Critical Criminology and Cybercrime

  • Reference work entry
  • First Online:
The Palgrave Handbook of International Cybercrime and Cyberdeviance

Abstract

Critical criminology consists of a diverse assortment of theoretical perspectives that share an attunement to the role of power and conflict in crime, criminalization, and crime control yet its applications toward cybercrime issues are lacking. The application to these cybercrime issues can help recognize that online criminal actors should be understood as agents navigating social structure, intergroup conflict, and power in addition to considering other kinds of social harm than those derived from legal definitions.

Adrienne L. McCarthy is a doctoral student of sociology in the Department of Sociology, Anthropology and Social Work at Kansas State University. Kevin F. Steinmetz is an Associate Professor of Sociology in the Department of Sociology, Anthropology and Social Work at Kansas State University.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 481.49
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 641.99
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Adler, P. A. (1993). Wheeling and dealing: An ethnography of an upper-level drug dealing and smuggling community (2nd ed.). New York: Columbia University Press.

    Book  Google Scholar 

  • Adorno, T., & Horkheimer, M. (1944). Dialectic of enlightenment. New York: Verso.

    Google Scholar 

  • Agger, B. (2013). Critical social theories: An introduction. Oxford: Oxford University Press.

    Google Scholar 

  • Alves, A. M. (2015). Between the “battlefield” metaphor and promises of generativity: Contrasting discourses on cyberconflict. Canadian Journal of Communication, 40, 389–405.

    Google Scholar 

  • Arrigo, B. A. (2003). Postmodern justice and critical criminology: Positional, relational, and provisional science. In M. Schwartz & S. E. Hatty (Eds.), Controversies in critical criminology (pp. 43–54). Cincinnatti: Anderson Publishing.

    Google Scholar 

  • Arrigo, B. A., & Sellers, B. G. (2018). Postmodern criminology and technocrime. In K. F. Steinmetz & M. R. Nobels (Eds.), Technocrime and criminological theory (pp. 133–146). New York: Routledge.

    Google Scholar 

  • Banks, J. (2014). Online gambling and crime: Causes, controls and controversies. Farnham: Ashgate Publishing Limited.

    Google Scholar 

  • Banks, J. (2015). The Heartbleed bug: Insecurity repackaged, rebranded and resold. Crime Media Culture, 11(3), 259–279.

    Article  Google Scholar 

  • Banks, J. (2018). Radical criminology and the techno-security-capitalist complex. In K. F. Steinmetz & M. R. Nobles (Eds.), Technocrime and criminological theory (pp. 102–115). New York: Routledge.

    Google Scholar 

  • Bell, D. (1980). Brown v. Board of Education and the interest convergence dilemma. Harvard Law Review, 93(3), 518–533.

    Article  Google Scholar 

  • Bernard, T. J., Snipes, J. B., & Berould, A. L. (2016). Vold’s theoretical criminology. New York: Oxford University Press.

    Google Scholar 

  • Bigo, D. (2008). Globalized (in)security: The field and the ban-opticon. In D. Bigo & A. Tsoukala (Eds.), Terror, insecurity and liberty: Illiberal practices of liberal regimes after 9/11 (pp. 10–49). Abingdon/Oxford: Routledge.

    Chapter  Google Scholar 

  • Bogard, W. (1996). The simulation of surveillance: Hypercontrol in telematic society. Cambridge, UK: Cambridge University Press.

    Google Scholar 

  • Bonger, W. (1916). Criminality and economic conditions. Boston: Little, Brown, and Company.

    Google Scholar 

  • Boyle, J. (2003). The second enclosure movement and the construction of the public domain. Law and Contemporary Problems, 66, 33–74.

    Google Scholar 

  • Brenner, S. W. (2016). Cyberthreats and the decline of the nation-state. New York: Routledge.

    Google Scholar 

  • Brotherton, D. C. (2015). Youth street gangs: A critical appraisal. New York: Routledge.

    Google Scholar 

  • Buist, C. L., & Lenning, E. (2015). Queer criminology. New York: Routledge.

    Book  Google Scholar 

  • Carceral, K. C., & Bernard, T. J. (2015). Prison, Inc. New York: NYU Press.

    Google Scholar 

  • Chambliss, W. J. (1974). Toward a political economy of crime. Theory and Society, 2, 149–170.

    Article  Google Scholar 

  • Chambliss, W. J., & Mankoff, M. (1976). Whose law, what order – A conflict approach to criminology. New York: Wiley.

    Google Scholar 

  • Chambliss, W. J., & Zatz, M. S. (1993). Making law: The state, the law, and structural contradictions. Bloomington: Indiana University Press.

    Google Scholar 

  • Christie, N. (2000). Crime control as industry: Toward gulags, Western style. (3rd ed). New York: Routledge.

    Google Scholar 

  • Clarke, R. A., & Knake, R. K. (2010). Cyber war: The next threat to national security and what to do about it. New York: Ecco.

    Google Scholar 

  • Copes, H., & Topalli, V. (2010). Criminology theory: Readings and retrospectives. New York: McGraw-Hill.

    Google Scholar 

  • Cowling, M. (2008). Marxism and criminological theory: A critique and a toolkit. New York: Palgrave Macmillan.

    Book  Google Scholar 

  • Crawford, M. (2014). The online gambling conflict: Antigua & Barbuda vs. the United States. The Estey Centre Journal of International Law and Trade Policy, 15(2), 133–161.

    Google Scholar 

  • Crenshaw, K. (1988). Race, reform, and retrenchment: Transformation and legitimation in antidiscrimination law. Harvard Law Review, 101(7), 1331–1387.

    Article  Google Scholar 

  • Currie, E. (2008). The roots of danger: Violent crime in global perspective. Upper Saddle River: Prentice Hall.

    Google Scholar 

  • Daly, K., & Chesney-Lind, M. (1988). Feminism and criminology. Justice Quarterly, 5, 497–538.

    Article  Google Scholar 

  • Dame-Boyle, A. (2015, April 16). EFF at 25: Remembering the case that established code as speech. Electronic Frontier Foundation. Retrieved 8 Oct 2018 at https://www.eff.org/deeplinks/2015/04/remembering-case-established-code-speech

  • DeKeseredy, W. S. (2011). Contemporary critical criminology. New York: Routledge.

    Google Scholar 

  • Denning, D. (1999). Information warfare and security. New York: Addison-Wesley.

    Google Scholar 

  • Doctorow, C. (2016, March 1). Federal judge rules US government can’t force Apple to make a security-breaking tool. Boing Boing. Retrieved 8 Oct 2018 at https://boingboing.net/2016/03/01/federal-judge-rules-us-governm.html

  • Dwyer, A., Ball, M., & Crofts, T. (2016). Queering criminology. London: Palgrave Macmillan.

    Book  Google Scholar 

  • Einstadter, W. J., & Henry, S. (2006). Criminological theory: An analysis of its underlying assumptions (2nd ed.). Lanham: Rowman & Littlefield Publishers.

    Google Scholar 

  • Ferrell, J. (1996). Crimes of style: Urban graffiti and the politics of criminality. Boston: Northeastern University Press.

    Google Scholar 

  • Ferrell, J., Hayward, K., & Young, J. (2015). Cultural criminology: An invitation. Thousand Oaks: Sage.

    Google Scholar 

  • Foucault, M. (1975). Discipline and punishment: The birth of the prison. New York: Vintage Books.

    Google Scholar 

  • Friedrichs, D. O. (2007). Trusted criminal: White collar crime in contemporary society (3rd ed.). Belmont: Wadsworth.

    Google Scholar 

  • Gunter, W. D. (2009). Internet scallywags: A comparative analysis of multiple forms and measurements of digital piracy. Western Criminology Review, 10(1), 15–28.

    Google Scholar 

  • Haggarty, K., & Ericson, R. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622.

    Article  Google Scholar 

  • Halbert, D. (2016). Intellectual property theft and national security: Agendas and assumptions. The Information Society, 32(4), 256–268.

    Article  Google Scholar 

  • Hall, S., & Winlow, S. (2005). Anti-nirvana: Crime, culture and instrumentalism in the age of insecurity. Crime Media Culture, 1(1), 31–48.

