Who You Gonna Call?: Cybercrime Types and Expectations of Police Response

Who You Gonna Call?: Cybercrime Types and Expectations of Police Response

Notes:
  • Cybercrime is often treated as a distinct phenomenon, but there are strong continuities with offline crime that are frequently overlooked.
  • Digital technologies change behaviour and scale, but do not fundamentally alter the social dynamics underlying crime.
  • There is a significant gap between the harms experienced by individuals and the institutions available to respond to those harms.
  • Federal law enforcement has expanded cyber capabilities, but local and state-level responses to individual victimization remain limited.
  • Private sector actors, particularly financial institutions, play a major role in responding to financially motivated cybercrime.
  • Non-financial cyber harms, such as sextortion or image-based abuse, often fall outside both private and public response systems.
  • In the absence of clear response pathways, private companies are emerging to fill the gap, sometimes exploiting victims seeking help.
  • Public attitudes toward police in cybercrime contexts are shaped by perceptions that police do not care or are unable to help.
  • These attitudes mirror broader perceptions of policing, indicating continuity between offline and online trust dynamics.
  • Perceptions of police capability differ depending on the type of cybercrime:
    • Computer-focused crimes (e.g., malware) are associated with lower perceived police usefulness
    • Interpersonal cybercrimes (e.g., sextortion) are associated with higher perceived police relevance
  • Perceived likelihood of victimization reduces confidence in police effectiveness, while fear increases it.
  • Gender differences emerge, with men less likely to believe police can help in cybercrime contexts.
  • A central problem is definitional ambiguity:
    • There is no consistent definition of cybercrime across agencies
    • This limits measurement, comparison, and policy design
  • Reporting systems are fragmented and often poorly understood by the public.
  • Cybercrime often involves chains of offences, making classification and response assignment difficult.
  • Comparative research suggests that investment and coordination can improve public confidence, but large-scale successes do not always translate to individual-level trust.
About our guest:

Rachel McNealey

https://www.linkedin.com/in/rachel-mcnealey-4b8720284/

Papers or resources mentioned in this episode:

McNealey, R. L., Figueroa, C. I., & Maher, C. A. (2025). “Police can't help you”: Exploring influences on perceptions of policing cybercrime. Journal of Criminal Justice, 101, 102542. https://doi.org/10.1016/j.jcrimjus.2025.102542

Hale, R., & Penzendstadler, N. (2025, March 20). Digital forensics firms promise help to sextortion victims. Some leave them worse off. USA Today. https://www.usatoday.com/story/life/health-wellness/2025/03/20/digital-forensics-sexortion-blackmail-recovery-services/81934584007/

Other:

Jaksot(129)

Public Interest Technology: Making Sense of Security in an AI World

Public Interest Technology: Making Sense of Security in an AI World

Notes: The conversation begins with his path into teaching public policy, despite never having planned a conventional academic career, and why translating technical subjects for non-technical studen...

1 Touko 34min

Disordered Sense-Making: Conflict Narratives in the Digital Era

Disordered Sense-Making: Conflict Narratives in the Digital Era

Notes: Dr Samuel Tanner began his doctoral research examining war crimes and armed militias involved in mass violence in the Balkans, conducting extensive fieldwork and interviews with participants ...

1 Maalis 36min

Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders

Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders

Notes:Dr Bekkers describes his academic pathway from psychology to criminology and explains why his research focus has consistently been on offenders and their behaviour rather than on offences or tec...

1 Helmi 25min

Systematically Improving Cybersecurity Training

Systematically Improving Cybersecurity Training

Notes:Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training.The discussion explores the ro...

1 Tammi 49min

The Human beneath the Hoodie: Profiling pathways into cybercrime

The Human beneath the Hoodie: Profiling pathways into cybercrime

otes:Melissa completed her PhD after two decades of operational work, bringing a pracademic perspective to cyber profiling and offender pathways.Her research focuses on understanding the human behind ...

1 Joulu 202533min

Courses, Clicks and Consequences: Empiricizing Enterprise Security

Courses, Clicks and Consequences: Empiricizing Enterprise Security

Episode Notes:Dr Ho describes an empirical research agenda focused on how security actually operates in organisations. He explains his experience with getting this research off the ground to allow the...

1 Marras 20251h 4min

The many minds of MITRE: building multidisciplinary human insider-risk research

The many minds of MITRE: building multidisciplinary human insider-risk research

Trigger warning: This episode includes discussion of suicide in the context of researching measurable predictive indicators and the lack thereof in the context of cyber. Episode NotesDr Caputo's path ...

1 Loka 202544min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
adhd-podi
rss-niinku-asia-on
rss-liian-kuuma-peruna
rss-rahamania
jari-sarasvuo-podcast
psykologia
rss-valo-minussa-2
rss-tietoinen-yhteys-podcast-2
kesken
rss-arkea-ja-aurinkoa-podcast-espanjasta
rss-narsisti
rss-vapaudu-voimaasi
rahapuhetta
filocast-filosofian-perusteet
ihminen-tavattavissa-tommy-hellsten-instituutti
kehossa
rss-psykalab