International Journal of Cyber Criminology

                             ISSN: 0974 � 2891                                                     

About the Journal
Current Issue
Previous Issue
Submission Guidelines
Peer Review








Virtual Forum Against Cybercrime (VFAC), KIC & UNODC


The Society for the Policing of Cyberspace



Crimes of the Internet

Editors: Frank Schmalleger and Michael Pittaro


Cyber Crime

Author: David S. Wall

Publisher: Polity Press







International Journal of Cyber Criminology


IJCC-July - December 2021


Vol 15 Issue 2




Online Traceability of Halal Food Information to Protect Muslim Consumers in the Cyber Era
Siti Nur Azizah  


Re-spatializing Gangs: An Exponential Random Graph Model of Twitter Data to Analyze the Geospatial Distribution of Gang Member Connections
Ryan J. Roberts  


Criminal Policy on Cyberbullying of Children in Indonesia
Wenggedes Frensh, Madiasa Ablisar, Mahmud Mulyadi  


LGBTQ Cyberbullying on Online Learning Platforms Among University Students
Assoc. Prof. Dr. Pannee Suanpang, Jatupon dongjit, Asst. Prof. Dr. Titiya Netwong  


Corruption in the acquisition of land for the benefit of infrastructure development in Indonesia
Aslan Noor  


Cyber Violence with Biosocial Perspective and The Role of Preventive Legislative Mechanism
Slamet Suhartono  


Gender-Based Cyber Violence: A Challenge to Gender Equality in Indonesia
Hesti Armiwulan  


Examining Religious and Justice System in Indonesia to Prevent Cyberbullying
Rahmida Erliyani  



International Journal of Cyber Criminology

IJCC - Jan - June 2021


Volume: 15 Issue: 1


The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach
Fangzhou Wang, C. Jordan Howell, Scott Jacques 


Cyber Security Issues in Implementing Shipping Traffic Separation Scheme (TSS) In Straits of Malacca and Singapore

New Trends in Online Crime Using Social Networking Sites and Apps against Children and Adolescents: Police-Based Longitudinal Research
Gonzalo Torquemada De La Hoz 


A Rational Choice Analysis of ISIS Mujahid in Becoming Cyber-Jihadists
Petrus Reinhard Golose 


History, Evolution and Challenges of Cyber Criminological Scholarship
Philip N. Ndubueze 

Harmonization of Cyber Crime laws with the Constitutional Law in Indonesia
M. Erham Amin, Mokhamad Khoirul Huda 


Cybercrimes and Violations of Intellectual Property Law on Indigenous Papuans in Indonesia
Roberth Kurniawan Ruslak Hammar*, Henrikus Renjaan 


Legal Problematics in the Execution of Copyrights as Fiduciary Collateral in the Indonesian Law
Imas Rosidawati Wiradirja, Nugraha Pranadita1, Hernawati RAS, Deny Haspada, H.R.1, A.R. Harry Anwar 


Policies and Platforms for Fake News Filtering on Cybercrime in Smart City Using Artificial Intelligence and Blockchain Technology
Assoc.Prof.Dr.Pannee Suanpang*, Pattanapong Pothipasa, Asst.Prof.Dr.Titiya Netwrong 

Examining the Adequacy of constitiutional laws Related to cybercrimes in indonesia
Imam Mahdi, Juhriyansyah Dalle

Cyber-Crime and Fraud Victimization of Online Halal Meat Shops: A Negative Image Propagation
Siti Nur Azizah 

Legal Status of Electronic Land Certificates in the Land Case Proof System in Indonesia
Aslan Noor  


International Journal of Cyber Criminology

IJCC - July - December 2020


Volume: 14 Issue: 2


Fighting Cybercrime: A Review of the Irish Experience
Catherine Friend, Lorraine Bowman Grieve, Jennifer Kavanagh and Marek Palace  


Hate Speech Propaganda from and against Muslims in Facebook Posts
Clara Herlina Karjo and Andreas Ng


Defining Cybercrime in Terms of Routine Activity and Spatial Distribution: Issues and Concerns
Troy Smith
and Nikolaos Stamatakis


Rising Trend of Phishing Attacks on Corporate Organisations in Cross River State, Nigeria

John Thompson Okpa, Benjamin Okorie Ajah, and Joseph Egidi Igbe  


Netflix as a Piracy Disruptor? A Cross-Sectional Test of Accessibility and Affordability on Interest in Piracy
David Makin and Oliver Bowers   


Not Your Typical Social Media Influencer: Exploring the Who, What, and Where of Islamic State Online Propaganda
Megan Stubbs-Richardson, Jessica Hubbert, Sierra Nelson, Audrey Reid, Taylor Johnson, Gracyn Young, and Alicia Hopkins 


Global Surge in Cybercrimes - Indian Response and Empirical Evidence on Need for a Robust Crime Prevention System
Mohammed Shamiulla Arab


Relationship between Religious Identity and Cyberbullying: The Case Study of Ferdowsi University of Mashhad, Iran
Seid Mahdi Seidzadeh Sani and Zahra Farhadi Alashti



IJCC - July - January - June 2020


Volume: 14 Issue: 1


Special Article


Why has it been so difficult to Counteract Cyber Crime in Nigeria? Evidence from an Ethnographic Study
Olayinka Akanle and Babajide Richard Shadare  


Assessing the Impact of Civil Gang Injunctions on the Use of Online Media by Criminal Street Gangs
Jared R. Dmello and Gisela Bichler


From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack
Anna Lepp�nen, Tero Toiviainen and Terhi Kankaanranta


Disciplinary and Interdisciplinary Trends in Cybercrime Research: An Examination

Brian K. Payne and Lora Hadzhidimova     


The Impact of Low Self-control on Past and Future Cyber Offending
Brooke Nodeland and Robert Morris   


Sexual Behaviours in Indecent Images of Children: A Content Analysis
Ricardo Tejeiro, Laurence Alison, Emma Hendricks, Susan Giles, Matthew Long and David Shipley    


Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes
Fernando Mir�-Llinares, Jacqueline Drew and Michael Townsley


Cybercrime in Vietnam: An Analysis based on Routine Activity Theory
Trong Van Nguyen


Factors Associating with Social Media related Crime Victimization: Evidence from the Undergraduates at a Public University in Sri Lanka
Suresh Nalaka and Hemantha Diunugala


Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud
Mohammed A. Abdulai


A Basic Principle of Physical Security and Its Link to Cybersecurity
Seungmug (Zech) Lee


Cyberharassment Awareness Course (Cybac): Influences from Domestic Abuse Perpetrator Programmes for its Design and Functions
Liesl Conradie, Melanie Pitchford, Ellie Myers, James Barnes and Emma Short


Harmful Discourse on Social Media: The Triggering Factors of Persecution Acts in Post-Truth Era
Bagus Sudarmanto and Adrianus Meliala


The Myanmar Conflict: A Role of Cyberspace in Counterinsurgency
Jan Kleiner and Ondrej Supka


Gender, Self-Control, and Opportunity: Applying the General Theory of Crime to Online Harassment
Jaeyong Choi and Nathan E. Kruis


Pattern of Cybercrime Awareness in Imo State, Nigeria: An Empirical Assessment
Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma and Peter-Jazzy Ezeh


African Insurance (Spiritualism) and the Success Rate of Cybercriminals in Nigeria: A Study of the Yahoo Boys in Ilorin, Nigeria
Isiaka Monsurat


Needs Assessment of Cybercrime and Digital Evidence in a UK Police Force
Z. Cliffe Schreuders, Tom Cockcroft, Emlyn Butterfield, John Elliott, Mohammad Shan-A-Khuda and Ahmad Ryad Soobhany


Effective Information Security Strategies for Small Business
Lisa Lee Bryan


What's in a Name? Using Words' Uniqueness to Identify Hackers in Brute Force Attacks
Amit Rechavi and Tamar Berenblum


IJCC - July - December 2019


Volume: 13 Issue: 2



Impact of Cybercrime and Trust on the Use of E-Commerce Technologies: An Application of the Theory of Planned Behavior 
Richard Apau and Felix Nti Koranteng 


Ensuring the Information Security of Information Communication Technology Users in Russia
Anna Zharova


A New Legal Framework for Cross-Border Data Collection in Crime Investigation amongst Selected European Countries 
Borka Jerman-Bla�ič
and Toma� Klobučar


Understanding Cybercrimes in Vietnam: From Leading-Point Provisions to Legislative System and Law Enforcement

Hai Thanh Luong, Huy Duc Phan, Dung Van Chu, Viet Quoc Nguyen, Kien Trung Le and Luc Trong Hoang     


Pathways and Motivations for Cyber Fraud Involvement among Female Undergraduates of Selected Universities in South-West Nigeria
Yetunde O. Ogunleye, Usman A. Ojedokun and Adeyinka A. Aderinto  


Neo-Economy and Militating Effects of Africa�s Profile on Cybercrime
Benjamin Okorie Ajah and Onyejebu Dominic Chukwuemeka   


Yahoo-plus in Ibadan: Meaning, Characterization and Strategies
Olayinka Akanle and Babajide Richard Shadare


Meaning Associated with Experiences of Cyberbullying: Cyber Victimization within the Netflix Series 13 Reasons Why
Molly-Gloria Harper


The War must be Sustained: An Integrated Theoretical Perspective of the Cyberspace-Boko Haram Terrorism Nexus in Nigeria
Macpherson Uchenna Nnam, Benjamin Okorie Ajah, Christopher Chukwu Arua, Groupson-Paul Okechukwu and Cornelius Ofobuisi Okorie


Risks of Online Victimisation Among College Students� on Mobile Social Networks
Juliyanti Jalil and Grant Sinnamon


Revenge Pornography or Non-Consensual Dissemination of Sexually Explicit Material as a Sexual Offence or as a Privacy Violation Offence
Miha �epec


Anonymity, Membership-Length and Postage Frequency as Predictors of Extremist Language and Behaviour among Twitter Users
Hollie Sutch and Pelham Carter 


A Study on Youth Prostitution using Mobile Application: Focusing on Korean Youth
Yoona Lee, Jisun Choi and Bong-Gyu Song


Cybercrime Glamorization in Nigerian songs 
Oludayo Tade


Understanding Cybercrime Victimisation: Modelling the Local Area Variations in Routinely Collected Cybercrime Police Data Using Latent Class Analysis
Mohammad Shan-A-Khuda & Z. Cliffe Schreuders


Anti-language, Slang and Cyber Scam Subculture among Urban Youth in Southwestern Nigeria
Temitope Michael Ajayi


Sexting and Mental Health among a Spanish College Sample: An Exploratory Analysis
Aina M. Gass�, Katrin Mueller-Johnson, Jos� R. Agustina and Irene Montiel


University Students� Awareness of Social Media Use and Hate Speech in Jordan
Faisal al Serhan and Mokhtar Elareshi


Artificial Intelligence and Problems of Ensuring Cyber Security
Zarina I., Khisamova, Ildar R., Begishev and Elina L., Sidorenko


Image-Based Abuse, Non-Consensual Pornography, Revenge Porn: A Study of Criminalization and Crime Prevention in Australia and England & Wales
Majid Yar and Jacqueline Drew

The Facebook Conundrum: Is it Time to Usher in a New Era of Regulation for Big Tech?
Sara M. Smyth


IJCC - January - June 2019


Volume: 13 Issue: 1



�Yahoo Boys� Phenomenon in Lagos Metropolis: A Qualitative Investigation 
Samuel O. Adejoh , Tunde A. Alabi , Waziri B. Adisa , & Nnenna M. Emezie


Emotional Competence and Sexting among University Students
Kristina Sesar, Arta Dodaj and Ana Kordić 


Online Undercover Investigations and the Role of Private Third Parties 
Peter Grabosky and Gregor Urbas 


Understanding the link between Sextortion and Suicide

Mirjana Gavrilović Nilsson, Calli.Tzani-Pepelasis, Maria Ioannou and David Lester     


Stolen Identity Valuation and Market Evolution on the Dark Web
Chad M.S. Steel 



Clustering Cyberspace Population and the tendency to Commit Cyber Crime:  

A Quantitative Application of Space Transition Theory
Nuttapol Assarut, Piyabutr Bunaramrueang and Patanaporn Kowpatanakit



Guarding against Cyber-Trespass and Theft: Routine Precautions from the Hacking Community
Nicholas Chavez and Gisela Bichler 


Book Review

Principles of Cyber Crime - Jonathan Clough
Joydeep Dass



IJCC - July - December 2018


Volume: 12 Issue: 2



The Predictive Ability of Self-Control and Differential Association on Sports Fans� Decision to Engage in Cyber Bullying Perpetration against Rivals
Seyyed Masoomeh (Shamila) Shadmanfaat, C. Jordan Howell, Caitlyn N. Muniz, John K. Cochran, Saeed Kabiri, and Dustin A. Richardson


Sexting in the Population of Children and Its Risks: A Quantitative Study
Kamil Kopeck� and Ren� Szotkowski


Estimating Causes of Cyber Crime: Evidence from Panel Data FGLS Estimator
Noura Al-Suwaidi, Haitham Nobanee, and Fauzia Jabeen


The Secondary Global Market for Hacked Data

Amit Rechavi, Tamar Berenblum and David Maimon    


Perceptions of Revenge Pornography and Victim Blame
Tegan S. Starr and Tiffany Lavis




IJCC - January - June 2018


Volume: 12 Issue: 1



Cyber Criminology as an Academic Discipline: History, Contribution and Impact

K. Jaishankar   



Legislating against Cyber Crime in Southern African Development Community: Balancing International Standards with Country-Specific Specificities

Lewis C. Bande       


Juvenile Delinquency in the Virtual World: Similarities and Differences between Cyber-Enabled, Cyber-Dependent and Offline Delinquents in the Netherlands 
Josja J. Rokven, Gijs Weijters, Marinus G.C.J. Beerthuizen and Andr� M. van der Laan



The Shift to Online Tobacco Trafficking
David D�cary-H�tu, Vincent Mousseau and Ikrame Rguioui


Computer-Specific Parental Management and Online Deviance across Gender in South Korea: A Test of Self-Control Theory
Hyunin Baek


Cyber Bullying Behaviors, Anonymity, and General Strain Theory: A Study of Undergraduate Students at a South Eastern University in the United States
Gang Lee and Matheson Sanchez


419 � It�s just a Game: Pathways to Cyber-Fraud Criminality emanating from West Africa
Monica T Whitty


Young People, the Internet, and Emerging Pathways into Criminality: A Study of Australian Adolescents
Russell Brewer, Jesse Cale, Andrew Goldsmith, and Thomas Holt


Predicting Moral Disengagement from the Harms associated with Digital Music Piracy: An Exploratory, Integrative Test of Digital Drift and the Criminal Interaction Order
James F. Popham and Claudia Volpe


Effects of Gender and Technological Fluency on Learners� Attitude to Cyber Crime Prevention in Urban Learning Ecologies: Lessons for Swedish Gymnasiums
Olugbenga A. Ige


Cyber-Sexual Violence and Negative Emotional States among Women in a Canadian University
Jenna Cripps and Lana Stermac


Hacktivists against Terrorism: A Cultural Criminological Analysis of Anonymous� Anti-IS Campaigns
Imogen Richards and Mark A. Wood


OSINT by Crowdsourcing: A Theoretical Model for Online Child Abuse Investigations
Kemal Veli A�ar


The Rise of Chinese Cyber Warriors: Towards a Theoretical Model of Online Hacktivism
Craig Webber and Michael Yip


Delineating Victims from Perpetrators: Prosecuting Self-Produced Child Pornography in Youth Criminal Justice Systems
Bryce G. Westlake


Employees Attitude towards Cyber Security and Risky Online Behaviours:   An Empirical Assessment in the United Kingdom
Lee Hadlington


Public Perceptions on Organised Crime, Mafia, and Terrorism: A Big Data Analysis based on Twitter and Google Trends
Panos Kostakos


Governing Cyber Security through Networks: An Analysis of Cyber Security Coordination in Belgium
Rafael Rondelez


Cloaked By Cyber Space: A Legal Response to the Risks of Cyber Stalking in Malaysia
Zaiton Hamin and Wan Rosalili Wan Rosli


