Definition
Cybercriminals commit or support criminal acts in a digital world. These acts can be classified as either digital-focused crimes, where a criminal act has emerged as result of technology, or digital-assisted crimes, where a criminal has used technology in a supporting capacity to commit a criminal act.
Introduction
Industry reports indicate that cybercriminals continue to target organizations around the world. The PricewaterhouseCoopers (PWC 2018) Global Economic Crime and Fraud Survey indicated that a third of all respondents had been a target for cybercriminals. The survey also reported that a quarter of the respondents were victims of digital extortion or had suffered from asset misappropriation during the last year. These increases come at a great financial cost. The 2017 Ponemon Cost of Cybercrime report estimated that the financial losses from criminal enterprise cost organizations an average of $11.7 million in 2017, an increase of 23% since the previous year and a...
References
Australian Cybercrime Online Reporting Network. (2018). Learn about cybercrime. Retrieved from https://www.acorn.gov.au/learn-about-cybercrime
Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4, 643–656.
Carrega-Woodby, C. (2012). Queens couple pleads guilty to roles in largest ID theft scam in US history. Retrieved from https://nypost.com/2012/08/06/queens-couple-pleads-guilty-to-roles-in-largest-id-theft-scam-in-us-history/
Choo, K.-K. R., & Smith, R. G. (2008). Criminal exploitation of online systems by organised crime groups. Asian Journal of Criminology, 3(1), 37–59.
Chouhan, R. (2014). Cyber crimes: Evolution, detection and future challenges. IUP Journal of Information Technology, 10(1).
Cisco. (2011). Cisco 2011 annual security report.
Council of Europe. (2001). Convention on cybercrime.
Cueto, J. (2015). Race and gender among computer science majors at Stanford. Retrieved from https://medium.com/@jcueto/race-and-gender-among-computer-science-majors-at-stanford-3824c4062e3a
Field, M. (2018). WannaCry cyber attack cost the NHS £92m as 19,000 appointments cancelled. Retrieved from https://www.telegraph.co.uk/technology/2018/10/11/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled/
Gibbs, S. (2017). WannaCry: hackers withdraw £108,000 of bitcoin ransom. Retrieved from https://www.theguardian.com/technology/2017/aug/03/wannacry-hackers-withdraw-108000-pounds-bitcoin-ransom
Gregorian, D. (2018). Feds say Russian hackers duped U.S. companies out of tens of millions in advertising dollars. Retrieved from https://www.nbcnews.com/news/us-news/feds-say-russian-cybercriminals-duped-u-s-companies-out-tens-n940946
Grispos, G. (2016). On the enhancement of data quality in security incident response investigations. University of Glasgow.
Grispos, G., GarcÃa-Galán, J., Pasquale, L., & Nuseibeh, B. (2017). Are you ready? Towards the engineering of forensic-ready systems. Paper presented at the 11th international conference on research challenges in information science (RCIS), Brighton, United Kingdom.
Grispos, G., Glisson, W., & Cooper, P. (2019). A bleeding digital heart: Identifying residual data generation from smartphone applications interacting with medical devices. Paper presented at the proceedings of the 52nd Hawaii international conference on system sciences. Maui, HI, USA.
Haggard, S., & Lindsay, J. R. (2015). North Korea and the Sony hack: Exporting instability through cyberspace. Asia-Pacific Issues (117), 1.
Hoar, S. B. (2005). Trends in cybercrime: The dark side of the Internet. Criminal Justice, 20, 4.
Hong, N. (2015). Silk road creator found guilty of cybercrimes. Retrieved from https://www.wsj.com/articles/silk-road-creator-found-guilty-of-cybercrimes-1423083107
Hutchings, A., & Chua, Y. T. (2016). Gendering cybercrime. In Cybercrime through an interdisciplinary lens (pp. 181–202). Routledge. New York, NY, USA.
INTERPOL. (2018). Cybercrime. Retrieved from https://www.interpol.int/Crime-areas/Cybercrime/Cybercrime
Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46(4), 757–780.
Kozlowski, A. (2014). Comparative analysis of cyberattacks on Estonia, Georgia and Kyrgyzstan. European Scientific Journal, 10(7), 237–245.
Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: Some economic and institutional considerations. Electronic Commerce Research, 13(1), 41–69.
Lamkin, P. (2018). Under Armour admits huge MyFitnessPal data hack. https://www.forbes.com/sites/paullamkin/2018/03/30/under-armour-admits-huge-myfitnesspal-data-hack/
Lewis, J. A. (2005). Computer espionage, Titan rain and China. Center for Strategic and International Studies-Technology and Public Policy Program, 1.
Loukas, G. (2015). Cyber-physical attacks: A growing invisible threat. Oxford: Butterworth-Heinemann.
Lusthaus, J., & Varese, F. (2017). Offline and local: The hidden face of cybercrime. Policing: A Journal of Policy and Practice, PAX042, 1–11. https://doi.org/10.1093/police/pax042
MacKinnon, L., Bacon, L., Gan, D., Loukas, G., Chadwick, D., & Frangiskatos, D. (2013). Cyber security countermeasures to combat cyber terrorism. In Strategic intelligence management (pp. 234–257). Elsevier. Waltham, MA, USA.
Maras, M.-H. (2016). Cybercriminology. Oxford University Press, Oxford, United Kingdom.
Markoff, J. (1990). Computer intruder is put on probation and fined $10,000. The New York Times.
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An analysis of underground forums. Paper presented at the proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference. Berlin, Germany.
National Crime Agency. (2018). Cyber crime. Retrieved from http://www.nationalcrimeagency.gov.uk/crime-threats/cyber-crime
Ophardt, J. A. (2010). Cyber warfare and the crime of aggression: The need for individual accountability on tomorrow’s battlefield. Duke Law & Technology Review, i.
Ponemon Institute. (2017). 2017 cost of cyber crime study.
PWC. (2018). Global economic crime and Fraud survey. https://www.pwc.com/gx/en/services/advisory/forensics/economic-crime-survey.html
Shimomura, T., & Markoff, J. (1995). Takedown: The pursuit and capture of Kevin Mitnick, America’s most wanted computer outlaws-by the man who did it. New York: Hyperion Press.
Thorsen, E., Sreedharan, C., & Allan, S. (2013). Wikileaks and whistle-blowing: The framing of Bradley manning. In Beyond WikiLeaks (pp. 101–122). Springer. London, United Kingdom.
Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183–205.
Yang, D. W., & Hoffstadt, B. M. (2006). Countering the cyber-crime threat. American Criminal Law Review, 43, 201.
Yip, M. (2011) An investigation into Chinese cybercrime and the applicability of social network analysis. ACM WebSci ’11, Koblenz, Germany.
Further Reading
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic. Waltham, MA, USA.
Rogers, M. K. (2011). The psyche of cybercriminals: A psycho-social perspective. In Cybercrimes: A multidisciplinary analysis (pp. 217–235). Springer. Berlin, Heidelberg.
Smith, R., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial. Criminal Justice Matters, 58(1), 22–23.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this entry
Cite this entry
Grispos, G. (2019). Criminals: Cybercriminals. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_80-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-69891-5_80-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69891-5
Online ISBN: 978-3-319-69891-5
eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences