APAV - Secretaria Online Forinsia
Efectuar pedido de informação
Tipo pedido informação
Nome
Distrito
Telefone
NIF
Email
Mensagem
Autorizo a utilização dos meus dados pessoais de acordo com a Politica de Protecção de Dados Pessoais
 Detalhes do curso
Curso: Cibercrime: Riscos e Como Evitá-los (E-Learning 35h)
Condições de acesso:
Objectivos: No final do curso, os/as formandos/as deverão ser capazes de reconhecer a temática do cibercrime, compreendendo o seu enquadramento legal, distinguindo as diferentes tipologias e identificando estratégias de segurança e prevenção eficazes no apoio vítimas de cibercrime.
Duração: 35 horas
Documentação necessária: Associação Portuguesa de Apoio à Vítima (2015). APAV Cibercrime. Obtido de: https://apav.pt/cibercrime/ .
Agrafiotis, I., Nurse, J. R. C., Goldsmith, M., Creese, S. & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 1–15. DOI:10.1093/cybsec/tyy006 .
Agustina, J. R. (2015). Understanding Cyber Victimization: Digital Architectures and the Disinhibition Effect. International Journal of Cyber Criminology. 9(1): 35-54. DOI: 10.5281/zenodo.22239 .
Aiken, M., Mc Mahon, C., Haughton, C., O'Neill, L., & O'Carroll, E. (2015). A consideration of the social impact of cybercrime: examples from hacking, piracy, and child abuse material online. Contemporary Social Science. DOI: https://doi.org/10.1080/21582041.2015.1117648 .
Ainsaar, M. & Lööf, L. (2012). Online behavior related to child sexual abuse - Literature Report. Project ROBERT - Risktaking Online Behaviour Empowerment Through Research and Training. Obtido de: https://www.childrenatrisk.eu/robert/public/Online_behaviour_related_to_sexual_abuse.pdf .
Aizenkot, D. (2018). Cyberbullying in WhatsApp Classroom Groups among Children and Adolescents: Exposure and Victimization. The Eurasia Proceedings of Educational & Social Sciences (EPESS), 10: 1-10. DOI: https://doi.org/10.1177%2F1461444818782702 .
Álvarez-García, D., Pérez, J. C. N., González, A. D. & Pérez, C. R. (2015). Risk factors associated with cybervictimization in adolescence. International Journal of Clinical and Health Psychology, 15: 226-235. DOI: 10.1016/j.ijchp.2015.03.002 .
Arntfield, M. (2015). Toward a Cybervictimology: Cyberbullying, Routine Activities Theory, and the Anti-Sociality of Social Media. Canadian Journal of Communication, 40: 371-388. DOI: 10.22230/cjc.2015v40n3a2863 .
Caetano, A. P., Amado, J., Martins, M. J. D., Simão, A. M. V., Freire, I., & Pessoa, M. T. R. (2017). Cyberbullying: Motivos da agressão na perspetiva de jovens portugueses. Educ. Soc., Campinas, 38, 141: 1017-1034. DOI: http://dx.doi.org/10.1590/es0101-73302017139852 .
Carin M. M. Reep-van den Bergh & Marianne Junger (2018). Victims of cybercrime in Europe: a review of victim surveys. Crime Science, 7:5. DOI: 10.1186/s40163-018-0079-3 .
Casa Branca, C., Grangeia, H. & Cruz, O. (2016). Grooming online em Portugal: Um estudo exploratório. Análise Psicológica, 3: 249-263. DOI: http://dx.doi.org/10.14417/ap.978 .
Cassidy, W., Faucher, C. & Jackson, M. (2013). Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. School Psychology International, 34(6):575-612. DOI: 10.1177/0143034313479697 .
Choi, K. (2008). Computer Crime Victimization and Integrated Theory: An Empirical Assessment. International Journal of Cyber Criminology, 2 (1): 308–333. Obtido de: https://www.researchgate.net/publication/238621672_Computer_Crime_Victimization_and_Integrated_Theory_An_Empirical_Assessment .
Cross, C. (2016). They’re Very Lonely’: Understanding the Fraud Victimisation of Seniors. International Journal for Crime, Justice and Social Democracy 5(4): 60-75. DOI: https://doi.org/10.5204/ijcjsd.v5i4.268 .
Cross, C., Richards K., & Smith, R. (2016). The reporting experiences and support needs of victims of online fraud. Trends & issues in crime and criminal justice - Australian Institute of Criminology. 518, pp. 1-14. Obtido de: https://aic.gov.au/publications/tandi/tandi518 .
Das, S. & Nayak, T. (2013). Impact of cybercrime: issues and challenges. International Journal of Engineering Sciences & Emerging Technologies, 6, 2: 142-153. Obtido de: http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=8745C9B6E64828141078C36AABDF1697?doi=10.1.1.429.548&rep=rep1&type=pdf .
Englander, E. (2019). What Do We Know About Sexting, and When Did We Know It?. Journal of Adolescent Health, 65: 577-578. DOI: https://doi.org/10.1016/j.jadohealth.2019.08.004 .
EPCAT & Interpol (2018).Towards a Global Indicator on Unidentified Victims in Child Sexual Exploitation Material. ECPAT: Bangkok. Obtido de: https://www.ecpat.org/wp-content/uploads/2018/03/TOWARDS-A-GLOBAL-INDICATOR-ON-UNIDENTIFIED-VICTIMS-IN-CHILD-SEXUAL-EXPLOITATION-MATERIAL-Summary-Report.pdf .
European Union Agency for Network and Information Security (2018). ENISA Threat Landscape Report 2017. 15 Top Cyber-Threats and Trends. European Union Agency For Network and Information Security. Obtido de: https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2017 .
EUROPOL (2018). Internet organised crime threat assessment (IOCTA) 2018. Obtido de: https://www.europol.europa.eu/internet-organised-crime-threat-assessment-2018 .
EUROPOL (2019). Internet organised crime threat assessment (IOCTA) 2019. Obtido de: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2019 .
Flach, R. D. & Deslandes, S. F. (2017). Cyber dating abuse in affective and sexual relationships: a literature review. Cadernos de Saúde Pública, 33(7). DOI: 10.15090/0102-311x00138516 .
Grabosky, P. N. (2001). Virtual criminality: old wine in new bottles?. Social & Legal Studies, 10, 2: 243-249. DOI: https://doi.org/10.1177%2Fa017405 .
Greijer, S. & Doek, J. (2016). Terminology guidelines for the protection of children from sexual exploitation and sexual abuse. ECPAT: Bangkok. Obtido de: http://luxembourgguidelines.org/ .
Hadlington, L. (2018). Employees Attitude towards Cyber Security and Risky Online Behaviours: An Empirical Assessment in the United Kingdom. International Journal of Cyber Criminology Vol. 12(1): 269–281. DOI: 10.5281/zenodo.1467909 .
Holt, T. J., & Bossler, A. M. (2008). Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization. Deviant Behavior, 30:1, 1-25. DOI: 10.1080/01639620701876577 .
International Associations of Internet Hotlines (June, 2019). INHOPE Annual Report 2018. Obtido de: https://www.inhope.org/media/pages/the-facts/download-our-whitepapers/3976156299-1576235919/2019.12.13_ih_annual_report_digital.pdf .
Jahankhani, H., Al-Nemrat, A. & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics (pp. 149-164). In Francesca Bosco, Andrew Staniforth, Babak Akhgar (Eds.), Cyber Crime and Cyber Terrorism Investigator’s Handbook. Elsevier Science. DOI: 10.1016/B978-0-12-800743-3.00012-8 .
Jansen, J. & Leukfeldt, R. (2018). Coping with cybercrime victimization: an exploratory study into the impact and change. Journal of Qualitative Criminal Justice & Criminology, 6: 205-228. Obtido de: https://surfsharekit.nl/publiek/hh/beb608b9-6f52-42e8-9cab-dc5848c8887c .
Jeney, P. (2015). Combatting child sexual abuse online - Study for the LIBE Committee. European Union. Obtido de: https://www.europarl.europa.eu/RegData/etudes/STUD/2015/536481/IPOL_STU(2015)536481_EN.pdf .
Kigerl, A. (2012). Routine Activity Theory and the Determinants of High Cybercrime Countries. Social Science Computer Review, 30(4): 470-486. DOI: https://doi.org/10.1177%2F0894439311422689 .
Koops B. (2011). The Internet and its Opportunities for Cybercrime. Tilburg Law School Legal Studies Research Paper Series. Paper No. 09/2011. Obtido de: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1738223 .
Kranenbarg, M. W., Holt, T. J. & Van Gelder, J. (2019). Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap. Deviant Behavior, 40:1, 40-55. DOI: 10.1080/01639625.2017.1411030 .
Leukfeldt, R. (2017). Research agenda the human factor in cybercrime and cybersecurity. Eleven International Publishing. Obtido de: https://www.researchgate.net/publication/317191029_Research_agenda_The_human_factor_in_cybercrime_and_cybersecurity .
Leukfeldt, E. R., Notté, R. J. & Malsch, M. (2019). Exploring the Needs of Victims of Cyber-dependent and Cyber-enabled Crimes. Victims & Offenders - An International Journal of Evidence-based Research, Policy, and Practice. DOI: 10.1080/15564886.2019.1672229 .
Leukfeldt, E. R., & Yar, M. (2016). Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis. Deviant Behavior, 37:3, 263-280. DOI: https://doi.org/10.1080/01639625.2015.1012409 .
Marganski, A. & Melander, L. (2015). Intimate partner violence victimization in the cyber and real world: examining the extent of cyber aggression experiences and its association with in-person dating violence. Journal of Interpersonal Violence, 1–25. DOI: 10.1177/0886260515614283 .
Martins, M. J. D. & colleagues (2019). Cyber-Victimization and Cyber-Aggression: Personal and Situational Factors (pp. 255-271). In Z. Yan (Ed.), Analyzing Human Behavior in Cyberspace. Hershey: IGI Global. DOI: 10.4018/IJCBPL.2016070105 .
Miró-Llinares, F. (2013). Cibercrimen, cibercriminales y cibervíctimas. Universitat Oberta del Catalunya. Obtido de: http://openaccess.uoc.edu/webapps/o2/bitstream/10609/70006/4/Delincuencia%20y%20TICs_M%C3%B3dulo%202_Cibercrimen%2C%20cibercriminales%20y%20ciberv%C3%ADctimas.pdf .
Miró-Llinares, F. (2013). La prevencíon del ciberdelito. Universitat Oberta del Catalunya.
Alyse Dickson (2016). ‘Revenge Porn’: a victim focused response. School of Law, University of South Australia. Obtido de: http://openaccess.uoc.edu/webapps/o2/bitstream/10609/70006/1/Delincuencia%20y%20TICs_M%C3%B3dulo%203_%20La%20prevenci%C3%B3n%20del%20ciberdelito.pdf .
Miró-Llinares, F. (2013). La victimización por cibercriminalidad social. Un estudio a partir de la teoría de las actividades cotidianas en el ciberespacio. Revista Española de Investigación Criminológica, 11. Obtido de: https://www.researchgate.net/publication/328342955_La_victimizacion_por_cibercriminalidad_social_Un_estudio_a_partir_de_la_teoria_de_las_actividades_cotidianas_en_el_ciberespacio .
Mitchell, K. J., Segura, A., Jones, L. M., & Turner, H. A. (2018). Poly-Victimization and Peer Harassment Involvement in a Technological World. Journal of Interpersonal Violence, 33 (5):762–788. DOI: 10.1177/0886260517744846 .
Nasi, M., Oksanen, A., Keipi, T. & Rasanen, P. (2015). Cybercrime victimization among young people: a multi-nation study. Journal of Scandinavian Studies in Criminology and Crime Prevention, 1-9. DOI: 10.1080/14043858.2015.1046640 .
Notar, C. E., Padgett, S. & Roden, J. (2013). Cyberbullying: Resources for Intervention and Prevention. Universal Journal of Educational Research, 1 (3): 133-145. DOI: 10.13189/ujer.2013.010301 .
Peterson, J. & Densley, J. (2017) Cyber violence: What do we know and where do we go from here?. Aggression and Violent Behavior, 34: 193–200. DOI: 10.1016/j.avb.2017.01.012 .
Reyns, B., Henson, B. & Fisher, B. S. (2015). Guardians of the CyberGalaxy: An Empirical and Theoretical Analysis of the Guardianship Concept From Routine Activity Theory as It Applies to Online Forms of Victimization. Journal of Contemporary Criminal Justice 1–21. DOI: 10.1177/1043986215621378 .
Reyns, B. W., & Randa, R. (2015). Victim Reporting Behaviors Following Identity Theft Victimization: Results from the National Crime Victimization Survey. Crime & Delinquency, 1–25. DOI: 10.1177/0011128715620428 .
Riek, M., Abramova, S. & Böhme, R. (2017). Analyzing Persistent Impact of Cybercrime on the Societal Level: Evidence for Individual Security Behavior. Thirty Eighth International Conference on Information Systems, South Korea. 2017. Obtido de: https://informationsecurity.uibk.ac.at/pdfs/RAB2017_Cybercrime_Eurobarometer_longitudinal_ICIS.pdf .
Runions, K. & colleagues (2013). Cyber-Aggression and Victimization and Social Information Processing: Integrating the Medium and the Message. Psychology of Violence, 3, 1: 9–26. DOI: 10.1037/a0030511 .
Ryan, K. N. & Curwen, T. (2013). Cyber-Victimized Students: Incidence, Impact, and Intervention. https://doi.org/10.1177%2F2158244013516772 .
Saini, H., Rao, Y. S., Panda, T. C. (2012). Cyber-Crimes and their Impacts: A Review. International Journal of Engineering Research and Applications, 2: 202-209. Obtido de: https://www.researchgate.net/publication/241689554_Cyber-Crimes_and_their_Impacts_A_Review .
Simão, A. M. V., Ferreira, P. C., Freire, I., Caetano, A. P., Martins, M. J. & Vieira, C. (2017). Adolescent cybervictimization - Who they turn to and their perceived school climate. Journal of Adolescence, 58: 12-23. DOI: 10.1016/j.adolescence.2017.04.009 .
Suler, J. (2004) The Online Disinhibition Effect. Cyberpsychology & Behavior, 7, 3: 321-326. DOI: 10.1089/1094931041291295 .
Taylor, R. W. & colleagues (2019). Cyber Crime and Cyber Terrorism. NY: Pearson Education. Obtido de: https://www.pearsonhighered.com/assets/preface/0/1/3/4/0134846516.pdf .
Vakhitovaa, Z. I. , Alston-Knoxb, C. L., M. Reynaldc, D. M., K. Townsleyc, M. K. & L. Webster, J. L. (2019). Lifestyles and routine activities: Do they enable different types of cyber abuse?. Computers in Human Behavior, 101: 225–237. DOI: 10.1016/j.chb.2019.07.012 .
Van de Weijer, S. G. A., & Leukfeldt, E. R. (2017). Big Five Personality Traits of Cybercrime Victims. Cyberpsychology, Behavior, and Social Networking, 20, 7: 407-412. DOI: 10.1089/cyber.2017.0028 .
Waasdorp, T. E. & Mehari, K. R. (2019). Cyberbullying: Building the Research in Context. Journal of Adolescent Health, 65: 575-576. DOI: 10.1016/j.jadohealth.2019.08.006 .
Wall, D. S. (2015). Towards a conceptualisation of cloud (cyber) crime (pp.529–538). In T. Tryfonas (Ed.) Human Aspects of Information Security, Privacy and Trust. New York: Springer International. DOI: 10.1007/978-3-319-58460-7_37 .
Worsley, J., Wheatcroft, J.M., Short, E., & Corcoran, R. (2017). Victims’ voices: Understanding the emotional impact of cyberstalking and individuals’ coping responses. DOI: https://doi.org/10.1177%2F2158244017710292 .
Wright, M. (2015). Cyber victimization and adjustment difficulties: The mediation of Chinese and American adolescents’ digital technology usage. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 9 (1). DOI: 10.5817/CP2015-1-7 .
Yar, M. (2005). The Novelty of ‘Cybercrime’- An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2 (4): 407–427. DOI: 10.1177/147737080556056 .
Módulos leccionados
Nome do módulo Número de horas
Módulo I | Enquadramento Jurídico Nacional e Comunitário relacionado com o Cibercrime 11h 00m
Módulo II | Tipologia de Crimes com recurso às Tecnologias de Informação 13h 00m
Módulo III | Estratégias de Segurança e Prevenção 11h 00m