Skip to main content

Cyber-Dependent Crime Versus Traditional Crime: Empirical Evidence for Clusters of Offenses and Related Motives

  • Chapter
  • First Online:
Cybercrime in Context

Part of the book series: Crime and Justice in Digital Society ((CJDS,volume I))

Abstract

It is unknown to what extent cyber-dependent offenders are distinctly different from other offenders and to what extent they have different motives. This is addressed in this study by examining to what extent cyber-dependent offenders can be distinguished from traditional offenders and by identifying clusters of cyber-dependent and traditional offenses. In addition, it is explored which motives for offending the offenders provide and to what extent a specific cluster of crimes distinguishes itself from the other clusters by specific motives. The analyses are based on a survey among a Dutch high-risk sample of adult cyber-dependent offenders (N = 268) and traditional offenders (N = 270). The principal component analysis identified seven clusters of crimes, four clusters that include only cyber-dependent crime and three clusters that only include traditional crimes. This indicates that cyber-dependent offenders can be distinguished from traditional offenders. In addition, cyber-dependent crimes can be distinguished from traditional crimes by almost all motives. The cyber-dependent crimes are mostly committed out of intrinsic motives, i.e., committing the crime is in itself rewarding. Financial motives are almost absent for cyber-dependent crime. Differences between cyber-dependent crime clusters are mainly found in extrinsic motives, i.e., the extent to which the external consequences of committing a crime is rewarding. The results are discussed in light of the existing cybercrime literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    It should be noted that not all literature about hackers is necessarily only about criminals. Hacking can be part of a completely legitimate profession.

  2. 2.

    This procedure was approved by the Ethics Committee. Apart from selecting the respondents, the Public Prosecutor’s Office was not involved in sending the letters or the rest of the data collection and analyses. Respondents could, therefore, participate anonymously, and their personal results would not be shared with the Public Prosecutor’s Office.

  3. 3.

    Communication with this type of website is completely encrypted and less easy to trace. Three traditional sample respondents completed the survey on paper and three cyber-dependent sample respondents completed it through the Tor Hidden Service website.

  4. 4.

    Some also load on another cluster (factor loading above 0.30). For interpretation clarity and further analyses, the highest factor loading is used to assign each crime to only one cluster.

References

  • Alleyne, B. (2011). “We are all hackers now”: Critical sociological reflections on the hacking phenomenon. Goldsmiths Research online. Retrieved from http://www.arifyildirim.com/ilt510/brian.alleyne.pdf.

  • Bachmann, M. (2011). Deciphering the hacker underground: First quantitative insights. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 105–126). New York, NY: Information Science Reference.

    Chapter  Google Scholar 

  • Bachmann, M., & Corzine, J. (2010). Insights into the hacking underground. In T. Finnie, T. Petee, & J. Jarvis (Eds.), The future challenges of cybercrime (Proceedings of the futures working group 2010) (Vol. 5, pp. 31–41). Quantico, VA: FBI.

    Google Scholar 

  • Bernaards, F., Monsma, E., & Zinn, P. (2012). High tech crime. Criminaliteitsbeeldanalyse, 2012. Retrieved from https://www.politie.nl/binaries/content/assets/politie/algemeen/nationaal-dreigingsbeeld-2012/cba-hightechcrime.pdf

  • Bernasco, W. (2010). Offenders on offending: Learning about crime from criminals. New York, NY: Taylor & Francis US.

    Google Scholar 

  • Brar, H. S., & Kumar, G. (2018). Cybercrimes: A proposed taxonomy and challenges. Journal of Computer Networks and Communications, 2018, 1–11.

    Article  Google Scholar 

  • Cappellari, L., & Jenkins, S. P. (2003). Multivariate probit regression using simulated maximum likelihood. Stata Journal, 3(3), 278–294.

    Article  Google Scholar 

  • Chan, D., & Wang, D. (2015). Profiling cybercrime perpetrators in china and its policy countermeasures. In R. G. Smith, R. C.-C. Cheung, & L. Y.-C. Lau (Eds.), Cybercrime risks and responses: Eastern and western perspectives (pp. 206–221). London: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Chiesa, R., Ducci, S., & Ciappi, S. (2008). Profiling hackers: The science of criminal profiling as applied to the world of hacking. Boca Raton, FL: CRC Press.

    Book  Google Scholar 

  • Chua, Y.-T., & Holt, T. J. (2016). A cross-national examination of the techniques of neutralization to account for hacking behaviors. Victims & Offenders, 11(4), 534–555.

    Article  Google Scholar 

  • Dalal, A. S., & Sharma, R. (2007). Peeping into a hacker’s mind: Can criminological theories explain hacking? ICFAI Journal of Cyber Law, 6(4), 34–47.

    Google Scholar 

  • Denning, D. E. (2011). Cyber conflict as an emergent social phenomenon. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 170–186). New York, NY: Information Science Reference.

    Chapter  Google Scholar 

  • Fotinger, C., & Ziegler, W. (2004). Understanding a hacker’s mind: A psychological insight into the hijacking of identities. Krems an der Donau: Donau-Universität Krems.

    Google Scholar 

  • Furnell, S. M. (2002). Categorising cybercrime and cybercriminals: The problem and potential approaches. Journal of Information Warfare, 1(5), 35–44.

    Google Scholar 

  • Gordon, S., & Ma, Q. (2003). Convergence of virus writers and hackers: Fact or fantasy? Retrieved from http://index-of.es/Viruses/C/Convergence%20of%20Virus%20Writers%20and%20Hackers%20Fact%20or%20Fantasy.pdf

  • Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243–249.

    Article  Google Scholar 

  • Grabosky, P. N. (2017). The evolution of cybercrime, 2006–2016. In T. J. Holt (Ed.), Cybercrime through an interdisciplinary lens (pp. 15–36). New York, NY: Routledge.

    Google Scholar 

  • Grabosky, P. N., & Walkley, S. (2007). Computer crime and white-collar crime. In H. N. Pontell & G. L. Geis (Eds.), International handbook of white-collar and corporate crime (pp. 358–375). New York, NY: Springer US.

    Chapter  Google Scholar 

  • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28(2), 171–198.

    Article  Google Scholar 

  • Holt, T. J. (2009). The attack dynamics of political and religiously motivated hackers. Paper presented at the Cyber Infrastructure Protection Conference, New York, NY.

    Google Scholar 

  • Holt, T. J., & Kilger, M. (2012). Know your enemy: The social dynamics of hacking. The Honeynet Project. Retrieved from https://www.honeynet.org/papers/kye-kyt/know-your-enemy-the-social-dynamics-of-hacking/

  • Holt, T. J., Leukfeldt, R., & Van de Weijer, S. (2020). An examination of motivation and routine activity theory to account for cyberattacks against Dutch web sites. Criminal Justice and Behavior, 47(4), 487–505.

    Article  Google Scholar 

  • Hutchings, A., & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163–1178.

    Article  Google Scholar 

  • Ibrahim, S. (2016). Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47, 44–57.

    Article  Google Scholar 

  • Jordan, T., & Taylor, P. A. (1998). A sociology of hackers. The Sociological Review, 46(4), 757–780.

    Article  Google Scholar 

  • Kilger, M. (2011). Social dynamics and the future of technolgy-driven crime. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 205–227). New York, NY: Information Science Reference.

    Chapter  Google Scholar 

  • Kilger, M., Arkin, O., & Stutzman, J. (2004). Profiling. In The Honeynet Project (Ed.), Know your enemy: Learning about security threats (2nd ed.). Boston, MA: Addison-Wesley Professional.

    Google Scholar 

  • Kirwan, G., & Power, A. (2013). Cybercrime: The psychology of online offenders. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Kshetri, N. (2009). Positive externality, increasing returns, and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144.

    Article  Google Scholar 

  • Leukfeldt, E. R., Lavorgna, A., & Kleemans, E. R. (2016). Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime. European Journal on Criminal Policy and Research, 23(3), 287–300.

    Article  Google Scholar 

  • Leukfeldt, E. R., Veenstra, S., & Stol, W. P. (2013). High volume cyber crime and the organization of the police: The results of two empirical studies in the Netherlands. International Journal of Cyber Criminology, 7(1), 1–17.

