Author
Abstract
Purpose: The research aimed to explore the theoretical determinants of cybercrime in Qatar and assess how it can be prevented and minimised. Methodology: This was done using the mixed method research design through the survey strategy and semi-structured interviews with experts in the field of cybercrime in Qatar. Having adopted a mixed-method research methodology, the study had a target population of 200 participants for questionnaire survey, while expert interview had a target population of 11 experts. All these participants were purposively sampled in pursuit of engaging respondents who had knowledge, experience and expertise in cybercrime, such as IT experts and professionals working on cyber security solutions, Lawyers, police officers working in cybercrime department in Qatar, and lawyers who had dealt with cybercrime. The results of the survey were quantified using the Likert scale and analysed quantitatively by the factor analysis, and frequency tables. The results of the interviews were analysed qualitatively. Findings: The results of the survey revealed that the most typical types of cybercrime in Qatar include website hacking, email cyberattacks, and online banking cyberattacks. The predominant motive for cybercrime in the country is monetary gains. However, the findings from the logistic regression analysis reveal that different types of cybercrime are associated with different determinants, and online banking crimes are predominantly driven by monetary gains. Moreover, the findings from IT experts interviewed revealed various measures can be adopted as control measures of cybercrime activities and hazards, such as development of stronger networks by commercial companies to protect their cyber assets and use of up-to-date protective software that detect and ensures complete data security. Unique contribution to theory, practice and policy: Further, the findings, in relation to the effective methods and mechanisms for preventing cybercrime, suggest that it can be reduced through the spread of awareness among people and companies and through the adoption of preventive control mechanisms. Further, the study recommends that governments should formulate and implement legislations aimed at enhancing stringent measures of combating and dealing with cybercrime in convergence with international standards and practices. Besides, companies should adopt technological cybersecurity solutions to enhance effective protection of intellectual property, intrusion, and malicious damage of data as well as other cyber-related crimes.
Suggested Citation
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bdu:ojijts:v:5:y:2020:i:1:p:34-63:id:1133. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://iprjb.org/journals/index.php/IJTS/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.