Abstract
Cybercrimes are becoming increasingly pervasive and sophisticated and have more severe economic impacts than most conventional crimes. Technology and skill-intensiveness; a higher degree of globalization than conventional crimes; and the newness make cybercrimes structurally different. In this chapter, we examine how characteristics of cyber-criminals, cybercrime-victims, and law-enforcement agencies have reinforced each other and formed the vicious circle. Next, we build on key elements of the vicious circle and some additional characteristics of cybercrimes to assess the cost–benefit calculus of a hacker.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
“Today’s online data thieves don’t just run automatic scanners and jump on any network hole they find. They’re more likely to first choose a target that has data they can turn into cash, and then figure out how to break in” (Peter Tippett of Verizon Business, cf. Larkin, 2009, p. 33).
“Law enforcement is presently 5 to 10 years behind the global crime curve in relation to technological capabilities” (Alexander, 2002).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adams, J. (2001, May/June). Virtual defense. Foreign Affairs, 98–112.
Aggarwal, V. (2009). Lead: Cyber crime’s rampant, Express Computer, 03 August 2009. http://www.expresscomputeronline.com/20090803/market01.shtml. Accessed 1 October 2009.
Aguilar-Millan, S., Foltz, J. E., Jackson, J., & Oberg, A. (2008). The globalization of crime. Futurist, 42(6), 41–50.
Alexander, D. (2002, June). Policing and the global paradox. FBI Law Enforcement Bulletin, 71(6), 6–13, 00145688.
Anderson, R., & Schneier, B. (2005). Counterpane internet security guest editors introduction: Economics of information security. IEEE Security & Privacy, 3(1), 12–13.
Andrews, L. (2009, June 9) Online scams go unreported and unpunished. Cybercriminals beating the law Canberra Times (Australia) SECTION: A, p. 5.
Barnes, D. A. (2004). Note, Deworming the Internet, 83 TEX. L. REV. 279, 322–329.
Bauerly, R. J. (2009). Online auction fraud and ebay. Marketing Management Journal, 19(1), 133–143.
Becker, G. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76(2), 169–217.
Becker, G. S. (1995, Fall). The economics of crime. Cross Sections, 8–15. http://www.rich.frb.org/pubs/cross/crime/crime.pdf. Accessed 1 October 2006.
Bednarz, A. (2004). Profiling cybercriminals: A promising but immature science, Network World, November 29. http://www.nwfusion.com/supp/2004/cybercrime/112904profile.html?page=2. Accessed 1 October 2005.
Bell, R. E. (2002). The prosecution of computer crime. Journal of Financial Crime, 9(4), 308–325.
Birmingham Post. (2007). Politics: Cybercrime victim every 10 seconds, 4.
Blau, J. (2004). Russia - a happy haven for hackers, 26 May 2004. http://www.computerweekly.com/Article130839.htm. Accessed 1 October 2005.
Blitstein, R. (2007, November 14). Cybercops: US targets terrorists as online thieves run amok. San Jose Mercury News.
Boal, M. (2005). Being Bill Gates Steven Spielberg, Martha Stewart, George Soros Charles Schwab: How the Most Brazen Identity Thief In US Almost Get Away With It. Readers Digest, 161–173.
Bottoms, A. E., & Wiles, P. (2002). Environmental criminology. Oxford Handbook of Criminology, 620–656.
Brenner, S. W. (2004). Toward a criminal law for cyberspace: A new model of law enforcement? 30 Rutgers Computer and Technology Law Journal, 30, 1–9.
Browning, C. R, Feinberg, S. L., & Dietz, R. D. (2004). The paradox of social organization: Networks, collective efficacy, and violent crime in urban neighborhoods. Social Forces, 83(2), 503–534.
Bryan-Low, C. (2005, July 13). Fraud Inc.: As identity theft moves online, crime rings mimic big business; Russian-led Carderplanet steals account numbers; Mr. Havard hits ATMs; ‘Common Punk’ to ‘Capo’. Wall Street Journal, A.1.
Bulkeley, W. M. (2008). Quiz; Tech IQ: How well do you know...the digital world. Wall Street Journal, R.14.
