skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 222477 Find in a Library
Title: High-Tech Crime, Soorten Criminaliteit En Hun Daders
Author(s): R.C. van der Hulst; R.J.M. Neve
Date Published: 2008
Page Count: 224
Sponsoring Agency: Boom Juridische Unitgevers (Royal Boom Publishers)
7940 KB Meppel, The Netherlands
Publication Number: ISBN 978-90-5454-998-7
Sale Source: Boom Juridische Unitgevers (Royal Boom Publishers)
PO Box 1050
7940 KB Meppel,
Netherlands
Publisher: http://www.wodc.nl 
Type: Literature Review
Format: Book (Softbound)
Language: Dutch
Country: Netherlands
Annotation: This literature review focuses on research pertinent to the characteristics of high-tech crimes and their perpetrators, expectations for the future, and current research gaps.
Abstract: The research shows the difficulty in defining the nature and scope of high-tech crime. The distinctive features of high-tech crime are difficult to define, given the close relationship between traditional crime defined in current law (such as fraud and theft) and advanced information/communication technologies (ICT) and digital technologies. This poses the need to distinguish between the crime itself, its tools/methods of commission, and the context in which it occurred. For the current review "high-tech crime" is the umbrella term that refers to a range of criminal activities that use ICT. These crimes may target individuals, property, and organizations by using ICT as a means, or electronic communication networks and information systems, with ICT being both the means and the objective. What distinguishes these crimes is their reliance on or targeting of activities based in the use of ICT. Within the concept of "high-tech crime," this review distinguishes "cyber crime" and "computer crime." "Cyber crime" refers to legal communication and covert shielding, illegal trade, economic and financial crime, and illegal communication. "Computer crime" refers to unauthorized access to ICT, ICT failure due to data traffic, ICT failure due to data and system manipulation, and service performers. Research on each of these types of crime is reviewed. A review of the literature on the characteristics of perpetrators of high-tech crime concludes that there is very little research on this topic. The information currently available is generally superficial, unstructured, and limited. In some cases it is based on anecdotes and hypotheses whose reliability and validity are difficult or impossible to establish through empirical research. 259 references
Main Term(s): Criminology; Foreign criminal justice research
Index Term(s): Computer aided operations; Computer related crime; Criminal justice research
Note: Onderzoek en beleid No. 264, English summary included.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=244378

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.