Skip to main content

Cybercrime

  • Chapter
  • First Online:
Handbook on Crime and Deviance

Abstract

The Internet and its affiliated technology currently dominate commerce, education, banking, and so many other facets of our daily lives. However, with this constant use of technology and innovation, it is no surprise that a dark underworld of criminality emerged, otherwise known as cybercrime. This entry will explain the development of cybercrime and its current state online. Each category of cybercrime will be explored, including discussion of the associated behaviors and the potential effects. In addition, this entry will investigate the responses to cybercrime made by the following entities: the criminal justice system, educational programs, and corporations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Ang, R., Huan, V., & Florell, D. (2014). Understanding the relationship between proactive and reactive aggression, and cyberbullying across United States and Singapore adolescent samples. Journal of Interpersonal Violence, 29, 237–254.

    Article  Google Scholar 

  • Arkansas Code Ann. 5-41-1018 (20150 Massachusetts General Laws ch. 265, 43A(a)) (2016).

    Google Scholar 

  • Arnold, M. (2014, July 21). A disturbing picture: Revenge porn is a vicious new way to smear someone’s professional reputation. HRMagazine, 59(8), 58. Retrieved from http://www.shrm.org/publications/hrmagazine/editorialcontent/2014/0814/pages/0814-revenge-porn.aspx.

  • Ashcroft v. Free Speech Coalition 535 U.S. 234 (2002).

    Google Scholar 

  • Baum, K., Catalano, S., Kristina, R., & Rand, M. (2009, January). Stalking victimization in the United States. Washington, DC: Bureau of Justice Studies. U.S. Department of Justice.

    Google Scholar 

  • Belknap, J., Chu, A., & DePrince, A. (2011). Roles of phones and computers in threatening and abusing women victims of male intimate partner abuse. Duke Journal of Gender Law & Policy, 19, 373.

    Google Scholar 

  • Bennet, D., Guran, E., Ramos, M., & Margolin, G. (2011). College students’ electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors. Violence and Victims, 4, 410–429.

    Article  Google Scholar 

  • Borrajo, E., Gamez-Guadix, M., Prereda, N., & Calvete, E. (2015). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358–365. https://doi.org/10.1016/j.chb.2015.01.063.

    Article  Google Scholar 

  • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400–420.

    Google Scholar 

  • Burke, S., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27(3), 1162–1167.

    Article  Google Scholar 

  • Burruss, G., Bossler, A., & Holt, T. (2013). Assessing the mediation of a fuller social learning model on low self-control’s influence on software piracy. Crime & Delinquency, 59, 1157–1184.

    Article  Google Scholar 

  • Chu, B., Holt, T., & Ahn, G. (2010). Examining the creation, distribution, and function of malware online. Washington, DC: National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018.

    Google Scholar 

  • District of Columbia v. Cleveland 13 DVM 1341 (Superior Court 2014).

    Google Scholar 

  • Englander, E. (2012a). Bullying and cyberbullying in teens: Clinical factors. The American Academy of Child and Adolescent Psychiatry. Retrieved from https://aacap.confex.com/aacap/2012/webpogram/Session8538.html.

  • Englander, E. (2012b). Research findings: MARC 2011 survey grades 3-12. Bridgewater, Massachusetts: Massachusetts Aggression Reduction Center, Bridgewater State University. Retrieved from http://webhost.bridgew.edu/marc/MARC%20REPORT-Bullying%20In%20Grades%203-12%20in%20MA.pdf.

  • Englander, E., Parti, K., & McCoy, M. (2015). Evaluation of a university-based bullying and cyberbullying prevention program. Journal of Modern Education Review, 5(10), 937–950.

    Article  Google Scholar 

  • Federal Trade Commission. (2012). Identity theft. Retrieved July 24, 2012, from http://www.ftc.gov/bcp/edu/microsites/idtheft2012/.

  • Finkelhor, D., Turner, H., Ormrod, R., & Hamby, S. (2010). Trends in childhood violence and abuse exposure: Evidence from 2 national surveys. Archives of Pediatric and Adolescent Medicine, 164, 239–242.

