Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

Cross-Chain Perp Trading Accelerates As Traders Optimize Execution Across Ecosystems

2026-02-08

Institutional Bitcoin Hedging Activity Signals Maturation Of On-Chain Perps

2026-02-08

BTC Risk Management Drives Adoption Of Structured Perp Strategies On HFDX

2026-02-08
Facebook X (Twitter) Instagram
Trending
  • Cross-Chain Perp Trading Accelerates As Traders Optimize Execution Across Ecosystems
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Opinion»Cybercrime Victims Who Aren’t Proficient In English Are Undercounted – And Poorly Protected
Opinion

Cybercrime Victims Who Aren’t Proficient In English Are Undercounted – And Poorly Protected

Fawn NgoBy Fawn Ngo2024-01-29Updated:2024-04-02No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
STEM
STEM Photo by Christina Morillo: https://www.pexels.com/photo/two-women-sitting-on-sofa-holding-laptop-computers-1181268/
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

by Fawn Ngo, University of South Florida

In the United States, the Internet Crime Complaint Center serves as a critical component in the FBI’s efforts to combat cybercrime. The center’s website provides educational resources to help individuals and businesses protect themselves from cyberthreats and also allows them to report their victimization by submitting complaints related to internet crimes. The Internet Crime Complaint Center also publishes annual reports summarizing the current state of internet crime, trends and notable cases.

However, the information and resources, including the reporting form, posted on the center’s website are only available in English. This excludes a substantial number of internet users and victims of cybercrime: people with limited English proficiency. In addition to leaving out many people who are more vulnerable to cyberthreats, one consequence is that the Internet Crime Complaint Center’s annual Internet Crime Reports are incomplete and inaccurate.

The lack of information and resources on cybersecurity and internet safety in languages other than English on the Internet Crime Complaint Center website further widens the “security gap,” a divide that has emerged between those who can manage and mitigate potential cybersecurity threats and those who cannot. Because there isn’t an appropriate reporting mechanism and structure for people with limited English proficiency to report their victimization, data and statistics on cyber victimization within this population are severely limited.

Play
This U.S. Justice Department video explains why government agencies must provide meaningful access to services to people with limited English proficiency.

Cybercrime and prevention

I’m a criminologist. My colleagues and I conducted focus groups with a sample of adult internet users with limited English proficiency to examine their experiences with nine forms of cybercrime and explore their knowledge of cybersecurity. The study is slated to be published in a forthcoming issue of the International Journal of Cybersecurity Intelligence and Cybercrime.

We recruited 18 Spanish- and six Vietnamese-speaking internet users for the study based on the evidence that limited English proficiency individuals in the U.S. tend to be Latino or Asian, and among the Asian ethnic groups Vietnamese Americans are the least proficient in English.

We asked participants whether they had encountered any of the following during the previous 12 months:

  • They received a phishing email, which is a deceptive message with the intent of tricking them into divulging sensitive information such as login credentials, personal details or financial information.
  • Their computer was infected with a computer virus.
  • They received online harassment; for example, a message from someone that threatened, insulted or harassed them.
  • They were the victim of an online scam; for example, they sent money to an individual or organization that they encountered online and later found to have misrepresented themselves.
  • They were notified that their financial account had been hacked.
  • They were notified that their email, social media, shopping or other account had been hacked.

Study participants encountered all nine types of cybercrime. The most common types of cyber victimization they experienced were computer virus, reported by seven participants; phishing emails, reported by six participants; notification that their financial account had been hacked and their personal data was at risk, reported by six participants; and notification that another type of account had been hacked, reported by six participants.

We asked participants whether they had engaged in the following cybersecurity measures during the previous 12 months:

  • Have antivirus, anti-spyware, or firewall software installed on their computer and laptop.
  • Create strong passwords for their online accounts.
  • Employ two-factor authentication procedure.
  • Avoid unsecured wireless networks such as free Wi-Fi at airports.
  • Avoid websites that are not protected by Secure Sockets Layer, or SSL, encryption, meaning look for URLs to begin with https rather than http.
  • Use a strong password or encryption to secure their home’s wireless network.
  • Employ email filters to block suspicious senders and attachments.
  • Check email senders and attachments to avoid phishing and online scams.
  • Be cautious when providing personal information to a third party.
  • Take extra steps such as shredding documents with personal information to prevent data theft.

The answer choices were yes, no and I don’t know. In all cases except creating strong passwords, more participants reported “no” than “yes,” and in all cases, the combination of participants who reported “no” and “I don’t know” significantly exceeded the number of participants who reported “yes.”

Closing the security gap

Executive Order 13166, signed in 2000, requires federal agencies to improve access to services for people with limited English proficiency. U.S. Attorney General Merrick Garland issued a memorandum on Nov. 21, 2022, directing the Justice Department’s Civil Rights Division to share best practices and exchange information about language access with other federal agencies.

I believe that it’s important to close the security gap and attain accurate data and statistics on cyber victimization. Internet- and computer-based crime is one of the fastest-growing security threats in the U.S.

Getting a full and accurate picture of the problem requires that data and statistics on cybercrime and cyber victimization include victims who have limited English proficiency as well as those who are English-proficient.

And just as public campaigns related to health and safety tend to be available in multiple languages to reach diverse audiences, I believe all users, regardless of their language skills, should have the knowledge and skills to protect themselves from cybercrime.The Conversation

Fawn Ngo, Associate Professor of Criminology, University of South Florida

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Cybercrime English as a second language Hackers Online scams technology
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Fawn Ngo

Related Posts

Private Credit Rating Agencies Shape Africa’s Access To Debt. Better Oversight Is Needed

2026-02-03

Why South Africa Cannot Afford To Wait For Healthcare Reform

2026-02-02

How is Technology Used in Cricket?

2026-02-02

SA Auto Industry At Crossroads: Cheap Imports Threaten Future

2026-02-02

Stablecoins: The Quiet Revolution South Africa Can’t Ignore

2026-02-02

South Africa Could Unlock SME Growth By Exploiting AI’s Potential Through Corporate ESD Funds

2026-01-28

How Local Leaders Can Shift Their Trajectory In 2026

2026-01-23

Why Legal Businesses Must Lead Digital Transformation Rather Than Chase It

2026-01-23

Directing The Dual Workforce In The Age of AI Agents

2026-01-22
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

Digitap ($TAP) Crushes NexChain with Real Banking Utility: Best Crypto to Buy in 2026

The crypto presale market in 2026 has seen dozens of projects compete for investor attention.…

Dutch Entrepreneurial Development Bank FMO Invests R340M In Lula To Expand SME funding In SA

2026-02-03

Paarl Mall Gets R270M Mega Upgrade

2026-02-02

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

Vodacom Reports Robust Q3 Growth, Driven By Diversification And Strategic Moves

2026-02-04

South Africa’s First Institutional Rand Stablecoin, ZARU, Launches

2026-02-03

The EX60 Cross Country: Built For The “Go Anywhere” Attitude

2026-01-23

Mettus Launches Splendi App To Help Young South Africans Manage Their Credit Health

2026-01-22

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

Cross-Chain Perp Trading Accelerates As Traders Optimize Execution Across Ecosystems

2026-02-08

Institutional Bitcoin Hedging Activity Signals Maturation Of On-Chain Perps

2026-02-08

BTC Risk Management Drives Adoption Of Structured Perp Strategies On HFDX

2026-02-08
Recent Posts
  • Cross-Chain Perp Trading Accelerates As Traders Optimize Execution Across Ecosystems
  • Institutional Bitcoin Hedging Activity Signals Maturation Of On-Chain Perps
  • BTC Risk Management Drives Adoption Of Structured Perp Strategies On HFDX
  • Bitcoin Traders Seek Deeper Perp Liquidity As On-Chain Volumes Hit New Highs
  • The Rise of Virtual Items: How Digital Assets Became Valuable
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2026 TechFinancials. Designed by TFS Media. TechFinancials brings you trusted, around-the-clock news on African tech, crypto, and finance. Our goal is to keep you informed in this fast-moving digital world. Now, the serious part (please read this): Trading is Risky: Buying and selling things like cryptocurrencies and CFDs is very risky. Because of leverage, you can lose your money much faster than you might expect. We Are Not Advisors: We are a news website. We do not provide investment, legal, or financial advice. Our content is for information and education only. Do Your Own Research: Never rely on a single source. Always conduct your own research before making any financial decision. A link to another company is not our stamp of approval. You Are Responsible: Your investments are your own. You could lose some or all of your money. Past performance does not predict future results. In short: We report the news. You make the decisions, and you take the risks. Please be careful.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.