Skip to main content

Cybercrime: Definition, Typology, and Criminalization

  • Chapter
  • First Online:
Cybercrime, Organized Crime, and Societal Responses

Abstract

This chapter addresses the theme of cybercrime, providing an overall review of the basic definition, legal principles, and responses to this growing criminal justice reality. It systematically addresses the definition of cybercrime, the legal interests protected by Information and Communication Technology and Cyber Crime law. It addresses in depth the extent of criminalization, especially preparation and possession. It does focus on the issue of the challenges and limits of criminal legislation. It concludes with an analysis of the legal demands advanced by the internationalization of cyber crime, a typical characteristic of this type of crime and ends examining projected trends for the future. The chapter is documented carefully and exhaustively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Adler, J. (2011). The public’s burden in a digital age: Pressures on intermediaries & the privatization of internet censorship. Journal of Law & Policy, 20, 231.

    Google Scholar 

  • Bacon, S. L. (2011). A distinction without a difference: "Receipt" and "Possession" of child pornography and the double jeopardy problem. University of Miami Law Review, 65(Spring), 1027.

    Google Scholar 

  • BBC Monitoring Europe. (2015, March 23). New bill gives Turkish government power to shut down Websites in four hours, supplied by BBC Worldwide Monitoring.

    Google Scholar 

  • Bernstein, A. (2012). Social networks and the law: Real remedies for virtual injuries. 90 N.C.L. Rev, 90, 1457.

    Google Scholar 

  • Bilge, L., Strufe, T., Balzaroti, D., & Kirda, E. (2009). All your contacts belong to us: Automated identity theft attacks on social networks. Retrieved from http://www.sba-research.org/wpcontent/uploads/publications/Bilge_AllYourContacts_2009.pdf.

  • Borisevich, G., Chernyadyeva, N., Frolovich, E., Pastukhov, P., Polyakova, S., Dobrovlyanina, O., et al. (2012). A comparative review of cybercrime law and digital forensics in Russia, the United States and under the convention on cybercrime of the Council of Europe. Northern Kentucky Law Review, 39(2), 267.

    Google Scholar 

  • Brenner, S. (2006). Cybercrime jurisdiction. Crime, Law and Social Change, 46(4), 189–206.

    Google Scholar 

  • Brenner, S. (2007). Cybercrime: Re-thinking crime control strategies. In Y. Jewkes (Ed.), Crime online (pp. 12–28). Cullompton, United Kingdom: Willan Publishing.

    Google Scholar 

  • Brenner, S. (2009, May 6). “Thoughts, witches and crimes,” CYB3RCRIM3: Observations on technology, law, and lawlessness. Retrieved from http://cyb3rcrim3.blogspot.com/2009/05/thoughts-witches-and-crimes.html.

  • Brenner, S. W., & Rehber, M. (2009–2010). “‘Kiddie Crime?’ The utility of criminal law in controlling cyber-bullying,” First Amendment Law Review 8(1).

    Google Scholar 

  • Burns, Brett. (2011-2012).Level 85 Rogue: When virtual theft merits criminal penalties. UMKC Law Review, 80: 831, 845.

    Google Scholar 

  • Cecil, N. (2011, November 6). MP demands law to force internet providers to remove gang videos. The Evening Standard.

    Google Scholar 

  • Center for Technology & Democrac. (2012). Shielding the messengers: Protecting platforms for expression and innovation. Version 2, updated December; https://cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf.

  • Cheh, M. M. (1991). Constitutional limits on using civil remedies to achieve criminal law objectives: Understanding and transcending the criminal-civil law distinction. Hastings L.J, 42(July), 1325.

    Google Scholar 

  • Chein, A. (2012). A practical look at virtual property. St. John’s Law Review, 80, 3, Summer, 1059–1088.

    Google Scholar 

  • Chia, T. (2012, August 20). Confidentiality, integrity and availability (CIA): The three components of the CIA triad. IT Security Community Blog.

    Google Scholar 

  • CJEU. (2014). Court of Justice of the European Union. Case number C-293/12. EUR-Lex, Official Journal of the European Union. Retrieved April 8, 2014 from http://curia.europa.eu/juris/documents.jsf?num=C-293/12.

