2,286
Views
3
CrossRef citations to date
0
Altmetric
Article

Cybercrime is whose responsibility? A case study of an online behaviour system in crime

ORCID Icon, ORCID Icon &
Pages 1-21 | Received 06 Apr 2017, Accepted 28 Nov 2017, Published online: 21 Dec 2017

Bibliography

  • Abu Rajab, M., J. Zarfoss, F. Monrose, and A. Terzis. “A Multifaceted Approach to Understanding the Botnet Phenomenon.” In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, Association for Computing Machinery (ACM), Rio de Janeriro, Brazil, 41-52, 2006.
  • Afroz, S., V. Garg, D. McCoy, and R. Greenstadt. “Honor among Thieves: A Common’s Analysis of Cybercrime Economies.” eCrime Researchers Summit (eCRS), Institute of Electrical and Electronics Engineers (IEEE), San Francisco, CA, USA, 1–11, 2013.
  • Aldridge, J., and D. Décary-Hétu. “Not an ‘Ebay for Drugs’: The Cryptomarket ‘Silk Road’ as a Paradigm Shifting Criminal Innovation.” SSRN Paper, 2014. Accessed September 25, 2016. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2436643
  • Alejandro, J. “Journalism in the Age of Social Media.” Reuters Institute Fellowship Paper. University of Oxford, 2010. Accessed September 25, 2017 http://reutersinstitute.politics.ox.ac.uk/sites/default/files/research/files/Digital%2520News%2520Report%25202016.pdf
  • Anderson, R. ‘Why Information Security Is Hard – An Economic Perspective.’ In Proceedings of the 17th annual IEEE Computer Security Applications Conference, Institute of Electrical and Electronics Engineers (IEEE), Washington, DC, USA, 358–365, 2001.
  • Anderson, R., C. Barton, R. Böhme, R. Clayton, M. J. Van Eeten, M. Levi, T. Moore, and S. Savage. “Measuring the Cost of Cybercrime.” In The Economics of Information Security and Privacy, edited by R. Böhme, 265–300. Berlin, Heidelberg: Springer, 2013.
  • Anderson, R., and T. Moore. “Information Security Economics – And Beyond.” In Proceedings of the Annual International Cryptology Conference, 68–91. Springer, Berlin, Germany, 68–91, 2007.
  • Armstrong, H. L., and P. J. Forde. “Internet Anonymity Practices in Computer Crime.” Information Management & Computer Security 11, no. 5 (2003): 209–215. doi:10.1108/09685220310500117.
  • Association of Computing Machiney. “ACM Code of Ethics and Professional Conduct.” Accessed March 20, 2017. https://www.acm.org/about-acm/acm-code-of-ethics-and-professional-conduct
  • Bagchi, K., and G. Udo. “An Analysis of the Growth of Computer and Internet Security Breaches.” Communications of the Association for Information Systems 11, no. 1 (2003): 46.
  • Barratt, M. J. “Silk Road: EBay for Drugs.” Addiction 107, no. 3 (2012): 683. doi:10.1111/add.2012.107.issue-3.
  • BBC News. “Mariposa Botnet ‘Mastermind’ Jailed in Slovenia.” Published December, 24, 2013. Accessed March 20, 2017. http://www.bbc.com/news/technology-25506016
  • Bennett, W. L. “The Personalization of Politics: Political Identity, Social Media, and Changing Patterns of Participation.” The ANNALS of the American Academy of Political and Social Science 644, no. 1 (2012): 20–39. doi:10.1177/0002716212451428.
  • Bilodeau, O., and T. Dupuy. ”Dissecting Linux/Moose: The Analysis of a Linux Router-Based Worm Hungry for Social Networks.” ESET Research Technical Report, Montreal, QC. Accessed March 27, 2017. http://www.welivesecurity.com/2016/11/02/linuxmoose-still-breathing/.
  • Brenner, S. W. “Cybercrime: Re-Thinking Crime Control Strategies.” In Crime Online, Edited by Yvonne Jewkes, 12-28. London: Taylor and Francis Group, 2006.
  • Briones, R. L., B. Kuch, B. F. Liu, and Y. Jin. “Keeping up with the Digital Age: How the American Red Cross Uses Social Media to Build Relationships.” Public Relations Review 37, no. 1 (2011): 37–43. doi:10.1016/j.pubrev.2010.12.006.
