="0" Template="Generic_A4_Unnumbered" Module="default" DiscussionAlias="Discussion" ExportedEquationLocation="" SessionAlias="" SecondColour="None" ThirdColour="None" FourthColour="None" Logo="colour" ReferenceStyle="OU Harvard" Rendering="OpenLearn" xsi:noNamespaceSchemaLocation="http://www.open.edu/openlearn/ocw/mod/oucontent/schemas/v2_0/OUIntermediateSchema.xsd" x_oucontentversion="2020051800">
    <meta name="aaaf:olink_server" content="http://www.open.edu/openlearn/ocw"/>
    <meta content="false" name="vle:osep"/>
    <meta content="mathjax" name="equations"/>
    <!--ADD CORRECT OPENLEARN COURSE URL HERE:<meta name="dc:source" content="http://www.open.edu/openlearn/education/educational-technology-and-practice/educational-practice/english-grammar-context/content-section-0"/>-->
    <CourseCode>dd802_1</CourseCode>
    <CourseTitle><!--can be blank--></CourseTitle>
    <ItemID><!--leave blank--></ItemID>
    <ItemTitle>The psychology of cybercrime</ItemTitle>
    <FrontMatter>
        <Imprint>
            <Standard>
                <GeneralInfo>
                    <Paragraph><b>About this free course</b></Paragraph>
                    <Paragraph>This free course is an adapted extract from <a href="http://www.open.ac.uk/postgraduate/modules/dd802">DD802 <i>Investigating forensic psychology</i>.</a><!--[MODULE code] [Module title- Italics] THEN LINK to Study @ OU page for module. Text to be page URL without http;// but make sure href includes http:// (e.g. <a href="http://www3.open.ac.uk/study/undergraduate/course/b190.htm">www3.open.ac.uk/study/undergraduate/course/b190?LKCAMPAIGN=ebook_&amp;amp;MEDIA=ou</a>)] -->.</Paragraph>
                    <Paragraph>This version of the content may include video, images and interactive content that may not be optimised for your device. </Paragraph>
                    <Paragraph>You can experience this free course as it was originally designed on OpenLearn, the home of free learning from The Open University –<a href=" https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-0">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-0</a></Paragraph>
                    <!--[course name] hyperlink to page URL make sure href includes http:// with trackingcode added <Paragraph><a href="http://www.open.edu/openlearn/money-management/introduction-bookkeeping-and-accounting/content-section-0?LKCAMPAIGN=ebook_&amp;amp;MEDIA=ol">www.open.edu/openlearn/money-management/introduction-bookkeeping-and-accounting/content-section-0</a>. </Paragraph>-->
                    <Paragraph>There you’ll also be able to track your progress via your activity record, which you can use to demonstrate your learning.</Paragraph>
                </GeneralInfo>
                <Address>
                    <AddressLine/>
                    <AddressLine/>
                </Address>
                <FirstPublished>
                    <Paragraph/>
                </FirstPublished>
                <Copyright>
                    <Paragraph>Copyright © 2020 The Open University</Paragraph>
                </Copyright>
                <Rights>
                    <Paragraph/>
                    <Paragraph><b>Intellectual property</b></Paragraph>
                    <Paragraph>Unless otherwise stated, this resource is released under the terms of the Creative Commons Licence v4.0 <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB">http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB</a>. Within that The Open University interprets this licence in the following way: <a href="http://www.open.edu/openlearn/about-openlearn/frequently-asked-questions-on-openlearn">www.open.edu/openlearn/about-openlearn/frequently-asked-questions-on-openlearn</a>. Copyright and rights falling outside the terms of the Creative Commons Licence are retained or controlled by The Open University. Please read the full text before using any of the content. </Paragraph>
                    <Paragraph>We believe the primary barrier to accessing high-quality educational experiences is cost, which is why we aim to publish as much free content as possible under an open licence. If it proves difficult to release content under our preferred Creative Commons licence (e.g. because we can’t afford or gain the clearances or find suitable alternatives), we will still release the materials for free under a personal end-user licence. </Paragraph>
                    <Paragraph>This is because the learning experience will always be the same high quality offering and that should always be seen as positive – even if at times the licensing is different to Creative Commons. </Paragraph>
                    <Paragraph>When using the content you must attribute us (The Open University) (the OU) and any identified author in accordance with the terms of the Creative Commons Licence.</Paragraph>
                    <Paragraph>The Acknowledgements section is used to list, amongst other things, third party (Proprietary), licensed content which is not subject to Creative Commons licensing. Proprietary content must be used (retained) intact and in context to the content at all times.</Paragraph>
                    <Paragraph>The Acknowledgements section is also used to bring to your attention any other Special Restrictions which may apply to the content. For example there may be times when the Creative Commons Non-Commercial Sharealike licence does not apply to any of the content even if owned by us (The Open University). In these instances, unless stated otherwise, the content may be used for personal and non-commercial use.</Paragraph>
                    <Paragraph>We have also identified as Proprietary other material included in the content which is not subject to Creative Commons Licence. These are OU logos, trading names and may extend to certain photographic and video images and sound recordings and any other material as may be brought to your attention.</Paragraph>
                    <Paragraph>Unauthorised use of any of the content may constitute a breach of the terms and conditions and/or intellectual property laws.</Paragraph>
                    <Paragraph>We reserve the right to alter, amend or bring to an end any terms and conditions provided here without notice.</Paragraph>
                    <Paragraph>All rights falling outside the terms of the Creative Commons licence are retained or controlled by The Open University.</Paragraph>
                    <Paragraph>Head of Intellectual Property, The Open University</Paragraph>
                </Rights>
                <Edited>
                    <Paragraph/>
                </Edited>
                <Printed>
                    <Paragraph/>
                </Printed>
                <ISBN><!--INSERT EPUB ISBN WHEN AVAILABLE (.kdl)-->
        <!--INSERT KDL ISBN WHEN AVAILABLE (.epub)--></ISBN>
                <Edition/>
            </Standard>
        </Imprint>
        <Introduction>
            <Title>Introduction</Title>
            <Paragraph>In this free course, <i>The psychology of cybercrime</i>, you will explore different questions about cybercrime from a psychological angle in an attempt to better understand this relatively recent field of psychology. You will consider the realms and limits of cybercrime, distinguishing between the different types of cybercrime (e.g. trolling, cyber-stalking, fraud, hacking), the experiences of being victims of cybercrime and the causes behind engaging in these types of criminal activity. Finally, current interventions will be highlighted. </Paragraph>
            <Paragraph>Even though cybercrime is broadly encompassing all the different types of crime committed online, it is important to emphasise very early on that it is likely to be committed by offenders with different characteristics, motivations and behaviours than those who commit other types of crime. As a result, those online criminal activities share similarities with offline equivalents (e.g. fraud and online fraud). The interest in studying the psychology of cybercrime both from the perpetrator and victim perspectives has arisen in an attempt to understand what makes cybercrime unique or similar to its offline counterpart.</Paragraph>
            <Box type="style2">
                <Heading>Content warning</Heading>
                <Paragraph>Cybercrime victimisation can <?oxy_delete author="sm36828" timestamp="20200810T100251+0100" content="touch"?><?oxy_insert_start author="sm36828" timestamp="20200810T100251+0100"?>affect<?oxy_insert_end?> both adults and children who engage online. Please find links to two useful guides that give tips on to stay safe online:</Paragraph>
                <NumberedList class="decimal">
                    <ListItem><a href="https://www.westyorkshire.police.uk/sites/default/files/a_guide_to_cyber_crime_and_online_safety_0.pdf">Cybercrime and online safety</a> developed by West Yorkshire police.</ListItem>
                    <ListItem><a href="https://www.net-aware.org.uk/news/supporting-your-childs-wellbeing-online/">Supporting your child’s wellbeing</a> by the NSPCC.</ListItem>
                </NumberedList>
            </Box>
            <Paragraph>This Open Learn course is an adapted extract from the Open University course <a href="http://www.open.ac.uk/postgraduate/modules/dd802">DD802 <i>Investigating forensic psychology</i>.</a> Explore the collection of <a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/postgraduate-study-psychology-and-criminology">Postgraduate study in psychology and criminology</a>.</Paragraph>
        </Introduction>
        <LearningOutcomes>
            <Paragraph>After studying this course you should be able to:</Paragraph>
            <LearningOutcome>outline <?oxy_delete author="sm36828" timestamp="20200810T100524+0100" content="its"?><?oxy_insert_start author="sm36828" timestamp="20200810T100525+0100"?>the<?oxy_insert_end?> impact on victims</LearningOutcome>
            <LearningOutcome>distinguish different types of cybercrime, considering the similarities and differences in the definitions and behaviours</LearningOutcome>
            <LearningOutcome>identify the motivations and behaviours of cybercriminals</LearningOutcome>
            <LearningOutcome>illustrate the current interventions to tackle cybercrime.</LearningOutcome>
        </LearningOutcomes>
        <Covers>
            <?oxy_attributes src="&lt;change type=&quot;modified&quot; oldValue=&quot;\\dog\printlive\nonCourse\OpenLearn\Courses\DD226_1\video\dd226_ol_epub_1400x1200.jpg&quot; author=&quot;sm36828&quot; timestamp=&quot;20200810T133759+0100&quot; /&gt;"?>
            <Cover template="false" type="ebook" src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd802_ol_template_epub_1400x1200.jpg"/>
            <?oxy_attributes src="&lt;change type=&quot;modified&quot; oldValue=&quot;\\dog\printlive\nonCourse\OpenLearn\Courses\DD226_1\video\dd226_ol_pdfimage_19x12-6_300d.jpg&quot; author=&quot;sm36828&quot; timestamp=&quot;20200810T133732+0100&quot; /&gt;"?>
            <Cover template="false" type="A4" src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd802_pdfimage_19x12-6_300d.jpg"/>
        </Covers>
    </FrontMatter>
    <Unit>
        <UnitID><!--leave blank--></UnitID>
        <UnitTitle><!--leave blank--></UnitTitle>
        <Session>
            <Title>1 What is cybercrime?</Title>
            <Paragraph>Cybercrime refers to criminal activities that are committed using internet technology. The internet has only been in widespread use by the general public for a few decades (a ‘start date’ could be considered to be the launch of the World Wide Web on the 6 August 1991), but online activity has already become ubiquitous in the developed world and is becoming progressively more common in much of the developing world as well<?oxy_delete author="sm36828" timestamp="20200817T091714+0100" content="."?><?oxy_insert_start author="sm36828" timestamp="20200817T091653+0100"?> (Naughton, 2016).<?oxy_insert_end?></Paragraph>
            <Paragraph>Psychologists studying cybercrime, including its perpetrators and victims, are interested both in what makes cybercrime unique (e.g. does online anonymity increase the propensity of some people to commit crimes of harassment?) as well as what it has in common with offline crime – although the emphasis is often on the former rather than the latter.</Paragraph>
            <Paragraph>Before reading further complete Activity 1.<?oxy_insert_start author="sm36828" timestamp="20200817T092008+0100"?> In order to help you complete the activity, please watch the following video and then consider your perspectives on living online.<?oxy_insert_end?></Paragraph>
            <?oxy_delete author="sm36828" timestamp="20200914T154040+0100" content="&lt;EditorComment&gt;I think we need to bring this video in a little more, something like, watch the video and then answer the following questions, or having watched the video, consider your perspectives on.… At the moment it feels a little lost. (this is assuming we get rights clearance to use it! Will chase up this week.) &lt;/EditorComment&gt;"?>
            <?oxy_attributes src="&lt;change type=&quot;modified&quot; oldValue=&quot;\\dog\printlive\nonCourse\OpenLearn\Courses\dd802_1\dd210_2015j_vid202-320x176.mp4&quot; author=&quot;sm36828&quot; timestamp=&quot;20200914T153730+0100&quot; /&gt;" type="&lt;change type=&quot;modified&quot; oldValue=&quot;video&quot; author=&quot;sm36828&quot; timestamp=&quot;20200914T153730+0100&quot; /&gt;"?>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd210_2015j_vid202-320x176.mp4" type="video" width="512" x_manifest="dd210_2015j_vid202_1_server_manifest.xml" x_filefolderhash="78ad59c7" x_folderhash="78ad59c7" x_contenthash="61d99f91" x_subtitles="dd210_2015j_vid202-320x176.srt">
                <Caption>Video 1 Everyday perspectives: engaging online <?oxy_delete author="sm36828" timestamp="20200914T154043+0100" content="&lt;EditorComment&gt;Asset 293461&lt;/EditorComment&gt;"?></Caption>
                <Transcript>
                    <Speaker>OMER</Speaker>
                    <Remark>It's, wherever I can, whenever I need it, I think. I'm not a really big social network user. Unless I have to get in contact with someone, I don't think I'll jump on it. It's a really good means of getting in contact with everyone and keeping up with everyone and what not. But usage terms, I don't think I use it too much. </Remark>
                    <Speaker>JASON</Speaker>
                    <Remark>With a mobile phone in your hand now it's pretty much the way of communicating with everybody. I mean, I use social media obviously. I use Facebook for personal usage, keeping in touch with friends and family that are all across the globe. And obviously, Twitter we use obviously as work purposes. </Remark>
                    <Remark>But I think, yeah, constantly, it's the first thing you check when you get up to see what's been going on the night before or, so that sort of stuff. So I think, yeah definitely, I'm quite a heavy Facebook user, if you like. </Remark>
                    <Speaker>NOEL</Speaker>
                    <Remark>I look things up. I occasionally order things on the internet. I am on Facebook. I'm not on Twitter. When I was working with asylum, I used it all the time for research. I do write a little bit now, and I use it for research. Mostly recipes, it must be said, at the moment. But yeah, I use it for those sorts of things, to find things out. </Remark>
                    <Speaker>JESS</Speaker>
                    <Remark>I use the internet a lot. I have a Facebook. I rely on emails for everything. Facebook, which is obviously for friends, I use that a lot for work. I know that I've got jobs in the past that I wouldn't have got without a Facebook. I don't own a television, so if I watch anything, that's online. Keeping in touch with friends is almost exclusively online, I'd say. Yeah, a lot of my life is online. </Remark>
                    <Speaker>ALEX</Speaker>
