Abstract

Cybercrime and Digital Deviance is a multidisciplinary primer composing insight from the social and computer sciences to broadly introduce cybercrime. Given the intricate nature of cybercrime, the juxtaposition of these two fields is essential in developing an understanding behind the technical and human aspects of cybercrime. Topics explored range from the challenges and impact of cybercrimes, to the different types of cybercrime, and the efficacy of criminological and sociological theories in explaining cybercrime. Although computer jargon is included throughout the primer, the author’s articulation of the material allows it to be more easily understood by nontechnical students. As a result, this text presents cybercrime in a straightforward and easy to absorb manner. The authors also make regular use of visual aids and conclude each chapter with a robust assortment of supplemental learning material. The supplemental learning material consists of vocabulary words, true/false questions, multiple-choice questions, and critical thinking exercises. Both Roderick S. Graham and Shawn K. Smith have experienced backgrounds in studying cybercrime that qualify them to extensively cover this topic. Graham earned his PhD in sociology from the University of New York and currently works in the Department of Sociology and Criminal Justice at Old Dominion University. In addition, he currently serves as program coordinator for Old Dominion University’s bachelors’ program in cybercrime. Smith earned his PhD in sociology and criminal justice from Old Dominion University and currently works in the Department of Criminal Justice at Radford University.
Cybercrime and Digital Deviance spans 11 chapters and is loosely divided between two sections. The first section familiarizes the reader with the challenges and issues in dealing with cybercrime. Moreover, this section also presents and describes the differing types of cybercrime. The introductive chapter acquaints the reader with the legal issues in addressing cybercrime. Anecdotal instances of cybercrime are also provided to help exemplify legal concerns. Chapter 1 describes the different layers of digital environments that cybercrimes can take place. The authors enlist David Wall’s (2001) four-part cybercrime typology (cybertrespass, cyberpornography, cyberviolence, and cyberdeception and theft) to shape their discussion. Chapter 2 addresses the first type of cybercrime—cybertrespass. It reviews the United States (U.S.) Computer Fraud and Abuse Act (CFAA) and familiarizes the reader with hackers. It also covers the different types of hackers, how they obtain unauthorized access, and what they do once access is obtained. Chapter 3 describes the consumption, ramifications, and legal issues surrounding cyberpornography. The remainder of this chapter presents subtypes of cyberpornography: child pornography, internet-facilitated sex trafficking, obscene pornography, sexting, and sex work. Chapter 4 discusses cyberviolence in some detail, comparing and contrasting digital and real-world violent crimes. The chapter concludes by describing different forms of cyberviolence: cyberbullying, trolling and flaming, hate speech, cyberstalking, and online shaming. Chapter 5 covers the fourth and final type of cybercrime—cyberdeception and theft. It discusses the motivations behind deceptive and thievish criminal behavior online. It too concludes with discussion on the different forms of cyberdeception and theft: identity theft, phishing, advance fee frauds, romance scams, selling of counterfeit goods, pump and dump schemes, digital piracy, and cryptocurrency fraud.
In the latter section of the book, the reader is acquainted with different aspects of policing in digital environments, the investigation of cybercrimes, and online victimization. In addition, the role of criminological and sociological theory in explaining deviant behavior over cyberspace is also discussed. Chapter 6 addresses investigative methods, the collection of digital evidence, and challenges for law enforcement. Moreover, this chapter also presents and discusses legal cases to provide a more reinforced understanding associated with crime in cyberspace. Chapter 7 discusses organized criminal groups in the context of digital environments. It covers how these groups are identified and the type of activities they perpetrate. Additionally, different typologies of organized criminal groups are explored. Chapter 8 examines the role of algorithms and big data as it pertains to the investigation and prosecution of cybercrime. Chapter 9 describes the prevalence and ramifications of cybervictimization. This chapter is largely guided by the routine activity theory in explaining cybervictimization. Chapter 10 concludes the book with a discussion of criminological and sociological theory as it relates to cybercrime. The covered theories include the following: Deterrence Theory, Social Learning Theory, Labeling Theory, Social Bonding Theory, Self-Control Theory, Techniques of Neutralization, Strain Theory, and theories of Deindividuation and Disinhibition.
Overall, Cybercrime and Digital Deviance is quite an informative primer that covers a wide array of up-to-date cybercrime topics. I highly recommend this book to not only social science students interested in cybercrime but also cybersecurity students who are interested in the sociological aspects of their academic forte. Moreover, the clear articulation of multidisciplinary information in junction with the supplemental learning material makes this book excellent choice for professors to teach with. In particular, the primer can serve as a great introductory text to an undergraduate cybercrime course. Given the social science orientation of the material however, this text may not be suitable for readers interested in learning more about the technologically sophisticated components of cybercrime. Furthermore, legislative matters are presented in the context of U.S. law and, as a result, may limit the book’s utility to non-U.S. students and scholars.
