Can Forensic Psychology Contribute to Solving the Problem of Cybercrime

Considering the severity of the problem of cybercrime, it must next be deliberated whether forensic psychology can aid in the detection, prevention and governance of these crimes or not. While forensic psychology to date has generally focused on violent, sexual and juvenile offences, most of its theory and practice can also be applied to other offences, such as cybercrime. This chapter aims to investigate if forensic psychology can be useful in solving the problem of cybercrime, and briefly considers to what extent it has been applied to these crimes so far. Initially, definitions of forensic psychology will be discussed, and the primary responsibilities and activities of forensic psychologists will be described. Following this the authors will examine how each of these responsibilities and activities may be applied to cybercrime cases, before determining to what extent forensic psychology has been involved in cybercrime cases to date. Suggestions will be made for how to promote the benefits of forensic psychology in cybercrime cases, and finally proposals for future research and potential trends will be highlighted. In order to provide background to the reader who is not familiar with forensic psychology, a very brief overview of some of the key research in the field is provided in the appropriate sections below. However, the reader is encouraged to consult a textbook on the area in order to gain a more thorough appreciation of the breadth and depth of research in this field to date (see for example Davies, Hollin & Bull, 2008; Howitt, 2009 or Huss, 2009). DOI: 10.4018/978-1-61350-350-8.ch002

[1]  Brendesha M. Tynes,et al.  Internet Safety Gone Wild? , 2007 .

[2]  Derek J. Paulsen,et al.  Connecting the dots: assessing the accuracy of geographic profiling software , 2006 .

[3]  Daniel D. Langleben,et al.  Detection of deception with fMRI: Are we there yet? , 2008 .

[4]  E. Loftus,et al.  Reconstruction of automobile destruction: An example of the interaction between language and memory , 1974 .

[5]  Ronald P. Fisher,et al.  Enhancement of Eyewitness Memory with the Cognitive Interview , 1986 .

[6]  Robert LaRose,et al.  Promoting personal responsibility for internet safety , 2008, CACM.

[7]  Empirical Studies on Jury Size , 1998 .

[8]  Michele Zito,et al.  On the Complexity and Accuracy of Geographic Profiling Strategies , 2005 .

[9]  Ann Wolbert Burgess,et al.  Criminal profiling from crime scene analysis , 1986 .

[10]  R. Blackburn What is forensic psychology , 1996 .

[11]  B. King,et al.  Asperger's syndrome: diagnosis and treatment. , 2008, The American journal of psychiatry.

[12]  Sandra Walklate,et al.  Imagining the Victim of Crime , 2006 .

[13]  S. Porter,et al.  Reading Between the Lies , 2008, Psychological science.

[14]  Holly A. Miller,et al.  Perceptions of the Validity and Utility of Criminal Profiling Among Forensic Psychologists and Psychiatrists , 2006 .

[15]  Ian M. Handley,et al.  Self-Blame Among Sexual Assault Victims Prospectively Predicts Revictimization: A Perceived Sociolegal Context Model of Risk , 2007 .

[16]  E F Loftus,et al.  Semantic integration of verbal information into a visual memory. , 1978, Journal of experimental psychology. Human learning and memory.

[17]  Peter Bull,et al.  Detecting Deception from Emotional and Unemotional Cues , 2009 .

[18]  Terry M. Gudaitis,et al.  The Missing Link in Information Security: Three Dimensional Profiling , 1998, Cyberpsychology Behav. Soc. Netw..

[19]  Eugene H. Spafford,et al.  Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..

[20]  Janis Wolak,et al.  Internet prevention messages: targeting the right online behaviors. , 2007, Archives of pediatrics & adolescent medicine.

[21]  Robin S. Edelstein,et al.  Detecting Lies in Children and Adults , 2006, Law and human behavior.

[22]  Nick Nykodym,et al.  Criminal profiling and insider cyber crime , 2005, Digit. Investig..

[23]  D. Sachau,et al.  Secondary Traumatic Stress and Burnout among Law Enforcement Investigators Exposed to Disturbing Media Images , 2010 .

[24]  Marcus K. Rogers The role of criminal profiling in the computer forensics process , 2003, Comput. Secur..

[25]  Alison Hunter High-tech Rascality: Asperger's Syndrome, Hackers, Geeks, and Personality Types in the ICT Industry , 2009 .

[26]  Megan Carney,et al.  The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction , 2004, Int. J. Digit. EVid..

[27]  Michael E Lamb,et al.  A structured forensic interview protocol improves the quality and informativeness of investigative interviews with children: a review of research using the NICHD Investigative Interview Protocol. , 2007, Child abuse & neglect.

[28]  Ameer Al-Nemrat,et al.  Examination of Cyber-criminal Behaviour , 2012 .

[29]  Matthew D. Smith,et al.  Toulmin's philosophy of argument and its relevance to offender profiling , 2003 .

[30]  Maria Papadaki,et al.  Considering the potential of criminal profiling to combat hacking , 2007, Journal in Computer Virology.

[31]  Seamus O. Ciardhuáin,et al.  An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..

[32]  A. Scarpa,et al.  Community Violence Victimization and Symptoms of Posttraumatic Stress Disorder , 2006, Journal of interpersonal violence.

[33]  M. Krause Identifying and Managing Stress in Child Pornography and Child Exploitation Investigators , 2009 .

[34]  R. Fisher,et al.  Facilitating children's eyewitness recall with the revised cognitive interview. , 1995, The Journal of applied psychology.