Examining signals of trust in criminal markets online
dc.contributor.author | Holt, Thomas J | en |
dc.contributor.author | Smirnova, Olga | en |
dc.contributor.author | Hutchings, Alice | en |
dc.date.accessioned | 2016-09-20T08:15:04Z | |
dc.date.available | 2016-09-20T08:15:04Z | |
dc.date.issued | 2016-09-15 | en |
dc.identifier.issn | 2057-2085 | |
dc.identifier.uri | https://www.repository.cam.ac.uk/handle/1810/260236 | |
dc.description.abstract | This study examines the signals of trust in stolen data advertisements by analysing the structural and situational factors that influence the type of feedback sellers receive. Specifically, this article explores the factors associated with positive and negative buyer feedback from the purchase of stolen credit card data in a series of advertisements from a sample of Russian and English language forums where individuals buy and sell personal information. The results of zero-inflated Poisson regression models suggest that the sellers may influence their likelihood of receiving feedback by specifying the type of payment mechanism, choosing the advertisement language and selecting the type of market they operate within. The implications of this study for our understanding of online illicit markets, criminological theory and policy-making will be explored in depth. | |
dc.description.sponsorship | Department of Homeland Security (DHS) Science and Technology Directorate, Cyber Security Division (DHSSandT/ CSD) Broad Agency Announcement 11.02, the Government of Australia and SPAWAR Systems Center Pacific [N66001-13-C-0131]; National Institute of Justice, Office of Justice Programs, US Department of Justice [2010-IJ-CX-1676, 2010] | |
dc.language | English | en |
dc.language.iso | en | en |
dc.publisher | Oxford University Press | |
dc.rights | Attribution-NonCommercial 4.0 International | en |
dc.rights.uri | http://creativecommons.org/licenses/by-nc/4.0/ | en |
dc.title | Examining signals of trust in criminal markets online | en |
dc.type | Article | |
dc.description.version | This is the final version of the article. It first appeared from Oxford University Press via https://doi.org/10.1093/cybsec/tyw007 | en |
prism.endingPage | 145 | |
prism.publicationDate | 2016 | en |
prism.publicationName | Journal of Cybersecurity | en |
prism.startingPage | 137 | |
prism.volume | 2 | en |
dc.identifier.doi | 10.17863/CAM.4467 | |
dcterms.dateAccepted | 2016-07-27 | en |
rioxxterms.versionofrecord | 10.1093/cybsec/tyw007 | en |
rioxxterms.version | VoR | en |
rioxxterms.licenseref.uri | http://creativecommons.org/licenses/by-nc/4.0/ | en |
rioxxterms.licenseref.startdate | 2016-09-15 | en |
dc.contributor.orcid | Hutchings, Alice [0000-0003-3037-2684] | |
dc.identifier.eissn | 2057-2093 | |
rioxxterms.type | Journal Article/Review | en |
pubs.funder-project-id | EPSRC (EP/M020320/1) | |
cam.orpheus.success | Thu Jan 30 12:58:07 GMT 2020 - The item has an open VoR version. | * |
rioxxterms.freetoread.startdate | 2100-01-01 |
Files in this item
This item appears in the following Collection(s)
-
Scholarly Works - Computer Science and Technology
-
Symplectic mapped items for data match
This collection contains all articles, datasets and conference objects to be harvested