Markets as Governance Environments for Organizations at the Edge of Illegality: Insights From Social Network Analysis

@article{Odaba2017MarketsAG,
  title={Markets as Governance Environments for Organizations at the Edge of Illegality: Insights From Social Network Analysis},
  author={Meltem Odabaş and Thomas J. Holt and Ronald L. Breiger},
  journal={American Behavioral Scientist},
  year={2017},
  volume={61},
  pages={1267 - 1288}
}
In the past two decades, researchers have examined the practices of online forums operating markets for the sale of stolen credit card data. Participants cannot rely on traditional legal system regulations in the event of disputes between buyers and sellers. Thus, this analysis focuses on two forms of monitoring within these forums: one based on an emergent social network of transactions among community members (second-party monitoring) and the other consisting of regulatory (third-party… 

Hybrid Governance in Online Drug Distribution

  • Kim Moeller
  • Political Science
    Contemporary Drug Problems
  • 2022
A growing share of illicit drug dealing occurs on online platforms. Technological innovations, such as encryption and anonymous payments, have enabled new and more complex ways of organizing

Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras

The market is becoming more centralised over time around influential users and threads, with significant changes observed during the Set-up and Covid-19 eras, and Bitcoin and PayPal are the preferred payment methods by trading values and number of contracts involved.

Countering Distrust in Illicit Online Networks: The Dispute Resolution Strategies of Cybercriminals

The core of this article is a detailed investigation of the dispute resolution system contained within Darkode, an elite cybercriminal forum. Extracting the dedicated disputes section from within the

Business Data Sharing through Data Marketplaces: A Systematic Literature Review

Data marketplaces are expected to play a crucial role in tomorrow’s data economy but hardly achieve commercial exploitation. Currently, there is no clear understanding of the knowledge gaps in data

PostCog: A tool for interdisciplinary research into underground forums at scale

Postcog is a web application developed to support users from both technical and non-technical backgrounds in forum analyses, such as search, information extraction and cross-forum comparison, and made available for academic research upon signing an agreement with the Cambridge Cybercrime Centre.

Cyber-organised crime. A case of moral panic?

A growing number of studies show that the advent of the Internet has transformed the organisational life of crime, with many academic and non-academic articles and reports describing various types of

Information Extraction from the Long Tail: A Socio-Technical AI Approach for Criminology Investigations into the Online Illegal Plant Trade

This work presents an inter-disciplinary (computer science, criminology and conservation science) socio-technical artificial intelligence (AI) approach to information extraction from the long tail of online forums around internet-facilitated illegal trades of endangered species.

References

SHOWING 1-10 OF 38 REFERENCES

The Dark Net: Self-Regulation Dynamics of Illegal Online Markets for Identities and Related Services

  • Frank P. Wehinger
  • Economics
    2011 European Intelligence and Security Informatics Conference
  • 2011
The sales outlets of illegal online markets are able to self-regulate the market and should be considered as a major device that makes cyber crime profitable.

Trust among cybercriminals? Carding forums, uncertainty and implications for policing

At the beginning of the twenty-first century, before the power of online social networking became apparent, several studies speculated about the likely structure of organised cybercrime. In the light

Examining the risk reduction strategies of actors in online criminal markets

Research examining offender risk reduction strategies within illicit markets focus primarily on those operating in the real world for drugs and stolen goods. Few have considered the strategies that

An analysis of underground forums

This paper empirically characterize six different underground forums examining the properties of the social networks formed within, the content of the goods and services being exchanged, and lastly, how individuals gain and lose trust in this setting.

Market, Hierarchy, and Trust: The Knowledge Economy and the Future of Capitalism

Recent conceptualizations of trends in the structure of U.S. industry have focused on the relative importance of markets, hierarchies, and hybrid intermediate forms. This paper advances the

THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY*

We analyze the social organization of three well-known price-fixing conspiracies in the heavy electrical equipment industry. Although aspects of collusion have been studied by industrial organization

Exploring stolen data markets online: products and market forces

Examination of the nature of the market for stolen data using a qualitative analysis of 300 threads from six web forums run by and for data thieves suggests that all manner of personal and financial data can be obtained through these markets at a fraction of their true value.

Competition in Two-Sided Markets ¤

There are many examples of markets involving two groups of participants who need to interact via intermediaries. Moreover, these intermediaries usually have to compete for business from both groups.

A Theory of Collective Reputations (with applications to the persistence of corruption and to firm quality)

The paper is a first attempt at modelling the idea of group reputation as an aggregate of individual reputations. A member's current incentives are affected by his past behaviour and, because his

Examining the Forces Shaping Cybercrime Markets Online

  • T. Holt
  • Computer Science, Business
  • 2013
Malicious software is increasingly used by hackers and attackers in order to acquire sensitive information and compromise various systems. The sophistication of these tools has increased to such a