Hostname: page-component-586b7cd67f-l7hp2 Total loading time: 0 Render date: 2024-11-22T13:53:35.093Z Has data issue: false hasContentIssue false

The Value of Criminological Theories in Explaining Cybersecurity in South African Smart Cities

Published online by Cambridge University Press:  26 August 2022

François Paul Cornelius
Affiliation:
Department of Criminology and Security Science, University of South Africa, Tshwane, South Africa
Shandré Kim Jansen van Rensburg
Affiliation:
Department of Criminology and Security Science, University of South Africa, Tshwane, South Africa
Sarika Kader*
Affiliation:
Department of Criminology and Security Science, University of South Africa, Tshwane, South Africa
*
*Corresponding Author: Sarika Kader, Department of Criminology and Security Science, University of South Africa, Tshwane, South Africa. E-mail: [email protected]

Abstract

The development of smart cities in South Africa has the potential to enrich quality of life, encourage economic growth and reduce the human ecological footprint. It can advance and elevate service delivery in urban areas by applying various information and communication technologies. However, despite the countless benefits available, smart cities are at risk for major cybersecurity breaches that can produce devastating consequences. Criminological theories provide a foundation for understanding and explaining the criminal activity. Advancements in computer technologies and increased use of electronic devices and the Internet have resulted in crimes committed in cyberspace. As such, criminology scholars have been forced to think differently about how crimes are committed in cyberspace and how theoretical perspectives can be advanced to explain these non-traditional crimes. This article contends that criminological theories can inform cybersecurity risks in smart cities. This paper is based on theoretical findings through a qualitative inquiry, and the data were analysed thematically. The authors illustrate the value of social learning theory, neutralization theory, code of the street theory, space transition theory, actor-network theory and integrated model theory in explaining cybersecurity risks in smart cities.

Abstracto

Abstracto

El desarrollo de ciudades inteligentes en Sudáfrica tiene el potencial de enriquecer la calidad de vida, fomentar el crecimiento económico y reducir la huella ecológica humana. Puede avanzar y elevar la prestación de servicios en áreas urbanas mediante la aplicación de diversas Tecnologías de la Información y la Comunicación. Sin embargo, a pesar de los innumerables beneficios disponibles, las ciudades inteligentes corren el riesgo de sufrir importantes brechas de seguridad cibernética que pueden tener consecuencias devastadoras. Las teorías criminológicas proporcionan una base para comprender y explicar la actividad delictiva. Los avances en las tecnologías informáticas y el mayor uso de dispositivos electrónicos e Internet han resultado en delitos cometidos en el ciberespacio. Como tal, los estudiosos de la criminología se vieron obligados a pensar de manera diferente sobre cómo se cometen los delitos en el ciberespacio y cómo se pueden avanzar las perspectivas teóricas para explicar estos delitos no tradicionales. Este artículo sostiene que las teorías criminológicas pueden informar los riesgos de seguridad cibernética en las ciudades inteligentes. Este artículo se basa en hallazgos teóricos a través de una investigación cualitativa, y los datos fueron analizados temáticamente. Los autores ilustran el valor de la teoría del aprendizaje social, de la neutralización, del código de la calle, de la transición espacial, del actor-red y la del modelo integrado para explicar los riesgos de ciberseguridad en las ciudades inteligentes.

Abstrait

Abstrait

Le développement de villes intelligentes en Afrique du Sud a le potentiel d’enrichir la qualité de vie, d’encourager la croissance économique et de réduire l’empreinte écologique humaine. Il peut faire progresser et élever la prestation de services dans les zones urbaines en appliquant diverses technologies de l’information et de la communication. Cependant, malgré les innombrables avantages disponibles, les villes intelligentes sont exposées à des failles majeures de cybersécurité qui peuvent avoir des conséquences dévastatrices. Les théories criminologiques fournissent une base pour comprendre et expliquer l’activité criminelle. Les progrès des technologies informatiques et l’utilisation accrue d’appareils électroniques et d’Internet ont entraîné des crimes commis dans le cyberespace. En tant que tels, les chercheurs en criminologie ont été contraints de penser différemment sur la façon dont les crimes sont commis dans le cyberespace et sur la manière dont les perspectives théoriques peuvent être avancées pour expliquer ces crimes non traditionnels. Cet article soutient que les théories criminologiques peuvent éclairer les risques de cybersécurité dans les villes intelligentes. Cet article est basé sur des découvertes théoriques à travers une enquête qualitative, et les données ont été analysées thématiquement. Les auteurs illustrent la valeur de la théorie de l’apprentissage social, de la théorie de la neutralisation, de la théorie du code de la rue, de la théorie de la transition spatiale, de la théorie des acteurs-réseaux et de la théorie des modèles intégrés pour expliquer les risques de cybersécurité dans les villes intelligentes.

抽象的

抽象的

南非智慧城市的发展具有丰富生活质量、鼓励经济增长和减少人类生态足迹的潜力。它可以通过应用各种信息和通信技术来推进和提升城市地区的服务提供。然而,尽管有无数的好处,智慧城市仍面临可能产生毁灭性后果的重大网络安全漏洞的风险。犯罪学理论为理解和解释犯罪活动提供了基础。计算机技术的进步以及电子设备和互联网的使用增加导致网络空间犯罪。因此,犯罪学学者被迫以不同的方式思考网络空间中的犯罪行为以及如何推进理论视角来解释这些非传统犯罪。本文认为,犯罪学理论可以为智慧城市的网络安全风险提供信息。本文基于定性调查的理论发现,并对数据进行了主题分析。作者阐述了社会学习理论、中和理论、街道代码理论、空间转换理论、行动者网络理论和集成模型理论在解释智慧城市网络安全风险中的价值。

الملخص

الملخص

إن تطوير المدن الذكية في جنوب إفريقيا لديه القدرة على إثراء نوعية الحياة ، وتشجيع النمو الاقتصادي ، وتقليل البصمة البيئية البشرية. يمكن أن تقدم وترتقي بتقديم الخدمات في المناطق الحضرية من خلال تطبيق تقنيات المعلومات والاتصالات المختلفة. ومع ذلك ، على الرغم من الفوائد العديدة المتاحة ، فإن المدن الذكية معرضة لخطر الانتهاكات الأمنية السيبرانية الكبرى التي يمكن أن تؤدي إلى عواقب وخيمة. توفر النظريات الإجرامية أساسًا لفهم النشاط الإجرامي وتفسيره. أدى التقدم في تقنيات الكمبيوتر وزيادة استخدام الأجهزة الإلكترونية والإنترنت إلى ارتكاب جرائم في الفضاء السيبراني. على هذا النحو ، اضطر علماء الجريمة إلى التفكير بشكل مختلف حول كيفية ارتكاب الجرائم في الفضاء الإلكتروني وكيف يمكن تطوير المنظورات النظرية لشرح هذه الجرائم غير التقليدية. تؤكد هذه المقالة أن النظريات الإجرامية يمكن أن تبلغ مخاطر الأمن السيبراني في المدن الذكية. تستند هذه الورقة إلى النتائج النظرية من خلال تحقيق نوعي ، وتم تحليل البيانات بشكل موضوعي. يوضح المؤلفون قيمة نظرية التعلم الاجتماعي ، ونظرية التحييد ، ورمز نظرية الشارع ، ونظرية انتقال الفضاء ، ونظرية شبكة الممثل ، ونظرية النموذج المتكامل في شرح مخاطر الأمن السيبراني في المدن الذكية.

