How "Digital" is Traditional Crime?
نویسندگان
چکیده
Measuring how much cybercrime exists is typically done by first defining cybercrime and then quantifying how many cases fit that definition. The drawback is that definitions vary across countries and many cybercrimes are recorded as traditional crimes. An alternative is to keep traditional definitions of crime and quantify the amount of associated information and communication technologies (ICT) that each contains. This research established how much ICT was used a) in the three phases of the ‘crime script’ (i.e. ‘before’, ‘during’ and ‘after’), b) during the criminal investigation and c) in the apprehension of the suspect(s) and d) whether digital crimes differ from traditional crimes in terms of the relationships between the victim and the offender or in terms of the physical distance between them. Residential and commercial burglary, threats and fraud were investigated and 809 incidents from the Police Department of East Netherlands were studied. It was found that ICT does not affect all types of crime equally: 16% of the threats and 41% of all frauds have partial digital modus operandi (MO). To commit burglaries, however, offenders hardly ever use ICT. In 2.9% of the residential burglaries, however, bank cards were stolen and later used to steal money from a bank account. For commercial burglary there was no associated ICT. Digital crimes differ from traditional crimes in a number of ways: the geographical distance between the victim and the offender is larger; digital threats occur relatively more often between expartners and digital frauds occur more often between business partners compared to traditional fraud. The study found that physical tools are more often linked to apprehension than digital ones. The regression models, however, showed digital and physical tools to be equally strong at predicting apprehension. The main findings show that ICT plays a greater role in traditional crime than expected on the basis of previous research.
منابع مشابه
A Model for Hybrid Evidence Investigation
With the advent of Information and Communication Technologies, the means of committing a crime and the crime itself are constantly evolved. In addition, the boundaries between traditional crime and cybercrime are vague: a crime may not have a defined traditional or digital form since digital and physical evidence may coexist in a crime scene. Furthermore, various items found in a crime scene ma...
متن کاملTechnology Enhanced Internationalization in Higher Education, Non-Traditional Indicators
This paper describes an alternative view of the internationalization process in higher education by comparing the traditional and non-traditional indicators on how the level of internationalization is measured; additionally, barriers that exist on both sides are reviewed and discussed. As higher education institutions are very accustomed to and focused on the number of international students, i...
متن کاملEngineering Adaptive Digital Investigations using Forensic Requirements
A digital forensic investigation aims to collect and analyse the evidence necessary to demonstrate a potential hypothesis of a digital crime. Despite the availability of several digital forensics tools, investigators still approach each crime case from scratch, postulating potential hypotheses and analysing large volumes of data. This paper proposes to explicitly model forensic requirements in ...
متن کاملEngineering Adaptive Digital Investigations using Forensics Requirements
A digital forensic investigation aims to collect and analyse the evidence necessary to demonstrate a potential hypothesis of a digital crime. Despite the availability of several digital forensics tools, investigators still approach each crime case from scratch, postulating potential hypotheses and analysing large volumes of data. This paper proposes to explicitly model forensic requirements in ...
متن کاملWildlife trafficking in the Internet age
There is a broad consensus that the Internet has greatly expanded possibilities for traditional transit crimes such as wildlife trafficking. However, the extent to which the Internet is exploited by criminals to carry out these types of activities and the way in which it has changed how these crimes are carried out remains under-investigated. Based on interviews and investigative cases, this pa...
متن کامل