메뉴 건너뛰기




Volumn 23, Issue 1, 2010, Pages 33-50

Exploring stolen data markets online: Products and market forces

Author keywords

Black markets; Cybercrime; Data theft; Electronic fraud; Hacking

Indexed keywords


EID: 77949555353     PISSN: 1478601X     EISSN: 14786028     Source Type: Journal    
DOI: 10.1080/14786011003634415     Document Type: Article
Times cited : (185)

References (43)
  • 1
    • 11344287619 scopus 로고    scopus 로고
    • Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics
    • Allison, S.F.H., Schuck, A.M., & Learsch, K.M. (2005). Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, 33, 19-29.
    • (2005) Journal of Criminal Justice , vol.33 , pp. 19-29
    • Allison, S.F.H.1    Schuck, A.M.2    Learsch, K.M.3
  • 2
    • 84982607483 scopus 로고
    • Receiving stolen property: The need for systematic inquiry into the fencing process
    • Chappell, D., & Walsh, M. (1974). Receiving stolen property: The need for systematic inquiry into the fencing process. Criminology, 11, 484-497.
    • (1974) Criminology , vol.11 , pp. 484-497
    • Chappell, D.1    Walsh, M.2
  • 3
    • 33748435812 scopus 로고    scopus 로고
    • Computer Security Institute., Retrieved April 19, 2007, from
    • Computer Security Institute. (2007). Computer crime and security survey. Retrieved April 19, 2007, from http://www.cybercrime.gov/FBI2006.pdf
    • (2007) Computer Crime and Security Survey
  • 4
    • 34247732721 scopus 로고
    • Grounded theory research: Procedures, canons, and evaluative criteria
    • Corbin, J., & Strauss, A. (1990). Grounded theory research: Procedures, canons, and evaluative criteria. Qualitative Sociology, 13, 3-21.
    • (1990) Qualitative Sociology , vol.13 , pp. 3-21
    • Corbin, J.1    Strauss, A.2
  • 7
    • 84992974149 scopus 로고    scopus 로고
    • Passing the buck: Risk avoidance and risk management in the illegal/ informal drug trade
    • Cross, J.C. (2000). Passing the buck: Risk avoidance and risk management in the illegal/ informal drug trade. International Journal of Sociology and Social Policy, 20, 68-94.
    • (2000) International Journal of Sociology and Social Policy , vol.20 , pp. 68-94
    • Cross, J.C.1
  • 11
    • 77949545382 scopus 로고    scopus 로고
    • TJX breach was twice as big as admitted, banks say
    • Retrieved October 20, 2008, from
    • Goodin, D. (2007). TJX breach was twice as big as admitted, banks say. The Register. Retrieved October 20, 2008, from http://www.theregister.co.uk/2007/10/24/tjx_breach_estimate_grows/
    • (2007) The Register
    • Goodin, D.1
  • 14
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
    • Holt, T.J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171-198.
    • (2007) Deviant Behavior , vol.28 , pp. 171-198
    • Holt, T.J.1
  • 17
    • 77949543969 scopus 로고    scopus 로고
    • Honeynet Research Alliance., (Know Your Enemy Paper Series). Retrieved July 20, 2008, from
    • Honeynet Research Alliance. (2003). Profile: Automated credit card fraud (Know Your Enemy Paper Series). Retrieved July 20, 2008, from http://www.honeynet.org/papers/ profiles/cc-fraud.pdf.
    • (2003) Profile: Automated Credit Card Fraud
  • 18
    • 0040240444 scopus 로고    scopus 로고
    • Crack dealers apprehension avoidance techniques: A case of restrictive deterrence
    • Jacobs, B. (1996). Crack dealers apprehension avoidance techniques: A case of restrictive deterrence. Criminology, 34, 409-431.
    • (1996) Criminology , vol.34 , pp. 409-431
    • Jacobs, B.1
  • 20
    • 0347177751 scopus 로고    scopus 로고
    • Managing retaliation: Drug robbery and informal sanction threats
    • Jacobs, B.A., Topalli, V., & Wright, R. (2000). Managing retaliation: Drug robbery and informal sanction threats. Criminology, 38, 171-198.
    • (2000) Criminology , vol.38 , pp. 171-198
    • Jacobs, B.A.1    Topalli, V.2    Wright, R.3
  • 24
    • 0032376197 scopus 로고    scopus 로고
    • Netcrime: More change in the organization of thieving
    • Mann, D., & Sutton, M. (1998). Netcrime: More change in the organization of thieving. British Journal of Criminology, 38, 201-229.
    • (1998) British Journal of Criminology , vol.38 , pp. 201-229
    • Mann, D.1    Sutton, M.2
  • 25
    • 0031487235 scopus 로고    scopus 로고
    • Counterfeiting credit cards: Displacement effects, suitable offenders, and crime wave patterns
    • Mativat, F., & Tremblay, P. (1997). Counterfeiting credit cards: Displacement effects, suitable offenders, and crime wave patterns. British Journal of Criminology, 37, 165-183.
    • (1997) British Journal of Criminology , vol.37 , pp. 165-183
    • Mativat, F.1    Tremblay, P.2
  • 28
    • 68149146473 scopus 로고    scopus 로고
    • PandaLabs., Retrieved November 1, 2007, from
    • PandaLabs. (2007). Malware infections in protected systems. Retrieved November 1, 2007, from http://research.pandasecurity.com/blogs/images/wp_pb_malware_infections_in_protected_systems.pdf
    • (2007) Malware Infections In Protected Systems
  • 29
    • 84858230810 scopus 로고    scopus 로고
    • Gartner: Victims of online phishing up nearly 40 percent in 2007
    • Retrieved January 20, 2008, from
    • Rogers, J. (2007). Gartner: Victims of online phishing up nearly 40 percent in 2007. SC Magazine. Retrieved January 20, 2008, from http://www.scmagazineus.com/Gartner-Victims-of-online-phishing-up-nearly-40-percent-in-2007/article/99768/
    • (2007) Sc Magazine
    • Rogers, J.1
  • 30
    • 24144457497 scopus 로고    scopus 로고
    • Stolen-goods markets: Methods of disposal
    • Schneider, J.L. (2005). Stolen-goods markets: Methods of disposal. British Journal of Criminology, 45, 129-140.
    • (2005) British Journal of Criminology , vol.45 , pp. 129-140
    • Schneider, J.L.1
  • 33
    • 0035582168 scopus 로고    scopus 로고
    • The stolen goods market in New South Wales, Australia: An analysis of disposal avenues and tactics
    • Stevenson, R.J., Forsythe, L.M.V., & Weatherburn, D. (2001). The stolen goods market in New South Wales, Australia: An analysis of disposal avenues and tactics. British Journal of Criminology, 41, 101-118.
    • (2001) British Journal of Criminology , vol.41 , pp. 101-118
    • Stevenson, R.J.1    Forsythe, L.M.V.2    Weatherburn, D.3
  • 36
    • 30644459162 scopus 로고    scopus 로고
    • Symantec Corporation., Retrieved October 3, 2005, from
    • Symantec Corporation. (2003). Symantec Internet security threat report. Retrieved October 3, 2005, from http://enterprisesecurity.symantec.com/content/knowledgelibrary.cfm?EID=0
    • (2003) Symantec Internet Security Threat Report
  • 40
    • 85140528371 scopus 로고    scopus 로고
    • Cybercrimes and the Internet
    • In D.S. Wall (Ed.), New York: Routledge
    • Wall, D.S. (2001). Cybercrimes and the Internet. In D.S. Wall (Ed.), Crime and the Internet (pp. 1-17). New York: Routledge.
    • (2001) Crime and The Internet , pp. 1-17
    • Wall, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.