Abstract
This chapter is a condensed and revised version of the author’s earlier work (Smith 2010b), “The Development of Cybercrime: An Opportunity Theory Approach,” originally published in Crime Over Time, edited by Robyn Lincoln and Shirleene Robinson (Cambridge Scholars Publishing, Newcastle upon Tyne). It is included in the current collection with permission.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Bibliography
Anti-Phishing Working Group (2003) Phishing Activity Trends Report 4th quarter 2003, New York: APWG http://www.antiphishing.org (accessed 13 January 2015).
Anti-Phishing Working Group (2010) Phishing Activity Trends Report 4th quarter 2009, New York: APWG http://www.antiphishing.org (accessed 13 January 2015).
Anti-Phishing Working Group (2013) Phishing Activity Trends Report 4th quarter 2013, New York: APWG http://www.antiphishing.org (accessed 13 January 2015).
Anti-Phishing Working Group (2014) Phishing Activity Trends Report 1st quarter 2014, New York: APWG http://www.antiphishing.org (accessed 13 January 2015).
Barker, G. (2003) “Counterfeit Credit Card Gangs on Rise,” Sunday Age, 17 August: 7.
Choo, Kim-Kwang Raymond (2007) “Zombies and Botnets,” Trends and Issues in Crime and Criminal Justice 333, Canberra: Australian Institute of Criminology.
Choo, Kim-Kwang Raymond (2010) “Cloud Computing: Challenges and Future Directions,” Trends and Issues in Crime and Criminal Justice 400, Canberra: Aus-tralian Institute of Criminology.
Choo, Kim-Kwang Raymond and Smith, Russell G. (2008) “Criminal Exploitation of Online Systems by Organised Crime Groups,” Asian Criminology 3: 37–59.
Choo, Kim-Kwang Raymond, Smith, Russell G. and McCusker, Rob (2007) “Future Directions in Technology-enabled Crime: 2007–09,” Research and Public Policy Series 78, Canberra: Australian Institute of Criminology.
Clarke, Ronald V. (1995) “Situational Crime Prevention,” in Building a Safer Society: Strategic Approaches to Crime Prevention, M. Tonry and D. P. Farrington (eds.), Chicago: University of Chicago Press, 91–150.
Clough, Brian and Mungo, P. (1992) Approaching Zero: Data Crime and the Computer Underworld, London: Faber and Faber.
Cohen, Lawrence E. and Felson, Marcus (1979) “Social Change and Crime Rate Trends: A Routine Activity Approach,” American Sociological Review 44: 588–608.
Curran, James (2010) “Reinterpreting Internet History,” in Handbook of Internet Crime, Y. Jewkes and M. Yar (eds.), Cullompton: Willan Publishing, 273–301.
Denning, Dorothy (2010) “Terror’s Web: How the Internet is Transforming Ter-rorism,” in Handbook of Internet Crime, Y. Jewkes and M. Yar (eds.), Cullompton: Willan Publishing, 194–213.
Felson, Marcus and Clarke, Ronald V. (1998) Opportunity Makes the Thief: Practical Theory for Crime Prevention, London: Home Office, Policing and Reducing Crime Unit.
Fitzgerald, Patrick and Leopold, Mark (1987) Stranger on the Line: The Secret History of Phone Tapping, London: The Bodley Head Limited.
Furnell, Steven (2010) “Hackers, Viruses and Malicious Software,” in Handbook of Internet Crime, Y. Jewkes and M. Yar (eds.), Cullompton: Willan Publishing, 173–93.
Gibson, William (1984) Neuromancer, London: HarperCollins.
Hutchings, Alice, Smith, Russell G. and James, Lachlan (2013) “Cloud Computing for Small Business: Criminal and Security Threats and Prevention Measures,” in Trends and Issues in Crime and Criminal Justice 456, Canberra: Australian Institute of Criminology.
Grabosky, Peter N. and Smith, Russell G. (1998) Crime in the Digital Age: Control-ling Telecommunications and Cyberspace Illegalities, Sydney: Federation Press.
Johnson, B. (2007) “Virtual Robber Nabbed for Real,” Age (Melbourne), 16 November, http://www.theage.com.au/news/world/virtual-robber-nabbed-for-real/2007/11/15/1194766867217.html (accessed 13 January 2015).
Millman, R. (2005) “IT Managers Fail to Protect Mobile Devices,” SC Magazine, 11 November.
O’Toole, G. J. A. (1978) The Private Sector: Private Spies, Rent-a-cops, and the Police-industrial Complex, New York: W. W. Norton and Company Inc.
Santayana, G. (1905) The Life of Reason; or the Phases of Human Progress vol. 1, New York: Dover Publications (1980 edn.).
Smith, Russell G. (1996) “Stealing Telecommunications Services,” in Trends and Issues in Crime and Criminal Justice 54, Canberra: Australian Institute of Criminology.
Smith, Russell G. (1998) “The Regulation of Telemedicine” in Health Care, Crime and Regulatory Control, R. G. Smith (ed.), Sydney: Hawkins Press, 190–203.
Smith, Russell G. (2007) “Biometric Solutions to Identity-related Cybercrime,” in Crime Online, Y. Jewkes (ed.), Cullompton: Willan Publishing, 44–59.
Smith, Russell G. (2010a) “Identity Theft and Fraud,” in Handbook of Internet Crime, Y. Jewkes and M. Yar (eds.), Cullompton: Willan Publishing, 273–301.
Smith, Russell G. (2010b) “The Development of Cybercrime: An Opportunity Theory Approach,” in Crime Over Time, R. Lincoln and S. Robinson (eds.), Newcastle upon Tyne: Cambridge Scholars Publishing, 211–36.
Smith, Russell G., Grabosky, Peter N. and Urbas, Gregor F. (2004) Cyber Criminals on Trial, Cambridge: Cambridge University Press.
Smith, Russell G., Wolanin, Nicholas and Worthington, Glenn (2003) “e-Crime Solutions and Crime Displacement,” in Trends and Issues in Crime and Criminal Justice 243, Canberra: Australian Institute of Criminology.
Sydney Morning Herald (2002) “A Scam to Bring the House Down,” Sydney Morning Herald, 28 August, http://www.smh.com.au/cgi-bin/common/printArticle.pl?path=/articles/2002/08/27/1030053059530.html (accessed 13 January 2015).
Symantec (2007) Internet Security Threat Report, Cupertino: Symantec.
Vaidhynathan, S. (2003) Copyrights and Copywrongs: The Rise of Intellectual Property and How It Threatens Creativity, New York: New York University Press.
Wall, David S. (2010) “Criminalising Cyberspace: The Rise of the Internet as a ‘Crime Problem’,” in Handbook of Internet Crime, Y. Jewkes and M. Yar (eds.), Cullompton: Willan Publishing, 83–103.
Warren, Ian and Palmer, Darren (2010) “Crime Risks of Three-dimensional Virtual Environments,” in Trends and Issues in Crime and Criminal Justice 388, Canberra: Australian Institute of Criminology.
Editor information
Editors and Affiliations
Copyright information
© 2015 Russell G. Smith
About this chapter
Cite this chapter
Smith, R.G. (2015). Trajectories of Cybercrime. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_2
Download citation
DOI: https://doi.org/10.1057/9781137474162_2
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-55788-2
Online ISBN: 978-1-137-47416-2
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)