Spatial and Temporal Patterns of Cyberattacks: Effective CYBERCRIME Prevention Strategies around the Globe
- 80
The issue of cyberattacks has become very pervasive and increasingly dangerous in the digital age. Many industrialized nations are highly dependent upon computer systems and other technologically supported infra-structures. An attack on such infrastructures may very likely compromise a nation’s security and economic vitality. However, to date there has not been a multinational cooperation system as an effective cyberattack prevention strategy. While the policing of high crime areas, known as hotspots, has garnered much attention among scholars and law enforcement officials, the spatial identification of hotspots in cybercrime has been limited. Routine activity theory has often been applied to explain crimes in the physical space, and consistent with this framework, a new theory has been put forth to explain crimes in cyberspace: cyber-routine activities theory. This theory contends that an unguarded virtual network must be present in addition to a potential offender and potential target in order for a cybercrime to occur. Further, unlike the spatial and temporal convergence of the physical world, the virtual world is not bound by the same spatial and temporal orderings. Due to the dynamic nature of cyberspace, a cyberattack may be committed against a target in different real-world time zones, while also allowing the at-tacker to escape. The current study seeks to address gaps in the literature concerning spatial and temporal patterns of cyberat-tack origins and victimizations. The purpose of this study is to identify spatial and temporal patterns of cyberattack hotspots, which can help law enforcement establish an effective cybercrime prevention strategy for international communities. In terms of methodology, Geospatial Information System(GIS) technique is employed to investigate the patterns of cyberattacks and victimizations. Data was derived from the Norse website from February 15-16, 2017, which feeds a livestream of cyberattacks worldwide. The data includes cyberattack origins, types, targets, times, IP addresses, locations, and ports. This study focuses on answering the following four research questions: Which nations are the top seven coun-tries by count: cyberattack origins? Which nations are the top seven countries by count: cyberattack victimiza-tions? Do the spatial hotspots for cyberattack origins differ from the spatial hotspots for cyberattack victimiza-tions? Does a temporal pattern of cyberattacks in the daytime differ from a temporal pattern of cyberattacks in the nighttime? Thus, the findings of the current study indicate (1) the spatial hotspots of the cyber attackers and victims, and (2) the difference between temporal patterns of cyberattacks in the daytime and nighttime. Finally, policy implications and limitations of the current study are discussed.
Abstract
1. Introduction
2. Literature Review
3. Methodology
5. Discussion
6. Conclusion
7. References
(0)
(0)