Центр научного сотрудничества "Интерактив плюс"
info@interactive-plus.ru
+7 (8352) 222-490
2130122532
Центр научного сотрудничества «Интерактив плюс»
RU
428000
Чувашская Республика
г.Чебоксары
ул.Гражданская, д.75
428000, Россия, Чувашская Республика, г. Чебоксары, улица Гражданская, дом 75
+7 (8352) 222-490
RU
428000
Чувашская Республика
г.Чебоксары
ул.Гражданская, д.75
56.125001
47.208966

Theory of digital crime

Research Article
DOI: 10.21661/r-114276
Open Access
Monthly international scientific journal «Interactive science»
Creative commons logo
Published in:
Monthly international scientific journal «Interactive science»
Author:
Ibraeva B. M. 1
Work direction:
Психология
Rating:
Article accesses:
3722
Published in:
doaj
eLibrary.ru
1 Private institution «Bolashak»
For citation:
Ibraeva B. M. (2016). Theory of digital crime. Interactive science, 60-62. https://doi.org/10.21661/r-114276

  • Metadata
  • Full text
  • Metrics
UDC 1

Abstract

Hackers seem to be the most mysterious people in the contemporary world. Where legal actions are helpless, hackers can intervene. However, not only hackers but state employees commit cyber crimes once they get power. Is it just a coincidence or authorities and hackers have lots of things in common? This article is trying to cast light on the reasons why digital crimes are committed.

References

  1. 1. Cybercrime: Security & Surveillance. Retrieved 2016, from [Электронный ресурс]. – Режим доступа: https://cdt.org/insight/cybercrime/, 2011
  2. 2. Howitt, D. Community Theory. Legal and Criminological Psychology. – №14 (1). – P. 183–183. – doi:10.1348/135532508x377128, 2009
  3. 3. McGuire W.J. A Perspective Approach to Theory Construction. Personality and Social Psychology Review. – №8 (2). – P. 173–182. – doi:10.1207/s15327957pspr0802_11, 2004
  4. 4. Cohen L.E. Social change and crime rate trends: A routine activity approach / L.E. Cohen, M. Felson // American Sociological Review. – 1979. – №44. – P. 588–608.
  5. 5. Agnew R. Strain Theory. Encyclopedia of Social Problems. – doi:10.4135/9781412963930.n550
  6. 6. Karl Marx. Political Theorists in Context. – P. 217–236. – doi:10.4324/9780203402276_chapter_9
  7. 7. Taylor R.W. Digital crime and digital terrorism (3rd edition). Upper Saddle River, NJ: Pearson/Prentice Hall, 2006.
  8. 8. Kirwan G. Can Theories of Crime be applied to Cybercriminal Acts? In G. Kirwan, A. Power (Eds.) the Psychology of Cyber Crime: Concepts and Principles (P. 37–51). Hershey, PA: Information Science Reference. – doi:10.4018/978–1-61350–350–8. ch003, 2012
  9. 9. Leukfeldt E.R. Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis / E.R. Leukfeldt, M. Yar // Deviant Behavior. – №37 (3). – P. 263–280. – doi:10.1080/01639625.2015.1012409, 2016
  10. 10. Hawley A. Human Ecology: A Theory of Community Structure. – New York: Ronald Press, 1950.
  11. 11. Clarke R.V. «Situational» Crime Prevention: Theory and Practice. British Journal of Criminology, Delinquency and Deviant Social Behavior. – 1980. – №20. – P. 136–147.
  12. 12. Merton. General Strain Theory. Springer Reference. – doi: 10.1007/springerreference_223303
  13. 13. Jaishankar K. Establishing a Theory of Cyber Crimes. International Journal of Cyber Criminology. – 2007. – №1. – P.  7–9.

Comments(0)

When adding a comment stipulate:
  • the relevance of the published material;
  • general estimation (originality and relevance of the topic, completeness, depth, comprehensiveness of topic disclosure, consistency, coherence, evidence, structural ordering, nature and the accuracy of the examples, illustrative material, the credibility of the conclusions;
  • disadvantages, shortcomings;
  • questions and wishes to author.