SlideShare a Scribd company logo
1 of 11
Download to read offline
MITIGATING
CIRCUMSTANCES IN
CYBER CRIME
Raian Ali, John McAlaney, Shamal Faily, Keith
Phalp, Vasilios Katos.
Bournemouth University
The 3rd International Workshop on Cybercrimes
and Emerging Web Environments (CEWE’15). Co-
located with DASC-2015. 26-28 October 2015,
Liverpool, UK.
BACKGROUND
 Mitigating circumstances in criminal law are
conditions which lessen the degree of
responsibility of an offender
 Intention to cause less harm than actually
caused; lack of premeditation; mental disorder;
disability; provocation; self-defence; misbelief of
doing a merciful job
 Very little current consideration in relation to
cyber crime or online deviancy
BACKGROUND
 The design of cyber system is often explicitly
intended to produce an immersive experience
that engages the user completely
 Possibly creating a flow state and impaired
decision making ability
 Coupled with the disinhibition effect, perceived
anonymity and the ability to post messages/
information quickly and easily
CYBER DESIGN
 The lack of precautionary and preventative
measures within the design of online platforms
could form the basis for a claim of mitigation
 Arguably similar to the case of McDonalds being
sued after a person scalded themselves with hot
coffee
 Raises issues of if individuals could use the
possibility of mitigation to retrospectively claim
digital addiction or impaired decision making
CORPORATE SOCIAL
RESPONSIBILITY
WARNING LABELS
PSYCHOLOGICAL FACTORS
 Lack of understanding of the technology
involved and reliance on informational influence
 Possible manipulation by others (e.g. Anonymous
vs Scientology)
 Group decision making biases and increased risk
 Debate around digital addiction and diminished
responsibility
DIGITAL ADDICTION
 Also known as internet addiction, compulsive
internet use, iDisorder and many other names
 Not in the main text of the DSM-5, although
included in the appendix of something in need
of further research
 Raises questions of corporate social responsibility
by digital technology companies
 Unique opportunities within digital technology for
real time prevention and intervention
CONTRIBUTORY NEGLIGENCE
 If the online environment is designed in such a
way that it encourages people to act in a
deviant manner should users be held completely
responsible?
 For example if a pedestrian crosses the road
without looking and is hit by a car the driver may
not be held entirely responsible, due to the
negligence of the pedestrian
 Given the aforementioned ability of software to
monitor and actively intervene in the case of risky
behaviour could software companies be argued
to be especially negligent for failing to protect
users?
CHALLENGES
 Establishing blame and responsibility
 Criminal or deviant acts taking part across
several countries
 And several legal frameworks
 Generating supporting evidence when a claim
for mitigating factors is made
Come and visit us in sunny Bournemouth!
Contact:
Dr Raian Ali – rali@bournemouth.ac.uk
Dr John McAlaney – jmcalaney@bournemouth.ac.uk

More Related Content

Similar to Mitigating circumstances in cyber crime

ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxbartholomeocoombs
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES.eu
 
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...IJITE
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Cybertorts
CybertortsCybertorts
Cybertortspanabaha
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyAmy Larrimore
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxgertrudebellgrove
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxadkinspaige22
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxpoulterbarbara
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0drennanmicah
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0alisondakintxt
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 

Similar to Mitigating circumstances in cyber crime (20)

ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017
 
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 

More from Engineering and Social Informatics (ESOTICS)

More from Engineering and Social Informatics (ESOTICS) (20)

Digital addiction and what you need to know
Digital addiction and what you need to knowDigital addiction and what you need to know
Digital addiction and what you need to know
 
Pragmatic requirements for adaptive systems a goal driven modeling and analys...
Pragmatic requirements for adaptive systems a goal driven modeling and analys...Pragmatic requirements for adaptive systems a goal driven modeling and analys...
Pragmatic requirements for adaptive systems a goal driven modeling and analys...
 
Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...
 
The design of software based peer groups to combat digital addiction
The design of software based peer groups to combat digital addiction The design of software based peer groups to combat digital addiction
The design of software based peer groups to combat digital addiction
 
Crowdsourcing transparency requirements through structured feedback and social
Crowdsourcing transparency requirements through structured feedback and socialCrowdsourcing transparency requirements through structured feedback and social
Crowdsourcing transparency requirements through structured feedback and social
 
Persuasive and culture aware feedback acquisition
Persuasive and culture aware feedback acquisitionPersuasive and culture aware feedback acquisition
Persuasive and culture aware feedback acquisition
 
Adaptive software based feedback acquisition a personas-based design
Adaptive software based feedback acquisition a personas-based designAdaptive software based feedback acquisition a personas-based design
Adaptive software based feedback acquisition a personas-based design
 
A modelling language for transparency requirements in business information sy...
A modelling language for transparency requirements in business information sy...A modelling language for transparency requirements in business information sy...
A modelling language for transparency requirements in business information sy...
 
Modelling and analysing contextual failures for dependability requirements
Modelling and analysing contextual failures for dependability requirementsModelling and analysing contextual failures for dependability requirements
Modelling and analysing contextual failures for dependability requirements
 
Engineering software based motivation a persona-based approach
Engineering software based motivation a persona-based approachEngineering software based motivation a persona-based approach
Engineering software based motivation a persona-based approach
 
REfine a gamifiedplatform for participatory requirements engineering
REfine a gamifiedplatform for participatory requirements engineeringREfine a gamifiedplatform for participatory requirements engineering
REfine a gamifiedplatform for participatory requirements engineering
 
The Emerging Requirement for Digital Addiction Labels
The Emerging Requirement for Digital Addiction LabelsThe Emerging Requirement for Digital Addiction Labels
The Emerging Requirement for Digital Addiction Labels
 
Gamification for volunteer cloud computing
Gamification for volunteer cloud computingGamification for volunteer cloud computing
Gamification for volunteer cloud computing
 
Crowd centric requirements engineering - ra
Crowd centric requirements engineering - raCrowd centric requirements engineering - ra
Crowd centric requirements engineering - ra
 
Towards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po emTowards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po em
 
Consideration in software mediated social interaction
Consideration in software mediated social interactionConsideration in software mediated social interaction
Consideration in software mediated social interaction
 
Software evaluation via users’ feedback at runtime
Software evaluation via users’ feedback at runtimeSoftware evaluation via users’ feedback at runtime
Software evaluation via users’ feedback at runtime
 
Crowdsourcing Software Evaluation
Crowdsourcing Software EvaluationCrowdsourcing Software Evaluation
Crowdsourcing Software Evaluation
 
Digital addiction REFSQ 14
Digital addiction REFSQ 14 Digital addiction REFSQ 14
Digital addiction REFSQ 14
 
The design of adaptive acquisition of users feedback an empirical study (rcis...
The design of adaptive acquisition of users feedback an empirical study (rcis...The design of adaptive acquisition of users feedback an empirical study (rcis...
The design of adaptive acquisition of users feedback an empirical study (rcis...
 

Recently uploaded

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 

Recently uploaded (20)

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 

Mitigating circumstances in cyber crime

  • 1. MITIGATING CIRCUMSTANCES IN CYBER CRIME Raian Ali, John McAlaney, Shamal Faily, Keith Phalp, Vasilios Katos. Bournemouth University The 3rd International Workshop on Cybercrimes and Emerging Web Environments (CEWE’15). Co- located with DASC-2015. 26-28 October 2015, Liverpool, UK.
  • 2. BACKGROUND  Mitigating circumstances in criminal law are conditions which lessen the degree of responsibility of an offender  Intention to cause less harm than actually caused; lack of premeditation; mental disorder; disability; provocation; self-defence; misbelief of doing a merciful job  Very little current consideration in relation to cyber crime or online deviancy
  • 3. BACKGROUND  The design of cyber system is often explicitly intended to produce an immersive experience that engages the user completely  Possibly creating a flow state and impaired decision making ability  Coupled with the disinhibition effect, perceived anonymity and the ability to post messages/ information quickly and easily
  • 4. CYBER DESIGN  The lack of precautionary and preventative measures within the design of online platforms could form the basis for a claim of mitigation  Arguably similar to the case of McDonalds being sued after a person scalded themselves with hot coffee  Raises issues of if individuals could use the possibility of mitigation to retrospectively claim digital addiction or impaired decision making
  • 7. PSYCHOLOGICAL FACTORS  Lack of understanding of the technology involved and reliance on informational influence  Possible manipulation by others (e.g. Anonymous vs Scientology)  Group decision making biases and increased risk  Debate around digital addiction and diminished responsibility
  • 8. DIGITAL ADDICTION  Also known as internet addiction, compulsive internet use, iDisorder and many other names  Not in the main text of the DSM-5, although included in the appendix of something in need of further research  Raises questions of corporate social responsibility by digital technology companies  Unique opportunities within digital technology for real time prevention and intervention
  • 9. CONTRIBUTORY NEGLIGENCE  If the online environment is designed in such a way that it encourages people to act in a deviant manner should users be held completely responsible?  For example if a pedestrian crosses the road without looking and is hit by a car the driver may not be held entirely responsible, due to the negligence of the pedestrian  Given the aforementioned ability of software to monitor and actively intervene in the case of risky behaviour could software companies be argued to be especially negligent for failing to protect users?
  • 10. CHALLENGES  Establishing blame and responsibility  Criminal or deviant acts taking part across several countries  And several legal frameworks  Generating supporting evidence when a claim for mitigating factors is made
  • 11. Come and visit us in sunny Bournemouth! Contact: Dr Raian Ali – rali@bournemouth.ac.uk Dr John McAlaney – jmcalaney@bournemouth.ac.uk