1,308
Views
48
CrossRef citations to date
0
Altmetric
Articles

Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets

, &
Pages 353-367 | Received 21 Nov 2014, Accepted 21 Jan 2015, Published online: 10 Feb 2016

References

  • Cashell, Brian, William D. Jackson, Mark Jickling, and Baird Webel. 2004. The Economic Impact of Cyber-Attacks. Congressional Research Service. Library of Congress.
  • Franklin, Jason, Vern Paxson, Adam Perrig, and Stefan Savage. 2007. “An Inquiry into the Nature and Cause of the Wealth of Internet Miscreants.” Paper presented at CCS07, October 29–November 2, 2007 in Alexandria, VA.
  • Harrell, Erika and Lynn Langton. 2013. Victims of Identity Theft, 2012. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics. Retrieved (http://www.bjs.gov/content/pub/pdf/vit12.pdf).
  • Herley, Cormac and David Florencio. 2010. “Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy.” Pp. 35–53 in Economics of Information Security and Privacy, edited by Tyler Moor, David J. Pym, and C. Ionnidis. New York: Springer.
  • Higgins, Kelly J. 2014. “Target, Neiman Marcus Data Breaches Tip of the Iceberg.” Dark Reading, January 13, 2014. Retrieved February 17, 2014 (http://www.darkreading.com/attacks-breaches/target-neiman-marcus-data-breaches-tip-o/240165363).
  • Holt, Thomas J. 2010. “Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-Line Data.” Journal of Criminal Justice Education 21:300–321.
  • ———. 2013. “Exploring the Social Organization and Structure of Stolen Data Markets.” Global Crime 14:155–174.
  • Holt, Thomas J. and Max Kilger. 2012. “The Social Dynamics of Hacking.” Know Your Enemy Series, The Honeynet Project. Retrieved May 25, 2014 (https://honeynet.org/papers/socialdynamics).
  • Holt, Thomas J. and Eric Lampke. 2010. “Exploring Stolen Data Markets On-Line: Products and Market Forces.” Criminal Justice Studies 23: 33–50.
  • Holt, Thomas J., Olga Smirnova, and Yi-Ting Chua. 2013. “An Exploration of the Factors Affecting the Advertised Price for Stolen Data.” eCrime Researchers Summit (eCRS): 1–10.
  • James, Lance. 2005. Phishing Exposed. Rockland: Syngress.
  • Mann, David and Mike Sutton. 1998. “Netcrime: More Change in the Organization of Thieving.” British Journal of Criminology 38:201–229.
  • Markham, Anne N. 2011. “Internet Research.” Pp. 111–127 in Qualitative Research: Issues of Theory, Method, and Practice, 3rd Edition, edited by David Silverman. Thousand Oaks, CA: SAGE Publications.
  • McAfee. 2014. Net Losses: Estimating the Global Cost of Cybercrime (Economic Impact of Cybercrime II). Center for Strategic and International Studies. McAfee.
  • Moore, Tyler, Richard Clayton, and Ross Anderson. 2009. “The Economics of Online Crime.” Journal of Economic Perspectives 23:3–20.
  • Motoyama, Marti, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker. 2011. “An Analysis of Underground Forums.” IMC’11, 71–79.
  • Newman, Grame and Ronald Clarke. 2003. Superhighway Robbery: Preventing E-Commerce Crime. Cullompton: Willan Press.
  • Pauli, Darren. 2014. “Oz Privacy Comish Says Breaches could be Double This Year.” The Register. October 20, 2014. Retrieved November 1, 2014 (http://www.theregister.co.uk/2014/10/20/2014_a_bumper_year_for_aussie_breaches/).
  • Peretti, Kimberly K. 2009. “Data Breaches: What the Underground World of ‘Carding’ Reveals.” Santa Clara Computer and High Technology Law Journal 25:375–413.
  • Ponemon Institute. 2014. 2013 Cost of Cyber Crime Study: United Kingdom. Traverse City, MI: Author.
  • Schneider, Jacqueline L. 2005. “Stolen-Goods Markets: Methods of Disposal.” British Journal of Criminology 45:129–140.
  • Seals, Tara. 2014. “2014 So Far: The Year of the Data Breach.” Infosecurity Magazine. August 12, 2014. Retrieved August 19, 2014 (http://www.infosecurity-magazine.com/news/2014-the-year-of-the-data-breach/).
  • Symantec Corporation. 2014. Symantec Internet Security Threat Report, Volume 19. Retrieved February 24, 2014 (http://www.symantec.com/threatreport/).
  • Wall, David S. 2001. “Cybercrimes and the Internet.” Pp. 1–17 in Crime and the Internet, edited by David S. Wall. New York: Routledge.
  • Wehinger, Frank. 2011. “The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services.” Intelligence and Security Informatics Conference:209–213.
  • Wright, Richard and Scott H. Decker. 1994. Burglars on the Job: Streetlife and Residential Break-Ins. Boston, MA: Northeastern University Press.
  • Yip, Michael, Craig Webber, and Nigel Shadbolt. 2013. “Trust among Cybercriminals? Carding Forums, Uncertainty, and Implications for Policing.” Policing and Society 23:1–24.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.