Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission

This paper examines a predominantly Australian sample of computer crime offenders involved in fraud and/or unauthorised access. This paper focuses on the extent to which offenders are involved in organised crime, the nature of the relationship between co-offending, initiation and knowledge transmission, and how the online environment facilitates organised crime and co-offending. This qualitative analysis draws from interviews with self-identified offenders, law enforcement officers who investigate these offenses, and court documents, providing a unique understanding of organised crime involving computer systems.

[1]  Kim-Kwang Raymond Choo Zombies and botnets , 2007 .

[2]  T. Holt subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .

[3]  T. Jordan,et al.  A Sociology of Hackers , 1998 .

[4]  Russell G. Smith,et al.  Cyber Criminals on Trial: List of figures and tables , 2004 .

[5]  R. Atkinson The Life Story Interview , 1998 .

[6]  Gordon R Meyer,et al.  The Social Organization of the Computer Underground , 1989 .

[7]  B. Berg Qualitative Research Methods for the Social Sciences , 1989 .

[8]  S. Brenner Cybercrime: re-thinking crime control strategies , 2013 .

[9]  Kim-Kwang Raymond Choo Organised crime groups in cyberspace: a typology , 2008 .

[10]  R. Broadhurst,et al.  Social Engineering and Crime Prevention in Cyberspace , 2008 .

[11]  Crime,et al.  United Nations convention against transnational organized crime and the protocols thereto , 2004 .

[12]  M. Bagaric,et al.  Australian Sentencing: Principles and Practice , 2007 .

[13]  Richard Barber Hackers Profiled — Who Are They and What Are Their Motivations? , 2001 .

[14]  Kim-Kwang Raymond Choo,et al.  Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .

[15]  M. Yar,et al.  Book Review: Cybercrime and Society , 2006 .

[16]  Russell G. Smith Cross border economic crime : the agenda for reform , 2001 .

[17]  Scott H. Decker,et al.  A Snowball's Chance in Hell: Doing Fieldwork with Active Residential Burglars , 1992 .

[18]  T. Holt,et al.  Exploring stolen data markets online: products and market forces , 2010 .

[19]  Steven Furnell,et al.  Cybercrime: Vandalizing the Information Society , 2003, ICWE.

[20]  Catherine A. Theohary,et al.  Terrorist Use of the Internet: Information Operations in Cyberspace , 2011 .

[21]  Peter Grabosky,et al.  Requirements of prosecution services to deal with cyber crime , 2007 .

[22]  Yuguang F. Ipsen,et al.  Trends & issues in crime and criminal justice , 2014 .

[23]  Audrey Guinchard,et al.  Cybercrime: The Transformation of Crime in the Information Age, 2nd edition, Cambridge: Polity (Outline of update) , 2007, SSRN Electronic Journal.

[24]  Stefan Savage,et al.  An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.

[25]  M. Felson,et al.  Crime and Everyday Life , 1998 .

[26]  D P Farrington,et al.  Early Predictors of Adolescent Aggression and Adult Violence , 1989, Violence and Victims.

[27]  Rob McCusker,et al.  Financing of terrorism: risks for Australia , 2010 .

[28]  Jonathan Lusthaus How organised is organised cybercrime? , 2013 .

[29]  Sigi Goode,et al.  What Motivates Software Crackers? , 2006 .

[30]  Emily Finch The problem of stolen identity and the Internet , 2013 .

[31]  Keven G. Ruby,et al.  The Insider Threat to Information Systems , 2022 .

[32]  Stefan Savage,et al.  An analysis of underground forums , 2011, IMC '11.

[33]  Mark Israel,et al.  Strictly Confidential?Integrity and the Disclosure of Criminological and Socio–Legal Research , 2004 .

[34]  Graham R. Gibbs,et al.  Analyzing Biographies and Narratives , 2014 .

[35]  T. Bennett,et al.  Exploring the Offender’s Perspective: Observing and Interviewing Criminals , 1990 .