Skip to main content

Advertisement

Log in

Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission

  • Published:
Crime, Law and Social Change Aims and scope Submit manuscript

Abstract

This paper examines a predominantly Australian sample of computer crime offenders involved in fraud and/or unauthorised access. This paper focuses on the extent to which offenders are involved in organised crime, the nature of the relationship between co-offending, initiation and knowledge transmission, and how the online environment facilitates organised crime and co-offending. This qualitative analysis draws from interviews with self-identified offenders, law enforcement officers who investigate these offenses, and court documents, providing a unique understanding of organised crime involving computer systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Lusthaus, J. (2013). How organised is organised cybercrime? Global Crime, 14(1), 52–60.

    Article  Google Scholar 

  2. Felson, M. (1998). Crime and everyday life (2nd ed.). Thousand Oakes: Pine Forge Press.

    Google Scholar 

  3. Chantler, A. N. (1995). Risk: The Profile of the Computer Hacker. Curtin University.

  4. Meyer, G. R. (1989). The Social Organization of the Computer Underground. Northern Illinois University.

  5. Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behaviour, 28(2), 171–198.

    Article  Google Scholar 

  6. Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46(4), 757–780.

    Article  Google Scholar 

  7. Yar, M. (2013). Cybercrime and society (2nd ed.). London: SAGE Publications Ltd.

    Google Scholar 

  8. AusCERT. (2006). Australian 2006 computer crime & security survey. Brisbane: AusCERT.

    Google Scholar 

  9. Smith, R. G. (2001). Trends & issues in crime and criminal justice No. 202: Cross-border economic crime: The agenda for reform. Canberra: Australian Institute of Criminology.

    Google Scholar 

  10. Brenner, S. W. (2007). Cybercrime: Re-thinking crime control strategies. In Y. Jewkes (Ed.), Crime online. Devon: Willan Publishing.

    Google Scholar 

  11. Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Cambridge: Polity Press.

    Google Scholar 

  12. Goode, S., & Cruise, S. (2006). What motivates software crackers? Journal of Business Ethics, 65, 173–201.

    Article  Google Scholar 

  13. Shaw, E., Ruby, K. G., & Post, J. M. (1998). The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin, 98(2), 1–10.

    Google Scholar 

  14. Finch, E. (2007). The problem of stolen identity and the Internet. In Y. Jewkes (Ed.), Crime online. Devon: Willan Publishing.

    Google Scholar 

  15. Chu, B., Holt, T. J., & Ahn, G. J. (2010). Examining the Creation, Distribution and Function of Malware On-Line: Technical report for the National Institute of Justice.

  16. Franklin, J., Paxson, V., Perrig, A., & Savage, S. (2007). An inquiry into the nature and causes of the wealth of internet miscreants. Paper presented at the ACM Conference on Computer and Communications Security (CCS), Virginia, October 29-November 2

  17. Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets online: products and market forces. Criminal Justice Studies: A Critical Journal of Crime, Law and Society, 23(1), 33–50.

    Article  Google Scholar 

  18. Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An analysis of underground forums. Paper presented at the 2011 ACM SIGCOMM conference on Internet measurement, Berlin, November 2–4

  19. Choo, K.-K. R. (2007). Trends & issues in crime and criminal justice No. 333: Zombies and botnets. Canberra: Australian Institute of Criminology.

    Google Scholar 

  20. United Nations Office on Drugs and Crime. (2004). United Nations convention against transnational organized crime and the protocols thereto. Vienna: United Nations Office on Drugs and Crime.

    Google Scholar 

  21. Choo, K.-K. R., & Smith, R. G. (2008). Criminal exploitation of online systems by organised crime groups. Asian Journal of Criminology, 3(1), 37–59.

    Article  Google Scholar 

  22. Choo, K.-K. R. (2008). Organised crime groups in cyberspace: a typology. Trends in Organized Crime, 11(3), 270–295.

    Article  Google Scholar 

  23. Grabosky, P. (2007). Requirements of prosecution services to deal with cyber crime. Crime, Law & Social Change, 47(4–5), 201–223.

    Article  Google Scholar 

  24. Theohary, C. A., & Rollins, J. (2011). Terrorist use of the internet: Information operations in cyberspace. Washington, DC: Congressional Research Service.

    Google Scholar 

  25. Smith, R. G., McCusker, R., & Walters, J. (2010). Trends & issues in crime and criminal justice No. 394: Financing of terrorism: Risks for Australia. Canberra: Australian Institute of Criminology.

    Google Scholar 

  26. Seib, P. (2008). The Al-Qaeda media machine. Military Review, 88(3), 74–80.

    Google Scholar 

  27. Barber, R. (2001). Hackers profiled - who are they and what are their motivations? Computer Fraud & Security, 2(1), 14–17.

    Article  Google Scholar 

  28. Chantler, A., & Broadhurst, R. (2006). Social engineering and crime prevention in cyberspace - technical report. Brisbane: Queensland University of Technology.

    Google Scholar 

  29. Furnell, S. (2002). Cybercrime: Vandalizing the information society. London: Pearson Education Limited.

    Google Scholar 

  30. Taylor, P. A. (1999). Hackers. London: Routledge.

    Book  Google Scholar 

  31. Berg, B. L. (2007). Qualitative research methods for the social sciences (6th ed.). Boston: Pearson Education, Inc.

    Google Scholar 

  32. Edney, R., & Bagaric, M. (2007). Australian sentencing: principles and practice. New York: Cambridge University Press.

    Google Scholar 

  33. Farrington, D. P. (1989). Early predictors of adolescent aggression and adult violence. Violence and Victims, 4(2), 79–100.

    Google Scholar 

  34. Wright, R. T., Decker, S. H., Redfern, A. K., & Smith, D. L. (1992). A snowball’s chance in hell: doing field research with residential burglars. Journal of Research in Crime and Delinquency, 29(2), 148–157.

    Article  Google Scholar 

  35. Sutherland, E. H., & Cressey, D. R. (1974). Criminology (9th ed.). Philadelphia: J. B. Lippincott Company.

    Google Scholar 

  36. McAdams, D. P. (2008). The Life Story Interview. http://www.sesp.northwestern.edu/docs/LifeStoryInterview.pdf. Accessed November 12 2009.

  37. Wright, R., & Bennett, T. (1990). Exploring the offender’s perspective: Observing and interviewing criminals. In K. L. Kempf (Ed.), Measurement issues in criminology (pp. 138–151). New York: Springer-Verlag New York Inc.

    Chapter  Google Scholar 

  38. Israel, M. (2004). Strictly confidential?: integrity and the disclosure of criminological and socio-legal research. British Journal of Criminology, 44(5), 715–740. doi:10.1093/bjc/azh033.

    Article  Google Scholar 

  39. Gibbs, G. (2007). Analyzing qualitative data. London: SAGE Publications Ltd.

    Google Scholar 

  40. Smith, R. G., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial. Cambridge: Cambridge University Press.

    Book  Google Scholar 

Download references

Acknowledgments

I would like to thank those who participated in this study and the assistance provided by the Australian Federal Police, the Queensland Police Service, Western Australia Police, and Victoria Police. I also appreciate the support of my supervisors, Dr Hennessey Hayes, Associate Professor Janet Ransley, Professor Simon Bronitt, and Professor Peter Grabosky, and acknowledge the assistance of the School of Criminology and Criminal Justice and the ARC Centre of Excellence in Policing and Security at Griffith University in undertaking my doctorate.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alice Hutchings.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hutchings, A. Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission. Crime Law Soc Change 62, 1–20 (2014). https://doi.org/10.1007/s10611-014-9520-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10611-014-9520-z

Keywords

Navigation