Skip to main content

Simple Economics of Cybercrime and the Vicious Circle

  • Chapter
  • First Online:
The Global Cybercrime Industry

Abstract

Cybercrimes are becoming increasingly pervasive and sophisticated and have more severe economic impacts than most conventional crimes. Technology and skill-intensiveness; a higher degree of globalization than conventional crimes; and the newness make cybercrimes structurally different. In this chapter, we examine how characteristics of cyber-criminals, cybercrime-victims, and law-enforcement agencies have reinforced each other and formed the vicious circle. Next, we build on key elements of the vicious circle and some additional characteristics of cybercrimes to assess the cost–benefit calculus of a hacker.

“Today’s online data thieves don’t just run automatic scanners and jump on any network hole they find. They’re more likely to first choose a target that has data they can turn into cash, and then figure out how to break in” (Peter Tippett of Verizon Business, cf. Larkin, 2009, p. 33).

“Law enforcement is presently 5 to 10 years behind the global crime curve in relation to technological capabilities” (Alexander, 2002).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Adams, J. (2001, May/June). Virtual defense. Foreign Affairs, 98–112.

    Google Scholar 

  • Aggarwal, V. (2009). Lead: Cyber crime’s rampant, Express Computer, 03 August 2009. http://www.expresscomputeronline.com/20090803/market01.shtml. Accessed 1 October 2009.

  • Aguilar-Millan, S., Foltz, J. E., Jackson, J., & Oberg, A. (2008). The globalization of crime. Futurist, 42(6), 41–50.

    Google Scholar 

  • Alexander, D. (2002, June). Policing and the global paradox. FBI Law Enforcement Bulletin, 71(6), 6–13, 00145688.

    Google Scholar 

  • Anderson, R., & Schneier, B. (2005). Counterpane internet security guest editors introduction: Economics of information security. IEEE Security & Privacy, 3(1), 12–13.

    Article  Google Scholar 

  • Andrews, L. (2009, June 9) Online scams go unreported and unpunished. Cybercriminals beating the law Canberra Times (Australia) SECTION: A, p. 5.

    Google Scholar 

  • Barnes, D. A. (2004). Note, Deworming the Internet, 83 TEX. L. REV. 279, 322–329.

    Google Scholar 

  • Bauerly, R. J. (2009). Online auction fraud and ebay. Marketing Management Journal, 19(1), 133–143.

    Google Scholar 

  • Becker, G. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76(2), 169–217.

    Article  Google Scholar 

  • Becker, G. S. (1995, Fall). The economics of crime. Cross Sections, 8–15. http://www.rich.frb.org/pubs/cross/crime/crime.pdf. Accessed 1 October 2006.

  • Bednarz, A. (2004). Profiling cybercriminals: A promising but immature science, Network World, November 29. http://www.nwfusion.com/supp/2004/cybercrime/112904profile.html?page=2. Accessed 1 October 2005.

  • Bell, R. E. (2002). The prosecution of computer crime. Journal of Financial Crime, 9(4), 308–325.

    Article  Google Scholar 

  • Birmingham Post. (2007). Politics: Cybercrime victim every 10 seconds, 4.

    Google Scholar 

  • Blau, J. (2004). Russia - a happy haven for hackers, 26 May 2004. http://www.computerweekly.com/Article130839.htm. Accessed 1 October 2005.

  • Blitstein, R. (2007, November 14). Cybercops: US targets terrorists as online thieves run amok. San Jose Mercury News.

    Google Scholar 

  • Boal, M. (2005). Being Bill Gates Steven Spielberg, Martha Stewart, George Soros Charles Schwab: How the Most Brazen Identity Thief In US Almost Get Away With It. Readers Digest, 161–173.

    Google Scholar 

  • Bottoms, A. E., & Wiles, P. (2002). Environmental criminology. Oxford Handbook of Criminology, 620–656.

