ABSTRACT

Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime.

The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.

part Part I|80 pages

Background

chapter 3|21 pages

The open and dark web

Facilitating cybercrime and technology-enabled offences
ByClaudia Flamand, David Décary-Hétu

part Part II|75 pages

Victims

chapter 4|28 pages

Predictors of cybercrime victimization

Causal effects or biased associations?
BySteve van de Weijer

chapter 5|23 pages

Virtual danger

An overview of interpersonal cybercrimes
ByJordana Navarro

chapter 6|22 pages

Sexual violence in digital society

Understanding the human and technosocial factors
ByAnastasia Powell, Asher Flynn, Nicola Henry

part Part III|180 pages

Offenders

chapter 7|14 pages

Cybercrime subcultures

Contextualizing offenders and the nature of the offence
ByThomas J. Holt

chapter 8|21 pages

On social engineering

ByKevin Steinmetz, Richard Goe, Alexandra Pimentel

chapter 9|22 pages

Contrasting cyber-dependent and traditional offenders

A comparison on criminological explanations and potential prevention methods
ByMarleen Weulen Kranenbarg

chapter 10|24 pages

Financial cybercrimes and situational crime prevention

ByRutger Leukfeldt, Jurjen Jansen

chapter 11|18 pages

Modelling cybercrime development

The case of Vietnam
ByJonathan Lusthaus

chapter 12|28 pages

Humanizing the cybercriminal

Markets, forums, and the carding subculture
ByCraig Webber, Michael Yip
Size: 0.39 MB

chapter 14|27 pages

Child sex abuse images and exploitation materials

ByRoderic Broadhurst

part Part IV|88 pages

Policing

chapter 15|20 pages

Policing cybercrime

Responding to the growing problem and considering future solutions
ByCassandra Dodge, George Burruss

chapter 16|30 pages

Responding to individual fraud

Perspectives of the fraud justice network
ByCassandra Cross

chapter 17|19 pages

The ecology of cybercrime

ByBenoît Dupont

chapter 18|17 pages

Displacing big data

How criminals cheat the system
ByAlice Hutchings, Sergio Pastrana, Richard Clayton