Skip to main content

Advertisement

Log in

Economic geographies of the illegal: the multiscalar production of cybercrime

  • Published:
Trends in Organized Crime Aims and scope Submit manuscript

Abstract

Economic geographers have traditionally been reluctant to extend their analysis to illicit and illegal markets despite their being significant in their global economic extent and displaying highly uneven geographies. By contrast, the geographies of licit, legal industries have produced multiple traditions of empirically rich, theoretically diverse accounts. Our understandings of the spatialities of illicit and illegal ‘industries’ derive from a different set of intellectual traditions for whom space is a less explicit, central concern. This paper aims to advance our understanding of the geographies of illegal economic activities by exploring the spatialities of one illegal industry, cybercrime (online for-profit fraud), through the lens of economic geography. It considers the spaces within which cybercrime is embedded, exploring it as the product of factors operating at multiple scales. It reviews cybercrime scholarship focused, variously, at the local, national and transnational scales and examines factors salient to the production of cybercrime through case studies at these scales. It examines national level drivers of cybercrime, local cybercrime agglomerations in Europe and transnational asymmetries, connections and opacities and the production of cybercrime. In each case, it reflects upon the potentials for the development of more spatially informed readings of cybercrime specifically, and illegal economic activities more generally, and considers how this might be mobilised to inform anti-cybercrime policy. The paper speaks to both theme I of this special edition ‘the interactions, the norms, the rituals, the behaviours of OCGs in physical spaces’ and theme III ‘the interactions between OCGs and institutions such as the political and economic field’.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

* Location factors / factor conditions identified as contributing to the development of cybercrime in FSU ECE and West Africa

  • Aas KF (2007) Globalization and crime. Sage, London

    Google Scholar 

  • *Adeniran A (2011) Cafe culture and heresy in Yahooboyism in Nigeria. in Jaishankar K, (ed) Cyber criminology: exploring internet crimes and criminal behaviour. CRC Press, Boca Raton, FL, 3–12

  • *Agwu E, (2013) Cybercriminals on the internet superhighways: a technical investigation of different shades and colours within the Nigerian cyberspace. Int J Online Market 3 (2): 56–74

  • Allen CM (2005) An industrial geography of cocaine. Routledge, New York

    Google Scholar 

  • Amin A, (2002) Ethnicity and the Multicultural City: living with diversity. Report for Department of Transport, Local Government and the Regions. University of Durham, Durham

  • Anderson R, Barton C, Bohme R, Clayton R, van Eeten, MJG, Levi M, Moore T, and Savage S, (2012) Measuring the cost of cybercrime https://www.econinfosec.org/archive/weis2012/papers/Anderson_WEIS2012.pdf (accessed 9th April 2020)

  • Aning K (2007) Are there emerging west African criminal networks? The case of Ghana. Global Crime 8(3):193–212

    Article  Google Scholar 

  • Aoyama Y, Murphy JT, Hanson S (2011) Key concepts in economic geography. Sage, London

    Book  Google Scholar 

  • *Aransiola JO, Asindemade SO (2011) Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychol Behav Soc Netw 14 (2): 759–763

  • *Armstrong A (2011) 'Sakawa' Rumours: occult internet fraud and Ghanaian identity. UCL anthropology working papers series, working paper no. 08/2011, University College London, London

  • *Asal V, Mauslein J, Murdie A, Young J, Cousins K, and Bronk C (2016) Repression, education and politically motivated cyberattacks. J Glob Sec Stud 1 (3): 235–247

  • *Atta-Asamoah A, (2010) Understanding the west African cyber crime process. Af Sec Rev 18 (4): 105–114

  • Babor T, Caulkins J, Edwards G, Fischer B, Foxcroft D, Humphreys K, Obot I, Rehm J, Reuter P, Room R, Rossow I, Strang J (2010) Drug policy and the public good. Oxford University Press, Oxford

    Google Scholar 

  • Bah MT, Shi J, Browne M, Suchier Y, Lefebvre F, Young P, King L, Dunlop DG, Heller MO (2015) Exploring inter-subject anatomic variability using a population of patient-specific femurs and a statistical shape and intensity model. Med Eng Phys 37(10):995–1007

    Article  Google Scholar 

  • Baldé CP, Forti V, Gray V, Kuehr R, and Stegmann P, (2017) Global E-waste monitor 2017: quantities, Flows and Resources, United Nations University (UNU), International Telecommunication Union (ITU) & International Solid Waste Association (ISWA), Bonn/Geneva/Vienna

  • Bathelt H, Malmberg A, Maskell P (2004) Clusters and knowledge: local buzz, global pipelines and the process of knowledge creation. Prog Hum Geogr 28(1):31–56

    Article  Google Scholar 

  • Beckert J, Dewey M (eds) (2017) The architecture of illegal markets: towards an economic sociology of illegality in the economy. Oxford University Press, Oxford

    Google Scholar 

  • *Beek J (2016) Cybercrime, police work and storytelling in West Africa. Africa 86 (2): 305–323

  • Belam M, (2016) We're living through the first world cyberwar – but just haven't called it that. The Guardian, https://www.theguardian.com/commentisfree/2016/dec/30/first-world-cyberwar-historians (accessed 9th April 2020)

  • Berger A, D’Alconzo A, Gansterer WN, Pescapé A (2016) Mining agile DNS traffic using graph analysis for cybercrime detection. Comput Netw 100:28–44

    Article  Google Scholar 

  • *Bernik I (2014) Cybercrime and Cyberwarfare. ISTE Ltd / John Wiley and Sons, London and Hoboken, NJ

  • Bhattacharjee Y, (2011) Welcome to Hackerville: the Romanian cybercriminal hotspot. Wired 7th February, https://www.wired.co.uk/article/welcome-to-hackerville (accessed 9th April 2020)

  • Bran M, (2011) Les pirates roumains d’ “Hackerville” tiennent te ˆte aux polices du monde entire’. Le Monde 28th December

  • Bran M, (2012) Romania: ‘Hackerville’, capital of global cyber-crime. France24 7th December: https://www.france24.com/en/20121207-reporters-romania-hackerville-ramnicu-valcea-cyber-crime-fraud-scams-hackers-internet-police-fbi-cia-bitdefender (accessed 9th April 2020)

  • Bran M, (2013) In Romania, a quiet city has become the global hub for hackers and online crooks. Worldcrunch 7th January: https://worldcrunch.com/tech-science/in-romania-a-quiet-city-has-become-the-global-hub-for-hackers-and-online-crooks (accessed 9th April 2020)

  • *Broadhurst R, and Chang YC (2013) Cybercrime in Asia: trends and challenges. In Liu J, Hebenton, B and Jou S, (Eds.) Asian handbook of criminology. Springer, New York, pp. 49–63

  • *Broadhurst R, Grabosky P, Alazab M, and Chon S (2014) Organisations and cybercrime: an analysis of the nature of groups engaged in cybercrime. Int J Cyber Criminol 8 (1): 1–20

  • Brown E, Cloke J (2004) Neoliberal reform, governance and corruption in the south: assessing the international anti-corruption crusade. Antipode 36(2):272–294

    Article  Google Scholar 

  • *Burrell J (2008) Problematic empowerment: west African internet scams as strategic misrepresentation. Inf Technol Int Dev 4 (4): 15–30

  • *Cassim F (2011) Addressing the growing spectre of cyber crime in Africa: evaluating measures adopted by South Africa and other regional role players. Comp Int Law J South Af 5(1): 123–138

  • Chiodelli F, Hall T, and Hudson R, (eds.) (2017) The illicit and illegal in regional and urban governance and development: corrupt places. Routledge, Abingdon

  • Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 44(4):588–608

    Article  Google Scholar 

  • Dearden L, (2017) Russian-speaking countries pose ‘number-one cyber threat to UK’, officials warn. Independent 17th November. https://www.independent.co.uk/news/uk/crime/russia-hacking-threat-uk-number-one-warning-cyber-attacks-wannacry-north-korea-iran-investigations-a8061521.html (accessed 9th April, 2020)

  • Dodge M, Kitchin R (2001) Mapping cyberspace. Routledge, London

    Google Scholar 

  • *Donner CM, Marcum CD, Jennings WG, Higgins GE. and Banfield J (2014) Low self-control in cybercrime: exploring the utility of the general theory of crime beyond digital piracy. Comput Hum Behav, 34: 165–172

  • *Doyon-Martin J (2015) Cybercrime in West Africa as a result of transboundary e-waste. J Appl Sec Res 10(2): 207–220

