2019
DOI: 10.1080/0735648x.2019.1692426
|View full text |Cite
|
Sign up to set email alerts
|

Introduction: new directions in cybercrime research

Abstract: The Internet, computers, cell phones, and other forms of technology have revolutionized every aspect of human life over the last several decades, including how we communicate, bank, shop, obtain the news, and entertain ourselves (Holt and Bossler 2016). These technological advancements have also created myriad opportunities for offenders to commit various forms of crime. Online crimes are often referred to as cybercrime and occur because 'the perpetrator uses special knowledge of cyberspace' (Furnell 2002, 21)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(22 citation statements)
references
References 4 publications
0
20
0
2
Order By: Relevance
“…Grabosky (2001); (2014) sees cybercrime as little more than an online version of existing types crime, whereas Holt and Bossler (2014) and Crown Prosecution Service (n.d.) include both traditional crime moving online and exclusively online activities. By contrast, Wall (2004) and subsequently (Bossler & Berenblum, 2019) identify traditional crime with cyber elements as distinct from cybercrime that solely exists online. For the current discussion, Wall's original typology (2001) summarised in Table 1 provides a useful starting point for this discussion.…”
Section: Typology Of Cybercrimesmentioning
confidence: 99%
“…Grabosky (2001); (2014) sees cybercrime as little more than an online version of existing types crime, whereas Holt and Bossler (2014) and Crown Prosecution Service (n.d.) include both traditional crime moving online and exclusively online activities. By contrast, Wall (2004) and subsequently (Bossler & Berenblum, 2019) identify traditional crime with cyber elements as distinct from cybercrime that solely exists online. For the current discussion, Wall's original typology (2001) summarised in Table 1 provides a useful starting point for this discussion.…”
Section: Typology Of Cybercrimesmentioning
confidence: 99%
“…Rising academic interest in cybercrime detection and prevention is evidenced by several recent special issues in journals across management, technical and professional disciplines. These include the special issue in which this article is published, the Journal of Crime and Justice (Bossler and Berenblum, 2019), Information Technology & People (Shah, Jones and Choudrie, 2019) and Computers and Security (Choo, Gai, Chiaraviglio and Yang, 2020).…”
Section: Cyber-crimementioning
confidence: 99%
“…(Nodeland et al, 2019;Wahid & Labib, 2005). Online crime is also called cybercrime since the attacker uses unique cyberspace information (Bossler & Berenblum, 2019) Cybercrimes can be classified into different categories, including cybertrespass (e.g., unauthorized system access), cyberdeception/theft (e.g., identity theft, online fraud, digital piracy), cyber-porn/obscenity (e.g., child sexual exploitation materials), and cyber-violence (e.g., cyberstalking; cyber terrorism) (Hansen et al, 2019). Cybercrime is increasing very rapidly due to technological developments.…”
Section: Introductionmentioning
confidence: 99%