Workshops‎ > ‎cs-ga-2010-1‎ > ‎cs-ga-2010‎ > ‎

O.B. Longe

Director, Cybercrime Institute,International Centre for IT & Dev. Southern University and A & M College, Baton Rouge, LA


Biography:



Olumide Babatope LONGE is on faculty at the Department of Computer Science, University of Ibadan, Ibadan, Nigeria. He holds a National Diploma in Electronics Engineering from the Federal Polytechnic, Ado Ekiti, Nigeria, a B.Sc. in Computer Science from the University of Benin, Benin City, Nigeria, a Master of Technology Degree in Computer Science from the Federal university of Technology, Akure. His PhD research at the Department of computer Science, University of Benin City focus on the design and implementation of an outbound antispam system for filtering fraudulent (419) mails. His scholarly publication has appeared and has been quoted in reputable peer-refereed Journals, Conference proceedings, Newsletters and edited books. A recipient of the prestigious John D. and Catherine T. MacArthur Award, he is an Associate Director of the Institute for Cyber Security and Allied Research at the International Center for Information Technology and Development (ICITD), College of Business, Southern University, Baton Rouge, Louisiana. Longe is a member of the IEEE, ACM, the International Association of Engineers (IAENG), Computer Professional of Nigeria (CPN) and the Internet Society (ISOC). A speaker at information security and allied research conferences and workshop, he is actively researching into cybercrime causation, apprehension, treatment, prevention using social theories and information security models. He can be reached at longeolumide@icitd.org, olumide@longeolumide.com or longeolumide@yahoo.com. Website – www.longeolumide.com. +2348024071175 or +12256506530




Abstract:

Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security


  1Longe, Olumide 2Richard, Boateng         3Chiemeke, Stella                     4Chanika, Jones

                                                 International Centre for IT & Development          Depof Computer Science                   Dept. of Criminal Justice                                           

                  Southern University and A & M College             University of Benin                             Southern University A & M

Baton Rouge, USA.                           Benin City, Nigeria                                 Baton Rouge, USA.        

1longeolumide@ieee.org    2richard@icitd.com       3schiemeke@yahoo.com                         4cj4su@yahoo.com


The current 
theory of community policing used for the detection apprehension of criminals as proposed by Peel in 1829 is premised on the intrinsic attributes of conventional crimes and criminals.  The defining postulates of the theory include proximity between criminals and victims, the constraints and limitations of the scale of crime that can be committed per time as well as the ability of law enforcement to study crime patterns as an aid to detection and apprehension. In contrast, cybercrime deviates to some extent in nature as opposed to conventional crimes. Cybercrimes are automated, thereby empowering the cybercriminal with the potential to attack multiple victims at multiple locations. Spatial confinement is negated as a means for detection and apprehension and cyber criminals can use proxies as a detour to avoid detection and apprehension. Cyber criminals can turn their victims to criminals by hijacking their systems without their knowledge thus gaining multiplier status in terms of the reach of the crime and provision of cover (anonymity). Since cybercrimes are committed across international boundaries, sovereignty of states is violated and state-specific cyber laws are rendered ineffective making prosecution and arrests extremely difficult. This discourse takes a critical look at the Peel theory of community policing in the context of its application to cybercrimes. The intention is to identify the weaknesses of the theory in combating cybercrime and make recommendations that will assist in remodelling the theory to better respond appropriately to the challenges of curtailing cybercrime on a global scale.

 

 

Keywords: Cyber crime, Law Enforcement, Policing, Proxies, Peel Model.


Presentation:


http://icc.ite.gmu.edu/csga2010/OB_Longe.ppt

Comments