  • Clough, J. (2011). Data theft? Cybercrime and the increasing criminalization of access to data. Criminal Law Forum, 22, 145–170. doi:10.1007/s10609-011-9133-5. Springer 2011.

    Article  Google Scholar 

  • COE. (2003). See, for example, an additional protocol to the council of Europe convention on cybercrime: Council of Europe. http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=201&CM=&DF=&CL=ENG.

  • COE. Council of Europe. (2007, October 25). Additional protocol to the convention on cybercrime, concerning the criminalization of acts of a racist and xenophobic nature committed through computer systems. Retrieved July 1, 2010 from http://conventions.coe.int/Treaty/en/Treaties/Html/189.htm.

  • COE. (2007). Signed on 25 October 2007; effective on 1 July 2010; http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=201&CM=&DF=&CL=ENG.

  • Colangelo, A. J. (2011). A unified approach to extraterritoriality. Virginia Law Review, 97, 1019.

    Google Scholar 

  • Couldry, N. (2008). Mediatization or mediation? Alternative understandings of the emergent space of digital storytelling. New Media & Society, 10(3), 373–391.

    Article  Google Scholar 

  • Council of Europe. (2001). Convention on cybercrime. Retrieved from http://conventions.coe.int/Treaty/EN/Treaties/html/185.htm.

  • Council of Europe. (2003). Additional protocol to the convention on cybercrime, concerning the criminalization of acts of a racist and xenophobic nature committed through computer systems. Retrieved from http://conventions.coe.int/Treaty/en/Treaties/Html/189.htm.

  • Deleon, N. (2008, March 26). Phishing scam targeting facebook users. Retrieved from http://techcrunch.com/2008/03/26/phishing-scam-targeting-facebook-users/.

  • Downing, R. (2005). Shoring up the weakest link: What lawmakers around the world need to consider in developing comprehensive laws to combat cybercrime. Colum. J. Transnat'l L., 43, 705.

    Google Scholar 

  • Doyle, C. (2016). RICO: A brief sketch. Congressional research service, Report 96-850.

    Google Scholar 

  • Dubber, M. D. (2010, December 1). The legality principle in American and German criminal law: An essay in comparative legal history. SSRN: http://ssrn.com/abstract=1735966 or http://dx.doi.org/10.2139/ssrn.1735966.

  • Dubber, Markus. (2013, July 3). Ultima Ratio as Caveat Dominus: Legal principles, police maxims, and the critical analysis of law, http://ssrn.com/abstract=2289479 orhttp://dx.doi.org/10.2139/ssrn.2289479.

  • Effross, W. A. (1997). High-tech heroes, virtual villains, and jacked-in justice: Visions of law and lawyers in cyberpunk science fiction. Buffalo Law Review, 931, 46.

    Google Scholar 

  • Eskola, T. (2012). From risk society to network society: Preventing cybercrimes in the 21st century. Journal of Applied Security Research, 7(1), 122–150.

    Article  Google Scholar 

  • European Network and Information Security Agency (ENISA). (2009). Cloud computing: cloud computing: benefits, risks and recommendations for information security. Report No: 2009.

    Google Scholar 

  • European Union. (2000). Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (Directive on electronic commerce), OJ L 178, 17.7.2000: 1.

    Google Scholar 

  • European Union. (2003). Council framework decision 2004/68/JHA of 22 December 2003 on combating the sexual exploitation of children and child pornography.

    Google Scholar 

  • European Union. (2005). Council framework decision 2005/222/JHA of 24 February 2005 on attacks against information systems. http://eur-lex.europa.eu/legal content/EN/ALL/?uri=CELEX%3A32005F0222.

  • European Union. (2006). Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC.

    Google Scholar 

  • Exum, J. J. (2010). Making the punishment fit the (Computer) crime: Rebooting notions of possession for the federal sentencing of child pornography offenses. Richmond Journal of Law and Technology, 16(Spring), 8.

    Google Scholar 

  • Fafinski, Stefan Frederick. (2008). Computer use and misuse: The constellation of control. Ph.D. Dissertation, University of Leeds, School of Law 273–281.

    Google Scholar 

  • Feinberg, J., & George, R. P. (1990). Crime and punishment: Moralistic liberalism and legal moralism: Harmless wrongdoing: The moral limits of the criminal law. Mich.L.R, 88, 1415.

    Article  Google Scholar 

  • Fernando, F. M. (2011). A comparison between continental European and Anglo-American approaches to overcriminalization and some remarks on how to deal with it. New Crim. L.R., 14, 123.

    Google Scholar 

  • Ferzan, Kimberly Kessler. (2013). Prevention, wrongdoing, and the harm principle’s breaking point. Ohio St. J. Crim. L, 685

    Google Scholar 

  • Finklea, Kristin., Catherine A. Theohary. (2015). Cybercrime: Conceptual issues for congress and law enforcement,” CRS, January 3.

    Google Scholar 

  • Fuller, Kathleen. (2001). ICANN: The debate over governing the internet. Duke L & Tech. Rev. 2(February): 24.

    Google Scholar 

  • Gercke, Marco. (2007). Internet-related identity theft. A discussion paper, http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/reportspresentations/567%20port%20id-d-identity%20theft%20paper%2022%20nov%2007.pdf.

  • Gercke, Marco. (2011). Legal approaches to criminalize identity theft. In: Handbook on Identity related Crime. pp. 146, New York: United Nations.

    Google Scholar 

  • Goodman, M., & Brenner, S. (2002). The emerging consensus on criminal conduct in cyberspace. UCLA Journal of Law and Technology, 3.

    Google Scholar 

  • Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal of Computer Virology, 2(July), 15–19.

    Google Scholar 

  • Graham, David. (2016, July 11). The era of lethal police robots has arrived. Defense One.

    Google Scholar 

  • Gray, John., G. W. Smith (eds.). (2003). J.S. Mill on Liberty. New York: Routledge, 2003: 90.

    Google Scholar 

  • Guinchard, A. (2008). Cybercrime: The transformation of crime in the digital age. Information, Communication and Society, 11(7), 1030–1032.

    Article  Google Scholar 

  • Hargrave,Vick. (2012, June 17). Hacker, hacktivist or cybercriminal? Trend micro simply security.

    Google Scholar 

  • Ho, Michael, Joyce Hung, & Michael Hasnick. (2015). The carrot and the stick: Innovation versus anti-piracy enforcement. The Copia Institute, October.

    Google Scholar 

  • Homeland Security Newswire. (2011, April 19). An electronic trail for every crime, http://homelandsecuritynewswire.com/electronic-trail-every-crime.

  • Iain Moir., George R. S. Weir. (2008). Identity theft: A study in contact centres, Paper presented at the 4th International Conference on Global E-Security, University of East London, June. http://www.cis.strath.ac.uk/cis/research/publications/papers/strath_cis_publication_2243.pdf.

  • INCB. (2001). International narcotics control board, globalization and new technologies: challenges to drug law enforcement in the twenty-first century, 2001.

    Google Scholar 

  • ITU (International Telecommunications Union). (2009). Understanding cybercrime: A guide for developing countries, pp. 30–40.

    Google Scholar 

  • Johnson. David R., David Post, (1996). Law and Borders - The rise of law in cyberspace, Stanford law review, vol. 48 (May) 1379.

    Google Scholar 

  • Kibble, M. B. (2008). Fear mongering, filters, the internet and the first amendment: Why congress should not pass legislation similar to the deleting online predators act. Roger Williams U.L. Rev., 13, 497.

    Google Scholar 

  • Koons, Stephanie. (2015, January 22). Researchers examine role of “white hat” hackers in cyber warfare. Phys Org, Technology, Security.

    Google Scholar 

  • Koops, B.-J., & Brenner, S. (Eds.). (2006). Cybercrime and jurisdiction: A global survey. Den Haag: T.M.C. Asser Press.

    Google Scholar 

  • Kuchera, B. (2008). Dutch court imposes real-world punishment for virtual theft. Ars Technica.

    Google Scholar 

  • Kunze, E. I. (2010). Sex trafficking via the internet: How international agreements address the problem and fail to go far enough. J. High Tech. L., 10, 241.

    Google Scholar 

  • Loi. (2009). Loi favorisant la diffusion et la protection de la création sur Internet : Loi n° 2009-669 du 12 juin 2009 published in the JO n° 135 du 13 juin 2009. Décision du Conseil constitutionnel n° 2009-580 du 10 juin 2009.

    Google Scholar 

  • Manes, Gavin W., Elizabeth Downing, Lance Watson, & Christopher Thrutchley. (2007). New federal rules and digital evidence, Conference on digital forensics, security and law.

    Google Scholar 

  • Marsh, J. R. (2015). Predators, porn & the law: America’s children in the internet era: A federal civil remedy for child pornography victims. Syracuse L. Rev., 61, 459.

    Google Scholar 

  • McBath, J. E. (2012). Trashing our system of justice? overturning jury verdicts where evidence is found in the computer’s cache. American Journal of Criminal Law, 39(Summer), 381.

    Google Scholar 

  • McCormack, Wayne. (2014). U.S. judicial independence: Victim in the ‘war on terror’, Wash & Lee L. Rev, 71, 305.

    Google Scholar 

  • Melander, Sakari. (2013). Ultima ratio in european criminal law. Oñate Socio-Legal Series, 3 (1).

    Google Scholar 

  • Mill, John Stuart. (1859). On Liberty. The “harm” principle is fundamental to John Stuart Mill’s approach to justifying or rejecting the intervention of the state through criminal law to prohibit, deter and punish certain behaviors. In On Liberty, Mill argues for ‘one very simple principle, as entitled to govern absolutely the dealings of society with the individual in the way of compulsion and control’. That principle is that ‘The only purpose for which power can be rightfully exercised over any member of a civilized community, against his will, is to prevent harm to others. His own good, either physical or moral, is not a sufficient warrant. In: John Gray., G.W. Smith (Eds.), J.S. Mill on Liberty, New York: Routledge, pp. 90, 2003.

    Google Scholar 

  • Ministry. (2013). http://www.culturecommunication.gouv.fr/Presse/Communiques-de-presse/Publication-du-decret-supprimant-la-peine-complementaire-de-la-suspension-d-acces-a-Internet.

  • Miquelon-Weismann, Miriam F. (2005). The convention on cybercrime: A harmonized implementation of international penal law: What prospects for procedural due process. 3 J. Marshall J. Computer & Info. L. Winter 23: 329.

    Google Scholar 

  • Moitra, S. D. (2004). Cybercrime: Towards an assessment of its nature and impact. International Journal of Comparative and Applied Criminal Justice, 28(2), 105–120.

    Article  Google Scholar 

  • National White Collar Crime Center. (2011). Criminal use of social media, http://www.iacpsocialmedia.org/Portals/1/documents/External/NW3CArticle.pdf.

  • Neumayer, Eric. (2007). Qualified ratification: Explaining reservations to international human rights treaties, J. Legal Stud, 397 June.

    Google Scholar 

  • Pontin, J. (2013, February 20). Free speech in the era of its technological amplification. Technology Review.

    Google Scholar 

  • Persak, Nina. (2007). Criminalizing harmful conduct: The harm principle, its limits and continental counterparts. Springer Science & Business Media.

    Google Scholar 

  • President’s Working Group. (2000, March). The electronic frontier: The challenge of unlawful conduct involving the use of the internet. A report of the President’s Working Group on Unlawful Conduct on the Internet.

    Google Scholar 

  • Salvador, J. (2015). Dismantling the internet mafia: RICO’s applicability to cyber crime. Rutgers Computer & Tech. L.J., 41, 268.

    Google Scholar 

  • Sarb Sembhi (2009). How to defend against data integrity attacks, computer weekly, 2009.

    Google Scholar 

  • Schjolberg, Stein. (2014). The History of Cybercrime: 1976-2014, pp. 200, Books on demand (November 24, 2014). Stein proposes in article 5 of a new Convention for the creation of an International Tribunal on Cybercrime that these types of crime fall under the jurisdiction of the proposed Tribunal.

    Google Scholar 

  • Sen, Jaydip. (2013). Security and privacy issues in cloud computing. http://arxiv.org/pdf/1303.4814.pdf.

