Skip to main content Accessibility help
×
Hostname: page-component-7479d7b7d-rvbq7 Total loading time: 0 Render date: 2024-07-08T16:15:02.395Z Has data issue: false hasContentIssue false

10 - Cybercrime

from PART IA - Varieties of Transnational Crimes

Published online by Cambridge University Press:  20 June 2019

Mangai Natarajan
Affiliation:
John Jay College of Criminal Justice, City University of New York
Get access
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

Allcott, H. & Gentzkow, M. (2017). Social media and fake news in the 2016 election. Journal of Economic Perspectives, 31(2), 211236.Google Scholar
Chen, T. M. & Robert, J. M. (2004). The evolution of viruses and worms. In W. S. Chen (Ed.), Statistical methods in computer security (pp. 265). New York: Marcel Dekker.Google Scholar
Clarke, R. & Youngstein, T. (2017). Cyberattack on Britain’s National Health Service: A wake-up call for modern medicine. New England Journal of Medicine, 377(5), 409411.CrossRefGoogle ScholarPubMed
Donner, C. M., Marcum, C. D., Jennings, W. G., Higgins, G. E., & Banfield, J. (2014). Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34, 165172.Google Scholar
Europol report (2017). Internet organized crime threat assessment by EUROPOL (IOCTA 2017). Retrieved from www.europol.europa.eu/iocta/2017/index.html.Google Scholar
Fishbein, M. & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Boston, MA: Addison-Wesley.Google Scholar
Haggard, S. & Lindsay, J. R. (2015). North Korea and the Sony Hack: exporting instability through cyberspace. Asia Pacific Issues, 117, 1–8.Google Scholar
Kshetri, N. & Voas, J. (2017). Hacking power grids: A current problem. Computer, 50(12), 9195.Google Scholar
Lewis, J. (2018). Mcafee – economic impact of cybercrime. Retrieved from www.mcafee.com/us/resources/reports/restricted/economic-impact-cybercrime.pdf.Google Scholar
Manky, D. (2013). Cybercrime as a service: a very modern business. Computer Fraud & Security, 2013(6), 913.CrossRefGoogle Scholar
Maras, M. H. (2017). Cybercriminology. New York: Oxford University Press.Google Scholar
Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767772.CrossRefGoogle Scholar
Persily, N. (2017). Can democracy survive the Internet? Journal of Democracy, 28(2), 6376.Google Scholar
Steinmetz, K. F. & Nobles, M. R. (2017). Introduction. In Technocrime and criminological theory (pp. 1726). New York: Routledge Taylor and Francis Group.CrossRefGoogle Scholar
Sunstein, C. R. (2018). Republic: Divided democracy in the age of social media. Princeton, NJ: Princeton University Press.Google Scholar
The Economist. (2017). The world’s most valuable resource is no longer oil, but data. Retrieved from www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource.Google Scholar
Trautman, L. J. (2016). Is cyberattack the next Pearl Harbor? North Carolina Journal of Law & Technology, 18, 233.Google Scholar
Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer hackers. Communications of the ACM, 56(4), 6474.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Cybercrime
  • Edited by Mangai Natarajan, John Jay College of Criminal Justice, City University of New York
  • Book: International and Transnational Crime and Justice
  • Online publication: 20 June 2019
  • Chapter DOI: https://doi.org/10.1017/9781108597296.010
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Cybercrime
  • Edited by Mangai Natarajan, John Jay College of Criminal Justice, City University of New York
  • Book: International and Transnational Crime and Justice
  • Online publication: 20 June 2019
  • Chapter DOI: https://doi.org/10.1017/9781108597296.010
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Cybercrime
  • Edited by Mangai Natarajan, John Jay College of Criminal Justice, City University of New York
  • Book: International and Transnational Crime and Justice
  • Online publication: 20 June 2019
  • Chapter DOI: https://doi.org/10.1017/9781108597296.010
Available formats
×