  • Broadhurst, R. “Developments in the Global Law Enforcement of Cyber-Crime.” Policing: An International Journal of Police Strategies and Management 29, no. 3 (2006): 408–433. doi:10.1108/13639510610684674.
  • Brown, D., and S. Fiorella. Influence Marketing: How to Create, Manage, and Measure Brand Influencers in Social Media Marketing. United States of America: Que Publishing, 2013.
  • Burden, K., and C. Palmer. “Internet Crime: Cyber Crime – A New Breed of Criminal?” Computer Law and Security Review 19, no. 3 (2003): 222–227. doi:10.1016/S0267-3649(03)00306-6.
  • Cetin, O., M. H. Jhaveri, C. Gañán, M. van Eeten, and T. Moore. “Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup.” Journal of Cybersecurity 2, no. 1 (2016): 83–98. doi:10.1093/cybsec/tyw005.
  • Charette, Y. “The Illusion of Penal Signals: The Tendentious Effect of Differential Impunity.” [In French] PhD Thesis, École de Criminologie, Université de Montréal, 2015.
  • Christin, N. “Traveling the Silk Road: A Measurement Analysis of A Large Anonymous Online Marketplace.” In Proceedings of the 22nd International Conference on World Wide Web, Association for Computing Machinery (ACM), Rio de Janeiro, Brazil, 213–224, 2013.
  • Clarke, R. V. “Situational Crime Prevention: Theoretical Background and Current Practice.” In Handbook on Crime and Deviance, edited by D. K. Marvin, A. J. Lizotte, and G. P. Hall, 259–276. New York: Springer, 2009.
  • Cooke, E., F. Jahanian, and D. McPherson. “The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets.” Proceedings of the 5th SRUTI – Steps to Reducing Unwanted Traffic on the Internet Workshop, Usenix, Cambridge, MA, USA, 1-6, 2005.
  • Correa, D. 2015. “Global Efforts Take Down 37,000 Websites Selling Counterfeit Goods”. SC Magazine, Published December, 4, 2015. Accessed November 13, 2017.. https://www.scmagazine.com/global-efforts-take-down-37000-websites-selling-counterfeit-goods/article/533253/
  • Deibert, R., A. Manchanda, R. Rohozinski, N. Villeneuve, and G. Walton. “Tracking GhostNet: Investigating a Cyber Espionage Network.” Technical Report JR02-2009, Information Warfare Monitor, Canada, March 2009. Accessed November 13, 2017. http://www.scribd.com/doc/13731776/Tracking-GhostNet-Investigating-a-Cyber-Espionage-Network.
  • Dittrich, D., M. Bailey, and S. Dietrich. “Towards Community Standards for Ethical Behavior in Computer Security Research.” Technical Report. USA: Stevens Institute of Technology, 2009. Accessed November 30, 2017. http://web.engr.illinois.edu/~mdbailey/publications/dbd2009tr1.pdf
  • The Economist. “Celebrities’ Endorsement Earnings on Social Media.” Accessed September 25, 2017. https://www.economist.com/blogs/graphicdetail/2016/10/daily-chart-9
  • ESET Research. “Linux/Moose: Still Breathing.” We Live Security Blog. Montreal, QC: ESET, 2016. Accessed March 20, 2017. http://www.welivesecurity.com/2016/11/02/linuxmoose-still-breathing/
  • Federal Trade Commission. “FTC Charges D-Link Put Consumers’ Privacy at Risk Due to the Inadequate Security of Its Computer Routers and Cameras.” Press Release Published January 5, 2017.. Acccessed March 21, 2017. https://www.ftc.gov/news-events/press-releases/2017/01/ftc-charges-d-link-put-consumers-privacy-risk-due-inadequate
  • Ferrell, O. C. “Broadening Marketing’s Contribution to Data Privacy.” Journal of the Academy of Marketing Science 45, no. 2 (2016): 1–4.
  • Franklin, J., A. Perrig, V. Paxson, and S. Savage. “An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.” In Proceedings of 2007 Conference on Computer and Communications, Security, Association for Computing Machinery (ACM), Alexandria, Virginia, USA, 375–388, 2007.
  • Glenny, M. Darkmarket: How Hackers Became the New Mafia. New York: Alfred. A. Knopf, 2012.
  • Grabosky, P. “The Global Dimension of Cybercrime.” Global Crime 6, no. 1 (2004): 146–157. doi:10.1080/1744057042000297034.
  • Hindriks, J., and G. Myles. Intermediate Public Economics. London: The MIT Press, 2006.
  • Holt, T. J. “On the Value of Honeypots to Produce Policy Recommendations.” Criminology & Public Policy 16, no. 3 (2017): 739–747. doi:10.1111/1745-9133.12315.
  • Holt, T. J., O. Smirnova, Y. T. Chua, and H. Copes. “Examining the Risk Reduction Strategies of Actors in Online Criminal Markets.” Global Crime 16, no. 2 (2015): 81–103. doi:10.1080/17440572.2015.1013211.
  • Ingram, M. “What if the Twitter Growth Everyone Is Hoping for Never Comes?” Forbes Magazine. Published October 29, 2015. Accessed March 21, 2017. http://fortune.com/2015/10/29/twitter-growth/
  • Khamis, S., L. Ang, and R. Welling. “Micro-Celebrity and the Rise of Social Media Influencers.” Celebrity Studies 8, no. 2 (2017): 191–208. doi:10.1080/19392397.2016.1218292.
  • Krebs, B. “DDoS on Dyn Impacts Twitter, Spotify, Reddit.” Krebs on Security, Published October 21, 2017.  Accessed March 28, 2016. https://krebsonsecurity.com/2016/10/ddos-on-dyn-impacts-twitter-spotify-reddit/
  • Krebs, B. “Microsoft Issues WanaCrypt Patch for Windows 8, XP.” Krebs On Security, Published May 13, 2017. Accessed September 25, 2017. https://krebsonsecurity.com/2017/05/microsoft-issues-wanacrypt-patch-for-windows-8-xp/
  • Krebs, B. “Inside the Gozi Bulletproof Hosting Facility.” Accessed March 20, 2016. https://krebsonsecurity.com/tag/bulletproof-hosting/
  • Kruithof, K., J. Aldridge, D. Décary-Hétu, S. Megan, E. Dujso, and S. Hoorens. “Internet-Facilitated Drugs Trade.” RAND Europe Research Report, Rand Corporation, Santa Monica, California, United States, 1-203, 2016.
  • Levi, M. The Phantom Capitalists: The Organization and Control of Long-Firm Fraud. Aldershot: Ashgate Publishing, 2008.
  • Maimon, D., M. Alper, B. Sobesto, and M. Cukier. “Restrictive Deterrent Effects of a Warning Banner in an Attacked Computer System.” Criminology 52, no. 1 (2014): 33–59. doi:10.1111/crim.2014.52.issue-1.
  • Mangold, W. G., and D. J. Faulds. “Social Media: The New Hybrid Element of the Promotion Mix.” Business Horizons 52, no. 4 (2009): 357–365. doi:10.1016/j.bushor.2009.03.002.
  • Marwick, A. E., and D. Boyd. “I Tweet Honestly, I Tweet Passionately: Twitter Users, Context Collapse, and the Imagined Audience.” New Media & Society 13, no. 1 (2011): 114–133. doi:10.1177/1461444810365313.
  • McCarthy, B., and J. Hagan. “When Crime Pays: Capital, Competence, and Criminal Success.” Social Forces 79, no. 3 (2001): 1035–1060. doi:10.1353/sof.2001.0027.
  • Moore, T., and R. Clayton. “Evaluating the Wisdom of Crowds in Assessing Phishing Websites.” In Proceedings of the 2008 International Conference on Financial Cryptography and Data Security, Springer Berlin, Germany, 16-30, 2008.
  • Moore, T., R. Clayton, and R. Anderson. “The Economics of Online Crime.” The Journal of Economic Perspectives 23, no. 3 (2009): 3–20. doi:10.1257/jep.23.3.3.
  • Morselli, C., D. Décary-Hétu, M. Paquet-Clouston, and J. Aldridge. “Conflict Management in Illicit Drug Cryptomarkets.” International Criminal Justice Review (2017). doi:10.1177/1057567717709498.
  • Motoyama, M., D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. “An Analysis of Underground Forums.” In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, Association for Computing Machinery (ACM), Berlin, Germany, 71-80, 2011.
  • Nash, J. “Non-Cooperative Games.” Annals of Mathematics (1951): 286–295. doi:10.2307/1969529.
  • Nguyen, C. 2016. “What Life for a Bangladeshi Click Farmer Looks Like.” Motherboard–Vice, March 30. https://motherboard.vice.com/en_us/article/what-life-for-a-bangladeshi-click-farmer-looks-like
  • Paquet-Clouston, M., O. Bilodeau, and D. Décary-Hétu. “Can We Trust Social Media Data? Social Network Manipulation by an IoT Botnet.” Proceedings of the 2017 Social Media and Society Conference, Association for Computing Machinery (ACM), Toronto, ON, 1-9, 2017.
  • Paquet-Clouston, M., O. Bilodeau, D. Décary-Hétu, and T. Dupuy. “EGO MARKET: When Greed for Fame Benefits Large-Scale Botnets.” GoSecure Technical Report. Montreal, QC, 2016. http://gosecure.net/wp-content/uploads/2016/11/Ego-Market_When-Greed-for-Fame-Benefits-Large-Scale-Botnets.pdf
  • Poulsen, K. Kingpin: How One Hacker Took over the Billion-Dollar Cybercrime Underground. New York: Crown Publisher, 2012.
  • Powell, B. “Is Cyberspace a Public Good – Evidence from the Financial Services Industry.” Journal of Law, Economics, and Policy 1 (2005): 497.
  • Provos, N., and T. Holz. Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Boston: Pearson Education, 2007.
  • Rosoff, M. “Instagram’s Growth Is Astounding, if You Ignore the US.” Business Insiders. Accessed March 20, 2017. http://www.businessinsider.com/instagram-user-growth-2016-6
  • Soska, K., and N. Christin. “Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem.” In Proceedings of the  24th USENIX Security Symposium, USENIX, Washington, D.C, 33-48, 2015.
  • The Spamhaus Project. Accessed September 25, 2017 https://www.spamhaus.org
  • Stone-Gross, B., T. Holz, G. Stringhini, and G. Vigna. “The Underground Economy of Spam: A Botmaster’s Perspective on Coordinating Large-Scale Spam Campaigns.” In Proceedings on Large-Scale Exploits and Emergent Threat (LEET), Association for Computing Machinery (ACM), Boston, MA, 1-8, 2011.
  • Stringhini, G., M. Egele, C. Kruegel, and G. Vigna. “Poultry Markets: On the Underground Economy of Twitter Followers.” In Newsletter ACM SIGCOMM Computer Communication Review, Association for Computing Machinery (ACM), New-York, United States, 527-532, 2012.
  • Sully, M., and M. Thompson. “The Deconstruction of the Mariposa Botnet.” Defence Intelligence White Paper. 2010. Accessed March 21, 2017. http://www.defintel.ca/docs/Mariposa_White_Paper.pdf
  • Sutherland, E. H. Principles of Criminology. 4th ed. Chicago, IL: J. B. Lippincott, 1947.
  • Thomas, R., and J. Martin. “The Underground Economy: Priceless.” In Proceedings of the 5th USENIX Conference on File and Storage Technologies. USENIX Security 31, no. 6 (2006): 7–16.
  • Tremblay, P. Le délinquant idéal. Performance, Discipline, Solidarité. Montreal: Liber, 2010.
  • Tremblay, P., and C. Morselli. “Patterns in Criminal Achievement: Wilson and Abrahamse Revisited.” Criminology 38, no. 2 (2000): 633–657. doi:10.1111/crim.2000.38.issue-2.
  • Wall, D. Cybercrime: The Transformation of Crime in the Information Age. Cambridge: Polity, 2007.
  • Wehinger, F. “The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services.” In Proceedings of the 2011 intelligence and Security Informatics Conference, (EISIC), Institute of Electrical and Electronics Engineers (IEEE), Athens, Greece, 209–213, 2011.
  • Yip, M., C. Webber, and N. Shadbolt. “Trust among Cybercriminals? Carding Forums, Uncertainty and Implications for Policing.” Policing and Society 23, no. 4 (2013): 516–539. doi:10.1080/10439463.2013.780227.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.