Abstract
Purpose
– The purpose of this article is to provide an empirically based description of how the Internet is exploited by different types of organised crime groups (OCGs), ranging from Italian mafia-style groups to looser gangs.
Design/methodology/approach
– The article relies on a dataset collected from mid-2011 to mid-2013 and, specifically, on semi-structured interviews to law enforcement officials and acknowledged experts in Italy, the UK, the USA and The Netherlands; judicial transcripts; police records; and media news.
Findings
– This article provides an account of the main scope for which the Internet has been used for various criminal activities traditionally associated with the organised crime rhetoric, first and foremost, cross-border trafficking activities. This study also discusses some current legal and policy approaches to deal with OCGs operating online.
Originality/value
– This contribution addresses an under-investigated research field and aims to foster a reflection on the opportunity to integrate Internet crime research, and even more Internet crime investigations, into the everyday routines of criminologists, analysts and law enforcement officers.
Subject
Law,General Economics, Econometrics and Finance,Public Administration
Reference55 articles.
1. Brenner, S.W.
(2002), “Organized cybercrime? How cyberspace may affect the structure of criminal relationships”,
North Carolina Journal of Law and Technology
, Vol. 4 No. 1, pp. 1-50.
2. Broadhurst, R.
(2009), “Developments in the global law enforcement of cybercrime”, in
Wall, D.S.
(Ed.),
Crime and Deviance in Cyberspace
, Ashgate, Dartmouth, NH.
3. Broadhurst, R.
,
Grabosky, P.
,
Alazab, M.
and
Chon, S.
(2014), “Organizations and Cybercrime”,
International Journal of Cyber Criminology
, Vol. 8 No. 1.
4. Chambers-Jones, C.
(2012),
Virtual Economies and Financial Crime. Money Laundering in Cyberspace
, Edward Elgar Publishing, Cheltenham.
5. Choo, K.K.R.
and
Smith, R.G.
(2008), “Criminal exploitation of online systems by organised crime groups”,
Asian Journal of Criminology
, Vol. 3 No. 1, pp. 37-59.
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献