4,067
Views
16
CrossRef citations to date
0
Altmetric
Introduction

Identifying gaps in the research literature on illicit markets on-line

Bibliography

  • Bacher, P., T. Holz, M. Kotter, and G. Wicherski. Know your enemy: Tracking botnets. 2005. https://www.honeynet.org/papers/bots.
  • Barratt, M. J. “Silk Road: EBay for drugs.” Addiction 107, no. 3 (2012): 683–683. doi:10.1111/j.1360-0443.2011.03709.x.
  • Barratt, M. J., J. A. Ferris, and A. R. Winstock. “Use of Silk Road, the Online Drug Marketplace, in the United Kingdom, Australia and the United States.” Addiction 109, no. 5 (2014): 774–783. doi:10.1111/add.12470.
  • Choo, K.-K. R. Zombies and botnets. Canberra: Australian Institute of Criminology, 2007. http://www.aic.gov.au/publications/current%20series/tandi/321-340/tandi333.html
  • Christin, N. “Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.” Proceedings of the 22nd International Conference on World Wide Web, May, 213–224. ACM, 2013.
  • Cooper, J., and D. M. Harrison. “The Social Organization of Audio Piracy on the Internet.” Media, Culture & Society 23, no. 1 (2001): 71–89. doi:10.1177/016344301023001004.
  • Cromwell, P. F., and J. N. Olson. Breaking and Entering: Burglars on Burglary. Belmont, CA: Wadsworth, 2004.
  • Cromwell, P. F., J. N. Olson, and D. W. Avary. “Who Buys Stolen Property? A New Look at Criminal Receiving.” Journal of Crime and Justice 16, no. 1 (1993): 75–95. doi:10.1080/0735648X.1993.9721479.
  • Dupont, B., A.-M. Côté, C. Savine, and D.-H. David. “The Ecology of Trust Among Hackers.” Global Crime 17, no. 2 (2016): 129–151. doi:10.1080/17440572.2016.1157480.
  • Edwards, S. “The Legal Regulation of Prostitution: A Human Rights Issue.” In Rethinking Prostitution: Purchasing Sex in the 1990s, edited by G. Scambler and A. Scambler, 57–82. London: Routledge, 1997.
  • Emigh, A. “The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond.” Journal of Digital Forensic Practice 1, no. 3 (2006): 245–260. doi:10.1080/15567280601049985.
  • Schultz, E. E. “Where have the Worms and Viruses Gone?—New Trends in Malware.” Computer Fraud & Security 2006, no. 7 (2006): 4–8. doi:10.1016/S1361-3723(06)70398-0.
  • Franklin, J., V. Paxson, A. Perrig, and S. Savage. “An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.” In ACM Conference on Computer and Communications Security (CCS), 375–388. ACM, 2007.
  • Gad, M. “Crimeware Marketplaces and their Facilitating Technologies.” Technology Innovation Management Review 4 (2014): 11.
  • Goldstein, P. J. “The Drugs/Violence Nexus: A Tripartite Conceptual Framework.” Journal of drug issues 15, no. 4 (1985): 493–506. doi:10.1177/002204268501500406.
  • Holt, T. J. “Exploring the Social Organisation and Structure of Stolen Data Markets.” Global Crime 14, no. 2–3 (2013): 155–174. doi:10.1080/17440572.2013.787925.
  • Holt, T. J., K. R. Blevins, and J. B. Kuhns. “Examining Diffusion and Arrest Avoidance Practices Among Johns.” Crime & Delinquency 60, no. 2 (2014): 261–283. doi:10.1177/0011128709347087.
  • Holt, T. J., and A. M. Bossler. Cybercrime in Progress: Theory and Prevention of Technology-enabled Offenses. London: Routledge, 2015.
  • Holt, T. J., Y.-T. Chua, and O. Smirnova. “An Exploration of the Factors Affecting the Advertised Price for Stolen Data.” eCrime Researchers Summit (eCRS), September, 1–10. IEEE, 2013.
  • Holt, T. J., and E. Lampke. “Exploring Stolen Data Markets Online: Products and Market Forces.” Criminal Justice Studies 23, no. 1 (2010): 33–50. doi:10.1080/14786011003634415.
  • Holt, T. J., O. Smirnova, and Y. T. Chua. “Exploring and Estimating the Revenues of Profits of Participants in Stolen Data Markets.” Deviant Behavior 37, no. 4 (2016): 353–367. doi:10.1080/01639625.2015.1026766.
  • Holt, T. J., O. Smirnova, Y. T. Chua, and H. Copes. “Examining the Risk Reduction Strategies of Actors in Online Criminal Markets.” Global Crime 16, no. 2 (2015): 81–103. doi:10.1080/17440572.2015.1013211.
  • Holzman, H. R., and S. Pines. “Buying Sex: The Phenomenology of Being a John.” Deviant Behavior 4, no. 1 (1982): 89–116. doi:10.1080/01639625.1982.9967604.
  • Hutchings, A., and R. Clayton. “Exploring the provision of online booter services.” Deviant Behavior (2016): 1–16.
  • Hutchings, A., and T. J. Holt. “A Crime Script Analysis of the Online Stolen Data Market.” British Journal of Criminology 55, no. 3 (2015): 596–614. doi:10.1093/bjc/azu106.
  • Ianelli, N., and A. Hackworth. “Botnets as a vehicle for online crime.” FORENSIC COMPUTER SCIENCE IJoFCS (2005): 19.
  • Jacobs, B. A. Robbing Drug Dealers: Violence Beyond the Law. Hawthorne NY: Aldine de Gruyter, 1991.
  • Jacobs, B. A. “Undercover Deception Clues: A Case of Restrictive Deterrence.” Criminology 31, no. 2 (1993): 281–299. doi:10.1111/j.1745-9125.1993.tb01131.x.
  • Jacobs, B. A. “Crack Dealers Apprehension Avoidance Techniques: A Case of Restrictive Deterrence.” Justice Quarterly 13, no. 3 (1996a): 359–381. doi:10.1080/07418829600093011.
  • Jacobs, B. A. “Crack Dealers and Restrictive Deterrence: Identifying Narcs.” Criminology 34, no. 3 (1996b): 409–431. doi:10.1111/j.1745-9125.1996.tb01213.x.
  • Jacobs, B. A. Dealing crack: The social world of streetcorner selling. Boston, MA: UPNE, 1999.
  • Jacques, S., and R. Wright. “How Victimized Drug Traders Mobilize Police.” Journal of Contemporary Ethnography 42, no. 5 (2013): 545–575. doi:10.1177/0891241612472057.
  • Jakobsson, M., and S. Myers, eds. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. New York: John Wiley & Sons, 2006.
  • Jakobsson, M., and Z. Ramzan. Crimeware: Understanding New Attacks and Defenses. Boston, MA: Addison-Wesley Professional, 2008.
  • James, L. Phishing exposed. San Francisco, CA: Syngress, 2005.
  • Lane, F. S. Obscene Profits: Entrepreneurs of Pornography in the Cyber Age. London: Routledge, 2001.
  • Leontiadis, N., and A. Hutchings. “Scripting the Crime Commission Process in the Illicit Online Prescription Drug Trade.” Journal of Cybersecurity 1, no. 1 (2015): 81–92.
  • Maher, L. Sexed Work: Gender, Race and Resistance in a Brooklyn Drug Market. Oxford: Oxford University Press, 2000.
  • Maher, L., and K. Daly. “Women in the street-level drug economy: Continuity or change?” Criminology 34 (1996): 465–492. doi:10.1111/crim.1996.34.issue-4.
  • Martin, J. “Lost on the Silk Road: Online Drug Distribution and the ‘Cryptomarket’.” Criminology and Criminal Justice 14, no. 3 (2014): 351–367. doi:10.1177/1748895813505234.
  • Matthews, R. Kerb-Crawling, Prostitution and Multi-Agency Policing. Great Britain: Crime Prevention Unit, 1993.
  • McCalley, H., B. Wardman, and G. Warner. “Analysis of Back-Doored Phishing Kits.” IFIP International Conference on Digital Forensics, September, 155–168. Berlin: Springer.
  • McCoy, D., K. Bauer, D. Grunwald, T. Kohno, and D. Sicker. “Shining Light in Dark Places: Understanding the Tor Network.” Paper presented at the privacy enhancing technologies, Leuven, July 23-25 2008.
  • Meyer, G. R. The Social Organization of the Computer Underground. Northern Illinois Univ De Kalb, 1989. http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA390834
  • Motoyama, M., D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. “An Analysis of Underground Forums.” In 2011 ACM SIGCOMM conference on Internet measurement, 71–80. Berlin, Germany: ACM, 2011.
  • Peretti, K. K. “Data Breaches: What the Underground World of Carding Reveals.” Santa Clara Computer & High Tech. LJ 25 (2009): 375–413.
  • Quinn, J. F., and C. J. Forsyth. “Describing Sexual Behavior in the era of the Internet: A Typology for Empirical Research.” Deviant Behavior 26, no. 3 (2005): 191–207. doi:10.1080/01639620590888285.
  • Rajab, M., J. Zarfoss, F. Monrose, and A. Terzis. “A Multifaceted Approach to Understanding the Botnet Phenomenon.” In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 41–52. ACM, 2006.
  • Sanders, T. “Selling Sex in the Shadow Economy.” International Journal of Social Economics 35, no. 10 (2008): 704–716. doi:10.1108/03068290810898927.
  • Schneider, J. L. “Stolen-Goods Markets: Methods of Disposal.” British Journal of Criminology 45, no. 2 (2005): 129–140. doi:10.1093/bjc/azh100.
  • Scott, M. S., and K. Dedel. “Street prostitution.” In Problem Oriented Policing Guide Series (2). Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice, 2006.
  • Sood, A. K., and R. J. Enbody. “Crimeware-as-a-Service—A Survey of Commoditized Crimeware in the Underground Market.” International Journal of Critical Infrastructure Protection 6, no. 1 (2013): 28–38. doi:10.1016/j.ijcip.2013.01.002.
  • Sterk, C. E., and K. W. Elifson. “Drug-Related Violence and Street Prostitution.” Drugs and violence: Causes, correlates, and consequences (1990): 208–220.
  • Sutton, M., J. Schneider, and S. Hetherington. Tackling Theft with the Market Reduction Approach. London: Home Office, Policing and Reducing Crime Unit, Research, Development and Statistics Directorate, 2001.
  • Symantec Corporation. Internet Security Threat Report. Mountain View: Symantec Corporation, 2014.
  • Taylor, P. A. Hackers: Crime in the Digital Sublime. London: Routledge, 1999.
  • Wehinger, F. “The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services.” Paper presented at the Intelligence and Security Informatics Conference (EISIC), 2011 European, 2011.
  • Weitzer, R. “New Directions in Research on Prostitution.” Crime, Law and Social Change 43, no. 4–5 (2005): 211–235. doi:10.1007/s10611-005-1735-6.
  • Wright, R., and S. H. Decker. Burglars on the Job: Streetlife and Residential Break-ins. Boston, MA: Northeastern University Press, 1994.
  • Yip, M., C. Webber, and N. Shadbolt. “Trust Among Cybercriminals? Carding Forums, Uncertainty and Implications for Policing.” Policing and Society 23, no. 4 (2013): 516–539. doi:10.1080/10439463.2013.780227.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.