Abstract
The Internet and its affiliated technology currently dominate commerce, education, banking, and so many other facets of our daily lives. However, with this constant use of technology and innovation, it is no surprise that a dark underworld of criminality emerged, otherwise known as cybercrime. This entry will explain the development of cybercrime and its current state online. Each category of cybercrime will be explored, including discussion of the associated behaviors and the potential effects. In addition, this entry will investigate the responses to cybercrime made by the following entities: the criminal justice system, educational programs, and corporations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ang, R., Huan, V., & Florell, D. (2014). Understanding the relationship between proactive and reactive aggression, and cyberbullying across United States and Singapore adolescent samples. Journal of Interpersonal Violence, 29, 237–254.
Arkansas Code Ann. 5-41-1018 (20150 Massachusetts General Laws ch. 265, 43A(a)) (2016).
Arnold, M. (2014, July 21). A disturbing picture: Revenge porn is a vicious new way to smear someone’s professional reputation. HRMagazine, 59(8), 58. Retrieved from http://www.shrm.org/publications/hrmagazine/editorialcontent/2014/0814/pages/0814-revenge-porn.aspx.
Ashcroft v. Free Speech Coalition 535 U.S. 234 (2002).
Baum, K., Catalano, S., Kristina, R., & Rand, M. (2009, January). Stalking victimization in the United States. Washington, DC: Bureau of Justice Studies. U.S. Department of Justice.
Belknap, J., Chu, A., & DePrince, A. (2011). Roles of phones and computers in threatening and abusing women victims of male intimate partner abuse. Duke Journal of Gender Law & Policy, 19, 373.
Bennet, D., Guran, E., Ramos, M., & Margolin, G. (2011). College students’ electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors. Violence and Victims, 4, 410–429.
Borrajo, E., Gamez-Guadix, M., Prereda, N., & Calvete, E. (2015). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358–365. https://doi.org/10.1016/j.chb.2015.01.063.
Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420.
Burke, S., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27(3), 1162–1167.
Burruss, G., Bossler, A., & Holt, T. (2013). Assessing the mediation of a fuller social learning model on low self-control’s influence on software piracy. Crime & Delinquency, 59, 1157–1184.
Chu, B., Holt, T., & Ahn, G. (2010). Examining the creation, distribution, and function of malware online. Washington, DC: National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018.
District of Columbia v. Cleveland 13 DVM 1341 (Superior Court 2014).
Englander, E. (2012a). Bullying and cyberbullying in teens: Clinical factors. The American Academy of Child and Adolescent Psychiatry. Retrieved from https://aacap.confex.com/aacap/2012/webpogram/Session8538.html.
Englander, E. (2012b). Research findings: MARC 2011 survey grades 3-12. Bridgewater, Massachusetts: Massachusetts Aggression Reduction Center, Bridgewater State University. Retrieved from http://webhost.bridgew.edu/marc/MARC%20REPORT-Bullying%20In%20Grades%203-12%20in%20MA.pdf.
Englander, E., Parti, K., & McCoy, M. (2015). Evaluation of a university-based bullying and cyberbullying prevention program. Journal of Modern Education Review, 5(10), 937–950.
Federal Trade Commission. (2012). Identity theft. Retrieved July 24, 2012, from http://www.ftc.gov/bcp/edu/microsites/idtheft2012/.
Finkelhor, D., Turner, H., Ormrod, R., & Hamby, S. (2010). Trends in childhood violence and abuse exposure: Evidence from 2 national surveys. Archives of Pediatric and Adolescent Medicine, 164, 239–242.
Forrester Consulting. (2009). DDoS: A threat you can’t afford to ignore. Retrieved from https://www.nl-ix.net/docs/versign/whitepaper-ddos-threat-forrester.
FS-ISAC. (2018). About FS-ISAC. Retrieved from https://www.fsisac.com/about.
Gaille, B. (2017, May 23). 23 shocking music piracy statistics. Retrieved from https://brandongaille.com/21-shocking-music-piracy-statistics/.
Gerlich, R., Lewer, J., & Lucas, D. (2010). Illegal media file sharing: The impact of cultural and demographic factors. Journal of Internet Commerce, 9, 104–126.
Gillespie, A. (2012). Child pornography: Law and policy. New York, NY: Routledge.
Goode, E. (2013, September 24). Once scorned, but on revenge sites, twice hurt. New York Times, A11.
Greenberg, P. (2017). The newest net threat. State Legislatures Magazine. Retrieved from http://www.ncsl.org/bookstore/state-legislatures-magazine/trends-in-state-policy-news.aspx.
Gregg, M. (2014). Cyber-random and online extortion—5 ways you could fall victim. Huffington Post. Retrieved from http://www.huffingtonpost.com/michael-gregg/cyber-ransom-and-online-e_b_5548810.html.
Hamm, M., Newton, A., Chisholm, A., Shulhan, J., Milne, A., Sudnar, P., et al. (2015). Prevalence and effect of cyberbullying on children and young people: A scoping review of social media studies. JAMA Pediatrics, 169, 770–777.
Hazelwood, S., & Koon-Magnin, S. (2013). Cyberstalking and cyberharassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology, 7(2), 155–160.
Higgins, G. (2006). Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4, 1–30.
Higgins, G., & Marcum, C. D. (2011). Digital piracy: An integrated theoretical approach. Durham, NC: Carolina Academic Press.
Hinduja, S., & Patchin, J. W. (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Violence, 6(3), 89–112. https://doi.org/10.1300/J202v06n03_06.
Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 1–29.
Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Sage Publications (Corwin Press).
Hinduja, S. & Patchin, J. W. (2013). Social influences on cyberbullying behaviors among middle and high school students. Journal of Youth and Adolescence, 42(5), 711–722. http://doi.org/10.1007/s10964-012-9902-4.
Hines, D., & Finkelhor, D. (2007). Statutory sex crime relationships between juveniles and adults: A review of social scientific research. Aggressive and Violent Behavior, 12, 300–314.
Hinjuda, S. (2006). Music piracy and crime theory. El Paso, TX: LFB Scholarly Publications.
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.
Holt, T. J. (2013). Exploring the social organisation and structure of stolen data markets. Global Crime, 14, 155–174.
Holt, T. J., & Bossler, A. M. (2009a). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1–25.
Holt, T. J., & Bossler, A. M. (2009b). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 28, 1–25.
Hui, K., Kim, S., & Wang, Q. (2017). Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks. MIS Quarterly, 41(2), 497–523.
Jaishankar, K. (2009). Sexting: A new form of victimless crime? International Journal of Cybercriminology, 31(1), 21–25.
Jones, L., Mitchell, K., & Finkelhor, D. (2012). Trends in youth internet victimization: Findings from three youth Internet safety surveys 2000–2010. Journal of Adolescent Health, 50, 179–186.
Kapersky Lab. (2015). Global IT security risks survey. Retrieved from https://media.kaspersky.com/en/business-security/it-security-risks-survey-2015.pdf.
Katos, V., & Bednar, P. (2008). A cyber-crime investigation framework. Computer Standards & Interfaces, 30(4), 223–229.
Kelly, K. (2017, November). Steeling treasury against cyberthreats. Treasury & Risk, 2–11.
Korchmaros, J., Ybarra, M., Langhinrichsen-Rohling, J., Boyd, D., & Lenhart, A. (2013). Perpetration of teen dating violence in a networked society. Cyberpsychology, Behavior, & Social Networking, 16, 1–7.
Korte, J. (2017). Mitigating cyber risks through information sharing. Journal of Payments, Strategy & Systems, 11(3), 203–214.
Lamphere, R., & Pikciunas, K. (2016). Sexting, sextortion, and other internet sexual offenses. In J. Navarro, S. Clevenger, & C. Marcum (Eds.), The intersection between intimate partner abuse, technology and cybercrime: Examining the virtual enemy (pp. 141–165). Durham, NC: Carolina Academic Press.
Li, X. (2007). International actions against cybercrime: Networking legal systems in the networked crime science. Webology, 4(3).
Marcum, C. D. (2014). Cybercrime. New York: Wolters Kluwer.
Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35(7).
Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2014). Becoming someone new: Identity theft behaviors by high school students. Journal of Financial Crime, 22(3), 318–328.
Marshak, E. (2017). Online harassment: A legislative solution. Harvard Journal on Legislation. Retrieved from http://harvardjol.com/wp-content/uploads/2017/05/HLL205.pdf.
Mayer, J. (2016). Cybercrime litigation. University of Pennsylvania Law Review, 16, 1453–1507.
Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2012). Prevalence and characteristics of youth sexting: A national study. Pediatrics, 129, 13–20.
Mitchell, K. J., Finkelhor, D., & Wolak, J. (2007). Online requests for sexual pictures from youth: Risk factors and incident characteristics. Journal of Adolescent Health, 41, 196–203.
Modecki, K., Minchin, J., Harbaugh, A., Guerra, N., & Runions, K. (2014). Bullying prevalence across contexts: A meta-analysis measuring cyber and traditional bullying. Journal of Adolescent Health, 55, 602–611.
Moore, R. (2011). Cybercrime: Investigating high-technology computer crime (2nd ed.). Burlington, MA: Anderson Publishing.
Morris, R., & Higgins, G. (2009). Neutralizing potential and self-reported digital piracy: A multi-theoretical exploration among college undergraduates. Crime Justice Review, 34, 173–195.
MUSO. (2017). Global piracy report 2017. Retrieved from https://www.muso.com/wp-content/uploads/2017/04/MUSO_2017_Global_Sample_Market_Insights_report.pdf.
