1932

Abstract

Cybercrime is not a solely technical subject but one that involves human offenders who are susceptible to social scientific study. Yet, despite calls for cybercrime research to be mainstreamed, the topic remains a niche area within legal studies and the social sciences. Drawing on the most significant findings over recent years, this review aims to make the subject more accessible to a wide range of scholars by softening some of the perceived boundaries between conceptions of cybercrime and conventional crime. It examines these key themes in the literature: definitions and categories of cybercrime, cybercrime marketplaces, the governance of cybercrime, the importance of “place” within the world of cybercrime, cybercriminal networks, a discussion of what is new or old about cybercrime, and how we should define the concept going forward. The empirical literature on these themes suggests a simple definition is most appropriate: Cybercrime is crime that uses digital technology in a significant way.

Loading

Article metrics loading...

/content/journals/10.1146/annurev-lawsocsci-041822-044042
2024-10-17
2025-06-14
Loading full text...

Full text loading...

/deliver/fulltext/lawsocsci/20/1/annurev-lawsocsci-041822-044042.html?itemId=/content/journals/10.1146/annurev-lawsocsci-041822-044042&mimeType=html&fmt=ahah

Literature Cited

  1. Axelrod R. 2006.. The Evolution of Cooperation. New York:: Basic Books
    [Google Scholar]
  2. Barratt M, Ferris J, Winstock A. 2016.. Safer scoring? Cryptomarkets, social supply and drug market violence. . Int. J. Drug Policy 35::2431
    [Crossref] [Google Scholar]
  3. Bernstein L. 1992.. Opting out of the legal system: extralegal contractual relations in the diamond industry. . J. Legal Stud. 21::11557
    [Crossref] [Google Scholar]
  4. Bijlenga N, Kleemans ER. 2018.. Criminals seeking ICT-expertise: an exploratory study of Dutch cases. . Eur. J. Crim. Policy Res. 24::25368
    [Crossref] [Google Scholar]
  5. Bossler A, Berenblum T. 2019.. Introduction: new directions in cybercrime research. . J. Crime Justice 42::49599
    [Crossref] [Google Scholar]
  6. Broadhurst R, Grabosky P, Alazab M, Chon S. 2014.. Organizations and cyber crime: an analysis of the nature of groups engaged in cyber crime. . Int. J. Cyber Criminol. 8::120
    [Google Scholar]
  7. Bruce M, Lusthaus J, Kashyap R, Phair N, Varese N. 2024.. Mapping the global geography of cybercrime with the World Cybercrime Index. . PLOS ONE 19:(4):e0297312
    [Crossref] [Google Scholar]
  8. Buil-Gil D, Saldaña-Taboada P. 2022.. Offending concentration on the Internet: an exploratory analysis of bitcoin-related cybercrime. . Deviant Behav. 43::145370
    [Crossref] [Google Scholar]
  9. Chen S, Hao M, Ding F, Jiang D, Zhang S, et al. 2023.. Exploring the global geography of cybercrime and its driving forces. . Hum. Soc. Sci. Commun. 10::71
    [Crossref] [Google Scholar]
  10. Collier B, Clayton R, Hutchings A, Thomas D. 2021.. Cybercrime is (often) boring: infrastructure and alienation in a deviant subculture. . Br. J. Criminol. 61:(5):140723
    [Crossref] [Google Scholar]
  11. Cook K, Hardin R, Levi M. 2005.. Cooperation Without Trust? New York:: Russell Sage Found.
    [Google Scholar]
  12. Custers B, Pool R, Cornelisse R. 2019.. Banking malware and the laundering of its profits. . Eur. J. Criminol. 16::72845
    [Crossref] [Google Scholar]
  13. Décary-Hétu D, Dupont B. 2013.. Reputation in a dark network of online criminals. . Global Crime 14::17596
    [Crossref] [Google Scholar]
  14. Décary-Hétu D, Giommoni L. 2017.. Do police crackdowns disrupt drug cryptomarkets? A longitudinal analysis of the effects of Operation Onymous. . Crime Law Soc. Change 67::5575
    [Crossref] [Google Scholar]
  15. Décary-Hétu D, Leppänen A. 2016.. Criminals and signals: an assessment of criminal performance in the carding underworld. . Secur. J. 29::44260
    [Crossref] [Google Scholar]
