Browse > Article
http://dx.doi.org/10.17703/JCCT.2021.7.2.157

Analysis of Psychological Factors Inducing Cybercrime  

Lim, HeonWook (Dept of Liberal Arts., Hansei Univ)
Publication Information
The Journal of the Convergence on Culture Technology / v.7, no.2, 2021 , pp. 157-163 More about this Journal
Abstract
This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.
Keywords
Cyber crime; Delphi technique; Maslow desire; Information and communication network violation; Information and communication network use crime; Illegal content crime;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Lee SH, I. Kang WY, Jung H, & Kim HW. "Analysis of Cyber Crime and Its Characteristics," Information Systems Review, Vol. 21, No. 3, pp. 1-26, 2019.   DOI
2 Lee YH, Kim DW, & Yoo YJ. "A Study on Routine Activity and Cyber-Crime Victimization in Cyberspace," korean Journal of Public Safety and Criminal Justice, Vol. 20, No. 3, pp. 213-240, 2011.
3 Kim SW, & Jo HB. "Prevention Methods of Cyber-crimes using the Private Security," The Journal of the Korea Contents Association, Vol. 13, No. 3, pp. 141-151, 2013.   DOI
4 Shin HJ, Lee KB, & Park TH. "Association Analysis on The Completion Rate of Security education and Cyber Terror Response According to Personal and Job characteristics," Journal of the Korea Society of Digital Industry and Information Management, Vol. 10, No. 4, pp. 97-107, 2014.   DOI
5 Kim KH, & Eom JH. "A Study on the Model of Training Performance Measurement Specialized toCyber Security Trainee for Cyber Security Professionals Acquisition," Journal of the Korea Society of Digital Industry and Information Management, Vol. 12, No. 4, pp. 59-69, 2016.   DOI
6 EOM JH. "A Study on the Capability of Cyber Security Education and Training Professional Personnel," Journal of the Korea Society of Digital Industry and Information Management, Vol. 15, No. 1, pp. 43-51, 2019.   DOI
7 Net Losses, "Estimating the Global Cost of Cybercrime, Economic impact of cybercrime II," Center for Strategic and International Studies, June, 2014.
8 Choi HS, & Kim HG. "The Countermeasure for Threat of Cyber Terror in Sociological Perspective," Journal of the Korea Society of Digital Industry and Information Management, Vol. 13, No. 11, pp. 59-67, 2017.   DOI
9 Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors
10 Jung W. "Phenomenon of cybercrime," Korean Journal Of Criminology KJC, Vol. 19, No. 2, pp. 9-32, 2017.
11 Cho YJ, Kim SY, & Park HH. "Tools and Indices of Crime Risk Assessment for More Effective CPTED Practice," Police Science Institute, Vol. 30, No. 3, pp. 385-421, 2016.
12 Park CW. "A Study on Effective Response of Police Officer against Cybercrime," Journal of The Korea Society of Computer and Information, Vol. 13, No. 3, pp. 189-196, 2008.
13 Lee MS. "The Reactions to Cybercrime Victimization," Test a General Model. Korean Journal of Victimology, Vol. 10, No. 2, pp. 209-247, 2002.
14 Lee YP, Kim TS, & Yoo JH. "Measurement of Economic Costs of Cybersecurity Breaches in South Korea," Korea Business Review, Vol. 24, No. 2, pp. 143-164, 2020.   DOI
15 Song HR, Kim CW, & Kim WJ. "Effects of Public's Media Dependency Risk Severity and Subjective Knowledge on Preventive Behavior Intention of Cyber Crime," Crisisonomy, Vol. 10, No. 5, pp. 83-100, 2014.
16 Kim T. A "Study on Violence and Countermeasures on Cyberspace Corruption," The journal of Convergence on Culture Technology, Vol. 5, No. 1, pp. 51-58, 2019. DOI : 10.17703/JCCT.2019.5.1.51   DOI