Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies
Abstract
:1. Introduction
Review Methodology
- A Boolean search string ((Cybercrime OR “computer crime”) AND (definition* OR typology* OR classification* OR categories* OR taxonomy*)) was used to identify sources via an academic search engine, namely Google Scholar;
- Included sources were English Language publications published from 2017 onwards;
- The first 100 (when ordered by most relevant) sources were assessed for relevance;
- Sources were rapidly assessed for relevance according to two stages: firstly, inclusion or exclusion according to the relevance of the title or abstract, and secondly only sources were included when the majority of the content discussed cybercrime definitions and typologies;
- In addition to the final sample (that meets criteria 1–4), references within said sources were included if highly relevant to the aims and objectives;
- Meta-analyses, review-type materials, keystone articles, or articles that are highly relevant were prioritized when preparing research findings.
- To identify key cybercrime definitions from academia and key definitions used by organizations;
- To identify key cybercrime typologies and taxonomies developed by academics and organizations;
- To evaluate identified definitions, typologies, and taxonomies of cybercrime, considering the wider implications for policy, practice, and future research.
2. Origin of the Term ‘Cybercrime’
3. Definitions of the Term ‘Cybercrime’
3.1. A Single Term to Encapsulate a Diverse Set of Criminal and Harmful Behaviors
3.2. Most Frequently Cited Definitions of the Term ‘Cybercrime’
3.3. Institutional and Organizational Definitions of the Term ‘Cybercrime’
4. Categorizing or Developing ‘Typologies’ of Cybercrime
4.1. Dichotomies of Cybercrime
4.1.1. Categorical Approach: ‘Cyber-Enabled’ vs. ‘Cyber-Dependent’ Crime
4.1.2. Continuum Approach: Type I to Type II as Proposed by Gordon and Ford
4.2. Trichotomies of Cybercrime
4.2.1. Categorization Systems That Define Three Categories of Cybercrimes
- ‘Crimes against the machine’, also known as computer integrity crimes, e.g., hacking, cracking and Denial of Service (DoS)/Distributed Denial of Service (DDoS);
- ‘Crimes using the machine’, also known as computer-assisted crimes, e.g., piracy, robberies and scams;
- ‘Crimes in the machine’, also known as computer content crimes, e.g., online hate, harassment, pornography.
- ‘Offences unique to computers and information systems (e.g., attacks against information systems, denial of service and malware)’, i.e., analogous to Wall’s [14] computer integrity crimes;
- ‘Traditional offences (e.g., fraud, forgery, and identity theft)’, i.e., analogous to Wall’s [14] computer-assisted crimes;
- ‘Content-related offences (e.g., online distribution of CSAM or incitement to racial hatred)’ i.e., analogous to Wall’s [14] computer content crimes.
4.2.2. Extending Dichotomies of Cybercrime to Trichotomies
- Cyber-dependent crimes or true cybercrimes, where the computer is the target and the crime could not happen without a computer, i.e., truly new opportunities for crime, e.g., hacking, malware, and DoS/DDoS;
- Cyber-enabled crimes or hybrid crimes, where the computer plays a role, but the crime could still be committed without the involvement of the computer, i.e., new opportunities for traditional crime, e.g., frauds, scams, and phishing;
- Cyber-assisted crimes or the use of computers in traditional crime, where the computer’s involvement is incidental to a real-world crime and simply increases the opportunity for traditional crimes, e.g., criminal communications.
- Type I cybercrimes refer to crimes that are technical in nature (e.g., hacking);
- Type II cybercrimes refer to crimes that involve human contact (e.g., cyberbullying);
- Type III cybercrimes refer to crimes that are perpetuated by Artificial Intelligence, robots/bots or self-learning technology.
