Reconceptualizing Policing for Cybercrime: Perspectives from Singapore †
Abstract
:1. Introduction
1.1. Terminology—Crime, Cybercrime, Digital Crime, and Cybersecurity
1.2. Literature Review—Shifting from Deterrence to Harm Mitigation in Cybercrime Policing
2. Historical Evolution and Functions of Policing in the Physical Space
2.1. Historical Evolution of Modern-Day Policing
2.2. Current Law Enforcement Mechanisms for Policing
- (1)
- The power to order the production of any document or thing (relevant to an investigation) under section 20 of the Criminal Procedure Code (2010);
- (2)
- The power to examine witnesses and record statements to be tendered in a court of law under sections 22 and 23 of the Criminal Procedure Code (2010);
- (3)
- The power to search (persons and places) under section 34 of the Criminal Procedure Code (2010)—this now includes the power to access computers and decrypt information under sections 39 and 40 of the Criminal Procedure Code (2010);
- (4)
- The power to seize property under section 35 of the Criminal Procedure Code (2010);
- (5)
- The power to arrest under section 64 of the Criminal Procedure Code (2010); and
- (6)
- The power to use necessary and reasonable force to effect an arrest, or otherwise discharge the functions and duties of the Police Force (see Zainal bin Kuning v Chan Sin Mian Michael [1996] 2 SLR(R) 858).
2.3. Two Overarching Aims of Policing—Prevention and Prosecution
3. Five Shortcomings of Existing Law Enforcement Mechanisms for Cybercrime
3.1. Complex and Evolving Nature of Cyberspace
3.2. Nature of Cybercrimes and Offenders
3.3. Victims of Cybercrime
3.4. The Role of Intermediaries
3.5. Attitudes of Enforcement Officers
4. Reconceptualizing Policing for Cybercrime
4.1. Need for Flexibility in Response, Not Just for Defining Cybercrime Typologies
4.2. A Harm-Centric Framework
4.2.1. Cybercrimes Involving Financial Flows
4.2.2. Cybercrimes Concerning Data
4.2.3. Cybercrimes Causing Intangible Harm
4.2.4. Cybercrimes Impacting Public Interest
5. Strategies to Tackle Cybercrime
5.1. Shared Public–Private Responsibility
5.2. Cross-Jurisdictional Partnerships
5.3. Training of Law Enforcement Officials
6. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Akdemir, Naci, Bülent Sungur, and Bürke Basaranel. 2020. Examining the Challenges of Policing Economic Cybercrime in the UK. Güvenlik Bilimleri Dergisi, 111–32. [Google Scholar] [CrossRef]
- Akerlof, George A., and Robert J. Shiller. 2016. Phishing for Phools: The Economics of Manipulation and Deception. Princeton: Princeton University Press. [Google Scholar]
- Anderson, Ross, Chris Barton, Rainer Böhme, Richard Clayton, Carlos Hernandez Ganan, Tom Grasso, Michael Levi, Tyler Moore, and Marie Vasek. 2019. Measuring the cost of Cybercrime. Paper presented at the 18th Annual Workshop on the Economics of Information Security, Boston, MA, USA, June 3–4. [Google Scholar]
- Anderson, Ross, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, and Stefan Savage. 2013. Measuring the cost of Cybercrime. In The Economics of Information Security and Privacy. Berlin/Heidelberg: Springer, pp. 265–300. [Google Scholar] [CrossRef]
- Asghari, Hadi. 2016. Cybersecurity via Intermediaries: Analyzing Security Measurements to Understand Intermediary Incentives and Inform Public Policy. Ph.D. thesis, Delft University of Technology, Faculty of Technology, Policy and Management, Delft, The Netherlands. [Google Scholar]
- Ashworth, Andrew, and Rory Kelly. 2021. Sentencing and Criminal Justice. Oxford: Hart. [Google Scholar]
- Attivilli, Ravali, and Angel Arul Jothi. 2023. Serverless stream-based processing for real time credit card fraud detection using machine learning. Paper presented at the 2023 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 7–10. [Google Scholar]
- Bassiouni, M. Cherif. 2014. International Extradition: United States Law and Practice. Oxford: Oxford University Press. [Google Scholar]
- Begum, Yasmin. 2022. CNA Explains: What Happens to Scam Proceeds and Can Victims Get Back Their Money? CNA. August 17. Available online: https://www.channelnewsasia.com/singapore/cna-explains-scams-proceeds-money-victims-2885326 (accessed on 9 July 2024).
- Belova, Gabriela, and Gergana Georgieva. 2018. Fake news as a threat to national security. International Conference Knowledge-Based Organization 24: 19–22. [Google Scholar] [CrossRef]
- Bernard, Tim. 2023. The Evolving Trust and Safety Vendor Ecosystem. Austin: Tech Policy Press, July 24, Available online: https://techpolicy.press/the-evolving-trust-and-safety-vendor-ecosystem/ (accessed on 9 July 2024).
- Bossler, Adam M. 2017. Need for debate on the implications of honeypot data for restrictive deterrence policies in Cyberspace. Criminology & Public Policy 16: 681–88. [Google Scholar] [CrossRef]
- Bossler, Adam M., Thomas J. Holt, Cassandra Cross, and George W. Burruss. 2019. Policing fraud in England and Wales: Examining constables’ and sergeants’ online fraud preparedness. Security Journal 33: 311–28. [Google Scholar] [CrossRef]
- Bowling, Benjamin, Robert Reiner, and James W. E. Sheptycki. 2019. Out of the blue: The establishment and diffusion of the modern police from the French Revolution to the twentieth century. In The Politics of the Police. Oxford: Oxford University Press. [Google Scholar]
- Bregant, Jessica, and Robert Bregant, II. 2014. Cybercrime and Computer Crime. In The Encyclopedia of Criminology and Criminal Justice. Edited by Jay S. Albanese. Hoboken: John Wiley & Sons, Inc. [Google Scholar] [CrossRef]
- Brenner, Susan W., and Joseph J. Schwerha. 2002. Transnational Evidence Gathering and Local Prosecution of International Cybercrime. Journal of Computer & Information Law 20: 347. [Google Scholar]
- Broadhead, Stearns. 2018. The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments. Computer Law & Security Review 34: 1180–96. [Google Scholar] [CrossRef]
- Broadhurst, Roderic. 2005. International Cooperation in Cyber-crime Research. Paper presented at the 11th UN Congress on Crime Prevention and Criminal Justice, Workshop 6: ‘Measures to Combat Computer Related Crime, Bangkok, Thailand, April 18–25. [Google Scholar]
- Broadhurst, Roderic. 2006. Developments in the global law enforcement of cyber-crime. Policing: An International Journal of Police Strategies & Management 29: 408–33. [Google Scholar] [CrossRef]
- Bunn, Amy. 2023. Artificial Imposters-Cybercriminals Turn to Ai Voice Cloning for a New Breed of Scam. McAfee Blog. May 17. Available online: https://www.mcafee.com/blogs/privacy-identity-protection/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam/ (accessed on 9 July 2024).
- Burruss, George W., C. Jordan Howell, Adam M. Bossler, and Thomas J. Holt. 2019. Self-perceptions of English and welsh constables and sergeants preparedness for online crime. Policing: An International Journal 43: 105–19. [Google Scholar] [CrossRef]
- Button, Mark, Chris Lewis, and Jacki Tapley. 2012. Not a victimless crime: The impact of fraud on individual victims and their families. Security Journal 27: 36–54. [Google Scholar] [CrossRef]
- Button, Mark, Lisa Sugiura, Dean Blackbourn, David W. J. Shepherd, Victoria Wang, and Richard Kapend. 2020. Victims of Computer Misuse: Main Findings. Portsmouth: University of Portsmouth, May 6, Available online: https://researchportal.port.ac.uk/en/publications/victims-of-computer-misuse-main-findings (accessed on 9 July 2024).