    Article  Google Scholar 

  • Forrester Consulting. (2009). DDoS: A threat you can’t afford to ignore. Retrieved from https://www.nl-ix.net/docs/versign/whitepaper-ddos-threat-forrester.

  • FS-ISAC. (2018). About FS-ISAC. Retrieved from https://www.fsisac.com/about.

  • Gaille, B. (2017, May 23). 23 shocking music piracy statistics. Retrieved from https://brandongaille.com/21-shocking-music-piracy-statistics/.

  • Gerlich, R., Lewer, J., & Lucas, D. (2010). Illegal media file sharing: The impact of cultural and demographic factors. Journal of Internet Commerce, 9, 104–126.

    Article  Google Scholar 

  • Gillespie, A. (2012). Child pornography: Law and policy. New York, NY: Routledge.

    Book  Google Scholar 

  • Goode, E. (2013, September 24). Once scorned, but on revenge sites, twice hurt. New York Times, A11.

    Google Scholar 

  • Greenberg, P. (2017). The newest net threat. State Legislatures Magazine. Retrieved from http://www.ncsl.org/bookstore/state-legislatures-magazine/trends-in-state-policy-news.aspx.

  • Gregg, M. (2014). Cyber-random and online extortion—5 ways you could fall victim. Huffington Post. Retrieved from http://www.huffingtonpost.com/michael-gregg/cyber-ransom-and-online-e_b_5548810.html.

  • Hamm, M., Newton, A., Chisholm, A., Shulhan, J., Milne, A., Sudnar, P., et al. (2015). Prevalence and effect of cyberbullying on children and young people: A scoping review of social media studies. JAMA Pediatrics, 169, 770–777.

    Article  Google Scholar 

  • Hazelwood, S., & Koon-Magnin, S. (2013). Cyberstalking and cyberharassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology, 7(2), 155–160.

    Google Scholar 

  • Higgins, G. (2006). Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4, 1–30.

    Google Scholar 

  • Higgins, G., & Marcum, C. D. (2011). Digital piracy: An integrated theoretical approach. Durham, NC: Carolina Academic Press.

    Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Violence, 6(3), 89–112. https://doi.org/10.1300/J202v06n03_06.

    Article  Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 1–29.

    Article  Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Sage Publications (Corwin Press).

    Google Scholar 

  • Hinduja, S. & Patchin, J. W. (2013). Social influences on cyberbullying behaviors among middle and high school students. Journal of Youth and Adolescence, 42(5), 711–722. http://doi.org/10.1007/s10964-012-9902-4.

    Article  Google Scholar 

  • Hines, D., & Finkelhor, D. (2007). Statutory sex crime relationships between juveniles and adults: A review of social scientific research. Aggressive and Violent Behavior, 12, 300–314.

    Article  Google Scholar 

  • Hinjuda, S. (2006). Music piracy and crime theory. El Paso, TX: LFB Scholarly Publications.

    Google Scholar 

  • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.

    Article  Google Scholar 

  • Holt, T. J. (2013). Exploring the social organisation and structure of stolen data markets. Global Crime, 14, 155–174.

    Article  Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2009a). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1–25.

    Article  Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2009b). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 28, 1–25.

    Google Scholar 

  • Hui, K., Kim, S., & Wang, Q. (2017). Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks. MIS Quarterly, 41(2), 497–523.

    Article  Google Scholar 

  • Jaishankar, K. (2009). Sexting: A new form of victimless crime? International Journal of Cybercriminology, 31(1), 21–25.

    Google Scholar 

  • Jones, L., Mitchell, K., & Finkelhor, D. (2012). Trends in youth internet victimization: Findings from three youth Internet safety surveys 2000–2010. Journal of Adolescent Health, 50, 179–186.

    Article  Google Scholar 

  • Kapersky Lab. (2015). Global IT security risks survey. Retrieved from https://media.kaspersky.com/en/business-security/it-security-risks-survey-2015.pdf.

  • Katos, V., & Bednar, P. (2008). A cyber-crime investigation framework. Computer Standards & Interfaces, 30(4), 223–229.

    Article  Google Scholar 

  • Kelly, K. (2017, November). Steeling treasury against cyberthreats. Treasury & Risk, 2–11.

    Google Scholar 

  • Korchmaros, J., Ybarra, M., Langhinrichsen-Rohling, J., Boyd, D., & Lenhart, A. (2013). Perpetration of teen dating violence in a networked society. Cyberpsychology, Behavior, & Social Networking, 16, 1–7.

    Article  Google Scholar 

  • Korte, J. (2017). Mitigating cyber risks through information sharing. Journal of Payments, Strategy & Systems, 11(3), 203–214.

    Google Scholar 

  • Lamphere, R., & Pikciunas, K. (2016). Sexting, sextortion, and other internet sexual offenses. In J. Navarro, S. Clevenger, & C. Marcum (Eds.), The intersection between intimate partner abuse, technology and cybercrime: Examining the virtual enemy (pp. 141–165). Durham, NC: Carolina Academic Press.

    Google Scholar 

  • Li, X. (2007). International actions against cybercrime: Networking legal systems in the networked crime science. Webology, 4(3).

    Google Scholar 

  • Marcum, C. D. (2014). Cybercrime. New York: Wolters Kluwer.

    Google Scholar 

  • Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35(7).

    Google Scholar 

  • Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2014). Becoming someone new: Identity theft behaviors by high school students. Journal of Financial Crime, 22(3), 318–328.

    Article  Google Scholar 

  • Marshak, E. (2017). Online harassment: A legislative solution. Harvard Journal on Legislation. Retrieved from http://harvardjol.com/wp-content/uploads/2017/05/HLL205.pdf.

  • Mayer, J. (2016). Cybercrime litigation. University of Pennsylvania Law Review, 16, 1453–1507.

    Google Scholar 

  • Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2012). Prevalence and characteristics of youth sexting: A national study. Pediatrics, 129, 13–20.

    Article  Google Scholar 

  • Mitchell, K. J., Finkelhor, D., & Wolak, J. (2007). Online requests for sexual pictures from youth: Risk factors and incident characteristics. Journal of Adolescent Health, 41, 196–203.

    Article  Google Scholar 

  • Modecki, K., Minchin, J., Harbaugh, A., Guerra, N., & Runions, K. (2014). Bullying prevalence across contexts: A meta-analysis measuring cyber and traditional bullying. Journal of Adolescent Health, 55, 602–611.

    Article  Google Scholar 

  • Moore, R. (2011). Cybercrime: Investigating high-technology computer crime (2nd ed.). Burlington, MA: Anderson Publishing.

    Google Scholar 

  • Morris, R., & Higgins, G. (2009). Neutralizing potential and self-reported digital piracy: A multi-theoretical exploration among college undergraduates. Crime Justice Review, 34, 173–195.

    Article  Google Scholar 

  • MUSO. (2017). Global piracy report 2017. Retrieved from https://www.muso.com/wp-content/uploads/2017/04/MUSO_2017_Global_Sample_Market_Insights_report.pdf.

  • Nansel, T. R., Overpeck, M., Pilla, R. S., Ruan, W. J., Simons-Morton, B., & Scheidt, P. (2001). Bullying behaviors among U.S. youth: Prevalence and association with psychosocial adjustment. Journal of the American Medical Association, 285, 2094–2100. https://doi.org/10.1001/jama.285.16.2094.

    Article  Google Scholar 

  • Navarro, J. (2016). Cyberabuse and cyberstalking. In J. Navarro, S. Clevenger, & C. Marcum (Eds.), The intersection between intimate partner abuse, technology and cybercrime: Examining the virtual enemy (pp. 125–140). Durham, NC: Carolina Academic Press.

    Google Scholar 

  • New York v. Ferber 458 U.S. 747 (1982).

    Google Scholar 

  • Olweus, D. (1993). Bullying at school: What we know and what we can do. Oxford, Cambridge: Blackwell.

    Google Scholar 

  • Pabian, S., & Vandebosch, H. (2015). An investigation of short-term longitudinal associations between social anxiety and victimization and perpetration of traditional bullying and cyberbullying. Journal of Youth Adolescence. https://doi.org/10.1007/s10964-015-0259-3.

    Article  Google Scholar 

  • Png, I., Wang, C., & Wang, Q. (2008). The deterrent and displacement effects on information security enforcement: International evidence. Journal of Management Information Systems, 25(2), 125–144.

