Article

Cybercrime

Thomas Holt

in Criminology

ISBN: 9780195396607
Published online December 2009 | | DOI: http://dx.doi.org/10.1093/obo/9780195396607-0025
Cybercrime

More Like This

Show all results sharing these subjects:

  • Criminology and Criminal Justice
  • Criminal Justice
  • Criminology

GO

Preview

There is no standard unit of analysis, and multiple terms are used to describe offenses often classified as cybercrime. In fact the terms “cybercrime” and “computer crime” have become nearly synonymous, although there is a difference between these two events. Cybercrimes typically are those in which special knowledge of cyberspace is used to commit a crime, whereas computer crimes are those in which the perpetrator uses computer technology to offend (Wall 2001, see General Overviews). Despite these differences, the term “cybercrime” will be used here to refer to the wide range of deviant and criminal behaviors that are facilitated in part by computer technology. Wall 2001 (see General Overviews) provides one of the most comprehensive and recognized typologies of cybercrime, which includes four categories of offending. The first category is cybertrespass, encompassing the crossing of invisible yet salient boundaries of ownership online, primarily by computer hackers. The second and related category is cyberdeception and theft. This form of computer crime includes all the various criminal acquisitions that may occur online, including digital piracy, fraud, and identity theft. The third category includes cyberporn and obscenity. This category recognizes deviant but not necessarily illegal content, such as traditional pornography, along with sexual services and child predation. The final category of crime within Wall’s typology is cyberviolence, representing the distribution of a variety of injurious, hurtful, or dangerous materials online. This includes online harassment and stalking as well as more serious acts of terror.

Article.  5904 words. 

Subjects: Criminology and Criminal Justice ; Criminal Justice ; Criminology

Full text: subscription required

How to subscribeRecommend to my Librarian

Buy this work at Oxford University Press »