    Google Scholar 

  • Madarie, R. (2017). Hackers’ motivations: Testing Schwartz’s theory of motivational types of values in a sample of hackers. International Journal of Cyber Criminology, 11(1), 78–97.

    Google Scholar 

  • McGuire, M., & Dowling, S. (2013). Chapter 1: Cyber-dependent crimes. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246751/horr75-chap1.pdf.

  • Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). New York, NY: Information Science Reference.

    Google Scholar 

  • National Crime Agency. (2017). Pathways into cyber crime. Retrieved from http://www.nationalcrimeagency.gov.uk/publications/791-pathways-into-cyber-crime/file.

  • National Cyber Security Centre. (2012). Cybercrime: From recognition to report [cybercrime. Van herkenning tot aangifte]. Retrieved from https://www.ncsc.nl/binaries/ncsc/documenten/publicaties/2019/juli/18/handreiking-cybercrime/Handreiking+Cybercrime.pdf

  • Nycyk, M. (2010). Computer hackers in virtual community forums: Identity shaping and dominating other hackers. Paper presented at the Online Conference on Networks and Communities: Debating Communities and Networks.

    Google Scholar 

  • Nykodym, N., Taylor, R., & Vilela, J. (2005). Criminal profiling and insider cyber crime. Computer Law & Security Review, 21(5), 408–414.

    Article  Google Scholar 

  • Provos, N., Rajab, M. A., & Mavrommatis, P. (2009). Cybercrime 2.0: When the cloud turns dark. Communications of the ACM, 52(4), 42–47.

    Article  Google Scholar 

  • Rogers, M. K. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. Winnipeg, MB: University of Manitoba. Retrieved from https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/rogers_01.pdf

    Google Scholar 

  • Rogers, M. K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97–102.

    Article  Google Scholar 

  • Romagna, M., & Van den Hout, N. J. (2017). Hacktivism and website defacement: Motivations, capabilities and potential threats. Paper presented at the 27th Virus Bulletin International Conference.

    Google Scholar 

  • Seebruck, R. (2015). A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Digital Investigation, 14, 36–45.

    Article  Google Scholar 

  • Smith, R. G. (2015). Trajectories of cybercrime. In R. G. Smith, R. C.-C. Cheung, & L. Y.-C. Lau (Eds.), Cybercrime risks and responses: Eastern and western perspectives (pp. 13–34). London: Palgrave Macmillan UK.

    Chapter  Google Scholar 

  • Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55(1), 125–145.

    Article  Google Scholar 

  • Stephenson, P., & Walter, R. (2012). Cyber crime assessment. Paper presented at the 45th Hawaii International Conference on System Science (HICSS), Grand Wailea, Maui, HI, HICSS.

    Google Scholar 

  • Svensson, R., Weerman, F. M., Pauwels, L. J. R., Bruinsma, G. J. N., & Bernasco, W. (2013). Moral emotions and offending: Do feelings of anticipated shame and guilt mediate the effect of socialization on offending? European Journal of Criminology, 10(1), 22–39.

    Article  Google Scholar 

  • Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.

    Article  Google Scholar 

  • Taylor, P. A. (1999). Hackers: Crime in the digital sublime. London: Routledge.

    Google Scholar 

  • Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890–911.

    Article  Google Scholar 

  • Turgeman-Goldschmidt, O. (2008). Meanings that hackers assign to their being a hacker. International Journal of Cyber Criminology, 2(2), 382–396.

    Google Scholar 

  • Turgeman-Goldschmidt, O. (2009). The rhetoric of hackers’ neutralizations. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the internet (pp. 317–335). Cranbury, NJ: Pearson Education.

    Google Scholar 

  • Turgeman-Goldschmidt, O. (2011). Between hackers and white-collar offenders. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 18–37). New York, NY: Information Science Reference.

    Chapter  Google Scholar 

  • Van Der Wagen, W. (2018). The cyborgian deviant: An assessment of the hacker through the lens of actor-network theory. Journal of Qualitative Criminal Justice and Criminology, 6(2), 157–178.

    Google Scholar 

  • Voiskounsky, A. E., & Smyslova, O. V. (2003). Flow-based model of computer hackers’ motivation. Cyberpsychology & Behavior, 6(2), 171–180.

    Article  Google Scholar 

  • Wall, D. S. (2001). Cybercrimes and the internet. In Crime and the internet (pp. 1–17). London: Routledge.

    Google Scholar 

  • White, K. (2013). The rise of cybercrime 1970 through 2010. In A tour of the conditions that gave rise to cybercrime and the crimes themselves. Retrieved from http://www.slideshare.net/bluesme/the-rise-of-cybercrime-1970s-2010-29879338.

  • Woo, H.-J. (2003). The hacker mentality: Exploring the relationship between psychological variables and hacking activities. Athens, GA: The University of Georgia. Retrieved from https://getd.libs.uga.edu/pdfs/woo_hyung-jin_200305_phd.pdf

    Google Scholar 

  • Woo, H.-J., Kim, Y., & Dominick, J. (2004). Hackers: Militants or merry pranksters? A content analysis of defaced web pages. Media Psychology, 6(1), 63–82.

    Article  Google Scholar 

  • Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer hackers. Communications of the ACM, 56(4), 64–74.

    Article  Google Scholar 

  • Yar, M. (2013). Hackers, crackers and viral coders. In M. Yar (Ed.), Cybercrime and society (2nd ed., pp. 21–43). London: Sage.

    Google Scholar 

  • Young, R., Zhang, L., & Prybutok, V. R. (2007). Hacking into the minds of hackers. Information Systems Management, 24(4), 281–287.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marleen Weulen Kranenbarg .

Editor information

Editors and Affiliations

Appendices

Appendix 1: Pattern Matrix Principal Component Analysis

 

Factor

 

1

2

3

4

5

6

7

(α = 0.75)

(α = 0.62)

(α = 0.60)

(α = 0.74)

(α = 0.63)

(α = 0.66)

(α = 0.59)

Cybercrime factor C1

Traditional crime factor T1

Cybercrime factor C2

Cybercrime factor C3

Traditional crime factor T2

Traditional crime factor T3

Cybercrime factor C4

Guessing password

0.70

0.03

−0.08

0.10

0.08

−0.09

0.07

Digital theft

0.77

−0.10

0.14

−0.03

−0.11

0.07

0.05

Hacking

0.65

0.18

−0.13

0.35

−0.18

−0.06

0.06

Damaging data

0.65

0.05

0.07

0.10

0.12

0.03

−0.09

Tax fraud

0.00

0.77

0.09

0.09

−0.27

0.06

−0.02

Stolen goods

0.07

0.63

−0.02

−0.06

0.22

0.09

−0.03

Insurance fraud

−0.01

0.71

0.12

−0.03

0.11

−0.14

0.08

Defacing

−0.07

0.11

0.47

0.14

−0.21

0.34

0.11

Phishing

0.38

−0.07

0.50

−0.07

0.04

0.17

0.19

DDoS

−0.04

0.16

0.61

0.26

0.12

−0.02

0.03

Spam

0.08

0.13

0.78

−0.08

0.09

−0.21

0.00

Taking control

0.19

−0.01

0.03

0.83

0.03

0.08

−0.07

Intercepting communication

0.21

0.01

−0.04

0.66

0.34

−0.11

0.00

Vandalism

0.09

0.14

0.29

0.07

0.37

0.26

−0.23

Burglary

−0.06

0.20

0.22

0.25

0.63

−0.12

0.09

Using weapon

0.04

0.02

0.02

0.12

0.71

0.18

0.19

Stealing

0.35

0.25

0.14

−0.08

0.05

0.40

−0.14

Threats

−0.01

−0.05

0.02

0.07

−0.10

0.75

0.11

Violence

−0.01

0.12

−0.15

−0.10

0.35

0.54

0.28

Carry weapon

0.10

−0.17

0.20

0.00

0.25

0.50

−0.26

Selling drugs

−0.04

0.35

−0.24

0.05

0.08

0.54

−0.06

Malware

−0.14

−0.02

0.14

0.48

−0.11

0.15

0.55

Selling data

0.43

0.01

−0.04

−0.11

0.04

−0.08

0.64

Selling credentials

−0.01

0.05

0.18

0.03

0.27

0.09

0.70

  1. Note: Pattern matrix with oblique rotation, varimax rotation indicated the same classification of crimes (results available upon request)

Appendix 2: Evidence for Significant Differences in Motives Between Clusters

These tables are based on clustered (respondent-crime) multivariate probit models. The underlying parameter estimates are available upon request. Dark gray areas show comparisons between a specific cybercrime and traditional crime cluster, while light gray areas show comparisons between a specific cybercrime and another cybercrime cluster, or a specific traditional crime and another traditional crime cluster.

