The transition from adolescence to adulthood also has been described as a window of opportunity or vulnerability when developmental and contextual changes converge to support positive turnarounds and redirections (Masten, Long, Kuo, McCormick, & Desjardins, 2009; Masten, Obradović, & Burt, 2006). The transition years also are a criminological crossroads, as major changes in criminal careers often occur at these ages as well. For some who began their criminal careers during adolescence, offending continues and escalates; for others involvement in crime wanes; and yet others only begin serious involvement in crime at these ages. There are distinctive patterns of offending that emerge during the transition from adolescence to adulthood. One shows a rise of offending in adolescence and the persistence of high crime rates into adulthood; a second reflects the overall age-crime curve pattern of increasing offending in adolescence followed by decreases during the transition years; and the third group shows a late onset of offending relative to the age-crime curve. Developmental theories of offending ought to be able to explain these markedly different trajectories
ENGLISH: A vast and growing body of research has shown that crime tends to run in families. However, previous studies focused only on traditional crimes and research on familial risk factors for cyber offending is very scarce. To address this gap in the literature, the present study examines the criminal behavior of the family members of a sample of cyber offenders prosecuted in the Netherlands. The sample consists of 979 cyber offenders prosecuted for computer trespassing between 2001 and 2018, and two matched groups of 979 traditional offenders and 979 non-offenders. Judicial information and kinship data from Dutch Statistics were used to measure criminal behavior among family members. Both traditional offenders and cyber offenders were found to be more likely to have criminal fathers, mothers, and siblings than non-offenders. Additional analyses, however, showed different patterns between cyber offenders who were only prosecuted for cyber offenses and those who also committed traditional crimes. While the former group of cyber offenders were similar to non-offenders in terms of family offending, the latter group of cyber offenders were more similar to traditional offenders. Overall, these results suggest that the traditional mechanisms of intergenerational transmission of crime can only partially explain cybercrime involvement. NEDERLANDS: Uit een groot en groeiend aantal onderzoeken blijkt dat criminaliteit vaak in families voorkomt. Eerdere studies richtten zich echter alleen op traditionele misdrijven en onderzoek naar familiaire risicofactoren voor cybercriminaliteit is zeer schaars. Om deze leemte in de literatuur op te vullen, onderzoekt deze studie het criminele gedrag van familieleden van een steekproef van cyberdelinquenten die in Nederland worden vervolgd. De steekproef bestaat uit 979 cyberdelinquenten die tussen 2001 en 2018 zijn vervolgd voor computervredebreuk, en twee gematchte groepen van 979 traditionele delinquenten en 979 niet-delinquenten. Justitiële informatie en verwantschapsgegevens van het Centraal Bureau voor de Statistiek werden gebruikt om crimineel gedrag onder familieleden te meten. Zowel traditionele daders als cybercriminelen bleken vaker criminele vaders, moeders en broers en zussen te hebben dan niet-daders. Aanvullende analyses lieten echter verschillende patronen zien tussen cyberdelinquenten die alleen werden vervolgd voor cyberdelicten en degenen die ook traditionele delicten pleegden. Terwijl de eerste groep cyberdelinquenten vergelijkbaar was met niet-delinquenten wat betreft gezinsdelinquentie, leek de tweede groep cyberdelinquenten meer op traditionele delinquenten. In het algemeen suggereren deze resultaten dat de traditionele mechanismen van intergenerationele overdracht van criminaliteit de betrokkenheid bij cybercriminaliteit slechts gedeeltelijk kunnen verklaren.
Prior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological perspective to examine these patterns, with a particular focus on data thieves targeting organizational networks. By conducting interviews with cybersecurity experts and applying crime script analysis, we developed a comprehensive script that describes the typical progression of attackers through organizational systems and networks in order to eventually steal data. This script integrates phases identified in previous academic literature and expert-defined phases that resemble phases from industry threat models. However, in contrast to prior cybercrime scripts and industry threat models, we did not only identify sequential phases, but also illustrate the circular nature of network attacks. This finding challenges traditional perceptions of crime as a linear process. In addition, our findings underscore the importance of considering both successful and failed attacks in cybercrime research to develop more effective cybersecurity strategies.
MULTIFILE
Door aanhoudende digitalisering nemen de mogelijkheden voor data-analyse toe. In de private sector wordt hier al veelvuldig gebruik van gemaakt, maar in de publieke sector is men nog voorzichtig. Met name in het veiligheidsdomein wordt nog voorzichtig omgesprongen met technologieën zoals dashboards, big data en kunstmatige intelligentie. De reden hiervoor is de balans die bewaard moet worden tussen de soms vergaande bevoegdheden van overheden en de bescherming van burgers, die zich soms in een kwetsbare positie bevinden.