Skip to main content

Unique Offender, Unique Response? Assessing the Suitability and Effectiveness of Interventions for Cyber Offenders

  • Chapter
  • First Online:
Cybercrime in Context

Part of the book series: Crime and Justice in Digital Society ((CJDS,volume I))

Abstract

Recent developments indicate that cyber-focused crimes are on the rise among both adolescents and adults, making a proper response vital. The knowledge in regard to how to effectively respond to cyber offenders is, however, still very limited. This chapter aims to provide insight into what interventions could potentially be effective for cyber offenders, taking into account their (unique) features. In this context, we assess three types of interventions: deterrence-based, risk-based and strength-based interventions. The potential effectiveness of these interventions is assessed by integrating findings from a systematic literature study, expert interviews and offender interviews. Our findings show that various “traditional” motivational, personal and contextual factors can be found among cyber offenders (e.g. peer pressure, neutralisation), but these manifest differently online. We also found factors (e.g. intellectual motivations, social discomfort, limited awareness of illegality) that set them apart from (most) traditional offenders. In light of these (unique) features, traditional interventions such as behavioural interventions can be effective, but need to be adjusted to the online context. Deterrence-based interventions are considered effective if they are applied more swiftly and focus more on generating general deterrence. Interventions that give first offenders the opportunity to use their talents in a pro-social way could potentially be effective for preventing reoffending. Considering the wide variety of cyber offenders, a tailor-made rather than a ‘one-size-fits all’ approach seems to be the right path.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    See also: https://www.thehaguesecuritydelta.com/news/newsitem/1353-79-hackers-attack-the-municipality-of-the-hague-for-6-hours.

  2. 2.

    In this research, we maintain a broad definition of interventions. Alternatives such as hacker competitions are also termed ‘interventions’ since they can contribute to behavioural change and a decrease of reoffending risks.

  3. 3.

    The research was commissioned by the Dutch Ministry of Security and Justice and supervised by the WODC (Scientific Research and Documentation Centre).

  4. 4.

    The Halt program (abbreviation of ‘Het Alternatief’ [The Alternative]) is an alternative for punishment for juveniles between 12 and 18 years of age who have been apprehended for nuisance, vandalism or petty theft, in order to avoid a criminal record.

  5. 5.

    It is important to note that the term ‘peers’ is quite broad in the online context and that it can refer to friendships, student–mentor relations or criminal partnerships.

  6. 6.

    In 2018 the National Cyber Security Centre of the Dutch Ministry of Justice and Security established the guideline Coordinated Vulnerability Disclosure (CVD) which aims ‘to improve the security of IT systems by sharing knowledge about vulnerabilities. Owners of IT systems can then mitigate vulnerabilities before these will be actively abused by third parties’ (NCSC, 2018).

References

  • Aiken, M., Davidson, J., & Amann, D. (2016). Youth pathways into cybercrime. Europol: European Cybercrime Centre/UCD Geary Institute for Public Policy/Middlesex University.

    Google Scholar 

  • Andrews, D. A., Bonta, J., & Wormith, J. S. (2006). The recent past and near future of risk and/or need assessment. Crime & Delinquency, 52(1), 7–27.

    Article  Google Scholar 

  • Andrews, D. A., Zinger, I., Hoge, R. D., Bonta, J., Gendreau, P., & Cullen, F. T. (1990). Does correctional treatment work? A clinically relevant and psychologically informed meta-analysis. Criminology, 28(3), 369–404.

    Article  Google Scholar 

  • CBS. (2020, March 2). Less traditional crime, more cybercrime. Retrieved from https://www.cbs.nl/en-gb/news/2020/10/less-traditional-crime-more-cybercrime

  • Chatfield, A. T., & Reddick, C. G. (2018). Crowdsourced cybersecurity innovation: The case of the Pentagon’s vulnerability reward program. Information Polity, 23(2), 177–194.

    Article  Google Scholar 

  • Chen, V. H., & Chang, G. S. (2016). Active and restrictive parental mediation over time: Effects on youths’ self-regulatory competencies and impulsivity. Computers and Education, 98, 206–212.

    Article  Google Scholar 

  • Chiesa, R., Ducci, S., & Ciappi, S. (2009). Profiling hackers. The science of criminal profiling as applied to the world of hacking. Boca Raton, FL: Auerbach Publications.

    Google Scholar 

  • Choo, K. R. (2011). The cyber threat landscape: challenges and future research directions. Computer & Security, 30, 719–731.

    Google Scholar 

  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608.

    Article  Google Scholar 

  • Cornish, D. B., & Clarke, R. V. (1986). The reasoning criminal: Rational choice perspectives on offending. New York, NY: Transaction Publishers.

    Book  Google Scholar 

  • Cybersprint. (2019, July 24). Invitation for hack the Hague 2019. Retrieved from https://www.cybersprint.com/news/hack-the-hague-2019

  • Dahan, M. (2013). Hacking for the homeland: Patriotic hackers versus hacktivists. In Article presented at the 8th international conference on information warfare and security, Denver, CO

    Google Scholar 

  • De Bruijne, M. (2018). Hack_Right. Een interventie voor jonge, naïeve cybercriminelen. Opportuun, 24(2), 73–83.

    Google Scholar 

  • Europol. (2016). Internet organised crime threat assessment (IOCTA) 2016. The Hague: Europol.

    Google Scholar 

  • Farrington, D. P. (2011). Families and crime. In J. Q. Wilson & J. Petersilia (Eds.), Crime and public policy (pp. 130–157). Oxford: Oxford University Press.

    Google Scholar 

  • Giordano, P. C., Cernkovich, S. A., & Rudolph, J. L. (2002). Gender, crime, and desistance: Toward a theory of cognitive transformation. American Journal of Science, 107(4), 990–1064.

    Google Scholar 

  • Hampson, K. S. (2018). Desistance approaches in youth justice – The next passing fad or a sea-change for the positive? Youth Justice, 18(1), 18–33.

    Google Scholar 

  • Hoek van Dijke, N. (2016). Onderzoeksrapportage. Jongeren over cybercrime en gedigitaliseerde criminaliteit. Den Haag: Ministerie van Justitie en Veiligheid.

    Google Scholar 

  • Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance and desistance. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context (pp. 117–140). Durham: Carolina Academic Press.

    Google Scholar 

  • Hutchings, A., & Holt, T. J. (2017). The online stolen data market: Disruption and intervention approaches. Global Crime, 18(1), 11–30.

    Article  Google Scholar 

  • Kleck, G., Sever, B., Li, S., & Gertz, M. (2005). The missing link in general deterrence research. Criminology, 43(3), 623–660.

    Article  Google Scholar 

  • Kroese, G. J., & Staring, R. H. J. M. (1993). Prestige, professie en wanhoop. Een onderzoek onder gedetineerde overvallers. Gouda Quint: Arnhem.

    Google Scholar 

  • Laub, J. H., & Sampson, R. J. (2003). Shared beginnings, divergent lives. Delinquent boys to age 70. Cambridge: Harvard University Press.

    Google Scholar 

  • Leukfeldt, E. R., Domenie, M. M. L., & Stol, W. (2010). Verkenning cybercrime in Nederland 2009. Den Haag: Boom Uitgevers.

    Google Scholar 

  • Lipsey, M. W., & Cullen, F. T. (2007). The effectiveness of correctional rehabilitation: A review of systematic reviews. Annual Review of Law and Social Science, 3, 297–320.

    Article  Google Scholar 

  • Lowenkamp, C. T., Latessa, E. J., & Holsinger, A. M. (2006). The risk principle in action: What have we learned from 13,676 offenders and correctional programs? Crime & Delinquency, 52(1), 77–93.

    Article  Google Scholar 

  • McMurran, M., & Ward, T. (2010). Treatment readiness, treatment engagement and behaviour change. Criminal Behaviour and Mental Health, 20(2), 75–85.

    Article  Google Scholar 

  • McNeill, F., Farrall, S., Lightowler, C., & Maruna, S. (2012). Reexamining evidence-based practice in community corrections: Beyond ‘a confined view’ of what works. Justice Research and Policy, 14(1), 35–60.

    Article  Google Scholar 

  • National Crime Agency. (2017). Pathways into cyber crime. Retrieved from https://www.nationalcrimeagency.gov.uk/who-we-are/publications/6-pathways-into-cyber-crime-1/file/

  • NCSC. (2018). Coordinated vulnerability disclosure: The guideline. The Hague: NCSC.

    Google Scholar 

  • Odinot, G., Verhoeven, M. A., Pool, R. L. D., & de Poot, D. J. (2017). Organised cybercrime in the Netherlands: Empirical findings and implications for law enforcement. The Hague: WODC.

    Google Scholar 

  • Oosterwijk, K., & Fischer, T. F. C. (2017). Interventies jeugdige daders cybercrime. Den Haag: WODC.

    Google Scholar 

  • Paternoster, R. (2010). How much do we really know about criminal deterrence. Journal of Criminal Law and Criminology, 100(3), 765–824.

    Google Scholar 

  • Paternoster, R., McGloin, J. M., Nguyen, H., & Thomas, K. J. (2012). The causal impact of exposure to deviant peers: An experimental investigation. Journal of Research in Crime and Delinquency, 50(4), 476–503.

    Article  Google Scholar 

  • Politie. (2020, April 21). Gamechangers: houd jongeren weg bij cybercrime. Retrieved from https://www.politie.nl/nieuws/2020/april/21/gamechangers-campagne.html

  • Power, A., & Kirwan, G. (2014). The future of cyberpscyhology. In A. Power & G. Kirwan (Eds.), Cyberpsychology and new media: A thematic reading (pp. 231–236). London: Psychology Press.

    Google Scholar 

  • Rogers, M. K. (2010). The psyche of cybercriminals: A psycho-social perspective. In S. Ghosh & E. Turrini (Eds.), Cybercrimes: A multidisciplinary analysis (pp. 217–235). Heidelberg: Springer.

    Google Scholar 

  • Rogers, M. K., Smoak, N. D., & Liu, J. (2006). Self-reported deviant computer behavior: A Big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior, 27(3), 245–268.

    Article  Google Scholar 

  • Sasson, H., & Mesch, G. (2014). Parental mediation, peer norms and risky online behaviour among adolescents. Computers in Human Behaviour, 33, 32–38.

    Article  Google Scholar 

  • Seigfried-Spellar, K. C., O’Quinn, C. L., & Treadway, K. N. (2015). Assessing the relationship between autistic traits and cyberdeviancy in a sample of college students. Behaviour & Information Technology, 34(5), 533–542.

    Article  Google Scholar 

  • Smith, R., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial. Port Melbourne, VIC: Cambridge University Press.

    Book  Google Scholar 

  • Steinmetz, K. F. (2015). Craft(y)ness. An ethnographic study of hacking. The British Journal of Criminology, 55(1), 125–145.

    Article  Google Scholar 

  • Suler, H. (2004). The online disinhibition effect. Cyberpsychology & Behavior, 7(3), 321–236.

    Article  Google Scholar 

  • Švábenský, V., Vykopal, J., Cermak, M., & Laštovička, M. (2018). Enhancing cybersecurity skills by creating serious games. In Proceedings of 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’18). New York, NY: ACM.

    Google Scholar 

  • Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.

    Article  Google Scholar 

  • Tanczer, L. M. (2017). The terrorist – Hacker/Hacktivist distinction: An investigation of self-identified hackers and Hacktivists. In M. Conway, L. Jarvis, O. Lehane, S. Macdonald, & L. Nouri (Eds.), Terrorists’ use of the internet (pp. 77–92). Amsterdam: IOS Press.

    Google Scholar 

  • Turgeman-Goldschmidt, O. (2005). Hacker’s accounts: Hacking as a social entertainment. Social Science Computer Review, 23(1), 8–23.

    Article  Google Scholar 

  • Van der Wagen, W. (2018). The Cyborgian deviant: An assessment of the hacker through actor network theory. Journal of Qualitative Criminal Justice & Criminology, 6(2), 157–178.

    Google Scholar 

  • Van der Wagen, W., Althoff, M., & Van Swaaningen, R. (2016). De andere ‘anderen’. Een exploratieve studie naar processen van labelling van, door en tussen hackers. Tijdschrift over Cultuur & Criminaliteit, 6(1), 27–41.

    Google Scholar 

  • Van der Wagen, W., Van’ t Zand, E., Matthijsse, S., & Fischer, T. F. C. (2020). Cyberdaders: Uniek profiel, unieke aanpak? Een onderzoek naar kenmerken van en passende interventies voor daders van cybercriminaliteit in enge zin. Den Haag: Wetenschappelijk Onderzoek-en Documentatiecentrum.

    Google Scholar 

  • Vermaas, P. (2018). Actiedag DDoS-aanvallen. Opportuun, 2.

    Google Scholar 

  • Ward, M. (2017). Rehab camp aims to put young cyber-crooks on right track. BBC. Retrieved From https://www.bbc.com/news/technology-40629887

  • Weulen Kranenbarg, M. (2018). Cyber-offenders versus traditional offenders: an empirical comparison. Dissertation. Retrieved from http://dare.ubvu.vu.nl/handle/1871/55530?show=full

  • Wible, B. (2003). A site where hackers are welcome: Using hack-in contests to shape preferences and deter computer crime. The Yale Law Journal, 112(6), 1577–1623.

    Article  Google Scholar 

  • Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer hackers. Communications of the ACM, 56(4), 64–74.

    Article  Google Scholar 

  • Zebel, S., De Vries, P., Giebels, E., Kuttschreuter, M., & Stol, W. (2013). Jeugdige daders van cybercrime in Nederland: Een empirische verkenning. Den Haag: WODC.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wytske van der Wagen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

van der Wagen, W., Fischer, T., Matthijsse, S., van ’t Zand, E. (2021). Unique Offender, Unique Response? Assessing the Suitability and Effectiveness of Interventions for Cyber Offenders. In: Weulen Kranenbarg, M., Leukfeldt, R. (eds) Cybercrime in Context. Crime and Justice in Digital Society, vol I. Springer, Cham. https://doi.org/10.1007/978-3-030-60527-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-60527-8_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-60526-1

  • Online ISBN: 978-3-030-60527-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics