2,482
Views
67
CrossRef citations to date
0
Altmetric
Articles

Trust among cybercriminals? Carding forums, uncertainty and implications for policing

, &
Pages 516-539 | Received 18 Dec 2012, Accepted 12 Jan 2013, Published online: 08 Apr 2013

References

  • Akerlof, G., 1970. The market for “Lemons”: quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84 (3), 488–500. 10.2307/1879431
  • Arndt, J., 1979. Toward a concept of domesticated markets. Journal of Marketing, 43 (4), 69–75. 10.2307/1250272
  • Ashforth, B. and Mael, F., 1989. Social identity theory and the organization. The Academy of Management Review, 14 (1), 20–39.
  • Bourdieu, P., 1986. The forms of capital. In: J. Richardson, eds. Handbook of theory and research for the sociology of education. New York: Greenwood, 241–258.
  • Brenner, S., 2002. Organized cybercrime? How cyberspace may affect the structure of criminal relationships. North Carolina Journal of Law & Technology, 41 (1984), 1–50.
  • Brynjolfsson, E., Malone, T. and Gurbaxani, V., 1988. Markets, hierarchies and the impact of information technology. MIT Center for Coordination Science Technical Report106. http://econpapers.repec.org/paper/mitsloanp/2229.htm [Accessed 11 March 2013].
  • Burt, R.S., 2000. The network structure of social capital. In R.I. Sutton and B. M. Staw, eds. Research in organizational behavior, vol. 22, Elsevier Science JAI, 345–423. Available from: http://www.sciencedirect.com/science/article/pii/S0191308500220091 [Accessed 10 Dec 2012]
  • Carley, K., 2006. Destabilization of covert networks. Computational & Mathematical Organization Theory, 12 (1), 51–66. 10.1007/s10588-006-7083-y
  • Carley, K.M., Lee, J. and Krackhardt, D., 2002. Destabilising networks. Connections, 24 (3), 79–92.
  • Chiles, T.H. and McMackin, J.F., 1996. Integrating variable risk preferences, trust, and transaction cost economics. The Academy of Management Review, 21 (1), 73–99.
  • Cohen, A., 1977. The concept of criminal organisation. British Journal of Criminology, 17, 97–111.
  • Coleman, J.S., 1988. Social capital in the creation of human capital. American Journal of Sociology, 94, 95–120. 10.1086/228943
  • Dasgupta, P., 2000. Trust as a commodity. In: D. Gambetta, ed. Trust: making and breaking cooperative relations. Oxford: Department of Sociology, University of Oxford, 49–72.
  • Douceur, J.R., 2002. The Sybil attack. In: Revised papers from the first international workshop on peer-to-peer systems. London: Springer-Verlag, 251–260.
  • F.B.I., 2012. Manhattan U.S. Attorney and FBI Assistant Director in Charge Announce 24 Arrests in Eight Countries as Part of International Cyber Crime Takedown [online]. Available from: http://www.fbi.gov/newyork/press-releases/2012/manhattan-u.s.-attorney-and-fbi-assistant-director-in-charge-announce-24-arrests-in-eight-countries-as-part-of-international-cyber-crime-takedown [Accessed 23 Jan 2013].
  • Fehr, E., Fischbacher, U. and Gächter, S., 2002. Strong reciprocity, human cooperation, and the enforcement of social norms. Human Nature, 13 (1), 1–25. 10.1007/s12110-002-1012-7
  • Franklin, J., et al. 2007. An inquiry into the nature and causes of the wealth of internet miscreants. In: Proceedings of the 14th ACM conference on computer and communications security. New York: ACM, 375–388.
  • Gambetta, D., 2000. In: D. Gambetta, ed. Trust: making and breaking cooperative relations. Oxford: Department of Sociology, University of Oxford, 213–237.. Can we trust trust?
  • Gambetta, D., 2008. Trust's odd ways. In: J. Elster, O. Gjelsvik, A. Hylland and K. Moene, eds. Understanding choice, explaining behaviour: essays in honour of Ole-Jørgen Skog. Oslo: Unipub Forlag/Oslo Academic Press, 81–100.
  • Giddens, A., 1984. The constitution of society. Cambridge: Polity.
  • Glenny, M., 2011. Darkmarket: Cyberthieves, cybercops and You. London: The Bodley Head.
  • Grabowski, M. and Roberts, K.H., 1999. Risk mitigation in virtual organizations. Organization Science, 10 (6), 704–721. 10.1287/orsc.10.6.704
  • Granovetter, M., 1973. The strength of weak ties. The American Journal of Sociology, 78, 1360–1380. 10.1086/225469
  • Granovetter, M., 1985. Economic action and social structure: the problem of embeddedness. American Journal of Sociology, 91 (3), 481–510.
  • Grow, B. and Bush, J., 2005. Hacker Hunters [online]. Bloomberg Business Week Magazine. Available from: http://www.businessweek.com/stories/2005-05-29/hacker-hunters [Accessed 23 Jan 2013].
  • Hardin, R., 1996. Trustworthiness. Ethics, 107 (1), 26–42. 10.1086/233695
  • Herley, C. and Florêncio, D., 2010. Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground cconomy. In: T. Moore, D. Pym and C. Ioannidis, eds. Economics of information security and privacy. , US: Springer, 33–53. Available from: http://link.springer.com/chapter/10.1007%2F978-1-4419-6967-5_3# [Accessed 10 Dec 2012]
  • HM Government, 2010. The national security strategy. London: Her Majesty's Stationary Office.
  • Hobbs, D., 2001. The firm: organizational logic and criminal culture on a shifting terrain. British Journal of Criminology, 41, 549–560. 10.1093/bjc/41.4.549
  • Holt, T.J., 2010. Examining the role of technology in the formation of deviant subcultures. Social Science Computer Review, 28 (4), 466–481. 10.1177/0894439309351344
  • Holt, T.J. and Lampke, E., 2010. Exploring stolen data markets online: products and market forces. Criminal Justice Studies, 23 (1), 33–50. 10.1080/14786011003634415
  • IC3, 2012. IC3 2011 Internet Crime Report [online]. Available from: http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf [Accessed 29 January 2013].
  • Jarvenpaa, S.L. and Leidner, D.E., 1999. Communication and trust in global virtual teams. Organization Science, 10 (6), 791–815. 10.1287/orsc.10.6.791
  • Jones, C., Hesterly, W.S. and Borgatti, S.P., 1997. A general theory of network governance: exchange conditions and social mechanisms. The Academy of Management Review, 22 (4), 911–945.
  • Kenney, M., 2007. The architecture of drug trafficking: network forms of organisation in the Colombian cocaine trade. Global Crime, 8 (3), 233–259. 10.1080/17440570701507794
  • Khodyakov, D., 2007. Trust as a process. Sociology, 41 (1), 115–132. 10.1177/0038038507072285
  • Levi, M., 2008. Organized fraud and organizing frauds. Criminology and Criminal Justice, 8 (4), 389–419. 10.1177/1748895808096470
  • Lewis, J.D. and Weigert, A., 1985. Trust as a social reality. Social Forces, 63 (4), 967–985.
  • Lo, T.W., 2010. Beyond social capital: triad organized crime in Hong Kong and China. British Journal of Criminology, 50 (5), 851–872. 10.1093/bjc/azq022
  • Luhmann, N., 2000. Familiarity, confidence, trust: problems and alternatives. In: D. Gambetta, ed. Trust: making and breaking cooperative relations. Oxford: Department of Sociology, University of Oxford, 94–107.
  • Lusthaus, J., 2012. Trust in the world of cybercrime. Global Crime, 13 (2), 71–94. 10.1080/17440572.2012.674183
  • Mann, D. and Sutton, M., 1998. NETCRIME: more change in the organization of thieving. British Journal of Criminology, 38 (2), 201–229. 10.1093/oxfordjournals.bjc.a014232
  • McCarthy, B. and Hagan, J., 1995. Getting into street crime: the structure and process of criminal embeddedness. Social Science Research, 24 (1), 63–95. 10.1006/ssre.1995.1003
  • McCarthy, B. and Hagan, J., 2001. When crime pays: capital, competence, and criminal success. Social Forces, 79 (3), 1035–1060. 10.1353/sof.2001.0027
  • McCarthy, B., Hagan, J. and Cohen, L.E., 1998. Uncertainty, cooperation, and crime: understanding the decision to co-offend. Social Forces, 77 (1), 155–184.
  • McIllwain, J.S., 1999. Organized crime: a social network approach. Crime, Law and Social Change, 32 (4), 301–323. 10.1023/A:1008354713842
  • McKnight, D.H., Cummings, L.L. and Chervany, N.L., 1998. Initial trust formation in new organizational relationships. The Academy of Management Review, 23 (3), 473–490.
  • Möllering, G., 2001. The nature of trust: from Georg Simmel to a theory of expectation, interpretation and suspension. Sociology, 35 (2), 403–420.
  • Moore, T., Clayton, R. and Anderson, R., 2009. The economics of online crime. Journal of Economic Perspectives, 23 (3), 3–20.
  • Morselli, C., 2001. Structuring Mr. Nice: entrepreneurial opportunities and brokerage positioning in the cannabis trade. Crime, Law and Social Change, 35 (3), 203–244. 10.1023/A:1011272411727
  • Morselli, C. and Petit, K., 2007. Law-enforcement disruption of a drug importation network. Global Crime, 8 (2), 109–130. 10.1080/17440570701362208
  • Pearson, G. and Hobbs, D., 2003. King Pin? A case study of a middle market drug broker. The Howard Journal of Criminal Justice, 42 (4), 335–347. 10.1111/1468-2311.00290
  • Peretti, K.K., 2008. Data breaches: what the underground world of “carding” reveals’. Santa Clara Computer and High Technology Journal, 25, 375–414.
  • Portes, A., 1998. Social capital: its origins and applications in modern sociology. Annual Review of Sociology, 24 (1), 1–24. 10.1146/annurev.soc.24.1.1
  • Poulsen, K., 2011. Kingpin: how one hacker took over the billion-dollar cybercrime underground. New York: Crown Publishing.
  • Powell, W.W., 1990. Neither market nor hierarchy: network forms of organization. Research in Organizational Behavior, 12 (1), 295–336.
  • PwC, 2012. UK information security breaches survey [online]. Available from: http://www.pwc.co.uk/audit-assurance/publications/uk-information-security-breaches-survey-results-2012.jhtml [Accessed 29 January 2013].
  • Sandywell, B., 2010. On the globalisation of crime: the internet and new criminality. In: Y. Jewkes and M. Yar, eds. Handbook of internet crime. Devon: Willan Publishing, 38–66.
  • Tajfel, H., 1982. Social psychology of intergroup relations. Annual Review of Psychology, 33 (1), 1–39. 10.1146/annurev.ps.33.020182.000245
  • Thomas, R. and Martin, J., 2006. The underground economy: priceless. The USENIX Magazine, 31 (6), 7–16.
  • Thorelli, H.B., 1986. Networks: between markets and hierarchies. Strategic Management Journal, 7 (1), 37–51. 10.1002/smj.4250070105
  • Tsai, W., 2002. Social structure of “coopetition” within a multiunit organization: coordination, competition, and intraorganizational knowledge sharing. Organization Science, 13 (2), 179–190. 10.1287/orsc.13.2.179.536
  • U.S. District Court, 2004. Operation firewall indictment. U.S. District Court, District of New Jersey [online]. Available from: http://www.justice.gov/usao/nj/press/files/pdffiles/firewallindct1028.pdf [Accessed 31 January 2010].
  • Uzzi, B., 1997. Social structure and competition in interfirm networks: the paradox of embeddedness. Administrative Science Quarterly, 42 (1), 35–67. 10.2307/2393808
  • Van Calster, P., 2006. Re-visiting Mr. Nice. On organized crime as conversational interaction. Crime, Law and Social Change, 45 (4), 337–359. 10.1007/s10611-006-9038-0
  • von Lampe, K., 2003. Criminally exploitable ties: a network approach to organized crime. In: E. Viano, J. Magallones and L. Bridel, eds. Transnational Organized crime: myth, power, and profit. Durham, NC: Carolina Academic Press, 9–22.
  • von Lampe, K. and Johansen, P., 2004a. Criminal networks and trust. On the importance of expectations of loyal behaviour in criminal relations. In: S. Nevala and K. Aromaa, eds. . The 3rd annual meeting of the European Society of Criminology (ESC), 29 August 2003, Helsinki, Finland, 102–113.
  • von Lampe, K. and Johansen, P., 2004b. Organized crime and trust: on the conceptualization and empirical relevance of trust in the context of criminal networks. Global Crime, 6 (2), 159–184. 10.1080/17440570500096734
  • Wall, D.S., 2008. Cybercrime: the transformation of crime in the information age. Malden: Polity Press.
  • Wall, D.S. and Williams, M., 2007. Policing diversity in the digital age. Criminology and Criminal Justice, 7 (4), 391–415. 10.1177/1748895807082064
  • Walther, J.B., 1995. Relational aspects of computer-mediated communication: experimental observations over time. Organization Science, 6 (2), 186–203. 10.1287/orsc.6.2.186
  • Walther, J.B., 1996. Computer-mediated communication: impersonal, interpersonal, and hyperpersonal interaction’. Communication Research, 23 (1), 3–43. 10.1177/009365096023001001
  • Wasserman, S. and Faust, K., 1994. Social network analysis: methods and applications (structural analysis in the social sciences). Cambridge: Cambridge University Press.
  • Webber, C. and Yip, M., 2013. Drifting on and off-line: humanising the cybercriminal. In: S. Winlow and R. Atkinson, eds. Future directions in crime and deviancy: proceedings of the York deviancy conference. Abington: Routledge, 191–205.
  • Weerman, F.M., 2003. Co-offending as social exchange. explaining characteristics of co-offending. British Journal of Criminology, 43 (2), 398–416. 10.1093/bjc/43.2.398
  • Williams, M., 2007. Policing and cybersociety: the maturation of regulation within an online community. Policing and Society, 17 (1), 59–82. 10.1080/10439460601124858
  • Williams, P., 1998. The nature of drug-trafficking networks. Current History, 97 (618), 154–159.
  • Williamson, O.E., 1979. Transaction-cost economics: the governance of contractual relations. Journal of Law and Economics, 22 (2), 233–261. 10.1086/466942
  • Williamson, O.E., 1991. Comparative economic organization: the analysis of discrete structural alternatives. Administrative Science Quarterly, 36 (2), 269–296. 10.2307/2393356
  • Williamson, O.E., 1993. Calculativeness, trust, and economic organization. Journal of Law and Economics, 36 (1), 453–486. 10.1086/467284
  • Yip, M., 2011. An investigation into chinese cybercrime and the applicability of social network analysis. In: ACM Web science conference 2011, 14–17 June 2011. Koblenz.
  • Yip, M., Shadbolt, N. and Webber, C., 2012a. Structural analysis of online criminal social networks. In: D. Zeng, L. Zhou, B. Cukic, G. Wang, and C. Yang, eds. . IEEE international conference on intelligence and security informatics (ISI) 2012, 11–14 June, Washington, DC. Piscataway: IEEE, 60–65.
  • Yip, M., Shadbolt, N., Tiropanis, T. and Webber, C., 2012b. The digital underground economy: a social network approach to understanding cybercrime. In: Digital futures 2012: The third annual digital economy all hands conference 23–25 October, Aberdeen.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.