The social network of hackers
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools tha...
Uložené v:
| Vydané v: | Global crime Ročník 13; číslo 3; s. 160 - 175 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Abingdon
Taylor & Francis
01.08.2012
Taylor & Francis Ltd |
| Predmet: | |
| ISSN: | 1744-0572, 1744-0580 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment. |
|---|---|
| AbstractList | Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment. Reproduced by permission of Taylor and Francis Ltd. Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment. Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment. [PUBLICATION ABSTRACT] Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment. Adapted from the source document. |
| Author | Dupont, Benoit Décary-Hétu, David |
| Author_xml | – sequence: 1 givenname: David surname: Décary-Hétu fullname: Décary-Hétu, David email: david.hetu@gmail.com organization: School of Criminology, Université de Montréal – sequence: 2 givenname: Benoit surname: Dupont fullname: Dupont, Benoit organization: School of Criminology, Université de Montréal |
| BookMark | eNqNkU1LAzEQhoNUsK3-A4UFL15aM_nYZL2IFL-g4KWew5hN6LbbTU22SP-9W6oePFhPMwzP-8LwDEivCY0j5BzoGKim16CEoFKxMaPAxooyyfgR6e_OIyo17f3sip2QQUoLSrkqdN4nF7O5y1KwFdZZ49qPEJdZ8Nkc7dLFdEqOPdbJnX3NIXl9uJ9NnkbTl8fnyd10ZCXIdqQ0AAqgMgfpNTqF3HpdCm0LJaEAhaV-k8rz0nPMUaAWzHvHnQddsNzyIbna965jeN-41JpVlayra2xc2CQDghVaCi7hMMpzkRcFA_kPVHKmqSp4h17-QhdhE5vuZwOUa2CgFe0osadsDClF5806ViuM2w4yOxPm24TZmTB7E13s5lfMVi22VWjaiFV9KHy7D1eND3GFnaG6NC1u6xB9xMZWyfA_Gz4BExieog |
| CitedBy_id | crossref_primary_10_1146_annurev_criminol_032317_092057 crossref_primary_10_1080_0960085X_2024_2305802 crossref_primary_10_1007_s10610_017_9356_z crossref_primary_10_1007_s10611_016_9649_z crossref_primary_10_1177_08944393221097881 crossref_primary_10_1177_1079063215616818 crossref_primary_10_1080_17440572_2025_2473350 crossref_primary_10_1089_cyber_2014_0008 crossref_primary_10_1111_1745_9133_12684 crossref_primary_10_1007_s12117_022_09474_x crossref_primary_10_1080_10538712_2023_2214540 crossref_primary_10_1080_17440572_2013_787925 crossref_primary_10_1108_K_11_2023_2517 crossref_primary_10_1177_1477370818788007 crossref_primary_10_1080_17440572_2016_1227707 crossref_primary_10_7202_1026733ar crossref_primary_10_1146_annurev_soc_090523_052916 crossref_primary_10_1007_s12117_018_9342_y crossref_primary_10_1177_1098611118796890 crossref_primary_10_3917_sestr_011_0025 crossref_primary_10_1016_j_socnet_2022_01_008 crossref_primary_10_1017_cri_2025_1 crossref_primary_10_1016_j_diin_2018_12_005 crossref_primary_10_1007_s12117_019_09366_7 crossref_primary_10_1016_j_ssresearch_2016_04_010 crossref_primary_10_1080_17440572_2015_1005363 crossref_primary_10_1007_s12117_014_9229_5 crossref_primary_10_1017_S0003975618000115 crossref_primary_10_1177_0022042617751685 crossref_primary_10_1080_01639625_2016_1197001 crossref_primary_10_1080_01639625_2025_2551790 crossref_primary_10_1093_bjc_azaa091 crossref_primary_10_1007_s12117_022_09476_9 crossref_primary_10_1080_01639625_2024_2352049 crossref_primary_10_1016_j_diin_2015_09_005 crossref_primary_10_1080_17440572_2021_1998772 crossref_primary_10_1007_s10611_024_10182_6 crossref_primary_10_1007_s12117_017_9313_8 crossref_primary_10_1093_bjc_azw009 crossref_primary_10_1080_07418825_2015_1046393 crossref_primary_10_1080_01639625_2013_822209 crossref_primary_10_1080_17440572_2025_2517027 crossref_primary_10_1177_0002764217734263 crossref_primary_10_1007_s10611_016_9663_1 crossref_primary_10_1016_j_socnet_2021_01_006 crossref_primary_10_1177_00111287251335013 crossref_primary_10_1007_s12117_016_9284_1 crossref_primary_10_1177_0002764217734267 crossref_primary_10_1080_13523260_2019_1669336 crossref_primary_10_1007_s11186_025_09637_z crossref_primary_10_1080_17440572_2023_2211521 crossref_primary_10_1177_1043986217699100 crossref_primary_10_1093_police_pax057 crossref_primary_10_7202_1065856ar crossref_primary_10_1080_01639625_2024_2373356 crossref_primary_10_1080_15614263_2018_1507889 |
| ContentType | Journal Article |
| Copyright | Copyright Taylor & Francis Group, LLC 2012 Copyright Taylor & Francis Ltd. 2012 |
| Copyright_xml | – notice: Copyright Taylor & Francis Group, LLC 2012 – notice: Copyright Taylor & Francis Ltd. 2012 |
| DBID | AAYXX CITATION 7U4 8BJ BHHNA DWI FQK JBE WZK 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1080/17440572.2012.702523 |
| DatabaseName | CrossRef Sociological Abstracts (pre-2017) International Bibliography of the Social Sciences (IBSS) Sociological Abstracts Sociological Abstracts International Bibliography of the Social Sciences International Bibliography of the Social Sciences Sociological Abstracts (Ovid) Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Sociological Abstracts (pre-2017) International Bibliography of the Social Sciences (IBSS) Sociological Abstracts Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | International Bibliography of the Social Sciences (IBSS) Sociological Abstracts (pre-2017) Computer and Information Systems Abstracts Sociological Abstracts (pre-2017) |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Social Welfare & Social Work |
| EISSN | 1744-0580 |
| EndPage | 175 |
| ExternalDocumentID | 2753539371 10_1080_17440572_2012_702523 702523 |
| Genre | Feature |
| GroupedDBID | -~X .7I .QK 0BK 0R~ 1PW 29I 4.4 5GY AAGDL AAGZJ AAHIA AAMFJ AAMIU AAPUL AATTQ AAZMC ABCCY ABFIM ABJNI ABLIJ ABPEM ABTAI ABXUL ABXYU ABZLS ACGFS ACTIO ACTOA ADAHI ADCVX ADKVQ ADLRE ADXPE ADZJE AECIN AEFOU AEISY AEKEX AEOZL AEPSL AEYOC AEZRU AFRVT AGDLA AGMYJ AGRBW AHDZW AIJEM AIYEW AJWEG AKBVH ALMA_UNASSIGNED_HOLDINGS ALQZU AQTUD AVBZW AWYRJ BEJHT BLEHA BMOTO BOHLJ CCCUG CQ1 CS3 DGFLZ DKSSO EBS EIS EJD ESI EV9 E~B E~C FIL G-F GTTXZ H13 HF~ HZ~ IPNFZ J.O KYCEM M4Z NA5 O9- PQQKQ RIG RNANH ROSJB RSYQP S-F STATR TASJS TBQAZ TDBHL TEW TFH TFL TFW TNTFI TRJHH TUROJ ULE UT5 UT9 VAE ~01 ~S~ 5VS AAEXZ AANOT AAYXX ABALO ABGVH ABTOG ACIQO AEZLS AJLVH BRICJ BTFIH CAG CITATION COF LJTGL OMIPZ 7U4 8BJ BHHNA DWI FQK JBE WZK 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c515t-7811a4105615f8ae7a3cf8d48c9751917ad8b57f3df3a6a4a842ffe3ef18926c3 |
| IEDL.DBID | 1PW |
| ISICitedReferencesCount | 77 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000212612600002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1744-0572 |
| IngestDate | Wed Oct 01 14:44:20 EDT 2025 Thu Aug 07 14:27:19 EDT 2025 Thu Sep 04 14:32:07 EDT 2025 Mon Nov 10 21:42:08 EST 2025 Sat Nov 29 03:00:23 EST 2025 Tue Nov 18 21:45:47 EST 2025 Mon Oct 20 23:41:38 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c515t-7811a4105615f8ae7a3cf8d48c9751917ad8b57f3df3a6a4a842ffe3ef18926c3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 ObjectType-Article-1 ObjectType-Feature-2 |
| PQID | 1038121870 |
| PQPubID | 52915 |
| PageCount | 16 |
| ParticipantIDs | proquest_miscellaneous_1429854351 proquest_miscellaneous_1353280793 proquest_miscellaneous_1364699215 proquest_journals_1038121870 crossref_primary_10_1080_17440572_2012_702523 informaworld_taylorfrancis_310_1080_17440572_2012_702523 crossref_citationtrail_10_1080_17440572_2012_702523 |
| PublicationCentury | 2000 |
| PublicationDate | 2012-08-00 |
| PublicationDateYYYYMMDD | 2012-08-01 |
| PublicationDate_xml | – month: 08 year: 2012 text: 2012-08-00 |
| PublicationDecade | 2010 |
| PublicationPlace | Abingdon |
| PublicationPlace_xml | – name: Abingdon |
| PublicationTitle | Global crime |
| PublicationYear | 2012 |
| Publisher | Taylor & Francis Taylor & Francis Ltd |
| Publisher_xml | – name: Taylor & Francis – name: Taylor & Francis Ltd |
| SSID | ssj0037986 |
| Score | 2.218369 |
| Snippet | Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under... |
| SourceID | proquest crossref informaworld |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 160 |
| SubjectTerms | Arrest Arrests botnet Case studies Communication networks Constraining Crime Criminology Cybercrime Effectiveness studies Focusing Hackers Hacking Information Internet Monitors Networks organised crime Researcher Subject Relations Researchers Segmentation Social media Social network analysis Social Networks Strikes Technical efficiency Values |
| Title | The social network of hackers |
| URI | https://www.tandfonline.com/doi/abs/10.1080/17440572.2012.702523 https://www.proquest.com/docview/1038121870 https://www.proquest.com/docview/1353280793 https://www.proquest.com/docview/1364699215 https://www.proquest.com/docview/1429854351 |
| Volume | 13 |
| WOSCitedRecordID | wos000212612600002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAWR databaseName: Taylor & Francis Criminology and Law Collection customDbUrl: eissn: 1744-0580 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0037986 issn: 1744-0572 databaseCode: 1PW dateStart: 20040201 isFulltext: true titleUrlDefault: https://www.tandfonline.com providerName: Taylor & Francis – providerCode: PRVAWR databaseName: Taylor & Francis Online Journals customDbUrl: eissn: 1744-0580 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0037986 issn: 1744-0572 databaseCode: TFW dateStart: 20040201 isFulltext: true titleUrlDefault: https://www.tandfonline.com providerName: Taylor & Francis |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEA4iHrz4FldXiSDeqpumbZKjiIsn2cPK7q2keaAorWx3_f3ONK2siCvopZB2prSTJvkmnfmGkAuA8NwVykQxBxclKXQRFVpZaA5iy7LYFtY0xSbEw4OcTtVoKYsfwyrRh_aBKKKZq3Fw66LuIuKuGZLapQLTqFh8JWDVjpHukwEWQIQ0mnRTMReqKfWIChFqdLlzP9zky9r0hbn020zdLD_D7f8_-A7ZaqEnvQnfyi5Zc-Ue6Yf8XDpxr17PHL2k3Ylq9rJPTuEzomFfnZYhYpxWnj5pjMaoD8jj8G58ex-1FRUiA7hlHmFaqcbATsAxXmonNDde2kQaJVL03LSVRSo8t57rTCdaJrH3jjvPpIozww_JelmV7ohQmYEEF0ZogDA2tQU4HszEKjUAQQaJ7RHe2TI3Ld04Vr14zVnLStpZI0dr5MEaPRJ9ar0Fuo1f5OVyN-XzZpvDh5okOV-t2u-6NG_HbZ0jXTwD1CMGPXL-eRlGHP5G0aWrFiDDU44cQoqvksmSTCnAUytkAArIFOAqO_77W5yQTWyFkMQ-WZ_PFu6UbJj3-XM9O2tGAxzHw8kH4fECVw |
| linkProvider | Taylor & Francis |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwEB5RqNReeLRFXVjASKi3tJs4ie0jQqxAwIrDIrhZjh9qBcpWu0t_PzNxgkCIrYQ4Jp6JkrHH840zD4ADhPDcV8omGUcXJa9MlVRGObwcZC4tM1c52zSbEKORvLlRl2004awNqyQfOsRCEc1eTcpNh9FdSNyvlKraFYLyqNLsp0CznfEPsFKgqaVFPh5ed5sxF6pp9kgcCbF02XOvPOWZdXpWu_TFXt0YoOHaO7z6Oqy26JMdxuWyAUu-_gL9mKLLrv1dMFPPfrDuxmR6-xV2cCWxeLTO6hg0ziaB_TYUkDH7BlfD4_HRSdI2VUgsQpd5QpmlhmI7EcoEabww3AbpcmmVKMh5M05WhQjcBW5KkxuZZyF47kMqVVZavgnL9aT234HJEim4sMIginGFq9D3SG2mCosoZJC7HvBOmNq2Fcep8cWdTtvCpJ00NElDR2n0IHnk-hsrbvyHXj6dJz1vTjpCbEui-WLWfjenulXdmaaK8SkCHzHowf7jMCod_UkxtZ_cIw0vOJURUnwRTZmXSiGkWkCDaEAWiFjTrbd_xR58OhlfnOvz09HZNnymkRih2Ifl-fTe78BH-2_-ZzbdbVTjAXUtBZw |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwEB5RqKpeeBaxZaFGQr2FbuIkto8IWIGoVhxAcLMcPwQCZdHu0t_fmThBIMRWKsfEM1Eyfn3jzHwDsI8QnvtK2STj6KLklamSyiiHl4PMpWXmKmebYhNiNJI3N-riRRY_hVWSDx0iUUSzVtPkfnShi4j7lRKpXSEojSrNDgTu2hn_BEuInEtyvy6H191azIVqaj2SRkIqXfLcO095tTm9oi59s1Q3-89w5eNvvgrLLfZkh3GwrMGCr9ehHxN02bV_CGbi2U_W3RhP7jdgB8cRiwfrrI4h42wc2K2hcIzpN7ganlwenSZtSYXEInCZJZRXaiiyE4FMkMYLw22QLpdWiYJcN-NkVYjAXeCmNLmReRaC5z6kUmWl5ZuwWI9rvwVMlijBhRUGMYwrXIWeR2ozVVjEIIPc9YB3ttS25RunshcPOm1pSTtraLKGjtboQfKs9Rj5Nv4hL192k5415xwhFiXRfL5qv-tS3U7cqSa--BRhjxj0YO-5Gacc_UcxtR8_oQwvOJEIKT5PpsxLpRBQzZFBLCALxKvp9___ih_w5eJ4qH-fjc634Ss1xPDEPizOJk9-Bz7bP7O76WS3mRh_AUYiBE0 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+social+network+of+hackers&rft.jtitle=Global+crime&rft.au=D%C3%A9cary-H%C3%A9tu%2C+David&rft.au=Dupont%2C+Benoit&rft.date=2012-08-01&rft.pub=Taylor+%26+Francis+Ltd&rft.issn=1744-0572&rft.eissn=1744-0580&rft.volume=13&rft.issue=3&rft.spage=160&rft_id=info:doi/10.1080%2F17440572.2012.702523&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=2753539371 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1744-0572&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1744-0572&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1744-0572&client=summon |