Abstract
It is unknown to what extent cyber-dependent offenders are distinctly different from other offenders and to what extent they have different motives. This is addressed in this study by examining to what extent cyber-dependent offenders can be distinguished from traditional offenders and by identifying clusters of cyber-dependent and traditional offenses. In addition, it is explored which motives for offending the offenders provide and to what extent a specific cluster of crimes distinguishes itself from the other clusters by specific motives. The analyses are based on a survey among a Dutch high-risk sample of adult cyber-dependent offenders (N = 268) and traditional offenders (N = 270). The principal component analysis identified seven clusters of crimes, four clusters that include only cyber-dependent crime and three clusters that only include traditional crimes. This indicates that cyber-dependent offenders can be distinguished from traditional offenders. In addition, cyber-dependent crimes can be distinguished from traditional crimes by almost all motives. The cyber-dependent crimes are mostly committed out of intrinsic motives, i.e., committing the crime is in itself rewarding. Financial motives are almost absent for cyber-dependent crime. Differences between cyber-dependent crime clusters are mainly found in extrinsic motives, i.e., the extent to which the external consequences of committing a crime is rewarding. The results are discussed in light of the existing cybercrime literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
It should be noted that not all literature about hackers is necessarily only about criminals. Hacking can be part of a completely legitimate profession.
- 2.
This procedure was approved by the Ethics Committee. Apart from selecting the respondents, the Public Prosecutor’s Office was not involved in sending the letters or the rest of the data collection and analyses. Respondents could, therefore, participate anonymously, and their personal results would not be shared with the Public Prosecutor’s Office.
- 3.
Communication with this type of website is completely encrypted and less easy to trace. Three traditional sample respondents completed the survey on paper and three cyber-dependent sample respondents completed it through the Tor Hidden Service website.
- 4.
Some also load on another cluster (factor loading above 0.30). For interpretation clarity and further analyses, the highest factor loading is used to assign each crime to only one cluster.
References
Alleyne, B. (2011). “We are all hackers now”: Critical sociological reflections on the hacking phenomenon. Goldsmiths Research online. Retrieved from http://www.arifyildirim.com/ilt510/brian.alleyne.pdf.
Bachmann, M. (2011). Deciphering the hacker underground: First quantitative insights. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 105–126). New York, NY: Information Science Reference.
Bachmann, M., & Corzine, J. (2010). Insights into the hacking underground. In T. Finnie, T. Petee, & J. Jarvis (Eds.), The future challenges of cybercrime (Proceedings of the futures working group 2010) (Vol. 5, pp. 31–41). Quantico, VA: FBI.
Bernaards, F., Monsma, E., & Zinn, P. (2012). High tech crime. Criminaliteitsbeeldanalyse, 2012. Retrieved from https://www.politie.nl/binaries/content/assets/politie/algemeen/nationaal-dreigingsbeeld-2012/cba-hightechcrime.pdf
Bernasco, W. (2010). Offenders on offending: Learning about crime from criminals. New York, NY: Taylor & Francis US.
Brar, H. S., & Kumar, G. (2018). Cybercrimes: A proposed taxonomy and challenges. Journal of Computer Networks and Communications, 2018, 1–11.
Cappellari, L., & Jenkins, S. P. (2003). Multivariate probit regression using simulated maximum likelihood. Stata Journal, 3(3), 278–294.
Chan, D., & Wang, D. (2015). Profiling cybercrime perpetrators in china and its policy countermeasures. In R. G. Smith, R. C.-C. Cheung, & L. Y.-C. Lau (Eds.), Cybercrime risks and responses: Eastern and western perspectives (pp. 206–221). London: Palgrave Macmillan.
Chiesa, R., Ducci, S., & Ciappi, S. (2008). Profiling hackers: The science of criminal profiling as applied to the world of hacking. Boca Raton, FL: CRC Press.
Chua, Y.-T., & Holt, T. J. (2016). A cross-national examination of the techniques of neutralization to account for hacking behaviors. Victims & Offenders, 11(4), 534–555.
Dalal, A. S., & Sharma, R. (2007). Peeping into a hacker’s mind: Can criminological theories explain hacking? ICFAI Journal of Cyber Law, 6(4), 34–47.
Denning, D. E. (2011). Cyber conflict as an emergent social phenomenon. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 170–186). New York, NY: Information Science Reference.
Fotinger, C., & Ziegler, W. (2004). Understanding a hacker’s mind: A psychological insight into the hijacking of identities. Krems an der Donau: Donau-Universität Krems.
Furnell, S. M. (2002). Categorising cybercrime and cybercriminals: The problem and potential approaches. Journal of Information Warfare, 1(5), 35–44.
Gordon, S., & Ma, Q. (2003). Convergence of virus writers and hackers: Fact or fantasy? Retrieved from http://index-of.es/Viruses/C/Convergence%20of%20Virus%20Writers%20and%20Hackers%20Fact%20or%20Fantasy.pdf
Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243–249.
Grabosky, P. N. (2017). The evolution of cybercrime, 2006–2016. In T. J. Holt (Ed.), Cybercrime through an interdisciplinary lens (pp. 15–36). New York, NY: Routledge.
Grabosky, P. N., & Walkley, S. (2007). Computer crime and white-collar crime. In H. N. Pontell & G. L. Geis (Eds.), International handbook of white-collar and corporate crime (pp. 358–375). New York, NY: Springer US.
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28(2), 171–198.
Holt, T. J. (2009). The attack dynamics of political and religiously motivated hackers. Paper presented at the Cyber Infrastructure Protection Conference, New York, NY.
Holt, T. J., & Kilger, M. (2012). Know your enemy: The social dynamics of hacking. The Honeynet Project. Retrieved from https://www.honeynet.org/papers/kye-kyt/know-your-enemy-the-social-dynamics-of-hacking/
Holt, T. J., Leukfeldt, R., & Van de Weijer, S. (2020). An examination of motivation and routine activity theory to account for cyberattacks against Dutch web sites. Criminal Justice and Behavior, 47(4), 487–505.
Hutchings, A., & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163–1178.
Ibrahim, S. (2016). Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47, 44–57.
Jordan, T., & Taylor, P. A. (1998). A sociology of hackers. The Sociological Review, 46(4), 757–780.
Kilger, M. (2011). Social dynamics and the future of technolgy-driven crime. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 205–227). New York, NY: Information Science Reference.
Kilger, M., Arkin, O., & Stutzman, J. (2004). Profiling. In The Honeynet Project (Ed.), Know your enemy: Learning about security threats (2nd ed.). Boston, MA: Addison-Wesley Professional.
Kirwan, G., & Power, A. (2013). Cybercrime: The psychology of online offenders. Cambridge: Cambridge University Press.
Kshetri, N. (2009). Positive externality, increasing returns, and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144.
Leukfeldt, E. R., Lavorgna, A., & Kleemans, E. R. (2016). Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime. European Journal on Criminal Policy and Research, 23(3), 287–300.
Leukfeldt, E. R., Veenstra, S., & Stol, W. P. (2013). High volume cyber crime and the organization of the police: The results of two empirical studies in the Netherlands. International Journal of Cyber Criminology, 7(1), 1–17.
Madarie, R. (2017). Hackers’ motivations: Testing Schwartz’s theory of motivational types of values in a sample of hackers. International Journal of Cyber Criminology, 11(1), 78–97.
McGuire, M., & Dowling, S. (2013). Chapter 1: Cyber-dependent crimes. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246751/horr75-chap1.pdf.
Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). New York, NY: Information Science Reference.
National Crime Agency. (2017). Pathways into cyber crime. Retrieved from http://www.nationalcrimeagency.gov.uk/publications/791-pathways-into-cyber-crime/file.
National Cyber Security Centre. (2012). Cybercrime: From recognition to report [cybercrime. Van herkenning tot aangifte]. Retrieved from https://www.ncsc.nl/binaries/ncsc/documenten/publicaties/2019/juli/18/handreiking-cybercrime/Handreiking+Cybercrime.pdf
Nycyk, M. (2010). Computer hackers in virtual community forums: Identity shaping and dominating other hackers. Paper presented at the Online Conference on Networks and Communities: Debating Communities and Networks.
Nykodym, N., Taylor, R., & Vilela, J. (2005). Criminal profiling and insider cyber crime. Computer Law & Security Review, 21(5), 408–414.
Provos, N., Rajab, M. A., & Mavrommatis, P. (2009). Cybercrime 2.0: When the cloud turns dark. Communications of the ACM, 52(4), 42–47.
Rogers, M. K. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. Winnipeg, MB: University of Manitoba. Retrieved from https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/rogers_01.pdf
Rogers, M. K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97–102.
Romagna, M., & Van den Hout, N. J. (2017). Hacktivism and website defacement: Motivations, capabilities and potential threats. Paper presented at the 27th Virus Bulletin International Conference.
Seebruck, R. (2015). A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Digital Investigation, 14, 36–45.
Smith, R. G. (2015). Trajectories of cybercrime. In R. G. Smith, R. C.-C. Cheung, & L. Y.-C. Lau (Eds.), Cybercrime risks and responses: Eastern and western perspectives (pp. 13–34). London: Palgrave Macmillan UK.
Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55(1), 125–145.
Stephenson, P., & Walter, R. (2012). Cyber crime assessment. Paper presented at the 45th Hawaii International Conference on System Science (HICSS), Grand Wailea, Maui, HI, HICSS.
Svensson, R., Weerman, F. M., Pauwels, L. J. R., Bruinsma, G. J. N., & Bernasco, W. (2013). Moral emotions and offending: Do feelings of anticipated shame and guilt mediate the effect of socialization on offending? European Journal of Criminology, 10(1), 22–39.
Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.
Taylor, P. A. (1999). Hackers: Crime in the digital sublime. London: Routledge.
Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890–911.
Turgeman-Goldschmidt, O. (2008). Meanings that hackers assign to their being a hacker. International Journal of Cyber Criminology, 2(2), 382–396.
Turgeman-Goldschmidt, O. (2009). The rhetoric of hackers’ neutralizations. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the internet (pp. 317–335). Cranbury, NJ: Pearson Education.
Turgeman-Goldschmidt, O. (2011). Between hackers and white-collar offenders. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 18–37). New York, NY: Information Science Reference.
Van Der Wagen, W. (2018). The cyborgian deviant: An assessment of the hacker through the lens of actor-network theory. Journal of Qualitative Criminal Justice and Criminology, 6(2), 157–178.
Voiskounsky, A. E., & Smyslova, O. V. (2003). Flow-based model of computer hackers’ motivation. Cyberpsychology & Behavior, 6(2), 171–180.
Wall, D. S. (2001). Cybercrimes and the internet. In Crime and the internet (pp. 1–17). London: Routledge.
White, K. (2013). The rise of cybercrime 1970 through 2010. In A tour of the conditions that gave rise to cybercrime and the crimes themselves. Retrieved from http://www.slideshare.net/bluesme/the-rise-of-cybercrime-1970s-2010-29879338.
Woo, H.-J. (2003). The hacker mentality: Exploring the relationship between psychological variables and hacking activities. Athens, GA: The University of Georgia. Retrieved from https://getd.libs.uga.edu/pdfs/woo_hyung-jin_200305_phd.pdf
Woo, H.-J., Kim, Y., & Dominick, J. (2004). Hackers: Militants or merry pranksters? A content analysis of defaced web pages. Media Psychology, 6(1), 63–82.
Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer hackers. Communications of the ACM, 56(4), 64–74.
Yar, M. (2013). Hackers, crackers and viral coders. In M. Yar (Ed.), Cybercrime and society (2nd ed., pp. 21–43). London: Sage.
Young, R., Zhang, L., & Prybutok, V. R. (2007). Hacking into the minds of hackers. Information Systems Management, 24(4), 281–287.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix 1: Pattern Matrix Principal Component Analysis
Factor | |||||||
---|---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 | |
(α = 0.75) | (α = 0.62) | (α = 0.60) | (α = 0.74) | (α = 0.63) | (α = 0.66) | (α = 0.59) | |
Cybercrime factor C1 | Traditional crime factor T1 | Cybercrime factor C2 | Cybercrime factor C3 | Traditional crime factor T2 | Traditional crime factor T3 | Cybercrime factor C4 | |
Guessing password | 0.70 | 0.03 | −0.08 | 0.10 | 0.08 | −0.09 | 0.07 |
Digital theft | 0.77 | −0.10 | 0.14 | −0.03 | −0.11 | 0.07 | 0.05 |
Hacking | 0.65 | 0.18 | −0.13 | 0.35 | −0.18 | −0.06 | 0.06 |
Damaging data | 0.65 | 0.05 | 0.07 | 0.10 | 0.12 | 0.03 | −0.09 |
Tax fraud | 0.00 | 0.77 | 0.09 | 0.09 | −0.27 | 0.06 | −0.02 |
Stolen goods | 0.07 | 0.63 | −0.02 | −0.06 | 0.22 | 0.09 | −0.03 |
Insurance fraud | −0.01 | 0.71 | 0.12 | −0.03 | 0.11 | −0.14 | 0.08 |
Defacing | −0.07 | 0.11 | 0.47 | 0.14 | −0.21 | 0.34 | 0.11 |
Phishing | 0.38 | −0.07 | 0.50 | −0.07 | 0.04 | 0.17 | 0.19 |
DDoS | −0.04 | 0.16 | 0.61 | 0.26 | 0.12 | −0.02 | 0.03 |
Spam | 0.08 | 0.13 | 0.78 | −0.08 | 0.09 | −0.21 | 0.00 |
Taking control | 0.19 | −0.01 | 0.03 | 0.83 | 0.03 | 0.08 | −0.07 |
Intercepting communication | 0.21 | 0.01 | −0.04 | 0.66 | 0.34 | −0.11 | 0.00 |
Vandalism | 0.09 | 0.14 | 0.29 | 0.07 | 0.37 | 0.26 | −0.23 |
Burglary | −0.06 | 0.20 | 0.22 | 0.25 | 0.63 | −0.12 | 0.09 |
Using weapon | 0.04 | 0.02 | 0.02 | 0.12 | 0.71 | 0.18 | 0.19 |
Stealing | 0.35 | 0.25 | 0.14 | −0.08 | 0.05 | 0.40 | −0.14 |
Threats | −0.01 | −0.05 | 0.02 | 0.07 | −0.10 | 0.75 | 0.11 |
Violence | −0.01 | 0.12 | −0.15 | −0.10 | 0.35 | 0.54 | 0.28 |
Carry weapon | 0.10 | −0.17 | 0.20 | 0.00 | 0.25 | 0.50 | −0.26 |
Selling drugs | −0.04 | 0.35 | −0.24 | 0.05 | 0.08 | 0.54 | −0.06 |
Malware | −0.14 | −0.02 | 0.14 | 0.48 | −0.11 | 0.15 | 0.55 |
Selling data | 0.43 | 0.01 | −0.04 | −0.11 | 0.04 | −0.08 | 0.64 |
Selling credentials | −0.01 | 0.05 | 0.18 | 0.03 | 0.27 | 0.09 | 0.70 |
Appendix 2: Evidence for Significant Differences in Motives Between Clusters
These tables are based on clustered (respondent-crime) multivariate probit models. The underlying parameter estimates are available upon request. Dark gray areas show comparisons between a specific cybercrime and traditional crime cluster, while light gray areas show comparisons between a specific cybercrime and another cybercrime cluster, or a specific traditional crime and another traditional crime cluster.
IM: Intrinsic motives | |||||||||||||||
IM1: Boredom/curiosity/excitement | IM3: Challenging/educational | ||||||||||||||
C1 | C2 | C3 | C4 | T1 | T2 | T3 | C1 | C2 | C3 | C4 | T1 | T2 | T3 | ||
C1 | (+) | +++ | (+) | +++ | C1 | + | + | ||||||||
C2 | (−) | (+) | C2 | ||||||||||||
C3 | (+) | C3 | (+) | ||||||||||||
C4 | ++ | + | C4 | ||||||||||||
T1 | – – – | (−) | (−) | – – | T1 | − | (−) | ||||||||
T2 | (−) | T2 | |||||||||||||
T3 | – – – | − | T3 | − | |||||||||||
IM2: Fun/felt good | IM4: See how far I could go | ||||||||||||||
C1 | C2 | C3 | C4 | T1 | T2 | T3 | C1 | C2 | C3 | C4 | T1 | T2 | T3 | ||
C1 | C1 | ||||||||||||||
C2 | C2 | ||||||||||||||
C3 | − | − | (−) | C3 | |||||||||||
C4 | + | C4 | |||||||||||||
T1 | + | T1 | |||||||||||||
T2 | (+) | T2 | |||||||||||||
T3 | T3 | ||||||||||||||
EM: Extrinsic motives | |||||||||||||||
EM1: Damage something | EM3: Put things straight/deliver a message | ||||||||||||||
C1 | C2 | C3 | C4 | T1 | T2 | T3 | C1 | C2 | C3 | C4 | T1 | T2 | T3 | ||
C1 | +++ | +++ | − | C1 | +++ | ||||||||||
C2 | +++ | +++ | + | C2 | +++ | ||||||||||
C3 | – – – | – – – | – – – | – – – | – – – | C3 | +++ | (−) | |||||||
C4 | – – – | – – – | – – – | – – – | – – – | C4 | – – – | – – – | – – – | – – – | – – – | – – – | |||
T1 | − | +++ | +++ | − | (−) | T1 | +++ | − | |||||||
T2 | + | +++ | +++ | + | T2 | +++ | |||||||||
T3 | +++ | +++ | (+) | T3 | (+) | +++ | + | ||||||||
EM2: Revenge/anger/to bully | EM4: Impress others/gain power | ||||||||||||||
C1 | C2 | C3 | C4 | T1 | T2 | T3 | C1 | C2 | C3 | C4 | T1 | T2 | T3 | ||
C1 | − | – – | C1 | (+) | |||||||||||
C2 | + | ++ | + | C2 | (+) | ||||||||||
C3 | – – | – – | – – | C3 | (−) | (−) | (−) | (−) | |||||||
C4 | − | C4 | |||||||||||||
T1 | − | (−) | – – | T1 | |||||||||||
T2 | ++ | (+) | T2 | (+) | |||||||||||
T3 | ++ | ++ | + | ++ | T3 | (+) | |||||||||
FM: Financial motive | |||||||||||||||
FM: Earn something | |||||||||||||||
C1 | C2 | C3 | C4 | T1 | T2 | T3 | |||||||||
C1 | – – – | − | |||||||||||||
C2 | – – – | – – | |||||||||||||
C3 | – – – | − | |||||||||||||
C4 | – – – | ||||||||||||||
T1 | +++ | +++ | +++ | +++ | +++ | +++ | |||||||||
T2 | – – – | ||||||||||||||
T3 | + | ++ | + | – – – |
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Weulen Kranenbarg, M. (2021). Cyber-Dependent Crime Versus Traditional Crime: Empirical Evidence for Clusters of Offenses and Related Motives. In: Weulen Kranenbarg, M., Leukfeldt, R. (eds) Cybercrime in Context. Crime and Justice in Digital Society, vol I. Springer, Cham. https://doi.org/10.1007/978-3-030-60527-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-60527-8_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-60526-1
Online ISBN: 978-3-030-60527-8
eBook Packages: Law and CriminologyLaw and Criminology (R0)