메뉴 건너뛰기




Volumn , Issue , 2013, Pages

An exploration of the factors affecting the advertised price for stolen data

Author keywords

carding; dumps; forum; stolen data; underground economy

Indexed keywords

COMMERCE; ECONOMICS; PERSONAL COMPUTING; RESEARCH; TEXTILE CARDING; TEXTILE INDUSTRY;

EID: 84900812458     PISSN: 21591237     EISSN: 21591245     Source Type: Conference Proceeding    
DOI: 10.1109/eCRS.2013.6805781     Document Type: Conference Paper
Times cited : (20)

References (32)
  • 1
    • 84925797895 scopus 로고    scopus 로고
    • Crime, deviance and the disembodied self transcending the dangers of corporeality
    • Y. Jewkes (ed), Y. Jewkes, Ed. Portland, OR Willan Publishing
    • Y. Jewkes, and K. Sharp, "Crime, deviance and the disembodied self Transcending the dangers of corporeality," in In Y. Jewkes (ed), Dot.cons Crime, deviance and identity on the internet, Y. Jewkes, Ed. Portland, OR Willan Publishing, 2003, pp. 1-14.
    • (2003) Dot.cons Crime, Deviance and Identity on the Internet , pp. 1-14
    • Jewkes, Y.1    Sharp, K.2
  • 3
    • 11344287619 scopus 로고    scopus 로고
    • Exploring the crime of identity theft prevalence, clearance rates, and victim/offender characteristics
    • S. F. H. Allison, A. M. Schuck, and K. M. Learsch, "Exploring the crime of identity theft prevalence, clearance rates, and victim/offender characteristics," J. Crim. J. vol. 33, pp. 19-29, 2005.
    • (2005) J. Crim. J , vol.33 , pp. 19-29
    • Allison, S.F.H.1    Schuck, A.M.2    Learsch, K.M.3
  • 6
    • 85140528371 scopus 로고    scopus 로고
    • Cybercrimes and the internet
    • D. S. Wall (ed.),. New York Routledge
    • D. S. Wall, "Cybercrimes and the internet," D. S. Wall (ed.), Crime and the internet. New York Routledge, 2001, pp. 1-17.
    • (2001) Crime and the Internet , pp. 1-17
    • Wall, D.S.1
  • 8
    • 78149334726 scopus 로고    scopus 로고
    • Data breaches what the underground world of "carding" reveals
    • K. K. Peretti, "Data breaches What the underground world of "carding" reveals," Santa Clara Computer &High Technology L. J., vol. 25,pp. 375-413, 2009.
    • (2009) Santa Clara Computer &High Technology L. J. , vol.25 , pp. 375-413
    • Peretti, K.K.1
  • 9
    • 84885155959 scopus 로고    scopus 로고
    • The great cyberheist
    • November 14,.
    • J. Verini, "The great cyberheist," The New York Times. November 14, 2010.
    • (2010) The New York Times
    • Verini, J.1
  • 10
    • 84900805032 scopus 로고    scopus 로고
    • Verison, 2012 Data breach investigations report and executive summary, 2012.
    • Verison, 2012 Data breach investigations report and executive summary, 2012. http//www.verisonbusiness.com/resources/reports/rp-databreach- investigations-report-2012-en-xg.pdf.
  • 11
    • 84900815649 scopus 로고    scopus 로고
    • Anti-Phishing Working Group, APWG Phishing activity trneds report, 2nd quarter 2012.
    • Anti-Phishing Working Group, APWG Phishing activity trneds report, 2nd quarter 2012. http//docs.apwg.org/reports/apwg-trends-report-q2-2012.pdf.
  • 12
    • 84858230810 scopus 로고    scopus 로고
    • Gartner victims of online phishing up nearly 40 percent in 2007
    • J. Rogers, J. "Gartner Victims of online phishing up nearly 40 percent in 2007." SC Magazine, 2007.
    • (2007) SC Magazine
    • Rogers, J.J.1
  • 15
    • 77949555353 scopus 로고    scopus 로고
    • Exploring stolen data markets on-line products and market forces
    • T. J. Holt, and E. Lampke, "Exploring stolen data markets on-line Products and market forces," Crim. Just. St., vol. 23, pp. 33-50, 2010.
    • (2010) Crim. Just. St. , vol.23 , pp. 33-50
    • Holt, T.J.1    Lampke, E.2
  • 16
    • 84900812269 scopus 로고    scopus 로고
    • Honeynet Research Alliance, 'Profile Automated Credit Card Fraud Know Your Enemy Paper series, 2003
    • Honeynet Research Alliance, 'Profile Automated Credit Card Fraud," Know Your Enemy Paper series, 2003.
  • 17
    • 70350423437 scopus 로고    scopus 로고
    • The underground economy priceless
    • R Thomas, and J. Martin, "The underground economy Priceless,"login The Usenix Magazine, vol. 31, pp. 7-17, 2006.
    • (2006) Login the Usenix Magazine , vol.31 , pp. 7-17
    • Thomas, R.1    Martin, J.2
  • 19
    • 81255149250 scopus 로고    scopus 로고
    • Nobody sells gold for the price of silver dishonesty, uncertainty and the underground economy
    • T. Moore, D. J. Pym, and C. Ioannidis, New York Springer
    • C. Herley, and D. Florencio, "Nobody sells gold for the price of silver Dishonesty, uncertainty and the underground economy," in Economics of information security and privacy, T. Moore, D. J. Pym, and C. Ioannidis, New York Springer, 2010, pp. 33-53.
    • (2010) Economics of Information Security and Privacy , pp. 33-53
    • Herley, C.1    Florencio, D.2
  • 20
    • 81255178753 scopus 로고    scopus 로고
    • The dark net Self-regulation dynamics of illegal online markets for identities and related services
    • F. Wehinger, "The dark net Self-regulation dynamics of illegal online markets for identities and related services." Intelligence and Security Informatics Conference, 209-213, 2011.
    • (2011) Intelligence and Security Informatics Conference , pp. 209-213
    • Wehinger, F.1
  • 21
    • 84900800907 scopus 로고    scopus 로고
    • Bad sushi beating phishers at their own game
    • N. Dhanjani, and B. Rios. "Bad sushi Beating phishers at their own game." Blackhat, 2008
    • (2008) Blackhat
    • Dhanjani, N.1    Rios, B.2
  • 22
    • 70350357344 scopus 로고    scopus 로고
    • Learning more about the underground economy a case-study of keyloggers and dropzones
    • M. Backes and P. Ning, (Eds.) Berlin and Heidelberg, Springer
    • T. Holz, M. Engelberth, and F. Freiling, "Learning more about the underground economy A case-study of keyloggers and dropzones," in Computer Security-ESORICS, M. Backes and P. Ning, (Eds.) Berlin and Heidelberg, Springer, 2009, pp. 1-18.
    • (2009) Computer Security-ESORICS , pp. 1-18
    • Holz, T.1    Engelberth, M.2    Freiling, F.3
  • 23
    • 84885107426 scopus 로고    scopus 로고
    • Russia cybercrime market doubles in 2011, says report
    • J. E. Dunn, "Russia cybercrime market doubles in 2011, says report," IT World Today, 2012. http//www.itworld.com/security/272448/ russiacybercrime-market-doubles-2011-says-report
    • (2012) IT World Today
    • Dunn, J.E.1
  • 25
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural evolution? Examining the influence of on-and off-line experiences on deviant subcultures
    • T. J. Holt, "Subcultural evolution? Examining the influence of on-and off-line experiences on deviant subcultures," J. Dev. Beh., vol. 28, pp. 171-198, 2007.
    • (2007) J. Dev. Beh. , vol.28 , pp. 171-198
    • Holt, T.J.1
  • 26
    • 77958509140 scopus 로고    scopus 로고
    • Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data
    • T. J. Holt, "Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data," J. Crim. Jus. Ed., vol. 21, pp. 300-321, 2010.
    • (2010) J. Crim. Jus. Ed. , vol.21 , pp. 300-321
    • Holt, T.J.1
  • 27
    • 84879724936 scopus 로고    scopus 로고
    • Exploring the social organization and structure of stolen data markets
    • T. J. Holt, "Exploring the social organization and structure of stolen data markets," GC vol. 2, pp. 155-174, 2013
    • (2013) GC , vol.2 , pp. 155-174
    • Holt, T.J.1
  • 28
    • 79959953965 scopus 로고    scopus 로고
    • Internet research
    • D. Silverman (ed, 3rd Edition, Thousand Oaks, CA SAGE Publications
    • A. N. Markham, "Internet research," D. Silverman (ed.), Qualitative Research Issues of Theory, Method, and Practice, 3rd Edition, Thousand Oaks, CA SAGE Publications, 2011, pp. 111-127.
    • (2011) Qualitative Research Issues of Theory, Method, and Practice , pp. 111-127
    • Markham, A.N.1
  • 29
    • 82255174349 scopus 로고    scopus 로고
    • Positively skewed data revisiting the box-cox power transformation
    • J. Olivier, and M. M. Norberg, "Positively skewed data Revisiting the box-cox power transformation," IJPR, vol. 3, pp. 68-75, 2010.
    • (2010) IJPR , vol.3 , pp. 68-75
    • Olivier, J.1    Norberg, M.M.2
  • 30
    • 84900831853 scopus 로고    scopus 로고
    • Why did criminals trust liberty reserve
    • May 31,.
    • J. Surowiecki, "Why did criminals trust liberty reserve," The New Yorker, May 31, 2013. http//www.newyorker.com/online/blogs/newsdesk/2013/05/ why-didcriminals-trust-liberty-reserve.htlm
    • (2013) The New Yorker
    • Surowiecki, J.1
  • 31
    • 84865416232 scopus 로고    scopus 로고
    • The social network of hackers
    • D. Decary-Hetu, and B. Dupont, "The social network of hackers." GC, vol. 13, pp. 160-173, 2012.
    • (2012) GC , vol.13 , pp. 160-173
    • Decary-Hetu, D.1    Dupont, B.2
  • 32
    • 84886398422 scopus 로고    scopus 로고
    • Trust among cybercriminals? Carding forums, uncertainty, and implications for policing
    • M. Yip, C. Webber, and N. Shadbolt, "Trust among cybercriminals? Carding forums, uncertainty, and implications for policing." Pol and Soc, vol. 23, pp. 1-24, 2013.
    • (2013) Pol and Soc , vol.23 , pp. 1-24
    • Yip, M.1    Webber, C.2    Shadbolt, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.