COAS
Center for Open Access in Science (COAS)
OPEN JOURNAL FOR PSYCHOLOGICAL RESEARCH (OJPR)
ISSN (Online) 2560-5372 * ojpr@centerprode.com

OJPR Home

2018 - Volume 2 - Number 2


Cyberdeviance and the Role of Data Privacy Officer’s Sustainable Structures in its Prevention

Silva Ibrahimi * ibrahimi.silva@gmail.com * ORCID: 0000-0003-3233-1157 * ResearcherID: N-5693-2018
Albanian University, Faculty of Social Sciences, Department of Psychology and Research Center

Eglantina Dervishi * egladervishi@gmail.com
University of Tirana, Faculty of Social Sciences, Department of Psychology and Pedagogy

Ervin Ibrahimi * ervinibrahimi@klikitalia.eu
Security Council, Italy

Open Journal for Psychological Research, 2018, 2(2), 61-68 * https://doi.org/10.32591/coas.ojpr.0202.02061i
Online Published Date: 12 December 2018

LICENCE: Creative Commons Attribution 4.0 International License.

ARTICLE (Full Text - PDF)


KEY WORDS: cyber deviant behavior, digitalization technology, DPO, national security, prevention.

ABSTRACT:
Prevention is undoubtedly one of the core items of todays’ health and social care. Massmedia, technology and the information technology system are of the most influential tools in the cognitive and psychological development of a person’s social life. The objective of the present article is to explore some of the basic aspects of the relationship between cyber deviant behaviors and the role of order security and cyber security structures such as the Data Privacy Officers (DPO) that exist in the cyber-digitalization preventing process. This article intersects the core aspects of deviant cyber subculture and the role of DPO officers in the screening and prevention of criminal extreme acts. The implementation of misguided protection strategies and consumer safety from hazardous navigation and risky online behaviors directly affects the growth of passive and active criminality, qualitative changes of attitudes and behaviors by pointing more towards antisocial personalities and rising risks for a broader   national and regional security.

CORRESPONDING AUTHOR:
Silva Ibrahimi, Lagjia “Beqir Dardha”, rr.11 Nendori, p.41/6, Ap., Elbasan 3001, ALBANIA. E-mail: silva.ibrahimi@yahoo.it.


REFERENCES:

Agastra, A., Ibrahimi, S., & Ibrahim, E. (2017). Profilet psikologjike, domosdoshmëri për hetimin [Psychological profiles, necessity for investigation]. Pg. 173.

Bamberger, K. A., & Mulligan, D. K. (2011). Privacy on the books and on the ground (18 November 2011), Stanford Law Review, Volume 63, January 2011; UC Berkeley Public Law Research Paper No. 1568385. Online: www.ssrn.com/abstract=1568385.

Berg, T. (2007). The changing face of cybercrime — New Internet threats create challenges to law enforcement. Michigan Bar Journal 2007, 18-22.

CSI and FBI (2004). Computer Crime and Security Survey. San Francisco.

Gercke, M. (2006). The slow wake of a global approach against cybercrime. Computer Law Review International. 140-145.

Gercke, M. (2009). Understanding cybercrime: A guide for developing countries. Geneva: ITU. Online:  www.itu.int/ITU-D/cyb/cybersecurity/legislation.htm.

Ealy, K. (2003). A new evolution in hack attacks: A general overview of types, methods, tools, and prevention. https://cyber-defense.sans.org/resources/papers/gsec/evolution-hack-attacks-general-overview-types-methods-tools-prevention-105082.

Interpol (2016). Crimes against children. Factsheet, pg 11.

Kozlovski, N. (2005). A paradigm shift in online policing — Designing accountable policing. Yale Law School Dissertation.

Long, J., Skoudis, E., & van Eijkelenborg, A. (2005). Google hacking for penetration testers. Syngress.

Lovet, G. (2009). Fighting cybercrime: Technical, juridical and ethical challenges, Virus Bulletin Conference, September 2009.

Putnam, T. L. & Elliott, D. D. (2001). International responses to cybercrime. In: A. D. Sofaer & S. E. Goodman (Eds.), Transnational Dimension of Cyber Crime and Terrorism (pp. 31-67). Hoover Institution Press.

Quille, M. (2009). Keynote address. Current threats and future challengesposed by cybercrime. Octopus Conference, CoE.

Rash, H. et al. (2009). Crime online. Cybercrime and illegal innovation. NESTA. Research Report. July.

Roth, B. (2005). State sovereignty, international legality, and moral disagreement. Oxford University Press.

Sieber, U. (2000). Legal Regulation, Law Enforcement and Self-regulation. In: J. Watermann & M. Machill, M. (Eds.), Protecting Our Children on the Internet, Gütersloh, Bertelsmann Foundation Publishers.

Sieber, U. (2010). Internet Crimes — Annex 1 to the Questionnaire for the 18th International Congress of the IACL.

Sofaer, A. D. & Goodman, S. E. (2001). Cybercrime and security — The transnational dimension. In: A. D. Sofaer & S. E. Goodman (Eds.), Transnational Dimension of Cyber Crime and Terrorism. Hoover Institution Press.

Vogel, J. (2007). Towards a global convention against cybercrime. World Conference on Penal Law, Guadalajara, Mexico.

Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within syberspace. Police Practice and Research, 8(2).

----- (1995). European Parliament and Council Directive 95/46/EC of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Regulation (EU) 2016/679 of the European Parliament and the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free.


© Center for Open Access in Science