Skip to main content

Trajectories of Cybercrime

  • Chapter
Cybercrime Risks and Responses

Abstract

This chapter is a condensed and revised version of the author’s earlier work (Smith 2010b), “The Development of Cybercrime: An Opportunity Theory Approach,” originally published in Crime Over Time, edited by Robyn Lincoln and Shirleene Robinson (Cambridge Scholars Publishing, Newcastle upon Tyne). It is included in the current collection with permission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Bibliography

  • Anti-Phishing Working Group (2003) Phishing Activity Trends Report 4th quarter 2003, New York: APWG http://www.antiphishing.org (accessed 13 January 2015).

    Google Scholar 

  • Anti-Phishing Working Group (2010) Phishing Activity Trends Report 4th quarter 2009, New York: APWG http://www.antiphishing.org (accessed 13 January 2015).

    Google Scholar 

  • Anti-Phishing Working Group (2013) Phishing Activity Trends Report 4th quarter 2013, New York: APWG http://www.antiphishing.org (accessed 13 January 2015).

    Google Scholar 

  • Anti-Phishing Working Group (2014) Phishing Activity Trends Report 1st quarter 2014, New York: APWG http://www.antiphishing.org (accessed 13 January 2015).

    Google Scholar 

  • Barker, G. (2003) “Counterfeit Credit Card Gangs on Rise,” Sunday Age, 17 August: 7.

    Google Scholar 

  • Choo, Kim-Kwang Raymond (2007) “Zombies and Botnets,” Trends and Issues in Crime and Criminal Justice 333, Canberra: Australian Institute of Criminology.

    Google Scholar 

  • Choo, Kim-Kwang Raymond (2010) “Cloud Computing: Challenges and Future Directions,” Trends and Issues in Crime and Criminal Justice 400, Canberra: Aus-tralian Institute of Criminology.

    Google Scholar 

  • Choo, Kim-Kwang Raymond and Smith, Russell G. (2008) “Criminal Exploitation of Online Systems by Organised Crime Groups,” Asian Criminology 3: 37–59.

    Article  Google Scholar 

  • Choo, Kim-Kwang Raymond, Smith, Russell G. and McCusker, Rob (2007) “Future Directions in Technology-enabled Crime: 2007–09,” Research and Public Policy Series 78, Canberra: Australian Institute of Criminology.

    Google Scholar 

  • Clarke, Ronald V. (1995) “Situational Crime Prevention,” in Building a Safer Society: Strategic Approaches to Crime Prevention, M. Tonry and D. P. Farrington (eds.), Chicago: University of Chicago Press, 91–150.

    Google Scholar 

  • Clough, Brian and Mungo, P. (1992) Approaching Zero: Data Crime and the Computer Underworld, London: Faber and Faber.

    Google Scholar 

  • Cohen, Lawrence E. and Felson, Marcus (1979) “Social Change and Crime Rate Trends: A Routine Activity Approach,” American Sociological Review 44: 588–608.

    Article  Google Scholar 

  • Curran, James (2010) “Reinterpreting Internet History,” in Handbook of Internet Crime, Y. Jewkes and M. Yar (eds.), Cullompton: Willan Publishing, 273–301.

    Google Scholar 

  • Denning, Dorothy (2010) “Terror’s Web: How the Internet is Transforming Ter-rorism,” in Handbook of Internet Crime, Y. Jewkes and M. Yar (eds.), Cullompton: Willan Publishing, 194–213.

    Google Scholar 

  • Felson, Marcus and Clarke, Ronald V. (1998) Opportunity Makes the Thief: Practical Theory for Crime Prevention, London: Home Office, Policing and Reducing Crime Unit.

    Google Scholar 

  • Fitzgerald, Patrick and Leopold, Mark (1987) Stranger on the Line: The Secret History of Phone Tapping, London: The Bodley Head Limited.

    Google Scholar 

  • Furnell, Steven (2010) “Hackers, Viruses and Malicious Software,” in Handbook of Internet Crime, Y. Jewkes and M. Yar (eds.), Cullompton: Willan Publishing, 173–93.

    Google Scholar 

  • Gibson, William (1984) Neuromancer, London: HarperCollins.

    Google Scholar 

  • Hutchings, Alice, Smith, Russell G. and James, Lachlan (2013) “Cloud Computing for Small Business: Criminal and Security Threats and Prevention Measures,” in Trends and Issues in Crime and Criminal Justice 456, Canberra: Australian Institute of Criminology.

    Google Scholar 

  • Grabosky, Peter N. and Smith, Russell G. (1998) Crime in the Digital Age: Control-ling Telecommunications and Cyberspace Illegalities, Sydney: Federation Press.

    Google Scholar 

  • Johnson, B. (2007) “Virtual Robber Nabbed for Real,” Age (Melbourne), 16 November, http://www.theage.com.au/news/world/virtual-robber-nabbed-for-real/2007/11/15/1194766867217.html (accessed 13 January 2015).

    Google Scholar 

  • Millman, R. (2005) “IT Managers Fail to Protect Mobile Devices,” SC Magazine, 11 November.

    Google Scholar 

  • O’Toole, G. J. A. (1978) The Private Sector: Private Spies, Rent-a-cops, and the Police-industrial Complex, New York: W. W. Norton and Company Inc.

    Google Scholar 

  • Santayana, G. (1905) The Life of Reason; or the Phases of Human Progress vol. 1, New York: Dover Publications (1980 edn.).

    Google Scholar 

  • Smith, Russell G. (1996) “Stealing Telecommunications Services,” in Trends and Issues in Crime and Criminal Justice 54, Canberra: Australian Institute of Criminology.

    Google Scholar 

  • Smith, Russell G. (1998) “The Regulation of Telemedicine” in Health Care, Crime and Regulatory Control, R. G. Smith (ed.), Sydney: Hawkins Press, 190–203.

    Google Scholar 

  • Smith, Russell G. (2007) “Biometric Solutions to Identity-related Cybercrime,” in Crime Online, Y. Jewkes (ed.), Cullompton: Willan Publishing, 44–59.

    Google Scholar 

  • Smith, Russell G. (2010a) “Identity Theft and Fraud,” in Handbook of Internet Crime, Y. Jewkes and M. Yar (eds.), Cullompton: Willan Publishing, 273–301.

    Google Scholar 

  • Smith, Russell G. (2010b) “The Development of Cybercrime: An Opportunity Theory Approach,” in Crime Over Time, R. Lincoln and S. Robinson (eds.), Newcastle upon Tyne: Cambridge Scholars Publishing, 211–36.

    Google Scholar 

  • Smith, Russell G., Grabosky, Peter N. and Urbas, Gregor F. (2004) Cyber Criminals on Trial, Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Smith, Russell G., Wolanin, Nicholas and Worthington, Glenn (2003) “e-Crime Solutions and Crime Displacement,” in Trends and Issues in Crime and Criminal Justice 243, Canberra: Australian Institute of Criminology.

    Google Scholar 

  • Sydney Morning Herald (2002) “A Scam to Bring the House Down,” Sydney Morning Herald, 28 August, http://www.smh.com.au/cgi-bin/common/printArticle.pl?path=/articles/2002/08/27/1030053059530.html (accessed 13 January 2015).

  • Symantec (2007) Internet Security Threat Report, Cupertino: Symantec.

    Google Scholar 

  • Vaidhynathan, S. (2003) Copyrights and Copywrongs: The Rise of Intellectual Property and How It Threatens Creativity, New York: New York University Press.

    Google Scholar 

  • Wall, David S. (2010) “Criminalising Cyberspace: The Rise of the Internet as a ‘Crime Problem’,” in Handbook of Internet Crime, Y. Jewkes and M. Yar (eds.), Cullompton: Willan Publishing, 83–103.

    Google Scholar 

  • Warren, Ian and Palmer, Darren (2010) “Crime Risks of Three-dimensional Virtual Environments,” in Trends and Issues in Crime and Criminal Justice 388, Canberra: Australian Institute of Criminology.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2015 Russell G. Smith

About this chapter

Cite this chapter

Smith, R.G. (2015). Trajectories of Cybercrime. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_2

Download citation

Publish with us

Policies and ethics