References
- Aldridge, Judith and Decary-Hétu. David. 2016. “Cryptomarkets and the Future of Illicit Drug Markets.” The Internet and Drug Markets 21: 23–32.
- Aldridge, Judith and Rebecca Askew. 2017. “Delivery dilemmas: How drug cryptomarket users identify and seek to reduce their risk of detection by law enforcement.” International Journal of Drug Policy 41:101–09. doi: https://doi.org/10.1016/j.drugpo.2016.10.010
- Barratt, Monica J. 2012. “Silk road: ebay for drugs.” Addiction 107 (3):683–683. doi: https://doi.org/10.1111/j.1360-0443.2011.03709.x
- Borrion, Hervé. 2013. “Quality assurance in crime scripting.” Crime Science 2 (1):6. doi: https://doi.org/10.1186/2193-7680-2-6
- Brantingham, Barney. 2007. “The camouflaged passport advantage,” The Independent March , 27.
- Cherbonneau, Michael and Heith Copes. 2006. “‘Drive It like You Stole It’: Auto theft and the illusion of normalcy.” British Journal of Criminology 46 (2):193–211. doi: https://doi.org/10.1093/bjc/azi059
- Chiu, Yi-Ning, Benoit Leclerc, and Michael Townsley. 2011. “Crime script analysis of drug manufacturing in clandestine laboratories: Implications for prevention.”.” The British Journal of Criminology 51 (2):355–74. doi: https://doi.org/10.1093/bjc/azr005
- Copeland, Christopher, Mikaela Wallin, and Thomas J. Holt. 2020. “Assessing the practices and products of darkweb firearm vendors.”Deviant Behavior 41: 949–968.
- Clarke, Ronald V. 1997. Situational Crime Prevention: Successful Case Studies. 2nd Ed. Guilderland, NY: Harrow and Heston.
- Clarke, Ronald V. and Derek B. Cornish. 1985. “Modeling offenders’ decisions: A framework for research and policy.” Crime and Justice 6:147–85. doi: https://doi.org/10.1086/449106
- Cloward, Richard A. and Lloyd E. Ohlin. 1960. Delinquency and Opportunity: A Theory of Delinquent Gangs. Glencoe, IL: Free Press.
- Cohen, Lawrence E. and Marcus Felson. 1979. ““Social change and crime rate trends: A routine activity approach.” American Sociological Review 44 (4):588–608. doi: https://doi.org/10.2307/2094589
- Collier, Ben, Daniel R. Thomas, Richard Clayton, and Alice Hutchings. 2019. “Booting the booters: Evaluating the effects of police interventions in the market for denial-of-service attacks.” In Proceedings of the Internet Measurement Conference 50–64. Amsterdam, NL.
- Congram, Mitchell, Peter Bell, and Mark Lauchs. 2013. Policing Transnational Organized Crime and Corruption: Exploring the Role of Communication Interception Technology. United Kingdom: Palgrave Macmillan.
- Copes, Heith and Michael Cherbonneau. 2006. “The key to auto theft: Emerging methods of auto theft from the offenders’ perspective.” British Journal of Criminology 46 (5):917–34. doi: https://doi.org/10.1093/bjc/azl001
- Cornish, Derek B. 1994. “The procedural analysis of offending and its relevance for situational prevention.” Crime Prevention Studies 3:151–96.
- Décary-Hétu, David, Masarah Paquet-Clouston, and Judith Aldridge. 2016. “Going international? Risk taking by cryptomarket drug vendors.” International Journal of Drug Policy 35:69–76. doi: https://doi.org/10.1016/j.drugpo.2016.06.003
- Ekblom, Paul. 1997. “Gearing up against Crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world.” International Journal of Risk Security and Crime Prevention 2:249–66.
- Ekblom, Paul and Nick Tilley. 2000. “Going Equipped.” British Journal of Criminology 40 (3):376–98. doi: https://doi.org/10.1093/bjc/40.3.376
- Flamand, Claudia and Décary-Hétu. David. 2019. The Open and Dark Web. Pp. 60-80, in The Human Factor of Cybercrime Rutger Leukfeldt and Thomas J. Holt (Eds.). London: Routledge.
