Abstract
This chapter looks at whether a credible link exists between “internet addiction” – the phenomenon of being “hooked on” online activities – and cybercrime. The bulk of this chapter explores trends and controversies surrounding internet addiction and then examines research findings linking internet addiction to cybercrime. Psychologists’ interventions for reducing the adverse effects of internet addiction are also discussed at the chapter’s end.
Young people are increasingly committing and being drawn into cyber-criminality. For example, in 2015, a UK telecommunications company had a security breach and lost valuable data. Five suspects were arrested in connection with the investigation, all aged between 15 and 20 years of age. The company has subsequently reported that the data breach has cost the firm up to £60 million; an estimated 101,000 customers have left the company following the hack. In October 2016 the company was fined £400,000 for theft of customer details and their failure to implement basic cybersecurity measures. The UK Information Commissioner’s Office, which imposed the fine, said security was so poor that the attack succeeded ‘with ease,’ which is notable given the age of those arrested. – Aiken et al. (2016a, p. 2)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aiken, M. (2016). The cyber effect: A pioneering cyberpsychologist explains how human behavior changes online. New York: Spiegel & Grau.
Aiken, M., Davidson, J., & Amann, P. (2016a). Youth pathways into cybercrime. Retrieved 21 Nov 2018, from http://www.maryaiken.com/new-blog/2016/11/21/youth-pathways-into-cybercrime-aiken-davidson-amann-2016
Aiken, M., McMahon, C., Haughton, C., O’Neill, L., & O’Carroll, E. (2016b). A consideration of the social impact of cybercrime: Examples from hacking, piracy, and child abuse material online. Contemporary Social Science, 11(4), 373–391.
American Psychiatric Association. (2000). Diagnostic and statistical manual of mental disorders (4th ed.). Washington, DC: Author.
American Psychiatric Association. (2013). Diagnostic and statistical manual of mental disorders (5th ed.). Washington, DC: Author.
Arkin, O. (2002). Tracing hackers: A concept for tracing and profiling malicious computer attackers. Computer Fraud & Security, 5, 8–11.
Beutel, M. E., Bruhler, E., Glaesmer, H., Kuss, D. J., Wufling, K., & Muller, K. W. (2011). Regular and problematic leisure-time Internet use in the community: Results from a German population-based survey. Cyberpsychology, Behavior and Social Networking, 14, 291–296.
Block, J. (2008). Issues for DSM-V: Internet addiction. American Journal of Psychiatry, 165, 306–307.
Campanella, M., Mucci, F., Baroni, S., Nardi, L., & Maratzziti, D. (2015). Prevalence of Internet addiction: A pilot study in a group of Italian high-school students. Clinical Neuropsychiatry, 12(4), 90–93.
Cho, H., Kwon, M., Choi, J.-H., Lee, S.-K., Choi, J. S., Choi, S.-W., & Kim, D.-J. (2014). Development of the Internet Addiction Scale based on the Internet gaming disorder criteria suggested in DSM-5. Addictive Behaviors, 39, 1361–1366.
De Cock, R., Vangeel, J., Klein, A., Minotote, P., Rosas, O., & Meerkerk, G.-J. (2014). Compulsive use of social networking sites in Belgium: Prevalence, profile, and the role of attitude toward work and school. Cyberpsychology, Behavior, and Social Networking, 17(3), 166–171.
Dick, D. M., Smith, G., Olausson, P., Mitchell, S. H., Leeman, R. F., O’Malley, S. S., & Sher, K. (2010). Understanding the construct of impulsivity and its relationship to alcohol use disorders. Addiction Biology, 15, 217–226.
Dong, G., DeVito, E. E., Du, X., & Cui, Z. (2012). Impaired inhibitory control in ‘Internet addiction disorder’: A functional magnetic resonance imaging study. Psychiatry Research: Neuroimaging, 203, 153–158.
Elmer-DeWitt, P. (1993). Cyberpunk. Time Magazine, 141(6), 58–65.
Freeman, C. B. (2008). Internet gaming addiction. Journal for Nurse Practitioners, 4, 42–47.
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford: Stanford University Press.
Harris, L. (2015). Rise in child and teen fraud arrests mainly due to increase of Internet-based crimes. Retrieved 28 Nov 2018, from https://www.dailytelegraph.com.au/news/nsw/rise-in-child-and-teen-fraud-arrests-mainly-due-to-increase-of-internetbased-crimes/news-story/fc620acdb8379e30ab46f17493e40475
Hetzel-Riggin, M. D., & Pritchard, J. R. (2011). Predicting problematic Internet use in men and women: The contributions of psychological distress, coping style, and body esteem. Cyberpsychology, Behavior, and Social Networking, 14(9), 519.
Holt, T., & Kilger, M. (2008). Techcrafters and makecrafters: A comparison of two populations of hackers. In WOMBAT workshop on information security threats data collection and sharing (pp. 67–78).
Howell, J. (2018, November 10). Dumb, but happy. The Globe and Mail, p. P5.
Hucker, S. J. (2004). Disorders of impulse control. In W. O. Donohue & E. Levensky (Eds.), Forensic psychology. New York: Academic.
Hwang, Y., & Jeong, S.-H. (2015). Predictors of parental mediation regarding children’s smartphone use. Cyberpsychology, Behavior, and Social Networking, 18(12), 737.
Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to integrating forensic techniques into incident response. Gaithersburg: Computer Security Resource Center.
Kilger, M., Arkin, O., & Stutzman, J. (2004). Profiling. In Know your enemy: Learning about security threats. Boston: Addison Wesley.
Ko, C.-H., Yen, J.-Y., Yen, C.-F., Lin, H.-C., & Yang, M.-J. (2007). Factors predictive for incidence and remission of Internet addiction in young adolescents: A prospective study. Cyberpsychology & Behavior, 10(4), 545–551.
Koronczai, B., Urban, R., Kokonyei, G., Paksi, B., Papp, K., Kun, B., Arnold, P., Kallai, J., & Demetrovics, Z. (2011). Confirmation of the three-factor model of problematic Internet use on off-line adolescent and adult samples. Cyberpsychology, Behavior, and Social Networking, 14(11), 657.
Ksherti, N. (2009). Positive externality, increasing returns, and the rise of cybercrimes. Communications of the ACM, 52, 141–144.
Laier, C., Pekal, J., & Brand, M. (2014). Cybersex Addiction in heterosexual female users of Internet pornography can be explained by gratification hypothesis. Cyberpsychology, Behavior, and Social Networking, 17(8), 505.
Lam, L. T., Peng, Z.-W., Mai, J.-C., & Jing, J. (2009). Factors associated with Internet addiction among adolescents. Cyberpsychology & Behavior, 12(5), 551–555.
Lesher, A. I. (1997). Addiction is a brain disease, and it matters. Science, 278, 807–808.
Lickiewicz, J. (2011). Cyber crime psychology – Proposal of an offender psychological profile. Problems of Forensic Science, 87, 239–252.
MacQueen, K. (2004). Hooked on crime. Maclean’s, 117(52), 82–83.
Morgan, S. (2016, January 17). Cyber crime costs projected to reach $2 trillion by 2019. Retrieved 9 Apr 2019, from https://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#2f4eb8153a91
Niemz, K., Griffiths, M., & Banyard, P. (2005). Prevalence of pathological Internet use among university students and correlations with self-esteem, the General Health Questionnaire (GHQ), and disinhibition. Cyberpsychology & Behavior, 8(6), 562–570.
Nykodym, N., & Marsillac, E. L. (2007, March 4). The managers guide to understanding, detecting, and thwarting computer crime: An international issue. Published in the Proceedings of the National Business and Economic Society international meeting 2007.
Nykodym, N., Ariss, S., & Kurtz, K. (2008). Computer addiction and cyber crime. Journal of Leadership, Accountability and Ethics, 35, 55–59.
Peters, S. (2014). Over 90 arrested in global FBI crackdown on Blackshades RAT. Retrieved 28 Nov 2018, from https://www.darkreading.com/over-90-arrested-in-global-fbi-crackdown-on-blackshades-rat/d/d-id/1252912
Ploskin, D. (2018). What are poor impulse controls? Retrieved 24 Nov 2018, from https://psychcentral.com/lib/what-are-impulse-control-disorders/
Rachlin, H. (1990). Why do people gamble despite heavy losses? Psychological Science, 1, 294–297.
Reed, L. (2002). Governing (through) the Internet. European Journal of Cultural Studies, 5(2), 131–153.
Ressler, R. (1997). Criminal personality profiling. Problems of Forensic Sciences, 35, 32–41.
Sarda, E., Begue, L., Bry, C., & Gentile, D. (2016). Internet gaming disorder and well-being: A scale validation. Cyberpsychology, Behavior, and Social Networking, 19(11), 674.
Sarkis, S. (2014). Internet gaming disorder in DSM-5. Retrieved 28 Nov 2018, from https://www.psychologytoday.com/us/blog/here-there-and-everywhere/201407/internet-gaming-disorder-in-dsm-5
Schell, B. (2016). Online health and safety: From cyberbullying to Internet addiction. Santa Barbara: Greenwood.
Schell, B., Dodge, J., & Moutsasos, S. (2002). The hacking of America: Who’s doing it, why, and how. Westport: Quorum Books.
Shotton, M. (1989). Computer addiction? A study of computer dependency. London: Taylor & Francis.
Su, W., Fang, X., Miller, J. K., & Wang, Y. (2011). Internet-based intervention for the treatment of online addiction for college students in China: A pilot study of the healthy online self-helping center. Cyberpsychology, Behavior, and Social Networking, 14(9), 497.
Taylor, H. (2016). An inside look at what’s driving the hacking economy. CNBC. Retrieved 28 Nov 2018, from https://www.cnbc.com/2016/02/05/an-inside-look-at-whats-driving-the-hacking-economy.html
Turvey, B. (2002). Criminal profiling. London: Academic.
Volkow, N. D. (2004). The reality of comorbidity: Depression and drug abuse. Biological Psychiatry, 56, 714–717.
Walker, M. B. (1989). Some problems with the concept of “gaming addiction”; Should theories of addiction be generalized to include excessive gambling? Journal of Gambling Behavior, 5, 179–200.
White, P. (2015, January 29). Suspect in Todd case proclaims innocence. The Globe and Mail, p. A3.
Wieland, D. M. (2005). Computer addiction: Implications for nursing psychotherapy practice. Perspectives in Psychiatric Care, 41, 153–161.
Wu, C.-S., & Cheng, F.-F. (2007). Internet café addiction of Taiwanese adolescents. Cyberpsychology & Behavior, 10(2), 220–225.
Yar, M. (2005). Computer hacking: Just another case of juvenile delinquency? The Howard Journal, 44, 387–399.
Young, K. S. (1996). Psychology of computer use: XL. Addictive use of the Internet: A case that breaks the stereotype. Psychological Reports, 79, 899–902.
Young, K. S. (1998). Internet addiction: The emergence of a new clinical disorder. Cyberpsychology & Behavior, 1(3), 237–244.
Young, K. S. (2009). Internet addiction: Diagnosis and treatment considerations. Journal of Contemporary Psychotherapy, 39, 241–246.
Yu, T.-K., & Chao, C. (2016). Internet misconduct impact adolescent mental health in Taiwan: The moderating roles of internet addiction. International Journal of Mental Health and Addiction, 14, 921–936.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Schell, B. (2020). Internet Addiction and Cybercrime. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_26
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences