메뉴 건너뛰기




Volumn , Issue , 2011, Pages 209-213

The dark net: Self-regulation dynamics of illegal online markets for identities and related services

Author keywords

Computer fraud; Cybercrime; Identity theft; Online underground economy; Self regulation

Indexed keywords

COMPUTER FRAUD; CYBERCRIME; IDENTITY THEFT; ONLINE UNDERGROUND ECONOMY; SELF-REGULATION;

EID: 81255178753     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EISIC.2011.54     Document Type: Conference Paper
Times cited : (60)

References (39)
  • 1
    • 32544441740 scopus 로고    scopus 로고
    • Fighting cybercrime: A review and the Taiwan experience
    • DOI 10.1016/j.dss.2004.06.006, PII S0167923604001381
    • W. Chung, H. Chen, W. Chang, and S. Chou, "Fighting cybercrime: a review and the Taiwan experience," Decision Support Systems, vol. 41, pp. 669-682, 2006. (Pubitemid 43233894)
    • (2006) Decision Support Systems , vol.41 , Issue.3 , pp. 669-682
    • Chung, W.1    Chen, H.2    Chang, W.3    Chou, S.4
  • 2
    • 11344287619 scopus 로고    scopus 로고
    • Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics
    • DOI 10.1016/j.jcrimjus.2004.10.007, PII S0047235204001175
    • S. Allison, A. Schuck, and K. Lersch, "Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics," J. Crim. Just., vol. 33, pp. 19-29, 2005. (Pubitemid 40076452)
    • (2005) Journal of Criminal Justice , vol.33 , Issue.1 , pp. 19-29
    • Allison, S.F.H.1    Schuck, A.M.2    Lersch, K.M.3
  • 5
    • 84872165562 scopus 로고    scopus 로고
    • In the shadow: Illegal markets and economic sociology
    • J. Beckert and F. Wehinger, "In the shadow: Illegal markets and economic sociology," MPIfG discussion paper 11/9.
    • MPIfG Discussion Paper , vol.11 , Issue.9
    • Beckert, J.1    Wehinger, F.2
  • 6
    • 0036013014 scopus 로고    scopus 로고
    • Flexible hierarchies and dynamic disorder: The drug distribution system in Frankfurt and Milan
    • L. Paoli, "Flexible hierarchies and dynamic disorder: The drug distribution system in Frankfurt and Milan," Drugs: Education, Prevention & Policy, vol. 9, pp. 143-151, 2002.
    • (2002) Drugs: Education, Prevention & Policy , vol.9 , pp. 143-151
    • Paoli, L.1
  • 8
    • 85040488951 scopus 로고    scopus 로고
    • Industry self-regulation: An institutional perspective
    • N. Gunningham and J. Rees, "Industry self-regulation: An institutional perspective," Law & Policy, vol. 19, pp. 363-414, 1997. (Pubitemid 128103881)
    • (1997) Law & policy , vol.19 , Issue.4 , pp. 363-414
    • Gunningham, N.1    Rees, J.2
  • 11
    • 81255134104 scopus 로고    scopus 로고
    • Underground economy: An overview on professional cybercrime business and the legal challenges that come along with it
    • M. Bellini, P. Brunst, J. Jähnke, Eds. Berlin: Duncker & Humblot
    • J. Spoenle, "Underground economy: An overview on professional cybercrime business and the legal challenges that come along with it," in Current issues in IT security, M. Bellini, P. Brunst, J. Jähnke, Eds. Berlin: Duncker & Humblot, 2010, 67-79.
    • (2010) Current Issues in IT Security , pp. 67-79
    • Spoenle, J.1
  • 12
    • 70350357344 scopus 로고    scopus 로고
    • Learning more about the underground economy: A case-study of keyloggers and dropzones
    • M. Backes and P. Ning, Eds. Berlin and Heidelberg: Springer
    • T. Holz, M. Engelberth, and F. Freiling, "Learning more about the underground economy: A case-study of keyloggers and dropzones," in Computer Security - ESORICS, M. Backes and P. Ning, Eds. Berlin and Heidelberg: Springer, 2009, pp. 1-18.
    • (2009) Computer Security - ESORICS , pp. 1-18
    • Holz, T.1    Engelberth, M.2    Freiling, F.3
  • 13
    • 77949555353 scopus 로고    scopus 로고
    • Exploring stolen data markets online: Products and market forces
    • T. Holt and E. Lampke, "Exploring stolen data markets online: Products and market forces,". Crim. Just. St., vol. 23, pp. 33 - 50, 2010.
    • (2010) Crim. Just. St. , vol.23 , pp. 33-50
    • Holt, T.1    Lampke, E.2
  • 14
    • 81255149250 scopus 로고    scopus 로고
    • Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
    • T. Moore, D. Pym, and C. Ioannidis, Eds. New York: Springer
    • C. Herley and D. Florêncio "Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy," in Economics of information security and privacy, T. Moore, D. Pym, and C. Ioannidis, Eds. New York: Springer, 2010, pp. 33-53.
    • (2010) Economics of Information Security and Privacy , pp. 33-53
    • Herley, C.1    Florêncio, D.2
  • 16
    • 81255138009 scopus 로고    scopus 로고
    • Zero-day und less-than-zero-day vulnerabilities und exploits
    • C. Zacharias, K. Horst, K.- U- Witt, V. Sommer, M. Anmt, U. Essmann, and L. Mülheims, Eds. Heidelberg: Physica-Verlag
    • H. Pohl, "Zero-day und less-than-zero-day vulnerabilities und exploits," in Forschungsspitzen und Spitzenforschung, C. Zacharias, K. Horst, K.- U- Witt, V. Sommer, M. Anmt, U. Essmann, and L. Mülheims, Eds. Heidelberg: Physica-Verlag, 2009, pp. 113-123.
    • (2009) Forschungsspitzen und Spitzenforschung , pp. 113-123
    • Pohl, H.1
  • 18
    • 78650247908 scopus 로고    scopus 로고
    • Playing with shadows: Exposing the black market for online game password theft
    • C. Feng, "Playing with shadows: Exposing the black market for online game password theft," Virus Bull., vol. 18, pp. 207-214, 2008.
    • (2008) Virus Bull. , vol.18 , pp. 207-214
    • Feng, C.1
  • 19
    • 80052782392 scopus 로고    scopus 로고
    • Cambridge, UK: Polity Press
    • P. Aspers, Markets. Cambridge, UK: Polity Press, 2011.
    • (2011) Markets
    • Aspers, P.1
  • 21
    • 0002116850 scopus 로고
    • Production of trust: Institutional sources of economic structure, 1840-1920
    • L. Zucker, "Production of trust: Institutional sources of economic structure, 1840-1920," Res. Org. Behav., vol. 8, pp. 53-111, 1986
    • (1986) Res. Org. Behav. , vol.8 , pp. 53-111
    • Zucker, L.1
  • 22
    • 84936824352 scopus 로고
    • Economic action and social structure: The problem of embeddedness
    • M. Granovetter, "Economic action and social structure: The problem of embeddedness," Am. J. Soc., vol. 91, pp. 481, 1985.
    • (1985) Am. J. Soc. , vol.91 , pp. 481
    • Granovetter, M.1
  • 23
    • 0011081592 scopus 로고    scopus 로고
    • Trust, control, and risk in strategic alliances: An integrated framework
    • T. K. Das, and T. Bing-Sheng, "Trust, control, and risk in strategic alliances: An integrated framework," Organization Studies, vol. 22, pp. 251-283, 2001. (Pubitemid 33590943)
    • (2001) Organization Studies , vol.22 , Issue.2 , pp. 251-283
    • Das, T.K.1    Teng, B.-S.2
  • 25
    • 0002353506 scopus 로고
    • Mafia: The price of distrust
    • D. Gambetta, Ed. New York and Oxford: Basil Blackwell
    • D. Gambetta, "Mafia: The price of distrust," in Trust: Making and breaking cooperative relations, D. Gambetta, Ed. New York and Oxford: Basil Blackwell, 1988, pp. 158-175.
    • (1988) Trust: Making and Breaking Cooperative Relations , pp. 158-175
    • Gambetta, D.1
  • 26
    • 84925834591 scopus 로고    scopus 로고
    • Italian organised crime: Mafia associations and criminal enterprises
    • L. Paoli, Italian organised crime: Mafia associations and criminal enterprises, Global Crime, vol. 6, pp. 19-31, 2004.
    • (2004) Global Crime , vol.6 , pp. 19-31
    • Paoli, L.1
  • 27
    • 81255149255 scopus 로고    scopus 로고
    • Cologne: Max-Planck-Institut für Gesellschaftsforschung, unpublished
    • F. Wehinger, Illegale Märkte. Cologne: Max-Planck-Institut für Gesellschaftsforschung, unpublished.
    • Illegale Märkte
    • Wehinger, F.1
  • 29
    • 85145522060 scopus 로고    scopus 로고
    • Identity theft and fraud
    • Y. Jewkes and M. Yar, Eds. Cullompton: Willan
    • R. Smith, "Identity theft and fraud," in Handbook of internet crime, Y. Jewkes and M. Yar, Eds. Cullompton: Willan, 2010, pp. 273-301.
    • (2010) Handbook of Internet Crime , pp. 273-301
    • Smith, R.1
  • 30
    • 0012828167 scopus 로고    scopus 로고
    • Cybercrimes of the 21st century: Crimes against the individual (Part 1)
    • A. Riem, "Cybercrimes of the 21st century: Crimes against the individual (Part 1)," Computer Fraud & Security, pp. 13-17, 2001.
    • (2001) Computer Fraud & Security , pp. 13-17
    • Riem, A.1
  • 32
    • 81255141791 scopus 로고    scopus 로고
    • The organization of cybercrime and organized cybercrime
    • M. Bellini, P. Brunst, J. Jähnke, Eds. Berlin: Duncker & Humblot
    • D. Wall, "The organization of cybercrime and organized cybercrime," in Current issues in IT security, M. Bellini, P. Brunst, J. Jähnke, Eds. Berlin: Duncker & Humblot, 2010, pp. 51-66.
    • (2010) Current Issues in IT Security , pp. 51-66
    • Wall, D.1
  • 33
    • 35348889528 scopus 로고    scopus 로고
    • Policing diversity in the digital age
    • D. Wall and M. Williams, "Policing diversity in the digital age," Crim. and Crim. Just., vol. 7, pp. 391-415, 2007.
    • (2007) Crim. and Crim. Just. , vol.7 , pp. 391-415
    • Wall, D.1    Williams, M.2
  • 34
    • 70350423437 scopus 로고    scopus 로고
    • The underground economy: Priceless
    • R. Thomas and J. Martin, "The underground economy: Priceless," ;LOGIN: The USENIX Magazine, vol. 31, pp. 7-16, 2006.
    • (2006) LOGIN: The USENIX Magazine , vol.31 , pp. 7-16
    • Thomas, R.1    Martin, J.2
  • 37
    • 85145536300 scopus 로고    scopus 로고
    • Hackers, viruses and malicious software
    • Y. Jewkes and M. Yar, Eds. Cullompton: Willan
    • S. Furnell, "Hackers, viruses and malicious software," in Handbook of internet crime, Y. Jewkes and M. Yar, Eds. Cullompton: Willan, 2010, pp. 173-193.
    • (2010) Handbook of Internet Crime , pp. 173-193
    • Furnell, S.1
  • 39
    • 55149123066 scopus 로고    scopus 로고
    • Lone hacks or group cracks: Examing the social organization of computer hackers
    • F. Schmalleger and M. Pittaro, Eds., Upper Saddle River: Pearson Education
    • T. Holt, "Lone hacks or group cracks: Examing the social organization of computer hackers," in Crimes of the internet, F. Schmalleger and M. Pittaro, Eds., Upper Saddle River: Pearson Education, 2008, 336-355.
    • (2008) Crimes of the Internet , pp. 336-355
    • Holt, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.