A New Version of Cybercrime Taxonomy: Empirical Evidence from Finland
Author(s): LUOMALA, Mikko
Author(s) keywords: classification, cybercrime, cybercriminology, Finland, taxonomy
Reference keywords: cybercrime, cybercriminality, taxonomy
Abstract:
Cybercrime is a discussed issue globally. There is a myth that cybercrimes are all technically advanced. This research developed an extended scale to measure a crime technique of cybercrime and how technology is used to perpetrate a crime against technology or software, or technology and software is used to aid crime. This study used Finnish Court cases to show the need for a revised extension of the taxonomy of the previous cybercrime scale. Finnish Court cases between 2015-2019 were examined with the cybercrime classification scale of a technique of cybercrime and with extended scale. The research dataset included N=527 offenders which are coded from the court documents from combination of cybercrime courts cased and economic crime court cases. The extended scale did give a result that cybercrimes which are regular usage of technical devices. Most offenders are male, and they were targeting mostly not technological devices or software rather they used technology to commit crimes with the aid of technology or software. This study shows that uses taxonomy need revision because of the changing nature of the world of cybersecurity issues of cybercriminality, when cybercrime and cybersecurity issues become more sophisticated, then there is need to revise the taxonomies. This study has given empirical support that cybercriminal can do both the computer is a target of a criminal activity (type I) and the computer is a tool to commit a criminal activity (type II), which previous research have only intuitionally and philosophical discussed. The previous taxonomy did not include metrics for skill level of cybercriminals and this study has created cybercrime scale metrics scoring, which gives more detail what skill level cybercriminals do different type cybercrimes on extended taxonomy.
References:
[1]. Alkaabi, A., Mohay, G., Mccullagh, A., & Chantler, N. (2010). Dealing with the Problem of Cybercrime. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 53, 1–18. https://doi.org/10.1007/978-3-642-19513-6_1
[2]. Alter, S. (1977). A taxonomy of decision support systems. Sloan Management Review (Pre-1986), 19(1), 39. https://www.proquest.com/scholarly-journals/taxonomy-decision-support-systems/docview/206763232/se-2
[3]. Aviv, I., & Ferri, U. (2023). Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem. International Journal of Critical Infrastructure Protection, 43. https://doi.org/10.1016/j.ijcip.2023.100637
[4]. Bailey, K. (1994). Typologies and Taxonomies. SAGE Publications, Inc. https://doi.org/10.4135/9781412986397
[5]. Bampaloukas, I. (2022). A Case for Observability. Perspectives on Behavior Science, 45(3), 579–596. https://doi.org/10.1007/s40614-022-00344-z
[6]. Barbagli, M. (2000). PERCHE E DIMINUITA LA CRIMINALITA NEGLI STATI UNITI. In Quaderni di Sociologia. Carlo Cattaneo - instituutin tutkimus ja tutkimukset. http://journals.openedition.org/qds/1370
[7]. Belknap, J., Chu, A., & Deprince, A. (2012). The Roles of Phones and Computers in Threatening and Abusing Women Victims of Male Intimate Partner Abuse. https://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1232&context=djglp
[8]. Blackwell, B. S., Holleran, D., & Finn, M. A. (2008). The Impact of the Pennsylvania Sentencing Guidelines on Sex Differences in Sentencing. Journal of Contemporary Criminal Justice, 24(4), 399–418. https://doi.org/10.1177/1043986208319453
[9]. Blumstein, A., & Wallman, J. (2000). The Crime Drop in America. In Cambridge Studies in Criminology (1st ed.). Cambridge University Press. https://www.finna.fi/Record/helka.9916185663506253?sid=3481359628
[10]. Blumstein, A., & Wallman, J. (2005). The Crime Drop in America. In Cambridge Studies in Criminology (2nd ed.). Cambridge University Press. https://doi.org/DOI: 10.1017/CBO9780511616167
[11]. Bontridder, N., & Poullet, Y. (2021). The role of artificial intelligence in disinformation. Data & Policy, 3, e32. https://doi.org/10.1017/dap.2021.20
[12]. Bossler, A. M., & Berenblum, T. (2019). Introduction: new directions in cybercrime research. Journal of Crime and Justice, 42(5), 495–499. https://doi.org/10.1080/0735648X.2019.1692426
[13]. Brenner, S. W. (2004). U.S. Cybercrime Law: Defining Offenses. Information Systems Frontiers, 6(2), 115–132. https://doi.org/10.1023/B:ISFI.0000025780.94350.79
[14]. Brenner, S. W. (2006). Defining Cybercrime: A review of the state and federal law. In R. D. Clifford (Ed.), Cybercrime: The investigation, prosecution and defence of a computer-related crime (pp. 12–40). Carolina Academic Press.
[15]. Burke, S. C., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27(3), 1162–1167. https://doi.org/10.1016/j.chb.2010.12.010
[16]. Bushway, S. D., & Piehl, A. M. (2007). The Inextricable Link Between Age and Criminal History in Sentencing. Crime & Delinquency, 53(1), 156–183. https://doi.org/10.1177/0011128706294444
[17]. Caldwell, M., Andrews, J. T. A., Tanay, T., & Griffin, L. D. (2020). AI-enabled future crime. Crime Science, 9(1), 14. https://doi.org/10.1186/s40163-020-00123-8
[18]. Caneppele, S., & Aebi, M. F. (2019). Crime Drop or Police Recording Flop? On the Relationship between the Decrease of Offline Crime and the Increase of Online and Hybrid Crimes. Policing: A Journal of Policy and Practice, 13(1), 66–79. https://doi.org/10.1093/police/pax055
[19]. Curtis, J., & Oxburgh, G. (2022). Understanding cybercrime in ‘real world’ policing and law enforcement. The Police Journal: Theory, Practice and Principles, 0032258X2211075. https://doi.org/10.1177/0032258X221107584
[20]. Dashora, K. (2011). Cyber Crime in the Society: Problems and Prevention. Journal of Alternative Perspectives in the Social Sciences, 3(1), 240–259.
[21]. David K., K. (2021). Cybercrime Sentencing. DOJ Journal of Federal Law and Practice. https://www.justice.gov/usao/page/file/1442521/download
[22]. Deering, R., & Mellor, D. D. (2009). Sentencing of Male and Female Child Sex Offenders: Australian Study. Psychiatry, Psychology and Law, 16(3), 394–412. https://doi.org/10.1080/13218710902930291
[23]. Denning, D. E. (2011). Cyber Conflict as an Emergent Social Phenomenon. In Corporate Hacking and Technology-Driven Crime (pp. 170–186). IGI Global. https://doi.org/10.4018/978-1-61692-805-6.ch009
[24]. Doerner, J. K., & Demuth, S. (2010). The Independent and Joint Effects of Race/Ethnicity, Gender, and Age on Sentencing Outcomes in U.S. Federal Courts. Justice Quarterly, 27(1), 1–27. https://doi.org/10.1080/07418820902926197
[25]. Donohue, J. J., & Levitt, S. D. (2001). The Impact of Legalized Abortion on Crime. The Quarterly Journal of Economics, 116(2), 379–420. https://doi.org/10.1162/00335530151144050
[26]. Dupont, B., & Holt, T. (2022). The Human Factor of Cybercrime. Social Science Computer Review, 40(4), 860–864. https://doi.org/10.1177/08944393211011584
[27]. Dupont, B., & Whelan, C. (2021). Enhancing relationships between criminology and cybersecurity. Journal of Criminology, 54(1), 76–92. https://doi.org/10.1177/00048658211003925
[28]. Farrell, G., & Birks, D. (2020). Further rejection of the cybercrime hypothesis. Crime Science, 9(4), 1–4. https://doi.org/10.1186/s40163-020-00113-w
[29]. Freiburger, T. (2009). The Effects of Gender, Family Status, and Race on Sentencing Decisions. Behavioral Sciences & the Law, 28(3), 378–395. https://doi.org/10.1002/bsl.901
[30]. G8 Government Industry and Conference on High-Tech Crime. (2001). Report of Workshop 3: Threat assessment and prevention. G8 Government and Industry Conference on High-Tech Crime. Japanin oikeusministeriö. https://www.mofa.go.jp/policy/i_crime/high_tec/conf0105-6.html
[31]. Graham, A., Kulig, T. C., & Cullen, F. T. (2019). Willingness to report crime to the police: Traditional crime, cybercrime, and procedural justice. Policing: An International Journal, 43(1), 1–16. https://doi.org/10.1108/PIJPSM-07-2019-0115
[32]. Green, B. N., Johnson, C. D., & Adams, A. (2006). Writing narrative literature reviews for peer-reviewed journals: secrets of the trade. Journal of Chiropractic Medicine, 5(3), 101–117. https://doi.org/10.1016/S0899-3467(07)60142-6
[33]. Gregor, S. (2006). The Nature of Theory in Information Systems. MIS Quarterly, 30(3), 611. https://doi.org/10.2307/25148742
[34]. Guembe, B., Azeta, A., Misra, S., Osamor, V. C., Fernandez-Sanz, L., & Pospelova, V. (2022). The Emerging Threat of Ai-driven Cyber Attacks: A Review. Applied Artificial Intelligence, 36(1). https://doi.org/10.1080/08839514.2022.2037254
[35]. Hagan, F. E. (2003). Research Methods in Criminal Justice and Criminology (6th ed.). Pearson education, Inc.
[36]. Helmus, T. (2022). Artificial Intelligence, Deepfakes, and Disinformation: A Primer. RAND Corporation. https://doi.org/10.7249/PEA1043-1
[37]. Higgins, G. (2010). Cybercrime – An Introduction to an Emerging Phenomenon (1st ed.). McGraw-Hill Companies.
[38]. Higgins, G. E., & Marcum, C. D. (2011). Digital piracy: An integrated theoretical approach. Carolina Academic Press.
[39]. Hirvonen, A. (2011). Mitkä methodit? Opas oikeustieteen metodologiaan [Helsingin yliopisto]. http://hdl.handle.net/10138/225264
[40]. Holt, T. J. (2007a). subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28(2), 171–198. https://doi.org/10.1080/01639620601131065
[41]. Holt, T. J. (2007b). subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28(2), 171–198. https://doi.org/10.1080/01639620601131065
[42]. Holt, T. J., & Bossler, A. M. (2016). Technology and Violence. In The Wiley Handbook on the Psychology of Violence (pp. 588–603). John Wiley & Sons, Ltd. https://doi.org/10.1002/9781118303092.ch30
[43]. Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2017). Cybercrime and Digital Forensics. Routledge. https://doi.org/10.4324/9781315296975
[44]. Holt, T. J., Freilich, J. D., & Chermak, S. M. (2017). Exploring the Subculture of Ideologically Motivated Cyber-Attackers. Journal of Contemporary Criminal Justice, 33(3), 212–233. https://doi.org/10.1177/1043986217699100
[45]. Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., & Mahmood, S. (2020). Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arabian Journal for Science and Engineering, 45(4), 3171–3189. https://doi.org/10.1007/s13369-019-04319-2
[46]. Hutchings, A., & Holt, T. J. (2015). A Crime Script Analysis of the Online Stolen Data Market. The British Journal of Criminology, 55(3), 596–614. https://doi.org/https://doi.org/10.1093/bjc/azu106
[47]. Inkeri Anttila, & Patrik Törnudd. (1983). Kriminologia ja kriminaalipolitiikka (1st ed.). WSOY.
[48]. Järvinen, P., & Järvinen, A. (2011). Tutkimustyön metodeista. Opinpajan kirja. https://www.tuni.fi/fi/pertti-jarvinen
[49]. Jonathan, M. (2016). Cybercrime litigation. University of Pennsylvania Law Review, 164, 1453–1507. https://scholarship.law.upenn.edu/penn_law_review/vol164/iss6/3/
[50]. Jordan, T., & Taylor, P. (1998). A Sociology of Hackers. The Sociological Review, 46(4), 757–780. https://doi.org/10.1111/1467-954X.00139
[51]. Kääriäinen, J., & Aaltonen, O.-P. (2021). Miten tutkia suomalaista rangaistuskäytäntöä: esimerkkinä rattijuopumuksesta annetut tuomiot. In K. Nieminen & N. Lähteenmäki (Eds.), Empiirinen oikeustutkimus (1st ed., pp. 285–304). Gaudeamus.
[52]. Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 97, 101804. https://doi.org/10.1016/j.inffus.2023.101804
[53]. Kendig, C., & Witteveen, J. (2020). The history and philosophy of taxonomy as an information science. History and Philosophy of the Life Sciences, 42(3), 40. https://doi.org/10.1007/s40656-020-00337-8
[54]. Keyser, M. (2003). The Council of Europe Convention on Cybercrime. Transnational Law and Policy Journal, 12(2), 287–326. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jtrnlwp12&div=14&id=&page=
[55]. Kipane, A. (2019). Meaning of profiling of cybercriminals in the security context. SHS Web of Conferences, 68(01009), 1–15. https://doi.org/10.1051/shsconf/20196801009
[56]. Koenig, D. (2002, March). Investigation of Cybercrime and Technology-related Crime. http://neiassociates.org/cybercrime-and-technology
[57]. Kreps, S., McCain, R. M., & Brundage, M. (2022). All the News That’s Fit to Fabricate: AI-Generated Text as a Tool of Media Misinformation. Journal of Experimental Political Science, 9(1), 104–117. https://doi.org/10.1017/XPS.2020.37
[58]. Levitt, S. D. (2004). Understanding Why Crime Fell in the 1990s: Four Factors that Explain the Decline and Six that Do Not. Journal of Economic Perspectives, 18(1), 163–190. https://doi.org/10.1257/089533004773563485
[59]. Lewis, T. (2006). Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. John Wiley & Sons, Inc. https://doi.org/10.1002/0471789542
[60]. Li, S., Zhou, Q., Zhou, R., & Lv, Q. (2022). Intelligent malware detection based on graph convolutional network. The Journal of Supercomputing, 78(3), 4182–4198. https://doi.org/10.1007/s11227-021-04020-y
[61]. Maimon, D., & Louderback, E. R. (2019). Cyber-Dependent Crimes: An Interdisciplinary Review. Annual Review of Criminology, 2(1), 191–216. https://doi.org/10.1146/annurev-criminol-032317-092057
[62]. Maimon, D., Wilson, T., Ren, W., & Berenblum, T. (2015). On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents. British Journal of Criminology, 55(3), 615–634. https://doi.org/10.1093/bjc/azu104
[63]. Malaty, G. (2003). Mitä matematiikka on? In E. Högman (Ed.), Johdatus matematiikan rakenteeseen. Finnish National Agency for Education.
[64]. Marcum, C. D., & Higgins, G. E. (2019). Cybercrime. In N. and P. H. G. and L. A. J. Krohn Marvin D. and Hendrix (Ed.), Handbook on Crime and Deviance (pp. 459–475). Springer International Publishing. https://doi.org/10.1007/978-3-030-20779-3_23
[65]. Marcum, C. D., Higgins, G. E., & Tewksbury, R. A. (2011). Doing Time for Cyber crime: An Examination of the Correlates of Sentence Length in the United States. International Journal of Cyber Criminology, 5(2), 825–835. https://www.proquest.com/docview/1032532391
[66]. Martinson, R. (1974). What Works?—Questions and Answers about Prison Reform (Vol. 35, pp. 22–54). https://www.nationalaffairs.com/storage/app/uploads/public/58e/1a4/ba7/58e1a4ba7354b822028275.pdf
[67]. McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence - Chapter 3: Cyber-enabled crimes – sexual offending against children- Home Office Research Report 75. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/246754/horr75-chap3.pdf
[68]. Miller, J. G., & Roth, A. V. (1994). A Taxonomy of Manufacturing Strategies. Management Science, 40(3), 285–304. https://doi.org/10.1287/mnsc.40.3.285
[69]. Miller, S., & Selgelid, M. J. (2007). Ethical and Philosophical Consideration of the Dual-use Dilemma in the Biological Sciences. Science and Engineering Ethics, 13(4), 523–580. https://doi.org/10.1007/s11948-007-9043-4
[70]. Miralaei, N., & Erfani, E. (2014). The Role of International Law and Economics Procedures to Overcome the Specified Crimes and Terrorism in Cyberspace. Research Journal of Applied Sciences, Engineering and Technology, 7(15), 3056–3063. https://doi.org/10.19026/rjaset.7.642
[71]. Mohsin, K. (2020). Regulation of AI and AI Crimes. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3552140
[72]. Montasari, R. (2024). Machine Learning and Deep Learning Techniques in Countering Cyberterrorism. In Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (pp. 135–158). Springer International Publishing. https://doi.org/10.1007/978-3-031-50454-9_8
[73]. Nansel, T. R., Overpeck, M., Pilla, R. S., Ruan, W. J., Simons-Morton, B., & Scheidt, P. (2001). Bullying Behaviors Among US Youth. JAMA, 285(16), 2094. https://doi.org/10.1001/jama.285.16.2094
[74]. Navarro, J. N. (2016). Cyberabuse and cyberstalking. The Intersection between Intimate Partner Abuse, Technology, and Cybercrime: Examining the Virtual Enemy, 125–139.
[75]. Nickerson, R. C., Varshney, U., & Muntermann, J. (2013). A method for taxonomy development and its application in information systems. European Journal of Information Systems, 22(3), 336–359. https://doi.org/10.1057/ejis.2012.26
[76]. Nickerson, R. C., Varshney, U., Muntermann, J., & Isaac, H. (2009). Taxonomy development in information systems: Developing a taxonomy of mobile applications. ECIS 2009 Proceedings, 388.
[77]. O’Malley, R. L., & Holt, K. M. (2020). Cyber Sextortion: An Exploratory Analysis of Different Perpetrators Engaging in a Similar Crime. Journal of Interpersonal Violence, 1–26. https://doi.org/10.1177/0886260520909186
[78]. Paasonen, J., Aaltonen, M., & Luomala, M. (2021). Kyberrikokset tuomioistuimissa – tarkastelussa rikoslain 38 luvun mukaiset tieto- ja viestintärikokset. Defensor Legis, 966–987. https://www.edilex.fi/defensor_legis/250670013
[79]. Peter N., G., Russell G., S., & Gillian, D. (2001). Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities. Cambridge University Press. https://regnet.anu.edu.au/research/publications/4540/electronic-theft-unlawful-acquisition-cyberspace
[80]. Raed Alsaqour, Ahmed Motmi, & Maha Abdelhaq. (2021). A Systematic Study of Network Firewall and Its Implementation. International Journal of Computer Science and Network Security, 21(c), 199–208. http://paper.ijcsns.org/07_book/202104/20210424.pdf
[81]. Rosoff, S., Pontell, H., & Tillman, R. (2002). Profit without honor: White-collar crime and the looting of America. Prentice Hall. https://www.ojp.gov/ncjrs/virtual-library/abstracts/profit-without-honor-white-collar-crime-and-looting-america-second
[82]. Russell G., S., & Peter N., G. (1998). Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities (1st ed.). Routledge. https://doi.org/https://doi.org/10.4324/9780203794401
[83]. Salminen, A. (2011). Mikä kirjallisuuskatsaus?: johdatus kirjallisuuskatsauksen tyyppeihin ja hallintotieteellisiin sovelluksiin (Toinen painos, Vol. 622). Vaasan yliopisto. https://urn.fi/URN:ISBN:978-952-476-349-3
[84]. Schell, B. H., Dodge, J. L., & Moutsatsos, S. S. (2003). The hacking of America: who’s doing it, why, and how. Choice Reviews Online, 41(01), 41-0387-41–0387. https://doi.org/10.5860/CHOICE.41-0387
[85]. Shu, K., Bhattacharjee, A., Alatawi, F., Nazer, T. H., Ding, K., Karami, M., & Liu, H. (2020). Combating disinformation in a social media age. WIREs Data Mining and Knowledge Discovery, 10(6). https://doi.org/10.1002/widm.1385
[86]. Sinha, R., & Vedpuria, N. (2018). Social Impact of Cyber Crime: A Sociological Analysis. https://doi.org/10.13140/RG.2.2.20922.93126
[87]. Smith, C., & Brooks, D. (2013). Security Science: The Theory and Practice of Security. https://www.researchgate.net/publication/235688059_Security_Science_The_Theory_and_Practice_of_Security
[88]. Smith, R., Grabosky, P., & Urbas, G. (2004). Cyber Criminals on Trial, Criminal Justice Matters. Criminal Justice Matters, 58(1), 22–23. https://doi.org/10.1080/09627250408553240
[89]. Steinmetz, B. K. (2016). Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F. Steinmetz. American Journal of Sociology, 123(3), 945–947. https://doi.org/10.1086/693363
[90]. Taylor, P. A. (1999). Hackers: Crime in the Digital Sublime. Routledge. https://dl.acm.org/doi/10.5555/519449
[91]. The United Nations. (1993). International Review of Criminal Policy - United Nations manual on the prevention and control of computer-related crime (pp. 43–44). https://digitallibrary.un.org/record/162804
[92]. Thomas, D. (2002). Hacker Culture. University of Minnesota Press.
