IDEAS home Printed from https://ideas.repec.org/a/bdu/ojijts/v5y2020i1p34-63id1133.html
   My bibliography  Save this article

Cybercrime: Theoretical Determinants, Criminal Policies, Prevention & Control Mechanisms

Author

Listed:
  • Nasser AL-Dosari Khalifa

Abstract

Purpose: The research aimed to explore the theoretical determinants of cybercrime in Qatar and assess how it can be prevented and minimised. Methodology: This was done using the mixed method research design through the survey strategy and semi-structured interviews with experts in the field of cybercrime in Qatar. Having adopted a mixed-method research methodology, the study had a target population of 200 participants for questionnaire survey, while expert interview had a target population of 11 experts. All these participants were purposively sampled in pursuit of engaging respondents who had knowledge, experience and expertise in cybercrime, such as IT experts and professionals working on cyber security solutions, Lawyers, police officers working in cybercrime department in Qatar, and lawyers who had dealt with cybercrime. The results of the survey were quantified using the Likert scale and analysed quantitatively by the factor analysis, and frequency tables. The results of the interviews were analysed qualitatively. Findings: The results of the survey revealed that the most typical types of cybercrime in Qatar include website hacking, email cyberattacks, and online banking cyberattacks. The predominant motive for cybercrime in the country is monetary gains. However, the findings from the logistic regression analysis reveal that different types of cybercrime are associated with different determinants, and online banking crimes are predominantly driven by monetary gains. Moreover, the findings from IT experts interviewed revealed various measures can be adopted as control measures of cybercrime activities and hazards, such as development of stronger networks by commercial companies to protect their cyber assets and use of up-to-date protective software that detect and ensures complete data security. Unique contribution to theory, practice and policy: Further, the findings, in relation to the effective methods and mechanisms for preventing cybercrime, suggest that it can be reduced through the spread of awareness among people and companies and through the adoption of preventive control mechanisms. Further, the study recommends that governments should formulate and implement legislations aimed at enhancing stringent measures of combating and dealing with cybercrime in convergence with international standards and practices. Besides, companies should adopt technological cybersecurity solutions to enhance effective protection of intellectual property, intrusion, and malicious damage of data as well as other cyber-related crimes.

Suggested Citation

  • Nasser AL-Dosari Khalifa, 2020. "Cybercrime: Theoretical Determinants, Criminal Policies, Prevention & Control Mechanisms," International Journal of Technology and Systems, IPRJB, vol. 5(1), pages 34-63.
  • Handle: RePEc:bdu:ojijts:v:5:y:2020:i:1:p:34-63:id:1133
    as