- Caneppele, Stefano, and Marcelo F. Aebi. 2017. Crime drop or police recording flop? on the relationship between the decrease of offline crime and the increase of online and hybrid crimes. Policing: A Journal of Policy and Practice 13: 66–79. [Google Scholar] [CrossRef]
- Cerezo, Ana. I., Javier Lopez, and Ahmed Patel. 2007. International cooperation to fight Transnational Cybercrime. Paper presented at the Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Karlovassi, Greece, August 27–28. [Google Scholar]
- Chee, Kenny. 2022. OCBC Customers Can Freeze Bank Accounts Instantly with New “Kill Switch” in Emergency. The Straits Times. May 17. Available online: https://www.straitstimes.com/singapore/ocbc-customers-can-freeze-bank-accounts-instantly-with-new-kill-switch-in-emergency (accessed on 9 July 2024).
- Chen, Shuai, Mengmeng Hao, Fangyu Ding, Dong Jiang, Jiping Dong, Shize Zhang, Qiquan Guo, and Chundong Gao. 2023. Exploring the global geography of cybercrime and its driving forces. Humanities and Social Sciences Communications 10: 71. [Google Scholar] [CrossRef]
- Chudasama, Dhaval, Darsh Patel, Abhishek Shah, and Nihal Shaikh. 2020. Research on Cybercrime and its Policing. American Journal of Computer Science and Engineering Survey 8: 14. [Google Scholar]
- Cockcroft, Tom, Mohammad Shan-A-Khuda, Cliffe Z. Schreuders, and Pip Trevorrow. 2018. Police cybercrime training: Perceptions, pedagogy, and policy. Policing: A Journal of Policy and Practice 15: 15–33. [Google Scholar] [CrossRef]
- Collier, Ben, Daniel R. Thomas, Richard Clayton, Alice Hutchings, and Yi Ting Chua. 2021. Influence, infrastructure, and recentering cybercrime policing: Evaluating emerging approaches to online law enforcement through a market for cybercrime services. Policing and Society 32: 103–24. [Google Scholar] [CrossRef]
- Computer Misuse Act. 1993. Singapore. Available online: https://sso.agc.gov.sg/Act/CMA1993 (accessed on 9 July 2024).
- Corbet, Shaen, Brian Lucey, Andrew Urquhart, and Larisa Yarovaya. 2019. Cryptocurrencies as a financial asset: A systematic analysis. International Review of Financial Analysis 62: 182–99. [Google Scholar] [CrossRef]
- Coupe, Richard T., and Barak Ariel. 2019. Conclusions. In Crime Solvability Factors. Edited by Richard Timothy Coupe, Barak Ariel and Katrin Mueller-Johnson. Berlin/Heidelberg: Springer. [Google Scholar]
- Criminal Procedure Code. 2010. Singapore. Available online: https://sso.agc.gov.sg/Act/CPC2010 (accessed on 9 July 2024).
- Cross, Cassandra, Thomas Holt, Anastasia Powell, and Michael Wilson. 2021. Responding to cybercrime: Results of a comparison between community members and police personnel. Trends & Issues in Crime and Criminal Justice 635: 1–20. [Google Scholar] [CrossRef]
- Curtis, Joanna, and Gavin Oxburgh. 2022. Understanding cybercrime in ‘real world’ policing and law enforcement. The Police Journal: Theory, Practice and Principles 96: 573–92. [Google Scholar] [CrossRef]
- Cybersecurity Act. 2018. Singapore. Available online: https://sso.agc.gov.sg/Acts-Supp/9-2018/ (accessed on 9 July 2024).
- D’Arcy, John, and Tejaswini Herath. 2011. A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems 20: 643–58. [Google Scholar] [CrossRef]
- De Paoli, Stefano, Jason Johnstone, Natalie Coull, Ian Ferguson, Georgina Sinclair, Patrick Tomkins, Maureen Brown, and Rebecca Martin. 2020. A qualitative exploratory study of the knowledge, forensic, and legal challenges from the perspective of police cybercrime specialists. Policing: A Journal of Policy and Practice 15: 1429–45. [Google Scholar] [CrossRef]
- Deflem, Mathieu. 2000. Bureaucratization and social control: Historical foundations of international police cooperation. Law & Society Review 34: 739. [Google Scholar] [CrossRef]
- Defossez, Delphine. 2021. Regulations for Cybercrimes. In Handbook of Research on Theory and Practice of Financial Crimes. London: IGI Global, pp. 453–76. [Google Scholar] [CrossRef]
- Denys, Catherine. 2010. The development of police forces in Urban Europe in the Eighteenth Century. Journal of Urban History 36: 332–44. [Google Scholar] [CrossRef]
- DeTardo-Bora, Kimberly A., and Dhruba J. Bora. 2016. Cybercrimes: An overview of contemporary challenges and impending threats. In Digital Forensics. Amsterdam: Elsevier, pp. 119–32. [Google Scholar] [CrossRef]
- Djanggih, Hardianto, Hambali Thalib, Hamza Baharuddin, Nurul Qamar, and Ansari Saleh Ahmar. 2018. The effectiveness of law enforcement on child protection for cybercrime victims in Indonesia. Journal of Physics: Conference Series 1028: 012192. [Google Scholar] [CrossRef]
- Dupont, Benoit. 2016. Bots, cops, and corporations: On the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime. Crime, Law and Social Change 67: 97–116. [Google Scholar] [CrossRef]
- EnterpriseSG. 2022. Introduction of E-Commerce Marketplace Transaction Safety Ratings and Revised Technical Reference 76 on E-Commerce Transactions. May 14. Available online: https://www.enterprisesg.gov.sg/-/media/esg/files/media-centre/media-releases/2022/may/mr03022_introduction-of-e-commerce-marketplace-transaction-safety-ratings-and-revised-technical-reference-76-on-e-commerce-transactions.pdf (accessed on 12 November 2023).
- European Commission (EC). n.d. We Protect Global Alliance to End Child Sexual Exploitation Online. Migration and Home Affairs. Available online: https://home-affairs.ec.europa.eu/fight-against-child-sexual-abuse/we-protect-global-alliance-end-child-sexual-exploitation-online_en#:~:text=The%20Global%20Alliance%20Against%20Child%20Sexual%20Abuse%20Online,-The%20Global%20Alliance&text=It%20gathers%2054%20countries%2C%20which,the%20re%2Dvictimization%20of%20children (accessed on 9 July 2024).
- Farrell, Graham, Gloria Laycock, and Nick Tilley. 2015. Debuts and legacies: The crime drop and the role of adolescence-limited and persistent offending. Crime Science 4: 16. [Google Scholar] [CrossRef]
- Forouzan, Homan, Hamid Jahankhani, and John McCarthy. 2018. An examination into the level of training, education and awareness among frontline police officers in tackling cybercrime within the Metropolitan Police Service. In Advanced Sciences and Technologies for Security Applications. Cham: Springer, pp. 307–23. [Google Scholar] [CrossRef]
- Foucault, Michel. 1977. Discipline and Punish: The Birth of the Prison. New York: Vintage Books. [Google Scholar]
- Gaia, Joana, Bina Ramamurthy, G. Lawrence Sanders, Sean Sanders, Shambhu Upadhyaya, Xunyi Wang, and Chul Yoo. 2020. Psychological profiling of hacking potential. Paper presented at the Annual Hawaii International Conference on System Sciences, Maui, HI, USA, January 7–10. [Google Scholar]
- Gordon, Sarah, and Richard Ford. 2006. On the definition and classification of Cybercrime. Journal in Computer Virology 2: 13–20. [Google Scholar] [CrossRef]
- Grossklags, Jens, Svetlana Radosavac, Alvaro A. Cárdenas, and John Chuang. 2010. Nudge. Paper presented at the 2010 ACM Symposium on Applied Computing, Sierre, Switzerland, March 22–26. [Google Scholar]
- Hadlington, Lee, Karen Lumsden, Alexandra Black, and Fenia Ferra. 2018. A qualitative exploration of police officers’ experiences, challenges, and perceptions of cybercrime. Policing: A Journal of Policy and Practice 15: 34–43. [Google Scholar] [CrossRef]
- Her Majesty’s Inspectorate of Constabulary (HMIC). 2015. Real Lives, Real Crimes: A Study of Digital Crime and Policing; Birmingham: Justice Inspectorates.
- Hodson, Hal. 2013. Silk road bust hints at FBI’s new Cybercrime Powers. New Scientist 220: 22. [Google Scholar] [CrossRef]
- Holt, Thomas J., and Adam M. Bossler. 2013. An assessment of the current state of cybercrime scholarship. Deviant Behavior 35: 20–40. [Google Scholar] [CrossRef]
- Holt, Thomas J., George W. Burruss, and Adam M. Bossler. 2015. Policing Cybercrime and Cyberterror. Durham: Carolina Academic Press. [Google Scholar]
- Holt, Thomas J., Russell Brewer, and Andrew Goldsmith. 2018. Digital Drift and the “sense of injustice”: Counter-productive policing of Youth Cybercrime. Deviant Behavior 40: 1144–56. [Google Scholar] [CrossRef]
- Hussain, Wisam S., and Nebras J. Ibrahim. 2019. A Survey of Cybercrimes, Investigations and Penal Laws Imposed on the Criminals. International Journal of Computer Science and Mobile Computing 8: 131–43. [Google Scholar]
- Hutchings, Alice, Richard Clayton, and Ross Anderson. 2016. Taking down websites to prevent crime. Paper presented at 2016 APWG Symposium on Electronic Crime Research (eCrime), Toronto, ON, Canada, June 1–3. [Google Scholar]
- IMDA. 2020. Mitigating Spoof Calls. IMDA COS Media Factsheet. Available online: https://www.imda.gov.sg/-/media/Imda/Files/About/Media-Releases/2020/COS2020/Annex-H-COS-2020---Factsheet---Digital-Economy-Agreements.pdf (accessed on 9 July 2024).
- Javaid, Maham. 2022. The FBI Closed the Book on Z-Library, and Readers and Authors Clashed. The Washington Post. November 17. Available online: https://www.washingtonpost.com/nation/2022/11/17/fbi-takeover-zlibrary-booktok-impacted/ (accessed on 9 July 2024).
- Kaakinen, Markus, Teo Keipi, Pekka Räsänen, and Atte Oksanen. 2018. Cybercrime victimization and subjective well-being: An examination of the buffering effect hypothesis among adolescents and young adults. Cyberpsychology, Behavior, and Social Networking 21: 129–37. [Google Scholar] [CrossRef]
- Kerstens, Joyce, and Jurjen Jansen. 2016. The victim–perpetrator overlap in financial cybercrime: Evidence and reflection on the overlap of youth’s on-line victimization and perpetration. Deviant Behavior 37: 585–600. [Google Scholar] [CrossRef]
- Kesari, Aniket, Chris Hoofnagle, and Damon McCoy. 2017. Deterring Cybercrime: Focus on Intermediaries. Berkeley Technology Law Journal 32: 1093–134. [Google Scholar]
- Kozlowska, Hanna. 2022. Overseas Call Centers Bombard People They Target for Fraud. AARP. December 8. Available online: https://www.aarp.org/money/scams-fraud/info-2022/international-phone-scammers-target-consumers.html (accessed on 9 July 2024).
- Kshetri, Nir. 2010. The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives. Berlin/Heidelberg: Springer. [Google Scholar]
- Leukfeldt, Eric R., Raoul J. Notté, and Marijke Malsch. 2019. Exploring the needs of victims of cyber-dependent and cyber-enabled crimes. Victims & Offenders 15: 60–77. [Google Scholar] [CrossRef]
- Lim, Jonathan W. Z., and Vrizlynn L. L. Thing. 2022. Towards Effective Cybercrime Intervention. arXiv arXiv:2211.09524. [Google Scholar] [CrossRef]
- Loveday, Barry. 1995. Reforming the police: From Local Service to State Police? The Political Quarterly 66: 141–56. [Google Scholar] [CrossRef]
- Luc, Jean-Noël. 2016. Histoire des gendarmes: De La Maréchaussée À nos jours. Paris: Nouveau Monde Éditions. [Google Scholar]
- Madarie, Renushka. 2017. Hackers’ Motivations: Testing Schwartz’s Theory of Motivational Types of Values in a Sample of Hackers. International Journal of Cyber Criminology 1: 78–97. [Google Scholar] [CrossRef]
- Mahmud, Aqil. H. 2022. If So Many People Think +65 Calls Are from Scammers, Why Do Some Businesses Still Use Them? CAN. May 8. Available online: https://www.channelnewsasia.com/singapore/scam-call-overseas-plus-65-businesses-imda-2663341 (accessed on 9 July 2024).
- Maimon, David, and Donald E. Hunt. 2020. Cybercrime investigations and prosecutions. Criminology. [Google Scholar] [CrossRef]
- Maimon, David, and Eric R. Louderback. 2019. Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology 2: 191–216. [Google Scholar] [CrossRef]
- McGowan, John. 1996. The Emergence of Modern Civil Police in Scotland: A Case Study of the Police and Systems of Police in Edinburghshire 1800–1833. Milton Keynes: Open University. [Google Scholar]
- Ministry of Home Affairs (MHA). 2016. National Cybercrime Action Plan; Singapore: MHA.
- Ministry of Home Affairs (MHA). 2024. E-Commerce Marketplace Transaction Safety Ratings 2024; Singapore: MHA. Available online: https://www.mha.gov.sg/mediaroom/press-releases/e-commerce-marketplace-transaction-safety-ratings-2024/#:~:text=The%20four%20categories%20the%20rating,as%20well%20as%20(d)%20the (accessed on 9 July 2024).
- Miró-Llinares, Fernando, and Jesús C. Aguerri. 2021. Misinformation about fake news: A systematic critical review of empirical studies on the phenomenon and its status as a ‘threat’. European Journal of Criminology 20: 356–74. [Google Scholar] [CrossRef]
- Mladek, Klaus. 2007. Police Forces: A Cultural History of an Institution. London: Palgrave Macmillan. [Google Scholar]
- Moeckel, Caroline. 2019. Examining and constructing attacker categorisations. Paper presented at the 14th International Conference on Availability, Reliability and Security, Canterbury, UK, August 26–29. [Google Scholar]
- Monteith, Scott, Michael Bauer, Martin Alda, John Geddes, Peter C Whybrow, and Tasha Glenn. 2021. Increasing cybercrime since the pandemic: Concerns for psychiatry. Current Psychiatry Reports 23: 18. [Google Scholar] [CrossRef] [PubMed]
- Morgan, Steve. 2020. Cybercrime to Cost the World $10.5 Trillion Annually by 2025. Cybercrime Magazine. April 27. Available online: https://cybersecurityventures.com/cybercrime-damage-costs-10-trillion-by-2025/ (accessed on 9 July 2024).
