Article Reviews

Article Review #2: Exploring the Psychological Profile of Cybercriminals for Improved Cybercrime Prevention

Introduction / BLUF

Cybercrime has been recognized as a major problem in today’s world, but because of the relatively new nature of cybercrime, the majority of current methods of cybercrime prevention are based on technology rather than understanding the motivations behind those who commit cybercrimes. Trinh et al. (2025) indicate that cybercrimes have numerous behavioral origins relative to the individual committing the cybercrime with respect to their degree of technical expertise and the extent of their impulsive and narcissistic behaviors.

Relation / Connection to Social Science Principles

This paper utilizes basic principles of social science including human behavior, institutional structure, and global systems to identify the cybercrime issue. Utilizing Routine Activity Theory and Deterrence Theory, the authors will utilize the social sciences to explain why motivated offenders take advantage of digital opportunities where there are weak guardianships in place. This research has established cybercrime as a social construction that exists as a result of opportunity (digital), regulatory environment, societal norms of the population at risk, and presence/absence of alternative opportunities.

Research Question / Hypothesis / Independent and Dependent Variables

A comprehensive review of the psychological attributes of cybercriminals was conducted to establish the implications of cybercrime prevention based upon the psychological attributes of cybercriminals. Since this was a systemic review, no direct experimental independent or dependent variables were measured. However, there are several psychologically-based traits (narcissism and impulsivity) that could explain why some individuals commit cybercrimes, and thus represent the outcome variable that all of the literature reviewed examined.

Types of Research Methods Used

The systematic literature review described above used PRISMA methodology to select peer-reviewed studies of cybercriminal behavior. Authors evaluated 1200 studies; selected 45 peer-reviewed studies published between 2010 and 2023. Authors identified the data sources for the studies as follows: PubMed, IEEE Xplore, Google Scholar, ACM Digital Library, and Web of Science. Authors used EndNote, Excel, and NVivo to evaluate and organize the results of the literature review.

Types of Data and Analysis Used

Authors evaluated qualitative and quantitative data from previous studies to collect the data for the current study. Authors used thematic synthesis and quality evaluation using PRISMA and CASP guidelines to analyze the findings of the study. As noted in the results section of the article, authors identified common psychological patterns of offending behavior, and authors identified the potential for an increased threat to security from AI-based attacks and IoT vulnerabilities.

Connections to Course Concepts

Findings of this study relate to some of the course materials relating to socio-technical systems, governance, and the human aspects of cybersecurity. Moreover, findings of this study support the view that while cybersecurity can be viewed as a purely technical concept, it is fundamentally a behavioral and institutional concept. Similarities to the course materials relating to the topics of risk, deterrence, and guardianship in the digital environment are found in the application of criminological theory.

Connections to Marginalized Groups

Cybercrime can result in both psychological and financial harm to its victims, resulting in stress, anxiety, and reputational damage to victims. In terms of the two most vulnerable populations to being victimized by cybercrime, those include older adults, as well as users with little or no digital knowledge, recommendations for creating educational programs and policies that will protect vulnerable groups were identified within this research.

Conclusion

In conclusion, this study has greatly contributed to our understanding of cybercrime from a multi-disciplinary and psychological standpoint. This study also provided evidence of how cybercrime prevention methods require a combination of law enforcement practices; technological solutions; and, behavioral science applications. The authors of this study have used their fields of study of criminology; psychology; and, computer security (cybersecurity) to develop a framework for creating policy and providing practical methods for preventing cybercrime.

Reference

Trinh, D. T., Dinh, T. C. H., & Tran, T. N. K. (2025). Exploring the psychological profile of cybercriminals: A comprehensive review for improved cybercrime prevention. International Journal of Cyber Criminology, 19(1), 114–137. https://doi.org/10.5281/zenodo.47661906

https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/452/133