Page 10 - THENIGERIAPOLICEFORCE AND CYBERPOLICINGASYNOPSIS
P. 10

Strengths of Routine Activities Theory


                   1)  RAT  has  informed  public  policy,  particularly  with  the  development  of  situational

                       crime prevention strategies intended to increase guardianship (Clarke, 1997).
                   2)  The  theory  provides  insights  on  individual-level  differences  in  victimization  and

                       offending (Baumer & Arnior, 2016).
                   3)  According to Siegel (2010), routine activities theory explains how victim’s behavior

                       can influence criminal opportunity.


               Weaknesses of Routine Activities Theory


                   1)  Researchers that try to apply this theory on cybercrimes focused on individuals. They

                       do  not  appear  to  be  literatures  testing  RAT  on  nations  that  perpetrate  cybercrimes

                       (Kigerl, 2012).
                   2)  The capacity of RAT to explain patterns of cybercrime is questionable when Yar (as

                       cited in Leukeldt & Yar, 2016) stated that not all parts of RAT are translatable into
                       virtual environment.

                   3)  While  most  recent  researches  have  begun  to  explore  the  application  of  RAT  to
                       cybercrime,  most  of  the  existing  literature  focused  on  victimization  rather  than

                       offending (Phillips, 2015).


               In  contemporary  world,  people,  corporations  and  governments  are  routinely  carrying  out

               several activities on the internet. It is alarming that, such activities increase target suitability
               and the likelihood of cybercrime offending. Researchers found that risky activities, such as

               frequently  visiting  unknown  websites,  downloading  games,  music  or  films,  increase  the
               likelihood of computer virus attacks on one’s gadgets. Providing personal information such

               as disclosure of credit card numbers or residential address and communicating with strangers
               on  social  networking  websites  increase  the  likelihood  of  cybercrime.  Also,  uploading

               expensive materials on social media enhances target attractiveness. Online businesses have

               high  propensity  to  cyber  attacks,  for  financial  gains  or  destruction  of  data.  Likewise,  the
               security of a country could be undermined through espionage and counterintelligence, mostly

               with  the  aid  of  Information  and  Communication  Technologies  (ICTs).  In  some  instances,
               cybercrimes  result  due  to  lack  of  cyber  security  awareness  amongst  internet  users,  which

               presents a serious condition of absence of guardianship. Therefore, internet users are likely to
               be  protected  if  conventional  policing  could  evolve  to  cyberspace,  whereby  the  police  and




                                                           10
   5   6   7   8   9   10   11   12   13   14   15