Advertisement

The Psychology of Cybercrime

  • Alison Attrill-SmithEmail author
  • Caroline Wesson
Reference work entry
  • 57 Downloads

Abstract

Criminological and forensic psychology has had a long history of offering us unique insights into criminal behavior in the offline world. Yet the advent of the Internet has meant that we have had to think about the psychology of criminal behavior from a different perspective. The Internet brings with it new crimes and new ways to commit old crimes, and has the potential to make a criminal of the unsuspecting and naïve Internet user. This chapter introduces the reader to the area of cyberpsychology and provides an overview of current psychological understandings of online crime. We start by considering cybercrime typologies, outlining the categories of cybertrespass, cyberdeception and theft, cyber-pornography and obscenity, and cyber-violence that have informed psychological theorizing in this area, as well as highlighting some of the problems inherent within these categorization systems. We then focus on the psychology of using the Internet as a tool for new and old crimes, where a perpetrator may use the Internet as a “weapon” that has the potential to cause harm or damage. Here, we focus on the old crime of domestic abuse that is committed through the new technology of the Internet and the associated new crime of revenge pornography that relies on the Internet and linked technologies to cause damage to its victims. We finish by considering some of the difficulties of researching online crime from a psychological perspective and propose a need for psychological theorizing to move away from categorizing large sways of mildly related crimes under umbrella labels.

Keywords

Internet psychology Cyberpsychology Criminal psychology Psychology typologies Forensic psychology 

References

  1. Al Mutawa, N., Bryce, J., Franqueira, V. N. L., Marrington, A., & Read, J. C. (2019). Behavioural digital forensics model: Embedding behavioural evidence analysis into the investigation of digital crimes. Digital Investigation, 28, 70–82.CrossRefGoogle Scholar
  2. Ang, R. P., & Goh, D. H. (2010). Cyberbullying among adoescents: The role of affective and cognitive empathy, and gender. Child Psychiatry and Human Development, 41(4), 387–397.CrossRefGoogle Scholar
  3. Attrill, A., Fullwood, C., & Chadwick, D. (2015). Catfish: The detection of red flags, dangers and suspicious behaviours in the pursuit of love online. Paper presented at the Social Networking in Cyberspace Conference, Wolverhampton, September, 2015.Google Scholar
  4. Baryshetev, M. V., & McGlone, M. S. (2018). Pronoun usage in online sexual predation. Cyberpsychology, Behavior and Social Networking, 21(2), 117–122.CrossRefGoogle Scholar
  5. Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1), 22–42.CrossRefGoogle Scholar
  6. Baumesiter, R. F., & Leary, M. R. (1995). The need to belong: Desire for interpersonal attachments as a fundamental human motivation. Psychological Bulletin, 117(3), 497–529.CrossRefGoogle Scholar
  7. BBC. (2018). Revenge porn: One in three allegations dropped. https://www.bbc.co.uk/news/uk-england-44411754. Retrieved, 20th November 2018.
  8. Bothamley, S., & Tulley, R. (2018). Understanding revenge pornography: Public perceptions of revenge pornography and victim blaming. Journal of Aggression, Conflict & Peace Research, 10(1), 1–10.CrossRefGoogle Scholar
  9. Campbell, M. A. (2005). Cyber bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling, 15(1), 68–76.CrossRefGoogle Scholar
  10. Chifflet, P. (2015). Questioning the validity of criminal profiling: An evidence-based approach. Australian and New Zealand Journal of Criminology, 48(2), 238–255.CrossRefGoogle Scholar
  11. Costa, P. T., & McCrae, R. R. (1985). The NEO personality inventory manual. Odessa: Psychological Assessment Resources.Google Scholar
  12. Cyber Civil Rights Initiative. (2014). Revenge porn statistics. https://www.cybercivilrights.org/wp-content/uploads/2014/12/RPStatistics.pdf. Retrieved 20 Nov 2018.
  13. Drouin, M., Boyd, R. L., & Greidanus Romaneli, M. (2018). Predicting recidivism among internet child sex sting offenders using psychological language analysis. Cyberpsychology, Behavior and Social Networking, 21(2), 78–83.CrossRefGoogle Scholar
  14. Fiske, S. T., & Taylor, S. E. (1991). Social cognition (2nd ed.). New York: McGraw-Hill.Google Scholar
  15. Glover, D., Cartwright, N., Gough, G., & Johnson, M. (1998). The introduction of anti-bullying policies: Do policies help in the management of change? School Leadership & Management, 18, 89–105.CrossRefGoogle Scholar
  16. Hatfield, E., Cacioppo, J. T., & Rapson, R. L. (1993). Emotional contagion. Current Directions in Psychological Science, 2(3), 96–99.CrossRefGoogle Scholar
  17. Henry, N., & Powell, A. (2015). Embodied harms: Gender, shame, and technology-facilitated sexual violence. Violence Against Women, 21, 758–779.CrossRefGoogle Scholar
  18. Henry, N., Powell, A., & Flynn, A. (2017). Not just ‘revenge pornography’: Australians’ experiences of image-based abuse. A summary report. Melbourne: RMIT University.Google Scholar
  19. Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behaviour, 29, 129–156.CrossRefGoogle Scholar
  20. Hoffman, C. (2013). Hacker hat colors explained. Black hats, white hats, and gray hats. https://www.howtogeek.com/157460/hacker-hat-colors-explained-black-hats-white-hats-and-gray-hats/. Retrieved 16 Nov 2018.
  21. Holmes, R. M. (1989). Profiling violent crimes: An investigative tool. New York: Sage.Google Scholar
  22. Kamal, M., & Newman, W. J. (2016). Revenge pornography: Mental health implications and related legislation. Journal of the American Academy of Psychiatry & Law, 44, 359–367.Google Scholar
  23. Kirwan, G., & Power, A. (2012). The psychology of cyber crime: Concepts and principles. Hershey: Information Science Reference.CrossRefGoogle Scholar
  24. Kuipers. (2006). The social construction of digital danger: Debating, defusing and inflating the moral dangers of online humor and pornography in the Netherlands and the United States. New Media & Society, 8(3), 379–400.CrossRefGoogle Scholar
  25. Laird, L., & Toups, H. (2013). Victims are taking on ‘revenge porn’ websites for posting photos they didn’t consent to. ABA Journal, 99(1), 1–10.Google Scholar
  26. Le Bon, G. [1895] (1903). The crowd: A study of the popular mind. London: Fisher Unwin.Google Scholar
  27. Marganski, A., & Melander, L. (2015). Intimate partner violence victimization in the cyber and real world: Examining the extent of cyber aggression experiences and its association with in-person dating violence. Journal of Interpersonal Violence, 33(7), 1071–1095.CrossRefGoogle Scholar
  28. Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior, 92, 139–150.CrossRefGoogle Scholar
  29. McGuire, M. (2012). Organized crime in the digital age. London: John Grieve Centre for Policing and Security & Detica.Google Scholar
  30. Nurse, J. R. C. (2019). Cybercrime and you: How criminals attack and the factors that make them successful. In A. Attrill-Smith, C. Fullwood, M. Keep, & D. Kuss (Eds.), Oxford handbook of cyberpsychology. Oxford: Oxford University Press.Google Scholar
  31. Nurse, J. R., & Bada, M. (2018). The group element of cybercrime: Types, dynamics and criminal operations. In A. Attrill-Smith, C. Fullwood, M. Keep, & D. Kuss (Eds.), Oxford handbook of cyberpsychology. Oxford: Oxford University Press.Google Scholar
  32. Obscene Publications Act (1959).Google Scholar
  33. Olweus, D. (2003). Bulying at school: What we know and what we can do. Cambridge, MA: Blackwell Publishers, Inc.Google Scholar
  34. Owen, M., Attrill-Smith, A., Wesson, C., Marsh, L., Brown, K. (n.d.). The role of victim blaming in real life reports of revenge porn for gifted and stolen images and videos.Google Scholar
  35. Pina, A., Holland, J., & James, M. (2017). The malevolent side of revenge porn proclivity: Dark personality traits and sexist ideology. International Journal of Technoethics, 8(1), 30–43.CrossRefGoogle Scholar
  36. Powell, A., & Henry, N. (2018). Policing technology-facilitated sexual violence against adult victims: Police and service sector perspectives. Policing and Society, 28(3), 291–307.CrossRefGoogle Scholar
  37. Reed, L. A., Tolman, R. M., & Ward, L. M. (2016). Snooping and sexting: Digital media as a context for dating aggression and abuse among college students. Violence Against Women, 22, 1556–1576.CrossRefGoogle Scholar
  38. Ringrose, J., Harvey, L., Gill, R., & Livingstone, S. (2013). Teen girls, sexual double standards and ‘sexting’: Gendered value in digital image exchange. Feminist Theory, 14, 305–323.CrossRefGoogle Scholar
  39. Scott, A. J., & Gavin, J. (2018). Revenge pornography: The influence of perpetrator-victim sex, observer sex and observer sexting experience on perceptions of seriousness and responsibility. Journal of Criminal Psychology, 8(2), 162–172.CrossRefGoogle Scholar
  40. Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154.CrossRefGoogle Scholar
  41. Smith, J. C., & Hogan, B. (1999). Criminal law. Cases and materials. London: Butterworths.Google Scholar
  42. Strohmaier, H. I., Murphy, M., & DeMatteo, D. (2014). Youth sexting: Prevalence rates, driving motivations, and the deterrent effect of legal consequences. Sexuality Research & Social Policy: A Journal of the NSRC, 11(3), 245–255.CrossRefGoogle Scholar
  43. Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185, 1124–1131.CrossRefGoogle Scholar
  44. UK Government. (2015). Revenge porn. https://www.gov.uk/government/publications/revenge-porn. Retrieved 20 Nov 2018.
  45. Vandebosch, H., & VanCleemput, K. (2009). Cyberbulying among youngsters: Profiles of bullies and victims. New Media and Society, 11(8), 1349–1371.CrossRefGoogle Scholar
  46. Walker, K., & Sleath, E. (2017). A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media. Aggression and Violent Behavior, 36, 9–24.CrossRefGoogle Scholar
  47. Wall, D. S. (2001). Crime and the internet. New York: Routledge.CrossRefGoogle Scholar
  48. Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Cambridge, MA: Polity Press.Google Scholar
  49. Ward, T., & Beech, A. (2006). An integrated theory of sexual offending. Aggression and Violent Behaviour, 11, 44–63.CrossRefGoogle Scholar
  50. Willard, N. (2004). An educator’s guide to cyberbullying and cyberthreats. Center for Safe and Responsible Internet use. www.http.ewa.org. Retrieved 16 Nov 2018.
  51. Young, L. F. (1993). Utopians, cyberpunks, players and other computer criminals. In IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society.Google Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  1. 1.Cyberpsychology Research Group, Department of PsychologyUniversity of WolverhamptonWolverhamptonUK

Personalised recommendations