The Psychology of Cybercrime
- 57 Downloads
Criminological and forensic psychology has had a long history of offering us unique insights into criminal behavior in the offline world. Yet the advent of the Internet has meant that we have had to think about the psychology of criminal behavior from a different perspective. The Internet brings with it new crimes and new ways to commit old crimes, and has the potential to make a criminal of the unsuspecting and naïve Internet user. This chapter introduces the reader to the area of cyberpsychology and provides an overview of current psychological understandings of online crime. We start by considering cybercrime typologies, outlining the categories of cybertrespass, cyberdeception and theft, cyber-pornography and obscenity, and cyber-violence that have informed psychological theorizing in this area, as well as highlighting some of the problems inherent within these categorization systems. We then focus on the psychology of using the Internet as a tool for new and old crimes, where a perpetrator may use the Internet as a “weapon” that has the potential to cause harm or damage. Here, we focus on the old crime of domestic abuse that is committed through the new technology of the Internet and the associated new crime of revenge pornography that relies on the Internet and linked technologies to cause damage to its victims. We finish by considering some of the difficulties of researching online crime from a psychological perspective and propose a need for psychological theorizing to move away from categorizing large sways of mildly related crimes under umbrella labels.
KeywordsInternet psychology Cyberpsychology Criminal psychology Psychology typologies Forensic psychology
- Attrill, A., Fullwood, C., & Chadwick, D. (2015). Catfish: The detection of red flags, dangers and suspicious behaviours in the pursuit of love online. Paper presented at the Social Networking in Cyberspace Conference, Wolverhampton, September, 2015.Google Scholar
- BBC. (2018). Revenge porn: One in three allegations dropped. https://www.bbc.co.uk/news/uk-england-44411754. Retrieved, 20th November 2018.
- Costa, P. T., & McCrae, R. R. (1985). The NEO personality inventory manual. Odessa: Psychological Assessment Resources.Google Scholar
- Cyber Civil Rights Initiative. (2014). Revenge porn statistics. https://www.cybercivilrights.org/wp-content/uploads/2014/12/RPStatistics.pdf. Retrieved 20 Nov 2018.
- Federal Trade Commission. (2016). https://www.ftc.gov/news-events/press-releases/2016/03/ftc-releases-annual-summary-consumer-complaints. Retrieved 16 Nov 2018.
- Fiske, S. T., & Taylor, S. E. (1991). Social cognition (2nd ed.). New York: McGraw-Hill.Google Scholar
- Henry, N., Powell, A., & Flynn, A. (2017). Not just ‘revenge pornography’: Australians’ experiences of image-based abuse. A summary report. Melbourne: RMIT University.Google Scholar
- Hoffman, C. (2013). Hacker hat colors explained. Black hats, white hats, and gray hats. https://www.howtogeek.com/157460/hacker-hat-colors-explained-black-hats-white-hats-and-gray-hats/. Retrieved 16 Nov 2018.
- Holmes, R. M. (1989). Profiling violent crimes: An investigative tool. New York: Sage.Google Scholar
- Kamal, M., & Newman, W. J. (2016). Revenge pornography: Mental health implications and related legislation. Journal of the American Academy of Psychiatry & Law, 44, 359–367.Google Scholar
- Laird, L., & Toups, H. (2013). Victims are taking on ‘revenge porn’ websites for posting photos they didn’t consent to. ABA Journal, 99(1), 1–10.Google Scholar
- Le Bon, G.  (1903). The crowd: A study of the popular mind. London: Fisher Unwin.Google Scholar
- McGuire, M. (2012). Organized crime in the digital age. London: John Grieve Centre for Policing and Security & Detica.Google Scholar
- Nurse, J. R. C. (2019). Cybercrime and you: How criminals attack and the factors that make them successful. In A. Attrill-Smith, C. Fullwood, M. Keep, & D. Kuss (Eds.), Oxford handbook of cyberpsychology. Oxford: Oxford University Press.Google Scholar
- Nurse, J. R., & Bada, M. (2018). The group element of cybercrime: Types, dynamics and criminal operations. In A. Attrill-Smith, C. Fullwood, M. Keep, & D. Kuss (Eds.), Oxford handbook of cyberpsychology. Oxford: Oxford University Press.Google Scholar
- Obscene Publications Act (1959).Google Scholar
- Olweus, D. (2003). Bulying at school: What we know and what we can do. Cambridge, MA: Blackwell Publishers, Inc.Google Scholar
- Owen, M., Attrill-Smith, A., Wesson, C., Marsh, L., Brown, K. (n.d.). The role of victim blaming in real life reports of revenge porn for gifted and stolen images and videos.Google Scholar
- Smith, J. C., & Hogan, B. (1999). Criminal law. Cases and materials. London: Butterworths.Google Scholar
- UK Government. (2015). Revenge porn. https://www.gov.uk/government/publications/revenge-porn. Retrieved 20 Nov 2018.
- Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Cambridge, MA: Polity Press.Google Scholar
- Willard, N. (2004). An educator’s guide to cyberbullying and cyberthreats. Center for Safe and Responsible Internet use. www.http.ewa.org. Retrieved 16 Nov 2018.
- Young, L. F. (1993). Utopians, cyberpunks, players and other computer criminals. In IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society.Google Scholar