- Herley, Cormac and Florêncio. Dinei. 2010. “Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy.” Pp. 33–53 in Economics of Information Security and Privacy. Boston, MA: Springer.
- Holt, Thomas J. 2013. “Examining the Forces Shaping Cybercrime Markets Online.”.” Social Science Computer Review 31 (2):165–77. doi: https://doi.org/10.1177/0894439312452998
- Holt, Thomas J. and Eric Lampke. 2010. ““Exploring stolen data markets online: Products and market forces.” Criminal Justice Studies 23 (1):33–50. doi: https://doi.org/10.1080/14786011003634415
- Holt, Thomas J. and Kristie R. Blevins. 2007. ““Examining sex work from the client’s perspective: Assessing Johns using on-line data.” Deviant Behavior 28 (4):333–54. doi: https://doi.org/10.1080/01639620701233282
- Holt, Thomas J., Olga Smirnova, and Alice Hutchings. 2016. “Examining signals of trust in criminal markets online.” Journal of Cybersecurity 2 (2):137–45.
- Hutchings, Alice and Thomas J. Holt. 2015. “A crime script analysis of the online stolen data market.” British Journal of Criminology 55 (3):596–614.
- Hutchings, Alice and Thomas J. Holt. 2017. “The online stolen data market: Disruption and intervention approaches.” Global Crime 18 (1):11–30. doi: https://doi.org/10.1080/17440572.2016.1197123
- Jacobs, Bruce A. 1996. “Crack Dealers’ apprehension avoidance techniques: A case of restrictive deterrence.” Justice Quarterly 13 (3):359–81. doi: https://doi.org/10.1080/07418829600093011
- Jacobs, Bruce A. and Michael Cherbonneau. 2017. “Nerve management and crime accomplishment.” Journal of Research in Crime and Delinquency 54 (5):617–38. doi: https://doi.org/10.1177/0022427817693037
- Kennedy, Jay P., Cory P. Haberman, and Jeremy M. Wilson. 2018. “Occupational pharmaceutical counterfeiting schemes: A crime scripts analysis.” Victims & Offenders 13 (2):196–214. doi: https://doi.org/10.1080/15564886.2016.1217961
- Lacoste, Julie and Pierre Tremblay. 2003. “Crime and innovation: A script analysis of patterns in check forgery.” Crime Prevention Studies 16:169–96.
- Lavorgna, Anita. 2015. “The online trade in counterfeit pharmaceuticals: New criminal opportunities, trends and challenges.” European Journal of Criminology 12 (2):226–41. doi: https://doi.org/10.1177/1477370814554722
- Leukfeldt, Rutger, Edward Kleemans, and Wouter Stol. 2017. ““The Use of Online Crime Markets by Cybercriminal Networks: A View from Within.”.” American Behavioral Scientist 61 (11):1387–402. doi: https://doi.org/10.1177/0002764217734267
- Lord, Nicholas, Jon Spencer, Elisa Bellotti, and Katie Benson. 2017. “A script analysis of the distribution of counterfeit alcohol across two European jurisdictions.” Trends in Organized Crime 20 (3–4):252–72.
- Mann, David and Mike Sutton. 1998. “NETCRIME: More change in the organization of thieving.” The British Journal of Criminology 38 (2):201–29. doi: https://doi.org/10.1093/oxfordjournals.bjc.a014232
- Martinez, Julia A. and Kenneth J. Sher. 2010. “Methods of “Fake ID” obtainment and use in underage college students.” Addictive Behaviors 35 (7):738–40. doi: https://doi.org/10.1016/j.addbeh.2010.03.014
- Martinez, Julia A., Patricia C. Rutledge, and Kenneth J. Sher. 2007. “Fake ID ownership and heavy drinking in underage college Students: Prospective findings.” Psychology of Addictive Behaviors 21 (2):226–32. doi: https://doi.org/10.1037/0893-164X.21.2.226
- Miller, Jody. 1998. ““Up It Up: Gender and the accomplishment of street robbery.” Criminology 36 (1):37–66. doi: https://doi.org/10.1111/j.1745-9125.1998.tb01239.x
- Moeller, Kim, Rasmus Munksgaard, and Jakob Demant. 2017. “Flow My FE the vendor said: Exploring violent and fraudulent resource exchanges on cryptomarkets for illicit drugs.” American Behavioral Scientist 61 (11):1427–50.
- Morselli, Carlo and Julie Roy. 2008. “Brokerage qualifications in ringing operations.” Criminology 46 (1):71–98. doi: https://doi.org/10.1111/j.1745-9125.2008.00103.x
- Motoyama, Marti, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker. 2011. “An analysis of underground forums.” In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference 71–80. Berlin, Germany.
- Musco, Stefano and Valter Coralluzzo. 2016. “Sneaking under cover: Assessing the relevance of passports for intelligence operations.” International Journal of Intelligence and CounterIntelligence 29 (3):427–46. doi: https://doi.org/10.1080/08850607.2016.1148477
- Natarajan, Mangai, Ronald V. Clarke, and Bruce D. Johnson. 1995. “Telephones as facilitators of drug dealing.” European Journal on Criminal Policy and Research 3 (3):137–53. doi: https://doi.org/10.1007/BF02242934
- Rudner, Martin. 2008. “Misuse of passports: Identity fraud, the propensity to travel, and international terrorism.” Studies in Conflict & Terrorism 31 (2):95–110. doi: https://doi.org/10.1080/10576100701812803
- Sanders, Teela. 2008. “Male sexual scripts: Intimacy, sexuality and pleasure in the purchase of commercial sex.” Sociology 42 (3):400–17. doi: https://doi.org/10.1177/0038038508088833
- Smirnova, Olga and Thomas J. Holt. 2017. “Examining the geographic distribution of victim nations in stolen data markets.” American Behavioral Scientist 61 (11):1403–26.
- Smith, Martha J. 2017. “Expanding the Script Analytic Approach Using Victim Narratives: Learning about Robberies of Taxi Drivers from the Drivers Themselves.” Pp. 77–98 in Crime Prevention in the 21st Century, Benoit Leclerc and Ernesto U Savona (Eds.). Cham: Springer.
- Soska, Kyle and Nicolas Christin. 2015. “Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem.” In 24th {USENIX} Security Symposium 15: 33–48. Washington DC.
- Tompson, Lisa and Spencer Chainey. 2011. “Profiling illegal waste activity: Using crime scripts as a data collection and analytical strategy.” European Journal on Criminal Policy and Research 17 (3):179–201. doi: https://doi.org/10.1007/s10610-011-9146-y
- Tremblay, Pierre, Bernard Talon, and Doug Hurley. 2001. “Body switching and related adaptations in the resale of stolen vehicles. script elaborations and aggregate crime learning curves.” British Journal of Criminology 41 (4):561–79. doi: https://doi.org/10.1093/bjc/41.4.561
- Tzanetakis, Meropi, Gerrit Kamphausen, Bernd Werse, and Roger von Laufenberg. 2015. “The transparency paradox. Building trust, resolving disputes and optimising logistics on conventional and online drugs markets.” International Journal of Drug Policy 35:58–68. doi: https://doi.org/10.1016/j.drugpo.2015.12.010
- van Hardeveld, Gert, Craig Webber Jan, and O’Hara Kieron. 2017. “Deviating from the cybercriminal script: Exploring tools of anonymity (Mis) used by carders on cryptomarkets.” American Behavioral Scientist 61 (11):1244–66. doi: https://doi.org/10.1177/0002764217734271
- VanNostrand, Lise-Marie and Richard Tewksbury. 1999. “The motives and mechanics of operating an illegal drug enterprise.” Deviant Behavior 20 (1):57–83. doi: https://doi.org/10.1080/016396299266597
- Wright, Richard T. and Scott H. Decker. 1994. “Burglars on the Job: Streetlife and Residential Break-ins. ” Boston, MA: Northeastern University Press.
- Wright, Richard T. and Scott H. Decker. 1997. Armed Robbers in Action: Stickups and Street Culture. Boston, MA: Northeastern University Press.