How does cyber technology impact interactions between offenders and victims?

Recent research of cyber technology demonstrates a significant rise in rates of crime that use information technology systems over the last two decades, whereas the rate of traditional crimes have been decreasing. Cybercrime is committed in a different context from traditional crimes, which leads to different risk factors for both offenders and victims. In cases of cybercrime, there is no physical convergence in space and time of offenders and victims. Previous research, nevertheless, suggests victims and offenders eventually interact with each other in order for cybercrime to occur, even if asynchronously. That can account for association identified between cyber offenders and the increased risk of victimization. Common risk factors for bot experiences include low self-control, routine actives, and socio-demographic characteristics. Researching associate between cyber offenders and victimization largely focus on forms of cybercrime that have no requirement of technical expertise or are dependent on technology, such as fraud, bullying, and piracy. Although, research on malware victims found individuals with malicious software infections were most likely to have engaged in online deviances, mainly piracy or viewing pornography. When comparing online harassment to hacking victimization, it was found that online offenders were related to harassment but not hacking. So in order to find common risk factors associated with cybercrime victimization and offending, it is imperative to study and understand the theoretical relationships underlying it. One of the primary risk factors identified in many studies in low self-control and is found in more less-technical forms of cybercrime. These forms of simple to complete cyber crimes provide immediate gratification and present multiple opportunities for the offender. Although, these same conditions increase an individual’s risk of victimization as tech savvy offenders may target those who are online frequently and engage in risky activities, such as downloading pirated materials. While targeting is random, those who display low self-control can be influenced to respond to a scam.