-
1
-
-
34249319104
-
Law-Enforcement Disruption of a Drug Importation Network
-
Morselli, Carlo, and Katia Petit, 'Law-Enforcement Disruption of a Drug Importation Network', Global Crime 8, no. 2 (2007): 109-30.
-
(2007)
Global Crime
, vol.8
, Issue.2
, pp. 109-130
-
-
Morselli, C.1
Petit, K.2
-
7
-
-
27844472177
-
Transnational Criminal Networks
-
eds. John Arquilla and David Ronfeldt, Santa Monica, CA: RAND Corporation
-
Williams, Phil, 'Transnational Criminal Networks', in Networks and Netwars: The Future of Terror, Crime, and Militancy, eds. John Arquilla and David Ronfeldt (Santa Monica, CA: RAND Corporation, 2001).
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
-
-
Williams, P.1
-
9
-
-
36348994955
-
Social Network Analysis as an Approach to Combat Terrorism: Past, Present and Future Research
-
Ressler, Steve, 'Social Network Analysis as an Approach to Combat Terrorism: Past, Present and Future Research', Homeland Security Affairs 2, no. 2 (2006): 1-10.
-
(2006)
Homeland Security Affairs
, vol.2
, Issue.2
, pp. 1-10
-
-
Ressler, S.1
-
10
-
-
4243169182
-
Graph-Based Technologies for Intelligence Analysis
-
Coffman, T., S. Greenblatt, and S. Marcus, 'Graph-Based Technologies for Intelligence Analysis', Communications of the ACM 47, no. 3 (2004): 45-7.
-
(2004)
Communications of the ACM
, vol.47
, Issue.3
, pp. 45-47
-
-
Coffman, T.1
Greenblatt, S.2
Marcus, S.3
-
13
-
-
20344376408
-
Criminal Network Analysis and Visualization
-
Xu, Jennifer, and Hsinchun Chen, 'Criminal Network Analysis and Visualization', Communications of the ACM 48, no. 6 (2005): 101-7.
-
(2005)
Communications of the ACM
, vol.48
, Issue.6
, pp. 101-107
-
-
Xu, J.1
Chen, H.2
-
15
-
-
0242508411
-
Dark Networks as Problems
-
Raab, Jörg, and H. Brinton Milward, 'Dark Networks as Problems', Journal of Public Administration Research and Theory 13, no. 4 (2003): 413-39.
-
(2003)
Journal of Public Administration Research and Theory
, vol.13
, Issue.4
, pp. 413-439
-
-
Raab, J.1
Brinton, M.H.2
-
16
-
-
3042526674
-
Terrorist/Liberators: Researching and Dealing with Adversary Social Networks
-
van Meter, Karl M., 'Terrorist/Liberators: Researching and Dealing with Adversary Social Networks', Connection 24, no. 3 (2002): 66-78.
-
(2002)
Connection
, vol.24
, Issue.3
, pp. 66-78
-
-
van, M.1
Karl, M.2
-
18
-
-
0003863956
-
-
Cambridge, MA: Analytic Technologies
-
Borgatti, Stephen P., Martin G. Everett, and Linton C. Freeman, Ucinet for Windows: Software for Social Network Analysis (Cambridge, MA: Analytic Technologies, 2002).
-
(2002)
Ucinet For Windows: Software For Social Network Analysis
-
-
Borgatti, S.P.1
Everett, M.G.2
Freeman, L.C.3
-
20
-
-
77951583374
-
Using Social Network Analysis to Target Criminal Networks
-
Schwartz, Daniel M. and Tony D.A. Rouselle, 'Using Social Network Analysis to Target Criminal Networks', Trends in Organized Crime 12 no. 2, (2008): 188-207.
-
(2008)
Trends In Organized Crime
, vol.12
, Issue.2
, pp. 188-207
-
-
Schwartz, D.M.1
Rouselle, T.D.A.2
-
21
-
-
34247160604
-
-
Upper Saddle River, NJ: Pearson Prentice Hall
-
Grabosky, Peter, Electronic Crime (Upper Saddle River, NJ: Pearson Prentice Hall, 2007).
-
(2007)
Electronic Crime
-
-
Grabosky, P.1
-
22
-
-
85000701895
-
My Botnet is Bigger than Yours (maybe, better than yours): Why Size Estimates Remain Challenging
-
ACM: New York
-
Rajab, Abu, M., Jay Zarfoss, Fabian Monrose, and Andreas Terzis, 'My Botnet is Bigger than Yours (maybe, better than yours): Why Size Estimates Remain Challenging', in Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets (ACM: New York, 2007), 1-8.
-
(2007)
Proceedings of the First Conference On First Workshop On Hot Topics In Understanding Botnets
, pp. 1-8
-
-
Rajab, A.M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
23
-
-
74049154670
-
Your Botnet is my Botnet: Analysis of a Botnet Takeover
-
eds. Somesh Jha, and Angelos D. Keromytis (New York: ACM
-
Stone-Gross, Brett, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni Vigna, 'Your Botnet is my Botnet: Analysis of a Botnet Takeover', in Proceedings of the 16th ACM Conference on Computer and Communication Security, eds. Somesh Jha, and Angelos D. Keromytis (New York: ACM, 2009), 635-47.
-
(2009)
Proceedings of the 16th ACM Conference On Computer and Communication Security
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
24
-
-
33846043733
-
-
Upper Saddle River, NJ: Pearson
-
Taylor, Robert W., Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John Liederbach, Digital Crime and Digital Terrorism (Upper Saddle River, NJ: Pearson, 2006).
-
(2006)
Digital Crime and Digital Terrorism
-
-
Taylor, R.W.1
Caeti, T.J.2
Kall, L.D.3
Fritsch, E.J.4
Liederbach, J.5
-
25
-
-
84865427614
-
-
Note
-
It is common for people who use IRC to change their nicknames frequently, making it very difficult for researchers to keep track of all the nicknames used by hackers. We analysed the distribution of nicknames found in the conversations and merged the nicknames that were nearly identical (ex: Poison and Poison). We also identified the nicknames for bots (computer programs) used by hackers to send commands through IRC and removed them from our sample. (These bots were easily recognisable by the string of numbers appended to their nicknames.) The resulting dataset included 771 individuals. In order to protect their privacy, the online nicknames of the individuals will not be used in this article. We assigned each individual a numeric code (N1, N2, N3, etc.) that is used to identify them in the rest of this article. The police organisation that provided us the dataset also added an additional layer of privacy protection for the people involved in this study (including convicted hackers) by refusing to disclose the real identities behind the nicknames.
-
-
-
-
26
-
-
0039593329
-
The Social Organization of the Computer Underground
-
Master's thesis in sociology, Northern Illinois University
-
Meyer, Gordon R., 'The Social Organization of the Computer Underground' (Master's thesis in sociology, Northern Illinois University, 1989).
-
(1989)
-
-
Meyer, G.R.1
-
27
-
-
0042855099
-
A Sociology of Hackers
-
Jordan, Tim, and Paul Taylor, 'A Sociology of Hackers', The Sociological Review 46, no. 4 (1998): 757-80.
-
(1998)
The Sociological Review
, vol.46
, Issue.4
, pp. 757-780
-
-
Jordan, T.1
Taylor, P.2
-
28
-
-
21244489423
-
-
Westport, CT: Quorum Books
-
Schell, Bernadette H., John L. Dodge, and Steve S. Moutsatsos, The Hacking of America: Who's Doing It, Why and How (Westport, CT: Quorum Books, 2002).
-
(2002)
The Hacking of America: Who's Doing It, Why and How
-
-
Schell, B.H.1
Dodge, J.L.2
Moutsatsos, S.S.3
-
29
-
-
55149123066
-
Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers
-
eds. Frank Schmalleger, and Michael Pittaro, Upper Saddle River, NJ: Pearson
-
Holt, Thomas J., 'Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers', in Crimes of the Internet, eds. Frank Schmalleger, and Michael Pittaro (Upper Saddle River, NJ: Pearson, 2009), 336-55.
-
(2009)
Crimes of the Internet
, pp. 336-355
-
-
Holt, T.J.1
-
32
-
-
57249097134
-
Who's in the Network? When Stakeholders Influence Data Analysis
-
Prell, C.K. Hubacek, C. Quinn, and M. Reed, 'Who's in the Network? When Stakeholders Influence Data Analysis', Systemic Practice and Action Research 21, no. 6 (2008): 443-58.
-
(2008)
Systemic Practice and Action Research
, vol.21
, Issue.6
, pp. 443-458
-
-
Prell, C.K.H.1
Quinn, C.2
Reed, M.3
-
33
-
-
70349639385
-
An Empirical Study of the Driving Forces Behind Online Communities
-
Toral, S.L., M.R. Martinez-Torres, F. Barrero, and F. Cortes, 'An Empirical Study of the Driving Forces Behind Online Communities', Internet Research 19, no. 4 (2009): 378-92.
-
(2009)
Internet Research
, vol.19
, Issue.4
, pp. 378-392
-
-
Toral, S.L.1
Martinez-Torres, M.R.2
Barrero, F.3
Cortes, F.4
-
34
-
-
84936824655
-
Power and Centrality: A Family of Measures
-
Bonacich, P., 'Power and Centrality: A Family of Measures', The American Journal of Sociology 92, no. 5 (1987): 1170-82.
-
(1987)
The American Journal of Sociology
, vol.92
, Issue.5
, pp. 1170-1182
-
-
Bonacich, P.1
-
35
-
-
84865432797
-
-
Note
-
Borgatti is the creator of Ucinet, a software package used to study social networks that is very popular among academics. He has recently published an article in Science describing the current state of social networks analysis (Borgatti et al., 2009). His work on the political independence measure has yet to be published.
-
-
-
-
37
-
-
84865434024
-
-
This software is still not feature-complete according to Borgatti (2010). It has thus never been publicized or promoted by its creator. This does not affect the core functions of the software used for this article, which is available free of charge from Analytic Technologies' website
-
This software is still not feature-complete according to Borgatti (2010). It has thus never been publicized or promoted by its creator. This does not affect the core functions of the software used for this article, which is available free of charge from Analytic Technologies' website (www.analytictech.com).
-
-
-
-
38
-
-
33845632678
-
Visualizing Social Networks
-
accessed December 21, 2010
-
Freeman, Linton C., 'Visualizing Social Networks', Journal of Social Structure 1, no. 1 (2000), http://www.cmu.edu/joss/content/articles/volume1/Freeman.html (accessed December 21, 2010).
-
(2000)
Journal of Social Structure
, vol.1
, Issue.1
-
-
Freeman, L.C.1
-
39
-
-
84865442879
-
-
Note
-
The power in this network is held to stem from the ability to provide information and easy access to information.
-
-
-
-
43
-
-
39749093168
-
The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information
-
Miller, George A., 'The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information', The Psychological Review 63, no. 2 (1956): 81-97.
-
(1956)
The Psychological Review
, vol.63
, Issue.2
, pp. 81-97
-
-
Miller, G.A.1
-
44
-
-
84970748043
-
Social Network Analysis
-
Scott, John, 'Social Network Analysis', Sociology 22, no. 1 (1988): 109-27.
-
(1988)
Sociology
, vol.22
, Issue.1
, pp. 109-127
-
-
Scott, J.1
|