Forensic Cyberpsychology and Approaches to Criminal Profiling

  • Dušan Lj. Vlajić University of Niš, Faculty of Philosophy, Department of Psychology
Keywords: criminal profiling, inductive profiling, deductive profiling, cybercrime, cyberpsychology, digital evidence

Abstract


Although there are plenty of theories which consider psychological factors of criminal behavior and almost every criminal act has a digital aspect, criminal profiling is not so popular among forensic psychologists, especially when it comes to cybercrime. Thus, the goal of this paper is to give a brief overview of literature considering psychological factors which shape deviant computer and online behaviour. Two basic approaches of criminal profiling, inductive and deductive, will be presented, as well as their advantages, disadvantages, logic they follow and concepts they rely on when analysing digital evidence in order to narrow suspect pools. Concrete models developed under each approach will be briefly portrayed. Moreover, studies from the field of cyberpsychology will be presented and their relationship with profiling will be discussed, particularly with inductive approach, which is original contribution of this paper. At the very end, suggestions for overcoming limitations of previous studies and converging disciplines of criminal profiling and cyberpsychology will be offered.

References

American Psychiatric Association. (2013a). Neurodevelopmental Disorders. In: Diagnostic and Statistical Manual of Mental Disorders (5th ed.). American Psychiatric Association Publishing.

American Psychiatric Association. (2013b). Personality Disorders. In: Diagnostic and Statistical Manual of Mental Disorders (5th ed.). American Psychiatric Association Publishing.

Babchishin, K. M., Hanson, R. K., & Hermann, C. A. (2011). The Characteristics of Online Sex Offenders: A Meta-Analysis. Sex Abuse, 23 (1), 92–123.

Bachmann, M. (2010). The Risk Propensity and Rationality of Computer Hackers. International Journal of Cyber Criminology, 4 (1–2), 643–656. Preuzeto sa: https://www.cybercrimejournal.com/bachmannjandec2010.htm

Bossler, A. M. & Burruss, G. W. (2010). The General Theory of Crime and Computer Hacking: Low Self-Control Hackers? In: T. J. Holt & B. H. Schell (Eds.), Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (38–67). New York, NY: IGI Global.

Campbell, Q. & Kennedy, D. M. (2014). The Psychology of Computer Criminals. In: S. Bosworth, M. E. Kabay, E. Whyne (Eds.), Computer Security Handbook (387–419). New York, NY: John Wiley & Sons.

Casey, E. (2012). Cyberpatterns: Criminal Behavior on the Internet. In: B. E. Turvey (Ed.), Criminal Profiling: An Introduction to Behavioral Evidence Analysis (361–178). San Diego, CA: Academic Press.

Casey, E. (2011). Foundations of Digital Forensics. In: E. Casey (Ed.), Digital Evidence and Computer Crime (3–34). San Diego, CA: Academic Press.

Chiesa, R., Ducci, S., & Ciappi, S. (2009). Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking. Boca Raton, FL: CRC Press.

Freeman, J. & Turvey B. E. (2012). Interpreting Motive. In: B. E. Turvey (Ed.), Criminal Profiling: An Introduction to Behavioral Evidence Analysis (311–330). San Diego, CA: Academic Press.

Guitton, C. (2012). Criminals and Cyber Attacks: The Missing Link Between Attribution and Deterrence. International Journal of Cyber Criminology, 6 (2), 1030–1043. Preuzeto sa: https://www.cybercrimejournal.com/guiton2012julyijcc.pdf

Henry, O., Mandeville-Norden, R., Hayes, E., & Egan, V. (2010). Do Internet-Based Sexual Offenders Reduce to Normal, Inadequate, and Deviant Groups?. Journal of Sexual Aggression, 16 (1), 33–46.

Hogan, M. D. & Newton, E. M. (2015). Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. (NISTIR 8074, Vol. 2). National Institute of Standards and Technology.

Kirwan, G. (2016a). Forensic Cyberpsychology. In: I. Connolly, M. Palmer, H. Barton, G. Kirwan (Eds.), An Introduction to Cyberpsychology (283–308). Oxfordshire: Routledge.

Kirwan, G. (2016b). Introduction to Cyberpsychology. In: I. Connolly, M. Palmer, H. Barton, G. Kirwan (Eds.), An Introduction to Cyberpsychology (29–50). Oxfordshire: Routledge.

Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the Intersection of Self-Control, Peer Association, and Neutralization in Explaining Digital Piracy. Western Criminology Review, 12 (3), 60–74. Preuzeto sa: http://www.westerncriminology.org/documents/WCR/v12n3/Marcum.pdf

Ménard, K. S. & Pincus, A. L. (2011). Predicting Overt and Cyber Stalking Perpetration by Male and Female College Students. Journal of Interpersonal Violence, 27 (11), 2183–2207.

Petherick, W. A. & Turvey B. E. (2012). Criminal Profiling: Science, Logic, and Cognition. In: B. E. Turvey (Ed.), Criminal Profiling: An Introduction to Behavioral Evidence Analysis (41–65). San Diego, CA: Academic Press.

Reijnen, L., Bulten, E., & Nijman, H. (2009). Demographic and Personality Characteristics of Internet Child Pornography Downloaders in Comparison to Other Offenders. Journal of Child Sexual Abuse, 18 (6), 611–622.

Rogers, M. (2003). The Role of Criminal Profiling in the Computer Forensics Process. Computers & Security, 22 (4), 292–298.

Rogers, M. K., Seigfried, K., & Tidke, K. (2006). Self-Reported Computer Criminal Behavior: A Psychological Analysis. Digital Investigation, 3, 116–120.

Rogers, M., Smoak, N. D., & Liu, J. (2006). Self-Reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis. Deviant Behavior, 27 (3), 245–268.

Savet Evrope. (2001). Konvencija o sajber kriminalu. Preuzeto sa: https://rm.coe.int/1680081561

Seigfried-Spellar, K. C. & Treadway, K. N. (2014). Differentiating Hackers, Identity Thieves, Cyberbullies, and Virus Writers by College Major and Individual Differences. Deviant Behavior, 35 (10), 782–803.

Seigfried-Spellar, K. C., Villacís-Vukadinović, N., & Lynam, D. R. (2017). Computer Criminal Behavior Is Related to Psychopathy and Other Antisocial Behavior. Journal of Criminal Justice, 51, 67–73.

Shaw, E. D. (2006). The Role of Behavioral Research and Profiling in Malicious Cyber Insider Investigations. Digital Investigation, 3 (1), 20–31.

Suler, J. (2004). The Online Disinhibition Effect. Cyberpsychology & Behavior, 7 (3), 321–326.

Turvey, B. E. (2011). Modus Operandi, Motive, and Technology. In: E. Casey (Ed.), Digital Evidence and Computer Crime (285–304). San Diego, CA: Academic Press.

Turvey, B. E. & Freeman J. (2012). Case Linkage: Offender Modus Operandi and Signature. In: B. E. Turvey (Ed.), Criminal Profiling: An Introduction to Behavioral Evidence Analysis. (331–360). San Diego, CA: Academic Press.

Whitty, M. T. & Young, G. (2016). Cyberpsychology: The Study of Individuals, Society, and Digital Technologies. Hoboken, New Jersey: John Wiley & Sons.

Woodhams, J. & Toye, K. (2007). An Empirical Test of the Assumptions of Case Linkage and Offender Profiling with Serial Commercial Robberies. Psychology, Public Policy, and Law, 13 (1), 59–85.

 

Published
2022/07/14
Section
Review Paper