5. Taxonomies of ‘Cybercrime’
5.1. The Council of Europe’s Convention of Cybercrime (2001)
Tsakalidis and Vergidis’ (2017) Update of the COE’s Convention of Cybercrime (2001) Taxonomy
5.2. Wall’s (2001) Taxonomy: An Alternative Framework Popular in Academic Literature
Marcum and Higgins’ (2019) Taxonomy: Another Example of an Alternative Framework Found in Academic Literature
5.3. Taxonomies of Single Offences or Single ‘Types’ of Cybercrime
6. Consolidating Findings: A New Cybercrime and Cyberdeviance Classification Framework
7. Evaluating Identified Definitions, Typologies and Taxonomies
7.1. An Evaluation of Cybercrime Definitions
7.2. An Evaluation of Cybercrime Typologies
7.3. An Evaluation of Cybercrime Taxonomies
8. Key Challenges
8.1. Problems with Prioritizing Response over Definitions
8.2. Lack of Consensus on Basic Terminology and Scope of Offences
8.3. Placing the Role of Technology at the Forefront of Developing Cybercrime Classifications
8.4. The Problem of ‘Nullen Crimen Sine Lege’ (No Crime without Law)
8.5. Accounting for Ideological Standpoints
8.6. Allowing for Future Concepts: Incorporating Complexity and Evolving Nature of Technology
9. Towards a Comprehensive Classification System
9.1. A Shared Cybercrime Lexicon
9.2. Adopting a Multidisciplinary and Multijurisdictional Approach
9.3. Research-Driven Classification System and Transparency in Development
9.4. Reconceptualizing the Boundaries between Cybercrime Categories
9.5. Application of Feminist Theory to Cybercrime Definitions
10. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
ICMEC | International Centre for Missing and Exploited Children |
CC-Driver | Combating Cyber Criminality by Understanding Human and Technical Drivers |
COE | Council of Europe |
CSA | Child Sexual Abuse |
CSAM | Child Sexual Abuse Material |
CSE | Child Sexual Exploitation |
DoS | Denial of Service |
DDoS | Distributed Denial of Service |
EU | European Union |
ICT | Information Communications Technology |
References
- Kemp, S. Digital 2021: Global Overview Report. 27 January 2021. Available online: https://datareportal.com/reports/digital-2021-global-overview-report (accessed on 12 May 2021).
- McGuire, M. It ain’t what it is, it’s the way that they do it? Why we still don’t understand cybercrime. In The Human Factor of Cybercrime; Leukfeldt, R., Holt, T.J., Eds.; Routledge: New York, NY, USA, 2020; pp. 3–28. [Google Scholar]
- Barn, R.; Barn, B. An ontological representation of a taxonomy for cybercrime. In Proceedings of the 24th European Conference on Information Systems (ECIS 2016), Istanbul, Turkey, 12–15 June 2016. [Google Scholar]
- Black, A.; Lumsden, K.; Hadlington, L. ‘Why Don’t You Block Them?’ Police Officers’ Constructions of the Ideal Victim when Responding to Reports of Interpersonal Cybercrime. In Online Othering: Exploring Violence and Discrimination on the Web; Lumsden, K., Harmer, E., Eds.; Palgrave Macmillan: Basingstoke, UK, 2019; pp. 355–378. [Google Scholar]
- Viano, E.C. Cybercrime: Definition, Typology, and Criminalization. In Cybercrime, Organized Crime, and Societal Responses; Viano, E.C., Ed.; Springer International Publishing: Cham, Switzerland, 2017; pp. 3–22. [Google Scholar]
- ICMEC. Online Grooming of Children for Sexual Purposes: Model Legislation & Global Review; International Centre for Missing & Exploited Children: Alexandria, VA, USA, 2017. [Google Scholar]
- Van der Hulst, R.C.; Neve, R.J. High Tech Crime Literature Review about Crimes and Their Offenders; WODC (Research and Documentation Centre): The Hague, The Netherlands, 2008. [Google Scholar]
- Paoli, L.; Visschers, J.; Verstraete, C.; Van Hellemont, E. The Impact of Cybercrime on Belgian Businesses; Intersentia: Cambridge, UK, 2018. [Google Scholar]
- Chang, L.Y. Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention across the Taiwan Strait; Edward Elgar Publishing: Cheltenham, UK, 2012. [Google Scholar]
- Sarre, R.; Lau, L.Y.C.; Chang, L.Y. Responding to cybercrime: Current trends. Police Pract. Res. 2018, 19, 515–518. [Google Scholar] [CrossRef] [Green Version]
- Grant, M.J.; Booth, A. A typology of reviews: An analysis of 14 review types and associated methodologies. Health Inf. Libr. J. 2009, 26, 91–108. [Google Scholar] [CrossRef] [PubMed]
- Yar, M.; Steinmetz, K.F. Cybercrime and Society, 3rd ed.; SAGE Publications Ltd.: London, UK, 2019. [Google Scholar]
- Parker, D. Crime by Computer; Charles Scribner’s Sons: New York, NY, USA, 1976. [Google Scholar]
- Wall, D.S. Cybercrime: The Transformation of Crime in the Information Age; Polity Press: Cambridge, UK, 2007. [Google Scholar]
- Tsakalidis, G.; Vergidis, K. A systematic approach toward description and classification of cybercrime incidents. IEEE Trans. Syst. Man Cybern. Syst. 2017, 49, 710–729. [Google Scholar] [CrossRef]
- Donalds, C.; Osei-Bryson, K.M. Toward a cybercrime classification ontology: A knowledge-based approach. Comput. Hum. Behav. 2019, 92, 403–418. [Google Scholar] [CrossRef]
- Broadhead, S. The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments. Comput. Law Secur. Rev. 2018, 34, 1180–1196. [Google Scholar] [CrossRef] [Green Version]
- Akdemir, N.; Sungur, B.; Başaranel, B.U. Examining the Challenges of Policing Economic Cybercrime in the UK. Güvenlik Bilimleri Derg. (Int. Secur. Congr. Spec. Issue) 2020, Özel Sayı, 113–134. [Google Scholar] [CrossRef]
- Gillespie, A.A. Cybercrime: Key Issues and Debates; Routledge: New York, NY, USA, 2015. [Google Scholar]
- Wall, D.S. Introduction: Cybercrime and the Internet. In Crime and the Internet; Wall, D.S., Ed.; Routledge: New York, NY, USA, 2001; pp. 1–17. [Google Scholar]
- Thomas, D.; Loader, B. Introduction-Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. In Cybercrime: Law Enforcement, Security and Surveillance in the Information Age; Thomas, D., Loader, B., Eds.; Routledge: London, UK, 2000. [Google Scholar]
- Gordon, S.; Ford, R. On the Definition and Classification of Cybercrime. J. Comput. Virol. 2006, 2, 13–20. [Google Scholar] [CrossRef]
- United Nations. United Nations Manual on the Prevention and Control of Computer-Related Crime; United Nations: New York, NY, USA, 1994. [Google Scholar]
- UN Congress Crimes Related to Computer Networks. 10th United Nations Congress on the Prevention of Crime and the Treatment of Offenders; United Nations: Vienna, Austria, 2000; Available online: https://www.unodc.org/documents/congress/Previous_Congresses/10th_Congress_2000/017_ACONF.187.10_Crimes_Related_to_Computer_Networks.pdf (accessed on 6 April 2022).
- Council of Europe. Convention on Cybercrime; European Treaty Series No. 185; Council of Europe: Budapest, Hungary, 2001; pp. 1–25. Available online: https://rm.coe.int/1680081561 (accessed on 6 April 2022).
- Commission of the European Communities. Communication from the Commission to the European Parliament, the Council and the Committee of the Regions: Towards a General Policy on the Fight against Cyber Crime; Commission of the European Communities: Brussels, Belgium, 2007; Volume 267. [Google Scholar]
- Malby, S.; Mace, R.; Holterhof, A.; Brown, C.; Kascherus, S.; Ignatuschtschenko, E. Comprehensive Study on Cybercrime; United Nations Office on Drugs and Crime: Vienna, Austria, 2013. [Google Scholar]
- European Commission. Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace; European Commission: Brussels, Belgium, 2013. [Google Scholar]
- Akhgar, B.; Choras, M.; Brewster, B.; Bosco, F.; Veermeersch, E.; Luda, V.; Puchalski, D.; Wells, D. Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism. In Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities; Akhgar, B., Brewster, B., Eds.; Springer: Cham, Switzerland, 2016; pp. 295–321. [Google Scholar]
- McGuire, M.; Dowling, S. Cybercrime: A Review of the Evidence: Summary of Key Findings and Implications; Home Office: London, UK, 2013. [Google Scholar]
- Brenner, S. Cybercrime: Re-thinking crime control strategies. In Crime Online; Jewkes, Y., Ed.; Willan Publishing: Cullompton, UK, 2007; pp. 12–28. [Google Scholar]
- Furnell, S.M. Cybercrime: Vandalizing the Information Society; Addison Wesley: London, UK, 2002. [Google Scholar]
- Burns, S.; Roberts, L. Applying the theory of planned behaviour to predicting online safety behaviour. Crime Prev. Community Saf. 2013, 15, 48–64. [Google Scholar] [CrossRef]
- Davidson, J.; Livingstone, S.; Jenkins, S.; Gekoski, A.; Choak, C.; Ike, T.; Phillips, K. Adult Online Hate, Harassment and Abuse: A Rapid Evidence Assessment; Department for Digital, Culture, Media and Sport (DCMS): London, UK, 2019. [Google Scholar]
- Department for Digital, Culture, Media & Sport. Consultation Outcome: Online Harms White Paper, 15 December 2020. Available online: https://www.gov.uk/government/consultations/online-harms-white-paper/online-harms-white-paper (accessed on 13 May 2021).
- Tsakalidis, G.; Vergidis, K.; Madas, M. Cybercrime Offences: Identification, Classification and Adaptive Response. In Proceedings of the 5th International Conference on Control, Decision and Information Technologies (CoDIT), Thessaloniki, Greece, 10–13 April 2018; pp. 470–475. [Google Scholar]
- European Commission. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, 7 February 2013. Available online: www.eeas.europa.eu/archives/docs/policies/eu-cyber-security/cybsec_comm_en.pdf (accessed on 12 July 2021).
- Wall, D.S. The Internet as a Conduit for Criminals. In Information Technology and the Criminal Justice System; Pattavina, A., Ed.; Sage: Thousand Oaks, CA, USA, 2005; pp. 77–98, (Chapter revised March 2010). [Google Scholar]
- Council of Europe. Additional Protocol to the Convention on Cybercrime, Concerning the Criminalization of Acts of a Racist and Xenophobic Nature Committed through Computer Systems; Council of Europe: Strasbourg, France, 2003. [Google Scholar]
- Jarrett, H.M.; Bailie, M.W.; Hagen, E.; Eltringham, S. Prosecuting Computer Crimes; US Department of Justice, Computer Crime and Intellectual Property Section Criminal Division, Office of Legal Education Executive Office for United States Attorneys: Washington, DC, USA, 2010. [Google Scholar]
- European Union. Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on attacks against information systems and replacing Council Framework Decision 2005/222/JHA. Off. J. Eur. Union 2013, 218, 8–14. Available online: https://data.europa.eu/eli/dir/2013/40/oj (accessed on 6 April 2022).
- Marcum, C.D.; Higgins, G.E. Cybercrime. In Handbooks of Sociology and Social Research, 2nd ed.; Krohn, M.D., Hendrix, N., Hall, G.P., Lizotte, A.J., Eds.; Springer: Cham, Switzerland, 2019; pp. 459–475. [Google Scholar]
- Aiken, M.; Davidson, J.; Amann, P. Youth Pathways into Cybercrime; Paladin Capital Group: London, UK, 2016. [Google Scholar]
- The Interagency Working Group Terminology. Guidelines for the Protection of Children from Sexual Exploitation and Sexual Abuse; ECPAT International and ECPAT Luxembourg: Bangkok, Thailand, 2016. [Google Scholar]
- Payne, B.K. Defining Cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Holt, T.J., Bossler, A.M., Eds.; Springer International Publishing AG: New York, NY, USA, 2020; pp. 3–25. [Google Scholar]
- Donaldson, S.; Davidson, J.; Aiken, M. Safer Technology, Safer Users: The UK as a World-Leader in Safety Tech, Perspective Economics & University of East London; Department for Digital, Culture, Media & Sport (DCMS): London, UK, 2020. [Google Scholar]
- Vold, G. Theoretical Criminology; Oxford University Press: New York, NY, USA, 1958. [Google Scholar]
- Weber, M. Objectivity in social science and social policy. In The Methodology of the Social Sciences; Shils, E.A., Finch, H.A., Eds.; Free Press: Glencoe, Illinois, USA, 1949. [Google Scholar]
- Worrall, J. Scientific realism and scientific change. Philos. Q. 1982, 32, 201–231. [Google Scholar] [CrossRef]
- Sparks, R. Reason and unreason in “left realism”: Some problems in the constitution of the fear of crime. In Issues in Realist Criminology; Matthews, R., Young, J., Eds.; SAGE Publications Ltd.: London, UK, 1992. [Google Scholar]
- Becker, H.S. Outsiders: Studies in the Sociology of Deviance; Free Press: New York, NY, USA, 1963. [Google Scholar]
- Cohen, S. Folk Devils and Moral Panics: The Creation of the Mods and Rockers; Routledge: London, UK, 2002. [Google Scholar]
- Matza, D. Delinquency & Drift, 2nd ed.; Taylor & Francis: Abingdon, UK, 1990. [Google Scholar] [CrossRef]
- Lavorgna, A.; Cyber-organised crime. A case of moral panic? Trends Organ. Crime 2019, 22, 357–374. [Google Scholar] [CrossRef] [Green Version]
- Payne, B.K.; Hawkins, B.; Chunsheng, X. Using Labelling Theory as a Guide to Examine the Patterns, Characteristics, and Sanctions Given to Cybercrimes. Am. J. Crim. Justice 2019, 44, 230–247. [Google Scholar] [CrossRef] [Green Version]
- EUROPOL. Exploiting Isolation: Offenders and Victims of Online Child Sexual Abuse during the COVID-19 Pandemic; European Union Agency for Law Enforcement Cooperation: The Hague, The Netherlands, 2020. [Google Scholar]
- Bossler, A.M.; Holt, T.J. Patrol officers’ perceived role in responding to cybercrime. Polic. Int. J. 2012, 35, 165–181. [Google Scholar] [CrossRef]
- Bond, E.; Tyrrell, K. Understanding revenge pornography: A national survey of police officers and staff in England and Wales. J. Interpers. Violence 2018, 36, 2166–2181. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Hadlington, L.; Lumsden, K.; Black, A.; Ferra, F. A qualitative exploration of police officers’ experiences, challenges, and perceptions of cybercrime. Polic. J. Policy Pract. 2021, 15, 34–43. [Google Scholar] [CrossRef]
- Lee, J.R.; Holt, T.J.; Burruss, G.W.; Bossler, A.M. Examining English and Welsh Detectives’ Views of Online Crime. Int. Crim. Justice Rev. 2021, 31, 20–39. [Google Scholar] [CrossRef]
- Hadlington, L.J. Employees attitudes towards cyber security and risky online behaviours: An empirical assessment in the United Kingdom. Int. J. Cyber Criminol. 2018, 12, 262–274. [Google Scholar]
- Ratner, C. When “Sweetie” is not so Sweet: Artificial Intelligence and its Implications for Child Pornography. Fam. Court. Rev. 2021, 59, 386–401. [Google Scholar] [CrossRef]
- Paterson, T.; Hanley, L. Political warfare in the digital age: Cyber subversion, information operations and ‘deep fakes’. Aust. J. Int. Aff. 2020, 74, 439–454. [Google Scholar] [CrossRef] [Green Version]
- Carrabine, E.; Cox, P.; Lee, M.; Plummer, K.; South, N. Criminology: A Sociological Introduction; Routledge: Abingdon, UK, 2009. [Google Scholar]
Number of Occurrences | ||
---|---|---|
Terminology | 1995–2000 | 2001–2018 |
Cybercrime | 1476 | 28,100 |
Cyber crime | 17,900 | |
Computer crime | 2760 | 19,000 |
E crime | 585 | 15,800 |
Internet crime | 236 | 7500 |
Digital crime | 50 | 3830 |
Online crime | 49 | 3120 |
Virtual crime | 43 | 1100 |
Techno-crime | 19 | 55 |
Netcrime | 17 | 216 |
Botnets | Grooming | Pornographic material |
CSAM/CSE | Harassment | Radicalisation |
Coercion | Hate speech | Ransomware |
Computer-related forgery | Heist | Religious offenses |
Computer-related fraud | Identity theft | Sex tourism |
Copyright infringements | Illegal access (hacking/cracking) | Sex trade |
Criminal communications | Illegal data acquisition | Sex trafficking |
Cyber troops | Illegal gambling | Sexting |
Cyberbullying | Illegal gaming | Sextortion |
Cyberfraud | Illegal interception | Spam |
Cyberwarfare | Image based abuse | Stalking |
Data interference | Inciting violence | System interference |
Deep fakes | Laundering | Terrorism |
Digital piracy | Misuse of devices | Trademark related offenses |
Drug trade | Money muling | Trolling |
Espionage | Phishing | Xenophobia |
Extortion (e.g., Romance Fraud) | Political interference |
Year | Organization | Definition of Cybercrime |
---|---|---|
1994 | The United Nations | “The United Nations manual [23] on the prevention and control of computer-related crime (1994) uses the terms, computer crime and computer-related crime interchangeably. This manual did not provide any definition” [18] (p. 116) |
2000 | The Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders | 1. “any illegal behaviour directed by means of electronic operations that target the security of computer systems and the data processed by them.” 2. “any illegal behaviour committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or network” [24] (p. 5) |
2001 | The Council of Europe Cybercrime Convention (also known as The Budapest Convention) | “action directed against the confidentiality, integrity and availability of computer systems, networks and computer data as well as the misuse of such systems, networks and data by providing for the criminalisation of such conduct” [25] (p. 2) |
2007 | The Commission of European Communities | “criminal acts committed using electronic communications networks and information systems or against such networks and systems” [26] (p. 2) |
2013 | Shanghai Cooperation Organization (SCO) Agreement | “the use of information resources and (or) the impact on them in the informational sphere for illegal purposes” (cited in Malby et al. [27] (p. 15)) |
2013 | Cybersecurity Strategy of the European Union | “a broad range of different criminal activities where computers and information systems are involved either as a primary tool or as a primary target” [28] (p. 3) |
2016 | Commonwealth of Independent States Agreement | “a criminal act of which the target is computer information” (cited in Akhgar et al. [29] (p. 298)) |
Category 1 | Category 2 | Category 3 | Category 4 | Category 5 |
---|---|---|---|---|
Offences against the Confidentiality, Integrity and Availability of Computer Data and Systems | Computer-Related Offences | Content-Related Offences | Offences Related to Infringements of Copyright and Related Rights | Acts of a Racist and Xenophobic Nature Committed through Computer Systems |
Article 2—Illegal access Article 3—Illegal interception Article 4—Data interference Article 5—System interference Article 6—Misuse of devices | Article 7—Computer-related forgery Article 8—Computer-related fraud | Article 9—Offences related to child pornography | Article 10—Offences related to infringements of copyright and related rights | Article 3—Dissemination of racist and xenophobic material through computer systems Article 4—Racist and xenophobic motivated threat Article 5—Racist and xenophobic motivated insult Article 6—Denial, gross minimization, approval or justification of genocide or crimes against humanity Article 7—Aiding and abetting |
The European Union’s Directive (2013) in Categorizing Cybercrime |
---|
Article 3—Illegal access to information systems Article 4—Illegal system interference Article 5—Illegal data interference Article 6—Illegal interception Article 7—Tools used for committing offences Article 8—Incitement, aiding and abetting and attempt |
Type A | Type B | Type C | Type D | Type E |
---|---|---|---|---|
Offences against the Confidentiality, Integrity and Availability of Computer Data and Systems | Computer-Related Offences | Content-Related Offences | Offences Related to Infringements of Copyright and Related Rights | Combinational Offences |
A1. Illegal access (hacking, cracking) A2. Illegal data acquisition (data espionage) A3. Illegal interception A4. Data interference A5. System interference A6. Misuse of devices | B1. Computer-related forgery B2. Computer-related fraud B3. Identity theft | C1. Pornographic material C2. CSAM/CSE C3. Religious offences C4. Cyberbullying C5. Illegal gambling and online games C6. Spam and related threats C7. Racism and hate speech on the internet | D1. Copyright-related offences D2. Trademark-related offences | E1. Phishing E2. Cyber laundering E3. Cyberwarfare E4. Terrorist use of the internet |
Cyber-Trespass | Cyber-Deception/Theft | Cyber-Pornography and Obscenity | Cyber-Violence |
---|---|---|---|
Defined as the crossing of virtual ownership boundaries, e.g., attempting to gain access to systems, networks or data. Offences: Hacking | Defined as the use of ICT to either steal information or valuable items. This is typically achieved by cyber-trespass. Offences: Hacking, piracy, spam | Defined as the use of ICT to access sexually explicit and illegal sexual content. Offences: Pornography, CSAM/CSE, sex trade, sex tourism, sex trafficking | Defined as causing harm in both virtual and real-life environments. Offences: Online harassment, bullying, terrorism, politically motivated hacking, organized crime |
1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|
Cyberbullying and Cyberstalking | Digital Piracy | Hacking and Malware | Identity Theft | Sex-Related Crimes Online |
Cyberbullying (5 types): 1.Denigration; 2. Exclusion; 3. Flaming; 4. Harassment; 5. Outing. Cyberstalking Cyber dating abuse | Digital Piracy | Hacking (6 types): 1. Accessing a computer system without permission; 2. Development or use of viruses; 3. Destruction or altering of a computer file without permission; 4. Theft of services; 5. Fraudulent use of a credit card; 6. Infiltration of software. Malware | Identity Theft | Sexual solicitation Grooming Sexting CSAM Revenge porn Sextortion |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Phillips, K.; Davidson, J.C.; Farr, R.R.; Burkhardt, C.; Caneppele, S.; Aiken, M.P. Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sci. 2022, 2, 379-398. https://doi.org/10.3390/forensicsci2020028
Phillips K, Davidson JC, Farr RR, Burkhardt C, Caneppele S, Aiken MP. Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences. 2022; 2(2):379-398. https://doi.org/10.3390/forensicsci2020028
Chicago/Turabian StylePhillips, Kirsty, Julia C. Davidson, Ruby R. Farr, Christine Burkhardt, Stefano Caneppele, and Mary P. Aiken. 2022. "Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies" Forensic Sciences 2, no. 2: 379-398. https://doi.org/10.3390/forensicsci2020028
APA StylePhillips, K., Davidson, J. C., Farr, R. R., Burkhardt, C., Caneppele, S., & Aiken, M. P. (2022). Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences, 2(2), 379-398. https://doi.org/10.3390/forensicsci2020028