                    <Remark>So I've had my Facebook account since I was 15 years old at the pressure of all my peers, as most of the people. I've got a LinkedIn account since I've been in the professional world. I love LinkedIn. I've got a Twitter account that I only set up about three months ago together with my blog. I don't have an Instagram. </Remark>
                    <Remark>I think that's about it from the social media interaction. 80% of the time I'm on all these social media networks through my mobile. 20% in the evening when I get home or sometimes on the weekend. But mobile is the, by far, number one. </Remark>
                </Transcript>
                <?oxy_delete author="sm36828" timestamp="20200914T153640+0100" content="&lt;Transcript&gt;&lt;Remark&gt;[How do you engage online?]&lt;/Remark&gt;&lt;Speaker&gt;DAVID&lt;/Speaker&gt;&lt;Remark&gt;Mostly, it comes through my smartphone at the moment, which does fortunately do everything nowadays. Predominantly through work, it’s email and internet-based, and I think I’m a little bit old to be caught up in the whole Facebook thing, but I do use LinkedIn and more professional-structured social media. &lt;/Remark&gt;&lt;Speaker&gt;OMER&lt;/Speaker&gt;&lt;Remark&gt;It’s whenever I need it, I think. I’m not a really big social-network user, unless I have to get in contact with someone, I don’t think I’ll jump on it. It’s a really good means of getting in contact with everyone, and keeping up with everyone, but like usage times, I don’t think I use it too much. &lt;/Remark&gt;&lt;Speaker&gt;JASON&lt;/Speaker&gt;&lt;Remark&gt;With a mobile phone in your hand, now, it’s pretty much the way of communicating with everybody. I mean I use social media, obviously, use Facebook for personal usage – keeping in touch with friends and family that are across the globe. And, obviously, Twitter we use, obviously, as work purposes. &lt;/Remark&gt;&lt;Remark&gt;But I think, yeah, constantly it’s the first thing you check when you get up, to see what’s been going on on the night before or ... that sort of stuff. So I think that, yeah, definitely, I’m a quite heavy Facebook user, if you like. &lt;/Remark&gt;&lt;Speaker&gt;NOEL&lt;/Speaker&gt;&lt;Remark&gt;I look things up. I occasionally order things on the internet. I am on Facebook. I’m not on Twitter. When I was working with asylum I used it all the time for research. I do write a little bit now and I use it for research, mostly recipes – just said a moment ago. But, yeah, I use it for those, sort of to find things out. &lt;/Remark&gt;&lt;Speaker&gt;JESS&lt;/Speaker&gt;&lt;Remark&gt;I use the internet a lot. I have a Facebook. I rely on emails for everything. Facebook, – which is obviously for friends – I use that a lot for work. I know that I’ve got jobs in the past that I wouldn’t have got without a Facebook. &lt;/Remark&gt;&lt;Remark&gt;I don’t own a television. So if I watch anything, that’s online. Keeping in touch with friends is almost exclusively online, I’d say. And, yeah, a lot of my life is online. &lt;/Remark&gt;&lt;Speaker&gt;ALEX&lt;/Speaker&gt;&lt;Remark&gt;I’ve had my Facebook account since I was 15 years old at the pressure of all my peers, as I think of most of the people. I’ve got a LinkedIn account, since I’ve been in the professional world. I love LinkedIn. &lt;/Remark&gt;&lt;Remark&gt;I’ve got a Twitter account that I only set up about three months ago together with my blog. I don’t have any Instagram. I think that’s about it from the social media and interaction. &lt;/Remark&gt;&lt;Remark&gt;Eighty per cent of the time I am on all these social media networks through my mobile – 20 per cent in the evening when I get home, or sometimes on the weekend, but mobile is the ... by far, number one. &lt;/Remark&gt;&lt;Speaker&gt;CHRISTIE&lt;/Speaker&gt;&lt;Remark&gt;I’m fairly unbothered by the online world, to be honest. I mean I have an iPad, I use a laptop. But, mostly, if I’m on the internet, I use it for Facebook, occasionally, news, news and reading a few articles in newspapers, and that kind of thing. &lt;/Remark&gt;&lt;Remark&gt;[What changes have you seen?] &lt;/Remark&gt;&lt;Speaker&gt;JASON&lt;/Speaker&gt;&lt;Remark&gt;I can remember not having anything. I remember having to talk to people before things like texting. And I think for me, in terms of society, it’s what’s now acceptable forms of communication is completely different to when I was a child, and even as a young adult, to a degree. &lt;/Remark&gt;&lt;Speaker&gt;NOEL&lt;/Speaker&gt;&lt;Remark&gt;Being old, I get annoyed by the fact I’m with a group of people, they’re all on their bloody phones or ... They’re not here now; they’re permanently elsewhere. They’re only a quarter observing what you’re saying, and they’re fiddling away; they drive you round the twist. I try not to do that. So you’re sat in a room, you’re not really with them. &lt;/Remark&gt;&lt;Speaker&gt;DAVID&lt;/Speaker&gt;&lt;Remark&gt;It’s actually quite amusing, because I’ve got colleagues who are slightly older than me, and colleagues who are slightly younger, and I’m sort of in the middle. So I’ve seen both aspects of it. Some of my older colleagues, you know, speak fondly of the days when you added things up in pencil, and some of my younger colleagues don’t even know what they’re talking about. &lt;/Remark&gt;&lt;Speaker&gt;ALEX&lt;/Speaker&gt;&lt;Remark&gt;I’m quite thankful for a childhood without Facebook and all this social media. You know, at a time when we used to kind of go and get our neighbour on the bike, you know, ring the bell to see if your neighbour is there, rather than just contacting them through Facebook, and just not really having to know about so much about everyone’s life, the way you find out from Facebook and other social media. &lt;/Remark&gt;&lt;Remark&gt;[How do people identify online?] &lt;/Remark&gt;&lt;Speaker&gt;DAVID&lt;/Speaker&gt;&lt;Remark&gt;You’ve probably heard people talking in the past when it was all about telephones and letters, then people were perceived to be very different on the telephone to a face-to-face meeting, or in writing, compared to in person, and being online is very much the same thing. Your perception of someone through an email or a Facebook interaction will often be extremely different from what they’re physically like in person. &lt;/Remark&gt;&lt;Speaker&gt;OMER&lt;/Speaker&gt;&lt;Remark&gt;I don’t really like the idea of having a personal profile, and then constructing it to be as close to how you are, because I don’t think it could portray me as a person very well at all. So I don’t really like sort of dabble with it too much, unless I have to get in contact with someone. It’s a really good means of getting in contact with everyone. &lt;/Remark&gt;&lt;Speaker&gt;JASON&lt;/Speaker&gt;&lt;Remark&gt;You know, there’s always going to be people that portray themselves in a different light because they have the tools to do that. They have the tools to check-in wherever they’re going to be, and do all these kind of different things, and just to share where they are. So I think, definitely you maybe feel a little bit of pressure to try and be a bit more exciting than you actually are. &lt;/Remark&gt;&lt;Speaker&gt;NOEL&lt;/Speaker&gt;&lt;Remark&gt;People can be what they want to be. You know, you think you’re talking to some young 18-year-old, and it’s some sort of 50-year-old plumber in Bournemouth. Who knows who you’re talking to? You can actually be a different character. And that can be very healthy or very sinister, depending on what it leads to. &lt;/Remark&gt;&lt;Speaker&gt;CHRISTIE&lt;/Speaker&gt;&lt;Remark&gt;Perhaps because I’ve seen friends kind of put too much information – you know, photographs of when they’re drunk, or whatever – on, I feel slightly suspicious, and slightly hold myself back from putting too much information on there, because really what you’re doing when you’re putting it on a website, effectively you’re publishing. &lt;/Remark&gt;&lt;Speaker&gt;ALEX&lt;/Speaker&gt;&lt;Remark&gt;The online space is a place where we can go and be whatever we want to be. It does let us be more creative; it does remove our limitations, I think. So, in a way it’s a good thing, because you can be what you aspire to be. I feel like I’m a freer person online. &lt;/Remark&gt;&lt;Speaker&gt;JESS&lt;/Speaker&gt;&lt;Remark&gt;When I put pictures on my Facebook, or on my profile pictures, I tend not to put pictures of me at 7:00 a.m. in the morning with greasy hair, but that’s me; that’s who I am. I tend to put the photos on where I’m well presented; I may be going out with friends. &lt;/Remark&gt;&lt;Remark&gt;I don’t think that’s necessary lying. It’s just that why would you put the bad photos on? I’d argue that that’s quite similar to when we get dressed in the morning, and we leave our house. In a certain way, everyone is competing, to an extent. Everyone wants to be the coolest person online. &lt;/Remark&gt;&lt;/Transcript&gt;"?>
                <?oxy_insert_start author="sm36828" timestamp="20200914T153646+0100"?>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd210_2015j_vid202-640x360_still.jpg" src_uri="file:////dog/PrintLive/Courses/dd802_1/dd210_2015j_vid202-640x360_still.jpg" x_folderhash="78ad59c7" x_contenthash="4815787d" x_imagesrc="dd210_2015j_vid202-640x360_still.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
                <?oxy_insert_end?>
            </MediaContent>
            <Activity>
                <Heading>Activity 1 Thinking about cybercrime</Heading>
                <Timing>Allow 20 minutes</Timing>
                <Multipart>
                    <Paragraph>Try to answer the following questions about cybercrime, drawing on your experiences and understandings. Type your responses (up to 100 words for each question) in the box below, and then select ‘Save’. <?oxy_delete author="sm36828" timestamp="20200810T100801+0100" content="Those"?><?oxy_insert_start author="sm36828" timestamp="20200810T100801+0100"?>Your<?oxy_insert_end?> responses are not published anywhere.</Paragraph>
                    <Part>
                        <Question>
                            <Paragraph>1. Think about how you engage online.  Make a list of the things you do online (e.g. social contact, looking for information, news, weather, sports, entertainment, studying online, shopping, bank, holiday booking and so on)</Paragraph>
                        </Question>
                        <Interaction>
                            <FreeResponse size="paragraph" id="xfr1"/>
                        </Interaction>
                    </Part>
                    <Part>
                        <Question>
                            <Paragraph>2. Looking at your answers above, try to guess how much time you spend on a weekly basis on each activity and your potential victimisation </Paragraph>
                        </Question>
                        <Interaction>
                            <FreeResponse size="paragraph" id="xfr2"/>
                        </Interaction>
                        <Discussion>
                            <Paragraph>According to Ofcom (2020), 87% of UK adults spent an average of 25 hours online per week. People go online for the following reasons (How People use the internet, 2020):</Paragraph>
                            <BulletedList>
                                <ListItem>social networks (including video calling)</ListItem>
                                <ListItem>email</ListItem>
                                <ListItem>be entertained (watching videos, music, online radio and podcasts) </ListItem>
                                <ListItem>get information (search, blogs)</ListItem>
                                <ListItem>news (including online newspapers, magazines)</ListItem>
                                <ListItem>online games</ListItem>
                                <ListItem>banking</ListItem>
                                <ListItem>work (either earning money online or using the internet to work remotely)</ListItem>
                                <ListItem>shopping </ListItem>
                                <ListItem>education</ListItem>
                                <ListItem>other access.</ListItem>
                            </BulletedList>
                            <Paragraph>You might have put online fraud (such as issues around scams and various security breaches when paying or banking online. You might have thought about more subtle forms of victimisations such as trolling or cyberbullying on social media for instance or issues around protection of identity and reputation. </Paragraph>
                        </Discussion>
                    </Part>
                </Multipart>
            </Activity>
            <Paragraph>As already indicated in the content warning <?oxy_delete author="sm36828" timestamp="20200810T101040+0100" content="section of the course"?><?oxy_insert_start author="sm36828" timestamp="20200810T101040+0100"?>in the introduction<?oxy_insert_end?>, you can download a comprehensive guide on cybercrime and online safety developed by <?oxy_delete author="sm36828" timestamp="20200810T101052+0100" content="West Yorkshire police "?><a href="https://www.westyorkshire.police.uk/sites/default/files/a_guide_to_cyber_crime_and_online_safety_0.pdf"><?oxy_insert_start author="sm36828" timestamp="20200810T101052+0100"?>West Yorkshire police <?oxy_insert_end?><?oxy_delete author="sm36828" timestamp="20200810T101054+0100" content="here"?></a> in order to get tips about how to increase your online safety. Alternatively, the NSPCC has developed <a href="https://www.net-aware.org.uk/">a range of resources</a> regarding child safety online. More guidance about online safety regarding specific online activities will be provided towards the end of the course. </Paragraph>
        </Session>
        <Session>
            <Title>2 Types of cybercrime</Title>
            <Paragraph>As you have probably identified from engaging in Activity 1, the internet offers a wide range of activities and opportunities for criminals to engage in anti-social and/or deviant behaviours. Therefore, the term cybercrime encompasses a variety of different activities, which goes beyond the fact that they are either a function of, or are facilitated by, the internet. Indeed, real-world crimes can be seen to achieve different goals; for example, theft for financial gain compared to murder for the purpose of revenge. In the same respect, criminal activities falling under the umbrella of cybercrime follow the same pattern. Usually, a distinction is made between<?oxy_insert_start author="sm36828" timestamp="20200810T101223+0100"?>:<?oxy_insert_end?><?oxy_delete author="sm36828" timestamp="20200810T101223+0100" content=" "?></Paragraph>
            <NumberedList class="lower-roman">
                <ListItem><b>instrumental crimes </b>(i.e. crimes where the harm to the victim is not the ultimate aim) and </ListItem>
                <ListItem><b>expressive crimes</b> (i.e. crimes are based on an offender’s emotional response to a situation that provokes anger, leading to a desire to cause harm to the victim) (Canter and Youngs, 2009; Youngs, Ioannou and Eagles, 2016). </ListItem>
            </NumberedList>
            <Paragraph>Similarly in an online environment, some forms of crime seem to principally be for financial gain (e.g. <GlossaryTerm>ransomware </GlossaryTerm>attacks, online identity theft), whereas others may be carried out for personal reasons, such as revenge (e.g. cyberstalking) or for the purposes of furthering an offline crime (e.g. a paedophile grooming a child online). However, there are also offences/anti-social online behaviours such as ‘hacking’ and ‘trolling’, which may be carried out for a variety of other reasons. </Paragraph>
            <Activity>
                <Heading>Activity 2 Classifying the different types of cybercrime</Heading>
                <Timing>Allow 20 minutes</Timing>
                <Question>
                    <Paragraph>Many categorisations of cybercrime distinguish between crimes against the person/morality and crimes again property/government. Use your common knowledge to decide whether this falls under crimes against the person or crime against the property or both. <?oxy_insert_start author="sm36828" timestamp="20200810T104325+0100"?>Put some text into the boxes you think are the right option. <?oxy_insert_end?></Paragraph>
