Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged cybercrime statistics
Cybercrime and strain theory: An examination of online crime and gender.

By Katalin Parti, Thomas Dearden

Purpose: Historically, cybercrime has been seen as a near exclusively male activity. We were interested to learn whether the relationship between strain and crime holds for both males and females.

Methods: We utilized an online survey instrument to collect data from a national sample of individuals (n=2,121) representing the US population by age, gender, race and ethnicity. We asked offending related questions regarding various cybercrimes. In the current study, we use data from 390 individuals who reported a cybercrime activity within the past 12 months.

Results: We find strong support for prior strains correlating with both specific (e.g., illegal uploading) and general cyber-offending. We further examine whether gender interacts with strain. While general strain theory (GST) correlates with cyber-offending for both males and females, we did find a few important differences. Except for lack of trust in others and receiving unsatisfactory evaluation at school or work, there are different variables responsible for online offending for men and women. Parents’ divorcing, anonymity, and online video gaming increase cybercrime offending in women, whereas falling victim to a crime, breaking up with a significant other, and darkweb activity are correlated with cyber-offending for men.

Conclusion: Although GST functions differently by gender when it comes to engaging in cyber-offending, the theory is indeed gender-specific, as different strain variables are responsible for engaging in cyber-offending in women and men. Components of general strain responsible for cyber-offending need to be further studied concerning gender. According to our results, GST is gender-specific, and these variables need to be further studied.

International Journal of Criminology and Sociology13, 211–226

 Cybercrime against senior citizens: exploring ageism, ideal victimhood, and the pivotal role of socioeconomics

By Suleman Lazarus  · Peter Tickner  · Michael R. McGuire1

 We discuss cybercrimes against senior citizens from three standpoints: (a) online fraudsters often target senior citizens because of their age, which results in the propagation of ageism. Thus, we explicitly defne ageism in the context of cybercrime, characterising it as the intentional targeting or prioritisation of senior citizens as potential victims of online fraud. (b) Senior citizens are vulnerable to online fraud schemes for physiological (e.g., cognitive decline), psychological (e.g., elevated fear of cybercrime), familial (e.g., insider fraud), and sociocultural (e.g., isolation) reasons. (c) Cybercrimes against older adults predominantly fall under the socioeconomic category driven by a common fnancial motive. We argue that ageism serves as a weapon used by online offenders to target older adults, whilst the concept of the ideal victim acts as society’s shield in response to these reprehensible actions. This framework invites closer attention to how age-based targeting in cyberspace reproduces broader social, economic, and moral asymmetries.  Future empirical studies are warranted to substantiate these claims beyond the theoretical realm.

Security Journal (2025) 38:42 

Cybercrime Classification and Measurement

By Hal S. Stern and Daniel L. Cork, Editors

Cybercrime poses serious threats and financial costs to individuals and businesses in the United States and worldwide. Reports of data breaches and ransomware attacks on governments and businesses have become common, as have incidents against individuals (e.g., identity theft, online stalking, and harassment). Concern over cybercrime has increased as the internet has become a ubiquitous part of modern life. However, comprehensive, consistent, and reliable data and metrics on cybercrime still do not exist - a consequence of a shortage of vital information resulting from the decentralized nature of relevant data collection at the national level.

Cybercrime Classification and Measurement addresses the absence credible cybercrime data and metrics. This report provides a taxonomy for the Federal Bureau of Investigation for the purpose of measuring different types of cybercrime, including both cyber-enabled and cyber-dependent crimes faced by individuals and businesses, and considers the needs for its periodic revision. This report was mandated by the 2022 Better Cybercrime Metrics Act (BCMA).

Washington, DC: The National Academies Press., 2025. 160p.

Cybercrime: The Transformation of Crime in the Information Age

MAY CONTAIN MARKUP

BY DAVID S. WALL

Looking at the full range of cybercrime, and computer security he shows how the increase in personal computing power available within a globalized communications network has affected the nature of and response to criminal activities. We have now entered the world of low impact, multiple victim crimes in which bank robbers, for example, no longer have to meticulously plan the theft of millions of dollars. New technological capabilities at their disposal now mean that one person can effectively commit millions of robberies of one dollar each. Against this background, David Wall scrutinizes the regulatory challenges that cybercrime poses for the criminal (and civil) justice processes, at both the national and the international levels.

Polity, 2007, 276 pages

Measuring cybercrime in Europe: The role of crime statistics and victimisation surveys. Proceedings of a conference organized by the Council of Europe with the support of the European Union

Edited by Marcelo F. Aebi, Stefano Caneppele, Lorena Molnar 

Cybercrime has become part of everyday life. We live in hybrid societies, fluctuating between the material and the virtual world, and we are hence confronted with online, offline and hybrid offences. However, the few victimisation surveys conducted in Europe reveal that victims of online crimes seldom report them to the police. Consequently, cybercrimes – which according to the best estimates represent between one third and more than half of all attempted and completed crimes in Europe – seldom appear in national criminal statistics. The State seems powerless to prevent them and private security companies flourish. 

During two days, experts from all over the continent gathered together in the framework of a virtual conference organized by the Council of Europe and the European Union to discuss what we know, what we do not know, and what we could do to improve our knowledge of crime in our contemporary hybrid societies, develop evidence-based criminal policies, provide assistance to crime victims, and implement realistic programs in the field of crime prevention and offender treatment. This book presents their experiences, reflexions, and proposals.

The Hague: Eleven International Publishing, 2022. 154p.

Cybercrime: Reporting Mechanisms Vary, and Agencies Face Challenges in Developing Metrics

By Marisol Cruz Cain, Gretta L. Goodwin

Cybercrime, such as hacking and ransomware attacks, is increasing in the United States—leading to billions of dollars in losses and threatening public safety. Several federal agencies work to detect, investigate, and prosecute cybercrimes. Agencies vary in how they collect data on these crimes, and there is no official definition of cybercrime. As a result, this data may not be consistent or complete. In 2022, Congress required the Department of Justice to develop definitions and categories for cybercrimes in its national crime reporting system—which should help law enforcement agencies comprehensively track and monitor these crimes.

Washington DC: U.S. Government Accountability Office, 2023. 40p.

Data breaches and cybercrime victimisation

By Anthony Morgan and Isabella Voce

This paper draws on data from a large national survey conducted in 2021 to examine the prevalence of data breaches among Australian computer users and the relationship between data breaches and other forms of cybercrime victimisation. Almost one in 10 respondents (9.3%) said they were notified their information was exposed in a data breach in the 12 months prior to the survey. Nearly one-third of these respondents (28.0%) had also been a victim of identity crime in the same period. Respondents who had been notified of a data breach were 34 percent more likely than other respondents to have been a victim of identity crime in the 12 months prior to the survey. They were also more likely to have been a victim of online scams or fraud and ransomware. Measures to protect individuals whose information has been exposed in a data breach from other potentially related cybercrimes are essential and should be prioritised when data breaches occur.

Statistical Bulletin no. 40. Canberra: Australian Institute of Criminology. 2022. 16p.

Identity crime and misuse in Australia 2023

By Merran McAlister, Emily Faulconbridge, Isabella Voce and Samantha Bricknell

This study presents findings from the Australian Cybercrime Survey related to identity crime and misuse. Thirty-one percent of respondents experienced identity crime in their lifetime and 20 percent in the past 12 months. Almost half of identity crime victims reported that suspicious transactions appeared in their bank statements or accounts. The type of personal information most commonly misused was names, followed by credit or debit card information. While one quarter of respondents did not know how their information was obtained, 16 percent believed it to be due to the hacking of a computer or device. Twenty-nine percent of past 12 month victims experienced a financial loss. The median amount initially lost was $300. Nineteen percent of victims had money reimbursed, the median amount being $250.

Statistical Bulletin 42. Canberra: Australian Institute of Criminology, 2023. 18p.

Cybercrime in Australia 2023

By Isabella Voce and Anthony Morgan

This is the first report in the Cybercrime in Australia series, which aims to provide a clearer picture of the extent of cybercrime victimisation, help-seeking and harms among Australian computer users. It is based on a survey of 13,887 computer users conducted in early 2023. In the 12 months prior to the survey, 27 percent of respondents had been a victim of online abuse and harassment, 22 percent had been a victim of malware, 20 percent had been a victim of identity crime and misuse, and eight percent had been a victim of fraud and scams. Overall, 47 percent of respondents experienced at least one cybercrime in the 12 months prior to the survey—and nearly half of all victims reported experiencing more than one type of cybercrime. Thirty-four percent of respondents had experienced a data breach. Cybercrime victimisation was not evenly distributed, with certain sections of the community more likely to have been a victim, and certain online activities associated with a higher likelihood of victimisation.

Most cybercrime victimisation went unreported to police or to ReportCyber, meaning official statistics significantly underestimate the size of the problem. Satisfaction with the outcomes of these reports was mixed, and relatively few reports resulted in an offender being apprehended. Rates of help-seeking varied and were influenced by the perceived seriousness of cybercrime and knowledge of how and where to report it.

The financial losses experienced by victims were wide ranging. Some victims reported losing large sums of money, but most victims reported relatively small financial losses. This report measures, for the first time, the harms experienced by individual victims and small businesses that extend beyond these financial costs. Twenty-five percent of respondents were negatively impacted by cybercrime in the 12 months prior to the survey, while 22 percent of respondents who owned or operated a small to medium business said their business was negatively impacted by cybercrime.

Statistical Bulletin, 43. Canberra: Australian Institute of Criminology, 2023. 113p.