  • *Eboibi FE (2017) A review of the legal and regulatory frameworks of Nigerian cybercrimes act 2015. Comput Law Secur Rev 33 (5): 700–717

  • Franceschi-Bicchierai L, (2015) Inside ‘Hackerville’, Romania’s infamous cybercrime hub. Vice, 17th June, https://www.vice.com/en_us/article/4x3jnd/inside-hackerville-romanias-infamous-cyber-crime-hub (accessed 9th April 2020)

  • Galeotti M (ed) (2005) Global crime today: the changing face of organised crime. Routledge, London

    Google Scholar 

  • *Ghandi R, Sharma A, Mahoney W, Sousan W, Zhu Q, and Laplante P (2011) Dimensions of cyber-attacks: cultural, economic, social and political. IEEE Technol Soc Mag 30 (1): 28–38

  • *Glenny M (2008) McMafia: crime without Frontiers. Bodley Head, London

  • *Glenny M (2011) Dark market: Cyberthieves, Cybercops and you. Bodley Head, London

  • *Glenny M, (2012) Organised crime in a network society. J Int Aff 66 (1): 145–149

  • *Goncharov M (2015) Russian underground 2.0. Trends lab working paper, trends micro, Tokyo

  • *Grabosky P, (2007) The internet, technology and organized crime. Asian J Criminol 2(2): 145–161

  • Hall T (2013) Geographies of the illicit: globalisation and organised crime. Prog Hum Geogr 37(3):366–385

    Article  Google Scholar 

  • Hall T (2018) The economic geographies of organized crime. Guilford, New York

    Google Scholar 

  • *Hartwig K (2016) Digital WASTE and cybercrime: understanding THE RELATIONSHIP. Working paper, Harvard University (available from: http://www.academia.edu/31385539/DIGITAL_WASTE_and_CYBER_CRIME_EXAMINING_THE_RELATIONSHIP accessed 22nd October 2018)

  • *Hassan AB, Lass FD, and Makinde J (2012) Cybercrime in Nigeria: causes, effects and the way out. ARPN J Sci Technol 2(7): 626–631

  • Holmes L (2016) Advanced introduction to organised crime. Edward Elgar, Cheltenham

    Google Scholar 

  • Holt TJ, Burruss GW, Bossler AM (2018) Assessing the macro-level correlates of malware infections using a routine activities framework. Int J Offend Ther Comparat Criminol 62(6):1720–1741

    Article  Google Scholar 

  • Huber F (2012) Do clusters really matter for innovation practices in information technology? Questioning the significance of technological knowledge spillovers. J Econ Geogr 12(1):107–126

    Article  Google Scholar 

  • Hudson R (2005) Economic Geographies: Circuits, Flows and Spaces Sage, London

  • Hudson R (2014) Thinking through the relationships between legal and illegal activities and economies: spaces, flows and pathways. J Econ Geogr 14(4):775–795

    Article  Google Scholar 

  • Hudson R, (2019) Economic geographies of the (il)legal and the (il)licit. in Hall, T. and Scalia, V. (eds) A Research Agenda for Global Crime. Edward Elgar, Cheltenham. 11–27

  • *Hutchings A (2014) Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission. Crime Law Soc Chang 62 (1): 1–20

  • *Ibrahim S (2016a) Social and contextual taxonomy of cybercrime: socioeconomic theory of Nigerian cybercriminals. Int J Law Crime Justice 47: 44–57

  • *Ibrahim S (2016b) Causes of socioeconomic cybercrime in Nigeria. Proceedings of 2016 IEEE international conference on cybercrime and computer forensic (ICCCF) https://ieeexplore.ieee.org/document/7740439 (accessed 19th October 2018)

  • *Ilievski A, Bernik I (2016) Social-economic aspects of cybercrime. Innov Iss Approach Soc Sci 9(3): 8–22

  • Iwenwanne V, (2019) Nigeria's e-waste mountain. Resource https://resource.co/article/nigerias-e-waste-mountain (accessed 30th September 2019)

  • *Jafarkarimi H, Tze Hiang Sim A, Saadatdoost R, and Mei Hee J (2015) Individual characteristics and hacking, piracy, online gambling and pornography use among students: a study in Malaysia. Int J Cyber Behav Psychol Learn 5(2): 30–43

  • *Kigerl A (2012) Routine activity theory and determinants of high cybercrime countries. Soc Sci Comput Rev 30 (4): 470–486

  • Kigerl A (2016a) Cyber crime nation typologies: K-means clustering of countries based on cyber crime rates. Int J Cyber Criminol 10(2):147–169

    Google Scholar 

  • Kigerl A (2016b) Email SPAM origins: does the CAN SPAM act shift spam beyond United States jurisdiction? Trends Organ Crime 21(1):62–78

    Article  Google Scholar 

  • Kilmer B, (2016) Uncle Sam's cocaine nosedive: a brief exploration of a dozen hypotheses. in LSE expert group on the economics of drug policy, (eds) after the drug wars. Report of the LSE Expert Group on the Economics of Drug Policy. London School of Economics, London, pp. 67–78

  • Kilmer B, Midgette G, Saloga C (2015) Back in the National Spotlight: an assessment of recent changes in drug use and drug policies in the United States. Brookings Institute, Washington DC

    Google Scholar 

  • Kraemer-Mbula E, Tang P, Rush H (2013) The cybercrime ecosystem: online innovation in the shadows? Technol Forecast Soc Chang 80:541–555

    Article  Google Scholar 

  • *Kshetri N (2005) Pattern of global cyber war and crime: a conceptual framework. J Int Manag 11 (4): 541–562

  • *Kshetri N (2009) Positive externality, increasing returns, and the rise in cybercrimes. Commun ACM 52 (12): 141–144

  • *Kshetri N (2010a) Diffusion and effects of cyber-crime in developing economies. Third World Q 31 (7): 1057–1079

  • *Kshetri N (2010b) The global cybercrime industry: economic, institutional and strategic perspectives. Springer, New York

  • *Kshetri N (2013a) Cybercrimes in the former Soviet Union and central and Eastern Europe: current status and key drivers. Crime Law Soc Chang 60 (1): 39–65

  • *Kshetri N (2013b) Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electron Commer Res 13 (1): 41–69

  • Lavorgna A. (2020) Organized crime and cybercrime in Holt T J, and Bossler A M, (eds) the Palgrave handbook of international cybercrime and Cyberdeviance. Cham, Switzerland: Palgrave Macmillan

  • Lazarus S (2018) Birds of a feather flock together: the Nigerian cyber fraudsters (yahoo boys) and hip hop artists. Criminol Crim Just Law Soc 19(2):63–81

    Google Scholar 

  • Lazarus S (2019) Where is the money? The intersectionality of the spirit world and the acquisition of wealth. Religions 10(3). https://doi.org/10.3390/rel10030146

  • *Leukfeldt ER (2014) Cybercrime and social ties: phising in Amsterdam. Trends Organ Crime 17(4): 231–249

  • *Leukfeldt ER, Kleemans ER, and Stol WP (2017a) Origin, growth and criminal capabilities of cybercriminal networks: an international empirical analysis. Crime Law Soc Chang 67 (1): 39–53

  • Leukfeldt ER, Kleemans ER, Stol WP (2017b) Cybercriminal networks, social ties and online forums: social ties versus digital ties within phishing and malware networks. Br J Criminol 57(3):704–722

    Google Scholar 

  • *Li X (2017) A review of motivations of illegal cyber activities. Criminol Soc Int J 25(1): 110–126

  • *Liang B, and Lu H (2010) Internet development, censorship and cyber crimes in China. J Contemp Crim Justice 26 (1): 103–120

  • *Lusthaus J (2013) How organised is organised cybercrime? G Crime 14 (1): 52–60

  • *Lusthaus J, and Varese F (2017) Offline and local: the hidden face of cybercrime. Policing: A Journal of Policy and Practice https://doi.org/10.1093/police/pax042, Offline and Local: The Hidden Face of Cybercrime

  • *Malin CH, Gudaitis T, Holt TJ, and Kilger M (2015) Deception in the digital age: exploiting and defending human targets through computer-mediated communications. Academic Press, London

  • *Marcum CD, Higgins GE, Ricketts ML, and Wolfe SE (2014) Hacking in high school: cybercrime perpetration by juveniles. Deviant Behav 35 (7): 581–591

  • *McCombie S, Pieprzky J, and Watters P (2009) Cybercrime attribution: an eastern European case study. Proceedings of the 7th Australian digital forensics conference Edith Cowan University, Perth Western Australia, December 3rd 2009. 41-50

  • Midgley T, Briscoe I, Bertoli D (2014) Identifying approaches and measuring impacts of Programmes focused on transnational organised crime. Department for International Development, London

    Google Scholar 

  • Neal S (2010) Cybercrime, transgression and virtual environments. In: Muncie J, Talbot D, Walters R (eds) Crime: local and global. Cullompton, Devon

    Google Scholar 

  • Nordstrom C (2007) Global outlaws: crime, money, and power in the contemporary world. University of California Press, Berkley

    Book  Google Scholar 

  • *Odumesi JO (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria. Int J Sociol Anthropol 6 (3): 116–125

  • *Ojedokun UA, and Eraye MC (2012) Socioeconomic lifestyles of the yahoo boys: a study of perceptions of university students in Nigera. Int J Cyber Criminol 6 (2): 1001–1013

  • *Okeshola FB, Adeta AK (2013) The nature, causes and consequences of cyber crime in tertiary institutions in Zaria-Kaduna state, Nigeria. Am Int J Contemp Res 3 (9): 98–114

  • *Olayemi OJ (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria. Int J Sociol Anthropol 6, (3): 116–125

  • *Olayinka Akanle JO, Adesina and Akarah EP (2016) Towards human dignity and the internet: the cybercrime (yahoo yahoo) phenomenon in Nigeria. Afr J Sci Technol Innov Dev, 8 (2): 213–220

  • *Ortner D (2015) Cybercrime and punishment: the Russian mafia and Russian responsibility to exercise due diligence to prevent trans-boundary cybercrime. Brigham Young Univ Law Rev 1: 177–218

  • Passas N (2001) Globalization and transnational crime: effects of criminogenic asymmetries. In: Williams P, Vlassis D (eds) Combating transnational crime: concepts, activities and responses. Frank Cass, London

    Google Scholar 

  • *Peel M (2006) Nigeria related financial crime and its links with Britain. Chatham House, London

  • Porter ME, (1990) The competitive advantage of nations. Harvard Bus Rev 73–91

  • Porter ME (1998) Clusters and the new economics of competition. Harv Bus Rev 76(6):77–90

    Google Scholar 

  • *Rashkovski D, Naumovski V, and Naumovski G (2016) Cybercrime tendencies and legislation in the republic of Macedonia. Eur J Crim Policy Res 22 (1): 127–151

  • Sandercock L (2006) Cosmopolitan urbanism: a love song to our mongrel cities. In: Binnie J, Holloway J, Millington S, Young C (eds) Cosmopolitan Urbanism. Routledge, Abingdon

    Google Scholar 

  • *Shabnam N, Faruk O, Kamruzzaman (2016) Underlying causes of cyber-criminality and victimization: an empirical study on students. Soc Sci 5 (1): 1–6

  • Sheppard E (2002) The spaces and times of globalization: place, scale, networks and positionality. Econ Geogr 78(3):307–330

    Article  Google Scholar 

  • *Soudijn MR, and Zegers BCHT (2012) Cybercrime and virtual offender convergence settings. Trends Organ Crime 15 (2–3): 111–129

  • Symantec, (2011) Symantec Internet Security Threat Report, https://www4.symantec.com/mktginfo/downloads/21182883_GA_REPORT_ISTR_Main-Report_04-11_HI-RES.pdf (Accessed 18th October 2019)

  • *Tade O (2013) A spiritual dimension to cybercrime in Nigeria: the “yahoo plus” phenomenon'. Hum Aff 23 (4): 689–705

  • *Tade O, and Ibrahim A (2011) Social organization of internet fraud among university undergraduates in Nigeria. Int J Cyber Criminol 5 (2): 860–875

  • UNODC (2005) Transnational organized crime in the west African region. United Nations Office on Drugs and Crime, Vienna

    Google Scholar 

  • van Dijk J (2007) Mafia markers: assessing organized crime and its impact upon societies. Trends Organ Crime 10(4):39–56

    Article  Google Scholar 

  • *Vasylenko O (2012) Problem of cybercrime in Ukraine: spread of, specific nature and methods of fighting. Internal security 4 (1): no page

  • *Warner J (2011) Understanding cyber-crime in Ghana: a view from below. Int J Cyber Criminol 5 (1): 736–749

  • Williams P, (2004) The global implications of west African organized crime. Input paper: West African Assessment Project

  • Wilson E (2009) Deconstructing the shadows. In: Wilson E (ed) Government of the shadows: Parapolitics and criminal sovereignty. Pluto Press, London

    Google Scholar 

  • *Wittes B, Poplin C, Jurecic Q, and Spera C (2016) Sextortion: Cybersecurity, teenagers and remote sexual assault. The Brookings Institution, Washington DC

  • *Wright S (2017) Mythology of cyber-crime—insecurity & governance in cyberspace: some critical perspectives. In Ramírez J, and García-Segura L, (eds) Cyberspace: risks and benefits for society, Security and Development. Springer, New York. 211–227

  • Yar M (2005) The novelty of ‘cybercrime’: an assessment in light of routine activity theory. Eur J Criminol 2:407–427

    Article  Google Scholar 

  • Yar M (2019) Transnational governance and cybercrime control: dilemmas, developments and emerging research agendas. In: Hall T, Scalia V (eds) A research agenda for global crime. Edward Elgar, Cheltenham, pp 91–106

    Chapter  Google Scholar 

  • *Yazdanifard R, Oyegoke T, and Seyedi AP (2011) Cyber-crimes: challenges of the millennium age. In Zheng, D. (ed) Advances in electrical engineering and electrical machines. Springer, New York, 527–534

  • *Yip M (2010) An investigation into Chinese cybercrime and the underground economy in comparison with the west. Presentation to Netcraft, 7th Decemer https://eprints.soton.ac.uk/271759/ (accessed 22nd October 2018)

  • *Zanini M, Edwards SJA (2001) The networking of terror in the information age. In Arquilla J, and Ronfeldt D, (eds) Networks and Netwars: the future of terror, crime, and militancy. RAND, Santa Monica Ca., pp. 29–60

  • *Zook MA (2007) Your urgent assistance is requested: the intersection of 419 spam and new networks of imagination. Ethics, Place Environ 10 (1): 65–88

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tim Hall.

Ethics declarations

Conflict of interest

This work does not involve any conflicts of interest.

Ethical approval

This work did not involve research with human participants or animals.

Informed consent

This work does not necessitate informed consent.

Additional information

1. Recent history of economic transition / liberalisation: Macroeconomic stability at pillar level. World Economic Forum, (WEF) Global Competitiveness Report (GCR), 2018.

2. Economic uncertainty / downturn: World Uncertainty Index, year average for 2018.

3. Poverty / lack of opportunities in legitimate economy (particularly affecting young people with IT skills): World Bank Unemployment with Advanced Education (% of total labour force with advanced education. 2017 (Nigeria 2016, Ghana 2015).

4. Blurring of licit and illicit economic practices: International Labour Organization Women and Men in the Informal Economy: A Statistical Picture, Share of informal employment in non-agricultural employment by urban location (2018).

5. Unbalanced economy / revenues inaccessible to the majority: Legatum Prosperity Index, 2018. (% of the population living below the national poverty lines).

6. High levels of education: Quality of math and science education from WEF Global Information Technology Report (GITR), 2016.

7. IT literacy / skills amongst young people: Digital skills amongst among population. WEF GCR, 2018.

8. Normative influence of consumerism / materialism: Post-materialist Index (4 item), World Values Survey, 2010-2014.

9. High internet penetration: WEF GITR, 2018. Internet users as a % of population.

10. Appropriate technical infrastructure: WEF GITR, 2018 3rd pillar infrastructure score.

11. High levels of corruption: Transparency International Corruption Perception Index, 2018.

12. State and institutional weakness: World Bank World Governance Indicators - Rule of law 2018.

13. Government indifference towards cybercrime / not a government priority: ITU Global Cybersecurity Index, 2017.

14. Internal legal and regulatory shortcomings: WEF GITR, 2016 – 1st pillar ‘Political and regulatory environment’.

15. Traditions of illicitness / normative influence of gangsterism: Legatum Prosperity Index, 2018 (Social capital pillar)

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

National predictors of cybercrime – statistical sources.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hall, T., Sanders, B., Bah, M. et al. Economic geographies of the illegal: the multiscalar production of cybercrime. Trends Organ Crim 24, 282–307 (2021). https://doi.org/10.1007/s12117-020-09392-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12117-020-09392-w

Keywords

Navigation