Quantitatively examining the interaction between cybercrime and physical crime
PDF

Keywords

crime and criminology
cybercrime
cybersecurity
cyberspace
sociology

Abstract

This study examined the differences and relationships between reported incidents of cybercrime and physical crime within U.S. society nationally. The examined period encompassed the years between 2001 and 2020. The study outcomes showed that a relationship existed between reported incidents of cybercrime and reported incidents of physical crime (p = 0.00; α = 0.05). More specifically, it appeared that relationships existed between the reported incidents of cybercrime and the reported incidents of physical crimes representing robbery rate (p = 0.01; α = 0.05), burglary rate (p = 0.00; α = 0.05), and larceny theft rate (p = 0.00; α = 0.05). It also appeared that a difference (p = 0.00; α = 0.05) existed between reported incidents of cybercrime and physical crime, wherein greater quantities of physical crime were exhibited societally during the examined period.

https://doi.org/10.14746/sr.2023.7.3.01
PDF

References

Back, S. (2019). The cybercrime triangle: An empirical assessment of offender, victim, and place. Miami, FL: Florida International University.

Beeler, A. (2022). Inmate seminaries: How they have positively impacted corrections. Corrections Today, 2022, 34-42.

Brenner, S. (2009). Cyberthreats: The emerging fault lines of the nation state. New York, NY: Oxford University Press. DOI: https://doi.org/10.1093/acprof:oso/9780195385014.001.0001

Bryant, R. & Bryant, S. (2014). Policing digital crime. New York, NY: Routledge.

Bossler, A. M., & Holt, T. J. (2007, November 14). Examining the utility of routine activities theory for cybercrime. Paper presented at the annual meeting of the American Society of Criminology, Atlanta Marriott.

Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308-333.

Collins, S. & McCombie, S. (2012). Stuxnet: The emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence, and Counter Terrorism 7(1), 80-91. DOI: https://doi.org/10.1080/18335330.2012.653198

Computer Fraud and Abuse Act of 1986, 100 Stat. 1213.

Curtis, J & Oxburgh, G. (2022). Understanding cybercrime in ‘real world’ policing and law enforcement. The Police Journal: Theory, Practice, and Principles, 0(0). DOI: https://doi.org/10.1177/0032258X221107584

Cveticanin, N. (2023). Hacking statistics to give you nightmares. Retrieved from https://dataprot.net/statistics/hacking-statistics/

Cybersecurity and Infrastructure Security Agency. (2018). Combating Cyber Crime. Retrieved from https://www.cisa.gov/combating-cyber-crime.

De Cremer, D., Nguyen, B., & Simkin, L. (2017). The integrity challenge of the Internet-of-Things (IoT): On understanding its dark side. Journal of Marketing Management, 33, 1-2. DOI: https://doi.org/10.1080/0267257X.2016.1247517

De Padirac, B. (2018). International dimensions of cyberspace law. New York, NY: Routledge.

Department of Justice. (n.d.). Computer crime and intellectual property section (CCIPS). Retrieved from: https://www.justice.gov/criminal-ccips

Department of Justice. (n.d.). Prosecuting computer crimes. Retrieved from https://www.justice.gov/criminal/file/442156/download

Dixon, V.K. (2009). Understanding the implications of a global village. Inquiries, 1(11), 1-2.

Doss, D.A., Etter, G., Rials, W., McElreath, D., Gokaraju, B., & Standish, H. (2022). Examining the effects of the Federal Information Sharing Modernization Act of 2014 and the Cybersecurity Information Sharing Act of 2015: What were the impacts toward reducing cybercrime incidents. Journal of Gang Research, 29(3), 1-23.

Encyclopedia Britannica. (n.d.) Cybercrime. Retrieved from: https://www.britannica.com/topic/cybercrime

European Union Agency for Law Enforcement Cooperation. (2021). Internet Organised Crime Threat Assessment 2021. Retrieved from https://www.europol.europa.eu/cms/sites/default/files/documents/internet_organised_crime_threat_assessment_iocta_2021.pdf DOI: https://doi.org/10.1016/S1361-3723(21)00125-1

Federal Bureau of Investigation. (n.d.). What We Investigate: Cyber. Retrieved from: https://www.fbi.gov/investigate/cyber

Federal Bureau of Investigation. (2022). Internet Crime Report: 2021. Retrieved from https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf

Felson, M. & Cohen, L. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8(4), 389-406. DOI: https://doi.org/10.1007/BF01561001

Henderson, H. (2014). A to Z of computer scientists. New York, NY: Facts on File.

Hoffman, D.E. (2004). CIA slipped bugs to Soviets. Retrieved from https://www.nbcnews.com/id/wbna4394002

Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1-25. DOI: https://doi.org/10.1080/01639620701876577

Ilbiz, E. & Kaunert, C. (2023). The sharing economy for tackling cybercrime. New York, NY: Springer. DOI: https://doi.org/10.1007/978-3-031-20274-2

International Telecommunications Union (2022). ITU Datahub: Individuals using the Internet. Retrieved from: https://datahub.itu.int/data/?e=USA&c=701&i=11624

Internet World Stats. (2022). Internet Growth Statistics: Today's road to e-Commerce and Global Trade. Retrieved from https://www.internetworldstats.com/emarketing.htm

Kennedy, J. (1926, January 30). An Interview with Nikola Tesla. Collier’s Magazine.

Kigerl, A. (2021). Routine activity theory and malware, fraud, and spam at the national level. Crime Law and Social Change, 76(4). DOI: https://doi.org/10.1007/s10611-021-09957-y

Koch, C. (2007). You plan to fight cyber crime. CIO, 2007, 34-40.

Kritzinger, E. & Von Solms, S. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840-847. DOI: https://doi.org/10.1016/j.cose.2010.08.001

Kshetri, N. (2010). The global cybercrime industry. New York, NY: Springer. DOI: https://doi.org/10.1007/978-3-642-11522-6

Klosowski, T. (2021). We asked appliance manufacturers how long they’ll keep connected devices secure. Many couldn’t tell us. Retrieved from https://www.nytimes.com/wirecutter/blog/how-long-connected-devices-secure/

Launiainen, P. (2018). A brief history of everything wireless: How invisible waves have changed the world. Cham, Switzerland: Springer. DOI: https://doi.org/10.1007/978-3-319-78910-1

Leider, R. (2021). The modern common law of crime. Journal of Criminal Law and Criminology, 111(2), 407-499.

Leukfeldt, E. & Yar, M. (2016) Applying Routine Activity Theory to cybercrime: A theoretical and empirical analysis, Deviant Behavior, 37(3), 263-280. DOI: https://doi.org/10.1080/01639625.2015.1012409

Levin, A. (2013). 9 Household Products That May Be Spying on You: Could you coffee machine be spying on you? Retrieved from https://abcnews.go.com/Business/household-products-spying/story?id=19974898

McElreath, D., DioGuardi, S., & Doss, D. (2022). Pre-crime prediction: Does it have value? Is it inherently racist? International Journal of Service Science, Management, Engineering, and Technology, 13(1), 1-17. DOI: https://doi.org/10.4018/IJSSMET.298672

McElreath, D., Doss, D., Russo, B., Etter, G., Van Slyke, J., Skinner, J., Corey, M., Jensen, C., Wigginton, M., & Nations, R. (2021). Introduction homeland security. (3rd ed.). Boca Raton, FL: CRC Press. DOI: https://doi.org/10.4324/9780429491962

Naik, K. & Patel, S. (2023). An open source smart home management system based on IOT. Wireless Networks, 29, 989-995. DOI: https://doi.org/10.1007/s11276-018-1884-z

Nir, S. (2022). How a cyberattack plunged a long island county into the 1990s. Retrieved from https://www.nytimes.com/2022/11/28/nyregion/suffolk-county-cyber-attack.html

Office of the Attorney General. (2014). Intake and Charging Policy for Computer Crime Matters. Retrieved from https://www.justice.gov/criminal-ccips/file/904941/download

Oosterman, N. & Yates D. (2021). Crime and art sociological and criminological perspectives of crimes in the art world. Cham, Switzerland: Springer. DOI: https://doi.org/10.1007/978-3-030-84856-9

Pesch-Cronin, K. & Marion, N. (2016). Critical infrastructure protection, risk management, and resilience: A policy perspective. Boca Raton, FL: CRC Press. DOI: https://doi.org/10.1201/9781315310657

Rawat, D. & Ghafoor, K. (2019). Smart cities cybersecurity and privacy. Cambridge, MA: Elsevier.

Reed, J. (2032). More school closings coast-to-coast due to ransomware. Retrieved from https://securityintelligence.com/news/schools-closing-due-to-ransomware/

Sanger, D., Krauss, C., & Perlroth, N. (2021). Cyberattack Forces a Shutdown of a Top U.S. Pipeline. Retrieved from https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html

United States Census Bureau. (2022a). E-Commerce Sales Surged During the Pandemic. Retrieved from https://www.census.gov/library/stories/2022/04/ecommerce-sales-surged-during-pandemic.html

United States Census Bureau. (2022b). Quarterly Retail E-Commerce Sales: 3d Quarter 2022. Retrieved from https://www.census.gov/retail/mrts/www/data/pdf/ec_current.pdf

Waldron, R., Quarles, C., McElreath, D., Walron, M., & Milstein, D. (2009). The criminal justice system. (5th ed.). Tulsa, OK: K&M Publishers.

Whalley, J., Stocker, V., & Lehr, W. (2023). Beyond the pandemic. Bingley, UK: Emerald Publishing.

World Bank. (2022). Databank: Population estimates and projections. Retrieved from: https://databank.worldbank.org/source/population-estimates-and-projections

Visger, M. (2022). The international law sovereignty debate and development of international norms on peacetime cyber operations. Retrieved from https://www.lawfareblog.com/international-law-sovereignty-debate-and-development-international-norms-peacetime-cyber-operations

Vojinovic, I. (2022). More than 70 cybercrime statistics - A $6 trillion problem. Retrieved from https://dataprot.net/statistics/cybercrime-statistics/