Causes of Cybercrime Victimization: A Systematic Literature Review
Causes of Cybercrime Victimization: A Systematic Literature Review
ABSTRACT
Keywords: Cybercrime, Cyberbullying,
A systematic literature review on causes of victimization, fraud, deviance, online, victims
cybercrime victimization has been done for this
study to explore the severity of cybercrime. INTRODUCTION
While 111 articles from Scopus and ASSIA Nowadays Internet is becoming part
databases were thematically analyzed to find and parcel of a modern lifestyle of the
trajectories of factors of cybercrime. people throughout the world. Whereas,
Cyberbullying are prevalent among various
online criminality have also been risen with
forms of cybercrime. It is evident that
adolescents are most targeted victims of the developments in Internet activities. At
cybercrime. It observed attitude, low self present, the risk of cybercrime can visualize
control, psychopathic behaviors, bystander in the form of offences analogous to the
behavior, social inequality, more use of cell physical world, such as cyberbullying and
phone and Internet, and school delinquency as online harassment which are termed as
the main causes of cyberbullying. Particularly, cyber-enabled crimes, or through security
older member of the society is responsible for risks that affect the computer itself, such as
online fraud. The causes of online fraud found malware infections, ransomware infections,
vulnerability, greed, trust, naiveté, strong and theft and misuse of personal data which
emotions, access to internet from home, lack of is called cyber-dependent crimes. [1] With
awareness, and chronic underreporting of
the development of information
cybercrime. In addition, software piracy, online
harassment and computer hacking as cyber technologies and the expansion of the in-
deviance caused due to availability of personal ternet cybercrime is becoming an
information in Social Networking Sites (SNS), increasingly technologically advanced,
socioeconomic, psychosocial, and geopolitical aggressive and one of the fastest-growing
aspects, pornography, sexual promiscuity, minor types of crime. [2] Hence, abuse of computer
daily stressors, living without parents and less and Internet put together some people to
active offline social life. Crypto market is a new commit crime and victimize others. [3]
form of cybercrime where criminals maintain a Cyberspace users have excessive
website to keep them anonymous for drugs confidence to use cyberspace which lead
dealing. Breakup of relationship and coercion to them to be exposed to risks in cyberspace.
woman by male counterparts are the causal
However, their perception is that the
factors of cyber stalking and sexting
respectively. However, follow up strategy, likelihood of their victimization is lower
warning, sanction and educational programs than other potential victims from the
were identified as prevention initiatives. Hence, traditional crimes in the real world.
this study is not beyond the limitation of Moreover, ‘knowledge on crime patterns,
empirical observations which will be the future their commission and victims’ responses are
research initiative to construct reporting crucial for developing prevention strategies
mechanism of cybercrime.
and user awareness-raising programmes’. [2] online purchases are more likely to be
As ‘formal social cybercrime control is victimized by internet fraud. Likewise, other
much worse than offline crime control’, kinds of cybercrime victimization such as
which indicated the need for more studies cyber-stalking, cyber-harassment, hacking,
on the causes of cybercrime victimization, or malware infection, empirical studies have
to fight growing threats from cyberspace. [4] also found online exposure to risks
This research explicitly examines causes of cybercrime victimizations.[8] Conversely,
cybercrime victimization through detailed ‘Ngo and Paternoster [9] found no evidence
analysis of existing etiological literature that online exposure had significant effects
with a systematic literature review process on cybercrime victimizations’.
to have insights on routine activity theory. 'Online sexuality' like 'pornography,
sex shops, sex work, sex education, sex
LITERATURE REVIEW contacts, and sexual subcultures' which
Cybercrime and Cyber-Victimization engaged large volume of Western people
Cybercrime is the “destruction, theft, irrespective of age, gender and sex. [10]
or unauthorized or illegal use, modification While Doring [10] argues internet sexuality
or copy of information, programs, services, should not be considered as ‘‘virtual
equipment or communication network”. [5] pseudo-sexuality” in comparison to ‘‘real
According to Council of Europe “any sex” as 'online dating' services' is successful
criminal offence committed against or with mechanism to meet the sexual partner in the
the help of a computer network is identified real world. On the other hand, online
as cyber crime”. Computer or computation sexuality has either positive or negative
related device is an essential for cyber crime consequences in the individual life who
perpetration and victimization. No country engaged in the online sexuality as 'sexual
is immune as cyber crime is a worldwide satisfaction' in some instances, sexually
problem. [3] ‘Computer crime or cyber crime transmitted diseases, sexual disorders and
is a form of crime where the Internet or sexual victimization. Hence, it has impacts
computers are used as a medium to commit on sexual attitude and identities. Whereas
crime’. [6] Specifically, cybercrime is the Cooper et al. [11] argues two motivation
commission of a crime utilizing of works for cybersex-one recreational for
technology, including computers, sexual felicitation or relax and the other,
smartphones, or tablets. To this end, ‘this problematic person to reduce stress,
form of criminality has been extremely emotional regulation or for fantasies.
costly to the economy, with estimates of Recidivism is directly related with
$575 billion lost annually worldwide’. [5] the criminogenic needs of an offender’s life.
However, cybercrime takes place in While low self-control, anti-social
a different context than traditional crimes, personality, anti-social values, criminal
‘which may lead to different risk factors for peers, substance abuse and dysfunctional
both offending and victimization’. While family are directly related to crime. [6] The
traditional offending and victimization effects of victimization in cyberspace
require physical interaction between victims evolved underpinning on the characteristics
and offenders, on the other hand, in of victim’s, incident, and post-victimization
cybercrime ‘there is no physical experience. In absence of knowledge and
convergence in space and time of offenders awareness regarding potential measures
and victims’. [7] In other word, opportunities against cybercrime, the victims fail to come
for cybercrime and victimization are forward for remedy. It is important to know
widespread like Internet in terms of access, cyber behavior and victimization to
time zones and nations, and the integration understand the characteristics of victims,
in daily activities. For instance, people who crime patterns and crime trends. [2]
spend more time online and make more However, few researches have been
any person of age 5 to 75 years, either sex financial cybercrimes targeted to the bank
or any ethnic group could be target of online where money transferred by the hackers
fraud. The cause of this offence identified from the consumers account, [40] and digital
human nature as ‘vulnerability, greed, trust piracy. [41] Subsequently, another online
and naiveté’. Furthermore, victim running fraud is the predatory publishing and
after smarter person and victim provide consumer fraud. [42] While this type of
information, money and love own-self to cybercrime constitute huge loss to the
online fraudster. [35] Ironically, strong victims like identity theft, stealing personal
emotions are used for online ‘Romance information, credit card loss and embezzle
Scam’ to collect money from their partners money from the bank account. In other
by the fraudsters, for instance, scammers of word, causes are identified as access to
this romance fraud are prevalent in Nigeria internet from home, lack of awareness,
and Ghana who used personal love story to chronic underreporting, weak policing and
draw a relation and ultimate target to take international cooperation, jurisdictional
money from their affectionate partners to arbitrage, and employee collusion of
victimize financially and emotionally. [36] financial companies and bank to share
Other forms of online fraud is online information with the perpetrators and
property crime (OPC), which comprises willingness to pay (WTP) impact digital
cyber-vandalism that are computer viruses, piracy. [37-38,40-45] In response to this
service denial and other attacks and cyber- cybercrime, identification of scam warning
theft for profit gain, [37] cyber attack in the to the victims [36] and personnel risk
financial companies where consumer incur assessment are identified as prevention
losses like insurance companies [38, 39] and initiatives. [43]
The persons who are usually spent more Subsequently, lower social status;
time in the internet engaged with three socioeconomic, psychosocial and
‘cyber deviance’ like 'software piracy, geopolitical aspects; smoking, drinking and
online harassment and computer hacking' binge drinking; pornography; sexual
and shown low self control behavior, as promiscuity and hostile masculinity; minor
shown in Figure 2. [46-48] Next factor of daily stressors and immigrant status, urban
cybercrime victimization is the availability residence, unemployment, living without
of personal information in Social parents and less active offline social life are
Networking Sites (SNS), which has an other causes of cyber deviance. [51-57]
impact on privacy and security of the Therefore, cyber deviance and victimization
victims. [49] Then, unauthorized 'access to caused to incur financial loss, anti-women
computer systems' has influenced on sexual aggression, physical damage to
'espionage and data theft', malicious industrial contamination, Internet Gaming
software and malware, and political freedom Disorder (IGD) and psychological distress.
[39, 50, 55, 58, 59]
in a country has impacted in the malware
infections in their routine activities. [50]
where love and money acted as a catalyst. this paper and edited the manuscript. Both the
[35] authors wrote this article and revised it.
Furthermore, the availability of personal
information in SNS; unauthorized access to
computer systems; lower social status; REFERENCES
socioeconomic, psychosocial and 1. Bergmann, M. C., Dreißigacker, A., von
Skarczinski, B., & Wollinger, G. R. (2018).
geopolitical aspects found as causal factor Cyber-Dependent Crime Victimization: The
of computer-based deviance. [51] In crypto Same Risk for Everyone? Cyberpsychology,
market, illicit drugs are traded with the help Behavior, and Social Networking, 21(2),
of a website called 'Silk Road' to make safer 84–90.
communication between drug traders and 2. Meško, G. (2018). On Some Aspects of
consumers. Cyber hate is also a new trend Cybercrime and Cybervictimization.
of cybercrime to spread hateful comments in European Journal of Crime, Criminal Law
the internet. Hence, follow up strategy, and Criminal Justice, 26(3), 189–199.
warning, personnel risk assessment, 3. Kamruzzaman, M., Islam, M. A., Islam,
sanction and educational programs M.S., Hossain, M. S. and Hakim, M.A.
identified as preventive mechanism for (2016). Plight of Youth Perception on Cyber
Crime in South Asia American Journal of
cybercrime. Information Science and Computer
Engineering. Vol. 2, No. 4, pp. 22-28.
CONCLUSION 4. Ilievski, A. (2016). An Explanation Of The
Cybercrime is predominantly a Cybercrime Victimisation: Self-Control
crime based on cyberspace where any And Lifestyle/Routine Activity Theory.
person may be victimized in any parts of the Innovative Issues and Approaches in Social
world. Mostly cyberbullying, online fraud, Sciences, Vol. 9, No. 1,pp.30-47.
cyber deviance, crypto market, cyber 5. Catherine D. Marcum and George E.
stalking, sexting, online child sexual abuse, Higgins Cybercrime in, Krohn, M. D.,
and cyber hate are the major heads of Hendrix, N., Penly Hall, G., & Lizotte, A. J.
cybercrime. While the identified causes of (Eds.). (2019). Handbook on Crime and
Deviance. Handbooks of Sociology and
cybercrime are pro-cyberbullying attitude,
Social Research.
psychopathic behaviours, social inequality, 6. Shabnam, N., Faruk, M. O. and
more use of cell phone and Internet, strong Kamruzzaman, M. (2016). Underlying
emotions, greed, lack of awareness, weak Causes of Cyber-Criminality and
policing and international cooperation, and Victimization: An Empirical Study on
availability of personal information. Students. Social Sciences. Vol. 5, No. 1, pp.
Whereas warning of cyber-victimization, 1-6.
personnel risk assessment, sanction and 7. Kranenbarg, M. W., Holt, T. J. & van
educational programs will be the Gelder J.L. (2019).Offending and
appropriate remedial measures of Victimization in the Digital Age:
cybercrime. These findings of causes, Comparing Correlates of Cybercrime and
TraditionalOffending-Only, Victimization-
classes and remedial measures will Only and the Victimization-Offending
contribute in the cybercrime scholarship. Overlap, Deviant Behavior,40:1, 40-55.
However, the current study is not beyond 8. Song, H., Lynch, M.J. and Cochran, J.K.
the limitation of empirical observations, (2015). A Macro-Social Exploratory
what will be the future endeavour of finding Analysis of the Rateof Interstate Cyber-
reporting mechanism of cybercrime to law Victimization. American Journal of
enforcement agent. Criminal Justice.1-20.
9. Ngo, F. T., & Paternoster, R. (2011).
Authors’ Contributions Cybercrime victimization: An examination
First author, Abu Taher Muhammad Abdullah of individual and situational level factors.
has produced this research work for publication International Journal of Cyber Criminology,
as a part of his dissertation. While second 5,773–793
author, Israt Jahan has conceptually constructed
10. Doring N.M. (2009). 'The Internet’s impact data: Is it as easy as it sounds? Currents in
on sexuality: A critical review of 15 years of Pharmacy Teaching and Learning, pp.1-9.
research'. Computers in Human Behavior. 22. Lawless, B. and Chen, Y.W. (2018)
Vol. 25, Issue 5, pp.1089-1101. Developing a Method of Critical Thematic
11. Cooper, A.L., Delmonico, D.L., Griffin- Analysis for Qualitative Communication
Shelley, E., and Mathy, R.M. (2004). Online Inquiry, Howard Journal of
sexual activity: An examination of Communications, Vol.0,No,0,pp.1-15.
potentially problematic behaviors. Sexual 23. Braun, V., & Clarke, V. (2006). Using
Addiction & Compulsivity, 11, 129–143. thematic analysis in psychology. Qualitative
12. Cohen, L. E. and Felson, M. (1979). Social Research in Psychology, 3, 77–101.
change and crime rate trends: A routine 24. Munnelly, A., Farrell, L., Martin O’Connor,
activity approach. American Sociological & McHugh, L. (2018). Adolescents’
Review, 44, 588-608. implicit and explicit attitudes toward
13. Clough, J. (2015) Principles of Cybercrime. cyberbullying: An exploratory study using
2nd ed. Cambridge: Cambridge University the implicit relational assessment procedure
Press.p.524. (IRAP) and self-report measures. The
14. Liberati, A., Altman, D.G., Tetzlaff, J., Psychological Record, 68(1), 1-10.
Mulrow, C., Gøtzsche, P.C., Ioannidis, 25. Marcum, C. D., Higgins, G. E., Freiburger,
J.P.A., Clarke,M., Devereaux, P. J., T. L., & Ricketts, M. L. (2014). Exploration
Kleijnen,J. and Moher, D. (2009) The of the cyberbullying Victim/Offender
PRISMA Statement for Reporting overlap by sex. American Journal of
Systematic Reviews and Meta-Analyses of Criminal Justice, 39(3), 538-548.
Studies That Evaluate Health Care 26. Beran, T., Mishna, F., McInroy, L. B., &
Interventions: Explanation and Elaboration. Shariff, S. (2015). Children's experiences of
PLoS Med 6(7): e1000100. cyberbullying: A Canadian national study.
15. Ramirez, R., and Choucri, N. (2016). Children & Schools, 37(4), 207.
Improving Interdisciplinary 27. van Geel, M., Toprak, F., Goemans, A.,
Communication With Standardized Cyber Zwaanswijk, W., & Vedder, P. (2017). Are
Security Terminology: A Literature youth psychopathic traits related to
Review. IEEE Access, 4, 2216-2243. bullying? Meta-analyses on callous-
16. Klettke, B., Hallford, D.J. and Mellor, D.J. unemotional traits, narcissism, and
(2014) Sexting prevalence and correlates: A impulsivity. Child Psychiatry and Human
systematic literature review, Clinical Development, 48(5), 768-777.
Psychology Review, 34: 44–53 28. Bastiaensens, S., Vandebosch, H., Poels, K.,
17. Lastdrager, E.E. (2014) Achieving a Van Cleemput, K., Desmet, A., & De
consensual definition of phishing based on a Bourdeaudhuij, I. (2014). Cyberbullying on
systematic review of the literature. Crime social network sites. an experimental study
Science, 3:9. into bystanders' behavioural intentions to
18. Booth, A., Papaioannou, D. and Sutton, A. help the victim or reinforce the bully.
(2012) Systematic Approaches to a Computers in Human Behavior, 31(1), 259-
Successful Literature Review. London: 271.
Sage.p.279. 29. Görzig, A., Milosevic, T., & Staksrud, E.
19. Rousseau, L.D.M., Manning, J., and (2017). Cyberbullying victimization in
Denyer, D. (2008) Evidence in management context: The role of social inequalities in
and organisational science: assembling the countries and regions. Journal of Cross -
field's full weight of scientific knowledge Cultural Psychology, 48(8), 1198-1215.
through syntheses. Academy of Management 30. Beyazit, U., Şimşek, Ş., & Ayhan, A. B.
Annals, 2:475-515. (2017). An Examination Of The Predictive
20. Sidebottom, A., Thornton, A., Tompson, L., Factors Of Cyberbullying In Adolescents.
Belur, J., Tilley, N. and Bowers, K. (2017) Social Behavior and Personality, 45(9),
'A systematic review of tagging as a method 1511-1522.
to reduce theft in retail environments'. 31. Sampasa-Kanyinga, H., & Willmore, J.
Sidebottom et al. Crime Sci. (2017) 6:7. (2015). Relationships between bullying
21. Castleberry, A. and Nolen, A.(2018) victimization psychological distress and
Thematic analysis of qualitative research
breakfast skipping among boys and girls. 42. Umlauf, M. G., & Mochizuki, Y. (2018).
Appetite, 89, 41-46. Predatory publishing and cybercrime
32. Korenis, P., & Billick, S. B. (2014). targeting academics. International Journal
Forensic implications: Adolescent sexting of Nursing Practice, 24.
and cyberbullying. Psychiatric Quarterly, 43. Cunningham, M. R., Jones, J. W., &
85(1), 97-101. Dreschler, B. W. (2018). Personnel risk
33. Holt, T. J., Fitzgerald, S., Bossler, A. M., management assessment for newly
Chee, G., & Ng, E. (2016). Assessing the emerging forms of employee crimes.
risk factors of cyber and mobile phone International Journal of Selection and
bullying victimization in a nationally Assessment, 26(1), 5-16.
representative sample of Singapore youth. 44. Levi, M. (2017). Assessing the trends, scale
International Journal of Offender Therapy and nature of economic cybercrimes:
and Comparative Criminology, 60(5), 598. Overview and issues: In cybercrimes,
34. Barboza, G. E. (2015). The association cybercriminals and their policing, in crime,
between school exclusion, delinquency and law and social change. Crime, Law and
subtypes of cyber- and F2F-victimizations: Social Change, 67(1), 3-20.
Identifying and predicting risk profiles and 45. Song, H., Lynch, M. J., & Cochran, J. K.
subtypes using latent class analysis. Child (2016). A macro-social exploratory analysis
Abuse & Neglect, 39, 109. of the rate of interstate cyber-victimization.
35. Bolimos, I. A. & Choo, K. R. (2017). American Journal of Criminal Justice,
Online fraud offending within an Australian 41(3), 583-601.
jurisdiction. Journal of Financial Crime, 46. Lee, B. H. (2018). Explaining cyber
24(2), 277-308. deviance among school-aged youth. Child
36. Kopp, C., Layton, R., Sillitoe, J., & Gondal, Indicators Research, 11(2), 563-584.
I. (2016). The role of love stories in 47. Li, H., Luo, X. R., Zhang, J., & Sarathy, R.
romance scams: A qualitative analysis of (2018). Self-control, organizational context,
fraudulent profiles. International Journal of and rational choice in internet abuses at
Cyber Criminology, 9(2), 205-216. work. Information and Management, 55(3),
37. Tcherni, M., Davies, A., Lopes, G., & 358-367.
Lizotte, A. (2016). The dark figure of online 48. Donner, C. M. (2016). The gender gap and
property crime: Is cyberspace hiding a crime cybercrime: An examination of college
wave?Justice Quarterly, 33(5), 890-911. students' online offending. Victims &
38. Lagazio, M., Sherif, N., & Cushman, M. Offenders, 11(4), 556.
(2014). A multi-level approach to 49. Martinez, F. R. C., Candelaria, A. D. H.,
understanding the impact of cyber crime on Lozano, M. A. R., Zúñiga, A. R. R., Peláez,
the financial sector. Computers and R. M., & Michel, J. R. P. (2017). After click
Security, 45, 58-74. the submit button, control over personal
39. Lathrop, A. J., & Stanisz, J. M. (2016). information and privacy is lost: A case
Hackers are after more than just data: Will study in Mexico. RISTI - Revista Iberica De
your company’s property policies respond Sistemas e Tecnologias De Informacao,
when cyber attacks cause physical damage (21), 115-128.
and shut down operations? Environmental 50. Holt, T. J., Burruss, G. W., & Bossler, A.
Claims Journal, 28(4), 286-303. M. (2018). Assessing the macro-level
40. Leukfeldt, E. R., Lavorgna, A., & correlates of malware infections using a
Kleemans, E. R. (2017). Organised routine activities framework. International
cybercrime or cybercrime that is organised? Journal of Offender Therapy and
an assessment of the conceptualisation of Comparative Criminology, 62(6), 1720-
financial cybercrime as organised crime. 1741.
European Journal on Criminal Policy and 51. Virtanen, S. M. (2017). Fear of cybercrime
Research, 23(3), 287-300. in Europe: Examining the effects of
41. Jackman, M. & Lorde, T. (2014). Why buy victimization and vulnerabilities.
when we can pirate? The role of intentions Psychiatry, Psychology, and Law: An
and willingness to pay in predicting piracy Interdisciplinary Journal of the Australian
behavior. International Journal of Social and New Zealand Association of Psychiatry,
Economics, 41(9), 801-819. Psychology and Law, 24(3), 323-338.
52. Ibrahim, S. (2016). Social and contextual 61. Greer, B. T., Cotulla, G., & Seddighzadeh,
taxonomy of cybercrime: Socioeconomic H. (2016). Should sex traffickers be subject
theory of Nigerian cybercriminals. to sexually violent predator laws? Journal of
International Journal of Law, Crime and Criminal Psychology, 6(3), 121-133.
Justice, 47, 44. 62. Lee, B. H. & O'Sullivan, L.F. (2014). The
53. Chan, S. F. & La Greca, A.M. (2016). ex-factor: Characteristics of online and
Cyber victimization and aggression: Are offline post-relationship contact and
they linked with adolescent smoking and tracking among canadian emerging adults.
drinking? Child & Youth Care Forum, The Canadian Journal of Human Sexuality,
45(1), 47-63. 23(2), 96-105.
54. Montgomery-Graham, S., Kohut, T., Fisher, 63. Gámez-guadix, M., Almendros, C., Borrajo,
W., & Campbell, L. (2015). How the E., & Calvete, E. (2015). Prevalence and
popular media rushes to judgment about association of sexting and online sexual
pornography and relationships while victimization among spanish adults.
research lags behind. The Canadian Journal Sexuality Research & Social Policy, 12(2),
of Human Sexuality, 24(3), 243-256. 145-154.
55. Baer, J. L., Kohut, T. & Fisher, W. A. 64. Strohmaier, H., Murphy, M., & Dematteo,
(2015). Is pornography use associated with D. (2014). Youth sexting: Prevalence rates,
anti-woman sexual aggression? re- driving motivations, and the deterrent effect
examining the confluence model with third of legal consequences. Sexuality Research
variable considerations. The Canadian & Social Policy, 11(3), 245-255.
Journal of Human Sexuality, 24(2), 160- 65. Thomas, S. E. (2018). “What should I do?”:
173. Young Women’s reported dilemmas with
56. Wright, M. F. (2015). Cyber victimization nude photographs. Sexuality Research &
and perceived stress: Linkages to late Social Policy, 15(2), 192-207.
adolescents' cyber aggression and 66. Açar, K. V. (2016). Sexual extortion of
psychological functioning. Youth and children in cyberspace. International
Society, 47(6):789. Journal of Cyber Criminology, 10(2), 110-
57. Näsi, M., Oksanen, A., Keipi, T., & 126.
Räsänen, P. (2015). Cybercrime 67. Burnap, P. & Williams, M. L. (2016). Us
victimization among young people: A multi- and them: Identifying cyber hate on twitter
nation study. Journal of Scandinavian across multiple protected characteristics.
Studies in Criminology & Crime Prevention, EPJ Data Science, 5(1).
16(2), 203. 68. Holt, T. J., & Bossler, A. M. (2009).
58. Wichstrøm, L., Stenseng, F., Belsky, J., Examining the applicability of lifestyle-
Tilmann, v. S., & Beate, W. H. (2018). routine activities theory for cybercrime
Symptoms of internet gaming disorder in victimization. Deviant Behavior, 30, 1-25.
youth: Predictors and comorbidity. Journal 69. Yar, M. (2006) Cybercrime and Society.
of Abnormal Child Psychology, , 1-13. London: Sage.p.185.
59. Hsieh, Y., Hsi-Sheng, W., Hsiao-Lin, H., 70. Slonje, R. and Smith, P.K. (2008)
Shen, A. C., Jui-Ying, F., & Ching-Yu, H. Cyberbullying: Another main type of
(2018). The effects of peer victimization on bullying? Scandinavian Journal of
Children’s internet addiction and Psychology, 2008, 49:147–154.
psychological distress: The moderating roles
of emotional and social intelligence. Journal How to cite this article: Abdullah ATM, Jahan I.
of Child and Family Studies,1-12. Causes of cybercrime victimization: a
60. Martin, J. (2014). Lost on the silk road: systematic literature review. International
Online drug distribution and the Journal of Research and Review. 2020; 7(5): 89-
'cryptomarket'. Criminology & Criminal 98.
Justice: CCJ, 14(3), 351.
******