Abstract
The book begins with an introductory chapter that sets the scene: providing an overview of the core principles associated with crime prevention targeting that will be drawn upon throughout. It chronicles the unique aspects of offending within digital contexts, and in particular, explicates offending lifecycles, and flags significant points of divergence from what is broadly accepted for offline forms of offending. Next, it provides a methodological account of the approach taken in researching this book, before concluding with an overview of chapters to come.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Such activities can be distinguished from cyber-enabled crimes which are regarded as ‘traditional’ crimes that are augmented through the use of computers or networking technologies (e.g. fraud) (McGuire and Dowling 2013).
References
Andrews, D. A., & Bonta, J. (2010). Rehabilitating criminal justice policy. Psychology, Public Policy, and Law, 16, 39–55. https://doi.org/10.1037/a0018362.
Andrews, D. A., Zinger, I., Hoge, R. D., Bonta, J., Gendreau, P., & Cullen, F. T. (1990). Does correctional treatment work? A clinically relevant and psychologically informed meta-analysis. Criminology, 28, 369–404. https://doi.org/10.1111/j.1745-9125.1990.tb01330.x.
Bachmann, M. (2010). The risk propensity and rationality of computer hackers. The International Journal of Cyber Criminology, 4, 643–656.
Bonta, J., & Andrews, D. A. (2017). The psychology of criminal conduct (6th ed.). New York, NY: Routledge.
Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 38–67). Hershey, PA: IGI Global. https://doi.org/10.4018/9781616928056.ch003.
Braithwaite, J. (1989). Crime, shame and reintegration. Cambridge, UK: Cambridge University Press. https://doi.org/10.1017/cbo9780511804618.
Brantingham, P. J., & Faust, F. L. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284–296. https://doi.org/10.1177/001112877602200302.
Clarke, R. V. (1995). Situational crime prevention. Crime and Justice, 19, 91–150. https://doi.org/10.1086/449230.
Cornish, D. B., & Clarke, R. V. (1986). Rational choice approaches to crime. In D. B. Cornish & R. V. G. Clarke (Eds.), The reasoning criminal: Rational choice perspectives on offending (pp. 1–16). New York, NY: Springer-Verlag.
Cottle, C. C., Lee, R. J., & Heilbrun, K. (2001). The prediction of criminal recidivism in juveniles: A meta-analysis. Criminal Justice and Behavior, 28, 367–394. https://doi.org/10.1177/0093854801028003005.
Décary-Hétu, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13(3), 160–175. https://doi.org/10.1080/17440572.2012.702523.
Dowden, C., & Andrews, D. A. (1999). What works in young offender treatment: A meta-analysis. Forum on Corrections Research, 11, 21–24.
Dupont, B., Côté, A.-M., Savine, C., & Décary-Hétu, D. (2016). The ecology of trust among hackers. Global Crime, 17(2), 129–151. https://doi.org/10.1080/17440572.2016.1157480.
Franklin, J., Paxson, V., Perrig, A., & Savage, S. (2007, October). An inquiry into the nature and cause of the wealth of Internet miscreants. Paper presented at CCS ’07, Alexandria, VA.
Gemalto. (2015). First half review: Findings from the breach level index. Retrieved from https://www.gemalto.com/brochures-site/downloadsite/Documents/Gemalto_H1_2015_BLI_Report.pdf. Accessed 26 June 2019.
Gendreau, P., Little, T., & Goggin, C. (1996). A meta-analysis of the predictors of adult offender recidivism: What works! Criminology, 34(4), 575–608. https://doi.org/10.1111/j.1745-9125.1996.tb01220.x.
Gilboa, N. (1996). Elites, lamers, narcs, and whores: Exploring the computer underground. In L. Cherny & E. R. Weise (Eds.), Wired women (pp. 98–113). Seattle, WA: Seal Press.
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198. https://doi.org/10.1080/01639620601131065.
Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of computer hackers. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 336–355). Upper Saddle River, NJ: Pearson Prentice Hall.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. London, UK: Routledge.
Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37, 378–395. https://doi.org/10.1007/s12103-011-9117-3.
Holt, T. J., Kilger, M., Strumsky, D., & Smirnova, O. (2009, July). Identifying, exploring, and predicting threats in the Russian hacker community. Paper presented at the DefCon 17 Convention. Las Vegas, NV.
Holt, T. J., Smirnova, O., & Chua, Y. T. (2016). Exploring and estimating the revenues and profits of participants in stolen data markets. Deviant Behavior, 37, 353–367. https://doi.org/10.1080/01639625.2015.1026766.
Holt, T. J., Soles, J., & Leslie, L. (2008, April). Characterizing malware writers and computer attackers in their own words. Paper presented at the 3rd International Conference on Information Warfare and Security, Omaha, NE.
Hutchings, A., & Holt, T. J. (2016). A crime script analysis of the online stolen data market. British Journal of Criminology, 55, 596–614. https://doi.org/10.1093/bjc/azu106.
Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757–780. https://doi.org/10.1111/1467-954X.00139.
Koehler, J. A., Lösel, F., Akoensi, T. D., & Humphreys, D. K. (2013). A systematic review and meta-analysis on the effects of young offender treatment programs in Europe. Journal of Experimental Criminology, 9, 19–43. https://doi.org/10.1007/s11292-012-9159-7.
Landreth, B. (1985). Out of the inner circle. Seattle, WA: Microsoft Press.
Leukfeldt, R., Kleemans, E. R., & Stol, W. (2017). Origin, growth, and criminal capabilities of cybercriminal networks: An international empirical analysis. Crime, Law and Social Change, 67, 39–53. https://doi.org/10.1007/s10611-016-9663-1.
Lipsey, M. W., & Derzon, J. H. (1998). Predictors of serious delinquency in adolescence and early adulthood: A synthesis of longitudinal research. In R. Loeber & D. P. Farrington (Eds.), Serious and violent offenders: Risk factors and successful interventions (pp. 86–105). Thousand Oaks, CA: Sage. https://doi.org/10.4135/9781452243740.n6.
McGuire, M. & Dowling S. (2013). Cyber crime: A review of the evidence (Home Office Research Report No. 75).
Meyer, G. R. (1989). The social organization of the computer underground. Master’s thesis. Retrieved from the National Institute of Standards and Technology Computer Security Resource Center (ADA390834).
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011, November). An analysis of underground forums. In Proceedings of the 2011 ACM SIGCOMM Internet Measurement Conference (pp. 71–80). New York, NY: ACM.
Murray, J., & Farrington, D. P. (2010). Risk factors for conduct disorder and delinquency: Key findings from longitudinal studies. The Canadian Journal of Psychiatry, 55, 633–642. https://doi.org/10.1177/070674371005501003.
Newman, G., & Clarke, R. (2003). Superhighway robbery: Preventing e-commerce crime. Cullompton, NJ: Willan Press. https://doi.org/10.4324/9781843924876.
Rhodes, J. E. (2002). Stand by me: The risks and rewards of mentoring today’s youth. Cambridge, MA: Harvard University Press.
Rhodes, J. E. (2005). A model of youth mentoring. In D. L. DuBois & M. J. Karcher (Eds.), Handbook of youth mentoring (pp. 30–43). Thousand Oaks, CA: Sage. https://doi.org/10.4135/9781412976664.n3.
Schell, B. H., & Dodge, J. L. (2002). The hacking of America: Who’s doing it, why, and how. Westport, CT: Quorum.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495–518. https://doi.org/10.1177/0022427897034004005.
Slatalla, M., & Quittner, J. (1995). Masters of deception: The gang that ruled cyberspace. New York, NY: HarperCollins.
Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55, 125–145. https://doi.org/10.1093/bjc/azu061.
Storm, D. (2015, June 8). MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks. Computerworld. Retrieved from https://www.computerworld.com/article/2932371/medjack-hackers-hijacking-medical-devices-to-create-backdoors-in-hospital-networks.html. Accessed 26 June 2019.
Weulen Kranenbarg, M., Ruiter, S., van Gelder, J.-L., & Bernasco, W. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. Journal of Developmental and Life-Course Criminology, 4(3), 343–364. https://doi.org/10.1007/s40865-018-0087-8.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 The Author(s)
About this chapter
Cite this chapter
Brewer, R., de Vel-Palumbo, M., Hutchings, A., Holt, T., Goldsmith, A., Maimon, D. (2019). Setting the Scene. In: Cybercrime Prevention. Crime Prevention and Security Management. Palgrave Pivot, Cham. https://doi.org/10.1007/978-3-030-31069-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-31069-1_1
Published:
Publisher Name: Palgrave Pivot, Cham
Print ISBN: 978-3-030-31068-4
Online ISBN: 978-3-030-31069-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)