Skip to main content

The Psychology of Cybercrime

  • Reference work entry
  • First Online:
The Palgrave Handbook of International Cybercrime and Cyberdeviance

Abstract

Criminological and forensic psychology has had a long history of offering us unique insights into criminal behavior in the offline world. Yet the advent of the Internet has meant that we have had to think about the psychology of criminal behavior from a different perspective. The Internet brings with it new crimes and new ways to commit old crimes, and has the potential to make a criminal of the unsuspecting and naïve Internet user. This chapter introduces the reader to the area of cyberpsychology and provides an overview of current psychological understandings of online crime. We start by considering cybercrime typologies, outlining the categories of cybertrespass, cyberdeception and theft, cyber-pornography and obscenity, and cyber-violence that have informed psychological theorizing in this area, as well as highlighting some of the problems inherent within these categorization systems. We then focus on the psychology of using the Internet as a tool for new and old crimes, where a perpetrator may use the Internet as a “weapon” that has the potential to cause harm or damage. Here, we focus on the old crime of domestic abuse that is committed through the new technology of the Internet and the associated new crime of revenge pornography that relies on the Internet and linked technologies to cause damage to its victims. We finish by considering some of the difficulties of researching online crime from a psychological perspective and propose a need for psychological theorizing to move away from categorizing large sways of mildly related crimes under umbrella labels.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 649.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Al Mutawa, N., Bryce, J., Franqueira, V. N. L., Marrington, A., & Read, J. C. (2019). Behavioural digital forensics model: Embedding behavioural evidence analysis into the investigation of digital crimes. Digital Investigation, 28, 70–82.

    Article  Google Scholar 

  • Ang, R. P., & Goh, D. H. (2010). Cyberbullying among adoescents: The role of affective and cognitive empathy, and gender. Child Psychiatry and Human Development, 41(4), 387–397.

    Article  Google Scholar 

  • Attrill, A., Fullwood, C., & Chadwick, D. (2015). Catfish: The detection of red flags, dangers and suspicious behaviours in the pursuit of love online. Paper presented at the Social Networking in Cyberspace Conference, Wolverhampton, September, 2015.

    Google Scholar 

  • Baryshetev, M. V., & McGlone, M. S. (2018). Pronoun usage in online sexual predation. Cyberpsychology, Behavior and Social Networking, 21(2), 117–122.

    Article  Google Scholar 

  • Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1), 22–42.

    Article  Google Scholar 

  • Baumesiter, R. F., & Leary, M. R. (1995). The need to belong: Desire for interpersonal attachments as a fundamental human motivation. Psychological Bulletin, 117(3), 497–529.

    Article  Google Scholar 

  • BBC. (2018). Revenge porn: One in three allegations dropped. https://www.bbc.co.uk/news/uk-england-44411754. Retrieved, 20th November 2018.

  • Bothamley, S., & Tulley, R. (2018). Understanding revenge pornography: Public perceptions of revenge pornography and victim blaming. Journal of Aggression, Conflict & Peace Research, 10(1), 1–10.

    Article  Google Scholar 

  • Campbell, M. A. (2005). Cyber bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling, 15(1), 68–76.

    Article  Google Scholar 

  • Chifflet, P. (2015). Questioning the validity of criminal profiling: An evidence-based approach. Australian and New Zealand Journal of Criminology, 48(2), 238–255.

    Article  Google Scholar 

  • Costa, P. T., & McCrae, R. R. (1985). The NEO personality inventory manual. Odessa: Psychological Assessment Resources.

    Google Scholar 

  • Cyber Civil Rights Initiative. (2014). Revenge porn statistics. https://www.cybercivilrights.org/wp-content/uploads/2014/12/RPStatistics.pdf. Retrieved 20 Nov 2018.

  • Drouin, M., Boyd, R. L., & Greidanus Romaneli, M. (2018). Predicting recidivism among internet child sex sting offenders using psychological language analysis. Cyberpsychology, Behavior and Social Networking, 21(2), 78–83.

    Article  Google Scholar 

  • Federal Trade Commission. (2016). https://www.ftc.gov/news-events/press-releases/2016/03/ftc-releases-annual-summary-consumer-complaints. Retrieved 16 Nov 2018.

  • Fiske, S. T., & Taylor, S. E. (1991). Social cognition (2nd ed.). New York: McGraw-Hill.

    Google Scholar 

  • Glover, D., Cartwright, N., Gough, G., & Johnson, M. (1998). The introduction of anti-bullying policies: Do policies help in the management of change? School Leadership & Management, 18, 89–105.

    Article  Google Scholar 

  • Hatfield, E., Cacioppo, J. T., & Rapson, R. L. (1993). Emotional contagion. Current Directions in Psychological Science, 2(3), 96–99.

    Article  Google Scholar 

  • Henry, N., & Powell, A. (2015). Embodied harms: Gender, shame, and technology-facilitated sexual violence. Violence Against Women, 21, 758–779.

    Article  Google Scholar 

  • Henry, N., Powell, A., & Flynn, A. (2017). Not just ‘revenge pornography’: Australians’ experiences of image-based abuse. A summary report. Melbourne: RMIT University.

    Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behaviour, 29, 129–156.

    Article  Google Scholar 

  • Hoffman, C. (2013). Hacker hat colors explained. Black hats, white hats, and gray hats. https://www.howtogeek.com/157460/hacker-hat-colors-explained-black-hats-white-hats-and-gray-hats/. Retrieved 16 Nov 2018.

  • Holmes, R. M. (1989). Profiling violent crimes: An investigative tool. New York: Sage.

    Google Scholar 

  • Kamal, M., & Newman, W. J. (2016). Revenge pornography: Mental health implications and related legislation. Journal of the American Academy of Psychiatry & Law, 44, 359–367.

    Google Scholar 

  • Kirwan, G., & Power, A. (2012). The psychology of cyber crime: Concepts and principles. Hershey: Information Science Reference.

    Book  Google Scholar 

  • Kuipers. (2006). The social construction of digital danger: Debating, defusing and inflating the moral dangers of online humor and pornography in the Netherlands and the United States. New Media & Society, 8(3), 379–400.

    Article  Google Scholar 

  • Laird, L., & Toups, H. (2013). Victims are taking on ‘revenge porn’ websites for posting photos they didn’t consent to. ABA Journal, 99(1), 1–10.

    Google Scholar 

  • Le Bon, G. [1895] (1903). The crowd: A study of the popular mind. London: Fisher Unwin.

    Google Scholar 

  • Marganski, A., & Melander, L. (2015). Intimate partner violence victimization in the cyber and real world: Examining the extent of cyber aggression experiences and its association with in-person dating violence. Journal of Interpersonal Violence, 33(7), 1071–1095.

    Article  Google Scholar 

  • Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Computers in Human Behavior, 92, 139–150.

    Article  Google Scholar 

  • McGuire, M. (2012). Organized crime in the digital age. London: John Grieve Centre for Policing and Security & Detica.

    Google Scholar 

  • Nurse, J. R. C. (2019). Cybercrime and you: How criminals attack and the factors that make them successful. In A. Attrill-Smith, C. Fullwood, M. Keep, & D. Kuss (Eds.), Oxford handbook of cyberpsychology. Oxford: Oxford University Press.

    Google Scholar 

  • Nurse, J. R., & Bada, M. (2018). The group element of cybercrime: Types, dynamics and criminal operations. In A. Attrill-Smith, C. Fullwood, M. Keep, & D. Kuss (Eds.), Oxford handbook of cyberpsychology. Oxford: Oxford University Press.

    Google Scholar 

  • Obscene Publications Act (1959).

    Google Scholar 

  • Olweus, D. (2003). Bulying at school: What we know and what we can do. Cambridge, MA: Blackwell Publishers, Inc.

    Google Scholar 

  • Owen, M., Attrill-Smith, A., Wesson, C., Marsh, L., Brown, K. (n.d.). The role of victim blaming in real life reports of revenge porn for gifted and stolen images and videos.

    Google Scholar 

  • Pina, A., Holland, J., & James, M. (2017). The malevolent side of revenge porn proclivity: Dark personality traits and sexist ideology. International Journal of Technoethics, 8(1), 30–43.

    Article  Google Scholar 

  • Powell, A., & Henry, N. (2018). Policing technology-facilitated sexual violence against adult victims: Police and service sector perspectives. Policing and Society, 28(3), 291–307.

    Article  Google Scholar 

  • Reed, L. A., Tolman, R. M., & Ward, L. M. (2016). Snooping and sexting: Digital media as a context for dating aggression and abuse among college students. Violence Against Women, 22, 1556–1576.

    Article  Google Scholar 

  • Ringrose, J., Harvey, L., Gill, R., & Livingstone, S. (2013). Teen girls, sexual double standards and ‘sexting’: Gendered value in digital image exchange. Feminist Theory, 14, 305–323.

    Article  Google Scholar 

  • Scott, A. J., & Gavin, J. (2018). Revenge pornography: The influence of perpetrator-victim sex, observer sex and observer sexting experience on perceptions of seriousness and responsibility. Journal of Criminal Psychology, 8(2), 162–172.

    Article  Google Scholar 

  • Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154.

    Article  Google Scholar 

  • Smith, J. C., & Hogan, B. (1999). Criminal law. Cases and materials. London: Butterworths.

    Google Scholar 

  • Strohmaier, H. I., Murphy, M., & DeMatteo, D. (2014). Youth sexting: Prevalence rates, driving motivations, and the deterrent effect of legal consequences. Sexuality Research & Social Policy: A Journal of the NSRC, 11(3), 245–255.

    Article  Google Scholar 

  • Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185, 1124–1131.

    Article  Google Scholar 

  • UK Government. (2015). Revenge porn. https://www.gov.uk/government/publications/revenge-porn. Retrieved 20 Nov 2018.

  • Vandebosch, H., & VanCleemput, K. (2009). Cyberbulying among youngsters: Profiles of bullies and victims. New Media and Society, 11(8), 1349–1371.

    Article  Google Scholar 

  • Walker, K., & Sleath, E. (2017). A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media. Aggression and Violent Behavior, 36, 9–24.

    Article  Google Scholar 

  • Wall, D. S. (2001). Crime and the internet. New York: Routledge.

    Book  Google Scholar 

  • Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Cambridge, MA: Polity Press.

    Google Scholar 

  • Ward, T., & Beech, A. (2006). An integrated theory of sexual offending. Aggression and Violent Behaviour, 11, 44–63.

    Article  Google Scholar 

  • Willard, N. (2004). An educator’s guide to cyberbullying and cyberthreats. Center for Safe and Responsible Internet use. www.http.ewa.org. Retrieved 16 Nov 2018.

  • Young, L. F. (1993). Utopians, cyberpunks, players and other computer criminals. In IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alison Attrill-Smith .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Attrill-Smith, A., Wesson, C. (2020). The Psychology of Cybercrime. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_25

Download citation

Publish with us

Policies and ethics