1,308
Views
48
CrossRef citations to date
0
Altmetric
Articles

Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets

, &
Pages 353-367 | Received 21 Nov 2014, Accepted 21 Jan 2015, Published online: 10 Feb 2016

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (9)

Rasmus Munksgaard. (2024) Marketness and Governance: A Typology of Illicit Online Markets. Deviant Behavior 0:0, pages 1-18.
Read now
Jin R. Lee, Thomas J. Holt & Olga Smirnova. (2024) An assessment of the state of firearm sales on the Dark Web. Journal of Crime and Justice 47:1, pages 46-60.
Read now
David Buil-Gil & Patricia Saldaña-Taboada. (2022) Offending Concentration on the Internet: An Exploratory Analysis of Bitcoin-related Cybercrime. Deviant Behavior 43:12, pages 1453-1470.
Read now
Claire Seungeun Lee. (2021) Online Fraud Victimization in China: A Case Study of Baidu Tieba. Victims & Offenders 16:3, pages 343-362.
Read now
Thomas S. Hyslip & Thomas J. Holt. (2019) Assessing the Capacity of DRDoS-For-Hire Services in Cybercrime Markets. Deviant Behavior 40:12, pages 1609-1625.
Read now
Jay Kennedy, Thomas Holt & Betty Cheng. (2019) Automotive cybersecurity: assessing a new platform for cybercrime and malicious hacking. Journal of Crime and Justice 42:5, pages 632-645.
Read now
Renushka Madarie, Stijn Ruiter, Wouter Steenbeek & Edward Kleemans. (2019) Stolen account credentials: an empirical comparison of online dissemination on different platforms. Journal of Crime and Justice 42:5, pages 551-568.
Read now
Thomas J. Holt. (2017) Identifying gaps in the research literature on illicit markets on-line. Global Crime 18:1, pages 1-10.
Read now
Alice Hutchings & Thomas J. Holt. (2017) The online stolen data market: disruption and intervention approaches. Global Crime 18:1, pages 11-30.
Read now

Articles from other publishers (39)

Taisiia Garkava, Asier Moneva & E. Rutger Leukfeldt. (2024) Stolen data markets on Telegram: a crime script analysis and situational crime prevention measures. Trends in Organized Crime.
Crossref
Renushka Madarie, Christianne de Poot & Marleen Weulen Kranenbarg. (2023) Criminal clickbait: a panel data analysis on the attractiveness of online advertisements offering stolen data. Frontiers in Big Data 6.
Crossref
Jin R. Lee. (2023) Understanding markers of trust within the online stolen data market: An examination of vendors’ signaling behaviors relative to product price point. Criminology & Public Policy 22:4, pages 665-693.
Crossref
Vincent Lennard Kraus. 2023. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems 1 32 .
Jordan Brinck, Brooke Nodeland & Scott Belshaw. (2023) The “Yelp-Ification” of the Dark Web: An Exploration of the Use of Consumer Feedback in Dark Web Markets. Journal of Contemporary Criminal Justice 39:2, pages 185-200.
Crossref
Thomas J. Holt & Jin Ree Lee. (2022) A crime script model of Dark web Firearms Purchasing. American Journal of Criminal Justice 48:2, pages 509-529.
Crossref
Thomas J. Holt. (2023) Understanding the state of criminological scholarship on cybercrimes. Computers in Human Behavior 139, pages 107493.
Crossref
Masarah Paquet-Clouston & Sebastián García. (2022) On the motivations and challenges of affiliates involved in cybercrime. Trends in Organized Crime.
Crossref
Le Van Hoang, Nguyen Xuan Nhu, To Trong Nghia, Nguyen Huu Quyen, Van-Hau Pham & Phan The Duy. (2022) Leveraging Deep Reinforcement Learning for Automating Penetration Testing in Reconnaissance and Exploitation Phase. Leveraging Deep Reinforcement Learning for Automating Penetration Testing in Reconnaissance and Exploitation Phase.
Thomas J. Holt, Jin R. Lee & Elizabeth O’Dell. (2022) Assessing the Practices of Online Counterfeit Currency Vendors. Crime & Delinquency, pages 001112872211340.
Crossref
Benoît Dupont & Jonathan Lusthaus. (2021) Countering Distrust in Illicit Online Networks: The Dispute Resolution Strategies of Cybercriminals. Social Science Computer Review 40:4, pages 892-913.
Crossref
Marleen Weulen Kranenbarg. (2022) When do they offend together? Comparing co-offending between different types of cyber-offenses and traditional offenses. Computers in Human Behavior 130, pages 107186.
Crossref
Eric Rutger Leukfeldt & Thomas J. Holt. (2022) Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals. Computers in Human Behavior 126, pages 106979.
Crossref
Julia Busch-Casler & Marija Radic. 2022. Research Challenges in Information Science. Research Challenges in Information Science 3 19 .
Antragama Ewa Abbas, Wirawan Agahari, Montijn van de Ven, Anneke Zuiderwijk & Mark de Reuver. (2021) Business Data Sharing through Data Marketplaces: A Systematic Literature Review. Journal of Theoretical and Applied Electronic Commerce Research 16:7, pages 3321-3339.
Crossref
Vit Sembera, Masarah Paquet-Clouston, Sebastian Garcia & Maria Jose Erquiaga. (2021) Cybercrime Specialization: An Exposé of a Malicious Android Obfuscation-as-a-Service. Cybercrime Specialization: An Exposé of a Malicious Android Obfuscation-as-a-Service.
Peter Kieseberg, Sebastian Schrittwieser & Edgar Weippl. (2021) Secure Internal Data Markets. Future Internet 13:8, pages 208.
Crossref
Ben R. Lane, Paul M. Salmon, Dennis Desmond, Adrian Cherney, Adam Carley, Adam Hulme & Neville A. Stanton. (2020) Out of control? Using STAMP to model the control and feedback mechanisms surrounding identity crime in darknet marketplaces. Applied Ergonomics 89, pages 103223.
Crossref
Saiba Nazah, Shamsul Huda, Jemal Abawajy & Mohammad Mehedi Hassan. (2020) Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach. IEEE Access 8, pages 171796-171819.
Crossref
Felipe Thomaz, Carolina Salge, Elena Karahanna & John Hulland. (2019) Learning from the Dark Web: leveraging conversational agents in the era of hyper-privacy to enhance marketing. Journal of the Academy of Marketing Science 48:1, pages 43-63.
Crossref
E. R. (Rutger) Leukfeldt, E. W. (Edwin) Kruisbergen, E. R. (Edward) Kleemans & R. A. (Robert) Roks. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 961 980 .
Ramakrishna Ayyagari. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 939 959 .
Thomas S. Hyslip. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 815 846 .
Marleen Weulen Kranenbarg. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 771 792 .
Kyung-Shick Choi, Claire S. Lee & Eric R. Louderback. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 27 43 .
Sergio Pastrana, Alice Hutchings, Daniel Thomas & Juan Tapiador. (2019) Measuring eWhoring. Measuring eWhoring.
Bradford W. Reyns, Bonnie S. Fisher, Adam M. Bossler & Thomas J. Holt. (2018) Opportunity and Self-Control: Do they Predict Multiple Forms of Online Victimization?. American Journal of Criminal Justice 44:1, pages 63-82.
Crossref
E. R. (Rutger) Leukfeldt, E. W. (Edwin) Kruisbergen, E. R. (Edward) Kleemans & R. A. (Robert) Roks. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 20 .
Ramakrishna Ayyagari. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 21 .
Thomas S. Hyslip. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 33 .
Marleen Weulen Kranenbarg. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 22 .
Kyung-Shick Choi, Claire S. Lee & Eric R. Louderback. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 17 .
Russell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David MaimonRussell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David Maimon. 2019. Cybercrime Prevention. Cybercrime Prevention 1 14 .
Tarmo Kalvet, Marek Tiits & Pille Ubakivi-Hadachi. 2019. Electronic Governance and Open Society: Challenges in Eurasia. Electronic Governance and Open Society: Challenges in Eurasia 67 81 .
Olga Smirnova & Thomas J. Holt. (2017) Examining the Geographic Distribution of Victim Nations in Stolen Data Markets. American Behavioral Scientist 61:11, pages 1403-1426.
Crossref
Benoît Dupont, Anne-Marie Côté, Jean-Ian Boutin & José Fernandez. (2017) Darkode: Recruitment Patterns and Transactional Features of “the Most Dangerous Cybercrime Forum in the World”. American Behavioral Scientist 61:11, pages 1219-1243.
Crossref
Mitch Macdonald & Richard Frank. (2017) Shuffle Up and Deal: Use of a Capture–Recapture Method to Estimate the Size of Stolen Data Markets. American Behavioral Scientist 61:11, pages 1313-1340.
Crossref
Laviniu Bojor. (2017) Security and Privacy in Smart Devices Era. International conference KNOWLEDGE-BASED ORGANIZATION 23:1, pages 44-52.
Crossref
Cameron H. Malin, Terry Gudaitis, Thomas J. Holt & Max Kilger. 2017. Deception in the Digital Age. Deception in the Digital Age 125 148 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.