Fig. 1From: Responding to victimisation in a digital world: a case study of fraud and computer misuse reported in WalesCybercrime typology, based on Home Office (2018a, b), Levi et al. (2017), Levi and Burrows (2008), McGuire and Dowling (2013) and Yar (2006)Back to article page