7,486
Views
60
CrossRef citations to date
0
Altmetric
Original Articles

Cybercrime, media and insecurity: The shaping of public perceptions of cybercrimeFootnote1

Pages 45-63 | Published online: 23 Apr 2008

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (8)

Yushawu Abubakari & Mateusz Blaszczyk. (2023) Politicization of Economic Cybercrime: Perceptions Among Ghanaian Facebook Users. Deviant Behavior 0:0, pages 1-20.
Read now
Catarina Fonseca, Samuel Moreira & Inês Guedes. (2022) Online Consumer Fraud Victimization and Reporting: A Quantitative Study of the Predictors and Motives. Victims & Offenders 17:5, pages 756-780.
Read now
Thomas Dearden. (2021) Who Responded to Equifax? Self-Protection Strategies When Guardians Fail. Victims & Offenders 16:8, pages 1149-1160.
Read now
Dale Willits & Jeffrey Nowacki. (2016) The use of specialized cybercrime policing units: an organizational analysis. Criminal Justice Studies 29:2, pages 105-124.
Read now
Joshua B. Hill & Nancy E. Marion. (2016) Presidential rhetoric on cybercrime: links to terrorism?. Criminal Justice Studies 29:2, pages 163-177.
Read now
Atte Oksanen & Teo Keipi. (2013) Young people as victims of crime on the internet: A population-based study in Finland. Vulnerable Children and Youth Studies 8:4, pages 298-309.
Read now
LynneD. Roberts, David Indermaur & Caroline Spiranovic. (2013) Fear of Cyber-Identity Theft and Related Fraudulent Activity. Psychiatry, Psychology and Law 20:3, pages 315-328.
Read now
Marko Eskola. (2012) From Risk Society to Network Society: Preventing Cybercrimes in the 21st Century. Journal of Applied Security Research 7:1, pages 122-150.
Read now

Articles from other publishers (52)

Gargi Sarkar & Sandeep K. Shukla. (2023) Behavioral analysis of cybercrime: Paving the way for effective policing strategies. Journal of Economic Criminology 2, pages 100034.
Crossref
Mangudi Ramgopal Mahalakshmi & Rajendran Lavanya. (2023) Good or bad? Depiction of crime and violence in contemporary Tamil cinema. SN Social Sciences 3:6.
Crossref
Candace E. Griffith, Melissa Tetzlaff-Bemiller & Lance Y. Hunter. (2023) Understanding the cyber-victimization of young people: A test of routine activities theory. Telematics and Informatics Reports 9, pages 100042.
Crossref
Vinita Sharma, Tanu Manocha, Seema Garg, Saatwik Sharma, Anshita Garg & Ritu Sharma. (2023) Growth of Cyber-crimes in Society 4.0. Growth of Cyber-crimes in Society 4.0.
Umberto Di Maggio & Fabio Massimo Lo Verde. 2021. The Palgrave Handbook of Global Social Problems. The Palgrave Handbook of Global Social Problems 1 24 .
Mark Button, David Shepherd, Dean Blackbourn, Lisa Sugiura, Richard Kapend & Victoria Wang. (2022) Assessing the seriousness of cybercrime: The case of computer misuse crime in the United Kingdom and the victims’ perspective. Criminology & Criminal Justice, pages 174889582211281.
Crossref
Lennon Yao-Chung Chang & John Whitehead. (2021) What the Hack: Reconsidering Responses to Hacking. Asian Journal of Criminology 17:2, pages 113-126.
Crossref
Małgorzata Gruchoła & Justyna Szulich-Kałuża. (2022) Digital Competence in Cybercrime Behaviours: A Study Based on Eurobarometer Research. Zeszyty Naukowe Katolickiego Uniwersytetu Lubelskiego Jana Pawła II 65:1, pages 3-27.
Crossref
Sue Caton & Roderick Landman. (2021) Internet safety, online radicalisation and young people with learning disabilities. British Journal of Learning Disabilities 50:1, pages 88-97.
Crossref
Jelle Brands & Janne Van Doorn. (2022) The measurement, intensity and determinants of fear of cybercrime: A systematic review. Computers in Human Behavior 127, pages 107082.
Crossref
Maryja Šupa. (2021) Social Research about Online Crime: Global Range of Topics and a Systematic Analysis of Research in Lithuania. Kriminologijos studijos 9, pages 8-46.
Crossref
Max Boholm. (2021) Twenty-five years of cyber threats in the news: a study of Swedish newspaper coverage (1995–2019). Journal of Cybersecurity 7:1.
Crossref
Lee Hadlington, Karen Lumsden, Alexandra Black & Fenia Ferra. (2021) A Qualitative Exploration of Police Officers’ Experiences, Challenges, and Perceptions of Cybercrime. Policing: A Journal of Policy and Practice 15:1, pages 34-43.
Crossref
Mark Button, Dean Blackbourn, Lisa Sugiura, David Shepherd, Richard Kapend & Victoria Wang. 2021. Cybercrime in Context. Cybercrime in Context 137 156 .
Cameron Coutu & Benoît Dupont. 2021. Cybercrime in Context. Cybercrime in Context 157 172 .
Maryam Khani, Zeynolabedin Fallah, Taher Bahlekeh & Nasser Bai. (2020) The Consequences of the Identity Theft Fear in the Sport Products Online Shopping From the Perspective of Physical Education Students. Annals of Applied Sport Science 8:4, pages 0-0.
Crossref
Lies De Kimpe, Koen Ponnet, Michel Walrave, Thom Snaphaan, Lieven Pauwels & Wim Hardyns. (2020) Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. Computers in Human Behavior 108, pages 106310.
Crossref
Naci AKDEMİR, Bülent SUNGUR & Bürke BAŞARANEL. (2020) BİRLEŞİK KRALLIKTA SİBER EKONOMİK SUÇLARA YÖNELİK KOLLUK FAALİYETLERİ SORUNLARININ İNCELENMESİ. Güvenlik Bilimleri Dergisi, pages 111-132.
Crossref
Richard Boateng & Jonathan Nii Barnor Barnor. 2020. Encyclopedia of Criminal Activities and the Deep Web. Encyclopedia of Criminal Activities and the Deep Web 66 92 .
Rami Baazeem & Alaa Qaffas. 2020. Emerging Cyber Threats and Cognitive Vulnerabilities. Emerging Cyber Threats and Cognitive Vulnerabilities 93 116 .
Anita Lavorgna. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 117 134 .
Brian K. Payne. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 3 25 .
Umit Can & Bilal Alatas. (2019) A new direction in social network analysis: Online social network analysis problems and applications. Physica A: Statistical Mechanics and its Applications 535, pages 122372.
Crossref
Anita Lavorgna. (2018) Cyber-organised crime. A case of moral panic?. Trends in Organized Crime 22:4, pages 357-374.
Crossref
Morvareed Bidgoli, Bart P. Knijnenburg, Jens Grossklags & Brad Wardman. (2019) Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting. Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting.
Stefano Caneppele & Marcelo F Aebi. (2019) Crime Drop or Police Recording Flop? On the Relationship between the Decrease of Offline Crime and the Increase of Online and Hybrid Crimes. Policing: A Journal of Policy and Practice 13:1, pages 66-79.
Crossref
Calvin Nobles. (2019) Disrupting the U.S. National Security Through Financial Cybercrimes. International Journal of Hyperconnectivity and the Internet of Things 3:1, pages 1-21.
Crossref
Anita Lavorgna. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 18 .
Brian K. Payne. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 24 .
Alex Black, Karen Lumsden & Lee Hadlington. 2019. Online Othering. Online Othering 355 378 .
Jordan Fairbairn & Dale Spencer. (2017) Virtualized Violence and Anonymous Juries: Unpacking Steubenville’s “Big Red” Sexual Assault Case and the Role of Social Media. Feminist Criminology 13:5, pages 477-497.
Crossref
Anđelija Đukić. (2018) Organizovani visokotehnološki kriminal - pojam, razvoj i osnovne karakteristike. Vojno delo 70:4, pages 128-156.
Crossref
E. Rutger Leukfeldt, Anita Lavorgna & Edward R. Kleemans. (2016) Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime. European Journal on Criminal Policy and Research 23:3, pages 287-300.
Crossref
Morvareed Bidgoli & Jens Grossklags. (2017) “Hello. This is the IRS calling.”: A case study on scams, extortion, impersonation, and phone spoofing. “Hello. This is the IRS calling.”: A case study on scams, extortion, impersonation, and phone spoofing.
Julianne Webster & Jacqueline M Drew. (2017) Policing advance fee fraud (AFF). International Journal of Police Science & Management 19:1, pages 39-53.
Crossref
A. Puccia, G. Sandri, M. Bardi, E. Corbari & J. DeMarco. (2016) Innes: Security Bonds. International Journal of Criminology and Sociology 5, pages 182-190.
Crossref
Morvareed Bidgoli & Jens Grossklags. (2016) End user cybercrime reporting: what we know and what we can do to improve it. End user cybercrime reporting: what we know and what we can do to improve it.
Morvareed Bidgoli, Bart P. Knijnenburg & Jens Grossklags. (2016) When cybercrimes strike undergraduates. When cybercrimes strike undergraduates.
Chanel Hewitt & Catherine D. Marcum. 2015. The Encyclopedia of Crime and Punishment. The Encyclopedia of Crime and Punishment 1 8 .
James Banks. (2015) The Heartbleed bug: Insecurity repackaged, rebranded and resold. Crime, Media, Culture: An International Journal 11:3, pages 259-279.
Crossref
Patrick Hille, Gianfranco Walsh & Mark Cleveland. (2015) Consumer Fear of Online Identity Theft: Scale Development and Validation. Journal of Interactive Marketing 30, pages 1-19.
Crossref
Monica Lagazio, Nazneen Sherif & Mike Cushman. (2014) A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers & Security 45, pages 58-74.
Crossref
Igor Bernik. 2014. Cybercrime and Cyberwarfare. Cybercrime and Cyberwarfare 145 161 .
Igor Bernik. (2012) Internet Study. International Journal of Cyber Warfare and Terrorism 2:3, pages 1-11.
Crossref
Adam M. Bossler & George W. Burruss. 2012. Cyber Crime. Cyber Crime 1499 1527 .
Gorazd Mesko & Igor Bernik. (2011) Cybercrime: Awareness and Fear: Slovenian Perspectives. Cybercrime: Awareness and Fear: Slovenian Perspectives.
Kristen Bernard, Andrew Cassidy, Monica Clark, Kevin Liu, Katrina Lobaton, Drew McNeill & Donald Brown. (2011) Identifying and tracking online financial services through web mining and latent semantic indexing. Identifying and tracking online financial services through web mining and latent semantic indexing.
Pieter Kleve, Richard De Mulder & Kees van Noortwijk. (2011) The definition of ICT Crime. Computer Law & Security Review 27:2, pages 162-167.
Crossref
Adam M. Bossler & George W. Burruss. 2011. Corporate Hacking and Technology-Driven Crime. Corporate Hacking and Technology-Driven Crime 38 67 .
Michael Levi. 2009. The Criminology of White-Collar Crime. The Criminology of White-Collar Crime 79 109 .
Sanduni Wickramasinghe. (2016) The Use of Hacking as a Cybercrime Investigation Technique in Sri Lanka through the Perspectives of the Right to Privacy as Enumerated in Article 17 of International Covenant on Civil and Political Rights, Article 8 of European Convention on Human Rights and Fourth Amendment to the US Constitution. SSRN Electronic Journal.
Crossref
Stefan Fafinski, William H. Dutton & Helen Zerlina Margetts. (2010) Mapping and Measuring Cybercrime. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.