As a former Finance auditor, I was curious to see how the research methods we used to use in CPA firm varied from those in forensic cyber psychology environment. At a glance, researchers in this field use a handful of methods to focus on the motivations and behaviors of cybercriminals and the impact of cybercrime on victims.
Surveys and questionnaires are a good way to gather data from both cybercrime offenders and victims. A survey and/or a questionnaire is a tool used in research to gather information from a sample (i.e specific group of people) on a wide range of topics, and can be administered in various ways: in-person, via mail, over the phone, or online. Typically, a survey is designed to obtain information on a specific topic(s), and includes a set of open-ended or closed-ended, simple to complex questions, tied to the research goals. While questionnaires are more of standardized forms that ask respondents to provide specific information about themselves, their attitudes, behaviors, and health status, or experiences. Surveys may be used to study the psychological profiles of offenders, while questionnaires can be used to measure the impact of cybercrime on victims.
Another method to be used for research are interviews, which can be structured, unstructured or semi-structured, and have the flexibility of being conducted in person, over the phone, or via video conferencing. While an interview can be time consuming, and can hold a risk of bias from the interviewer, it is still the most effective way to gather rich and detailed data from participants. Interviewing both offenders and victims can help provide more in-depth and nuanced insights into the individual’s thoughts, emotions, and behaviors related to cybercrime.
Along the lines of interviewing come experimental and observational studies. In cyber psychology specifically, experimental studies may be used to investigate the effects of different types of online interventions on behavior, cognition, or emotions. For example, a researcher may manipulate the frequency of online feedback given to individuals to determine its impact on their self-esteem.
Observational studies usually involve the collection and analysis of data from natural settings without any intervention by the researcher, and benefit the cyber psychology research because they allow researchers to examine behavior in its natural context, that is, without the influence of experimental manipulations. For instance, a researcher may observe online communication patterns in a chat room to identify the emergence of social norms.
Two great methods to gain insights into specific phenomena and analyze large datasets are case studies and data mining, respectively. They may seem to be “closely related” at first glance, however case studies focus more on in-depth examination of a particular individual, group, or event. Data mining though involves analyzing large datasets to discover patterns, relationships, and insights, and is more of a computational approach integrating statistical and machine learning techniques to extract meaningful information from vast amounts of data.
In cyber psychology, case studies can be used to investigate specific instances of cybercrime, cyberbullying, or online addiction. Thus, a researcher might conduct a case study in order to examine the psychological and social factors contributing to an individual’s involvement in online fraud.
Data mining is leveraged to help researchers identify trends, predict behaviors, or uncover hidden patterns in online behavior. Imagine massive amounts of online data, such as social media posts, chat logs, or user interactions that can potentially help uncover a deeper understanding of online behavior across diverse populations, say, better identify patterns of online aggression, detect trends in online gaming behavior, or predict the likelihood of cyber victimization.
Finally, and this cool methodology deserves a separate post some time in future weeks, brain activity and structure can be examined closely to understand the cognitive and neural processes underlying cyber-related behaviors and experiences. This is known as neuroimaging technique, and its biggest benefits are in provide objective measures and empirical evidence to better understand the underlying mechanisms of cyber-related behaviors, and to help investigate the neural correlates of various phenomena (e.g. cyber deception, cyber victimization, or online addiction). A couple of most commonly used techniques in forensic cyber psychology field are:
– functional magnetic resonance imaging (fMRI) measures changes in blood flow to different brain regions, which helps provide insights into brain activity during specific tasks or experiences, subsequently identifying brain regions associated with processes such as decision-making, emotional responses, cognitive control etc. in the context of cyber activities.
– electroencephalography (EEG) measures electrical activity in the brain through electrodes placed on the scalp, and focuses on the temporal dynamics of brain activity. EEG can help recognize neural markers associated with specific cognitive processes or emotional responses in the cyber context.
Now, the neuroimaging studies is a relatively recent methodology and can be costly as well. However they prove to be extremely useful when directly observing the neural processes underlying various behaviors and cognitive functions, providing a deeper understanding of the mechanisms involved, developing personalized interventions, identifying risk factors for cyber-related behaviors, or understanding how individuals may respond differently to various cyber stimuli.

