Weitere Kapitel dieses Buchs durch Wischen aufrufen
This chapter employs increasing returns and externality approaches to explain cybercrimes’ escalation. We focus on three positive or self-reinforcing feedback systems to examine increasing returns in cybercrime-related activities. They are related to economic, sociopolitical, and cognitive systems. We also examine three mechanisms that may give positive feedback to cyber-criminals: inefficiency and congestion in the law-enforcement system, acceleration of the diffusion of cybercrime know-how and technology, and increase in potential criminals’ predisposition toward cybercrimes.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Acohido, B., & Swartz, J. (2005, December 15). Meth addicts’ other habit: Online theft. USA Today.
Akerlof, G. A. (1970). The Market for ‘Lemons’: Qualitative uncertainty and the market mechanism. Quarterly Journal of Economics, 84, 488–500. CrossRef
Aldrich, H. E., & Fiol, C. M. (1994). Fools rush in? The institutional context of new industry creation. Academy of Management Review, 19, 645–670. CrossRef
Antariksa. (2001, July). I am a thief, not a hacker: Indonesia’s electronic underground. Latitudes Magazine, 12–17.
Arrow, K. J. (1962). The economic implications of learning by doing. Review of Economic Studies, 29, 155–173. CrossRef
Arthur, W. B. (1989). Competing technologies, increasing returns, and lock-in by historical events. Economic Journal, 99, 116–131.
Arthur, W. B. (1996, July/August). Increasing returns and the New World of Business. Harvard Business Review, 101–109.
Ashley, B. K. (2004, March). The United States is vulnerable to cyberterrorism. SIGNAL Magazine. http://www.afcea.org/signal/articles/anmviewer.asp?a=32. Accessed 21 September 2006.
Banisar, D. (1999, August 3). Computer Hacker’s sentence spotlights high-tech crime prosecutions. Criminal Justice Weekly.
Barkhi, R., Belanger, F., & Hicks, J. (2008). A model of the determinants of purchasing from virtual stores. Journal of Organizational Computing & Electronic Commerce, 18(3), 177–196. CrossRef
Becker, G. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76(2), 169–217. CrossRef
Becker, G. S. (1995, Fall). The economics of crime. Cross Sections, 8–15, http://www.rich.frb.org/pubs/cross/crime/crime.pdf. Accessed 21 September 2006.
Becker, G. S., Murphy, K. M., & Grossman, M. (2004, December). The economic theory of illegal goods: The case of drugs. NBER Working Paper No. 10976. http://home.uchicago.edu/~gbecker/illegalgoods_Becker_Grossman_Murphy.pdf. Accessed 21 September 2006.
Bednarz, A. (2004, November 29). Profiling cybercriminals: A promising but immature science, Network World. http://www.nwfusion.com/supp/2004/cybercrime/112904profile.html?page=2. Accessed 21 September 2006.
Bell, R. E. (2002). The prosecution of computer crime. Journal of Financial Crime, 9(4), 308–325. CrossRef
Blau, J. (2004, May 26). Russia – A happy haven for hackers. http://www.computerweekly.com/Article130839.htm. Accessed 21 September 2006.
Bolton, G. E., Katok, E., & Ockenfels, A. (2004). How effective are electronic reputation mechanisms? An experimental investigation. Management Science, 50(11), 1587–1602. CrossRef
Bottoms, A. E., & Wiles, P. (2002). Environmental criminology. Oxford Handbook of Criminology, 620–656.
Bowker, A. L. (2000). The advent of the computer delinquent. FBI Law Enforcement, 69(12), 7–11.
Brenner, S. W. (2004). Toward a criminal law for cyberspace: A new model of law enforcement? 30 Rutgers Computer and Technology Law Journal, 30, 1–9.
Brown, J., & Morgan, J. (2006). Reputation in online markets: The market for trust. California Management Review, 49(1), 61–81.
Bryan-Low, C. (2005, September 1). Digital trails: In Eastern Europe, a Gumshoe chases Internet villains; Microsoft deploys Mr. Fifka to hunt cyber felons amid rise in online crime; tailing ‘Benny’ in a Czech city. Wall Street Journal, A.1.
Bulgaria Country Report. (2007). The PRS Group, Inc., Bulgaria, ISSN: 1054–5298.
Bun, M. J. G., & Makhloufi, A. E. (2007). Dynamic externalities, local industrial structure and economic development: Panel data evidence for morocco. Regional Studies, 41(6), 823–837. CrossRef
Calabresi, G., & Melamed, A. D. (1972). Property rules, liability rules, and inalienability: One view of the cathedral. Harvard Law Review, 85, 1089, 1102–1105. CrossRef
Chatterjee, S., & Datta, P. (2008). Examining inefficiencies and consumer uncertainty in e-commerce. Communications of AIS, 22, 525–546.
Clarke, R. V. (1995). Situational crime prevention. In M. Tonry & D. P. Farrington (Eds.), Building a safer society strategic approaches to crime (pp. 91–150). Chicago: University of Chicago Press.
Cody, E. (2007, February 8). Poll finds surge of religion among Chinese. The Washington Post, A.15.
Darby, M. R., & Kami, E. (1973). Free competition and optimal amount of fraud. Journal of Law and Economics, 16(April), 67–86. CrossRef
darkreading.com. (2008, June 11). Cybercrime outranks other crimes on Europeans’ worry list: Almost half of German PC users believe they will eventually fall victim. http://www.darkreading.com/document.asp?doc_id=156206. Accessed 21 September 2008.
David, P., & Arthur, B. (1985). Clio and the economics of QWERTY. American Economic Review, 75, 332–337.
De La Calle Robles, L. (2007). Fighting for local control: Street violence in the basque country. International Studies Quarterly, 51(2), 431–455. CrossRef
Deas, D., & Thomas, S. (2002). Comorbid psychiatric factors contributing to adolescent alcohol and other drug use. Alcohol Research and Health, 26, 116–121.
Deutsch, J., Hakim, S., & Weinblatt, J. (1984). Interjurisdictional criminal mobility: A theoretical perspective. Urban Studies, 21, 451–458. CrossRef
Demsetz, H. (1967). Toward a theory of property rights. The American Economic Review, 57(2), 347–359.
Drinkard, J. (2004, November 23). Nation’s moral values declining, most say; Poll: Majority see USA as deeply split. USA Today, A.11.
Egelko, B. (2009, October 8). FBI chief urges vigilance against cybercrime. San Francisco Chronicle. http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2009/10/07/BA061A2HG7.DTL. Accessed 21 October 2009.
Fitzgerald, P. (2008, September/October). Crash of civilizations. Foreign Policy, 122.
Fong, C. (2008, May 8). Fighting the agents of organized cybercrime. CNN.com.
Foreign Policy. (2002). Web Trafficking, 129, 96.
Fream, A. M., & Skinner, W. F. (1997). Social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 24(4), 495–518.
Freeman, S., Grogger, J., & Sonstelie, J. (1996). The spatial concentration of crime. Journal of Urban Economics, 40(2), 216–231. CrossRef
Frischmann, B. M., & Lemley, M. A. (2007). Spillovers. Columbia Law Review, 107(1), 257–301.
Gaviria, A. (2000). Increasing returns and the evolution of violent crime: The case of Colombia. Journal of Development Economics, 61(1), 1. CrossRef
Gefen, D., Karahanna, E., & Straub, D. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90.
Ghose, A. (2009). Internet exchanges for used goods: An empirical analysis of trade patterns and adverse selection. MIS Quarterly, 33(2), 263–291.
Giannangeli, M. (2008, June 8). Are we ready for Russian Mafia’s crime revolution? Sunday Express, Scottish Edition, 4.
Glaeser, E. L., & Sacerdote, B. (1999). Why is there more crime in cities? The Journal of Political Economy, 107(6), Part 2, 225–258. CrossRef
Goldman, L. (2004, October 4). Cybercon. Forbes, 174(6).
Grazioli, S., & Jarvenpaa, S. L. (2003). Deceived: Under target online, Association for computing machinery. Communications of the ACM, 46, 196. CrossRef
Gregg, D. G., & Scott, J. E. (2008, April). A typology of complaints about ebay sellers. Communications of the ACM, 51(4), 69–74. CrossRef
Harvard Law Review. (2006, June). Note: Immunizing the Internet, or: How I learned to stop worrying and love the worm. 119, 2442.
Honig, D. (2005). Can illegal content be regulated or prosecuted? Intermedia, 33(1), 30–33.
Hsu, M., & Soo, M. (2002). A secure multi-agent vickrey auction scheme. In International conference on Autonomous Agents and Multi-Agent Systems.
Huff, A. S. (1990). Mapping strategic thought. In A. S. Huff (Ed.), Mapping strategic thought (pp. 11–49). Chichester, England: Wiley.
Jacobs, J. (1969). The economy of cities. New York: Vintage.
John, G. (1984). An empirical investigation of some antecedents of opportunism in a marketing channel. Journal of Marketing Research, 21(3), 278–289. CrossRef
Jones, B. R. (2007). Comment: Virtual neighborhood watch: Open source software and community policing against cybercrime. Journal of Criminal Law & Criminology, 97(2), 601–629.
Kahan, D. M. (1996). What do alternative sanctions mean? 63 U. Chicago Law Review, 591, 603–604.
Kalakota, R., & Whinston, A. B. (1996). Frontiers of electronic commerce. New York: Addison-Wesley.
Katz, I. (2005, February 5). Suit against bank of America to highlight cybercriminal issues. Knight Ridder Tribune Business News, 1.
Kendall, N. (2009, August 1). What the cybercrime fraudsters get up to. Times Online. http://www.timesonline.co.uk/tol/news/uk/crime/article6735761.ece.
Kshetri, N. (2005, May/June). Hacking the odds. Foreign Policy, 93.
Kshetri, N. (2006). The simple economics of cybercrimes, IEEE Security and Privacy, 4(1), 33–39. CrossRef
Lack, K. (2002). Why directors could end up behind bars quicker than the cyber criminal. Credit Control, 23(3), 4–9.
Larsen, E., & Lomi, A. (2002). Representing change: A system model of organizational inertia and capabilities as dynamic accumulation processes. Simulation Model Practice and Theory, 10(5), 271–296. CrossRef
Marshall, A. (1890). Principles of economics. London: Macmillan.
Marshall, A. (1920). Principles of economics (8th ed.). London: Macmillan.
McCabe, S. (2000, April 24). Cyber-vandals: Is hacking a crime? Junior Scholastic, 102(17), 4–5.
McCord, E. S., Ratcliffe, J. H., Garcia, R. M., & Taylor, R. B. (2007). Nonresidential crime attractors and generators elevate perceived neighborhood crime and incivilities. Journal of Research in Crime and Delinquency, 44(3), 295–320. CrossRef
McDonald, C. G., & Slawson, J., & Carlos, V. (2002, October). Reputation in an internet auction market economic inquiry, 40(4), 633–650.
Messmer, E. (2009, October 6). Malware flea market pays hackers to hijack PCs. The Industry Standard. http://www.thestandard.com/news/2009/10/06/malware-flea-market-pays-hackers-hijack-pcs. Accessed 21 October 2009.
Morton, F. S. (2006). Consumer benefit from use of the internet. NBER Innovation Policy & the Economy, 6(1), 67–90.
National Center for Policy Analysis. (2002). Crime and Punishment in Texas: Update. http://www.ncpa.org/pub/st/st202/st202c.html. Accessed 21 September 2006.
New Zealand Ministry of Justice. (2008). Crime Prevention Unit Organised Crime: Organised Crime Strategy Developing a whole of government approach to combat organised crime, March 2008–June 2009. http://www.justice.govt.nz/cpu/organised-crime/strategy.html. Accessed 21 September 2008.
Noda, T., & Collis, D. J. (2001). The evolution of intraindustry firm heterogeneity: Insights from a process study. Academy of Management Journal, 44(4), 897–925. CrossRef
North, D. C. (1990). Institutions, institutional change and economic performance. Cambridge, UK: Cambridge University Press.
Orlans, H. (2002). Telecommunication crime. Change, 34(1), 8.
Poulsen, K. (2009, October 27). Cybercrooks trick Gawker into serving Malware-Laced Ad. wired.com. http://www.wired.com/threatlevel/2009/10/gawker/. Accessed 27 October 2009.
Property Rights & Competition. (2000). Institutions and order, 43–62.
Putnam, R. (2000). Bowling alone. New York: Touchstone Press.
Rogers, E. M. (1995). Diffusion of innovation (4th ed.). New York: Free Press.
Romer, P. M. (1986). Increasing return and long-run growth. Journal of Political Economy, 94, 1002–1037. CrossRef
Rubenking, N. J. (2009, July 10). Top cybercrime fighters discuss their trade. PC Magazine.com.
Ruse, M. (1998). Taking Darwin seriously; a naturalistic approach to philosophy. Cambridge: Cambridge University Press.
Ruse, M., & Maienschein, J. (Eds.). (1999). Biology and the foundation of ethics. Cambridge: Cambridge University Press.
Sah, R. (1991). Social osmosis and patterns of crime. Journal of Political Economy, 99(6), 169–217. CrossRef
Schuerman, L., & Kobrin, S. (1986). Community careers in crime. In A. J. Reiss, Jr., & M. Tonry (Eds.), Communities and crime (pp. 67–100). Chicago: University of Chicago Press.
Scott, R. (1995). Institutions and organizations. Thousand Oaks, CA: Sage.
Scott, R. (2001). Institutions and organizations. Thousand Oaks, CA: Sage.
Serio, J. D., & Gorkin, A. (2003). Changing lenses: Striving for sharper focus on the nature of the ‘Russian Mafia’ and its impact on the computer realm. International Review of Law, Computers and Technology, 17(2), 191–202. CrossRef
Shubert, A. (2003, February 6). Taking a swipe at cyber card fraud. CNN.com. http://www.cnn.com/2003/WORLD/asiapcf/southeast/02/06/indonesia.fraud. Accessed 21 September 2006.
Skorodumova, O. (2004). Hackers as information space phenomenon. Social Sciences, 35(4), 105–113.
Smith, T. (2003, October 27). Technology; Brazil becomes a cybercrime lab. http://query.nytimes.com/gst/fullpage.html?res=9F02E3DA1131F934A15753C1A9659C8B63&sec=&spon=&pagewanted=2. Accessed 21 September 2006.
Strader, T. J., & Shaw, M. J. (1999). Consumer cost differences for traditional and ecommerce. Internet Research, 9, 82–92. CrossRef
Sulaiman, H. (2007, October 15). Quest to fight cybercrime. New Straits Times, 13.
Swardson, A. (2000). Multi-nation conference confronts cybercrime; Officials warn virus attacks are virtually unpreventable. The Washington Post, A.18.
The Canadian Press. (2008, May 28). Police say banks not reporting cybercrime in effort to protect image. http://canadianpress.google.com/article/ALeqM5jr3niVbLuNtqPL5mrNxhvqw8naRA. Accessed 21 September 2008.
The Chronicle of Higher Education. (2007, January 5). We must educate young people about cybercrime before they start college. Chronicle of Higher Education, 53(18), B.29.
US Fed News Service, Including US State News. (2005, May 20). Cracking down on cyber crime. Washington, DC.
US Fed News Service, Including US State News. (2007, June 4). Sen. Biden: New FBI crime report should be a wake-up call to Bush administration.
Vallance, C. (2008, February 21). The battle against the botnet hordes. http://news.bbc.co.uk/1/hi/technology/7256501.stm. Accessed 21 September 2008.
Vardi, N. (2005, July 25). Chinese take out. Forbes, 54.
Voigt, K. (2009, June 21). Dangerous Internet search terms grow with cybercrime. CNN.com.
Walden, I. (2005). Crime and security in cyberspace. Cambridge Review of International Affairs, 18(1), 51–68. CrossRef
Walker, C. (2004, June). Russian Mafia Extorts Gambling Websites. http://www.americanmafia.com/cgi/clickcount.pl?url=www.americanmafia.com/Feature_Articles_270.html. Accessed 27 October 2005.
Weisburd, D., Bushway, S., Lum, C., & Yang, S. M. (2004). Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology, 42(2), 283–320. CrossRef
Williamson, O. E. (1975). Markets and hierarchies: Analysis and antitrust implications. New York: Free Press.
Williamson, O. E. (1985). The economic institutions of capitalism. New York: Free Press.
Wylie, I. (2007, December 26). Internet; Romania home base for EBay scammers; The auction website has dispatched its own cyber-sleuth to help police crack fraud rings. Los Angeles Times, C.1.
Zittrain, J. (2006). The generative internet. Harvard Law Review, 119(7), 1974–2040.
- Increasing Returns and Externality in Cybercrimes
Dr. Nir Kshetri
- Springer Berlin Heidelberg
- Chapter 4