Longe, Olumide, Richard, Boateng - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Longe, Olumide, Richard, Boateng

Description:

Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES – PowerPoint PPT presentation

Number of Views:67
Avg rating:3.0/5.0
Slides: 17
Provided by: Home1416
Category:

less

Transcript and Presenter's Notes

Title: Longe, Olumide, Richard, Boateng


1
Towards Remodelling The Peel Theory of
Community Policing for Global Cyber Security
  • Longe, Olumide, Richard, Boateng
  • Chiemeke, Stella Chanika, Jones

2
INTRODUCTION
  • The definition of crime from different schools of
    thought varies as much as there are differing
    perceptions of the issue in different societies.
  • Crime could be against persons, organizations,
    institutions, states and even global.
  • Cybercrimes are crimes committed on the
    cyberspace using computer and networking
    technology provided by Information and
    Communication infrastructures.

3
CRIME CONTROL
  • Crime control refers to a theory of criminal
    justice that places emphasize reducing crime in
    society through increased police and
    prosecutorial powers.
  • Use general societal condemnation of violations
    and the violators
  • Exact punishment on affront and appease the
    victim
  • Deter future violations by sanctions and new
    pronouncement appropriate to the instance or new
    instances or genre of crime
  • Reconcile violators and victim(s)

4
CRIME CONTROL
  • The Peel Model of Community Policing

5
Characteristic of Real World Crime
  • Four characteristics of real-world crime shaped
    the way the way the Peel model approach the issue
    of crime and criminality. These are
  • Proximity between criminals and victims
  • The scale of the crime
  • Physical constraints that can discourage the
    criminal(s)
  • Patterns of crime with which investigator are
    familiar.

6
Characteristic of Real World Crime
  • Factors that shape the Peel Model of Law
    Enforcement

7
THE CYBERCRIME CHALLENGE
  • Cybercrime poses a lot of challenges to the Peel
    Model. These challenges are not more of adopting
    or creating new laws that criminalize certain
    cyber activities but more of law enforcements
    ability to react to cybercrime. This is because
    cybercrime does not share some of the
    characteristics of conventional crimes that
    shaped the current Peel model of law enforcement.
  • Response to crime based on the Peel model is also
    localized making it difficult to apply it on a
    global scale

8
THE CYBERCRIME CHALLENGE
  • Multiple Effect of Reach of Cybercrime

9
Localized Crime Response
10
OUR MODEL
  • Our opinion is that, amongst other, in the
    efforts to fight cybercrimes, users must be
    empowered as the last line of defense as compared
    to the Peel model where the most responsibility
    rests on the Police and other law enforcement
    agents.
  • We propose a User-centric socio-technological
    model that employs technology, social theory,
    policy and education (awareness) as tools to
    mitigate the cybercrime problem.

11
OUR MODEL
  • This model offers an interactive real-time
    challenge-demand-response platform that aids
    identification, reporting, apprehension and
    prosecution.
  • Our model takes into consideration the fact that
    cyber crime does not share the common
    characteristics on which the Peel theory rests
    and that the criminals plug into the webscape
    through remote proxies.
  • The model provides valves that assist users
    identify malicious intentions through a
    multi-level access control mechanism.

12
OUR MODEL
  • Real-Time Cybercrime Response Model (RtCRM)

13
Workability of the RtCR Model
  • Hypothetically, users A, B and C access the cyber
    infrastructure from different locations.
  • Law Enforcement Agencies at Locations A, B and C
    (not necessarily the same locations as Users A,B
    and C) are directly connected to the different
    users logging into the cyberspace from these
    different locations.
  • Mechanisms are provided in the user-domain that
    enables users to report any noticeable or
    suspected malicious activities to trained law
    enforcement officers.

14
Workability of the RtCR Model
  • Requests for attention and responses are
    Real-time where users can be directed on what to
    do and how to do it.
  • This provides a repository of user requests
    (commonly referred to FAQs or frequently asked
    questions) and responses that can be used to
    train the response engine so the system can be
    collaborative, adaptive and learn.
  • Reactions to specific instances of problems or
    criminal activities are exchanged and fine-tuned
    between or among the responding agents at the
    various locations to produce well-directed and
    fine grained output.
  • Responses are therefore global in nature and
    based on identification, profiling.
  • This is as opposed o the static offline Peel
    Model, the mechanism provided ensure prompt
    reporting and responses which has hitherto
    hindered apprehension and prosecution of cyber
    criminals.
  •  

15
RECCOMENDATIONS FOR POLICY AND PRACTICE
  • Cyber crime has added to the dilemma of the Peel
    theory for crime control.
  • The ubiquitous nature of the web coupled with the
    cloud of users presents a new form of challenge
    to system security and demand a paradigm shift in
    the perception.
  • To secure the internet from cyber crime and other
    abuses, users must not only be made aware of the
    existence of security flaws and vulnerabilities
    on the webscape, they must be empowered in a
    holistic manner through design, policies,
    practices and technology to mitigate against
    these risks and to understand the criminals.

16
CONCLUSION
  • The challenge in fighting cyber crimes stems from
    the fact that it is automated and share very few
    commonalities with offline crimes.
  • We have shown in this presentation that the Peel
    model of community policing suffer some
    inadequacies with regards to facing the
    challenges posed by cybercrime.
  • A new model is proposed that can assist law
    enforcement agents in their fight against
    cybercriminals.
  • The Internet community and law enforcement must
    engage in a collective effort to curb the
    Internet of the demeaning crimes that it is
    helping to fuel. We ignore these important issues
    at our own risk.
Write a Comment
User Comments (0)
About PowerShow.com