Skip to main content

Researching Cybercrime in the European Union: Asking the Right Ethics Questions

  • Chapter
  • First Online:
Researching Cybercrimes

Abstract

European Union (EU) research is based on the commitment to embed ethics from the first conceptual stage of the proposal through the implementation of the project. Given this background, and while the concern for ethics in crime research has been widely covered by the European Commission, few contributions have yet shifted their interest on this issue with respect to the growing research on cybercrime. Hence, the purpose of the study is threefold: first, to identify the main European Commission research ethics guidelines and their applicability to cybercrime research; second, to conceptually introduce internet research ethics as a potential ethical framework that can serve as a complement to existing European reference documents; and third, to provide support on identifying some of its main challenges through practical key questions applied to cybercrime research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • All European Academies. (2017). The European code of conduct for research integrity. Available at: https://www.allea.org/wp-content/uploads/2017/05/ALLEA-European-Code-of-Conduct-for-Research-Integrity-2017.pdf.

  • Alexander, L., & Ferzan, K. K. (Eds.). (2019). The Palgrave handbook of applied ethics and the criminal law. Palgrave Macmillan.

    Google Scholar 

  • Arrigo, B. A. (Ed.). (2014). Encyclopedia of criminal justice ethics. Sage.

    Google Scholar 

  • Banks, C. (2018). Criminal justice ethics: Theory and practice. Sage.

    Google Scholar 

  • Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school bullying. The Journal of Student Wellbeing,1(2), 16–33.

    Article  Google Scholar 

  • Bossler, A. M. (2016). Cybercrime research at the crossroads: Where the field currently stands and innovative strategies to move forward. In T. J. Holt (Ed.), Cybercrime through an interdisciplinary lens. Routledge.

    Google Scholar 

  • Braswell, M. C., McCarthy, B. R., & McCarthy, B. J. (2017). Justice, crime, and ethics. Taylor & Francis.

    Book  Google Scholar 

  • Bromseth, J. C. (2002). Public places–public activities: Methodological approaches and ethical dilemmas in research on computer-mediated communication contexts. SKIKT’Researchers–Researching IT in context, 33–61.

    Google Scholar 

  • Buchanan, E., & Ess, C. (2008). Internet research ethics: The field and its critical issues. In H. Tavani & K. E. Himma (Eds.), The handbook of information and computer ethics. Wiley.

    Google Scholar 

  • Buchanan, E., & Ess, C. (2016). Ethics in digital research. In M. Nolden., G. Rebane, & M. Schreiter (Eds.), The handbook of social practices and digital everyday worlds. Springer.

    Google Scholar 

  • Buchanan, E. (2010). Internet research ethics: Past, present, future. In C. Ess & M. Consalvo (Eds.), The Blackwell handbook of internet studies. Oxford University Press.

    Google Scholar 

  • Buchanan, E., & Zimmer, M. (2016). Internet research ethics. Retrieved from http://plato.stanford.edu/entries/ethics-internet-research/.

  • Burnap, P., & Williams, M. L. (2016). Us and them: Identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science,5(1), 11.

    Article  Google Scholar 

  • Caruana, M. M. (2019). The reform of the EU data protection framework in the context of the police and criminal justice sector: Harmonisation, scope, oversight and enforcement. International Review of Law, Computers & Technology,33(3), 249–270.

    Article  Google Scholar 

  • Castro Toledo, F. J. (2019). Miedo al crimen y sociedad tecnológica. B de F editorial.

    Google Scholar 

  • Castro-Toledo, F. J., Gretenkort, T., Esteve, M., & Miró-Llinares, F. (2020). “Fear in 280 characters”: A new approach for evaluation of fear over time in cyberspace 1. In V. Cecatto & M. Nalla (Eds.), Crime and fear in public places. Routledge.

    Google Scholar 

  • Castro-Toledo, F. J. (2021). Exploring some old and new ethical issues in criminological research and its implications for evidence-based policy. Spanish Journal of Legislative Studies, 2.

    Google Scholar 

  • Chua, Y. T., & Holt, T. J. (2016). A cross-national examination of the techniques of neutralization to account for hacking behaviors. Victims & Offenders,11(4), 534–555.

    Article  Google Scholar 

  • Clarke, R. (2009). Privacy impact assessment: Its origins and development. Computer Law & Security Review,25(2), 123–135.

    Article  Google Scholar 

  • Cohen, M. (2003). 101 dilemas éticos. Alianza.

    Google Scholar 

  • Cowburn, M., Gelsthorpe, L., & Wahidin, A. (2017). Research ethics in criminology: Dilemmas, issues and solutions. Routledge.

    Google Scholar 

  • D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research,20(1), 79–98.

    Article  Google Scholar 

  • Díaz Fernández, A. (2019). La investigación de temas sensibles en criminología y seguridad. Tecnos.

    Google Scholar 

  • Dingwall, R. (2012). How did we ever get into this mess? The rise of ethical regulation in the social sciences. In Ethics in social research. Emerald Group Publishing Limited.

    Google Scholar 

  • Djanali, S., Arunanto, F. X., Pratomo, B. A., Baihaqi, A., Studiawan, H., & Shiddiqi, A. M. (2014, November). Aggressive web application honeypot for exposing attacker’s identity. In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering (pp. 212–216). IEEE.

    Google Scholar 

  • Elgesem, D. (2002). What is special about the ethical issues in online research? Ethics and Information Technology,4(3), 195–203.

    Article  Google Scholar 

  • European Commission. (2013a). Research, risk-benefit analyses and ethical issues: A guidance document for researchers complying with requests from the European Commission Ethics Reviews. Available at: https://ec.europa.eu/research/swafs/pdf/pub_research_ethics/KI3213113ENC.pdf.

  • European Commission. (2013b). Ethics for researcher: Facilitating research excellence for FP7. Available at: https://ec.europa.eu/research/participants/data/ref/fp7/89888/ethics-for-researchers_en.pdf.

  • European Commission. (2018a). Ethics in social science and humanities.https://ec.europa.eu/info/sites/info/files/6._h2020_ethics-soc-science-humanities_en.pdf.

  • European Commission. (2018b). Ethics and data protection. Available at: https://ec.europa.eu/info/sites/info/files/5._h2020_ethics_and_data_protection_0.pdf.

  • Frankel, M. S., & Siang, S. (1999). Ethical and legal aspects of human subjects research on the Internet. Association for the Advancement of Science. Available at: https://www.aaas.org/sites/default/files/2020-02/report_internet_research.pdf.

  • Garrett, B. (2013). Explore everything: Place-hacking the city. Verso.

    Google Scholar 

  • Hagan, F. E. (1997). Research methods in criminal justice and criminology. Allyn and Bacon.

    Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior,35(1), 20–40.

    Article  Google Scholar 

  • Israel, M. (2015). Research ethics and integrity for social scientist: Beyond regulatory compliance. Sage.

    Book  Google Scholar 

  • Jasserand, C. (2018). Law enforcement access to personal data originally collected by private parties: Missing data subjects’ safeguards in directive 2016/680? Computer Law & Security Review,34(1), 154–165.

    Article  Google Scholar 

  • Kleinig, J. (2008). Ethics and criminal justice: An introduction. Cambridge University Press.

    Book  Google Scholar 

  • Lavorgna, A., & Sugiura, L. (2020). Direct contacts with potential interviewees when carrying out online ethnography on controversial and polarized topics: A loophole in ethics guidelines. International Journal of Social Research Methodology (online first).

    Google Scholar 

  • Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology.

    Google Scholar 

  • Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior,35(7), 581–591.

    Article  Google Scholar 

  • McKee, H. A., & Porter, J. (2009). The ethics of internet research: A rhetorical, case-based process. Peter Lang Publishing.

    Google Scholar 

  • Mertens, D., & Ginsberg, P. (2009). The handbook of social research ethics. Sage.

    Book  Google Scholar 

  • Miller, S., & Gordon, I. A. (2014). Investigative ethics: Ethics for police detectives and criminal investigators. Wiley.

    Google Scholar 

  • Miró Llinares, F. (2012). El cibercrimen. Fenomenología y criminología de la delincuencia en el ciberespacio. Marcial Pons.

    Google Scholar 

  • Miró-Llinares, F., & Johnson, S. D. (2018). Cybercrime and place: Applying environmental criminology to crimes in cyberspace. The Oxford handbook of environmental criminology (pp. 883–906).

    Google Scholar 

  • Miró-Llinares, F., Drew, J., & Townsley, M. (2020). Understanding target suitability in cyberspace: An international comparison of cyber victimization processes. International Journal of Cyber Criminology,14(1), 139–155.

