How does Routine Activity Theory explain the interactions of individuals involved in Illegal Gambling on the DarkNet?

This topic relates to the field of social sciences as it very much relates to criminology and sociology. Human behavior is studied through why these individuals commit the cybercrimes there motivations which also relates to criminology. I hypothesize that Routine activity Theory explains how and the reasoning behind individuals’ gambling is for profit or to launder money. The research was conducted through 2 organizations ICANN which manages the WHOIS database where they can track illegal gambling through the registration data. In this article, they took a sample of 69 Bitcoin gambling sites from m GamblingBitcoin.com. I feel as though this concept relates to our class in many regards such as this topic goes into Individual motivations of cybercrime and goes to the psychology of these individuals who partake in illegal gambling on the DarkNet. Throughout the article, it refers to how some of the motivations to participate in this gambling is to do is the bitcoin was formerly gained through illegal methods and criminal activity. Or for instance the psychological profile of these criminals of what languages were more likely to participate in this gambling and who these providers have marketed towards. I might note that language-wise Chinese leads the languages behind English (supporting all of these platforms) with 47.2 percent. Some of the contributions of this study to society as that this backdoor money laundering can fund more illegal activities and has funded acts of terror in the past as well as distorting financial institutions overall affecting a country’s economy.

ICANN: the Internet Corporation for Assignments Names and Numbers manages DNS allocation.
WHOIS: a system that asks who is responsible for an IP or domain address.
Citation: Choi, S., Choi, K. Sungu-Eryilmaz, Y., & Park H. (2020). Illegal gambling and its operation via the Darknet and Bitcoin: An application of routine activity theory. International Journal of Cybersecurity Intelligence and Cybercrime, 3(1), 3-23. https://www.doi.org/10.52306/03010220HTLI7653

Leave a Reply

Your email address will not be published. Required fields are marked *