Computer Crime: A Criminological Overview

This paper provides an overview of computer-related crime. Nine varieties of crime are considered: theft of services; communications in furtherance of criminal conspiracies; information piracy and forgery; the dissemination of offensive materials (including extortion threats); electronic money laundering; electronic vandalism and terrorism; telemarketing fraud; illegal interception; and electronic funds transfer fraud. Computer-related crime, like crime in general, may be explained by the conjunction of three factors, motivation, opportunity and the absence of capable guardianship. Motivations will vary depending on the nature of the crime in question, but may include greed, lust, revenge, challenge or adventure. Opportunities are expanding dramatically with the rapid proliferation and penetration of digital technology. Significant challenges are posed by the transnational nature of much computer crime. The most appropriate strategies for the control of computer-related crime entails a mixture of law enforcement, technological and market-based solutions. The pursuit of a strict enforcement agenda is, in most cases not feasible because of the limited capacity of the state. Over-regulation, moreover, may stifle commercial and technological development. It is argued that in some contexts, the market place may be able to provide more efficient solutions to the problems of computer-related crime than state interventions.