Skip to main content

2010 | OriginalPaper | Buchkapitel

2. Simple Economics of Cybercrime and the Vicious Circle

verfasst von : Dr. Nir Kshetri

Erschienen in: The Global Cybercrime Industry

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cybercrimes are becoming increasingly pervasive and sophisticated and have more severe economic impacts than most conventional crimes. Technology and skill-intensiveness; a higher degree of globalization than conventional crimes; and the newness make cybercrimes structurally different. In this chapter, we examine how characteristics of cyber-criminals, cybercrime-victims, and law-enforcement agencies have reinforced each other and formed the vicious circle. Next, we build on key elements of the vicious circle and some additional characteristics of cybercrimes to assess the cost–benefit calculus of a hacker.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Adams, J. (2001, May/June). Virtual defense. Foreign Affairs, 98–112. Adams, J. (2001, May/June). Virtual defense. Foreign Affairs, 98–112.
Zurück zum Zitat Aguilar-Millan, S., Foltz, J. E., Jackson, J., & Oberg, A. (2008). The globalization of crime. Futurist, 42(6), 41–50. Aguilar-Millan, S., Foltz, J. E., Jackson, J., & Oberg, A. (2008). The globalization of crime. Futurist, 42(6), 41–50.
Zurück zum Zitat Alexander, D. (2002, June). Policing and the global paradox. FBI Law Enforcement Bulletin, 71(6), 6–13, 00145688. Alexander, D. (2002, June). Policing and the global paradox. FBI Law Enforcement Bulletin, 71(6), 6–13, 00145688.
Zurück zum Zitat Anderson, R., & Schneier, B. (2005). Counterpane internet security guest editors introduction: Economics of information security. IEEE Security & Privacy, 3(1), 12–13.CrossRef Anderson, R., & Schneier, B. (2005). Counterpane internet security guest editors introduction: Economics of information security. IEEE Security & Privacy, 3(1), 12–13.CrossRef
Zurück zum Zitat Andrews, L. (2009, June 9) Online scams go unreported and unpunished. Cybercriminals beating the law Canberra Times (Australia) SECTION: A, p. 5. Andrews, L. (2009, June 9) Online scams go unreported and unpunished. Cybercriminals beating the law Canberra Times (Australia) SECTION: A, p. 5.
Zurück zum Zitat Barnes, D. A. (2004). Note, Deworming the Internet, 83 TEX. L. REV. 279, 322–329. Barnes, D. A. (2004). Note, Deworming the Internet, 83 TEX. L. REV. 279, 322–329.
Zurück zum Zitat Bauerly, R. J. (2009). Online auction fraud and ebay. Marketing Management Journal, 19(1), 133–143. Bauerly, R. J. (2009). Online auction fraud and ebay. Marketing Management Journal, 19(1), 133–143.
Zurück zum Zitat Becker, G. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76(2), 169–217.CrossRef Becker, G. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76(2), 169–217.CrossRef
Zurück zum Zitat Bell, R. E. (2002). The prosecution of computer crime. Journal of Financial Crime, 9(4), 308–325.CrossRef Bell, R. E. (2002). The prosecution of computer crime. Journal of Financial Crime, 9(4), 308–325.CrossRef
Zurück zum Zitat Birmingham Post. (2007). Politics: Cybercrime victim every 10 seconds, 4. Birmingham Post. (2007). Politics: Cybercrime victim every 10 seconds, 4.
Zurück zum Zitat Blitstein, R. (2007, November 14). Cybercops: US targets terrorists as online thieves run amok. San Jose Mercury News. Blitstein, R. (2007, November 14). Cybercops: US targets terrorists as online thieves run amok. San Jose Mercury News.
Zurück zum Zitat Boal, M. (2005). Being Bill Gates Steven Spielberg, Martha Stewart, George Soros Charles Schwab: How the Most Brazen Identity Thief In US Almost Get Away With It. Readers Digest, 161–173. Boal, M. (2005). Being Bill Gates Steven Spielberg, Martha Stewart, George Soros Charles Schwab: How the Most Brazen Identity Thief In US Almost Get Away With It. Readers Digest, 161–173.
Zurück zum Zitat Bottoms, A. E., & Wiles, P. (2002). Environmental criminology. Oxford Handbook of Criminology, 620–656. Bottoms, A. E., & Wiles, P. (2002). Environmental criminology. Oxford Handbook of Criminology, 620–656.
