533
Views
9
CrossRef citations to date
0
Altmetric
Research Article

An Assessment of Hitmen and Contracted Violence Providers Operating Online

&
Pages 139-151 | Received 22 Mar 2020, Accepted 14 Jun 2020, Published online: 01 Jul 2020

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Jin R. Lee, Thomas J. Holt & Olga Smirnova. (2024) An assessment of the state of firearm sales on the Dark Web. Journal of Crime and Justice 47:1, pages 46-60.
Read now

Articles from other publishers (7)

Ashok Yadav, Atul Kumar & Vrijendra Singh. (2023) Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security. Artificial Intelligence Review 56:11, pages 12407-12438.
Crossref
Hai Thanh Luong. (2023) Foundations and trends in the darknet-related criminals in the last 10 years: a systematic literature review and bibliometric analysis. Security Journal.
Crossref
C. Jordan Howell, Taylor Fisher, Caitlyn N. Muniz, David Maimon & Yolanda Rotzinger. (2023) A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach. Journal of Contemporary Criminal Justice 39:2, pages 298-317.
Crossref
Jordan Brinck, Brooke Nodeland & Scott Belshaw. (2023) The “Yelp-Ification” of the Dark Web: An Exploration of the Use of Consumer Feedback in Dark Web Markets. Journal of Contemporary Criminal Justice 39:2, pages 185-200.
Crossref
Thomas J. Holt. (2023) Understanding the state of criminological scholarship on cybercrimes. Computers in Human Behavior 139, pages 107493.
Crossref
Vinod Mahor, Romil Rawat, Shrikant Telang, Bhagwati Garg, Debajyoti Mukhopadhyay & Prajyot Palimkar. (2021) Machine Learning based Detection of Cyber Crime Hub Analysis using Twitter Data. Machine Learning based Detection of Cyber Crime Hub Analysis using Twitter Data.
Romil Rawat, Vinod Mahor, Anjali Rawat, Bhagwati Garg & Shrikant Telang. 2021. Handbook of Research on Advancing Cybersecurity for Digital Transformation. Handbook of Research on Advancing Cybersecurity for Digital Transformation 227 243 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.