메뉴 건너뛰기




Volumn 16, Issue 2, 2015, Pages 81-103

Examining the risk reduction strategies of actors in online criminal markets

Author keywords

fraud; hacking; identity theft; rational choice theory; risk avoidance; stolen data

Indexed keywords


EID: 84926525114     PISSN: 17440572     EISSN: 17440580     Source Type: Journal    
DOI: 10.1080/17440572.2015.1013211     Document Type: Article
Times cited : (63)

References (54)
  • 2
    • 0037408982 scopus 로고    scopus 로고
    • Building Trust in Online Auction Markets through an Economic Incentive Mechanism
    • Ba, Sulin, Andrew B. Whinston, and Han Zhang. “Building Trust in Online Auction Markets through an Economic Incentive Mechanism.” Decision Support Systems 35 (2003): 273–286. doi:10.1016/S0167-9236(02)00074-X.
    • (2003) Decision Support Systems , vol.35 , pp. 273-286
    • Ba, S.1    Whinston, A.B.2    Zhang, H.3
  • 3
    • 84856707624 scopus 로고    scopus 로고
    • Silk Road: eBay for Drugs
    • Barratt, Monica J. “Silk Road: eBay for Drugs.” Addiction 107, no. 3 (2012): 683–683. doi:10.1111/j.1360-0443.2011.03709.x.
    • (2012) Addiction , vol.107 , Issue.3 , pp. 683
    • Barratt, M.J.1
  • 4
    • 0000787258 scopus 로고
    • Crime and Punishment: An Economic Approach
    • Becker, Gary S. “Crime and Punishment: An Economic Approach.” The Journal of Political Economy 76, no. 2 (1968): 169–217. doi:10.1086/259394.
    • (1968) The Journal of Political Economy , vol.76 , Issue.2 , pp. 169-217
    • Becker, G.S.1
  • 5
    • 33645081478 scopus 로고    scopus 로고
    • ‘Drive It like You Stole It’: Auto Theft and the Illusion of Normalcy
    • Cherbonneau, Michael, and Heith Copes. “‘Drive It like You Stole It’: Auto Theft and the Illusion of Normalcy.” British Journal of Criminology 46, no. 2 (2006): 193–211. doi:10.1093/bjc/azi059.
    • (2006) British Journal of Criminology , vol.46 , Issue.2 , pp. 193-211
    • Cherbonneau, M.1    Copes, H.2
  • 6
    • 84859365388 scopus 로고    scopus 로고
    • Examining the Creation, Distribution, and Function of Malware On-Line
    • Chu, Bill., Thomas J. Holt, and Gail Joon Ahn. Examining the Creation, Distribution, and Function of Malware On-Line. Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018, 2010. http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf
    • (2010) Technical Report for National Institute of Justice
    • Chu, B.1    Holt, T.J.2    Ahn, G.J.3
  • 8
    • 0001244215 scopus 로고
    • Modeling Offenders’ Decisions: A Framework for Research and Policy
    • Clarke, Ronald V., and Derek B. Cornish. “Modeling Offenders’ Decisions: A Framework for Research and Policy.” Crime and Justice 6 (1985): 147–185. doi:10.1086/449106.
    • (1985) Crime and Justice , vol.6 , pp. 147-185
    • Clarke, R.V.1    Cornish, D.B.2
  • 9
    • 85044911536 scopus 로고    scopus 로고
    • Bounded Rationality of Identity Thieves: Using Offender‐based Research to Inform Policy
    • Copes, Heith, and Lynne M. Vieraitis. “Bounded Rationality of Identity Thieves: Using Offender‐based Research to Inform Policy.” Criminology and Public Policy 8, no. 2 (2009): 237–262. doi:10.1111/j.1745-9133.2009.00553.x.
    • (2009) Criminology and Public Policy , vol.8 , Issue.2 , pp. 237-262
    • Copes, H.1    Vieraitis, L.M.2
  • 11
    • 0023576254 scopus 로고
    • Understanding Crime Displacement: An Application of Rational Choice Theory
    • Cornish, Derek B., and Ronald V. Clarke. “Understanding Crime Displacement: An Application of Rational Choice Theory.” Criminology 25, no. 4 (1987): 933–948. doi:10.1111/j.1745-9125.1987.tb00826.x.
    • (1987) Criminology , vol.25 , Issue.4 , pp. 933-948
    • Cornish, D.B.1    Clarke, R.V.2
  • 13
    • 84992974149 scopus 로고    scopus 로고
    • Passing the Buck: Risk Avoidance and Risk Management in the Illegal/Informal Drug Trade
    • Cross, John C. “Passing the Buck: Risk Avoidance and Risk Management in the Illegal/Informal Drug Trade.” International Journal of Sociology and Social Policy 20, no. 9/10 (2000): 68–94. doi:10.1108/01443330010789232.
    • (2000) International Journal of Sociology and Social Policy , vol.20 , Issue.9-10 , pp. 68-94
    • Cross, J.C.1
  • 14
    • 0012053937 scopus 로고
    • Those Who Discourage Crime
    • Felson, Marcus. “Those Who Discourage Crime.” Crime and Place 4 (1995): 53–66.
    • (1995) Crime and Place , vol.4 , pp. 53-66
    • Felson, M.1
  • 15
    • 77949547807 scopus 로고    scopus 로고
    • An Inquiry into the Nature and Cause of the Wealth of Internet Miscreants
    • Paper presented at CCS07, Alexandria, VA: November 2, October
    • Franklin, Jason, Vern Paxson, Adrian Perrig, and Stefan Savage. “An Inquiry into the Nature and Cause of the Wealth of Internet Miscreants.” Paper presented at CCS07, Alexandria, VA, October29–November 2, 2007.
    • (2007)
    • Franklin, J.1    Paxson, V.2    Perrig, A.3    Savage, S.4
  • 17
    • 84926524514 scopus 로고    scopus 로고
    • Russian Underground Revisited
    • Goncharov, Max. “Russian Underground Revisited.” Cybercriminal Underground Economy Series. Trend Micro, 2014. http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-russian-underground-revisited.pdf
    • (2014) Cybercriminal Underground Economy Series
    • Goncharov, M.1
  • 18
    • 0037997806 scopus 로고    scopus 로고
    • The role of consumers’ trust in online-shopping
    • Grahner-Kraueter, Sonja. “The role of consumers’ trust in online-shopping.” Journal of Business Ethics 39 (2002): 43–50.
    • (2002) Journal of Business Ethics , vol.39 , pp. 43-50
    • Grahner-Kraueter, S.1
  • 19
    • 33745056767 scopus 로고    scopus 로고
    • The Role of Reputation Systems in Reducing On-Line Auction Fraud
    • Gregg, Dawn G., and Judy E. Scott. “The Role of Reputation Systems in Reducing On-Line Auction Fraud.” International Journal of Electronic Commerce 10 (2006): 95–120. doi:10.2753/JEC1086-4415100304.
    • (2006) International Journal of Electronic Commerce , vol.10 , pp. 95-120
    • Gregg, D.G.1    Scott, J.E.2
  • 20
    • 84870423433 scopus 로고    scopus 로고
    • Dealing with a Gendered Economy: Female Drug Dealers and Street Capital
    • Grundetjern, Heidi, and Sveinung Sandberg. “Dealing with a Gendered Economy: Female Drug Dealers and Street Capital.” European Journal of Criminology 9, no. 6 (2012): 621–635. doi:10.1177/1477370812453103.
    • (2012) European Journal of Criminology , vol.9 , Issue.6 , pp. 621-635
    • Grundetjern, H.1    Sandberg, S.2
  • 21
    • 33748144568 scopus 로고    scopus 로고
    • Drug Dealing in Open-Air Markets
    • Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services
    • Harocopos, Alex, and Mike Hough. “Drug Dealing in Open-Air Markets.” In Problem Oriented Guides for Police: Response Guide Series (31). Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services, 2005.
    • (2005) Problem Oriented Guides for Police: Response Guide Series (31)
    • Harocopos, A.1    Hough, M.2
  • 22
    • 81255149250 scopus 로고    scopus 로고
    • Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy
    • Moore Tyler, Pym David J., Ionnidis Christos, (eds), New York: Springer
    • Herley, Cormac, Dinei Florencio. “Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy.” In Economics of Information Security and Privacy, edited by Tyler Moore, David J. Pym, and Christos Ionnidis, 35–53. New York: Springer, 2010.
