Modus operandi study of information and communication technology (ICT) facilitated crime

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

73 Downloads (Pure)

Abstract

Background: How can one measure the prevalence of cybercrime? One option is to define cybercrime as a specific form of crime, and then quantify it using, for example, police files. Domenie, Leukfeldt, Toutenhoofd‿Visser, and Stol (2009) used this approach and concluded that between 0.42% and 0.66% of all crime reported to the police constitutes cybercrime. An alternative is to keep traditional definitions of crime and quantify the amount of associated ICT.

Aim: The present research established how ‘digital’ crimes currently classified as ‘traditional crimes’ are.

Methods: We collected information on residential and commercial burglary, threats and fraud. 809 incidents from the Police Department of East Netherlands were studied. The data collected consisted of information on incidents, victims and suspect characteristics. We determined how much ICT was used a) in 3 phases of the ‘crime script’ (i.e. before, during and after), b) during the criminal investigation c) in the apprehension of the suspect(s).

Results: In total, 136 burglaries, 140 commercial burglaries, 259 threats and 274 cases of fraud were studied. The results show that ICT is used in 16% of the threats; and 41% of the fraud cases. Among residential burglaries, 3% of the cases involved IT, mostly after the offense. IT is not used in commercial burglaries. We will discuss the characteristics of offenders and victims of digital crimes.

Conclusion: The main conclusion is that ICT plays a greater role in traditional crime than first expected. The implications of the findings for the measurement of cybercrime will be discussed.
Original languageEnglish
Title of host publicationCongresbundel NVC Congres
Subtitle of host publication13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden
Place of PublicationLeiden, The Netherlands
PublisherNederlandse Vereniging voor Criminologie
Pages93
Number of pages1
Publication statusPublished - 14 Jun 2013
EventNVC Congres 2013 - Leiden, Netherlands
Duration: 13 Jun 201314 Jun 2013

Conference

ConferenceNVC Congres 2013
CountryNetherlands
CityLeiden
Period13/06/1314/06/13

Fingerprint

communication technology
information technology
offense
fraud
police
threat
incident
offender
Netherlands

Keywords

  • SCS-Cybersecurity
  • METIS-299974
  • IR-87355
  • EWI-23463

Cite this

Montoya, L., Junger, M., & Hartel, P. (2013). Modus operandi study of information and communication technology (ICT) facilitated crime. In Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden (pp. 93). Leiden, The Netherlands: Nederlandse Vereniging voor Criminologie.
Montoya, Lorena ; Junger, Marianne ; Hartel, Pieter. / Modus operandi study of information and communication technology (ICT) facilitated crime. Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands : Nederlandse Vereniging voor Criminologie, 2013. pp. 93
@inproceedings{830761e7ef9a41fcb01b2356652977a7,
title = "Modus operandi study of information and communication technology (ICT) facilitated crime",
abstract = "Background: How can one measure the prevalence of cybercrime? One option is to define cybercrime as a specific form of crime, and then quantify it using, for example, police files. Domenie, Leukfeldt, Toutenhoofd‿Visser, and Stol (2009) used this approach and concluded that between 0.42{\%} and 0.66{\%} of all crime reported to the police constitutes cybercrime. An alternative is to keep traditional definitions of crime and quantify the amount of associated ICT.Aim: The present research established how ‘digital’ crimes currently classified as ‘traditional crimes’ are. Methods: We collected information on residential and commercial burglary, threats and fraud. 809 incidents from the Police Department of East Netherlands were studied. The data collected consisted of information on incidents, victims and suspect characteristics. We determined how much ICT was used a) in 3 phases of the ‘crime script’ (i.e. before, during and after), b) during the criminal investigation c) in the apprehension of the suspect(s).Results: In total, 136 burglaries, 140 commercial burglaries, 259 threats and 274 cases of fraud were studied. The results show that ICT is used in 16{\%} of the threats; and 41{\%} of the fraud cases. Among residential burglaries, 3{\%} of the cases involved IT, mostly after the offense. IT is not used in commercial burglaries. We will discuss the characteristics of offenders and victims of digital crimes.Conclusion: The main conclusion is that ICT plays a greater role in traditional crime than first expected. The implications of the findings for the measurement of cybercrime will be discussed.",
keywords = "SCS-Cybersecurity, METIS-299974, IR-87355, EWI-23463",
author = "Lorena Montoya and Marianne Junger and Pieter Hartel",
year = "2013",
month = "6",
day = "14",
language = "English",
pages = "93",
booktitle = "Congresbundel NVC Congres",
publisher = "Nederlandse Vereniging voor Criminologie",

}

Montoya, L, Junger, M & Hartel, P 2013, Modus operandi study of information and communication technology (ICT) facilitated crime. in Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Nederlandse Vereniging voor Criminologie, Leiden, The Netherlands, pp. 93, NVC Congres 2013, Leiden, Netherlands, 13/06/13.

Modus operandi study of information and communication technology (ICT) facilitated crime. / Montoya, Lorena ; Junger, Marianne ; Hartel, Pieter.

Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands : Nederlandse Vereniging voor Criminologie, 2013. p. 93.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

TY - GEN

T1 - Modus operandi study of information and communication technology (ICT) facilitated crime

AU - Montoya, Lorena

AU - Junger, Marianne

AU - Hartel, Pieter

PY - 2013/6/14

Y1 - 2013/6/14

N2 - Background: How can one measure the prevalence of cybercrime? One option is to define cybercrime as a specific form of crime, and then quantify it using, for example, police files. Domenie, Leukfeldt, Toutenhoofd‿Visser, and Stol (2009) used this approach and concluded that between 0.42% and 0.66% of all crime reported to the police constitutes cybercrime. An alternative is to keep traditional definitions of crime and quantify the amount of associated ICT.Aim: The present research established how ‘digital’ crimes currently classified as ‘traditional crimes’ are. Methods: We collected information on residential and commercial burglary, threats and fraud. 809 incidents from the Police Department of East Netherlands were studied. The data collected consisted of information on incidents, victims and suspect characteristics. We determined how much ICT was used a) in 3 phases of the ‘crime script’ (i.e. before, during and after), b) during the criminal investigation c) in the apprehension of the suspect(s).Results: In total, 136 burglaries, 140 commercial burglaries, 259 threats and 274 cases of fraud were studied. The results show that ICT is used in 16% of the threats; and 41% of the fraud cases. Among residential burglaries, 3% of the cases involved IT, mostly after the offense. IT is not used in commercial burglaries. We will discuss the characteristics of offenders and victims of digital crimes.Conclusion: The main conclusion is that ICT plays a greater role in traditional crime than first expected. The implications of the findings for the measurement of cybercrime will be discussed.

AB - Background: How can one measure the prevalence of cybercrime? One option is to define cybercrime as a specific form of crime, and then quantify it using, for example, police files. Domenie, Leukfeldt, Toutenhoofd‿Visser, and Stol (2009) used this approach and concluded that between 0.42% and 0.66% of all crime reported to the police constitutes cybercrime. An alternative is to keep traditional definitions of crime and quantify the amount of associated ICT.Aim: The present research established how ‘digital’ crimes currently classified as ‘traditional crimes’ are. Methods: We collected information on residential and commercial burglary, threats and fraud. 809 incidents from the Police Department of East Netherlands were studied. The data collected consisted of information on incidents, victims and suspect characteristics. We determined how much ICT was used a) in 3 phases of the ‘crime script’ (i.e. before, during and after), b) during the criminal investigation c) in the apprehension of the suspect(s).Results: In total, 136 burglaries, 140 commercial burglaries, 259 threats and 274 cases of fraud were studied. The results show that ICT is used in 16% of the threats; and 41% of the fraud cases. Among residential burglaries, 3% of the cases involved IT, mostly after the offense. IT is not used in commercial burglaries. We will discuss the characteristics of offenders and victims of digital crimes.Conclusion: The main conclusion is that ICT plays a greater role in traditional crime than first expected. The implications of the findings for the measurement of cybercrime will be discussed.

KW - SCS-Cybersecurity

KW - METIS-299974

KW - IR-87355

KW - EWI-23463

M3 - Conference contribution

SP - 93

BT - Congresbundel NVC Congres

PB - Nederlandse Vereniging voor Criminologie

CY - Leiden, The Netherlands

ER -

Montoya L, Junger M, Hartel P. Modus operandi study of information and communication technology (ICT) facilitated crime. In Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands: Nederlandse Vereniging voor Criminologie. 2013. p. 93