Criminal Use of Technology
- LAST REVIEWED: 28 February 2017
- LAST MODIFIED: 28 February 2017
- DOI: 10.1093/obo/9780195396607-0211
- LAST REVIEWED: 28 February 2017
- LAST MODIFIED: 28 February 2017
- DOI: 10.1093/obo/9780195396607-0211
Introduction
Substantial growth has occurred since the 1990s in technologies sectors: the widespread use of the Internet, cellular telephones, digital media, and social networking sites. Suffice it to say, much of everyday life has moved online. Just as these emerging technologies offer a number of benefits to users, so too do they open up new opportunities for crime and deviance. Technology can act as an environment and means for offending (as in the case of hacking) and as a facilitator for deviance and crime in the real world (as with gangs, terrorism, and child pornography). Research over the past decade has begun elaborating on various criminal uses of the technology, including computer hacking and digital piracy, the creation and dissemination of child pornography and sexting, identity fraud and theft, and cyber bullying and harassment. A parallel body of research details the online presence and digital capabilities of antisocial groups, such as gangs, cults, and terrorist and extremist organizations, among others. The development of a coherent body of research on the criminal use of technology spans disciplines and theories of individual and group behavior. Indeed, it is noteworthy that these areas are concerns not just for criminology, but also for public health, human development, computer science, economics, and public policy. Further, the diverse nature of offending intimately tied to technology means that understanding how criminals embrace and harness these technologies carries important implications for theorists and practitioners alike. Despite its interdisciplinary appeal, and the very real problems associated with cyber deviance, rarely do these disciplines engage one another. This article brings together, and provides readers with, interdisciplinary readings and references to important and influential works examining deviant and criminal uses of technology since the 1990s. Although this article concentrates primarily on online offending and the use of technology by antisocial groups, it is nevertheless important to also understand cyber victimization or institutional reactions to the criminal uses of technology. Where applicable, references to these areas are also discussed.
General Overviews
A number of works detail the use of technology for deviant or criminal purposes. Felson and Boba 2010 provides an overview of routine activity theory and the way in which everyday items and behaviors can be linked to crime. Natarajan, et al. 1995 is an early example of this way of thinking in detailing the importance of telephones for drug dealing. Newman and Clarke 2011 provides a logical extension of Felson and Boba 2010, which presents a framework to the online world. Yar 2013 and Wall 2001 are early overviews of the growing problems associated with cybercrime. Wall 2001 further provides a typology of cybercrimes, which is used in Holt and Bossler 2014 (cited under Anthologies and State of the Literature Reviews) to frame the current state of knowledge surrounding cybercrime. Taylor, et al. 2015 brings together research linking individual and group offending behaviors online in an accessible way. Arquilla and Ronfeldt 2001 provides a somewhat extreme but important view of cybercrime from the perspective of government, and the challenges associated with use of increasingly sophisticated technology by antisocial groups.
Arquilla, John, and David Ronfeldt, eds. 2001. Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.
Focuses on asymmetrical conflict and the use of the technology to promote and support violence, terrorism, and other forms of extremism both domestically and abroad. Less criminologically focused, but covers a number of important antisocial groups.
Felson, Marcus, and Rachel L. Boba. 2010. Crime and everyday life. Thousand Oaks, CA: SAGE.
Most recent version of the book. Influential framework for early studies of cybercrime and cyber victimization; useful for undergraduates. This edition integrates insights from control theory into the routine activity framework.
Hollinger, Richard C., and Lonn Lanza-Kaduce. 1988. The process of criminalization: The case of computer crime laws. Criminology 26.1: 101–126.
DOI: 10.1111/j.1745-9125.1988.tb00834.x
Early account of the institutional efforts to criminalize online behavior. Good window into the development and definitions of cybercrime from a legal and social control perspective.
Natarajan, Mangai, Ronald V. Clarke, and Bruce D. Johnson. 1995. Telephones as facilitators of drug dealing. European Journal on Criminal Policy and Research 3.3: 137–153.
DOI: 10.1007/BF02242934
Conceptually important piece demonstrating how to think about technology and crime and the challenges they pose for law enforcement.
Newman, Graeme R., and Ronald V. Clarke. 2011. Superhighway robbery: Preventing E-commerce crime. Oxon, UK: Routledge.
An important book for considering how to prevent cybercrime and cyber victimization, particularly those offenses related to e-commerce. Emphasizes rational choice and situational crime prevention strategies, to the neglect of other major criminological theories.
Taylor, Robert W., Eric J. Fritsch, and John Liederbach. 2015. Digital crime and digital terrorism. 3d ed. Upper Saddle River, NJ: Pearson.
The volume covers a broad body of cybercrime literature fairly successfully, including the online presence of antisocial groups and state social control responses to cybercrime. Useful for undergraduates.
Wall, David S., ed. 2001. Crime and the Internet: Cybercrimes and cyberfears. New York: Routledge.
Seminal work laying a foundation for thinking about cybercrime. Defines four main cybercrime areas: hacking and cybertrespass, cyber-deception and theft, cyber porn and obscenity, and cyber violence. Lays out much of the foundation for research in this area, much of which remains unexplored.
Yar, Majid. 2013. Cybercrime and society. 2d ed. Los Angeles: SAGE.
Solid introductory work, covering traditional areas of cybercrime and cyber victimization. Also explores the role of civil liberties in trying to control cybercrime and the diffusion of child pornography and hate speech on the Internet.
Users without a subscription are not able to see the full content on this page. Please subscribe or login.
How to Subscribe
Oxford Bibliographies Online is available by subscription and perpetual access to institutions. For more information or to contact an Oxford Sales Representative click here.
Article
- Active Offender Research
- Actus Reus
- Adler, Freda
- Adversarial System of Justice
- Adverse Childhood Experiences
- Aging Prison Population, The
- Airport and Airline Security
- Alcohol and Drug Prohibition
- Alcohol Use, Policy and Crime
- Alt-Right Gangs and White Power Youth Groups
- Animals, Crimes Against
- Anomie
- Arson
- Art Crime
- Back-End Sentencing and Parole Revocation
- Bail and Pretrial Detention
- Batterer Intervention Programs
- Bentham, Jeremy
- Big Data and Communities and Crime
- Biosocial Criminology
- Blackmail
- Black's Theory of Law and Social Control
- Blumstein, Alfred
- Boot Camps and Shock Incarceration Programs
- Burglary, Residential
- Bystander Intervention
- Capital Punishment
- Chambliss, William
- Chicago School of Criminology, The
- Child Maltreatment
- Chinese Triad Society
- Civil Protection Orders
- Collateral Consequences of Felony Conviction and Imprisonm...
- Collective Efficacy
- Commercial and Bank Robbery
- Commercial Sexual Exploitation of Children
- Communicating Scientific Findings in the Courtroom
- Community Change and Crime
- Community Corrections
- Community Disadvantage and Crime
- Community-Based Justice Systems
- Community-Based Substance Use Prevention
- Comparative Criminal Justice Systems
- CompStat Models of Police Performance Management
- Confessions, False and Coerced
- Conservation Criminology
- Consumer Fraud
- Contextual Analysis of Crime
- Control Balance Theory
- Convict Criminology
- Co-Offending and the Role of Accomplices
- Corporate Crime
- Costs of Crime and Justice
- Courts, Drug
- Courts, Juvenile
- Courts, Mental Health
- Courts, Problem-Solving
- Crime and Justice in Latin America
- Crime, Campus
- Crime Control Policy
- Crime Control, Politics of
- Crime, (In)Security, and Islam
- Crime Prevention, Delinquency and
- Crime Prevention, Situational
- Crime Prevention, Voluntary Organizations and
- Crime Trends
- Crime Victims' Rights Movement
- Criminal Career Research
- Criminal Decision Making, Emotions in
- Criminal Justice Data Sources
- Criminal Justice Ethics
- Criminal Justice Fines and Fees
- Criminal Justice Reform, Politics of
- Criminal Justice System, Discretion in the
- Criminal Records
- Criminal Retaliation
- Criminal Talk
- Criminology and Political Science
- Criminology of Genocide, The
- Critical Criminology
- Cross-National Crime
- Cross-Sectional Research Designs in Criminology and Crimin...
