INTRODUCTION
Smart cities promise to vastly improve and optimize urban service delivery by applying various information and communication technologies (ICT) (Karvonen, Cugurullo, and Caprotti Reference Karvonen, Cugurullo and Caprotti2019). Furthermore, smart cities’ key goals are to improve citizens’ quality of life, promote economic growth and reduce the human ecological footprint through sustainability (Deloitte 2015). Regarding global population figures, 55% of the world’s current population now lives in urban city areas, likely to grow to 68% by the year 2050 (United Nations 2018). In South Africa, the implementation of smart city initiatives has been limited to mere elements of a smart city, mainly installing smart electricity meters and limited smart city ICT projects (Foster Reference Foster2020). However, plans for developing South Africa’s first ground-up built new smart city in the region, titled “The Lanseria Airport City”, are underway (BusinessTech 2020). The new smart city is also one of 19 “Mega City” projects, including constructing multiple mixed-use smart city developments in the province (Gauteng Department of Human Settlements 2018). Despite the various benefits of smart cities, cybersecurity risks remain significant and could have catastrophic implications (Barlow and Levy-Bencheton Reference Barlow and Levy-Bencheton2019).
Criminological theories form the basis of understanding and explaining the reasons behind why individuals commit a crime (Newburn Reference Newburn2017). From theories, a substantial amount of empirical research has been conducted to increase knowledge of the motivations and other factors behind the causation of crime (Akers, Sellers, and Jennings Reference Akers, Sellers and Jennings2016). Moreover, the rise in popularity and usability of computer technology and the Internet has led to the growth of crimes such as online fraud, hacking and the distribution of malicious malware (Holt and Bossler Reference Holt and Bossler2017).
This newfound “cyberspace” influenced the ideological perspectives of criminologists and forced researchers to start deliberating on how much “cybercrime” diverged from traditional crime (Grabosky Reference Grabosky2001; Wall Reference Wall1998). Grabosky (Reference Grabosky2001) claimed that the fundamental motivations to commit a crime (financial gain, power) are relevant to traditional theories and that technology was now a new avenue to conduct a crime. Wall (Reference Wall1998) acknowledged that certain real-world crimes have direct comparisons to cybercrimes (online fraud) but argued that there are also certain cybercrimes (hacking, distribution of malicious malware) that traditional theories could not adequately support. Wall (Reference Wall1998) motivates this notation that cybercrimes depend on an individual’s ability to gain knowledge on the function and exploitation of a specific computer or Internet technology. As a result, Jaishankar (Reference Jaishankar2007a:2) conceptualized cybercriminology as “the study of causation of crimes that occur in cyberspace and its impact in the physical space”. He argues that cybercriminology is a multidisciplinary field that includes researchers from various fields such as criminology, victimology, sociology, psychology and computer science.
This paper argues that criminological theories inform cybersecurity risks in smart cities. The theoretical underpinning of this article encompasses theories evolving from the positivist school of thought and taking on a subcultural perspective on cybercrimes. Additionally, this paper intends to showcase how selected criminological theories can be used to explain cybercrimes in smart cities. Subsequently, the paper contributes to the body of knowledge related to the theories (Crawford Reference Crawford, Burkholder, Cox, Crawford, Hitchcock and Patton2020).
Traditional theory, subcultural theory, new theoretical paradigms and an integrated model of multiple theoretical perspectives enlighten this paper. Therefore, the following theories are used to contextualize cybercrimes in smart cities:
-
Social learning theory
-
Neutralization theory
-
Code of the street theory
-
Space transition theory
-
Actor-network theory (ANT)
-
Integrated model theory
OVERVIEW OF SMART CITIES
The concept of a smart city has been around for many years. Although adoption has been slow, the potential is evident in various city sectors (Allam Reference Allam2021). Smart cities consist of highly sophisticated forms of technology and require the partnership of numerous local and international stakeholders (Ferreira Reference Ferreira2021). In sum, a smart city is a complex “system of systems, of both traditional systems, such as critical infrastructure as well as new ones resulting from emerging technologies, such as virtualisation, sensor networks, and others”. Furthermore, three fundamental elements driving smart city initiatives consist of physical, social and technological infrastructures (British Standards Institution 2014:3; International Organization for Standardization and International Electrotechnical Commission (ISO/IEC) 2015:2).
Merely a decade ago, the concept of a smart city seemed like a utopian fantasy driven by unrealistic technological advancements. However, over the last few years, smart urbanization has formed a significant part of numerous urban projects in cities around the globe (Karvonen et al. Reference Karvonen, Cugurullo and Caprotti2019). The rise of the Internet of Things (IoT) technology has significantly enabled the development and feasibility of a smart city. IoT is, however, just one of the many technologies that are allowing the smart city concept to become a reality (Allam Reference Allam2021). Other modern technologies, such as broadband Internet connections, artificial intelligence and ICT systems, have fundamentally changed how cities function and ultimately form the critical infrastructure of smart cities (Pelton and Singh Reference Pelton and Singh2018). Global population figures show that 55% of the world’s current population now live in urban city areas, likely to grow to 68% by the year 2050 (United Nations 2018). The planet is therefore fast becoming urbanized. Digital social market studies indicate that the continuing trend of urbanization will have a significant impact on the socio-economic environment within cities (White and Marchet Reference White, Marchet and Ferreira2021).
