Show simple item record

dc.contributor.authorHolt, Thomas Jen
dc.contributor.authorSmirnova, Olgaen
dc.contributor.authorHutchings, Aliceen
dc.date.accessioned2016-09-20T08:15:04Z
dc.date.available2016-09-20T08:15:04Z
dc.date.issued2016-09-15en
dc.identifier.issn2057-2085
dc.identifier.urihttps://www.repository.cam.ac.uk/handle/1810/260236
dc.description.abstractThis study examines the signals of trust in stolen data advertisements by analysing the structural and situational factors that influence the type of feedback sellers receive. Specifically, this article explores the factors associated with positive and negative buyer feedback from the purchase of stolen credit card data in a series of advertisements from a sample of Russian and English language forums where individuals buy and sell personal information. The results of zero-inflated Poisson regression models suggest that the sellers may influence their likelihood of receiving feedback by specifying the type of payment mechanism, choosing the advertisement language and selecting the type of market they operate within. The implications of this study for our understanding of online illicit markets, criminological theory and policy-making will be explored in depth.
dc.description.sponsorshipDepartment of Homeland Security (DHS) Science and Technology Directorate, Cyber Security Division (DHSSandT/ CSD) Broad Agency Announcement 11.02, the Government of Australia and SPAWAR Systems Center Pacific [N66001-13-C-0131]; National Institute of Justice, Office of Justice Programs, US Department of Justice [2010-IJ-CX-1676, 2010]
dc.languageEnglishen
dc.language.isoenen
dc.publisherOxford University Press
dc.rightsAttribution-NonCommercial 4.0 Internationalen
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/en
dc.titleExamining signals of trust in criminal markets onlineen
dc.typeArticle
dc.description.versionThis is the final version of the article. It first appeared from Oxford University Press via https://doi.org/10.1093/cybsec/tyw007en
prism.endingPage145
prism.publicationDate2016en
prism.publicationNameJournal of Cybersecurityen
prism.startingPage137
prism.volume2en
dc.identifier.doi10.17863/CAM.4467
dcterms.dateAccepted2016-07-27en
rioxxterms.versionofrecord10.1093/cybsec/tyw007en
rioxxterms.versionVoRen
rioxxterms.licenseref.urihttp://creativecommons.org/licenses/by-nc/4.0/en
rioxxterms.licenseref.startdate2016-09-15en
dc.contributor.orcidHutchings, Alice [0000-0003-3037-2684]
dc.identifier.eissn2057-2093
rioxxterms.typeJournal Article/Reviewen
pubs.funder-project-idEPSRC (EP/M020320/1)
cam.orpheus.successThu Jan 30 12:58:07 GMT 2020 - The item has an open VoR version.*
rioxxterms.freetoread.startdate2100-01-01


Files in this item

Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial 4.0 International
Except where otherwise noted, this item's licence is described as Attribution-NonCommercial 4.0 International