When do they offend together? Comparing co-offending between different types of cyber-offenses and traditional offenses

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Research on cyber-co-offending tends to focus on either the organizational structure of organized cybercrime or social learning processes among individuals. This paper provides a new perspective on co-offending by examining the extent to which individuals co-offend for different types of cybercrime compared to traditional crime. Additionally, differences in the type of co-offender (friends, family, or others) and relationships between IT-knowledge and cyber-co-offending are examined. This paper is based on individual self-report survey data from a judicial sample of Dutch adult cyber-dependent offenders and traditional offenders. It includes information on 466 different crimes (51.50% cybercrime) self-reported by 164 individuals. Results indicate that cybercrime and traditional crime show similar patterns of co-offending. The majority of offenders prefer to commit their crimes alone, but some types of crime are more often committed with co-offenders than other types of crime. For cybercrime results suggest that limitations in an offender's IT-knowledge may be a reason to seek co-offenders with strong IT-skills.

Original languageEnglish
Article number107186
Pages (from-to)1-11
Number of pages11
JournalComputers in Human Behavior
Volume130
Early online date12 Jan 2022
DOIs
Publication statusPublished - May 2022

Bibliographical note

Funding Information:
This work was supported by the Netherlands Organisation for Scientific Research (NWO) in the framework of the Cyber Security research program under Grant 12-NROI-058b .

Publisher Copyright:
© 2022 The Author

Keywords

  • Co-offending
  • Comparison traditional crime
  • Criminal collaboration
  • Cyber-dependent crime
  • Cybercrime
  • IT-Knowledge and IT-Skills

Fingerprint

Dive into the research topics of 'When do they offend together? Comparing co-offending between different types of cyber-offenses and traditional offenses'. Together they form a unique fingerprint.

Cite this