Zurück zum Zitat Brenner, S. W. (2004). Toward a criminal law for cyberspace: A new model of law enforcement? 30 Rutgers Computer and Technology Law Journal, 30, 1–9. Brenner, S. W. (2004). Toward a criminal law for cyberspace: A new model of law enforcement? 30 Rutgers Computer and Technology Law Journal, 30, 1–9.
Zurück zum Zitat Browning, C. R, Feinberg, S. L., & Dietz, R. D. (2004). The paradox of social organization: Networks, collective efficacy, and violent crime in urban neighborhoods. Social Forces, 83(2), 503–534.CrossRef Browning, C. R, Feinberg, S. L., & Dietz, R. D. (2004). The paradox of social organization: Networks, collective efficacy, and violent crime in urban neighborhoods. Social Forces, 83(2), 503–534.CrossRef
Zurück zum Zitat Bryan-Low, C. (2005, July 13). Fraud Inc.: As identity theft moves online, crime rings mimic big business; Russian-led Carderplanet steals account numbers; Mr. Havard hits ATMs; ‘Common Punk’ to ‘Capo’. Wall Street Journal, A.1. Bryan-Low, C. (2005, July 13). Fraud Inc.: As identity theft moves online, crime rings mimic big business; Russian-led Carderplanet steals account numbers; Mr. Havard hits ATMs; ‘Common Punk’ to ‘Capo’. Wall Street Journal, A.1.
Zurück zum Zitat Bulkeley, W. M. (2008). Quiz; Tech IQ: How well do you know...the digital world. Wall Street Journal, R.14. Bulkeley, W. M. (2008). Quiz; Tech IQ: How well do you know...the digital world. Wall Street Journal, R.14.
Zurück zum Zitat Casey, E. (2004). Digital evidence and computer crime. Cambridge: Academic Press. Casey, E. (2004). Digital evidence and computer crime. Cambridge: Academic Press.
Zurück zum Zitat Chretien, K. C., Ryan, G. S., Chretien, J. P., & Kind, T. (2009). Online posting of unprofessional content by medical students. JAMA, 302(12), 1309–1315.CrossRef Chretien, K. C., Ryan, G. S., Chretien, J. P., & Kind, T. (2009). Online posting of unprofessional content by medical students. JAMA, 302(12), 1309–1315.CrossRef
Zurück zum Zitat Clarke, R. V. (1983). Situational crime prevention: Its theoretical basis and practical scope. In M. Tonry & N. Morris (Eds.), Crime and justice: An annual review of research (p. 14). Chicago: University of Chicago Press. Clarke, R. V. (1983). Situational crime prevention: Its theoretical basis and practical scope. In M. Tonry & N. Morris (Eds.), Crime and justice: An annual review of research (p. 14). Chicago: University of Chicago Press.
Zurück zum Zitat Clarke, R. V. (1995). Situational crime prevention. In M. Tonry & D. P. Farrington (Eds.), Building a safer society. Strategic approaches to crime (pp. 91–150). University of Chicago Press. Clarke, R. V. (1995). Situational crime prevention. In M. Tonry & D. P. Farrington (Eds.), Building a safer society. Strategic approaches to crime (pp. 91–150). University of Chicago Press.
Zurück zum Zitat Clarke, R. V. (1999). Hot products: Understanding, anticipating, and reducing demand for stolen goods. Police Research Paper 112. London: Home Office. Clarke, R. V. (1999). Hot products: Understanding, anticipating, and reducing demand for stolen goods. Police Research Paper 112. London: Home Office.
Zurück zum Zitat Clemons, E. K. (2007). An empirical investigation of third-party seller rating systems in e-commerce: The case of buySAFE. Journal of Management Information Systems, 24(2), 43–71.CrossRef Clemons, E. K. (2007). An empirical investigation of third-party seller rating systems in e-commerce: The case of buySAFE. Journal of Management Information Systems, 24(2), 43–71.CrossRef
Zurück zum Zitat Dawkins, R. (1982). The extended phenotype. Oxford University Press. Dawkins, R. (1982). The extended phenotype. Oxford University Press.
Zurück zum Zitat de Jong, W. M. (2001). Manipulative tactics in budgetary games: The art and craft of getting the money you don’t deserve. Knowledge, Technology & Policy, Spring, 14(1), 50–66. de Jong, W. M. (2001). Manipulative tactics in budgetary games: The art and craft of getting the money you don’t deserve. Knowledge, Technology & Policy, Spring, 14(1), 50–66.
Zurück zum Zitat Deas, D., & Thomas, S. (2002). Comorbid psychiatric factors contributing to adolescent alcohol and other drug use. Alcohol Research and Health, 26, 116–121. Deas, D., & Thomas, S. (2002). Comorbid psychiatric factors contributing to adolescent alcohol and other drug use. Alcohol Research and Health, 26, 116–121.
Zurück zum Zitat Dellarocas, C., & Wood, C. A. (2008). The sound of silence in online feedback: Estimating trading risks in the presence of reporting bias. Management Science, 54(3), 460–476.CrossRef Dellarocas, C., & Wood, C. A. (2008). The sound of silence in online feedback: Estimating trading risks in the presence of reporting bias. Management Science, 54(3), 460–476.CrossRef
Zurück zum Zitat Downes, L. (2007, March 6). Cybercrime treaty: What it means to you. Baseline.com. Downes, L. (2007, March 6). Cybercrime treaty: What it means to you. Baseline.com.
Zurück zum Zitat Edelman, B. (2007, January 25). Why I can never agree with adware and spyware. The Guardian. Edelman, B. (2007, January 25). Why I can never agree with adware and spyware. The Guardian.
Zurück zum Zitat Ehrlich, I. (1996). Crime, punishment, and the market for offenses. Journal of Economic Perspectives, 10(1), 43–67. Ehrlich, I. (1996). Crime, punishment, and the market for offenses. Journal of Economic Perspectives, 10(1), 43–67.
Zurück zum Zitat Ehrlich, I., & Becker, G. (1972). Market insurance, serf-insurance and serf-protection. Journal of Political Economy, 80(4), 623–648.CrossRef Ehrlich, I., & Becker, G. (1972). Market insurance, serf-insurance and serf-protection. Journal of Political Economy, 80(4), 623–648.CrossRef
Zurück zum Zitat Fest, G. (2005, September 1). Offshoring: Feds take fresh look at India BPOs; Major theft has raised more than a few eyebrows. Bank Technology News, 18(9), 1. Fest, G. (2005, September 1). Offshoring: Feds take fresh look at India BPOs; Major theft has raised more than a few eyebrows. Bank Technology News, 18(9), 1.
Zurück zum Zitat Fong, C. (2008, May 8). Fighting the agents of organized cybercrime. CNN.com. Fong, C. (2008, May 8). Fighting the agents of organized cybercrime. CNN.com.
Zurück zum Zitat Foreign Policy. (2005, March/April). Caught in the net: Australian teens, 92. Foreign Policy. (2005, March/April). Caught in the net: Australian teens, 92.
Zurück zum Zitat Gabrys, E. (2002). The international dimensions of cyber-crime, Part 1. Information Systems Security, 11(4), 21–32.CrossRef Gabrys, E. (2002). The international dimensions of cyber-crime, Part 1. Information Systems Security, 11(4), 21–32.CrossRef
Zurück zum Zitat GAO Reports. (2007). Public and private entities face challenges in addressing cyber threats, RPT-NUMBER: GAO-07-705. GAO Reports. (2007). Public and private entities face challenges in addressing cyber threats, RPT-NUMBER: GAO-07-705.
Zurück zum Zitat Giannangeli, M. (2008, June 8). Are we ready for Russian Mafia’s crime revolution? Sunday Express, Scottish Edition, 3. Giannangeli, M. (2008, June 8). Are we ready for Russian Mafia’s crime revolution? Sunday Express, Scottish Edition, 3.
Zurück zum Zitat Glaeser, E. L., & Sacerdote, B. (1999). Why is there more crime in cities? The Journal of Political Economy, 107(6), Part 2, 225–258. Glaeser, E. L., & Sacerdote, B. (1999). Why is there more crime in cities? The Journal of Political Economy, 107(6), Part 2, 225–258.
Zurück zum Zitat Grow, B., & Bush, J. (2005, May 30). Hacker hunters. Business Week, 74. Grow, B., & Bush, J. (2005, May 30). Hacker hunters. Business Week, 74.
Zurück zum Zitat Harler, C., & Fox, B. (1992). Network security communications news. Nokomis, 29(1), 20–24. Harler, C., & Fox, B. (1992). Network security communications news. Nokomis, 29(1), 20–24.
Zurück zum Zitat Hawkins, J. D., Herrenkohl, T., Farrington, D. P., Brewer, D., Catalano, R., & Harachi, T. W. (1998). A review of predictors of youth violence. In R. Loeber & D. P. Harrington (Eds.), Serious & violent juvenile offenders: Risk factors and successful interventions (pp. 106–146). Thousand Oaks, CA: Sage. Hawkins, J. D., Herrenkohl, T., Farrington, D. P., Brewer, D., Catalano, R., & Harachi, T. W. (1998). A review of predictors of youth violence. In R. Loeber & D. P. Harrington (Eds.), Serious & violent juvenile offenders: Risk factors and successful interventions (pp. 106–146). Thousand Oaks, CA: Sage.
Zurück zum Zitat Hirschauer, N., & Musshoff, O. (2007). A game-theoretic approach to behavioral food risks: The case of grain producers. Food Policy, 32(2), 246–265.CrossRef Hirschauer, N., & Musshoff, O. (2007). A game-theoretic approach to behavioral food risks: The case of grain producers. Food Policy, 32(2), 246–265.CrossRef
Zurück zum Zitat Ismail, I. (2008, February 18). Understanding cybercriminals. New Straits Times (Malaysia), 12. Ismail, I. (2008, February 18). Understanding cybercriminals. New Straits Times (Malaysia), 12.
Zurück zum Zitat Jones, B. R. (2007). Comment: Virtual neighborhood watch: Open source software and community policing against cybercrime. Journal of Criminal Law & Criminology, 97(2), 601–629. Jones, B. R. (2007). Comment: Virtual neighborhood watch: Open source software and community policing against cybercrime. Journal of Criminal Law & Criminology, 97(2), 601–629.
Zurück zum Zitat Kallman, E. A., & Grillo, J. P. (1996). Ethical decision making and information technology, 2e. New York: McGraw Hill. Kallman, E. A., & Grillo, J. P. (1996). Ethical decision making and information technology, 2e. New York: McGraw Hill.
Zurück zum Zitat Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149(4), 1003–1114. Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149(4), 1003–1114.
Zurück zum Zitat Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541–562.CrossRef Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541–562.CrossRef
Zurück zum Zitat Kupersmidt, J. B., Griesler, P. C., DeRosier, M. E., Patterson, C. J., & Davis, P. W. (1995). Childhood aggression and peer relations in the context of family and neighborhood factors. Child Development, 66, 360–375.CrossRef Kupersmidt, J. B., Griesler, P. C., DeRosier, M. E., Patterson, C. J., & Davis, P. W. (1995). Childhood aggression and peer relations in the context of family and neighborhood factors. Child Development, 66, 360–375.CrossRef
Zurück zum Zitat Lagu, T., Kaufman, E. J., & Asch, D. A. (2008). Armstrong, K. Content of weblogs written by health professionals. Journal of General Internal Medicine, 23(10), 1642–1646.CrossRef Lagu, T., Kaufman, E. J., & Asch, D. A. (2008). Armstrong, K. Content of weblogs written by health professionals. Journal of General Internal Medicine, 23(10), 1642–1646.CrossRef
Zurück zum Zitat Larkin, E. (2009). Organized crime moves into data theft. PC World, 27(7), 33–34. Larkin, E. (2009). Organized crime moves into data theft. PC World, 27(7), 33–34.
Zurück zum Zitat Larsen, E., & Lomi, A. (2002). Representing change: A system model of organizational inertia and capabilities as dynamic accumulation processes. Simulation Model Practice and Theory, 10(5), 271–296.CrossRef Larsen, E., & Lomi, A. (2002). Representing change: A system model of organizational inertia and capabilities as dynamic accumulation processes. Simulation Model Practice and Theory, 10(5), 271–296.CrossRef
Zurück zum Zitat Lianos, M., & Douglas, M. (2000). Dangerization and the end of deviance. The British Journal of Criminology, 40(2), 261–278. Lianos, M., & Douglas, M. (2000). Dangerization and the end of deviance. The British Journal of Criminology, 40(2), 261–278.
