Index Index
Cybercrime Networks
Taylor and Francis online: Understanding How the Internet Facilitates Crime and Deviance. By Loretta J. Stalans and Mary A. Finn. Vol. 11 29 Jul 2016 From: Journal Victims & Offenders An International Journal of Evidence-based Research, Policy, and Practice Volume 11, 2016 - Issue 4: How the Internet Facilitates Deviance Excerpt: Cybercrime is crime that is mediated by networked technology (Wall, 2007 Wall, D. S. (2007). Cybercrime: ). Old crimes such as theft, fraud, and harassment find new forms in cyberspace and information technologies…. Unlawful behavior in some countries is tolerated and legal behavior in other countries, allowing offenders to choose jurisdictions for their websites that have the least harsh legal consequences. Moreover, maintaining anonymity or bogus identities during the commission of crimes is easier in virtual spaces than in real physical space. Apps, avatars, disposable devices, and the deep web—where search engines cannot detect websites due to an added layer of security—facilitate a concealment of criminal transactions, socialization into subcultures, and networking of those involved in illicit or nonconventional behavior. Specialized forums and chat rooms in cyberspace have created virtual spaces to network and to form trustworthy underground markets for illicit drugs, prostitution, and child pornography (e.g., Beech, Elliot, Birgden, & Findlater, 2008 Resources Beech, A. R., Elliott, I. A., Birgden, A., & Findlater, D. (2008). The Internet and child sexual offending: A criminological review. Aggression and Violent Behavior, 13, 216–228. doi:10.1016/j.avb.2008.03.007 [Crossref], [Web of Science ®], [Google Scholar] ; Lavorgna, 2014 Lavorgna, A. (2014). Internet-mediated drug trafficking: Towards a better understanding of new criminal dynamics. Trends in Organized Crime, 27, 250–270. doi:10.1007/s12117-014-9226-8 [Crossref], [Google Scholar] ; Stalans & Finn, 2016 Stalans, L. J. & Finn, M. A. (2016). Consulting legal experts in the real and virtual world: Pimps’ and johns’ cultural schemas about strategies to avoid arrest and conviction. Deviant Behavior, 37(6), 644–664. doi:10.1080/01639625.2015.1060810 [Taylor & Francis Online], [Google Scholar] ) and ideological deviant groups to incite terrorism, engage in espionage, or engage in harmful health risks such as The transformation of crime in the information age. Malden, MA: Polity Press. [Google Scholar] Article: Criminal and Routine Activities in Online Settings: Gangs, Offenders, and the Internet David C. Pyrooz et al. Justice Quarterly Volume 32, 2015 - Issue 3 Published online: 18 Mar 2013 Article: Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis Eric Rutger Leukfeldt et al. Deviant Behavior Volume 37, 2016 - Issue 3 Published online: 19 Jan 2016 Article: SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD Thomas J. Holt et al. Journal of Crime and Justice Volume 33, 2010 - Issue 2 Journal: Victims & Offenders An International Journal of Evidence-based Research, Policy, and Practice Updates: Page started 10/21/2018