                    <Table class="type 2" style="allrules">
                        <TableHead>Table 1 Classifying the different types of cybercrime</TableHead>
                        <tbody>
                            <tr>
                                <td> </td>
                                <th>Crime against the person</th>
                                <th>Crime against the property</th>
                                <th>Both</th>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Malware</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr3"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr20"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr37"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Trojan</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr4"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr21"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr38"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Virus</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr5"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr22"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr39"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Worm</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr6"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr23"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr40"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Ransomware</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr7"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr24"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr41"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Phishing</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr8"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr25"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr42"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Online financial crimes</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr9"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr26"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr43"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Online Fraud</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr10"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr27"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr44"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Password cracking</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr11"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr28"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr45"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Hacking</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr12"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr29"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr46"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Photo-hacking</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr13"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr30"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr47"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Sextortion</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr14"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr31"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr48"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Image-based sexual crimes</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr15"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr32"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr49"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Revenge Pornography</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr16"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr33"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr50"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Cyberstalking</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr17"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr34"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr51"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Trolling</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr18"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr35"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr52"> </FreeResponse></td>
                            </tr>
                            <tr>
                                <td><GlossaryTerm>Cyberbullying</GlossaryTerm></td>
                                <td><FreeResponse size="single line" id="xfr19"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr36"> </FreeResponse></td>
                                <td><FreeResponse size="single line" id="xfr53"> </FreeResponse></td>
                            </tr>
                        </tbody>
                    </Table>
                </Question>
                <Discussion>
                    <Paragraph>Under that assumption, cyberbullying, trolling and cyberstalking, revenge pornography, image-based sexual crimes, sextortion, photo-hacking, hacking are likely to fall under the crime against the person category. Malware (including trojan, virus, worm), online financial crimes (including online fraud and password cracking) are more likely to fall under the crimes against the property category. However, you have probably realised that for many crimes it is not as clear cut and could be both directed at the person and the property (even if one is a by-product of obtaining the desired object or status) such as image-based sexual crimes who at face value could be seen as a crime against property (i.e. stealing an image) but ultimately it is a crime against the person. Moreover, cybercriminals usually combine criminal behaviours such as cyberstalking, sextortion, revenge pornography and possibly cyberbullying<?oxy_delete author="sm36828" timestamp="20200817T092137+0100" content=". "?><?oxy_insert_start author="sm36828" timestamp="20200817T092134+0100"?>, therefore people can easily be victim of two (or more) types of cybercrimes simultaneously.<?oxy_insert_end?><?oxy_delete author="sm36828" timestamp="20200810T130739+0100" content="Let’s"?><?oxy_insert_start author="sm36828" timestamp="20200810T130739+0100"?> Now<?oxy_insert_end?> have a look at some of them in details in the next sections. </Paragraph>
                </Discussion>
            </Activity>
            <Section>
                <Title>2.1 Trolling</Title>
                <Paragraph>The term trolling has been widely used since the apparition of the internet and it refers to all online deviant behaviours generated by individuals towards other individuals and/or groups that are repetitive and disruptive in nature (Fichman &amp; Sanfilippo, 2016). However, this is slightly simplistic as trolling behaviours do evolve constantly in line with how the online environment itself changes. Vaisman and Fichman (2012), cited in Fichman &amp; Sanfilippo, (2016, p.6) consider four factors to explain the variety within trolling behaviours depending on: </Paragraph>
                <NumberedList class="lower-roman">
                    <ListItem><i>Location</i>: The distinction between asynchronous (when people communicate but not at the same time such as blog comments) and synchronous communication (live conversation such as chat room). Both types of trolling exist but it is more difficult to account for within synchronous settings as the context is not recorded (Fichman &amp; Sanfilippo, 2016).</ListItem>
                    <ListItem><i>Relationships</i>: Trolls usually target random, innocent people as well as the community. When they start targeting individuals, it overlaps with other online deviant behaviours such as harassment or bullying. According to Fichman and Sanfilippo (2016), trolls usually act individually and usually hide their identity, though they can coordinate their behaviours with other trolls as there are evidence of camaraderie between trolls such as in the controversial online platform <a href="https://tattle.life/">TATTLE.life</a> where people gather to openly and freely troll about social media influencers, even referring themselves as trolls (e.g. tattle trolls….), or reflecting on <a href="https://tattle.life/threads/what-is-an-online-troll.4791/">what is an online troll?</a> – See <a href="https://twitter.com/hashtag/tattlelife?lang=en">#tattlelife</a><?oxy_insert_start author="sm36828" timestamp="20201104T093006+0000"?>. The reasons why this website has received so much attention is that the purpose of the site is to group people with trolling tendencies together. Therefore, group trolling not only normalises this type of behaviour but also it intensifies the damage under the greatest anonymity with made up usernames (Fogarty, 2019).<?oxy_insert_end?></ListItem>
                    <ListItem><i>Intentions</i>: Originally trolling behaviours were thought as being unintentional because it was just for fun (Buckels, Trapnell, &amp; Paulhus, 2014). Whil<?oxy_insert_start author="sm36828" timestamp="20200810T105428+0100"?>e<?oxy_insert_end?><?oxy_delete author="sm36828" timestamp="20200810T105427+0100" content="st"?> you could find up to 135 different types of trolls identified from many online resources (Nuccitelli, n.d.), psychological evidence has been more reserved in categorising the different types of online trolls. Indeed, research has mostly focused on motivations or intentions either looking at personality (e.g., Buckels et al., 2014), or explanations of intentions such as being ideological, non-ideological, religion driven, grief driven, fun driven, or political (Fichman &amp; Sanfilippo, 2016). However, as Coles and West (2016) argued, beyond the broadness of the term ‘troll’ and the many subtypes, it is important to look at the term as having variable meanings, intentions, and varied sub-types between different platforms and the course of interaction.</ListItem>
                    <ListItem><i>Behavioural practices</i>: Trolls themselves usually do not identify their behaviour as being aggressive but more as being opiniated. However, the pattern is that trolls usually set ‘discursive’ trap to create a reaction through controversial comments or questions. What truly defines someone as a troll is the repetitive action of their behaviour towards the same individual or online community, repeating the same ideas and ignoring the responses and challenges directed at them (Shachaf &amp; Hara, 2010).</ListItem>
                </NumberedList>
                <Activity>
                    <Heading>Activity 3 Which of these examples is trolling?</Heading>
                    <Timing>Allow 10 minutes</Timing>
                    <Question>
                        <Paragraph>Jane Doe posted the following on a popular social media site.</Paragraph>
                        <?oxy_insert_start author="sm36828" timestamp="20200817T092502+0100"?>
                        <Figure>
                            <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd802_1_figx_tweet.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/Courses/dd802_1/dd802_1_figx_tweet.jpg" width="100%" x_folderhash="d1c4e0e0" x_contenthash="66c63a33" x_imagesrc="dd802_1_figx_tweet.jpg" x_imagewidth="512" x_imageheight="195"/>
                            <Alternative>An image of a social media post that says I believe in Science. And empirical evidence.</Alternative>
                            <Description>An image of a social media post that says I believe in Science. And empirical evidence.</Description>
                        </Figure>
                        <?oxy_insert_end?>
                        <?oxy_delete author="sm36828" timestamp="20200817T092853+0100" content="&lt;EditorComment&gt;Figure 1 Axelle/Lara can I get source details of where this appears in the module? Then I can assess if we can use this or whether we need to recreate this image. &lt;/EditorComment&gt;"?>
                        <Paragraph>Look at the <?oxy_delete author="sm36828" timestamp="20201023T091436+0100" content="three"?><?oxy_insert_start author="sm36828" timestamp="20201023T091436+0100"?>six<?oxy_insert_end?> examples of trolling below and decide whether you feel it falls under the trolling category or being opiniated. Type your anwer into the box.</Paragraph>
                        <Table class="type 2" style="allrules">
                            <TableHead>Table 2 Replying to @Jane_Doe:</TableHead>
                            <tbody>
                                <tr>
                                    <td>‘… and very poor grammar 😱’</td>
                                    <td><FreeResponse size="single line" id="xfr60"/></td>
                                </tr>
                                <tr>
                                    <td>‘I don’t have opinions; I have facts at my disposal.’</td>
                                    <td><FreeResponse size="single line" id="xfr61"/></td>
                                </tr>
                                <tr>
                                    <td>‘As my friend Phoebe Buffay would say… ‘this is brand new information’’</td>
                                    <td><FreeResponse size="single line" id="xfr62"/></td>
                                </tr>
                                <tr>
                                    <td>‘You are just an idiot who don’t understand science. It’s not about belief!’</td>
                                    <td><FreeResponse size="single line" id="xfr63"/></td>
                                </tr>
                                <tr>
                                    <td>‘I disagree, I don’t think scientific evidence and religious beliefs are incompatible.’</td>
                                    <td><FreeResponse size="single line" id="xfr64"/></td>
                                </tr>
                                <tr>
                                    <td>‘Interesting statement. Belief in science? that's an oxymoron.’</td>
                                    <td><FreeResponse size="single line" id="xfr65"/></td>
                                </tr>
                            </tbody>
                        </Table>
                    </Question>
                    <Discussion>
                        <Paragraph>Those 6 examples illustrate different online behaviours. The first example is typical of ‘grammar trolls’ and it is not clear whether it falls under the definition of trolling or not. The intention could well be to patronise the author of the post, but it could also be a way to divert the post into less relevant discussion or ultimately, the author of this reply might just want to be humorous. This type of trolling is referred as ‘kudos trolling’ (Bishop, 2014). </Paragraph>
                        <Paragraph>The second example is a clever, non-aggressive reply that subtly point out the contradiction in the post (i.e. science and belief). It is done without attacking the author of the post and for that reason, it falls under the category of being opinionated.</Paragraph>
                        <Paragraph>The third example seems innocent on the surface, but the author here is making a cultural reference to a television show (Friends - popular in the 90s), and the tone here is sarcastic and the message itself indicate that Jane Doe post has no real informative purpose. This is another example of ‘kudos trolling’ and even more difficult to spot than the first example. </Paragraph>
                        <Paragraph>The fourth example, however, is more typical of common understanding of trolling. Indeed, the comment is aggressive, malicious with the intention of causing harm. Name calling is a way to intensify the abuse and this type of trolling is known as ‘flame trolling’ (Bishop, 2014).</Paragraph>
                        <Paragraph>The last two examples are other examples of opiniated posts rather than coming under the label of trolling due to adding something to the discussion and not personally attacking the author of the post.</Paragraph>
                        <?oxy_delete author="sm36828" timestamp="20201023T090655+0100" content="&lt;Paragraph&gt;Those three examples illustrate different online behaviours. The first example is typical of ‘grammar trolls’ and it is not clear whether it falls within the definition of trolling or not. The intention could well be to patronise the author of the post, but it could also be a way to divert the post into less relevant discussion or ultimately the author of this reply might just want to be humorous. This type of trolling is referred as ‘kudos trolling’ (Bishop, 2014). &lt;/Paragraph&gt;&lt;Paragraph&gt;The second example seems innocent on the surface but the author here is making a cultural reference to a television show (Friends - popular in the 90s), and the tone here is sarcastic and the message itself indicate that Jane Doe post has no real informative purpose. This is another example of ‘kudos trolling’ and even more difficult to spot than the first example. &lt;/Paragraph&gt;&lt;Paragraph&gt;The last example, however, is more typical of common understanding of trolling. Indeed, the comment is aggressive, malicious with the intention of causing harm. Name calling is a way to intensify the abuse and this type of trolling is known as ‘flame trolling’ (Bishop, 2014).&lt;/Paragraph&gt;"?>
                        <Table class="type 2" style="allrules">
                            <TableHead>Table 2 Replying to @Jane_Doe: (answers)</TableHead>
                            <tbody>
                                <tr>
                                    <td>‘… and very poor grammar 😱’</td>
                                    <td>trolling</td>
                                </tr>
                                <tr>
                                    <td>‘I don’t have opinions; I have facts at my disposal.’</td>
                                    <td>being opinionated</td>
                                </tr>
                                <tr>
                                    <td>‘As my friend Phoebe Buffay would say… ‘this is brand new information’’</td>
                                    <td>trolling</td>
                                </tr>
                                <tr>
                                    <td>‘You are just an idiot who don’t understand science. It’s not about belief!’</td>
                                    <td>trolling</td>
                                </tr>
                                <tr>
                                    <td>‘I disagree, I don’t think scientific evidence and religious beliefs are incompatible.’</td>
                                    <td>being opinionated</td>
                                </tr>
                                <tr>
                                    <td>‘Interesting statement. Belief in science? that's an oxymoron.’</td>
                                    <td>being opinionated</td>
                                </tr>
                            </tbody>
                        </Table>
                    </Discussion>
                </Activity>
                <Paragraph>Internet trolling provides a good illustration of some of the definitional and practical difficulties, and the challenges that these present for legislative and criminal justice responses. Indeed, offending people and being antagonistic is not necessarily criminal. Herring et al. (2002) provide an interesting analysis of attempts to manage a troll on a feminist web-forum, in which the troll employs a number of tactics (for example name calling, deliberately misunderstanding other users, pretending to be sincerely trying to understand the issues). This troll was clearly a source of ongoing annoyance, and at times was offensive, but the attempts to control him (albeit with limited success) did not resort to criminal sanctions.</Paragraph>
            </Section>
            <Section>
                <Title>2.2 Non-consensual distribution of sexual images</Title>
                <Paragraph>Image-based sexual crimes are multi-faceted and incorporate crimes that involve obtaining sexual or degrading imagery of individuals and then threatening to distribute these images, as a means of blackmailing victims into producing more imagery or committing harmful acts towards others. </Paragraph>
                <Paragraph>Even though these types of crime are not restricted to one particular gender, it is important to note that most victims are females (Mc Glynn, Rackley, &amp; Houghton, 2017). Furthermore, the ease of obtaining and distributing sexual imagery online without consent and using sensitive materials as a means of blackmailing victims, means that the frequency and scale of the problem has mushroomed. The nature of the harassment being sexualised and misogynistic means that victims are often blamed for sharing the images in the first  place. However, because the images are used in a way that is not intended means that the person who originally shared the images is not responsible and should be treated as a victim in its own right. </Paragraph>
                <Paragraph>Non-consensual distribution of sexual images can also unveil other forms of cybercrime such as revenge pornography, child pornography, sextortion and many other types. The most common type of non-consensual obtention or distribution of sexual images are related to child pornography and by extension it could also results in the solicitation of in-person sexual contact known as online grooming. Due to the sensitive nature of some of those sub-types of image-based sexual crimes, this course will only cover sexting, photo hacking as examples of this type of cybercrime. </Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd802_1_victim_blaming294086.tif" src_uri="file:////dog/PrintLive/Courses/dd802_1/dd802_1_victim_blaming294086.tif" width="100%" x_printonly="y" x_folderhash="78ad59c7" x_contenthash="de586a60" x_imagesrc="dd802_1_victim_blaming294086.tif.jpg" x_imagewidth="400" x_imageheight="534"/>
                    <Alternative>An image of a person with their head in their hands looking at a laptop.</Alternative>
                    <Description>An image of a person with their head in their hands looking at a laptop.</Description>
                </Figure>
                <SubSection>
                    <Title>Sexting</Title>
                    <Paragraph>The ready availability of mobile communication technologies and the increase in the use of the internet has seen the development of what is known as ‘sexting’. ‘Sexting can be understood as the sending or posting of sexually suggestive text messages and images, including nude or semi-nude photographs, via mobiles or over the Internet’ (Cooper et al., 2016, p. 706). ‘Sexting’ becomes problematic and falls into the cybercrime category when the images are shared without the victim’s knowledge. This might be through ‘<GlossaryTerm>hacking</GlossaryTerm>’, where the images are stolen from the legitimate recipient, or it could be through the intended recipient sharing them (either with other acquaintances or in online forums etc.) without the consent of the sender. Senders might be unaware about the possible distribution of their images, or a previously trusted receiver may turn out to not merit such trust (such as an ex-partner who shares images – sometimes known as ‘revenge pornography’). Research has found that women usually only send sexual images in the context of a relationship where there is trust (Samimi and Alderson, 2014), and therefore at the time the images are sent, there is little reason for the sender to think that they will be passed on without consent. </Paragraph>
                    <Paragraph>However, the harm is constant and amplified due to the permanency of the images stored on the internet. Even if the original images/videos are removed, copies could have been made and could circulate indefinitely (Langos, 2015). As a result, the long-term impact of such crime could be far more damaging than originally intended, permanently discrediting the victim’s reputation on a personal and professional level.</Paragraph>
                </SubSection>
                <SubSection>
                    <Title>Photo-hacking</Title>
                    <Paragraph>As you have read in the previous section, self-taken sexual images may sometimes be produced non-consensually by tricking or coercing the victim, while in other situations production of the image may have been consensual but it is non-consensually distributed beyond the intended recipient(s). Sometimes this non-consensual distribution is achieved by hacking into private images that have been stored online. A high-profile example of this was the celebrity photo-hacking scandal in 2014, where nude images of celebrities were stolen from online accounts and disseminated publicly. Bates (2017) suggests that these cases of celebrity photo-hacking and non-consensual pornography, targeting well-known women such as Jennifer Lawrence and Kate Upton, have led to deeper discussion in the media of issues around non-consensual pornography, consent, and the oppression of women. Jennifer Lawrence termed what happened to her as a ‘sex crime’ (Kashner, 2014) and described how violated she felt by the experience (Oppenheim, 2017). </Paragraph>
                    <Paragraph>However, although the theft and distribution of the images was a crime, legally it was not considered a <i>sex</i> crime, and some commentators (e.g. Mackie, 2014) suggest that it is the responsibility of internet users to understand that the worldwide web is not a private space, placing the responsibility for the crime with the victims, rather than the perpetrators. </Paragraph>
                    <Activity>
                        <Heading>Activity 4 How does photo hacking affect victims?</Heading>
                        <Timing>Allow 15 minutes</Timing>
                        <Question>
                            <Paragraph>While the large-scale theft and distribution of images of celebrity photo-hacking victims has been important in drawing attention to the issues around non-consensual access and distribution of intimate images, not all victims are in the public eye. Listen to the following audio clip from Danger in the Download, in which Angie describes her experience of having her private images hacked. Make some notes on the questions below as you listen:</Paragraph>
                            <NumberedList class="lower-alpha">
                                <ListItem>How does Angie describe her feelings about what happened to her?</ListItem>
                                <ListItem>Are there aspects of the online nature of the crime that make it particularly troubling for Angie?</ListItem>
                            </NumberedList>
                            <?oxy_insert_start author="sm36828" timestamp="20201104T093053+0000"?>
                            <!--Still awaiting rights clearance. Asset 293473-->
                            <?oxy_insert_end?>
                            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd802_2018j_aug016.mp3" type="audio" x_manifest="dd802_2018j_aug016_1_server_manifest.xml" x_filefolderhash="d1c4e0e0" x_folderhash="d1c4e0e0" x_contenthash="82935fd0">
                                <Caption>Audio 1 Danger in the download</Caption>
                                <Transcript>
                                    <Speaker>INTERVIEWER</Speaker>
                                    <Remark>Today cyberspace has grown beyond anything that its architects could have imagined. Up to a third of humanity has access to the Internet and an increasing proportion of them have come to depend on it for education, entertainment, social interaction, even their livelihoods. And inevitably among those two and a half billion souls there are some you might want to steer well clear of.</Remark>
                                    <Speaker>ANGIE</Speaker>
                                    <Remark>The first pictures that out were just me in bikinis. And then the second ones that came out were lingerie, like a bra and panties, a bunch of stuff like that. At that point I didn’t know that people could hack into that website. I thought it was secure.</Remark>
                                    <Speaker>INTERVIEWER</Speaker>
                                    <Remark>This is Angie. Aged 14 she decided to store some mildly suggestive pictures of herself online securing them in a password protected website. They were meant only for her boyfriend.</Remark>
                                    <Speaker>ANGIE</Speaker>
                                    <Remark>So, one summer my friend messaged me and he was like, oh you have to see this. He sends me a link and all the pictures that I thought were secure had been hacked and linked on to like a different website. At that point I realised that it wasn’t just going to stop at one friend who saw it.</Remark>
                                    <Speaker>INTERVIEWER</Speaker>
                                    <Remark>Before long the hacked information went viral on the open Internet.</Remark>
                                    <Speaker>ANGIE</Speaker>
                                    <Remark>Even now it’s still very popular on the Internet and it’s been four years and it’s only getting bigger.</Remark>
                                    <Speaker>INTERVIEWER</Speaker>
                                    <Remark>How many people in the end do you think have viewed these pictures of you?</Remark>
                                    <Speaker>ANGIE</Speaker>
                                    <Remark>A lot. Millions.</Remark>
                                    <Speaker>INTERVIEWER</Speaker>
                                    <Remark>Millions.</Remark>
                                    <Speaker>ANGIE</Speaker>
                                    <Remark>Yeah.</Remark>
                                    <Speaker>INTERVIEWER</Speaker>
                                    <Remark>That must be a weird feeling?</Remark>
                                    <Speaker>ANGIE</Speaker>
                                    <Remark>Yeah. And there’s no way that I could fully ever get rid of all the pictures. Once it’s on the Internet it’s there for good. It got to the point where I realised like what kind of future can I have knowing that my reputation is this bad. Imagine like what happens when a job comes between me and someone else and they can’t take me because of what’s happened. So basically it feels like my life is over.</Remark>
                                </Transcript>
                            </MediaContent>
                        </Question>
                        <Discussion>
                            <Paragraph>Like Jennifer Lawrence (Oppenheim, 2017), Angie expresses a feeling of violation. She is a victim of the initial theft, but this is compounded by the widespread distribution of the images, which is facilitated by the internet. She has the uncomfortable knowledge that people she has never met may have seen private images of her without her consent. She also highlights the potential damage on a professional level, as prospective employers may be able to access the images, and because of the permanence of images online they can never be truly erased.</Paragraph>
                        </Discussion>
                    </Activity>
                </SubSection>
            </Section>
            <Section>
                <Title>2.3 Hacking</Title>
