Abstract
In the theoretical literature, many differences between cybercriminals and traditional criminals are discussed. On the one hand, the empirical literature tends to focus only on cybercrime and usually does not empirically compare cybercriminals with traditional criminals. However, such a comparison enables an empirical evaluation on the extent to which traditional criminological theories and concepts are equally important in explaining cybercrime. Comparing such different types of crime committed in completely different contexts is, however, also very challenging. One needs to find comparable samples of criminals and find research methods suitable for both groups. Based on the experiences resulting from empirical comparisons of cybercriminals and traditional criminals, this chapter will discuss several of these challenges. In addition to methodological choices, it will also discuss differences between cybercriminals and traditional criminals in, for example, response rates or privacy awareness, as this may be useful in both comparative research as well as research specifically focused on cybercrime.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akers, R. L. (1998). Social learning and social structure: A general theory of crime and deviance. Northeastern University Press.
Berenblum, T., Weulen Kranenbarg, M., & Maimon, D. (2019). Out of control online? A combined examination of peer-offending and perceived formal and informal social control in relation to system-trespassing. Journal of Crime and Justice,42(5), 616–631.
Dupont, B., Côté, A. M., Savine, C., & Décary-Hétu, D. (2016). The ecology of trust among hackers. Global Crime,17(2), 129–151.
Goldsmith, A., & Brewer, R. (2015). Digital drift and the criminal interaction order. Theoretical Criminology,19(1), 112–130.
Goldsmith, A., & Wall, D. S. (2019). The seductions of cybercrime: Adolescence and the thrills of digital transgression. European Journal of Criminology (online first).
Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies,10(2), 243–249.
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior,28(2), 171–198.
Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice,37(3), 378–395.
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2010). Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice,33(2), 31–61.
Holt, T. J., Cale, J., Brewer, R., & Goldsmith, A. (2020). Assessing the role of opportunity and low self-control in Juvenile Hacking. Crime & Delinquency (online first).
Holt, T. J., Smirnova, O., & Hutchings, A. (2016). Examining signals of trust in criminal markets online. Journal of Cybersecurity,2(2), 137–145.
Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance, and desistance. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context. Carolina Academic Press.
Hutchings, A., & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior,37(10), 1163–1178.
Jaishankar, K. (2009). Space transition theory of cyber crimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet. Pearson Education.
Kazemian, L. (2015). Desistance from crime and antisocial behavior. In J. Morizot & L. Kazemian (Eds.), The development of criminal and antisocial behavior. Springer.
Lageson, S., & Uggen, C. (2013). How work affects crime—And crime affects work—Over the life course. In C. L. Gibson & M. D. Krohn (Eds.), Handbook of life-course criminology. Springer.
Leukfeldt, E. R., Kleemans, E. R., & Stol, W.Ph. (2016). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. British Journal of Criminology,57(3), 704–722.
Lusthaus, J. (2018). Industry of anonymity: Inside the business of cybercrime. Harvard University Press.
McCuddy, T. (2020). Peer delinquency among digital natives: The cyber context as a source of peer influence. Journal of Research in Crime and Delinquency (online first).
McGuire, M., & Dowling, S. (2013a). Chapter 1: Cyber-dependent crimes. Home Office.
McGuire, M., & Dowling, S. (2013b). Chapter 2: Cyber-enabled crimes. Home Office.
Morris, R. G., & Blackburn, A. G. (2009). Cracking the code: An empirical exploration of social learning theory and computer crime. Journal of Crime and Justice,32(1), 1–34.
Navarro, R., Yubero, S., & Larrañaga, E. (2015). Psychosocial risk factors for involvement in bullying behaviors: Empirical comparison between cyberbullying and social bullying victims and bullies. School Mental Health,7(4), 235–248.
Rogers, M. K. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study (Doctoral dissertation). University of Manitoba. Available at https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/rogers_01.pdf.
Rokven, J. J., Weijters, G., Beerthuizen, M. G. C. J., & van der Laan, A. M. (2018). Juvenile delinquency in the virtual world: Similarities and differences between cyber-enabled, cyber-dependent and offline delinquents in the Netherlands. International Journal of Cyber Criminology,12(1), 27–46.
Rokven, J. J., Weijters, G., & Van Der Laan, A. M. (2017). Jeugddelinquentie in de virtuele wereld: Een nieuw type daders of nieuwe mogelijkheden voor traditionele daders? WODC.
Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology,55(1), 125–145.
Suler, J. (2004). The online disinhibition effect. Cyber Psychology & Behavior,7(3), 321–326.
Turgeman-Goldschmidt, O. (2008). Meanings that hackers assign to their being a hacker. International Journal of Cyber Criminology,2(2), 382–396.
Turgeman-Goldschmidt, O. (2009). The rhetoric of hackers’ neutralizations. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet. Pearson Education.
Van der Laan, A. M., & Tollenaar, N. (2021). Textmining for cybercrime in registrations of the Dutch police. In M. Weulen Kranenbarg & E. R. Leukfeldt (Eds.), Cybercrime in context: The human factor in victimization, offending, and policing (pp. 327–350). Cham: Springer International Publishing.
Van der Toolen, Y., Weulen Kranenbarg, M., & Weerman, F. M. (2020). Online jeugdcriminaliteit en “verkeerde vrienden”: Wanneer is de samenhang het sterkst? Tijdschrift Voor Criminologie,62(2–3), 153–180.
Van Der Wagen, W. (2018). From cybercrime to cyborgcrime: An exploration of high-tech cybercrime, offenders and victims through the lens of actor-network theory (Doctoral dissertation). Rijksuniversiteit Groningen & Erasmus Universiteit Rotterdam, The Netherlands. Available at https://www.rug.nl/research/portal/en/publications/from-cybercrime-to-cyborg-crime(f3a5c5e0-ff0f-4dad-ac6c-2bc91d96a1b4).html.
Van Der Wagen, W., Althoff, M., & Swaaningen, R. (2016). De andere “anderen.” Tijdschrift over Cultuur & Criminaliteit,6(1), 27–41.
Weulen Kranenbarg, M. (2018). Cyber-offenders versus traditional offenders: An empirical comparison (Doctoral dissertation). Vrije Universiteit (VU) Amsterdam, The Netherlands. Available at http://dare.ubvu.vu.nl/handle/1871/55530.
Weulen Kranenbarg, M. (2021). Cyber-dependent crime versus traditional crime: Empirical evidence for clusters of offenses and related motives. In M. Weulen Kranenbarg & E. R. Leukfeldt (Eds.), Cybercrime in context: The human factor in victimization, offending, and policing (pp. 195–216). Cham: Springer International Publishing.
Weulen Kranenbarg, M., Holt, T. J., & Van Gelder, J. L. (2019). Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap. Deviant Behavior,40(1), 40–55.
Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J. L. (2021). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. European Journal of Criminology, 18(3), 386–406.
Weulen Kranenbarg, M., Ruiter, S., Van Gelder, J.-L., & Bernasco, W. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. Journal of Developmental and Life-Course Criminology,4(3), 343–364.
Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Weulen Kranenbarg, M. (2021). The Challenges of Empirically Comparing Cybercriminals and Traditional Offenders. In: Lavorgna, A., Holt, T.J. (eds) Researching Cybercrimes. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-74837-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-74837-1_6
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-74836-4
Online ISBN: 978-3-030-74837-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)