Cybercrime and subculture of cybercriminals


  • Yevgen V. Kotukh Sumy State University, Sumy, Ukraine
  • Denis V. Kislov Open International University of Human Development “Ukraine”, Kyiv, Ukraine
  • Tykhon S. Yarovoi Interregional Academy of Personnel Management, Kyiv, Ukraine
  • Ruslana O. Kotsiuba Legislation Institute of the Verkhovna Rada of Ukraine, Kyiv, Ukraine
  • Oleksandr H. Bondarenko National Academy of the National Guard of Ukraine, Kharkiv, Ukraine


computer, cybercrime, cyber-security, government agencies, hackers


Unlike traditional types of crime, such as murder or theft, that have a long history, cybercrime is a relatively young phenomenon and a new one that emerged with the advent of the Internet. It should be noted that the very nature of the Internet is quite favourable for committing crimes. Its properties such as globality, cross-border nature, the anonymity of users, wide audience coverage, distribution of main network nodes, and their interchangeability create advantages for cybercriminals who use the Internet at all stages of crime and also allow them to effectively hide from law enforcement agencies. An important aspect of cybercrime that contributes to its spread and hinders the fight against it is the subculture of cybercriminals. This subculture needs to be given special attention, so this issue is discussed in detail in the article. Therefore, the purpose of the article was to analyse cybercrime as one of the youngest types of crime in the modern world. The history of the emergence of cybercrime and cyber-security was considered, the types of cybercrime were characterized, and the functions of cybercrime were analysed. 


Download data is not yet available.


Andreev, A., Davidovich, S. (2002). On information confrontation during the armed conflict in Kosovo.

Aryani, I. G. A. I., & Rahayuni, N. K. S. (2016). Innovation of teaching and learning english applied to animal sciences’ student with the combination of computer media and audio visual. International Journal of Linguistics, Literature and Culture, 2(1), 1-7. Retrieved from

Barber, R. (2001). Hackers profiled—who are they and what are their motivations?. Computer Fraud & Security, 2001(2), 14-17.

Beigl, M., Gellersen, H. W., & Schmidt, A. (2001). Mediacups: experience with design and use of computer-augmented everyday artefacts. Computer Networks, 35(4), 401-409.

Danilyan, O.G. (2006). Philosophy of law. Moscow: Publishing House “Eksmo”.

De Joode, A. (2011). Effective corporate security and cybercrime. Network Security, 2011(9), 16-18.

Denisov, N. L. (2002). Influence of criminal subculture on the formation of the personality of a minor criminal: Dis.... cand. jurid. sciences.

Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. Networks and netwars: The future of terror, crime, and militancy, 239, 288.

Diorditsa, I. V., Telestakova, A. A., Koval, O. M., Nazarenko, O. A., & Nastiuk, A. A. (2021). Information interventions as a new dimension of Ukraine’s cyber-vulnerability. Linguistics and Culture Review, 5(S2), 152-166.

Dolgova, A. I. (2003). Crime, its organization and criminal society. Russian Criminology Associations, Moscow, 191-194.

Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-497.

Golubev, V.A. (2002). “Cyber terrorism” – myth or reality?

Halchin, L. E. (2004). Electronic government: Government capability and terrorist resource. Government Information Quarterly, 21(4), 406-419.

Hamner, M. (2009). Expanding the technology acceptance model to examine personal computing technology utilization in government agencies in developing countries. Government information quarterly, 26(1), 128-136.

Kaspersky, K. (2004). Technique and philosophy of hacker attacks. Moscow: SOLON-Press.

Kaspersky, K. (2005). Shellcoder's Programming Uncovered (Uncovered series). ???-?????????.

Kesareyeva, T. P. (2002). Criminological characteristics and crime prevention in the Russian segment of the Internet: abstract of dissertation for the degree of candidate of Law. Moscow: University of the Prosecutor's Office of the Russian Federation.

Kurakov, L. P., & Smirnov, S. N. (1998). Information as an object of legal protection. Helios, 18.

Lemos, R. (2011). Cyberterrorism: The real risk.

Lindbom, L., Pihlgren, P., & Jonsson, N. (2005). PsN-Toolkit—a collection of computer intensive statistical methods for non-linear mixed effect modeling using NONMEM. Computer methods and programs in biomedicine, 79(3), 241-257.

Lukatsky, A. (2010). Hackers control reactor.

Mahyudi, J., Saryono, D., Siswanto, W., & Pratiwi, Y. (2017). Construction of visual features of Indonesian digital poetry. International Journal of Linguistics, Literature and Culture, 3(5), 1-13. Retrieved from

Manky, D. (2013). Cybercrime as a service: a very modern business. Computer Fraud & Security, 2013(6), 9-13.

Mentor. (1986). The hacker manifesto.

Nersesyants, V. S. (2004). Problems of the general theory of law.

Oli, M. C. (2021). Proficiency amidst COVID-19 challenges in developing computer programs: An outcomes-based approach in discrete structures. Linguistics and Culture Review, 5(S3), 770-783.

Pavlova, A. A. (2004). Subculture of shadow economic activity: Essence and factors of reproduction in Russia: abstract of dissertation for the degree of candidate of Sociology. ?oscow: Russian Academy of Public Administration.

Qiang, X. (2003). China's Virtual Revolution. Project Syndicate.

Rassolov, I. M. (2003). Law and the Internet. Theoretical problems. Moscow: Publishing House “NORMA”.

Schultz, E. E. (2002). Taking a stand on hackers. Computers & Security, 21(5), 382-384.

Schweitzer, D. (2003). Incident response: computer forensics toolkit. Wiley.

Smirnova, I.A. (2000). The virtual space of culture. In Materials of the scientific conference on April 11-13, 2000, (pp. 148-149). St. Petersburg: St. Petersburg Philosophical Society.

Tulegenov, V. V. (2003). Criminal Subculture and Its Criminological Meaning/Tulegenov Vadim V.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.

Widana, I.K., Dewi, G.A.O.C., Suryasa, W. (2020). Ergonomics approach to improve student concentration on learning process of professional ethics. Journal of Advanced Research in Dynamical and Control Systems, 12(7), 429-445.

Zong, F., & Zhen, S. X. (2021). The link between language and thought. Macrolinguistics and Microlinguistics, 2(1), 12–27. Retrieved from



How to Cite

Kotukh, Y. V., Kislov, D. V., Yarovoi, T. S., Kotsiuba, R. O., & Bondarenko, O. H. (2021). Cybercrime and subculture of cybercriminals. Linguistics and Culture Review, 5(S4), 858-869.



Research Articles