    Google Scholar 

  • Brenner, S. W. (2004). Toward a criminal law for cyberspace: A new model of law enforcement? 30 Rutgers Computer and Technology Law Journal, 30, 1–9.

    Google Scholar 

  • Browning, C. R, Feinberg, S. L., & Dietz, R. D. (2004). The paradox of social organization: Networks, collective efficacy, and violent crime in urban neighborhoods. Social Forces, 83(2), 503–534.

    Article  Google Scholar 

  • Bryan-Low, C. (2005, July 13). Fraud Inc.: As identity theft moves online, crime rings mimic big business; Russian-led Carderplanet steals account numbers; Mr. Havard hits ATMs; ‘Common Punk’ to ‘Capo’. Wall Street Journal, A.1.

    Google Scholar 

  • Bulkeley, W. M. (2008). Quiz; Tech IQ: How well do you know...the digital world. Wall Street Journal, R.14.

    Google Scholar 

  • Caribbean Press Releases. (2008). Trinidad and Tobago to Host OAS Cyber-Crime Workshop, 13 May 2008. http://www.caribbeanpressreleases.com/articles/3236/1/Trinidad-and-Tobago-To-Host-OAS-Cyber-Crime-Workshop/Page1.html. Accessed 1 October 2009.

  • Casey, E. (2004). Digital evidence and computer crime. Cambridge: Academic Press.

    Google Scholar 

  • Chretien, K. C., Ryan, G. S., Chretien, J. P., & Kind, T. (2009). Online posting of unprofessional content by medical students. JAMA, 302(12), 1309–1315.

    Article  Google Scholar 

  • Claburn, T. (2008). The Cybercrime Economy, April 9, 2008. http://www.informationweek.com/blog/main/archives/2008/04/the_cyber_crime.html. Accessed 1 October 2009.

  • Clarke, R. V. (1983). Situational crime prevention: Its theoretical basis and practical scope. In M. Tonry & N. Morris (Eds.), Crime and justice: An annual review of research (p. 14). Chicago: University of Chicago Press.

    Google Scholar 

  • Clarke, R. V. (1995). Situational crime prevention. In M. Tonry & D. P. Farrington (Eds.), Building a safer society. Strategic approaches to crime (pp. 91–150). University of Chicago Press.

    Google Scholar 

  • Clarke, R. V. (1999). Hot products: Understanding, anticipating, and reducing demand for stolen goods. Police Research Paper 112. London: Home Office.

    Google Scholar 

  • Clemons, E. K. (2007). An empirical investigation of third-party seller rating systems in e-commerce: The case of buySAFE. Journal of Management Information Systems, 24(2), 43–71.

    Article  Google Scholar 

  • CNN.com. (2000, July 26). Many countries said to lack computer crime laws. CNN.com. http://www.cnn.com/2000/TECH/computing/07/26/crime.internet.reut.

  • COE. (2009). Convention on Cybercrime: CETS No.:185. http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG. Accessed 1 October 2009.

  • Dawkins, R. (1982). The extended phenotype. Oxford University Press.

    Google Scholar 

  • de Jong, W. M. (2001). Manipulative tactics in budgetary games: The art and craft of getting the money you don’t deserve. Knowledge, Technology & Policy, Spring, 14(1), 50–66.

    Google Scholar 

  • Deas, D., & Thomas, S. (2002). Comorbid psychiatric factors contributing to adolescent alcohol and other drug use. Alcohol Research and Health, 26, 116–121.

    Google Scholar 

  • Dellarocas, C., & Wood, C. A. (2008). The sound of silence in online feedback: Estimating trading risks in the presence of reporting bias. Management Science, 54(3), 460–476.

    Article  Google Scholar 

  • Downes, L. (2007, March 6). Cybercrime treaty: What it means to you. Baseline.com.

    Google Scholar 

  • Edelman, B. (2007, January 25). Why I can never agree with adware and spyware. The Guardian.

    Google Scholar 

  • Ehrlich, I. (1996). Crime, punishment, and the market for offenses. Journal of Economic Perspectives, 10(1), 43–67.

    Google Scholar 

  • Ehrlich, I., & Becker, G. (1972). Market insurance, serf-insurance and serf-protection. Journal of Political Economy, 80(4), 623–648.

    Article  Google Scholar 

  • Fest, G. (2005, September 1). Offshoring: Feds take fresh look at India BPOs; Major theft has raised more than a few eyebrows. Bank Technology News, 18(9), 1.

    Google Scholar 

  • Fong, C. (2008, May 8). Fighting the agents of organized cybercrime. CNN.com.

    Google Scholar 

  • Foreign Policy. (2005, March/April). Caught in the net: Australian teens, 92.

    Google Scholar 

  • Gabrys, E. (2002). The international dimensions of cyber-crime, Part 1. Information Systems Security, 11(4), 21–32.

    Article  Google Scholar 

  • GAO Reports. (2007). Public and private entities face challenges in addressing cyber threats, RPT-NUMBER: GAO-07-705.

    Google Scholar 

  • Giannangeli, M. (2008, June 8). Are we ready for Russian Mafia’s crime revolution? Sunday Express, Scottish Edition, 3.

    Google Scholar 

  • Glaeser, E. L., & Sacerdote, B. (1999). Why is there more crime in cities? The Journal of Political Economy, 107(6), Part 2, 225–258.

    Google Scholar 

  • Grant, I. (2008, March 19). The UK’s dependence on the internet is putting more than half of its economy at risk, says the government. ComputerWeekly.com. http://www.computerweekly.com/Articles/2008/03/19/229932/uk-government-warns-of-economys-reliance-on-internet.htm. Accessed 1 October 2009.

  • Greenberg, A. (2007). The top countries for cybercrime, Forbes.com. http://www.forbes.com/2007/07/13/cybercrime-world-regions-tech-cx_ag_0716cybercrime.html. Accessed 1 October 2008.

  • Grow, B., & Bush, J. (2005, May 30). Hacker hunters. Business Week, 74.

    Google Scholar 

  • Harler, C., & Fox, B. (1992). Network security communications news. Nokomis, 29(1), 20–24.

    Google Scholar 

  • Hawkins, J. D., Herrenkohl, T., Farrington, D. P., Brewer, D., Catalano, R., & Harachi, T. W. (1998). A review of predictors of youth violence. In R. Loeber & D. P. Harrington (Eds.), Serious & violent juvenile offenders: Risk factors and successful interventions (pp. 106–146). Thousand Oaks, CA: Sage.

    Google Scholar 

  • Hirschauer, N., & Musshoff, O. (2007). A game-theoretic approach to behavioral food risks: The case of grain producers. Food Policy, 32(2), 246–265.

    Article  Google Scholar 

  • Internet Crime Complaint Center. (2007). Internet Crime Report, 2007. http://www.ic3.gov/media/annualreport/2007_IC3Report.pdf. Accessed 1 October 2008.

  • Ismail, I. (2008, February 18). Understanding cybercriminals. New Straits Times (Malaysia), 12.

    Google Scholar 

  • Jones, B. R. (2007). Comment: Virtual neighborhood watch: Open source software and community policing against cybercrime. Journal of Criminal Law & Criminology, 97(2), 601–629.

    Google Scholar 

  • Joshi, V. (2009, October 12). Officials: Criminals cooperate better than police. The Boston Globe. http://www.boston.com/news/world/asia/articles/2009/10/12/officials_criminals_cooperate_better_than_police/ Accessed 27 October 2009.

  • Kallman, E. A., & Grillo, J. P. (1996). Ethical decision making and information technology, 2e. New York: McGraw Hill.

    Google Scholar 

  • Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149(4), 1003–1114.

    Google Scholar 

  • Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541–562.

    Article  Google Scholar 

  • Kupersmidt, J. B., Griesler, P. C., DeRosier, M. E., Patterson, C. J., & Davis, P. W. (1995). Childhood aggression and peer relations in the context of family and neighborhood factors. Child Development, 66, 360–375.

    Article  Google Scholar 

  • Lagu, T., Kaufman, E. J., & Asch, D. A. (2008). Armstrong, K. Content of weblogs written by health professionals. Journal of General Internal Medicine, 23(10), 1642–1646.

    Article  Google Scholar 

  • Larkin, E. (2009). Organized crime moves into data theft. PC World, 27(7), 33–34.

    Google Scholar 

  • Larsen, E., & Lomi, A. (2002). Representing change: A system model of organizational inertia and capabilities as dynamic accumulation processes. Simulation Model Practice and Theory, 10(5), 271–296.

    Article  Google Scholar 

  • Lemos, R. (2001, May 1). FBI “hack” raises global security concerns. CNet News. http://news.com.com/2100-1001-950719.html

  • Lianos, M., & Douglas, M. (2000). Dangerization and the end of deviance. The British Journal of Criminology, 40(2), 261–278.

    Google Scholar 

  • Matsumoto, K., Ouchi, N., Watanabe, C., & Griffy-Brown, C. (2002). Optimal timing of the development of innovative goods with generation. Technovation, 22(3), 175–185.

    Article  Google Scholar 

  • McCarthy, B. (2002). New economics of sociological criminology. Annual Review of Sociology, 28, 417–442.

    Google Scholar 

  • McCleary, R. M. (2008). Religion and economic development. Policy Review, 148, 45–57.

    Google Scholar 

  • McCord, E. S., Ratcliffe, J. H., Garcia, R. M., & Taylor, R. B. (2007). Nonresidential crime attractors and generators elevate perceived neighborhood crime and incivilities. Journal of Research in Crime and Delinquency, 44(3), 295–320.

    Article  Google Scholar 

  • McDonald, C. G., Slawson, C. V., Jr. (2002, October). Reputation in an internet auction market. Economic Inquiry, 40(4), 633–650.

    Article  Google Scholar 

  • McIllwain, J. S. (2005). Intellectual property theft and organized crime: The case of film piracy. Trends in Organized Crime, 8(4), 15–39.

    Article  Google Scholar 

  • Merton, R. (1968). Social theory and social structure. New York: Free Press.

    Google Scholar 

  • Messmer, E. (2009, October 6). Malware flea market pays hackers to hijack PCs. The Industry Standard. http://www.thestandard.com/news/2009/10/06/malware-flea-market-pays-hackers-hijack-pcs. Accessed 14 October 2009.

  • Mikos, R. A. (2006). “Eggshell” victims, private precautions, and the societal benefits of shifting crime. Michigan Law Review, 105(2), 307–351.

    Google Scholar 

  • Miller, N. (2008). Casting a wide net for cyber crimes. The Age. Melbourne, Australia.

    Google Scholar 

  • Morgan, P. M. (2005). Taking the long view of deterrence. Journal of Strategic Studies, 28(5), 751–763.

    Article  Google Scholar 

  • Nagin, D. S. (1998). Criminal deterrence–research at the outset of the twenty-first century. In M. Tondry (Ed.), Crime and justice: A review of research, 23, 1–42.

    Google Scholar 

  • Oberwittler, D. (2007). The effects of neighborhood poverty on adolescent problem behaviors: A multi-level analysis differentiated by gender and ethnicity. Housing Studies, 22, 781–803.

    Article  Google Scholar 

  • Phukan, S. (2002, June). IT ethics in the Internet age: New dimensions. InSITE. http://proceedings.informingscience.org/IS2002Proceedings/papers/phuka037iteth.pdf

  • Probasco, J., Clark, R., & Davis, W. L. (1995). A human capital perspective on criminal careers. Journal of Applied Business Research, 11(3), 58–64.

