NEWSLETTER

Sign up to read weekly email newsletter

13 years 🥳 of Publication, 100k+ Stories, 30+ Countries

Legal Desire Media and Insights
Donate
Search
  • Law Firm & In-house Updates
  • Deals
  • Interviews
  • Insight
  • Read to know
  • Courses
Reading: Psychology of Cyber Criminal
Share
Aa
Legal Desire Media and InsightsLegal Desire Media and Insights
  • Law Firm & In-house Updates
  • Deals
  • Interviews
  • Insight
  • Read to know
  • Courses
Search
  • Law Firm & In-house Updates
  • Deals
  • Interviews
  • Insight
  • Read to know
  • Courses
Follow US
Legal Desire Media & Insights
Home » Blog » Psychology of Cyber Criminal
Cyber CrimeForensic

Psychology of Cyber Criminal

By kparihar94 5 Min Read
Share

To discuss the psychology of cybercriminal it’s necessary to define what the term cybercrime means. Cybercrime or computer related crime that involves the computer and a network, the computer may be employed in the commission of a crime against the law or it’s going to be targeted. Cybercrime isn’t about computers: It’s about behaviour. It is important to grasp the psychological mindset of cyber-criminal, so we may consolidate the key insights about human behaviour along with technical solutions. Cyber psychology employed to be considered as emerging discipline within behavioural sciences. Cyber psychologist studies the impact of emerging technology on human behaviour. If we predict about the word hacking in terms of motive, without a doubt hacking may be a skill set. Somehow the word hacking become an abusive and harmful term but if we glance back in 80s or 90 centuries it considered as impressive skill set. But in these times hacking is completely perceived as being negative. Observing the psychology behind hacking through perspective of behavioural sciences, humanitarian understanding to hacking would enlighten an emotion like revenge, anger. Many cybercriminals have same modus operandi, like in phishing ransomware they are trying to convince the victim to give something – new car offer, lottery schemes, increasing master card value. There are many reasons behind technologically intelligent person to become a cyber-criminal, scary childhood experiences, mentally stressor, financial problem, these all factors that will cause an individual to feel deeply needy and build opportunities. It’s all up to hacker, it can be financial gain, to wreck someone assets simply because they will be proving a degree.  The psychology of cyber criminals may be explained through a mixture of theoretical perspective, indeed theories like Routine Activity Theory, and Social Learning Theory.

Routine Activity Theory (RAT)

Routine activity theory makes a connection between crime and its environment and lays stress on its ecological process. According to the Routine activity theory, the three major factors of victimization are the presence of motivated offender, availability of suitable target and lack of capable guardian. In 1979, Marcus Felson and Lawrence E. Cohen tested that explanation for changes in crimes through empirical evaluation of their principle postulates. So as to verify that the dispersion of activities far away from home and family could increase the probabilities of becoming the acceptable  target and diminish the presence of capable guardian, to verify that suitability of targets influenced mediatory contacts which solitary life far away from the family environment could raise victimisation rates and at last to do to verify that rise in crime was associated to changes in structure of  daily activities in life.

Social Learning Theory (SLT)

Social learning theory is learning through observations. There is various study which reflects the cybercrime learned from peer groups In Social Learning theory explaining the relationship between peer social influences and chances of committing crime like cyber harassment.

Case Study

Phishing calls is increasing day-by-day and it is basically originating from local villages. Recently, an internet series JAMTARA, (Jamtara is a district of Jharkhand state) shows how they portray themselves as bank employee, this breed of young fraud would use various tricks to fool their victim across country. They started conversation like this “Sir, you utilize an ATM Card, and you get a message two days ago that it had been blocked?’’ Every day they make uncountable calls from their village Jamtara. By doing these quite phishing calls from time to time would make off with as high Rs. 2-3 lacs in a very day.

 

References

1)     https://blog.avast.com/psychology-of-cybercrime (Access 14:04:2020)

2)     http://www.cambridgeblog.org/2013/09/forensic-psychology-vs-cybercriminals/ (Access 14:04:2020)

 

Author- Sumit Mishra, Legal Intern (2020)

Sumit Mishra, Born on 09 Aug 1995, at Bihar, India. He has completed B.Sc. (Hons.) Forensic Science from Galgotias University, Greater Noida, U.P. He is pursuing M.Sc. Forensic Science from Department of Anthropology, University of Delhi.  He has done training in Central Forensic Science Laboratory (CBI), New Delhi in Physics Division and Photo Division. He has participated in National & International Conferences & Workshops.

You Might Also Like

The Crucial Role of Expert Witnesses in the Criminal Justice System: Differentiating Investigation, Charges, and Guilt, and Exploring the Distinction

Information Technology Act’2000 and it’s Rules for the Digital Nagriks

Identifying the dead is a crucial part of grieving and Human Rights respect

FSL Delhi signed MOU with National Forensic Science University, Gandhinagar for promoting Academic, Research and Training Cooperation

Heredity in Fingerprints and Pattern similarities among family members: A Review

Subscribe

Subscribe to our newsletter to get our newest articles instantly!

Don’t miss out on new posts, Subscribe to newsletter Get our latest posts and announcements in your inbox.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

Don’t miss out on new posts, Subscribe to newsletter Get our latest posts and announcements in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
kparihar94 May 4, 2020
Share this Article
Facebook Twitter Email Copy Link Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

YOU MAY ALSO LIKE

The Crucial Role of Expert Witnesses in the Criminal Justice System: Differentiating Investigation, Charges, and Guilt, and Exploring the Distinction

It is important to clarify the distinctions between individuals who are being investigated, those who are charged, and those who…

Forensic
February 26, 2024

Information Technology Act’2000 and it’s Rules for the Digital Nagriks

“Putting Interest of Digital Nagriks First”- tweeted by Mr. Rajeev Chandrashekar on 6th June 2022, Union Minister of the State…

ArticlesCyber Crime
June 8, 2022

Identifying the dead is a crucial part of grieving and Human Rights respect

Returning an identity to unidentified human remains is a crucial part of the process of grieving for the loss of…

ArticlesForensic
April 28, 2022

FSL Delhi signed MOU with National Forensic Science University, Gandhinagar for promoting Academic, Research and Training Cooperation

Forensic Science Laboratory (FSL) Home Department, Government of NCT of Delhi entered into MoU with National Forensic Science University Gandhinagar,…

Forensic
March 17, 2022

For over 10 years, Legal Desire provides credible legal industry updates and insights across the globe.

  • About
  • Contact Us
  • Legal Marketing Service for Law Firms and Lawyers
  • Privacy Policy
  • Terms & Condition
  • Cancellation/Refund Policy

Follow US: 

Legal Desire Media & Insights

For Submissions/feedbacks/sponsorships/advertisement/syndication: office@legaldesire.com

Legal Desire Media & Insights 2023

✖
Cleantalk Pixel

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?