    Article  Google Scholar 

  • Rogers, M., Smoak, N., & Liu, J. (2005). Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior, 27, 245–268.

    Article  Google Scholar 

  • Rosoff, S., Pontell, H., & Tillman, R. (2002). Profit without honor: White-collar crime and the looting of America. Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  • Schrock, S., & Boyd, D. (2009). Online threats to youth: Solicitation, harassment, and problematic content: A review by the Research Advisory Board of the Internet Safety Technical Task Force. Retrieved July 2, 2009, from http://cyber.law.harvard.edu/research/isttf/RAB.

  • Short, E., Linford, S., Wheatcroft, J., & Maple, C. (2014). The impact of cyberstalking: The lived experience-a thematic analysis. Studies in Health Technology and Informatics, 199, 133–137.

    Google Scholar 

  • Smith, P., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippet, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49(4), 376–385.

    Article  Google Scholar 

  • Stambaugh, H., Beaupre, D. S., Icove, D. J., Baker, R., Cassady, W., & Williams, W. P. (2001). Electronic crime needs assessment for state and local law enforcement, NCJ 186276 (Vol. 186276). Washington, DC: National Institute of Justice.

    Google Scholar 

  • Symantec. (2016). ISTR Internet security threat report. Retrieved from https://www.symantec.com/content/dam/symantec/cocs/.

  • Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2010). Digital crime and digital terrorism (2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall.

    Google Scholar 

  • United States v. Goff 501 F.3d 250, 251 (3d Cir. 2007).

    Google Scholar 

  • United States v. Williams 583 U.S. 285 (2008).

    Google Scholar 

  • US v. Shiver 305 Fed.Appx.640.

    Google Scholar 

  • US v. Tucker 305 F.3d 1193 (2002).

    Google Scholar 

  • US v. Goff 155 Fed.Appx.773, 776 (5th Cir. 2005).

    Google Scholar 

  • Wall, D. (2010). Micro-frauds: Virtual robberies, stings and scams in the information age. In T. Holt & B. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 68–85). Hershey, PA: Information Science Reference.

    Google Scholar 

  • Wastler, S. (2010). The harm in sexting? Analyzing the constitutionality of child pornography statutes that prohibit the voluntary production, possession, and dissemination of sexually explicit images by teenagers. Harvard Journal of Law & Gender, 33, 687–702.

    Google Scholar 

  • Weins, W. (2014). Concepts and context. In T. Heistand & W. J. Weins (Eds.), Sexting and youth (pp. 63–76). Durham, NC: Carolina Academic Press.

    Google Scholar 

  • Wells, M., & Mitchell, K. (2008). How do high-risk youth use the internet? Characteristics and implications for prevention. Child Maltreatment, 13, 227–234.

    Article  Google Scholar 

  • Wells, M., & Mitchell, K. (2013). Patterns of internet use and risk of online victimization for youth with and without disabilities. Journal of Special Education, 20, 1–10.

    Google Scholar 

  • White, W., & Carmody, D. (2016). Preventing online victimization: College students’ views on intervention and prevention. Journal of Interpersonal Violence, 1–17.

    Google Scholar 

  • Wolak, J., & Finkelhor, D. (2016). Sextortion: Findings from a survey of 1,631 victims. Crimes Against Children Research Center. Retrieved from https://27l51l1qnwey246mkc1vzqg0-wpengine.netdna-ssl.com/wp-content/uploads/2016/08/Sextortion_Report.pdf.

  • Wright, M. (2018). Cyberstalking victimization, depression and academic performance: The role of perceived social support from parents. Cyberpsychology, Behavior and Social Networking, 21(2), 110–116.

    Article  Google Scholar 

  • Zweig, J., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 1–15.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Catherine D. Marcum .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Marcum, C.D., Higgins, G.E. (2019). Cybercrime. In: Krohn, M., Hendrix, N., Penly Hall, G., Lizotte, A. (eds) Handbook on Crime and Deviance. Handbooks of Sociology and Social Research. Springer, Cham. https://doi.org/10.1007/978-3-030-20779-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20779-3_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20778-6

  • Online ISBN: 978-3-030-20779-3

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics