Criminological Explanations of Cybercrime

Module 3 provides an overview of criminological theories that explain the causes of crime. It categorizes various theories into major groups, such as biological, psychological, sociological, and contemporary approaches, and outlines the foundational assumptions behind each. Understanding these assumptions is essential, as they shape the perspectives on why crime occurs and how society should respond. This module also emphasizes the importance of theory in understanding crime causation. Theories not only offer explanations but also influence public policy decisions and practices in both the private and public sectors. By explaining the link between theory and policy, the chapter highlights how theoretical perspectives can guide law enforcement strategies, crime prevention efforts, and rehabilitation programs. In addition, there is a focus on the relationship between criminology and cybercriminology, discussing how both fields share similarities in studying crime while differing in focus areas. Criminology traditionally examines crime within physical spaces, whereas cybercriminology focuses on digital and cyber environments. In summary, by the end of this chapter, students will gain a comprehensive understanding of the various criminological theories, their applications in policymaking, and the evolving field of cybercriminology.


Learning Objectives

After completing this module, you should be able to:

  • categorize criminological theories of crime causation.
  • summarize assumptions for the most substantive categories of criminological theory.
  • discuss the significance of theory as it relates causation.
  • explain the connection between theory and public policy as related to policy and practice within the private and public sphere.
  • describe the similarities and differences between criminology and cybercriminology.

Summary

Computer crime, also known as cybercrime, refers to criminal activities that are conducted through the use of computers or other digital technologies. Criminologists have developed a number of theoretical domains to explain why individuals engage in computer crime, including:

1. Rational Choice Theory – This theory suggests that individuals engage in computer crime because they believe it is a profitable and low-risk activity. In other words, they weigh the potential benefits of committing a crime against the potential risks of getting caught and punished.

2. Social Learning Theory – This theory argues that individuals learn to engage in computer crime through observing the behaviors of others, particularly those who are close to them. They may also be influenced by media portrayals of hackers as glamorous and successful.

3. Strain Theory – This theory posits that individuals engage in computer crime when they experience strain or pressure in their lives, such as economic hardship or social exclusion. Computer crime may provide a way for them to alleviate their stress or gain a sense of power and control.

4. Routine Activities Theory – This theory suggests that computer crime occurs when there is a convergence of three factors: a motivated offender, a suitable target (such as a vulnerable computer system), and the absence of capable guardians (such as effective cybersecurity measures).

5. Self-Control Theory – This theory proposes that individuals who engage in computer crime have low levels of self-control, which makes them more likely to act impulsively and make decisions without considering the consequences.

Overall, these criminological theories help us understand the various motives, opportunities, and situational factors that contribute to computer crime. By better understanding the underlying causes of this type of criminal behavior, public and private sectors can develop more effective strategies for preventing and responding to cybercrime.

Cybercriminology as an outgrowth of traditional criminological teachings and is important for several reasons. The following provides a preliminary list of reasons that necessitate a peer-reviewed supported examination of the computer crime.

Rising Cybercrime Rates – With the increasing reliance on technology and the internet, cybercrime has become a significant threat. Cybercriminals engage in activities such as hacking, identity theft, phishing, ransomware attacks, and more. Understanding the motivations, methods, and trends of cybercriminals is crucial for developing effective countermeasures.

Economic Impact – Cybercrimes can cause significant financial losses for individuals, businesses, and governments. These losses include expenses related to data breaches, theft of intellectual property, disruption of services, and costs associated with recovery and prevention. By studying cybercriminology, researchers and practitioners can work to mitigate these economic impacts.

Technological Advancements – As technology continues to evolve, so do the techniques and tools used by cybercriminals. By studying cybercriminology, experts can stay updated on the latest tactics employed by cybercriminals and develop strategies to defend against them.

Privacy and Data Protection – Cybercrimes often involve breaches of personal and sensitive information, leading to concerns about privacy and data protection. Studying cybercriminology helps to identify vulnerabilities in data systems, improve encryption methods, and develop effective security protocols to safeguard sensitive information.

Global Reach – Cybercrimes transcend geographical boundaries. A cybercriminal from one part of the world can easily target victims in another. This global reach makes it necessary to have a comprehensive understanding of cybercriminal behavior, legal frameworks, and international cooperation to combat cybercrime effectively.

Legal and Regulatory Challenges – Cybercrimes can be complex in terms of jurisdiction, making it challenging for law enforcement to apprehend and prosecute cybercriminals. Cybercriminology helps legal experts understand the intricacies of cybercrime and develop relevant laws and regulations to address these challenges.

Public Awareness and Education – Cybercriminology research can contribute to public awareness and education about online threats and how to protect oneself from cybercrime. Educating individuals and organizations about best practices for online safety can help reduce the risk of falling victim to cybercrimes.

Cybersecurity Workforce Development – As cybercrimes become more sophisticated, there’s a growing need for skilled professionals in the field of cybersecurity. Studying cybercriminology can provide insights into the skill sets required to counter cyber threats and contribute to the development of a well-trained cybersecurity workforce.

Policy Formulation – Policymakers need accurate information to develop effective strategies to combat cybercrime. Cybercriminology research provides valuable insights into the motivations and behaviors of cybercriminals, helping policymakers make informed decisions about legislation, regulations, and international cooperation.

Prevention and Detection – Understanding the psychology and techniques of cybercriminals can help in early detection and prevention of cybercrimes. By analyzing patterns of cybercriminal behavior, experts can create better predictive models to identify potential threats before they escalate.

In essence, cybercriminology plays a critical role in enhancing our understanding of cybercriminal behavior, devising effective countermeasures, protecting sensitive information, and maintaining the overall security of digital systems and networks.

Key Takeaways

Key Terms/Concepts

Applied Criminology
Behavioral Theory
Classical School of Criminology
Correlation
Criminal Justice
Criminologist
Cybercriminology
Cyberspace
Cybervictims
Cybercrime
Determinism
Positivism
Rational Choice
Routine Activities Theory
Space Transition Theory
Social Theory
Theoretical Criminology
Theory

Modern Example

An excellent resource filled with cybercriminology related discussions that advance the field and reinforce the necessity and role of criminology within the examination and response to all forms of digital crime.

“Cybercrimeology is a podcast about cybercrime, its research and its researchers. We talk to top researchers from around the world to learn about different forms of cybercrime and their research. We learn about cybercrime theory, organized crime online, Darknet drug markets, cybercrime awareness and crime prevention, technology-facilitated intimate partner violence and much more. The podcast has been running since November of 2019 and there is still so much to learn. I am happy to have you along for the journey into this fascinating subject.” (Cybercriminology, 2024) [last accessed, February 2024]

Access the Cybercriminology podcast by clicking HERE

Read, Review, Watch and Listen

  1. Read Cyber Criminology: Evolution, Contribution and Impact (Karuppannan, 2018) [click Download file PDF] (pp. 1-16)
  2. Review TEDx Talks Cyber Crime Isn’t About Computers: It’s About Behavior (Anderson, 2017) [also embedded below]
  3. Watch How criminal investigations have evolved along with technology (THV11, 2012) [also embedded below / last accessed February 2024]
  4. Watch Careers in criminology (UniSC University of the Sunshine Coast, Aug. 30, 2021) [also embedded below]
  5. Watch Kahan Academy’s Rational Choice-Exchange Theory (Brown, S. 2014)
  6. Watch Kahan Academy’s Behavioral Theory (Desai, 2019)
  7. Watch Social Theories Overview (Brown, 2015)
  8. Watch Social Theories Overview (part 2) (Brown, 2015)
  9. Listen to Cybercrimeology most recent episode and voluntarily explore others (last accessed February 2024)

Activity 3 – Criminological Explanations of Cybercrime

STOP!! Students should review the course syllabus to determine the assignment of this activity.

This is a copy of the module’s activity that students find within Blackboard. For that reason, refer to the Activities page to submit your work for review.

Purpose

The purpose of this activity is to introduce traditional theories of crime causation that serve as the basis of examining social phenomena.

Overview

Within the framework of classical/choice theory, perceptions of opportunities to commit crime are very important. Routine activities theory builds on this foundation by claiming that crimes are more likely to be committed by motivated offenders who have suitable targets in the absence of capable guardians. Routine activities of perpetrators, as well as those of potential victims and other actors, thus result in opportunities for committing and preventing cybercrimes with technology. As such, routine activities theory has important implications for understanding crimes committed with or prevented with computers, other electronic IT devices, or information systems.

One measure of situational crime prevention is target hardening. Target hardening makes it more difficult or increases the amount of effort needed for offenders to carry out crimes on specific targets. The use of locked doors, windows, alarm systems, watchdogs, and community crime watch programs are all examples of target hardening–making it harder to become a victim of crime.

Instructions

  1. Locate a computer crime or IT-enabled abuse news story using a search engine of your choice, e.g., Google, or an electronic COD library resource.
  2. Review the tenets of routine activities theory (RAT) as introduced within Chapter 3 (see pp. 50-51)
  3. Watch Cybercrime isn’t about computers” It’s about behavior by Adam Anderson (https://youtu.be/c_2Ja-OTmGc)
  4. As a byproduct of rational choice theory (i.e., routine activities), review Arizona State University Center for Problem-Oriented Policing’s Twenty-Five Techniques of Situational Prevention [https://popcenter.asu.edu/sites/default/files/library/25%20techniques%20grid.pdf] (University, 2021)

Watch Video

Cyber Crime Isn’t About Computers: It’s About Behavior | Adam Anderson | TEDxGreenville
Duration: 13:12
User: n/a – Added: 5/17/17

 

Answer the following questions:

  • Think about the crime example that you located and explain how that might have been prevented. Incorporate techniques of situational prevention into the explanation.
  • In your own words, explain how technology (specifically cyber-space) has changed behavior (if at all) and explain what methods of reducing opportunity are necessary to reduce the prevalence of cybercrime.

AND Answer one of the following three questions:

  • Use rational choice exchange theory to explain “Why?” cybercrime happens.
  • Use behavioral theory to explain “Why?” cybercrime happens.
  • Use social theory to explain “Why?” cybercrime happens.

Key Terms/Concepts

Behavioral theory or behaviorism is the second major psychological theory. This theory maintains that human behavior is developed through learning experiences. The hallmark of behavioral theory is the notion that people alter or change their behavior according to the reactions this behavior elicits in other people (Bandura, 1978).

Cybercriminology combines coursework in Criminal Justice and Computer Science to study the growing problem of computer crime.

Rational choice in criminology adopts a utilitarian belief that humans are reasoning actors who weigh means and ends, costs and benefits, in order to make a rational choice. This method was designed by Cornish and Clarke to assist in thinking about situational crime prevention.

Routine Activities Theory– According to Cohen and Felson, crime occurs when there is a convergence in time and space of three factors: (1) motivated offender, (2) suitable target, and (3) the absence of a capable guardian, e.g., inadequate software protection.

Social theory is an empirically tested set of ideas within the social sciences, e.g., social process, that views criminality as a function of people’s interactions with various organizations, institutions, and processes in society; people in all walks of life have the potential to become criminals if they maintain destructive social relationships.

Theory is an attempt to answer the question of “Why?” within the framework of established propositions that provide the basis for an empirical examination.

Refer to the course learning management system (LMS); that is Blackboard (BB), for the correct due date. In addition, submit your work via BB for grading.

Supplemental Resources

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Click HERE to report any needed updates, e.g., broken links.

 

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book