Smart cities aim to improve citizens’ quality of life and the efficiency of public services by optimizing the digital integration of the IoT and ICT systems with the current city infrastructure to create a fair and sustainable operational system (Akhuseyinoglu and Joshi Reference Akhuseyinoglu, Joshi, Al-Tudjman and Imran2020). Additionally, many smart IoT components, such as sensors, cameras and other related devices, are deployed throughout a smart city in places such as houses, roads and buildings. These technologies generate massive amounts of “big data” and allow cities to gain valuable insights into their operations (Lozada, Arias-Pérez, and Perdomo-Charry Reference Lozada, Arias-Pérez and Perdomo-Charry2019). The use of ICT systems and IoT technologies enables the increased efficiency of energy grids, enhanced service delivery, and improved communications and transportation in smart cities (Ghosal and Halder Reference Ghosal, Halder and Mahmood2018). Furthermore, smart cities have the potential to improve planning strategies, enhance economic development, reduce pollution, lower energy consumption and implement a faster, more efficient infrastructure. As a result, commuting time will be reduced due to better transportation systems and a decrease in traffic accidents (Pelton and Singh Reference Pelton and Singh2018). Moreover, smart cities will enhance the safety of citizens with the assistance of IoT-connected devices to identify, prevent and minimize the impact of security risks. The reporting of crimes and other security issues will be improved with the increased reliance on IoT-connected devices such as closed-circuit television (CCTV) video surveillance systems, mobile applications and interactive kiosks (Le-Dang and Le-Ngoc Reference Le-Dang, Le-Ngoc, Maheswaran and Baddi2018).
Cybersecurity in smart cities has become increasingly important as the new era of digitalization and hyper-connectivity has created a wide range of new cybersecurity risks. Cybersecurity risks may have a profound impact on the functionality and feasibility of smart cities (Pandey, Peasley, and Kelkar Reference Pandey, Peasley and Kelkar2019). Cybersecurity risks refer to the level of exposure to harm within an organization that could result in a loss-occurring event due to a breach or attacks on the information system, technical infrastructure or technological devices (RSA Security 2019). Cyber-threats have been growing yearly, and recent trends in cybersecurity statistics reveal a considerable increase in cyberattacks targeting data and physical assets (World Economic Forum 2018).
CYBERCRIME AND ITS IMPACT ON CYBERSECURITY OF SMART CITIES
Major global smart city cybersecurity incidents include a global ransomware cyberattack that was distributed to 150 countries, encrypting over 300,000 computers resulting in an £92 million loss of income to the National Health Service of the United Kingdom (Woollaston-Webber Reference Woollaston-Webber2017). Singapore experienced the country’s worst-ever data breach when hackers stole the personal healthcare profiles of 1.5 million patients (Tham Reference Tham2018). In terms of cyber-warfare, the critical infrastructure of Ukraine was attacked by Russian hackers, which resulted in massive power outages, leading to blackouts in regions of the country (Kovacs Reference Kovacs2019). Recently, the largest fuel pipeline in the United States fell victim to a significant ransomware attack that forced the shutdown of operations for approximately one week, resulting in fuel panic-buying and countless fuel stations running out of supplies (Milman Reference Milman2021).
It has become increasingly difficult to prevent cyberattacks such as ransomware, data breaches and cyberterrorism (Pelton and Singh Reference Pelton and Singh2018). As a result, smart cities have the potential to become lucrative targets for cybercriminals, cyberterrorists and hackers capable of crippling a city’s operations through ransomware and other forms of cyberattacks (KPMG 2019).
In 2012, R42 million was stolen during a cyber-fraud incident at the South African Postbank. The cyber-fraud incident was carried out during the Christmas season when a Postbank employee fraudulently utilized the computer of a colleague who was on leave (Swart and Wa Africa Reference Swart and Wa Afrika2012). In 2012, the “Red October” cyber-espionage campaign was first detected. The campaign is believed to be a Russian state-sponsored operation (FireEye 2014) that utilized malware to steal sensitive information from many governments and private organizations worldwide (Valeriano and Maness Reference Valeriano and Maness2015). In South Africa, attackers sent an infected document via e-mail to numerous embassies, claiming to be from the Department of International Relations and Cooperation (ESET 2016).
Moreover, the South African Police Service (SAPS) fell victim to a data breach that exposed information related to approximately 16,000 whistle-blowers and victims. The cyberattack was politically motivated, as the hacking group “Anonymous” claimed that the data breach was in response to the killings of striking mineworkers at the Marikana mine by members of the SAPS (Roane Reference Roane2013; Tubbs Reference Tubbs2013). In July 2018, the hacktivist group “Black Team X” attacked and defaced the South African Presidency’s website. The socio-politically motivated attack prevented access to the website (Sicetsha Reference Sicetsha2018) in response to South Africa’s support of the independent state of Western Sahara, which Morocco claims to be a part of their country (Nxumalo Reference Nxumalo2018). In 2015, the adultery website Ashley Madison was hacked, and the personal information of 175,000 South African users was leaked online (Vermeulen Reference Vermeulen2015). The hackers claimed that the privacy breach was intended to expose companies’ morally dubious business model and their users, and their attempts were aimed at shutting the website down (Lee Reference Lee2015).
In October 2019, multiple South African banks were targeted by a distributed denial of service (DDoS) attack (Moyo Reference Moyo2019). The South African Banking Risk Information Centre confirmed the incidents and stated that the attacks were financially motivated and initiated by a ransom note delivered by e-mail to publicly available staff e-mail addresses (South African Banking Risk Information Centre 2019). Experian South Africa announced that it was investigating a major data breach that exposed the personal information of 24 million South Africans and 793,749 local businesses (South African Banking Risk Information Centre 2020). The data breach is believed to be financially motivated, as the data records are potentially worth millions of rands (Hosken Reference Hosken2020).
Furthermore, the COVID-19 pandemic has created increased risks for smart cities, businesses and individuals as they adapt to a revised operating model in the “new ordinary world” (Khan et al. Reference Khan, Iftikhar, Ali and Khalid2021). Kaspersky (2020) reported that cyberattacks soared in 2020 as South Africans increased their reliance on the Internet due to factors caused by the COVID-19 pandemic. Thus, the “new normal” concerning the role of digital technologies will probably create lucrative ground for cybercriminals to carry out a variety of cyberattacks at the present time and beyond (Mimecast 2021).
GOAL OF THE STUDY
This article is based on a more extensive study conducted by the first author (Cornelius Reference Cornelius2022). It accentuates the value of criminological theories to cybersecurity in smart cities. Thus, it is directed by the following research question: How can criminological theories inform cybersecurity in smart cities?
RESEARCH METHODOLOGY
Research Approach
The paper adopted a qualitative approach, contributing to a comprehensive and rich understanding of the phenomenon under study (Leavy Reference Leavy2017). The research study was exploratory as it examined a problem that had not been studied thoroughly (Patton Reference Patton2015). Due to the novelty of the phenomenon, a phenomenological research strategy was used. Phenomenological research is exploratory, intending to understand people’s perceptions, perspectives and experiences in a particular situation in the real world (Schurink, Schurink, and Fouché Reference Schurink, Schurink, Fouché, Fouché, Strydom and Roestenburg2021). The paper uses a conceptual approach in its research design because it is problem-focused and meticulously unpacks the research question. Thus, this conceptual paper endeavours to link traditional and contemporary criminological theories in exciting ways. Consequently, it provides introspection across disciplines, proposes multilevel perceptions, and expands the reader’s scope of thinking and reasoning regarding South African smart cities (Gilson and Goldberg Reference Gilson and Goldberg2015).
FINDINGS AND DISCUSSION
The paper’s findings are premised on three main contributions: traditional, new, and integrated criminological theories that inform cybersecurity in smart cities.
Traditional Criminological Theories Value Cybersecurity in South African Smart Cities
Social Learning Theory
Within the positivist perspective, social learning theory has been proved over the last five decades to be one of the most popular theories utilized by criminologists. The theory, developed by Akers (Reference Akers1998), has been used in countless studies to describe various criminal activities. The origins of the theory date back to the 1960s. It is considered an extension of Sutherland’s (1947) differential association theory. Sutherland (Reference Sutherland1947) argued that individuals gain an understanding of criminal behaviour through time spent with influential criminal groups. Akers (Reference Akers1998) expanded on that notion by arguing that the learning method of any behaviour, especially crime, includes the following four key components: (1) differential association; (2) favourable definitions; (3) differential reinforcement; and (4) imitation.
