Synonyms
Glossary
- Cyberstalking:
-
Persistent harassment in an online setting
- DNS:
-
Domain name server
- Hacking:
-
Unauthorized access to a computer system
- SQL:
-
Structured Query Language is a special purpose programming language for database management systems
Introduction
As our social and professional lives increasingly revolve around information and communication technologies (ICTs), these systems create new vulnerabilities for exploitation. These networked technologies enable a wide range of illicit and criminal activities that both emulate off-line crimes and embody wholly new types of activity. Technologies like the web, e-mail, and social media have transformed the division of criminal labor and provided new opportunities involving the acquisition and manipulation of...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Balkin JM, Kozlovski N (2007) Introduction. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York
Benkler Y (2011) A free irresponsible press: Wikileaks and the battle over the soul of the networked fourth estate. Harv Civ Rights-Civ Liberties Law Rev 46:311
Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1. http://www.cs.umn.edu/tech_reports_upload/tr2007/07-017.pdf. Accessed 17 June 2013
Chen H (2012) Extremist Youtube videos. In: Chen H (ed) Dark web. Springer, New York, pp 295–318
Chen H, Thoms S, Fu T (2008) Cyber extremism in web 2.0: an exploratory study of international jihadist groups. In: IEEE international conference on intelligence and security informatics, ISI 2008, Taipei. IEEE, pp 98–103
Denning DE (2009) Terror’s web: how the internet is transforming terrorism. In: Yar M, Jewkes Y (eds) Handbook of internet crime. Willan Publishing, New York
Dibbell J (2006) Play money: or, how i quit my day job and made millions trading virtual loot. Basic Books, New York
Everton SF (2012) Disrupting dark networks. Structural analysis in the social sciences, vol 34. Cambridge University Press, New York
Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40
Goolsbee A (2001) The implications of electronic commerce for fiscal policy (and vice versa). J Econ Perspect 15:13–23
Grabosky P, Smith R (2001) Telecommunication fraud in the digital age. In: Wall DS (ed) Crime and the internet. Routledge, London
Jackson C, Barth A, Bortz A, Shao W, Boneh D (2009) Protecting browsers from DNS rebinding attacks. ACM Trans Web 3(1):1–26
Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100
Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the international conference on web search and web data mining, Palo Alto, p 219–230
Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644
Keegan B, Ahmad MA, Williams D, Srivastava J, Contractor N (2011) Sic transit gloria mundi virtuali? Promise and peril in the computational social science of clandestine organizing. In: Proceedings of the ACM WebSci’11, Koblenz, p 1–8
Kozlovski N (2007) Designing accountable online policing. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York
Landler M, Sanger D (2013) US demands China block cyberattacks and agree to rules. The New York Times. http://www.nytimes.com/2013/03/12/world/asia/us-demands-that-china-end-hacking-and-set-cyber-rules.html. Accessed 12 May 2013
Lastowka FG, Hunter D (2006) Virtual crime. In: Balkin J, Noveck B (eds) The state of play: law, games, and virtual worlds. New York University Press, New York
Lau F, Rubin SH, Smith MH, Trajkovic L (2000) Distributed denial of service attacks. In: 2000 I.E. international conference on systems, man, and cybernetics, Nashville, vol 3. IEEE, pp 2275–2280
Lehdonvirta V, Ernkvist M (2011) Knowledge map of the virtual economy: converting the virtual economy into development potential. Technical report, The World Bank, Washington, DC
Levy S (2001) Hackers: heroes of the computer revolution, vol 4. Penguin Books, New York
Milward HB, Raab J (2006) Dark networks as organizational problems: elements of a theory 1. Int Public Manag J 9(3):333–360
Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2):39–53
Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, Indianapolis
Newman G, McNally MM (2005) Identity theft literature review. National Institute of Justice, Rockville
Nissenbaum H (2007) Where computer security meets national security. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York
Ott M, Cardie C, Hancock J (2012) Estimating the prevalence of deception in online review communities. In: Proceedings of the 21st international conference on world wide web, Lyon. ACM, pp 201–210
Owens WA, Dam KW, Lin HS (2009) Technology, policy, law, and ethics regarding US acquisition and use of cyberattack capabilities. The National Academy Press, Washington, DC. http://www.steptoe.com/assets/attachments/3785.pdf. Accessed 17 June 2013
Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37–59
Primo Braga CA (2005) E-commerce regulation: new game, new rules? Q Rev Econ Finance 45(2):541–558
Quayle E (2003) Child pornography: an internet crime. Routledge, New York
Spitzberg BH, Hoobler G (2002) Cyberstalking and the technologies of interpersonal terrorism. New Media Soc 4(1):71–92
Stohl C, Stohl M (2007) Networks of terror: theoretical assumptions and pragmatic consequences. Commun Theory 17(2):93–124
Taipale KA (2007) How technology, security, and privacy can coexist in the digital age. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York
Taylor P (1999) Hackers: crime in the digital sublime. Routledge, New York
Thomas D (2003) Hacker culture. University of Minnesota Press, Minneapolis
Traynor I (2007) Russia accused of unleashing cyberwar to disable Estonia. The Guardian. http://www.guardian.co.uk/world/2007/may/17/topstories3.russia. Accessed 17 June 2013
Wall DS (2001a) Maintaining order and law on the internet. In: Wall D (ed) Crime and the internet. Routledge, New York
Wall D (2001b) Cybercrimes and the internet. In: Wall D (ed) Crime and the internet. Routledge, New York
Wall D (2007) Cybercrime: the transformation of crime in the information age. Polity, Cambridge
Yar M (2006) Cybercrime and society. Sage, London
Recommended Reading
Balkin JM, Grimmelmann J, Katz E, Kozlovski N, Wagman S, Zarsky T (2007) Cybercrime: digital cops in a networked environment. New York University Press, New York
Clough J (2010) Principles of cybercrime. Cambridge University Press, Cambridge
Jewkes Y (2007) Crime online. Willan, Portland
Wall DS (2007) Cybercrime. Polity, New York
Williams M (2006) Virtually criminal: crime, deviance and regulation online. Routledge, New York
Yar M (2006) Cybercrime and society. Sage, New York
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media LLC, part of Springer Nature
About this entry
Cite this entry
Keegan, B.C., Ahmad, M.A. (2018). Deviant and Criminal Uses of Social Networks. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_55
Download citation
DOI: https://doi.org/10.1007/978-1-4939-7131-2_55
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-7130-5
Online ISBN: 978-1-4939-7131-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering