Table of Contents

Research Handbook on Digital Transformations

Research Handbook on Digital Transformations

Research Handbooks in Business and Management series

Edited by F. Xavier Olleros and Majlinda Zhegu

The digital transition of our economies is now entering a phase of broad and deep societal impact. While there is one overall transition, there are many different sectoral transformations, from health and legal services to tax reports and taxi rides, as well as a rising number of transversal trends and policy issues, from widespread precarious employment and privacy concerns to market monopoly and cybercrime. They all are fertile ground for researchers, as established laws and regulations, organizational structures, business models, value networks and workflow routines are contested and displaced by newer alternatives. This Research Handbook offers a rich and interdisciplinary synthesis of some of the current thinking on the digital transformations underway.

Chapter 20: A continuum of Internet-based crime: how the effectiveness of cybersecurity policies varies across cybercrime types

Eric Jardine

Subjects: business and management, knowledge management, innovation and technology, innovation policy, knowledge management, technology and ict


Internet-based crime is a pressing problem. Some crimes, such as the sale of drugs and guns and the distribution of child abuse imagery, have shifted into the applications, forums and chatrooms of the Internet. Other crimes, such as data breaches and identity theft, ransomware and distributed denial of service attacks, are launched via the infrastructure of the network. Cybersecurity policies designed to counter these activities have predictably different effects across the various types of Internet-based crime. Dark Web indexing and Internet service provider botnet mitigation strategies, as two examples, affect some forms of cybercrime more than others. In particular, this chapter outlines how Internet-based crime varies along a continuum from crime in the applications of the Internet to crime via the infrastructure of the system. It then shows how cybersecurity strategies have differential effects across the various cybercrime types.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information