Skip to main content

The Challenges of Empirically Comparing Cybercriminals and Traditional Offenders

  • Chapter
  • First Online:
Book cover Researching Cybercrimes

Abstract

In the theoretical literature, many differences between cybercriminals and traditional criminals are discussed. On the one hand, the empirical literature tends to focus only on cybercrime and usually does not empirically compare cybercriminals with traditional criminals. However, such a comparison enables an empirical evaluation on the extent to which traditional criminological theories and concepts are equally important in explaining cybercrime. Comparing such different types of crime committed in completely different contexts is, however, also very challenging. One needs to find comparable samples of criminals and find research methods suitable for both groups. Based on the experiences resulting from empirical comparisons of cybercriminals and traditional criminals, this chapter will discuss several of these challenges. In addition to methodological choices, it will also discuss differences between cybercriminals and traditional criminals in, for example, response rates or privacy awareness, as this may be useful in both comparative research as well as research specifically focused on cybercrime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Akers, R. L. (1998). Social learning and social structure: A general theory of crime and deviance. Northeastern University Press.

    Google Scholar 

  • Berenblum, T., Weulen Kranenbarg, M., & Maimon, D. (2019). Out of control online? A combined examination of peer-offending and perceived formal and informal social control in relation to system-trespassing. Journal of Crime and Justice,42(5), 616–631.

    Article  Google Scholar 

  • Dupont, B., Côté, A. M., Savine, C., & Décary-Hétu, D. (2016). The ecology of trust among hackers. Global Crime,17(2), 129–151.

    Article  Google Scholar 

  • Goldsmith, A., & Brewer, R. (2015). Digital drift and the criminal interaction order. Theoretical Criminology,19(1), 112–130.

    Article  Google Scholar 

  • Goldsmith, A., & Wall, D. S. (2019). The seductions of cybercrime: Adolescence and the thrills of digital transgression. European Journal of Criminology (online first).

    Google Scholar 

  • Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies,10(2), 243–249.

    Article  Google Scholar 

  • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior,28(2), 171–198.

    Article  Google Scholar 

  • Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice,37(3), 378–395.

    Article  Google Scholar 

  • Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice,33(2), 31–61.

    Article  Google Scholar 

  • Holt, T. J., Cale, J., Brewer, R., & Goldsmith, A. (2020). Assessing the role of opportunity and low self-control in Juvenile Hacking. Crime & Delinquency (online first).

    Google Scholar 

  • Holt, T. J., Smirnova, O., & Hutchings, A. (2016). Examining signals of trust in criminal markets online. Journal of Cybersecurity,2(2), 137–145.

    Google Scholar 

  • Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance, and desistance. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context. Carolina Academic Press.

    Google Scholar 

  • Hutchings, A., & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior,37(10), 1163–1178.

    Article  Google Scholar 

  • Jaishankar, K. (2009). Space transition theory of cyber crimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet. Pearson Education.

    Google Scholar 

  • Kazemian, L. (2015). Desistance from crime and antisocial behavior. In J. Morizot & L. Kazemian (Eds.), The development of criminal and antisocial behavior. Springer.

    Google Scholar 

  • Lageson, S., & Uggen, C. (2013). How work affects crime—And crime affects work—Over the life course. In C. L. Gibson & M. D. Krohn (Eds.), Handbook of life-course criminology. Springer.

    Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W.Ph. (2016). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. British Journal of Criminology,57(3), 704–722.

    Google Scholar 

  • Lusthaus, J. (2018). Industry of anonymity: Inside the business of cybercrime. Harvard University Press.

    Book  Google Scholar 

  • McCuddy, T. (2020). Peer delinquency among digital natives: The cyber context as a source of peer influence. Journal of Research in Crime and Delinquency (online first).

    Google Scholar 

  • McGuire, M., & Dowling, S. (2013a). Chapter 1: Cyber-dependent crimes. Home Office.

    Google Scholar 

  • McGuire, M., & Dowling, S. (2013b). Chapter 2: Cyber-enabled crimes. Home Office.

    Google Scholar 

  • Morris, R. G., & Blackburn, A. G. (2009). Cracking the code: An empirical exploration of social learning theory and computer crime. Journal of Crime and Justice,32(1), 1–34.

