메뉴 건너뛰기




Volumn 31, Issue 2, 2013, Pages 165-177

Examining the Forces Shaping Cybercrime Markets Online

Author keywords

botnets; cybercrime; hackers; malware; subculture

Indexed keywords


EID: 84874510393     PISSN: 08944393     EISSN: 15528286     Source Type: Journal    
DOI: 10.1177/0894439312452998     Document Type: Article
Times cited : (116)

References (44)
  • 3
    • 80052980820 scopus 로고    scopus 로고
    • Online activities, guardianship, and malware infection: An examination of routine activities theory
    • Bossler A. M.,Holt T. J.Online activities, guardianship, and malware infection: An examination of routine activities theory.International Journal of Cyber Criminology. 2009;3:400-420.
    • (2009) International Journal of Cyber Criminology , vol.3 , pp. 400-420
    • Bossler, A.M.1    Holt, T.J.2
  • 5
    • 77949584268 scopus 로고    scopus 로고
    • Computer crime victimization and integrated theory: An empirical assessment
    • Choi K. S.Computer crime victimization and integrated theory: An empirical assessment.International Journal of Cyber Criminology. 2008;2:308-333.
    • (2008) International Journal of Cyber Criminology , vol.2 , pp. 308-333
    • Choi, K.S.1
  • 6
    • 70449508100 scopus 로고    scopus 로고
    • Zombies and botnets
    • Australian Institute of Criminology. Retrieved December, 28, 2007, from
    • ChooK. R. (2007). Zombies and botnets. Trends and issues in crime and criminal justice. Australian Institute of Criminology. Retrieved December, 28, 2007, fromhttp://www.aic.gov.au/en/publications/current%20series/tandi/321-340/tandi333/view%20paper.aspx.
    • (2007) Trends and issues in crime and criminal justice
    • Choo, K.R.1
  • 8
    • 33748435812 scopus 로고    scopus 로고
    • Computer Security Institute. Retrieved September 20, 2011, from
    • Computer Security Institute. (2009). Computer crime and security survey. Retrieved September 20, 2011, fromhttp://www.cybercrime.gov/FBI2009.pdf.
    • (2009) Computer crime and security survey
  • 10
    • 34247732721 scopus 로고
    • Grounded theory research: Procedures, canons, and evaluative criteria
    • Corbin J.,Strauss A.Grounded theory research: Procedures, canons, and evaluative criteria.Qualitative Sociology. 1990;13:3-21.
    • (1990) Qualitative Sociology , vol.13 , pp. 3-21
    • Corbin, J.1    Strauss, A.2
  • 14
    • 84874531002 scopus 로고    scopus 로고
    • says report. IT World Today Retrieved May 26, 2012, from
    • DunnJ. E. (2012). Russia cybercrime market doubles in 2011, says report. IT World Today Retrieved May 26, 2012, fromhttp://www.itworld.com/security/272448/russia-cybercrime-market-doubles-2011-says-report.
    • (2012) Russia cybercrime market doubles in 2011
    • Dunn, J.E.1
  • 15
    • 77949547807 scopus 로고    scopus 로고
    • An Inquiry into the nature and cause of the wealth of internet miscreants
    • Paper presented at CCS07, October 29-November 2, 2007; Alexandria, VA;
    • Franklin J.,Paxson V.,Perrig A.,Savage S.An Inquiry into the nature and cause of the wealth of internet miscreants. Paper presented at CCS07, October 29-November 2, 2007; 2007Alexandria, VA; 2007.
    • (2007)
    • Franklin, J.1    Paxson, V.2    Perrig, A.3    Savage, S.4
  • 18
    • 0038473060 scopus 로고    scopus 로고
    • Police subculture reconsidered
    • Herbert S.Police subculture reconsidered.Criminology. 1998;36:343-369.
    • (1998) Criminology , vol.36 , pp. 343-369
    • Herbert, S.1
  • 19
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures
    • Holt T. J.Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures.Deviant Behavior. 2007;28:171-198.
    • (2007) Deviant Behavior , vol.28 , pp. 171-198
    • Holt, T.J.1
  • 20
    • 77958509140 scopus 로고    scopus 로고
    • Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data
    • Holt T. J.Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data.Journal of Criminal Justice Education. 2010;21:300-321.
    • (2010) Journal of Criminal Justice Education , vol.21 , pp. 300-321
    • Holt, T.J.1
  • 24
    • 77949555353 scopus 로고    scopus 로고
    • Exploring stolen data markets online: Products and market forces
    • Holt T. J.,Lampke E.Exploring stolen data markets online: Products and market forces.Criminal Justice Studies. 2010;23:33-50.
    • (2010) Criminal Justice Studies , vol.23 , pp. 33-50
    • Holt, T.J.1    Lampke, E.2
  • 27
    • 0040240444 scopus 로고    scopus 로고
    • Crack dealers apprehension avoidance techniques: A case of restrictive deterrence
    • Jacobs B.Crack dealers apprehension avoidance techniques: A case of restrictive deterrence.Criminology. 1996;34:409-431.
    • (1996) Criminology , vol.34 , pp. 409-431
    • Jacobs, B.1
  • 29
    • 0347177751 scopus 로고    scopus 로고
    • Managing retaliation: Drug robbery and informal sanction threats
    • Jacobs B. A.,Topalli V.,Wright R.Managing retaliation: Drug robbery and informal sanction threats.Criminology. 2000;38:171-198.
    • (2000) Criminology , vol.38 , pp. 171-198
    • Jacobs, B.A.1    Topalli, V.2    Wright, R.3
  • 30
    • 0032376197 scopus 로고    scopus 로고
    • Netcrime: More change in the organization of thieving
    • Mann D.,Sutton M.Netcrime: More change in the organization of thieving.British Journal of Criminology. 1998;38:201-229.
    • (1998) British Journal of Criminology , vol.38 , pp. 201-229
    • Mann, D.1    Sutton, M.2
  • 32
    • 68149146473 scopus 로고    scopus 로고
    • PandaLabs, Retrieved November 1, 2007, from
    • PandaLabs. (2007). Malware infections in protected systems. Retrieved November 1, 2007, fromhttp://research.pandasecurity.com/blogs/images/wp_pb_malware_infections_in_protected_systems.pdf.
    • (2007) Malware infections in protected systems
  • 33
    • 34547399387 scopus 로고    scopus 로고
    • A multifaceted approach to understanding the botnet phenonmenon
    • Rajab M. A.,Zarfoss J.,Monrose F.,Terzis A.A multifaceted approach to understanding the botnet phenonmenon.IMC'06. 2006;:41-52.
    • (2006) IMC'06 , pp. 41-52
    • Rajab, M.A.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 34
    • 24144457497 scopus 로고    scopus 로고
    • Stolen-goods markets: Methods of Disposal
    • Schneider J. L.Stolen-goods markets: Methods of Disposal.British Journal of Criminology. 2005;45:129-140.
    • (2005) British Journal of Criminology , vol.45 , pp. 129-140
    • Schneider, J.L.1
  • 36
    • 0035582168 scopus 로고    scopus 로고
    • The stolen goods market in New South Wales Australia: An analysis of disposal avenues and tactics
    • Stevenson R. J.,Forsythe L. M. V.,Weatherburn D.The stolen goods market in New South Wales Australia: An analysis of disposal avenues and tactics.British Journal of Criminology. 2001;41:101-118.
    • (2001) British Journal of Criminology , vol.41 , pp. 101-118
    • Stevenson, R.J.1    Forsythe, L.M.V.2    Weatherburn, D.3
  • 37
    • 0347389690 scopus 로고    scopus 로고
    • London: Home Office Research and Statistics Directorate
    • Sutton M.Home Office Research Study 178. London: Home Office Research and Statistics Directorate; 1998:.
    • (1998) Home Office Research Study 178
    • Sutton, M.1
  • 38
    • 30644459162 scopus 로고    scopus 로고
    • Symantec Corporation. Retrieved October 3, 2005, from
    • Symantec Corporation. (2003). Symantec Internet security threat report. Retrieved October 3, 2005, fromhttp://enterprisesecurity.symantec.com/content/knowledgelibrary.cfm?EID=0.
    • (2003) Symantec Internet security threat report
  • 39
    • 84874545490 scopus 로고    scopus 로고
    • Symantec Corporation.Retrieved May 25, 2012, from
    • Symantec Corporation. (2012). Symantec Internet security threat report, Volume 17.Retrieved May 25, 2012, fromhttp://www.symantec.com/threatreport/.
    • (2012) Symantec Internet security threat report , vol.17
  • 41
    • 33846043733 scopus 로고    scopus 로고
    • (2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall.;, Upper Saddle River, NJ: Pearson Prentice Hall
    • Taylor R. W.,Fritsch E. J.,Liederbach J.,Holt T. J.Digital crime and digital terrorism. 2010). Digital crime and digital terrorism (2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall.Upper Saddle River, NJ: Pearson Prentice Hall; 2010:.
    • (2010) Digital Crime and Digital Terrorism
    • Taylor, R.W.1    Fritsch, E.J.2    Liederbach, J.3    Holt, T.J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.