International Journal of Cyber Criminology

Articles from Vol. 4, No. 1/2, January-December

Advance Fee Fraud Letters as Machiavellian/Narcissistic Narratives
IntroductionPrasad, Kathawala, Bocker and Sprague (1991) said that the number of computer crimes was on the rise and that there was a spreading variety of sophisticated misdeeds: viruses; physical damage or destruction (sabotage); financial deception,...
Book Review of Cybercrime: An Introduction to an Emerging Phenomenon
Book Review of Cybercrime: An Introduction to an Emerging Phenomenon Cybercrime: An Introduction to an Emerging Phenomenon, George Higgins, 2010, McGraw- Hill Publishing, New York, NY, 192 pages, U.S. $52.83 (Paperback), ISBN-10: 0073401552Cybercrime...
Cyber Bullying in Chinese Web Forums: An Examination of Nature and Extent
IntroductionAdolescent school violence is a common and significant problem in many countries across the globe (Arseneault, Walsh, Trzesniewski, Newcombe, Caspi, & Moffitt, 2006; Beran & Li, 2005, 2007; Erdur-Baker, 2010; Frost, 1991; Hazler,...
Gambling in Penny Stocks: The Case of Stock Spam E-Mails
IntroductionAs the Internet has become an integral part of people's lives around the world, criminals have increasingly adopted online strategies, such as stock spam e-mail campaigns (SCs), to reach large numbers of potential victims cheaply and efficiently....
Online Child Sexual Abuse by Female Offenders: An Exploratory Study
IntroductionRecent cases in the United Kingdom4 have brought to public light that women do exploit the Internet to sexually abuse children. It is therefore important to lift the taboo surrounding female sex offenders and explore the evidence available...
Parental Regulation and Online Activities: Examining Factors That Influence a Youth's Potential to Become a Victim of Online Harassment
IntroductionInterest in research related to Internet-based deviance has increased dramatically over the last decade. One area in which interest has increased equally among both academics and practitioners alike is the realm of online harassment, which...
Pirating Youth: Examining the Correlates of Digital Music Piracy among Adolescents
IntroductionThe development of the personal computer has led to widespread use of the Internet, which allows for an exchange of information and the production of behaviors that include crime. One form of crime on the Internet is digital piracy. Digital...
The Council of Europe's Cyber Crime Treaty: An Exercise in Symbolic Legislation
IntroductionIn recent years, computers and the internet have evolved into a world-wide phenomenon. Technology now links populations around the world in ways never before possible. The interconnection of many computers, called "cyberspace," allows for...
The Future of Cyber Criminology: Challenges and Opportunities1
Internet technology and the development of cyberspace have taken society to the next level of evolution. Cyberspace has defied the boundaries and has made geography (or place) irrelevant. Cyberspace presents myriad potential opportunities for society...
The Risk Propensity and Rationality of Computer Hackers
IntroductionThe English verb hacking in the context of computers is commonly described as referring to the act of re-designing the configuration of hardware or software systems to alter their intended function. This act requires that the person hacking...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.