Abstract
This chapter aims to examine cybercrime viz-à-viz technological developments by identifying key research studies in the field and crime resulting from technological changes. The industrial revolution technological process and innovations are discussed to illustrate their significant role in shaping and creating cybercrime research. In the age of the fourth industrial revolution, existing cybercrimes will coexist with newer types and versions of cybercrimes while combining traditional crimes in hybrid forms. This chapter concludes with future challenges for cybercrime research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
American Society of Criminology (ASC). (2019). ASC homepage. https://www.asc41.com/.
Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., Moore, T., & Savage, S. (2013). Measuring the cost of cybercrime. In B. Schneier (Ed.), The economics of information security and privacy (pp. 265–300). Berlin/Heidelberg: Springer.
Arief, B., & Adzmi, M. A. B. (2015). Understanding cybercrime from its stakeholders’ perspectives: Part 2-defenders and victims. IEEE Security and Privacy, 13(2), 84–88.
Arief, B., Adzmi, M. A. B., & Gross, T. (2015). Understanding cybercrime from its stakeholders’ perspectives: Part 1-attackers. IEEE Security and Privacy, 13(1), 71–76.
Bossler, A. M. (2017). Need for debate on the implications of honeypot data for restrictive deterrence policies in cyberspace. Criminology and Public Policy, 16(3), 681–688.
Brenner, S. W. (2008). Fantasy crime: The role of criminal law in virtual worlds. Vanderbilt Journal of Entertainment and Technology Law, 11, 1–91.
Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara: ABC-CLIO.
Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. Boston: UPNE.
Brevini, B. (2017). WikiLeaks: Between disclosure and whistle-blowing in digital times. Sociology Compass, 11(3), 124–157.
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the Internet (3rd ed.). Waltham: Academic Press.
Chaka, J. G., & Marimuthu, M. (2018). Curtailing the threats to cloud computing in the fourth industrial revolution. In Z. Fields (Ed.), Handbook of research on information and cyber security in the fourth industrial revolution (pp. 112–141). Hershey: IGI Global.
Cheng, Y., Naslund, M., Selander, G., & Fogelstrom, E. (2012). Privacy in machine-to-machine communications a state-of-the-art survey. In 2012 IEEE International Conference on Communication Systems (ICCS). IEEE, pp. 75–79.
Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308–333.
Choi, K. S. (2015). Cybercriminology and digital investigation. El Paso: LFB Scholarly Publishing.
Choi, K. S., & Lee, C. S. (2018). The present and future of cybercrime, cyberterrorism, and cybersecurity. International Journal of Cybersecurity Intelligence and Cybercrime, 1(1), 1–4.
Chory, R. M., Vela, L. E., & Avtgis, T. A. (2016). Organizational surveillance of computer-mediated workplace communication: Employee privacy concerns and responses. Employee Responsibilities and Rights Journal, 28(1), 23–43.
Cowen, C., Louderback, E. R., & Roy, S. S. (2018). The role of land use and walkability in predicting crime patterns: A spatiotemporal analysis of Miami-Dade County neighborhoods, 2007–2015. Security Journal, 1–23. https://doi.org/10.1057/s41284-018-00161-7
Curran, J. (2016). The Internet of history: Rethinking the internet’s past. In Misunderstanding the Internet (pp. 48–84). Abingdon/New York: Routledge.
D’arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658.
Dhillon, G., & Moores, S. (2001). Computer crimes: Theorizing about the enemy within. Computers and Security, 20(8), 715–723.
Doerfel, M. L. (1998). What constitutes semantic network analysis? A comparison of research and methodologies. Connect, 21(2), 16–26.
Dupont, B. (2017). Bots, cops, and corporations: On the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime. Crime, Law and Social Change, 67(1), 97–116.
Federal Bureau of Investigation (FBI). (2017). 2016 IC3 annual report. Washington, DC: Bureau of Justice Statistics. http://www.ic3.gov/media/annualreport/2016_IC3Report.pdf.
Furnell, S., Emm, D., & Papadaki, M. (2015). The challenge of measuring cyber-dependent crimes. Computer Fraud and Security, 10, 5–12.
Gabbal, A. (2015). Kevin Ashton describes “the Internet Things”. Smithsonian Magazine (January). Available at: http://www.smithsonianmag.com/innovation/kevin-ashton-describes-the-internetof-things-180953749/.
Greenstein, S. (2015). How the Internet became commercial: Innovation, privatization, and the birth of a new network. Princeton: Princeton University Press.
Grégoire, Y., Salle, A., & Tripp, T. M. (2015). Managing social media crises with your customers: The good, the bad, and the ugly. Business Horizons, 58(2), 173–182.
Holt, T. J. (2013a). Exploring the social organisation and structure of stolen data markets. Global Crime, 14(2–3), 155–174.
Holt, T. J. (2013b). Examining the forces shaping cybercrime markets online. Social Science Computer Review, 31(2), 165–177.
Holt, T. J. (Ed.). (2016). Cybercrime through an interdisciplinary lens. Taylor & Francis.
Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.
Holt, T. J., & Bossler, A. M. (2015). Cybercrime in Progress: Theory and prevention of technology-enabled offenses. New York: Routledge.
Holt, T. J., & Turner, M. G. (2012). Examining risks and protective factors of on-line identity theft. Deviant Behavior, 33(4), 308–323.
Holt, T. J., Smirnova, O., & Chua, Y. T. (2016a). Exploring and estimating the revenues and profits of participants in stolen data markets. Deviant Behavior, 37(4), 353–367.
Holt, T. J., Smirnova, O., & Hutchings, A. (2016b). Examining signals of trust in criminal markets online. Journal of Cybersecurity, 2(2), 137–145.
Howard, P. N. (2015). Sketching out the Internet of things Trendline. Washington, DC: The Brookings Institution. https://www.brookings.edu/blog/techtank/2015/06/09/sketching-out-the-internet-of-things-trendline/. Accessed May 14, 2019.
Hutchings, A., & Holt, T. J. (2017). The online stolen data market: Disruption and intervention approaches. Global Crime, 18(1), 11–30.
IDN. (2018). United nations definition of cybercrime. https://idn-wi.com/united-nations-definition-cybercrime/. Accessed January 5, 2019.
Internet World Stats. (2019). Internet world penetration rates by geographic regions – March, 2019. https://www.internetworldstats.com/stats.htm. Accessed May 10, 2019.
Jaishankar, K. (2008). Space transition theory of cyber crimes. Crimes of the Internet, 283–301.
Jan Smit, S. K. (2016). Industry 4.0. Directorate general for internal policies. European Parliament.
Karlov, A. A. (2017). Cybersecurity of Internet of things: Risks and opportunities. In Proceedings of the XXVI International Symposium on Nuclear Electronics and Computing (NEC’2017) Becici, Budva, Montenegro, September 25–29, 2017.
Kraemer-Mbula, E., Tang, P., & Rush, H. (2013). The cybercrime ecosystem: Online innovation in the shadows? Technological Forecasting and Social Change, 80, 541–555.
Lagazio, M., Sherif, N., & Cushman, M. (2014). A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers and Security, 45, 58–74.
Lee, C. S. (2019). Datafication, dataveillance, and the social credit system as China’s new normal. Online Information Review. https://doi.org/10.1108/OIR-08-2018-0231.
Luo, X., & Liao, Q. (2009). Ransomware: A new cyber hijacking threat to enterprises. In Handbook of research on information security and assurance (pp. 1–6). IGI global.
Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, 2(1), 191–216.
Maimon, D., Kamerdze, A., Cukier, M., & Sobesto, B. (2013). Daily trends and origin of computer-focused crimes against a large university computer network. British Journal of Criminology, 53, 319–343.
Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology, 52, 33–59.
Mansfield-Devine, S. (2016). Ransomware: Taking businesses hostage. Network Security, 10, 8–17.
Martellini, M., Abaimov, S., Gaychen, S., & Wilson, C. (2017). Assessing cyberattacks against wireless networks of the next global Internet of things revolution: Industry 4.0. In Information security of highly critical wireless networks (SpringerBriefs in computer science) (pp. 63–69). Cham: Springer.
McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. Summary of key findings and implications. Home Office Research report, 75.
Mitch, D. (2018). The role of education and skill in the British industrial revolution. In The British Industrial Revolution (pp. 241–279). Routledge.
Mohamed, A., & Køien, G. M. (2015). Cyber security and the Internet of things: Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, 4, 65–88.
Moore, R. (2010). Cybercrime: Investigating high-technology computer crime. New York: Routledge.
National White Collar Crime Center (2003). Check and Credit Card Fraud, WCC Issue Papers. Morgantown, WV: National White Collar Crime Center Administration and Research Office.
O’Rourke, A., Pyman, A., Teicher, J., & van Gramberg, B. (2018). Old wine in new bottles? Regulating employee social media use through termination of employment law: A comparative analysis. Common Law World Review, 47(4), 248–271.
Obeidat, Z. M. I., Xiao, S. H., Iyer, G. R., & Nicholson, M. (2017). Consumer revenge using the Internet and social media: An examination of the role of service failure types and cognitive appraisal processes. Psychology and Marketing, 34(4), 496–515.
Peters, M. A. (2017). Technological unemployment: Educating for the fourth industrial revolution. Educational Philosophy and Theory, 49(1), 1–6.
Schnur, Z., & Wilson, R. (2018). Cold war echoes: The Russian effort to interfere in the 2016 election. In International Conference on Cyber Warfare and Security (pp. 675–680). Academic Conferences International Limited.
Schwab, K. (2016). The fourth industrial revolution. New York: Crown Business.
Schwab, K. (2017). The fourth industrial revolution. Currency.
Sorell, T. (2015). Human rights and hacktivism: The cases of Wikileaks and anonymous. Journal of Human Rights Practice, 7(3), 391–410.
Stearns, P. N. (2018). The industrial revolution in world history. New York: Routledge.
Taylor, C. A. (Ed.). (2017). The ethics of WikiLeaks. New York: Greenhaven Publishing LLC.
Wall, D. S. (2007a). Cybercrime: The transformation of crime in the information age. Malden: Polity Press.
Wall, D. S. (2007b). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183–205.
Wei, J. (2005). Internet penetration analysis: The impact on global e-commerce. Journal of Global Competitiveness, 13(1–2), 9–24.
West, J. P., & Bowman, J. S. (2016). Electronic surveillance at work: An ethical analysis. Administration and Society, 48(5), 628–651.
Westrick, S. J. (2016). Nursing students’ use of electronic and social media: Law, ethics, and e-professionalism. Nursing Education Perspectives, 37(1), 16–22.
World Bank. (n.d.). Individuals using the Internet (% of population). https://data.worldbank.org/indicator/it.net.user.zs?end=2017&start=1986&view=chart. Retrieved from October 20, 2018.
Yar, M. (2005a). The novelty of ‘cybercrime’: An assessment in light of routine activities theory. European Journal of Criminology, 2(4), 407–427.
Yar, M. (2005b). Computer hacking: Just another case of juvenile delinquency? The Howard Journal of Criminal Justice, 44(4), 387–399.
Zureich, D., & Graebe, W. (2015). Cybersecurity: The continuing evolution of insurance and ethics. Defense Counsel Journal, 82(2), 192–198.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Choi, KS., Lee, C.S., Louderback, E.R. (2020). Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_2
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences