Weitere Kapitel dieses Buchs durch Wischen aufrufen
Cybercrime’s footprints across the developing world are getting bigger. In this chapter, we examine the structure of cybercrimes in developing economies. Specifically, we analyze economic and institutional factors facing cyber-criminals and potential victims in the developing world. The findings indicate that formal institutions related to cybercrimes are thin and dysfunctional in a developing economy; a cyber-criminal is less likely to be stigmatized in a developing economy than in a developed economy; and organizations’ and individuals’ technological and behavioral defense mechanisms are likely to be weaker in a developing economy than in a developed economy.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Acohido, B., & Swartz, J. (2005, July 11). Cybercrooks lure citizens into international crime. USA Today. http://www.usatoday.com/tech/news/2005-07-10-cyber-mules-cover_x.htm. Accessed 5 October 2009.
Adams, J. (2001, May/June). Virtual defense. Foreign Affairs, 98–112.
Africa News. (2007, October 24). South Africa; Internet banking fraud on the increase.
Aggarwal, V. (2009, August 3). Cyber crime’s rampant. Express Computer. http://www.expresscomputeronline.com/20090803/market01.shtml. Accessed 27 October 2009.
Arnott, S. (2008, March 22). Cyber crime stays one step ahead. http://www.independent.co.uk/news/business/analysis-and-features/cyber-crime-stays-one-step-ahead-799395.html. Accessed 27 October 2009.
Asia Pulse. (2007, November 6). Cybercrime cost is a burden on developing countries: Bangladesh.
Baumol, W. J. (1990). Entrepreneurship: Productive, unproductive, and destructive. Journal of Political Economy, 98 (5), 893–921. CrossRef
BBC Monitoring International Reports. (2006, September 30). Kazakhstan Russian police chief urges cis efforts against cybercrime.
BBC Monitoring South Asia. (2007, September 15). India takes steps to tackle cybercrime.
Becker, G. S. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76, 169–217. CrossRef
Blau, J. (2004, May 28). Viruses: From Russia, with love? IDG News Service. http://www.pcworld.com/news/article/0,aid,116304,00.asp. Accessed 27 October 2005.
Brandt, R. L. (2007). Ivan Krstic, 21. Technology Review, 110(5), 54–55.
Brown, L., Malecki, E., & Spector, A. (1976). Adopter Categories in a Spatial Context: Alternative explanations for an empirical regularity. Rural Sociology, 41, 99–118.
Browning, C. R., Feinberg, S. L., & Dietz, R. D. (2004). The paradox of social organization: Networks, collective efficacy, and violent crime in urban neighborhoods. Social Forces, 83(2), 503–534. CrossRef
Business Daily Update. (2006, September 28). China tops globe in robot PCs.
Business Wire. (2006, November 20). SMBs in Brazil to Spend $260USM on IT Security in 2007; – Up to 72% of Brazil-based MBs Cited Enhanced Data Security and Privacy as Key Factors Influencing IT Purchases, AMI Partners Study Finds.
caribbean360.com. (2009, September 28). Regional cyber lab opens in Antigua. http://www.caribbean360.com/News/Caribbean/Stories/2009/09/28/NEWS0000008964.html. Accessed 27 October 2009.
Chan, I. (2007, July 26). China’s Disturbing Broadband Decline: A digital divide between saturated urban areas and underserved rural markets is behind the slowdown. http://www.businessweek.com/globalbiz/content/jul2007/gb20070726_579284.htm?campaign_id=rss_as. Accessed 27 October 2009.
China Daily. (2008, May 5). China gets its game on. http://www.chinadaily.com.cn/bizchina/2008-05/05/content_6661519.htm. Accessed 2 October 2008.
Claburn, T. (2008, April 9). The Cybercrime Economy. http://www.informationweek.com/blog/main/archives/2008/04/the_cyber_crime.html. Accessed 7 October 2008.
Clark, D. (2008). PC makers race to market with low-cost ‘Netbooks’. Wall Street Journal (Eastern edition), B.1.
Clark, E., & Soulsby, A. (1999). Organisational change in post-communist Europe. London: Routledge.
COMMWEB. (2007, January 4). India will train police to catch cybercriminals.
Cone, E. (2005). Is offshore BPO running around? CIO Insight, 53, 22.
Conti, M. K. C. (2007). Firms warned vs. cybercrimes. BusinessWorld, S1/7.
Cuéllar, M. (2004). The mismatch between state power and state capacity in transnational law enforcement. Berkeley Journal of International Law, 22(1), 15–58.
Dairy Industries International. (1998). No fuss printing basics assist third world trade, 63(2), 48.
Darmosumarto, S. (2003, December 8). Battle on Internet credit card fraud still long. The Jakarta Post. http://www.crime-research.org/news/2003/12/Mess0802.html. Accessed 27 October 2005.
Denardis, L. (2007, November 11). Internet standards and developing countries: Problems and opportunities. Giganet second annual symposium, Rio De Janeiro, Brazil. http://www.igloo.org/community.igloo?r0=community-download&r0_script=/scripts/document/download.script&r0_pathinfo=%2F%7B58dacb33-31ea-4219-9124-89a75ffe71d0%7D%2FPublic%20Library%2Fpapers∼1%2Fdenardis&r0_output=xml. Accessed 27 October 2009.
Deshpande, S. (2009, October 28) New cyber law casts its net wide. The Economic Times. http://economictimes.indiatimes.com/infotech/internet/New-cyber-law-casts-its-net-wide-/articleshow/5170897.cms. Accssed 29 October 2009.
Deutsch, J., Hakim, S., & Weinblatt, J. (1984). Interjurisdictional criminal mobility: A theoretical perspective. Urban Studies, 21, 451–458. CrossRef
Duggal, P. (2004). What’s wrong with our cyber laws? http://www.expresscomputeronline.com/20040705/newsanalysis01.shtml
Duncan, R. (1994). Who wants to stop the church: Homosexual rights, legislation, public policy, and religious freedom. Notre Dame Law Review, 69, 393.
Ehrlich, I. (1973). Participation in illegitimate activities: A theoretical and empirical investigation. Journal of Political Economy, 81, 521–565. CrossRef
Ehrlich, I. (1996). Crime, punishment, and the market for offenses? Journal of Economic Perspectives, 10(1), 43–67.
Europemedia. (2002, June 13). Terrorist attacks mean bid e-security spending, 1.
Evans, J. (2000). Cyber-crime laws emerge, but slowly. http://archives.cnn.com/2000/TECH/computing/07/05/cyber.laws.idg. Accessed 27 October 2005.
Expressindia. (2008, January 7). Cyber crime in India on the decline: Report. http://www.expressindia.com/latest-news/Cyber-crime-in-India-on-the-decline-Report/258638/.
Fest, G. (2005). Offshoring: Feds take fresh look at India BPOs; Major theft has raised more than a few eyebrows. Bank Technology News, 18(9), 1.
Fong, C. (2008, May 8). Fighting the agents of organized cybercrime. http://www.cnn.com/2008/TECH/05/08/digitalbiz.cybercrime. Accessed 27 October 2009.
Frayssine, F. (2007). Latin America: New ‘Cyber Paradise’ for Paedophiles and Racists? ipsnews.net http://ipsnews.net/news.asp?idnews=40072. Accessed 11 April 2010.
Freeman, S., Grogger, J., & Sonstelie, J. (1996). The spatial concentration of crime. Journal of Urban Economics, 40(2), 216–231. CrossRef
Gatignon, H., & Robertson, T. S. (1985). A propositional inventory for new diffusion research. Journal of Consumer Research, 11, 849–867. CrossRef
Giannangeli, M. (2008). Are we ready for Russian Mafia’s crime revolution? Sunday Express, Scottish Edition, 4.
Gohring, N. (2008, June 25). Woman gets two years for aiding Nigerian internet check scam. PC World. http://www.pcworld.com/businesscenter/article/147575/woman_gets_two_years_for_aiding_nigerian_internet_check_scam.html.
Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2, 13–20. CrossRef
Greenberg, A. (2007, July 17). The top countries for cybercrime. Forbes.com. http://www.forbes.com/2007/07/13/cybercrime-world-regions-tech-cx_ag_0716cybercrime.html. Accessed on 9 April 2008.
Hamner, K. M. (1992). Gay-bashing: A social identity analysis of violence against Lesbians and Gay Men. In G. M. Herek & K. Berrill (Eds.), Hate crimes: Confronting violence against Lesbians and Gay Men (pp. 179–190). Newbury Park, CA: Sage.
Harwood, M. (2008, February 22). Quebec police break up hacking syndicate. Security Management. http://www.securitymanagement.com/news/quebec-police-break-hacking-syndicate.
Hawser, A. (2007). Banks on the spot over internet fraud. Global Finance, 21(8), 8.
Hindustan Times. (2006, October 22). Securing the web.
Hindu.com. (2008, April 1). Delhi Police to train officers on combating cyber crime. http://www.hindu.com/thehindu/holnus/002200804011653.htm
Hindustan Times. (2009, October 24). Wired for trouble. http://www.tmcnet.com/usubmit/2009/10/24/4442635.htm. Accessed on 29 October 2009.
Hodgson, G. M. (2003). The hidden persuaders: Institutions and individuals in economic theory. Cambridge Journal of Economics, 27, 159–175. CrossRef
Holm, P. (1995). The dynamics of institutionalization: Transformation processes in Norwegian fisheries. Administrative Science Quarterly, 40(3), 398–422. CrossRef
Hope, C. (2008, March 20). UK security threat from cyber crime. http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2008/03/19/nterror319.xml. Accessed 27 October 2008.
Hu, V. T. (2001). Nondiscrimination or secular orthodoxy? Religious freedom and breach of contract at Tufts University. Texas Review of Law & Politics, 6(1), 289–333.
Ibrahim, G., & Galt, V. (2002). Bye-bye central planning, hello market hiccups: Institutional transition in Romania. Cambridge Journal of Economics, 26(1), 105. CrossRef
Indiatimes. (2009, September 24). Phishing attacks on Indian brands rising. Symantec. http://economictimes.indiatimes.com/infotech/software/Phishing-attacks-on-Indian-brands-rising-Symantec/articleshow/5051231.cms. Accessed 27 October 2009.
Indo-Asian News Service. (2007, January 23). Indian IT revenue grows 10-fold in decade. NASSCOM.
Information Today. (2008, February). Challenges in the East. 25(2), 22.
Ismail, I. (2008). Understanding cybercriminals. New Straits Times (Malaysia), 12.
ITU. (2007). World Information Society Report 2007, International Telecommunication Union. http://www.itu.int/osg/spu/publications/worldinformationsociety/2007. Accessed 27 October 2009.
ITU. (2008). ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia, Meeting Report: ITU Regional Cybersecurity Forum for Eastern and Southern Africa, Lusaka, Zambia, 25–28 August 2008, 29 August 2008. http://www.itu.int/ITU-D/cyb/events/2008/lusaka/docs/lusaka-cybersecurity-forum-report-aug-08.pdf. Accessed 5 October 2009.
Jordan, M., & Karp, J. (2003). Machines for the masses; Whirlpool aims cheap washer at Brazil, India and China; Making due with slower spin. Wall Street Journal, A.19.
Kahan, D. M. (1996). What do alternative sanctions mean? 63 U. Chicago Law Review, 591, 603–604.
Kallman, E. A., & Grillo, J. P. (1996). Ethical decision making and information technology, 2e. New York: McGraw Hill.
Kim, J. Y. (2007). Toward a golden age. Harvard International Review, 29(2), 20–25.
Kinyanjui, K. (2009). High speed Internet exposes Kenya to cybercrime. http://www.businessdailyafrica.com/-/539444/638794/-/rx1rgv/-/. Accessed 5 October 2009.
Kinyanjui, K. (2009b, September 8). Watchdog warns of increased cybercrime threat. http://www.businessdailyafrica.com/Company%20Industry/-/539550/654440/-/u765i9z/-/. Accessed 5 October 2009.
Kornakov, K. (2006, September 8). Police forces in East Africa will have a new hi-tech lab. http://www.viruslist.com/en/viruses/news?id=197753850. Accessed 27 October 2007.
Kotadia, M. (2003, December 3). Report: A third of spam spread by RAT-infested PCs. CNET News.com. http://www.news.com/Report-A-third-of-spam-spread-by-RAT-infested-PCs/2100-7355_3-5113080.html. Accessed 27 October 2005.
Krebs, B. (2007, October 13). Taking on the Russian business network. http://blog.washingtonpost.com/securityfix/2007/10/taking_on_the_russian_business.html. Accessed 27 October 2008.
Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541–562. CrossRef
Kshetri, N. (2009a). Positive externality, increasing returns and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144.
Kshetri, N. (2009b). The evolution of the chinese online gaming industry. Journal of Technology Management in China, 4(2), 158–179. CrossRef
Kshetri, N., & Dholakia, N. (2002). Determinants of the global diffusion of B2B e-commerce. Electronic Markets, 12(2), 120–129. CrossRef
Kshetri, N., & Dholakia, N. (2009). Professional and trade associations in a nascent and formative sector of a developing economy: A case study of the NASSCOM effect on the Indian Offshoring industry. Journal of International Management, 15(2), 225–239. CrossRef
Leyden, J. (2004, September 23). US credit card firm fights DDoS attack. http://www.theregister.co.uk/2004/09/23/authorize_ddos_attack. Accessed 27 October 2005.
Lianos, M., & Douglas, M. (2000). Dangerization and the end of deviance. The British Journal of Criminology, 40(2), 261–278.
Luard, T. (2005, July 22). China’s spies come out from the cold. http://news.bbc.co.uk/2/hi/asia-pacific/4704691.stm. Accessed 27 October 2007.
M2 Presswire. (2007, July 13). Frost & Sullivan: Correction: Cybercrime drives growth and increased competition in the global anti-malware market.
Mark, O. (2009). ICT experts gear up for war against e-crime. http://www.businessdailyafrica.com/Company%20Industry/-/539550/655032/-/u75jcqz/-/. Accessed 5 October 2009.
McCue, A. (2007, June 7). India gets offshore cyber crime watchdog. silicon.com. http://services.silicon.com/bpo/0,3800004865,39167417,00.htm.
McGeer, B. (2002). Security: Bankers fight a new battle it adjustments, purchases Part of Patriot Act. Bank Technology News, 15(11), 1.
Miller, N. (2008). Casting a wide net for cyber crimes. The Age (Melbourne, Australia), 6.
Mittelman, J. H., & Johnston, R. (1999). The globalization of organized crime, the courtesan state, and the corruption of civil society. Global Governance, 5(1), 103–126.
Naraine, R. (2006). Money Bots: Hackers cash in; Research group details how lucrative PC hijacking can be. eWeek, 27.
Nordas, H. K. (1996). South African manufacturing industries – Catching up or falling behind? The Journal of Development Studies, 32(5), 715–733. CrossRef
North, D. C. (1990). Institutions, institutional change and economic performance. Cambridge, MA: Harvard University Press.
North, D. C. (1996). Epilogue: Economic Performance Through Time. In L. J. Alston, T. Eggertsson, & D. C. North (Eds.), Empirical studies in institutional change (pp. 342–355). Cambrige, PA: Cambridge University Press.
Nystedt, D. (2004). Online gaming growing fast in China, study says. http://archive.thestandard.com/movabletype/datadigest/archives/003210.php. Accessed 27 October 2005.
Otis, C., & Evans, P. (2003). The Internet and Asia-Pacific security: Old conflicts and new behavior. Pacific Review, 16(4), 549–550. CrossRef
Parto, S. (2005). Economic activity and institutions: Taking stock. Journal of Economic Issues, 39(1), 21–52.
Phukan, S. (2002, June). IT ethics in the Internet age: New dimensions. InSITE. http://proceedings.informingscience.org/IS2002Proceedings/papers/phuka037iteth.pdf. Accessed 27 October 2005.
PR Newswire. (2008, February 21). New McAfee research shows regionalized malware rising; More attacks tailored to different cultures and technologies.
Precision Marketing. (2006, October 6). India call centres set to triple US Bank work. 18(42).
Raghav, K. (2008, June 26). Cyber attacks will be disruptive, not destructive. http://www.livemint.com/2008/06/26001839/Cyber-attacks-will-be-disrupti.html. Accessed 27 October 2009.
redherring.com. (2005, April 5). China’s Zombie PCs. http://www.redherring.com/Home/11708. Accessed 27 October 2006.
Reilly, M. (2007). Beware, botnets have your PC in their sights. New Scientist, 196(2634), 22–23. CrossRef
Ribeiro, J. (2006, September 7). India’s Nasscom calls for special cybercrimes court. Network World. http://www.networkworld.com/news/2006/090706-indias-nasscom-calls-for-special.html. Accessed 27 October 2007.
RTÉ. (2006, November 2). Global forum on Web bridges ‘cultural gap’. RTÉ Commercial Enterprises. http://www.rte.ie/business/2006/1102/internet.html. Accessed 1 October 2009.
Saravade, P., & Saravade, N. (2007). A public-private partnership in India: Broken windows in cyberspace. The Police Chief, 74(3), 16.
Sawant, N. (2009, October 5). Virtually speaking, crime in the city on an upward spiral. The Times of India. http://timesofindia.indiatimes.com/news/city/mumbai/Virtually-speaking-crime-in-the-city-on-an-upward-spiral/articleshow/5087668.cms. Accessed 27 October 2009.
Schwartz, K. D. (2005). The background-check challenge. InformationWeek, 59–61.
Scott, R. (1995). Institutions and organizations. Thousand Oaks, CA: Sage.
Scott, R. (2001). Institutions and organizations. Thousand Oaks, CA: Sage.
Screen Digest. (2008). Telefonica takes the lead in Latin America. http://www.screendigest.com/press/releases/press_releases_22_01_2008/view.html
Shilts, R. (1991, January). The queering of America. The Advocate, 1.
Shubert, A. (2003, February 6). Taking a swipe at cyber card fraud. CNN.com. http://www.cnn.com/2003/WORLD/asiapcf/southeast/02/06/indonesia.fraud. Accessed 27 October 2005.
Sjoquist, D. L. (1973). Property crime and economic behavior. American Economic Review, 63, 439–446.
Smith, T. (2003, October 27). Technology; Brazil becomes a cybercrime lab. http://query.nytimes.com/gst/fullpage.html?res=9F02E3DA1131F934A15753C1A9659C8B63&sec=&spon=&pagewanted=2. Accessed 27 October 2005.
sophos.com. (2008, July 23). Police crack suspected online extortion ring. Sophos reports. http://www.sophos.com/virusinfo/articles/extortion.html. Accessed 27 October 2009.
South Africa: The Good News. (2008, April 8). SA kids benefit from one Laptop per child campaign. http://www.sagoodnews.co.za/education/sa_kids_benefit_from_one_laptop_per_child_campaign_.html. Accessed 27 October 2008.
Srivastava , M. (2009, September 14). Pros of con; From credit card fraud to drug peddling and job scams, Nigerians seem to be everywhere in the crime business. India Today. http://indiatoday.intoday.in/index.php?option=com_magazine&opt=section§ionid=36&issueid=127&Itemid=1. Accessed 27 October 2009.
Sulaiman, H. (2007). Quest to fight cybercrime. New Straits Times, 13.
Sullivan, B. (2007, April 10). Who’s behind criminal bot networks? http://redtape.msnbc.com/2007/04/whos_behind_cri.html. Accessed 27 October 2009.
Syed, F., & D’monte, L. (2008, April 7). India lags in cybercrime insurance. http://www.rediff.com/money/2008/apr/07cyber.htm. Accessed 27 October 2009.
Tajfel, H., & Turner, J. C. (1986). The social identity theory of intergroup behavior. In S. Worchel & W. G. Austin (Eds.), Psychology of intergroup relations (pp. 7–24). Chicago, IL: Nelson-Hall.
The Economist. International: It may make life easier and cheaper; East Africa gets broadband. 391(8636), 46.
The New Nation. (2009, October 5). Cell phone crime rise: Extortions go on unabated. Internet Edition. http://nation.ittefaq.com/issues/2009/10/05/news0827.htm. Accessed 5 October 2009.
thestate.com. (2008, April 15). Intel adds new features to low-cost laptops. http://www.thestate.com/business/story/376162.html. Accessed 27 October 2009.
Ticoll, D. (2004, October). IT industry trade associations and the globalization of knowledge work. Review of NASSCOM and the Irish Software Association. http://www.itac.ca/Archive/PolicyandAdvocacy/Outsourcing/04OctITIndustryTrade-AReviewofNASSCOM.pdf. Accessed 27 October 2005.
tribuneindia.com. (2005, June 25). Outsourcing crime Call centre expose can wreak havoc. http://www.tribuneindia.com/2005/20050625/edit.htm. Accessed 27 October 2006.
Trombly, M. (2006). India tightens security. Insurance Networking & Data Management, 10(1), 9.
Trombly, M., & Yu, W. (2006). Outsourcing resilient in India. Securities Industry News, 18(26), 1–21.
US Commercial Service. (2004, October 15). Approximately 58% of China’s internet users experience security problems. China Commercial Brief – American Embassy, Beijing, 2(168). http://www.buyusa.gov/china/en/ccb041015.html. Accessed 27 October 2005.
van Koppen, P. J., & Jansen, R.W. J. (1998). The road to the robbery: Travel patterns in commercial robberies. The British Journal of Criminology, 38(2), 230–246.
Vardi, N. (2005). Chinese take out. Forbes, 54.
Vassilev, R. (2003). De-development problems in Bulgaria. East European Quarterly, 37(3), 345.
Viano, E. C. (1999). Global organized crime and international security. Burlington, VT: Ashgate Publishing.
Walker, C. (2004, June ). Russian Mafia extorts gambling websites. http://www.americanmafia.com/cgi/clickcount.pl?url=www.americanmafia.com/Feature_Articles_270.html. Accessed 27 October 2005.
Warren, P. (2007, November 15). Hunt for Russia’s web criminals the Russian Business Network – Which some blame for 60% of all internet crime – Appears to have gone to ground. The Guardian. http://www.guardian.co.uk/technology/2007/nov/15/news.crime. Accessed 5 October 2009.
WEBWIRE. (2008, June 25). First told of Chinese PC hijack explosion. http://www.webwire.com/ViewPressRel.asp?aId=68776. Accessed 27 October 2009.
Weisburd, D., Bushway, S., Lum, C., & Yang, S. M. (2004). Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology, 42(2), 283–320. CrossRef
Wilson, W. J. (1987). The truly disadvantaged. Chicago: University of Chicago Press.
Wylie, I. (2007). Internet; Romania home base for EBay scammers; The auction website has dispatched its own cyber-sleuth to help police crack fraud rings. Los Angeles Times, C.1.
Zweynert, J., & Goldschmidt, N. (2006). The two transitions in Central and Eastern Europe as processes of institutional transplantation. Journal of Economic Issues, 40(4), 895–918.
- Structure of Cybercrime in Developing Economies
Dr. Nir Kshetri
- Springer Berlin Heidelberg
- Chapter 8