Loss of Trust: How Cybercrime Changes the Way Victims See the Internet
DOI:
https://doi.org/10.22399/ijasrar.45Keywords:
Loss of trust, internet, CybercrimeAbstract
The growing digitalization of contemporary existence has redefined victimization boundaries, transforming cybercrime into an essential psychological and social risk. This research examines the impact of cybercrime on reshaping human cognition and trust and the resulting Generalized Digital Distrust (GDD)—an adaptive cognitive disorder in which victims view all digital stimuli, such as harmless emails and reminders, as threats. Based on multidisciplinary literature, psychological theory, and policy documents, the study integrates quantitative findings and qualitative accounts to analyze emotional outcomes like anxiety (claimed by 63%), stress (73%), anger (86%), depression (18%), and suicidal thoughts (3%) in cybercrime victims.The study finds that the erosion of trust goes beyond cyberspace, impairing victims' social relations and self-concept via internalized blame, shame, and learned helplessness. GDD appears in the form of hyper-vigilance and cognitive distortion, which generates avoidance of required digital interactions, cyber fatigue, and final digital exclusion. Yet, a divergent adaptive pattern shows up, in which trauma-inducing conservatism promotes heightened cybersecurity practices—like multi-factor authentication and risk assessment—illustrating the double-edged nature of cyber-victimization.This study enriches the conceptualization of GDD as both a psychological and behavioral theory of post-cybercrime trauma. It promotes Trauma-Informed Computing (TIC) and cognition reflection–based interventions that rebuild digital confidence without inducing fear-based avoidance. The research concludes that cybercrime needs to be considered not merely as a financial or technical threat but as an invasive form of digital trauma calling for an integrative approach combining psychological healing, human-centered security design, and knowledge-based policy intervention in order to re-establish digital trust.
References
1. Cyber risk and cybersecurity: a systematic review of data availability - PMC, accessed on October 17, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC8853293/
2. AI and Serious Online Crime | Centre for Emerging Technology and Security, accessed on October 17, 2025, https://cetas.turing.ac.uk/publications/ai-and-serious-online-crime
3. The Latest Cyber Crime Statistics (updated July 2025) | AAG IT Support, accessed on October 17, 2025, https://aag-it.com/the-latest-cyber-crime-statistics/
4. Digital Trauma and Victimology: Rethinking Justice in the Age of Cybercrime | Virtuosity Legal, ac-cessed on October 17, 2025, https://virtuositylegal.com/digital-trauma-and-victimology-rethinking-justice-in-the-age-of-cybercrime/
5. Protecting Minds in the Digital Age: A Review Based Study on ..., accessed on October 17, 2025, https://ijip.co.in/index.php/ijip/article/view/8563
6. Psychological Trauma and Cybercrime | Canadian Occupational Safety, accessed on October 17, 2025, https://www.thesafetymag.com/ca/news/opinion/psychological-trauma-and-cybercrime/252447
7. Keeping Your Guard Up: Hypervigilance Among Urban Residents Affected By Community and Police Violence, accessed on October 17, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC7263347/
8. Psychological Impact of Cybercrime - NABHS, accessed on October 17, 2025, https://nabhs.org/psychological-impact-of-cybercrime/
9. Experiences of victims of fraud and cyber crime - GOV.UK, accessed on October 17, 2025, https://www.gov.uk/government/publications/experiences-of-victims-of-fraud-and-cyber-crime/experiences-of-victims-of-fraud-and-cyber-crime
10. The social and psychological impact of cyberattacks - ResearchGate, accessed on October 17, 2025, https://www.researchgate.net/publication/338313135_The_social_and_psychological_impact_of_cyberattacks
11. The Social and Psychological Impact of Cyber-Attacks - arXiv, accessed on October 17, 2025, https://arxiv.org/pdf/1909.13256
12. “Falling into a Black Hole”: A Qualitative Exploration of the Lived ..., accessed on October 17, 2025, https://www.tandfonline.com/doi/full/10.1080/15564886.2025.2481267
13. Impact of Media-Induced Uncertainty on Mental Health: Narrative-Based Perspective - PMC, ac-cessed on October 17, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC12175740/
14. Social media and moral panics: Assessing the effects of technological change on societal reaction - PubMed Central, accessed on October 17, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC7201200/
15. The Role of User Behaviour in Improving Cyber Security Management - Frontiers, accessed on Octo-ber 17, 2025, https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2021.561011/full
16. An exploratory study of cyber hygiene behaviors and knowledge, accessed on October 17, 2025, https://par.nsf.gov/servlets/purl/10083310
17. Assessing the Processual Relationship Between Thoughtfully Reflective Decision Making, Protection - Digital Commons @ USF - University of South Florida, accessed on October 17, 2025, https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=9991&context=etd
18. Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions - PubMed Central, accessed on October 17, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC11576173/
19. A scoping review of trauma-informed care principles applied in design and technology, accessed on October 17, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC12304634/
20. Trauma-Informed Approaches to Victims of Technology-Facilitated Crime | Office of Juvenile Justice and Delinquency Prevention, accessed on October 17, 2025, https://ojjdp.ojp.gov/media/video/33351
21. Trauma-Informed Computing: Towards Safer Technology Experiences for All - Emily Tseng, accessed on October 17, 2025, https://emtseng.me/assets/Chen-2022-CHI_Trauma-Informed-Computing.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Applied Sciences and Radiation Research

This work is licensed under a Creative Commons Attribution 4.0 International License.