573
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Convenience Theory and Cybercrime Opportunity: An Analysis of Online Cyber Offending

ORCID Icon &
Pages 348-360 | Received 27 Feb 2023, Accepted 05 Aug 2023, Published online: 10 Aug 2023

References

  • Al-Garadi, M. A., K. D. Varathan, and S. D. Ravana. 2016. “Cybercrime Detection in Online Communications: The Experimental Case of Cyberbullying Detection in the Twitter Network.” Computers in Human Behavior 63:433–43. doi:10.1016/j.chb.2016.05.051.
  • Benson, M. L. and T. D. Madensen. 2007. “Situational Crime Prevention and White-Collar Crime.” Pp. 609–26 in International Handbook of White-Collar and Corporate Crime, Springer US. doi:10.1007/978-0-387-34111-8_31
  • Blois, K. and A. Ryan. 2013. “Affinity Fraud and Trust within Financial Markets.” Journal of Financial Crime 20(2):186–202. doi: 10.1108/13590791311322364.
  • Braaten, C. and M. S. Vaughn. 2021. “Convenience theory of cryptocurrency crime: A content analysis of US federal court decisions.” Deviant behavior 42(8):958–78.
  • Brewer, R., S. Fox, and C. Miller. 2020. “Applying the Techniques of Neutralization to the Study of Cybercrime.” The Palgrave Handbook of International Cybercrime and Cyberdeviance Springer International Publishing. 547–65. doi:10.1007/978-3-319-78440-3_22.
  • Chen, X., M. Al Hasan, X. Wu, P. Skums, M. J. Feizollahi, M. Ouellet, E. L. Sevigny, D. Maimon, and Y. Wu. 2019. “Characteristics of Bitcoin Transactions on Cryptomarkets.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11611:261–76. LNCS. doi:10.1007/978-3-030-24907-6_20.
  • Choi, K. 2008. “Computer Crime Victimization and Integrated Theory: An Empirical Assessment.” International Journal of Cyber Criminology 2 (1):308–333.
  • Chua, Y. T. and T. J. Holt. 2016. “A Cross-National Examination of the Techniques of Neutralization to Account for Hacking Behaviors.” Victims & Offenders 11(4):534–55. doi: 10.1080/15564886.2015.1121944.
  • Clarke, R. V. and D. B. Cornish. 1985. “Modeling offenders’ Decisions: A Framework for Research and Policy.” Crime and Justice 6:147–85. doi:10.1086/449106.
  • Cohen, L. E. and M. Felson. 1979. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44 (4):588–608. doi:10.2307/2094589.
  • Dearden, T. E. and K. Parti. 2021. “Cybercrime, Differential Association, and Self-Control: Knowledge Transmission Through Online Social Learning.” American Journal of Criminal Justice 46(6):935–55. doi: 10.1007/s12103-021-09655-4.
  • Dearden, T. E., K. Parti, and J. Hawdon. 2021. “Institutional Anomie Theory and Cybercrime—Cybercrime and the American Dream, Now Available Online.” Journal of Contemporary Criminal Justice 37(3):311–32. doi: 10.1177/10439862211001590.
  • Donner, C. M. 2016. “The Gender Gap and Cybercrime: An Examination of College Students’ Online Offending.” Victims and Offenders 11 (4):556–77. doi:10.1080/15564886.2016.1173157.
  • Einarsson, H., J. W. Sakshaug, A. Cernat, C. Cornesse, and A. G. Blom. 2022. “Measurement Equivalence in Probability and Nonprobability Online Panels.” International Journal of Market Research 64 (4):484–505. doi:10.1177/14707853221085206.
  • Farrington, D. P. 1986. “Age and Crime.” Crime and Justice 7:189–250. doi:10.1086/449114.
  • Gottschalk, P. 2017. “Convenience in White-Collar Crime: Introducing a Core Concept.” Deviant Behavior 38 (5):605–19. doi:10.1080/01639625.2016.1197585.
  • Gottschalk, P. and C. Hamerton. 2022. “Online convenience.” Pp. 37–61 in White-Collar Crime Online, Springer International Publishing. doi:10.1007/978-3-030-82132-6_3
  • Graham, R. and R. Triplett. 2017. “Capable Guardians in the Digital Environment: The Role of Digital Literacy in Reducing Phishing Victimization.” Deviant Behavior 38(12):1371–82. doi: 10.1080/01639625.2016.1254980.