In terms of cybercrimes, the four key components can also be effectively used to explain the motives behind such criminal behaviour (Stalans and Donner Reference Stalans, Donner and Jahankhani2018). Differential association refers to social exchanges with others who offer motives, reasoning and supportive attitudes to commit cybercrime. Favourable definitions of committing cybercrimes refer to an individual’s attitude created from social interactions with deviant peers who support criminal behaviour (Akers Reference Akers1998). Favourable attitudes refer to an individual’s defiant mindset that the criminal act that they are committing is not immoral and not harmful to others. This reasoning allows individuals to feel that they are not accountable for the subsequent harm caused by their actions (Hinduja and Ingram Reference Hinduja and Ingram2008). Differential reinforcement refers to positive (rewards of cybercrimes) and negative reinforcements (being arrested by the authorities). Lastly, imitation/modelling refers to observing other individuals involved in criminal behaviour, including cybercrimes, and subsequently emulating such behaviour (Akers Reference Akers1998). From a South African perspective, Akers’ (Reference Akers1998) four key components can also be effectively used to explain the motives behind cybersecurity risks faced by South Africa’s smart cities.
The differential association could refer to online social exchanges, reasoning and supportive attitudes that result in individuals committing cybercrime in South African smart cities. The use of social media in South Africa is on the rise and, every day, more people are socializing online. In 2019, there were approximately 22.89 million social network users in South Africa, projected to grow to 26.81 million in 2025 (Statista 2021). Many dedicated websites, website forums and social media groups support subculture groups, enabling them to share information and support the various forms of cybercrime deviance (Stalans and Donner Reference Stalans, Donner and Jahankhani2018). Cybercrime activities in the form of cyberterrorism can be cultivated on websites and social media groups. These “virtual communities of hate” allow individuals to engage with others who may share similar beliefs and nefarious motives and, as such, support Akers’ (Reference Akers1998) differential association component within social learning theory. Research studies have found that hackers appear to function in a global subculture, which exchanges ideas and techniques on how to successfully commit cybercrimes (Holt Reference Holt, Smalleger and Pittaro2009; Holt et al. Reference Holt, Strumsky, Smirnova and Kilger2012). Hackers reported maintaining regular peer relationships with other hackers, either online, offline or both (Decary-Hetu, Morselli, and Leman-Langlois Reference Decary-Hetu, Morselli and Leman-Langlois2012; Holt Reference Holt, Smalleger and Pittaro2009; Holt and Kilger Reference Holt and Kilger2008). Multiple studies have utilized the social learning theory to indicate its ability to explain cybercrimes (Morris and Blackburn Reference Morris and Blackburn2009; Navarro and Marcum Reference Navarro, Marcum, Holt and Bossler2019; Skinner and Fream Reference Skinner and Fream1997). Therefore, the social exchanges, reasoning and support that individuals experience online could be the driving force behind cybercrimes committed in potential South African smart cities.
Favourable definitions could refer to an individual’s change of attitude created by continued visits to websites and social media groups that support and encourage online criminal behaviour in South Africa (Akers Reference Akers1998). The pro-criminal attitude cultivated in such groups could be the driving force behind cybercrimes committed in South African smart cities. Examples include financially motivated (see South African Postbank), politically motivated (see SAPS, South African Presidency), cyber-espionage (see Red October) or privacy breaches (see Ashley Madison) cybercrimes.
Differential reinforcement could refer to the positive reinforcements from the rewards of cybercrimes that could encourage individuals to start or continue to commit cybercrimes in South African smart cities. The rewards and lower consequences of online crimes outweigh the much higher likelihood of being caught in real-world crimes (Stalans and Donner Reference Stalans, Donner and Jahankhani2018). The lucrative opportunities for financial rewards are a major driving factor in committing crimes online rather than in the real world. The positive reinforcements from the rewards of cybercrimes could be the driving force behind cybercrimes committed in South African smart cities.
Imitation applies to individuals in South Africa who observe the successes and financial rewards achieved by their online peers involved in cybercrimes and could subsequently start to emulate such behaviour. This could be an individual’s first and foremost motivation to start criminal activities in South African intelligent cities (Holt and Bossler Reference Holt and Bossler2017). The successful execution of previous cybercriminal incidents in South African cities could motivate individuals to start to emulate such behaviour.
Social learning theory can explain the rise of cybersecurity incidents in South Africa over the last few years. In 2019, South Africa saw a sharp increase in cyberattacks. Internet service providers, utilities, e-commerce platforms and customers were severely affected. Furthermore, social learning theory can also be used to explain the rise in hacking incidents in South Africa over the last few years. Therefore, social learning can explain why cyberattacks in South African cities are committed and continue to rise.
Subculture Theories
Social learning theory emphasizes that peer relationships and individual perceptions of crime contribute significantly to criminal behaviour. However, the theory fails to address criminal behaviour’s influence on individuals (Holt and Bossler Reference Holt and Bossler2017). Researchers utilizing a subcultural perspective have broadened knowledge and placed in perspective the aspects that individuals account for when they commit crimes. Research has been widespread, ranging from gang membership (Miller Reference Miller1958; Short Reference Short1968) to digital piracy (Cooper and Harrison Reference Cooper and Harrison2001). Subcultural theories were developed to explain the societal structures that create oppositional subgroups in society (Stalans and Donner Reference Stalans, Donner and Jahankhani2018). In a criminological and sociological context, subcultures are any group whose values, attitudes and behaviours are at odds with society’s universal laws and values (Brake Reference Brake1980; Kornblum Reference Kornblum1997). Researchers have conducted numerous studies to examine the subcultural values, norms and practices of digital pirates, hackers, online fraudsters and accomplices in the online illicit sex trade (Holt Reference Holt2007; Holt and Copes Reference Holt and Copes2010; Holt, Freilich, and Chermak Reference Holt, Freilich and Chermak2017; Stalans and Finn Reference Stalans and Finn2016).
