1,200
Views
42
CrossRef citations to date
0
Altmetric

References

  • Abbasi, A., and Chen, H. CyberGate: A design framework and system for text analysis of computer-mediated communication. MIS Quarterly, 32, 4 (2008), 811–837.
  • Abbasi, A.; Li, W.; Benjamin, V.; Hu, S.; and Chen, H. (2014). Descriptive analytics: investigating expert cybercriminals in web forums. Proceedings of the IEEE Joint Intelligence and Security Informatics Conference. The Hague, September 24–26, 2014, pp. 55–63.
  • Balahur, A.; Hermida, J.M.; Montoyo, A. Detecting implicit expressions of emotion in text: a comparative analysis. Decision Support Systems, 53, 4 (2010), 742–753.
  • Benjamin, V., and Chen, H. Securing cyberspace : Identifying key actors in cybercriminal communities. Proceedings of the IEEE Joint Intelligence and Security Informatics Conference. Washington, DC, June 11–14, 2012, pp. 24–29.
  • Benjamin, V., and Chen, H. Time-to-event modeling for predicting hacker IRC community participant trajectory. Proceedings of the IEEE Joint Intelligence and Security Informatics Conference. The Hague, September 24–26, 2014, pp. 25–32.
  • Bewick, V.; Cheek, L.; and Ball, J. Statistics review 12: Survival analysis. Critical Care, 8, 5 (2004), 389–394.
  • Cox, D.R. Regression models and life-tables. Journal of the Royal Statistical Society. Series B (Methodological), 34, 2 (1972), 187–220.
  • Cremonini, M., and Nizovtsev, D. Risks and benefits of signaling information system characteristics to strategic attackers. Journal of Management Information Systems, 26, 3 (2009), 241–274.
  • Dey, D.; Atanu, L.; Guoying, Z. Hacker behavior, network effects, and the security software market. Journal of Management Information Systems, 29, 2 (2012), 77–108.
  • Fallman, H.; Wondracek, G.; and Platzer, C. Covertly probing underground economy marketplaces. Proceedings of the Seventh International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Bonn, July 8–9, 2010, pp. 101–110.
  • Freeman, L.C. Centrality in social networks conceptual clarification. Social Networks, 1, 3 (1979), 215–239.
  • Garas, A.; Garcia, D.; Skowron, M.; and Schweitzer, F. Emotional persistence in online chatting communities. Scientific Reports, 2 (2012), 1–34.
  • Goel, S. Cyberwarfare: Connecting the dots in cyber intelligence. Communications of the ACM, 54, 8 (2011), 132–140.
  • Holt, T.J. Examining the forces shaping cybercrime markets online. Social Science Computer Review, 31, 2 (2013), 165–177.
  • Holt, T.J., and Kilger, M. Know your enemy: The social dynamics of hacking. Honeynet Project (2012), 1–17.
  • Holt, T.J., and Lampke, E. Exploring stolen data markets online: products and market forces. Criminal Justice Studies: A Critical Journal of Crime, Law, and Society, 23, 1 (2010), 33–50.
  • Holt, T.J.; Strumsky, D.; Smirnova, O.; and Kilger, M. Examining the social networks of malware writers and cybercriminals. International Journal of Cyber Criminology, 6, 1 (2012), 891–903.
  • Jones, S. (Ed.). Internet Relay Chat. Encyclopedia of New Media: An Essential Reference to Communication and Technology. New York, NY: Sage, 2002, p. 257.
  • Kalbfleisch, J.D., and Prentice, R.L. The Statistical Analysis of Failure Time Data. 2nd ed. Hoboken, NJ: Wiley-Interscience, 2002.
  • Lee, G., and Santanam, R. Determinants of mobile apps’ success: evidence from the App Store market. Journal of Management Information Systems, 31, 2 (2014), 133–170.
  • Lin, Y.-K.; Chen, H.; Brown, R.A.; Li, S.-H.; and Yang, H.-J. Time-to-event predictive modeling for chronic conditions using electronic health records. IEEE Intelligent Systems, 29, 3 (2014), 14–20.
  • Liu, X., and Chen, H. AZDrugMiner: An information extraction system for mining patient-reported adverse drug events. In Zeng, D., Yang, C.C., Tseng, V.S., Xing, C., Chen, H., Wang, F.-Y., and Zheng, X. (Eds.), Smart Health. Berlin: Springer, 2013, pp. 134–150.
  • Martin, J. Lost on the Silk Road: Online drug distribution and the “cryptomarket.” Criminology and Criminal Justice, 14, 3 (2013), 351–367.
  • Mahmood, A.M.; Siponen, M.; Straub, D.; Rao, H.R.; and Raghu, T.S. Moving toward black hat research in information systems security: An editorial introduction to the special issue. MIS Quarterly, 34, 3 (2010), 431–433.
  • Motoyama, M.; McCoy, D.; Levchenko, K.; Savage, S.; and Voelker, G.M. An analysis of underground forums. Proceedings of the ACM SIGCOMM Conference on Internet Measurement Conference. Berlin, November 2–4, 2011, pp. 71–80.
  • National Science and Technology Council (NSTC) Trustworthy cyberspace: Strategic plan for the Federal Cybersecurity Research and Development Program. Report of the National Science and Technology Council, Executive Office of the President (2011), 1–19. http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf
  • Radianti, J. A study of a social behavior inside the online black markets. Proceedings of the International Conference on Emerging Security Information, Systems and Technologies. Nice, July 24–28, 2010, pp. 88–92.
  • Sandle, P., and Char, P. Cyber crime costs global economy $445 billion a year: Report. Reuters, 2014. http://www.reuters.com/article/us-cybersecurity-mcafee-csis-idUSKBN0EK0SV20140609 ( accessed on October 10, 2014).
  • Schone, M.; Esposito, R.; Cole, M.; and Greenwald, G. (2014). War on anonymous: British spies attacked cybercriminals, Snowden docs show. NBC News, 2014. www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-cybercriminals-snowden-docs-show-n21361 (accessed on February 6, 2014).
  • Sinha, T., and Rajasingh, I. Investigating substructures in goal oriented online communities: Case study of Ubuntu IRC. Proceedings of the IEEE International Advance Computing Conference (IACC). New Delhi, February 21–22, 2014, pp. 916–922.
  • Wang, H.; Chung, J.E.; Park, N.; McLaughlin, M.L.; and Fulk, J. Understanding online community participation: A technology acceptance perspective. Communication Research, 39, 6 (2011), 781–801.
  • Wang, M.C., and Chang, S.H. Nonparametric estimation of a recurrent survival function. Journal of the American Statistical Association, 94, 445 (1999), 146–153.
  • Wang, Y.; Kraut, R.; and Levine, J.M. To stay or leave? The relationship of emotional and informational support to commitment in online health support groups. Proceedings of the ACM Conference on Computer Supported Cooperative Work. Seattle, WA, February 11–15, 2012, pp. 833–842.
  • Wei, L.J.; Lin, D.Y.; Weissfeld, L. Regression analysis of multivariate incomplete failure time data by modeling marginal distributions. Journal of the American Statistical Association, 84, 408 (1989), 1065–1073.
  • Van Den Berg, G.J. Duration models: Specification, identification, and multiple durations. In J.J. Heckman and E.E. Leamer (Eds.), Handbook of Econometrics, Vol. 5, Chapter 55, 2001 (pp. 3381–3460).
  • Yip, M. An investigation into Chinese cybercrime and the applicability of social network analysis. ACM Web Science Conference. Koblenz, June 14–17, 2011, pp. 1–4.
  • Yip, M.; Shadbolt, N.; and Webber, C. Why forums ? An empirical analysis into the facilitating factors of carding forums. ACM Web Science. Paris, May 2–4, 2013, pp. 453–462.
  • Zhang, D.; Prior, K.; and Levene, M. How long do Wikipedia editors keep active? Proceedings of the Eighth Annual International Symposium on Wikis and Open Collaboration. Linz, August 27–29, 2012, pp. 4–7.
  • Zhang, Q.; Wang, F.-Y.; Zeng, D.; and Wang, T. Understanding crowd-powered search groups: a social network perspective. PloS One, 7, 6 (2012), e39749.
  • Zhao, X.; Ling, X.; Whinston, A.B. Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements. Journal of Management Information Systems, 30, 1 (2013), 123–152.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.