Abstract
In recent years, many human activities have made cyberspace their preferred environment. This study focuses on the betting environment, specifically on fixed-match informing websites (FMIWs). These sites claim to be capable of selling tips about fixed sports events. They essentially act as vendors of confidential sources, allowing punters to place 100% sure bets. We hypothesize that cyber places for match-fixing tips facilitate deviant behaviors. Through systematic observation, we describe and quantify a set of 15 environmental features they share, which do not always belong to regulated online betting platforms. Findings from 78 FMIWs corroborate our hypothesis, as they support the relevance of Environmental Criminology theories applied to cybercrime. Additional exploration through hyperlink network analysis shows that FMIWs are highly homogeneous and have similar characteristics to the Tor network but differ from other illicit online environments such as sexual child exploitation networks or white supremacist communities. The characteristics of the network suggest that the business is more similar to a fraud scheme than an illicit market. Finally, the practical implications of the results for crime prevention and the directions for future research are outlined.
Similar content being viewed by others
Notes
ESSA reported 100 incidents in 2015, 130 in 2016, 266 in 2017, and 267 in 2018.
(1) match-fixing, (2) fixed betting tips, (3) fixed matches, (4) fixed-odd sports.
References
Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40. https://doi.org/10.1080/01639625.2013.822209.
Morselli, C., & Décary-Hétu, D. (2013). Crime facilitation purposes of social networking sites: A review and analysis of the ‘cyberbanging’ phenomenon. Small Wars & Insurgencies, 24(1), 152–170. https://doi.org/10.1080/09592318.2013.740232.
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017a). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. British Journal of Criminology, 57(3), 704–722. https://doi.org/10.1093/bjc/azw009.
Cross, C., & Blackshaw, D. (2015). Improving the police response to online fraud. Policing, 9(2), 119–128. https://doi.org/10.1093/police/pau044.
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017b). A typology of cybercriminal networks: From low-tech all-rounders to high-tech specialists. Crime, Law and Social Change, 67(1), 21–37. https://doi.org/10.1007/s10611-016-9662-2.
Huggins, M. (2018). Match-fixing: A historical perspective. The International Journal of the History of Sport, 35(2–3), 123–140. https://doi.org/10.1080/09523367.2018.1476341.
Forrest, D. (2012). The threat to football from betting-related corruption. International Journal of Sport Finance, 7(2), 99–116.
Moriconi, M., & Almeida, J. P. (2019). Portuguese fight against match-fixing: Which policies and what ethic? Journal of Global Sport Management, 4(1), 79–96. https://doi.org/10.1080/24704067.2018.1493357.
Tak, M. (2018). Too big to jail: Match-fixing, institutional failure and the shifting of responsibility. International Review for the Sociology of Sport, 53(7), 788–806. https://doi.org/10.1177/1012690216682950.
ESSA (2015). ESSA Q4 2015 integrity report (pp. 1–6). Retrieved from http://www.eu-ssa.org/wp-content/uploads/QR4-BROCHURE-WEB.pdf.
ESSA (2016). ESSA 2016 annual integrity report (pp. 1–6). Retrieved from http://www.eu-ssa.org/wp-content/uploads/QR1-BROCHURE-2017-SINGLE.pdf.
ESSA (2017). ESSA 2017 annual integrity report (pp. 1–6). Retrieved from http://www.eu-ssa.org/wp-content/uploads/ESSA-2017-annual-integrity-report.pdf.
ESSA (2018). ESSA 2018 annual integrity report (pp. 1–6). Retrieved from http://www.eu-ssa.org/wp-content/uploads/ESSA-2018-Annual-Integrity-Report.pdf.
CK Consulting & Stichting VU-VUmc (2017). The monitoring systems of sports betting and warning mechanisms between public and private actors (pp. 1–245). Retrieved from http://ethisport.com/wp-content/uploads/sites/28/2017/06/Betmonitalert_Design-NB-DEF-2-06-2017.pdf.
Weisburd, D., Eck, J. E., Braga, A. A., Telep, C. W., Cave, B., Bowers, K., … Yang, S.-M. (2016). Place matters: Criminology for the twenty-first century. https://doi.org/10.1017/CBO9781139342087
Clarke, R. V. (2018). Book review. Journal of Criminal Justice Education, 29(1), 157–159. https://doi.org/10.1080/10511253.2016.1258031.
Miró-Llinares, F., & Johnson, S. D. (2018). Cybercrime and place: Applying environmental criminology to crimes in cyberspace. In G. J. N. Bruinsma & S. D. Johnson (Eds.), The Oxford handbook of environmental criminology (pp. 883–906). Oxford: Oxford University Press. https://doi.org/10.1093/oxfordhb/9780190279707.013.39.
Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410. https://doi.org/10.1080/01639620903004903.
Näsi, M., Räsänen, P., Kaakinen, M., Keipi, T., & Oksanen, A. (2017). Do routine activities help predict young adults’ online harassment: A multi-nation study. Criminology & Criminal Justice, 17(4), 418–432. https://doi.org/10.1177/1748895816679866.
Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238. https://doi.org/10.1177/0022427811425539.
van Wilsem, J. (2013). ‘Bought it, but never got it’ assessing risk factors for online consumer fraud victimization. European Sociological Review, 29(2), 168–178. https://doi.org/10.1093/esr/jcr053.
Brantingham, P., & Brantingham, P. (1995). Criminality of place: Crime generators and crime attractors. European Journal on Criminal Policy and Research, 3(3), 5–26. https://doi.org/10.1007/BF02242925.
Wortley, R. (1997). Reconsidering the role of opportunity in situational crime prevention. In G. R. Newman, R. V. Clarke, & S. G. Shoham (Eds.), Rational choice and situational crime prevention (pp. 65–81). Aldershot: Ashgate Publishing.
Wortley, R. (2001). A classification of techniques for controlling situational precipitators of crime. Security Journal, 14(4), 63–82. https://doi.org/10.1057/palgrave.sj.8340098.
Clarke, R. V. (Ed.). (1997). Situational crime prevention: Successful case studies (2nd ed). Guilderland: Harrow and Heston.
Newman, G. R., & Clarke, R. V. (2012). Superhighway robbery preventing e-commerce crime. Milton Park: Routledge Chapman & Hall.
Hutchings, A., & Holt, T. J. (2017). The online stolen data market: Disruption and intervention approaches. Global Crime, 18(1), 11–30. https://doi.org/10.1080/17440572.2016.1197123.
Hinduja, S., & Kooi, B. (2013). Curtailing cyber and information security vulnerabilities through situational crime prevention. Security Journal, 26(4), 383–402. https://doi.org/10.1057/sj.2013.25.
Hutchings, A., & Clayton, R. (2016). Exploring the provision of online Booter services. Deviant Behavior, 37(10), 1163–1178. https://doi.org/10.1080/01639625.2016.1169829.
Haberfeld, M. R., & Sheehan, D. (Eds.). (2013). Match-fixing in international sports. https://doi.org/10.1007/978-3-319-02582-7
Pineau, T., Schopfer, A., Grossrieder, L., Broséus, J., Esseiva, P., & Rossy, Q. (2016). The study of doping market: How to produce intelligence from internet forums. Forensic Science International, 268, 103–115. https://doi.org/10.1016/j.forsciint.2016.09.017.
Mastrofski, S. D., Parks, R. B., & McCluskey, J. D. (2010). Systematic social observation in criminology. In A. R. Piquero & D. Weisburd (Eds.), Handbook of quantitative criminology (pp. 225–247). https://doi.org/10.1007/978-0-387-77650-7_12.
Reiss, A. J. (1971). Systematic observation of natural social phenomena. Sociological Methodology, 3, 3. https://doi.org/10.2307/270816.
Raudenbush, S. W., & Sampson, R. J. (1999). Ecometrics: Toward a science of assessing ecological settings, with application to the systematic social observation of neighborhoods. Sociological Methodology, 29(1), 1–41. https://doi.org/10.1111/0081-1750.00059.
Sampson, R. J., & Raudenbush, S. W. (1999). Systematic social observation of public spaces: A new look at disorder in urban neighborhoods. American Journal of Sociology, 105(3), 603–651. https://doi.org/10.1086/210356.
Mastrofski, S. D., Parks, R. B., Reiss, A. J., Worden, R. E., De Jong, C., Snipes, J. B., & Terrill, W. (1998). Systematic social observation of public police: Applying field research methods to policy issues. [Research Report]. Retrieved from National Institute of Justice website: https://www.ncjrs.gov/pdffiles/172859.pdf.
Park, H. W. (2003). Hyperlink network analysis: A new method for the study of social structure on the web. Connections, 25(1), 49–61.
Park, H. W., & Thelwall, M. (2006). Hyperlink analyses of the world wide web: A review. Journal of Computer-Mediated Communication, 8(4). https://doi.org/10.1111/j.1083-6101.2003.tb00223.x.
Thelwall, M. (2004). Link analysis: An information science approach. Amsterdam: Elsevier Academic Press.
Westlake, B. G., & Bouchard, M. (2016). Liking and hyperlinking: Community detection in online child sexual exploitation networks. Social Science Research, 59, 23–36. https://doi.org/10.1016/j.ssresearch.2016.04.010.
Burris, V., Smith, E., & Strahm, A. (2000). White supremacist networks on the internet. Sociological Focus, 33(2), 215–235. https://doi.org/10.1080/00380237.2000.10571166.
Khalil, S., & Fakir, M. (2017). RCrawler: An R package for parallel web crawling and scraping. SoftwareX, 6, 98–106. https://doi.org/10.1016/j.softx.2017.04.004.
Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications. In Cambridge. New York: Cambridge University Press.
Csárdi, G., & Nepusz, T. (2006). The igraph software package for complex network research. InterJournal, Complex Systems, 1695(5), 1–9.
Wickham, H. (2016). ggplot2: Elegant graphics for data analysis (2nd ed.). Cham: Springer.
Ackland, R., & Shorish, J. (2009). Network formation in the political blogosphere: An application of agent based simulation and e-research tools. Computational Economics, 34(4), 383–398. https://doi.org/10.1007/s10614-009-9173-7.
Malm, A., Bichler, G., & Van De Walle, S. (2010). Comparing the ties that bind criminal networks: Is blood thicker than water? Security Journal, 23(1), 52–74. https://doi.org/10.1057/sj.2009.18.
Monk, B., Mitchell, J., Frank, R., & Davies, G. (2018). Uncovering Tor: An examination of the network structure. Security and Communication Networks, 2018, 1–12. https://doi.org/10.1155/2018/4231326.
Davey, C. L., Wootton, A. B., & Wootton, A. B. (2017). Design against crime: A human-centred approach to designing for safety and security. https://doi.org/10.4324/9781315576565.
Malm, A., & Bichler, G. (2011). Networks of collaborating criminals: Assessing the structural vulnerability of drug markets. Journal of Research in Crime and Delinquency, 48(2), 271–297. https://doi.org/10.1177/0022427810391535.
McGloin, J. M. (2005). Policy and intervention considerations of a network analysis of street gangs. Criminology & Public Policy, 4(3), 607–635. https://doi.org/10.1111/j.1745-9133.2005.00306.x.
Funding
This work was funded by the Spanish Ministry of Science, Innovation and Universities under Grant FPU16/01671.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
Rights and permissions
About this article
Cite this article
Moneva, A., Caneppele, S. 100% sure bets? Exploring the precipitation-control strategies of fixed-match informing websites and the environmental features of their networks. Crime Law Soc Change 74, 115–133 (2020). https://doi.org/10.1007/s10611-019-09871-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10611-019-09871-4