                <Paragraph>In the previous section, you have learned that private images are sometimes accessed by <GlossaryTerm>hacking</GlossaryTerm> the accounts of other users. The term hacking might make you think of computer geniuses cracking complex codes, and therefore that increasingly sophisticated computer security is the solution to the problem; in reality, while hacking can sometimes require advanced skills, many instances require little technological expertise on the part of the hacker. For example, in 2014, a number of former employees of the now defunct <i>News of the World</i> were convicted on phone hacking charges, having accessed messages belonging to both celebrities and crime victims to provide material for the newspaper (BBC News, 2014). In many cases they had been able to gain access to voicemail messages quite easily, by exploiting the fact that users had not reset the default voicemail PIN code. Phone service providers have since made changes to their systems so that default PIN codes no longer exist, but many users still use meaningful information such as their birthdates as PIN codes, making them easy to guess (BBC News, 2011). This highlights the importance of considering both technological and human aspects when developing security measures. </Paragraph>
                <Paragraph>As explained above, gaining access to other people’s accounts can sometimes be accomplished very simply because people choose simple passwords such as ‘123456’ and ‘password’ (Morgan, 2017). The reason why people choose simple passwords or reuse across sites is due to a poor fit between system and user (Conklin et al., 2004). When password authentication was introduced as a security measure online, there were only a limited number of systems and users, and it was effective in that context. However, this approach is less effective in the current situation with millions of systems and many millions of users. Indeed, designers did not take into account that users now have multiple usernames and passwords to remember. This means that users have been left to develop their own individual strategies to manage their various online accounts, and sometimes these strategies (e.g. writing down passwords, reusing details) can compromise security. </Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd802_2_3_hackingv2_294338.tif" src_uri="file:////dog/PrintLive/Courses/dd802_1/dd802_2_3_hackingv2_294338.tif" width="100%" x_printonly="y" x_folderhash="78ad59c7" x_contenthash="1e5361c3" x_imagesrc="dd802_2_3_hackingv2_294338.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Alternative>An image of a person in a dark room looking at a laptop. </Alternative>
                    <Description>An image of a person in a dark room looking at a laptop. </Description>
                </Figure>
                <Paragraph>Another possible explanation could be that people don’t know what constitutes good password security. However, in a survey by Tam et al. (2009), respondents showed an ability to distinguish between strong and weak passwords, and an understanding of poor password management behaviours, but there was a trade-off between convenience and security. People were more willing to engage in password management practices that were inconvenient, but which increased security, for accounts where they could foresee an immediate negative consequence for themselves should security be breached (e.g. a bank account), and less willing to do so for accounts where they could not (e.g. email). However, a hacker with access to an email account can use this to reset passwords and learn other personal information that could facilitate access to other user accounts, including bank accounts, so this approach may be short-sighted. </Paragraph>
                <Paragraph>Attempts to alter user behaviour at a system level, by introducing mandatory rules for the creation of passwords (e.g. forcing account holders to use a combination of letters, numbers and punctuation), reduce vulnerability by making it less likely that a stranger could guess the password. However, they simultaneously increase the likelihood that the genuine account holder will forget their password, thereby increasing the use of memory strategies which introduce other sources of vulnerability (Gehringer, 2002; Conklin et al, 2004). Therefore, it is important that security systems are carefully designed to take into account the human behaviour of the people who use them, as well as the ingenuity of those who wish to hack them. </Paragraph>
            </Section>
            <Section>
                <Title>2.4 Malware</Title>
                <Paragraph>As you are accessing this course online, you are already likely to be familiar with the need to protect your system against attacks from viruses and other types of <GlossaryTerm>malware</GlossaryTerm>. </Paragraph>
                <?oxy_insert_start author="sm36828" timestamp="20201014T111031+0100"?>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd802_1_2_3_hacking294082.tif" src_uri="file:////dog/PrintLive/Courses/dd802_1/dd802_1_2_3_hacking294082.tif" width="100%" x_printonly="y" x_folderhash="78ad59c7" x_contenthash="fc23a36a" x_imagesrc="dd802_1_2_3_hacking294082.tif.jpg" x_imagewidth="400" x_imageheight="600"/>
                    <?oxy_insert_end?>
                    <Alternative>An image of a child drinking from a mug with a computer screen in the background. </Alternative>
                    <Description>An image of a child drinking from a mug with a computer screen in the background. </Description>
                    <?oxy_insert_start author="sm36828" timestamp="20201014T111031+0100"?>
                </Figure>
                <?oxy_insert_end?>
                <Paragraph>However, as with hacking, those who produce malware are inventive, and are often able to exploit weaknesses in the system and make use of social engineering to introduce malware to a computer or network despite existing safeguards. There are two aspects of the criminal use of malware: firstly, creation of the malware; and secondly, distribution (Kirwan and Power, 2013). The term ‘malware’ encompasses a number of different types of malicious program, and in common with the other types of cybercrime you have explored so far, motivations for creating and distributing malware are varied. While psychological research on creators of malware is limited, Kirwan and Power (2013) suggest that the underlying motivations may have changed over time, and that while early creators of malware were often motivated by a desire to identify system vulnerabilities, or by the intellectual challenge, there is an increasing tendency towards creation and distribution of malware for financial gain.</Paragraph>
                <Paragraph>You can learn more about the different types of malware as part of the free OpenLearn course: <a href="https://www.open.edu/openlearn/science-maths-technology/introduction-cyber-security-stay-safe-online/content-section-overview"><i>Introduction to cyber security: stay safe online</i></a>.</Paragraph>
            </Section>
            <Section>
                <Title>2.5 Online fraud</Title>
                <Paragraph>So far you have learned how social engineering can be a useful tool for those who wish to distribute malware. However, it can also be used to gain access to personal information, which may allow unauthorised individuals to access accounts, facilitating photo hacking. However, perhaps the most familiar form of social engineering used by cybercriminals is the <GlossaryTerm>phishing</GlossaryTerm> email, which is normally used to gain information that can be used to commit online fraud. This phishing email often appears to be from a legitimate business or bank and asks for an immediate response from the recipient in order to prevent serious consequences (for example, the account being frozen). When the recipient clicks on the link in the email, they are taken to a fake website and asked to enter their account details. By doing so, they provide fraudsters with the information needed to access their genuine account and steal money. As in the previous examples, by manipulating human behaviour, cybercriminals can gain access to private accounts without being skilled in hacking.</Paragraph>
                <Paragraph>Advance fee fraud is another online scam with which you might be familiar with. There are many variants, but the basic format is the same. The fraudster sends an email in which they claim to need help in moving a large amount of money from one country to another and are prevented from doing so due to some unfortunate set of circumstances. The recipient of the email is asked to assist by sending a small amount of money and is offered a share of the large sum of money as their reward (Action Fraud, 2020). Of course, the large sum of money does not exist, and anyone who sends money will never see it again. Online dating romance scam (Buchanan and Whitty, 2014; Whitty and Buchanan, 2012; 2016) is a subtype of advance fee fraud, in which the scammer or scammers pose as someone interested in forming a relationship with their victim. They use photographs of attractive people to create fake profiles and make contact with their victims via social networking sites or online dating sites (e.g. Aransiola and Asindemade, 2011; Rege, 2009; Whitty and Buchanan, 2012). This is sometimes termed ‘catfishing’. The focus in this type of crime is on building a relationship with the victim so that they will then comply with requests for money.</Paragraph>
                <Activity>
                    <Heading>Activity 5 Why does online dating scam succeed? </Heading>
                    <Timing>Allow 10 minutes</Timing>
                    <Question>
                        <Paragraph>Watch the video of FBI Special Agent Christine Beining describing romance scams. As you watch the video, note down any information related to the victims’ likely characteristics and techniques used to gain trust and obtain the desired result. </Paragraph>
                        <?oxy_insert_start author="sm36828" timestamp="20201014T110348+0100"?>
                        <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/youtube:BmIvqOYwGGU" width="512" type="embed" x_manifest="BmIvqOYwGGU_1_server_manifest.xml" x_filefolderhash="da39a3ee">
                            <Caption>Video 2 Romance scams</Caption>
                        </MediaContent>
                        <?oxy_insert_end?>
                        <!--<Paragraph><a href="https://www.youtube.com/watch?time_continue=18&amp;v=BmIvqOYwGGU&amp;feature=emb_logo">Video 2 Romance scams</a> <EditorComment>Asset 293493</EditorComment></Paragraph>-->
                    </Question>
                    <Discussion>
                        <Paragraph>Christine Beining explained that:</Paragraph>
                        <BulletedList>
                            <ListItem>Scammers usually target vulnerable women (though men can be targeted but less so than women) , using the internet, with money and willing to give it. More specifically, they target people not in existing relationships and looking for love (divorced or widowed)</ListItem>
                            <ListItem>they will use information available on the internet to find common grounds and use information to manipulate victims and get their trust. The relationships become intense very quickly. So, they can start asking for money using different excuses and promising to repay back the money. </ListItem>
                            <ListItem>Scammers are usually part of criminal organisations and data about victims are recorded in ‘sucker lists’, which make them even more vulnerable and easily targeted to repeat victimisations (Button et al., 2009).</ListItem>
                        </BulletedList>
                    </Discussion>
                </Activity>
                <Paragraph>Buchanan and Whitty (2014) also found that higher scores on ‘idealisation’ of romantic partners were associated with an increased likelihood of being a romance scam victim, but the other factors they investigated – including extraversion, agreeableness, sensation-seeking, neuroticism, and loneliness – were not associated with the likelihood that someone would become a romance scam victim.</Paragraph>
                <Paragraph>You can read about the many different types of online fraud at the <a href="https://www.open.ac.uk/libraryservices/resource/website:118067&amp;f=30574">Action Fraud website</a>.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>3 Victim’s experience of cybercrime</Title>
            <Paragraph>You have seen in the previous sections that the accurate distinction between different types of cybercrime can be difficult. </Paragraph>
            <Paragraph>However, regardless of the specific type of cybercrime experienced, a common research finding is that it can have adverse consequences for its victims. Cyber-victimisation can be seen to have similar social, psychological and physiological effects to those experienced by people victimised in the parallel offline offences. This suggests that cybercrimes should be responded to with equal concern to their offline equivalents. For instance, the effects of cyberbullying are similar to those of traditional bullying (Smith et al. 2008). In the same respect, Dreßing et al. (2014) identify that the impact of cyberstalking is similar to that of offline stalking. However, there is, as yet, little research that looks at the effects of trolling on those targeted. </Paragraph>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd802_1_3_victim_experience294083.tif" src_uri="file:////dog/PrintLive/Courses/dd802_1/dd802_1_3_victim_experience294083.tif" width="100%" x_printonly="y" x_folderhash="78ad59c7" x_contenthash="a1753b4d" x_imagesrc="dd802_1_3_victim_experience294083.tif.jpg" x_imagewidth="400" x_imageheight="600"/>
                <Alternative>An image of a young person leaning against a bed with a laptop on their lap, arms folded and looking at the laptop. </Alternative>
                <Description>An image of a young person leaning against a bed with a laptop on their lap, arms folded and looking at the laptop. </Description>
            </Figure>
            <Section>
                <Title>3.1 Impact of cybercrime on victims and coping strategies</Title>
                <Paragraph>It is important to add that for certain types of cybercrime, the victimisation is multi-faceted. For instance, while the negative impact of online fraud on the victims might appear to be solely financial, a study by Button et al. (2014) found that in addition to financial hardship, some victims might experience negative effects on their mental health, physical health and personal relationships. Whitty and Buchanan (2012; 2016) argue that victims of online dating romance scams suffer a ‘double hit’, as they suffer the loss of a relationship as well as experiencing financial loss. The survey conducted by Buchanan and Whitty (2014) showed that there are large individual differences in the degree of emotional distress reported by victims, and they found that sometimes emotional distress was high even where there was no financial loss. More in-depth interviews with a small number of victims identified that people who had lost money to online romance scams reported greater distress at the loss of their relationship than their money. Their distress was exacerbated by a lack of social support, with some victims reporting that they experienced anger and blame from family and friends.</Paragraph>
                <Table class="type 2" style="norules">
                    <TableHead/>
                    <tbody>
                        <tr>
                            <td><Paragraph>The literature has identified the following consequences on cyber-victimisation:</Paragraph><BulletedList><ListItem>Social withdrawal/anxiety</ListItem><ListItem>Depression</ListItem><ListItem>PTSD</ListItem><ListItem>Obsessive behaviours</ListItem><ListItem>Loss of confidence</ListItem><ListItem>Reduction in self-esteem.</ListItem><ListItem>Headaches </ListItem><ListItem>Abdominal pain/stomach problems</ListItem><ListItem>Eating disorder</ListItem><ListItem>Sleep disorder</ListItem><ListItem>Not feeling safe</ListItem><ListItem>Self-harm</ListItem><ListItem>Suicide tendencies</ListItem><ListItem>Feeling helpless</ListItem><ListItem>Panic attacks</ListItem><ListItem>Mistrust of others</ListItem></BulletedList><Paragraph>(Låftman et al., 2013; Sourander et al., 2010; Schneider et al., 2012; Bates, 2017)</Paragraph></td>
