How to Become a Cybercriminal?: An Explanation of Cybercrime Diffusion

How to Become a Cybercriminal?: An Explanation of Cybercrime Diffusion

Copyright: © 2018 |Pages: 13
ISBN13: 9781522531630|ISBN10: 1522531637|EISBN13: 9781522531647
DOI: 10.4018/978-1-5225-3163-0.ch004
Cite Chapter Cite Chapter

MLA

Richet, Jean-Loup. "How to Become a Cybercriminal?: An Explanation of Cybercrime Diffusion." The Dark Web: Breakthroughs in Research and Practice, edited by Information Resources Management Association, IGI Global, 2018, pp. 51-63. https://doi.org/10.4018/978-1-5225-3163-0.ch004

APA

Richet, J. (2018). How to Become a Cybercriminal?: An Explanation of Cybercrime Diffusion. In I. Management Association (Ed.), The Dark Web: Breakthroughs in Research and Practice (pp. 51-63). IGI Global. https://doi.org/10.4018/978-1-5225-3163-0.ch004

Chicago

Richet, Jean-Loup. "How to Become a Cybercriminal?: An Explanation of Cybercrime Diffusion." In The Dark Web: Breakthroughs in Research and Practice, edited by Information Resources Management Association, 51-63. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-3163-0.ch004

Export Reference

Mendeley
Favorite

Abstract

The main purpose of this chapter is to illustrate a landscape of current literature in cybercrime taking into consideration diffusion of innovation theories and economic theory of competition. In this chapter, a narrative review of the literature was carried out, facilitators leading to cybercrime were explored and explained the diffusion of Cybercriminals' best practices. Cybercrime is compatible with young adults lifestyle (familiarity) and requires little knowledge. Moreover, barriers to entry related to costs (psychological, financial), risks and investments are low. This review provides a snapshot and reference base for academics and practitioners with an interest in cybercrime while contributing to a cumulative culture which is desired in the field. This chapter provides insights into barriers to entry into cybercrime and the facilitators of cybercrime.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.