12.07.2015 Views

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

The Criminal Phenomenon on the Internet: Hallmarks of ... - uoltj

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

(2008) 5:1&2 UOLTJ 125<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>Criminal</str<strong>on</strong>g> <str<strong>on</strong>g>Phenomen<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>the</strong> <strong>Internet</strong> 127<str<strong>on</strong>g>The</str<strong>on</strong>g> <str<strong>on</strong>g>Criminal</str<strong>on</strong>g> <str<strong>on</strong>g>Phenomen<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>the</strong> <strong>Internet</strong>:<strong>Hallmarks</strong> <strong>of</strong> <str<strong>on</strong>g>Criminal</str<strong>on</strong>g>s and Victims Revisited throughTypical Cases ProsecutedXingan Li1. INTRODUCTION<strong>the</strong> social changes <strong>of</strong> recent decades have been primarily driven by <strong>the</strong>development <strong>of</strong> informati<strong>on</strong> and communicati<strong>on</strong>s technology. One <strong>of</strong> <strong>the</strong> mostsignificant negative impacts in this c<strong>on</strong>text is <strong>the</strong> emergence and rampancy <strong>of</strong>cybercrime. Research <strong>on</strong> criminal activity related to informati<strong>on</strong> andcommunicati<strong>on</strong>s technology has become a focus <strong>of</strong> study in <strong>the</strong> fields <strong>of</strong>criminology, criminal law and informati<strong>on</strong> security.Cybercrime is a comprehensive topic and attracts scholars from differentdisciplines. Many have written about <strong>the</strong> <strong>the</strong>oretical explanati<strong>on</strong> for cybercrime.Studies <strong>of</strong> cybercrime have revealed different dimensi<strong>on</strong>s <strong>of</strong> this phenomen<strong>on</strong>.While <strong>the</strong> limited previous first-hand explorati<strong>on</strong>s have been widely acceptedand cited, inc<strong>on</strong>sistencies exist am<strong>on</strong>g various studies. Unfortunately, in <strong>the</strong> field<strong>of</strong> cybercriminal and cybervictim pr<strong>of</strong>iling, most subsequent <strong>the</strong>oretical treatisestend to reinforce <strong>the</strong> earliest findings, or at most provide some modest revisi<strong>on</strong>s.It is critical to answer <strong>the</strong> following questi<strong>on</strong>s: Who is most likely tocommit cybercrime? Who is most likely to be victimized by cybercrime? Andwhat are <strong>the</strong> similarities between cybercrime perpetrators and <strong>the</strong>ir victims? <str<strong>on</strong>g>The</str<strong>on</strong>g>subject <strong>of</strong> cybercrime leads <strong>the</strong> tide <strong>of</strong> <strong>the</strong> <strong>the</strong>ory and practice <strong>of</strong> legislati<strong>on</strong> andlaw enforcement in <strong>the</strong> sense that <strong>the</strong> perpetrators are those who challenge <strong>the</strong>traditi<strong>on</strong>al legal system. Studies <strong>on</strong> <strong>the</strong> subject <strong>of</strong> computer crime have a history<strong>of</strong> several decades and have established widely-accepted pr<strong>of</strong>iles forcybercriminals and <strong>the</strong>ir victims.With <strong>the</strong> deepening <strong>of</strong> <strong>the</strong> research <strong>on</strong> cybercrime, lawyers and lawenforcement <strong>of</strong>ficials are paying increased attenti<strong>on</strong> to <strong>the</strong> hallmarks <strong>of</strong>cybercriminals and <strong>the</strong> security <strong>of</strong> cybervictims. <str<strong>on</strong>g>The</str<strong>on</strong>g> purpose <strong>of</strong> this study is topresent an updated pr<strong>of</strong>ile <strong>of</strong> cybercriminality and cybervictimizati<strong>on</strong>, through<strong>the</strong> analysis <strong>of</strong> 115 typical cybercrime cases prosecuted in <strong>the</strong> United States <strong>of</strong>America between 18 March 1998 and 12 May 2006, and published <strong>on</strong> <strong>the</strong>Department <strong>of</strong> Justice website.(2008) 5:1&2 UOLTJ 125

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!