References
- Abbink, K., & Sadrieh, A. (2009). The pleasure of being nasty. Economics Letters, 105(3), 306–308. doi:10.1016/j.econlet.2009.08.024
- Amoore, L., & Hall, A. (2010). Border theatre: On the arts of security and resistance. Cultural Geographies, 17(3), 299–319. doi:10.1177/1474474010368604
- Association of Internet Researchers. (2012). Ethical decision-making and internet research – recommendations from the AoIR ethics working committee (Version 2.0). Retrieved from http://aoir.org/reports/ethics2.pdf
- Bajc, V. (2007). Surveillance in public rituals: Security meta-ritual and the 2005 U.S. Presidential Inauguration. American Behavioral Scientist, 50(12), 1648–1673. doi:10.1177/0002764207302473
- Bancroft, A., & Scott Reid, P. (2015). Concepts of illicit drug quality among darknet market users: Purity, embodied experience, craft and chemical knowledge. International Journal of Drug Policy, Early Online. doi:10.1016/j.drugpo.2015.11.008
- Barlow, J. P. (1996). A declaration of the independence of cyberspace. Retrieved from http://homes.eff.org/~barlow/Declaration-Final.html
- Barratt, M. J. (2011). Discussing illicit drugs in public internet forums: Visibility, stigma, and pseudonymity. In Proceedings of the 5th International Conference on Communities and Technologies (pp. 159–168). Brisbane: C&T '11. doi:10.1145/2103354.2103376
- Beer, D., & Burrows, R. (2010). Consumption, prosumption and participatory web cultures: An introduction. Journal of Consumer Culture, 10(1), 3–12. doi:10.1177/1469540509354009
- Beer, D., & Burrows, R. (2013). Popular culture, digital archives and the new social life of data. Theory, Culture & Society, 30(4), 47–71. doi:10.1177/0263276413476542
- Branwen, G. (2015). Silk road: Theory & practice. Retrieved from http://www.gwern.net/Silk%20Road
- Çalışkan, E., Minárik, T., & Osula, A.-M. (2015). Technical and legal overview of the tor anonymity network. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.
- Cobb, N. (2007). Governance through publicity: Anti-social behaviour orders, young people, and the problematization of the right to anonymity. Journal of Law and Society, 34(3), 342–373. doi: 10.1111/j.1467-6478.2007.00396.x
- Coleman, E. G., & Golub, A. (2008). Hacker practice: Moral genres and the cultural articulation of liberalism. Anthropological Theory, 8(3), 255–277. doi:10.1177/1463499608093814
- Department of Electronics and Information Technology. (2015). Draft national encryption policy. New Delhi: The Indian Ministry of Communications and Information Technology.
- Duff, C. (2007). Towards a theory of drug use contexts: Space, embodiment and practice. Addiction Research & Theory, 15(5), 503–519. doi: 10.1080/16066350601165448
- Durkheim, E. (1893). De la division du travail social. Paris: Les Presses universitaires de France.
- Flint, J., & Nixon, J. (2006). Governing neighbours: Anti-social behaviour orders and new forms of regulating conduct in the UK. Urban Studies, 43(5–6), 939–955. doi:10.1080/00420980600676386
- Froomkin, A. M. (1999). Legal issues in anonymity and pseudonymity. The Information Society, 15(2), 113–127. doi: 10.1080/019722499128574
- Froomkin, A. M. (2015). From anonymity to identification. Journal of Self-Regulation and Regulation, 1, 121–138.
- Gans, H. (1962). Urban villagers: Group and class in the Life of Italian-Americans. New York, NY: The Free Press.
- Garrett, R. K. (2006). Protest in an information society: A review of literature on social movements and new ICTs. Information, Communication & Society, 9(2), 202–224. doi:10.1080/13691180600630773
- Gilman, N., Goldhammer, J., & Weber, S. (2011). Deviant globalization: Black market economy in the 21st century. London: Bloomsbury Publishing.
- Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. The British Journal of Sociology, 51(4), 605–622. doi:10.1080/00071310020015280
- Hales, T. C. (2014). The NSA Back Door to NIST. Notices of the AMS, 61(2), 190–192.
- Hine, C. (2015). Ethnography for the Internet: Embedded, embodied and everyday. London: Bloomsbury Academic.
- Hobbs, D. (2013). Lush Life: Constructing Organized Crime in the UK. Oxford: Oxford University Press.
- Holt, T. J., Smirnova, O., Chua, Y. T., & Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets. Global Crime, 16(2), 81–103. doi:10.1080/17440572.2015.1013211
- Julian. (2015). Deanonymizing darknet data. Retrieved from http://atechdad.com/deanonymizing-darknet-data/
- Karp, D. A. (1973). Hiding in pornographic bookstores: A reconsideration of the nature of urban anonymity. Urban Life and Culture, 1(4), 427–451.
- Kennedy, H. (2006). Beyond anonymity, or future directions for internet identity research. New Media & Society, 8(6), 859–876. doi:10.1177/1461444806069641
- Lee, A., & Cook, P. S. (2015). The conditions of exposure and immediacy: Internet surveillance and generation Y. Journal of Sociology, 51(3), 674–688. doi:10.1177/1440783314522870
- Loader, I., Goold, B., & Thumala, A. (2015). Grudge spending: The interplay between markets and culture in the purchase of security. The Sociological Review, 63(4), 858–875. doi:10.1111/1467-954X.12329
- Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: consumer and ethical predispositions. Journal of Consumer Marketing, 25(3), 167–178. doi:10.1108/07363760810870662
- Maddox, A., Barratt, M. J., Allen, M., & Lenton, S. (2016). Constructive activism in the dark web: cryptomarkets and illicit drugs in the digital ‘demimonde’. Information, Communication & Society, 19(1), 111–126. doi:10.1080/1369118X.2015.1093531
- Martin, J. (2014). Lost on the silk road: Online drug distribution and the ‘cryptomarket’. Criminology and Criminal Justice, 14(3), 351–367. doi:10.1177/1748895813505234
- Marx, G. T. (1999). What’s in a name? Some reflections on the sociology of anonymity. The Information Society, 15(2), 99–112. doi: 10.1080/019722499128565
- Milgram, S. (1970). The experience of living in cities. Science, 167(3924), 1461–1468. doi: 10.1126/science.167.3924.1461
- Moore, D., & Rid, T. (2016). Cryptopolitik and the darknet. Survival, 58(1), 7–38. doi:10.1080/00396338.2016.1142085
- Natanson, M. (1990). Anonymity: A study in the philosophy of Alfred Schutz. Human Studies, 13(1), 97–101. doi: 10.1007/BF00143042
- O’Brien, J. (2001). Putting a face to a (screen) name: The first amendment implications of compelling ISPs to reveal the identities of anonymous internet speakers in online defamation cases. Fordham Law Review, 70, 2745–2776.
- Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701–1777.
- Pfitzmann, A., & Hansen, M. (2010). Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology. Dresden: TU Dresden, Faculty of Computer Science, Institute of Systems Architecture.
- Reader, B. (2012). Free press vs. free speech? The rhetoric of ‘civility’ in regard to anonymous online comments. Journalism & Mass Communication Quarterly, 89(3), 495–513. doi:10.1177/1077699012447923
- Reid, F., & Harrigan, M. (2013). Security and privacy in social networks. In Y. Altshuler, Y. Elovici, A. B. Cremers, N. Aharony, & A. Pentland (Eds.), An analysis of anonymity in the bitcoin system (pp. 197–223). New York, NY: Springer. Retrieved from http://link.springer.com/chapter/10.1007/978-1-4614-4139-7_10
- Rogaway, P. (2015). The moral character of cryptographic work. Retrieved from http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf
- Ruppert, E., Law, J., & Savage, M. (2013). Reassembling social science methods: The challenge of digital devices. Theory, Culture & Society, 30(4), 22–46. doi:10.1177/0263276413484941
- Schreier, F., & Caparini, M. (2005). Privatising security: Law, practice and governance of private military and security companies. Geneva: Centre for the Democratic Control Armed Forces. Retrieved from http://www.dcaf.ch/content/download/34919/525055/version/1/file/op06_privatising-security.pdf
- Scott, C. R. (2004). Benefits and drawbacks of anonymous online communication: legal challenges and communicative recommendations. Free Speech Yearbook, 41(1), 127–141. doi:10.1080/08997225.2004.10556309
- Shilling, C., & Mellor, P. A. (2015). For a sociology of deceit: Doubled identities, interested actions and situational logics of opportunity. Sociology, 49(4), 607–623. doi:10.1177/0038038514546661
- Simmel. (1903). The metropolis and mental life. In J. Farganis (Ed.), Readings in social theory: The classic tradition to post-modernism (pp. 149–157). New York, NY: McGraw Hill.
- Skeggs, B., & Yuill, S. (2015). The methodology of a multi-model project examining how Facebook infrastructures social relations. Information, Communication & Society. doi:10.1080/1369118X.2015.1091026
- Spender, D. (1995). Nattering on the net: Women, power and cyberspace. Melbourne: Spinifex Press. Retrieved from http://dl.acm.org/citation.cfm?id=525249
- Spitter, M., Klaver, F., Koot, G., & van Staalduinen, M. (2015). Authorship analysis on dark marketplace forums. Proceedings of the IEEE European Intelligence & Security Informatics Conference (EISIC), Manchester.
- Thompson, E. P. (1975). The crime of anonymity. In D. Hay, P. Linebaugh, J. G. Rule, E. Thompson, & C. Winslow (Eds.), Albion’s fatal tree: Crime and society in eighteenth-century England (pp. 255–344). London: Allen Lane.
- UN Broadband Commission for Digital Development. (2015). Cyber violence against women and girls: A world-wide wake-up call. Geneva: Broadband Commission for Sustainable Development.
- Van Hout, M. C., & Bingham, T. (2013a). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24(5), 385–391. doi:10.1016/j.drugpo.2013.01.005
- Van Hout, M. C., & Bingham, T. (2013b). ‘Surfing the silk road’: A study of users’ experiences. International Journal of Drug Policy, 24(6), 524–529. doi:10.1016/j.drugpo.2013.08.011
- Van Hout, M. C., & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25(2), 183–189. doi:10.1016/j.drugpo.2013.10.009
- Vickery, J. R. (2015). ‘I don’t have anything to hide, but … ’: the challenges and negotiations of social and mobile media privacy for non-dominant youth. Information, Communication & Society, 18(3), 281–294. doi:10.1080/1369118X.2014.989251
- Viseu, A., Clement, A., & Aspinall, J. (2004). Situating privacy online. Information, Communication & Society, 7(1), 92–114. doi:10.1080/1369118042000208924
- Watters, P. A., & Phair, N. (2012). Detecting illicit drugs on social media using automated social media intelligence analysis (ASMIA). In Y. Xiang, J. Lopez, C.-C. J. Kuo, & W. Zhou (Eds.), Cyberspace safety and security (pp. 66–76). Berlin: Springer Berlin Heidelberg. Retrieved from http://link.springer.com/chapter/10.1007/978-3-642-35362-8_7
- Williams, D. (1986). The Rebecca riots: A study in agrarian discontent. Cardiff: University of Wales Press.
- Wirth, L. (1938). Urbanism as a way of life. American Journal of Sociology, 44(1), 1–24. doi: 10.1086/217913