- O’Malley, Roberta L., and Karen M. Holt. 2020. Cyber sextortion: An exploratory analysis of different perpetrators engaging in a similar crime. Journal of Interpersonal Violence 37: 258–83. [Google Scholar] [CrossRef] [PubMed]
- Özdan, Selman. 2021. The right to freedom of expression versus legal actions against fake news: A case study of singapore. In Postdigital Science and Education. Cham: Springer, pp. 77–94. [Google Scholar] [CrossRef]
- Pease, Ken, and Dainis Ignatans. 2016. The global crime drop and changes in the distribution of victimisation. Crime Science 5. [Google Scholar] [CrossRef]
- Peters, Allison, and Amy Jordan. 2020. Strengthening Global Capacity on Cybercrime. Journal of National Security Law and Policy 10: 487–524. [Google Scholar]
- Phillips, Kirsty, Julia C. Davidson, Ruby R. Farr, Christine Burkhardt, Stefano Caneppele, and Mary P. Aiken. 2022. Conceptualizing cybercrime: Definitions, typologies and taxonomies. Forensic Sciences 2: 379–98. [Google Scholar] [CrossRef]
- Popoola, Segun I., Ujioghosa B. Iyekekpolo, Samuel O. Ojewande, Faith O. Sweetwilliams, Samuel N. John, and Aderemi A. Atayero. 2017. Ransomware: Current Trend, Challenges, and Research Directions. Paper presented at the World Congress on Engineering and Computer Science 2017, San Francisco, CA, USA, October 25–27; 1. Available online: https://www.iaeng.org/publication/WCECS2017/WCECS2017_pp169-174.pdf (accessed on 10 September 2023).
- Pucci, Michael. 2016. FATF Recommendations: Becoming Soft Law. Michigan Journal of International Law. April 8. Available online: https://www.mjilonline.org/fatf-recommendations-becoming-soft-law-2/ (accessed on 9 July 2024).
- Rich, Timothy. 2017. You can trust me: A multimethod analysis of the Nigerian email scam. Security Journal 31: 208–25. [Google Scholar] [CrossRef]
- Riek, Markus, Rainer Böhme, and Tyler Moore. 2016. Measuring the influence of perceived cybercrime risk on online service avoidance. IEEE Transactions on Dependable and Secure Computing 13: 261–73. [Google Scholar] [CrossRef]
- Roth, Mitchel. 1998. Mounted Police Forces: A Comparative history. Policing: An International Journal of Police Strategies & Management 21: 707–19. [Google Scholar] [CrossRef]
- Sarre, Rick. 2017. Metadata retention as a means of combatting terrorism and organised crime: A perspective from Australia. Asian Journal of Criminology 12: 167–79. [Google Scholar] [CrossRef]
- Schneier, Bruce. 2003. Beyond Fear: Thinking Sensibly about Security in an Uncertain World. New York: Springer. [Google Scholar]
- Singapore Police Force (SPF). 2011. Annual Crime Brief 2011; Singapore: SPF.
- Singapore Police Force (SPF). 2021. Annual Crime Brief 2021; Singapore: SPF.
- Singapore Police Force (SPF). 2023. Annual Scams and Cybercrime Brief 2022; Singapore: SPF.
- Sorbán, Kinga. 2022. The role of internet intermediaries in combatting cybercrime: Organisation and liabilities. Central and Eastern European eDem and eGov Days 335: 19–31. [Google Scholar] [CrossRef]
- Sparrow, Malcolm K. 2008. The Character of Harms: Operational Challenges in Control. Cambridge: Cambridge University Press. [Google Scholar]
- Stabek, Amber, Paul Watters, and Robert Layton. 2010. The seven scam types: Mapping the terrain of Cybercrime. Paper presented at the 2010 Second Cybercrime and Trustworthy Computing Workshop, Ballarat, Australia, July 19–20. [Google Scholar]
- Stephens, Paul, and Abhaya Induruwa. 2007. Cybercrime investigation training and specialist education for the European Union. Paper presented at the Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Karlovassi, Greece, August 27–28. [Google Scholar]
- Swire, Peter P. 2009. No cop on the beat: Underenforcement in e-commerce and Cybercrime. Journal on Telecommunications and High Technology Law 7: 107. [Google Scholar] [CrossRef]
- Thomas, Douglas, and Brian Loader. 2000. Cybercrime: Security and Surveillance in the Information Age. London: Routledge. [Google Scholar]
- Vaseashta, Ashok, Philip Susmann, and Eric Braman. 2014. Cyber Security and Resiliency Policy Framework. Amsterdam: IOS Press. [Google Scholar]
- Waldrop, Mitchell M. 2017. The genuine problem of fake news. Proceedings of the National Academy of Sciences 114: 12631–34. [Google Scholar] [CrossRef] [PubMed]
- Wall, David S. 2007. Cybercrime: The Transformation of Crime in the Information Age. Cambridge: Polity Press. [Google Scholar]
- Wall, David S. 2017. Crime, security and information communication technologies: The changing cybersecurity threat landscape and its implications for regulation and policing. In The Oxford Handbook on the Law and Regulation of Technology. Edited by Roger Brownsword, Eloise Scotford and Karen Yeung. Oxford: Oxford University Press. [Google Scholar]
- Wall, David S., and Matthew L. Williams. 2013. Policing cybercrime: Networked and social media technologies and the challenges for policing. Policing and Society 23: 409–12. [Google Scholar] [CrossRef]
- Walsh, M. E., and D. D. Schram. 1980. Victims of White-Collar Crime—Accuser or Accused. In WhiteCollar Crime—Theory and Research. Edited by Gilbert Geis and Ezra Stotland. Thousand Oaks: Sage. [Google Scholar]
- Wang, Shun-Yung Kevin, and Ming-Li Hsieh. 2021. Digital Robbery: ATM Hacking and Implications. Cham: Springer Nature. [Google Scholar]
- Whitty, Monica T., and Tom Buchanan. 2015. The online dating romance scam: The psychological impact on victims—Both financial and non-financial. Criminology & Criminal Justice 16: 176–94. [Google Scholar] [CrossRef]
- Witting, Sabine. 2018. ‘Cyber’ Trafficking? An Interpretation of the Palermo Protocol in the Digital Era. Voelkerrechtsblog. June. Available online: https://voelkerrechtsblog.org/ (accessed on 9 September 2023).
- Woo, Hyung-jin, Yeora Kim, and Joseph Dominick. 2004. Hackers: Militants or Merry Pranksters? A content analysis of defaced web pages. Media Psychology 6: 63–82. [Google Scholar] [CrossRef]
- Woods, DeVere D., Charles E. O’Hara, and Gregory L. O’Hara. 2019. O’Hara’s Fundamentals of Criminal Investigation. Springfield: Charles C Thomas, Publisher, Ltd. [Google Scholar]
- Worsley, Joanne D., Jacqueline M. Wheatcroft, Emma Short, and Rhiannon Corcoran. 2017. Victims’ voices: Understanding the emotional impact of cyberstalking and individuals’ coping responses. SAGE Open 7: 215824401771029. [Google Scholar] [CrossRef]
- Xia, Pengcheng, Haoyu Wang, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, and Guoai Xu. 2020. Characterizing cryptocurrency exchange scams. Computers & Security 98: 101993. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khan, A.A. Reconceptualizing Policing for Cybercrime: Perspectives from Singapore. Laws 2024, 13, 44. https://doi.org/10.3390/laws13040044
Khan AA. Reconceptualizing Policing for Cybercrime: Perspectives from Singapore. Laws. 2024; 13(4):44. https://doi.org/10.3390/laws13040044
Chicago/Turabian StyleKhan, Azfer A. 2024. "Reconceptualizing Policing for Cybercrime: Perspectives from Singapore" Laws 13, no. 4: 44. https://doi.org/10.3390/laws13040044
APA StyleKhan, A. A. (2024). Reconceptualizing Policing for Cybercrime: Perspectives from Singapore. Laws, 13(4), 44. https://doi.org/10.3390/laws13040044