IM: Intrinsic motives

IM1: Boredom/curiosity/excitement

IM3: Challenging/educational

 

C1

C2

C3

C4

T1

T2

T3

 

C1

C2

C3

C4

T1

T2

T3

C1

 

(+)

  

+++

(+)

+++

C1

    

+

 

+

C2

(−)

   

(+)

  

C2

       

C3

    

(+)

  

C3

    

(+)

  

C4

    

++

 

+

C4

       

T1

– – –

(−)

(−)

– –

   

T1

 

(−)

    

T2

(−)

      

T2

       

T3

– – –

  

   

T3

      

IM2: Fun/felt good

IM4: See how far I could go

 

C1

C2

C3

C4

T1

T2

T3

 

C1

C2

C3

C4

T1

T2

T3

C1

       

C1

       

C2

       

C2

       

C3

   

(−)

 

C3

       

C4

  

+

    

C4

       

T1

  

+

    

T1

       

T2

  

(+)

    

T2

       

T3

       

T3

       

EM: Extrinsic motives

EM1: Damage something

EM3: Put things straight/deliver a message

 

C1

C2

C3

C4

T1

T2

T3

 

C1

C2

C3

C4

T1

T2

T3

C1

  

+++

+++

 

 

C1

   

+++

   

C2

  

+++

+++

+

  

C2

   

+++

   

C3

– – –

– – –

  

– – –

– – –

– – –

C3

   

+++

  

(−)

C4

– – –

– – –

  

– – –

– – –

– – –

C4

– – –

– – –

– – –

 

– – –

– – –

– – –

T1

 

+++

+++

 

(−)

T1

   

+++

  

T2

+

 

+++

+++

+

  

T2

   

+++

   

T3

  

+++

+++

(+)

  

T3

  

(+)

+++

+

  

EM2: Revenge/anger/to bully

EM4: Impress others/gain power

 

C1

C2

C3

C4

T1

T2

T3

 

C1

C2

C3

C4

T1

T2

T3

C1

 

    

– –

C1

  

(+)

    

C2

+

 

++

 

+

  

C2

  

(+)

    

C3

 

– –

   

– –

– –

C3

(−)

(−)

   

(−)

(−)

C4

      

C4

       

T1

 

   

(−)

– –

T1

       

T2

  

++

 

(+)

  

T2

  

(+)

    

T3

++

 

++

+

++

  

T3

  

(+)

    

FM: Financial motive

FM: Earn something

 
 

C1

C2

C3

C4

T1

T2

T3

        

C1

    

– – –

 

        

C2

    

– – –

 

– –

        

C3

    

– – –

 

        

C4

    

– – –

          

T1

+++

+++

+++

+++

 

+++

+++

        

T2

    

– – –

          

T3

+

++

+

 

– – –

          
  1. + indicates more common for crime cluster in left column compared to cluster in upper row
  2. – indicates less common for crime cluster in left column compared to cluster in upper row
  3. +++/− − − = p < 0.001 (two-tailed); ++/− − = p < 0.01 (two-tailed); +/− = p < 0.05 (two-tailed); (+)/(−) = p < 0.10 (two-tailed)

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Weulen Kranenbarg, M. (2021). Cyber-Dependent Crime Versus Traditional Crime: Empirical Evidence for Clusters of Offenses and Related Motives. In: Weulen Kranenbarg, M., Leukfeldt, R. (eds) Cybercrime in Context. Crime and Justice in Digital Society, vol I. Springer, Cham. https://doi.org/10.1007/978-3-030-60527-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-60527-8_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-60526-1

  • Online ISBN: 978-3-030-60527-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics