Trust among Cybercriminals? Carding Forums, Uncertainty and Implications for Policing

نویسندگان

  • Michael Yip
  • Craig Webber
  • Nigel Shadbolt
چکیده

At the beginning of the 21 st Century, before the power of online social networking became apparent, several studies speculated about the likely structure of organised cybercrime (Mann and Sutton 1998; Brenner 2002). In the light of new data on cybercriminal organisations, this paper sets out to revisit their claims. In collaboration with the Serious Organised Crime Agency (SOCA), this paper examines the structure of organised cybercrime by analysing data from online underground markets previously in operation over the Internet. In order to understand the various structures of organised cybercrime which have manifested, theories are drawn from social psychology, organised crime and transaction cost economics (TCE). Since the focus is on how uncertainty is mitigated in trading among cybercriminals, uncertainty is treated as a cost to the transactions and is used as the unit of analysis to examine the mechanisms cybercriminals use to control two key sources of uncertainty: the quality of merchandise and the identity of the trader. The findings indicate that carding forums facilitate organised cybercrime because they offer a hybrid form of organisational structure that is able to address sources of uncertainty and minimise transaction costs to an extent that allows a competitive underground market to emerge. The findings from this study can be used to examine other online applications that could facilitate the online underground economy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying High Quality Carding Services in Underground Economy using Nonparametric Supervised Topic Model

Over the years, cybercriminals increasingly joined the underground economy to exchange malicious services for conducting data breaches crimes. As many service providers are rippers, most cybercriminals rely on a few high quality services. To this end, cybercriminals post customer reviews evaluating the purchase experience and the service quality. To identify high quality services, researchers f...

متن کامل

Information Interaction of Pregnant Women in Ninisite

Background and Aim: Pregnant women are the most active users of health information with regard to the growing use of the Internet as an important source of information. This research studies the information interactions of pregnant women in Ninisite forum, andis to create awareness of pregnant women. This site is the largest Persian-language site for women's issues, pregnancy and parenting. Met...

متن کامل

Trust as Glue in Nanotechnology Governance Networks

This paper reflects on the change of relations among participants in nanotechnology governance through their participation in governance processes such as stakeholder dialogues. I show that policymaking in practice-that is, the practice of coming and working together in such stakeholder dialogues-has the potential for two-fold performative effects: it can contribute to the development of trust ...

متن کامل

Restrictive Deterrence: Impact of Warning Banner Messages on Repeated Low-trust Software Use

This research paper focuses on the warning messages that are one of the last lines of defense against cybercriminals. The effectiveness of warnings in influencing users’ behavior when using low-trust (potentially malicious) software has not been adequately addressed by the prior research. Using the restrictive deterrence theory, supported by the Communication-Human Information Processing (C-HIP...

متن کامل

Harvesting Wild Honey from Webmail Beehives

Cybercriminals steal access credentials to online accounts in a bid to derive profit from the valuable content of such accounts. The research community lacks a comprehensive understanding of what these stolen accounts are used for. This is largely because it is hard for researchers to collect data on compromised online accounts. To bridge this gap, we present an infrastructure that is able to m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013