Academia.eduAcademia.edu

Outline

COVID-19 PANDEMIC AND CYBERCRIME: INSIGHTS FROM PRACTITIONERS

2024, Journal of Business and Professional Studies

https://doi.org/10.1111/J.17459125.1987.TB00826.X

Abstract

The scare of the COVID-19 pandemic in the early stages and subsequent lockdowns by countries worldwide caused many business organisations to shut down their operations. To mitigate the effects of the ensuing socioeconomic hardships, businesses resorted to work-from-home and online digital interactions. However, as economic activities migrated online, criminals followed suit. This study employs qualitative research methodology and the combined theories of rational choice and general deterrence to explore the relationship between online activities during COVID-19 and cybercrime. The findings from this study show that COVID-19 norms increased and deepened the social circumstances that cybercriminals exploit to engage in their nefarious acts. These circumstances include stay-at-home, charity, global attention, known authorities, urgency, system vulnerabilities, lack of cybersecurity awareness training, and lack of qualified cybersecurity professionals. The study has implications for cybersecurity practices for business organisations and research.

References (27)

  1. Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Psychiatric Quarterly, 3(2), 77-101.
  2. Cornish, D. B., & Clarke, R. V. (1987). Understanding Crime Displacement: An Application of Rational Choice Theory. Criminology, 25(4), 933. https://doi.org/doi:10.1111/j.1745- 9125.1987.tb00826.x
  3. De', R., Pandey, N., & Pal, A. (2020). Impact of digital surge during Covid-19 pandemic: A viewpoint on research and practice. International Journal of Information Management, 55(June), 102171.
  4. Eigner, I., Hamper, A., Wickramasinghe, N., & Bodendorf, F. (2017). Decision Makers and Criteria for Patient Discharge -A Qualitative Study. BLED 2017 Proceedings, 41.
  5. FBI. (2021). Internet Crime Complaint Center 2020 Internet Crime Report. https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-the-internet-crime-complaint- center-2020-internet-crime-report-including-covid-19-scam-statistics
  6. Gallagher, S., & Brandt, A. (2020). Facing down the myriad threats tied to COVID-19. https://news.sophos.com/en-us/2020/04/14/covidmalware/
  7. Galov, D. (2020). Remote spring: the rise of RDP bruteforce attacks. https://securelist.com/remote- spring-the-rise-of-rdp-bruteforce-attacks/96820/ Herjavic Group. (2020). The 2020 Official Annual Cybercrime Report. https://www.herjavecgroup.com/the-2019-official-annual-cybercrime- report/#:~:text=According to the 2020 Official,the biggest problems with mankind Hiscox. (2021). Hiscox Cyber Readiness report. https://www.hiscox.co.uk/cyberreadiness Interpol. (2020). COVID-19 Cybercrime Analysis Report.
  8. Klein, H. K., & Myers, M. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 23(1), 67-94.
  9. KPMG Ghana. (2021). COVID-19 frauds and scams. https://home.kpmg/gh/en/home/insights/2020/04/covid-19-frauds-and-scams.html
  10. Kshetri, N. (2019). Cybercrime and cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77-81.
  11. McGuire, M. (2018). Understanding the growth of the cybercrime economy. RSA Conference, USA, 2018.
  12. Mikkola, M., Oksanen, A., Kaakinen, M., Miller, B. L., Savolainen, I., Sirola, A., & Paek, H. J. (2020). Situational and individual risk factors for cybercrime victimization in a cross-national context. International Journal of Offender Therapy and Comparative Criminology, 0306624X20.
  13. Myers, M. (2013). Qualitative research in business & management (N. S. Kirsty Smy (ed.); 2nd ed.). Sage Publications.
  14. Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306-321.
  15. Neo, H. F., Teo, C. C., & Peng, C. L. (2021). Safe Internet: An Edutainment Tool for Teenagers. In Information Science and Applications: Proceedings of ICISA 2020 (pp. 53-70). Springer.
  16. NHS UK. (2020). 10 tips to help if you are worried about COVID-19. https://www.nhs.uk/every- mind-matters/coronavirus/10-tips-covid-19-anxiety/
  17. Nurse, J. R. C. (2018). Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In The Oxford Handbook of Cyberpsychology (pp. 662-690). Oxford Library of Psychology.
  18. Patton, M. (2005). Qualitative research. In Encyclopedia of statistics in behavioral science. John Wiley & Sons, Ltd.
  19. Savić, D. (2020). COVID-19 and work from home: Digital transformation of the workforce. Grey Journal, 16(2), 101-104.
  20. Shi, F. (2020). Threat Spotlight: Coronavirus-related phishing. https://blog.barracuda.com/2020/03/26/threat-spotlight-coronavirus-related-phishing/
  21. Silberman, M. (1976). Toward a theory of criminal deterrence. American Sociological Review, Owusu-Oware, E., Koi-Akrofi, G., Quist, C. & Ocansey, S. Journal of Business and Professional Studies Vol. 15, No.1, 2024 92 41(3), 442-461.
  22. Srivastava, S. K., Das, S., Udo, G. J., & Bagchi, K. (2020). Determinants of Cybercrime Originating within a Nation: A Cross-country Study. Journal of Global Information Technology Management, 23(2), 112-137.
  23. Taylor, H., Artman, E., & Woelfer, J. P. (2012). Information technology project risk management: Bridging the gap between research and practice. Journal of Information Technology, 27(1), 17-34.
  24. Tidy, J. (2020). Google blocking 18m coronavirus scam emails every day. Bbc.Com. https://www.bbc.com/news/technology-52319093
  25. Wiggen, J. (2020). Impact of COVID-19 on cyber crime and state-sponsored cyber activities. In Facts and Findings. Konrad-Adenauer-Stiftung e. V.
  26. Williams, C. M., Chaturvedi, R., & Chakravarthy, K. (2020). Cybersecurity risks in a pandemic. Journal of Medical Internet Research, 22(9), 7-10.
  27. Workman, M., Bommer, W. H., & Straub, D. (2009). The amplification effects of procedural justice on a threat control model of information systems security behaviours. Behaviour and Information Technology, 28(6), 563-575.