Skip to main content

Advertisement

Log in

On the definition and classification of cybercrime

  • Original Paper
  • Published:
Journal in Computer Virology Aims and scope Submit manuscript

Abstract

The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cybercrime. In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms “Cybercrime” and “crimeware”. We then divide Cybercrime into two distinct categories: Type I Cybercrime, which is mostly technological in nature, and Type II Cybercrime, which has a more pronounced human element. We then use two case studies to illustrate the role of crimeware in different types of Cybercrime, and offer some observations on the role of cognition in the process of Cybercrime. Finally we provide several suggestions for future work in the area of Cybercrime.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bocij P. (2005) Reactive stalking: a new perspective on victimisation. Br J Forensic Pract 7(1): 1–5

    Google Scholar 

  2. Chawki, M.: Cybercrime in France: an overview. Computer Crime Research Center. December, 2005. Downloaded January 23rd 2006 from: http://www.crime-research.org/articles/cybercrime-in-france-overview/ (2005)

  3. Davis E., Wright H., Tremaine C.: Beyond phishing: pharming and crimeware attacks. Downloaded Jan 23rd 2006 from: http://www.privsecblog.com/archives/phishingpharming-53-beyond-phishing-pharming-and-crimeware-attacks-.html (2005)

  4. DOJ: Cyberstalking: a new challenge for law enforcement and industry" a report from the Attorney General to the Vice President (August 1999) Downloaded January 23rd 2006 from http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm. (1999)

  5. DOJ: H.R. 3402 Department of Justice Appropriations Authorization Act, fiscal years 2006 through 2009. Downloaded January 23rd from: http://www.gop.gov/Committeecentral/bills/hr3402.asp (2005)

  6. Gordon, S.: Exploring spyware and adware risk assessment. Presentation to the Computers and Security Institute Conference, Phoenix, Arizona (2005)

  7. Gordon S. Changing the way the World thinks about computer security. Ph.D. Thesis, University of Middlesex, Department of Computer Science. London, UK (2005)

  8. Gordon S., Ford, R.: Cyberterrorism? In: Cybterterrorism. The International Library of Essays in Terrorism, Alan O’Day, Ashgate, ISBN 0 7546 2426 9 (2004)

  9. Grodzinsky F.S., Tavani, H.T.: Some ethical reflections on cyberstalking. In: ACM SIGCAS Computers and Society, vol. 32 Issue 1 (2002)

  10. Helpguide: Domestic violence and abuse: types, signs, symptoms, Causes, and Effects. A project of the Rotary Club of Santa Monica, California and the Center for Healthy Again. Downloaded January 23rd 2006 from: http://www.helpguide.org/mental/domestic_violence_abuse_types_signs_causes_effects.htm (2005)

  11. Informit: Protecting yourself from internet crime. Part II. Downloaded Jan 23rd 2006 from: http://www.informit.com/ guides/content.asp?g=security&seqNum=144 (2005)

  12. ISTR: Symantec internet security threat report. Trends for July 04- December 04, Vol VII (2005)

  13. Krone T.: High tech crime brief. Australian Institute of Criminology, Canberra, Australia, ISSN 1832–3413 (2005)

  14. Kshetri, N.: The simple economics of cybercrimes, security & privacy magazine. In: IEEE, vol. 4, Issue 1, pp. 33–39 (2006)

  15. Kuhn T. (1992) The structure of scientific revolution 2nd ed. University of Chicago Press, Chicago Illinois

    Google Scholar 

  16. Parker D. (1998) Fighting computer crime: a new framework for protecting information ISBN 0471163783. Wiley, New York

    Google Scholar 

  17. PC Magazine: PC magazine encyclopedia. Downloaded Jan 23rd 2006 from: http://www.pcmag.com/encyclopedia_term/ 0,2542, t=crimeware&i=55434,00.asp (2005)

  18. Studycrime: Online resource guide to law and crime. Downloaded Jan 23rd 2006 from: http://www.studycrime.com/Crime/Crimeware.php (2005)

  19. United Nations: The united Nations manual on the prevention and control of computer related crime, 1995, supra note 41, paragraphs 20 to 73 in International Review of Criminal Policy, pp. 43–44 (1995)

  20. Wikipedia: Common usage crimeware definition. Downloaded Jan 23rd 2006 from http://en.wikipedia.org/wiki/Crimeware (2006)

  21. ZD: 2.8 Billion in E-commerce revenues lost to fraud in 2005. ZD Online., Downloaded Jan 23rd 2006 from: http://blogs.zdnet.com/ITFacts/?p=9471 (2005)

  22. Zeviar-Geese: The state of the law on cyberjurisdiction and cybercrime on the internet.In: California Pacific School of Law, Gonzaga Journal of International Law, vol. 1 (1997–1998)

  23. Zona M.A., Sharma K.K., Lane M.D. (1993) A comparative study of erotomanic and obsessional subjects in a forensic sample. J Forensic Sci 38, 894–903

    Google Scholar 

  24. Zona M.A., Palarea R.E., Lane J.C. (1998). Psychiatric diagnosis and the offender-victim typology of stalking. In Meloy, J.R. The Psychology of Stalking: Clinical and Forensic Perspectives. Academic, San Diego, California: (1998)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarah Gordon.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gordon, S., Ford, R. On the definition and classification of cybercrime. J Comput Virol 2, 13–20 (2006). https://doi.org/10.1007/s11416-006-0015-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-006-0015-z

Keywords

Navigation