Abstract
Space Transition Theory is one of the key theories that explain why people commit cyber crime. However, past research in the field has mainly used qualitative research methods. This is because there has been a lack of quantitative tools to measure the concept in a large-scale survey. This research proposes a measurement of attitudes towards cyberspace based on Space Transition Theory. The analysis results identify the three factors in attitudes towards cyberspace, namely anonymity, freedom and insecurity, which are then used to classify 487 Thai respondents into five groups. The sociodemographic profiles and the tendency to commit crime-related behaviours in cyberspace compared to physical space are explored for each group. We find that freedom and anonymity are key factors in the behavioural intention to commit cyber crime. The results help us identify people who have the greatest tendency to commit cyber crime. This allows us to make recommendations for law amendments and prosecution improvements.
Keywords: Cyber Crime, Cyberspace, Quantitative Approach, Space Transition Theory, Tendency to commit Cyber Crime.
Introduction
The emergence of the Internet has changed the way people connect to another. Along with advances in hardware communication technologies, people can connect to the Internet using several methods, such as desktop computers, laptop computers, mobile devices (i.e., smart phones and tablets), and smart devices (i.e., smart TVs and other household appliances). This helps people connect to the Internet from anywhere and anytime-and creates a ubiquitous society-which increases the frequency and time that people spend online on the Internet (Tan & Wang, 2010).
In the beginning, the Internet was used in the workplace. However, in the last decade, the rise of social networks has made people engage more on the Internet on various platform, e.g., web boards, blogs, MSN, Line, Facebook, Instagram, YouTube. The Internet is no longer a platform for work but has become a part of people's lifestyle (Antoci, Sabatini, & Sodini, 2014; Goldfarb & Prince, 2008; Kotler, Kartajaya, & Setiawan, 2016; Van Deursen, van Dijk, & Peter, 2015). It is a new world called the cyber world or cyberspace. We are now not able to deny that the Internet has become a necessity in our life, whether work life or private life. The population in cyberspace has dramatically increased in the past few years, especially on social network platforms, where the monthly number of Facebook active users has reached 2.07 billion in the third quarter of 2017. The number is more than the population of a small country (Statista, 2018)
When people connect to the Internet from any device almost all the time, their social identity, social interaction, and relationship formation may be different on the Internet than in real life (Mckenna & Bargh, 2000, p. 57). The impact of the Internet is so enormous that researchers have tried to investigate the many aspects of the phenomenon. In most fields of study, one key factor that is a concern is the attitude towards the Internet; in this study, this is called attitudes towards cyberspace.
Past research has found that people's attitude towards cyberspace influence their online behaviours. The attitude has been indicated to be a predictor of Internet usage (Chang, Tsai, & Chiu, 2015; Eastman & Iyer, 2004; Jackson et al., 2003; Porter & Donthu, 2006; Teo, Lee, & Chai, 2008). The attitude has an impact on the frequency, purpose, and usage of the Internet after adoption (Cheung & Huang, 2005; Duggan, Hess, Morgan, Kim, & Wilson, 2001), and on Internet addiction behaviour (Chou, Chou, & Chen 2016; Tsai & Lin 2001), and social and security behaviour (Chou et al., 2016). However, the studies have attempted to investigate the impact of attitudes towards cyberspace in the context of technology adoption, marketing or education research. The dimensions of attitudes examined in the studies were related to the ease of usage or the benefits that people derived from using the Internet.
For example, Tsai and Lin (2004) proposed a 4-T model, including technology as an improvement of life, tool for information acquisition and communication, a toy for pleasure, and a tour/travel to navigate and open up to the world. The model was later modified due to the rise of Web 2.0 and e-commerce platforms to include space for selfexpression and trade (Chou et al., 2016; Chou, Wu, & Chen, 2011, 2013; Chou, Yu, Chen, & Wu, 2009). Another example is the attitude scale that was developed by Dutton and Blank (2013) in the Oxford Internet Survey (OxIS) project, which consisted of 14 questions that were classified into four dimensions, i.e., enjoyable escape, instrumental efficiency, problem generator, and social facilitator (Dutton & Blank, 2013, 2015). Moreover, Liaw (2002) developed a scale to measure attitudes towards computers and the World Wide Web based on a computer attitudes scale (Al-Khaldi & Al-Jabri, 1998; Nash & Moroz, 1997) and a technology acceptance model (Davis, Bagozzi, & Warshaw, 1989; Fenech, 1998; Moon & Kim, 2001). The scale was further validated by Bras and Miranda (2013), who confirmed that the scale is composed of three dimensions, i.e., confidence about information and communication technology (ICT, learning through ICT, and talking about ICT.
On the other hand, in criminological research, researchers have tried to investigate the reasons for why people conduct cyber crime. Jaishankar (2007, 2008) proposed space transition theory that explains the characteristics of cyberspace that affect people's tendency to conduct cyber crime. It was found that people are varied in their attitudes towards cyberspace and online behaviours due to their socio-economic background and past experiences (Chou et al., 2016). Thus, the characteristics of cyberspace discussed in space transition theory would be perceived differently by people with different backgrounds and thus affect the tendency to conduct cyber crime. However, only a limited number of quantitative studies applying space transition theory in a large-scale survey exist. This is due to the lack of a quantitative scale to measure people's attitudes towards cyberspace in terms of cyberspace characteristics.
While existing measurements of attitudes towards cyberspace are related to the benefits of the Internet, this study aims to develop a measurement of attitudes towards cyberspace based on assumptions about the characteristics of cyberspace in space transition theory. Then, by applying the measurement in a large-scale survey, this study also investigates the impact of attitudes towards cyberspace on people's tendency to conduct several types of cyber crime.
This study is an interdisciplinary study in criminology and marketing research. We applied cluster analysis in the data analysis-a quantitative research technique widely used in marketing research (Dutton & Blank, 2015; Eiamkanchanalai & Assarut, 2016; Srisuphaolarn & Assarut, 2017). The respondents were classified into groups according to their attitudes towards cyberspace. Then, the socio-economic profiles and the tendency to conduct cyber crime of each group were analysed. The analysis results can identify people who have a high tendency to conduct cyber crime and guide policy makers to launch campaigns to protect people from conducting cyber crime.
Literature Review
In the field of criminology, there are several theories explaining why people conduct crime, namely, routine activities theory (Cohen & Felson, 1979), self-control theory (Gottfredson & Hirschi, 1990), social learning theory (Akers, 1998), and techniques of neutralization (Sykes & Matza, 1957). The growing number of cyber crimes has made researchers apply traditional criminology theory to explain the phenomenon (Morris, 2011; Ngo & Paternoster, 2011; Pratt, Holtfreter & Reisig, 2010). Holt and Bossler (2008) have explained the possibility of applying Cohen & Felson's (1979) routine activity theory to cyber crime victimization. However, Yar (2005) have suggested that the theory may not be applicable to all cyber cases.
Jaishankar (2007, 2008) has propounded the space transition theory-an essential theory that explains the antecedents of cyber crime behaviour. The theory suggests that people behave differently when they move from one space to another. In other words, according to the theory, people behave differently in physical space and cyberspace. The assumptions of the theory are as follows:
1. Persons with repressed criminal behaviour (in the physical space) have a propensity to commit crime in the cyberspace, which they could otherwise not commit in physical space due to their status and position.
2. Identity flexibility, dissociative anonymity and lack of deterrence factors in the cyberspace provide the offenders with the choice to commit cyber crime
3. The criminal behaviour of offenders in cyberspace is likely to be imported into physical space, which may then be exported to cyberspace as well.
4. The intermittent ventures of offenders into cyberspace and the dynamic spatiotemporal nature of cyberspace provide the chance to escape.
5. a. Strangers are likely to unite together in cyberspace to commit crime in the physical space.
b. Associates in physical space are likely to unite to commit crime in cyberspace. 6. Persons from a closed society are more likely to commit crimes in cyberspace than persons from an open society.
7. The conflict of norms and values of physical space with the norms and values of cyberspace may lead to cyber crimes.
According to the assumptions of the space transition theory, it can be concluded that the characteristics of cyberspace that affect cyber crime behaviour are status and position, identity flexibility and anonymity, spatio-temporal nature, conflict of norms, deterrence factors, open or closed society and physical or cyber world associates. The theory is a novel theory applied to explain cyber crime behaviour in various studies (Danqua & Longe, 2011; Diamond & Bachmann, 2015; Holt & Bossler, 2016; Holt, Bossler, & Spellar, 2015; Moore, 2012, Wada, Longe, & Danquah, 2012).
The theory is consistent with past research in criminology; for example, Arbak (2005) remarked that online users who commit crime are usually concerned about their social status in the physical world but are not bothered about their status in cyberspace because there is no one to watch and stigmatize them. Later studies have confirmed the assumptions of space transition theory. Danquah and Longe (2011) found that most cyber crimes in Ghana were cyber-deception crimes, with some positive and negative relationships between physical space and cyberspace. Wall (2011) explained that compared to traditional crimes, it is much more difficult to identify and apprehend cyber criminals because they can use technology to conceal their identities and physical locations.
However, the studies on space transition theory have been mostly qualitative (Akanle, Adesina, & Akarah, 2016; Danquah & Longe, 2011; Kethineni, Cao, & Dodge, 2018; Tade, 2013). The scope of these studies has been limited to cyber criminals, which may not represent the behaviour of the general public. The current study attempts to investigate the tendency to conduct cyber crime among the general public. In this case, a quantitative survey is needed. Thus, based on the assumptions of space transition theory, this study develops a measurement scale to quantitatively investigate attitudes towards cyberspace and to analyse the tendency to conduct cyber crime among people who perceive cyberspace in different ways.
Methodology
1.Sample
Thailand is the case study in this research. The country has enacted its Computer Crime Act (CCA) B.E.2550 (2007). The law includes all kinds of computer crimes and imposes strong punishments, with sentences of up to 20 years. However, the number of computer crimes has continued to increase. The wrongdoings have been developed with the latest technologies. The law is losing its grip on technological changes and social media.
This study conducted a survey on attitudes towards cyberspace among Thai citizens. The 487 respondents in this study were Thai people aged 15-60 years old. The entire sample must have had experience using and accessing the Internet on a regular basis. The questionnaires were distributed among proper proportions of age groups (15-24, 25-34, 35-44, and more than 45 years old) and gender (male and female) to avoid the biasing of results that could occur based on the respondents' characteristics (see Table 1).
2.Data Collection
A self-administered questionnaire was used as the data collection method. The questionnaire consisted of four parts. First, the respondents answered questions regarding their Internet behaviour, including their frequency of usage and the access method (personal computer, tablet, or smartphone).
Then, in the second part, the respondents rated the frequency of doing 15 particular activities in online and offline situations using a four-point scale (1= never done, 2 = used to do it in the past, 3 = do it sometimes, 4 = usually do it). The activities covered the four types of crime behaviours (Wall, 2001; Yar, 2005), including the following:
1) Cyber-trespassing: This is a violation and invasion behaviour that involves crossing boundaries into other people's property and/or causing damage, e.g., hacking, defacement and viruses.
2) Cyber-deception and theft: This is a deception and fraud behaviour that involves stealing (money, property), e.g., credit card fraud, intellectual property violation, piracy.
3) Cyber-pornography: This is an obscene behaviour, including activities that breach laws on obscenity and indecency.
4) Cyber violence: This a violent and defamation behaviour that involves causing psychological harm to others or inciting physical harm against others, thereby breaching laws pertaining to the protection of persons, e.g., hate speech.
After that, the respondents rated their attitudes towards the online world on a fivepoint Likert scale. The 13 questions measuring respondents' attitudes towards the online world were extracted from the assumptions of the space transition theory by Jaishankar (2007, 2008) and the qualitative works of Danquah and Longe (2011). Finally, the respondents answered questions about their socio-demographic profiles (gender, age, occupation, income).
Results
Table 1 and Table 2 present the respondents' profiles and Internet usage behaviours. According to Table 1, the respondents were collected with a good proportion of gender and age groups, as indicated in the methodology. The majority of the respondents connected to the Internet using mobile phones, with a duration of usage of 4-6 hours per day (n = 190; 40%) or 1-3 hours per day (n = 120; 40%). It is clear that personal computers were not the major way that people connect to the Internet and that tablet usage was still in the introduction stage of the market.1.Attitudes towards Cyberspace
The 13 questions measuring attitudes towards the cyber world were analysed using principal component analysis with varimax rotation to identify the construct of the measurement as well as the scale reliability and validity.
The analysis results suggested the three components of attitudes towards cyberspace. They were anonymity, freedom, and insecurity. The Kaiser-Meyer-Olkin (KMO) index of analysis was .878. The communality of all questions was greater than .400, and the factor loadings were above .500. Moreover, the Cronbach's alpha coefficients of the three components were .546-.849. All the indices suggested the acceptable validity and reliability of the measurement.
Considering the questions in the three components, the anonymity component means that people are not identified in cyberspace. They do not feel peer pressure, do not need to care about relationships and can easily control what happens. The freedom component means that people think that no one knows them in cyberspace, so that they can do anything that they cannot do in physical space; they do not need to concern themselves about their role and status. The last component is insecurity, which means that cyberspace is not secure. A person can easily find a friend but he or she may not be trustworthy.
2.Clustering the Cyberspace Population
Though there were three components of attitudes towards cyberspace, the differences in people's backgrounds and experiences in cyberspace made them perceive cyberspace differently. This study performed a further analysis by clustering the respondents into several groups according to their attitudes towards cyberspace.
The average score of each attitude component was calculated into a standardized score and applied in K-mean cluster analysis. The results suggested classifying the respondents into five clusters (Table 4). Furthermore, the profiles and Internet usage behaviours of each cluster are shown in Table 5 and Table 6, respectively.
3.Tendency to Conduct Cybercrime of the Five Clusters
The last analysis was to investigate the tendency to conduct cybercrime of each cluster compared to the behaviour in physical space. The 15 questions in Table 7 represented the four types of crime behaviours, including violation and invasion behaviour, deception and fraud behaviour, obscene behaviour, and violent and defamation behaviour. The respondents rated the frequency with which they conducted the behaviours on a fourpoint Likert scale Thus, in this study, an average score that was higher than 3.0 implied that the respondents had a high frequency of doing the behaviour, while a 2.0-2.9 score implied moderate behaviour, and less than 2.0 indicated a low frequency of the behaviour.
Discussion
1. Overall Behaviours in Cyberspace and Physical Space
Focusing on the difference score between cyberspace and physical space, overall, the respondents in all clusters have a higher tendency to conduct the behaviours in cyberspace than in physical space, except for violent and defamation behaviours, which the respondents tend to do more in physical space. The results support the assumption of space transition theory that people tend to conduct crime in cyberspace more than in physical space. This may be due to the nature of cyberspace, which is characterized by freedom and anonymity (Jaishankar, 2007, 2008).
Violation and invasion behaviour, which were related to consuming and purchasing pirated software, were the behaviours exhibited by all clusters. This implies that pirated software is still a major problem in Thailand, which most people are still not concerned about.
Similarly, two behaviours in deception and fraud behaviours, i.e., Providing false personal information to others (04) and Filling in false personal information on forms (05), were the behaviours that the clusters conducted the most. This also implies that people are still concerned about providing their private information in cyberspace.
Furthermore, Watching pornographic pictures or movies (08) is another behaviour that most clusters conducted, except for cluster 1, in which the majority of respondents were female and aged more than 45 years old. Though this behaviour is not a crime behaviour according to Thai law, it is a risky behaviour that motivates the selling of pornographic pictures and movies, which violates the cyber law of Thailand.
With regard to violent and defamatory behaviours, it was found that the respondents engage in these behaviours more in physical space than in cyberspace. This may be because the evidence on these actions taking place is as clear as in cyberspace as it is in physical space.
2. Characteristics and Behaviours of the Five Clusters
According to Tables 4 to 7, the characteristics of the five clusters as well as their behaviours can be summarized as follows:
Cluster 1 is the largest cluster, consisting of 204 respondents (42%). They thought that there is no freedom in cyberspace (mean = -.587) but that it is anonymous (mean = .394) and secure (mean = -.318) (Table 4). The majority of them were females aged more than 45 years with a bachelor-degree education (23.2% of the group size) (Table 5). The respondents in this group were low to moderate users of the Internet. The majority of them connected to the Internet for less than three hours per day via a personal computer or tablet and for 1-3 hours to 4-6 hours per day via a mobile phone (Table 6). Though the respondents in this cluster thought that cyber space is anonymous and free, they still had a lower tendency to conduct behaviours related to cyber crimes compared to other clusters (Table 7). This may be because of their socio-demographic profile, which is female aged over 45 years old with high education.
Cluster 2 consisted of 57 respondents (12%) who were relatively conservative and risk averse in cyberspace. They thought that the cyberspace is insecure (mean = 1.270), that it is not anonymous (mean = -.841) and that there is no freedom (mean = -.789) (Table 4). Most of them were females and males aged 15-24 years old with bachelor's degree (female = 22.8%, male = 15.8%) (Table 5). They were moderate users of the Internet by connecting via a personal computer for 1-3 hours per day and for 4-6 hours per day via a mobile phone (Table 6). This cluster seems to have clear attitudes towards cyberspace, which is not anonymous, not free, and insecure. However, in addition to the basic behaviours that most of the clusters engaged in, the respondents in cluster 2 also tended to copy another user's message without reference to the source (07) and to view pornographic pictures or movies (08) (Table 7). This may be because they were of the younger generation and were not educated about copyrights and citation requirements.
Cluster 3 was the third largest group, with 89 respondents (18%). In their opinion, the cyberspace is insecure (mean = .965) but full of freedom (mean = .872) and anonymous (mean = .531) (Table 4). The respondents were relatively more mature than the other groups and were aged 35-44 years (male = 21.6%, female = 17.0%) (Table 5). They varied in their Internet usage behaviour (Table 6). Respondents in this cluster thought that cyberspace is insecure but still provides freedom and anonymity. Thus, they still view pornographic pictures or movies (08) and post political opinions through various media (15). This may be because of the majority of this cluster is aged 35-44, which is the age range that is the most engaged in political issues.
Cluster 4 was the smallest group and consisted of 14 respondents (3%). They thought that the cyberspace is anonymous (mean = 1.895), secure (mean =-1.587) and full of freedom (mean = 1.399). They seemed unaware of the dangers in cyberspace (Table 4). The majority of the respondents in this group were males aged less than 35 years old with an education level lower than a bachelor's degree (57.1%) (Table 5). The group members were heavy users of the Internet. They connected to the Internet via a personal computer for 7-9 hours per day and for more than 10 hours per day with a mobile phone (Table 6). Respondents in this cluster tended to engage in all of the behaviours related to crimes both in cyberspace and physical space (Table 7). This may be because the majority of the respondents were young males who had low education, which made them think that the cyberspace is anonymous, secure, and full of freedom.
Cluster 5 was the second largest group (n = 123; 25%), and the respondents thought that the cyberspace is not anonymous (mean = -.863) but that it is secure (mean = -.580) and full of freedom (mean = .548) (Table 4). The majority of the group were males aged less than 25 years old with a bachelor's degree (23.6%) and females aged 25-35 years old with a bachelor's degree (16.3%) (Table 5). They were rather high on their Internet usage, i.e., 1-3 hours or 4-6 hours per day with a personal computer and 4-6 hours per day with a mobile phone (Table 6). In addition to the basic behaviour that most clusters engaged in, such as violating software, providing untrue personal information, and viewing pornographic pictures and movies, the respondents in this cluster did not conduct any other crime-related behaviour.
Conclusion
This study, based on space transition theory (Jaishankar, 2007, 2008), developed a measurement scale to quantitatively gauge people's attitudes towards cyberspace. The scale provides a great opportunity to quantitatively conduct research related to cyberspace behaviour in a large-scale survey.
Using statistical techniques, the study was able to classify respondents into five clusters according to their attitudes towards cyberspace. The characteristics and crime behaviours of each cluster were also further investigated, and it was found that the key factors that lead people to conduct cyber crime are as follows:
1. Social norms: common behaviours that most people do make people overlook the fact that the behaviours are illegal. Even if they know this, they may think that the behaviour is not a severe violation: for example, infringing software copyrights, providing untrue information, or viewing pornographic pictures or movies.
2. Demographic profiles: females who are of higher age and who have higher education tend to conduct less crime-related behaviours than other groups, such as cluster 1.
3. Attitudes towards cyberspace: those who think that cyberspace is anonymous, free, and secure (Cluster 4) seem to conduct cyber crime-related behaviours more than other groups. The second riskiest group is Cluster 3, which thought that cyberspace is anonymous and free but insecure. This implies that the security of cyberspace is not the most important characteristic of cyberspace that leads people to conduct cyber crime. The key factors are anonymity and freedom.
The analysis results can help identify the groups of people who have a high tendency to conduct cyber crimes. It is shown statistically that attitudes towards cyberspace are major factors in cyber crimes, especially the attitudes regarding anonymity and freedom. Speaking of anonymity and freedom, it is not new to point them out as major attitudinal factors in people's commitment of cyber crimes. Recent developments such as fake news and real-name systems help emphasize that we need to counter the false attitudes of anonymity and freedom. However, many people are still unaware that anonymity is shrinking. Policy makers can then customize their strategy to prevent cyber crimes, especially by addressing anonymity and freedom to fit each cluster, which will be a more effective way to prevent cyber crime. Cyberspace should be a communication channel for all, not the other space for us to live parallel lives in.
Acknowledgements
This study was supported by Rabi Bhadanasak Research and Development Institute, Office of Judiciary, Thailand. We sincerely thank the Editor-in-Chief of IJCC and the anonymous reviewers for their valuable comments and feedback.
References
Akanle, O., Adesina, J. O., & Akarah, E. P. (2016). Towards human dignity and the internet: The cybercrime (yahoo yahoo) phenomenon in Nigeria. African Journal of Science, Technology, Innovation and Development, 8(2), 213-220.
Akers, R. L. (1998). Social learning and social structure: A general theory of crime and deviance. Boston: Northeastern University Press.
Al-Khaldi, M. A., & Al-Jabri, I. M. (1998). The relationship of attitudes to computer utilization: New evidence from a developing nation. Computers in Human Behavior, 14(1), 23-42.
Antoci, A., Sabatini, F., & Sodini, M. (2014). Bowling alone but tweeting together: the evolution of human interaction in the social networking era. Quality & Quantity, 48(4), 1911-1927.
Arbak, E. (2005) Social Status and Crime. GATE Working Paper No. W.P.05-10. Available at SSRN: https://ssrn.com/abstract=906771
Bras, P., & Miranda, G. L. (2013). Validation of Liaw's attitude questionnaire: A study with Portuguese teachers. In Information Systems and Technologies (CISTI), 2013 8th Iberian Conference on (pp. 1-6). IEEE.
Chang, Y. C., Tsai, C. L., & Chiu, W. Y. (2015). The influence of life satisfaction and well-being on attitude toward the internet, motivation for internet usage and internet usage behavior. Journal of Interdisciplinary Mathematics, 18(6), 927-946.
Cheung, W., & Huang, W. (2005). Proposing a framework to assess Internet usage in university education: an empirical investigation from a student's perspective. British Journal of Educational Technology, 36(2), 237-253.
Chou, H. L., Chou, C., & Chen, C. H. (2016). The moderating effects of parenting styles on the relation between the internet attitudes and internet behaviors of high-school students in Taiwan. Computers & Education, 94, 204-214.
Chou, C., Wu, H. C., & Chen, C. H. (2011). Re-visiting college students' attitudes toward the Internet-based on a 6-T model: Gender and grade level difference. Computers & Education, 56(4), 939-947.
Chou, C., Wu, H. C., & Chen, C. H. (2013). Tool, toy, telephone, territory, trade, or treasure of information: a cross-sectional study of Taiwanese students' attitudes toward the Internet. Chinese_ Journal of Communication, 6(2), 202-220.
Chou, C., Yu, S. C., Chen, C. H., & Wu, H. C. (2009). Tool, toy, telephone, territory, or treasure of information: Elementary school students' attitudes toward the Internet. Computers & Education, 53(2), 308-316.
Cohen, L. E., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44(4), 588-608.
Danquah, P., & Longe, O. B. (2011). An Empirical Test of the Space Transition Theory of Cyber Criminality: The Case of Ghana and Beyond. African Journal of Computing & ICTs, 4(2), 37-48.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35(8), 9821003.
Duggan, A., Hess, B., Morgan, D., Kim, S., & Wilson, K. (2001). Measuring students' attitudes toward educational use of the Internet. Journal of Educational Computing Research, 25(3), 267-281.
Dutton, W. H., & Blank, G. (2013), Cultures of the Internet: The Internet in Britain, Oxford Internet survey 2013 Report. Oxford: Oxford Internet Institute.
Dutton, W. H., & Blank, G. (2015), Cultures on the Internet, InterMedia, Winter 2014/15, 42(4/5), 55-57.
Eastman, J. K., & Iyer, R. (2004). The elderly's uses and attitudes towards the Internet. _Journal of Consumer Marketing, 21(3), 208-220.
Eiamkanchanalai, S., & Assarut, N. (2016). Consumer innovativeness and opinion leadership: revisiting consumer characteristics in new product diffusion model. Global Business and Economics Review, 18(1), 15-27.
Fenech, T. (1998). Using perceived ease of use and perceived usefulness to predict acceptance of the World Wide Web. Computer Networks and ISDN Systems, 30(1-7), 629-630.
Goldfarb, A., & Prince, J. (2008). Internet adoption and usage patterns are different: Implications for the digital divide. Information Economics and Policy, 20(1), 2-15.
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford University Press.
Holt, T. J., & Bossler, A. M. (2008). Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization. Deviant Behavior, 30(1), 1-25.
Holt, T., & Bossler, A. M. (2016). Cyber crime in progress: theory and prevention of technologyenabled offenses. Abingdon, Oxon: Routledge.
Holt, T., Bossler, A. M., & Spellar, S. K. (2015). Cyber crime and Digital Forensics. Abingdon, Oxon: Routledge.
Jackson, L. A., Von Eye, A., Barbatsis, G., Biocca, F., Zhao, Y., & Fitzgerald, H. E. (2003). Internet attitudes and Internet use: Some surprising findings from the HomeNetToo project. International Journal of Human-Computer Studies, 59(3), 355-382.
Jaishankar, K. (2007). Establishing a theory of cyber crimes. International Journal of Cyber Criminology, 1(2), 7-9.
Jaishankar K., (2008). Space Transition Theory of Cyber Crimes. In Schmallager, F., & Pittaro, M. (Eds.), Crimes of the Internet (pp. 283-301). Upper Saddle River, NJ: Prentice Hall.
Kethineni, S., Cao, Y., & Dodge, C. (2018). Use of bitcoin in darknet markets: Examining facilitative factors on bitcoin-related crimes. American Journal of Criminal Justice, 43(2), 141-157.
Kotler, P., Kartajaya, H., & Setiawan, I. (2016). Marketing 4.0: moving from traditional to digital. John Wiley & Sons.
Liaw, S. S. (2002). An Internet survey for perceptions of computers and the World Wide Web: relationship, prediction, and difference. Computers in Human Behavior, 18(1), 1735.
McKenna, K. Y., & Bargh, J. A. (2000). Plan 9 from cyberspace: The implications of the Internet for personality and social psychology. Personality and Social Psychology Review, 4(1), 57-75.
Moon, J. W., & Kim, Y. G. (2001). Extending the TAM for a World-Wide-Web context. Information & Management, 38(4), 217-230.
Moore, R. (2012). Cyber crime: investigating high-technology computer crime. Abingdon, Oxon: Routledge.
Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt and B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and Implications (pp. 1-17). IGI Global: Hershey, PA.
Nash, J. B., & Moroz, P. A. (1997). An examination of the factor structures of the computer attitude scale. Journal of Educational Computing Research, 17(4), 341-356.
Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5, 773793.
Porter, C. E., & Donthu, N. (2006). Using the technology acceptance model to explain how attitudes determine Internet usage: The role of perceived access barriers and demographics. Journal of business research, 59(9), 999-1007.
Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47, 267-296.
Srisuphaolarn, P., & Assarut, N. (2017). The Influence of Corporate Social Responsibility on Work Engagement and Organizational Commitment. Chulalongkorn Business Review, 38(4), 68-92.
Statista (2018) Number of monthly active Facebook users worldwide as of 4th quarter 2017 (in millions) Retrieved from https://www.statista.com/statistics/264810/number-ofmonthly-active-facebook-users-worldwide/.
Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664-670.
Tade, O. (2013). A spiritual dimension to cybercrime in Nigeria: The 'yahoo plus' phenomenon. Human Affairs, 23(4), 689-705.
Tan, L., & Wang, N. (2010, August). Future internet: The internet of things. In 2010 3rd international conference on advanced computer theory and engineering (ICACTE), 5, V5-376.
Teo, T., Lee, C. B., & Chai, C. S. (2008). Understanding pre - service teachers' computer attitudes: applying and extending the technology acceptance model. Journal of Computer Assisted Learning, 24(2), 128-143.
Tsai, C. C., & Lin, S. S. (2001). Analysis of attitudes toward computer networks and Internet addiction of Taiwanese adolescents. CyberPsychology & Behavior, 4(3), 373376.
Van Deursen, A. J., van Dijk, J. A., & Peter, M. (2015). Increasing inequalities in what we do online: A longitudinal cross sectional analysis of Internet activities among the Dutch population (2010 to 2013) over gender, age, education, and income. Telematics and Informatics, 32(2), 259-272.
Wada, F., Longe, & O. Danquah (2012). Action Speaks Louder than Words: Understanding Cyber Criminal Behavior Using Criminological Theories. Journal of Internet Banking and Commerce, 17(1), 1.
Wall, D. S. (2001). Cyber crimes and the internet. In D. Wall (ed.) Crime and the Internet (pp. 1-17). London: Routledge.
Wall, D. S. (2011). Policing Cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research: An International Journal, 8, 183205.
Yar, M. (2005). The Novelty of "Cybercrime" An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2(4), 407-427.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2019. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Space Transition Theory is one of the key theories that explain why people commit cyber crime. However, past research in the field has mainly used qualitative research methods. This is because there has been a lack of quantitative tools to measure the concept in a large-scale survey. This research proposes a measurement of attitudes towards cyberspace based on Space Transition Theory. The analysis results identify the three factors in attitudes towards cyberspace, namely anonymity, freedom and insecurity, which are then used to classify 487 Thai respondents into five groups. The sociodemographic profiles and the tendency to commit crime-related behaviours in cyberspace compared to physical space are explored for each group. We find that freedom and anonymity are key factors in the behavioural intention to commit cyber crime. The results help us identify people who have the greatest tendency to commit cyber crime. This allows us to make recommendations for law amendments and prosecution improvements.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 Associate Professor, Marketing Department, Chulalongkorn Business School, Chulalongkorn University, Phyathai Road, Bangkok 10330, Thailand
2 Assistant Professor, Faculty of Law, Chulalongkorn University, Phyathai Road, Bangkok 10330, Thailand