    Article  Google Scholar 

  • Navarro, R., Yubero, S., & Larrañaga, E. (2015). Psychosocial risk factors for involvement in bullying behaviors: Empirical comparison between cyberbullying and social bullying victims and bullies. School Mental Health,7(4), 235–248.

    Article  Google Scholar 

  • Rogers, M. K. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study (Doctoral dissertation). University of Manitoba. Available at https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/rogers_01.pdf.

  • Rokven, J. J., Weijters, G., Beerthuizen, M. G. C. J., & van der Laan, A. M. (2018). Juvenile delinquency in the virtual world: Similarities and differences between cyber-enabled, cyber-dependent and offline delinquents in the Netherlands. International Journal of Cyber Criminology,12(1), 27–46.

    Google Scholar 

  • Rokven, J. J., Weijters, G., & Van Der Laan, A. M. (2017). Jeugddelinquentie in de virtuele wereld: Een nieuw type daders of nieuwe mogelijkheden voor traditionele daders? WODC.

    Google Scholar 

  • Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology,55(1), 125–145.

    Article  Google Scholar 

  • Suler, J. (2004). The online disinhibition effect. Cyber Psychology & Behavior,7(3), 321–326.

    Article  Google Scholar 

  • Turgeman-Goldschmidt, O. (2008). Meanings that hackers assign to their being a hacker. International Journal of Cyber Criminology,2(2), 382–396.

    Google Scholar 

  • Turgeman-Goldschmidt, O. (2009). The rhetoric of hackers’ neutralizations. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet. Pearson Education.

    Google Scholar 

  • Van der Laan, A. M., & Tollenaar, N. (2021). Textmining for cybercrime in registrations of the Dutch police. In M. Weulen Kranenbarg & E. R. Leukfeldt (Eds.), Cybercrime in context: The human factor in victimization, offending, and policing (pp. 327–350). Cham: Springer International Publishing.

    Google Scholar 

  • Van der Toolen, Y., Weulen Kranenbarg, M., & Weerman, F. M. (2020). Online jeugdcriminaliteit en “verkeerde vrienden”: Wanneer is de samenhang het sterkst? Tijdschrift Voor Criminologie,62(2–3), 153–180.

    Article  Google Scholar 

  • Van Der Wagen, W. (2018). From cybercrime to cyborgcrime: An exploration of high-tech cybercrime, offenders and victims through the lens of actor-network theory (Doctoral dissertation). Rijksuniversiteit Groningen & Erasmus Universiteit Rotterdam, The Netherlands. Available at https://www.rug.nl/research/portal/en/publications/from-cybercrime-to-cyborg-crime(f3a5c5e0-ff0f-4dad-ac6c-2bc91d96a1b4).html.

  • Van Der Wagen, W., Althoff, M., & Swaaningen, R. (2016). De andere “anderen.” Tijdschrift over Cultuur & Criminaliteit,6(1), 27–41.

    Google Scholar 

  • Weulen Kranenbarg, M. (2018). Cyber-offenders versus traditional offenders: An empirical comparison (Doctoral dissertation). Vrije Universiteit (VU) Amsterdam, The Netherlands. Available at http://dare.ubvu.vu.nl/handle/1871/55530.

  • Weulen Kranenbarg, M. (2021). Cyber-dependent crime versus traditional crime: Empirical evidence for clusters of offenses and related motives. In M. Weulen Kranenbarg & E. R. Leukfeldt (Eds.), Cybercrime in context: The human factor in victimization, offending, and policing (pp. 195–216). Cham: Springer International Publishing.

    Google Scholar 

  • Weulen Kranenbarg, M., Holt, T. J., & Van Gelder, J. L. (2019). Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap. Deviant Behavior,40(1), 40–55.

    Article  Google Scholar 

  • Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J. L. (2021). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. European Journal of Criminology, 18(3), 386–406.

    Google Scholar 

  • Weulen Kranenbarg, M., Ruiter, S., Van Gelder, J.-L., & Bernasco, W. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. Journal of Developmental and Life-Course Criminology,4(3), 343–364.

    Article  Google Scholar 

  • Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marleen Weulen Kranenbarg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Weulen Kranenbarg, M. (2021). The Challenges of Empirically Comparing Cybercriminals and Traditional Offenders. In: Lavorgna, A., Holt, T.J. (eds) Researching Cybercrimes. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-74837-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-74837-1_6

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-74836-4

  • Online ISBN: 978-3-030-74837-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics