The social network of hackers

Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools tha...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Global crime Ročník 13; číslo 3; s. 160 - 175
Hlavní autori: Décary-Hétu, David, Dupont, Benoit
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Abingdon Taylor & Francis 01.08.2012
Taylor & Francis Ltd
Predmet:
ISSN:1744-0572, 1744-0580
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment.
AbstractList Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment. Reproduced by permission of Taylor and Francis Ltd.
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment.
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment. [PUBLICATION ABSTRACT]
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment. Adapted from the source document.
Author Dupont, Benoit
Décary-Hétu, David
Author_xml – sequence: 1
  givenname: David
  surname: Décary-Hétu
  fullname: Décary-Hétu, David
  email: david.hetu@gmail.com
  organization: School of Criminology, Université de Montréal
– sequence: 2
  givenname: Benoit
  surname: Dupont
  fullname: Dupont, Benoit
  organization: School of Criminology, Université de Montréal
BookMark eNqNkU1LAzEQhoNUsK3-A4UFL15aM_nYZL2IFL-g4KWew5hN6LbbTU22SP-9W6oePFhPMwzP-8LwDEivCY0j5BzoGKim16CEoFKxMaPAxooyyfgR6e_OIyo17f3sip2QQUoLSrkqdN4nF7O5y1KwFdZZ49qPEJdZ8Nkc7dLFdEqOPdbJnX3NIXl9uJ9NnkbTl8fnyd10ZCXIdqQ0AAqgMgfpNTqF3HpdCm0LJaEAhaV-k8rz0nPMUaAWzHvHnQddsNzyIbna965jeN-41JpVlayra2xc2CQDghVaCi7hMMpzkRcFA_kPVHKmqSp4h17-QhdhE5vuZwOUa2CgFe0osadsDClF5806ViuM2w4yOxPm24TZmTB7E13s5lfMVi22VWjaiFV9KHy7D1eND3GFnaG6NC1u6xB9xMZWyfA_Gz4BExieog
CitedBy_id crossref_primary_10_1146_annurev_criminol_032317_092057
crossref_primary_10_1080_0960085X_2024_2305802
crossref_primary_10_1007_s10610_017_9356_z
crossref_primary_10_1007_s10611_016_9649_z
crossref_primary_10_1177_08944393221097881
crossref_primary_10_1177_1079063215616818
crossref_primary_10_1080_17440572_2025_2473350
crossref_primary_10_1089_cyber_2014_0008
crossref_primary_10_1111_1745_9133_12684
crossref_primary_10_1007_s12117_022_09474_x
crossref_primary_10_1080_10538712_2023_2214540
crossref_primary_10_1080_17440572_2013_787925
crossref_primary_10_1108_K_11_2023_2517
crossref_primary_10_1177_1477370818788007
crossref_primary_10_1080_17440572_2016_1227707
crossref_primary_10_7202_1026733ar
crossref_primary_10_1146_annurev_soc_090523_052916
crossref_primary_10_1007_s12117_018_9342_y
crossref_primary_10_1177_1098611118796890
crossref_primary_10_3917_sestr_011_0025
crossref_primary_10_1016_j_socnet_2022_01_008
crossref_primary_10_1017_cri_2025_1
crossref_primary_10_1016_j_diin_2018_12_005
crossref_primary_10_1007_s12117_019_09366_7
crossref_primary_10_1016_j_ssresearch_2016_04_010
crossref_primary_10_1080_17440572_2015_1005363
crossref_primary_10_1007_s12117_014_9229_5
crossref_primary_10_1017_S0003975618000115
crossref_primary_10_1177_0022042617751685
crossref_primary_10_1080_01639625_2016_1197001
crossref_primary_10_1080_01639625_2025_2551790
crossref_primary_10_1093_bjc_azaa091
crossref_primary_10_1007_s12117_022_09476_9
crossref_primary_10_1080_01639625_2024_2352049
crossref_primary_10_1016_j_diin_2015_09_005
crossref_primary_10_1080_17440572_2021_1998772
crossref_primary_10_1007_s10611_024_10182_6
crossref_primary_10_1007_s12117_017_9313_8
crossref_primary_10_1093_bjc_azw009
crossref_primary_10_1080_07418825_2015_1046393
crossref_primary_10_1080_01639625_2013_822209
crossref_primary_10_1080_17440572_2025_2517027
crossref_primary_10_1177_0002764217734263
crossref_primary_10_1007_s10611_016_9663_1
crossref_primary_10_1016_j_socnet_2021_01_006
crossref_primary_10_1177_00111287251335013
crossref_primary_10_1007_s12117_016_9284_1
crossref_primary_10_1177_0002764217734267
crossref_primary_10_1080_13523260_2019_1669336
crossref_primary_10_1007_s11186_025_09637_z
crossref_primary_10_1080_17440572_2023_2211521
crossref_primary_10_1177_1043986217699100
crossref_primary_10_1093_police_pax057
crossref_primary_10_7202_1065856ar
crossref_primary_10_1080_01639625_2024_2373356
crossref_primary_10_1080_15614263_2018_1507889
ContentType Journal Article
Copyright Copyright Taylor & Francis Group, LLC 2012
Copyright Taylor & Francis Ltd. 2012
Copyright_xml – notice: Copyright Taylor & Francis Group, LLC 2012
– notice: Copyright Taylor & Francis Ltd. 2012
DBID AAYXX
CITATION
7U4
8BJ
BHHNA
DWI
FQK
JBE
WZK
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1080/17440572.2012.702523
DatabaseName CrossRef
Sociological Abstracts (pre-2017)
International Bibliography of the Social Sciences (IBSS)
Sociological Abstracts
Sociological Abstracts
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
Sociological Abstracts (Ovid)
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Sociological Abstracts (pre-2017)
International Bibliography of the Social Sciences (IBSS)
Sociological Abstracts
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList International Bibliography of the Social Sciences (IBSS)

Sociological Abstracts (pre-2017)
Computer and Information Systems Abstracts
Sociological Abstracts (pre-2017)
DeliveryMethod fulltext_linktorsrc
Discipline Social Welfare & Social Work
EISSN 1744-0580
EndPage 175
ExternalDocumentID 2753539371
10_1080_17440572_2012_702523
702523
Genre Feature
GroupedDBID -~X
.7I
.QK
0BK
0R~
1PW
29I
4.4
5GY
AAGDL
AAGZJ
AAHIA
AAMFJ
AAMIU
AAPUL
AATTQ
AAZMC
ABCCY
ABFIM
ABJNI
ABLIJ
ABPEM
ABTAI
ABXUL
ABXYU
ABZLS
ACGFS
ACTIO
ACTOA
ADAHI
ADCVX
ADKVQ
ADLRE
ADXPE
ADZJE
AECIN
AEFOU
AEISY
AEKEX
AEOZL
AEPSL
AEYOC
AEZRU
AFRVT
AGDLA
AGMYJ
AGRBW
AHDZW
AIJEM
AIYEW
AJWEG
AKBVH
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AQTUD
AVBZW
AWYRJ
BEJHT
BLEHA
BMOTO
BOHLJ
CCCUG
CQ1
CS3
DGFLZ
DKSSO
EBS
EIS
EJD
ESI
EV9
E~B
E~C
FIL
G-F
GTTXZ
H13
HF~
HZ~
IPNFZ
J.O
KYCEM
M4Z
NA5
O9-
PQQKQ
RIG
RNANH
ROSJB
RSYQP
S-F
STATR
TASJS
TBQAZ
TDBHL
TEW
TFH
TFL
TFW
TNTFI
TRJHH
TUROJ
ULE
UT5
UT9
VAE
~01
~S~
5VS
AAEXZ
AANOT
AAYXX
ABALO
ABGVH
ABTOG
ACIQO
AEZLS
AJLVH
BRICJ
BTFIH
CAG
CITATION
COF
LJTGL
OMIPZ
7U4
8BJ
BHHNA
DWI
FQK
JBE
WZK
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c515t-7811a4105615f8ae7a3cf8d48c9751917ad8b57f3df3a6a4a842ffe3ef18926c3
IEDL.DBID 1PW
ISICitedReferencesCount 77
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000212612600002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1744-0572
IngestDate Wed Oct 01 14:44:20 EDT 2025
Thu Aug 07 14:27:19 EDT 2025
Thu Sep 04 14:32:07 EDT 2025
Mon Nov 10 21:42:08 EST 2025
Sat Nov 29 03:00:23 EST 2025
Tue Nov 18 21:45:47 EST 2025
Mon Oct 20 23:41:38 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c515t-7811a4105615f8ae7a3cf8d48c9751917ad8b57f3df3a6a4a842ffe3ef18926c3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
ObjectType-Article-1
ObjectType-Feature-2
PQID 1038121870
PQPubID 52915
PageCount 16
ParticipantIDs proquest_miscellaneous_1429854351
proquest_miscellaneous_1353280793
proquest_miscellaneous_1364699215
proquest_journals_1038121870
crossref_primary_10_1080_17440572_2012_702523
informaworld_taylorfrancis_310_1080_17440572_2012_702523
crossref_citationtrail_10_1080_17440572_2012_702523
PublicationCentury 2000
PublicationDate 2012-08-00
PublicationDateYYYYMMDD 2012-08-01
PublicationDate_xml – month: 08
  year: 2012
  text: 2012-08-00
PublicationDecade 2010
PublicationPlace Abingdon
PublicationPlace_xml – name: Abingdon
PublicationTitle Global crime
PublicationYear 2012
Publisher Taylor & Francis
Taylor & Francis Ltd
Publisher_xml – name: Taylor & Francis
– name: Taylor & Francis Ltd
SSID ssj0037986
Score 2.218369
Snippet Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under...
SourceID proquest
crossref
informaworld
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 160
SubjectTerms Arrest
Arrests
botnet
Case studies
Communication networks
Constraining
Crime
Criminology
Cybercrime
Effectiveness studies
Focusing
Hackers
Hacking
Information
Internet
Monitors
Networks
organised crime
Researcher Subject Relations
Researchers
Segmentation
Social media
Social network analysis
Social Networks
Strikes
Technical efficiency
Values
Title The social network of hackers
URI https://www.tandfonline.com/doi/abs/10.1080/17440572.2012.702523
https://www.proquest.com/docview/1038121870
https://www.proquest.com/docview/1353280793
https://www.proquest.com/docview/1364699215
https://www.proquest.com/docview/1429854351
Volume 13
WOSCitedRecordID wos000212612600002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAWR
  databaseName: Taylor & Francis Criminology and Law Collection
  customDbUrl:
  eissn: 1744-0580
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0037986
  issn: 1744-0572
  databaseCode: 1PW
  dateStart: 20040201
  isFulltext: true
  titleUrlDefault: https://www.tandfonline.com
  providerName: Taylor & Francis
– providerCode: PRVAWR
  databaseName: Taylor & Francis Online Journals
  customDbUrl:
  eissn: 1744-0580
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0037986
  issn: 1744-0572
  databaseCode: TFW
  dateStart: 20040201
  isFulltext: true
  titleUrlDefault: https://www.tandfonline.com
  providerName: Taylor & Francis
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEA4iHrz4FldXiSDeqpumbZKjiIsn2cPK7q2keaAorWx3_f3ONK2siCvopZB2prSTJvkmnfmGkAuA8NwVykQxBxclKXQRFVpZaA5iy7LYFtY0xSbEw4OcTtVoKYsfwyrRh_aBKKKZq3Fw66LuIuKuGZLapQLTqFh8JWDVjpHukwEWQIQ0mnRTMReqKfWIChFqdLlzP9zky9r0hbn020zdLD_D7f8_-A7ZaqEnvQnfyi5Zc-Ue6Yf8XDpxr17PHL2k3Ylq9rJPTuEzomFfnZYhYpxWnj5pjMaoD8jj8G58ex-1FRUiA7hlHmFaqcbATsAxXmonNDde2kQaJVL03LSVRSo8t57rTCdaJrH3jjvPpIozww_JelmV7ohQmYEEF0ZogDA2tQU4HszEKjUAQQaJ7RHe2TI3Ld04Vr14zVnLStpZI0dr5MEaPRJ9ar0Fuo1f5OVyN-XzZpvDh5okOV-t2u-6NG_HbZ0jXTwD1CMGPXL-eRlGHP5G0aWrFiDDU44cQoqvksmSTCnAUytkAArIFOAqO_77W5yQTWyFkMQ-WZ_PFu6UbJj3-XM9O2tGAxzHw8kH4fECVw
linkProvider Taylor & Francis
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwEB5RqNReeLRFXVjASKi3tJs4ie0jQqxAwIrDIrhZjh9qBcpWu0t_PzNxgkCIrYQ4Jp6JkrHH840zD4ADhPDcV8omGUcXJa9MlVRGObwcZC4tM1c52zSbEKORvLlRl2004awNqyQfOsRCEc1eTcpNh9FdSNyvlKraFYLyqNLsp0CznfEPsFKgqaVFPh5ed5sxF6pp9kgcCbF02XOvPOWZdXpWu_TFXt0YoOHaO7z6Oqy26JMdxuWyAUu-_gL9mKLLrv1dMFPPfrDuxmR6-xV2cCWxeLTO6hg0ziaB_TYUkDH7BlfD4_HRSdI2VUgsQpd5QpmlhmI7EcoEabww3AbpcmmVKMh5M05WhQjcBW5KkxuZZyF47kMqVVZavgnL9aT234HJEim4sMIginGFq9D3SG2mCosoZJC7HvBOmNq2Fcep8cWdTtvCpJ00NElDR2n0IHnk-hsrbvyHXj6dJz1vTjpCbEui-WLWfjenulXdmaaK8SkCHzHowf7jMCod_UkxtZ_cIw0vOJURUnwRTZmXSiGkWkCDaEAWiFjTrbd_xR58OhlfnOvz09HZNnymkRih2Ifl-fTe78BH-2_-ZzbdbVTjAXUtBZw
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwEB5RqKpeeBaxZaFGQr2FbuIkto8IWIGoVhxAcLMcPwQCZdHu0t_fmThBIMRWKsfEM1Eyfn3jzHwDsI8QnvtK2STj6KLklamSyiiHl4PMpWXmKmebYhNiNJI3N-riRRY_hVWSDx0iUUSzVtPkfnShi4j7lRKpXSEojSrNDgTu2hn_BEuInEtyvy6H191azIVqaj2SRkIqXfLcO095tTm9oi59s1Q3-89w5eNvvgrLLfZkh3GwrMGCr9ehHxN02bV_CGbi2U_W3RhP7jdgB8cRiwfrrI4h42wc2K2hcIzpN7ganlwenSZtSYXEInCZJZRXaiiyE4FMkMYLw22QLpdWiYJcN-NkVYjAXeCmNLmReRaC5z6kUmWl5ZuwWI9rvwVMlijBhRUGMYwrXIWeR2ozVVjEIIPc9YB3ttS25RunshcPOm1pSTtraLKGjtboQfKs9Rj5Nv4hL192k5415xwhFiXRfL5qv-tS3U7cqSa--BRhjxj0YO-5Gacc_UcxtR8_oQwvOJEIKT5PpsxLpRBQzZFBLCALxKvp9___ih_w5eJ4qH-fjc634Ss1xPDEPizOJk9-Bz7bP7O76WS3mRh_AUYiBE0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+social+network+of+hackers&rft.jtitle=Global+crime&rft.au=D%C3%A9cary-H%C3%A9tu%2C+David&rft.au=Dupont%2C+Benoit&rft.date=2012-08-01&rft.pub=Taylor+%26+Francis+Ltd&rft.issn=1744-0572&rft.eissn=1744-0580&rft.volume=13&rft.issue=3&rft.spage=160&rft_id=info:doi/10.1080%2F17440572.2012.702523&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=2753539371
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1744-0572&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1744-0572&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1744-0572&client=summon