4.7 Article

Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals

Journal

COMPUTERS IN HUMAN BEHAVIOR
Volume 126, Issue -, Pages -

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.chb.2021.106979

Keywords

Cybercrime; Phishing; Malware; Organized crime; Criminal network; Cafeteria-style offending

Ask authors/readers for more resources

Criminologists have debated whether offenders are specialists or versatile in committing cybercrimes, with this study finding that half of offender networks specialize in certain forms of cybercrime while the other half commit various types of crimes. The study suggests that treating cybercriminals as a distinct offender group may have limited value.
Criminologists have frequently debated whether offenders are specialists, in that they consistently perform either one offense or similar offenses, or versatile by performing any crime based on opportunities and situational provocations. Such foundational research has yet to be developed regarding cybercrimes, or offenses enabled by computer technology and the Internet. This study address this issue using a sample of 37 offender networks. The results show variations in the offending behaviors of those involved in cybercrime. Almost half of the offender networks in this sample appeared to be cybercrime specialists, in that they only performed certain forms of cybercrime. The other half performed various types of crimes on and offline. The relative equity in specialization relative to versatility, particularly in both on and offline activities, suggests that there may be limited value in treating cybercriminals as a distinct offender group. Furthermore, this study calls to question what factors influence an offender's pathway into cybercrime, whether as a specialized or versatile offender. The actors involved in cybercrime networks, whether as specialists or generalists, were enmeshed into broader online offender networks who may have helped recognize and act on opportunities to engage in phishing, malware, and other economic offenses.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available