Skip to main content

Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime

  • Reference work entry
  • First Online:
The Palgrave Handbook of International Cybercrime and Cyberdeviance

Abstract

This chapter aims to examine cybercrime viz-à-viz technological developments by identifying key research studies in the field and crime resulting from technological changes. The industrial revolution technological process and innovations are discussed to illustrate their significant role in shaping and creating cybercrime research. In the age of the fourth industrial revolution, existing cybercrimes will coexist with newer types and versions of cybercrimes while combining traditional crimes in hybrid forms. This chapter concludes with future challenges for cybercrime research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 649.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • American Society of Criminology (ASC). (2019). ASC homepage. https://www.asc41.com/.

  • Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., Moore, T., & Savage, S. (2013). Measuring the cost of cybercrime. In B. Schneier (Ed.), The economics of information security and privacy (pp. 265–300). Berlin/Heidelberg: Springer.

    Chapter  Google Scholar 

  • Arief, B., & Adzmi, M. A. B. (2015). Understanding cybercrime from its stakeholders’ perspectives: Part 2-defenders and victims. IEEE Security and Privacy, 13(2), 84–88.

    Article  Google Scholar 

  • Arief, B., Adzmi, M. A. B., & Gross, T. (2015). Understanding cybercrime from its stakeholders’ perspectives: Part 1-attackers. IEEE Security and Privacy, 13(1), 71–76.

    Article  Google Scholar 

  • Bossler, A. M. (2017). Need for debate on the implications of honeypot data for restrictive deterrence policies in cyberspace. Criminology and Public Policy, 16(3), 681–688.

    Google Scholar 

  • Brenner, S. W. (2008). Fantasy crime: The role of criminal law in virtual worlds. Vanderbilt Journal of Entertainment and Technology Law, 11, 1–91.

    Google Scholar 

  • Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara: ABC-CLIO.

    Google Scholar 

  • Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. Boston: UPNE.

    Google Scholar 

  • Brevini, B. (2017). WikiLeaks: Between disclosure and whistle-blowing in digital times. Sociology Compass, 11(3), 124–157.

    Article  Google Scholar 

  • Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the Internet (3rd ed.). Waltham: Academic Press.

    Google Scholar 

  • Chaka, J. G., & Marimuthu, M. (2018). Curtailing the threats to cloud computing in the fourth industrial revolution. In Z. Fields (Ed.), Handbook of research on information and cyber security in the fourth industrial revolution (pp. 112–141). Hershey: IGI Global.

    Chapter  Google Scholar 

  • Cheng, Y., Naslund, M., Selander, G., & Fogelstrom, E. (2012). Privacy in machine-to-machine communications a state-of-the-art survey. In 2012 IEEE International Conference on Communication Systems (ICCS). IEEE, pp. 75–79.

    Google Scholar 

  • Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308–333.

    Google Scholar 

  • Choi, K. S. (2015). Cybercriminology and digital investigation. El Paso: LFB Scholarly Publishing.

    Google Scholar 

  • Choi, K. S., & Lee, C. S. (2018). The present and future of cybercrime, cyberterrorism, and cybersecurity. International Journal of Cybersecurity Intelligence and Cybercrime, 1(1), 1–4.

    Google Scholar 

  • Chory, R. M., Vela, L. E., & Avtgis, T. A. (2016). Organizational surveillance of computer-mediated workplace communication: Employee privacy concerns and responses. Employee Responsibilities and Rights Journal, 28(1), 23–43.

    Article  Google Scholar 

  • Cowen, C., Louderback, E. R., & Roy, S. S. (2018). The role of land use and walkability in predicting crime patterns: A spatiotemporal analysis of Miami-Dade County neighborhoods, 2007–2015. Security Journal, 1–23. https://doi.org/10.1057/s41284-018-00161-7

  • Curran, J. (2016). The Internet of history: Rethinking the internet’s past. In Misunderstanding the Internet (pp. 48–84). Abingdon/New York: Routledge.

    Chapter  Google Scholar 

  • D’arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658.

    Google Scholar 

  • Dhillon, G., & Moores, S. (2001). Computer crimes: Theorizing about the enemy within. Computers and Security, 20(8), 715–723.

    Article  Google Scholar 

  • Doerfel, M. L. (1998). What constitutes semantic network analysis? A comparison of research and methodologies. Connect, 21(2), 16–26.

    Google Scholar 

  • Dupont, B. (2017). Bots, cops, and corporations: On the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime. Crime, Law and Social Change, 67(1), 97–116.

    Article  Google Scholar 

  • Federal Bureau of Investigation (FBI). (2017). 2016 IC3 annual report. Washington, DC: Bureau of Justice Statistics. http://www.ic3.gov/media/annualreport/2016_IC3Report.pdf.

    Google Scholar 

  • Furnell, S., Emm, D., & Papadaki, M. (2015). The challenge of measuring cyber-dependent crimes. Computer Fraud and Security, 10, 5–12.

    Article  Google Scholar 

  • Gabbal, A. (2015). Kevin Ashton describes “the Internet Things”. Smithsonian Magazine (January). Available at: http://www.smithsonianmag.com/innovation/kevin-ashton-describes-the-internetof-things-180953749/.

  • Greenstein, S. (2015). How the Internet became commercial: Innovation, privatization, and the birth of a new network. Princeton: Princeton University Press.

    Book  Google Scholar 

  • Grégoire, Y., Salle, A., & Tripp, T. M. (2015). Managing social media crises with your customers: The good, the bad, and the ugly. Business Horizons, 58(2), 173–182.

    Article  Google Scholar 

  • Holt, T. J. (2013a). Exploring the social organisation and structure of stolen data markets. Global Crime, 14(2–3), 155–174.

    Article  Google Scholar 

  • Holt, T. J. (2013b). Examining the forces shaping cybercrime markets online. Social Science Computer Review, 31(2), 165–177.

    Article  Google Scholar 

  • Holt, T. J. (Ed.). (2016). Cybercrime through an interdisciplinary lens. Taylor & Francis.

    Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.

    Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2015). Cybercrime in Progress: Theory and prevention of technology-enabled offenses. New York: Routledge.

    Book  Google Scholar 

  • Holt, T. J., & Turner, M. G. (2012). Examining risks and protective factors of on-line identity theft. Deviant Behavior, 33(4), 308–323.

    Article  Google Scholar 

  • Holt, T. J., Smirnova, O., & Chua, Y. T. (2016a). Exploring and estimating the revenues and profits of participants in stolen data markets. Deviant Behavior, 37(4), 353–367.

    Article  Google Scholar 

  • Holt, T. J., Smirnova, O., & Hutchings, A. (2016b). Examining signals of trust in criminal markets online. Journal of Cybersecurity, 2(2), 137–145.

    Google Scholar 

  • Howard, P. N. (2015). Sketching out the Internet of things Trendline. Washington, DC: The Brookings Institution. https://www.brookings.edu/blog/techtank/2015/06/09/sketching-out-the-internet-of-things-trendline/. Accessed May 14, 2019.

    Google Scholar 

  • Hutchings, A., & Holt, T. J. (2017). The online stolen data market: Disruption and intervention approaches. Global Crime, 18(1), 11–30.

    Article  Google Scholar 

  • IDN. (2018). United nations definition of cybercrime. https://idn-wi.com/united-nations-definition-cybercrime/. Accessed January 5, 2019.

  • Internet World Stats. (2019). Internet world penetration rates by geographic regions – March, 2019. https://www.internetworldstats.com/stats.htm. Accessed May 10, 2019.

  • Jaishankar, K. (2008). Space transition theory of cyber crimes. Crimes of the Internet, 283–301.

    Google Scholar 

  • Jan Smit, S. K. (2016). Industry 4.0. Directorate general for internal policies. European Parliament.

    Google Scholar 

  • Karlov, A. A. (2017). Cybersecurity of Internet of things: Risks and opportunities. In Proceedings of the XXVI International Symposium on Nuclear Electronics and Computing (NEC’2017) Becici, Budva, Montenegro, September 25–29, 2017.

    Google Scholar 

  • Kraemer-Mbula, E., Tang, P., & Rush, H. (2013). The cybercrime ecosystem: Online innovation in the shadows? Technological Forecasting and Social Change, 80, 541–555.

    Article  Google Scholar 

  • Lagazio, M., Sherif, N., & Cushman, M. (2014). A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers and Security, 45, 58–74.

    Article  Google Scholar 

  • Lee, C. S. (2019). Datafication, dataveillance, and the social credit system as China’s new normal. Online Information Review. https://doi.org/10.1108/OIR-08-2018-0231.

  • Luo, X., & Liao, Q. (2009). Ransomware: A new cyber hijacking threat to enterprises. In Handbook of research on information security and assurance (pp. 1–6). IGI global.

    Google Scholar 

  • Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, 2(1), 191–216.

    Article  Google Scholar 

  • Maimon, D., Kamerdze, A., Cukier, M., & Sobesto, B. (2013). Daily trends and origin of computer-focused crimes against a large university computer network. British Journal of Criminology, 53, 319–343.

    Article  Google Scholar 

  • Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology, 52, 33–59.

    Article  Google Scholar 

  • Mansfield-Devine, S. (2016). Ransomware: Taking businesses hostage. Network Security, 10, 8–17.

    Article  Google Scholar 

  • Martellini, M., Abaimov, S., Gaychen, S., & Wilson, C. (2017). Assessing cyberattacks against wireless networks of the next global Internet of things revolution: Industry 4.0. In Information security of highly critical wireless networks (SpringerBriefs in computer science) (pp. 63–69). Cham: Springer.

    Chapter  Google Scholar 

  • McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. Summary of key findings and implications. Home Office Research report, 75.

    Google Scholar 

  • Mitch, D. (2018). The role of education and skill in the British industrial revolution. In The British Industrial Revolution (pp. 241–279). Routledge.

    Google Scholar 

  • Mohamed, A., & Køien, G. M. (2015). Cyber security and the Internet of things: Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, 4, 65–88.

    Article  Google Scholar 

  • Moore, R. (2010). Cybercrime: Investigating high-technology computer crime. New York: Routledge.

    Google Scholar 

  • National White Collar Crime Center (2003). Check and Credit Card Fraud, WCC Issue Papers. Morgantown, WV: National White Collar Crime Center Administration and Research Office.

    Google Scholar 

  • O’Rourke, A., Pyman, A., Teicher, J., & van Gramberg, B. (2018). Old wine in new bottles? Regulating employee social media use through termination of employment law: A comparative analysis. Common Law World Review, 47(4), 248–271.

    Article  Google Scholar 

  • Obeidat, Z. M. I., Xiao, S. H., Iyer, G. R., & Nicholson, M. (2017). Consumer revenge using the Internet and social media: An examination of the role of service failure types and cognitive appraisal processes. Psychology and Marketing, 34(4), 496–515.

    Article  Google Scholar 

  • Peters, M. A. (2017). Technological unemployment: Educating for the fourth industrial revolution. Educational Philosophy and Theory, 49(1), 1–6.

    Article  Google Scholar 

  • Schnur, Z., & Wilson, R. (2018). Cold war echoes: The Russian effort to interfere in the 2016 election. In International Conference on Cyber Warfare and Security (pp. 675–680). Academic Conferences International Limited.

    Google Scholar 

  • Schwab, K. (2016). The fourth industrial revolution. New York: Crown Business.

    Google Scholar 

  • Schwab, K. (2017). The fourth industrial revolution. Currency.

    Google Scholar 

  • Sorell, T. (2015). Human rights and hacktivism: The cases of Wikileaks and anonymous. Journal of Human Rights Practice, 7(3), 391–410.

    Article  Google Scholar 

  • Stearns, P. N. (2018). The industrial revolution in world history. New York: Routledge.

    Book  Google Scholar 

  • Taylor, C. A. (Ed.). (2017). The ethics of WikiLeaks. New York: Greenhaven Publishing LLC.

    Google Scholar 

  • Wall, D. S. (2007a). Cybercrime: The transformation of crime in the information age. Malden: Polity Press.

    Google Scholar 

  • Wall, D. S. (2007b). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183–205.

    Article  Google Scholar 

  • Wei, J. (2005). Internet penetration analysis: The impact on global e-commerce. Journal of Global Competitiveness, 13(1–2), 9–24.

    Google Scholar 

  • West, J. P., & Bowman, J. S. (2016). Electronic surveillance at work: An ethical analysis. Administration and Society, 48(5), 628–651.

    Article  Google Scholar 

  • Westrick, S. J. (2016). Nursing students’ use of electronic and social media: Law, ethics, and e-professionalism. Nursing Education Perspectives, 37(1), 16–22.

    Google Scholar 

  • World Bank. (n.d.). Individuals using the Internet (% of population). https://data.worldbank.org/indicator/it.net.user.zs?end=2017&start=1986&view=chart. Retrieved from October 20, 2018.

  • Yar, M. (2005a). The novelty of ‘cybercrime’: An assessment in light of routine activities theory. European Journal of Criminology, 2(4), 407–427.

    Article  Google Scholar 

  • Yar, M. (2005b). Computer hacking: Just another case of juvenile delinquency? The Howard Journal of Criminal Justice, 44(4), 387–399.

    Article  Google Scholar 

  • Zureich, D., & Graebe, W. (2015). Cybersecurity: The continuing evolution of insurance and ethics. Defense Counsel Journal, 82(2), 192–198.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyung-Shick Choi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Choi, KS., Lee, C.S., Louderback, E.R. (2020). Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_2

Download citation

Publish with us

Policies and ethics