Nansel, T. R., Overpeck, M., Pilla, R. S., Ruan, W. J., Simons-Morton, B., & Scheidt, P. (2001). Bullying behaviors among U.S. youth: Prevalence and association with psychosocial adjustment. Journal of the American Medical Association, 285, 2094–2100. https://doi.org/10.1001/jama.285.16.2094.
Navarro, J. (2016). Cyberabuse and cyberstalking. In J. Navarro, S. Clevenger, & C. Marcum (Eds.), The intersection between intimate partner abuse, technology and cybercrime: Examining the virtual enemy (pp. 125–140). Durham, NC: Carolina Academic Press.
New York v. Ferber 458 U.S. 747 (1982).
Olweus, D. (1993). Bullying at school: What we know and what we can do. Oxford, Cambridge: Blackwell.
Pabian, S., & Vandebosch, H. (2015). An investigation of short-term longitudinal associations between social anxiety and victimization and perpetration of traditional bullying and cyberbullying. Journal of Youth Adolescence. https://doi.org/10.1007/s10964-015-0259-3.
Png, I., Wang, C., & Wang, Q. (2008). The deterrent and displacement effects on information security enforcement: International evidence. Journal of Management Information Systems, 25(2), 125–144.
Rogers, M., Smoak, N., & Liu, J. (2005). Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior, 27, 245–268.
Rosoff, S., Pontell, H., & Tillman, R. (2002). Profit without honor: White-collar crime and the looting of America. Upper Saddle River, NJ: Prentice Hall.
Schrock, S., & Boyd, D. (2009). Online threats to youth: Solicitation, harassment, and problematic content: A review by the Research Advisory Board of the Internet Safety Technical Task Force. Retrieved July 2, 2009, from http://cyber.law.harvard.edu/research/isttf/RAB.
Short, E., Linford, S., Wheatcroft, J., & Maple, C. (2014). The impact of cyberstalking: The lived experience-a thematic analysis. Studies in Health Technology and Informatics, 199, 133–137.
Smith, P., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippet, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49(4), 376–385.
Stambaugh, H., Beaupre, D. S., Icove, D. J., Baker, R., Cassady, W., & Williams, W. P. (2001). Electronic crime needs assessment for state and local law enforcement, NCJ 186276 (Vol. 186276). Washington, DC: National Institute of Justice.
Symantec. (2016). ISTR Internet security threat report. Retrieved from https://www.symantec.com/content/dam/symantec/cocs/.
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2010). Digital crime and digital terrorism (2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall.
United States v. Goff 501 F.3d 250, 251 (3d Cir. 2007).
United States v. Williams 583 U.S. 285 (2008).
US v. Shiver 305 Fed.Appx.640.
US v. Tucker 305 F.3d 1193 (2002).
US v. Goff 155 Fed.Appx.773, 776 (5th Cir. 2005).
Wall, D. (2010). Micro-frauds: Virtual robberies, stings and scams in the information age. In T. Holt & B. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 68–85). Hershey, PA: Information Science Reference.
Wastler, S. (2010). The harm in sexting? Analyzing the constitutionality of child pornography statutes that prohibit the voluntary production, possession, and dissemination of sexually explicit images by teenagers. Harvard Journal of Law & Gender, 33, 687–702.
Weins, W. (2014). Concepts and context. In T. Heistand & W. J. Weins (Eds.), Sexting and youth (pp. 63–76). Durham, NC: Carolina Academic Press.
Wells, M., & Mitchell, K. (2008). How do high-risk youth use the internet? Characteristics and implications for prevention. Child Maltreatment, 13, 227–234.
Wells, M., & Mitchell, K. (2013). Patterns of internet use and risk of online victimization for youth with and without disabilities. Journal of Special Education, 20, 1–10.
White, W., & Carmody, D. (2016). Preventing online victimization: College students’ views on intervention and prevention. Journal of Interpersonal Violence, 1–17.
Wolak, J., & Finkelhor, D. (2016). Sextortion: Findings from a survey of 1,631 victims. Crimes Against Children Research Center. Retrieved from https://27l51l1qnwey246mkc1vzqg0-wpengine.netdna-ssl.com/wp-content/uploads/2016/08/Sextortion_Report.pdf.
Wright, M. (2018). Cyberstalking victimization, depression and academic performance: The role of perceived social support from parents. Cyberpsychology, Behavior and Social Networking, 21(2), 110–116.
Zweig, J., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 1–15.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Marcum, C.D., Higgins, G.E. (2019). Cybercrime. In: Krohn, M., Hendrix, N., Penly Hall, G., Lizotte, A. (eds) Handbook on Crime and Deviance. Handbooks of Sociology and Social Research. Springer, Cham. https://doi.org/10.1007/978-3-030-20779-3_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-20779-3_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-20778-6
Online ISBN: 978-3-030-20779-3
eBook Packages: Social SciencesSocial Sciences (R0)