Published April 9, 2017 | Version v1
Journal article Open

SPECIAL ARTICLE: Commemorating a Decade in Existence of the International Journal of Cyber Criminology: A Research Agenda to Advance the Scholarship on Cyber Crime

  • 1. University of South Florida Sarasota-Manatee, United States of America
  • 2. Raksha Shakti University, Ahmedabad, India

Contributors

  • 1. Raksha Shakti University, Ahmedabad, Gujarat

Description

The International Journal of Cyber Criminology (IJCC) is an interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy. Ten years back in 2007, IJCC was launched by its founder Publisher and Editor-in-Chief K. Jaishankar with its website www.cybercrimejournal.com and with its launch a new sub-academic discipline of Criminology, Cyber Criminology is born. IJCC is an unique Diamond open access international journal, where the authors or the readers need not pay and open to all and it is freely accessible. IJCC is indexed in prestigious databases such as Scopus & Directory of Open Acces Journals (DOAJ) and IJCC’s Hirsch’s h-index Journal impact is 23. The International Journal of Cyber Criminology (IJCC) is commemorating its decade of existence in 2017 and we felt it would be pertinent to bring out a special article with a Research Agenda. In this article, we outline five areas that need to be addressed for the advancement of Cyber Criminology and scholarship on cyber crime and we hope this will be positively addressed by the contemporary and future cyber criminologists.

Files

FawnjaiSAvol11issue1IJCC2017.pdf

Files (452.3 kB)

Name Size Download all
md5:7acf305ef5eebe0fe6a7c8f76c7f34a7
452.3 kB Preview Download

Additional details

References

  • Akers, R. L. (1998). Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston: Northeastern University Press. Alkaabi, A., Mohay, G., Mucullagh, A., & Chantler, N. (2010). Dealing with the problem of cyber crime. In: Baggili I. (eds.), Digital Forensics and Cyber Crime (1-18). Berlin, Heidelberg: Springer. Bossler, A. M., Holt, T. J., & May, D. (2011). Predicting Online Harassment Victimization Among a Juvenile Population. Youth & Society, 4, 500-523. Brenner, S. W. (2004). Cybercrime metrics: Old wine, new bottles? Virginia Journal of Law and Technology, 9, 1-53. Cohen, L. E., & Felson, M. (1978). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588-608. Choi, K. S. (2015). Cybercriminology and Digital Investigation. El Paso, Texas: LFB Scholarly Publishing LLC. Danquah, P., & Longe, O. (2011). An empirical test of the space transition theory of cyber criminality: Investigating cyber crime causation factors in Ghana. African Journal of Computing & ICT, 2(1), 37-48. Department of Commerce (1998). The emerging digital Economy [On-line]. Retrieved from https://www.esa.doc.gov/sites/default/files/emergingdig_0.pdf. Diamond, A., & Bachmann, M. (2015). Out of the beta phase: Obstacles, challenges, and promising paths in the study of cyber criminology. International Journal of Cyber Criminology, 9, 24-34. França, L. A. (Forthcoming 2018). Cyber-Criminologies. In P. Carlen and L. A. França, (Eds. ), Alternative Criminologies. Abington, Oxford, UK: Routledge. Gordon, S., & Ford, R. (2006). On the definition and classification of cyber crime. Journal of Computer Virology, 2, 13-20. Gottfredson, M. R., & Hirschi, T. (1990). A General Theory of Crime. Stanford, CA: Stanford University Press. Halder, D., & Jaishankar, K. (2015). Irrational Coping Theory and Positive Criminology: A Frame Work to Protect Victims of Cyber Crime. In N. Ronel and D. Segev (eds.), Positive Criminology (pp.276 -291). Abingdon, Oxon: Routledge. ISBN 978-0-415-74856-8. Halder, D., & Jaishankar, K. (2016). Policing Initiatives and Limitations. In: J. Navarro, S. Clevenger, and C. D. Marcum (eds.), The Intersection between Intimate Partner Abuse, Technology, and Cyber crime: Examining the Virtual Enemy (pp. 167-186). Durham, North Carolina: Carolina Academic Press. Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cyber crime scholarship. Deviant Behavior, 35, 20–40. doi:10.1080/01639625.2013.822209 Holt, T., Bossler, A. M., & Spellar, S. K. (2015). Cyber crime and Digital Forensics. Abingdon, Oxon: Routledge. Holt, T., & Bossler, A. M. (2016). Cyber crime in Progress: Theory and Prevention of Technology-enabled Offenses. Abingdon, Oxon: Routledge. Hyman, P. (2013). Cybercrime: It's serious, but exactly how serious? Communications of the ACM, 56, 18–20. Jaishankar, K. (2007). Establishing a theory of cyber crimes. International Journal of Cyber Criminology, 1, 7-9. Jaishankar K., (2008). Space transition theory of cyber crimes. In Schmallager, F., and Pittaro M. (Eds.), Crimes of the Internet (pp.283-301). Upper Saddle River, NJ: Prentice Hall. Jaishankar, K. (2010). The Future of Cyber Criminology: Challenges and Opportunities. International Journal of Cyber Criminology, 4(1&2), 26–31. Jaishankar, K. (2011). Introduction / Conclusion. In K. Jaishankar (Ed.), Cyber criminology: Exploring Internet crimes and criminal behavior (pp. xxvii–xxxv and pp. 411-414). Boca Raton, FL: CRC Press. Jaishankar, K. (2015). "Cyber crime Victimization: New Wine into Old Wineskins?", Keynote Speech at the 15th World Society of Victimology Symposium, July 5-9, 2015, at Perth, Australia, organized by Victim Support, Angelhands Inc. and supported by Australian Institute of Criminology. Jaishankar, K. & Halder, D. (Forthcoming). Cyber Victimology: Decoding Cyber Crime Victimization. Boca Raton, FL, USA: CRC Press, Taylor and Francis Group. ISBN: 978-14-987848-9-4. Jones, B. R. (2007). Virtual neighborhood watch: Open source software and community policing against cyber crime. Journal of Criminal Law and Criminology, 97, 601-630. Kshetri, N. (2013). Cybercrime and cybersecurity in the global south. New York, NY: Palgrave MacMillan Publishers. Moore, R. (2012). Cyber crime: Investigating High-Technology Computer Crime. Abingdon, Oxon: Routledge. Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt and B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and Implications (pp. 1-17). IGI Global: Hershey, PA. Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5, 773-793. Nhan, J., & Bachmann, M. (2010). Developments in cyber criminology. In M. Maguire & D. Okada (Eds.), Critical issues in crime and justice: Thought, policy, and practice (pp. 164–183). Thousand Oaks, CA: Sage. Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47, 267-296. Stalans L. J. & Finn, M. A., (2016). Understanding How the Internet Facilitates Crime and Deviance. Victims & Offenders, 11(4), 501-508. Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664-670. Wada, F., Longe, & O. Danquah (2012). Action Speaks Louder than Words-Understanding Cyber Criminal Behavior Using Criminological Theories. Journal of Internet Banking and Commerce, 17(1), 1. Wall, D. S. (2005, revised in 2010). The internet as a conduit for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 78-94). Thousand Oaks, CA: Sage Publications. Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Malden, MA: Polity Press. Wall, D. S. (2001). Cyber crimes and the internet. In D. Wall (ed.) Crime and the internet (pp. 1-17). London: Routledge. Wall, D. S. (2011). Policing Cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research: An International Journal, 8, 183-205. Windmill, L. B., Metcalf, D. L., & Band, M. E. (2000). Cybercrime: Issues and challenges in the United States. Digital Evidence and Electronic Signature Law Review, 7, 19-34.