IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft

Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft
View Sample PDF
Author(s): Paul Danquah (Heritage Christian College, Ghana), Olumide Babatope Longe (American University of Nigeria, Nigeria), Jojo Desmond Lartey (Heritage Christian College, Ghana)and Peter Ebo Tobbin (Center for IT Professional Development, Ghana)
Copyright: 2020
Pages: 15
Source title: Modern Theories and Practices for Cyber Ethics and Security Compliance
Source Author(s)/Editor(s): Winfred Yaokumah (University of Ghana, Ghana), Muttukrishnan Rajarajan (City University of London, UK), Jamal-Deen Abdulai (University of Ghana, Ghana), Isaac Wiafe (University of Ghana, Ghana)and Ferdinand Apietu Katsriku (University of Ghana, Ghana)
DOI: 10.4018/978-1-7998-3149-5.ch003

Purchase

View Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft on the publisher's website for pricing and purchasing information.

Abstract

Socially engineered cyber deception and theft seems to have gained prominence in cybercrime. Given the contextual background of inadequate theoretical explanations of socially engineered cyber deception and theft cybercrime, there is the need for theory to better explain and possibly predict activities involved in socially engineered cyber deception and theft. This chapter proposes a theory of socially engineered cyber deception and theft (SECT), with routine activity theory, crime displacement theory, the space transition theory, and empirical review as its foundation. It iteratively combines deductive and inductive approaches to infer the occurrence of socially engineered cyber deception and theft. While the deductive approach serves the deduction leading to the inference, the inductive approach extracts and suggests empirical evidence for a deterministic prediction of the crime occurrence. It is recommended that the theory is further validated to test its applicability.

Related Content

Preeti Sharma, Manoj Kumar, Hitesh Kumar Sharma. © 2023. 30 pages.
Ayushi Malik, Shagun Gehlot, Ambika Aggarwal. © 2023. 32 pages.
Kritika. © 2023. 32 pages.
N. Ambika. © 2023. 19 pages.
Qasem Abu Al-Haija, Rahmeh Ibrahim. © 2023. 25 pages.
Qasem Abu Al-Haija, Noor A. Jebril. © 2023. 32 pages.
Aaeen Naushadahmad Alchi, Kiranbhai R. Dodiya. © 2023. 22 pages.
Body Bottom