International Journal of Cyber Criminology

Articles from Vol. 5, No. 1, January-July

Book Review of Crime-Online
Book Review of Crime-Online Crime On-Line: Correlates, causes and contexts, Thomas. J. Holt, 2011, Carolina Academic Press, Durham, NC, USA. Pages 254. ISBN 978-1-59460-781-3In the present internet era the three glaring problems that have outsmarted...
Cybercrime Victimization: An Examination of Individual and Situational Level Factors
IntroductionOver the past two decades, cybercrime has emerged as a salient area of inquiry for criminologists and a growing concern for public policy. Although there are many definitions of cybercrime, the term generally refers to crimes committed through...
Email Spam and the CAN-SPAM Act: A Qualitative Analysis
IntroductionEmail spam could be one of the most prevalent crimes in the sense that almost every email user probably has received at least a few unsolicited commercial emails at some point of time. The motivation of spam usually involves revenue generation,...
Organizational Data Breaches 2005-2010: Applying SCP to the Healthcare and Education Sectors
(ProQuest: ... denotes formula omitted.)IntroductionSituational crime prevention (SCP) is a practical application of routine activity theory (RAT) that reduces the frequency of likely criminal opportunities (Felson & Clarke, 1998). Cohen and Felson...
Retro Gaming Subculture and the Social Construction of a Piracy Ethic
IntroductionElectronic gaming has become a massive industry, rivaling Hollywood in its revenues (San Francisco Chronicle, 2004). Growing alongside it is a form of copyright infringement increasingly investigated by scholars: digital piracy. Most of this...
Understanding Cyber-Crime in Ghana: A View from Below
IntroductionIn January 2011, I purchased a discarded hard drive for $27 in a secondhand computer store on Bantama High Street in Kumasi, Ghana. Upon connecting it to a hard drive reader, I learned a plethora of information about the drive's former owner....
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.