Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Faceless-Oriented Policing: Traditional Policing Theories are Not Adequate in a Cyber World

View through CrossRef
This article examines traditional policing theories in a cyber world and defines ‘Faceless-Oriented Policing’ (FOP). FOP policing theory is centred on cyber-world crimes. Many traditional policing theories do not apply when crimes are committed online. FOP has multiple tenets outlining the explanation of policing utilising the internet as a faceless venue to commit crimes and how to investigate these crimes. Problem-Oriented Policing (POP) and Community-Oriented Policing (COP) are two of the most popular policing theories utilised today in the United States. These strategies, while successful in response to conventional crime, are not easily applied to cyber crimes. Getting close to the community is really not the solution. The visible aspects of much of these offences are absent or drastically altered. In the event that detection is possible, one must contend with the escalation of certain activities online due to the overall perception that they are not detectable. The internet has not created new vices. It has made many traditional vices more accessible to the general public. If the public can remain anonymous while committing crimes, some people will become more willing to pursue these vices. The internet has also allowed a person to practise these vices around the world rather than in just their own small segment of the world.
Title: Faceless-Oriented Policing: Traditional Policing Theories are Not Adequate in a Cyber World
Description:
This article examines traditional policing theories in a cyber world and defines ‘Faceless-Oriented Policing’ (FOP).
FOP policing theory is centred on cyber-world crimes.
Many traditional policing theories do not apply when crimes are committed online.
FOP has multiple tenets outlining the explanation of policing utilising the internet as a faceless venue to commit crimes and how to investigate these crimes.
Problem-Oriented Policing (POP) and Community-Oriented Policing (COP) are two of the most popular policing theories utilised today in the United States.
These strategies, while successful in response to conventional crime, are not easily applied to cyber crimes.
Getting close to the community is really not the solution.
The visible aspects of much of these offences are absent or drastically altered.
In the event that detection is possible, one must contend with the escalation of certain activities online due to the overall perception that they are not detectable.
The internet has not created new vices.
It has made many traditional vices more accessible to the general public.
If the public can remain anonymous while committing crimes, some people will become more willing to pursue these vices.
The internet has also allowed a person to practise these vices around the world rather than in just their own small segment of the world.

Related Results

Hot Spots Policing
Hot Spots Policing
Since the 1980s, the nature of policing has expanded beyond a person-focused approach to include a location-based approach. Recently developed proactive policing strategies that ar...
Technology in policing, policing in a technological society. Special Issue brief
Technology in policing, policing in a technological society. Special Issue brief
Watson and Huey, in a 2020 article in this Journal, point out that there is still little empirical research offering a practice-focused perspective. This Special Issue responds to ...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Legitimacy in Policing: A Systematic Review
Legitimacy in Policing: A Systematic Review
This Campbell systematic review assesses the direct and indirect benefits of public police interventions that use procedurally just dialogue. The review summarises findings from 30...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
Abstrak Artikel ini menyajikan hasil pelaksanaan cyber extension yang dilaksanakan oleh penyuluh agama Kota Semarang, serta efektifitas dari pelaksanaannya. Cyber extension ...

Back to Top