Neutralization Theory
Sykes and Matza (Reference Sykes and Matza1957) argued that individuals are constantly aware of the obligation to abide by the law. Individuals who commit crimes need to engage in cognitive activity to neutralize their guilt. They developed five techniques to explain how individuals “neutralize” themselves to temporarily lift their guilt and allow individuals to “drift” into committing crimes (Stalans and Donner Reference Stalans, Donner and Jahankhani2018). The techniques are denial of responsibility, denial of injury, denial of the victim, condemnation of the condemners and appeal to higher loyalties. In his study, Morris (Reference Morris, Holt and Schell2010) utilized the theory and concluded that neutralization in combination with the influence of deviant peers was directly linked to hacking.
Additionally, the neutralization of individuals created a shared value of secrecy in the hackers’ subculture. All the members of the hacking group did not want to get caught, so the group created methods like “spot the fed” warnings at hacking conventions to warn other hackers of the presence of undercover law enforcement (Stalans and Donner Reference Stalans, Donner and Jahankhani2018). Moreover, the study found that hackers were inspired by their shared values in the subculture. However, targeting victims for malicious hacking attacks was based on religious and political agendas (Holt et al. Reference Holt, Freilich and Chermak2017).
Smart cities in South Africa face severe cybersecurity risks due to neutralized hackers carrying out malicious cyberattacks. The hackers’ moral disengagement with society, caused by neutralization, enables them to neutralize their guilt and engage in cybercrimes within a smart city’s cyberspace. The five techniques outlined by Sykes and Matza (Reference Sykes and Matza1957) are reviewed in light of their practical implications for cybersecurity risks, especially potential hacking incidents in South African smart cities:
-
Denial of responsibility: Individuals may deny responsibility for their behaviour due to disengagement from society and, as a result, detach their sense of responsibility from their moral standards to commit cybercrime. The disconnect created by the Internet enables hackers and other individuals to lose any sense of responsibility. Individuals would possibly not have had the courage to carry out cybercrimes in the “real world”.
-
Denial of injury: One of the key components in social learning theory is “favourable attitudes”, which maintains that some individuals create a defiant mindset that the criminal act they are engaged in is not immoral and encourages reasoning on why the cybercrime is not harmful to others. If a hacker perceives the cybersecurity breach that he/she is committing will not harm anyone, then he/she inadvertently denies that there are any affected victims present (Hinduja and Ingram Reference Hinduja and Ingram2008). The attacker could feel that their attack will only affect wealthy organizations, affluent institutions or government agencies, denying that specific individuals will be affected.
-
Denial of the victim: Criminals often claim that the victim is deserving of the harm or is partly responsible for the harm (Stalans and Donner Reference Stalans, Donner and Jahankhani2018). This may motivate criminals to engage in cybercrime because the attacker believes “they deserve it”. Hackers often view themselves as a Robin Hood type of character by stealing (hacking) from the rich and giving to the poor (hacking community) (Maurushat Reference Maurushat2019).
-
Condemnation of the condemners: Individuals that commit cybercrimes claim that their behaviour is not wrong because those who disapprove of their behaviour engage in more unlawful activities (Stalans and Donner Reference Stalans, Donner and Jahankhani2018). Hacktivists could claim that their actions of website defacement are far less destructive than that of the person or organization they are attacking. Furthermore, empirical studies have shown that in many cases, hackers blame their victims for not having good cybersecurity skills or anti-virus software to prevent them from being victims (Cross, Richards, and Smith Reference Cross, Richards and Smith2016; Taylor Reference Taylor1999).
-
Appeal to higher loyalties: Individuals attempt to justify themselves by claiming that their actions are motivated by other more important values. Individuals believe that their actions will benefit their friends, peers or the hacking community and feel the need to protect themselves (Schmalleger Reference Schmalleger2019). The influence of peer relations is key to introducing individuals to the techniques of neutralization to justify their immoral values and criminal behaviours in cyberspace (Bossler and Burruss Reference Bossler, Burruss, Holt, Schell and Hershey2011). Hackers maintain peer relations with other hackers online or offline and often need to prove their loyalty to each other (Holt and Kilger Reference Holt and Kilger2012). These beliefs are a neutralization technique to justify their criminal behaviours in cyberspace.
Over the last few decades, traditional subcultural theories have been applied to studies to explain cybercrime and deviance (Holt and Bossler Reference Holt and Bossler2017). The code of the street theory has proven to be effective in explaining the causes behind specific cybercrimes. The theory and its application to cybersecurity in South African smart cities are reviewed.
Code of the Street Theory
The code of the street theory was developed by Anderson (Reference Anderson1999). The theory argues that a set of informal or “street” rules govern interpersonal relations in depreciated inner-city neighbourhoods struggling with joblessness, racism, poverty, alienation and mistrust of the police. These neighbourhoods are often characterized by a lack of public resources, poor service delivery and a history of racial segregation. Adverse socio-economic situations force youths to choose between believing in traditional values or the “code of the street” values which consist of illegal behaviours to get ahead in life (Stalans and Donner Reference Stalans, Donner and Jahankhani2018). The theory was utilized in numerous studies (Stewart and Simons Reference Stewart and Simons2010), which found that individuals’ loyalty to “street values” is linked to numerous violent crimes.
Henson, Swartz, and Reyns (Reference Henson, Swartz and Reyns2017) applied the code of the street theory to their empirical research to indicate how theory can explain crime in cyberspace. In their study, Henson et al. (Reference Henson, Swartz and Reyns2017) found that when youths started adopting online street-oriented beliefs, it related to online offending. Street-oriented beliefs were supported and shared on platforms such as social media and specific web forums. In another study, Holt (Reference Holt2007) examined the subculture of hackers using interviews with active hackers by examining data from public web forums from Defcon 2004, the largest annual hacker convention in the United States. Holt (Reference Holt2007) identified five general “normative orders” related to hackers. Notably, the establishment of identity within the subcategories of hackers who have shared values on violating laws is similar to that of street-oriented beliefs.
Furthermore, a study by Adeniran (Reference Adeniran, Jaishankar and Boca Raton2011) on the notorious Nigerian “yahoo boys” highlighted the group’s use of the Internet to conduct online criminal activities, including fraud, money laundering and hacking. Poverty, unemployment and deteriorating social lifestyle standards lead to the development of the “yahoo boys” subculture (Adeniran Reference Adeniran, Jaishankar and Boca Raton2011). Interestingly, the hostile socio-economic environment was similar to the environment that led to the creation of the “code of the street” values.
The code of the street theory has proven to be relevant, especially in poverty-stricken areas of the world. The subculture that gave rise to the origins of “street culture” and the online application of the values system by the Nigerian “yahoo boys” both have deep roots in poverty, unemployment and deteriorating social lifestyle standards (Adeniran Reference Adeniran, Jaishankar and Boca Raton2011). South Africa faces similar socio-economic misfortunes. The unemployment rate for the fourth quarter of 2020 escalated to 32.5%, putting the number of unemployed people at 7.2 million (Stats SA 2020). Furthermore, youth unemployment, individuals aged 25–34 years, recorded the highest unemployment rate of 41.2% (Stats SA 2020). Young South African work-seekers are turning to online platforms to enhance their digital literacy to increase their chances of achieving work opportunities (Matli and Ngoepe Reference Matli and Ngoepe2020). Youth unemployment is expected to drive an increased reliance on criminality as a source of income in both the online and offline spheres.
Furthermore, opportunities for cybercrimes have increased due to uncertainty created by the COVID-19 pandemic (Mahadevan Reference Mahadevan2020). The unemployed youth in South Africa can therefore take advantage of the increased cybercrime opportunities created by the COVID-19 pandemic and turn to a life of crime on the “streets” of cyberspace. The potential “street code culture” among the unemployed youth coupled with the many specialized forums and “how-to-do” websites could breed a substantial community of hackers and other cybercriminals in South Africa. This envisioned increase in skilled cybercriminals in South Africa could pose a significant risk to its IoT-interconnected smart cities.
New Theoretical Paradigms and Their Value to Cybersecurity in South African Smart Cities
Empirical studies have shown that traditional theories can advance knowledge of cybercrimes. However, these theoretical frameworks have clear limitations and shortcomings in their limited applicability for certain cybercrimes. As a result, there is immense value in developing new theoretical paradigms that integrate online and offline criminal behaviour more comprehensively (Holt and Bossler Reference Holt and Bossler2017). Furthermore, studies have shown that theoretical integration, or combining individual frameworks into a single model, could prove valuable in better understanding specific crimes (Bossler and Burruss Reference Bossler, Burruss, Holt, Schell and Hershey2011; Higgins and Marcum Reference Higgins and Marcum2011).
The subsequent section will discuss space transition theory, ANT and integrated models in terms of their applicability to cybersecurity in smart cities.
Space Transition Theory
Space transition theory is viewed as one of the newer theories in criminology that have been designed to distinctively address the ever-growing phenomenon of cybercrimes (Holt and Bossler Reference Holt and Bossler2017). Developed in 2007 by Jaishankar (Reference Jaishankar2007b), space transition theory attempts to explain the causation of crimes in cyberspace. He deemed it necessary to create a different theory on cybercrimes due to the inability of traditional criminological theories to suitably deliver a comprehensive explanation of the phenomenon of cybercrimes (Jaishankar Reference Jaishankar, Schmallager and Pittaro2008). Space transition theory is defined as the movement of an individual from one space to another (physical space to cyberspace) and argues that individuals conduct themselves differently when moving from one space to another.
Jaishankar (Reference Jaishankar2007b) offers seven fundamental propositions regarding the behaviour of individuals when they engage online and offline:
-
Individuals who control their need to conduct crime in the real world to protect their reputation could tend to engage in crimes in cyberspace.
-
Cybercriminals may find it more appealing to engage in cybercrime due to the ability to use multiple identities, keep their location secret, and the absence of deterrence factors in cyberspace.
-
Crimes in cyberspace are prone to move into physical space and vice versa.
-
Individuals could have the opportunity to cease their criminal activities due to the temporary nature of the Internet and its disengagement from the real world.
-
The Internet enables strangers to form online partnerships to plan and commit crimes in the real world and, conversely, allows real-world partnerships to engage in cybercrimes.
-
Closed societies could harvest higher levels of online crime than open societies because of the oppressive nature of such regimes.
-
The feeling of disengagement from the real world created by the Internet could allow individuals to disengage from their real-world societal norms and values and start engaging in cybercrime.
Space transition theory offers a critical understanding of the behaviour of criminals in cyberspace (Al-Ali, Nimrat, and Benzaid Reference Al-Ali, Nimrat, Benzaid and Jahankhani2018).
The COVID-19 pandemic has expanded the global cyber-landscape by forcing industries and governments to implement a massive and uncoordinated strategic shift to working remotely and relying heavily on the Internet to stay operational and conduct business (Wiggen Reference Wiggen2020). Due to nationwide lockdowns, work-from-home offices in public and private sectors required industries to increase electronic transactions, shift offline data to online databases, and use unproved software to communicate sensitive information (Mahadevan Reference Mahadevan2020). Subsequently, millions of malware and other attacks were experienced between January and August of 2020 (Kaspersky 2020). The COVID-19 pandemic has increased risks for smart cities, businesses and individuals as they adapt to a revised operating model in the “new normal” world. Space transition theory can therefore be utilized to explain the causations of cybercrimes created by the increased movement of individuals from offline spaces to cyberspace due to the COVID-19 pandemic. Additionally, the rise of more sophisticated smart cities in South Africa will only increase and amplify cybercrime opportunities.
Actor-Network Theory
ANT is a theoretical and methodological approach to social theory that claims everything in the social and natural worlds exists through a relationship of continuously shifting networks (Latour Reference Latour2005). This approach was adopted by van der Wagen and Pieters (Reference Van der Wagen and Pieters2015), who argued that the ANT could be explicitly applied to their study on the cybercrimes committed by botnets. They further argue that the ANT could take a social constructionist approach to focus on the role technologies have on specific criminal actions, especially where the technology does not require constant human input to carry out continuous cybercrimes. A botnet attack is a new type of “cyborg crime”, carried out by a combination of human and non-human criminal actions. The ANT is therefore used to draw a parallel perspective on human and non-human interactions in hybrid cybercriminal networks (van der Wagen and Pieters Reference Van der Wagen and Pieters2015). Van der Wagen and Pieter’s (Reference Van der Wagen and Pieters2015) application of the ANT opened a platform for scholars to start the debate over the concept that technological innovations are non-rational actors rather than tools that can be used to commit complex forms of cybercrime. This notion would lead to better insights into empirical research studies (Holt and Bossler Reference Holt and Bossler2017). Furthermore, van der Wagen and Pieters (Reference Van der Wagen and Pieters2015) suggest that the ANT framework would not only be applicable for studying botnets but could also be utilized for understanding how technology affects other forms of cybercrime. Hence, the selection of the ANT framework for application to this paper.
One complex botnet case from the Netherlands was examined for their research study to demonstrate their argument. The study concluded that the human “actor” was not always entirely in control of the deployed technology, as the “botherder” (individual responsible for controlling the botnet) could not consistently predict how the botnet network would interact and carry out actions. Van der Wagen and Pieters (Reference Van der Wagen and Pieters2015) motivated that without the ANT, their analysis and conclusion would have overstated the influence of the human as a rational “actor” managing the botnet network.
As global smart cities have increased their reliance on technology, cybersecurity incidents have increased in sophistication. As a result, more complex forms of cybercrime will be experienced in smart cities. Therefore, smart cities around the globe and in South Africa are at risk for sophisticated cyberattacks like botnet attacks and ransomware. According to ANT, everything in the social and natural worlds exists through a relationship of continuously shifting networks. The theory is used to explain the parallel perspectives that exist between human and non-human interactions within a hybrid cybercriminal network. Furthermore, the ANT explains the causes behind such hybrid cybercriminal networks carrying out sophisticated cyberattacks on smart cities.
TOWARDS AN INTEGRATED CRIMINOLOGICAL THEORETICAL FRAMEWORK
Numerous cybercrime criminologists (Higgins and Marcum Reference Higgins and Marcum2011; Holt and Bossler Reference Holt and Bossler2014) have promoted the use of integrated models in cybercrime studies. Integrated models can be referred to as integrating several theoretical perspectives into one model to better understand criminal behaviour in cyberspace (Stalans and Donner Reference Stalans, Donner and Jahankhani2018). Criminal behaviour is multifaceted and cannot be interpreted merely by a single viewpoint. Therefore, theoretical integration in cybercrime could deliver comprehensive insight into why individuals engage in online criminal behaviour (Akers et al. Reference Akers, Sellers and Jennings2016). Thus, an integrated model consists of social learning theory, street code and space transition theory.
Social learning theory can explain the rise of cybersecurity and hacking incidents in South Africa over the last few years. In the last few years, South Africa has seen a sharp increase in cyberattacks on all business fronts (Mcanyana, Brindley, and Seedat Reference Mcanyana, Brindley and Seedat2020). The four critical components of Akers’ (Reference Akers1998) social learning theory, i.e. (1) differential association (supportive attitudes to commit cybercrime); (2) favourable definitions (criminal attitude gained from deviant online social interactions); (3) differential reinforcement (financial rewards to cybercrimes); and (4) imitation (emulating criminal behaviour), can effectively be used to explain the motives behind cybercrimes in South African smart cities. Social learning theory can be applied to the rise in the number of individuals that have access to the Internet and can now visit deviant websites, forums and social media sites. This could empower individuals with the required technical skills and support to carry out cybercrimes in South African smart cities. The code of the street theory can be used to explain street-oriented beliefs as the values that can be used to commit cybercrimes (Henson et al. Reference Henson, Swartz and Reyns2017) in South African smart cities. The code of the street theory has proven to be relevant, especially in poverty-stricken areas of the world (Adeniran Reference Adeniran, Jaishankar and Boca Raton2011). Space transition theory can explain why individuals conduct themselves differently when moving from the physical, real-world space to cyberspace and why this could lead to them committing cybercrimes. Moving an individual’s current offline-based experience to an increased online experience will only increase opportunities for cybercrimes in South African smart cities.
All three theories can be combined to explain the current cybercriminological uptake in South Africa: social learning theory (growing number of empowered, cyber-skilled individuals with deviant peers); the code of the street theory (unemployed individuals with online street values and increased opportunities for cybercrimes due to the COVID-19 pandemic); and space transition theory (individual behaviour change from the real world to cyberspace).
Social learning theory-related incidents in South African cities include politically motivated cybercrimes, which include hacktivism through web defacement. Code of the street theory in a South African smart city context refers to the unemployed youth who could turn to online crime as a worthwhile opportunity for financial reward rather than attempting crime in the real world. The adverse socio-economic situation could be the driving force behind creating an online “code of the street” culture amongst youth seeking the rewards of cybercrimes in South African smart cities. Moreover, space transition theory in a South African smart city context refers to the disconnect created by the Internet that enables individuals to lose any sense of responsibility and behave in a manner they would not have done offline or in the real world.
CONCLUSION
Criminological theories play a significant role in explaining why individuals commit a crime. This article accentuated the value of criminological theories in explaining cybersecurity risks in smart cities. The authors illustrated how theoretical perspectives from traditional criminological theories, subculture theories and new theoretical paradigms could be combined into an integrated criminological theoretical framework as a valuable resource to provide a comprehensive understanding of cybercrimes in South African smart cities. This understanding contributes constructive insights to explain cybersecurity risks in smart cities and the planning and implementation of cybersecurity goals in South African smart cities.
Acknowledgements
The authors would like to acknowledge all the participants who participated in the larger study on which this article is premised and the Editorial Office of the International Annals of Criminology for the assistance in its publication.
François Paul Cornelius holds an MA in Criminal Justice and is a PhD candidate in the Department of Criminology and Security Science at the University of South Africa. His field of interest comprises criminal law and criminology, focusing on cybercrime in smart cities.
Shandré Kim Jansen van Rensburg is an Associate Professor in the Department of Criminology and Security Science, University of South Africa. Her fields of interest include cybercrime, contemporary criminology, transformative research methodology, and women in safety and security.
Sarika Kader is a Senior Lecturer in the Department of Criminology and Security Science, University of South Africa. Her fields of interest include criminology, victimology, and safety and security.