DOI QR코드

DOI QR Code

Analysis of Psychological Factors Inducing Cybercrime

사이버범죄를 유발하는 심리적요인 분석

  • Received : 2021.03.05
  • Accepted : 2021.04.17
  • Published : 2021.05.31

Abstract

This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

본 연구는 사이버범죄를 유발하는 개인의 심리적인 요인이 무엇인지 찾고자 하였다. 설문은 해킹 등 사이버 범죄유형 11가지에 대해 전·현직 수사관과 보안전문가를 대상으로 실시하였으며, 범죄를 유발하는 내부요인을 16가지로 선정하고 매슬로우 욕구 5단계에 따라 분류하였다. 총176개 항목에 대한 설문 조사결과 신뢰성을 나타내는 크롬바 알파 계수가 0.925로 신뢰성이 있었으며, 요인분석 결과 매슬로우 1단계 생리욕구는 상업성, 사익추구로, 2단계 안전욕구는 처벌인지부족과 군중심리로, 3단계 사회욕구는 충동성, 무관심, 사회성결여, 사회적마찰, 분노표시, 과대망상으로, 4단계 존경욕구는 익명성, 명예욕이며, 5단계 자아실현 욕구는 비인격성, 절제력부족, 도덕성결여, 매스컴영향으로 축소되었다. 결론적으로 사이버범죄를 유발하는 내부요인으로 「정보통신망 침해범죄」는 생리욕구, 존경욕구 순이며, 「정보통신망 이용범죄」는 생리욕구, 자아실현욕구순이며, 「불법콘텐츠범죄」는 자아실현욕구, 사회욕구 순이었다.

Keywords

References

  1. Jung W. "Phenomenon of cybercrime," Korean Journal Of Criminology KJC, Vol. 19, No. 2, pp. 9-32, 2017.
  2. Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors
  3. Cho YJ, Kim SY, & Park HH. "Tools and Indices of Crime Risk Assessment for More Effective CPTED Practice," Police Science Institute, Vol. 30, No. 3, pp. 385-421, 2016.
  4. Park CW. "A Study on Effective Response of Police Officer against Cybercrime," Journal of The Korea Society of Computer and Information, Vol. 13, No. 3, pp. 189-196, 2008.
  5. Lee MS. "The Reactions to Cybercrime Victimization," Test a General Model. Korean Journal of Victimology, Vol. 10, No. 2, pp. 209-247, 2002.
  6. Lee YP, Kim TS, & Yoo JH. "Measurement of Economic Costs of Cybersecurity Breaches in South Korea," Korea Business Review, Vol. 24, No. 2, pp. 143-164, 2020. https://doi.org/10.17287/kbr.2020.24.2.143
  7. Song HR, Kim CW, & Kim WJ. "Effects of Public's Media Dependency Risk Severity and Subjective Knowledge on Preventive Behavior Intention of Cyber Crime," Crisisonomy, Vol. 10, No. 5, pp. 83-100, 2014.
  8. Net Losses, "Estimating the Global Cost of Cybercrime, Economic impact of cybercrime II," Center for Strategic and International Studies, June, 2014.
  9. Lee SH, I. Kang WY, Jung H, & Kim HW. "Analysis of Cyber Crime and Its Characteristics," Information Systems Review, Vol. 21, No. 3, pp. 1-26, 2019. https://doi.org/10.14329/isr.2019.21.3.001
  10. Lee YH, Kim DW, & Yoo YJ. "A Study on Routine Activity and Cyber-Crime Victimization in Cyberspace," korean Journal of Public Safety and Criminal Justice, Vol. 20, No. 3, pp. 213-240, 2011.
  11. Kim SW, & Jo HB. "Prevention Methods of Cyber-crimes using the Private Security," The Journal of the Korea Contents Association, Vol. 13, No. 3, pp. 141-151, 2013. https://doi.org/10.5392/JKCA.2013.13.03.141
  12. Shin HJ, Lee KB, & Park TH. "Association Analysis on The Completion Rate of Security education and Cyber Terror Response According to Personal and Job characteristics," Journal of the Korea Society of Digital Industry and Information Management, Vol. 10, No. 4, pp. 97-107, 2014. https://doi.org/10.17662/ksdim.2014.10.1.097
  13. Kim KH, & Eom JH. "A Study on the Model of Training Performance Measurement Specialized toCyber Security Trainee for Cyber Security Professionals Acquisition," Journal of the Korea Society of Digital Industry and Information Management, Vol. 12, No. 4, pp. 59-69, 2016. https://doi.org/10.17662/ksdim.2016.12.4.059
  14. EOM JH. "A Study on the Capability of Cyber Security Education and Training Professional Personnel," Journal of the Korea Society of Digital Industry and Information Management, Vol. 15, No. 1, pp. 43-51, 2019. https://doi.org/10.17662/KSDIM.2019.15.1.043
  15. Choi HS, & Kim HG. "The Countermeasure for Threat of Cyber Terror in Sociological Perspective," Journal of the Korea Society of Digital Industry and Information Management, Vol. 13, No. 11, pp. 59-67, 2017. https://doi.org/10.17662/ksdim.2017.13.1.059
  16. Kim T. A "Study on Violence and Countermeasures on Cyberspace Corruption," The journal of Convergence on Culture Technology, Vol. 5, No. 1, pp. 51-58, 2019. DOI : 10.17703/JCCT.2019.5.1.51