Skip to main content
Top

2010 | OriginalPaper | Chapter

9. Institutional and Economic Foundations of Cybercrime Business Models

Author : Dr. Nir Kshetri

Published in: The Global Cybercrime Industry

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cybercrime business models are rapidly evolving. It is argued that cyber-criminals closely imitate business models of legitimate corporations. Cybercrime firms and legitimate businesses, however, differ in terms of the important sources of core competence. Legitimate businesses’ core processes are centered around creating the most value for customers. Most cyber-criminals’ core processes, however, involve extorting and defrauding prospective victims and minimizing the odds of getting caught. Cyber-criminals and legitimate businesses also differ in terms of the legitimacy related to regulative institutions and inter-organizational arrangements. This chapter disentangles the mechanisms behind the cybercrime business models and examines the contexts and processes associated with such models.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Aguilar-Millan, S., Foltz, J. E., Jackson, J., & Oberg, A. (2008). The globalization of crime. Futurist, 42(6), 41–50. Aguilar-Millan, S., Foltz, J. E., Jackson, J., & Oberg, A. (2008). The globalization of crime. Futurist, 42(6), 41–50.
go back to reference Arlen, J. H., & Carney, W. J. (1992). Vicarious liability for fraud on securities markets: Theory and evidence. The University of Illinois Law Review, 691, 724–727. Arlen, J. H., & Carney, W. J. (1992). Vicarious liability for fraud on securities markets: Theory and evidence. The University of Illinois Law Review, 691, 724–727.
go back to reference Australia. Treasury. (2001) Dispute resolution in economic commerce. Canberra: Consumer Affairs Division, Department of the Treasury. Australia. Treasury. (2001) Dispute resolution in economic commerce. Canberra: Consumer Affairs Division, Department of the Treasury.
go back to reference Barkhi, R., Belanger, F., & Hicks, J. (2008). A model of the determinants of purchasing from virtual stores. Journal of Organizational Computing & Electronic Commerce, 18(3), 177–196.CrossRef Barkhi, R., Belanger, F., & Hicks, J. (2008). A model of the determinants of purchasing from virtual stores. Journal of Organizational Computing & Electronic Commerce, 18(3), 177–196.CrossRef
go back to reference Baumol, W. J. (1990). Entrepreneurship: Productive, unproductive, and destructive. Journal of Political Economy, 98(5), 893–921.CrossRef Baumol, W. J. (1990). Entrepreneurship: Productive, unproductive, and destructive. Journal of Political Economy, 98(5), 893–921.CrossRef
go back to reference Becker, G. S. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76, 169–217.CrossRef Becker, G. S. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76, 169–217.CrossRef
go back to reference Berger, P. L., & Luckmann, T. (1967). The social construction of reality: A treatise in the sociology of knowledge. New York: Doubleday. Berger, P. L., & Luckmann, T. (1967). The social construction of reality: A treatise in the sociology of knowledge. New York: Doubleday.
go back to reference Berinato, S. (2008). Service Economy the cybercrime, breakthrough ideas for 2008. Harvard Business Review, 86(2), 17–45. Berinato, S. (2008). Service Economy the cybercrime, breakthrough ideas for 2008. Harvard Business Review, 86(2), 17–45.
go back to reference Blakely, R., Richards, J., & Halpin, T. (2007, November 10). Cybergang raises fear of new crime wave. The Times (London), 13. Blakely, R., Richards, J., & Halpin, T. (2007, November 10). Cybergang raises fear of new crime wave. The Times (London), 13.
go back to reference Cao, L. (2004). The transnational and sub-national in global crimes. Berkeley Journal of International Law, 22(1), 59–97. Cao, L. (2004). The transnational and sub-national in global crimes. Berkeley Journal of International Law, 22(1), 59–97.
go back to reference Carvajal, D. (2008, April 7). Cybercrime evolves as it grows. The International Herald Tribune, 10. Carvajal, D. (2008, April 7). Cybercrime evolves as it grows. The International Herald Tribune, 10.
go back to reference Clark, K. B., & Fujimoto, T. (1991). Product development performance: Strategy, organization, and management in the world auto industry. Boston: Harvard Business School Press. Clark, K. B., & Fujimoto, T. (1991). Product development performance: Strategy, organization, and management in the world auto industry. Boston: Harvard Business School Press.
go back to reference Dillman, B. (2007). Introduction: Shining light on the shadows: The political economy of illicit transactions in the Mediterranean. Mediterranean Politics, 12(2), 123–139.CrossRef Dillman, B. (2007). Introduction: Shining light on the shadows: The political economy of illicit transactions in the Mediterranean. Mediterranean Politics, 12(2), 123–139.CrossRef
go back to reference DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48, 147–160.CrossRef DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48, 147–160.CrossRef
go back to reference Edelman, B. (2007, January 25). Why I can never agree with adware and spyware. The Guardian. Edelman, B. (2007, January 25). Why I can never agree with adware and spyware. The Guardian.
go back to reference Ehrlich, I. (1973). Participation in illegitimate activities: A theoretical and empirical investigation. Journal of Political Economy, 81, 521–565.CrossRef Ehrlich, I. (1973). Participation in illegitimate activities: A theoretical and empirical investigation. Journal of Political Economy, 81, 521–565.CrossRef
go back to reference Einhorn, B. (2006). Advertisers in China are getting burned, too. Business Week, 4003, 54. Einhorn, B. (2006). Advertisers in China are getting burned, too. Business Week, 4003, 54.
go back to reference Eisenhardt, K., Martin, M., & Jeffrey, A. (2000, October/November). Dynamic capabilities: What are they? Strategic Management Journal, 21(10/11), 1105–1121.CrossRef Eisenhardt, K., Martin, M., & Jeffrey, A. (2000, October/November). Dynamic capabilities: What are they? Strategic Management Journal, 21(10/11), 1105–1121.CrossRef
go back to reference Etges, R., & Sutcliffe, E. (2008). An overview of transnational organized cyber crime. Information Security Journal: A Global Perspective, 17(2), 87–94.CrossRef Etges, R., & Sutcliffe, E. (2008). An overview of transnational organized cyber crime. Information Security Journal: A Global Perspective, 17(2), 87–94.CrossRef
go back to reference Foreign Policy. (2005, March/April). Caught in the net: Australian teens, 92. Foreign Policy. (2005, March/April). Caught in the net: Australian teens, 92.
go back to reference Freeman, S., Grogger, J., & Sonstelie, J. (1996). The spatial concentration of crime. Journal of Urban Economics, 40(2), 216–231.CrossRef Freeman, S., Grogger, J., & Sonstelie, J. (1996). The spatial concentration of crime. Journal of Urban Economics, 40(2), 216–231.CrossRef
go back to reference GAO Reports. (2007, June 22). Public and private entities face challenges in addressing cyber threats. RPT-number: GAO-07-705. GAO Reports. (2007, June 22). Public and private entities face challenges in addressing cyber threats. RPT-number: GAO-07-705.
go back to reference Ghose, A. (2009). Internet exchanges for used goods: An empirical analysis of trade patterns and adverse selection. MIS Quarterly, 33(2), 263–291. Ghose, A. (2009). Internet exchanges for used goods: An empirical analysis of trade patterns and adverse selection. MIS Quarterly, 33(2), 263–291.
go back to reference Glaser, D. (1971). Social deviance. Chicago, IL: Markham. Glaser, D. (1971). Social deviance. Chicago, IL: Markham.
go back to reference Graft, M. (2000). Cyber threats and the U.S. economy: Hearing before the joint economic committee on Cyber Threats and the US Economy, The One Hundred Sixth United States Congress. Graft, M. (2000). Cyber threats and the U.S. economy: Hearing before the joint economic committee on Cyber Threats and the US Economy, The One Hundred Sixth United States Congress.
go back to reference Gregg, D. G., & Scott, J. E. (2008, April). A typology of complaints about ebay sellers. Communications of the ACM, 51(4), 69–74.CrossRef Gregg, D. G., & Scott, J. E. (2008, April). A typology of complaints about ebay sellers. Communications of the ACM, 51(4), 69–74.CrossRef
go back to reference Grow, B., Elgin, B., & Herbst, M. (2006, October 2). Click fraud. Business Week, 4003, 46. Grow, B., Elgin, B., & Herbst, M. (2006, October 2). Click fraud. Business Week, 4003, 46.
go back to reference Hall, J., & Rosson, P. (2006). The impact of technological turbulence on entrepreneurial behavior, social norms and ethics: Three Internet-based cases. Journal of Business Ethics, 64(3), 231–248.CrossRef Hall, J., & Rosson, P. (2006). The impact of technological turbulence on entrepreneurial behavior, social norms and ethics: Three Internet-based cases. Journal of Business Ethics, 64(3), 231–248.CrossRef
go back to reference Hamel, G. (2002). Leading the revolution. Boston: Harvard Business School Press. Hamel, G. (2002). Leading the revolution. Boston: Harvard Business School Press.
go back to reference Hampton, M. P., & Levi, M. (1999). Fast spinning into oblivion? Recent developments in money-laundering policies and offshore finance centres. Third World Quarterly, 20(3), 645–656.CrossRef Hampton, M. P., & Levi, M. (1999). Fast spinning into oblivion? Recent developments in money-laundering policies and offshore finance centres. Third World Quarterly, 20(3), 645–656.CrossRef
go back to reference Helfat, C. E. (1997). Know-how and asset complementarity and dynamic capability accumulation. Strategic Management Journal, 18(5): 339–360.CrossRef Helfat, C. E. (1997). Know-how and asset complementarity and dynamic capability accumulation. Strategic Management Journal, 18(5): 339–360.CrossRef
go back to reference Hirshleifer, J. (1971). The private and social value of information and the reward to inventive activity. American Economic Review, 61, 561–574. Hirshleifer, J. (1971). The private and social value of information and the reward to inventive activity. American Economic Review, 61, 561–574.
go back to reference Hirshleifer, J., & Riley, J. G. (1979). The analytics of uncertainty and information: An expository survey. Journal of Economic Literature, 17, 1375–1421. Hirshleifer, J., & Riley, J. G. (1979). The analytics of uncertainty and information: An expository survey. Journal of Economic Literature, 17, 1375–1421.
go back to reference Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149(4), 1003–1114.CrossRef Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149(4), 1003–1114.CrossRef
go back to reference Koopmans, T. (1957). Three essays on the state of the economic science. New York: McGraw-Hill. Koopmans, T. (1957). Three essays on the state of the economic science. New York: McGraw-Hill.
go back to reference Kotler, P., & Armstrong, G. (2005). Principles of marketing. NJ: Prentice Hall. Kotler, P., & Armstrong, G. (2005). Principles of marketing. NJ: Prentice Hall.
go back to reference Kshetri, N. (2005). Hacking the Odds. Foreign Policy, May/June, 93. Kshetri, N. (2005). Hacking the Odds. Foreign Policy, May/June, 93.
go back to reference Kshetri, N. (2009). Entrepreneurship in post-socialist economies: A typology and institutional contexts for market entrepreneurship. Journal of International Entrepreneurship, 7(3), 236–259.CrossRef Kshetri, N. (2009). Entrepreneurship in post-socialist economies: A typology and institutional contexts for market entrepreneurship. Journal of International Entrepreneurship, 7(3), 236–259.CrossRef
go back to reference Lawrence, T. B., & Phillips, N. (2004). From Moby Dick to Free Willy: Macro-cultural discourse and institutional entrepreneurship in emerging institutional fields. Organization, 11, 689–711.CrossRef Lawrence, T. B., & Phillips, N. (2004). From Moby Dick to Free Willy: Macro-cultural discourse and institutional entrepreneurship in emerging institutional fields. Organization, 11, 689–711.CrossRef
go back to reference Lovet, G. (2006). Dirty money on the wires: The business models of cyber criminals. Virus Bulletin Conference. Lovet, G. (2006). Dirty money on the wires: The business models of cyber criminals. Virus Bulletin Conference.
go back to reference Lynn, M. (2006, October 7). Why Google has already passed its peak. The Spectator. Lynn, M. (2006, October 7). Why Google has already passed its peak. The Spectator.
go back to reference Machlup, F. (1962). The production and distribution of knowledge in the United States. Princeton, NJ: Princeton University Press. Machlup, F. (1962). The production and distribution of knowledge in the United States. Princeton, NJ: Princeton University Press.
go back to reference Marketing. (2006, July 19). Media Analysis: Click fraud rears its head. Marketing. (2006, July 19). Media Analysis: Click fraud rears its head.
go back to reference Metropolitan Police. (2006). Criminal networks, a new approach. London: Metropolitan Police. Metropolitan Police. (2006). Criminal networks, a new approach. London: Metropolitan Police.
go back to reference Mittelman, J. H., & Johnston, R. (1999). The globalization of organized crime, the courtesan state, and the corruption of civil society. Global Governance, 5(1), 103–126. Mittelman, J. H., & Johnston, R. (1999). The globalization of organized crime, the courtesan state, and the corruption of civil society. Global Governance, 5(1), 103–126.
go back to reference Naím, M. (2005). Illicit: How smugglers, traffickers, and copycats are hijacking the global economy. New York: Doubleday. Naím, M. (2005). Illicit: How smugglers, traffickers, and copycats are hijacking the global economy. New York: Doubleday.
go back to reference Naylor, R. T. (2005, Winter/Spring). The rise and fall of the underground economy. Brown Journal of World Affairs, 11(2), 131–143. Naylor, R. T. (2005, Winter/Spring). The rise and fall of the underground economy. Brown Journal of World Affairs, 11(2), 131–143.
go back to reference Nordstrom, C. (2004). Shadows of war: Violence, power, and profiteering in the twenty-first century. Berkeley: University of California Press. Nordstrom, C. (2004). Shadows of war: Violence, power, and profiteering in the twenty-first century. Berkeley: University of California Press.
go back to reference Paoli, L., & Fijnaut, C. (2006). Organized crime and its control policies. European Journal of Crime, Criminal Law & Criminal Justice, 14(3), 307–327.CrossRef Paoli, L., & Fijnaut, C. (2006). Organized crime and its control policies. European Journal of Crime, Criminal Law & Criminal Justice, 14(3), 307–327.CrossRef
go back to reference Paoli, L. (2001). Drug trafficking in Russia: A form of organized crime? Journal of Drug Issues, 31(4), 1007–1037. Paoli, L. (2001). Drug trafficking in Russia: A form of organized crime? Journal of Drug Issues, 31(4), 1007–1037.
go back to reference Pearce, J. A. (1982, Spring). The company mission as a strategic tool. Sloan Management Review, 23(3), 15–24. Pearce, J. A. (1982, Spring). The company mission as a strategic tool. Sloan Management Review, 23(3), 15–24.
go back to reference Rodier, M. (2007). Thwarting Hackers; As hacking increases, experts say firms must use a blend of multifactor authentication, risk analysis and people to protect themselves. Wall Street & Technology, October 1, 17. Rodier, M. (2007). Thwarting Hackers; As hacking increases, experts say firms must use a blend of multifactor authentication, risk analysis and people to protect themselves. Wall Street & Technology, October 1, 17.
go back to reference Security Director’s Report. (2007, July). Cybercrime in 2007–2008. 7(7), 8. Security Director’s Report. (2007, July). Cybercrime in 2007–2008. 7(7), 8.
go back to reference Simon, H. A. (1957). Models of men, social and rational. New York: Wiley and Sons. Simon, H. A. (1957). Models of men, social and rational. New York: Wiley and Sons.
go back to reference Sjoquist, D. L. (1973). Property crime and economic behavior. American Economic Review, 63, 439–446. Sjoquist, D. L. (1973). Property crime and economic behavior. American Economic Review, 63, 439–446.
go back to reference Sutherland, B. (2008). The rise of black market data; Criminals who steal personal data often don’t exploit it. Instead, they put it up for sale on one of the many vibrant online markets. Newsweek, 152(24), (International ed.). Sutherland, B. (2008). The rise of black market data; Criminals who steal personal data often don’t exploit it. Instead, they put it up for sale on one of the many vibrant online markets. Newsweek, 152(24), (International ed.).
go back to reference Teece, D., Gary, P., & Amy, S. (1997). Dynamic capabilities and strategic management. Strategic Management Journal, 18(7), 509–533.CrossRef Teece, D., Gary, P., & Amy, S. (1997). Dynamic capabilities and strategic management. Strategic Management Journal, 18(7), 509–533.CrossRef
go back to reference Tillman, R. (1998). Broken promises: Fraud by small business health insurers. Boston: Northeastern University Press. Tillman, R. (1998). Broken promises: Fraud by small business health insurers. Boston: Northeastern University Press.
go back to reference US Fed News Service, Including US State News. (2008, May 19). 38 Individuals in US, Romania charged in two related cases of computer fraud involving international organized crime. Washington, DC. US Fed News Service, Including US State News. (2008, May 19). 38 Individuals in US, Romania charged in two related cases of computer fraud involving international organized crime. Washington, DC.
go back to reference Viano, E. C. (1999). Global organized crime and international security. Burlington, VT: Ashgate Publishing. Viano, E. C. (1999). Global organized crime and international security. Burlington, VT: Ashgate Publishing.
go back to reference Warner, M., & Daugherty, C. W. (2004). Promoting the ‘civic’ in entrepreneurship: The case of rural Slovakia. Journal of the Community Development Society, 35(1), 117–135.CrossRef Warner, M., & Daugherty, C. W. (2004). Promoting the ‘civic’ in entrepreneurship: The case of rural Slovakia. Journal of the Community Development Society, 35(1), 117–135.CrossRef
go back to reference Williamson, O. E. (1975). Markets and hierarchies: Analysis and antitrust implications. New York: Free Press. Williamson, O. E. (1975). Markets and hierarchies: Analysis and antitrust implications. New York: Free Press.
go back to reference Williamson, O. E. (1985). The economic institutions of capitalism. New York: Free Press. Williamson, O. E. (1985). The economic institutions of capitalism. New York: Free Press.
go back to reference Wurth, A. H., Jr. (1992/1993). Policy information or information policy? Information types in economics and policy. Knowledge & Policy, 5(4), 65–81. Wurth, A. H., Jr. (1992/1993). Policy information or information policy? Information types in economics and policy. Knowledge & Policy, 5(4), 65–81.
go back to reference Wylie, I. (2007). Internet; Romania home base for EBay scammers; The auction website has dispatched its own cyber-sleuth to help police crack fraud rings. Los Angeles Times, C.1. Wylie, I. (2007). Internet; Romania home base for EBay scammers; The auction website has dispatched its own cyber-sleuth to help police crack fraud rings. Los Angeles Times, C.1.
go back to reference Zahra, S., & George, G. (2002). Absorptive capacity: A review, reconceptualization, and extension. The Academy of Management Review, 27(2), 185–203.CrossRef Zahra, S., & George, G. (2002). Absorptive capacity: A review, reconceptualization, and extension. The Academy of Management Review, 27(2), 185–203.CrossRef
go back to reference Zazzaro, A., Fratianni, M., & Alessandrin, P. (2009). The changing geography of banking and finance. Chapter 3: Financial centers between centralization and virtualization. New York: Springer US. Zazzaro, A., Fratianni, M., & Alessandrin, P. (2009). The changing geography of banking and finance. Chapter 3: Financial centers between centralization and virtualization. New York: Springer US.
Metadata
Title
Institutional and Economic Foundations of Cybercrime Business Models
Author
Dr. Nir Kshetri
Copyright Year
2010
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-11522-6_9