Who You Gonna Call?: Cybercrime Types and Expectations of Police Response

Who You Gonna Call?: Cybercrime Types and Expectations of Police Response

Notes:
  • Cybercrime is often treated as a distinct phenomenon, but there are strong continuities with offline crime that are frequently overlooked.
  • Digital technologies change behaviour and scale, but do not fundamentally alter the social dynamics underlying crime.
  • There is a significant gap between the harms experienced by individuals and the institutions available to respond to those harms.
  • Federal law enforcement has expanded cyber capabilities, but local and state-level responses to individual victimization remain limited.
  • Private sector actors, particularly financial institutions, play a major role in responding to financially motivated cybercrime.
  • Non-financial cyber harms, such as sextortion or image-based abuse, often fall outside both private and public response systems.
  • In the absence of clear response pathways, private companies are emerging to fill the gap, sometimes exploiting victims seeking help.
  • Public attitudes toward police in cybercrime contexts are shaped by perceptions that police do not care or are unable to help.
  • These attitudes mirror broader perceptions of policing, indicating continuity between offline and online trust dynamics.
  • Perceptions of police capability differ depending on the type of cybercrime:
    • Computer-focused crimes (e.g., malware) are associated with lower perceived police usefulness
    • Interpersonal cybercrimes (e.g., sextortion) are associated with higher perceived police relevance
  • Perceived likelihood of victimization reduces confidence in police effectiveness, while fear increases it.
  • Gender differences emerge, with men less likely to believe police can help in cybercrime contexts.
  • A central problem is definitional ambiguity:
    • There is no consistent definition of cybercrime across agencies
    • This limits measurement, comparison, and policy design
  • Reporting systems are fragmented and often poorly understood by the public.
  • Cybercrime often involves chains of offences, making classification and response assignment difficult.
  • Comparative research suggests that investment and coordination can improve public confidence, but large-scale successes do not always translate to individual-level trust.
About our guest:

Rachel McNealey

https://www.linkedin.com/in/rachel-mcnealey-4b8720284/

Papers or resources mentioned in this episode:

McNealey, R. L., Figueroa, C. I., & Maher, C. A. (2025). “Police can't help you”: Exploring influences on perceptions of policing cybercrime. Journal of Criminal Justice, 101, 102542. https://doi.org/10.1016/j.jcrimjus.2025.102542

Hale, R., & Penzendstadler, N. (2025, March 20). Digital forensics firms promise help to sextortion victims. Some leave them worse off. USA Today. https://www.usatoday.com/story/life/health-wellness/2025/03/20/digital-forensics-sexortion-blackmail-recovery-services/81934584007/

Other:

Avsnitt(129)

Public Interest Technology: Making Sense of Security in an AI World

Public Interest Technology: Making Sense of Security in an AI World

Notes: The conversation begins with his path into teaching public policy, despite never having planned a conventional academic career, and why translating technical subjects for non-technical studen...

1 Maj 34min

Disordered Sense-Making: Conflict Narratives in the Digital Era

Disordered Sense-Making: Conflict Narratives in the Digital Era

Notes: Dr Samuel Tanner began his doctoral research examining war crimes and armed militias involved in mass violence in the Balkans, conducting extensive fieldwork and interviews with participants ...

1 Mars 36min

Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders

Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders

Notes:Dr Bekkers describes his academic pathway from psychology to criminology and explains why his research focus has consistently been on offenders and their behaviour rather than on offences or tec...

1 Feb 25min

Systematically Improving Cybersecurity Training

Systematically Improving Cybersecurity Training

Notes:Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training.The discussion explores the ro...

1 Jan 49min

The Human beneath the Hoodie: Profiling pathways into cybercrime

The Human beneath the Hoodie: Profiling pathways into cybercrime

otes:Melissa completed her PhD after two decades of operational work, bringing a pracademic perspective to cyber profiling and offender pathways.Her research focuses on understanding the human behind ...

1 Dec 202533min

Courses, Clicks and Consequences: Empiricizing Enterprise Security

Courses, Clicks and Consequences: Empiricizing Enterprise Security

Episode Notes:Dr Ho describes an empirical research agenda focused on how security actually operates in organisations. He explains his experience with getting this research off the ground to allow the...

1 Nov 20251h 4min

The many minds of MITRE: building multidisciplinary human insider-risk research

The many minds of MITRE: building multidisciplinary human insider-risk research

Trigger warning: This episode includes discussion of suicide in the context of researching measurable predictive indicators and the lack thereof in the context of cyber. Episode NotesDr Caputo's path ...

1 Okt 202544min

Populärt inom Utbildning

historiepodden-se
rss-bara-en-till-om-missbruk-medberoende-2
det-skaver
nu-blir-det-historia
harrisons-dramatiska-historia
not-fanny-anymore
rss-viktmedicinpodden
johannes-hansen-podcast
allt-du-velat-veta
rss-foraldramotet-bring-lagercrantz
sektledare
roda-vita-rosen
i-vantan-pa-katastrofen
sa-in-i-sjalen
rss-max-tant-med-max-villman
rss-sjalsligt-avkladd
rikatillsammans-om-privatekonomi-rikedom-i-livet
sex-pa-riktigt-med-marika-smith
rss-relationsrevolutionen
rss-pa-insidan-med-bjorn-rudman