- Copyright Page
- List of Contributors
- Volume Introduction
- Cyberpsychology Research Methods
- The Online Self
- Impression Management and Self-Presentation Online
- Personality and Internet Use: The Case of Introversion and Extroversion
- Adolescent and Emerging Adult Perception and Participation in Problematic and Risky Online Behavior
- The Myth of the Digital Native and What It Means for Higher Education
- Technology Interference in Couple and Family Relationships
- Older Adults and Digital Technologies
- Textese: Language in the Online World
- Cultural Considerations on Online Interactions
- Online Romantic Relationships
- The Social Consequences of Online Interaction
- Online Support Communities
- Digital Inclusion for People with an Intellectual Disability
- The Psychology of Online Lurking
- Conceptualizing Online Groups as Multidimensional Networks
- Uses and Gratifications of Social Media: Who Uses It and Why?
- Image Sharing on Social Networking Sites: Who, What, Why, and So What?
- Social Media and Cyberactivism
- Socially Connecting Through Blogs and Vlogs: A Social Connections Approach to Blogging and Vlogging Motivation
- Positive Aspects of Social Media
- Managing Your Health Online: Issues in the Selection, Curation, and Sharing of Digital Health Information
- A Psychological Overview of Gaming Disorder
- Mourning and Memorialization on Social Media
- The Therapeutic and Health Benefits of Playing Video Games
- Video Games and Behavior Change
- Game Transfer Phenomena: Origin, Development, and Contributions to the Video Game Research Field
- Psychosocial Effects of Gaming
- Enacting Immorality Within Gamespace: Where Should We Draw the Line, and Why?
- Gaming Classifications and Player Demographics
- The Rise of Cybercrime
- Policing Cybercrime through Law Enforcement and Industry Mechanisms
- Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit
- The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations
Abstract and Keywords
While cybercrime can often be an individual activity pursued by lone hackers, it has increasingly grown into a group activity, with networks across the world. This chapter critically examines the group element of cybercrime from several perspectives. It identifies the platforms that online groups—cybercriminal and otherwise—use to interact, and considers groups as both perpetrators and victims of cybercrime. A key novelty is the discovery of new types of online groups whose collective actions border on criminality. The chapter also analyzes how online cybercrime groups form, organize, and operate. It explores issues such as trust, motives, and means, and draws on several poignant examples, from Anonymous to LulzSec, to illustrate the arguments.
Jason R. C. Nurse, School of Computing, University of Kent, UK
Maria Bada, Global Cyber Security Capacity Centre, University of Oxford, UK
Access to the complete content on Oxford Handbooks Online requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.