  • Grauer, K., E. Jardine, E. Leosz, and H. Updegrave (2023). The 2023 Crypto Crime Report: Everything You Need to Know About Cryptocurrency-Based Crime. Chainanalysis. Available at https://go.chainalysis.com/2023-crypto-crime-report.html
  • Greene, v and Mizuho Bank, LTD. (U.S. District Court, N.D. Illinois, Eastern Division 2016). https://casetext.com/case/greene-v-mizuho-bank-ltd-4
  • Hadzhidimova, L. I. and B. K. Payne. 2019. “The Profile of the International Cyber Offender in the US.” International Journal of Cybersecurity Intelligence & Cybercrime 2(1):40–55. doi: 10.52306/0201041YNGG5534.
  • Hansen, K. 2003. “Education and the Crime‐Age Profile.” British Journal of Criminology 43(1):141–68. doi: 10.1093/bjc/43.1.141.
  • Hawdon, J., C. Bernatzky, and M. Costello. 2019. “Cyber-Routines, Political Attitudes, and Exposure to Violence-Advocating Online Extremism.” Social Forces 98 (1):329–54. doi:10.1093/sf/soy115.
  • Hawdon, J., K. Parti, and T. E. Dearden. 2020. “Cybercrime in America Amid COVID-19: The Initial Results from a Natural Experiment.” American Journal of Criminal Justice 45(4):546–62. doi: 10.1007/s12103-020-09534-4.
  • Hay, C. and K. Ray. 2020. “General Strain Theory and Cybercrime”. Pp. 583–97 in Palgrave Handbook of International Cybercrime, in edited by, T. J. Holt and A. M. Bossler. Palgrave Macmillan. 10.1007/978-3-319-78440-3_21
  • Hinduja, S. and G. E. Higgins. 2011. “Trends and Patterns Among Music Pirates.” Deviant Behavior 32(7):563–88. doi: 10.1080/01639625.2010.514202.
  • Hinduja, S. and J. W. Patchin. 2007. “Offline Consequences of Online Victimization: School Violence and Delinquency.” Journal of School Violence 6(3):89–112. doi: 10.1300/J202v06n03_06.
  • Holt, Thomas J, R. Brewer, and A. Goldsmith. 2019. “Digital Drift and the “Sense of injustice”: Counter-Productive Policing of Youth Cybercrime.” Deviant Behavior 40(9):1144–56. doi: 10.1080/01639625.2018.1472927.
  • Holt, Thomas J., G. W. Burruss, and A. M. Bossler. 2010. “Social Learning and Cyber-Deviance: Examining the Importance of a Full Social Learning Model in the Virtual World.” Journal of Crime & Justice 33 (2):31–61. doi:10.1080/0735648X.2010.9721287.
  • Holt, Thomas J., J. van Wilsem, S. van de Weijer, and R. Leukfeldt. 2018. “Testing an Integrated Self-Control and Routine Activities Framework to Examine Malware Infection Victimization.” Social Science Computer Review 38(2):187–206. doi: 10.1177/0894439318805067.
  • Hutchings, A. and B. Collier. 2019. Inside Out: Characterising Cybercrimes Committed Inside and Outside the Workplace. 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 481–90.
  • Kerstens, J. and J. Jansen. 2016. “The Victim–Perpetrator Overlap in Financial Cybercrime: Evidence and Reflection on the Overlap of Youth’s On-Line Victimization and Perpetration.” Deviant Behavior 37(5):585–600. doi: 10.1080/01639625.2015.1060796.
  • Lehdonvirta, V., A. Oksanen, P. Räsänen, and G. Blank. 2021. “Social Media, Web, and Panel Surveys: Using Non‐Probability Samples in Social and Policy Research.” Policy & Internet 13 (1):134–55. doi:10.1002/poi3.238.
  • Leukfeldt, E. R. (2015). Comparing Victims of Phishing and Malware Attacks: Unraveling Risk Factors and Possibilities for Situational Crime Prevention. International Conference on Cyber Security, 1–7. Retreived from http://arxiv.org/abs/1506.00769
  • MacInnis, B., J. A. Krosnick, A. S. Ho, and M. J. Cho. 2018. “The Accuracy of Measurements with Probability and Nonprobability Survey Samples: Replication and Extension.” Public Opinion Quarterly 82 (4):707–44. doi:10.1093/poq/nfy038.
  • Manky, D. 2013. “Cybercrime as a Service: A Very Modern Business.” Computer Fraud & Security 2013(6):9–13. doi: 10.1016/S1361-3723(13)70053-8.
  • McCarthy, A. L. and K. F. Steinmetz. 2020. “Critical Criminology and Cybercrime.” Pp. 601–21 in The Palgrave Handbook of International Cybercrime and Cyberdeviance, Springer International Publishing. doi:10.1007/978-3-319-78440-3_27
  • McElrath, K. and M. Martin. 2021. Bachelor’s Degree Attainment in the United States: 2005 to 2019. U.S. Census. https://www.census.gov/content/dam/Census/library/publications/2021/acs/acsbr-009.pdf.
  • Muftić, L. R. 2006. “Advancing Institutional Anomie Theory: A Microlevel Examination Connecting Culture, Institutions, and Deviance.” International Journal of Offender Therapy and Comparative Criminology 50(6):630–53. doi: 10.1177/0306624X06287284.
  • Nakamoto, S. (2008). Re: Bitcoin P2P E-Cash Paper. The Cryptography Mailing List.
  • National Gang Intelligence Center. 2021. “Gang involvement in tax return fraud scehems to supplement traditional criminal activities”. Situational Awareness Bulletin. Retrieved December 13, 2011.
  • Nolasco Braaten, C. and M. S. Vaughn. 2021. “Convenience Theory of Cryptocurrency Crime: A Content Analysis of U.S. Federal Court Decisions.” Deviant Behavior 42 (8):958–78. doi:10.1080/01639625.2019.1706706.
  • Owen, T. and J. Marshall. 2020. Rethinking Cybercrime: Critical Debates. Springer. doi:10.1007/978-3-030-55841-3.
  • Paquet-Clouston, M., B. Haslhofer, and B. Dupont. 2019. “Ransomware Payments in the Bitcoin Ecosystem.” Journal of Cybersecurity 5(1):tyz003. doi: 10.1093/cybsec/tyz003.
  • Pickering, D. and A. Blaszczynski. 2021. “Paid Online Convenience Samples in Gambling Studies: Questionable Data Quality.” International Gambling Studies 21 (3):516–36. doi:10.1080/14459795.2021.1884735.
  • Reisig, M. D., T. C. Pratt, and K. Holtfreter. 2009. “Perceived Risk of Internet Theft Victimization: Examining the Effects of Social Vulnerability and Financial Impulsivity.” Criminal Justice and Behavior 36 (4):369–84. doi:10.1177/0093854808329405.
  • Reyns, B. W. 2013. “Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory Beyond Direct-Contact Offenses.” Journal of Research in Crime and Delinquency 50 (2):216–38. doi:10.1177/0022427811425539.
  • Simmons, A. D. and L. D. Bobo. 2015. “Can Non-Full-Probability Internet Surveys Yield Useful Data? A Comparison with Full-Probability Face-To-Face Surveys in the Domain of Race and Social Inequality Attitudes.” Sociological Methodology 45 (1):357–87. doi:10.1177/0081175015570096.
  • Singer, E. and R. A. Kulka. 2002. Paying Respondents for Survey Participation. In Studies of Welfare Populations: Data Collections and Research Issues. M. V. Ploeg, R. A. Moffitt, & C. F. Citro Eds. Pp. 105–29. Washington, DC: National Academy Press.
  • Weinberg, J. D., J. Freese, and D. McElhattan. 2014. “Comparing Data Characteristics and Results of an Online Factorial Survey Between a Population-Based and a Crowdsource-Recruited Sample.” Sociological Science 1 (19):292–310. doi:10.15195/v1.a19.
  • Weulen Kranenbarg, M., T. J. Holt, and J. L. Van Gelder. 2019. “Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap.” Deviant Behavior 40(1):40–55. doi: 10.1080/01639625.2017.1411030.
  • Weulen Kranenbarg, M., S. Ruiter, and J. L. Van Gelder. 2021. “Do Cyber-Birds Flock Together? Comparing Deviance Among Social Network Members of Cyber-Dependent Offenders and Traditional Offenders.” European Journal of Criminology 18 (3):386–406. doi:10.1177/1477370819849677.
  • Young, M. D., M. A. Donley, G. A. Rubin, and T. M. Kneller (2016). Bitcoins and the Blockchain: The CFTC Takes Notice of Virtual Currencies[memorandum]. Retrieved from https://www.skadden.com/-/media/files/publications/2016/01/bitcoinsandtheblockchainthecftctakesnoticeofvirtua.pdf
  • Zhou, Q., J. Zhang, and D. A. Hennessy. 2019. “The Role of Family Absolute and Relative Income in Suicide Among Chinese Rural Young Adults: Mediation Effects of Social Support and Coping Strain.” Journal of Public Health 41(3):609–17. doi: 10.1093/pubmed/fdy123.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.