- Series Information
- The Oxford Handbook of Organized Crime
- List of Contributors
- Organized Crime: A Contested Concept
- Theoretical Perspectives on Organized Crime
- Searching for Organized Crime in History
- How to Research Organized Crime
- The Italian Mafia
- The Italian-American Mafia
- the Russian Mafia: Rise and Extinction
- Organized Crime in Colombia: The Actors Running the Illegal Drug Industry
- Mexican Drug “Cartels”
- Chinese Organized Crime
- The Japanese Yakuza
- Nigerian Criminal Organizations
- Gangs Another Form of Organized Crime?
- Opportunistic Structures of Organized Crime
- Organizing Crime: The State as Agent
- The Social Embeddedness of Organized Crime
- Protection and Extortion
- Drug Markets and Organized Crime
- Human Smuggling, Human Trafficking, and Exploitation in the Sex Industry
- Illegal Gambling
- Money Laundering
- Arms Trafficking
- Organized Fraud
- The Illegal Exploitation of Natural Resources
- Organized Crime Control in the United States of America
- U.S. Organized Crime Control Policies Exported Abroad
- European Union Organized Crime Control Policies
- The Fight Against the Italian Mafia
- Organized Crime Control in Australia and New Zealand
- Organized Crime “Control” in Asia: Experiences from India, China, and the Golden Triangle
- Finance-Oriented Strategies of Organized Crime Control
Abstract and Keywords
This essay considers how information and communications technologies (ICT) are used by organized crime groups. Three categories of groups are identified: traditional organized criminal groups, which make use of ICT to enhance their terrestrial criminal activities; organized cybercriminal groups, which operate exclusively online; and organized groups of ideologically and politically motivated individuals (including state and state-sponsored actors), who make use of ICT to facilitate their criminal conduct. We feel that it is important to draw a distinction between these types of organized criminal groups, particularly when formulating cybersecurity policy, because cybercriminality is not a monolithic threat. The article will note the transnational nature of much organized criminal activity and will discuss mechanisms for the control of organized crime in the digital age.
Kim-Kwang Raymond Choo is a Senior Lecturer at the University of South Australia, and has (co)authored a number of publications in the areas of cyber and information security, and anti-money laundering including a book published in Springer’s “Advances in Information Security” book series and six AIC refereed monographs. He is the recipient of various awards and scholarships including 2010 Australian Capital Territory (ACT) Pearcey Award for "Taking a risk and making a difference in the development of the Australian ICT industry", 2010 Consensus IT Professional Award, 2009 Fulbright Scholarship, 2008 Australia Day Achievement Medallion in recognition of my dedication and contribution to the AIC, and through it to the public service of the nation, and British Computer Society's Wilkes Award for the best paper published in the 2007 volume of Oxford University Press's Computer Journal.
Peter Grabosky, a Professor in the Regulatory Institutions Network at the Australian National University, and a Fellow of the Academy of the Social Sciences in Australia, holds a PhD in Political Science from Northwestern University. His interests lie in the areas of cybercrime, regulation, policing, and the role of non-state actors in public policy. His recent books include Crime and Terrorism (2010 with M. Stohl); Lengthening the Arm of the Law: Enhancing Police Resources in the 21st Century (2009 with Ayling and Shearing) and Electronic Crime (2007).
Access to the complete content on Oxford Handbooks Online requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.