"

Criminological Explanations of Cybercrime

Module 3 provides an overview of criminological theories that explain the causes of crime. It categorizes various theories into major groups, such as biological, psychological, sociological, and contemporary approaches, and outlines the foundational assumptions behind each. Understanding these assumptions is essential, as they shape the perspectives on why crime occurs and how society should respond. This module also emphasizes the importance of theory in understanding crime causation. Theories not only offer explanations but also influence public policy decisions and practices in both the private and public sectors. By explaining the link between theory and policy, the chapter highlights how theoretical perspectives can guide law enforcement strategies, crime prevention efforts, and rehabilitation programs. In addition, there is a focus on the relationship between criminology and Cybercriminology, discussing how both fields share similarities in studying crime while differing in focus areas. Criminology traditionally examines crime within physical spaces, whereas Cybercriminology focuses on digital and cyber environments. In summary, by the end of this chapter, students will gain a comprehensive understanding of the various criminological theories, their applications in policymaking, and the evolving field of Cybercriminology.


Learning Objectives

After completing this module, you should be able to:

  • Identify and describe the main categories of criminological theories, including biological, psychological, sociological, and contemporary approaches.
  • Explain the core assumptions of each theoretical perspective and how they influence understandings of crime causation.
  • Analyze how criminological theories shape policy, including their impact on law enforcement strategies, crime prevention, and rehabilitation initiatives.
  • Differentiate between criminology and cybercriminology, highlighting their common focus on crime and their unique areas of study (physical versus digital environments).
  • Apply theoretical frameworks to examples of both traditional and cybercrime.
  • Examine real-world cases and resources (readings, talks, videos, and podcasts) to understand how theory relates to practice in explaining and solving crime.
  • Explore career pathways in criminology and cybercriminology, and understand how theory underpins professional practice in these fields.

A key theme of this module is the connection between criminology and cybercriminology. While criminology usually studies crime in physical spaces, cybercriminology uses similar theories to analyze digital environments, focusing on how human behavior, social structures, and technology come together in cyberspace. This link shows both the ongoing similarities and the new challenges introduced by cybercrime.

Through the assigned readings, videos, and podcasts, students will deepen their understanding of how theoretical frameworks relate to real-world issues and careers in the field. For example, Karuppannan (2018) explores the development of cybercriminology, Anderson (2017) emphasizes the role of human behavior in cybercrime, and THV11 (2012) traces how investigations evolve with technology. Additional resources from Khan Academy and TEDx Talks offer accessible overviews of rational choice, behavioral, and social theories, while podcasts like “Cybercrimeology” expose students to current debates and practitioner insights.

Cybercrime, also called computer crime, involves illegal activities performed using computers or digital technology. Criminologists have developed different theories to explain why people engage in such behavior.

  • Rational Choice Theory – Offenders assess potential rewards and risks, viewing cybercrime as lucrative and with relatively low dangers.
  • Social Learning Theory – People acquire cybercriminal skills and attitudes by observing their peers, online groups, or media portrayals of hackers.
  • Strain Theory – Social or economic pressures can drive individuals toward cybercrime as a way to relieve frustration or gain status.
  • Routine Activities Theory states that cybercrime happens when motivated offenders find vulnerable digital targets lacking proper guardianship (e.g., weak cybersecurity).
  • Self-Control Theory – Low self-control and impulsivity increase the likelihood of committing cybercrime.

While traditional criminology focuses on crimes in physical locations, cybercriminology adapts these frameworks to the digital world, where crime crosses borders and advances with technology. Analyzing cybercrime through theoretical lenses is essential because theories inform policy, prevention efforts, law enforcement techniques, and rehabilitation programs.

Cybercriminology is becoming increasingly vital because of rising cybercrime rates, significant economic losses, global scope, privacy and data concerns, and the need for international cooperation. It also helps develop skilled cybersecurity professionals, raises public awareness, and guides laws and regulations to combat complex digital crimes.

In summary, this module highlights that understanding theory is crucial to understanding cybercrime: theories explain behavior, influence responses, and link criminology to real-world practice in both traditional and digital settings.

Key Takeaways

Key Terms/Concepts

Applied Criminology
Behavioral Theory
Biological Theories
Classical School of Criminology
Contemporary Theories
Correlation
Crime Causation
Crime Prevention
Criminal Justice
Criminologist
Criminology
Cybercrime
Cybercriminology
Cyberspace
Cybervictims
Determinism
Positivism
Psychological Theories
Public Policy Connection
Rational Choice
Routine Activities Theory
Social Theory
Sociological Theories
Space Transition Theory
Theoretical Criminology
Theory
Theory-to-Practice Link

Modern Example

An excellent resource containing discussions on Cybercriminology that advance the field and emphasize the importance of criminology in examining and responding to all forms of digital crime.

“Cybercrimeology is a podcast about cybercrime, its research and its researchers. We talk to top researchers from around the world to learn about different forms of cybercrime and their research. We learn about cybercrime theory, organized crime online, Darknet drug markets, cybercrime awareness and crime prevention, technology-facilitated intimate partner violence and much more. The podcast has been running since November of 2019 and there is still so much to learn. I am happy to have you along for the journey into this fascinating subject” (Cybercriminology, 2024) [last accessed, February 2024].

Access the “Cybercrimeology” podcast by clicking HERE

Read, Review, Watch and Listen

  1. Read Cyber Criminology: Evolution, Contribution and Impact (Karuppannan, 2018) [click Download file PDF] (pp. 1-16)
    • Key Terms: Cybercriminology, Cybercrime, Theory-to-Practice Link.
    • Shows how criminological theories adapt to the digital age and how cybercrime challenges traditional frameworks.
  2. Review TEDx Talks Cyber Crime Isn’t About Computers: It’s About Behavior (Anderson, 2017) [also embedded below]
    • Key Terms: Behavioral Theory, Psychological Theories, Cybercrime.
    • Highlights the role of human behavior and decision-making in cybercrime.
  3. Watch How criminal investigations have evolved along with technology (THV11, 2012) [also embedded below / last accessed February 2024]
    • Key Terms: Crime Prevention, Public Policy Connection, Cybercrime.
    • Demonstrates the impact of technological change on law enforcement practices.
  4. Watch Careers in criminology (UniSC University of the Sunshine Coast, Aug. 30, 2021) [also embedded below]
    • Key Terms: Criminology, Cybercriminology, Rehabilitation, Crime Prevention.
    • Connects theory to practice and professional opportunities.
  5. Watch Kahan Academy’s Rational Choice-Exchange Theory (Brown, S. 2014)
    • Key Terms: Rational Choice Theory, Contemporary Theories.
    • Explains decision-making models of crime causation.
  6. Watch Kahan Academy’s Behavioral Theory (Desai, 2019)
    • Key Terms: Behavioral Theory, Psychological Theories.
    • Outlines conditioning and learned behavior explanations of crime.
  7. Watch Social Theories Overview (Brown, 2015)
    • Key Terms: Sociological Theories, Social Theories, Crime Causation.
    • Provides broad context on social structure and group influences on crime.
  8. Watch Social Theories Overview (part 2) (Brown, 2015)
    • Key Terms: Sociological Theories, Social Theories, Crime Causation.
    • Provides broad context on social structure and group influences on crime.
  9. Listen to Cybercrimeology most recent episode and voluntarily explore others (last accessed February 2024)
    • Key Terms: Cybercriminology, Public Policy Connection, Theory-to-Practice Link.
    • Offers practitioner insights and current issues in the field.

Activity 3 – Criminological Explanations of Cybercrime

STOP!!

Students should review the course syllabus to determine the assignment of this activity.

This is a copy of the module’s activity that students find within Blackboard. For that reason, refer to the Activities page to submit your work for review.

Purpose

The purpose of this activity is to introduce traditional theories of crime causation that serve as the basis of examining social phenomena.

Overview

Within the framework of classical/choice theory, perceptions of opportunities to commit crime are very important. Routine activities theory builds on this foundation by claiming that crimes are more likely to be committed by motivated offenders who have suitable targets in the absence of capable guardians. Routine activities of perpetrators, as well as those of potential victims and other actors, thus result in opportunities for committing and preventing cybercrimes with technology. As such, routine activities theory has important implications for understanding crimes committed with or prevented with computers, other electronic IT devices, or information systems.

One measure of situational crime prevention is target hardening. Target hardening makes it more difficult or increases the amount of effort needed for offenders to carry out crimes on specific targets. The use of locked doors, windows, alarm systems, watchdogs, and community crime watch programs are all examples of target hardening–making it harder to become a victim of crime.

Instructions

  1. Locate a computer crime or IT-enabled abuse news story using a search engine of your choice, e.g., Google, or an electronic COD library resource.
  2. Review the tenets of routine activities theory (RAT) as introduced within Chapter 3 (see pp. 50-51)
  3. Watch Cybercrime isn’t about computers” It’s about behavior by Adam Anderson
  4. As a byproduct of rational choice theory (i.e., routine activities), review Arizona State University Center for Problem-Oriented Policing’s Twenty-Five Techniques of Situational Prevention (University, 2021)

Watch Video

Cyber Crime Isn’t About Computers: It’s About Behavior | Adam Anderson | TEDxGreenville
Duration: 13:12
User: n/a – Added: 5/17/17

Answer the following questions

  • Consider the example of crime you identified and explain how it could have been prevented. Include techniques of situational prevention in your explanation.
  • In your own words, explain how technology, particularly cyberspace, has changed behavior (if at all), and describe what methods of reducing opportunity are necessary to decrease the prevalence of cybercrime.

AND Answer one of the following three questions:

  • Use rational choice exchange theory to explain “Why?” cybercrime occurs.
  • Use behavioral theory to explain “Why?” cybercrime occurs.
  • Use social theory to explain “Why?” cybercrime occurs.

Key Terms/Concepts

Behavioral theory, or behaviorism, is the second major psychological theory. It holds that human behavior is learned through experiences. The key idea of behavioral theory is that people change their behavior based on how others react to it (Bandura, 1978).

Cybercriminology merges coursework in Criminal Justice and Computer Science to examine the increasing issue of computer crime.

Rational choice in criminology is based on a utilitarian view that humans are reasoning actors who consider means and ends, costs and benefits, to make rational decisions. This approach was developed by Cornish and Clarke to help understand situational crime prevention.

Routine Activities Theory – According to Cohen and Felson, crime happens when three factors come together in time and space: (1) a motivated offender, (2) a suitable target, and (3) the absence of a capable guardian, such as inadequate software protection.

Social theory is an empirically validated set of ideas within the social sciences, such as social processes, that sees criminality as a result of people’s interactions with various organizations, institutions, and social processes. People from all walks of life can become criminals if they maintain destructive social relationships.

Theory is an effort to answer the question of “Why?” within the framework of established propositions that form the basis for empirical examination.

Refer to the course learning management system (LMS), Blackboard (BB), for the correct due date. Also, submit your work through BB for grading.

Supplemental Resources

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Click HERE to report any needed updates, e.g., broken links.

 

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.