Type
Article
Copyright
© International Society of Criminology, 2022

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adeniran, Adebusuyi I. 2011. “Café Culture and Heresy of Yahooboyism in Nigeria.” Pp. 312 in Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, edited by Jaishankar, K.. Boca Raton, FL: Taylor & Francis.Google Scholar
Akers, Ronald L. 1998. Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston, MA: Northeastern University Press.Google Scholar
Akers, Ronald L., Sellers, Christine S., and Jennings, Wesley G.. 2016. Criminological Theories: Introduction, Evaluation, and Application, 7th ed. Oxford: Oxford University Press.Google Scholar
Akhuseyinoglu, Nuray B. and Joshi, James. 2020. “Access Control Approaches for Smart Cities.” Pp. 140 in IoT Technologies in Smart-Cities: From Sensors to Big Data, Security and Trust, edited by Al-Tudjman, F. and Imran, M.. Stevenage: Institution of Engineering and Technology.Google Scholar
Al-Ali, Abdelrahman A., Nimrat, Amer, and Benzaid, Chafika. 2018. “Combating Cyber Victimisation: Cybercrime Prevention.” Pp. 325–39 in Cyber Criminology, edited by Jahankhani, H.. Cham, Switzerland: Springer.Google Scholar
Allam, Zaheer. 2021. The Rise of Autonomous Smart Cities: Technology, Economic Performance, and Climate Resilience. London: Palgrave Macmillan.CrossRefGoogle Scholar
Anderson, Elijah. 1999. Code of the Street: Decency, Violence, and the Moral Life of the Inner City. New York: W. W. Norton & Company.Google Scholar
Barlow, Mike and Levy-Bencheton, Cornelia. 2019. Smart Cities, Smart Future: Showcasing Tomorrow. Hoboken, NJ: John Wiley & Sons.Google Scholar
Bossler, Adam M. and Burruss, George W.. 2011. “The General Theory of Crime and Computer Hacking: Low Self-Control Hackers?” Pp. 3867 in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by Holt, T. J. and Schell, B. H.. Hershey, PA: Business Science Reference.Google Scholar
Brake, Mike. 1980. The Sociology of Youth Cultures and Youth Subcultures. London: Routledge and Kegan Paul.Google Scholar
British Standards Institution. 2014. “PAS 180 Smart Cities – Terminology.” BSI, retrieved 9 July 2020 (https://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/).Google Scholar
BusinessTech. 2020. “Ramaphosa Has a Plan for a New ‘Smart City’ in Gauteng.” 14 February 2020, retrieved 15 February 2021 (https://businesstech.co.za/news/technology/374270/ramaphosa-has-a-plan-for-a-new-smart-city-in-gauteng/).Google Scholar
Cooper, Jon and Harrison, Daniel M.. 2001. “The Social Organization of Audio Piracy on the Internet.” Media, Culture, and Society 23(1):7189.Google Scholar
Cornelius, François Paul. 2022. Cyber Security Risks in Smart Cities: A South African Perspective. Unpublished MA Dissertation, University of South Africa, Pretoria.Google Scholar
Crawford, Linda M. 2020. “Conceptual and Theoretical Frameworks in Research.” Pp. 3548 in Research Design and Methods: An Applied Guide for the Scholar–Practitioner, edited by Burkholder, G. J., Cox, K. A., Crawford, L. M., Hitchcock, J. H., and Patton, M. Q.. Thousand Oaks, CA: Sage.Google Scholar
Cross, Cassandra, Richards, Kelly M., and Smith, Russel G.. 2016. “The Reporting Experiences and Support Needs of Victims of Online Fraud.” Trends and Issues in Crime and Criminal Justice 518(1):114.Google Scholar
Decary-Hetu, David, Morselli, Carlo, and Leman-Langlois, Stéphane. 2012. “Welcome to the Scene: A Study of Social Organization and Recognition Among Warez Hackers.” Journal of Research in Crime and Delinquency 49(3):359–82.Google Scholar
Deloitte. 2015. “Smart Cities: How Rapid Advances in Technology are Reshaping our Economy and Society.” Retrieved 28 October 2020 (https://www2.deloitte.com/tr/en/pages/public-sector/articles/smart-cities.html).Google Scholar
ESET. 2016. “En Route with Sednit: Part I: Approaching the Target.” Version 1.0. Retrieved 18 May 2021 (https://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf).Google Scholar
Ferreira, Maria I. A. (ed.). 2021. How Smart is Your City?: Technological Innovation, Ethics, and Inclusiveness. Cham, Switzerland: Springer.Google Scholar
FireEye. 2014. “APT28: A Window into Russia’s Cyber Espionage Operations?” Retrieved 18 May 2021 (https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf).Google Scholar
Foster, Kevin. 2020. “Smarten Up: Paths to Bottom-Up Smart Cities and the Risks of Top-Down Smart Governance.” Pp. 23–8 in South African Cities Network: Smart Cities Paper Series: Smart Governance in South African Cities. The South African Cities Network (SACN). Retrieved 27 April 2021. (https://www.sacities.net/wp-content/uploads/2020/10/Smart_Cities_Papers_Volume_1_Final-Draft.pdf).Google Scholar
Gauteng Department of Human Settlements. 2018. “Gauteng Infrastructure Funding Summit: Mega Projects.” Retrieved 25 October 2020 (https://www.gpf.org.za/wp-content/uploads/2018/04/MEGA-Projects-Booklet-V7-ilovepdf-compressed.pdf).Google Scholar
Ghosal, Amrita and Halder, Subir. 2018. “Building Intelligent Systems for Smart Cities: Issues, Challenges, and Approaches.” Pp. 107–25 in Smart Cities: Development and Governance Frameworks, edited by Mahmood, Z.. Cham, Switzerland: Springer.Google Scholar
Gilson, Lucy L. and Goldberg, Caren B.. 2015. “Editors’ Comment: So, What is a Conceptual Paper?Group & Organization Management 50(2):127–30.Google Scholar
Grabosky, Peter N. 2001. “Virtual Criminality: Old Wine in New Bottles?Social and Legal Studies 10(2):243–9.CrossRefGoogle Scholar
Henson, Billy, Swartz, Kristin, and Reyns, Bradford W.. 2017. “#Respect: Applying Anderson’s Code of the Street to the Online Context.” Deviant Behavior 38(7):768–80.CrossRefGoogle Scholar
Higgins, George E. and Marcum, Catherine D.. 2011. Digital Piracy: An Integrated Theoretical Approach. Raleigh, NC: Carolina Academic Press.Google Scholar
Hinduja, Sameer and Ingram, Jason R.. 2008. “Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft.” Western Criminology Review 9(2):5272.Google Scholar
Holt, Thomas J. 2007. “Subcultural Evolution? Examining the Influence of On- and Offline Experiences on Deviant Subcultures.” Deviant Behavior 28(2):171–98.Google Scholar
Holt, Thomas J. 2009. “Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers.” Pp. 336–55 in Crimes of the Internet, edited by Smalleger, F. and Pittaro, M.. Upper Saddle River, NJ: Pearson Prentice Hall.Google Scholar
Holt, Thomas J. and Bossler, Adam M.. 2014. “An Assessment of the Current State of Cybercrime Scholarship.” Deviant Behavior 35(1):2040.Google Scholar
Holt, Thomas J. and Bossler, Adam M.. 2017. Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses. London: Routledge.Google Scholar
Holt, Thomas J. and Copes, Heith. 2010. “Transferring Subcultural Knowledge Online: Practices and Beliefs of Digital Pirates.” Deviant Behavior 31(7):625–54.Google Scholar
Holt, Thomas J., Freilich, Joshua D., and Chermak, Steven M.. 2017. “Exploring the Subculture of Ideologically Motivated Cyber-Attackers.” Journal of Contemporary Criminal Justice 33(3):212–33.CrossRefGoogle Scholar
Holt, Thomas J. and Kilger, Max. 2008. “Techcrafters and Makecrafters: A Comparison of Two Populations of Hackers.” Pp. 6778 in 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing (WISTDCS). Amsterdam, the Netherlands: IEEE Computer Society.Google Scholar
Holt, Thomas J. and Kilger, Max. 2012. “Know Your Enemy: The Social Dynamics of Hacking.” The Honeynet Project, 29 May 2012, retrieved 4 April 2021 (https://www.honeynet.org/papers/kye-kyt/know-your-enemy-the-social-dynamics-of-hacking/).Google Scholar
Holt, Thomas J., Strumsky, Deborah, Smirnova, Olga, and Kilger, Max. 2012. “Examining the Social Networks of Malware Writers and Hackers.” International Journal of Cyber Criminology 6(1):891903.Google Scholar
Hosken, Graeme. 2020. “Data from Huge Experian Breach Found on the Internet.” TimesLIVE, 13 September 2020, retrieved 30 April 2021 (https://www.timeslive.co.za/sunday-times/news/2020-09-13-data-from-huge-experian-breach-found-on-the-internet/).Google Scholar
International Organization for Standardization and International Electrotechnical Commission (ISO/IEC). 2015. “Smart Cities: Preliminary Report 2014.” Retrieved 24 February 2021 (https://www.iso.org/files/live/sites/isoorg/files/developing_standards/docs/en/smart_cities_report-jtc1.pdf).Google Scholar
Jaishankar, Karuppannan. 2007a. “Editorial. Cyber Criminology: Evolving a Novel Discipline with a New Journal.” International Journal of Cyber Criminology 1(1):16.Google Scholar
Jaishankar, Karuppannan. 2007b. “Establishing a Theory of Cyber-Crimes.” International Journal of Cyber Criminology 1(2):79.Google Scholar
Jaishankar, Karuppannan. 2008. “Space Transition Theory of Cyber-Crimes.” Pp. 283301 in Crimes of the Internet, edited by Schmallager, F. and Pittaro, M.. Upper Saddle River, NJ: Prentice Hall.Google Scholar
Karvonen, Andrew, Cugurullo, Federico, and Caprotti, Federico (eds). 2019. Inside Smart Cities: Place, Politics and Urban Innovation. London: Routledge.Google Scholar
Kaspersky. 2020. “Kaspersky Security Bulletin 2020. Statistics.” Retrieved 23 February 2021 (https://go.kaspersky.com/rs/802-IJN-240/images/KSB_statistics_2020_en.pdf).Google Scholar
Khan, Iman, Iftikhar, Muhammad N., Ali, Saleem H., and Khalid, Shua. 2021. “Cities and COVID-19: Navigating the New Normal.” Global Sustainability 4(12):16. Retrieved 5 May 2021 (https://www.cambridge.org/core/services/aop-cambridge-core/content/view/4096D1C809023C58527C59A9E1BB1DD3/S2059479821000107a.pdf/div-class-title-cities-and-covid-19-navigating-the-new-normal-div.pdf).Google Scholar
Kornblum, William. 1997. Sociology in a Changing World, 4th ed. Fort Worth, TX: Harcourt Brace and Company.Google Scholar
Kovacs, Eduard. 2019. “Russian Hackers Behind Ukraine Power Outage May Have Sought More Damage.” SecurityWeek, 13 September 2019, retrieved 1 November 2020 (https://www.securityweek.com/russian-hackers-behind-ukraine-power-outage-may-have-sought-more-damage).Google Scholar
KPMG. 2019. “Cybersecurity in Smart Cities.” Retrieved 11 October 2019 (https://home.kpmg/in/en/home/insights/2019/02/cybersecurity-smartcities.html).Google Scholar
Latour, Bruno. 2005. Reassembling the Social: An Introduction to Actor-Network Theory. Oxford: Oxford University Press.Google Scholar
Leavy, Patricia. 2017. Research Design: Quantitative, Qualitative, Mixed Methods, Arts-Based, and Community-Based Participatory Research Approaches. New York: The Guilford Press.Google Scholar
Le-Dang, Quang and Le-Ngoc, Tho. 2018. “Internet of Things (IoT) Infrastructures for Smart Cities.” Pp. 130 in Handbook of Smart Cities Software Services and Cyber Infrastructure, edited by Maheswaran, M. and Baddi, E.. Cham, Switzerland: Springer.Google Scholar
Lee, Timothy B. 2015. “The Ashley Madison Hack, Explained.” Vox, 19 August 2015, retrieved 15 May 2021 (https://www.vox.com/2015/7/20/9007039/ashley-madison-hack-explained).Google Scholar
Lozada, Nelson, Arias-Pérez, Jose, and Perdomo-Charry, Geovanny. 2019. “Big Data Analytics Capability and Co-Innovation: An Empirical Study.” Heliyon 5(10):17.CrossRefGoogle ScholarPubMed
Mahadevan, Prem. 2020. “Cybercrime: Threats During the Covid-19 Pandemic.” Geneva, Switzerland: Global Initiative. Retrieved 4 April 2021 (https://globalinitiative.net/analysis/cybercrime-covid-19/).Google Scholar
Matli, Walter and Ngoepe, Mpho. 2020. “Capitalizing on Digital Literacy Skills for Capacity Development of People Who Are Not in Education, Employment or Training in South Africa.” African Journal of Science, Technology, Innovation, and Development 12(2):129–39.Google Scholar
Maurushat, Alana. 2019. Ethical Hacking. Ottawa, Ontario: University of Ottawa.Google Scholar
Mcanyana, Wandile, Brindley, Clive, and Seedat, Yusof. 2020. “Cyberthreat Landscape in South Africa.” Retrieved 20 September 2021 (https://www.accenture.com/_acnmedia/PDF-125/Accenture-Insight-Into-The-Threat-Landscape-Of-South-Africa-V5.pdf).Google Scholar
Miller, Walter. B. 1958. “Lower Class Culture as a Generating Milieu of Gang Delinquency.” Journal of Social Issues 14(3):519.Google Scholar
Milman, Oliver. 2021. “Largest US Pipeline Restarts Operations After Hack Shut It Down for Nearly a Week.” The Guardian, 12 May 2021, retrieved 26 May 2021 (https://www.theguardian.com/us-news/2021/may/12/us-fuel-shortages-pipeline-hack-drivers).Google Scholar
Mimecast. 2021 .“What 2021 Holds for Cybersecurity in South Africa.” BusinessTech, 8 February 2021, retrieved 10 August 2021 (https://businesstech.co.za/news/industry-news/466148/what-2021-holds-for-cybersecurity-in-south-africa/).Google Scholar
Morris, Robert G. 2010. “Computer Hacking and the Techniques of Neutralization: An Empirical Assessment.” Pp. 1–17 in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, edited by Holt, T. J. and Schell, B.. New York: Information Science Reference.Google Scholar
Morris, Robert G. and Blackburn, Ashley G.. 2009. “Cracking the Code: An Empirical Exploration of Social Learning Theory and Computer Crime.” Journal of Crime and Justice 32(1):134.CrossRefGoogle Scholar
Moyo, Admire. 2019. “Bad Day for SA’s Cyber Security as Banks Suffer DDoS Attacks.” ITWeb, 25 October 2019, retrieved 30 April 2021 (https://www.itweb.co.za/content/LPp6V7r4OVzqDKQz).Google Scholar
Navarro, Jordana N. and Marcum, Catherine D.. 2019. “Deviant Instruction: The Applicability of Social Learning Theory to Understanding Cybercrime.” Pp 120 in The Palgrave Handbook of International Cybercrime and Cyberdeviance, edited by Holt, T. and Bossler, Adam. Cham, Switzerland: Palgrave Macmillan.Google Scholar
Newburn, Tim. 2017. Criminology, 3rd ed. London: Routledge.Google Scholar
Nxumalo, Mphathi. 2018. “SA Presidency Website Hacked.” IOL, 11 July 2008, retrieved 19 May 2021 (https://www.iol.co.za/dailynews/news/sa-presidency-website-hacked-15950026).Google Scholar
Pandey, Piyush, Peasley, Sean, and Kelkar, Mahesh. 2019. “Making Smart Cities Cybersecure: Ways to Address Distinct Risks in an Increasingly Connected Urban Future.” Deloitte Insights, 11 April 2019, retrieved 10 August 2020 (https://www2.deloitte.com/us/en/insights/focus/smart-city/making-smart-cities-cyber-secure.html).Google Scholar
Patton, Michael Q. 2015. Qualitative Research and Evaluation Methods, 4th ed. Thousand Oaks, CA: Sage.Google Scholar
Pelton, Joseph N. and Singh, Indu B.. 2018. Smart Cities of Today and Tomorrow: Better Technology, Infrastructure, and Security. Cham, Switzerland: Springer.Google Scholar
Roane, Brendan. 2013. “SAPS Website Hacked.” The Star, 22 May 2013, retrieved 19 May 2021 (https://www.iol.co.za/news/saps-website-hacked-1520042).Google Scholar
RSA Security. 2019. “Digital Risk Report.” September 2019, retrieved 30 May 2020 (https://www.rsa.com/content/dam/en/white-paper/rsa-digital-risk-report-2019.pdf).Google Scholar
Schmalleger, Frank. 2019. Criminology Today: An Integrative Introduction. New York: Pearson.Google Scholar
Schurink, Willem J., Schurink, Evanthe M., and Fouché, Christa B.. 2021. “Thematic Inquiry in Qualitative Research.” Pp. 289310 in Research at Grass Roots: For the Social Sciences and Human Service Professions, edited by Fouché, C. B., Strydom, H., and Roestenburg, W. J. H.. Pretoria: Van Schaik.Google Scholar
Short, James F. 1968. Gang Delinquency and Delinquent Subcultures. Oxford: Harper and Row.Google Scholar
Sicetsha, Andile. 2018. “Hack Alert: The Presidency’s Website Has Just Been Hacked.” The South African, 7 July 2018, retrieved 13 May 2021 (https://www.thesouthafrican.com/news/hack-alert-the-presidencys-website-has-just-been-hacked/).Google Scholar
Skinner, William F. and Fream, Anne M.. 1997. “A Social Learning Theory Analysis of Computer Crime Among College Students.” Journal of Research in Crime and Delinquency 34(4):495518.Google Scholar
South African Banking Risk Information Centre. 2019. “South African Banks Resilient in the Face of Latest DDoS Attacks.” SABRIC, 23 October 2019, retrieved 30 April 2021 (https://www.sabric.co.za/media-and-news/press-releases/south-african-banks-resilient-in-the-face-of-latest-ddos-attacks/).Google Scholar
South African Banking Risk Information Centre. 2020. “Experian Data Breach.” SABRIC, retrieved 16 December 2020 (https://www.sabric.co.za/media-and-news/press-releases/experian-data-breach/).Google Scholar
Stalans, Loretta J. and Donner, Christopher M.. 2018. “Explaining Why Cybercrime Occurs: Criminological and Psychological Theories.” Pp. 2545 in Cyber Criminology, edited by Jahankhani, H.. Cham, Switzerland: Springer.Google Scholar
Stalans, Loretta J. and Finn, Mary A.. 2016. “Consulting Legal Experts in the Real and Virtual World: Pimps’ and Johns’ Cultural Schemas About Strategies to Avoid Arrest and Conviction.” Deviant Behavior 37(6):644–64.Google Scholar
Stats, SA. 2020. “Quarterly Labour Force Survey (QLFS) Q4:2020.” Retrieved 4 April 2021 (http://www.statssa.gov.za/publications/P0211/Presentation%20QLFS%20Q4_2020.pdf).Google Scholar
Stewart, Eric A. and Simons, Ronald L.. 2010. “Race, Code of the Street, and Violent Delinquency: A Multilevel Investigation of Neighborhood Street Culture and Individual Norms of Violence.” Criminology 48(2):569605.Google ScholarPubMed
Sutherland, Edwin H. 1947. Principles of Criminology, 4th ed. Philadelphia, PA: Lippincott.Google Scholar
Swart, Werner and Wa Afrika, Mzilikazi. 2012. “It Was a Happy New Year’s Day for the Gang Who Pulled Off the R42m Postbank Heist.” TimesLIVE, 15 January 2012, retrieved 14 May 2021 (https://www.timeslive.co.za/news/south-africa/2012-01-15-it-was-a-happy-new-years-day-for-gang-who-pulled-offr42m-postbank-heist/).Google Scholar
Sykes, Gresham M. and Matza, David. 1957. “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22(6):664–70.Google Scholar
Taylor, Paul A. 1999. Hackers: Crime in the Digital Sublime. London: Routledge.Google Scholar
Tham, Irene. 2018. “Personal Info of 1.5m SingHealth Patients, Including PM Lee, Stolen in Singapore’s Worst Cyber Attack.” 21 July 2018, retrieved 1 November 2020 (https://www.straitstimes.com/singapore/personal-info-of-15m-singhealth-patients-including-pm-lee-stolen-in-singapores-most).Google Scholar
Tubbs, Bonnie. 2013. “SAPS Hack Spells Negligence.” ITWeb, 22 May 2013, retrieved 19 May 2021 (https://www.itweb.co.za/content/nG98YdqL2yx7X2PD).Google Scholar
United Nations. 2018. “68% of the World Population Projected to Live in Urban Areas by 2050, Says UN.” New York: United Nations. Retrieved 9 October 2019 (https://www.un.org/development/desa/en/news/population/2018-revision-of-world-urbanization-prospects.html).Google Scholar
Valeriano, Brandon and Maness, Ryan C.. 2015. Cyber War Versus Cyber Realities: Cyber Conflict in the International System. New York: Oxford University Press.Google Scholar
Van der Wagen, Wytske and Pieters, Wolter. 2015. “From Cybercrime to Cyborg: Botnets as Hybrid Criminal Actor-Networks.” British Journal of Criminology 55(3):578–95.Google Scholar
Vermeulen, Jan. 2015. “Ashley Madison Hack List: South African Details.” MyBroadband, 21 August 2015, retrieved 15 May 2021 (https://mybroadband.co.za/news/security/135972-ashley-madison-hack-list-south-african-details.html).Google Scholar
Wall, David S. 1998. “Catching Cybercriminals: Policing the Internet.” International Review of Law, Computers, and Technology 12(2):201–18.Google Scholar
White, Thomas and Marchet, Francesco. 2021. “Digital Social Markets: Exploring the Opportunities and Impacts of Gamification and Reward Mechanisms in Citizen Engagement and Smart City Services.” Pp 103–44 in How Smart is Your City?: Technological Innovation, Ethics, and Inclusiveness, edited by Ferreira, M. I. A.. Cham, Switzerland: Springer.Google Scholar
Wiggen, Johannes. 2020. “The Impact of COVID-19 on Cyber Crime and State-Sponsored Cyber Activities.” Konrad Adenauer Stiftung, June 2020, retrieved 10 April 2021 (https://www.jstor.org/stable/resrep25300?seq=1#metadata_info_tab_contents).Google Scholar
Woollaston-Webber, Victoria. 2017. “WannaCry Ransomware: What is It and How to Protect Yourself.” Wired, 22 May 2017, retrieved 4 November 2020 (https://www.wired.co.uk/article/wannacry-ransomware-virus-patch).Google Scholar
World Economic Forum. 2018. The Global Risks Report 2018, 13th ed. Retrieved 9 August 2020 (https://www3.weforum.org/docs/WEF_GRR18_Report.pdf).Google Scholar