Routine Activities in a Virtual Space: A Taiwanese Case of an ATM Hacking Spree
Ming-Li Hsieh and Shun-Yung Kevin Wang


Book Review

Cyber Bullying Approaches, Consequences and Interventions - Lucy Betts

Yu-Hsien Sung    



IJCC - July - December 2017


Volume: 11 Issue: 2




Guest Editors:

Fawn Ngo, K. Jaishankar and Jose R. Agustina


IJCC - January - June 2017


Volume: 11 Issue: 1





Commemorating a Decade in Existence of the International Journal of Cyber Criminology: A Research Agenda to Advance the Scholarship on Cyber Crime

Fawn T. Ngo and K. Jaishankar       

Predictive Roles of Depression and Demographic Factors in Internet Addiction: A Cross-Sectional Study of Students in a Nigerian University   
Mfon E. Ineme, Kubiat M. Ineme and Gloria A. Akpabio10.5281/zenodo.56201 align=



Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory
S. Elizabeth Wick, Craig Nagoshi, Randy Basham, Catheleen Jordan, Youn Kyoung Kim, Anh Phuong Nguyen and Peter Lehmanne


Digital Natives and Digital Immigrants: Exploring Online Harassment Victimization by Generational Age
Logan Hans Stickel10.5281/zenodo.56201 align=

System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination
Christian J. Howell, David Maimon, John K. Cochran, Hattie M. Jones and R�chael A. Powers
10.5281/zenodo.56201 align=

Hackers' Motivations: Testing Schwartz's Theory of Motivational Types of Values in a Sample of Hackers
Renushka Madarie
10.5281/zenodo.56201 align=

Webcam Child Prostitution: An Exploration of Current and Futuristic Methods of Detection
Kemal Veli A�ar
10.5281/zenodo.56201 align=

Mobile Phone Technology and Online Sexual Harassment among Juveniles in South Korea: Effects of Self-control and Social Learning
Kyung-Shick Choi, Seong-Sik Lee, and Jin Ree lee

10.5281/zenodo.56201 align=

Revenge Porn Victimization of College Students in the United States:

An Exploratory Analysis
Kathryn Branch, Carly M. Hilinski-Rosick, Emily Johnson and Gabriela Solano
10.5281/zenodo.56201 align=

Dynamics of Cyber Hate in Social Media: A Comparative Analysis of Anti-Muslim Movements in the Czech Republic and Germany
Jan Hanzelka and Ina Schmidt
10.5281/zenodo.56201 align=



IJCC - July - December 2016


Volume: 10 Issue: 2  




IJCC - January - June 2016


Volume: 10 Issue: 1  




IJCC - July - December 2015


Volume: 9 Issue: 2  




IJCC - January - June 2015

 Volume: 9 Issue: 1  




IJCC - June - December 2014

 Volume: 8 Issue: 2  



Sexting Behaviors among Adolescents in Rural North Carolina: A Theoretical Examination of Low Self-Control and Deviant Peer Association

Catherine D. Marcum, George E. Higgins and Melissa L. Ricketts      

Technological Skills of White Supremacists in an Online Forum: A Qualitative Examination
Thomas J. Holt and Micah-Sage Bolden  

Cyber-Aggression among Portuguese Adolescents: A Study on Perpetration, Victim Offender Overlap and Parental Supervision
F�bio Novo, Filipa Pereira and Marlene Matos

The Greening of Canadian Cyber Laws: What Environmental Law can Teach and Cyber Law can learn
Sara M. Smyth   

Australian Internet Users and Guardianship against Cyber Abuse: An Empirical Analysis

Zarina I. Vakhitova and Danielle M. Reynald   

Book Review

Hate Crimes in Cyberspace - Danielle Keats Citron
Debarati Halder


IJCC - January - June 2014

 Volume: 8 Issue: 1  





IJCC - July - December 2013

 Volume: 7 Issue: 2  



Adults� Sexual Interest in Children and Adolescents Online: A Quasi-Experimental Study

Emilia Bergen, Jan Antfolk, Patrick Jern, Katarina Alanko and Pekka Santtila

Frames of Fraud: A Qualitative Analysis of the Structure and Process of Victimization on the Internet

Anna Burgard and Christopher Schlembach 

Crime Specific Neutralizations: An Empirical Examination of Four Types of Digital Piracy
Joshua L. Smallridge and Jennifer R. Roberts

Individual Differences of Internet Child Pornography Users: Peculiar Findings in a Community-Based Study

Kathryn Seigfried-Spellar   

Cyber Stalking and Cyber Harassment Legislation in the United States: A Qualitative Analysis
Steven D. Hazelwood and Sarah Koon-Magnin 

Book Review

Policing Cyber Hate, Cyber Threats and Cyber Terrorism - Imran Awan and Brian Blakemore
Debarati Halder


IJCC - January - June 2013

 Volume: 7 Issue: 1  



High Volume Cyber Crime and the Organization of the Police: The results of two empirical studies in the Netherlands

Rutger Leukfeldt, Sander Veenstra & Wouter Stol 

Cyber Crime in Singapore: An Analysis of Regulation based on Lessig�s four Modalities of Constraint

Hee Jhee Jiow

The effect of de-individuation of the Internet Troller on Criminal Procedure implementation: An interview with a Hater
Jonathan Bishop 

Cyber Attacks and Defense Strategies in India: An Empirical Assessment of Banking Sector

Atul Bamrara, Gajendra Singh & Mamta Bhatt   

Infringing Nations: Predicting Software Piracy Rates, BitTorrent Tracker Hosting, and P2P File Sharing Client Downloads Between Countries
Alex C. Kigerl

Cyber Crimes in Jordan: A Legal Assessment on the Effectiveness of Information System Crimes Law No (30) of 2010

Raed S. A. Faqir  

Book Review

WikiLeaks: News in the Networked Era - Charlie Beckett with James Ball
Johanna C. Granville

IJCC - July - December 2012

 Volume: 6 Issue: 2  




IJCC - January - June 2012

 Volume: 6 Issue: 1  




IJCC - July - December 2011 

 Volume: 5 Issue: 2  




IJCC - January - June 2011 

 Volume: 5 Issue: 1  




IJCC (January - June 2010  July - December 2010)

 Volume: 4 Issue: 1 & 2 (Combined Issue)




The Future of Cyber Criminology: Challenges and Opportunities

K. Jaishankar 


Online child sexual abuse by female offenders: An Exploratory study

 Elena Martellozzo, Daniel Nehring, and Helen Taylor 

Gambling in Penny Stocks: The Case of Stock Spam E-mails  

Bill Hu, Thomas McInish, and Li Zeng

Advance Fee Fraud Letters as Machiavellian/Narcissistic Narratives
Michel Dion

The Risk Propensity and Rationality of Computer Hackers  

Michael Bachmann

Pirating Youth: Examining the Correlates of Digital Music Piracy among Adolescents
Whitney D. Gunter, George E. Higgins, and Roberta E. Gealt

Cyber bullying in Chinese Web Forums: An examination of nature and extent
Chang Su and Thomas J. Holt

Parental Regulation and Online Activities: Examining factors that influence a Youth�s potential to become a Victim of Online Harassment  
Robert Moore, Naga Tarun Guntupalli, and Tina Lee

The Council of Europe�s Cyber Crime Treaty: An exercise in Symbolic Legislation
Nancy E. Marion 

Book Review

Cybercrime: An Introduction to an Emerging Phenomenon - George Higgins

Calli Price

IJCC July - December 2009 

Volume: 3 Issue: 2




International Journal of Cyber Criminology

IJCC January - June 2009 

Volume: 3 Issue: 1 




Sexting: A new form of Victimless Crime?  

K. Jaishankar   



IJCC July - December 2008 

Volume: 2 Issue: 2



Cyber Hate: Antisocial networking in the Internet

K. Jaishankar   



IJCC January - June 2008

 Volume: 2 Issue: 1


Identity related Crime in the Cyberspace: Examining Phishing and its impact 

K. Jaishankar    10.5281/zenodo.18800



Bangkok International Summit (2007) Declaration on Policing Cyberspace  

K. Jaishankar, Bessie Pang, and Stuart Hyde  

Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking


Lynne Roberts

Self-Reported Online Child Pornography Behavior: A Psychological Analysis
Kathryn C. Seigfried, Richard W. Lovely, and Marcus K. Rogers

Understanding Sexually Deviant Online Behavior from an Addiction Perspective   
Kimberly Young

Computer Crime Victimization and Integrated Theory: An Empirical Assessment

Kyung-shick Choi

A Systematic Examination of Terrorist Use of the Internet
Tina Freiburger and Jeffrey S. Crane

Book Reviews

Crime Online -Yvonne Jewkes

Travis Morris

Crimes of the Internet - Frank Schmalleger, & Michael Pittaro

Stephen M. Marson


IJCC July - December 2007 

Volume: 1 Issue: 2  


Establishing a theory of cyber crimes  

K. Jaishankar    10.5281/zenodo.18792



IJCC January - June 2007 

Volume: 1 Number: 1  


Cyber Criminology: Evolving a Novel Discipline with a New Journal  

K. Jaishankar




Computer Crime Investigations in the United States:
Leveraging Knowledge from the Past to Address the Future


Sameer Hinduja



Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value

George E. Higgins



Cyber bullying: Clarifying Legal Boundaries for School Supervision in Cyberspace  
Shaheen Shariff and Dianne L. Hoff


Offshore Internet Gambling and the World Trade Organization: Is it Criminal Behavior or a Commodity? 

Henry N. Pontell, Gilbert Geis and Gregory C. Brown10.5281/zenodo.18279


A Qualitative Analysis of Advance Fee Fraud E-mail Schemes
Thomas J. Holt and Danielle C. Graves



Book Reviews

Sexual Predators: How to Recognize Them on the Internet and on the Street - How to Keep Your Kids Away - Stephen Dean 

Catherine D. Marcum

10.5281/zenodo.18283 align=

Net crimes & misdemeanors: Outmaneuvering webspammers, stalkers and con artists- J..A. Hitchcock
Mari B. Pierce

10.5281/zenodo.18284 align=




Editorial Board

                       Editor- in- Chief

Susan Brenner                        Chief Editorial Advisor

Michael Pittaro                       Associate Editor

Debarati Halder                       Associate Editor (Book Reviews)

Philip N. Ndubueze                       Managing Editor

Leepaxi Gupta                       Editorial Assistant

Editorial Advisory Board


Adam Bossler, USA

Ahmed Patel,  Ireland
Ana I. Cerazo,  Spain
Bernard H. Levin,  USA
Bernard Jouga,  France
Catherine D. Marcum, USA

Chi Sung Laih  Taiwan
Chris Magee, UK
David G. Post, USA
David S. Wall,  UK
Dianne Martin  USA, UAE
Dorothy E. Denning,  USA
George E. Higgins, USA

Georgios A. Antonopoulos, UK Gillian Dempsey,  Australia
Gregor Urbas, Australia
Henry Pontell, USA
Ibrahim Baggili, UAE

Jayne A. Hitchcock, USA
Joseph Migga Kizza,  USA
Jung-Shian Li, Taiwan
Justin W. Patchin,  USA
Kimberly Young, USA

Raymond Choo,  Australia

Kyung-shick Choi, USA

Liz Butterfield, New Zealand
P. Madhava

Soma Sundaram, India
Majid Yar, UK
Marcus Rogers, USA
Marjie T. Britz, USA
Maura Conway, Ireland
Mikhail Atallah,  USA
Mourad Debbabi, Canada
Nimrod Kozlovski, Israel
Orly Turgeman

Goldschmidt, Israel

Peter Grabosky, Australia
Phil Attfield, USA
Roderic Broadhurst, Australia
Robert G. Morris, USA

Russell Smith, Australia
Sameer Hinduja, USA
Sam McQuade, USA
Seymour E. Goodman, USA
Steven M. Abrams, USA
Thomas J. Holt, USA
Vladimir Golubev,  Ukraine
William P. Bloss, USA

Whitney D. Gunter, USA



2015 International Journal of Cyber Criminology. All rights reserved

Web Journal created, published and maintained by  K. Jaishankar

 Last updated 17-08-2015

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

International Journal of Cyber Criminology unless otherwise noted.