[93]. Thomson, S. A., Pyle, R. L., Ahyong, S. T., Alonso-Zarazaga, M., Ammirati, J., Araya, J. F., Ascher, J. S., Audisio, T. L., Azevedo-Santos, V. M., Bailly, N., Baker, W. J., Balke, M., Barclay, M. V. L., Barrett, R. L., Benine, R. C., Bickerstaff, J. R. M., Bouchard, P., Bour, R., Bourgoin, T., Zhou, H.-Z. (2018). Taxonomy based on science is necessary for global conservation. PLOS Biology, 16(3), e2005075. https://doi.org/10.1371/journal.pbio.2005075
[94]. Urbas, G., & Kim-Kwang, R. C. (2008). Resources Materials on Technology-enabled Crime. Australian Institute of Criminology, 28. https://www.politieacademie.nl/kennisenonderzoek/kennis/mediatheek/PDF/67284.pdf
[95]. U.S. Attorneys Northern District of Ohio. (2016). Multiple Victim Case Update - United States V. Nicolescu et al. https://www.justice.gov/usao-ndoh/multiple-victim-case-update-united-states-v-nicolescu-et-al
[96]. U.S Department of Justice. (2016). Three Romanian Nationals Indicted in 4 Million Cyber Fraud Scheme that Infected at Least 60,000 Computers and Sent 11 Million Malicious Emails. https://www.justice.gov/opa/pr/three-romanian-nationals-indicted-4-million-cyber-fraud-scheme-infected-least-60000-computers
[97]. Velasco, C. (2022). Cybercrime and Artificial Intelligence. An overview of the work of international organizations on criminal justice and the international applicable instruments. ERA Forum, 23(1), 109–126. https://doi.org/10.1007/s12027-022-00702-z
[98]. Walsham, G. (2006). Doing interpretive research. European Journal of Information Systems, 15(3), 320–330. https://doi.org/10.1057/palgrave.ejis.3000589
[99]. Wang, S.-Y. K., Hsieh, M.-L., Chang, C. K.-M., Jiang, P.-S., & Dallier, D. J. (2020). Collaboration between Law Enforcement Agencies in Combating Cybercrime: Implications of a Taiwanese Case Study about ATM Hacking. International Journal of Offender Therapy and Comparative Criminology, 65(4), 390–408. https://doi.org/10.1177/0306624X20952391
[100]. Warren, W. E. (2011). Reexamining Mathematics. In THE LANGUAGE OF MATHEMATICS (Nineteenth, pp. 5–6). Professor of mathematics Warren W. Esty.
[101]. Webster, J., & Watson, R. (2002). Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly, 26. https://doi.org/10.2307/4132319
[102]. Welsh, B. C., & Farrington, D. P. (2012). Science, politics, and crime prevention: Toward a new crime policy. Journal of Criminal Justice, 40(2), 128–133. https://doi.org/10.1016/j.jcrimjus.2012.01.008
[103]. Whitty, M. T. (2020). Is There a Scam for Everyone? Psychologically Profiling Cyberscam Victims. European Journal on Criminal Policy and Research, 26(3), 399–409. https://doi.org/10.1007/s10610-020-09458-z
[104]. Wright, D., & Kumar, R. (2023). Assessing the socio-economic impacts of cybercrime. Societal Impacts, 1(1–2), 100013. https://doi.org/10.1016/j.socimp.2023.100013
[105]. Wu, J., & Spohn, C. (2009). Does an Offender’s Age Have an Effect on Sentence Length?A Meta-Analytic Review. Criminal Justice Policy Review, 20(4), 379–413. https://doi.org/10.1177/0887403409333047
[106]. Wu, L., Peng, Q., & Lembke, M. (2023). Research Trends in Cybercrime and Cybersecurity: A Review Based on Web of Science Core Collection Database. International Journal of Cybersecurity Intelligence and Cybercrime. https://doi.org/10.52306/OZMB2721
[107]. Zimring, F. E. (2006). The great American crime decline. Oxford University Press. https://doi.org/https://doi.org/10.1093/acprof:oso/9780195181159.001.0001
Article Title: A New Version of Cybercrime Taxonomy: Empirical Evidence from Finland
Author(s): LUOMALA, Mikko
Date of Publication: 2025-06-30
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2025.01.03
Issue: Volume XIV, Issue 1, Year 2025
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 37-62 (26 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.


---