Crime and the Cyber Periphery: Criminological Theory Beyond Time and Space

  • Murray Lee


The internet and social media have opened the world to new forms of personal, social and political expression, ranging from ambiguous deviancy (e.g. sexting) to promising democratic advances (social justice campaigns, the Arab spring) and to extremism (e.g. ISIS or far right propaganda). These alternative and amorphous public (and semipublic) spheres require new conceptualization that push criminology’s epistemological gaze into extraterritoriality. Information and communication technologies (ICT) are now engrained into the fabric of our daily lives, yet criminological theory seems hopelessly trapped in the terrestrial world. This chapter explores the capacities and limits of criminology to comprehend crime and deviance in the age of the internet and asks whether ideas derived from Southern criminology might usefully be applied to in in these cyber contexts.


Cybercrime Crime drop Dark Web Sexting Online fraud Fake news 


  1. Aas, K. F. (2007). Beyond ‘the desert of the real’: Crime control in a virtual(ised) reality. In Y. Jewkes (Ed.), Crime Online (pp. 160–177). London: Routledge.Google Scholar
  2. Australian Bureau of Statistics. (2013). Victims of personal fraud: A statistical snapshot. In Focus: Crime and Justice Statistics, June 19. Retrieved March 17, 2017, from
  3. Australian Competition and Consumer Commission. (2016). Scam statistics. Scamwatch. Retrieved May 17, 2017, from
  4. Australian Institute of Criminology. (2016). Victims of violent crime (n per year). Facts & Figures Online Data Tool. Retrieved May 17, 2017, from
  5. Beesley, J. (2010). Organised chaos: Seeing with new eyes. Current Issues in Criminal Justice, 21(3), 443–464.Google Scholar
  6. Bradbury, D. (2014). Unveiling the dark web. Network Security, 4, 14–17.CrossRefGoogle Scholar
  7. Carrington, K., Hogg, R., & Sozzo, M. (2016). Southern criminology. British Journal of Criminology, 56(1), 1–20. Scholar
  8. Castells, M. (2002). The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford University Press.CrossRefGoogle Scholar
  9. Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608.CrossRefGoogle Scholar
  10. Cohen, S. (1972). Folk Devils and Moral Panics: The Creation of the Mods and Rockers. London: Paladin.Google Scholar
  11. Connell, R. (2007). Southern Theory: The Global Dynamics of Knowledge in the Social Science. Crows Nest: Allen & Unwin.Google Scholar
  12. Cox, J. (2015, June 18). The dark web as you know it is a myth. Wired. Retrieved March 10, 2017, from
  13. Crofts, T., Lee, M., McGovern, A., & Milivojevic, S. (2015). Sexting and Young People. Basingstoke, UK: Palgrave Macmillan.CrossRefGoogle Scholar
  14. Database and Network Journal (DNJ). (2016). New report exposes the dark web. Database & Network Journal, 46(2). Retrieved March 10, 2017, from
  15. de Certeau, M. (1984). The Practice of Everyday Life. Berkeley, CA: University of California Press.Google Scholar
  16. de Graaf, D., Shosha, A. F., & Gladyshev, P. (2013). Bredolab: Shopping in the cybercrime underworld. In M. Rogers & K. C. Seigfried-Spellar (Eds.), Digital Forensics and Cybercrime (pp. 302–313). Racine, WA: Springer.Google Scholar
  17. DiNucci, D. (1999). Fragmented future. Print, 53(4), 32–33.Google Scholar
  18. Eisner, M. (2015, February 4). Why violent crime is plummeting in the rich world. New Scientist. Retrieved March 20, 2017, from
  19. Findley, M. (1999). Governing Through Globalised Crime: Futures for International Criminal Justice. Milton Park: Routledge.Google Scholar
  20. Fisher, D. (2017, February 22). Kim Dotcom’s next step: ‘I’ll get the whole case thrown out’. NZ Herald. Retrieved May 20, 2017, from
  21. Ford, M. (2016, April 15). What caused the great crime decline in the U.S.? The Atlantic. Retrieved January 10, 2017, from
  22. Funnell, N. (2016, August 17). Exclusive: Students from 71 Australian schools targeted by sick pornography ring. Retrieved January 10, 2017, from
  23. Garzón, J., & Muggah, R. (2017, March 31). Venezuela’s raging homicide epidemic is going unrecorded. LA Times. Retrieved May 9, 2017, from
  24. Giddens, A. (1991). Modernity and Self-Identity: Self and Society in the Late Modern Age. Stanford: Stanford University Press.Google Scholar
  25. Gies, H., & Mychalejko, C. (2015, February 11). Social media coup? The vile virality of Venezuela’s opposition. TeleSUR. Retrieved May 9, 2017, from
  26. Henry, N., Powell, A., & Flynn, A. (2017). Not Just ‘Revenge Pornography’: Australians’ Experiences of Image Based Abuse. A Summary Report. Melbourne: RMIT University.Google Scholar
  27. Herman, E., & Chomsky, N. (1988). Manufacturing Consent. New York: Pantheon Books.Google Scholar
  28. Holt, T. (2013). Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft and Harassment. San Diego: Cognella.Google Scholar
  29. Intelliagg. (2016). DeepLight: Shining a Light on the Dark Web. London: Intelliagg.Google Scholar
  30. International Telecommunications Union. (2016). ICT Facts and Figures 2016. Retrieved May 10, 2017, from
  31. Jewkes, Y. (2007). Crime Online. London: Routledge.Google Scholar
  32. Ladegaard, I. (2017). We know where you are, what you are doing and we will catch you: Testing deterrence theory in digital drug markets. British Journal of Criminology.
  33. LaFrance, A. (2015, September 30). How many websites are there? The Atlantic. Retrieved May 17, 2017, from
  34. Latour, B. (2005). Reassembling the Social. An Introduction to Actor-Network-Theory. Oxford: University Press.Google Scholar
  35. Lee, M., & Crofts, T. (2015). Gender, pressure, coercion and pleasure: Untangling motivations for sexting between young people. The British Journal of Criminology, 55(3), 454–473.CrossRefGoogle Scholar
  36. Lee, M., Crofts, T., McGovern, A., & Milivojevic, S. (2015). Sexting and Young People: Report to Criminology Research Council. Canberra: Australian Institute of Criminology.Google Scholar
  37. Lee, M., Crofts, T., Salter, M., Milivojevic, S., & McGovern, A. (2013). ‘Let’s get sexting’: Risk, power, sex and criminalisation in the moral domain. International Journal for Crime, Justice and Social Democracy, 2(1), 35–49. Scholar
  38. Leukfeldt, E., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. Scholar
  39. Levi, M. (2017). Assessing the trends, scale and nature of economic cybercrimes: Overview and issues. Crime Law Social Change, 67(1), 3–20. Scholar
  40. Mann, M., & Warren, I. (2017). The digital and legal divide: Silk Road, transnational online policing and Southern criminology. In K. Carrington, R. Hogg, J. Scott, & M. Sozzo (Eds.), Southern Criminology. Palgrave Macmillan.Google Scholar
  41. Mason, G., & Czapski, N. (2017). Regulating cyber racism. Melbourne University Law Review, 41(1), 284–340.Google Scholar
  42. Mauss, M. (1969). The Gift: Forms and Functions of Exchange in Archaic Societies. London: Routledge.Google Scholar
  43. McGovern, A. M., Crofts, T., Lee, M., & Milivojevic, S. (2016). Media, legal and young people’s discourses around sexting. Global Studies of Childhood, 6(4), 428–441. Scholar
  44. Mitchell, A., Kiley, J., Gottfried, J., & Guskin, K. (2013, October 24). The role of news on Facebook: Common yet incidental. Journalism and Media. Pew Research Centre. Retrieved May 17, 2017, from
  45. Newburn, T. (2017). Criminology (3rd ed.). London: Routledge.Google Scholar
  46. Palmer, D., & Warren, I. (2013). Global policing and the case of Kim Dotcom. International Journal for Crime, Justice and Social Democracy, 2(3), 105–119. Scholar
  47. PricewaterhouseCoopers (PwC). (2016). Global Economic Crime Survey 2016: Adjusting the Lens on Economic Crime: Preparation Brings Opportunity Back into Focus. Retrieved May 20, 2017, from
  48. Tarquin. (2016, September 20). How to access the Dark Web. Dark Web News. Retrieved May 15, 2017, from
  49. Tor Project. (2017). Tor: Overview. Retrieved April 21, 2017, from
  50. Smith, R., Chak-Chung Cheung, R., & Yiu-Chung Lau, L. (2015). Introduction. In R. Smith, R. Chak-Chung Cheung, & L. Yiu-Chung Lau (Eds.), Cybercrime Risks and Responses Eastern and Western Perspectives (pp. 1–9). London: Palgrave.CrossRefGoogle Scholar
  51. Soukieh, K. (2011). Cybercrime—The shifting doctrine of jurisdiction. Canberra Law Review, 10, 221–238.Google Scholar
  52. United Nations Office on Drugs and Crime (UNODC). (2014, April 14). Some 437,000 people murdered worldwide in 2012, according to new UNODC study. Press Release. Vienna: United Nations. Retrieved May 17, 2017, from
  53. van der Wagen, W., & Pieters, W. (2015). From cybercrime to cyborg crime: Botnets as hybrid criminal actor-networks. British Journal of Criminology, 55(3), 578–595. Scholar
  54. Warren, I., & Palmer, D. (2015). Global Criminology. Pyrmont, New South Wales: Thomson Reuters.Google Scholar
  55. Zimring, F. (2007). The Great American Crime Decline. Oxford: Oxford University Press.Google Scholar


  1. Dotcom v Attorney General [2012] NZHC 1494.Google Scholar
  2. Dow Jones and Company Inc v Gutnick [2002] HCA 56; 210 CLR 575; 194 ALR 433; 77 ALJR 255, 10 December.Google Scholar


  1. Judiciary Act 1903 (Cth).Google Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Murray Lee
    • 1
  1. 1.University of Sydney Law SchoolSydneyAustralia

Personalised recommendations