    Google Scholar 

  • Miró-Llinares, F., Moneva, A., & Esteve, M. (2018). Hate is in the air! But where? Introducing an algorithm to detect hate speech in digital microenvironments. Crime Science,7(1), 15.

    Article  Google Scholar 

  • Moneva, A., & Caneppele, S. (2019). 100% sure bets? Exploring the precipitation-control strategies of fixed-match informing websites and the environmental features of their networks. Crime, Law and Social Change, 1–19.

    Google Scholar 

  • Moor, J. H. (2017). What is computer ethics? In Computer Ethics, Routledge. (pp. 31–40).

    Google Scholar 

  • Nolan, K. (2018). GDPR: Harmonization or fragmentation? Applicable law problems in EU data protection law. Berkeley Technology Law Journal Blog,20.

    Google Scholar 

  • O’Connor, F., Malthaner, S., & Lindekilde, L. (2018). Killing in Pairs: Radicalisation patterns of violent dyads. International Journal of Conflict and Violence (IJCV),12, a640–a640.

    Google Scholar 

  • Pollock, J. M. (2014). Ethical dilemmas and decisions in criminal justice. Nelson Education.

    Google Scholar 

  • Roberson, C., & Mire, S. (2019). Ethics for criminal justice professionals. CRC Press.

    Google Scholar 

  • Rosenberg, A. (2010). Virtual world research ethics and the private/public distinction. International Journal of Internet Research Ethics,3(1), 23–37.

    Google Scholar 

  • Stockman, M., Heile, R., & Rein, A. (2015, September). An open-source honeynet system to study system banner message effects on hackers. In Proceedings of the 4th Annual ACM Conference on Research in Information Technology (pp. 19–22).

    Google Scholar 

  • Turner, R., & Angius, N. (2017). The philosophy of computer science. Stanford Encyclopedia of Philosophy.

    Google Scholar 

  • Van Hee, C., Jacobs, G., Emmery, C., Desmet, B., Lefever, E., Verhoeven, B., De Pauw, G., Daelemans, W., & Hoste, V. (2018). Automatic detection of cyberbullying in social media text. PLoS ONE,13(10), e0203794.

    Article  Google Scholar 

  • Vemou, K., & Karyda, M. (2019). Evaluating privacy impact assessment methods: Guidelines and best practice. Information & Computer Security.

    Google Scholar 

  • Walther, J. B. (2002). Research ethics in Internet-enabled research: Human subjects issues and methodological myopia. Ethics and Information Technology,4(3), 205–216.

    Article  Google Scholar 

  • Warren, I., Mann, M., & Molnar, A. (2020). Lawful illegality: Authorizing extraterritorial police surveillance. Surveillance & Society,18(3), 357–369.

    Article  Google Scholar 

  • Wiener, N. (2019). Cybernetics or control and communication in the animal and the machine. MIT Press.

    Book  Google Scholar 

  • Winlow, S., & Hall, S. (2012). What is an “ethics committee”? Academic governance in an epoch of belief and incredulity. British Journal of Criminology,52, 400–416.

    Article  Google Scholar 

  • Yao, M., Chelmis, C., & Zois, D. S. (2019). Cyberbullying ends here: Towards robust detection of cyberbullying in social media. In The World Wide Web Conference (pp. 3427–3433).

    Google Scholar 

  • Zeid, R. B., Moubarak, J., & Bassil, C. (2020, June). Investigating the darknet. In 2020 International Wireless Communications and Mobile Computing (IWCMC) (pp. 727–732). IEEE.

    Google Scholar 

  • Zimmer, M. (2010). “But the data is already public”: On the ethics of research in Facebook. Ethics and Information Technology,12(4), 313–325.

    Article  Google Scholar 

Download references

Acknowledgments

This chapter has been elaborated within the framework of the project “Criminología, evidencias empíricas y Política criminal. Sobre la incorporación de datos científicos para la toma de decisiones en relación con la criminalización de conductas – Referencia: DER2017-86204-R,” funded by the Spanish State Agency for Research (AEI)/Ministry of Science, Innovation and Universities and the European Union through the European Regional Development Fund “ERDF- A way to make Europe.”

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francisco J. Castro-Toledo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Castro-Toledo, F.J., Miró-Llinares, F. (2021). Researching Cybercrime in the European Union: Asking the Right Ethics Questions. In: Lavorgna, A., Holt, T.J. (eds) Researching Cybercrimes. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-74837-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-74837-1_16

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-74836-4

  • Online ISBN: 978-3-030-74837-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics