Smartphone Using Risk Behaviors For Cybercrime Victimisation : A Case Study Of Kasetsart University, Bang Khen Campus, Students

Chetsadaphong Khamchu, Seksan Khruakham

Abstract


In 2001, mobile phone users were only 20% of the world’s population, but the number of mobile phone users has dramatically increased to almost 100% of the world’s population in 2017. The rapid change of technology has also brought the rapid change in lifestyles of people. For instance, smartphones have become one of the most useful devices in modern society. However, using a smartphone can be vulnerable to higher technology-crime victimization. Therefore, it is interesting to study smartphone using risk behaviors of being a cybercrime victim. This quantitative research was conducted by collecting data from the samples of 400 Kasetsart University, Bang Khen Campus, students selected by using stratified sampling method. The data were collected through online questionnaires and analyzed by using descriptive statistics including frequency, percentage, mean, and standard deviation and referential statistics including t-test and F-test. The results show that place of birth of smartphone users caused a significant difference in risk behaviors for cybercrime victimization at the significant level of 0.05, meanwhile, gender, age, faculty, and residence did not cause any significant difference in risk behaviors. In addition, it was found that the number of smartphones, number of phone number in service, smartphone using duration, smartphone using duration for social media, and smartphone operation system caused some significant differences in risk behaviors for cybercrime victimization. There were 3 risk behaviors in a rather high level for being a victim of cybercrime including (1) careless smartphone using that makes it easy to be stolen, (2) setting up auto - log in for many applications, and (3) using public wifi to get an access to the internet. However, most of the risk behaviors for cybercrime victimization of the sampled smartphone users were found at a rather low level.


Full Text:

PDF

References


International Telecommunication Union. (2017). “Measuring the Information

Society Report Volume 1.” (online), URL: https://www.itu.int/en/ITUD/

Statistics/Documents/publications/misr2017/MISR2017_Volume1. pdf.

Kyung-Shick Choi. (2008). “Computer Crime Victimization and Integrated

Theory: An Empirical Assessment.” URL:

http://www.cybercrimejournal.com/Choiijccjan2008.htm. International Journal of Cyber Criminology, January-June 2008, Vol 2 (1), 308–333.

Marilyn McShane. (2013). “An Introduction to Criminological Theory.” Taylor & Francis Group. eBook ISBN: 9781135632663.

Martin A. A., and Graham F. (2015). “Criminal Act: The Role and Influence of Routine Activity Theory.” Palgrave Macmillan Limited. eBook ISBN: 9781137391322.

Seksan Khruakham. (2015). “Criminology and Criminal Justice.” Nakhonprathom. Thailand.

Thai-CERT. (2011). “Smartphone safety using principle from cyber-threat.” (online), URL: https://www.thai cert.or.th/papers/general/2011/pa2011ge010.html.

World Bank. (2018). “Individuals using the Internet (% of population).” (online),URL:https://data.worldbank.org /indicator/IT.NET.USER.ZS.

World Economic Forum. (2018). “The Global Risks Report 2018, 13th Edition.” (online), URL: http:// reports.weforum.org/global-risks-2018.


Refbacks

  • There are currently no refbacks.