Spatial Analysis of of Financial Fraud Among Citizens in the Cyberspace of Tehran

Document Type : Original Article

Authors

1 -

2 university of police

Abstract

The goal of the geographic management of cyber crime is to ensure continuation of the police organization’s         accomlishments and achievments, and to prevent sudden and startling events by choosing appropriate strategies against environmental change. To confront the consequences of the emergence of new information technologies,    police organizations have to choose a collection of strategic geographic options in the midst of two conditions of    continuation the current state of affairs and the creation of change and development. It should be noted that the    components of criminology of physical fraud are very different from cybercrime, and the legislator also has partial reaction in the penalization of these types of crimes. One of the main problems in dealing with these types of crimes is the spatial characteristics of the crime requiring legal and police jurisdiction. The purpose of this paper is the spatial analysis of criminality of citizens in the cyberspace of Tehran. The research method of this article is                        analytical-descriptive. This paper is based on the statistical community of all the number of unauthorized withdrawals from bank accounts in cyberspace in the year 1989 in Tehran. In the analysis of the information of this research,    statistical-graphical methods have been used in the form of GIS. In this study, the mean center test, standard deviation ellipse, clustering test and spatial correlation analysis of the global Moran statistic have been performed. Results   indicate that the crime of financial fraud in cyberspace was observed with an East-West orientation in the regions with the highest concentration of economic activity. Two important spatial factors, namely population density and economic centers, are among the most important factors in shaping the focal points of this type of crime.
 

Keywords

  1.        

    1. B.  Arora, “Exploring and analyzing Internet crimes and their behaviours. Perspectives in Science,” no. 8, 2016 .##
    2. C.  Baker, “CRIME, Fraud and Deceit on the Internet: Is There Hyperreality in Cyberspace,” Critical Perspectives on Accounting. no. 13, 2002 .##
    3. عبادی‌نژاد، سید علی، امینی، داود، مبانی جغرافیای انتظامی، سازمان تحقیقات و مطالعات ناجا، 1394.##
    4. هادیان‌فر، سید کمال، نشست خبری با اصحاب رسانه، کد خبر ایرنا82900640(6483126) ، مورخه9/2/1397، 1397.##
    5. علیجانی، بهلول، تحلیل فضایی، نشریه تحلیل فضایی مخاطرات محیطی، سال دوم، شماره3 ، 1394 .##
      1. S. Y. Paek and M. K. Nalla, “The relationship between receiving phishing attempt and identity theft victimization in South Korea,” International Journal of Law, Crime and Justice, no. 43, pp. 626-642, 2015.##
      2. رضوی، محمد، جرایم سایبری و نقش پلیس در پشگیری از این جرایم و کشف آن‌ها، فصلنامه دانش انتظامی، دوره 9،  شماره 1، 1386.##
        1. S. Vahdati and N. Yasini, “Factors affecting internet frauds in private sector: A case study in Cyberspace Surveillance and Scam Monitoring Agency of Iran,” Computers in Human Behavior, no. 51, 2015.##
        2. T. Moore, “The economics of cybersecurity: Principles and policy options. International Journal of Critical Infrastructure Protection3,” vol 3, no. 3-4, 2010.##
        3. P. E. Chaudhry, “The looming shadow of illicit trade on the internet,” Business Horizons, no. 13, 2016.##
        4. A. Aleem and A. Antwi-Boasiako, “Internet auction fraud: The evolving nature of online auctions criminality and the mitigating framework to address the threat,” International Journal of Law, Crime and Justice, no. 39, 2011.##
        5. P.  Hallam-Baker, “Prevention strategies for the next wave of cyber crime,” Network Security, no. 10, 2005.##
        6. A.  Aleroud and L.  Zhou, “Phishing environments, techniques, and countermeasures: a survey,” Computers & Security, pp. 1-46, 2017.##
        7. N. A. G.  Arachchilage and S.  Love, “Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior,” no. 38, 2014.##
        8. روضه‌ای، منصور، توان‌بخش، جعفر، حسن‌زاده، حمید، ابزارهای پیشگیری از جرائم نوظهور در فضای مجازی، فصلنامه علمی پژوهشی مطالعات امنیت اجتماعی، شماره 50، تابستان 1396.##
          1. M. A. Manuputty, S. M. Noor, and J. Sumardi, “Cyber Security: Rule of Use Internet Safely? 13th International Educational Technology Conference,” no. 103, pp.            255 – 261, 2013.##
          2. H. Galanxhi and F. Fui-Hoon Nah, “Deception in cyberspace: A comparison of text-only vs. avatar-supported medium,” Int. J. Human-Computer Studies, no. 65, pp. 770–783, 2007.##
          3. S. Mary Ho, P. B. Lowry, M. Warkentin, Y. Yang, and J. M. Hollister, “Gender deception in asynchronous online communication: A path analysis,” Information Processing and Management, pp. 1–21, 2016.##
          4. R. Jamieson, L. Pek Wee Land, D. Winchester, G. Stephens, A. Steel, A. Maurushat, and D. Sarre, “Addressing identity crime in crime management informationsystems: Definitions, classification, and empirics,” Computer law & security review, no. 28, 2012.##
          5. P. Simpson, “Spoofed Identities: Virus, Spam or Scam?,” Computer Fraud & Securit, no. 10, 2003.##

      21.     هدایتی، حمید، بررسی تجارت الکترونیک و جرم کلاهبرداری اینترنتی، پایان‌نامه کارشناسی ارشد، استاد راهنما: غلامرضا عبدلی، دانشگاه آزاد واحد شاهرود، 1393.##

    1.  K. K.  Raymond Choo, “The cyber threat landscape: Challenges and future research directions,” Computers & security, no. 30, pp. 719 -731, 2011.##
    2.  J. M. Bauer and M. J. G. Van Eeten, “Cybersecurity: Stakeholder incentives, externalities, and policy options. Telecommunications Policy,” no. 33, 2009.##
    3. وکیلی، شیدا، کلاهبرداری اینترنتی، کنفرانس جهانی روانشناسی و علوم تربیتی، حقوق و علوم اجتماعی در آغاز هزاره سوم، 1395.##
      1. T. A. Oriola, “Advance fee fraud on the Internet: Nigeria’s regulatory response,” Computer Law & Security Report, no. 21, 2005.##
      2. وروایی، اکبر، میرزکی، سید شمس‌الدین، بررسی عوامل مؤثر بر کشف جرم کلاهبرداری رایانه‌ای پلیس آگاهی تهران سال   1386-1387، فصلنامه کارآگاه، سال چهارم شماره 14، بهار1390.##