5,770
Views
25
CrossRef citations to date
0
Altmetric
Articles

Digital Drift and the “Sense of Injustice”: Counter-Productive Policing of Youth Cybercrime

, &
Pages 1144-1156 | Received 12 Jan 2018, Accepted 24 Mar 2018, Published online: 21 May 2018
 

ABSTRACT

Over the past several decades, criminological scholarship has increasingly focused on the problem of cybercrime including technology-enabled offending. Theoretical developments that account for these offences have not grown in tandem, leading to questions as to the nature of cybercriminality relative to traditional forms of offending. Recently, Goldsmith and Brewer proposed the conceptual framework of digital drift, extending elements of Matza’s original theories to the virtual environment. While making a useful contribution to the theorization of cybercrime, we argue that further elements of Matza’s original work also warrant consideration. In particular, we acknowledge the role of policing and the criminal justice system in affecting offender perceptions and decision-making. As such, this article extends the theorizing around digital drift to incorporate the ways that offender views are shaped in reaction to the law enforcement and industry responses to cybercrime. The implications of this extension are discussed in depth.

Notes

1 See further studies by Wall (Citation2007), as well as Chang and Grabosky (Citation2017) for treatment of these concepts.

2 Law enforcement organizations, for instance, are central to responding to criminal hacks as they have the legal authority to arrest and enforce laws at the local, state, federal, or national level (see also Brenner, Citation2010; Wall, Citation2007). There is some segmentation in the response capacities of police organizations regarding cybercrimes, as evidence from the United States suggests local agencies are more heavily involved in investigating cases involving child pornography and sex crimes (Jones, Mitchell, and Finkelhor, Citation2012), while national agencies are more likely to investigate cases involving computer hacking and data theft (Brenner, Citation2008; Smith, Grabosky, and Urbas, Citation2004). This is due to the jurisdictional limitations evident at each level of policing, as local agencies may only investigate cases involving both a victim and offender within their given geographical boundaries (Brenner, Citation2010; Smith, Grabosky, and Urbas, Citation2004). National agencies have much broader jurisdictions, and typically take cases where crimes cross borders, where victims and offenders reside in separate states or nations.

3 Corporate security personnel are essential to policing hacking as they serve as the first responders to internal compromises of sensitive infrastructure and resources within their organization (Wall, Citation2007). Security personnel not only manage sensitive customer and client data, but must also comply with existing industrial regulatory standards and procedures. They also investigate intrusions in their network and compromises that occur as a result of either external or internal threat actors. Security personnel also serve as gatekeepers to law enforcement as they will be the first to recognize a compromise that could have criminal or civil implications for their employer (Brenner, Citation2008; Wall, Citation2001). They will often work with management to determine the need for law enforcement engagement on the basis of the severity of the compromise and the extent to which embarrassment, financial harm, or legal liabilities may arise through public awareness of the incident for the organization. Should the scope of a hack require that law enforcement be contacted, security personnel will liaise with police on behalf of their employer and provide evidence to aid in the investigation (Brenner, Citation2008).

4 A DDoS attack uses various methods to flood a website or service provider with traffic in excess of its maximum tolerance, thereby keeping others from being able to use the resource until the traffic ceases.

Additional information

Notes on contributors

Thomas J. Holt

Dr. THOMAS J. HOLT is a professor in the School of Criminal Justice at Michigan State University. His research examines cybercrime, terror, and the role of the Internet in crime and deviance. He has been published in a range of journals, and is the author of multiple books on the topic of cybercrime and policing.

Russell Brewer

Dr. RUSSELL BREWER is a senior lecturer at Flinders University. He has a PhD in Criminology from the Australian National University. His research explores the links between the use of technology and pathways into crime. He has published his findings through several leading publication outlets, holds multiple nationally competitive grants, and has been called upon by Government Agencies both domestically and abroad to advise on policy.

Andrew Goldsmith

ANDREW GOLDSMITH is Matthew Flinders Distinguished Professor and Director of the Centre for Crime Policy and Research, Flinders University Australia. He researches in the areas of policing and organized crime. He is also Co-Editor of the Australian and New Zealand Journal of Criminology. This paper arises from the Australian Research Council funded Discovery Grant, Becoming Delinquent Online DP170103538 in which all authors of this paper are involved.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 324.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.