The Internet, Technology, and Organized Crime

@article{Grabosky2007TheIT,
  title={The Internet, Technology, and Organized Crime},
  author={Peter Nils Grabosky},
  journal={Asian Journal of Criminology},
  year={2007},
  volume={2},
  pages={145-161}
}
  • P. Grabosky
  • Published 30 October 2007
  • Computer Science
  • Asian Journal of Criminology
Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to enhance the efficiency and effectiveness of their own operations. This paper will discuss the organized criminal exploitation of digital… 
Criminal networks in a digitised world: on the nexus of borderless opportunities and local embeddedness
TLDR
How the use of IT affects the processes of origin and growth of criminal networks is explored, including traditionalorganized crime, traditional organized crime in which IT is an innovative element, low tech cybercrimes and high tech cyberCrimes.
Developments in the global law enforcement of cyber‐crime
TLDR
In response to the threat of cyber-crime there is an urgent need to reform methods of mutual legal assistance and to develop trans-national policing capability, and the potential for potent global enforcement mechanisms are discussed.
Transit crimes in the Internet age: How new online criminal opportunities affect the organization of offline transit crimes
There is a general consensus that the Internet has expanded possibilities for so-called transit crimes—i.e., traditional trafficking activities. However, the extent to which the Internet is exploited
The Social Organization of Pet Trafficking in Cyberspace
Recent research has highlighted how deeply pet trafficking has been affected by the use of the Internet, to the point that it can be conceived as a hybrid market that combines both traditional and
Cyber-organised crime. A case of moral panic?
A growing number of studies show that the advent of the Internet has transformed the organisational life of crime, with many academic and non-academic articles and reports describing various types of
Organized Cyber-Crimes, An Approach on Islamic and Iranian Legal Systems
TLDR
This research will try to determine the cyber-crime and its boundaries to reach an opportunity of systematic prevention of such crimes and accept cyber-crimes and cyber-terrorism.
Organized Financial Cybercrime: Criminal Cooperation, Logistic Bottlenecks, and Money Flows
This chapter provides an overview of what we know about organized forms of cybercrime executed with a financial goal. First, criminal cooperation is covered. We discuss recent insights into the
Organized Financial Cybercrime: Criminal Cooperation, Logistic Bottlenecks, and Money Flows
This chapter provides an overview of what we know about organized forms of cybercrime executed with a financial goal. First, criminal cooperation is covered. We discuss recent insights into the
Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime
TLDR
Whether and to what extent these criminal networks meet the definitions of organised crime are met and the theoretical and policing implications of the findings are discussed.
Cybercrime and Online Safety in Cyberspace
TLDR
This paper outlines some of the issues and problems in respect to the role of OC in cybercrime.
...
1
2
3
4
...

References

SHOWING 1-10 OF 33 REFERENCES
Developments in the global law enforcement of cyber‐crime
TLDR
In response to the threat of cyber-crime there is an urgent need to reform methods of mutual legal assistance and to develop trans-national policing capability, and the potential for potent global enforcement mechanisms are discussed.
Future directions in technology-enabled crime: 2007-09
The aim of this report was to identify the crime risks which will arise between 2007-09 out of the environment in which Australians use information and communications technologies. The aim of this
The Internet and Asia-Pacific security: Old conflicts and new behaviour
The positive uses of the Internet by civil society groups, research institutes, governments and other entities interested in promoting Asia-Pacific community building and cooperative security regimes
Transnational activities of Chinese crime organizations
This study investigates the major pockets of activity of Chinese criminal groups from 2000–2003, throughout the world except for Mainland China, Hong Kong, Macau, and Taiwan. The main geographical
The Crime-Terror Continuum: Tracing the Interplay between Transnational Organised Crime and Terrorism
Increasingly since the end of the Cold War and the subsequent decline of state sponsorship for terrorism, organised criminal activities have become a major revenue source for terrorist groups
What NSA is Doing . . . and Why it's Illegal
On December 16, 2005, The New York Times disclosed the existence of a secret electronic surveillance program being carried out by the National Security Agency (NSA) that involves government
The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium
There is a revolution going on in criminal activity. It creates major problems for law enforcement in almost every part of the world—problems that have rarely been as systemic and pervasive. The
Cyber-Crime: The Challenge in Asia
Lists of Tables and Figures Foreword Justice K Bokhary, Hong Kong Court of Final Appeal Acknowledgements Contributors Abbreviations 1. Computer-Related Crime in Asia: Emergent Issues Roderic
Networks and Netwars: The Future of Terror, Crime and Militancy
From the Publisher: Book Introduction: The fight for the future makes daily headlines. Its battles are not between the armies of leading states, nor are its weapons the large, expensive tanks,
International Dimensions of Crimes in Cyberspace
Part I describes a few experiences with international computer hackers in order to provide a context for the rest of the Essay. Part II extracts from that experience the central issues that have
...
1
2
3
4
...