Theory of digital crime
Research Article
DOI: 10.21661/r-114276
Open Access


- Published in:
- Monthly international scientific journal «Interactive science»
- Author:
- Ibraeva B. M. 1
- Work direction:
- Психология
- Rating:
- Article accesses:
- 3722
- Published in:
- doaj
- eLibrary.ru
1 Private institution «Bolashak»
- APA
For citation:
Ibraeva B. M. (2016). Theory of digital crime. Interactive science, 60-62. https://doi.org/10.21661/r-114276
- Full text
- Metrics
UDC 1
DOI: 10.21661/r-114276
Abstract
Hackers seem to be the most mysterious people in the contemporary world. Where legal actions are helpless, hackers can intervene. However, not only hackers but state employees commit cyber crimes once they get power. Is it just a coincidence or authorities and hackers have lots of things in common? This article is trying to cast light on the reasons why digital crimes are committed.
Keywords
References
- 1. Cybercrime: Security & Surveillance. Retrieved 2016, from [Электронный ресурс]. – Режим доступа: https://cdt.org/insight/cybercrime/, 2011
- 2. Howitt, D. Community Theory. Legal and Criminological Psychology. – №14 (1). – P. 183–183. – doi:10.1348/135532508x377128, 2009
- 3. McGuire W.J. A Perspective Approach to Theory Construction. Personality and Social Psychology Review. – №8 (2). – P. 173–182. – doi:10.1207/s15327957pspr0802_11, 2004
- 4. Cohen L.E. Social change and crime rate trends: A routine activity approach / L.E. Cohen, M. Felson // American Sociological Review. – 1979. – №44. – P. 588–608.
- 5. Agnew R. Strain Theory. Encyclopedia of Social Problems. – doi:10.4135/9781412963930.n550
- 6. Karl Marx. Political Theorists in Context. – P. 217–236. – doi:10.4324/9780203402276_chapter_9
- 7. Taylor R.W. Digital crime and digital terrorism (3rd edition). Upper Saddle River, NJ: Pearson/Prentice Hall, 2006.
- 8. Kirwan G. Can Theories of Crime be applied to Cybercriminal Acts? In G. Kirwan, A. Power (Eds.) the Psychology of Cyber Crime: Concepts and Principles (P. 37–51). Hershey, PA: Information Science Reference. – doi:10.4018/978–1-61350–350–8. ch003, 2012
- 9. Leukfeldt E.R. Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis / E.R. Leukfeldt, M. Yar // Deviant Behavior. – №37 (3). – P. 263–280. – doi:10.1080/01639625.2015.1012409, 2016
- 10. Hawley A. Human Ecology: A Theory of Community Structure. – New York: Ronald Press, 1950.
- 11. Clarke R.V. «Situational» Crime Prevention: Theory and Practice. British Journal of Criminology, Delinquency and Deviant Social Behavior. – 1980. – №20. – P. 136–147.
- 12. Merton. General Strain Theory. Springer Reference. – doi: 10.1007/springerreference_223303
- 13. Jaishankar K. Establishing a Theory of Cyber Crimes. International Journal of Cyber Criminology. – 2007. – №1. – P. 7–9.
Comments(0)