  • Silverstone, R. (2006). Media and morality: on the rise of the mediapolis. New York: Wiley.

    Google Scholar 

  • Smith, R. G., Raymond Chak-Chung Cheung, & Laurie Yiu-Chung Lau. (2015). Cyber risks and perspectives: Eastern and western perspectives. Palgrave Macmillan.

    Google Scholar 

  • Spidalieri, Framcesca. (2015, November 3). State of the states on cybersecurity, Pell Center for International Relations.

    Google Scholar 

  • Steel, A. (2010). The true identity of Australian identity theft offences: A measured response or an unjustified status offence? University of New South Wales Law Journal, 33, 503–531.

    Google Scholar 

  • Sweeney, B. J. (2008). Global competition: Searching for a rational basis for global competition rules. The Sydney Law Review, 30(June), 209.

    Google Scholar 

  • Tosza, S. (2013). Online social networks and violations committed using I.T. –identity fraud and theft of victual property. Revue Internationale de Droit Penal, 84, 115.

    Article  Google Scholar 

  • Ty, E. Howard. (2004). Don’t cache out your case: Prosecuting child pornography possession laws based on images located in temporary internet files. Berkeley Tech. L.J, 19 (Fall):1227.

    Google Scholar 

  • U.S. Access Board. (2000). Section 508, standards for electronic and information technology, Federal register, December 21.

    Google Scholar 

  • U.S. Congress. (1998). Identity theft and assumption deterrence act of 1998. Title 18, U.S. Code, Sect.1028. Fraud and related activity in connection with identification documents, authentication features, and information.

    Google Scholar 

  • U.S. Dept. of Commerce. (2013). Internet policy task force, copyright, creativity and innovation in the digital economy, July.

    Google Scholar 

  • USGAO. (2007). Public and private entities face challenges in addressing cyber threats. U.S. Government Accountability Office, June.

    Google Scholar 

  • Viano, E. C. (2012). Balancing liberty and security fighting cybercrime: Challenges for the networked society. In S. Manacorda (Ed.), Cybercriminality: Finding a balance between freedom and security (pp. 33–64). Milano, Italy: ISPAC.

    Google Scholar 

  • Viano, Emilio C. (2013). Section II: Criminal law. Special part, information society and penal law, general report. Revue Internationale de Droit Penal, 84 (3–4), 336.

    Google Scholar 

  • Viano, E. C. (2006). Cybercrime: A new frontier in criminology. International Annals of Criminology, 44(1/2), 11–22.

    Google Scholar 

  • Wall, D. S. (2007). Cybercrime. Cambridge, U.K.: Polity Press.

    Google Scholar 

  • Wall, D. S. (2001). Cybercrimes and the internet. In D. S. Wall (Ed.), Crime and the Internet (pp. 1–17). New York: Routledge.

    Google Scholar 

  • Wall, D. S. (2015). Cybercrime as a conduit for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 77–88). Beverly Hills CA: Sage Publications.

    Google Scholar 

  • Walls, David S. (2008). Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime, International review of law, computers and technology, 22 (1–2), 45-63. Special issue: Crime and Criminal Justice.

    Google Scholar 

  • Webster, Stephen et al. (2012). The European online grooming project final report, March, especially chapters 3, 4 & 5. http://www.europeanonlinegroomingproject.com/media/2076/european-online-grooming-project-final-report.pdf.

  • Weigend, T. (2013). Information society and penal law: General report. Revue Internationale de Droit Penal, 84(1–2), 51.

    Google Scholar 

  • Wendt, Rudolph. (2013). The principle of ultima ratio and/or the principle of proportionality. Oñate Socio-Legal Series, 3(1).

    Google Scholar 

  • Westbrook, Theodore J. (2006). Owned: Finding a place for virtual world property rights, Mich. St. L. Rev, 779ff.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Emilio C. Viano .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Viano, E.C. (2017). Cybercrime: Definition, Typology, and Criminalization. In: Viano, E. (eds) Cybercrime, Organized Crime, and Societal Responses. Springer, Cham. https://doi.org/10.1007/978-3-319-44501-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44501-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44499-4

  • Online ISBN: 978-3-319-44501-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics