Please enable JavaScript.
Coggle requires JavaScript to display documents.
Week 6 - New Technologies - Coggle Diagram
Week 6 - New Technologies
Untangling the web of cybercrime
Spatial
Temporal
Traditional crimes - Static, socially, politcally and legally rationalized, offenders socio-economically marginalised.
Cybercrimes - distanciated, lack of social, political and legal recognition, offender privelidged.
3 Categories of cybercrime (Wall)
Faciliatated existing criminal activity
New crimes recognized by existing laws
New harms unrecognized by laws
Online hate speech
Crime and disorder act 1998, Malicious Communications act 1998, and the communications act 2003 (updated for tech)
Hateful social media posts - grossly offensive, threatening or abusive, racial hatred - religion or sexual orientation
Prosecutors operate high threshold at evidential and public interest stages
Free speech - freedom to cause offence
Regulatory Mechanisms
Governance
Regulation of relationships in complex systems
Not just police
Public/Private and national/international
Diverse, dynamic, decentralised
no core
Policy
Governs who is involved
UK cyber security strategy - Tier 1 threat
DEFEND, DETER, DETECT, DEVELOP
Supports gov, industry and SMEs
Education and traiing
Cyber security sharing partnership (CISP)- safe share data
Police initiatives
NCA
Child protection
Money laundering
Investigate, target hardening, intelligence, partnership - action fraud, national online hate crime hub, true vision
Public/ Private partnerships
Nhan and Huey - nodal clusters; Gov, law enforcement, private, general public
Dupont - 5 forms of capital that shape nodal efficient regulation
. Social, Cultural, Political, Economic, Symbolic
Levi and Williams - ecrime partnership mapping study
Tech as a regulator
Williams - Guardians upon high
Applied RAT to online identity theft
3 types of guardianship
Avoidance personal guardianship
Active personal guardianship
Passive physical Guardianship
FINDINGS - Internet penetration affected infrasturcture + maturity of cyber security strategy
Tri-modal regulation
Law - retroactive
Market/Social - Retroactive
Technical - proactive
Situational preventative methods
Lessig and digitial realism
Tech as most effective regulator of crime
Disrupt human action
Tech is malleable
Pervasive tech
Rapidly adaptive
Prevenentative
Non-contentious
Criticism - Hoesin, Tsiavos and Whitley
Create new sovereigns
Tech a biased cultural artifact
Code writers as soverigns
Untouchable when regulating them
Power to shape content
Subjective to misuse