Skip to main content

2016 | OriginalPaper | Buchkapitel

5. Visualizing the Networks of Economic Transactions and Ads in Stolen Data Markets

verfasst von : Thomas J. Holt, Olga Smirnova, Yi-Ting Chua

Erschienen in: Data Thieves in Action

Verlag: Palgrave Macmillan US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter explores how social network analysis can enlighten our understanding of the deviant exchanges between data market participants at the global (network overall) and local (key players) levels. It starts with the network visualizations and global network measures. The correlations between user centrality (measure derived from the network) and the number of posts a user has made (measure collected from the forums) do not differentiate between ripping and non-ripping forums, but indicate a high variation among forums. On most forums, the sellers are central users, indicating their importance to the existence of the market, while the buyers create the most discussion. The chapter ends with Monte Carlo simulations of the networks attempting to identify their hidden structure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Adamic, L. A., & Glance, N. (2005, August). The political blogosphere and the 2004 US election: divided they blog. In Proceedings of the 3rd international workshop on Link discovery (pp. 36–43). ACM. Adamic, L. A., & Glance, N. (2005, August). The political blogosphere and the 2004 US election: divided they blog. In Proceedings of the 3rd international workshop on Link discovery (pp. 36–43). ACM.
Zurück zum Zitat Bakker, R. M., Raab, J., & Milward, H. B. (2012). A preliminary theory of network resilience. Journal of Policy Analysis and Management, 31, 33–62.CrossRef Bakker, R. M., Raab, J., & Milward, H. B. (2012). A preliminary theory of network resilience. Journal of Policy Analysis and Management, 31, 33–62.CrossRef
Zurück zum Zitat Best, J., & Luckenbill, D. F. (1994). Organizing deviance (2nd ed.). New Jersey: Prentice Hall. Best, J., & Luckenbill, D. F. (1994). Organizing deviance (2nd ed.). New Jersey: Prentice Hall.
Zurück zum Zitat de Nooy, W., Mrvar, A., & Batagelj, V. (2005). Exploratory social network analysis with Pajek. Cambridge: Cambridge University Press.CrossRef de Nooy, W., Mrvar, A., & Batagelj, V. (2005). Exploratory social network analysis with Pajek. Cambridge: Cambridge University Press.CrossRef
Zurück zum Zitat Décary-Hétu, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13, 160–175. Décary-Hétu, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13, 160–175.
Zurück zum Zitat Décary-Hétu, D., & Morselli, C. (2011). Gang presence in social network sites. International Journal of Cyber Criminology, 5(2), 876. Décary-Hétu, D., & Morselli, C. (2011). Gang presence in social network sites. International Journal of Cyber Criminology, 5(2), 876.
Zurück zum Zitat Granovetter, M. (1973). The strength of weak ties. American Journal of Sociology, 78, 1360–1380.CrossRef Granovetter, M. (1973). The strength of weak ties. American Journal of Sociology, 78, 1360–1380.CrossRef
Zurück zum Zitat Herley, C., & Florencio, D. (2010). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In T. Moor, D. J. Pym, & C. Ioannidis (Eds.), Economics of information security and privacy (pp. 35–53). New York: Springer. Herley, C., & Florencio, D. (2010). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In T. Moor, D. J. Pym, & C. Ioannidis (Eds.), Economics of information security and privacy (pp. 35–53). New York: Springer.
Zurück zum Zitat Herring, S. C. (2004). Slouching toward the ordinary: Current trends in computer-mediated communication. New Media & Society, 6(1), 26–36.CrossRef Herring, S. C. (2004). Slouching toward the ordinary: Current trends in computer-mediated communication. New Media & Society, 6(1), 26–36.CrossRef
Zurück zum Zitat Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.CrossRef Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198.CrossRef
Zurück zum Zitat Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of computer hackers. In F. Smalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 336–355). Upper Saddle River, NJ: Pearson Prentice Hall. Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of computer hackers. In F. Smalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 336–355). Upper Saddle River, NJ: Pearson Prentice Hall.
Zurück zum Zitat Holt, T. J. (2010). Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data. Journal of Criminal Justice Education, 21, 300–321.CrossRef Holt, T. J. (2010). Exploring strategies for qualitative criminological and criminal justice inquiry using on-line data. Journal of Criminal Justice Education, 21, 300–321.CrossRef
Zurück zum Zitat Holt, T. J. (2013). Exploring the social organization and structure of stolen data markets. Global Crime, 14, 155–174.CrossRef Holt, T. J. (2013). Exploring the social organization and structure of stolen data markets. Global Crime, 14, 155–174.CrossRef
Zurück zum Zitat Holt, T. J., & Blevins, K. R. (2007). Examining sex work from the client’s perspective: Assessing johns using online data. Deviant Behavior, 28, 333–354.CrossRef Holt, T. J., & Blevins, K. R. (2007). Examining sex work from the client’s perspective: Assessing johns using online data. Deviant Behavior, 28, 333–354.CrossRef
Zurück zum Zitat Holt, T. J., Strumsky, D., Smirnova, O., & Kilger, M. (2012). Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology, 6, 891–903. Holt, T. J., Strumsky, D., Smirnova, O., & Kilger, M. (2012). Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology, 6, 891–903.
Zurück zum Zitat Morselli, C., & Décary-Hétu, D. (2010). Crime facilitation purposes of social networking sites: A review and analysis of the “cyberbanging” phenomenon. Small Wars & Insurgencies, 23, 39–50. Morselli, C., & Décary-Hétu, D. (2010). Crime facilitation purposes of social networking sites: A review and analysis of the “cyberbanging” phenomenon. Small Wars & Insurgencies, 23, 39–50.
Zurück zum Zitat Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An analysis of underground forums. IMC’11, 71–79. Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An analysis of underground forums. IMC’11, 71–79.
Zurück zum Zitat Robinson, M. (1984). Groups. New York: John Wiley & Sons. Robinson, M. (1984). Groups. New York: John Wiley & Sons.
Zurück zum Zitat Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications (Vol. 8). Cambridge University Press. Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications (Vol. 8). Cambridge University Press.
Zurück zum Zitat Wehinger, F. (2011). The Dark Net: Self-regulation dynamics of illegal online markets for identities and related services. Intelligence and Security Informatics Conference, 209–213. Wehinger, F. (2011). The Dark Net: Self-regulation dynamics of illegal online markets for identities and related services. Intelligence and Security Informatics Conference, 209–213.
Zurück zum Zitat Womer, S., & Bunker, R. J. (2010). Sureños gangs and Mexican cartel use of social networking sites. Small Wars & Insurgencies, 21(1), 81–94. Womer, S., & Bunker, R. J. (2010). Sureños gangs and Mexican cartel use of social networking sites. Small Wars & Insurgencies, 21(1), 81–94.
Zurück zum Zitat Yip, M., Webber, C., & Shadbolt, N. (2013). Trust among cybercriminals? Carding forums, uncertainty, and implications for policing. Policing and Society, 23, 1–24.CrossRef Yip, M., Webber, C., & Shadbolt, N. (2013). Trust among cybercriminals? Carding forums, uncertainty, and implications for policing. Policing and Society, 23, 1–24.CrossRef
Zurück zum Zitat Zhang, J., Ackerman, M. S., & Adamic, L. (2007). Expertise networks in online communities: Structure and algorithms. WWW’07: Proceedings of the 16th International Conference on World Wide Web, 221–230. Zhang, J., Ackerman, M. S., & Adamic, L. (2007). Expertise networks in online communities: Structure and algorithms. WWW’07: Proceedings of the 16th International Conference on World Wide Web, 221–230.
Metadaten
Titel
Visualizing the Networks of Economic Transactions and Ads in Stolen Data Markets
verfasst von
Thomas J. Holt
Olga Smirnova
Yi-Ting Chua
Copyright-Jahr
2016
DOI
https://doi.org/10.1057/978-1-137-58904-0_5

Premium Partner