Caribbean Press Releases. (2008). Trinidad and Tobago to Host OAS Cyber-Crime Workshop, 13 May 2008. http://www.caribbeanpressreleases.com/articles/3236/1/Trinidad-and-Tobago-To-Host-OAS-Cyber-Crime-Workshop/Page1.html. Accessed 1 October 2009.
Casey, E. (2004). Digital evidence and computer crime. Cambridge: Academic Press.
Chretien, K. C., Ryan, G. S., Chretien, J. P., & Kind, T. (2009). Online posting of unprofessional content by medical students. JAMA, 302(12), 1309–1315.
Claburn, T. (2008). The Cybercrime Economy, April 9, 2008. http://www.informationweek.com/blog/main/archives/2008/04/the_cyber_crime.html. Accessed 1 October 2009.
Clarke, R. V. (1983). Situational crime prevention: Its theoretical basis and practical scope. In M. Tonry & N. Morris (Eds.), Crime and justice: An annual review of research (p. 14). Chicago: University of Chicago Press.
Clarke, R. V. (1995). Situational crime prevention. In M. Tonry & D. P. Farrington (Eds.), Building a safer society. Strategic approaches to crime (pp. 91–150). University of Chicago Press.
Clarke, R. V. (1999). Hot products: Understanding, anticipating, and reducing demand for stolen goods. Police Research Paper 112. London: Home Office.
Clemons, E. K. (2007). An empirical investigation of third-party seller rating systems in e-commerce: The case of buySAFE. Journal of Management Information Systems, 24(2), 43–71.
CNN.com. (2000, July 26). Many countries said to lack computer crime laws. CNN.com. http://www.cnn.com/2000/TECH/computing/07/26/crime.internet.reut.
COE. (2009). Convention on Cybercrime: CETS No.:185. http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG. Accessed 1 October 2009.
Dawkins, R. (1982). The extended phenotype. Oxford University Press.
de Jong, W. M. (2001). Manipulative tactics in budgetary games: The art and craft of getting the money you don’t deserve. Knowledge, Technology & Policy, Spring, 14(1), 50–66.
Deas, D., & Thomas, S. (2002). Comorbid psychiatric factors contributing to adolescent alcohol and other drug use. Alcohol Research and Health, 26, 116–121.
Dellarocas, C., & Wood, C. A. (2008). The sound of silence in online feedback: Estimating trading risks in the presence of reporting bias. Management Science, 54(3), 460–476.
Downes, L. (2007, March 6). Cybercrime treaty: What it means to you. Baseline.com.
Edelman, B. (2007, January 25). Why I can never agree with adware and spyware. The Guardian.
Ehrlich, I. (1996). Crime, punishment, and the market for offenses. Journal of Economic Perspectives, 10(1), 43–67.
Ehrlich, I., & Becker, G. (1972). Market insurance, serf-insurance and serf-protection. Journal of Political Economy, 80(4), 623–648.
Fest, G. (2005, September 1). Offshoring: Feds take fresh look at India BPOs; Major theft has raised more than a few eyebrows. Bank Technology News, 18(9), 1.
Fong, C. (2008, May 8). Fighting the agents of organized cybercrime. CNN.com.
Foreign Policy. (2005, March/April). Caught in the net: Australian teens, 92.
Gabrys, E. (2002). The international dimensions of cyber-crime, Part 1. Information Systems Security, 11(4), 21–32.
GAO Reports. (2007). Public and private entities face challenges in addressing cyber threats, RPT-NUMBER: GAO-07-705.
Giannangeli, M. (2008, June 8). Are we ready for Russian Mafia’s crime revolution? Sunday Express, Scottish Edition, 3.
Glaeser, E. L., & Sacerdote, B. (1999). Why is there more crime in cities? The Journal of Political Economy, 107(6), Part 2, 225–258.
Grant, I. (2008, March 19). The UK’s dependence on the internet is putting more than half of its economy at risk, says the government. ComputerWeekly.com. http://www.computerweekly.com/Articles/2008/03/19/229932/uk-government-warns-of-economys-reliance-on-internet.htm. Accessed 1 October 2009.
Greenberg, A. (2007). The top countries for cybercrime, Forbes.com. http://www.forbes.com/2007/07/13/cybercrime-world-regions-tech-cx_ag_0716cybercrime.html. Accessed 1 October 2008.
Grow, B., & Bush, J. (2005, May 30). Hacker hunters. Business Week, 74.
Harler, C., & Fox, B. (1992). Network security communications news. Nokomis, 29(1), 20–24.
Hawkins, J. D., Herrenkohl, T., Farrington, D. P., Brewer, D., Catalano, R., & Harachi, T. W. (1998). A review of predictors of youth violence. In R. Loeber & D. P. Harrington (Eds.), Serious & violent juvenile offenders: Risk factors and successful interventions (pp. 106–146). Thousand Oaks, CA: Sage.
Hirschauer, N., & Musshoff, O. (2007). A game-theoretic approach to behavioral food risks: The case of grain producers. Food Policy, 32(2), 246–265.
Internet Crime Complaint Center. (2007). Internet Crime Report, 2007. http://www.ic3.gov/media/annualreport/2007_IC3Report.pdf. Accessed 1 October 2008.
Ismail, I. (2008, February 18). Understanding cybercriminals. New Straits Times (Malaysia), 12.
Jones, B. R. (2007). Comment: Virtual neighborhood watch: Open source software and community policing against cybercrime. Journal of Criminal Law & Criminology, 97(2), 601–629.
Joshi, V. (2009, October 12). Officials: Criminals cooperate better than police. The Boston Globe. http://www.boston.com/news/world/asia/articles/2009/10/12/officials_criminals_cooperate_better_than_police/ Accessed 27 October 2009.
Kallman, E. A., & Grillo, J. P. (1996). Ethical decision making and information technology, 2e. New York: McGraw Hill.
Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149(4), 1003–1114.
Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541–562.
Kupersmidt, J. B., Griesler, P. C., DeRosier, M. E., Patterson, C. J., & Davis, P. W. (1995). Childhood aggression and peer relations in the context of family and neighborhood factors. Child Development, 66, 360–375.
Lagu, T., Kaufman, E. J., & Asch, D. A. (2008). Armstrong, K. Content of weblogs written by health professionals. Journal of General Internal Medicine, 23(10), 1642–1646.
Larkin, E. (2009). Organized crime moves into data theft. PC World, 27(7), 33–34.
Larsen, E., & Lomi, A. (2002). Representing change: A system model of organizational inertia and capabilities as dynamic accumulation processes. Simulation Model Practice and Theory, 10(5), 271–296.
Lemos, R. (2001, May 1). FBI “hack” raises global security concerns. CNet News. http://news.com.com/2100-1001-950719.html
Lianos, M., & Douglas, M. (2000). Dangerization and the end of deviance. The British Journal of Criminology, 40(2), 261–278.
Matsumoto, K., Ouchi, N., Watanabe, C., & Griffy-Brown, C. (2002). Optimal timing of the development of innovative goods with generation. Technovation, 22(3), 175–185.
McCarthy, B. (2002). New economics of sociological criminology. Annual Review of Sociology, 28, 417–442.
McCleary, R. M. (2008). Religion and economic development. Policy Review, 148, 45–57.
McCord, E. S., Ratcliffe, J. H., Garcia, R. M., & Taylor, R. B. (2007). Nonresidential crime attractors and generators elevate perceived neighborhood crime and incivilities. Journal of Research in Crime and Delinquency, 44(3), 295–320.
McDonald, C. G., Slawson, C. V., Jr. (2002, October). Reputation in an internet auction market. Economic Inquiry, 40(4), 633–650.
McIllwain, J. S. (2005). Intellectual property theft and organized crime: The case of film piracy. Trends in Organized Crime, 8(4), 15–39.
Merton, R. (1968). Social theory and social structure. New York: Free Press.
Messmer, E. (2009, October 6). Malware flea market pays hackers to hijack PCs. The Industry Standard. http://www.thestandard.com/news/2009/10/06/malware-flea-market-pays-hackers-hijack-pcs. Accessed 14 October 2009.
Mikos, R. A. (2006). “Eggshell” victims, private precautions, and the societal benefits of shifting crime. Michigan Law Review, 105(2), 307–351.
Miller, N. (2008). Casting a wide net for cyber crimes. The Age. Melbourne, Australia.
Morgan, P. M. (2005). Taking the long view of deterrence. Journal of Strategic Studies, 28(5), 751–763.
Nagin, D. S. (1998). Criminal deterrence–research at the outset of the twenty-first century. In M. Tondry (Ed.), Crime and justice: A review of research, 23, 1–42.
Oberwittler, D. (2007). The effects of neighborhood poverty on adolescent problem behaviors: A multi-level analysis differentiated by gender and ethnicity. Housing Studies, 22, 781–803.
Phukan, S. (2002, June). IT ethics in the Internet age: New dimensions. InSITE. http://proceedings.informingscience.org/IS2002Proceedings/papers/phuka037iteth.pdf
Probasco, J., Clark, R., & Davis, W. L. (1995). A human capital perspective on criminal careers. Journal of Applied Business Research, 11(3), 58–64.
Regan, K. (2006). FBI: Cybercrime causes financial pain for many businesses. TechNewsWorld. http://www.technewsworld.com/story/48417.html. Accessed 1 October 2009.
Richtel, M. (1999, June 2). Federal cybercrime unit hunts for hackers. New York Times, A16.
Rush, H., Smith, C., Mbula, E. K., & Tang, P. (2009). Crime online: Cybercrime and illegal innovation, Research report: July 2009, CENTRIM, University of Brighton. http://eprints.brighton.ac.uk/5800/01/Crime_Online.pdf. Accessed 1 October 2009.
Salkever, A. (2003, October 21). “Phishing” is foul on the Net. Business Week Online. http://www.businessweek.com/technology/content/oct2003/tc20031021_8711_tc047.htm. Accessed 1 October 2004.
Salu, A. O. (2004). Online crimes and advance fee fraud in nigeria – Are available legal remedies adequate? Journal of Money Laundering Control, 8(2), 159–167.
Sawant, N. (2009, October 5). Virtually speaking, crime in the city on an upward spiral. The Times of India. http://timesofindia.indiatimes.com/news/city/mumbai/Virtually-speaking-crime-in-the-city-on-an-upward-spiral/articleshow/5087668.cms.
Schneier, B. (2009, October 15). Why framing your enemies is now virtually child’s play. The Guardian. http://www.guardian.co.uk/technology/2009/oct/15/bruce-schneier-internet-security.
Schuerman, L., & Kobrin, S. (1986). Community careers in crime. In A. J. Reiss, Jr. & M. Tonry (Eds.), Communities and crime (pp. 67–100). Chicago: University of Chicago Press.
Serio, J. D., & Gorkin, A. (2003). Changing lenses: Striving for sharper focus on the nature of the ‘Russian Mafia’ and its impact on the computer realm. International Review of Law, Computers and Technology, 17(2), 191–202.
Shelley, L. I. (1998). Crime and corruption in the digital age. Journal of International Affairs, 51(2), 605–620.
Shiels, M. (2009, October 1). US urges ‘cyber hygiene’ effort, BBC News. http://news.bbc.co.uk/2/hi/technology/8279867.stm. Accessed 1 October 2009.
Sullivan, B. (2007). Who’s Behind Criminal Bot Networks?, April 10. http://redtape.msnbc.com/2007/04/whos_behind_cri.html. Accessed 1 October 2008.
Sutherland, B. (2008). The Rise of Black Market Data; Criminals who steal personal data often don’t exploit it. Instead, they put it up for sale on one of the many vibrant online markets. Newsweek (International ed.), 152(24).
Swartz, J. (2004, October 21). Crooks slither into Net’s shady nooks and crannies crime explodes as legions of strong-arm thugs, sneaky thieves log on. USA Today. http://www.usatoday.com/printedition/money/20041021/cybercrimecover.art.htm. Accessed 1 October 2005.
Swope, R. E. (2001). Criminal theory on the street: Analyzing why offenses take place. Law and Order, 49(6), 121–128.
Taylor, R. B., Koons, B., Kurtz, E., Greene, J., & Perkins, D. (1995). Streetblocks with more nonresidential landuse have more physical deterioration: Evidence from baltimore and philadelphia. Urban Affairs Review, 30, 120–136.
The Baltic Times. (2009, August 4). Cyber criminals found in Latvia. http://www.baltictimes.com/news/articles/23283. Accessed 1 October 2009.
The New York Times. (2009). Text: Obama’s Remarks on Cyber-Security. http://www.nytimes.com/2009/05/29/us/politics/29obama.text.html?pagewanted=2. Accessed 1 October 2009.
Thompson, L. A., Dawson, K., & Ferdig, R., Black, E., Boyer, J., & Coutts, J. (2008). The intersection of online social networking with medical professionalism. Journal of General Internal Medicine, 23(7), 954–957.
Toshiya, K., Susumu, F., & Noriyasu, Y. (2003). A validation on Pareto optimality of Walrasian virtual market. IEIC Technical Report (Institute of Electronics, Information and Communication Engineers), 102(613), 13–18.
Valdez, A., Kaplan, C. D., & Curtis, R. L. (2007). Aggressive crime, alcohol and drug use, and concentrated poverty in 24 US urban areas. American Journal of Drug and Alcohol Abuse, 33, 595–603.
Van Koppen, P. J., & Jansen, R. W. J. (1998). The road to the robbery: Travel patterns in commercial robberies. The British Journal of Criminology, 38(2), 230–246.
Walden, I. (2005). Crime and security in cyberspace. Cambridge Review of International Affairs, 18(1), 51–68.
Walker, C. (2004, June). Russian Mafia extorts gambling websites. http://www.americanmafia.com/cgi/clickcount.pl?url=www.americanmafia.com/Feature_Articles_270.html. Accessed 1 October 2005.
Wall, D. S. (1998). Catching cybercriminals: Policing the internet. International Review of Law, 12(2), 201–218.
Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice & Research, 8(2), 183–205.
Warren, P. (2007, November 15). Hunt for Russia’s web criminals. The Russian Business Network – Which some blame for 60% of all internet crime – Appears to have gone to ground. The Guardian. http://www.guardian.co.uk/technology/2007/nov/15/news.crime. Accessed 1 October 2009.
Watanabe, C., & Tokumasu, S. (2003). Optimal timing of R&D for effective utilization of potential resources in innovation. Journal of Advances in Management Research, 1(1), 11–27.
Webb, J. W., Tihanyi, L., Ireland, R. D., & Sirmon, D. G. (2009). You say illegal, I say legitimate: Entrepreneurship in the informal economy. Academy of Management Review, 34(3), 492–510.
Webwire. (2008, June 25). First told of Chinese PC hijack explosion. http://www.webwire.com/ViewPressRel.asp?aId=68776. Accessed 1 October 2009.
Weisburd, D., Bushway, S., Lum, C., & Yang, S. M. (2004). Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology, 42(2), 283–320.
Whitlock, R. A. (1979). Witch crazes and drug crazes: A contribution to the social pathology of credulity and scapegoating. Australian Journal of Social, 14(1), 43–54.
Wilson, W. J. (1987). The truly disadvantaged. Chicago: University of Chicago Press.
Wylie, I. (2007, December 26). Internet; Romania home base for EBay scammers; The auction website has dispatched its own cyber-sleuth to help police crack fraud rings. Los Angeles Times, C.1.
Ye, V. (2008, April 15). Asia hindered by lack of cybercrime laws. businessweek.com. http://www.businessweek.com/globalbiz/content/apr2008/gb20080415_220378.htm?campaign_id=rss_daily. Accessed 12 October 2009.
Zimmerman, A. (2006, October 25). Creative crooks: As shoplifters use high-tech scams, retail losses rise; Theft rings alter bar codes, work gift-card swindles; Fencing the loot online; Target snares a Lego bandit. Wall Street Journal, A1.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kshetri, N. (2010). Simple Economics of Cybercrime and the Vicious Circle. In: The Global Cybercrime Industry. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11522-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-11522-6_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11521-9
Online ISBN: 978-3-642-11522-6
eBook Packages: Business and EconomicsBusiness and Management (R0)