    • (2010) Economics of Information Security and Privacy , pp. 35-53
    • Herley, C.1    Florencio, D.2
  • 23
    • 84926524513 scopus 로고    scopus 로고
    • Target, Neiman Marcus Data Breaches Tip of the Iceberg
    • January
    • Higgins, Kelly J. 2014. “Target, Neiman Marcus Data Breaches Tip of the Iceberg.” Dark Reading, January13. http://www.darkreading.com/attacks-breaches/target-neiman-marcus-data-breaches-tip-o/240165363
    • (2014) Dark Reading
    • Higgins, K.J.1
  • 24
    • 84874510393 scopus 로고    scopus 로고
    • Examining the Forces Shaping Cybercrime Markets Online
    • Holt, Thomas J. “Examining the Forces Shaping Cybercrime Markets Online.” Social Science Computer Review 31, no. 2 (2013a): 165–177. doi:10.1177/0894439312452998.
    • (2013) Social Science Computer Review , vol.31 , Issue.2 , pp. 165-177
    • Holt, T.J.1
  • 25
    • 77958509140 scopus 로고    scopus 로고
    • Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-line Data
    • Holt, Thomas J. “Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-line Data.” Journal of Criminal Justice Education 21, no. 4 (2010): 466–487. doi:10.1080/10511253.2010.516565.
    • (2010) Journal of Criminal Justice Education , vol.21 , Issue.4 , pp. 466-487
    • Holt, T.J.1
  • 26
    • 84879724936 scopus 로고    scopus 로고
    • Exploring the Social Organisation and Structure of Stolen Data Markets
    • Holt, Thomas J. “Exploring the Social Organisation and Structure of Stolen Data Markets.” Global Crime 14, no. 2–3 (2013b): 155–174. doi:10.1080/17440572.2013.787925.
    • (2013) Global Crime , vol.14 , Issue.2-3 , pp. 155-174
    • Holt, T.J.1
  • 27
    • 84885115078 scopus 로고    scopus 로고
    • An Assessment of the Current State of Cybercrime Scholarship
    • Holt, Thomas J., and Adam M. Bossler. “An Assessment of the Current State of Cybercrime Scholarship.” Deviant Behavior 35, no. 1 (2014): 20–40. doi:10.1080/01639625.2013.822209.
    • (2014) Deviant Behavior , vol.35 , Issue.1 , pp. 20-40
    • Holt, T.J.1    Bossler, A.M.2
  • 28
    • 77949555353 scopus 로고    scopus 로고
    • Exploring Stolen Data Markets On-line: Products and Market Forces
    • Holt, Thomas J., and Eric Lampke. “Exploring Stolen Data Markets On-line: Products and Market Forces.” Criminal Justice Studies 23, no. 1 (2010): 33–50. doi:10.1080/14786011003634415.
    • (2010) Criminal Justice Studies , vol.23 , Issue.1 , pp. 33-50
    • Holt, T.J.1    Lampke, E.2
  • 29
    • 84900812458 scopus 로고    scopus 로고
    • An Exploration of the Factors Affecting the Advertised Price for Stolen Data
    • Holt, Thomas J., Chua Yi-Ting, and Smirnova Olga. “An Exploration of the Factors Affecting the Advertised Price for Stolen Data.” Ecrime Researchers Summit (eCRS) (2013): 1–10. doi:10.1109/eCRS.2013.6805781.
    • (2013) Ecrime Researchers Summit (eCRS) , pp. 1-10
    • Holt, T.J.1    Yi-Ting, C.2    Olga, S.3
  • 30
    • 84894283055 scopus 로고    scopus 로고
    • Examining Diffusion and Arrest Avoidance Practices among Johns
    • Holt, Thomas J., Kristie R. Blevins, and Joseph B. Kuhns. “Examining Diffusion and Arrest Avoidance Practices among Johns.” Crime and Delinquency 60, no. 2 (2014): 261–283. doi:10.1177/0011128709347087.
    • (2014) Crime and Delinquency , vol.60 , Issue.2 , pp. 261-283
    • Holt, T.J.1    Blevins, K.R.2    Kuhns, J.B.3
  • 31
    • 0040240444 scopus 로고    scopus 로고
    • Crack Dealers and Restrictive Deterrence: Identifying Narcs
    • Jacobs, Bruce A. “Crack Dealers and Restrictive Deterrence: Identifying Narcs.” Criminology 34, no. 3 (1996b): 409–431. doi:10.1111/j.1745-9125.1996.tb01213.x.
    • (1996) Criminology , vol.34 , Issue.3 , pp. 409-431
    • Jacobs, B.A.1
  • 32
    • 84993028917 scopus 로고    scopus 로고
    • Crack Dealers Apprehension Avoidance Techniques: A Case of Restrictive Deterrence
    • Jacobs, Bruce A. “Crack Dealers Apprehension Avoidance Techniques: A Case of Restrictive Deterrence.” Justice Quarterly 13, no. 3 (1996a): 359–381. doi:10.1080/07418829600093011.
    • (1996) Justice Quarterly , vol.13 , Issue.3 , pp. 359-381
    • Jacobs, B.A.1
  • 33
    • 77954295697 scopus 로고    scopus 로고
    • Deterrence and Deterrability
    • Jacobs, Bruce A. “Deterrence and Deterrability.” Criminology 48, no. 2 (2010): 417–441. doi:10.1111/j.1745-9125.2010.00191.x.
    • (2010) Criminology , vol.48 , Issue.2 , pp. 417-441
    • Jacobs, B.A.1
  • 35
    • 21144459619 scopus 로고
    • Undercover Deception Clues: A Case of Restrictive Deterrence
    • Jacobs, Bruce A. “Undercover Deception Clues: A Case of Restrictive Deterrence.” Criminology 31, no. 2 (1993): 281–299. doi:10.1111/j.1745-9125.1993.tb01131.x.
    • (1993) Criminology , vol.31 , Issue.2 , pp. 281-299
    • Jacobs, B.A.1
  • 36
    • 0347177751 scopus 로고    scopus 로고
    • Managing Retaliation: Drug Robbery and Informal Sanction Threats
    • Jacobs, Bruce A., Volkan Topalli, and Richard Wright. “Managing Retaliation: Drug Robbery and Informal Sanction Threats.” Criminology 38, no. 1 (2000): 171–198. doi:10.1111/j.1745-9125.2000.tb00887.x.
    • (2000) Criminology , vol.38 , Issue.1 , pp. 171-198
    • Jacobs, B.A.1    Topalli, V.2    Wright, R.3
  • 37
    • 84879624327 scopus 로고    scopus 로고
    • How Victimized Drug Traders Mobilize Police
    • Jacques, Scott, and Richard Wright. “How Victimized Drug Traders Mobilize Police.” Journal of Contemporary Ethnography 42, no. 5 (2013): 545–575. doi:10.1177/0891241612472057.
    • (2013) Journal of Contemporary Ethnography , vol.42 , Issue.5 , pp. 545-575
    • Jacques, S.1    Wright, R.2
  • 38
    • 0040236270 scopus 로고
    • Strategies to Avoid Arrest: Crack Sellers’ Response to Intensified Policing
    • Johnson, Bruce D., and Mangai Natarajan. “Strategies to Avoid Arrest: Crack Sellers’ Response to Intensified Policing.” American Journal of Police 14, no. 3/4 (1995): 49–69. doi:10.1108/07358549510111947.
    • (1995) American Journal of Police , vol.14 , Issue.3-4 , pp. 49-69
    • Johnson, B.D.1    Natarajan, M.2
  • 39
    • 0043137654 scopus 로고    scopus 로고
    • Deception, Detection, and Evasion: A Trade Craft Analysis of Honolulu, Hawaii’s Street Crack-Cocaine Traffickers
    • Knowles, Gordon J. “Deception, Detection, and Evasion: A Trade Craft Analysis of Honolulu, Hawaii’s Street Crack-Cocaine Traffickers.” Journal of Criminal Justice 27, no. 5 (1999): 443–455. doi:10.1016/S0047-2352(99)00015-X.
    • (1999) Journal of Criminal Justice , vol.27 , Issue.5 , pp. 443-455
    • Knowles, G.J.1
  • 40
    • 0032376197 scopus 로고    scopus 로고
    • Netcrime: More Change in the Organization of Thieving
    • Mann, David, and Mike Sutton. “Netcrime: More Change in the Organization of Thieving.” British Journal of Criminology 38, no. 2 (1998): 201–229. doi:10.1093/oxfordjournals.bjc.a014232.
    • (1998) British Journal of Criminology , vol.38 , Issue.2 , pp. 201-229
    • Mann, D.1    Sutton, M.2
  • 43
    • 78149334726 scopus 로고    scopus 로고
    • Data Breaches: What the Underground World of ‘Carding’ Reveals
    • Peretti, Kimberly K. “Data Breaches: What the Underground World of ‘Carding’ Reveals.” Santa Clara Computer and High Technology Law Journal 25 (2009): 375–413.
    • (2009) Santa Clara Computer and High Technology Law Journal , vol.25 , pp. 375-413
    • Peretti, K.K.1
  • 45
    • 24144457497 scopus 로고    scopus 로고
    • Stolen-goods Markets: Methods of Disposal
    • Schneider, Jacqueline L. “Stolen-goods Markets: Methods of Disposal.” British Journal of Criminology 45, no. 2 (2005): 129–140. doi:10.1093/bjc/azh100.
    • (2005) British Journal of Criminology , vol.45 , Issue.2 , pp. 129-140
    • Schneider, J.L.1
  • 46
    • 27844503291 scopus 로고    scopus 로고
    • Street Prostitution
    • Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice
    • Scott, Michael S., and Kelly Dedel. “Street Prostitution.” In Problem Oriented Policing Guide Series (2). Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice, 2006.
    • (2006) Problem Oriented Policing Guide Series (2)
    • Scott, M.S.1    Dedel, K.2
  • 47
    • 84900831853 scopus 로고    scopus 로고
    • Why Did Criminals Trust Liberty Reserve
    • May
    • Surowiecki, Jason. 2013. “Why Did Criminals Trust Liberty Reserve.” The New Yorker, May31. http://www.newyorker.com/online/blogs/newsdesk/2013/05/why-did-criminals-trust-liberty-reserve.html
    • (2013) The New Yorker
    • Surowiecki, J.1
  • 49
    • 0036249377 scopus 로고    scopus 로고
    • Drug Dealers, Robbery and Retaliation: Vulnerability, Deterrence, and the Contagion of Violence
    • Topalli, Volkan, Richard Wright, and Robert Fornango. “Drug Dealers, Robbery and Retaliation: Vulnerability, Deterrence, and the Contagion of Violence.” British Journal of Criminology 42, no. 2 (2002): 337–351. doi:10.1093/bjc/42.2.337.
    • (2002) British Journal of Criminology , vol.42 , Issue.2 , pp. 337-351
    • Topalli, V.1    Wright, R.2    Fornango, R.3
  • 50
    • 0033476905 scopus 로고    scopus 로고
    • The Motives and Mechanics of Operating an Illegal Drug Enterprise
    • VanNostrand, Lise-Marie, and Richard Tewksbury. “The Motives and Mechanics of Operating an Illegal Drug Enterprise.” Deviant Behavior 20, no. 1 (1999): 57–83. doi:10.1080/016396299266597.
    • (1999) Deviant Behavior , vol.20 , Issue.1 , pp. 57-83
    • VanNostrand, L.-M.1    Tewksbury, R.2
  • 51
    • 81255178753 scopus 로고    scopus 로고
    • The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services
    • Athens: IEEE, September
    • Wehinger, Frank. “The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services.” Intelligence and Security Informatics Conference, Athens, September12–14, 209–213. IEEE, 2011.
    • (2011) Intelligence and Security Informatics Conference , pp. 209-213
    • Wehinger, F.1
  • 54
    • 34247657469 scopus 로고    scopus 로고
    • The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory
    • Yar, Majid. “The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2, no. 4 (2005): 407–427. doi:10.1177/147737080556056.
    • (2005) European Journal of Criminology , vol.2 , Issue.4 , pp. 407-427
    • Yar, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.