                            <td><Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd802_1_1impact294084.tif" src_uri="file:////dog/PrintLive/Courses/dd802_1/dd802_1_1impact294084.tif" width="100%" x_printonly="y" x_folderhash="78ad59c7" x_contenthash="6fce287e" x_imagesrc="dd802_1_1impact294084.tif.jpg" x_imagewidth="512" x_imageheight="683"/><Alternative>An image of a person looking at a computer tablet.</Alternative><Description>An image of a person looking at a computer tablet.</Description></Figure></td>
                        </tr>
                    </tbody>
                </Table>
                <Paragraph>Similarities in coping strategies for victims of cybercrime were also found, with victims initially tending to turn to negative coping strategies such as alcohol use and avoidance, before engaging with more positive approaches such as seeking counselling and undertaking advocacy work. However, with cybercrime directed at the person, the issue of victim blaming is important to consider, drawing more specifically on research into public attitudes towards sexual violence that place the blame for onto the victims. </Paragraph>
            </Section>
            <Section>
                <Title>3.2 Victim blaming</Title>
                <Paragraph>When a crime is committed, the victims themselves and other members of society often seek to understand why the crime happened. Victims may ask questions like ‘why me?’, ‘why did that have to happen to me?’. Friends, family and other members of society might ask ‘why did that happen?’ but may also ask questions like ‘could the victim have avoided being targeted?’ or ‘did the victim do something to make themselves vulnerable?’. These latter questions lead to the idea that the victim is at least partially responsible for their own victimisation. </Paragraph>
                <Paragraph>The notion of victim blaming has long been the subject of academic study. Early victim typologies (such as those developed by Mendelsohn in the 1930s for crimes against the person) considered the role victims could be seen to play in their own victimisation. Modern academic study has moved away from this type of victim blaming, and it is more widely understood that the perpetrator of a crime should be the one held to blame. Nonetheless, victim blaming is still frequently encountered. Victims who are seen as making themselves vulnerable are particularly likely to be blamed (e.g. Gray, 2015). This type of blaming forms part of a wider set of beliefs and attitudes towards online victimisation where blame and responsibility is put on the failure to avoid victimisation due to victims’ greediness and/or gullibility for instance in relation to online dating scams (Cross, 2015) or initial consent given to take/send the picture to someone else in cases of non-consensual pornography and revenge porn. Bates (2017) refers this type of thinking as the ‘she should have known better’ argument. In offline contexts, this type of thinking can be seen in rape myth beliefs that suggest rape victims are to blame because of something that they did, for example: ‘they walked down a dark alley on their own’; ‘they got drunk’; ‘they invited them back to their house’. </Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd802_1_victim_blamingv2_294344.tif" src_uri="file:////dog/PrintLive/Courses/dd802_1/dd802_1_victim_blamingv2_294344.tif" width="100%" x_printonly="y" x_folderhash="78ad59c7" x_contenthash="59fcfab2" x_imagesrc="dd802_1_victim_blamingv2_294344.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Alternative>A close up image of someone’s eye with a tear rolling down their cheek. </Alternative>
                    <Description>A close up image of someone’s eye with a tear rolling down their cheek. </Description>
                </Figure>
                <Paragraph>The theory of just-world beliefs (Lerner, 1980) has been used to account for why people may blame victims. The underlying principle is that the world is a fair place, and therefore if people are good, then nothing bad will happen to them. The consequence of this is that if something bad happens to people (i.e. being a victim of a crime), then they must have done something to bring this bad thing upon them. In this context, this allows people to feel safe if they avoid doing the things that they believe that the victim has done. For example, victim blaming in this context can consist of arguments that people do not have to go online, do not have to use social media and can always log off if they do not like what is happening online. If people do use social media, and do not deactivate their accounts in response to harassment, then they are often characterised as having put themselves in the way of harm. Conversely, it this type of reasoning allows cybercriminals such as trolls and other online abusers to rationalise their behaviour by saying that the victim can always avoid being victimised by not going online, or not posting comments. However, this means that it is the abused, rather than the abuser, who is expected to change their behaviour. </Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>4 What are the motivations for cybercrime?</Title>
            <Paragraph>In this section you will move to consider the reasons that have been identified to explain cybercrime. When looking at the motivations, the key aspects to consider are:</Paragraph>
            <BulletedList>
                <ListItem>Individual differences (e.g., personality traits)</ListItem>
                <ListItem>The context of the online environment</ListItem>
                <ListItem>The characteristics given by observers to those performing the various types of cybercrime.</ListItem>
            </BulletedList>
            <?oxy_insert_start author="sm36828" timestamp="20200817T103429+0100"?>
            <Paragraph>Psychological research has been able to identify personality correlations of self-reported cyber-criminality or trolling, particularly the ‘dark tetrad’ of personality which includes the personality traits of narcissism, Machiavellianism, psychopathy and sadism. Buckels et al. (2014) used personality inventories to assess these traits; hence these are not clinical assessments. They found that sadism, psychopathy and Machiavellianism all predicted trolling behaviour, with sadism being the strongest predictor. Similarly, Craker and March (2016) found psychopathy and sadism to be predictors of trolling on Facebook. In their research, Craker and March also included a measure of negative social potency (obtaining social reward from negative actions), and this was found to be a stronger predictor of Facebook trolling than any of the personality characteristics.</Paragraph>
            <?oxy_insert_end?>
            <Paragraph>In a nutshell, cybercriminals’ motivations are wide-ranging, and it depends on the crime being looked at. For instance, all cybercrimes linked to ransomware, phishing, online financial crimes, online fraud, password cracking, malware, hacking, sextortion are mainly motivated by financial gain but for some of them motivation can be due to pranks, activism, cyber theft, espionage (e.g. malware). Cybercrimes against the person such as cyberstalking, cyberbullying, trolling, revenge pornography are likely to be motivated by hatred, desire to inflict pain and harm to either known or unknown individuals, groups or community. Lastly, for image related crimes, it could be motivated by a desire to control, to intimidate, sexual gratification, social status building (Henry, Powell, and Flynn, 2017). </Paragraph>
            <Paragraph>As you can see, cybercriminals’ motivations are largely determined by the crime itself and due to the versatility of the different online crimes, it is difficult to consider the motivations for cybercrime on a general level. Additionally, research around motivations for cybercrime can be difficult to investigate because it relies to some extent on the words of criminals who may not see their behaviour as being deviant (e.g. such as in the case of trolling), they may not wish to disclose their reasons for engaging in criminal activities, or may not have complete insight into their own motives. </Paragraph>
        </Session>
        <Session>
            <Title>5 Intervention on cyber criminality</Title>
            <Paragraph>Earlier on in the course, you have looked at the different types of criminal activities that fall within the cyber criminality, and the different ways in which they are connected. So far you have learned about crimes committed via the internet, which have financial and/or psychological consequences for the victims. While online versions of offline crimes might once have been viewed less seriously, there is increasing recognition that the impact of online crimes can be as great as, or in some cases greater, than offline versions of the crime (for example, victims of online image-based sexual offences suffer longer-term effects due to wider distribution and longevity of images on the web). Initially the law struggled to address online criminality, as existing laws did not always fit the online crimes. However, in some cases (e.g. revenge porn), specific laws have now been developed (Nigam, 2018) to address these more effectively. There is information about the way in which these crimes are being tackled in jurisdictions across the world on the <a href="https://www.open.ac.uk/libraryservices/resource/website:118207&amp;f=30596">Centre for Internet &amp; Society</a> website.</Paragraph>
            <Paragraph>In some cases, the match between online and offline versions of a crime make it simple to define criminality and pursue the perpetrator using existing laws. For example, it is easy to see that both physically stealing money from a bank, and electronically stealing money from an online bank account, are forms of theft: regardless of the means used to take the money, the financial loss is the same. However, what if the theft was of virtual money or objects that belong to someone in an online world? Should laws be developed to regulate behaviour in virtual settings? </Paragraph>
            <Section>
                <Title>5.1 Where cybercrime and online anti-social behaviour meet</Title>
                <Paragraph>In some cases, behaviours labelled as trolling for instance, such as threats to rape and kill, or persistent harassment, can be clearly identified as possible criminal offences that should be investigated and potentially prosecuted. At the other extreme, there are online behaviours that fall within the above definition that are not criminal offences. For example, on forums or other internet sites it is quite common to see irrelevancies, pointless questions, arguments and suchlike that can all be forms of trolling. While these may be disruptive or aggravate other users, they do not seem to merit criminal justice responses. </Paragraph>
                <Paragraph>There is currently no legislation that specifically targets trolling (at the time of writing, 2020). However in England and Wales there are a number of pieces of legislation that can be used to prosecute trolling, and the Crown Prosecution Service identifies the Malicious Communications Act 1988 and the Communications Act 2003 as being the relevant legislation. Depending upon the content of the behaviour, other potentially relevant legislation includes the Protection from Harassment Act 1997 and the Criminal Justice and Courts Act 2015. Even considering just England and Wales, the legislative framework for these offences is complex, and different jurisdictions handle these behaviours differently. </Paragraph>
                <Paragraph>Having considered two extremes of trolling, this leaves a significant question as to where the line should be drawn between the offensive/annoying types of trolling and those that warrant a criminal justice response. At present there is not a clear answer to this question, but the issue of where to draw the line is something to be aware of when considering cybercrime.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>6 Reflecting on your experiences</Title>
            <Paragraph>The material covered so far in this course has shown that there are a variety of different types of online victimisation. As well the direct victims of cybercrime, the awareness of the possibility of being a target may influence other internet users. This therefore can be seen as a type of secondary victimisation that may serve to alter and constrain our online behaviours. In this final activity you are going to consider what you have learned and whether this might change how you will engage online.</Paragraph>
            <Activity>
                <Heading>Activity 6 Keeping yourself safe online, or secondary victimisation?</Heading>
                <Timing>Allow 20 minutes</Timing>
                <Question>
                    <Paragraph>Reflect on the following questions:</Paragraph>
                    <NumberedList class="decimal">
                        <ListItem>Based on the content of this course, what steps might you take to try to reduce the likelihood of being targeted by cybercriminals and internet trolls?</ListItem>
                        <ListItem>What are the implications of these measures?<NumberedSubsidiaryList class="lower-alpha"><SubListItem>Do these measures contain an element of victim blaming?</SubListItem><SubListItem>How do you feel about these measures?</SubListItem></NumberedSubsidiaryList></ListItem>
                    </NumberedList>
                </Question>
                <Interaction>
                    <FreeResponse size="paragraph" id="xfr54"/>
                </Interaction>
                <Discussion>
                    <?oxy_delete author="sm36828" timestamp="20200817T103553+0100" content="&lt;Paragraph&gt;Like you have seen in the video in Activity 1, we all take a different approach when it comes to engaging with the online world. Some people are heavily involved online (e.g., social media, online shopping, banking and so on) whereas others are taking a lighter approach to it (i.e. being reluctant to invest themselves more than necessary). Regardless of where you place yourself, up to now it might have been done without reflecting too much about its impact to your virtual and real lives, as well as the risks associated with it. Reflecting upon how you personally engage online is useful since there are not ‘one size fits all’ model and what one person might find acceptable, another may not. Regardless of how much time you have spent on this activity, it is worthwhile as it is important to think about the best (and current) ways to protect yourself. The internet itself is a great source of information but it is always important to favour official guidance such as the UK government (National Cyber Security Centre). The NCSC is offering a wealth of useful advice on how to stay secure online. You can find, below, a selection of such guidance that might be relevant to you: &lt;/Paragraph&gt;"?>
                    <?oxy_insert_start author="sm36828" timestamp="20200817T103553+0100"?>
                    <Paragraph>Like you have seen in the video in Activity 1, <?oxy_insert_end?>everyone takes<?oxy_insert_start author="sm36828" timestamp="20200817T103553+0100"?> a different approach when it comes to engaging with the online world. Some people are heavily involved online (e.g., social media, online shopping, banking and so on) whereas others are taking a lighter approach to it (i.e. being reluctant to invest themselves more than necessary). Regardless of where you place yourself, up to now it might have been done without reflecting too much about its impact to your virtual and real lives, as well as the risks associated with it. While <?oxy_insert_end?>it cannot be said<?oxy_insert_start author="sm36828" timestamp="20200817T103553+0100"?> that cybercrime does not exist, it is probably erroneous to look at it as being the modern-day plague (Wall, 2008). Indeed, the risks associated with online activities are real. However, it is important to emphasise that actual cases of cybercrime are not as common as the media seems to portray its prevalence. This discrepancy could be because the problem has been exaggerated by the media instilling moral panic but could also be because cybercrime remains largely unreported and unprosecuted due to shame or lack of evidence. The best strategy to reduce cybercrime victimisation rates is to raise awareness (Williams and Levi, 2017). Therefore, reflecting upon how you personally engage online is useful since there are not ‘one size fits all’ model and what one person might find acceptable, another may not. Regardless of how much time you have spent on this activity, it is worthwhile as it is important to think about the best (and current) ways to protect yourself. The internet itself is a great source of information but it is always important to favour official guidance such as the UK government (National Cyber Security Centre). The NCSC is offering a wealth of useful advice on how to stay secure online. You can find, below, a selection of such guidance that might be relevant to you:</Paragraph>
                    <?oxy_insert_end?>
                    <BulletedList>
                        <ListItem><a href="https://www.ncsc.gov.uk/files/Protecting-devices-from-viruses-malware-infographic.pdf">Protect devices from viruses and malware</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/files/Phishing-attacks-dealing-suspicious-emails-infographic.pdf">Phishing attacks: dealing with suspicious emails</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/files/Using-passwords-protect-devices-data-infographic.pdf">Using passwords to protect your devices and data</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/guidance/shopping-online-securely">Shopping online securely</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/files/Sextortion-how-to-protect-yourself.pdf">Sextortion phishing scams: how to protect yourself</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/files/Recovering-hacked-online-accounts-infographic.pdf">A guide to recovering your hacked online accounts</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/files/vtc_infographic.pdf">Video conferencing: using services securely</a></ListItem>
                        <ListItem><a href="https://parentinfo.org/article/video-chatting-a-guide-for-parents-and-carers-of-primary-school-age-children">Video chatting: a guide for protecting primary school age children</a></ListItem>
                        <ListItem><a href="https://parentinfo.org/article/video-chatting-a-guide-for-parents-and-carers-of-secondary-school-age-children">Video chatting: a guide for protecting secondary school age children</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/guidance/smart-devices-in-the-home">Smart devices: using them safely in your home</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/guidance/smart-security-cameras-using-them-safely-in-your-home">Smart security cameras: Using them safely in your home</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/guidance/securing-your-devices">Securing your devices</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/guidance/online-gaming-for-families-and-individuals">Online gaming for families and individuals</a></ListItem>
                        <ListItem><a href="https://www.ncsc.gov.uk/guidance/social-media-protect-what-you-publish">Social media: protecting what you publish</a></ListItem>
                        <ListItem><a href="https://revengepornhelpline.org.uk/">Revenge Porn Helpline</a></ListItem>
                        <ListItem><a href="https://www.internetmatters.org/issues/cyberbullying/learn-about-it/">Information about cyberbullying and how to respond to it</a></ListItem>
                        <ListItem><a href="https://www.victimsupport.org.uk/crime-info/types-crime/stalking-and-harassment">Cyberstalking support website</a></ListItem>
                    </BulletedList>
                </Discussion>
            </Activity>
        </Session>
        <Session>
            <Title>7 Conclusion</Title>
            <Paragraph>This course has provided an introduction to some of the different types of cybercrime, considering the similarities and differences in the definitions and behaviours. You have looked at how it is challenging to recognise the differences between anti-social and criminal behaviour. You have also learned about the impact of cybercrime on victims and the motivations for cybercrime, as well as the challenges that some of these crimes raise in terms of crime prevention and legal redress. </Paragraph>
            <Table class="type 2" style="norules">
                <TableHead/>
                <tbody>
                    <tr>
                        <td><Paragraph>Now that you are at the end of this course, you should be able to: </Paragraph><BulletedList><ListItem>outline <?oxy_delete author="sm36828" timestamp="20200810T100524+0100" content="its"?><?oxy_insert_start author="sm36828" timestamp="20200810T100525+0100"?>the<?oxy_insert_end?> impact on victims</ListItem><ListItem>distinguish different types of cybercrime, considering the similarities and differences in the definitions and behaviours</ListItem><ListItem>identify the motivations and behaviours of cybercriminals</ListItem><ListItem>illustrate the current interventions to tackle cybercrime.</ListItem></BulletedList></td>
                        <td><Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/dd801_2_conclusion294089.tif" src_uri="file:////dog/PrintLive/Courses/dd802_1/dd801_2_conclusion294089.tif" x_printonly="y" x_folderhash="78ad59c7" x_contenthash="75f9c200" x_imagesrc="dd801_2_conclusion294089.tif.jpg" x_imagewidth="512" x_imageheight="683"/><Alternative>An image of a person sat at a table with one arm in the air, palm up. Above the palm is an image of a love heart, similar to that of a like option found on social media platforms. </Alternative><Description>An image of a person sat at a table with one arm in the air, palm up. Above their palm is an image of a love heart, similar to that of a like option found on social media platforms. </Description></Figure></td>
                    </tr>
                </tbody>
            </Table>
            <Paragraph>This Open Learn course is an adapted extract from the Open University course <a href="http://www.open.ac.uk/postgraduate/modules/dd802">DD802 <i>Investigating forensic psychology</i>.</a></Paragraph>
            <Paragraph>Explore the collection of <a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/postgraduate-study-psychology-and-criminology">Postgraduate study in psychology and criminology</a>.</Paragraph>
        </Session>
    </Unit>
    <BackMatter>
        <Glossary>
            <GlossaryItem>
                <Term>Cyber bullying</Term>
                <Definition>Cyberbullying has been defined as ‘an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself’ (Smith et al., 2008, p. 376).</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Cyberstalking</Term>
                <Definition>Cyberstalking is aimed at a specific individual and entails ‘using the Internet as part of a targeted campaign that causes fear, distress or alarm’ (Cavezza and McEwan, 2014, pp. 955-956). </Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Hacking</Term>
                <Definition>Bypassing security systems to make an unauthorised intrusion into a computer or network.</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Image-based sexual crimes</Term>
                <Definition>The use of nude/sexual images of a victim for criminal purposes.</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Malware</Term>
                <Definition>Malicious software that interferes with the normal functioning of a network or computer.</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Online financial crimes</Term>
                <Definition>Illegally obtaining money or other financial rewards using online methods.</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Online Fraud</Term>
                <Definition>Fraud that is committed using online methods. You can read about the many different types of online fraud at the <a href="https://www.open.ac.uk/libraryservices/resource/website:118067&amp;f=30574">Action Fraud website</a>.</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Password cracking</Term>
                <Definition>The process of recovering or guessing the correct password needed to gain access to a system or account.</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Phishing</Term>
                <Definition>Techniques used to persuade people to divulge information that can be used in online fraud (e.g. bank account passwords).</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Photo-hacking</Term>
                <Definition>Hacking that is specifically targeted at gaining unauthorised access to photos, particularly nude images.</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Ransomware</Term>
                <Definition>A type of malware that renders a computer and/or its files inaccessible, with a demand for payment to unlock it/them.</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Revenge Pornography</Term>
                <Definition>Kamal and Newman (2016, p. 361) describe revenge pornography as ‘the online release of explicit photographs or videos of an individual without permission for the purpose of humiliation.’</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Sextortion</Term>
                <Definition>‘Situations in which perpetrators threaten to expose sexual images to coerce victims to provide additional pictures, engage in sexual activity, or agree to other demands’ (Wolak et al., 2017, pp. 1).</Definition>
            </GlossaryItem>
            <?oxy_insert_start author="sm36828" timestamp="20200810T104440+0100"?>
            <GlossaryItem>
                <Term><?oxy_insert_end?>Trojan<?oxy_insert_start author="sm36828" timestamp="20200810T104440+0100"?></Term>
                <Definition><?oxy_insert_end?>A malicious piece of software that misleads users into activating it by masking its true intent. For example, a file that destroys software which is named ‘virus protection program’.<?oxy_insert_start author="sm36828" timestamp="20200810T104440+0100"?></Definition>
            </GlossaryItem>
            <?oxy_insert_end?>
            <GlossaryItem>
                <Term>Trolling</Term>
                <Definition>‘The act of ‘trolling’ is generally defined as being a negative online behaviour intended to disrupt online communications, aggravate internet users and draw individuals into fruitless debates’ (Coles and West, 2016, p. 44).</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Virus</Term>
                <Definition>Software that replicates by inserting its code into other programs and files, often causing damage by corrupting data or creating a ‘back door’ to allow attackers to access the system.</Definition>
            </GlossaryItem>
            <GlossaryItem>
                <Term>Worm</Term>
                <Definition>A stand-alone malware program that can self-replicate and spread to other computers.</Definition>
            </GlossaryItem>
        </Glossary>
        <References>
            <Reference>Action Fraud (2018) <i>419 emails and letters</i>. Available at: <a href="https://www.actionfraud.police.uk/a-z-of-fraud/419-emails-and-letters">https://www.actionfraud.police.uk/a-z-of-fraud/419-emails-and-letters</a> (Accessed: 04 November 2020).</Reference>
            <Reference>Aransiola, J. O. and Asindemade, S. O. (2011) ‘Understanding cybercrime perpetrators and the strategies they employ in Nigeria’, <i>Cyberpsychology, Behavior, and Social Networking</i>, 14, pp. 759−763.</Reference>
            <Reference>Bates, S. (2017) ‘Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors,’ <i>Feminist Criminology</i>, 12(1), pp. 22−42.</Reference>
            <Reference>BBC News (2011) ‘Who, What, Why: Can phone hackers still access messages?’, <i>BBC News</i> 6 July. Available at: <a href="https://www.bbc.co.uk/news/magazine-14044499">https://www.bbc.co.uk/news/magazine-14044499</a> (Accessed: 04 November 2020).</Reference>
            <Reference>BBC News (2014) ‘Hacking Trial: the verdicts’, <i>BBC News</i> 4 July. Available at: <a href="https://www.bbc.co.uk/news/uk-27145187">https://www.bbc.co.uk/news/uk-27145187</a> (Accessed: 04 November 2020).</Reference>
            <Reference>Bishop, J. (2014) ‘Representations of ‘trolls’ in mass media communication: a review of media-texts and moral panics relating to ‘internet trolling’, <i>International Journal of Web Based Communities</i>, 10(1), pp. 7-24.</Reference>
            <Reference>Buchanan, T. and Whitty, M. T. (2014) ‘The online dating romance scam: causes and consequences of victimhood’, <i>Psychology, Crime and Law</i>, 20(3), pp.261–283. </Reference>
            <Reference>Buckels, E. E., Trapnell, P. D. and Paulhus, D. L. (2014). ‘Trolls just want to have fun’ <i>Personality and individual Differences</i>, 67, pp. 97–102.</Reference>
            <Reference>Button, M., Lewis, C. and Tapley, J. (2009) Fraud typologies and the victims of fraud literature review. London, National Fraud Authority.</Reference>
            <Reference>Button, M., Lewis, C. and Tapley, J. (2014) ‘Not a victimless crime: The impact of fraud on individual victims and their families’, Security Journal, 27(1), pp. 36−54.</Reference>
            <Reference>Canter, D. and Youngs, D. (2009) <i>Investigative Psychology: Offender Profiling and the Analysis of Criminal Action</i>, Chichester, Wiley.</Reference>
            <Reference>Coles, B. A. and West, M. (2016) ‘Trolling the trolls: Online forum users constructions of the nature and properties of trolling’, <i>Computers in Human Behavior</i>, 60, pp. 233–244.</Reference>
            <Reference>Conklin, A., Dietrich, G. and Walz, D. (2004) ‘Password-based Authentication: A System Perspective’, <i>Proceedings of the 37th Annual Hawaii International Conference on System Sciences</i>, pp. 1−10.</Reference>
            <Reference>Cooper, K., Quayle, E., Jonsson, L. and Göran Svedin, C. (2016) ‘Adolescents and self-taken sexual images: A review of the literature’, <i>Computers in Human Behavior</i>, 55, Part B, pp. 706−716.</Reference>
            <Reference>Cross, C. (2015). ‘No laughing matter: Blaming the victim of online fraud’, <i>International Review of Victimology</i>, 21(2), pp. 187–204.</Reference>
            <Reference>Dreßing, H., Bailer, J., Anders, A., Wagner, H. and Gallas, C. (2014) ‘Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims’, <i>Cyberpsychology, Behavior, and Social Networking</i>, 17(2), pp. 61–67.</Reference>
            <Reference>Fichman, P. and Sanfilippo, M.R. (2016). ‘Online trolling and its perpetrators: Under the cyberbridge’. Lanham, Maryland: Rowman &amp; Littlefield.</Reference>
            <?oxy_insert_start author="sm36828" timestamp="20200817T091901+0100"?>
            <Reference>Fogarty, P. (2019) ‘ What is tattle life? Harmless forum or hotbed of harassement?’ Available at<?oxy_insert_end?>:<?oxy_insert_start author="sm36828" timestamp="20200817T091901+0100"?> <a href="https://www.hitc.com/en-gb/2019/06/27/what-is-tattle-life-mrs-meldrum-harassment-bullying-petition/">https://www.hitc.com/en-gb/2019/06/27/what-is-tattle-life-mrs-meldrum-harassment-bullying-petition/</a> (Accessed<?oxy_insert_end?>:<?oxy_insert_start author="sm36828" timestamp="20200817T091901+0100"?> <?oxy_insert_end?>04 November<?oxy_insert_start author="sm36828" timestamp="20200817T091901+0100"?> 2020)</Reference>
            <?oxy_insert_end?>
            <Reference>Gehringer. E. F. (2002) ‘Choosing passwords: security and human factors’, <i>2002 International Symposium on Technology and Society</i>, pp. 369−373.</Reference>
            <Reference>Gray, J. M. (2015) ‘What constitutes a “reasonable belief in consent” to sex? A thematic analysis’, <i>Journal of Sexual Aggression</i>, 21(3), pp. 337−353.</Reference>
            <Reference>Henry, N., Powell, A., &amp; Flynn, A. L. G. (2017). <i>Not Just ‘Revenge Pornography’: Australians’ Experiences of Image-Based Abuse: A Summary Report</i>, RMIT University. Available at: <a href="https://researchmgt.monash.edu/ws/portalfiles/portal/214045352/revenge_porn_report_2017.pdf">https://researchmgt.monash.edu/ws/portalfiles/portal/214045352/revenge_porn_report_2017.pdf</a> (Accessed: 04 November 2020).</Reference>
            <Reference>Herring, S., Job-Sluder, K., Scheckler, R. and Barab, S. (2002) ‘Searching for safety online: Managing “trolling” in a feminist forum’, <i>The Information Society</i>, 18, pp. 371–384.</Reference>
            <Reference>Kashner, S. (2014) ‘Both Huntress and Prey’, <i>Vanity Fair</i>, 20 October. Available at: <a href="https://archive.vanityfair.com/article/2014/11/both-huntress-and-prey">https://archive.vanityfair.com/article/2014/11/both-huntress-and-prey</a> (Accessed: 04 November 2020).</Reference>
            <Reference>How People Use the Internet in 2020 (2020). <i>How people use the internet in 2020</i>. Available at: <a href="https://www.broadbandsearch.net/blog/most-common-uses-internet-daily-life">https://www.broadbandsearch.net/blog/most-common-uses-internet-daily-life</a> (Accessed: 04 November 2020).</Reference>
            <Reference>Kirwan, G. and Power, A. (2013) ‘Cyberbullying and Cyberstalking’, in Kirwan, G. and Power, A. <i>Cybercrime: The Psychology of Online Offenders</i>, Cambridge, Cambridge University Press, pp. 147–168.</Reference>
            <Reference>Låftman, S. B., Modin, B. and Östberg, V. (2013) ‘Cyberbullying and subjective health: A large-scale study of students in Stockholm, Sweden’, <i>Children and Youth Services Review</i>, 35, pp. 112–119. </Reference>
            <Reference>Langos, C. (2015) ‘Cyberbullying: The shades of harm’ <i>Psychiatry, psychology and law</i>, 22(1), pp.106–123.</Reference>
            <Reference>Lerner, M. J. (1980) <i>The Belief in a Just World: A Fundamental Delusion</i>, New York, Plenum Press.</Reference>
            <Reference>Mackie , J. (2014) ‘Jennifer Lawrence’s nude photo leak is not a sex crime, however much she’d like it to be’, The Independent, 10 October. Available at: <a href="https://www.independent.co.uk/voices/comment/jennifer-lawrences-nude-photo-leak-was-a-scandal-but-legally-speaking-it-was-not-a-sex-crime-9786886.html">https://www.independent.co.uk/voices/comment/jennifer-lawrences-nude-photo-leak-was-a-scandal-but-legally-speaking-it-was-not-a-sex-crime-9786886.html</a> (Accessed: 04 November 2020).</Reference>
            <Reference>McGlynn, C., Rackley, E. and Houghton, R. (2017) ‘Beyond ‘revenge porn’: The continuum of image-based sexual abuse’ <i>Feminist Legal Studies</i>, 25(1), pp. 25–46.</Reference>
            <Reference>Mendelsohn, B. (1956) ‘The Victimology’, <i>Etudes Internationales de Psycho-Sociologie Criminelle</i>, 3, pp. 25–26 (in French).</Reference>
            <Reference>Morgan (2017) ‘Announcing our Worst Passwords of 2016’, TeamsID [Online]. Available at: <a href="https://www.teamsid.com/worst-passwords-2016/">https://www.teamsid.com/worst-passwords-2016/</a> (Accessed: 04 November 2020).</Reference>
            <?oxy_insert_start author="sm36828" timestamp="20200817T091752+0100"?>
            <Reference>Naughton, J. (2016). ‘The evolution of the internet: from military experiment to general purpose technology’, <i>Journal of Cyber Policy</i>, vol.35, no. 1, pp.5-28.</Reference>
            <?oxy_insert_end?>
            <Reference>Nigam, S. (2018) ‘Revenge Porn Laws across the World’, The Centre for Internet and Society [Online] Available at: https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world (Accessed: 04 November 2020).</Reference>
            <Reference>Nuccitelli, M (n.d.) <i>130+ types of internet trolls and online provocateurs</i>. Available at: <a href="https://www.ipredator.co/troll/">https://www.ipredator.co/troll/</a> (Accessed: 04 November 2020).</Reference>
            <Reference>Ofcom (2020). <i>Adult’s media use and attitudes 2020</i>. Available at: <a href="https://www.ofcom.org.uk/__data/assets/pdf_file/0031/196375/adults-media-use-and-attitudes-2020-report.pdf">https://www.ofcom.org.uk/__data/assets/pdf_file/0031/196375/adults-media-use-and-attitudes-2020-report.pdf</a> (Accessed: 04 November 2020).</Reference>
            <Reference>Oppenheim, M. (2017) ‘Jennifer Lawrence addresses nude photo hack: “It was so unbelievably violating”’, <i>The Guardian</i>, 21 November. Available at: <a href="https://www.independent.co.uk/%20arts-entertainment/%20films/%20news/%20jennifer-lawrence-nude-photo-hack-pictures-video-leak-celebrity-addresses-issue-violating-a8067121.html">https://www.independent.co.uk/ arts-entertainment/ films/ news/ jennifer-lawrence-nude-photo-hack-pictures-video-leak-celebrity-addresses-issue-violating-a8067121.html</a> (Accessed: 04 November 2020).</Reference>
            <Reference>Rege, A. (2009) ‘What's love got to do with it? Exploring online dating scams and identity fraud’, <i>International Journal of Cyber Criminology</i>, 3, pp. 494−512.</Reference>
            <Reference>Samimi, P. and Alderson, K. (2014) ‘Sexting among undergraduate students’, <i>Computers in Human Behavior</i>, 31, pp. 230−241.</Reference>
            <Reference>Schneider, S. K., O’Donnell, L., Stueve, A. and Coulter, R. (2012) ‘Cyberbullying, school bullying, and psychological distress: A regional census of high school students’, <i>American Journal of Public Health</i>, 102, pp. 171–177.</Reference>
            <Reference>Shachaf, P. and Hara, N. (2010) ‘Beyond vandalism: Wikipedia trolls’, <i>Journal of Information Science</i>, 36(3), pp. 357–370.</Reference>
            <Reference>Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008) ‘Cyberbullying: its nature and impact in secondary school pupils’, <i>Journal of Child Psychology and Psychiatry</i>, 49(4), pp. 376–385.</Reference>
            <Reference>Schneider, S. K., O’Donnell, L., Stueve, A. and Coulter, R. (2012) ‘Cyberbullying, school bullying, and psychological distress: A regional census of high school students’, <i>American Journal of Public Health</i>, 102, pp. 171–177.</Reference>
            <Reference>Sourander, A., Brunstein Klomek, A., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T. and Helenius, H. (2010) ‘Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study’, <i>Archives of General Psychiatry</i>, 67(7), pp. 720–728.</Reference>
            <Reference>Tam, L., Glassman, M. and Vanderwauver, M. (2009) ‘The psychology of password management: a tradeoff between security and convenience’, <i>Behaviour &amp; Information Technology</i>, 29(3), pp. 233−244.</Reference>
            <Reference>Whitty, M. T. and Buchanan, T. (2012) ‘The online dating romance scam: A serious cybercrime’, <i>Cyberpsychology, Behavior, and Social Networking</i>, 15(3), pp. 181−183.</Reference>
            <Reference>Whitty, M.T. and Buchanan, T. (2016) ‘The online dating romance scam: The psychological impact on victims – both financial and non-financial’, <i>Criminology &amp; Criminal Justice</i>, 16(2), pp. 176−194.</Reference>
            <?oxy_insert_start author="sm36828" timestamp="20200817T091833+0100"?>
            <Reference>Williams, M. L., &amp; Levi, M. (2017). ‘Cybercrime prevention’. In N. Tilley &amp; A. Sidebottom (Eds.), Handbook of crime prevention and community safety (pp. 454<?oxy_insert_end?>−<?oxy_insert_start author="sm36828" timestamp="20200817T091833+0100"?>469). London: Routledge.</Reference>
            <?oxy_insert_end?>
            <Reference>Youngs, D., Ioannou, M. and Eagles, J. (2016) ‘Expressive and instrumental offending: Reconciling the paradox of specialisation and versatility’, <i>International Journal of Offender Therapy and Comparative Criminology</i>, 60(4), pp. 397–422.</Reference>
        </References>
        <!--To be completed where appropriate: 
<Glossary><GlossaryItem><Term/><Definition/></GlossaryItem>
</Glossary><References><Reference/></References>
<FurtherReading><Reference/></FurtherReading>-->
        <Acknowledgements>
            <Paragraph>This free course was written by the DD802 module team and rewritten for OpenLearn by Axelle Philippon.<!--Author name, to be included if required--></Paragraph>
            <!--If archive course include following line: 
This free course includes adapted extracts from the course [Module title IN ITALICS]. If you are interested in this subject and want to study formally with us, you may wish to explore other courses we offer in [SUBJET AREA AND EMBEDDED LINK TO STUDY @OU].-->
            <Paragraph>Except for third party materials and otherwise stated (see <a href="http://www.open.ac.uk/conditions">terms and conditions</a>), this content is made available under a <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence</a>.</Paragraph>
            <Paragraph>The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this free course: </Paragraph>
            <Paragraph><?oxy_insert_start author="sm36828" timestamp="20201023T143710+0100"?>Course image: Adapted from Jacob Morch / unsplash and geralt / pixabay (asset 293456)<?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143739+0100" type="split"?></Paragraph>
            <?oxy_insert_end?>
            <?oxy_insert_start author="sm36828" timestamp="20201023T143739+0100" type="split"?>
            <Paragraph><?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143710+0100"?>Section 2.1 activity image: Axelle Philippon (asset 294436)<?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143744+0100" type="split"?></Paragraph>
            <Paragraph><?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143710+0100"?>Section 2.2 image: Photo by Oladimeji Ajegbile from Pexels (asset 294086)<?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143748+0100" type="split"?></Paragraph>
            <?oxy_insert_end?>
            <Paragraph>Audio 1: © BBC</Paragraph>
            <?oxy_insert_start author="sm36828" timestamp="20201023T143748+0100" type="split"?>
            <Paragraph><?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143710+0100"?>Section 2.3 image: Image by Robinraj Premchand from Pixabay (asset 294338)<?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143751+0100" type="split"?></Paragraph>
            <Paragraph><?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143710+0100"?>Section 2.4 image: Photo by cottonbro from Pexels (asset 294082)<?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143753+0100" type="split"?></Paragraph>
            <Paragraph><?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143710+0100"?>Section 3 image: Photo by Ekaterina Bolovtsova from Pexels (asset 294083)<?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143756+0100" type="split"?></Paragraph>
            <Paragraph><?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143710+0100"?>Section 3.1 image: Photo by Oladimeji Ajegbile from Pexels (asset 294084)<?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143758+0100" type="split"?></Paragraph>
            <Paragraph><?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143710+0100"?>Section 3.2 image: Photo by Aliyah Jamous on Unsplash (asset 294344)<?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143819+0100" type="split"?></Paragraph>
            <Paragraph><?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T143710+0100"?>Conclusion image: Photo by Oladimeji Ajegbile from Pexels (asset 294089) <?oxy_insert_end?><?oxy_insert_start author="sm36828" timestamp="20201023T144031+0100" type="split"?></Paragraph>
            <?oxy_insert_end?>
            <?oxy_insert_start author="sm36828" timestamp="20201023T144031+0100" type="split"?>
            <Paragraph><?oxy_insert_end?><?oxy_delete author="sm36828" timestamp="20201023T144345+0100" content="Figure 1 photograph: Stocktrek Images"?></Paragraph>
            <?oxy_delete author="sm36828" timestamp="20201023T144345+0100" content="&lt;Paragraph&gt;Figure 3 photograph: Wiskerke/Alamy&lt;/Paragraph&gt;&lt;Paragraph&gt;Figure 4 photograph: Oxfordshire Photography Project/Alamy&lt;/Paragraph&gt;&lt;Paragraph&gt;Figure 5: Florilegius/Alamy&lt;/Paragraph&gt;&lt;Paragraph&gt;Figure 6 graphic of news headlines, sources: Gulfnews.com &lt;a href=&quot;https://gulfnews.com/business/property/abu-dhabi-property-close-to-demand-supply-balance-1.68110536&quot;&gt;https://gulfnews.com/business/property/abu-dhabi-property-close-to-demand-supply-balance-1.68110536&lt;/a&gt; (accessed: 12 March 2020); Freshplaza.com &lt;a href=&quot;https://www.freshplaza.com/article/9166995/huge-demand-for-egyptian-onions-price-nearly-doubled-in-45-days/&quot;&gt;https://www.freshplaza.com/article/9166995/huge-demand-for-egyptian-onions-price-nearly-doubled-in-45-days/&lt;/a&gt; (accessed: 12 March 2020); Nikkei Asia Review &lt;a href=&quot;https://asia.nikkei.com/Business/Energy/LNG-prices-in-Asia-plunge-43-as-new-US-supply-hits-market&quot;&gt;https://asia.nikkei.com/Business/Energy/LNG-prices-in-Asia-plunge-43-as-new-US-supply-hits-market&lt;/a&gt; (accessed: 12 March 2020); ITV News &lt;a href=&quot;https://www.itv.com/news/2019-09-10/uk-employment-rate-hits-record-high-as-wages-surge-higher/&quot;&gt;https://www.itv.com/news/2019-09-10/uk-employment-rate-hits-record-high-as-wages-surge-higher/&lt;/a&gt; (accessed: 12 March 2020)&lt;/Paragraph&gt;&lt;Paragraph&gt;Figure 11 photograph: FLPA/Alamy Stock Photo&lt;/Paragraph&gt;&lt;Paragraph&gt;Figure 12 photograph: Paul Glendell / Alamy&lt;/Paragraph&gt;&lt;Paragraph&gt;Figure 13 photograph: LPETTET / iStock / Getty Images&lt;/Paragraph&gt;&lt;Paragraph&gt;Figure 14: Flood Re&lt;/Paragraph&gt;&lt;Paragraph&gt;Video 1 Making space for water: with kind permission from The Rivers Trust/West Cumbria Rivers Trust.&lt;/Paragraph&gt;"?>
            <!--The full URLs if required should the hyperlinks above break are as follows: Terms and conditions link  http://www.open.ac.uk/ conditions; Creative Commons link: http://creativecommons.org/ licenses/ by-nc-sa/ 4.0/ deed.en_GB]-->
            <Paragraph>Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.</Paragraph>
            <!--<Paragraph>Course image <EditorComment>Acknowledgements provided in production specification or by LTS-Rights</EditorComment></Paragraph>-->
            <!--<Paragraph>
        <EditorComment>Please include  further acknowledgements as provided in production specification or by LTS-Rights in following order:
Text



Images



Figures



Illustrations



Tables



AV



Interactive assets</EditorComment>
      </Paragraph>-->
            <Paragraph/>
            <Paragraph><b>Don't miss out</b></Paragraph>
            <Paragraph>If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University – <a href="http://www.open.edu/openlearn/free-courses?LKCAMPAIGN=ebook_&amp;MEDIA=ol">www.open.edu/openlearn/free-courses</a>.</Paragraph>
        </Acknowledgements>
    </BackMatter>
<settings>
    <numbering>
        <Session autonumber="false"/>
        <Section autonumber="false"/>
        <SubSection autonumber="false"/>
        <SubSubSection autonumber="false"/>
        <Activity autonumber="false"/>
        <Exercise autonumber="false"/>
        <Box autonumber="false"/>
        <CaseStudy autonumber="false"/>
        <Quote autonumber="false"/>
        <Extract autonumber="false"/>
        <Dialogue autonumber="false"/>
        <ITQ autonumber="false"/>
        <Reading autonumber="false"/>
        <StudyNote autonumber="false"/>
        <Example autonumber="false"/>
        <Verse autonumber="false"/>
        <SAQ autonumber="false"/>
        <KeyPoints autonumber="false"/>
        <ComputerDisplay autonumber="false"/>
        <ProgramListing autonumber="false"/>
        <Summary autonumber="false"/>
        <Tables autonumber="false"/>
        <Figures autonumber="false"/>
        <MediaContent autonumber="false"/>
        <Chemistry autonumber="false"/>
    </numbering>
    <discussion_alias>Discussion</discussion_alias>
    <session_prefix/>
<version>2020051800</version></settings></Item>