    Article  Google Scholar 

  • Hamm, M. (2010). Encyclopedia of criminological theory. In W. J. Chambliss (Ed.), Power conflict and crime. Thousand Oaks: Sage Publications.

    Google Scholar 

  • Harring, S. (1983). Policing a class society: The experience of American cities, 1865–1915. New Brunswick: Rutgers University Press.

    Google Scholar 

  • Hayward, K. (2004). City limits: Crime, consumer culture and the urban experience. London: Glasshouse Press.

    Google Scholar 

  • Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29(5), 440–460.

    Article  Google Scholar 

  • Holliday, I. (2000). Is the British state hollowing out? The Political Quarterly, 71(2), 167–176.

    Article  Google Scholar 

  • Irwin, J. (1970). The felon. Berkeley: University of California Press.

    Google Scholar 

  • Jessop, B. (2004). Hollowing out the nation-state and multilevel governance. In P. Kennett (Ed.), A handbook of comparative social policy (pp. 11–26). Cheltenham: Edward Elfar.

    Google Scholar 

  • Kappeler, V. E., & Kraska, P. B. (2013). Normalizing police militarization, living in denial. Policing and Society: An International Journal of Research and Policy, 25(3), 268–275.

    Article  Google Scholar 

  • Kariithi, N. K. (2011). Is the devil in the data? A literature review of piracy around the world. The Journal of World Intellectual Property, 14(2), 133–154.

    Article  Google Scholar 

  • Kraska, P. B., & Kappeler, V. E. (1997). Militarizing American police: The rise and normalization of paramilitary units. Social Problems, 44(1), 1–18.

    Article  Google Scholar 

  • Lakoff, G., & Johnson, M. (1980). Conceptual metaphor in everyday language. The Journal of Philosophy, 77(8), 453–486.

    Article  Google Scholar 

  • Lanier, M. M., Henry, S., and Anastasia, D. (2015). Essential Criminology. (4th ed). New York: Routledge.

    Google Scholar 

  • Lessig, L. (2004). Free culture. New York: Penguin.

    Google Scholar 

  • Lessig, L. (2012). Remix: How creativity is being strangled by the law. In M. Mandiberg (Ed.), The social media reader (pp. 155–169). New York: New York University Press.

    Google Scholar 

  • Levi, M. (2008). Organized fraud and organizing frauds: Unpacking research on networks and organization. Criminology & Criminal Justice, 8(4), 389–419.

    Article  Google Scholar 

  • Levi, M., & Williams, M. L. (2013). Multi-agency partnerships in cybercrime reduction: Map** the UK information assurance network cooperation space. Information Management & Computer Security, 21(5), 420–443.

    Article  Google Scholar 

  • Lewis, L. (2003). The surveillance economy of post-Columbine schools. Review of Education, Pedagogy, and Cultural Studies, 25(4), 335–355.

    Article  Google Scholar 

  • Lilly, J. R., & Knepper, P. (1993). The corrections-commercial complex. Crime & Delinquency, 39(2), 150–166.

    Article  Google Scholar 

  • Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365–404.

    Article  Google Scholar 

  • Loader, I. and Sparks, R. (2007). Contemporary landscapes of crime, order and control: Governance, risk and globalization. In M. Maguire, R. Morgan and R. Reiner (eds), The Oxford Handbook of Criminology (4th Ed) (pp. 78 - 101). Oxford: Oxford University Press.

    Google Scholar 

  • Lynch, M. J. (1990). The greening of criminology: A perspective for the 1990s. The Critical Criminologist, 2(3), 3–4, 11–12.

    Google Scholar 

  • Mathiason, T. (1997). The viewer society: Michel Foucault’s panopticon revisited. Theoretical Criminology, 1(2), 215–234.

    Article  Google Scholar 

  • Matthews, R. (2014). Realist criminology. London: Palgrave Macmillan.

    Book  Google Scholar 

  • McGuire, M. R. (2018). Cons, constructions, and misconceptions of computer related crime: From a digital syntax to a social semantics. Journal of Qualitative Criminal Justice and Criminology, 6(2), 137–156.

    Google Scholar 

  • Merton, R. K. (1938). Social structure and anomie. American Sociological Review, 3(5), 672–682.

    Article  Google Scholar 

  • Messerschmidt, J. W. (1993). Masculinities and crime: A critique and re-conceptualization of theory. Lanham: Rowman and Littlefield.

    Google Scholar 

  • Miller, J. (1998). Up it up: Gender and the accomplishment of street robbery. Criminology, 36(1), 37–66.

    Article  Google Scholar 

  • Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: The case of social learning theory and digital piracy. Journal of Criminal Justice, 38, 470–480.

    Article  Google Scholar 

  • Mueller, G. (2016). Piracy as labour struggle. Communication, Capitalism & Critique, 14, 333–345.

    Google Scholar 

  • Parkes, M. (2012). Making plans for Nigel: The industry trust and film piracy management in the United Kingdom. Convergence: The International Journal of Research into New Media Technologies, 19(1), 25–43.

    Article  Google Scholar 

  • Pepinsky, H. E., & Quinney, R. (1991). Criminology as peacemaking. Bloomington: Indiana University Press.

    Google Scholar 

  • Perelman, M. (1998). Class warfare in the information age. New York: St. Martin’s Press.

    Google Scholar 

  • Perelman, M. (2002). Steal this idea: Intellectual property rights and the corporate confiscation of creativity. New York: Palgrave Macmillan.

    Book  Google Scholar 

  • Perelman, M. (2014). The political economy of intellectual property. Socialism and Democracy, 28(1), 24–33.

    Article  Google Scholar 

  • Presdee, M. (2000). Cultural criminology and the carnival of crime. New York: Routledge.

    Google Scholar 

  • Quinney, R. (1970). The social reality of crime. New York: Little, Brown and Company.

    Google Scholar 

  • Reiman, J., & Leighton, P. (2017). The rich get richer and the poor get prison. New York: Routledge.

    Google Scholar 

  • Rhodes, R. A. W. (1994). The hollowing out of the state: The changing nature of the public service in Britain. The Political Quarterly, 65(2), 138–151.

    Article  Google Scholar 

  • Rid, T. (2013). Cyber war will not take place. Cambridge, MA: Oxford University Press.

    Google Scholar 

  • Rid, T. (2016). Rise of the machines. New York: W. W. Norton & Company.

    Google Scholar 

  • Rothe, D. L., & Steinmetz, K. F. (2013). The case of Bradley Manning: State victimization, realpolitik and WikiLeaks. Contemporary Justice Review, 16(2), 280–292.

    Article  Google Scholar 

  • Rusche, G., & Kirchheimer, O. (1939). Punishment and social structure. New York: Columbia University Press.

    Book  Google Scholar 

  • Sellers, B. G., & Arrigo, B. A. (2018). Postmodern criminology and technocrime. In K. F. Steinmetz & M. R. Nobles (Eds.), Technocrime and criminological theory (pp. 133–146). New York: Routledge.

    Google Scholar 

  • Shaw, C., & McKay, H. (1942). Juvenile delinquency and urban areas. Chicago: University of Chicago Press.

    Google Scholar 

  • Simon, J. (2007). Governing through crime: How the war on crime transformed American democracy and created a culture of fear. New York: Oxford University Press.

    Google Scholar 

  • Spitzer, S. (1975). Toward a Marxian theory of deviance. Social Problems 22(5): 638–651.

    Google Scholar 

  • Smallridge, J. L., & Roberts, J. R. (2013). Crime specific neutralizations: An empirical examination of four types of digital piracy. International Journal of Cyber Criminology, 7(2), 125–140.

    Google Scholar 

  • Stallman, R. (2002). Free software free society: Selected essays of Richard M. Stallman. Boston: Free Software Foundation, Inc.

    Google Scholar 

  • Steinmetz, K. F. (2012). Wikileaks and realpolitik. Journal of Theoretical & Philosophical Criminology, 4(1), 14–52.

    Google Scholar 

  • Steinmetz, K. F. (2016). Hacked: A radical approach to hacker culture and crime. New York: NYU Press.

    Book  Google Scholar 

  • Steinmetz, K. F., & Nobles, M. R. (2018). Technocrime and criminological theory. New York: Routledge.

    Google Scholar 

  • Steinmetz, K. F., & Pimentel, A. (2018). Deliberating the information commons: A critical analysis of intellectual property and piracy. In S. C. Brown & T. J. Holt (Eds.), Digital piracy: A global, multidisciplinary account (pp. 185–207). New York: Routledge.

    Google Scholar 

  • Sykes, G. M. (1974). Criminology: The rise of critical criminology. Journal of Criminal Law & Criminology, 65(2), 206–213.

    Article  Google Scholar 

  • Tade, O., & Akinleye, B. (2012). “We are promoters not pirates”: A qualitative analysis of artists and pirates on music piracy in Nigeria. International Journal of Cyber Criminology, 6(2), 1014–1029.

    Google Scholar 

  • Turk, A. T. (1976). Law as a weapon in social conflict. Social Problems, 23(3), 276–291.

    Article  Google Scholar 

  • Ventura, H. E., Miller, J. M., & Deflem, M. (2005). Governmentality and the war on terror: FBI project carnivore and the diffusion of disciplinary power. Critical Criminology, 13(1), 55–70.

    Article  Google Scholar 

  • Wall, D. S. (2008). Cybercrime and the culture of fear. Information, Communication & Society, 11, 861–884.

    Article  Google Scholar 

  • Wall, D. S. (2012). ‘The devil drives a Lada’: The social construction of hackers as cyber-criminals. In C. Gregorious (Ed.), Constructing crime: Discourse and cultural representations of crime and ‘deviance.’. Basingstoke: Palgrave Macmillan.

    Google Scholar 

  • Walton, P., & Young, J. (Eds.). (1998). The new criminology revisited. New York: Palgrave.

    Google Scholar 

  • Wark, M. (1997). Cyberhype: The packaging of cyberpunk. In A. Crawford & R. Edgar (Eds.), Transit lounge (pp. 154–157). North Ryde: Craftsman House.

    Google Scholar 

  • Weis, V. A. (2017). Marxism and criminology: A history of criminal selectivity. Boston: Brill.

    Book  Google Scholar 

  • Wiener, N. (1948). Cybernetics: Or control and communication in the animal and the machine. New York: Wiley.

    Google Scholar 

  • Williams, C. R., & Arrigo, B. A. (2001). Anarchaos and order: On the emergence of social justice ideology. Theoretical Criminology, 5(2), 223–252.

    Article  Google Scholar 

  • Yar, M. (2005). The global ‘epidemic’ of movie ‘piracy’: Crime-wave or social construction? Media, Culture & Society, 27(5), 677–696.

    Article  Google Scholar 

  • Yar, M. (2008a). Computer crime control as industry: Virtual insecurity and the market for private policing. In K. F. Aas, H. O. Gundhus, & H. M. Lornell (Eds.), Technologies of InSecurity: The surveillance of everyday life. New York: Routledge.

    Google Scholar 

  • Yar, M. (2008b). The rhetorics and myths of anti-piracy campaigns: Criminalization, moral pedagogy and capitalist property relations in the classroom. New Media & Society, 10(4), 605–623.

    Article  Google Scholar 

  • Yar, M. (2011). From the “governance of security” to “governance failure”: Refining the criminological agenda. Internet Journal of Criminology. Retrieved 21 June 2018 at https://docs.wixstatic.com/ugd/b93dd4_bcc9194abe534c75be23f6f295beb4cb.pdf

  • Yar, M. (2014). The cultural imaginary of the internet. New York: Palgrave Macmillan.

    Book  Google Scholar 

  • Yar, M., & Steinmetz, K. F. (2019). Cybercrime & society (3rd ed.). Thousand Oaks: Sage.

    Google Scholar 

  • Young, J. (2007). The Vertigo of late modernity. Thousand Oaks: Sage.

    Google Scholar 

  • Young, J., & Lea, J. (1984). What is to be done about law and order? New York: Penguin Books.

    Google Scholar 

  • Zinn, H. (2003). A people’s history of the United States. New York: Harper Perennial.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adrienne L. McCarthy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

McCarthy, A.L., Steinmetz, K.F. (2020). Critical Criminology and Cybercrime. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_27

Download citation

Publish with us

Policies and ethics

Navigation