Abstract
This study examined the differences and relationships between reported incidents of cybercrime and physical crime within U.S. society nationally. The examined period encompassed the years between 2001 and 2020. The study outcomes showed that a relationship existed between reported incidents of cybercrime and reported incidents of physical crime (p = 0.00; α = 0.05). More specifically, it appeared that relationships existed between the reported incidents of cybercrime and the reported incidents of physical crimes representing robbery rate (p = 0.01; α = 0.05), burglary rate (p = 0.00; α = 0.05), and larceny theft rate (p = 0.00; α = 0.05). It also appeared that a difference (p = 0.00; α = 0.05) existed between reported incidents of cybercrime and physical crime, wherein greater quantities of physical crime were exhibited societally during the examined period.
References
Back, S. (2019). The cybercrime triangle: An empirical assessment of offender, victim, and place. Miami, FL: Florida International University.
Beeler, A. (2022). Inmate seminaries: How they have positively impacted corrections. Corrections Today, 2022, 34-42.
Brenner, S. (2009). Cyberthreats: The emerging fault lines of the nation state. New York, NY: Oxford University Press. DOI: https://doi.org/10.1093/acprof:oso/9780195385014.001.0001
Bryant, R. & Bryant, S. (2014). Policing digital crime. New York, NY: Routledge.
Bossler, A. M., & Holt, T. J. (2007, November 14). Examining the utility of routine activities theory for cybercrime. Paper presented at the annual meeting of the American Society of Criminology, Atlanta Marriott.
Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308-333.
Collins, S. & McCombie, S. (2012). Stuxnet: The emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence, and Counter Terrorism 7(1), 80-91. DOI: https://doi.org/10.1080/18335330.2012.653198
Computer Fraud and Abuse Act of 1986, 100 Stat. 1213.
Curtis, J & Oxburgh, G. (2022). Understanding cybercrime in ‘real world’ policing and law enforcement. The Police Journal: Theory, Practice, and Principles, 0(0). DOI: https://doi.org/10.1177/0032258X221107584
Cveticanin, N. (2023). Hacking statistics to give you nightmares. Retrieved from https://dataprot.net/statistics/hacking-statistics/
Cybersecurity and Infrastructure Security Agency. (2018). Combating Cyber Crime. Retrieved from https://www.cisa.gov/combating-cyber-crime.
De Cremer, D., Nguyen, B., & Simkin, L. (2017). The integrity challenge of the Internet-of-Things (IoT): On understanding its dark side. Journal of Marketing Management, 33, 1-2. DOI: https://doi.org/10.1080/0267257X.2016.1247517
De Padirac, B. (2018). International dimensions of cyberspace law. New York, NY: Routledge.
Department of Justice. (n.d.). Computer crime and intellectual property section (CCIPS). Retrieved from: https://www.justice.gov/criminal-ccips
Department of Justice. (n.d.). Prosecuting computer crimes. Retrieved from https://www.justice.gov/criminal/file/442156/download
Dixon, V.K. (2009). Understanding the implications of a global village. Inquiries, 1(11), 1-2.
Doss, D.A., Etter, G., Rials, W., McElreath, D., Gokaraju, B., & Standish, H. (2022). Examining the effects of the Federal Information Sharing Modernization Act of 2014 and the Cybersecurity Information Sharing Act of 2015: What were the impacts toward reducing cybercrime incidents. Journal of Gang Research, 29(3), 1-23.
Encyclopedia Britannica. (n.d.) Cybercrime. Retrieved from: https://www.britannica.com/topic/cybercrime
European Union Agency for Law Enforcement Cooperation. (2021). Internet Organised Crime Threat Assessment 2021. Retrieved from https://www.europol.europa.eu/cms/sites/default/files/documents/internet_organised_crime_threat_assessment_iocta_2021.pdf DOI: https://doi.org/10.1016/S1361-3723(21)00125-1
Federal Bureau of Investigation. (n.d.). What We Investigate: Cyber. Retrieved from: https://www.fbi.gov/investigate/cyber
Federal Bureau of Investigation. (2022). Internet Crime Report: 2021. Retrieved from https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf
Felson, M. & Cohen, L. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8(4), 389-406. DOI: https://doi.org/10.1007/BF01561001
Henderson, H. (2014). A to Z of computer scientists. New York, NY: Facts on File.
Hoffman, D.E. (2004). CIA slipped bugs to Soviets. Retrieved from https://www.nbcnews.com/id/wbna4394002
Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1-25. DOI: https://doi.org/10.1080/01639620701876577
Ilbiz, E. & Kaunert, C. (2023). The sharing economy for tackling cybercrime. New York, NY: Springer. DOI: https://doi.org/10.1007/978-3-031-20274-2
International Telecommunications Union (2022). ITU Datahub: Individuals using the Internet. Retrieved from: https://datahub.itu.int/data/?e=USA&c=701&i=11624
Internet World Stats. (2022). Internet Growth Statistics: Today's road to e-Commerce and Global Trade. Retrieved from https://www.internetworldstats.com/emarketing.htm
Kennedy, J. (1926, January 30). An Interview with Nikola Tesla. Collier’s Magazine.
Kigerl, A. (2021). Routine activity theory and malware, fraud, and spam at the national level. Crime Law and Social Change, 76(4). DOI: https://doi.org/10.1007/s10611-021-09957-y
Koch, C. (2007). You plan to fight cyber crime. CIO, 2007, 34-40.
Kritzinger, E. & Von Solms, S. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840-847. DOI: https://doi.org/10.1016/j.cose.2010.08.001
Kshetri, N. (2010). The global cybercrime industry. New York, NY: Springer. DOI: https://doi.org/10.1007/978-3-642-11522-6
Klosowski, T. (2021). We asked appliance manufacturers how long they’ll keep connected devices secure. Many couldn’t tell us. Retrieved from https://www.nytimes.com/wirecutter/blog/how-long-connected-devices-secure/
Launiainen, P. (2018). A brief history of everything wireless: How invisible waves have changed the world. Cham, Switzerland: Springer. DOI: https://doi.org/10.1007/978-3-319-78910-1
Leider, R. (2021). The modern common law of crime. Journal of Criminal Law and Criminology, 111(2), 407-499.
Leukfeldt, E. & Yar, M. (2016) Applying Routine Activity Theory to cybercrime: A theoretical and empirical analysis, Deviant Behavior, 37(3), 263-280. DOI: https://doi.org/10.1080/01639625.2015.1012409
Levin, A. (2013). 9 Household Products That May Be Spying on You: Could you coffee machine be spying on you? Retrieved from https://abcnews.go.com/Business/household-products-spying/story?id=19974898
McElreath, D., DioGuardi, S., & Doss, D. (2022). Pre-crime prediction: Does it have value? Is it inherently racist? International Journal of Service Science, Management, Engineering, and Technology, 13(1), 1-17. DOI: https://doi.org/10.4018/IJSSMET.298672
McElreath, D., Doss, D., Russo, B., Etter, G., Van Slyke, J., Skinner, J., Corey, M., Jensen, C., Wigginton, M., & Nations, R. (2021). Introduction homeland security. (3rd ed.). Boca Raton, FL: CRC Press. DOI: https://doi.org/10.4324/9780429491962
Naik, K. & Patel, S. (2023). An open source smart home management system based on IOT. Wireless Networks, 29, 989-995. DOI: https://doi.org/10.1007/s11276-018-1884-z
Nir, S. (2022). How a cyberattack plunged a long island county into the 1990s. Retrieved from https://www.nytimes.com/2022/11/28/nyregion/suffolk-county-cyber-attack.html
Office of the Attorney General. (2014). Intake and Charging Policy for Computer Crime Matters. Retrieved from https://www.justice.gov/criminal-ccips/file/904941/download
Oosterman, N. & Yates D. (2021). Crime and art sociological and criminological perspectives of crimes in the art world. Cham, Switzerland: Springer. DOI: https://doi.org/10.1007/978-3-030-84856-9
Pesch-Cronin, K. & Marion, N. (2016). Critical infrastructure protection, risk management, and resilience: A policy perspective. Boca Raton, FL: CRC Press. DOI: https://doi.org/10.1201/9781315310657
Rawat, D. & Ghafoor, K. (2019). Smart cities cybersecurity and privacy. Cambridge, MA: Elsevier.
Reed, J. (2032). More school closings coast-to-coast due to ransomware. Retrieved from https://securityintelligence.com/news/schools-closing-due-to-ransomware/
Sanger, D., Krauss, C., & Perlroth, N. (2021). Cyberattack Forces a Shutdown of a Top U.S. Pipeline. Retrieved from https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html
United States Census Bureau. (2022a). E-Commerce Sales Surged During the Pandemic. Retrieved from https://www.census.gov/library/stories/2022/04/ecommerce-sales-surged-during-pandemic.html
United States Census Bureau. (2022b). Quarterly Retail E-Commerce Sales: 3d Quarter 2022. Retrieved from https://www.census.gov/retail/mrts/www/data/pdf/ec_current.pdf
Waldron, R., Quarles, C., McElreath, D., Walron, M., & Milstein, D. (2009). The criminal justice system. (5th ed.). Tulsa, OK: K&M Publishers.
Whalley, J., Stocker, V., & Lehr, W. (2023). Beyond the pandemic. Bingley, UK: Emerald Publishing.
World Bank. (2022). Databank: Population estimates and projections. Retrieved from: https://databank.worldbank.org/source/population-estimates-and-projections
Visger, M. (2022). The international law sovereignty debate and development of international norms on peacetime cyber operations. Retrieved from https://www.lawfareblog.com/international-law-sovereignty-debate-and-development-international-norms-peacetime-cyber-operations
Vojinovic, I. (2022). More than 70 cybercrime statistics - A $6 trillion problem. Retrieved from https://dataprot.net/statistics/cybercrime-statistics/
License
Copyright (c) 2023 Daniel Adrian Doss, Daniel Scherr
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Manuscript authors are responsible for obtaining copyright permissions for any copyrighted materials included within manuscripts. The authors must provide permission letters, when appropriate, to the Society Register Editors. In addition, all published papers in Society Register are published under a Creative Commons Attribution-NonCommercial 4.0 International License. Authors retain copyright and publishing rights to their articles, granting the journal the right to distribute them under the terms of the CC BY-NC 4.0.
1.1 The Author hereby warrants that he/she is the owner of all the copyright and other intellectual property rights in the Work and that, within the scope of the present Agreement, the paper does not infringe the legal rights of another person. The owner of the copyright work also warrants that he/she is the sole and original creator thereof and that is not bound by any legal constraints in regard to the use or sale of the work.
1.2. The Publisher warrants that is the owner of the PRESSto platform for open access journals, hereinafter referred to as the PRESSto Platform.
2. The Author grants the Publisher non-exclusive and free of charge license to unlimited use worldwide over an unspecified period of time in the following areas of exploitation:
2.1. production of multiple copies of the Work produced according to the specific application of a given technology, including printing, reproduction of graphics through mechanical or electrical means (reprography) and digital technology;
2.2. marketing authorisation, loan or lease of the original or copies thereof;
2.3. public performance, public performance in the broadcast, video screening, media enhancements as well as broadcasting and rebroadcasting, made available to the public in such a way that members of the public may access the Work from a place and at a time individually chosen by them;
2.4. inclusion of the Work into a collective work (i.e. with a number of contributions);
2.5. inclusion of the Work in the electronic version to be offered on an electronic platform, or any other conceivable introduction of the Work in its electronic version to the Internet;
2.6. dissemination of electronic versions of the Work in its electronic version online, in a collective work or independently;
2.7. making the Work in the electronic version available to the public in such a way that members of the public may access the Work from a place and at a time individually chosen by them, in particular by making it accessible via the Internet, Intranet, Extranet;
2.8. making the Work available according to appropriate license pattern CC BY-NC 4.0 as well as another language version of this license or any later version published by Creative Commons.
3. The Author grants the Publisher permission to reproduce a single copy (print or download) and royalty-free use and disposal of rights to compilations of the Work and these compilations.
4. The Author grants the Publisher permission to send metadata files related to the Work, including to commercial and non-commercial journal-indexing databases.
5. The Author represents that, on the basis of the license granted in the present Agreement, the Publisher is entitled and obliged to:
5.1. allow third parties to obtain further licenses (sublicenses) to the Work and to other materials, including derivatives thereof or compilations made, based on or including the Work, whereas the provisions of such sub-licenses will be the same as with the Attribution 4.0 International (CC BY-NC 4.0) Creative Commons sub-license or another language version of this license, or any later version of this license published by Creative Commons;
5.2. make the Work available to the public in such a way that members of the public may access the Work from a place and at a time individually chosen by them, without any technological constraints;
5.3. appropriately inform members of the public to whom the Work is to be made available about sublicenses in such a way as to ensure that all parties are properly informed (appropriate informing messages).
6. Because of the royalty-free provision of services of the Author (resulting from the scope of obligations stipulated in the present Agreement), the Author shall not be entitled to any author’s fee due and payable on the part of the Publisher (no fee or royalty is payable by the Publisher to the Author).
7.1. In the case of third party claims or actions for indemnity against the Publisher owing to any infractions related to any form of infringement of intellectual property rights protection, including copyright infringements, the Author is obliged to take all possible measures necessary to protect against these claims and, when as a result of legal action, the Publisher, or any third party licensed by the Publisher to use the Work, will have to abandon using the Work in its entirety or in part or, following a court ruling in a legal challenge, to pay damages to a third party, whatever the legal basis
7.2. The Author will immediately inform the Publisher about any damage claims related to intellectual property infringements, including the author’s proprietary rights pertaining to a copyrighted work, filed against the Author. of liability, the Author is obliged to redress the damage resulting from claims made by third party, including costs and expenditures incurred in the process.
7.3. To all matters not settled herein provisions of the Polish Civil Code and the Polish Copyright and Related Rights Act shall apply.