Skip to main content
Have a personal or library account? Click to login
Quantitatively examining the interaction between cybercrime and physical crime Cover

Quantitatively examining the interaction between cybercrime and physical crime

Open Access
|Sep 2023

References

  1. Back, S. (2019). The cybercrime triangle: An empirical assessment of offender, victim, and place. Miami, FL: Florida International University.
  2. Beeler, A. (2022). Inmate seminaries: How they have positively impacted corrections. Corrections Today, 2022, 34-42.
  3. Brenner, S. (2009). Cyberthreats: The emerging fault lines of the nation state. New York, NY: Oxford University Press.
  4. Bryant, R. & Bryant, S. (2014). Policing digital crime. New York, NY: Routledge.
  5. Bossler, A. M., & Holt, T. J. (2007, November 14). Examining the utility of routine activities theory for cybercrime. Paper presented at the annual meeting of the American Society of Criminology, Atlanta Marriott.
  6. Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308-333.
  7. Collins, S. & McCombie, S. (2012). Stuxnet: The emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence, and Counter Terrorism 7(1), 80-91.
  8. Computer Fraud and Abuse Act of 1986, 100 Stat. 1213.
  9. Curtis, J. & Oxburgh, G. (2022). Understanding cybercrime in ‘real world’ policing and law enforcement. The Police Journal: Theory, Practice, and Principles, 0(0). https://doi.org/10.1177/0032258X221107584
  10. Cveticanin, N. (2023). Hacking statistics to give you nightmares. Retrieved from https://dataprot.net/statistics/hacking-statistics/
  11. Cybersecurity and Infrastructure Security Agency. (2018). Combating Cyber Crime. Retrieved from https://www.cisa.gov/combating-cyber-crime
  12. De Cremer, D., Nguyen, B., & Simkin, L. (2017). The integrity challenge of the Internet-of-Things (IoT): On understanding its dark side. Journal of Marketing Management, 33, 1-2.
  13. De Padirac, B. (2018). International dimensions of cyberspace law. New York, NY: Rout-ledge.
  14. Department of Justice. (n.d.). Computer crime and intellectual property section (CCIPS). Retrieved from: https://www.justice.gov/criminal-ccips
  15. Department of Justice. (n.d.). Prosecuting computer crimes. Retrieved from https://www.justice.gov/criminal/file/442156/download
  16. Dixon, V.K. (2009). Understanding the implications of a global village. Inquiries, 1(11), 1-2.
  17. Doss, D.A., Etter, G., Rials, W., McElreath, D., Gokaraju, B., & Standish, H. (2022). Examining the effects of the Federal Information Sharing Modernization Act of 2014 and the Cybersecurity Information Sharing Act of 2015: What were the impacts toward reducing cybercrime incidents. Journal of Gang Research, 29(3), 1-23.
  18. Encyclopedia Britannica. (n.d.) Cybercrime. Retrieved from https://www.britannica.com/topic/cybercrime
  19. European Union Agency for Law Enforcement Cooperation. (2021). Internet Organised Crime Threat Assessment 2021. Retrieved from https://www.europol.europa.eu/cms/sites/default/files/documents/internet_organised_crime_threat_assessment_iocta_2021.pdf
  20. Federal Bureau of Investigation. (n.d.). What We Investigate: Cyber. Retrieved from https://www.fbi.gov/investigate/cyber
  21. Federal Bureau of Investigation. (2022). Internet Crime Report: 2021. Retrieved from https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf
  22. Felson, M. & Cohen, L. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8(4), 389-406.
  23. Henderson, H. (2014). A to Z of computer scientists. New York, NY: Facts on File.
  24. Hoffman, D.E. (2004). CIA slipped bugs to Soviets. Retrieved from https://www.nbc-news.com/id/wbna4394002
  25. Holt, T. J. & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1-25.
  26. Ilbiz, E. & Kaunert, C. (2023). The sharing economy for tackling cybercrime. New York, NY: Springer.
  27. International Telecommunications Union (2022). ITU Datahub: Individuals using the Internet. Retrieved from https://datahub.itu.int/data/?e=USA&c=701&i=11624
  28. Internet World Stats. (2022). Internet Growth Statistics: Today’s road to e-Commerce and Global Trade. Retrieved from https://www.internetworldstats.com/emarketing.htm
  29. Kennedy, J. (1926, January 30). An Interview with Nikola Tesla. Collier’s Magazine.
  30. Kigerl, A. (2021). Routine activity theory and malware, fraud, and spam at the national level. Crime Law and Social Change, 76(4).
  31. Koch, C. (2007). You plan to fight cyber crime. CIO, 2007, 34-40.
  32. Kritzinger, E. & Von Solms, S. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840-847.
  33. Kshetri, N. (2010). The global cybercrime industry. New York, NY: Springer.
  34. Klosowski, T. (2021). We asked appliance manufacturers how long they’ll keep connected devices secure. Many couldn’t tell us. Retrieved from https://www.nytimes.com/wirecutter/blog/how-long-connected-devices-secure/
  35. Launiainen, P. (2018). A brief history of everything wireless: How invisible waves have changed the world. Cham, Switzerland: Springer.
  36. Leider, R. (2021). The modern common law of crime. Journal of Criminal Law and Criminology, 111(2), 407-499.
  37. Leukfeldt, E. & Yar, M. (2016) Applying Routine Activity Theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263-280.
  38. Levin, A. (2013). 9 Household Products That May Be Spying on You: Could you coffee machine be spying on you? Retrieved from https://abcnews.go.com/Business/household-products-spying/story?id=19974898
  39. McElreath, D., DioGuardi, S., & Doss, D. (2022). Pre-crime prediction: Does it have value? Is it inherently racist? International Journal of Service Science, Management, Engineering, and Technology, 13(1), 1-17.
  40. McElreath, D., Doss, D., Russo, B., Etter, G., Van Slyke, J., Skinner, J., Corey, M., Jensen, C., Wigginton, M., & Nations, R. (2021). Introduction homeland security. (3rd ed.). Boca Raton, FL: CRC Press.
  41. Naik, K. & Patel, S. (2023). An open source smart home management system based on IOT. Wireless Networks, 29, 989-995.
  42. Nir, S. (2022). How a cyberattack plunged a long island county into the 1990s. Retrieved from https://www.nytimes.com/2022/11/28/nyregion/suffolk-county-cyber-attack.html
  43. Office of the Attorney General. (2014). Intake and Charging Policy for Computer Crime Matters. Retrieved from https://www.justice.gov/criminal-ccips/file/904941/download
  44. Oosterman, N. & Yates D. (2021). Crime and art sociological and criminological perspectives of crimes in the art world. Cham, Switzerland: Springer.
  45. Pesch-Cronin, K. & Marion, N. (2016). Critical infrastructure protection, risk management, and resilience: A policy perspective. Boca Raton, FL: CRC Press.
  46. Rawat, D. & Ghafoor, K. (2019). Smart cities cybersecurity and privacy. Cambridge, MA: Elsevier.
  47. Reed, J. (2032). More school closings coast-to-coast due to ransomware. Retrieved from https://securityintelligence.com/news/schools-closing-due-to-ransomware/
  48. Sanger, D., Krauss, C., & Perlroth, N. (2021). Cyberattack Forces a Shutdown of a Top U.S. Pipeline. Retrieved from https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html
  49. United States Census Bureau. (2022a). E-Commerce Sales Surged During the Pandemic. Retrieved from https://www.census.gov/library/stories/2022/04/ecommerce-sales-surged-during-pandemic.html
  50. United States Census Bureau. (2022b). Quarterly Retail E-Commerce Sales: 3d Quarter 2022. Retrieved from https://www.census.gov/retail/mrts/www/data/pdf/ec_current.pdf
  51. Waldron, R., Quarles, C., McElreath, D., Walron, M., & Milstein, D. (2009). The criminal justice system. (5th ed.). Tulsa, OK: K&M Publishers.
  52. Whalley, J., Stocker, V., & Lehr, W. (2023). Beyond the pandemic. Bingley, UK: Emerald Publishing.
  53. World Bank. (2022). Databank: Population estimates and projections. Retrieved from: https://databank.worldbank.org/source/population-estimates-and-projections
  54. Visger, M. (2022). The international law sovereignty debate and development of international norms on peacetime cyber operations. Retrieved from https://www.lawfareblog.com/international-law-sovereignty-debate-and-development-international-norms-peacetime-cyber-operations
  55. Vojinovic, I. (2022). More than 70 cybercrime statistics—A $6 trillion problem. Retrieved from https://dataprot.net/statistics/cybercrime-statistics/
Language: English
Page range: 7 - 20
Submitted on: Jul 15, 2023
Accepted on: Sep 24, 2023
Published on: Sep 29, 2023
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2023 Daniel Adrian Doss, Daniel Scherr, published by Adam Mickiewicz University
This work is licensed under the Creative Commons Attribution-NonCommercial 4.0 License.