In the interdisciplinary study of cybercrime, there is also the study of criminal justice in general as a baseline. It was noted that with in-person crimes between offenders and victims, that they would interact in a very specific way. The technological advancements in internet systems has impacted how offenders and victims interact. One of the ways is the physical distance between the 2 groups. Connected internet has given an avenue for a criminal to initiate a crime from a long distance, sometime all the way from other countries speaking another language with different laws. This is complicated even further when a cybercrime happens in a local US state, as some states have varying laws for some of the crimes like cyberstalking and harassment.
Another impact is the usage of possible identity theft to carry out the crimes on the internet. It is one thing to commit these criminal interactions online as the actual person to a victim, the next level is when a criminal has successfully stolen the identity of another person and contacting a victim and abusing their trust. An offender may use this identity to convince a victim to give them confidential information, and also steal their identity as well. This stolen information can be rolled into each other to gain access to a victims banking information, personal information such as a social security number, and possible access to their employment.
These technical advancements also allow some offenders to commit these attempts on a wider scale. More sophisticated attacks can use scripted programs to attack an organization from multiple methods, making it seem like many people are attacking when it is actually just one person or a small group. The victim in this case could be an energy grid system or a hospital network. Cyber technology is obviously used to help protect from such an attack, but sometimes there are technology savvy offenders that know how to use the technology to carry out the crime. They would have intimate knowledge of the systems, find weaknesses, and exploit those weaknesses to their advantage.