1. Introduction
Together with the invention and the expansion of electronics, computers and computer networks in everyday life, criminal activities are also moving into this area. In addition to traditional crimes that existed in the offline environment, we have also witnessed a whole new criminal acts that arose as a result of these new technologies. We talk about cybercrime and virtual offences.
Cybercrime or computer-oriented crime is commonly defined as a malicious activity that uses a computer and/or a computer network either in the commission of a crime, or as the target. It includes the usage of internet (social networks, emails or chat software) and even mobile phones.
Cybercrime may threaten victim’s personality, privacy, security and often financial interests. Issues surrounding cybercrime may include: unwarranted surveillance and data gathering, identity theft, harassment, bullying, sextortion, stalking, child pornography, hacking. These harmful acts committed on-line are usually already prohibited by the existing criminal law. Harassment, threatening violence, stalking, malicious communications, incitement and theft are all crimes from off-line era. Cyberspace makes them easier to commit and harder to stop and punish—that is why cybercrimes are becoming widespread lately. It does not mean that we resign and accept them as a new norm. Common law defines criminal offences as acts (or omissions) which are so harmful that the wrong is thought to be against the state rather than the individual who has suffered the act; the state prosecutes and, on conviction by a court, the state punishes, by deprivation of liberty, fine or other means [
1].
While cybercrime involves serious crimes such as financial fraud, cyberterrorism and cyberextortion is not the subject of our research, this paper focuses on less serious forms of crime—virtual offenses.
Virtual offences which we focus on are:
identity theft—unauthorized use of someone else’s identity to gain benefits in the other person’s name. Based on theft of personally identifying information and its subsequent use for criminal activities. The victim is left with consequences (invoices, charges and a damaged personal credit).
cyber stalking (e-stalking or online stalking)—use of electronic means to systematically stalk, embarrass or threaten a victim. It may also include defamation, false accusations, or libel. Cyber stalking is perpetrated through social media, email, instant messaging as well as other electronic media.
phishing—fraudulent act of acquiring sensitive private information such as account passwords, personal identification details, usernames, credit card info, social security numbers by using a complex set of social engineering techniques and pretending to be a trustworthy entity in an electronic communication.
cyber scam—a form of fraud (confidence tricks) promising the victim a significant financial benefit conditioned by a minor up-front payment. The Federal Bureau of Investigation (FBI) defines cyber scam as an advance fee scheme in which the victim pays money to someone in anticipation of receiving something of greater value—such as a loan, contract, investment, or gift—and then receives little or nothing in return. Notoriously popular became so called Nigerian scams offering a share in a large sum of money or a payment for help to transfer money out of the country.
cyber harassment—harassment conducted by the social media, email, instant messaging or other electronic means. It can be in the form of unwanted sexually explicit messages, pictures (so called dickpics), inappropriate or offensive advances, threats of physical and/or sexual violence and/or hate speech (insults, threats).
A quite interesting topic—related to the virtual offences and cybercrime—is theft limited to the digital environment. W. Rumbles in his article in Canterbury Law Review asks interesting question: Theft in the digital: Can you steal virtual property? [
2]. Rumbles introduces a number of counter intuitive concepts related to the extending real world criminal liability and criminal law to behavior and activities inside purely virtual worlds (Second Life, on-line game environments like World of Warcraft). He looks into the theft of virtual property and explores how different jurisdictions are responding to the evolution of virtual property.
Virtual offences are unfortunately becoming quite common. Very illustrative case is so called GamerGate controversy, which refers to a 2014 harassment campaign conducted primarily through the use of the #GamerGate hashtag. It opens issues of sexism and progressivism in video game culture, which attracted public attention, but other cases of online offences are usually underreported. However, academic literature does cover some cases of virtual offences. For example Bailey Poland [
3] covers the latest available research into cybersexism and questions its motivations, monitors related activities and explores different methods of Internet misogyny reduction.
Yi-Chih Lee and Wei-Li Wu in their 2018 article Factors in cyber bullying: the attitude-social influence-efficacy model [
4] examine the correlation between social influence, knowledge, self-efficacy, risk perception and cyberbullying behavior from the perspective of the attitude-social influence-efficacy model—particularly for youngsters who have an admitted history of cyberbullying behavior or have observed their peers’ cyberbullying behavior. Yi-Chih Lee et al. conclude that attitude towards cyberbullying affected cyberbullying intention, and vice versa that intention influenced witnessed cyberbullying behavior.
Justin W. Patchin [
5] surveyed a sample of almost 5 thousand US middle and high school students (age 12–17) and realized that 36.5% reported experiencing cyberbullying in their lifetimes; 17.4% in the previous 30 days. Reported problems include: Mean or hurtful online comments, rumors spread, threats to hurt through a cell phone text, mean names or comments with sexual meaning, impersonation, mean or hurtful picture or video, insults to race, color, religion, mean or hurtful web page, cyberbullying by gender. As for the gender of victims, adolescent girls are slightly more likely to have experienced cyberbullying than boys (38.7% to 34.1%), boys on the other hand were more likely to confess to be perpetrators (16.1% to 13.4%). The 2019 findings are quite consistent with similar surveys in 2010, 2015 and 2016, which proves that the problem of cyberbullying is a persistent problem.
However, online cruelty is not limited just to adolescents, adults get cyberbullied too. In this case the perpetrators, commonly referred to as trolls, are basking in anonymity which gives them possibility to abuse and harass a victim without fear of consequences. Famous personalities, such as actors, politicians, musicians, athletes and other VIPs get cyberbullied routinely and report the distress it causes to them [
6].
Aiken, M. [
7] in the book The Cyber Effect describes the psychological phenomenon of Diffusion of Responsibility in relation to cyberbullying or harassment. Diffusion of Responsibility implies the greater the number of people who witness a crime or emergency, the less likely any of them will feel responsible to respond. It is also sometimes called The Bystander Effect and, in case of cyberbullying, hundreds to thousands of people can witness bullying online on a regular basis but do not step up and do anything about it.
To prevent cyberbullying social media can employ advanced social analytics not just to estimate user’s age, sex and political leanings, but also use mathematical algorithms to detect antisocial behavior, bullying or harassment. By analyzing behavioral parameters, content analysis (usage of keywords such as die, hate, bastard, etc.) can estimate the direction, length and frequency of attacks.
As for the literature where online offences have already been linked to the personality traits, there is not much so far. So far the best research in this area has been done by Steve G. A. van de Weijer and E. Rutger Leukfeldt in their article [
8] Big Five Personality Traits of Cybercrime Victims published in Cyberpsychology, Behavior and Social Networking.
Their study based on a large (N = 3648) representative sample of Dutch population focused on the link between the victimization of cybercrime and the main characteristics of the Big Five personality model, which is exactly what authors have done in this paper. De Weijer et al. used multinomial logistic regression analyzes to explore correlations between the specific personality characteristics and 3 classes of victims (victims of cybercrime against non-victims, victims of traditional crime against non-victims and victims of cybercrime against victims of conventional crime). As opposed to our research, de Weijer et al. [
8] divided crimes into two separated groups—cyber-dependent crimes (i.e., computer virus spreading and cracking) and cyber-enabled crimes (i.e., virtual coercion, bank account robbery and consumer fraud) and used logistic regression to predict victimization, stating that there is only a minor difference between identified Big Five personality traits related to the victimization of both cyber-dependent and/or cyber-enabled misconducts.
Interesting finding is, that Big Five personality characteristics are not directly correlated with victimization in cyberspace but rather with the victimization in general (both off-line and on-line). Only those with higher emotional health ratings were less likely to fall victim to criminal in the cyber space than conventional crime in the real world. Only respondents more opened to experience would have greater chances of becoming cyber-enabled crime victim.
Thomas J. Holt et al. [
9] in his article Testing an Integrated Self-Control and Routine Activities Framework to Examine Malware Infection Victimization studied the connection between low self-control and increased risk of victimization. He theorized that the increase is due to frequent involvement in routine activities that tend to place victims into the close proximity of motivated perpetrators (e.g., downloading files, visiting questionable websites) and decrease in their willingness to use adequate preventive steps (antivirus and wireless network protection). This link is significant not only in predicting physical forms of victimization, but also crime in the cyberspace.
Importance of self-control and utilizing of appropriate guardianship factor are studied also in the article [
10] Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things. Author points out that with the growing number of GSM and Internet-linked devices (e.g., simple sensors), the capacity to ensure security without incurring unrealistic performance overheads is crucial. Instead of using conventional encryption authors suggest the dynamic privacy protection model designed to achieve improved privacy protection even in large volume of data transmissions. The authors also developed the approach called a fully homomorphic encryption (FHE) for blend operations model that uses tensor laws to carry the computations of blend arithmetic operations over real numbers [
11].
Personality Traits
Hinds, Tung, Franz et al. in the article Genome-wide Analyses for Personality Traits Dentify Six Genomic Loci and Show Correlations with Psychiatric Disorders [
12] conclude that Big Five personality traits are genetically dependent. The meta-analysis Patterns of mean-level change in personality traits across the life course: a meta-analysis of longitudinal studies [
13] points out that people are more conscientious, more agreeable and emotionally positive as they grow older. Another meta-analysis worth mentioning is A Systematic Review of Personality Trait Change Through Intervention [
14], which concludes that negative emotionality and extraversion can be possibly cured by therapy. When we take into consideration quite young age of our respondents, they could have been victims of a virtual offense only recently, there is not enough time for the effect of aging (identified by [
13]).
The gender aspect in the field of information and communication technologies has been studied in extensively [
15], however we have not found any study related to the virtual offenses. The problematics of virtual offenses and personality traits is quite comprehensive and is influenced (amongst others) by ethics [
16], psychology [
17] and education theory [
18].
The main goal of our investigation is to establish if demographic factor or Big Five personality traits may be connected to online offenses.
Unfortunately, since we are using a cross-sectional survey, it does not allow us to test also causality, in other words, whether Big Five personality traits caused the respondent to be a victim of a virtual crime or the experience of virtual crime changed Big Five personality traits of the subject.
The article is structured in the traditional format: the next section Methodology describes data collection and method of analysis. In the section Results, the overall tables of the analysis are presented. The section Discussion tries to explain our findings in relation to similar works and known facts. The last section offers brief conclusions.
3. Results
Model 1 estimates influence of demographics and personality on identity theft. Regression coefficients are shown in
Table 1. With regards to the explanatory power, Cox and Snell pseudo-R2 is 0.030, Nagelkerke pseudo-R2 is 0.041, McFadden pseudo-R2 is 0.024 and
p-value is 0.215.
Regression coefficients for the streamlined model for identity theft are shown in
Table 2. With regards to the explanatory power, Cox and Snell pseudo-R2 is 0.022, Nagelkerke pseudo-R2 is 0.030, McFadden pseudo-R2 is 0.017 and
p-value is 0.005.
Model 2 estimates influence of demographics and personality on stalking. Regression coefficients are shown in
Table 3. With regards to the explanatory power, Cox and Snell pseudo-R2 is 0.062, Nagelkerke pseudo-R2 is 0.088, McFadden pseudo-R2 is 0.053 and
p-value is 0.001.
Regression coefficients for the streamlined model for stalking are shown in
Table 4. With regards to the explanatory power, Cox and Snell pseudo-R2 is 0.058, Nagelkerke pseudo-R2 is 0.083, McFadden pseudo-R2 is 0.050 and
p-value is 0.000.
If extraversion and genders are excluded, significance of the regression coefficient for the threshold of 0 improves to 0.001 and for the threshold of 1 it changes to 0.081. With regards to the explanatory power, Cox and Snell pseudo-R2 changes to 0.045, Nagelkerke pseudo-R2 to 0.064, McFadden pseudo-R2 to 0.038 and p-value to 0.001.
Model 3 estimates influence of demographics and personality on phishing. Regression coefficients are shown in
Table 5. With regards to the explanatory power, Cox and Snell pseudo-R2 is 0.061, Nagelkerke pseudo-R2 is 0.080, McFadden pseudo-R2 is 0.044 and
p-value is 0.002.
Regression coefficients for the streamlined model for phishing are shown in
Table 6. With regards to the explanatory power, Cox and Snell pseudo-R2 is 0.050, Nagelkerke pseudo-R2 is 0.066, McFadden pseudo-R2 is 0.036 and
p-value is 0.000.
Model 4 estimates influence of demographics and personality on scam. Regression coefficients are shown in
Table 7. With regards to the explanatory power, Cox and Snell pseudo-R2 is 0.117, Nagelkerke pseudo-R2 is 0.141, McFadden pseudo-R2 is 0.071 and
p-value is 0.000.
Regression coefficients for the streamlined model for scam are shown in
Table 8. It is worth noting that the reference category was changed from the full-time job within the field of study to the full-time job outside the field of study. With regards to the explanatory power, Cox and Snell pseudo-R2 is 0.111, Nagelkerke pseudo-R2 is 0.134, McFadden pseudo-R2 is 0.067 and
p-value is 0.000.
Model 5 estimates influence of demographics and personality on harassment. Regression coefficients are shown in
Table 9. With regards to the explanatory power, Cox and Snell pseudo-R2 is 0.041, Nagelkerke pseudo-R2 is 0.053, McFadden pseudo-R2 is 0.029 and
p-value is 0.047.
Regression coefficients for the streamlined model for harassment are shown in
Table 10. It is worth noting that the reference category was changed from the full-time job within the field of study to the full-time job outside the field of study. With regards to the explanatory power, Cox and Snell pseudo-R
2 is 0.035, Nagelkerke pseudo-R
2 is 0.046, McFadden pseudo-R
2 is 0.024 and
p-value is 0.009.
If gender is excluded in the streamlined model, significance of the regression coefficient for the threshold of 0 improves to 0.046 and for the threshold of 1 it changes to 0.000. With regards to the explanatory power, Cox and Snell pseudo-R2 changes to 0.028, Nagelkerke pseudo-R2 to 0.037, McFadden pseudo-R2 to 0.020 and p-value to 0.017.
4. Discussion
We have tested 5 different models in our paper. Model 1 estimates influence of demographics and personality on identity theft, model 2 estimates influence of demographics and personality on stalking, model 3 estimates influence of demographics and personality on phishing, model 4 estimates influence of demographics and personality on scam and model 5 estimates influence of demographics and personality on harassment. Here are our most important findings.
(1). More extravert individuals are more prone to become the victims of identity theft. This finding is not so surprising and confirms the assumption that identity theft usually requires an access to the victims and extraversion tends to cause that—people high in extraversion enjoy engaging with the external world, often seek out the company of other people. They are action-oriented and enthusiastic, people, who tend to thrive on excitement, they are quite open and it increases the chances they put themselves into the positions leading to the identity theft.
(2). As for stalking, less agreeable individuals are more prone to be victims of stalking. An explanation could be, that people who score low on the scale of agreeableness usually put their own interests above interests of others. They are inclined to be uncooperative, unfriendly and distant, and therefore stalkers can be incentivized to use them for target practice.
(3). Another reasonable result is that more neurotic individuals are prone to report being harassment victims. A person who scores high in neuroticism is emotionally very reactive, he/she feels vulnerable or in a bad mood even in quite standard situation. He/she has an emotional reaction to events and activities that would probably not affect other people. They may find it difficult to cope with stress and think clearly. So reported victimization can be explained by oversensitivity and self-victimization.
(4). Less consciousness individuals are more prone to be victims of scam. Since conscientiousness is ability to regulate, control and direct urges and impulses, the less control a person have over his impulses, the more prone he is to be scammed.
(5). We also came to some findings, which are not easily explain. It seems, that men report to be more often a victim of scam and phishing. Why that is should be researched later, we do not have any theory for that at the moment. In addition, respondents who work full-time outside their field of studies report to be victims of scam and harassment, while full-time workers within their field of studies suffer from stalking and phishing. Last but not least, less agreeable people seem to be more often victims of identity theft. These findings will have to be subject of further investigation.
When we compare our findings with van de Weijer’s article [
8] Big Five Personality Traits of Cybercrime Victims, we can confirm their observations and conclusions. They have found that people with higher emotional stability were less likely to be a victim of cybercrime which was confirmed by our statistics, since our results indicate that people with lower scores (neurotics) are more prone to report being victims of harassment. As for their conclusion that people opened to experience have higher chances to become a victim of cyber-enabled crimes, we have found that other similar factor (extraversion) can play a role. Again, not surprising, since openness and extraversion are correlated [
24].