Zurück zum Zitat Matsumoto, K., Ouchi, N., Watanabe, C., & Griffy-Brown, C. (2002). Optimal timing of the development of innovative goods with generation. Technovation, 22(3), 175–185.CrossRef Matsumoto, K., Ouchi, N., Watanabe, C., & Griffy-Brown, C. (2002). Optimal timing of the development of innovative goods with generation. Technovation, 22(3), 175–185.CrossRef
Zurück zum Zitat McCarthy, B. (2002). New economics of sociological criminology. Annual Review of Sociology, 28, 417–442. McCarthy, B. (2002). New economics of sociological criminology. Annual Review of Sociology, 28, 417–442.
Zurück zum Zitat McCleary, R. M. (2008). Religion and economic development. Policy Review, 148, 45–57. McCleary, R. M. (2008). Religion and economic development. Policy Review, 148, 45–57.
Zurück zum Zitat McCord, E. S., Ratcliffe, J. H., Garcia, R. M., & Taylor, R. B. (2007). Nonresidential crime attractors and generators elevate perceived neighborhood crime and incivilities. Journal of Research in Crime and Delinquency, 44(3), 295–320.CrossRef McCord, E. S., Ratcliffe, J. H., Garcia, R. M., & Taylor, R. B. (2007). Nonresidential crime attractors and generators elevate perceived neighborhood crime and incivilities. Journal of Research in Crime and Delinquency, 44(3), 295–320.CrossRef
Zurück zum Zitat McDonald, C. G., Slawson, C. V., Jr. (2002, October). Reputation in an internet auction market. Economic Inquiry, 40(4), 633–650.CrossRef McDonald, C. G., Slawson, C. V., Jr. (2002, October). Reputation in an internet auction market. Economic Inquiry, 40(4), 633–650.CrossRef
Zurück zum Zitat McIllwain, J. S. (2005). Intellectual property theft and organized crime: The case of film piracy. Trends in Organized Crime, 8(4), 15–39.CrossRef McIllwain, J. S. (2005). Intellectual property theft and organized crime: The case of film piracy. Trends in Organized Crime, 8(4), 15–39.CrossRef
Zurück zum Zitat Merton, R. (1968). Social theory and social structure. New York: Free Press. Merton, R. (1968). Social theory and social structure. New York: Free Press.
Zurück zum Zitat Mikos, R. A. (2006). “Eggshell” victims, private precautions, and the societal benefits of shifting crime. Michigan Law Review, 105(2), 307–351. Mikos, R. A. (2006). “Eggshell” victims, private precautions, and the societal benefits of shifting crime. Michigan Law Review, 105(2), 307–351.
Zurück zum Zitat Miller, N. (2008). Casting a wide net for cyber crimes. The Age. Melbourne, Australia. Miller, N. (2008). Casting a wide net for cyber crimes. The Age. Melbourne, Australia.
Zurück zum Zitat Morgan, P. M. (2005). Taking the long view of deterrence. Journal of Strategic Studies, 28(5), 751–763.CrossRef Morgan, P. M. (2005). Taking the long view of deterrence. Journal of Strategic Studies, 28(5), 751–763.CrossRef
Zurück zum Zitat Nagin, D. S. (1998). Criminal deterrence–research at the outset of the twenty-first century. In M. Tondry (Ed.), Crime and justice: A review of research, 23, 1–42. Nagin, D. S. (1998). Criminal deterrence–research at the outset of the twenty-first century. In M. Tondry (Ed.), Crime and justice: A review of research, 23, 1–42.
Zurück zum Zitat Oberwittler, D. (2007). The effects of neighborhood poverty on adolescent problem behaviors: A multi-level analysis differentiated by gender and ethnicity. Housing Studies, 22, 781–803.CrossRef Oberwittler, D. (2007). The effects of neighborhood poverty on adolescent problem behaviors: A multi-level analysis differentiated by gender and ethnicity. Housing Studies, 22, 781–803.CrossRef
Zurück zum Zitat Probasco, J., Clark, R., & Davis, W. L. (1995). A human capital perspective on criminal careers. Journal of Applied Business Research, 11(3), 58–64. Probasco, J., Clark, R., & Davis, W. L. (1995). A human capital perspective on criminal careers. Journal of Applied Business Research, 11(3), 58–64.
Zurück zum Zitat Richtel, M. (1999, June 2). Federal cybercrime unit hunts for hackers. New York Times, A16. Richtel, M. (1999, June 2). Federal cybercrime unit hunts for hackers. New York Times, A16.
Zurück zum Zitat Salu, A. O. (2004). Online crimes and advance fee fraud in nigeria – Are available legal remedies adequate? Journal of Money Laundering Control, 8(2), 159–167.CrossRef Salu, A. O. (2004). Online crimes and advance fee fraud in nigeria – Are available legal remedies adequate? Journal of Money Laundering Control, 8(2), 159–167.CrossRef
Zurück zum Zitat Schuerman, L., & Kobrin, S. (1986). Community careers in crime. In A. J. Reiss, Jr. & M. Tonry (Eds.), Communities and crime (pp. 67–100). Chicago: University of Chicago Press. Schuerman, L., & Kobrin, S. (1986). Community careers in crime. In A. J. Reiss, Jr. & M. Tonry (Eds.), Communities and crime (pp. 67–100). Chicago: University of Chicago Press.
Zurück zum Zitat Serio, J. D., & Gorkin, A. (2003). Changing lenses: Striving for sharper focus on the nature of the ‘Russian Mafia’ and its impact on the computer realm. International Review of Law, Computers and Technology, 17(2), 191–202. Serio, J. D., & Gorkin, A. (2003). Changing lenses: Striving for sharper focus on the nature of the ‘Russian Mafia’ and its impact on the computer realm. International Review of Law, Computers and Technology, 17(2), 191–202.
Zurück zum Zitat Shelley, L. I. (1998). Crime and corruption in the digital age. Journal of International Affairs, 51(2), 605–620. Shelley, L. I. (1998). Crime and corruption in the digital age. Journal of International Affairs, 51(2), 605–620.
Zurück zum Zitat Sutherland, B. (2008). The Rise of Black Market Data; Criminals who steal personal data often don’t exploit it. Instead, they put it up for sale on one of the many vibrant online markets. Newsweek (International ed.), 152(24). Sutherland, B. (2008). The Rise of Black Market Data; Criminals who steal personal data often don’t exploit it. Instead, they put it up for sale on one of the many vibrant online markets. Newsweek (International ed.), 152(24).
Zurück zum Zitat Swope, R. E. (2001). Criminal theory on the street: Analyzing why offenses take place. Law and Order, 49(6), 121–128. Swope, R. E. (2001). Criminal theory on the street: Analyzing why offenses take place. Law and Order, 49(6), 121–128.
Zurück zum Zitat Taylor, R. B., Koons, B., Kurtz, E., Greene, J., & Perkins, D. (1995). Streetblocks with more nonresidential landuse have more physical deterioration: Evidence from baltimore and philadelphia. Urban Affairs Review, 30, 120–136. Taylor, R. B., Koons, B., Kurtz, E., Greene, J., & Perkins, D. (1995). Streetblocks with more nonresidential landuse have more physical deterioration: Evidence from baltimore and philadelphia. Urban Affairs Review, 30, 120–136.
Zurück zum Zitat Thompson, L. A., Dawson, K., & Ferdig, R., Black, E., Boyer, J., & Coutts, J. (2008). The intersection of online social networking with medical professionalism. Journal of General Internal Medicine, 23(7), 954–957.CrossRef Thompson, L. A., Dawson, K., & Ferdig, R., Black, E., Boyer, J., & Coutts, J. (2008). The intersection of online social networking with medical professionalism. Journal of General Internal Medicine, 23(7), 954–957.CrossRef
Zurück zum Zitat Toshiya, K., Susumu, F., & Noriyasu, Y. (2003). A validation on Pareto optimality of Walrasian virtual market. IEIC Technical Report (Institute of Electronics, Information and Communication Engineers), 102(613), 13–18. Toshiya, K., Susumu, F., & Noriyasu, Y. (2003). A validation on Pareto optimality of Walrasian virtual market. IEIC Technical Report (Institute of Electronics, Information and Communication Engineers), 102(613), 13–18.
Zurück zum Zitat Valdez, A., Kaplan, C. D., & Curtis, R. L. (2007). Aggressive crime, alcohol and drug use, and concentrated poverty in 24 US urban areas. American Journal of Drug and Alcohol Abuse, 33, 595–603.CrossRef Valdez, A., Kaplan, C. D., & Curtis, R. L. (2007). Aggressive crime, alcohol and drug use, and concentrated poverty in 24 US urban areas. American Journal of Drug and Alcohol Abuse, 33, 595–603.CrossRef
Zurück zum Zitat Van Koppen, P. J., & Jansen, R. W. J. (1998). The road to the robbery: Travel patterns in commercial robberies. The British Journal of Criminology, 38(2), 230–246. Van Koppen, P. J., & Jansen, R. W. J. (1998). The road to the robbery: Travel patterns in commercial robberies. The British Journal of Criminology, 38(2), 230–246.
Zurück zum Zitat Walden, I. (2005). Crime and security in cyberspace. Cambridge Review of International Affairs, 18(1), 51–68. Walden, I. (2005). Crime and security in cyberspace. Cambridge Review of International Affairs, 18(1), 51–68.
Zurück zum Zitat Wall, D. S. (1998). Catching cybercriminals: Policing the internet. International Review of Law, 12(2), 201–218. Wall, D. S. (1998). Catching cybercriminals: Policing the internet. International Review of Law, 12(2), 201–218.
Zurück zum Zitat Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice & Research, 8(2), 183–205.CrossRef Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice & Research, 8(2), 183–205.CrossRef
Zurück zum Zitat Watanabe, C., & Tokumasu, S. (2003). Optimal timing of R&D for effective utilization of potential resources in innovation. Journal of Advances in Management Research, 1(1), 11–27.CrossRef Watanabe, C., & Tokumasu, S. (2003). Optimal timing of R&D for effective utilization of potential resources in innovation. Journal of Advances in Management Research, 1(1), 11–27.CrossRef
Zurück zum Zitat Webb, J. W., Tihanyi, L., Ireland, R. D., & Sirmon, D. G. (2009). You say illegal, I say legitimate: Entrepreneurship in the informal economy. Academy of Management Review, 34(3), 492–510. Webb, J. W., Tihanyi, L., Ireland, R. D., & Sirmon, D. G. (2009). You say illegal, I say legitimate: Entrepreneurship in the informal economy. Academy of Management Review, 34(3), 492–510.
Zurück zum Zitat Weisburd, D., Bushway, S., Lum, C., & Yang, S. M. (2004). Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology, 42(2), 283–320.CrossRef Weisburd, D., Bushway, S., Lum, C., & Yang, S. M. (2004). Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology, 42(2), 283–320.CrossRef
Zurück zum Zitat Whitlock, R. A. (1979). Witch crazes and drug crazes: A contribution to the social pathology of credulity and scapegoating. Australian Journal of Social, 14(1), 43–54. Whitlock, R. A. (1979). Witch crazes and drug crazes: A contribution to the social pathology of credulity and scapegoating. Australian Journal of Social, 14(1), 43–54.
Zurück zum Zitat Wilson, W. J. (1987). The truly disadvantaged. Chicago: University of Chicago Press. Wilson, W. J. (1987). The truly disadvantaged. Chicago: University of Chicago Press.
Zurück zum Zitat Wylie, I. (2007, December 26). Internet; Romania home base for EBay scammers; The auction website has dispatched its own cyber-sleuth to help police crack fraud rings. Los Angeles Times, C.1. Wylie, I. (2007, December 26). Internet; Romania home base for EBay scammers; The auction website has dispatched its own cyber-sleuth to help police crack fraud rings. Los Angeles Times, C.1.
Zurück zum Zitat Zimmerman, A. (2006, October 25). Creative crooks: As shoplifters use high-tech scams, retail losses rise; Theft rings alter bar codes, work gift-card swindles; Fencing the loot online; Target snares a Lego bandit. Wall Street Journal, A1. Zimmerman, A. (2006, October 25). Creative crooks: As shoplifters use high-tech scams, retail losses rise; Theft rings alter bar codes, work gift-card swindles; Fencing the loot online; Target snares a Lego bandit. Wall Street Journal, A1.
Metadaten
Titel
Simple Economics of Cybercrime and the Vicious Circle
verfasst von
Dr. Nir Kshetri
Copyright-Jahr
2010
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-11522-6_2