    Download full text from publisher

    File URL: https://iprjb.org/journals/IJTS/article/view/1133
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Corbet, Shaen & Gurdgiev, Constantin, 2019. "What the hack: Systematic risk contagion from cyber events," International Review of Financial Analysis, Elsevier, vol. 65(C).
    2. Mark E. Lokanan, 2015. "Challenges to the fraud triangle: Questions on its usefulness," Accounting Forum, Taylor & Francis Journals, vol. 39(3), pages 201-224, September.
    3. Mohammed Ahmad Naheem, 2017. "Legitimacy of the Summer 2017 GCC crisis and Qatar’s AML framework," Journal of Money Laundering Control, Emerald Group Publishing Limited, vol. 20(4), pages 405-416, October.
    4. Kshetri, Nir, 2005. "Pattern of global cyber war and crime: A conceptual framework," Journal of International Management, Elsevier, vol. 11(4), pages 541-562, December.
    5. Mohammed Ahmad Naheem, 2020. "Legal analysis of Qatar’santi-money laundering and combating terrorist financing legislation and regulation amidst the summer 2017 GCC crisis," Journal of Money Laundering Control, Emerald Group Publishing Limited, vol. 23(4), pages 793-804, February.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Fleury, Afonso & Fleury, Maria Tereza Leme & Oliveira, Luis & Leao, Pablo, 2024. "Going digital EMNEs: The role of digital maturity capability," International Business Review, Elsevier, vol. 33(4).
    2. Cao, Hung & Phan, Hieu V. & Silveri, Sabatino, 2024. "Data breach disclosures and stock price crash risk: Evidence from data breach notification laws," International Review of Financial Analysis, Elsevier, vol. 93(C).
    3. Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
    4. Jun Zhuo & Mengmeng Hao & Fangyu Ding & Jiping Dong & Dong Jiang & Shuai Chen, 2024. "The spatiotemporal patterns and driving factors of cybercrime in the UK during the COVID-19 pandemic," Humanities and Social Sciences Communications, Palgrave Macmillan, vol. 11(1), pages 1-10, December.
    5. Adekunle Akinola, PhD., 2024. "Fraud Prevention and Internal Control Mechanisms in Selected Banks in Nigeria," International Journal of Research and Innovation in Social Science, International Journal of Research and Innovation in Social Science (IJRISS), vol. 8(7), pages 287-298, July.
    6. Paulina Roszkowska & Domènec Melé, 2021. "Organizational Factors in the Individual Ethical Behaviour. The Notion of the “Organizational Moral Structure”," Humanistic Management Journal, Springer, vol. 6(2), pages 187-209, July.
    7. Margit Schratzenstaller-Altzinger, 2018. "Implikationen der Digitalisierung für den öffentlichen Sektor," WIFO Monatsberichte (monthly reports), WIFO, vol. 91(12), pages 863-869, December.
    8. Xin Xu & Feng Xiong & Zhe An, 2023. "Using Machine Learning to Predict Corporate Fraud: Evidence Based on the GONE Framework," Journal of Business Ethics, Springer, vol. 186(1), pages 137-158, August.
    9. Nadine Gatzert & Madeline Schubert, 2022. "Cyber risk management in the US banking and insurance industry: A textual and empirical analysis of determinants and value," Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 89(3), pages 725-763, September.
    10. Cuervo-Cazurra, Alvaro & Dieleman, Marleen & Hirsch, Paul & Rodrigues, Suzana B. & Zyglidopoulos, Stelios, 2021. "Multinationals’ misbehavior," Journal of World Business, Elsevier, vol. 56(5).
    11. Ozili, Peterson K, 2020. "Forensic accounting theory," MPRA Paper 102566, University Library of Munich, Germany.
    12. Jeanette Akkeren & Sherrena Buckby, 2017. "Perceptions on the Causes of Individual and Fraudulent Co-offending: Views of Forensic Accountants," Journal of Business Ethics, Springer, vol. 146(2), pages 383-404, December.
    13. Monica Ramos Montesdeoca & Agustín J. Sánchez Medina & Felix Blázquez Santana, 2019. "Research Topics in Accounting Fraud in the 21st Century: A State of the Art," Sustainability, MDPI, vol. 11(6), pages 1-31, March.
    14. Akyildirim, Erdinc & Conlon, Thomas & Corbet, Shaen & Hou, Yang (Greg), 2024. "HACKED: Understanding the stock market response to cyberattacks," Journal of International Financial Markets, Institutions and Money, Elsevier, vol. 97(C).
    15. Mark E. Lokanan & Prerna Sharma, 2023. "Two Decades of Accounting Fraud Research: The Missing Meso-Level Analysis," SAGE Open, , vol. 13(3), pages 21582440231, September.
    16. Saffet A. Uygur & Christopher J. Napier, 2024. "Understanding Fraud in the Not-For-Profit Sector: A Stakeholder Perspective for Charities," Journal of Business Ethics, Springer, vol. 190(3), pages 569-588, March.
    17. Akyildirim, Erdinc & Corbet, Shaen & O'Connell, John F. & Sensoy, Ahmet, 2021. "The influence of aviation disasters on engine manufacturers: An analysis of financial and reputational contagion risks," International Review of Financial Analysis, Elsevier, vol. 74(C).
    18. Corbet, Shaen & Goodell, John W., 2022. "The reputational contagion effects of ransomware attacks," Finance Research Letters, Elsevier, vol. 47(PB).
    19. Ghio, Alessandro & McGuigan, Nicholas & Powell, Lisa, 2023. "The Queering Accounting Manifesto," CRITICAL PERSPECTIVES ON ACCOUNTING, Elsevier, vol. 90(C).
    20. Hideaki Sakawa & Naoki Watanabel, 2022. "Correction to: Accounting Frauds and Main-Bank Monitoring in Japanese Corporations," Journal of Business Ethics, Springer, vol. 180(2), pages 623-623, October.

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bdu:ojijts:v:5:y:2020:i:1:p:34-63:id:1133. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://iprjb.org/journals/IJTS/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.