    Google Scholar 

  • Regan, K. (2006). FBI: Cybercrime causes financial pain for many businesses. TechNewsWorld. http://www.technewsworld.com/story/48417.html. Accessed 1 October 2009.

  • Richtel, M. (1999, June 2). Federal cybercrime unit hunts for hackers. New York Times, A16.

    Google Scholar 

  • Rush, H., Smith, C., Mbula, E. K., & Tang, P. (2009). Crime online: Cybercrime and illegal innovation, Research report: July 2009, CENTRIM, University of Brighton. http://eprints.brighton.ac.uk/5800/01/Crime_Online.pdf. Accessed 1 October 2009.

  • Salkever, A. (2003, October 21). “Phishing” is foul on the Net. Business Week Online. http://www.businessweek.com/technology/content/oct2003/tc20031021_8711_tc047.htm. Accessed 1 October 2004.

  • Salu, A. O. (2004). Online crimes and advance fee fraud in nigeria – Are available legal remedies adequate? Journal of Money Laundering Control, 8(2), 159–167.

    Article  Google Scholar 

  • Sawant, N. (2009, October 5). Virtually speaking, crime in the city on an upward spiral. The Times of India. http://timesofindia.indiatimes.com/news/city/mumbai/Virtually-speaking-crime-in-the-city-on-an-upward-spiral/articleshow/5087668.cms.

  • Schneier, B. (2009, October 15). Why framing your enemies is now virtually child’s play. The Guardian. http://www.guardian.co.uk/technology/2009/oct/15/bruce-schneier-internet-security.

  • Schuerman, L., & Kobrin, S. (1986). Community careers in crime. In A. J. Reiss, Jr. & M. Tonry (Eds.), Communities and crime (pp. 67–100). Chicago: University of Chicago Press.

    Google Scholar 

  • Serio, J. D., & Gorkin, A. (2003). Changing lenses: Striving for sharper focus on the nature of the ‘Russian Mafia’ and its impact on the computer realm. International Review of Law, Computers and Technology, 17(2), 191–202.

    Google Scholar 

  • Shelley, L. I. (1998). Crime and corruption in the digital age. Journal of International Affairs, 51(2), 605–620.

    Google Scholar 

  • Shiels, M. (2009, October 1). US urges ‘cyber hygiene’ effort, BBC News. http://news.bbc.co.uk/2/hi/technology/8279867.stm. Accessed 1 October 2009.

  • Sullivan, B. (2007). Who’s Behind Criminal Bot Networks?, April 10. http://redtape.msnbc.com/2007/04/whos_behind_cri.html. Accessed 1 October 2008.

  • Sutherland, B. (2008). The Rise of Black Market Data; Criminals who steal personal data often don’t exploit it. Instead, they put it up for sale on one of the many vibrant online markets. Newsweek (International ed.), 152(24).

    Google Scholar 

  • Swartz, J. (2004, October 21). Crooks slither into Net’s shady nooks and crannies crime explodes as legions of strong-arm thugs, sneaky thieves log on. USA Today. http://www.usatoday.com/printedition/money/20041021/cybercrimecover.art.htm. Accessed 1 October 2005.

  • Swope, R. E. (2001). Criminal theory on the street: Analyzing why offenses take place. Law and Order, 49(6), 121–128.

    Google Scholar 

  • Taylor, R. B., Koons, B., Kurtz, E., Greene, J., & Perkins, D. (1995). Streetblocks with more nonresidential landuse have more physical deterioration: Evidence from baltimore and philadelphia. Urban Affairs Review, 30, 120–136.

    Google Scholar 

  • The Baltic Times. (2009, August 4). Cyber criminals found in Latvia. http://www.baltictimes.com/news/articles/23283. Accessed 1 October 2009.

  • The New York Times. (2009). Text: Obama’s Remarks on Cyber-Security. http://www.nytimes.com/2009/05/29/us/politics/29obama.text.html?pagewanted=2. Accessed 1 October 2009.

  • Thompson, L. A., Dawson, K., & Ferdig, R., Black, E., Boyer, J., & Coutts, J. (2008). The intersection of online social networking with medical professionalism. Journal of General Internal Medicine, 23(7), 954–957.

    Article  Google Scholar 

  • Toshiya, K., Susumu, F., & Noriyasu, Y. (2003). A validation on Pareto optimality of Walrasian virtual market. IEIC Technical Report (Institute of Electronics, Information and Communication Engineers), 102(613), 13–18.

    Google Scholar 

  • Valdez, A., Kaplan, C. D., & Curtis, R. L. (2007). Aggressive crime, alcohol and drug use, and concentrated poverty in 24 US urban areas. American Journal of Drug and Alcohol Abuse, 33, 595–603.

    Article  Google Scholar 

  • Van Koppen, P. J., & Jansen, R. W. J. (1998). The road to the robbery: Travel patterns in commercial robberies. The British Journal of Criminology, 38(2), 230–246.

    Google Scholar 

  • Walden, I. (2005). Crime and security in cyberspace. Cambridge Review of International Affairs, 18(1), 51–68.

    Google Scholar 

  • Walker, C. (2004, June). Russian Mafia extorts gambling websites. http://www.americanmafia.com/cgi/clickcount.pl?url=www.americanmafia.com/Feature_Articles_270.html. Accessed 1 October 2005.

  • Wall, D. S. (1998). Catching cybercriminals: Policing the internet. International Review of Law, 12(2), 201–218.

    Google Scholar 

  • Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice & Research, 8(2), 183–205.

    Article  Google Scholar 

  • Warren, P. (2007, November 15). Hunt for Russia’s web criminals. The Russian Business Network – Which some blame for 60% of all internet crime – Appears to have gone to ground. The Guardian. http://www.guardian.co.uk/technology/2007/nov/15/news.crime. Accessed 1 October 2009.

  • Watanabe, C., & Tokumasu, S. (2003). Optimal timing of R&D for effective utilization of potential resources in innovation. Journal of Advances in Management Research, 1(1), 11–27.

    Article  Google Scholar 

  • Webb, J. W., Tihanyi, L., Ireland, R. D., & Sirmon, D. G. (2009). You say illegal, I say legitimate: Entrepreneurship in the informal economy. Academy of Management Review, 34(3), 492–510.

    Google Scholar 

  • Webwire. (2008, June 25). First told of Chinese PC hijack explosion. http://www.webwire.com/ViewPressRel.asp?aId=68776. Accessed 1 October 2009.

  • Weisburd, D., Bushway, S., Lum, C., & Yang, S. M. (2004). Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology, 42(2), 283–320.

    Article  Google Scholar 

  • Whitlock, R. A. (1979). Witch crazes and drug crazes: A contribution to the social pathology of credulity and scapegoating. Australian Journal of Social, 14(1), 43–54.

    Google Scholar 

  • Wilson, W. J. (1987). The truly disadvantaged. Chicago: University of Chicago Press.

    Google Scholar 

  • Wylie, I. (2007, December 26). Internet; Romania home base for EBay scammers; The auction website has dispatched its own cyber-sleuth to help police crack fraud rings. Los Angeles Times, C.1.

    Google Scholar 

  • Ye, V. (2008, April 15). Asia hindered by lack of cybercrime laws. businessweek.com. http://www.businessweek.com/globalbiz/content/apr2008/gb20080415_220378.htm?campaign_id=rss_daily. Accessed 12 October 2009.

  • Zimmerman, A. (2006, October 25). Creative crooks: As shoplifters use high-tech scams, retail losses rise; Theft rings alter bar codes, work gift-card swindles; Fencing the loot online; Target snares a Lego bandit. Wall Street Journal, A1.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nir Kshetri .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Kshetri, N. (2010). Simple Economics of Cybercrime and the Vicious Circle. In: The Global Cybercrime Industry. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11522-6_2

Download citation

Publish with us

Policies and ethics