- Cultural Criminology
- Cultural Theories
- Cybercrime
- Cybercrime Investigations and Prosecutions
- Cycle of Violence
- Day Fines
- Deadly Force
- Defense Counsel
- Defining "Success" in Corrections and Reentry
- Desistance
- Deterrence
- Developmental and Life-Course Criminology
- Digital Piracy
- Driving and Traffic Offenses
- Drug Control
- Drug Trafficking, International
- Drugs and Crime
- Elder Abuse
- Electronically Monitored Home Confinement
- Employee Theft
- Environmental Crime and Justice
- Experimental Criminology
- Extortion
- Family Violence
- Fear of Crime and Perceived Risk
- Felon Disenfranchisement
- Femicide
- Feminist Theories
- Feminist Victimization Theories
- Fencing and Stolen Goods Markets
- Firearms and Violence
- Forensic Science
- For-Profit Private Prisons and the Criminal Justice–Indust...
- Fraud
- Gambling
- Gangs, Peers, and Co-offending
- Gender and Crime
- Gendered Crime Pathways
- General Opportunity Victimization Theories
- Genetics, Environment, and Crime
- Green Criminology
- Halfway Houses
- Harm Reduction and Risky Behaviors
- Hate Crime
- Hate Crime Legislation
- Healthcare Fraud
- Hirschi, Travis
- History of Crime in the United Kingdom
- History of Criminology
- Homelessness and Crime
- Homicide
- Homicide Victimization
- Honor Cultures and Violence
- Hot Spots Policing
- Human Rights
- Human Trafficking
- Identity Theft
- Immigration, Crime, and Justice
- Incarceration, Mass
- Incarceration, Public Health Effects of
- Income Tax Evasion
- Indigenous Criminology
- Institutional Anomie Theory
- Integrated Theory
- Intermediate Sanctions
- Interpersonal Violence, Historical Patterns of
- Interrogation
- Intimate Partner Violence, Criminological Perspectives on
- Intimate Partner Violence, Police Responses to
- Investigation, Criminal
- Juvenile Delinquency
- Juvenile Justice System, The
- Juvenile Waivers
- Kidnapping
- Kornhauser, Ruth Rosner
- Labeling Theory
- Labor Markets and Crime
- Land Use and Crime
- Lead and Crime
- Legitimacy
- LGBTQ Intimate Partner Violence
- LGBTQ People in Prison
- Life Without Parole Sentencing
- Local Institutions and Neighborhood Crime
- Lombroso, Cesare
- Longitudinal Research in Criminology
- Mandatory Minimum Sentencing
- Mapping and Spatial Analysis of Crime, The
- Mass Media, Crime, and Justice
- Measuring Crime
- Mediation and Dispute Resolution Programs
- Mental Health and Crime
- Merton, Robert K.
- Meta-analysis in Criminology
- Middle-Class Crime and Criminality
- Migrant Detention and Incarceration
- Mixed Methods Research in Criminology
- Money Laundering
- Motor Vehicle Theft
- Multi-Level Marketing Scams
- Murder, Serial
- Narrative Criminology
- National Deviancy Symposia, The
- Nature Versus Nurture
- Neighborhood Disorder
- Neutralization Theory
- New Penology, The
- Offender Decision-Making and Motivation
- Offense Specialization/Expertise
- Organized Crime
- Outlaw Motorcycle Clubs
- Panel Methods in Criminology
- Peacemaking Criminology
- Peer Networks and Delinquency
- Perceptions of Youth, Juvenile Justice Professionals'
- Performance Measurement and Accountability Systems
- Personality and Trait Theories of Crime
- Persons with a Mental Illness, Police Encounters with
- Phenomenological Theories of Crime
- Plea Bargaining
- Poaching
- Police Administration
- Police Cooperation, International
- Police Discretion
- Police Effectiveness
- Police History
- Police Militarization
- Police Misconduct
- Police, Race and the
- Police Use of Force
- Police, Violence against the
- Policing and Law Enforcement
- Policing, Body-Worn Cameras and
- Policing, Broken Windows
- Policing, Community and Problem-Oriented
- Policing Cybercrime
- Policing, Evidence-Based
- Policing, Intelligence-Led
- Policing, Privatization of
- Policing, Proactive
- Policing, School
- Policing, Stop-and-Frisk
- Policing, Third Party
- Polyvictimization
- Positivist Criminology
- Pretrial Detention, Alternatives to
- Pretrial Diversion
- Prison Administration
- Prison Classification
- Prison, Disciplinary Segregation in
- Prison Education Exchange Programs
- Prison Gangs and Subculture
- Prison History
- Prison Labor
- Prison Visitation
- Prisoner Reentry
- Prisons and Jails
- Prisons, HIV in
- Private Security
- Probation Revocation
- Procedural Justice
- Property Crime
- Prosecution and Courts
- Prostitution
- Psychiatry, Psychology, and Crime: Historical and Current ...
- Psychology and Crime
- Public Criminology
- Public Opinion, Crime and Justice
- Public Order Crimes
- Public Social Control and Neighborhood Crime
- Punishment Justification and Goals
- Qualitative Methods in Criminology
- Queer Criminology
- Race and Sentencing Research Advancements
- Race, Ethnicity, Crime, and Justice
- Racial Threat Hypothesis
- Racial Profiling
- Rape and Sexual Assault
- Rape, Fear of
- Rational Choice Theories
- Rehabilitation
- Religion and Crime
- Restorative Justice
- Risk Assessment
- Routine Activity Theories
- School Bullying
- School Crime and Violence
- School Safety, Security, and Discipline
- Search Warrants
- Seasonality and Crime
- Self-Control, The General Theory:
- Self-Report Crime Surveys
- Sentencing Enhancements
- Sentencing, Evidence-Based
- Sentencing Guidelines
- Sentencing Policy
- Sex Crimes
- Sex Offender Policies and Legislation
- Sex Trafficking
- Sexual Revictimization
- Situational Action Theory
- Snitching and Use of Criminal Informants
- Social and Intellectual Context of Criminology, The
- Social Construction of Crime, The
- Social Control of Tobacco Use
- Social Control Theory
- Social Disorganization
- Social Ecology of Crime
- Social Learning Theory
- Social Networks
- Social Threat and Social Control
- Solitary Confinement
- South Africa, Crime and Justice in
- Sport Mega-Events Security
- Stalking and Harassment
- State Crime
- State Dependence and Population Heterogeneity in Theories ...
- Strain Theories
- Street Code
- Street Robbery
- Substance Use and Abuse
- Surveillance, Public and Private
- Sutherland, Edwin H.
- Technology and the Criminal Justice System
- Technology, Criminal Use of
- Terrorism
- Terrorism and Hate Crime
- Terrorism, Criminological Explanations for
- Testimony, Eyewitness
- Therapeutic Jurisprudence
- Trajectory Methods in Criminology
- Transnational Crime
- Truth-In-Sentencing
- Urban Politics and Crime
- US War on Terrorism, Legal Perspectives on the
- Victim Impact Statements
- Victimization, Adolescent
- Victimization, Biosocial Theories of
- Victimization Patterns and Trends
- Victimization, Repeat
- Victimization, Vicarious and Related Forms of Secondary Tr...
- Victimless Crime
- Victim-Offender Overlap, The
- Violence Against Women
- Violence, Youth
- Violent Crime
- White-Collar Crime
- White-Collar Crime, The Global Financial Crisis and
- White-Collar Crime, Women and
- Wilson, James Q.
- Wolfgang, Marvin
- Women, Girls, and Reentry
- Wrongful Conviction