<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:cc="http://web.resource.org/cc/" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>RSS feed for The psychology of cybercrime</title>
    <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-0</link>
    <description>This RSS feed contains all the sections in The psychology of cybercrime</description>
    <generator>Moodle</generator>
    <copyright>Copyright © 2020 The Open University</copyright>
    <image>
      <url>https://www.open.edu/openlearn/ocw/theme/image.php/_s/openlearnng/core/1604916807/i/rsssitelogo</url>
      <title>moodle</title>
      <link>https://www.open.edu/openlearn/ocw</link>
      <width>140</width>
      <height>35</height>
    </image>
    <language>en-gb</language><lastBuildDate>Tue, 17 Nov 2020 15:31:09 +0000</lastBuildDate><pubDate>Tue, 17 Nov 2020 15:31:09 +0000</pubDate><dc:date>2020-11-17T15:31:09+00:00</dc:date><dc:publisher>The Open University</dc:publisher><dc:language>en-gb</dc:language><dc:rights>Copyright © 2020 The Open University</dc:rights><cc:license>Copyright © 2020 The Open University</cc:license><item>
      <title>Introduction</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-0</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;In this free course, &lt;i&gt;The psychology of cybercrime&lt;/i&gt;, you will explore different questions about cybercrime from a psychological angle in an attempt to better understand this relatively recent field of psychology. You will consider the realms and limits of cybercrime, distinguishing between the different types of cybercrime (e.g. trolling, cyber-stalking, fraud, hacking), the experiences of being victims of cybercrime and the causes behind engaging in these types of criminal activity. Finally, current interventions will be highlighted. &lt;/p&gt;&lt;p&gt;Even though cybercrime is broadly encompassing all the different types of crime committed online, it is important to emphasise very early on that it is likely to be committed by offenders with different characteristics, motivations and behaviours than those who commit other types of crime. As a result, those online criminal activities share similarities with offline equivalents (e.g. fraud and online fraud). The interest in studying the psychology of cybercrime both from the perpetrator and victim perspectives has arisen in an attempt to understand what makes cybercrime unique or similar to its offline counterpart.&lt;/p&gt;&lt;div class="oucontent-box oucontent-s-heavybox2 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Content warning&lt;/h3&gt;&lt;div class="oucontent-inner-box"&gt;&lt;p&gt;Cybercrime victimisation can affect both adults and children who engage online. Please find links to two useful guides that give tips on to stay safe online:&lt;/p&gt;&lt;ol class="oucontent-numbered"&gt;&lt;li&gt;&lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.westyorkshire.police.uk/sites/default/files/a_guide_to_cyber_crime_and_online_safety_0.pdf"&gt;Cybercrime and online safety&lt;/a&gt;&lt;/span&gt; developed by West Yorkshire police.&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.net-aware.org.uk/news/supporting-your-childs-wellbeing-online/"&gt;Supporting your child’s wellbeing&lt;/a&gt; by the NSPCC.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;This Open Learn course is an adapted extract from the Open University course &lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/postgraduate/modules/dd802"&gt;DD802 &lt;i&gt;Investigating forensic psychology&lt;/i&gt;.&lt;/a&gt; Explore the collection of &lt;a class="oucontent-hyperlink" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/postgraduate-study-psychology-and-criminology"&gt;Postgraduate study in psychology and criminology&lt;/a&gt;.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-0</guid>
    <dc:title>Introduction</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;In this free course, &lt;i&gt;The psychology of cybercrime&lt;/i&gt;, you will explore different questions about cybercrime from a psychological angle in an attempt to better understand this relatively recent field of psychology. You will consider the realms and limits of cybercrime, distinguishing between the different types of cybercrime (e.g. trolling, cyber-stalking, fraud, hacking), the experiences of being victims of cybercrime and the causes behind engaging in these types of criminal activity. Finally, current interventions will be highlighted. &lt;/p&gt;&lt;p&gt;Even though cybercrime is broadly encompassing all the different types of crime committed online, it is important to emphasise very early on that it is likely to be committed by offenders with different characteristics, motivations and behaviours than those who commit other types of crime. As a result, those online criminal activities share similarities with offline equivalents (e.g. fraud and online fraud). The interest in studying the psychology of cybercrime both from the perpetrator and victim perspectives has arisen in an attempt to understand what makes cybercrime unique or similar to its offline counterpart.&lt;/p&gt;&lt;div class="oucontent-box oucontent-s-heavybox2 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Content warning&lt;/h3&gt;&lt;div class="oucontent-inner-box"&gt;&lt;p&gt;Cybercrime victimisation can affect both adults and children who engage online. Please find links to two useful guides that give tips on to stay safe online:&lt;/p&gt;&lt;ol class="oucontent-numbered"&gt;&lt;li&gt;&lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.westyorkshire.police.uk/sites/default/files/a_guide_to_cyber_crime_and_online_safety_0.pdf"&gt;Cybercrime and online safety&lt;/a&gt;&lt;/span&gt; developed by West Yorkshire police.&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.net-aware.org.uk/news/supporting-your-childs-wellbeing-online/"&gt;Supporting your child’s wellbeing&lt;/a&gt; by the NSPCC.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;This Open Learn course is an adapted extract from the Open University course &lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/postgraduate/modules/dd802"&gt;DD802 &lt;i&gt;Investigating forensic psychology&lt;/i&gt;.&lt;/a&gt; Explore the collection of &lt;a class="oucontent-hyperlink" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/postgraduate-study-psychology-and-criminology"&gt;Postgraduate study in psychology and criminology&lt;/a&gt;.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>Learning outcomes</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section---learningoutcomes</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;After studying this course you should be able to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;outline the impact on victims&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;distinguish different types of cybercrime, considering the similarities and differences in the definitions and behaviours&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;identify the motivations and behaviours of cybercriminals&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;illustrate the current interventions to tackle cybercrime.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section---learningoutcomes</guid>
    <dc:title>Learning outcomes</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;After studying this course you should be able to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;outline the impact on victims&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;distinguish different types of cybercrime, considering the similarities and differences in the definitions and behaviours&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;identify the motivations and behaviours of cybercriminals&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;illustrate the current interventions to tackle cybercrime.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>1 What is cybercrime?</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-1</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;Cybercrime refers to criminal activities that are committed using internet technology. The internet has only been in widespread use by the general public for a few decades (a &amp;#x2018;start date’ could be considered to be the launch of the World Wide Web on the 6 August 1991), but online activity has already become ubiquitous in the developed world and is becoming progressively more common in much of the developing world as well (Naughton, 2016).&lt;/p&gt;&lt;p&gt;Psychologists studying cybercrime, including its perpetrators and victims, are interested both in what makes cybercrime unique (e.g. does online anonymity increase the propensity of some people to commit crimes of harassment?) as well as what it has in common with offline crime – although the emphasis is often on the former rather than the latter.&lt;/p&gt;&lt;p&gt;Before reading further complete Activity 1. In order to help you complete the activity, please watch the following video and then consider your perspectives on living online.&lt;/p&gt;&lt;div id="idm45634923141056" class="oucontent-media oucontent-audio-video omp-version1 oucontent-unstableid" style="width:512px;"&gt;&lt;div class="oucontent-default-filter "&gt;&lt;span class="oumediafilter"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/61d99f91/dd210_2015j_vid202-320x176.mp4?forcedownload=1" class="oumedialinknoscript omp-spacer"&gt;Download this video clip.&lt;/a&gt;&lt;span class="accesshide"&gt;Video player: Video 1 Everyday perspectives: engaging online &lt;/span&gt;&lt;div class="omp-wrapper-div"&gt;
&lt;a href="#" class="omp-enter-media omp-accesshide" tabindex="-1"&gt;
  &lt;!-- This tag is a flag to oump standalone recognizes that user prepare to enter to media by using tab --&gt;
&lt;/a&gt;
&lt;video  style="display: none;"
  data-omp-type = 'video'
  data-omp-player = 'html5'
  data-omp-sizing = 'custom'
  data-omp-width = '512'
  data-omp-height = '0'
  data-omp-contextid = '2528823'
  data-omp-renderstyle = 'compact'
  data-omp-uilanguage = 'openlearn'
  preload = 'none'
  controls = 'controls'
  data-omp-disable-features = ',playlist,chapters,transcripts,textdescriptions,autoplay,annotation,sources,language,download,share,description,title,share,copyright'
  data-omp-speed-control = ''
  data-omp-poster = 'https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/4815787d/dd210_2015j_vid202-640x360_still.jpg'
  data-omp-base-url =  'https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554'
  data-omp-ios-base-url =  'https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554'
  data-omp-iswhitelist =  '2'
  data-omp-controlslist = ' '
  src = '' &lt;!-- put this to avoid browser throw the error "Media resource load failed" --&gt;
&gt;
            &lt;div data-omp-name = 'manifest'
            data-omp-manifest = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/6j04uqdp/dd210_2015j_vid202_1_server_manifest.xml"&gt;&lt;/div&gt;              &lt;source type = "video/mp4"
                data-omp-src = "/78ad59c7/4pk2x1aj/dd210_2015j_vid202-320x176.mp4"
                data-omp-label = "320x176 mp4"
                data-omp-resolution = "320"
                data-omp-provider = ""
                data-omp-player = ""
                data-omp-default = "default"/&gt;              &lt;div data-omp-name = 'track'
            data-omp-srclang = "en"
            data-omp-kind = "subtitles"
            data-omp-type = "text/vtt"
            data-omp-src = "/78ad59c7/3q5tqjmn/dd210_2015j_vid202-320x176.vtt"
            data-omp-label = "English subtitles"&gt;&lt;/div&gt;              &lt;div data-omp-name = 'copyright'&gt;&lt;/div&gt;              &lt;div data-omp-name = 'description'&gt;&lt;/div&gt;              &lt;div data-omp-name = 'title'&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;Video 1 Everyday perspectives: engaging online &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;              &lt;div data-omp-name = 'track'
            data-omp-srclang = "en"
            data-omp-kind = "transcripts"
            data-omp-type = "html"
            data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/6c0f3694/dd210_2015j_vid202_1_transcript.html"
            data-omp-label = "English transcripts"&gt;&lt;/div&gt;              &lt;div data-omp-name = 'track'
            data-omp-srclang = "en"
            data-omp-kind = "transcripts"
            data-omp-type = "text"
            data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/6c0f3694/dd210_2015j_vid202_1_transcript.txt"
            data-omp-label = "English transcripts"&gt;&lt;/div&gt;              &lt;source type = "video/mp4"
                data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/61d99f91/dd210_2015j_vid202-320x176.mp4"
                data-omp-label = ""
                data-omp-resolution = ""
                data-omp-provider = ""
                data-omp-player = ""
                data-omp-default = ""/&gt;  &lt;/video&gt;
&lt;a href="#" class="omp-exit-media omp-accesshide" tabindex="-1"&gt;
  &lt;!-- This tag is a flag to oump standalone recognizes that user prepare to exit media by using tab --&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;div&gt;&lt;div class="oucontent-if-printable oucontent-video-image"&gt;&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/4815787d/dd210_2015j_vid202-640x360_still.jpg" alt="" width="512" height="288" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide"/&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="filter_transcript" id="transcript_0d4a57692"&gt;&lt;div&gt;&lt;a href="#skip_transcript_0d4a57692" class="accesshide"&gt;Skip transcript: Video 1 Everyday perspectives: engaging online&lt;/a&gt;&lt;h4 class="accesshide"&gt;Transcript: Video 1 Everyday perspectives: engaging online&lt;/h4&gt;&lt;/div&gt;&lt;div class="filter_transcript_box" tabindex="0" id="content_transcript_0d4a57692"&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;OMER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;It's, wherever I can, whenever I need it, I think. I'm not a really big social network user. Unless I have to get in contact with someone, I don't think I'll jump on it. It's a really good means of getting in contact with everyone and keeping up with everyone and what not. But usage terms, I don't think I use it too much. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;JASON&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;With a mobile phone in your hand now it's pretty much the way of communicating with everybody. I mean, I use social media obviously. I use Facebook for personal usage, keeping in touch with friends and family that are all across the globe. And obviously, Twitter we use obviously as work purposes. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-remark"&gt;But I think, yeah, constantly, it's the first thing you check when you get up to see what's been going on the night before or, so that sort of stuff. So I think, yeah definitely, I'm quite a heavy Facebook user, if you like. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;NOEL&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;I look things up. I occasionally order things on the internet. I am on Facebook. I'm not on Twitter. When I was working with asylum, I used it all the time for research. I do write a little bit now, and I use it for research. Mostly recipes, it must be said, at the moment. But yeah, I use it for those sorts of things, to find things out. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;JESS&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;I use the internet a lot. I have a Facebook. I rely on emails for everything. Facebook, which is obviously for friends, I use that a lot for work. I know that I've got jobs in the past that I wouldn't have got without a Facebook. I don't own a television, so if I watch anything, that's online. Keeping in touch with friends is almost exclusively online, I'd say. Yeah, a lot of my life is online. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ALEX&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;So I've had my Facebook account since I was 15 years old at the pressure of all my peers, as most of the people. I've got a LinkedIn account since I've been in the professional world. I love LinkedIn. I've got a Twitter account that I only set up about three months ago together with my blog. I don't have an Instagram. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-remark"&gt;I think that's about it from the social media interaction. 80% of the time I'm on all these social media networks through my mobile. 20% in the evening when I get home or sometimes on the weekend. But mobile is the, by far, number one. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;&lt;span class="accesshide" id="skip_transcript_0d4a57692"&gt;End transcript: Video 1 Everyday perspectives: engaging online&lt;/span&gt;&lt;/div&gt;&lt;div class="filter_transcript_output" id="output_transcript_0d4a57692"&gt;&lt;div class="filter_transcript_copy"&gt;&lt;a href="#" id="action_link5fb3ecbcd30c53" class="action-icon" &gt;&lt;i class="icon fa fa-copy fa-fw iconsmall"  title="Copy this transcript to the clipboard" aria-label="Copy this transcript to the clipboard"&gt;&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="filter_transcript_print"&gt;&lt;a href="#" id="action_link5fb3ecbcd30c54" class="action-icon" &gt;&lt;i class="icon fa fa-print fa-fw iconsmall"  title="Print this transcript" aria-label="Print this transcript"&gt;&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="oucontent-figure-text"&gt;&lt;div class="oucontent-transcriptlink"&gt;&lt;span class="filter_transcript_button" id="button_transcript_0d4a57692"&gt;Show transcript|Hide transcript&lt;/span&gt;&lt;/div&gt;&lt;div class="oucontent-media-download"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/61d99f91/dd210_2015j_vid202-320x176.mp4?forcedownload=1" class="nomediaplugin" title="Download this video clip"&gt;Download&lt;/a&gt;&lt;/div&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;Video 1 Everyday perspectives: engaging online &lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="oucontent-interaction-print"&gt;&lt;div class="oucontent-interaction-unavailable"&gt;Interactive feature not available in single page view (&lt;a class="oucontent-crossref" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-1#idm45634923141056"&gt;see it in standard view&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 1 Thinking about cybercrime&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 20 minutes&lt;/div&gt;&lt;div class="oucontent-saq-randomstuff"&gt;&lt;p&gt;Try to answer the following questions about cybercrime, drawing on your experiences and understandings. Type your responses (up to 100 words for each question) in the box below, and then select &amp;#x2018;Save’. Your responses are not published anywhere.&lt;/p&gt;&lt;/div&gt;&lt;div class="&amp;#10;            oucontent-saq&amp;#10;           oucontent-saqtype-part oucontent-saqwith-freeresponse oucontent-part-first&amp;#10;        "&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;1. Think about how you engage online.  Make a list of the things you do online (e.g. social contact, looking for information, news, weather, sports, entertainment, studying online, shopping, bank, holiday booking and so on)&lt;/p&gt;
&lt;/div&gt;&lt;div&gt;Interactive content appears here. Please visit the website to use it&lt;/div&gt;&lt;/div&gt;&lt;div class="&amp;#10;            oucontent-saq&amp;#10;           oucontent-saqtype-part oucontent-saqwith-freeresponse oucontent-part-last&amp;#10;        "&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;2. Looking at your answers above, try to guess how much time you spend on a weekly basis on each activity and your potential victimisation &lt;/p&gt;
&lt;/div&gt;&lt;div&gt;Interactive content appears here. Please visit the website to use it&lt;/div&gt;

&lt;div class="oucontent-saq-interactivediscussion" data-showtext="" data-hidetext=""&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;According to Ofcom (2020), 87% of UK adults spent an average of 25 hours online per week. People go online for the following reasons (How People use the internet, 2020):&lt;/p&gt;
&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;social networks (including video calling)&lt;/li&gt;&lt;li&gt;email&lt;/li&gt;&lt;li&gt;be entertained (watching videos, music, online radio and podcasts) &lt;/li&gt;&lt;li&gt;get information (search, blogs)&lt;/li&gt;&lt;li&gt;news (including online newspapers, magazines)&lt;/li&gt;&lt;li&gt;online games&lt;/li&gt;&lt;li&gt;banking&lt;/li&gt;&lt;li&gt;work (either earning money online or using the internet to work remotely)&lt;/li&gt;&lt;li&gt;shopping &lt;/li&gt;&lt;li&gt;education&lt;/li&gt;&lt;li&gt;other access.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;You might have put online fraud (such as issues around scams and various security breaches when paying or banking online. You might have thought about more subtle forms of victimisations such as trolling or cyberbullying on social media for instance or issues around protection of identity and reputation. &lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;As already indicated in the content warning in the introduction, you can download a comprehensive guide on cybercrime and online safety developed by &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.westyorkshire.police.uk/sites/default/files/a_guide_to_cyber_crime_and_online_safety_0.pdf"&gt;West Yorkshire police &lt;/a&gt;&lt;/span&gt; in order to get tips about how to increase your online safety. Alternatively, the NSPCC has developed &lt;a class="oucontent-hyperlink" href="https://www.net-aware.org.uk/"&gt;a range of resources&lt;/a&gt; regarding child safety online. More guidance about online safety regarding specific online activities will be provided towards the end of the course. &lt;/p&gt;                    &lt;script&gt;
                        function newtarget(container) {
                            var downloads = document.getElementsByClassName(container),
                                length = downloads.length;

                            for (var i=0; i&lt;length; i++) {
                                var a = downloads[i].getElementsByTagName('a');
                                for (var j = 0; j &lt; a.length; j++) {
                                    a[j].setAttribute('target', '_blank');
                                }
                            }
                        }

                        newtarget('oucontent-media-download');
                    &lt;/script&gt; </description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-1</guid>
    <dc:title>1 What is cybercrime?</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;Cybercrime refers to criminal activities that are committed using internet technology. The internet has only been in widespread use by the general public for a few decades (a ‘start date’ could be considered to be the launch of the World Wide Web on the 6 August 1991), but online activity has already become ubiquitous in the developed world and is becoming progressively more common in much of the developing world as well (Naughton, 2016).&lt;/p&gt;&lt;p&gt;Psychologists studying cybercrime, including its perpetrators and victims, are interested both in what makes cybercrime unique (e.g. does online anonymity increase the propensity of some people to commit crimes of harassment?) as well as what it has in common with offline crime – although the emphasis is often on the former rather than the latter.&lt;/p&gt;&lt;p&gt;Before reading further complete Activity 1. In order to help you complete the activity, please watch the following video and then consider your perspectives on living online.&lt;/p&gt;&lt;div id="idm45634923141056" class="oucontent-media oucontent-audio-video omp-version1 oucontent-unstableid" style="width:512px;"&gt;&lt;div class="oucontent-default-filter "&gt;&lt;span class="oumediafilter"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/61d99f91/dd210_2015j_vid202-320x176.mp4?forcedownload=1" class="oumedialinknoscript omp-spacer"&gt;Download this video clip.&lt;/a&gt;&lt;span class="accesshide"&gt;Video player: Video 1 Everyday perspectives: engaging online &lt;/span&gt;&lt;div class="omp-wrapper-div"&gt;
&lt;a href="#" class="omp-enter-media omp-accesshide" tabindex="-1"&gt;
  &lt;!-- This tag is a flag to oump standalone recognizes that user prepare to enter to media by using tab --&gt;
&lt;/a&gt;
&lt;video  style="display: none;"
  data-omp-type = 'video'
  data-omp-player = 'html5'
  data-omp-sizing = 'custom'
  data-omp-width = '512'
  data-omp-height = '0'
  data-omp-contextid = '2528823'
  data-omp-renderstyle = 'compact'
  data-omp-uilanguage = 'openlearn'
  preload = 'none'
  controls = 'controls'
  data-omp-disable-features = ',playlist,chapters,transcripts,textdescriptions,autoplay,annotation,sources,language,download,share,description,title,share,copyright'
  data-omp-speed-control = ''
  data-omp-poster = 'https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/4815787d/dd210_2015j_vid202-640x360_still.jpg'
  data-omp-base-url =  'https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554'
  data-omp-ios-base-url =  'https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554'
  data-omp-iswhitelist =  '2'
  data-omp-controlslist = ' '
  src = '' &lt;!-- put this to avoid browser throw the error "Media resource load failed" --&gt;
&gt;
            &lt;div data-omp-name = 'manifest'
            data-omp-manifest = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/6j04uqdp/dd210_2015j_vid202_1_server_manifest.xml"&gt;&lt;/div&gt;              &lt;source type = "video/mp4"
                data-omp-src = "/78ad59c7/4pk2x1aj/dd210_2015j_vid202-320x176.mp4"
                data-omp-label = "320x176 mp4"
                data-omp-resolution = "320"
                data-omp-provider = ""
                data-omp-player = ""
                data-omp-default = "default"/&gt;              &lt;div data-omp-name = 'track'
            data-omp-srclang = "en"
            data-omp-kind = "subtitles"
            data-omp-type = "text/vtt"
            data-omp-src = "/78ad59c7/3q5tqjmn/dd210_2015j_vid202-320x176.vtt"
            data-omp-label = "English subtitles"&gt;&lt;/div&gt;              &lt;div data-omp-name = 'copyright'&gt;&lt;/div&gt;              &lt;div data-omp-name = 'description'&gt;&lt;/div&gt;              &lt;div data-omp-name = 'title'&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;Video 1 Everyday perspectives: engaging online &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;              &lt;div data-omp-name = 'track'
            data-omp-srclang = "en"
            data-omp-kind = "transcripts"
            data-omp-type = "html"
            data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/6c0f3694/dd210_2015j_vid202_1_transcript.html"
            data-omp-label = "English transcripts"&gt;&lt;/div&gt;              &lt;div data-omp-name = 'track'
            data-omp-srclang = "en"
            data-omp-kind = "transcripts"
            data-omp-type = "text"
            data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/6c0f3694/dd210_2015j_vid202_1_transcript.txt"
            data-omp-label = "English transcripts"&gt;&lt;/div&gt;              &lt;source type = "video/mp4"
                data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/61d99f91/dd210_2015j_vid202-320x176.mp4"
                data-omp-label = ""
                data-omp-resolution = ""
                data-omp-provider = ""
                data-omp-player = ""
                data-omp-default = ""/&gt;  &lt;/video&gt;
&lt;a href="#" class="omp-exit-media omp-accesshide" tabindex="-1"&gt;
  &lt;!-- This tag is a flag to oump standalone recognizes that user prepare to exit media by using tab --&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;div&gt;&lt;div class="oucontent-if-printable oucontent-video-image"&gt;&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/4815787d/dd210_2015j_vid202-640x360_still.jpg" alt="" width="512" height="288" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide"/&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="filter_transcript" id="transcript_0d4a57692"&gt;&lt;div&gt;&lt;a href="#skip_transcript_0d4a57692" class="accesshide"&gt;Skip transcript: Video 1 Everyday perspectives: engaging online&lt;/a&gt;&lt;h4 class="accesshide"&gt;Transcript: Video 1 Everyday perspectives: engaging online&lt;/h4&gt;&lt;/div&gt;&lt;div class="filter_transcript_box" tabindex="0" id="content_transcript_0d4a57692"&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;OMER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;It's, wherever I can, whenever I need it, I think. I'm not a really big social network user. Unless I have to get in contact with someone, I don't think I'll jump on it. It's a really good means of getting in contact with everyone and keeping up with everyone and what not. But usage terms, I don't think I use it too much. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;JASON&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;With a mobile phone in your hand now it's pretty much the way of communicating with everybody. I mean, I use social media obviously. I use Facebook for personal usage, keeping in touch with friends and family that are all across the globe. And obviously, Twitter we use obviously as work purposes. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-remark"&gt;But I think, yeah, constantly, it's the first thing you check when you get up to see what's been going on the night before or, so that sort of stuff. So I think, yeah definitely, I'm quite a heavy Facebook user, if you like. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;NOEL&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;I look things up. I occasionally order things on the internet. I am on Facebook. I'm not on Twitter. When I was working with asylum, I used it all the time for research. I do write a little bit now, and I use it for research. Mostly recipes, it must be said, at the moment. But yeah, I use it for those sorts of things, to find things out. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;JESS&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;I use the internet a lot. I have a Facebook. I rely on emails for everything. Facebook, which is obviously for friends, I use that a lot for work. I know that I've got jobs in the past that I wouldn't have got without a Facebook. I don't own a television, so if I watch anything, that's online. Keeping in touch with friends is almost exclusively online, I'd say. Yeah, a lot of my life is online. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ALEX&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;So I've had my Facebook account since I was 15 years old at the pressure of all my peers, as most of the people. I've got a LinkedIn account since I've been in the professional world. I love LinkedIn. I've got a Twitter account that I only set up about three months ago together with my blog. I don't have an Instagram. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-remark"&gt;I think that's about it from the social media interaction. 80% of the time I'm on all these social media networks through my mobile. 20% in the evening when I get home or sometimes on the weekend. But mobile is the, by far, number one. &lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;&lt;span class="accesshide" id="skip_transcript_0d4a57692"&gt;End transcript: Video 1 Everyday perspectives: engaging online&lt;/span&gt;&lt;/div&gt;&lt;div class="filter_transcript_output" id="output_transcript_0d4a57692"&gt;&lt;div class="filter_transcript_copy"&gt;&lt;a href="#" id="action_link5fb3ecbcd30c53" class="action-icon" &gt;&lt;i class="icon fa fa-copy fa-fw iconsmall"  title="Copy this transcript to the clipboard" aria-label="Copy this transcript to the clipboard"&gt;&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="filter_transcript_print"&gt;&lt;a href="#" id="action_link5fb3ecbcd30c54" class="action-icon" &gt;&lt;i class="icon fa fa-print fa-fw iconsmall"  title="Print this transcript" aria-label="Print this transcript"&gt;&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="oucontent-figure-text"&gt;&lt;div class="oucontent-transcriptlink"&gt;&lt;span class="filter_transcript_button" id="button_transcript_0d4a57692"&gt;Show transcript|Hide transcript&lt;/span&gt;&lt;/div&gt;&lt;div class="oucontent-media-download"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/61d99f91/dd210_2015j_vid202-320x176.mp4?forcedownload=1" class="nomediaplugin" title="Download this video clip"&gt;Download&lt;/a&gt;&lt;/div&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;Video 1 Everyday perspectives: engaging online &lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="oucontent-interaction-print"&gt;&lt;div class="oucontent-interaction-unavailable"&gt;Interactive feature not available in single page view (&lt;a class="oucontent-crossref" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-1#idm45634923141056"&gt;see it in standard view&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 1 Thinking about cybercrime&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 20 minutes&lt;/div&gt;&lt;div class="oucontent-saq-randomstuff"&gt;&lt;p&gt;Try to answer the following questions about cybercrime, drawing on your experiences and understandings. Type your responses (up to 100 words for each question) in the box below, and then select ‘Save’. Your responses are not published anywhere.&lt;/p&gt;&lt;/div&gt;&lt;div class="
            oucontent-saq
           oucontent-saqtype-part oucontent-saqwith-freeresponse oucontent-part-first
        "&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;1. Think about how you engage online.  Make a list of the things you do online (e.g. social contact, looking for information, news, weather, sports, entertainment, studying online, shopping, bank, holiday booking and so on)&lt;/p&gt;
&lt;/div&gt;&lt;div&gt;Interactive content appears here. Please visit the website to use it&lt;/div&gt;&lt;/div&gt;&lt;div class="
            oucontent-saq
           oucontent-saqtype-part oucontent-saqwith-freeresponse oucontent-part-last
        "&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;2. Looking at your answers above, try to guess how much time you spend on a weekly basis on each activity and your potential victimisation &lt;/p&gt;
&lt;/div&gt;&lt;div&gt;Interactive content appears here. Please visit the website to use it&lt;/div&gt;

&lt;div class="oucontent-saq-interactivediscussion" data-showtext="" data-hidetext=""&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;According to Ofcom (2020), 87% of UK adults spent an average of 25 hours online per week. People go online for the following reasons (How People use the internet, 2020):&lt;/p&gt;
&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;social networks (including video calling)&lt;/li&gt;&lt;li&gt;email&lt;/li&gt;&lt;li&gt;be entertained (watching videos, music, online radio and podcasts) &lt;/li&gt;&lt;li&gt;get information (search, blogs)&lt;/li&gt;&lt;li&gt;news (including online newspapers, magazines)&lt;/li&gt;&lt;li&gt;online games&lt;/li&gt;&lt;li&gt;banking&lt;/li&gt;&lt;li&gt;work (either earning money online or using the internet to work remotely)&lt;/li&gt;&lt;li&gt;shopping &lt;/li&gt;&lt;li&gt;education&lt;/li&gt;&lt;li&gt;other access.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;You might have put online fraud (such as issues around scams and various security breaches when paying or banking online. You might have thought about more subtle forms of victimisations such as trolling or cyberbullying on social media for instance or issues around protection of identity and reputation. &lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;As already indicated in the content warning in the introduction, you can download a comprehensive guide on cybercrime and online safety developed by &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.westyorkshire.police.uk/sites/default/files/a_guide_to_cyber_crime_and_online_safety_0.pdf"&gt;West Yorkshire police &lt;/a&gt;&lt;/span&gt; in order to get tips about how to increase your online safety. Alternatively, the NSPCC has developed &lt;a class="oucontent-hyperlink" href="https://www.net-aware.org.uk/"&gt;a range of resources&lt;/a&gt; regarding child safety online. More guidance about online safety regarding specific online activities will be provided towards the end of the course. &lt;/p&gt;                    &lt;script&gt;
                        function newtarget(container) {
                            var downloads = document.getElementsByClassName(container),
                                length = downloads.length;

                            for (var i=0; i&lt;length; i++) {
                                var a = downloads[i].getElementsByTagName('a');
                                for (var j = 0; j &lt; a.length; j++) {
                                    a[j].setAttribute('target', '_blank');
                                }
                            }
                        }

                        newtarget('oucontent-media-download');
                    &lt;/script&gt; </dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>2 Types of cybercrime</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;As you have probably identified from engaging in Activity 1, the internet offers a wide range of activities and opportunities for criminals to engage in anti-social and/or deviant behaviours. Therefore, the term cybercrime encompasses a variety of different activities, which goes beyond the fact that they are either a function of, or are facilitated by, the internet. Indeed, real-world crimes can be seen to achieve different goals; for example, theft for financial gain compared to murder for the purpose of revenge. In the same respect, criminal activities falling under the umbrella of cybercrime follow the same pattern. Usually, a distinction is made between:&lt;/p&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;i.&lt;/span&gt;&lt;b&gt;instrumental crimes &lt;/b&gt;(i.e. crimes where the harm to the victim is not the ultimate aim) and &lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;ii.&lt;/span&gt;&lt;b&gt;expressive crimes&lt;/b&gt; (i.e. crimes are based on an offender’s emotional response to a situation that provokes anger, leading to a desire to cause harm to the victim) (Canter and Youngs, 2009; Youngs, Ioannou and Eagles, 2016). &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Similarly in an online environment, some forms of crime seem to principally be for financial gain (e.g. &lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913350896" class="oucontent-glossaryterm" data-definition="A type of malware that renders a computer and/or its files inaccessible, with a demand for payment to unlock it/them." title="A type of malware that renders a computer and/or its files inaccessible, with a demand for payment t..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;ransomware &lt;/span&gt;&lt;/a&gt;attacks, online identity theft), whereas others may be carried out for personal reasons, such as revenge (e.g. cyberstalking) or for the purposes of furthering an offline crime (e.g. a paedophile grooming a child online). However, there are also offences/anti-social online behaviours such as &amp;#x2018;hacking’ and &amp;#x2018;trolling’, which may be carried out for a variety of other reasons. &lt;/p&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 2 Classifying the different types of cybercrime&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 20 minutes&lt;/div&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;Many categorisations of cybercrime distinguish between crimes against the person/morality and crimes again property/government. Use your common knowledge to decide whether this falls under crimes against the person or crime against the property or both. Put some text into the boxes you think are the right option. &lt;/p&gt;
&lt;div class="oucontent-table oucontent-s-type2 oucontent-s-box"&gt;&lt;h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Table 1 Classifying the different types of cybercrime&lt;/h3&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table id="idm45634913700016"&gt;&lt;tr&gt;
&lt;td&gt;&amp;#xA0;&lt;/td&gt;
&lt;th&gt;Crime against the person&lt;/th&gt;
&lt;th&gt;Crime against the property&lt;/th&gt;
&lt;th&gt;Both&lt;/th&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913360912" class="oucontent-glossaryterm" data-definition="Malicious software that interferes with the normal functioning of a network or computer." title="Malicious software that interferes with the normal functioning of a network or computer."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Malware&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr3"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr3"/&gt;
&lt;input type="hidden" name="itemid" value="461158322"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr3" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 1, Your response 1&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr3"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr20"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr20"/&gt;
&lt;input type="hidden" name="itemid" value="85753475"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr20" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 2, Your response 2&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr20"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr37"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr37"/&gt;
&lt;input type="hidden" name="itemid" value="630937838"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr37" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 3, Your response 3&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr37"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913345728" class="oucontent-glossaryterm" data-definition="A malicious piece of software that misleads users into activating it by masking its true intent. For example, a file that destroys software which is named &amp;#x2018;virus protection program’." title="A malicious piece of software that misleads users into activating it by masking its true intent. For..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Trojan&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr4"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr4"/&gt;
&lt;input type="hidden" name="itemid" value="826254944"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr4" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 4, Your response 4&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr4"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr21"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr21"/&gt;
&lt;input type="hidden" name="itemid" value="616629407"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr21" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 5, Your response 5&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr21"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr38"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr38"/&gt;
&lt;input type="hidden" name="itemid" value="318335426"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr38" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 6, Your response 6&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr38"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913341360" class="oucontent-glossaryterm" data-definition="Software that replicates by inserting its code into other programs and files, often causing damage by corrupting data or creating a &amp;#x2018;back door’ to allow attackers to access the system." title="Software that replicates by inserting its code into other programs and files, often causing damage b..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Virus&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr5"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr5"/&gt;
&lt;input type="hidden" name="itemid" value="273813722"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr5" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 7, Your response 7&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr5"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr22"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr22"/&gt;
&lt;input type="hidden" name="itemid" value="218449466"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr22" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 8, Your response 8&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr22"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr39"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr39"/&gt;
&lt;input type="hidden" name="itemid" value="583224817"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr39" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 9, Your response 9&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr39"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913339744" class="oucontent-glossaryterm" data-definition="A stand-alone malware program that can self-replicate and spread to other computers." title="A stand-alone malware program that can self-replicate and spread to other computers."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Worm&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr6"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr6"/&gt;
&lt;input type="hidden" name="itemid" value="349228629"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr6" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 10, Your response 10&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr6"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr23"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr23"/&gt;
&lt;input type="hidden" name="itemid" value="868434747"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr23" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 11, Your response 11&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr23"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr40"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr40"/&gt;
&lt;input type="hidden" name="itemid" value="777218644"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr40" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 12, Your response 12&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr40"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913350896" class="oucontent-glossaryterm" data-definition="A type of malware that renders a computer and/or its files inaccessible, with a demand for payment to unlock it/them." title="A type of malware that renders a computer and/or its files inaccessible, with a demand for payment t..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Ransomware&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr7"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr7"/&gt;
&lt;input type="hidden" name="itemid" value="903699062"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr7" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 13, Your response 13&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr7"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr24"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr24"/&gt;
&lt;input type="hidden" name="itemid" value="8082262"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr24" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 14, Your response 14&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr24"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr41"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr41"/&gt;
&lt;input type="hidden" name="itemid" value="380092884"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr41" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 15, Your response 15&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr41"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913353984" class="oucontent-glossaryterm" data-definition="Techniques used to persuade people to divulge information that can be used in online fraud (e.g. bank account passwords)." title="Techniques used to persuade people to divulge information that can be used in online fraud (e.g. ban..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Phishing&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr8"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr8"/&gt;
&lt;input type="hidden" name="itemid" value="411819042"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr8" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 16, Your response 16&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr8"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr25"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr25"/&gt;
&lt;input type="hidden" name="itemid" value="875774751"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr25" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 17, Your response 17&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr25"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr42"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr42"/&gt;
&lt;input type="hidden" name="itemid" value="59425842"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr42" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 18, Your response 18&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr42"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913359392" class="oucontent-glossaryterm" data-definition="Illegally obtaining money or other financial rewards using online methods." title="Illegally obtaining money or other financial rewards using online methods."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Online financial crimes&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr9"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr9"/&gt;
&lt;input type="hidden" name="itemid" value="54180915"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr9" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 19, Your response 19&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr9"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr26"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr26"/&gt;
&lt;input type="hidden" name="itemid" value="877404761"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr26" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 20, Your response 20&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr26"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr43"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr43"/&gt;
&lt;input type="hidden" name="itemid" value="380009401"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr43" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 21, Your response 21&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr43"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913357888" class="oucontent-glossaryterm" data-definition="Fraud that is committed using online methods. You can read about the many different types of online fraud at the Action Fraud website." title="Fraud that is committed using online methods. You can read about the many different types of online ..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Online Fraud&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr10"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr10"/&gt;
&lt;input type="hidden" name="itemid" value="562707045"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr10" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 22, Your response 22&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr10"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr27"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr27"/&gt;
&lt;input type="hidden" name="itemid" value="629869863"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr27" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 23, Your response 23&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr27"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr44"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr44"/&gt;
&lt;input type="hidden" name="itemid" value="823189856"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr44" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 24, Your response 24&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr44"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913355520" class="oucontent-glossaryterm" data-definition="The process of recovering or guessing the correct password needed to gain access to a system or account." title="The process of recovering or guessing the correct password needed to gain access to a system or acco..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Password cracking&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr11"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr11"/&gt;
&lt;input type="hidden" name="itemid" value="898293580"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr11" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 25, Your response 25&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr11"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr28"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr28"/&gt;
&lt;input type="hidden" name="itemid" value="379206010"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr28" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 26, Your response 26&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr28"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr45"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr45"/&gt;
&lt;input type="hidden" name="itemid" value="237020839"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr45" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 27, Your response 27&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr45"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913363936" class="oucontent-glossaryterm" data-definition="Bypassing security systems to make an unauthorised intrusion into a computer or network." title="Bypassing security systems to make an unauthorised intrusion into a computer or network."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Hacking&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr12"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr12"/&gt;
&lt;input type="hidden" name="itemid" value="70490977"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr12" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 28, Your response 28&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr12"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr29"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr29"/&gt;
&lt;input type="hidden" name="itemid" value="206029170"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr29" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 29, Your response 29&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr29"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr46"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr46"/&gt;
&lt;input type="hidden" name="itemid" value="940802525"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr46" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 30, Your response 30&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr46"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913352432" class="oucontent-glossaryterm" data-definition="Hacking that is specifically targeted at gaining unauthorised access to photos, particularly nude images." title="Hacking that is specifically targeted at gaining unauthorised access to photos, particularly nude im..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Photo-hacking&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr13"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr13"/&gt;
&lt;input type="hidden" name="itemid" value="470729203"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr13" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 31, Your response 31&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr13"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr30"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr30"/&gt;
&lt;input type="hidden" name="itemid" value="317349521"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr30" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 32, Your response 32&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr30"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr47"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr47"/&gt;
&lt;input type="hidden" name="itemid" value="388576906"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr47" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 33, Your response 33&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr47"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913347744" class="oucontent-glossaryterm" data-definition="&amp;#x2018;Situations in which perpetrators threaten to expose sexual images to coerce victims to provide additional pictures, engage in sexual activity, or agree to other demands’ (Wolak et al., 2017, pp. 1)." title="&amp;#x2018;Situations in which perpetrators threaten to expose sexual images to coerce victims to provide addi..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Sextortion&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr14"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr14"/&gt;
&lt;input type="hidden" name="itemid" value="522419619"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr14" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 34, Your response 34&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr14"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr31"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr31"/&gt;
&lt;input type="hidden" name="itemid" value="40424669"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr31" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 35, Your response 35&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr31"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr48"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr48"/&gt;
&lt;input type="hidden" name="itemid" value="219631491"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr48" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 36, Your response 36&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr48"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913362416" class="oucontent-glossaryterm" data-definition="The use of nude/sexual images of a victim for criminal purposes." title="The use of nude/sexual images of a victim for criminal purposes."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Image-based sexual crimes&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr15"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr15"/&gt;
&lt;input type="hidden" name="itemid" value="630638782"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr15" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 37, Your response 37&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr15"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr32"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr32"/&gt;
&lt;input type="hidden" name="itemid" value="467308511"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr32" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 38, Your response 38&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr32"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr49"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr49"/&gt;
&lt;input type="hidden" name="itemid" value="256711284"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr49" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 39, Your response 39&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr49"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913349360" class="oucontent-glossaryterm" data-definition="Kamal and Newman (2016, p. 361) describe revenge pornography as &amp;#x2018;the online release of explicit photographs or videos of an individual without permission for the purpose of humiliation.’" title="Kamal and Newman (2016, p. 361) describe revenge pornography as &amp;#x2018;the online release of explicit phot..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Revenge Pornography&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr16"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr16"/&gt;
&lt;input type="hidden" name="itemid" value="398833816"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr16" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 40, Your response 40&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr16"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr33"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr33"/&gt;
&lt;input type="hidden" name="itemid" value="578918354"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr33" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 41, Your response 41&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr33"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr50"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr50"/&gt;
&lt;input type="hidden" name="itemid" value="510604921"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr50" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 42, Your response 42&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr50"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913365552" class="oucontent-glossaryterm" data-definition="Cyberstalking is aimed at a specific individual and entails &amp;#x2018;using the Internet as part of a targeted campaign that causes fear, distress or alarm’ (Cavezza and McEwan, 2014, pp. 955-956)." title="Cyberstalking is aimed at a specific individual and entails &amp;#x2018;using the Internet as part of a targete..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Cyberstalking&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr17"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr17"/&gt;
&lt;input type="hidden" name="itemid" value="156565881"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr17" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 43, Your response 43&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr17"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr34"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr34"/&gt;
&lt;input type="hidden" name="itemid" value="381204742"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr34" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 44, Your response 44&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr34"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr51"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr51"/&gt;
&lt;input type="hidden" name="itemid" value="134768204"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr51" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 45, Your response 45&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr51"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913343024" class="oucontent-glossaryterm" data-definition="&amp;#x2018;The act of &amp;#x2018;trolling’ is generally defined as being a negative online behaviour intended to disrupt online communications, aggravate internet users and draw individuals into fruitless debates’ (Coles and West, 2016, p. 44)." title="&amp;#x2018;The act of &amp;#x2018;trolling’ is generally defined as being a negative online behaviour intended to disrupt..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Trolling&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr18"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr18"/&gt;
&lt;input type="hidden" name="itemid" value="429746697"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr18" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 46, Your response 46&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr18"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr35"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr35"/&gt;
&lt;input type="hidden" name="itemid" value="610504286"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr35" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 47, Your response 47&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr35"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr52"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr52"/&gt;
&lt;input type="hidden" name="itemid" value="535726856"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr52" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 48, Your response 48&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr52"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary" class="oucontent-glossaryterm-notfound"&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Cyberbullying&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr19"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr19"/&gt;
&lt;input type="hidden" name="itemid" value="322795604"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr19" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 49, Your response 49&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr19"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr36"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr36"/&gt;
&lt;input type="hidden" name="itemid" value="977867137"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr36" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 50, Your response 50&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr36"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr53"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr53"/&gt;
&lt;input type="hidden" name="itemid" value="135639971"/&gt;
&lt;input type="hidden" name="defaultvalue" value="&amp;#xA0;"/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr53" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 51, Your response 51&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr53"  size="50" value="&amp;#xA0;"/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;form class="oucontent-buttons-freeresponse-cell"&gt;&lt;div&gt;&lt;input type="hidden" name="tableid" value="idm45634913700016"/&gt;&lt;input type="submit" name="submit_group" value="Save"/&gt; &lt;input type="submit" name="submit_group_reset" value="Reset"/&gt;&lt;span class='oucontent-word-count' aria-live='polite'&gt;Words: 0&lt;/span&gt; &lt;div class="oucontent-wait-cell" id="cellwaitidm45634913700016"&gt;&lt;/div&gt;&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;div class="oucontent-interaction-print"&gt;&lt;div class="oucontent-interaction-unavailable"&gt;Interactive feature not available in single page view (&lt;a class="oucontent-crossref" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2#xfr3"&gt;see it in standard view&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div class="oucontent-saq-discussion" data-showtext="Reveal discussion" data-hidetext="Hide discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;Under that assumption, cyberbullying, trolling and cyberstalking, revenge pornography, image-based sexual crimes, sextortion, photo-hacking, hacking are likely to fall under the crime against the person category. Malware (including trojan, virus, worm), online financial crimes (including online fraud and password cracking) are more likely to fall under the crimes against the property category. However, you have probably realised that for many crimes it is not as clear cut and could be both directed at the person and the property (even if one is a by-product of obtaining the desired object or status) such as image-based sexual crimes who at face value could be seen as a crime against property (i.e. stealing an image) but ultimately it is a crime against the person. Moreover, cybercriminals usually combine criminal behaviours such as cyberstalking, sextortion, revenge pornography and possibly cyberbullying, therefore people can easily be victim of two (or more) types of cybercrimes simultaneously. Now have a look at some of them in details in the next sections. &lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2</guid>
    <dc:title>2 Types of cybercrime</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;As you have probably identified from engaging in Activity 1, the internet offers a wide range of activities and opportunities for criminals to engage in anti-social and/or deviant behaviours. Therefore, the term cybercrime encompasses a variety of different activities, which goes beyond the fact that they are either a function of, or are facilitated by, the internet. Indeed, real-world crimes can be seen to achieve different goals; for example, theft for financial gain compared to murder for the purpose of revenge. In the same respect, criminal activities falling under the umbrella of cybercrime follow the same pattern. Usually, a distinction is made between:&lt;/p&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;i.&lt;/span&gt;&lt;b&gt;instrumental crimes &lt;/b&gt;(i.e. crimes where the harm to the victim is not the ultimate aim) and &lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;ii.&lt;/span&gt;&lt;b&gt;expressive crimes&lt;/b&gt; (i.e. crimes are based on an offender’s emotional response to a situation that provokes anger, leading to a desire to cause harm to the victim) (Canter and Youngs, 2009; Youngs, Ioannou and Eagles, 2016). &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Similarly in an online environment, some forms of crime seem to principally be for financial gain (e.g. &lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913350896" class="oucontent-glossaryterm" data-definition="A type of malware that renders a computer and/or its files inaccessible, with a demand for payment to unlock it/them." title="A type of malware that renders a computer and/or its files inaccessible, with a demand for payment t..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;ransomware &lt;/span&gt;&lt;/a&gt;attacks, online identity theft), whereas others may be carried out for personal reasons, such as revenge (e.g. cyberstalking) or for the purposes of furthering an offline crime (e.g. a paedophile grooming a child online). However, there are also offences/anti-social online behaviours such as ‘hacking’ and ‘trolling’, which may be carried out for a variety of other reasons. &lt;/p&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 2 Classifying the different types of cybercrime&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 20 minutes&lt;/div&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;Many categorisations of cybercrime distinguish between crimes against the person/morality and crimes again property/government. Use your common knowledge to decide whether this falls under crimes against the person or crime against the property or both. Put some text into the boxes you think are the right option. &lt;/p&gt;
&lt;div class="oucontent-table oucontent-s-type2 oucontent-s-box"&gt;&lt;h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Table 1 Classifying the different types of cybercrime&lt;/h3&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table id="idm45634913700016"&gt;&lt;tr&gt;
&lt;td&gt; &lt;/td&gt;
&lt;th&gt;Crime against the person&lt;/th&gt;
&lt;th&gt;Crime against the property&lt;/th&gt;
&lt;th&gt;Both&lt;/th&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913360912" class="oucontent-glossaryterm" data-definition="Malicious software that interferes with the normal functioning of a network or computer." title="Malicious software that interferes with the normal functioning of a network or computer."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Malware&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr3"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr3"/&gt;
&lt;input type="hidden" name="itemid" value="461158322"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr3" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 1, Your response 1&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr3"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr20"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr20"/&gt;
&lt;input type="hidden" name="itemid" value="85753475"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr20" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 2, Your response 2&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr20"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr37"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr37"/&gt;
&lt;input type="hidden" name="itemid" value="630937838"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr37" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 3, Your response 3&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr37"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913345728" class="oucontent-glossaryterm" data-definition="A malicious piece of software that misleads users into activating it by masking its true intent. For example, a file that destroys software which is named ‘virus protection program’." title="A malicious piece of software that misleads users into activating it by masking its true intent. For..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Trojan&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr4"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr4"/&gt;
&lt;input type="hidden" name="itemid" value="826254944"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr4" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 4, Your response 4&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr4"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr21"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr21"/&gt;
&lt;input type="hidden" name="itemid" value="616629407"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr21" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 5, Your response 5&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr21"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr38"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr38"/&gt;
&lt;input type="hidden" name="itemid" value="318335426"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr38" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 6, Your response 6&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr38"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913341360" class="oucontent-glossaryterm" data-definition="Software that replicates by inserting its code into other programs and files, often causing damage by corrupting data or creating a ‘back door’ to allow attackers to access the system." title="Software that replicates by inserting its code into other programs and files, often causing damage b..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Virus&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr5"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr5"/&gt;
&lt;input type="hidden" name="itemid" value="273813722"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr5" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 7, Your response 7&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr5"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr22"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr22"/&gt;
&lt;input type="hidden" name="itemid" value="218449466"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr22" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 8, Your response 8&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr22"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr39"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr39"/&gt;
&lt;input type="hidden" name="itemid" value="583224817"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr39" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 9, Your response 9&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr39"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913339744" class="oucontent-glossaryterm" data-definition="A stand-alone malware program that can self-replicate and spread to other computers." title="A stand-alone malware program that can self-replicate and spread to other computers."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Worm&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr6"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr6"/&gt;
&lt;input type="hidden" name="itemid" value="349228629"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr6" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 10, Your response 10&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr6"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr23"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr23"/&gt;
&lt;input type="hidden" name="itemid" value="868434747"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr23" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 11, Your response 11&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr23"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr40"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr40"/&gt;
&lt;input type="hidden" name="itemid" value="777218644"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr40" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 12, Your response 12&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr40"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913350896" class="oucontent-glossaryterm" data-definition="A type of malware that renders a computer and/or its files inaccessible, with a demand for payment to unlock it/them." title="A type of malware that renders a computer and/or its files inaccessible, with a demand for payment t..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Ransomware&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr7"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr7"/&gt;
&lt;input type="hidden" name="itemid" value="903699062"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr7" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 13, Your response 13&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr7"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr24"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr24"/&gt;
&lt;input type="hidden" name="itemid" value="8082262"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr24" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 14, Your response 14&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr24"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr41"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr41"/&gt;
&lt;input type="hidden" name="itemid" value="380092884"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr41" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 15, Your response 15&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr41"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913353984" class="oucontent-glossaryterm" data-definition="Techniques used to persuade people to divulge information that can be used in online fraud (e.g. bank account passwords)." title="Techniques used to persuade people to divulge information that can be used in online fraud (e.g. ban..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Phishing&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr8"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr8"/&gt;
&lt;input type="hidden" name="itemid" value="411819042"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr8" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 16, Your response 16&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr8"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr25"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr25"/&gt;
&lt;input type="hidden" name="itemid" value="875774751"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr25" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 17, Your response 17&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr25"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr42"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr42"/&gt;
&lt;input type="hidden" name="itemid" value="59425842"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr42" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 18, Your response 18&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr42"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913359392" class="oucontent-glossaryterm" data-definition="Illegally obtaining money or other financial rewards using online methods." title="Illegally obtaining money or other financial rewards using online methods."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Online financial crimes&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr9"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr9"/&gt;
&lt;input type="hidden" name="itemid" value="54180915"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr9" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 19, Your response 19&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr9"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr26"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr26"/&gt;
&lt;input type="hidden" name="itemid" value="877404761"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr26" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 20, Your response 20&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr26"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr43"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr43"/&gt;
&lt;input type="hidden" name="itemid" value="380009401"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr43" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 21, Your response 21&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr43"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913357888" class="oucontent-glossaryterm" data-definition="Fraud that is committed using online methods. You can read about the many different types of online fraud at the Action Fraud website." title="Fraud that is committed using online methods. You can read about the many different types of online ..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Online Fraud&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr10"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr10"/&gt;
&lt;input type="hidden" name="itemid" value="562707045"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr10" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 22, Your response 22&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr10"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr27"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr27"/&gt;
&lt;input type="hidden" name="itemid" value="629869863"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr27" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 23, Your response 23&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr27"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr44"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr44"/&gt;
&lt;input type="hidden" name="itemid" value="823189856"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr44" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 24, Your response 24&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr44"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913355520" class="oucontent-glossaryterm" data-definition="The process of recovering or guessing the correct password needed to gain access to a system or account." title="The process of recovering or guessing the correct password needed to gain access to a system or acco..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Password cracking&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr11"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr11"/&gt;
&lt;input type="hidden" name="itemid" value="898293580"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr11" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 25, Your response 25&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr11"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr28"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr28"/&gt;
&lt;input type="hidden" name="itemid" value="379206010"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr28" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 26, Your response 26&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr28"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr45"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr45"/&gt;
&lt;input type="hidden" name="itemid" value="237020839"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr45" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 27, Your response 27&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr45"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913363936" class="oucontent-glossaryterm" data-definition="Bypassing security systems to make an unauthorised intrusion into a computer or network." title="Bypassing security systems to make an unauthorised intrusion into a computer or network."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Hacking&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr12"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr12"/&gt;
&lt;input type="hidden" name="itemid" value="70490977"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr12" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 28, Your response 28&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr12"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr29"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr29"/&gt;
&lt;input type="hidden" name="itemid" value="206029170"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr29" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 29, Your response 29&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr29"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr46"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr46"/&gt;
&lt;input type="hidden" name="itemid" value="940802525"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr46" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 30, Your response 30&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr46"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913352432" class="oucontent-glossaryterm" data-definition="Hacking that is specifically targeted at gaining unauthorised access to photos, particularly nude images." title="Hacking that is specifically targeted at gaining unauthorised access to photos, particularly nude im..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Photo-hacking&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr13"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr13"/&gt;
&lt;input type="hidden" name="itemid" value="470729203"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr13" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 31, Your response 31&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr13"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr30"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr30"/&gt;
&lt;input type="hidden" name="itemid" value="317349521"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr30" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 32, Your response 32&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr30"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr47"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr47"/&gt;
&lt;input type="hidden" name="itemid" value="388576906"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr47" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 33, Your response 33&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr47"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913347744" class="oucontent-glossaryterm" data-definition="‘Situations in which perpetrators threaten to expose sexual images to coerce victims to provide additional pictures, engage in sexual activity, or agree to other demands’ (Wolak et al., 2017, pp. 1)." title="‘Situations in which perpetrators threaten to expose sexual images to coerce victims to provide addi..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Sextortion&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr14"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr14"/&gt;
&lt;input type="hidden" name="itemid" value="522419619"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr14" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 34, Your response 34&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr14"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr31"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr31"/&gt;
&lt;input type="hidden" name="itemid" value="40424669"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr31" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 35, Your response 35&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr31"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr48"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr48"/&gt;
&lt;input type="hidden" name="itemid" value="219631491"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr48" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 36, Your response 36&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr48"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913362416" class="oucontent-glossaryterm" data-definition="The use of nude/sexual images of a victim for criminal purposes." title="The use of nude/sexual images of a victim for criminal purposes."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Image-based sexual crimes&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr15"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr15"/&gt;
&lt;input type="hidden" name="itemid" value="630638782"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr15" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 37, Your response 37&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr15"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr32"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr32"/&gt;
&lt;input type="hidden" name="itemid" value="467308511"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr32" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 38, Your response 38&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr32"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr49"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr49"/&gt;
&lt;input type="hidden" name="itemid" value="256711284"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr49" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 39, Your response 39&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr49"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913349360" class="oucontent-glossaryterm" data-definition="Kamal and Newman (2016, p. 361) describe revenge pornography as ‘the online release of explicit photographs or videos of an individual without permission for the purpose of humiliation.’" title="Kamal and Newman (2016, p. 361) describe revenge pornography as ‘the online release of explicit phot..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Revenge Pornography&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr16"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr16"/&gt;
&lt;input type="hidden" name="itemid" value="398833816"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr16" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 40, Your response 40&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr16"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr33"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr33"/&gt;
&lt;input type="hidden" name="itemid" value="578918354"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr33" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 41, Your response 41&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr33"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr50"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr50"/&gt;
&lt;input type="hidden" name="itemid" value="510604921"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr50" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 42, Your response 42&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr50"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913365552" class="oucontent-glossaryterm" data-definition="Cyberstalking is aimed at a specific individual and entails ‘using the Internet as part of a targeted campaign that causes fear, distress or alarm’ (Cavezza and McEwan, 2014, pp. 955-956)." title="Cyberstalking is aimed at a specific individual and entails ‘using the Internet as part of a targete..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Cyberstalking&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr17"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr17"/&gt;
&lt;input type="hidden" name="itemid" value="156565881"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr17" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 43, Your response 43&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr17"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr34"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr34"/&gt;
&lt;input type="hidden" name="itemid" value="381204742"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr34" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 44, Your response 44&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr34"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr51"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr51"/&gt;
&lt;input type="hidden" name="itemid" value="134768204"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr51" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 45, Your response 45&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr51"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913343024" class="oucontent-glossaryterm" data-definition="‘The act of ‘trolling’ is generally defined as being a negative online behaviour intended to disrupt online communications, aggravate internet users and draw individuals into fruitless debates’ (Coles and West, 2016, p. 44)." title="‘The act of ‘trolling’ is generally defined as being a negative online behaviour intended to disrupt..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Trolling&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr18"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr18"/&gt;
&lt;input type="hidden" name="itemid" value="429746697"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr18" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 46, Your response 46&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr18"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr35"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr35"/&gt;
&lt;input type="hidden" name="itemid" value="610504286"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr35" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 47, Your response 47&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr35"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr52"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr52"/&gt;
&lt;input type="hidden" name="itemid" value="535726856"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr52" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 48, Your response 48&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr52"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary" class="oucontent-glossaryterm-notfound"&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;Cyberbullying&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr19"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr19"/&gt;
&lt;input type="hidden" name="itemid" value="322795604"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr19" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 49, Your response 49&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr19"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr36"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr36"/&gt;
&lt;input type="hidden" name="itemid" value="977867137"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr36" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 50, Your response 50&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr36"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr53"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2 Types of cybercrime"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr53"/&gt;
&lt;input type="hidden" name="itemid" value="135639971"/&gt;
&lt;input type="hidden" name="defaultvalue" value=" "/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913700016" /&gt;
&lt;label for="responsebox_xfr53" class="accesshide"&gt;Table 1 Classifying the different types of cybercrime 51, Your response 51&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr53"  size="50" value=" "/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;form class="oucontent-buttons-freeresponse-cell"&gt;&lt;div&gt;&lt;input type="hidden" name="tableid" value="idm45634913700016"/&gt;&lt;input type="submit" name="submit_group" value="Save"/&gt; &lt;input type="submit" name="submit_group_reset" value="Reset"/&gt;&lt;span class='oucontent-word-count' aria-live='polite'&gt;Words: 0&lt;/span&gt; &lt;div class="oucontent-wait-cell" id="cellwaitidm45634913700016"&gt;&lt;/div&gt;&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;div class="oucontent-interaction-print"&gt;&lt;div class="oucontent-interaction-unavailable"&gt;Interactive feature not available in single page view (&lt;a class="oucontent-crossref" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2#xfr3"&gt;see it in standard view&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div class="oucontent-saq-discussion" data-showtext="Reveal discussion" data-hidetext="Hide discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;Under that assumption, cyberbullying, trolling and cyberstalking, revenge pornography, image-based sexual crimes, sextortion, photo-hacking, hacking are likely to fall under the crime against the person category. Malware (including trojan, virus, worm), online financial crimes (including online fraud and password cracking) are more likely to fall under the crimes against the property category. However, you have probably realised that for many crimes it is not as clear cut and could be both directed at the person and the property (even if one is a by-product of obtaining the desired object or status) such as image-based sexual crimes who at face value could be seen as a crime against property (i.e. stealing an image) but ultimately it is a crime against the person. Moreover, cybercriminals usually combine criminal behaviours such as cyberstalking, sextortion, revenge pornography and possibly cyberbullying, therefore people can easily be victim of two (or more) types of cybercrimes simultaneously. Now have a look at some of them in details in the next sections. &lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>2.1 Trolling</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.1</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;The term trolling has been widely used since the apparition of the internet and it refers to all online deviant behaviours generated by individuals towards other individuals and/or groups that are repetitive and disruptive in nature (Fichman &amp;amp; Sanfilippo, 2016). However, this is slightly simplistic as trolling behaviours do evolve constantly in line with how the online environment itself changes. Vaisman and Fichman (2012), cited in Fichman &amp;amp; Sanfilippo, (2016, p.6) consider four factors to explain the variety within trolling behaviours depending on: &lt;/p&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;i.&lt;/span&gt;&lt;i&gt;Location&lt;/i&gt;: The distinction between asynchronous (when people communicate but not at the same time such as blog comments) and synchronous communication (live conversation such as chat room). Both types of trolling exist but it is more difficult to account for within synchronous settings as the context is not recorded (Fichman &amp;amp; Sanfilippo, 2016).&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;ii.&lt;/span&gt;&lt;i&gt;Relationships&lt;/i&gt;: Trolls usually target random, innocent people as well as the community. When they start targeting individuals, it overlaps with other online deviant behaviours such as harassment or bullying. According to Fichman and Sanfilippo (2016), trolls usually act individually and usually hide their identity, though they can coordinate their behaviours with other trolls as there are evidence of camaraderie between trolls such as in the controversial online platform &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://tattle.life/"&gt;TATTLE.life&lt;/a&gt;&lt;/span&gt; where people gather to openly and freely troll about social media influencers, even referring themselves as trolls (e.g. tattle trolls&amp;#x2026;.), or reflecting on &lt;a class="oucontent-hyperlink" href="https://tattle.life/threads/what-is-an-online-troll.4791/"&gt;what is an online troll?&lt;/a&gt; – See &lt;a class="oucontent-hyperlink" href="https://twitter.com/hashtag/tattlelife?lang=en"&gt;#tattlelife&lt;/a&gt;. The reasons why this website has received so much attention is that the purpose of the site is to group people with trolling tendencies together. Therefore, group trolling not only normalises this type of behaviour but also it intensifies the damage under the greatest anonymity with made up usernames (Fogarty, 2019).&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;iii.&lt;/span&gt;&lt;i&gt;Intentions&lt;/i&gt;: Originally trolling behaviours were thought as being unintentional because it was just for fun (Buckels, Trapnell, &amp;amp; Paulhus, 2014). While you could find up to 135 different types of trolls identified from many online resources (Nuccitelli, n.d.), psychological evidence has been more reserved in categorising the different types of online trolls. Indeed, research has mostly focused on motivations or intentions either looking at personality (e.g., Buckels et al., 2014), or explanations of intentions such as being ideological, non-ideological, religion driven, grief driven, fun driven, or political (Fichman &amp;amp; Sanfilippo, 2016). However, as Coles and West (2016) argued, beyond the broadness of the term &amp;#x2018;troll’ and the many subtypes, it is important to look at the term as having variable meanings, intentions, and varied sub-types between different platforms and the course of interaction.&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;iv.&lt;/span&gt;&lt;i&gt;Behavioural practices&lt;/i&gt;: Trolls themselves usually do not identify their behaviour as being aggressive but more as being opiniated. However, the pattern is that trolls usually set &amp;#x2018;discursive’ trap to create a reaction through controversial comments or questions. What truly defines someone as a troll is the repetitive action of their behaviour towards the same individual or online community, repeating the same ideas and ignoring the responses and challenges directed at them (Shachaf &amp;amp; Hara, 2010).&lt;/li&gt;&lt;/ul&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 3 Which of these examples is trolling?&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 10 minutes&lt;/div&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;Jane Doe posted the following on a popular social media site.&lt;/p&gt;
&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/66c63a33/dd802_1_figx_tweet.jpg" alt="An image of a social media post that says I believe in Science. And empirical evidence." width="512" height="195" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide" longdesc="view.php&amp;amp;extra=longdesc_idm45634913588464"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;amp;extra=longdesc_idm45634913588464&amp;amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913588464"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;p&gt;Look at the six examples of trolling below and decide whether you feel it falls under the trolling category or being opiniated. Type your anwer into the box.&lt;/p&gt;
&lt;div class="oucontent-table oucontent-s-type2 oucontent-s-box"&gt;&lt;h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Table 2 Replying to @Jane_Doe:&lt;/h3&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table id="idm45634913585200"&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;&amp;#x2026; and very poor grammar &amp;#x1F631;’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr60"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr60"/&gt;
&lt;input type="hidden" name="itemid" value="597254479"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr60" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 1, Your response 1&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr60"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;I don’t have opinions; I have facts at my disposal.’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr61"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr61"/&gt;
&lt;input type="hidden" name="itemid" value="779107885"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr61" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 2, Your response 2&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr61"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;As my friend Phoebe Buffay would say&amp;#x2026; &amp;#x2018;this is brand new information’’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr62"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr62"/&gt;
&lt;input type="hidden" name="itemid" value="45346120"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr62" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 3, Your response 3&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr62"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;You are just an idiot who don’t understand science. It’s not about belief!’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr63"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr63"/&gt;
&lt;input type="hidden" name="itemid" value="482727944"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr63" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 4, Your response 4&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr63"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;I disagree, I don’t think scientific evidence and religious beliefs are incompatible.’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr64"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr64"/&gt;
&lt;input type="hidden" name="itemid" value="823050056"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr64" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 5, Your response 5&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr64"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;Interesting statement. Belief in science? that's an oxymoron.’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr65"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr65"/&gt;
&lt;input type="hidden" name="itemid" value="140485596"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr65" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 6, Your response 6&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr65"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;form class="oucontent-buttons-freeresponse-cell"&gt;&lt;div&gt;&lt;input type="hidden" name="tableid" value="idm45634913585200"/&gt;&lt;input type="submit" name="submit_group" value="Save"/&gt; &lt;input type="submit" name="submit_group_reset" value="Reset"/&gt;&lt;span class='oucontent-word-count' aria-live='polite'&gt;Words: 0&lt;/span&gt; &lt;div class="oucontent-wait-cell" id="cellwaitidm45634913585200"&gt;&lt;/div&gt;&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;div class="oucontent-interaction-print"&gt;&lt;div class="oucontent-interaction-unavailable"&gt;Interactive feature not available in single page view (&lt;a class="oucontent-crossref" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.1#xfr60"&gt;see it in standard view&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div class="oucontent-saq-discussion" data-showtext="Reveal discussion" data-hidetext="Hide discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;Those 6 examples illustrate different online behaviours. The first example is typical of &amp;#x2018;grammar trolls’ and it is not clear whether it falls under the definition of trolling or not. The intention could well be to patronise the author of the post, but it could also be a way to divert the post into less relevant discussion or ultimately, the author of this reply might just want to be humorous. This type of trolling is referred as &amp;#x2018;kudos trolling’ (Bishop, 2014). &lt;/p&gt;
&lt;p&gt;The second example is a clever, non-aggressive reply that subtly point out the contradiction in the post (i.e.&amp;#xA0;science and belief). It is done&amp;#xA0;without attacking the author of the post and for that reason, it falls under the category of being opinionated.&lt;/p&gt;
&lt;p&gt;The third example seems innocent on the surface, but the author here is making a cultural reference to a television show (Friends - popular in the 90s), and the tone here is sarcastic and the message itself indicate that Jane Doe post has no real informative purpose. This is another example of &amp;#x2018;kudos trolling’ and even more difficult to spot than the first example. &lt;/p&gt;
&lt;p&gt;The fourth example, however, is more typical of common understanding of trolling. Indeed, the comment is aggressive, malicious with the intention of causing harm. Name calling is a way to intensify the abuse and this type of trolling is known as &amp;#x2018;flame trolling’ (Bishop, 2014).&lt;/p&gt;
&lt;p&gt;The last two examples are other examples of opiniated posts rather than coming under the label of trolling due to adding something to the discussion and not personally attacking the author of the post.&lt;/p&gt;
&lt;div class="oucontent-table oucontent-s-type2 oucontent-s-box"&gt;&lt;h4 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Table 2 Replying to @Jane_Doe: (answers)&lt;/h4&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;&amp;#x2026; and very poor grammar &amp;#x1F631;’&lt;/td&gt;
&lt;td&gt;trolling&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;I don’t have opinions; I have facts at my disposal.’&lt;/td&gt;
&lt;td&gt;being opinionated&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;As my friend Phoebe Buffay would say&amp;#x2026; &amp;#x2018;this is brand new information’’&lt;/td&gt;
&lt;td&gt;trolling&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;You are just an idiot who don’t understand science. It’s not about belief!’&lt;/td&gt;
&lt;td&gt;trolling&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;I disagree, I don’t think scientific evidence and religious beliefs are incompatible.’&lt;/td&gt;
&lt;td&gt;being opinionated&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;&amp;#x2018;Interesting statement. Belief in science? that's an oxymoron.’&lt;/td&gt;
&lt;td&gt;being opinionated&lt;/td&gt;
&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;Internet trolling provides a good illustration of some of the definitional and practical difficulties, and the challenges that these present for legislative and criminal justice responses. Indeed, offending people and being antagonistic is not necessarily criminal. Herring et al. (2002) provide an interesting analysis of attempts to manage a troll on a feminist web-forum, in which the troll employs a number of tactics (for example name calling, deliberately misunderstanding other users, pretending to be sincerely trying to understand the issues). This troll was clearly a source of ongoing annoyance, and at times was offensive, but the attempts to control him (albeit with limited success) did not resort to criminal sanctions.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.1</guid>
    <dc:title>2.1 Trolling</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;The term trolling has been widely used since the apparition of the internet and it refers to all online deviant behaviours generated by individuals towards other individuals and/or groups that are repetitive and disruptive in nature (Fichman &amp; Sanfilippo, 2016). However, this is slightly simplistic as trolling behaviours do evolve constantly in line with how the online environment itself changes. Vaisman and Fichman (2012), cited in Fichman &amp; Sanfilippo, (2016, p.6) consider four factors to explain the variety within trolling behaviours depending on: &lt;/p&gt;&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;i.&lt;/span&gt;&lt;i&gt;Location&lt;/i&gt;: The distinction between asynchronous (when people communicate but not at the same time such as blog comments) and synchronous communication (live conversation such as chat room). Both types of trolling exist but it is more difficult to account for within synchronous settings as the context is not recorded (Fichman &amp; Sanfilippo, 2016).&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;ii.&lt;/span&gt;&lt;i&gt;Relationships&lt;/i&gt;: Trolls usually target random, innocent people as well as the community. When they start targeting individuals, it overlaps with other online deviant behaviours such as harassment or bullying. According to Fichman and Sanfilippo (2016), trolls usually act individually and usually hide their identity, though they can coordinate their behaviours with other trolls as there are evidence of camaraderie between trolls such as in the controversial online platform &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://tattle.life/"&gt;TATTLE.life&lt;/a&gt;&lt;/span&gt; where people gather to openly and freely troll about social media influencers, even referring themselves as trolls (e.g. tattle trolls….), or reflecting on &lt;a class="oucontent-hyperlink" href="https://tattle.life/threads/what-is-an-online-troll.4791/"&gt;what is an online troll?&lt;/a&gt; – See &lt;a class="oucontent-hyperlink" href="https://twitter.com/hashtag/tattlelife?lang=en"&gt;#tattlelife&lt;/a&gt;. The reasons why this website has received so much attention is that the purpose of the site is to group people with trolling tendencies together. Therefore, group trolling not only normalises this type of behaviour but also it intensifies the damage under the greatest anonymity with made up usernames (Fogarty, 2019).&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;iii.&lt;/span&gt;&lt;i&gt;Intentions&lt;/i&gt;: Originally trolling behaviours were thought as being unintentional because it was just for fun (Buckels, Trapnell, &amp; Paulhus, 2014). While you could find up to 135 different types of trolls identified from many online resources (Nuccitelli, n.d.), psychological evidence has been more reserved in categorising the different types of online trolls. Indeed, research has mostly focused on motivations or intentions either looking at personality (e.g., Buckels et al., 2014), or explanations of intentions such as being ideological, non-ideological, religion driven, grief driven, fun driven, or political (Fichman &amp; Sanfilippo, 2016). However, as Coles and West (2016) argued, beyond the broadness of the term ‘troll’ and the many subtypes, it is important to look at the term as having variable meanings, intentions, and varied sub-types between different platforms and the course of interaction.&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;iv.&lt;/span&gt;&lt;i&gt;Behavioural practices&lt;/i&gt;: Trolls themselves usually do not identify their behaviour as being aggressive but more as being opiniated. However, the pattern is that trolls usually set ‘discursive’ trap to create a reaction through controversial comments or questions. What truly defines someone as a troll is the repetitive action of their behaviour towards the same individual or online community, repeating the same ideas and ignoring the responses and challenges directed at them (Shachaf &amp; Hara, 2010).&lt;/li&gt;&lt;/ul&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 3 Which of these examples is trolling?&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 10 minutes&lt;/div&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;Jane Doe posted the following on a popular social media site.&lt;/p&gt;
&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/66c63a33/dd802_1_figx_tweet.jpg" alt="An image of a social media post that says I believe in Science. And empirical evidence." width="512" height="195" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide" longdesc="view.php&amp;extra=longdesc_idm45634913588464"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;extra=longdesc_idm45634913588464&amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913588464"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;p&gt;Look at the six examples of trolling below and decide whether you feel it falls under the trolling category or being opiniated. Type your anwer into the box.&lt;/p&gt;
&lt;div class="oucontent-table oucontent-s-type2 oucontent-s-box"&gt;&lt;h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Table 2 Replying to @Jane_Doe:&lt;/h3&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table id="idm45634913585200"&gt;&lt;tr&gt;
&lt;td&gt;‘… and very poor grammar 😱’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr60"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr60"/&gt;
&lt;input type="hidden" name="itemid" value="597254479"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr60" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 1, Your response 1&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr60"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;‘I don’t have opinions; I have facts at my disposal.’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr61"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr61"/&gt;
&lt;input type="hidden" name="itemid" value="779107885"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr61" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 2, Your response 2&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr61"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;‘As my friend Phoebe Buffay would say… ‘this is brand new information’’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr62"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr62"/&gt;
&lt;input type="hidden" name="itemid" value="45346120"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr62" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 3, Your response 3&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr62"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;‘You are just an idiot who don’t understand science. It’s not about belief!’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr63"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr63"/&gt;
&lt;input type="hidden" name="itemid" value="482727944"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr63" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 4, Your response 4&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr63"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;‘I disagree, I don’t think scientific evidence and religious beliefs are incompatible.’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr64"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr64"/&gt;
&lt;input type="hidden" name="itemid" value="823050056"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr64" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 5, Your response 5&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr64"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;‘Interesting statement. Belief in science? that's an oxymoron.’&lt;/td&gt;
&lt;td&gt;&lt;span&gt;&lt;/span&gt;&lt;form class="oucontent-cellfreeresponse oucontent-singleline" id="xfr65"
    action="https://www.open.edu/openlearn/ocw/mod/oucontent/freeresponse.php" method="post" data-formatted=""&gt;
&lt;div&gt;
&lt;input type='hidden' name='id' value='105783'/&gt;
&lt;input type="hidden" name="section" value="2.1 Trolling"/&gt;
&lt;input type="hidden" name="gotvalue" value="0"/&gt;
&lt;input type="hidden" name="freeresponse" value="xfr65"/&gt;
&lt;input type="hidden" name="itemid" value="140485596"/&gt;
&lt;input type="hidden" name="defaultvalue" value=""/&gt;
&lt;input type="hidden" name="size" value="single line"/&gt;
&lt;input type="hidden" name="tableid" value="idm45634913585200" /&gt;
&lt;label for="responsebox_xfr65" class="accesshide"&gt;Table 2 Replying to @Jane_Doe: 6, Your response 6&lt;/label&gt;&lt;input class="oucontent-freeresponse-field" type="text"
name="content" id = "responsebox_xfr65"  size="50" value=""/&gt;&lt;/div&gt;&lt;/form&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;form class="oucontent-buttons-freeresponse-cell"&gt;&lt;div&gt;&lt;input type="hidden" name="tableid" value="idm45634913585200"/&gt;&lt;input type="submit" name="submit_group" value="Save"/&gt; &lt;input type="submit" name="submit_group_reset" value="Reset"/&gt;&lt;span class='oucontent-word-count' aria-live='polite'&gt;Words: 0&lt;/span&gt; &lt;div class="oucontent-wait-cell" id="cellwaitidm45634913585200"&gt;&lt;/div&gt;&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;div class="oucontent-interaction-print"&gt;&lt;div class="oucontent-interaction-unavailable"&gt;Interactive feature not available in single page view (&lt;a class="oucontent-crossref" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.1#xfr60"&gt;see it in standard view&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div class="oucontent-saq-discussion" data-showtext="Reveal discussion" data-hidetext="Hide discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;Those 6 examples illustrate different online behaviours. The first example is typical of ‘grammar trolls’ and it is not clear whether it falls under the definition of trolling or not. The intention could well be to patronise the author of the post, but it could also be a way to divert the post into less relevant discussion or ultimately, the author of this reply might just want to be humorous. This type of trolling is referred as ‘kudos trolling’ (Bishop, 2014). &lt;/p&gt;
&lt;p&gt;The second example is a clever, non-aggressive reply that subtly point out the contradiction in the post (i.e. science and belief). It is done without attacking the author of the post and for that reason, it falls under the category of being opinionated.&lt;/p&gt;
&lt;p&gt;The third example seems innocent on the surface, but the author here is making a cultural reference to a television show (Friends - popular in the 90s), and the tone here is sarcastic and the message itself indicate that Jane Doe post has no real informative purpose. This is another example of ‘kudos trolling’ and even more difficult to spot than the first example. &lt;/p&gt;
&lt;p&gt;The fourth example, however, is more typical of common understanding of trolling. Indeed, the comment is aggressive, malicious with the intention of causing harm. Name calling is a way to intensify the abuse and this type of trolling is known as ‘flame trolling’ (Bishop, 2014).&lt;/p&gt;
&lt;p&gt;The last two examples are other examples of opiniated posts rather than coming under the label of trolling due to adding something to the discussion and not personally attacking the author of the post.&lt;/p&gt;
&lt;div class="oucontent-table oucontent-s-type2 oucontent-s-box"&gt;&lt;h4 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Table 2 Replying to @Jane_Doe: (answers)&lt;/h4&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table&gt;&lt;tr&gt;
&lt;td&gt;‘… and very poor grammar 😱’&lt;/td&gt;
&lt;td&gt;trolling&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;‘I don’t have opinions; I have facts at my disposal.’&lt;/td&gt;
&lt;td&gt;being opinionated&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;‘As my friend Phoebe Buffay would say… ‘this is brand new information’’&lt;/td&gt;
&lt;td&gt;trolling&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;‘You are just an idiot who don’t understand science. It’s not about belief!’&lt;/td&gt;
&lt;td&gt;trolling&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;‘I disagree, I don’t think scientific evidence and religious beliefs are incompatible.’&lt;/td&gt;
&lt;td&gt;being opinionated&lt;/td&gt;
&lt;/tr&gt;&lt;tr&gt;
&lt;td&gt;‘Interesting statement. Belief in science? that's an oxymoron.’&lt;/td&gt;
&lt;td&gt;being opinionated&lt;/td&gt;
&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;Internet trolling provides a good illustration of some of the definitional and practical difficulties, and the challenges that these present for legislative and criminal justice responses. Indeed, offending people and being antagonistic is not necessarily criminal. Herring et al. (2002) provide an interesting analysis of attempts to manage a troll on a feminist web-forum, in which the troll employs a number of tactics (for example name calling, deliberately misunderstanding other users, pretending to be sincerely trying to understand the issues). This troll was clearly a source of ongoing annoyance, and at times was offensive, but the attempts to control him (albeit with limited success) did not resort to criminal sanctions.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>2.2 Non-consensual distribution of sexual images</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.2</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;Image-based sexual crimes are multi-faceted and incorporate crimes that involve obtaining sexual or degrading imagery of individuals and then threatening to distribute these images, as a means of blackmailing victims into producing more imagery or committing harmful acts towards others. &lt;/p&gt;&lt;p&gt;Even though these types of crime are not restricted to one particular gender, it is important to note that most victims are females (Mc Glynn, Rackley, &amp;amp; Houghton, 2017). Furthermore, the ease of obtaining and distributing sexual imagery online without consent and using sensitive materials as a means of blackmailing victims, means that the frequency and scale of the problem has mushroomed. The nature of the harassment being sexualised and misogynistic means that victims are often blamed for sharing the images in the first  place. However, because the images are used in a way that is not intended means that the person who originally shared the images is not responsible and should be treated as a victim in its own right. &lt;/p&gt;&lt;p&gt;Non-consensual distribution of sexual images can also unveil other forms of cybercrime such as revenge pornography, child pornography, sextortion and many other types. The most common type of non-consensual obtention or distribution of sexual images are related to child pornography and by extension it could also results in the solicitation of in-person sexual contact known as online grooming. Due to the sensitive nature of some of those sub-types of image-based sexual crimes, this course will only cover sexting, photo hacking as examples of this type of cybercrime. &lt;/p&gt;&lt;div class="oucontent-figure" style="width:400px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/de586a60/dd802_1_victim_blaming294086.tif.jpg" alt="An image of a person with their head in their hands looking at a laptop." width="400" height="534" style="max-width:400px;" class="oucontent-figure-image" longdesc="view.php?id=105783&amp;amp;extra=longdesc_idm45634913542912"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;amp;extra=longdesc_idm45634913542912&amp;amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913542912"&gt;&lt;/a&gt;&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.2</guid>
    <dc:title>2.2 Non-consensual distribution of sexual images</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;Image-based sexual crimes are multi-faceted and incorporate crimes that involve obtaining sexual or degrading imagery of individuals and then threatening to distribute these images, as a means of blackmailing victims into producing more imagery or committing harmful acts towards others. &lt;/p&gt;&lt;p&gt;Even though these types of crime are not restricted to one particular gender, it is important to note that most victims are females (Mc Glynn, Rackley, &amp; Houghton, 2017). Furthermore, the ease of obtaining and distributing sexual imagery online without consent and using sensitive materials as a means of blackmailing victims, means that the frequency and scale of the problem has mushroomed. The nature of the harassment being sexualised and misogynistic means that victims are often blamed for sharing the images in the first  place. However, because the images are used in a way that is not intended means that the person who originally shared the images is not responsible and should be treated as a victim in its own right. &lt;/p&gt;&lt;p&gt;Non-consensual distribution of sexual images can also unveil other forms of cybercrime such as revenge pornography, child pornography, sextortion and many other types. The most common type of non-consensual obtention or distribution of sexual images are related to child pornography and by extension it could also results in the solicitation of in-person sexual contact known as online grooming. Due to the sensitive nature of some of those sub-types of image-based sexual crimes, this course will only cover sexting, photo hacking as examples of this type of cybercrime. &lt;/p&gt;&lt;div class="oucontent-figure" style="width:400px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/de586a60/dd802_1_victim_blaming294086.tif.jpg" alt="An image of a person with their head in their hands looking at a laptop." width="400" height="534" style="max-width:400px;" class="oucontent-figure-image" longdesc="view.php?id=105783&amp;extra=longdesc_idm45634913542912"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;extra=longdesc_idm45634913542912&amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913542912"&gt;&lt;/a&gt;&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>Sexting</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.2.1</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;The ready availability of mobile communication technologies and the increase in the use of the internet has seen the development of what is known as &amp;#x2018;sexting’. &amp;#x2018;Sexting can be understood as the sending or posting of sexually suggestive text messages and images, including nude or semi-nude photographs, via mobiles or over the Internet’ (Cooper et al., 2016, p. 706). &amp;#x2018;Sexting’ becomes problematic and falls into the cybercrime category when the images are shared without the victim’s knowledge. This might be through &amp;#x2018;&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913363936" class="oucontent-glossaryterm" data-definition="Bypassing security systems to make an unauthorised intrusion into a computer or network." title="Bypassing security systems to make an unauthorised intrusion into a computer or network."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;hacking&lt;/span&gt;&lt;/a&gt;’, where the images are stolen from the legitimate recipient, or it could be through the intended recipient sharing them (either with other acquaintances or in online forums etc.) without the consent of the sender. Senders might be unaware about the possible distribution of their images, or a previously trusted receiver may turn out to not merit such trust (such as an ex-partner who shares images – sometimes known as &amp;#x2018;revenge pornography’). Research has found that women usually only send sexual images in the context of a relationship where there is trust (Samimi and Alderson, 2014), and therefore at the time the images are sent, there is little reason for the sender to think that they will be passed on without consent. &lt;/p&gt;&lt;p&gt;However, the harm is constant and amplified due to the permanency of the images stored on the internet. Even if the original images/videos are removed, copies could have been made and could circulate indefinitely (Langos, 2015). As a result, the long-term impact of such crime could be far more damaging than originally intended, permanently discrediting the victim’s reputation on a personal and professional level.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.2.1</guid>
    <dc:title>Sexting</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;The ready availability of mobile communication technologies and the increase in the use of the internet has seen the development of what is known as ‘sexting’. ‘Sexting can be understood as the sending or posting of sexually suggestive text messages and images, including nude or semi-nude photographs, via mobiles or over the Internet’ (Cooper et al., 2016, p. 706). ‘Sexting’ becomes problematic and falls into the cybercrime category when the images are shared without the victim’s knowledge. This might be through ‘&lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913363936" class="oucontent-glossaryterm" data-definition="Bypassing security systems to make an unauthorised intrusion into a computer or network." title="Bypassing security systems to make an unauthorised intrusion into a computer or network."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;hacking&lt;/span&gt;&lt;/a&gt;’, where the images are stolen from the legitimate recipient, or it could be through the intended recipient sharing them (either with other acquaintances or in online forums etc.) without the consent of the sender. Senders might be unaware about the possible distribution of their images, or a previously trusted receiver may turn out to not merit such trust (such as an ex-partner who shares images – sometimes known as ‘revenge pornography’). Research has found that women usually only send sexual images in the context of a relationship where there is trust (Samimi and Alderson, 2014), and therefore at the time the images are sent, there is little reason for the sender to think that they will be passed on without consent. &lt;/p&gt;&lt;p&gt;However, the harm is constant and amplified due to the permanency of the images stored on the internet. Even if the original images/videos are removed, copies could have been made and could circulate indefinitely (Langos, 2015). As a result, the long-term impact of such crime could be far more damaging than originally intended, permanently discrediting the victim’s reputation on a personal and professional level.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>Photo-hacking</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.2.2</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;As you have read in the previous section, self-taken sexual images may sometimes be produced non-consensually by tricking or coercing the victim, while in other situations production of the image may have been consensual but it is non-consensually distributed beyond the intended recipient(s). Sometimes this non-consensual distribution is achieved by hacking into private images that have been stored online. A high-profile example of this was the celebrity photo-hacking scandal in 2014, where nude images of celebrities were stolen from online accounts and disseminated publicly. Bates (2017) suggests that these cases of celebrity photo-hacking and non-consensual pornography, targeting well-known women such as Jennifer Lawrence and Kate Upton, have led to deeper discussion in the media of issues around non-consensual pornography, consent, and the oppression of women. Jennifer Lawrence termed what happened to her as a &amp;#x2018;sex crime’ (Kashner, 2014) and described how violated she felt by the experience (Oppenheim, 2017). &lt;/p&gt;&lt;p&gt;However, although the theft and distribution of the images was a crime, legally it was not considered a &lt;i&gt;sex&lt;/i&gt; crime, and some commentators (e.g. Mackie, 2014) suggest that it is the responsibility of internet users to understand that the worldwide web is not a private space, placing the responsibility for the crime with the victims, rather than the perpetrators. &lt;/p&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 4 How does photo hacking affect victims?&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 15 minutes&lt;/div&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;While the large-scale theft and distribution of images of celebrity photo-hacking victims has been important in drawing attention to the issues around non-consensual access and distribution of intimate images, not all victims are in the public eye. Listen to the following audio clip from Danger in the Download, in which Angie describes her experience of having her private images hacked. Make some notes on the questions below as you listen:&lt;/p&gt;
&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;How does Angie describe her feelings about what happened to her?&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;Are there aspects of the online nature of the crime that make it particularly troubling for Angie?&lt;/li&gt;&lt;/ul&gt;
&lt;div id="idm45634922912224" class="oucontent-media oucontent-audio-video omp-version1 oucontent-unstableid" style="width:342px;"&gt;&lt;div class="oucontent-default-filter"&gt;&lt;span class="oumediafilter"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/82935fd0/dd802_2018j_aug016.mp3?forcedownload=1" class="oumedialinknoscript omp-spacer"&gt;Download this audio clip.&lt;/a&gt;&lt;span class="accesshide"&gt;Audio player: Audio 1 Danger in the download&lt;/span&gt;&lt;div class="omp-wrapper-div"&gt;
&lt;a href="#" class="omp-enter-media omp-accesshide" tabindex="-1"&gt;
  &lt;!-- This tag is a flag to oump standalone recognizes that user prepare to enter to media by using tab --&gt;
&lt;/a&gt;
&lt;audio  style="display: none;"
  data-omp-type = 'audio'
  data-omp-player = 'html5'
  data-omp-sizing = 'smart'
  data-omp-width = ''
  data-omp-height = ''
  data-omp-contextid = '2528823'
  data-omp-renderstyle = 'compact'
  data-omp-uilanguage = 'openlearn'
  preload = 'none'
  controls = 'controls'
  data-omp-disable-features = ',playlist,chapters,transcripts,setting,
            textdescriptions,audiodescriptions,autoplay,annotation,sources,
            language,download,share,description,title,share,copyright'
  data-omp-speed-control = ''
  data-omp-poster = ''
  data-omp-base-url =  'https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554'
  data-omp-ios-base-url =  'https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554'
  data-omp-iswhitelist =  '1'
  data-omp-controlslist = ' '
  src = '' &lt;!-- put this to avoid browser throw the error "Media resource load failed" --&gt;
&gt;
            &lt;div data-omp-name = 'manifest'
            data-omp-manifest = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/66z83u12/dd802_2018j_aug016_1_server_manifest.xml"&gt;&lt;/div&gt;              &lt;source type = "audio/mp3"
                data-omp-src = "/d1c4e0e0/l4krc0lc/dd802_2018j_aug016.mp3"
                data-omp-label = "dd802_2018j_aug016.mp3"
                data-omp-resolution = "dd802_2018j_aug016"
                data-omp-provider = ""
                data-omp-player = ""
                data-omp-default = "default"/&gt;              &lt;div data-omp-name = 'copyright'&gt;&lt;/div&gt;              &lt;div data-omp-name = 'description'&gt;&lt;/div&gt;              &lt;div data-omp-name = 'title'&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;Audio 1 Danger in the download&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;              &lt;div data-omp-name = 'track'
            data-omp-srclang = "en"
            data-omp-kind = "transcripts"
            data-omp-type = "html"
            data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/ca3f12f1/dd802_2018j_aug016_1_transcript.html"
            data-omp-label = "English transcripts"&gt;&lt;/div&gt;              &lt;div data-omp-name = 'track'
            data-omp-srclang = "en"
            data-omp-kind = "transcripts"
            data-omp-type = "text"
            data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/ca3f12f1/dd802_2018j_aug016_1_transcript.txt"
            data-omp-label = "English transcripts"&gt;&lt;/div&gt;              &lt;source type = "audio/mp3"
                data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/82935fd0/dd802_2018j_aug016.mp3"
                data-omp-label = ""
                data-omp-resolution = ""
                data-omp-provider = ""
                data-omp-player = ""
                data-omp-default = ""/&gt;  &lt;/audio&gt;
&lt;a href="#" class="omp-exit-media omp-accesshide" tabindex="-1"&gt;
  &lt;!-- This tag is a flag to oump standalone recognizes that user prepare to exit media by using tab --&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="filter_transcript" id="transcript_2f8b25134"&gt;&lt;div&gt;&lt;a href="#skip_transcript_2f8b25134" class="accesshide"&gt;Skip transcript: Audio 1 Danger in the download&lt;/a&gt;&lt;h4 class="accesshide"&gt;Transcript: Audio 1 Danger in the download&lt;/h4&gt;&lt;/div&gt;&lt;div class="filter_transcript_box" tabindex="0" id="content_transcript_2f8b25134"&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Today cyberspace has grown beyond anything that its architects could have imagined. Up to a third of humanity has access to the Internet and an increasing proportion of them have come to depend on it for education, entertainment, social interaction, even their livelihoods. And inevitably among those two and a half billion souls there are some you might want to steer well clear of.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;The first pictures that out were just me in bikinis. And then the second ones that came out were lingerie, like a bra and panties, a bunch of stuff like that. At that point I didn’t know that people could hack into that website. I thought it was secure.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;This is Angie. Aged 14 she decided to store some mildly suggestive pictures of herself online securing them in a password protected website. They were meant only for her boyfriend.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;So, one summer my friend messaged me and he was like, oh you have to see this. He sends me a link and all the pictures that I thought were secure had been hacked and linked on to like a different website. At that point I realised that it wasn’t just going to stop at one friend who saw it.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Before long the hacked information went viral on the open Internet.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Even now it’s still very popular on the Internet and it’s been four years and it’s only getting bigger.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;How many people in the end do you think have viewed these pictures of you?&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;A lot. Millions.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Millions.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Yeah.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;That must be a weird feeling?&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Yeah. And there’s no way that I could fully ever get rid of all the pictures. Once it’s on the Internet it’s there for good. It got to the point where I realised like what kind of future can I have knowing that my reputation is this bad. Imagine like what happens when a job comes between me and someone else and they can’t take me because of what’s happened. So basically it feels like my life is over.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;&lt;span class="accesshide" id="skip_transcript_2f8b25134"&gt;End transcript: Audio 1 Danger in the download&lt;/span&gt;&lt;/div&gt;&lt;div class="filter_transcript_output" id="output_transcript_2f8b25134"&gt;&lt;div class="filter_transcript_copy"&gt;&lt;a href="#" id="action_link5fb3ecbcd30c57" class="action-icon" &gt;&lt;i class="icon fa fa-copy fa-fw iconsmall"  title="Copy this transcript to the clipboard" aria-label="Copy this transcript to the clipboard"&gt;&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="filter_transcript_print"&gt;&lt;a href="#" id="action_link5fb3ecbcd30c58" class="action-icon" &gt;&lt;i class="icon fa fa-print fa-fw iconsmall"  title="Print this transcript" aria-label="Print this transcript"&gt;&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="oucontent-figure-text"&gt;&lt;div class="oucontent-transcriptlink"&gt;&lt;span class="filter_transcript_button" id="button_transcript_2f8b25134"&gt;Show transcript|Hide transcript&lt;/span&gt;&lt;/div&gt;&lt;div class="oucontent-media-download"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/82935fd0/dd802_2018j_aug016.mp3?forcedownload=1" class="nomediaplugin" title="Download this audio clip"&gt;Download&lt;/a&gt;&lt;/div&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;Audio 1 Danger in the download&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="oucontent-interaction-print"&gt;&lt;div class="oucontent-interaction-unavailable"&gt;Interactive feature not available in single page view (&lt;a class="oucontent-crossref" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.2.2#idm45634922912224"&gt;see it in standard view&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div class="oucontent-saq-discussion" data-showtext="Reveal discussion" data-hidetext="Hide discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;Like Jennifer Lawrence (Oppenheim, 2017), Angie expresses a feeling of violation. She is a victim of the initial theft, but this is compounded by the widespread distribution of the images, which is facilitated by the internet. She has the uncomfortable knowledge that people she has never met may have seen private images of her without her consent. She also highlights the potential damage on a professional level, as prospective employers may be able to access the images, and because of the permanence of images online they can never be truly erased.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;                    &lt;script&gt;
                        function newtarget(container) {
                            var downloads = document.getElementsByClassName(container),
                                length = downloads.length;

                            for (var i=0; i&lt;length; i++) {
                                var a = downloads[i].getElementsByTagName('a');
                                for (var j = 0; j &lt; a.length; j++) {
                                    a[j].setAttribute('target', '_blank');
                                }
                            }
                        }

                        newtarget('oucontent-media-download');
                    &lt;/script&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.2.2</guid>
    <dc:title>Photo-hacking</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;As you have read in the previous section, self-taken sexual images may sometimes be produced non-consensually by tricking or coercing the victim, while in other situations production of the image may have been consensual but it is non-consensually distributed beyond the intended recipient(s). Sometimes this non-consensual distribution is achieved by hacking into private images that have been stored online. A high-profile example of this was the celebrity photo-hacking scandal in 2014, where nude images of celebrities were stolen from online accounts and disseminated publicly. Bates (2017) suggests that these cases of celebrity photo-hacking and non-consensual pornography, targeting well-known women such as Jennifer Lawrence and Kate Upton, have led to deeper discussion in the media of issues around non-consensual pornography, consent, and the oppression of women. Jennifer Lawrence termed what happened to her as a ‘sex crime’ (Kashner, 2014) and described how violated she felt by the experience (Oppenheim, 2017). &lt;/p&gt;&lt;p&gt;However, although the theft and distribution of the images was a crime, legally it was not considered a &lt;i&gt;sex&lt;/i&gt; crime, and some commentators (e.g. Mackie, 2014) suggest that it is the responsibility of internet users to understand that the worldwide web is not a private space, placing the responsibility for the crime with the victims, rather than the perpetrators. &lt;/p&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 4 How does photo hacking affect victims?&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 15 minutes&lt;/div&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;While the large-scale theft and distribution of images of celebrity photo-hacking victims has been important in drawing attention to the issues around non-consensual access and distribution of intimate images, not all victims are in the public eye. Listen to the following audio clip from Danger in the Download, in which Angie describes her experience of having her private images hacked. Make some notes on the questions below as you listen:&lt;/p&gt;
&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;How does Angie describe her feelings about what happened to her?&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;Are there aspects of the online nature of the crime that make it particularly troubling for Angie?&lt;/li&gt;&lt;/ul&gt;
&lt;div id="idm45634922912224" class="oucontent-media oucontent-audio-video omp-version1 oucontent-unstableid" style="width:342px;"&gt;&lt;div class="oucontent-default-filter"&gt;&lt;span class="oumediafilter"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/82935fd0/dd802_2018j_aug016.mp3?forcedownload=1" class="oumedialinknoscript omp-spacer"&gt;Download this audio clip.&lt;/a&gt;&lt;span class="accesshide"&gt;Audio player: Audio 1 Danger in the download&lt;/span&gt;&lt;div class="omp-wrapper-div"&gt;
&lt;a href="#" class="omp-enter-media omp-accesshide" tabindex="-1"&gt;
  &lt;!-- This tag is a flag to oump standalone recognizes that user prepare to enter to media by using tab --&gt;
&lt;/a&gt;
&lt;audio  style="display: none;"
  data-omp-type = 'audio'
  data-omp-player = 'html5'
  data-omp-sizing = 'smart'
  data-omp-width = ''
  data-omp-height = ''
  data-omp-contextid = '2528823'
  data-omp-renderstyle = 'compact'
  data-omp-uilanguage = 'openlearn'
  preload = 'none'
  controls = 'controls'
  data-omp-disable-features = ',playlist,chapters,transcripts,setting,
            textdescriptions,audiodescriptions,autoplay,annotation,sources,
            language,download,share,description,title,share,copyright'
  data-omp-speed-control = ''
  data-omp-poster = ''
  data-omp-base-url =  'https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554'
  data-omp-ios-base-url =  'https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554'
  data-omp-iswhitelist =  '1'
  data-omp-controlslist = ' '
  src = '' &lt;!-- put this to avoid browser throw the error "Media resource load failed" --&gt;
&gt;
            &lt;div data-omp-name = 'manifest'
            data-omp-manifest = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/66z83u12/dd802_2018j_aug016_1_server_manifest.xml"&gt;&lt;/div&gt;              &lt;source type = "audio/mp3"
                data-omp-src = "/d1c4e0e0/l4krc0lc/dd802_2018j_aug016.mp3"
                data-omp-label = "dd802_2018j_aug016.mp3"
                data-omp-resolution = "dd802_2018j_aug016"
                data-omp-provider = ""
                data-omp-player = ""
                data-omp-default = "default"/&gt;              &lt;div data-omp-name = 'copyright'&gt;&lt;/div&gt;              &lt;div data-omp-name = 'description'&gt;&lt;/div&gt;              &lt;div data-omp-name = 'title'&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;Audio 1 Danger in the download&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;              &lt;div data-omp-name = 'track'
            data-omp-srclang = "en"
            data-omp-kind = "transcripts"
            data-omp-type = "html"
            data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/ca3f12f1/dd802_2018j_aug016_1_transcript.html"
            data-omp-label = "English transcripts"&gt;&lt;/div&gt;              &lt;div data-omp-name = 'track'
            data-omp-srclang = "en"
            data-omp-kind = "transcripts"
            data-omp-type = "text"
            data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/ca3f12f1/dd802_2018j_aug016_1_transcript.txt"
            data-omp-label = "English transcripts"&gt;&lt;/div&gt;              &lt;source type = "audio/mp3"
                data-omp-src = "https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/82935fd0/dd802_2018j_aug016.mp3"
                data-omp-label = ""
                data-omp-resolution = ""
                data-omp-provider = ""
                data-omp-player = ""
                data-omp-default = ""/&gt;  &lt;/audio&gt;
&lt;a href="#" class="omp-exit-media omp-accesshide" tabindex="-1"&gt;
  &lt;!-- This tag is a flag to oump standalone recognizes that user prepare to exit media by using tab --&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="filter_transcript" id="transcript_2f8b25134"&gt;&lt;div&gt;&lt;a href="#skip_transcript_2f8b25134" class="accesshide"&gt;Skip transcript: Audio 1 Danger in the download&lt;/a&gt;&lt;h4 class="accesshide"&gt;Transcript: Audio 1 Danger in the download&lt;/h4&gt;&lt;/div&gt;&lt;div class="filter_transcript_box" tabindex="0" id="content_transcript_2f8b25134"&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Today cyberspace has grown beyond anything that its architects could have imagined. Up to a third of humanity has access to the Internet and an increasing proportion of them have come to depend on it for education, entertainment, social interaction, even their livelihoods. And inevitably among those two and a half billion souls there are some you might want to steer well clear of.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;The first pictures that out were just me in bikinis. And then the second ones that came out were lingerie, like a bra and panties, a bunch of stuff like that. At that point I didn’t know that people could hack into that website. I thought it was secure.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;This is Angie. Aged 14 she decided to store some mildly suggestive pictures of herself online securing them in a password protected website. They were meant only for her boyfriend.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;So, one summer my friend messaged me and he was like, oh you have to see this. He sends me a link and all the pictures that I thought were secure had been hacked and linked on to like a different website. At that point I realised that it wasn’t just going to stop at one friend who saw it.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Before long the hacked information went viral on the open Internet.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Even now it’s still very popular on the Internet and it’s been four years and it’s only getting bigger.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;How many people in the end do you think have viewed these pictures of you?&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;A lot. Millions.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Millions.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Yeah.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;INTERVIEWER&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;That must be a weird feeling?&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div class="oucontent-dialogue-line"&gt;&lt;div class="oucontent-dialogue-speaker"&gt;ANGIE&lt;/div&gt;&lt;div class="oucontent-dialogue-remark"&gt;Yeah. And there’s no way that I could fully ever get rid of all the pictures. Once it’s on the Internet it’s there for good. It got to the point where I realised like what kind of future can I have knowing that my reputation is this bad. Imagine like what happens when a job comes between me and someone else and they can’t take me because of what’s happened. So basically it feels like my life is over.&lt;/div&gt;&lt;div class="clearer"&gt;&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;&lt;span class="accesshide" id="skip_transcript_2f8b25134"&gt;End transcript: Audio 1 Danger in the download&lt;/span&gt;&lt;/div&gt;&lt;div class="filter_transcript_output" id="output_transcript_2f8b25134"&gt;&lt;div class="filter_transcript_copy"&gt;&lt;a href="#" id="action_link5fb3ecbcd30c57" class="action-icon" &gt;&lt;i class="icon fa fa-copy fa-fw iconsmall"  title="Copy this transcript to the clipboard" aria-label="Copy this transcript to the clipboard"&gt;&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="filter_transcript_print"&gt;&lt;a href="#" id="action_link5fb3ecbcd30c58" class="action-icon" &gt;&lt;i class="icon fa fa-print fa-fw iconsmall"  title="Print this transcript" aria-label="Print this transcript"&gt;&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="oucontent-figure-text"&gt;&lt;div class="oucontent-transcriptlink"&gt;&lt;span class="filter_transcript_button" id="button_transcript_2f8b25134"&gt;Show transcript|Hide transcript&lt;/span&gt;&lt;/div&gt;&lt;div class="oucontent-media-download"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/d1c4e0e0/82935fd0/dd802_2018j_aug016.mp3?forcedownload=1" class="nomediaplugin" title="Download this audio clip"&gt;Download&lt;/a&gt;&lt;/div&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;Audio 1 Danger in the download&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="oucontent-interaction-print"&gt;&lt;div class="oucontent-interaction-unavailable"&gt;Interactive feature not available in single page view (&lt;a class="oucontent-crossref" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.2.2#idm45634922912224"&gt;see it in standard view&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div class="oucontent-saq-discussion" data-showtext="Reveal discussion" data-hidetext="Hide discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;Like Jennifer Lawrence (Oppenheim, 2017), Angie expresses a feeling of violation. She is a victim of the initial theft, but this is compounded by the widespread distribution of the images, which is facilitated by the internet. She has the uncomfortable knowledge that people she has never met may have seen private images of her without her consent. She also highlights the potential damage on a professional level, as prospective employers may be able to access the images, and because of the permanence of images online they can never be truly erased.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;                    &lt;script&gt;
                        function newtarget(container) {
                            var downloads = document.getElementsByClassName(container),
                                length = downloads.length;

                            for (var i=0; i&lt;length; i++) {
                                var a = downloads[i].getElementsByTagName('a');
                                for (var j = 0; j &lt; a.length; j++) {
                                    a[j].setAttribute('target', '_blank');
                                }
                            }
                        }

                        newtarget('oucontent-media-download');
                    &lt;/script&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>2.3 Hacking</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.3</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;In the previous section, you have learned that private images are sometimes accessed by &lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913363936" class="oucontent-glossaryterm" data-definition="Bypassing security systems to make an unauthorised intrusion into a computer or network." title="Bypassing security systems to make an unauthorised intrusion into a computer or network."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;hacking&lt;/span&gt;&lt;/a&gt; the accounts of other users. The term hacking might make you think of computer geniuses cracking complex codes, and therefore that increasingly sophisticated computer security is the solution to the problem; in reality, while hacking can sometimes require advanced skills, many instances require little technological expertise on the part of the hacker. For example, in 2014, a number of former employees of the now defunct &lt;i&gt;News of the World&lt;/i&gt; were convicted on phone hacking charges, having accessed messages belonging to both celebrities and crime victims to provide material for the newspaper (BBC News, 2014). In many cases they had been able to gain access to voicemail messages quite easily, by exploiting the fact that users had not reset the default voicemail PIN code. Phone service providers have since made changes to their systems so that default PIN codes no longer exist, but many users still use meaningful information such as their birthdates as PIN codes, making them easy to guess (BBC News, 2011). This highlights the importance of considering both technological and human aspects when developing security measures. &lt;/p&gt;&lt;p&gt;As explained above, gaining access to other people’s accounts can sometimes be accomplished very simply because people choose simple passwords such as &amp;#x2018;123456’ and &amp;#x2018;password’ (Morgan, 2017). The reason why people choose simple passwords or reuse across sites is due to a poor fit between system and user (Conklin et al., 2004). When password authentication was introduced as a security measure online, there were only a limited number of systems and users, and it was effective in that context. However, this approach is less effective in the current situation with millions of systems and many millions of users. Indeed, designers did not take into account that users now have multiple usernames and passwords to remember. This means that users have been left to develop their own individual strategies to manage their various online accounts, and sometimes these strategies (e.g. writing down passwords, reusing details) can compromise security. &lt;/p&gt;&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/1e5361c3/dd802_2_3_hackingv2_294338.tif.jpg" alt="An image of a person in a dark room looking at a laptop." width="512" height="341" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide" longdesc="view.php?id=105783&amp;amp;extra=longdesc_idm45634913500240"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;amp;extra=longdesc_idm45634913500240&amp;amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913500240"&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Another possible explanation could be that people don’t know what constitutes good password security. However, in a survey by Tam et al. (2009), respondents showed an ability to distinguish between strong and weak passwords, and an understanding of poor password management behaviours, but there was a trade-off between convenience and security. People were more willing to engage in password management practices that were inconvenient, but which increased security, for accounts where they could foresee an immediate negative consequence for themselves should security be breached (e.g. a bank account), and less willing to do so for accounts where they could not (e.g. email). However, a hacker with access to an email account can use this to reset passwords and learn other personal information that could facilitate access to other user accounts, including bank accounts, so this approach may be short-sighted. &lt;/p&gt;&lt;p&gt;Attempts to alter user behaviour at a system level, by introducing mandatory rules for the creation of passwords (e.g. forcing account holders to use a combination of letters, numbers and punctuation), reduce vulnerability by making it less likely that a stranger could guess the password. However, they simultaneously increase the likelihood that the genuine account holder will forget their password, thereby increasing the use of memory strategies which introduce other sources of vulnerability (Gehringer, 2002; Conklin et al, 2004). Therefore, it is important that security systems are carefully designed to take into account the human behaviour of the people who use them, as well as the ingenuity of those who wish to hack them. &lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.3</guid>
    <dc:title>2.3 Hacking</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;In the previous section, you have learned that private images are sometimes accessed by &lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913363936" class="oucontent-glossaryterm" data-definition="Bypassing security systems to make an unauthorised intrusion into a computer or network." title="Bypassing security systems to make an unauthorised intrusion into a computer or network."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;hacking&lt;/span&gt;&lt;/a&gt; the accounts of other users. The term hacking might make you think of computer geniuses cracking complex codes, and therefore that increasingly sophisticated computer security is the solution to the problem; in reality, while hacking can sometimes require advanced skills, many instances require little technological expertise on the part of the hacker. For example, in 2014, a number of former employees of the now defunct &lt;i&gt;News of the World&lt;/i&gt; were convicted on phone hacking charges, having accessed messages belonging to both celebrities and crime victims to provide material for the newspaper (BBC News, 2014). In many cases they had been able to gain access to voicemail messages quite easily, by exploiting the fact that users had not reset the default voicemail PIN code. Phone service providers have since made changes to their systems so that default PIN codes no longer exist, but many users still use meaningful information such as their birthdates as PIN codes, making them easy to guess (BBC News, 2011). This highlights the importance of considering both technological and human aspects when developing security measures. &lt;/p&gt;&lt;p&gt;As explained above, gaining access to other people’s accounts can sometimes be accomplished very simply because people choose simple passwords such as ‘123456’ and ‘password’ (Morgan, 2017). The reason why people choose simple passwords or reuse across sites is due to a poor fit between system and user (Conklin et al., 2004). When password authentication was introduced as a security measure online, there were only a limited number of systems and users, and it was effective in that context. However, this approach is less effective in the current situation with millions of systems and many millions of users. Indeed, designers did not take into account that users now have multiple usernames and passwords to remember. This means that users have been left to develop their own individual strategies to manage their various online accounts, and sometimes these strategies (e.g. writing down passwords, reusing details) can compromise security. &lt;/p&gt;&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/1e5361c3/dd802_2_3_hackingv2_294338.tif.jpg" alt="An image of a person in a dark room looking at a laptop." width="512" height="341" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide" longdesc="view.php?id=105783&amp;extra=longdesc_idm45634913500240"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;extra=longdesc_idm45634913500240&amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913500240"&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Another possible explanation could be that people don’t know what constitutes good password security. However, in a survey by Tam et al. (2009), respondents showed an ability to distinguish between strong and weak passwords, and an understanding of poor password management behaviours, but there was a trade-off between convenience and security. People were more willing to engage in password management practices that were inconvenient, but which increased security, for accounts where they could foresee an immediate negative consequence for themselves should security be breached (e.g. a bank account), and less willing to do so for accounts where they could not (e.g. email). However, a hacker with access to an email account can use this to reset passwords and learn other personal information that could facilitate access to other user accounts, including bank accounts, so this approach may be short-sighted. &lt;/p&gt;&lt;p&gt;Attempts to alter user behaviour at a system level, by introducing mandatory rules for the creation of passwords (e.g. forcing account holders to use a combination of letters, numbers and punctuation), reduce vulnerability by making it less likely that a stranger could guess the password. However, they simultaneously increase the likelihood that the genuine account holder will forget their password, thereby increasing the use of memory strategies which introduce other sources of vulnerability (Gehringer, 2002; Conklin et al, 2004). Therefore, it is important that security systems are carefully designed to take into account the human behaviour of the people who use them, as well as the ingenuity of those who wish to hack them. &lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>2.4 Malware</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.4</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;As you are accessing this course online, you are already likely to be familiar with the need to protect your system against attacks from viruses and other types of &lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913360912" class="oucontent-glossaryterm" data-definition="Malicious software that interferes with the normal functioning of a network or computer." title="Malicious software that interferes with the normal functioning of a network or computer."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;malware&lt;/span&gt;&lt;/a&gt;. &lt;/p&gt;&lt;div class="oucontent-figure" style="width:400px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/fc23a36a/dd802_1_2_3_hacking294082.tif.jpg" alt="An image of a child drinking from a mug with a computer screen in the background." width="400" height="600" style="max-width:400px;" class="oucontent-figure-image" longdesc="view.php?id=105783&amp;amp;extra=longdesc_idm45634913490176"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;amp;extra=longdesc_idm45634913490176&amp;amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913490176"&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;However, as with hacking, those who produce malware are inventive, and are often able to exploit weaknesses in the system and make use of social engineering to introduce malware to a computer or network despite existing safeguards. There are two aspects of the criminal use of malware: firstly, creation of the malware; and secondly, distribution (Kirwan and Power, 2013). The term &amp;#x2018;malware’ encompasses a number of different types of malicious program, and in common with the other types of cybercrime you have explored so far, motivations for creating and distributing malware are varied. While psychological research on creators of malware is limited, Kirwan and Power (2013) suggest that the underlying motivations may have changed over time, and that while early creators of malware were often motivated by a desire to identify system vulnerabilities, or by the intellectual challenge, there is an increasing tendency towards creation and distribution of malware for financial gain.&lt;/p&gt;&lt;p&gt;You can learn more about the different types of malware as part of the free OpenLearn course: &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.open.edu/openlearn/science-maths-technology/introduction-cyber-security-stay-safe-online/content-section-overview"&gt;&lt;i&gt;Introduction to cyber security: stay safe online&lt;/i&gt;&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.4</guid>
    <dc:title>2.4 Malware</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;As you are accessing this course online, you are already likely to be familiar with the need to protect your system against attacks from viruses and other types of &lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913360912" class="oucontent-glossaryterm" data-definition="Malicious software that interferes with the normal functioning of a network or computer." title="Malicious software that interferes with the normal functioning of a network or computer."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;malware&lt;/span&gt;&lt;/a&gt;. &lt;/p&gt;&lt;div class="oucontent-figure" style="width:400px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/fc23a36a/dd802_1_2_3_hacking294082.tif.jpg" alt="An image of a child drinking from a mug with a computer screen in the background." width="400" height="600" style="max-width:400px;" class="oucontent-figure-image" longdesc="view.php?id=105783&amp;extra=longdesc_idm45634913490176"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;extra=longdesc_idm45634913490176&amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913490176"&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;However, as with hacking, those who produce malware are inventive, and are often able to exploit weaknesses in the system and make use of social engineering to introduce malware to a computer or network despite existing safeguards. There are two aspects of the criminal use of malware: firstly, creation of the malware; and secondly, distribution (Kirwan and Power, 2013). The term ‘malware’ encompasses a number of different types of malicious program, and in common with the other types of cybercrime you have explored so far, motivations for creating and distributing malware are varied. While psychological research on creators of malware is limited, Kirwan and Power (2013) suggest that the underlying motivations may have changed over time, and that while early creators of malware were often motivated by a desire to identify system vulnerabilities, or by the intellectual challenge, there is an increasing tendency towards creation and distribution of malware for financial gain.&lt;/p&gt;&lt;p&gt;You can learn more about the different types of malware as part of the free OpenLearn course: &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.open.edu/openlearn/science-maths-technology/introduction-cyber-security-stay-safe-online/content-section-overview"&gt;&lt;i&gt;Introduction to cyber security: stay safe online&lt;/i&gt;&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>2.5 Online fraud</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.5</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;So far you have learned how social engineering can be a useful tool for those who wish to distribute malware. However, it can also be used to gain access to personal information, which may allow unauthorised individuals to access accounts, facilitating photo hacking. However, perhaps the most familiar form of social engineering used by cybercriminals is the &lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913353984" class="oucontent-glossaryterm" data-definition="Techniques used to persuade people to divulge information that can be used in online fraud (e.g. bank account passwords)." title="Techniques used to persuade people to divulge information that can be used in online fraud (e.g. ban..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;phishing&lt;/span&gt;&lt;/a&gt; email, which is normally used to gain information that can be used to commit online fraud. This phishing email often appears to be from a legitimate business or bank and asks for an immediate response from the recipient in order to prevent serious consequences (for example, the account being frozen). When the recipient clicks on the link in the email, they are taken to a fake website and asked to enter their account details. By doing so, they provide fraudsters with the information needed to access their genuine account and steal money. As in the previous examples, by manipulating human behaviour, cybercriminals can gain access to private accounts without being skilled in hacking.&lt;/p&gt;&lt;p&gt;Advance fee fraud is another online scam with which you might be familiar with. There are many variants, but the basic format is the same. The fraudster sends an email in which they claim to need help in moving a large amount of money from one country to another and are prevented from doing so due to some unfortunate set of circumstances. The recipient of the email is asked to assist by sending a small amount of money and is offered a share of the large sum of money as their reward (Action Fraud, 2020). Of course, the large sum of money does not exist, and anyone who sends money will never see it again. Online dating romance scam (Buchanan and Whitty, 2014; Whitty and Buchanan, 2012; 2016) is a subtype of advance fee fraud, in which the scammer or scammers pose as someone interested in forming a relationship with their victim. They use photographs of attractive people to create fake profiles and make contact with their victims via social networking sites or online dating sites (e.g. Aransiola and Asindemade, 2011; Rege, 2009; Whitty and Buchanan, 2012). This is sometimes termed &amp;#x2018;catfishing’. The focus in this type of crime is on building a relationship with the victim so that they will then comply with requests for money.&lt;/p&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 5 Why does online dating scam succeed? &lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 10 minutes&lt;/div&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;Watch the video of FBI Special Agent Christine Beining describing romance scams. As you watch the video, note down any information related to the victims’ likely characteristics and techniques used to gain trust and obtain the desired result. &lt;/p&gt;
&lt;div id="idm45634922863488" class="oucontent-media oucontent-unstableid oucontent-media-mini" style="width:512px;"&gt;&lt;div class="oucontent-embedtemplate"&gt;&lt;iframe type="text/html" width="425" height="344" src="https://www.youtube.com/embed/BmIvqOYwGGU?&amp;amp;hl=en&amp;amp;fs=1&amp;amp;rel=0" frameborder="0"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class="oucontent-figure-text"&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;Video 2 Romance scams&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="oucontent-interaction-print"&gt;&lt;div class="oucontent-interaction-unavailable"&gt;Interactive feature not available in single page view (&lt;a class="oucontent-crossref" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.5#idm45634922863488"&gt;see it in standard view&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div class="oucontent-saq-discussion" data-showtext="Reveal discussion" data-hidetext="Hide discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;Christine Beining explained that:&lt;/p&gt;
&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Scammers usually target vulnerable women (though men can be targeted but less so than women) , using the internet, with money and willing to give it. More specifically, they target people not in existing relationships and looking for love (divorced or widowed)&lt;/li&gt;&lt;li&gt;they will use information available on the internet to find common grounds and use information to manipulate victims and get their trust. The relationships become intense very quickly. So, they can start asking for money using different excuses and promising to repay back the money. &lt;/li&gt;&lt;li&gt;Scammers are usually part of criminal organisations and data about victims are recorded in &amp;#x2018;sucker lists’, which make them even more vulnerable and easily targeted to repeat victimisations (Button et al., 2009).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;Buchanan and Whitty (2014) also found that higher scores on &amp;#x2018;idealisation’ of romantic partners were associated with an increased likelihood of being a romance scam victim, but the other factors they investigated – including extraversion, agreeableness, sensation-seeking, neuroticism, and loneliness – were not associated with the likelihood that someone would become a romance scam victim.&lt;/p&gt;&lt;p&gt;You can read about the many different types of online fraud at the &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.open.ac.uk/libraryservices/resource/website:118067&amp;amp;f=30574"&gt;Action Fraud website&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.5</guid>
    <dc:title>2.5 Online fraud</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;So far you have learned how social engineering can be a useful tool for those who wish to distribute malware. However, it can also be used to gain access to personal information, which may allow unauthorised individuals to access accounts, facilitating photo hacking. However, perhaps the most familiar form of social engineering used by cybercriminals is the &lt;a href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary#idm45634913353984" class="oucontent-glossaryterm" data-definition="Techniques used to persuade people to divulge information that can be used in online fraud (e.g. bank account passwords)." title="Techniques used to persuade people to divulge information that can be used in online fraud (e.g. ban..."&gt;&lt;span class="oucontent-glossaryterm-styling"&gt;phishing&lt;/span&gt;&lt;/a&gt; email, which is normally used to gain information that can be used to commit online fraud. This phishing email often appears to be from a legitimate business or bank and asks for an immediate response from the recipient in order to prevent serious consequences (for example, the account being frozen). When the recipient clicks on the link in the email, they are taken to a fake website and asked to enter their account details. By doing so, they provide fraudsters with the information needed to access their genuine account and steal money. As in the previous examples, by manipulating human behaviour, cybercriminals can gain access to private accounts without being skilled in hacking.&lt;/p&gt;&lt;p&gt;Advance fee fraud is another online scam with which you might be familiar with. There are many variants, but the basic format is the same. The fraudster sends an email in which they claim to need help in moving a large amount of money from one country to another and are prevented from doing so due to some unfortunate set of circumstances. The recipient of the email is asked to assist by sending a small amount of money and is offered a share of the large sum of money as their reward (Action Fraud, 2020). Of course, the large sum of money does not exist, and anyone who sends money will never see it again. Online dating romance scam (Buchanan and Whitty, 2014; Whitty and Buchanan, 2012; 2016) is a subtype of advance fee fraud, in which the scammer or scammers pose as someone interested in forming a relationship with their victim. They use photographs of attractive people to create fake profiles and make contact with their victims via social networking sites or online dating sites (e.g. Aransiola and Asindemade, 2011; Rege, 2009; Whitty and Buchanan, 2012). This is sometimes termed ‘catfishing’. The focus in this type of crime is on building a relationship with the victim so that they will then comply with requests for money.&lt;/p&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 5 Why does online dating scam succeed? &lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 10 minutes&lt;/div&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;Watch the video of FBI Special Agent Christine Beining describing romance scams. As you watch the video, note down any information related to the victims’ likely characteristics and techniques used to gain trust and obtain the desired result. &lt;/p&gt;
&lt;div id="idm45634922863488" class="oucontent-media oucontent-unstableid oucontent-media-mini" style="width:512px;"&gt;&lt;div class="oucontent-embedtemplate"&gt;&lt;iframe type="text/html" width="425" height="344" src="https://www.youtube.com/embed/BmIvqOYwGGU?&amp;hl=en&amp;fs=1&amp;rel=0" frameborder="0"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class="oucontent-figure-text"&gt;&lt;div class="oucontent-caption oucontent-nonumber"&gt;&lt;span class="oucontent-figure-caption"&gt;Video 2 Romance scams&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="oucontent-interaction-print"&gt;&lt;div class="oucontent-interaction-unavailable"&gt;Interactive feature not available in single page view (&lt;a class="oucontent-crossref" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.5#idm45634922863488"&gt;see it in standard view&lt;/a&gt;).&lt;/div&gt;&lt;/div&gt;
&lt;/div&gt;

&lt;div class="oucontent-saq-discussion" data-showtext="Reveal discussion" data-hidetext="Hide discussion"&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;Christine Beining explained that:&lt;/p&gt;
&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Scammers usually target vulnerable women (though men can be targeted but less so than women) , using the internet, with money and willing to give it. More specifically, they target people not in existing relationships and looking for love (divorced or widowed)&lt;/li&gt;&lt;li&gt;they will use information available on the internet to find common grounds and use information to manipulate victims and get their trust. The relationships become intense very quickly. So, they can start asking for money using different excuses and promising to repay back the money. &lt;/li&gt;&lt;li&gt;Scammers are usually part of criminal organisations and data about victims are recorded in ‘sucker lists’, which make them even more vulnerable and easily targeted to repeat victimisations (Button et al., 2009).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;Buchanan and Whitty (2014) also found that higher scores on ‘idealisation’ of romantic partners were associated with an increased likelihood of being a romance scam victim, but the other factors they investigated – including extraversion, agreeableness, sensation-seeking, neuroticism, and loneliness – were not associated with the likelihood that someone would become a romance scam victim.&lt;/p&gt;&lt;p&gt;You can read about the many different types of online fraud at the &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.open.ac.uk/libraryservices/resource/website:118067&amp;f=30574"&gt;Action Fraud website&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>3 Victim&amp;#x2019;s experience of cybercrime</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-3</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;You have seen in the previous sections that the accurate distinction between different types of cybercrime can be difficult. &lt;/p&gt;&lt;p&gt;However, regardless of the specific type of cybercrime experienced, a common research finding is that it can have adverse consequences for its victims. Cyber-victimisation can be seen to have similar social, psychological and physiological effects to those experienced by people victimised in the parallel offline offences. This suggests that cybercrimes should be responded to with equal concern to their offline equivalents. For instance, the effects of cyberbullying are similar to those of traditional bullying (Smith et al. 2008). In the same respect, Dre&amp;#xDF;ing et al. (2014) identify that the impact of cyberstalking is similar to that of offline stalking. However, there is, as yet, little research that looks at the effects of trolling on those targeted. &lt;/p&gt;&lt;div class="oucontent-figure" style="width:400px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/a1753b4d/dd802_1_3_victim_experience294083.tif.jpg" alt="An image of a young person leaning against a bed with a laptop on their lap, arms folded and looking at the laptop." width="400" height="600" style="max-width:400px;" class="oucontent-figure-image" longdesc="view.php?id=105783&amp;amp;extra=longdesc_idm45634913460960"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;amp;extra=longdesc_idm45634913460960&amp;amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913460960"&gt;&lt;/a&gt;&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-3</guid>
    <dc:title>3 Victim’s experience of cybercrime</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;You have seen in the previous sections that the accurate distinction between different types of cybercrime can be difficult. &lt;/p&gt;&lt;p&gt;However, regardless of the specific type of cybercrime experienced, a common research finding is that it can have adverse consequences for its victims. Cyber-victimisation can be seen to have similar social, psychological and physiological effects to those experienced by people victimised in the parallel offline offences. This suggests that cybercrimes should be responded to with equal concern to their offline equivalents. For instance, the effects of cyberbullying are similar to those of traditional bullying (Smith et al. 2008). In the same respect, Dreßing et al. (2014) identify that the impact of cyberstalking is similar to that of offline stalking. However, there is, as yet, little research that looks at the effects of trolling on those targeted. &lt;/p&gt;&lt;div class="oucontent-figure" style="width:400px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/a1753b4d/dd802_1_3_victim_experience294083.tif.jpg" alt="An image of a young person leaning against a bed with a laptop on their lap, arms folded and looking at the laptop." width="400" height="600" style="max-width:400px;" class="oucontent-figure-image" longdesc="view.php?id=105783&amp;extra=longdesc_idm45634913460960"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;extra=longdesc_idm45634913460960&amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913460960"&gt;&lt;/a&gt;&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>3.1 Impact of cybercrime on victims and coping strategies</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-3.1</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;It is important to add that for certain types of cybercrime, the victimisation is multi-faceted. For instance, while the negative impact of online fraud on the victims might appear to be solely financial, a study by Button et al. (2014) found that in addition to financial hardship, some victims might experience negative effects on their mental health, physical health and personal relationships. Whitty and Buchanan (2012; 2016) argue that victims of online dating romance scams suffer a &amp;#x2018;double hit’, as they suffer the loss of a relationship as well as experiencing financial loss. The survey conducted by Buchanan and Whitty (2014) showed that there are large individual differences in the degree of emotional distress reported by victims, and they found that sometimes emotional distress was high even where there was no financial loss. More in-depth interviews with a small number of victims identified that people who had lost money to online romance scams reported greater distress at the loss of their relationship than their money. Their distress was exacerbated by a lack of social support, with some victims reporting that they experienced anger and blame from family and friends.&lt;/p&gt;&lt;div class="oucontent-table oucontent-s-type2 oucontent-s-norules oucontent-s-box"&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table&gt;&lt;tr&gt;
&lt;td&gt;&lt;p&gt;The literature has identified the following consequences on cyber-victimisation:&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Social withdrawal/anxiety&lt;/li&gt;&lt;li&gt;Depression&lt;/li&gt;&lt;li&gt;PTSD&lt;/li&gt;&lt;li&gt;Obsessive behaviours&lt;/li&gt;&lt;li&gt;Loss of confidence&lt;/li&gt;&lt;li&gt;Reduction in self-esteem.&lt;/li&gt;&lt;li&gt;Headaches &lt;/li&gt;&lt;li&gt;Abdominal pain/stomach problems&lt;/li&gt;&lt;li&gt;Eating disorder&lt;/li&gt;&lt;li&gt;Sleep disorder&lt;/li&gt;&lt;li&gt;Not feeling safe&lt;/li&gt;&lt;li&gt;Self-harm&lt;/li&gt;&lt;li&gt;Suicide tendencies&lt;/li&gt;&lt;li&gt;Feeling helpless&lt;/li&gt;&lt;li&gt;Panic attacks&lt;/li&gt;&lt;li&gt;Mistrust of others&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(L&amp;#xE5;ftman et al., 2013; Sourander et al., 2010; Schneider et al., 2012; Bates, 2017)&lt;/p&gt;&lt;/td&gt;
&lt;td&gt;&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/6fce287e/dd802_1_1impact294084.tif.jpg" alt="An image of a person looking at a computer tablet." width="512" height="683" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide" longdesc="view.php?id=105783&amp;amp;extra=longdesc_idm45634913445680"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;amp;extra=longdesc_idm45634913445680&amp;amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913445680"&gt;&lt;/a&gt;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;Similarities in coping strategies for victims of cybercrime were also found, with victims initially tending to turn to negative coping strategies such as alcohol use and avoidance, before engaging with more positive approaches such as seeking counselling and undertaking advocacy work. However, with cybercrime directed at the person, the issue of victim blaming is important to consider, drawing more specifically on research into public attitudes towards sexual violence that place the blame for onto the victims. &lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-3.1</guid>
    <dc:title>3.1 Impact of cybercrime on victims and coping strategies</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;It is important to add that for certain types of cybercrime, the victimisation is multi-faceted. For instance, while the negative impact of online fraud on the victims might appear to be solely financial, a study by Button et al. (2014) found that in addition to financial hardship, some victims might experience negative effects on their mental health, physical health and personal relationships. Whitty and Buchanan (2012; 2016) argue that victims of online dating romance scams suffer a ‘double hit’, as they suffer the loss of a relationship as well as experiencing financial loss. The survey conducted by Buchanan and Whitty (2014) showed that there are large individual differences in the degree of emotional distress reported by victims, and they found that sometimes emotional distress was high even where there was no financial loss. More in-depth interviews with a small number of victims identified that people who had lost money to online romance scams reported greater distress at the loss of their relationship than their money. Their distress was exacerbated by a lack of social support, with some victims reporting that they experienced anger and blame from family and friends.&lt;/p&gt;&lt;div class="oucontent-table oucontent-s-type2 oucontent-s-norules oucontent-s-box"&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table&gt;&lt;tr&gt;
&lt;td&gt;&lt;p&gt;The literature has identified the following consequences on cyber-victimisation:&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Social withdrawal/anxiety&lt;/li&gt;&lt;li&gt;Depression&lt;/li&gt;&lt;li&gt;PTSD&lt;/li&gt;&lt;li&gt;Obsessive behaviours&lt;/li&gt;&lt;li&gt;Loss of confidence&lt;/li&gt;&lt;li&gt;Reduction in self-esteem.&lt;/li&gt;&lt;li&gt;Headaches &lt;/li&gt;&lt;li&gt;Abdominal pain/stomach problems&lt;/li&gt;&lt;li&gt;Eating disorder&lt;/li&gt;&lt;li&gt;Sleep disorder&lt;/li&gt;&lt;li&gt;Not feeling safe&lt;/li&gt;&lt;li&gt;Self-harm&lt;/li&gt;&lt;li&gt;Suicide tendencies&lt;/li&gt;&lt;li&gt;Feeling helpless&lt;/li&gt;&lt;li&gt;Panic attacks&lt;/li&gt;&lt;li&gt;Mistrust of others&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;(Låftman et al., 2013; Sourander et al., 2010; Schneider et al., 2012; Bates, 2017)&lt;/p&gt;&lt;/td&gt;
&lt;td&gt;&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/6fce287e/dd802_1_1impact294084.tif.jpg" alt="An image of a person looking at a computer tablet." width="512" height="683" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide" longdesc="view.php?id=105783&amp;extra=longdesc_idm45634913445680"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;extra=longdesc_idm45634913445680&amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913445680"&gt;&lt;/a&gt;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;Similarities in coping strategies for victims of cybercrime were also found, with victims initially tending to turn to negative coping strategies such as alcohol use and avoidance, before engaging with more positive approaches such as seeking counselling and undertaking advocacy work. However, with cybercrime directed at the person, the issue of victim blaming is important to consider, drawing more specifically on research into public attitudes towards sexual violence that place the blame for onto the victims. &lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>3.2 Victim blaming</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-3.2</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;When a crime is committed, the victims themselves and other members of society often seek to understand why the crime happened. Victims may ask questions like &amp;#x2018;why me?’, &amp;#x2018;why did that have to happen to me?’. Friends, family and other members of society might ask &amp;#x2018;why did that happen?’ but may also ask questions like &amp;#x2018;could the victim have avoided being targeted?’ or &amp;#x2018;did the victim do something to make themselves vulnerable?’. These latter questions lead to the idea that the victim is at least partially responsible for their own victimisation. &lt;/p&gt;&lt;p&gt;The notion of victim blaming has long been the subject of academic study. Early victim typologies (such as those developed by Mendelsohn in the 1930s for crimes against the person) considered the role victims could be seen to play in their own victimisation. Modern academic study has moved away from this type of victim blaming, and it is more widely understood that the perpetrator of a crime should be the one held to blame. Nonetheless, victim blaming is still frequently encountered. Victims who are seen as making themselves vulnerable are particularly likely to be blamed (e.g. Gray, 2015). This type of blaming forms part of a wider set of beliefs and attitudes towards online victimisation where blame and responsibility is put on the failure to avoid victimisation due to victims’ greediness and/or gullibility for instance in relation to online dating scams (Cross, 2015) or initial consent given to take/send the picture to someone else in cases of non-consensual pornography and revenge porn. Bates (2017) refers this type of thinking as the &amp;#x2018;she should have known better’ argument. In offline contexts, this type of thinking can be seen in rape myth beliefs that suggest rape victims are to blame because of something that they did, for example: &amp;#x2018;they walked down a dark alley on their own’; &amp;#x2018;they got drunk’; &amp;#x2018;they invited them back to their house’. &lt;/p&gt;&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/59fcfab2/dd802_1_victim_blamingv2_294344.tif.jpg" alt="A close up image of someone’s eye with a tear rolling down their cheek." width="512" height="341" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide" longdesc="view.php?id=105783&amp;amp;extra=longdesc_idm45634913435808"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;amp;extra=longdesc_idm45634913435808&amp;amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913435808"&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;The theory of just-world beliefs (Lerner, 1980) has been used to account for why people may blame victims. The underlying principle is that the world is a fair place, and therefore if people are good, then nothing bad will happen to them. The consequence of this is that if something bad happens to people (i.e. being a victim of a crime), then they must have done something to bring this bad thing upon them. In this context, this allows people to feel safe if they avoid doing the things that they believe that the victim has done. For example, victim blaming in this context can consist of arguments that people do not have to go online, do not have to use social media and can always log off if they do not like what is happening online. If people do use social media, and do not deactivate their accounts in response to harassment, then they are often characterised as having put themselves in the way of harm. Conversely, it this type of reasoning allows cybercriminals such as trolls and other online abusers to rationalise their behaviour by saying that the victim can always avoid being victimised by not going online, or not posting comments. However, this means that it is the abused, rather than the abuser, who is expected to change their behaviour. &lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-3.2</guid>
    <dc:title>3.2 Victim blaming</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;When a crime is committed, the victims themselves and other members of society often seek to understand why the crime happened. Victims may ask questions like ‘why me?’, ‘why did that have to happen to me?’. Friends, family and other members of society might ask ‘why did that happen?’ but may also ask questions like ‘could the victim have avoided being targeted?’ or ‘did the victim do something to make themselves vulnerable?’. These latter questions lead to the idea that the victim is at least partially responsible for their own victimisation. &lt;/p&gt;&lt;p&gt;The notion of victim blaming has long been the subject of academic study. Early victim typologies (such as those developed by Mendelsohn in the 1930s for crimes against the person) considered the role victims could be seen to play in their own victimisation. Modern academic study has moved away from this type of victim blaming, and it is more widely understood that the perpetrator of a crime should be the one held to blame. Nonetheless, victim blaming is still frequently encountered. Victims who are seen as making themselves vulnerable are particularly likely to be blamed (e.g. Gray, 2015). This type of blaming forms part of a wider set of beliefs and attitudes towards online victimisation where blame and responsibility is put on the failure to avoid victimisation due to victims’ greediness and/or gullibility for instance in relation to online dating scams (Cross, 2015) or initial consent given to take/send the picture to someone else in cases of non-consensual pornography and revenge porn. Bates (2017) refers this type of thinking as the ‘she should have known better’ argument. In offline contexts, this type of thinking can be seen in rape myth beliefs that suggest rape victims are to blame because of something that they did, for example: ‘they walked down a dark alley on their own’; ‘they got drunk’; ‘they invited them back to their house’. &lt;/p&gt;&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/59fcfab2/dd802_1_victim_blamingv2_294344.tif.jpg" alt="A close up image of someone’s eye with a tear rolling down their cheek." width="512" height="341" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide" longdesc="view.php?id=105783&amp;extra=longdesc_idm45634913435808"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;extra=longdesc_idm45634913435808&amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913435808"&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;The theory of just-world beliefs (Lerner, 1980) has been used to account for why people may blame victims. The underlying principle is that the world is a fair place, and therefore if people are good, then nothing bad will happen to them. The consequence of this is that if something bad happens to people (i.e. being a victim of a crime), then they must have done something to bring this bad thing upon them. In this context, this allows people to feel safe if they avoid doing the things that they believe that the victim has done. For example, victim blaming in this context can consist of arguments that people do not have to go online, do not have to use social media and can always log off if they do not like what is happening online. If people do use social media, and do not deactivate their accounts in response to harassment, then they are often characterised as having put themselves in the way of harm. Conversely, it this type of reasoning allows cybercriminals such as trolls and other online abusers to rationalise their behaviour by saying that the victim can always avoid being victimised by not going online, or not posting comments. However, this means that it is the abused, rather than the abuser, who is expected to change their behaviour. &lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>4 What are the motivations for cybercrime?</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-4</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;In this section you will move to consider the reasons that have been identified to explain cybercrime. When looking at the motivations, the key aspects to consider are:&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Individual differences (e.g., personality traits)&lt;/li&gt;&lt;li&gt;The context of the online environment&lt;/li&gt;&lt;li&gt;The characteristics given by observers to those performing the various types of cybercrime.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Psychological research has been able to identify personality correlations of self-reported cyber-criminality or trolling, particularly the &amp;#x2018;dark tetrad’ of personality which includes the personality traits of narcissism, Machiavellianism, psychopathy and sadism. Buckels et al. (2014) used personality inventories to assess these traits; hence these are not clinical assessments. They found that sadism, psychopathy and Machiavellianism all predicted trolling behaviour, with sadism being the strongest predictor. Similarly, Craker and March (2016) found psychopathy and sadism to be predictors of trolling on Facebook. In their research, Craker and March also included a measure of negative social potency (obtaining social reward from negative actions), and this was found to be a stronger predictor of Facebook trolling than any of the personality characteristics.&lt;/p&gt;&lt;p&gt;In a nutshell, cybercriminals’ motivations are wide-ranging, and it depends on the crime being looked at. For instance, all cybercrimes linked to ransomware, phishing, online financial crimes, online fraud, password cracking, malware, hacking, sextortion are mainly motivated by financial gain but for some of them motivation can be due to pranks, activism, cyber theft, espionage (e.g. malware). Cybercrimes against the person such as cyberstalking, cyberbullying, trolling, revenge pornography are likely to be motivated by hatred, desire to inflict pain and harm to either known or unknown individuals, groups or community. Lastly, for image related crimes, it could be motivated by a desire to control, to intimidate, sexual gratification, social status building (Henry, Powell, and Flynn, 2017). &lt;/p&gt;&lt;p&gt;As you can see, cybercriminals’ motivations are largely determined by the crime itself and due to the versatility of the different online crimes, it is difficult to consider the motivations for cybercrime on a general level. Additionally, research around motivations for cybercrime can be difficult to investigate because it relies to some extent on the words of criminals who may not see their behaviour as being deviant (e.g. such as in the case of trolling), they may not wish to disclose their reasons for engaging in criminal activities, or may not have complete insight into their own motives. &lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-4</guid>
    <dc:title>4 What are the motivations for cybercrime?</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;In this section you will move to consider the reasons that have been identified to explain cybercrime. When looking at the motivations, the key aspects to consider are:&lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;Individual differences (e.g., personality traits)&lt;/li&gt;&lt;li&gt;The context of the online environment&lt;/li&gt;&lt;li&gt;The characteristics given by observers to those performing the various types of cybercrime.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Psychological research has been able to identify personality correlations of self-reported cyber-criminality or trolling, particularly the ‘dark tetrad’ of personality which includes the personality traits of narcissism, Machiavellianism, psychopathy and sadism. Buckels et al. (2014) used personality inventories to assess these traits; hence these are not clinical assessments. They found that sadism, psychopathy and Machiavellianism all predicted trolling behaviour, with sadism being the strongest predictor. Similarly, Craker and March (2016) found psychopathy and sadism to be predictors of trolling on Facebook. In their research, Craker and March also included a measure of negative social potency (obtaining social reward from negative actions), and this was found to be a stronger predictor of Facebook trolling than any of the personality characteristics.&lt;/p&gt;&lt;p&gt;In a nutshell, cybercriminals’ motivations are wide-ranging, and it depends on the crime being looked at. For instance, all cybercrimes linked to ransomware, phishing, online financial crimes, online fraud, password cracking, malware, hacking, sextortion are mainly motivated by financial gain but for some of them motivation can be due to pranks, activism, cyber theft, espionage (e.g. malware). Cybercrimes against the person such as cyberstalking, cyberbullying, trolling, revenge pornography are likely to be motivated by hatred, desire to inflict pain and harm to either known or unknown individuals, groups or community. Lastly, for image related crimes, it could be motivated by a desire to control, to intimidate, sexual gratification, social status building (Henry, Powell, and Flynn, 2017). &lt;/p&gt;&lt;p&gt;As you can see, cybercriminals’ motivations are largely determined by the crime itself and due to the versatility of the different online crimes, it is difficult to consider the motivations for cybercrime on a general level. Additionally, research around motivations for cybercrime can be difficult to investigate because it relies to some extent on the words of criminals who may not see their behaviour as being deviant (e.g. such as in the case of trolling), they may not wish to disclose their reasons for engaging in criminal activities, or may not have complete insight into their own motives. &lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>5 Intervention on cyber criminality</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-5</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;Earlier on in the course, you have looked at the different types of criminal activities that fall within the cyber criminality, and the different ways in which they are connected. So far you have learned about crimes committed via the internet, which have financial and/or psychological consequences for the victims. While online versions of offline crimes might once have been viewed less seriously, there is increasing recognition that the impact of online crimes can be as great as, or in some cases greater, than offline versions of the crime (for example, victims of online image-based sexual offences suffer longer-term effects due to wider distribution and longevity of images on the web). Initially the law struggled to address online criminality, as existing laws did not always fit the online crimes. However, in some cases (e.g. revenge porn), specific laws have now been developed (Nigam, 2018) to address these more effectively. There is information about the way in which these crimes are being tackled in jurisdictions across the world on the &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.open.ac.uk/libraryservices/resource/website:118207&amp;amp;f=30596"&gt;Centre for Internet &amp;amp; Society&lt;/a&gt;&lt;/span&gt; website.&lt;/p&gt;&lt;p&gt;In some cases, the match between online and offline versions of a crime make it simple to define criminality and pursue the perpetrator using existing laws. For example, it is easy to see that both physically stealing money from a bank, and electronically stealing money from an online bank account, are forms of theft: regardless of the means used to take the money, the financial loss is the same. However, what if the theft was of virtual money or objects that belong to someone in an online world? Should laws be developed to regulate behaviour in virtual settings? &lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-5</guid>
    <dc:title>5 Intervention on cyber criminality</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;Earlier on in the course, you have looked at the different types of criminal activities that fall within the cyber criminality, and the different ways in which they are connected. So far you have learned about crimes committed via the internet, which have financial and/or psychological consequences for the victims. While online versions of offline crimes might once have been viewed less seriously, there is increasing recognition that the impact of online crimes can be as great as, or in some cases greater, than offline versions of the crime (for example, victims of online image-based sexual offences suffer longer-term effects due to wider distribution and longevity of images on the web). Initially the law struggled to address online criminality, as existing laws did not always fit the online crimes. However, in some cases (e.g. revenge porn), specific laws have now been developed (Nigam, 2018) to address these more effectively. There is information about the way in which these crimes are being tackled in jurisdictions across the world on the &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.open.ac.uk/libraryservices/resource/website:118207&amp;f=30596"&gt;Centre for Internet &amp; Society&lt;/a&gt;&lt;/span&gt; website.&lt;/p&gt;&lt;p&gt;In some cases, the match between online and offline versions of a crime make it simple to define criminality and pursue the perpetrator using existing laws. For example, it is easy to see that both physically stealing money from a bank, and electronically stealing money from an online bank account, are forms of theft: regardless of the means used to take the money, the financial loss is the same. However, what if the theft was of virtual money or objects that belong to someone in an online world? Should laws be developed to regulate behaviour in virtual settings? &lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>5.1 Where cybercrime and online anti-social behaviour meet</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-5.1</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;In some cases, behaviours labelled as trolling for instance, such as threats to rape and kill, or persistent harassment, can be clearly identified as possible criminal offences that should be investigated and potentially prosecuted. At the other extreme, there are online behaviours that fall within the above definition that are not criminal offences. For example, on forums or other internet sites it is quite common to see irrelevancies, pointless questions, arguments and suchlike that can all be forms of trolling. While these may be disruptive or aggravate other users, they do not seem to merit criminal justice responses. &lt;/p&gt;&lt;p&gt;There is currently no legislation that specifically targets trolling (at the time of writing, 2020). However in England and Wales there are a number of pieces of legislation that can be used to prosecute trolling, and the Crown Prosecution Service identifies the Malicious Communications Act 1988 and the Communications Act 2003 as being the relevant legislation. Depending upon the content of the behaviour, other potentially relevant legislation includes the Protection from Harassment Act 1997 and the Criminal Justice and Courts Act 2015. Even considering just England and Wales, the legislative framework for these offences is complex, and different jurisdictions handle these behaviours differently. &lt;/p&gt;&lt;p&gt;Having considered two extremes of trolling, this leaves a significant question as to where the line should be drawn between the offensive/annoying types of trolling and those that warrant a criminal justice response. At present there is not a clear answer to this question, but the issue of where to draw the line is something to be aware of when considering cybercrime.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-5.1</guid>
    <dc:title>5.1 Where cybercrime and online anti-social behaviour meet</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;In some cases, behaviours labelled as trolling for instance, such as threats to rape and kill, or persistent harassment, can be clearly identified as possible criminal offences that should be investigated and potentially prosecuted. At the other extreme, there are online behaviours that fall within the above definition that are not criminal offences. For example, on forums or other internet sites it is quite common to see irrelevancies, pointless questions, arguments and suchlike that can all be forms of trolling. While these may be disruptive or aggravate other users, they do not seem to merit criminal justice responses. &lt;/p&gt;&lt;p&gt;There is currently no legislation that specifically targets trolling (at the time of writing, 2020). However in England and Wales there are a number of pieces of legislation that can be used to prosecute trolling, and the Crown Prosecution Service identifies the Malicious Communications Act 1988 and the Communications Act 2003 as being the relevant legislation. Depending upon the content of the behaviour, other potentially relevant legislation includes the Protection from Harassment Act 1997 and the Criminal Justice and Courts Act 2015. Even considering just England and Wales, the legislative framework for these offences is complex, and different jurisdictions handle these behaviours differently. &lt;/p&gt;&lt;p&gt;Having considered two extremes of trolling, this leaves a significant question as to where the line should be drawn between the offensive/annoying types of trolling and those that warrant a criminal justice response. At present there is not a clear answer to this question, but the issue of where to draw the line is something to be aware of when considering cybercrime.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>6 Reflecting on your experiences</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-6</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;The material covered so far in this course has shown that there are a variety of different types of online victimisation. As well the direct victims of cybercrime, the awareness of the possibility of being a target may influence other internet users. This therefore can be seen as a type of secondary victimisation that may serve to alter and constrain our online behaviours. In this final activity you are going to consider what you have learned and whether this might change how you will engage online.&lt;/p&gt;&lt;div class="&amp;#10;            oucontent-activity&amp;#10;           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 6 Keeping yourself safe online, or secondary victimisation?&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 20 minutes&lt;/div&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;Reflect on the following questions:&lt;/p&gt;
&lt;ol class="oucontent-numbered"&gt;&lt;li&gt;Based on the content of this course, what steps might you take to try to reduce the likelihood of being targeted by cybercriminals and internet trolls?&lt;/li&gt;&lt;li&gt;What are the implications of these measures?&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;Do these measures contain an element of victim blaming?&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;How do you feel about these measures?&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;&lt;div&gt;Interactive content appears here. Please visit the website to use it&lt;/div&gt;

&lt;div class="oucontent-saq-interactivediscussion" data-showtext="" data-hidetext=""&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;Like you have seen in the video in Activity 1, everyone takes a different approach when it comes to engaging with the online world. Some people are heavily involved online (e.g., social media, online shopping, banking and so on) whereas others are taking a lighter approach to it (i.e. being reluctant to invest themselves more than necessary). Regardless of where you place yourself, up to now it might have been done without reflecting too much about its impact to your virtual and real lives, as well as the risks associated with it. While it cannot be said that cybercrime does not exist, it is probably erroneous to look at it as being the modern-day plague (Wall, 2008). Indeed, the risks associated with online activities are real. However, it is important to emphasise that actual cases of cybercrime are not as common as the media seems to portray its prevalence. This discrepancy could be because the problem has been exaggerated by the media instilling moral panic but could also be because cybercrime remains largely unreported and unprosecuted due to shame or lack of evidence. The best strategy to reduce cybercrime victimisation rates is to raise awareness (Williams and Levi, 2017). Therefore, reflecting upon how you personally engage online is useful since there are not &amp;#x2018;one size fits all’ model and what one person might find acceptable, another may not. Regardless of how much time you have spent on this activity, it is worthwhile as it is important to think about the best (and current) ways to protect yourself. The internet itself is a great source of information but it is always important to favour official guidance such as the UK government (National Cyber Security Centre). The NCSC is offering a wealth of useful advice on how to stay secure online. You can find, below, a selection of such guidance that might be relevant to you:&lt;/p&gt;
&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;&lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/Protecting-devices-from-viruses-malware-infographic.pdf"&gt;Protect devices from viruses and malware&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/Phishing-attacks-dealing-suspicious-emails-infographic.pdf"&gt;Phishing attacks: dealing with suspicious emails&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/Using-passwords-protect-devices-data-infographic.pdf"&gt;Using passwords to protect your devices and data&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/shopping-online-securely"&gt;Shopping online securely&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/Sextortion-how-to-protect-yourself.pdf"&gt;Sextortion phishing scams: how to protect yourself&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/Recovering-hacked-online-accounts-infographic.pdf"&gt;A guide to recovering your hacked online accounts&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/vtc_infographic.pdf"&gt;Video conferencing: using services securely&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://parentinfo.org/article/video-chatting-a-guide-for-parents-and-carers-of-primary-school-age-children"&gt;Video chatting: a guide for protecting primary school age children&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://parentinfo.org/article/video-chatting-a-guide-for-parents-and-carers-of-secondary-school-age-children"&gt;Video chatting: a guide for protecting secondary school age children&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/smart-devices-in-the-home"&gt;Smart devices: using them safely in your home&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/smart-security-cameras-using-them-safely-in-your-home"&gt;Smart security cameras: Using them safely in your home&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/securing-your-devices"&gt;Securing your devices&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/online-gaming-for-families-and-individuals"&gt;Online gaming for families and individuals&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/social-media-protect-what-you-publish"&gt;Social media: protecting what you publish&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://revengepornhelpline.org.uk/"&gt;Revenge Porn Helpline&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.internetmatters.org/issues/cyberbullying/learn-about-it/"&gt;Information about cyberbullying and how to respond to it&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.victimsupport.org.uk/crime-info/types-crime/stalking-and-harassment"&gt;Cyberstalking support website&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt; </description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-6</guid>
    <dc:title>6 Reflecting on your experiences</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;The material covered so far in this course has shown that there are a variety of different types of online victimisation. As well the direct victims of cybercrime, the awareness of the possibility of being a target may influence other internet users. This therefore can be seen as a type of secondary victimisation that may serve to alter and constrain our online behaviours. In this final activity you are going to consider what you have learned and whether this might change how you will engage online.&lt;/p&gt;&lt;div class="
            oucontent-activity
           oucontent-s-heavybox1 oucontent-s-box "&gt;&lt;div class="oucontent-outer-box"&gt;&lt;h2 class="oucontent-h3 oucontent-heading oucontent-nonumber"&gt;Activity 6 Keeping yourself safe online, or secondary victimisation?&lt;/h2&gt;&lt;div class="oucontent-inner-box"&gt;&lt;div class="oucontent-saq-timing"&gt;&lt;span class="accesshide"&gt;Timing: &lt;/span&gt;Allow 20 minutes&lt;/div&gt;&lt;div class="oucontent-saq-question"&gt;
&lt;p&gt;Reflect on the following questions:&lt;/p&gt;
&lt;ol class="oucontent-numbered"&gt;&lt;li&gt;Based on the content of this course, what steps might you take to try to reduce the likelihood of being targeted by cybercriminals and internet trolls?&lt;/li&gt;&lt;li&gt;What are the implications of these measures?&lt;ul class="oucontent-numbered"&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;a.&lt;/span&gt;Do these measures contain an element of victim blaming?&lt;/li&gt;&lt;li class="oucontent-markerdirect"&gt;&lt;span class="oucontent-listmarker"&gt;b.&lt;/span&gt;How do you feel about these measures?&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;&lt;div&gt;Interactive content appears here. Please visit the website to use it&lt;/div&gt;

&lt;div class="oucontent-saq-interactivediscussion" data-showtext="" data-hidetext=""&gt;&lt;h3 class="oucontent-h4"&gt;Discussion&lt;/h3&gt;
&lt;p&gt;Like you have seen in the video in Activity 1, everyone takes a different approach when it comes to engaging with the online world. Some people are heavily involved online (e.g., social media, online shopping, banking and so on) whereas others are taking a lighter approach to it (i.e. being reluctant to invest themselves more than necessary). Regardless of where you place yourself, up to now it might have been done without reflecting too much about its impact to your virtual and real lives, as well as the risks associated with it. While it cannot be said that cybercrime does not exist, it is probably erroneous to look at it as being the modern-day plague (Wall, 2008). Indeed, the risks associated with online activities are real. However, it is important to emphasise that actual cases of cybercrime are not as common as the media seems to portray its prevalence. This discrepancy could be because the problem has been exaggerated by the media instilling moral panic but could also be because cybercrime remains largely unreported and unprosecuted due to shame or lack of evidence. The best strategy to reduce cybercrime victimisation rates is to raise awareness (Williams and Levi, 2017). Therefore, reflecting upon how you personally engage online is useful since there are not ‘one size fits all’ model and what one person might find acceptable, another may not. Regardless of how much time you have spent on this activity, it is worthwhile as it is important to think about the best (and current) ways to protect yourself. The internet itself is a great source of information but it is always important to favour official guidance such as the UK government (National Cyber Security Centre). The NCSC is offering a wealth of useful advice on how to stay secure online. You can find, below, a selection of such guidance that might be relevant to you:&lt;/p&gt;
&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;&lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/Protecting-devices-from-viruses-malware-infographic.pdf"&gt;Protect devices from viruses and malware&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/Phishing-attacks-dealing-suspicious-emails-infographic.pdf"&gt;Phishing attacks: dealing with suspicious emails&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/Using-passwords-protect-devices-data-infographic.pdf"&gt;Using passwords to protect your devices and data&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/shopping-online-securely"&gt;Shopping online securely&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/Sextortion-how-to-protect-yourself.pdf"&gt;Sextortion phishing scams: how to protect yourself&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/Recovering-hacked-online-accounts-infographic.pdf"&gt;A guide to recovering your hacked online accounts&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/files/vtc_infographic.pdf"&gt;Video conferencing: using services securely&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://parentinfo.org/article/video-chatting-a-guide-for-parents-and-carers-of-primary-school-age-children"&gt;Video chatting: a guide for protecting primary school age children&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://parentinfo.org/article/video-chatting-a-guide-for-parents-and-carers-of-secondary-school-age-children"&gt;Video chatting: a guide for protecting secondary school age children&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/smart-devices-in-the-home"&gt;Smart devices: using them safely in your home&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/smart-security-cameras-using-them-safely-in-your-home"&gt;Smart security cameras: Using them safely in your home&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/securing-your-devices"&gt;Securing your devices&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/online-gaming-for-families-and-individuals"&gt;Online gaming for families and individuals&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.ncsc.gov.uk/guidance/social-media-protect-what-you-publish"&gt;Social media: protecting what you publish&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://revengepornhelpline.org.uk/"&gt;Revenge Porn Helpline&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.internetmatters.org/issues/cyberbullying/learn-about-it/"&gt;Information about cyberbullying and how to respond to it&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="oucontent-hyperlink" href="https://www.victimsupport.org.uk/crime-info/types-crime/stalking-and-harassment"&gt;Cyberstalking support website&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt; </dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>7 Conclusion</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-7</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;This course has provided an introduction to some of the different types of cybercrime, considering the similarities and differences in the definitions and behaviours. You have looked at how it is challenging to recognise the differences between anti-social and criminal behaviour. You have also learned about the impact of cybercrime on victims and the motivations for cybercrime, as well as the challenges that some of these crimes raise in terms of crime prevention and legal redress. &lt;/p&gt;&lt;div class="oucontent-table oucontent-s-type2 oucontent-s-norules oucontent-s-box"&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table&gt;&lt;tr&gt;
&lt;td&gt;&lt;p&gt;Now that you are at the end of this course, you should be able to: &lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;outline the impact on victims&lt;/li&gt;&lt;li&gt;distinguish different types of cybercrime, considering the similarities and differences in the definitions and behaviours&lt;/li&gt;&lt;li&gt;identify the motivations and behaviours of cybercriminals&lt;/li&gt;&lt;li&gt;illustrate the current interventions to tackle cybercrime.&lt;/li&gt;&lt;/ul&gt;&lt;/td&gt;
&lt;td&gt;&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/75f9c200/dd801_2_conclusion294089.tif.jpg" alt="An image of a person sat at a table with one arm in the air, palm up. Above the palm is an image of a love heart, similar to that of a like option found on social media platforms." width="512" height="683" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide" longdesc="view.php?id=105783&amp;amp;extra=longdesc_idm45634913372416"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;amp;extra=longdesc_idm45634913372416&amp;amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913372416"&gt;&lt;/a&gt;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;This Open Learn course is an adapted extract from the Open University course &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/postgraduate/modules/dd802"&gt;DD802 &lt;i&gt;Investigating forensic psychology&lt;/i&gt;.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Explore the collection of &lt;a class="oucontent-hyperlink" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/postgraduate-study-psychology-and-criminology"&gt;Postgraduate study in psychology and criminology&lt;/a&gt;.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-7</guid>
    <dc:title>7 Conclusion</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;This course has provided an introduction to some of the different types of cybercrime, considering the similarities and differences in the definitions and behaviours. You have looked at how it is challenging to recognise the differences between anti-social and criminal behaviour. You have also learned about the impact of cybercrime on victims and the motivations for cybercrime, as well as the challenges that some of these crimes raise in terms of crime prevention and legal redress. &lt;/p&gt;&lt;div class="oucontent-table oucontent-s-type2 oucontent-s-norules oucontent-s-box"&gt;&lt;div class="oucontent-table-wrapper"&gt;&lt;table&gt;&lt;tr&gt;
&lt;td&gt;&lt;p&gt;Now that you are at the end of this course, you should be able to: &lt;/p&gt;&lt;ul class="oucontent-bulleted"&gt;&lt;li&gt;outline the impact on victims&lt;/li&gt;&lt;li&gt;distinguish different types of cybercrime, considering the similarities and differences in the definitions and behaviours&lt;/li&gt;&lt;li&gt;identify the motivations and behaviours of cybercriminals&lt;/li&gt;&lt;li&gt;illustrate the current interventions to tackle cybercrime.&lt;/li&gt;&lt;/ul&gt;&lt;/td&gt;
&lt;td&gt;&lt;div class="oucontent-figure" style="width:512px;"&gt;&lt;img src="https://www.open.edu/openlearn/ocw/pluginfile.php/2528823/mod_oucontent/oucontent/98554/78ad59c7/75f9c200/dd801_2_conclusion294089.tif.jpg" alt="An image of a person sat at a table with one arm in the air, palm up. Above the palm is an image of a love heart, similar to that of a like option found on social media platforms." width="512" height="683" style="max-width:512px;" class="oucontent-figure-image oucontent-media-wide" longdesc="view.php?id=105783&amp;extra=longdesc_idm45634913372416"/&gt;&lt;div class="oucontent-longdesclink oucontent-longdesconly"&gt;&lt;a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=105783&amp;extra=longdesc_idm45634913372416&amp;clicked=1"&gt;Long description&lt;/a&gt;&lt;/div&gt;&lt;a id="back_longdesc_idm45634913372416"&gt;&lt;/a&gt;&lt;/div&gt;&lt;/td&gt;
&lt;/tr&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;This Open Learn course is an adapted extract from the Open University course &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/postgraduate/modules/dd802"&gt;DD802 &lt;i&gt;Investigating forensic psychology&lt;/i&gt;.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Explore the collection of &lt;a class="oucontent-hyperlink" href="https://www.open.edu/openlearn/health-sports-psychology/psychology/postgraduate-study-psychology-and-criminology"&gt;Postgraduate study in psychology and criminology&lt;/a&gt;.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>Glossary</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;dl class="oucontent-glossary"&gt;
&lt;dt id="idm45634913367232"&gt;Cyber bullying&lt;/dt&gt;
&lt;dd&gt;Cyberbullying has been defined as &amp;#x2018;an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself’ (Smith et al., 2008, p. 376).&lt;/dd&gt;
&lt;dt id="idm45634913365552"&gt;Cyberstalking&lt;/dt&gt;
&lt;dd&gt;Cyberstalking is aimed at a specific individual and entails &amp;#x2018;using the Internet as part of a targeted campaign that causes fear, distress or alarm’ (Cavezza and McEwan, 2014, pp. 955-956). &lt;/dd&gt;
&lt;dt id="idm45634913363936"&gt;Hacking&lt;/dt&gt;
&lt;dd&gt;Bypassing security systems to make an unauthorised intrusion into a computer or network.&lt;/dd&gt;
&lt;dt id="idm45634913362416"&gt;Image-based sexual crimes&lt;/dt&gt;
&lt;dd&gt;The use of nude/sexual images of a victim for criminal purposes.&lt;/dd&gt;
&lt;dt id="idm45634913360912"&gt;Malware&lt;/dt&gt;
&lt;dd&gt;Malicious software that interferes with the normal functioning of a network or computer.&lt;/dd&gt;
&lt;dt id="idm45634913359392"&gt;Online financial crimes&lt;/dt&gt;
&lt;dd&gt;Illegally obtaining money or other financial rewards using online methods.&lt;/dd&gt;
&lt;dt id="idm45634913357888"&gt;Online Fraud&lt;/dt&gt;
&lt;dd&gt;Fraud that is committed using online methods. You can read about the many different types of online fraud at the &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.open.ac.uk/libraryservices/resource/website:118067&amp;amp;f=30574"&gt;Action Fraud website&lt;/a&gt;&lt;/span&gt;.&lt;/dd&gt;
&lt;dt id="idm45634913355520"&gt;Password cracking&lt;/dt&gt;
&lt;dd&gt;The process of recovering or guessing the correct password needed to gain access to a system or account.&lt;/dd&gt;
&lt;dt id="idm45634913353984"&gt;Phishing&lt;/dt&gt;
&lt;dd&gt;Techniques used to persuade people to divulge information that can be used in online fraud (e.g. bank account passwords).&lt;/dd&gt;
&lt;dt id="idm45634913352432"&gt;Photo-hacking&lt;/dt&gt;
&lt;dd&gt;Hacking that is specifically targeted at gaining unauthorised access to photos, particularly nude images.&lt;/dd&gt;
&lt;dt id="idm45634913350896"&gt;Ransomware&lt;/dt&gt;
&lt;dd&gt;A type of malware that renders a computer and/or its files inaccessible, with a demand for payment to unlock it/them.&lt;/dd&gt;
&lt;dt id="idm45634913349360"&gt;Revenge Pornography&lt;/dt&gt;
&lt;dd&gt;Kamal and Newman (2016, p. 361) describe revenge pornography as &amp;#x2018;the online release of explicit photographs or videos of an individual without permission for the purpose of humiliation.’&lt;/dd&gt;
&lt;dt id="idm45634913347744"&gt;Sextortion&lt;/dt&gt;
&lt;dd&gt;&amp;#x2018;Situations in which perpetrators threaten to expose sexual images to coerce victims to provide additional pictures, engage in sexual activity, or agree to other demands’ (Wolak et al., 2017, pp. 1).&lt;/dd&gt;
&lt;dt id="idm45634913345728"&gt;Trojan&lt;/dt&gt;
&lt;dd&gt;A malicious piece of software that misleads users into activating it by masking its true intent. For example, a file that destroys software which is named &amp;#x2018;virus protection program’.&lt;/dd&gt;
&lt;dt id="idm45634913343024"&gt;Trolling&lt;/dt&gt;
&lt;dd&gt;&amp;#x2018;The act of &amp;#x2018;trolling’ is generally defined as being a negative online behaviour intended to disrupt online communications, aggravate internet users and draw individuals into fruitless debates’ (Coles and West, 2016, p. 44).&lt;/dd&gt;
&lt;dt id="idm45634913341360"&gt;Virus&lt;/dt&gt;
&lt;dd&gt;Software that replicates by inserting its code into other programs and files, often causing damage by corrupting data or creating a &amp;#x2018;back door’ to allow attackers to access the system.&lt;/dd&gt;
&lt;dt id="idm45634913339744"&gt;Worm&lt;/dt&gt;
&lt;dd&gt;A stand-alone malware program that can self-replicate and spread to other computers.&lt;/dd&gt;
&lt;/dl&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section--glossary</guid>
    <dc:title>Glossary</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;dl class="oucontent-glossary"&gt;
&lt;dt id="idm45634913367232"&gt;Cyber bullying&lt;/dt&gt;
&lt;dd&gt;Cyberbullying has been defined as ‘an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself’ (Smith et al., 2008, p. 376).&lt;/dd&gt;
&lt;dt id="idm45634913365552"&gt;Cyberstalking&lt;/dt&gt;
&lt;dd&gt;Cyberstalking is aimed at a specific individual and entails ‘using the Internet as part of a targeted campaign that causes fear, distress or alarm’ (Cavezza and McEwan, 2014, pp. 955-956). &lt;/dd&gt;
&lt;dt id="idm45634913363936"&gt;Hacking&lt;/dt&gt;
&lt;dd&gt;Bypassing security systems to make an unauthorised intrusion into a computer or network.&lt;/dd&gt;
&lt;dt id="idm45634913362416"&gt;Image-based sexual crimes&lt;/dt&gt;
&lt;dd&gt;The use of nude/sexual images of a victim for criminal purposes.&lt;/dd&gt;
&lt;dt id="idm45634913360912"&gt;Malware&lt;/dt&gt;
&lt;dd&gt;Malicious software that interferes with the normal functioning of a network or computer.&lt;/dd&gt;
&lt;dt id="idm45634913359392"&gt;Online financial crimes&lt;/dt&gt;
&lt;dd&gt;Illegally obtaining money or other financial rewards using online methods.&lt;/dd&gt;
&lt;dt id="idm45634913357888"&gt;Online Fraud&lt;/dt&gt;
&lt;dd&gt;Fraud that is committed using online methods. You can read about the many different types of online fraud at the &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.open.ac.uk/libraryservices/resource/website:118067&amp;f=30574"&gt;Action Fraud website&lt;/a&gt;&lt;/span&gt;.&lt;/dd&gt;
&lt;dt id="idm45634913355520"&gt;Password cracking&lt;/dt&gt;
&lt;dd&gt;The process of recovering or guessing the correct password needed to gain access to a system or account.&lt;/dd&gt;
&lt;dt id="idm45634913353984"&gt;Phishing&lt;/dt&gt;
&lt;dd&gt;Techniques used to persuade people to divulge information that can be used in online fraud (e.g. bank account passwords).&lt;/dd&gt;
&lt;dt id="idm45634913352432"&gt;Photo-hacking&lt;/dt&gt;
&lt;dd&gt;Hacking that is specifically targeted at gaining unauthorised access to photos, particularly nude images.&lt;/dd&gt;
&lt;dt id="idm45634913350896"&gt;Ransomware&lt;/dt&gt;
&lt;dd&gt;A type of malware that renders a computer and/or its files inaccessible, with a demand for payment to unlock it/them.&lt;/dd&gt;
&lt;dt id="idm45634913349360"&gt;Revenge Pornography&lt;/dt&gt;
&lt;dd&gt;Kamal and Newman (2016, p. 361) describe revenge pornography as ‘the online release of explicit photographs or videos of an individual without permission for the purpose of humiliation.’&lt;/dd&gt;
&lt;dt id="idm45634913347744"&gt;Sextortion&lt;/dt&gt;
&lt;dd&gt;‘Situations in which perpetrators threaten to expose sexual images to coerce victims to provide additional pictures, engage in sexual activity, or agree to other demands’ (Wolak et al., 2017, pp. 1).&lt;/dd&gt;
&lt;dt id="idm45634913345728"&gt;Trojan&lt;/dt&gt;
&lt;dd&gt;A malicious piece of software that misleads users into activating it by masking its true intent. For example, a file that destroys software which is named ‘virus protection program’.&lt;/dd&gt;
&lt;dt id="idm45634913343024"&gt;Trolling&lt;/dt&gt;
&lt;dd&gt;‘The act of ‘trolling’ is generally defined as being a negative online behaviour intended to disrupt online communications, aggravate internet users and draw individuals into fruitless debates’ (Coles and West, 2016, p. 44).&lt;/dd&gt;
&lt;dt id="idm45634913341360"&gt;Virus&lt;/dt&gt;
&lt;dd&gt;Software that replicates by inserting its code into other programs and files, often causing damage by corrupting data or creating a ‘back door’ to allow attackers to access the system.&lt;/dd&gt;
&lt;dt id="idm45634913339744"&gt;Worm&lt;/dt&gt;
&lt;dd&gt;A stand-alone malware program that can self-replicate and spread to other computers.&lt;/dd&gt;
&lt;/dl&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>References</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section---references</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;div class="oucontent-referenceitem"&gt;Action Fraud (2018) &lt;i&gt;419 emails and letters&lt;/i&gt;. Available at: &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.actionfraud.police.uk/a-z-of-fraud/419-emails-and-letters"&gt;https://www.actionfraud.police.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;a-z-of-fraud/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;419-emails-and-letters&lt;/a&gt;&lt;/span&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Aransiola, J. O. and Asindemade, S. O. (2011) &amp;#x2018;Understanding cybercrime perpetrators and the strategies they employ in Nigeria’, &lt;i&gt;Cyberpsychology, Behavior, and Social Networking&lt;/i&gt;, 14, pp. 759&amp;#x2212;763.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Bates, S. (2017) &amp;#x2018;Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors,’ &lt;i&gt;Feminist Criminology&lt;/i&gt;, 12(1), pp. 22&amp;#x2212;42.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;BBC News (2011) &amp;#x2018;Who, What, Why: Can phone hackers still access messages?’, &lt;i&gt;BBC News&lt;/i&gt; 6 July. Available at: &lt;a class="oucontent-hyperlink" href="https://www.bbc.co.uk/news/magazine-14044499"&gt;https://www.bbc.co.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;news/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;magazine-14044499&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;BBC News (2014) &amp;#x2018;Hacking Trial: the verdicts’, &lt;i&gt;BBC News&lt;/i&gt; 4 July. Available at: &lt;a class="oucontent-hyperlink" href="https://www.bbc.co.uk/news/uk-27145187"&gt;https://www.bbc.co.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;news/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;uk-27145187&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Bishop, J. (2014) &amp;#x2018;Representations of &amp;#x2018;trolls’ in mass media communication: a review of media-texts and moral panics relating to &amp;#x2018;internet trolling’, &lt;i&gt;International Journal of Web Based Communities&lt;/i&gt;, 10(1), pp. 7-24.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Buchanan, T. and Whitty, M. T. (2014) &amp;#x2018;The online dating romance scam: causes and consequences of victimhood’, &lt;i&gt;Psychology, Crime and Law&lt;/i&gt;, 20(3), pp.261–283. &lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Buckels, E. E., Trapnell, P. D. and Paulhus, D. L. (2014). &amp;#x2018;Trolls just want to have fun’ &lt;i&gt;Personality and individual Differences&lt;/i&gt;, 67, pp. 97–102.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Button, M., Lewis, C. and Tapley, J. (2009) Fraud typologies and the victims of fraud literature review. London, National Fraud Authority.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Button, M., Lewis, C. and Tapley, J. (2014) &amp;#x2018;Not a victimless crime: The impact of fraud on individual victims and their families’, Security Journal, 27(1), pp. 36&amp;#x2212;54.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Canter, D. and Youngs, D. (2009) &lt;i&gt;Investigative Psychology: Offender Profiling and the Analysis of Criminal Action&lt;/i&gt;, Chichester, Wiley.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Coles, B. A. and West, M. (2016) &amp;#x2018;Trolling the trolls: Online forum users constructions of the nature and properties of trolling’, &lt;i&gt;Computers in Human Behavior&lt;/i&gt;, 60, pp. 233–244.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Conklin, A., Dietrich, G. and Walz, D. (2004) &amp;#x2018;Password-based Authentication: A System Perspective’, &lt;i&gt;Proceedings of the 37th Annual Hawaii International Conference on System Sciences&lt;/i&gt;, pp. 1&amp;#x2212;10.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Cooper, K., Quayle, E., Jonsson, L. and G&amp;#xF6;ran Svedin, C. (2016) &amp;#x2018;Adolescents and self-taken sexual images: A review of the literature’, &lt;i&gt;Computers in Human Behavior&lt;/i&gt;, 55, Part B, pp. 706&amp;#x2212;716.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Cross, C. (2015). &amp;#x2018;No laughing matter: Blaming the victim of online fraud’, &lt;i&gt;International Review of Victimology&lt;/i&gt;, 21(2), pp. 187–204.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Dre&amp;#xDF;ing, H., Bailer, J., Anders, A., Wagner, H. and Gallas, C. (2014) &amp;#x2018;Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims’, &lt;i&gt;Cyberpsychology, Behavior, and Social Networking&lt;/i&gt;, 17(2), pp. 61–67.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Fichman, P. and Sanfilippo, M.R. (2016). &amp;#x2018;Online trolling and its perpetrators: Under the cyberbridge’. Lanham, Maryland: Rowman &amp;amp; Littlefield.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Fogarty, P. (2019) &amp;#x2018; What is tattle life? Harmless forum or hotbed of harassement?’ Available at: &lt;a class="oucontent-hyperlink" href="https://www.hitc.com/en-gb/2019/06/27/what-is-tattle-life-mrs-meldrum-harassment-bullying-petition/"&gt;https://www.hitc.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;en-gb/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2019/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;06/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;27/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;what-is-tattle-life-mrs-meldrum-harassment-bullying-petition/&lt;/a&gt; (Accessed: 04 November 2020)&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Gehringer. E. F. (2002) &amp;#x2018;Choosing passwords: security and human factors’, &lt;i&gt;2002 International Symposium on Technology and Society&lt;/i&gt;, pp. 369&amp;#x2212;373.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Gray, J. M. (2015) &amp;#x2018;What constitutes a &amp;#x201C;reasonable belief in consent&amp;#x201D; to sex? A thematic analysis’, &lt;i&gt;Journal of Sexual Aggression&lt;/i&gt;, 21(3), pp. 337&amp;#x2212;353.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Henry, N., Powell, A., &amp;amp; Flynn, A. L. G. (2017). &lt;i&gt;Not Just &amp;#x2018;Revenge Pornography’: Australians’ Experiences of Image-Based Abuse: A Summary Report&lt;/i&gt;, RMIT University. Available at: &lt;a class="oucontent-hyperlink" href="https://researchmgt.monash.edu/ws/portalfiles/portal/214045352/revenge_porn_report_2017.pdf"&gt;https://researchmgt.monash.edu/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;ws/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;portalfiles/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;portal/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;214045352/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;revenge_porn_report_2017.pdf&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Herring, S., Job-Sluder, K., Scheckler, R. and Barab, S. (2002) &amp;#x2018;Searching for safety online: Managing &amp;#x201C;trolling&amp;#x201D; in a feminist forum’, &lt;i&gt;The Information Society&lt;/i&gt;, 18, pp. 371–384.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Kashner, S. (2014) &amp;#x2018;Both Huntress and Prey’, &lt;i&gt;Vanity Fair&lt;/i&gt;, 20 October. Available at: &lt;a class="oucontent-hyperlink" href="https://archive.vanityfair.com/article/2014/11/both-huntress-and-prey"&gt;https://archive.vanityfair.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;article/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2014/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;11/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;both-huntress-and-prey&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;How People Use the Internet in 2020 (2020). &lt;i&gt;How people use the internet in 2020&lt;/i&gt;. Available at: &lt;a class="oucontent-hyperlink" href="https://www.broadbandsearch.net/blog/most-common-uses-internet-daily-life"&gt;https://www.broadbandsearch.net/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;blog/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;most-common-uses-internet-daily-life&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Kirwan, G. and Power, A. (2013) &amp;#x2018;Cyberbullying and Cyberstalking’, in Kirwan, G. and Power, A. &lt;i&gt;Cybercrime: The Psychology of Online Offenders&lt;/i&gt;, Cambridge, Cambridge University Press, pp. 147–168.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;L&amp;#xE5;ftman, S. B., Modin, B. and &amp;#xD6;stberg, V. (2013) &amp;#x2018;Cyberbullying and subjective health: A large-scale study of students in Stockholm, Sweden’, &lt;i&gt;Children and Youth Services Review&lt;/i&gt;, 35, pp. 112–119. &lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Langos, C. (2015) &amp;#x2018;Cyberbullying: The shades of harm’ &lt;i&gt;Psychiatry, psychology and law&lt;/i&gt;, 22(1), pp.106–123.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Lerner, M. J. (1980) &lt;i&gt;The Belief in a Just World: A Fundamental Delusion&lt;/i&gt;, New York, Plenum Press.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Mackie , J. (2014) &amp;#x2018;Jennifer Lawrence’s nude photo leak is not a sex crime, however much she’d like it to be’, The Independent, 10 October. Available at: &lt;a class="oucontent-hyperlink" href="https://www.independent.co.uk/voices/comment/jennifer-lawrences-nude-photo-leak-was-a-scandal-but-legally-speaking-it-was-not-a-sex-crime-9786886.html"&gt;https://www.independent.co.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;voices/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;comment/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;jennifer-lawrences-nude-photo-leak-was-a-scandal-but-legally-speaking-it-was-not-a-sex-crime-9786886.html&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;McGlynn, C., Rackley, E. and Houghton, R. (2017) &amp;#x2018;Beyond &amp;#x2018;revenge porn’: The continuum of image-based sexual abuse’ &lt;i&gt;Feminist Legal Studies&lt;/i&gt;, 25(1), pp. 25–46.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Mendelsohn, B. (1956) &amp;#x2018;The Victimology’, &lt;i&gt;Etudes Internationales de Psycho-Sociologie Criminelle&lt;/i&gt;, 3, pp. 25–26 (in French).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Morgan (2017) &amp;#x2018;Announcing our Worst Passwords of 2016’, TeamsID [Online]. Available at: &lt;a class="oucontent-hyperlink" href="https://www.teamsid.com/worst-passwords-2016/"&gt;https://www.teamsid.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;worst-passwords-2016/&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Naughton, J. (2016). &amp;#x2018;The evolution of the internet: from military experiment to general purpose technology’, &lt;i&gt;Journal of Cyber Policy&lt;/i&gt;, vol.35, no. 1, pp.5-28.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Nigam, S. (2018) &amp;#x2018;Revenge Porn Laws across the World’, The Centre for Internet and Society [Online] Available at: https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Nuccitelli, M (n.d.) &lt;i&gt;130+ types of internet trolls and online provocateurs&lt;/i&gt;. Available at: &lt;a class="oucontent-hyperlink" href="https://www.ipredator.co/troll/"&gt;https://www.ipredator.co/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;troll/&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Ofcom (2020). &lt;i&gt;Adult’s media use and attitudes 2020&lt;/i&gt;. Available at: &lt;a class="oucontent-hyperlink" href="https://www.ofcom.org.uk/__data/assets/pdf_file/0031/196375/adults-media-use-and-attitudes-2020-report.pdf"&gt;https://www.ofcom.org.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;__data/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;assets/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;pdf_file/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;0031/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;196375/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;adults-media-use-and-attitudes-2020-report.pdf&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Oppenheim, M. (2017) &amp;#x2018;Jennifer Lawrence addresses nude photo hack: &amp;#x201C;It was so unbelievably violating&amp;#x201D;’, &lt;i&gt;The Guardian&lt;/i&gt;, 21 November. Available at: &lt;a class="oucontent-hyperlink" href="https://www.independent.co.uk/%20arts-entertainment/%20films/%20news/%20jennifer-lawrence-nude-photo-hack-pictures-video-leak-celebrity-addresses-issue-violating-a8067121.html"&gt;https://www.independent.co.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt; arts-entertainment/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt; films/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt; news/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt; jennifer-lawrence-nude-photo-hack-pictures-video-leak-celebrity-addresses-issue-violating-a8067121.html&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Rege, A. (2009) &amp;#x2018;What's love got to do with it? Exploring online dating scams and identity fraud’, &lt;i&gt;International Journal of Cyber Criminology&lt;/i&gt;, 3, pp. 494&amp;#x2212;512.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Samimi, P. and Alderson, K. (2014) &amp;#x2018;Sexting among undergraduate students’, &lt;i&gt;Computers in Human Behavior&lt;/i&gt;, 31, pp. 230&amp;#x2212;241.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Schneider, S. K., O’Donnell, L., Stueve, A. and Coulter, R. (2012) &amp;#x2018;Cyberbullying, school bullying, and psychological distress: A regional census of high school students’, &lt;i&gt;American Journal of Public Health&lt;/i&gt;, 102, pp. 171–177.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Shachaf, P. and Hara, N. (2010) &amp;#x2018;Beyond vandalism: Wikipedia trolls’, &lt;i&gt;Journal of Information Science&lt;/i&gt;, 36(3), pp. 357–370.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008) &amp;#x2018;Cyberbullying: its nature and impact in secondary school pupils’, &lt;i&gt;Journal of Child Psychology and Psychiatry&lt;/i&gt;, 49(4), pp. 376–385.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Schneider, S. K., O’Donnell, L., Stueve, A. and Coulter, R. (2012) &amp;#x2018;Cyberbullying, school bullying, and psychological distress: A regional census of high school students’, &lt;i&gt;American Journal of Public Health&lt;/i&gt;, 102, pp. 171–177.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Sourander, A., Brunstein Klomek, A., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T. and Helenius, H. (2010) &amp;#x2018;Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study’, &lt;i&gt;Archives of General Psychiatry&lt;/i&gt;, 67(7), pp. 720–728.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Tam, L., Glassman, M. and Vanderwauver, M. (2009) &amp;#x2018;The psychology of password management: a tradeoff between security and convenience’, &lt;i&gt;Behaviour &amp;amp; Information Technology&lt;/i&gt;, 29(3), pp. 233&amp;#x2212;244.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Whitty, M. T. and Buchanan, T. (2012) &amp;#x2018;The online dating romance scam: A serious cybercrime’, &lt;i&gt;Cyberpsychology, Behavior, and Social Networking&lt;/i&gt;, 15(3), pp. 181&amp;#x2212;183.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Whitty, M.T. and Buchanan, T. (2016) &amp;#x2018;The online dating romance scam: The psychological impact on victims – both financial and non-financial’, &lt;i&gt;Criminology &amp;amp; Criminal Justice&lt;/i&gt;, 16(2), pp. 176&amp;#x2212;194.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Williams, M. L., &amp;amp; Levi, M. (2017). &amp;#x2018;Cybercrime prevention’. In N. Tilley &amp;amp; A. Sidebottom (Eds.), Handbook of crime prevention and community safety (pp. 454&amp;#x2212;469). London: Routledge.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Youngs, D., Ioannou, M. and Eagles, J. (2016) &amp;#x2018;Expressive and instrumental offending: Reconciling the paradox of specialisation and versatility’, &lt;i&gt;International Journal of Offender Therapy and Comparative Criminology&lt;/i&gt;, 60(4), pp. 397–422.&lt;/div&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section---references</guid>
    <dc:title>References</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;div class="oucontent-referenceitem"&gt;Action Fraud (2018) &lt;i&gt;419 emails and letters&lt;/i&gt;. Available at: &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="https://www.actionfraud.police.uk/a-z-of-fraud/419-emails-and-letters"&gt;https://www.actionfraud.police.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;a-z-of-fraud/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;419-emails-and-letters&lt;/a&gt;&lt;/span&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Aransiola, J. O. and Asindemade, S. O. (2011) ‘Understanding cybercrime perpetrators and the strategies they employ in Nigeria’, &lt;i&gt;Cyberpsychology, Behavior, and Social Networking&lt;/i&gt;, 14, pp. 759−763.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Bates, S. (2017) ‘Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors,’ &lt;i&gt;Feminist Criminology&lt;/i&gt;, 12(1), pp. 22−42.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;BBC News (2011) ‘Who, What, Why: Can phone hackers still access messages?’, &lt;i&gt;BBC News&lt;/i&gt; 6 July. Available at: &lt;a class="oucontent-hyperlink" href="https://www.bbc.co.uk/news/magazine-14044499"&gt;https://www.bbc.co.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;news/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;magazine-14044499&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;BBC News (2014) ‘Hacking Trial: the verdicts’, &lt;i&gt;BBC News&lt;/i&gt; 4 July. Available at: &lt;a class="oucontent-hyperlink" href="https://www.bbc.co.uk/news/uk-27145187"&gt;https://www.bbc.co.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;news/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;uk-27145187&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Bishop, J. (2014) ‘Representations of ‘trolls’ in mass media communication: a review of media-texts and moral panics relating to ‘internet trolling’, &lt;i&gt;International Journal of Web Based Communities&lt;/i&gt;, 10(1), pp. 7-24.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Buchanan, T. and Whitty, M. T. (2014) ‘The online dating romance scam: causes and consequences of victimhood’, &lt;i&gt;Psychology, Crime and Law&lt;/i&gt;, 20(3), pp.261–283. &lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Buckels, E. E., Trapnell, P. D. and Paulhus, D. L. (2014). ‘Trolls just want to have fun’ &lt;i&gt;Personality and individual Differences&lt;/i&gt;, 67, pp. 97–102.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Button, M., Lewis, C. and Tapley, J. (2009) Fraud typologies and the victims of fraud literature review. London, National Fraud Authority.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Button, M., Lewis, C. and Tapley, J. (2014) ‘Not a victimless crime: The impact of fraud on individual victims and their families’, Security Journal, 27(1), pp. 36−54.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Canter, D. and Youngs, D. (2009) &lt;i&gt;Investigative Psychology: Offender Profiling and the Analysis of Criminal Action&lt;/i&gt;, Chichester, Wiley.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Coles, B. A. and West, M. (2016) ‘Trolling the trolls: Online forum users constructions of the nature and properties of trolling’, &lt;i&gt;Computers in Human Behavior&lt;/i&gt;, 60, pp. 233–244.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Conklin, A., Dietrich, G. and Walz, D. (2004) ‘Password-based Authentication: A System Perspective’, &lt;i&gt;Proceedings of the 37th Annual Hawaii International Conference on System Sciences&lt;/i&gt;, pp. 1−10.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Cooper, K., Quayle, E., Jonsson, L. and Göran Svedin, C. (2016) ‘Adolescents and self-taken sexual images: A review of the literature’, &lt;i&gt;Computers in Human Behavior&lt;/i&gt;, 55, Part B, pp. 706−716.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Cross, C. (2015). ‘No laughing matter: Blaming the victim of online fraud’, &lt;i&gt;International Review of Victimology&lt;/i&gt;, 21(2), pp. 187–204.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Dreßing, H., Bailer, J., Anders, A., Wagner, H. and Gallas, C. (2014) ‘Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims’, &lt;i&gt;Cyberpsychology, Behavior, and Social Networking&lt;/i&gt;, 17(2), pp. 61–67.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Fichman, P. and Sanfilippo, M.R. (2016). ‘Online trolling and its perpetrators: Under the cyberbridge’. Lanham, Maryland: Rowman &amp; Littlefield.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Fogarty, P. (2019) ‘ What is tattle life? Harmless forum or hotbed of harassement?’ Available at: &lt;a class="oucontent-hyperlink" href="https://www.hitc.com/en-gb/2019/06/27/what-is-tattle-life-mrs-meldrum-harassment-bullying-petition/"&gt;https://www.hitc.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;en-gb/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2019/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;06/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;27/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;what-is-tattle-life-mrs-meldrum-harassment-bullying-petition/&lt;/a&gt; (Accessed: 04 November 2020)&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Gehringer. E. F. (2002) ‘Choosing passwords: security and human factors’, &lt;i&gt;2002 International Symposium on Technology and Society&lt;/i&gt;, pp. 369−373.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Gray, J. M. (2015) ‘What constitutes a “reasonable belief in consent” to sex? A thematic analysis’, &lt;i&gt;Journal of Sexual Aggression&lt;/i&gt;, 21(3), pp. 337−353.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Henry, N., Powell, A., &amp; Flynn, A. L. G. (2017). &lt;i&gt;Not Just ‘Revenge Pornography’: Australians’ Experiences of Image-Based Abuse: A Summary Report&lt;/i&gt;, RMIT University. Available at: &lt;a class="oucontent-hyperlink" href="https://researchmgt.monash.edu/ws/portalfiles/portal/214045352/revenge_porn_report_2017.pdf"&gt;https://researchmgt.monash.edu/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;ws/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;portalfiles/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;portal/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;214045352/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;revenge_porn_report_2017.pdf&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Herring, S., Job-Sluder, K., Scheckler, R. and Barab, S. (2002) ‘Searching for safety online: Managing “trolling” in a feminist forum’, &lt;i&gt;The Information Society&lt;/i&gt;, 18, pp. 371–384.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Kashner, S. (2014) ‘Both Huntress and Prey’, &lt;i&gt;Vanity Fair&lt;/i&gt;, 20 October. Available at: &lt;a class="oucontent-hyperlink" href="https://archive.vanityfair.com/article/2014/11/both-huntress-and-prey"&gt;https://archive.vanityfair.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;article/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;2014/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;11/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;both-huntress-and-prey&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;How People Use the Internet in 2020 (2020). &lt;i&gt;How people use the internet in 2020&lt;/i&gt;. Available at: &lt;a class="oucontent-hyperlink" href="https://www.broadbandsearch.net/blog/most-common-uses-internet-daily-life"&gt;https://www.broadbandsearch.net/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;blog/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;most-common-uses-internet-daily-life&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Kirwan, G. and Power, A. (2013) ‘Cyberbullying and Cyberstalking’, in Kirwan, G. and Power, A. &lt;i&gt;Cybercrime: The Psychology of Online Offenders&lt;/i&gt;, Cambridge, Cambridge University Press, pp. 147–168.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Låftman, S. B., Modin, B. and Östberg, V. (2013) ‘Cyberbullying and subjective health: A large-scale study of students in Stockholm, Sweden’, &lt;i&gt;Children and Youth Services Review&lt;/i&gt;, 35, pp. 112–119. &lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Langos, C. (2015) ‘Cyberbullying: The shades of harm’ &lt;i&gt;Psychiatry, psychology and law&lt;/i&gt;, 22(1), pp.106–123.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Lerner, M. J. (1980) &lt;i&gt;The Belief in a Just World: A Fundamental Delusion&lt;/i&gt;, New York, Plenum Press.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Mackie , J. (2014) ‘Jennifer Lawrence’s nude photo leak is not a sex crime, however much she’d like it to be’, The Independent, 10 October. Available at: &lt;a class="oucontent-hyperlink" href="https://www.independent.co.uk/voices/comment/jennifer-lawrences-nude-photo-leak-was-a-scandal-but-legally-speaking-it-was-not-a-sex-crime-9786886.html"&gt;https://www.independent.co.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;voices/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;comment/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;jennifer-lawrences-nude-photo-leak-was-a-scandal-but-legally-speaking-it-was-not-a-sex-crime-9786886.html&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;McGlynn, C., Rackley, E. and Houghton, R. (2017) ‘Beyond ‘revenge porn’: The continuum of image-based sexual abuse’ &lt;i&gt;Feminist Legal Studies&lt;/i&gt;, 25(1), pp. 25–46.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Mendelsohn, B. (1956) ‘The Victimology’, &lt;i&gt;Etudes Internationales de Psycho-Sociologie Criminelle&lt;/i&gt;, 3, pp. 25–26 (in French).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Morgan (2017) ‘Announcing our Worst Passwords of 2016’, TeamsID [Online]. Available at: &lt;a class="oucontent-hyperlink" href="https://www.teamsid.com/worst-passwords-2016/"&gt;https://www.teamsid.com/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;worst-passwords-2016/&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Naughton, J. (2016). ‘The evolution of the internet: from military experiment to general purpose technology’, &lt;i&gt;Journal of Cyber Policy&lt;/i&gt;, vol.35, no. 1, pp.5-28.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Nigam, S. (2018) ‘Revenge Porn Laws across the World’, The Centre for Internet and Society [Online] Available at: https://cis-india.org/internet-governance/blog/revenge-porn-laws-across-the-world (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Nuccitelli, M (n.d.) &lt;i&gt;130+ types of internet trolls and online provocateurs&lt;/i&gt;. Available at: &lt;a class="oucontent-hyperlink" href="https://www.ipredator.co/troll/"&gt;https://www.ipredator.co/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;troll/&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Ofcom (2020). &lt;i&gt;Adult’s media use and attitudes 2020&lt;/i&gt;. Available at: &lt;a class="oucontent-hyperlink" href="https://www.ofcom.org.uk/__data/assets/pdf_file/0031/196375/adults-media-use-and-attitudes-2020-report.pdf"&gt;https://www.ofcom.org.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;__data/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;assets/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;pdf_file/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;0031/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;196375/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;adults-media-use-and-attitudes-2020-report.pdf&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Oppenheim, M. (2017) ‘Jennifer Lawrence addresses nude photo hack: “It was so unbelievably violating”’, &lt;i&gt;The Guardian&lt;/i&gt;, 21 November. Available at: &lt;a class="oucontent-hyperlink" href="https://www.independent.co.uk/%20arts-entertainment/%20films/%20news/%20jennifer-lawrence-nude-photo-hack-pictures-video-leak-celebrity-addresses-issue-violating-a8067121.html"&gt;https://www.independent.co.uk/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt; arts-entertainment/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt; films/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt; news/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt; jennifer-lawrence-nude-photo-hack-pictures-video-leak-celebrity-addresses-issue-violating-a8067121.html&lt;/a&gt; (Accessed: 04 November 2020).&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Rege, A. (2009) ‘What's love got to do with it? Exploring online dating scams and identity fraud’, &lt;i&gt;International Journal of Cyber Criminology&lt;/i&gt;, 3, pp. 494−512.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Samimi, P. and Alderson, K. (2014) ‘Sexting among undergraduate students’, &lt;i&gt;Computers in Human Behavior&lt;/i&gt;, 31, pp. 230−241.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Schneider, S. K., O’Donnell, L., Stueve, A. and Coulter, R. (2012) ‘Cyberbullying, school bullying, and psychological distress: A regional census of high school students’, &lt;i&gt;American Journal of Public Health&lt;/i&gt;, 102, pp. 171–177.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Shachaf, P. and Hara, N. (2010) ‘Beyond vandalism: Wikipedia trolls’, &lt;i&gt;Journal of Information Science&lt;/i&gt;, 36(3), pp. 357–370.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008) ‘Cyberbullying: its nature and impact in secondary school pupils’, &lt;i&gt;Journal of Child Psychology and Psychiatry&lt;/i&gt;, 49(4), pp. 376–385.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Schneider, S. K., O’Donnell, L., Stueve, A. and Coulter, R. (2012) ‘Cyberbullying, school bullying, and psychological distress: A regional census of high school students’, &lt;i&gt;American Journal of Public Health&lt;/i&gt;, 102, pp. 171–177.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Sourander, A., Brunstein Klomek, A., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T. and Helenius, H. (2010) ‘Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study’, &lt;i&gt;Archives of General Psychiatry&lt;/i&gt;, 67(7), pp. 720–728.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Tam, L., Glassman, M. and Vanderwauver, M. (2009) ‘The psychology of password management: a tradeoff between security and convenience’, &lt;i&gt;Behaviour &amp; Information Technology&lt;/i&gt;, 29(3), pp. 233−244.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Whitty, M. T. and Buchanan, T. (2012) ‘The online dating romance scam: A serious cybercrime’, &lt;i&gt;Cyberpsychology, Behavior, and Social Networking&lt;/i&gt;, 15(3), pp. 181−183.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Whitty, M.T. and Buchanan, T. (2016) ‘The online dating romance scam: The psychological impact on victims – both financial and non-financial’, &lt;i&gt;Criminology &amp; Criminal Justice&lt;/i&gt;, 16(2), pp. 176−194.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Williams, M. L., &amp; Levi, M. (2017). ‘Cybercrime prevention’. In N. Tilley &amp; A. Sidebottom (Eds.), Handbook of crime prevention and community safety (pp. 454−469). London: Routledge.&lt;/div&gt;
&lt;div class="oucontent-referenceitem"&gt;Youngs, D., Ioannou, M. and Eagles, J. (2016) ‘Expressive and instrumental offending: Reconciling the paradox of specialisation and versatility’, &lt;i&gt;International Journal of Offender Therapy and Comparative Criminology&lt;/i&gt;, 60(4), pp. 397–422.&lt;/div&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
    <item>
      <title>Acknowledgements</title>
      <link>https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section---acknowledgements</link>
      <pubDate>Tue, 17 Nov 2020 14:59:38 GMT</pubDate>
      <description>&lt;p&gt;This free course was written by the DD802 module team and rewritten for OpenLearn by Axelle Philippon.&lt;/p&gt;
&lt;p&gt;Except for third party materials and otherwise stated (see &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/conditions"&gt;terms and conditions&lt;/a&gt;&lt;/span&gt;), this content is made available under a &lt;a class="oucontent-hyperlink" href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB"&gt;Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this free course: &lt;/p&gt;
&lt;p&gt;Course image: Adapted from Jacob Morch / unsplash and geralt / pixabay (asset 293456)&lt;/p&gt;
&lt;p&gt;Section 2.1 activity image: Axelle Philippon (asset 294436)&lt;/p&gt;
&lt;p&gt;Section 2.2 image: Photo by Oladimeji Ajegbile from Pexels (asset 294086)&lt;/p&gt;
&lt;p&gt;Audio 1: &amp;#xA9; BBC&lt;/p&gt;
&lt;p&gt;Section 2.3 image: Image by Robinraj Premchand from Pixabay (asset 294338)&lt;/p&gt;
&lt;p&gt;Section 2.4 image: Photo by cottonbro from Pexels (asset 294082)&lt;/p&gt;
&lt;p&gt;Section 3 image: Photo by Ekaterina Bolovtsova from Pexels (asset 294083)&lt;/p&gt;
&lt;p&gt;Section 3.1 image: Photo by Oladimeji Ajegbile from Pexels (asset 294084)&lt;/p&gt;
&lt;p&gt;Section 3.2 image: Photo by Aliyah Jamous on Unsplash (asset 294344)&lt;/p&gt;
&lt;p&gt;Conclusion image: Photo by Oladimeji Ajegbile from Pexels (asset 294089) &lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Don't miss out&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University – &lt;a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/free-courses?LKCAMPAIGN=ebook_&amp;amp;MEDIA=ol"&gt;www.open.edu/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;openlearn/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;free-courses&lt;/a&gt;.&lt;/p&gt;</description>
      <guid isPermaLink="true">https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section---acknowledgements</guid>
    <dc:title>Acknowledgements</dc:title><dc:identifier>dd802_1</dc:identifier><dc:description>&lt;p&gt;This free course was written by the DD802 module team and rewritten for OpenLearn by Axelle Philippon.&lt;/p&gt;
&lt;p&gt;Except for third party materials and otherwise stated (see &lt;span class="oucontent-linkwithtip"&gt;&lt;a class="oucontent-hyperlink" href="http://www.open.ac.uk/conditions"&gt;terms and conditions&lt;/a&gt;&lt;/span&gt;), this content is made available under a &lt;a class="oucontent-hyperlink" href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB"&gt;Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this free course: &lt;/p&gt;
&lt;p&gt;Course image: Adapted from Jacob Morch / unsplash and geralt / pixabay (asset 293456)&lt;/p&gt;
&lt;p&gt;Section 2.1 activity image: Axelle Philippon (asset 294436)&lt;/p&gt;
&lt;p&gt;Section 2.2 image: Photo by Oladimeji Ajegbile from Pexels (asset 294086)&lt;/p&gt;
&lt;p&gt;Audio 1: © BBC&lt;/p&gt;
&lt;p&gt;Section 2.3 image: Image by Robinraj Premchand from Pixabay (asset 294338)&lt;/p&gt;
&lt;p&gt;Section 2.4 image: Photo by cottonbro from Pexels (asset 294082)&lt;/p&gt;
&lt;p&gt;Section 3 image: Photo by Ekaterina Bolovtsova from Pexels (asset 294083)&lt;/p&gt;
&lt;p&gt;Section 3.1 image: Photo by Oladimeji Ajegbile from Pexels (asset 294084)&lt;/p&gt;
&lt;p&gt;Section 3.2 image: Photo by Aliyah Jamous on Unsplash (asset 294344)&lt;/p&gt;
&lt;p&gt;Conclusion image: Photo by Oladimeji Ajegbile from Pexels (asset 294089) &lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Don't miss out&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University – &lt;a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/free-courses?LKCAMPAIGN=ebook_&amp;MEDIA=ol"&gt;www.open.edu/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;openlearn/&lt;span class="oucontent-hidespace"&gt; &lt;/span&gt;free-courses&lt;/a&gt;.&lt;/p&gt;</dc:description><dc:publisher>The Open University</dc:publisher><dc:creator>The Open University</dc:creator><dc:type>Course</dc:type><dc:format>text/html</dc:format><dc:language>en-GB</dc:language><dc:source>The psychology of cybercrime - dd802_1</dc:source><cc:license>Copyright © 2020 The Open University</cc:license></item>
  </channel>
</rss>
