The Fox and the Hunters: How IC Technologies Change the Crime Race

  • Ernesto U. Savona
  • Mara Mignone


What is the role and the impact of technologies on crime? Criminals use them for maximizing their opportunities and minimizing the risk of being detected and caught. The Police do exactly the reverse, using technologies for detecting crime and criminals and arresting them. The range of relationships between technologies and crime is wide. This paper focuses on a relatively narrow path: Information and Communication Technologies (ICT) related crime, looking at how criminals and law enforcement agencies use ICT.


Smart Card Illegal Immigration Malicious Code Environmental Crime Computer Crime 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Adamoli, S., A. Di Nicola, E. U. Savona and P. Zoffi, Organised crime around the world. Helsinki: HEUNI Publication Series No. 31, 1998.Google Scholar
  2. Akdeniz, Y., Controlling illegal and harmful content on the Internet. In: D. Wall (Ed.), Crime and the Internet, pp. 113–140. London: Routledge, 2001.Google Scholar
  3. Beck, U., World Risk Society. Cambridge: Polity Press, 1999.Google Scholar
  4. Becker, G.S., Crime and punishment: An economic approach. In: G. Becker and W. Landes (Eds.), Essays in the Economic of Crime and Punishment, pp. 1–54. New York: Columbia University Press, 1974.Google Scholar
  5. Brill, A., Cyberlaundering: The American experience: Presentation and analysis of specific cases in the USA. Paper presented at the workshop Cyberlaundering 2000. The Risk of Money Laundering via Internet, organised by TRANSCRIME-University of Trento, Trento, Italy, 11 June 1999.Google Scholar
  6. Cornish, D.B. and R.V.G. Clarke, The Reasoning Criminal: Rational Choice Perspectives on Offending. New York: Springer-Verlag, 1986.CrossRefGoogle Scholar
  7. Denning, D., Information Warfare and Security. Essex: Addison Wesley, 1999.Google Scholar
  8. Doney, L., The growing threat of computer crime in small business, Business Horizons, May–June 1998.Google Scholar
  9. Europol 2000. EU Organised Crime Situation Report. The Hague: Europol.Google Scholar
  10. Felson, M. and R.V.G. Clarke, Opportunity makes the thief: Practical theory for crime prevention. Police Research Series-Paper 98, London: Home Office, 1998.Google Scholar
  11. Forte, D., International hacking: When the cooperation is the only cure. Paper presented at the Black Hat USA 2003 Convention, Washington, 23 October 2003. Retrieved from, 2003.Google Scholar
  12. International Narcotics Control Board. Report of the International Narcotics Control Board for 2001. Retrieved from, 2001.Google Scholar
  13. Korsell, L.E., Information Technology and Economic Crime–Old Wine in New Bottles or a Threat to the New Millennium. National Council for Crime Prevention-Sweden, 2000.Google Scholar
  14. Magklaras, G.B. and S.M. Furnell, Insider threat prediction tool: Evaluating the probability of IT misuse. Computers & Security, 21 (1), pp. 62–73, 2002.CrossRefGoogle Scholar
  15. Malagò, T. and M. Mignone, Crimini and musica on line. Gli sviluppi della pirateria musicale attraverso le nuove tecnologie: Analisi e rimedi. Milan: FrancoAngeli Editore, 2000.Google Scholar
  16. Ministero degli Interni. Il programma operativo nazionale per il Mezzogiorno–sicurezza per lo sviluppo del Mezzogiorno d’Italia. In: Rapporto sulla Sicurezza, 2003.Google Scholar
  17. Ogilvie, E., Cyberstalking. Trends and Issues in Crime and Criminal Justice, 166. Australian Institute of Criminology, 2000.Google Scholar
  18. Peltier, T.R., Information Security Risk Analysis. Boca Raton: Auerbach, 2001.Google Scholar
  19. Power, R., Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace. Indianapolis: Que Corporation, 2000.Google Scholar
  20. RAND Europe. Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries. Study for the European Commission Directorate-General Information Society, 2003.Google Scholar
  21. Rider, B., Cyber-organised crime: The impact of information technology on organized crime. Journal of Financial Crime, 8 (4), pp. 332–346, 2001.CrossRefGoogle Scholar
  22. Shenk, D., Watching you: The world of high-tech surveillance. National Geographic, November pp. 2–29, 2003.Google Scholar
  23. Sieber, U., The Legal Aspect of Computer Related Crime in the Information Society. COMCRIME Study, 1998.Google Scholar
  24. Standler, R.B., Computer crime. Retrieved from, 2002.Google Scholar
  25. The Honeynet Project 2002. Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Essex: Addison Wesley.Google Scholar
  26. Thomas, D. and B.D. Loader, Introduction. In: D. Thomas and B.D. Loader (Eds), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge, 2000.Google Scholar
  27. TRANSCRIME. Business Crime Prevention in Europe: Implementing an Early Warning Strategy. Final Report. Study financed by the European Commission under the 2001 Falcone Programme, 2002a.Google Scholar
  28. TRANSCRIME. Transatlantic Agenda. EU/US Co-operation for Preventing Computer Related Crime. Final Report. Study financed by the European Commission under the Transatlantic Agenda Programme, 2002b.Google Scholar
  29. Voiskounsky, A.E., J.D. Babaeva and O.V. Smyslova, Attitudes towards computer hacking in Russia. In: D. Thomas and B.D. Loader (Eds), Cybercrime, Law Enforcement, Security and Surveillance in the Information Age. London: Routledge, 2000.Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2004

Authors and Affiliations

  • Ernesto U. Savona
  • Mara Mignone

There are no affiliations available

Personalised recommendations