  16. Dupont B, Côté A-M, Boutin J-I, Fernandez J. 2017.. Darkode: recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world. .” Am. Behav. Sci. 61::121943
    [Crossref] [Google Scholar]
  17. Dupont B, Côté A-M, Savine C, Décary-Hétu D. 2016.. The ecology of trust among hackers. . Global Crime 17::12951
    [Crossref] [Google Scholar]
  18. Dupont B, Lusthaus J. 2021.. Countering distrust in illicit online networks: the dispute resolution strategies of cybercriminals. . Soc. Sci. Comput. Rev. 40:(4):892913
    [Crossref] [Google Scholar]
  19. Duxbury S, Haynie D. 2018a.. Building them up, breaking them down: topology, vendor selection patterns, and a digital drug market's robustness to disruption. . Soc. Netw. 52::23850
    [Crossref] [Google Scholar]
  20. Duxbury S, Haynie D. 2018b.. The network structure of opioid distribution on a darknet cryptomarket. . J. Quant. Criminol. 43::92141
    [Crossref] [Google Scholar]
  21. Ellickson R. 1991.. Order without Law: How Neighbors Settle Disputes. Cambridge, MA:: Harvard Univ. Press
    [Google Scholar]
  22. Eur. Comm. 2024.. Cybercrime. Eur. Comm., Brussels:. https://home-affairs.ec.europa.eu/policies/internal-security/cybercrime_en
    [Google Scholar]
  23. Furnell S. 2002.. Cybercrime: Vandalizing the Information Society. Boston/London:: Addison-Wesley
    [Google Scholar]
  24. Glenny M. 2011.. DarkMarket: CyberThieves, CyberCops and You. London:: Bodley Head
    [Google Scholar]
  25. Gordon S, Ford R. 2006.. On the definition and classification of cybercrime. . J. Comput. Virol. 2::1320
    [Crossref] [Google Scholar]
  26. Grabosky P. 2001.. Virtual criminality: Old wine in new bottles?. Soc. Legal Stud. 10::24349
    [Crossref] [Google Scholar]
  27. Hall T, Sanders B, Bah M, King O, Wigley E. 2021.. Economic geographies of the illegal: the multiscalar production of cybercrime. . Trends Organ. Crime 24::282307
    [Crossref] [Google Scholar]
  28. Halpern J. 2015.. Bank of the underworld. . The Atlantic, May. http://www.theatlantic.com/magazine/archive/2015/05/bank-of-the-underworld/389555/
    [Google Scholar]
  29. Hardy R, Norgaard J. 2016.. Reputation in the Internet black market: an empirical and theoretical analysis of the Deep Web. . J. Inst. Econ. 12::51539
    [Google Scholar]
  30. Holt T. 2013.. Exploring the social organisation and structure of stolen data markets. . Global Crime 14::15574
    [Crossref] [Google Scholar]
  31. Holt T, Bossler A. 2014.. An assessment of the current state of cybercrime scholarship. . Deviant Behav. 35::2040
    [Crossref] [Google Scholar]
  32. Holt T, Lampke E. 2010.. Exploring stolen data markets online: products and market forces. . Crim. Justice Stud. 23::3350
    [Crossref] [Google Scholar]
  33. Holt T, Lee J. 2022.. A crime script analysis of counterfeit identity document procurement online. . Deviant Behav. 43:(3):285302
    [Crossref] [Google Scholar]
  34. Hutchings A, Clayton R. 2016.. Exploring the provision of online booter services. . Deviant Behav. 37::116378
    [Crossref] [Google Scholar]
  35. Hutchings A, Holt T. 2015.. A crime script analysis of the online stolen data market. . Br. J. Criminol. 55::596614
    [Crossref] [Google Scholar]
  36. Hutchings A, Pastrana S. 2019.. Understanding eWhoring. . In Proceedings of the 2019 IEEE European Symposium on Security and Privacy. Stockholm:: IEEE
    [Google Scholar]
  37. Kigerl A. 2012.. Routine activity theory and the determinants of high cybercrime countries. . Soc. Sci. Comput. Rev. 30::47086
    [Crossref] [Google Scholar]
  38. Kigerl A. 2016.. Cyber crime nation typologies: K-means clustering of countries based on cyber crime rates. . Int. J. Cyber Criminol. 10::14769
    [Google Scholar]
  39. Kruisbergen EW, Leukfeldt ER, Kleemans ER, Roks RA. 2019.. Money talks: money laundering choices of organized crime offenders in a digital age. . J. Crime Justice 42::56981
    [Crossref] [Google Scholar]
  40. Kshetri N. 2010.. The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives. Berlin:: Springer
    [Google Scholar]
  41. Lavorgna A. 2015.. The online trade in counterfeit pharmaceuticals: new criminal opportunities, trends and challenges. . Eur. J. Criminol. 12:(2):22641
    [Crossref] [Google Scholar]
  42. Leukfeldt ER. 2014.. Cybercrime and social ties. . Trends Organ. Crime 17::23149
    [Google Scholar]
  43. Leukfeldt ER, Kleemans ER, Stol WP. 2017a.. Origin, growth and criminal capabilities of cybercriminal networks. . Int. Empir. Anal. 67::3953
    [Google Scholar]
  44. Leukfeldt R, Kleemans E, Stol W. 2017b.. Cybercriminal networks, social ties and online forums: social ties versus digital ties within phishing and malware networks. . Br. J. Criminol. 57::70422
    [Google Scholar]
  45. Leukfeldt R, Kleemans E, Stol W. 2017c.. A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists. . Crime Law Soc. Change 67::2137
    [Crossref] [Google Scholar]
  46. Leukfeldt ER, Yar M. 2016.. Applying routine activity theory to cybercrime: a theoretical and empirical analysis. . Deviant Behav. 37::26380
    [Crossref] [Google Scholar]
  47. Levi M. 2022.. Money mules: some insights into vulnerabilities and networks. . Public Sector Counter Fraud J. 9::1113
    [Google Scholar]
  48. Levy S. 2010.. Hackers: Heroes of the Computer Revolution. Sebastopol, CA:: O'Reilly Media
    [Google Scholar]
  49. Luo Q. 2024.. A qualitative examination of cybercriminal governance in China. PhD Thesis , Dep. Sociol., Univ. Oxford, Oxford, UK:
    [Google Scholar]
  50. Lusthaus J. 2012.. Trust in the world of cybercrime. . Global Crime 13::7194
    [Crossref] [Google Scholar]
  51. Lusthaus J. 2013.. How organised is organised cybercrime?. Global Crime 14::5260
    [Crossref] [Google Scholar]
  52. Lusthaus J. 2018.. Industry of Anonymity: Inside the Business of Cybercrime. Cambridge, MA:: Harvard Univ. Press
    [Google Scholar]
  53. Lusthaus J, Kleemans E, Leukfeldt R, Levi M, Holt T. 2023.. Cybercriminal networks in the UK and beyond: network structure, criminal cooperation and external interactions. . Trends Organ. Crime. https://doi.org/10.1007/s12117-022-09476-9
    [Google Scholar]
  54. Lusthaus J, van Oss J, Amann P. 2022.. The Gozi group: A criminal firm in cyberspace?. Eur. J. Criminol. 20:(5):170118
    [Crossref] [Google Scholar]
  55. Lusthaus J, Varese F. 2021.. Offline and local: the hidden face of cybercrime. . Policing 15:(1):414
    [Crossref] [Google Scholar]
  56. Maimon D, Louderback E. 2019.. Cyber-dependent crimes: an interdisciplinary review. . Annu. Rev. Criminol. 2::191216
    [Crossref] [Google Scholar]
  57. Martin J. 2014.. Lost on the Silk Road: online drug distribution and the ‘cryptomarket. .’ Criminol. Crim. Justice 14::35167
    [Crossref] [Google Scholar]
  58. Martin J, Munksgaard R, Coomber R, Demant J, Barratt M. 2020.. Selling drugs on darkweb cryptomarkets: differentiated pathways, risks and rewards. . Br. J. Criminol. 60::55978
    [Crossref] [Google Scholar]
  59. McGuire M, Dowling S. 2013.. Cyber crime: a review of the evidence. Res. Rep. 75 , Home Off., London:. https://assets.publishing.service.gov.uk/media/5a74fc06e5274a59fa716800/horr75-summary.pdf
    [Google Scholar]
  60. Moore T, Clayton R, Anderson R. 2009.. The economics of online crime. . J. Econ. Perspect. 23:(3):320
    [Crossref] [Google Scholar]
  61. Morselli C, Décary-Hétu D, Aldridge J. 2017.. Conflict management in illicit drug cryptomarkets. . Int. Crim. Justice Rev. 27::23754
    [Crossref] [Google Scholar]
  62. Munksgaard R. 2023.. Building a case for trust: reputation, institutional regulation and social ties in online drug markets. . Global Crime 24::4972
    [Crossref] [Google Scholar]
  63. Nguyen TV. 2022.. The modus operandi of transnational computer fraud: a crime script analysis in Vietnam. . Trends Organ. Crime 25::22647
    [Crossref] [Google Scholar]
  64. Norbutas L, Ruiter S, Corten R. 2020.. Believe it when you see it: dyadic embeddedness and reputation effects on trust in cryptomarkets for illegal drugs. . Soc. Netw. 63::15061
    [Crossref] [Google Scholar]
  65. North D. 1991.. Institutions. . J. Econ. Perspect. 5::97112
    [Crossref] [Google Scholar]
  66. Paquet-Clouston M, Décary-Hétu D, Morselli C. 2018.. Assessing market competition and vendors’ size and scope on AlphaBay. . Int. J. Drug Policy 54::8798
    [Crossref] [Google Scholar]
  67. Paquet-Clouston M, Haslhofer B, Dupont B. 2019.. Ransomware payments in the Bitcoin ecosystem. . J. Cybersecur. 5::tyz003
    [Crossref] [Google Scholar]
  68. Pastrana S, Hutchings A, Caines A, Buttery P. 2018.. Characterizing Eve: analysing cybercrime actors in a large underground forum. . In Research in Attacks, Intrusions and Defenses (RAID) 2018, ed. M Bailey, T Holz, M Stamatogiannakis, S Ioannidis , pp. 20727. Lect. Notes Comput. Sci. Cham, Switz:.: Springer
    [Google Scholar]
  69. Phillips K, Davidson JC, Farr RR, Burkhardt C, Caneppele S, Aiken MP. 2022.. Conceptualizing cybercrime: definitions, typologies and taxonomies. . Forensic Sci. 2::37998
    [Crossref] [Google Scholar]
  70. Porcedda MG, Wall D. 2021.. Modelling the cybercrime cascade effect in data crime. . In Proceedings of the 2021 IEEE European Symposium on Security and Privacy Workshops, pp. 16177. Piscataway, NJ:: IEEE
    [Google Scholar]
  71. Poulsen K. 2011.. Kingpin. New York:: Crown Publ.
    [Google Scholar]
  72. Przepiorka W, Norbutas L, Corten R. 2017.. Order without law: reputation promotes cooperation in a cryptomarket for illegal drugs. . Eur. Sociol. Rev. 6::75264
    [Crossref] [Google Scholar]
  73. Ragan S. 2012.. Eight arrested in Moscow after allegedly stealing millions using Carberp Trojan. . Security Week, March 21. http://www.securityweek.com/eight-arrested-moscow-after-allegedly-stealing-millions-using-carberp-trojan
    [Google Scholar]
  74. Roks RA, Leukfeldt ER, Densley JA. 2021.. The hybridization of street offending in the Netherlands. . Br. J. Criminol. 61:92645
    [Google Scholar]
  75. Soudijn M, Zegers B. 2012.. Cybercrime and virtual offender convergence settings. . Trends Organ. Crime 15::11129
    [Crossref] [Google Scholar]
  76. Srivastava S, Das S, Udo G, Bagchi K. 2020.. Determinants of cybercrime originating within a nation: a cross-country study. . J. Glob. Inf. Technol. Manag. 23::11237
    [Google Scholar]
  77. Steinmetz K. 2016.. Hacked: A Radical Approach to Hacker Culture and Crime. New York:: NYU Press
    [Google Scholar]
  78. Steinmetz K. 2024.. Against Cybercrime: Toward a Realist Criminology of Computer Crime. Oxford, UK:: Routledge
    [Google Scholar]
  79. Sugiura L. 2018.. Respectable Deviance and Purchasing Medicine Online. Cham, Switz.:: Palgrave Macmillan
    [Google Scholar]
  80. UNODC (UN Off. Drugs Crime). 2024.. Casinos, money laundering, underground banking, and transnational organized crime in East and Southeast Asia: a hidden and accelerating threat. Tech. Policy Rep. , UNODC, Vienna:
    [Google Scholar]
  81. Wall D. 1998.. Catching cybercriminals: policing the internet. . Int. Rev. Law Comput. Technol. 12::20118
    [Crossref] [Google Scholar]
  82. Wall D. 2007.. Cybercrime: The Transformation of Crime in the Information Age. Cambridge, UK:: Polity
    [Google Scholar]
  83. Wall D. 2008.. What are cybercrimes?. Crim. Justice Matters 58::2021
    [Crossref] [Google Scholar]
  84. Weulen Kranenbarg M, Ruiter S, van Gelder J-L, Bernasco W. 2018.. Cyber-offending and traditional offending over the life-course: an empirical comparison. . J. Dev. Life-Course Criminol. 4::34364
    [Crossref] [Google Scholar]
  85. Yar M. 2005.. The novelty of “cybercrime”: an assessment in light of routine activity theory. . Eur. J. Criminol. 2::40727
    [Crossref] [Google Scholar]
  86. Yip M, Webber C, Shadbolt N. 2013.. Trust among cybercriminals? Carding forums, uncertainty and implications for policing. . Polic. Soc. 23:(4):51639
    [Crossref] [Google Scholar]
/content/journals/10.1146/annurev-lawsocsci-041822-044042
Loading
/content/journals/10.1146/annurev-lawsocsci-041822-044042
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error