{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:26:28Z","timestamp":1743049588942,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":43,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461461692"},{"type":"electronic","value":"9781461461708"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-6170-8_55","type":"book-chapter","created":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T14:46:07Z","timestamp":1412433967000},"page":"319-332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dark Sides of Social Networking"],"prefix":"10.1007","author":[{"given":"Brian C.","family":"Keegan","sequence":"first","affiliation":[]},{"given":"Muhammad Aurangzeb","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"key":"55_CR41","volume-title":"Cybercrime: digital cops in a networked environment","author":"JM Balkin","year":"2007","unstructured":"Balkin JM, Kozlovski N (2007) Introduction. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York"},{"key":"55_CR42","first-page":"311","volume":"46","author":"Y Benkler","year":"2011","unstructured":"Benkler Y (2011) A free irresponsible press: Wikileaks and the battle over the soul of the networked fourth estate. Harv Civ Rights-Civ Liberties Law Rev 46:311","journal-title":"Harv Civ Rights-Civ Liberties Law Rev"},{"key":"55_CR43","doi-asserted-by":"crossref","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3). http:\/\/www.cs.umn.edu\/tech_reports_upload\/tr2007\/07 -017.pdf. Accessed 17 June 2013","DOI":"10.1145\/1541880.1541882"},{"key":"55_CR44","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/978-1-4614-1557-2_15","volume-title":"Dark web","author":"H Chen","year":"2012","unstructured":"Chen H (2012) Extremist Youtube videos. In: Chen H (ed) Dark web. Springer, New York, pp 295\u2013318"},{"key":"55_CR45","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/ISI.2008.4565037","volume-title":"IEEE international conference on intelligence and security informatics, ISI 2008","author":"H Chen","year":"2008","unstructured":"Chen H, Thoms S, Fu T (2008) Cyber extremism in web 2.0: an exploratory study of international jihadist groups. In: IEEE international conference on intelligence and security informatics, ISI 2008, Taipei. IEEE, pp 98\u2013103"},{"key":"55_CR46","volume-title":"Handbook of internet crime","author":"DE Denning","year":"2009","unstructured":"Denning DE (2009) Terror's web: how the internet is transforming terrorism. In: Yar M, Jewkes Y (eds) Handbook of internet crime. Willan Publishing, New York"},{"key":"55_CR47","volume-title":"Play money: or, how i quit my day job and made millions trading virtual loot","author":"J Dibbell","year":"2006","unstructured":"Dibbell J (2006) Play money: or, how i quit my day job and made millions trading virtual loot. Basic Books, New York"},{"key":"55_CR48","volume-title":"Structural analysis in the social sciences, vol 34","author":"SF Everton","year":"2012","unstructured":"Everton SF (2012) Disrupting dark networks. Structural analysis in the social sciences, vol 34. Cambridge University Press, New York"},{"issue":"1","key":"55_CR49","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/00396338.2011.555586","volume":"53","author":"JP Farwell","year":"2011","unstructured":"Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23\u201340","journal-title":"Survival"},{"key":"55_CR410","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1257\/jep.15.1.13","volume":"15","author":"A Goolsbee","year":"2001","unstructured":"Goolsbee A (2001) The implications of electronic commerce for fiscal policy (and vice versa). J Econ Perspect 15:13\u201323","journal-title":"J Econ Perspect"},{"key":"55_CR411","volume-title":"Crime and the internet","author":"P Grabosky","year":"2001","unstructured":"Grabosky P, Smith R (2001) Telecommunication fraud in the digital age. In: Wall DS (ed) Crime and the internet. Routledge, London"},{"issue":"1","key":"55_CR412","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1462148.1462150","volume":"3","author":"C Jackson","year":"2009","unstructured":"Jackson C, Barth A, Bortz A, Shao W, Boneh D (2009) Protecting browsers from DNS rebinding attacks. ACM Trans Web 3(1):1\u201326","journal-title":"ACM Trans Web"},{"issue":"10","key":"55_CR413","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94\u2013100","journal-title":"Social phishing. Commun ACM"},{"key":"55_CR414","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1145\/1341531.1341560","volume-title":"Proceedings of the international conference on web search and web data mining","author":"N Jindal","year":"2008","unstructured":"Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the international conference on web search and web data mining, Palo Alto, pp 219\u2013230"},{"issue":"2","key":"55_CR415","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618\u2013644","journal-title":"Decis Support Syst"},{"key":"55_CR416","volume-title":"IEEE conference on social computing","author":"B Keegan","year":"2010","unstructured":"Keegan B, Ahmed M, Williams D, Srivastava J, Contractor N (2010) Dark gold: statistical properties of clandestine networks in massively multiplayer online games. In: IEEE conference on social computing, Minneapolis"},{"key":"55_CR417","first-page":"1","volume-title":"Proceedings of the ACM WebSci'11","author":"B Keegan","year":"2011","unstructured":"Keegan B, Ahmad MA, Williams D, Srivastava J, Contractor N (2011) Sic transit gloria mundi virtuali? Promise and peril in the computational social science of clandestine organizing. In: Proceedings of the ACM WebSci'11, Koblenz, pp 1\u20138"},{"key":"55_CR418","volume-title":"Cybercrime: digital cops in a networked environment","author":"N Kozlovski","year":"2007","unstructured":"Kozlovski N (2007) Designing accountable online policing. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York"},{"key":"55_CR419","unstructured":"Landler M, Sanger D (2013) US demands China block cyberattacks and agree to rules. The New York Times. http:\/\/www.nytimes.com\/2013\/03\/12\/world\/asia\/us-demands-that-china-end-hacking-and-set-cyber-rules.html . Accessed 12 May 2013"},{"key":"55_CR420","volume-title":"The state of play: law, games, and virtual worlds","author":"FG Lastowka","year":"2006","unstructured":"Lastowka FG, Hunter D (2006) Virtual crime. In: Balkin J, Noveck B (eds) The state of play: law, games, and virtual worlds. New York University Press, New York"},{"key":"55_CR421","first-page":"2275","volume-title":"2000 IEEE international conference on systems, man, and cybernetics, Nashville, vol 3","author":"F Lau","year":"2000","unstructured":"Lau F, Rubin SH, Smith MH, Trajkovic L (2000) Distributed denial of service attacks. In: 2000 IEEE international conference on systems, man, and cybernetics, Nashville, vol 3. IEEE, pp 2275\u20132280"},{"key":"55_CR422","doi-asserted-by":"crossref","DOI":"10.1596\/27361","volume-title":"Knowledge map of the virtual economy: converting the virtual economy into development potential","author":"V Lehdonvirta","year":"2011","unstructured":"Lehdonvirta V, Ernkvist M (2011) Knowledge map of the virtual economy: converting the virtual economy into development potential. Technical report, The World Bank, Washington, DC"},{"key":"55_CR423","volume-title":"Hackers: heroes of the computer revolution, vol 4","author":"S Levy","year":"2001","unstructured":"Levy S (2001) Hackers: heroes of the computer revolution, vol 4. Penguin Books, New York"},{"issue":"3","key":"55_CR424","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1080\/10967490600899747","volume":"9","author":"HB Milward","year":"2006","unstructured":"Milward HB, Raab J (2006) Dark networks as organizational problems: elements of a theory 1. Int Public Manag J 9(3):333\u2013360","journal-title":"Int Public Manag J"},{"issue":"2","key":"55_CR425","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2):39\u201353","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"55_CR426","volume-title":"The art of deception: controlling the human element of security","author":"KD Mitnick","year":"2002","unstructured":"Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, Indianapolis"},{"key":"55_CR427","volume-title":"Identity theft literature review","author":"G Newman","year":"2005","unstructured":"Newman G, McNally MM (2005) Identity theft literature review. National Institute of Justice, Rockville"},{"key":"55_CR428","volume-title":"Cybercrime: digital cops in a networked environment","author":"H Nissenbaum","year":"2007","unstructured":"Nissenbaum H (2007) Where computer security meets national security. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York"},{"key":"55_CR429","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/2187836.2187864","volume-title":"Proceedings of the 21st international conference on world wide web","author":"M Ott","year":"2012","unstructured":"Ott M, Cardie C, Hancock J (2012) Estimating the prevalence of deception in online review communities. In: Proceedings of the 21st international conference on world wide web, Lyon. ACM, pp 201\u2013210"},{"key":"55_CR430","unstructured":"Owens WA, Dam KW, Lin HS (2009) Technology, policy, law, and ethics regarding US acquisition and use of cyberattack capabilities. The National Academy Press. http:\/\/www.steptoe.com\/assets\/attachments\/3785.pdf. . Accessed 17 June 2013"},{"issue":"1","key":"55_CR431","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1287\/isre.1040.0015","volume":"15","author":"PA Pavlou","year":"2004","unstructured":"Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37\u201359","journal-title":"Inf Syst Res"},{"issue":"2","key":"55_CR432","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.qref.2004.12.019","volume":"45","author":"CA Primo Braga","year":"2005","unstructured":"Primo Braga CA (2005) E-commerce regulation: new game, new rules? Q Rev Econ Finance 45(2): 541\u2013558","journal-title":"Q Rev Econ Finance"},{"key":"55_CR433","volume-title":"Child pornography: an internet crime","author":"E Quayle","year":"2003","unstructured":"Quayle E (2003) Child pornography: an internet crime. Routledge, New York"},{"issue":"1","key":"55_CR434","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1177\/14614440222226271","volume":"4","author":"BH Spitzberg","year":"2002","unstructured":"Spitzberg BH, Hoobler G (2002) Cyberstalking and the technologies of interpersonal terrorism. New Media Soc 4(1):71\u201392","journal-title":"New Media Soc"},{"issue":"2","key":"55_CR435","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1111\/j.1468-2885.2007.00289.x","volume":"17","author":"C Stohl","year":"2007","unstructured":"Stohl C, Stohl M (2007) Networks of terror: theoretical assumptions and pragmatic consequences. Commun Theory 17(2):93\u2013124","journal-title":"Commun Theory"},{"key":"55_CR436","volume-title":"Cybercrime: digital cops in a networked environment","author":"KA Taipale","year":"2007","unstructured":"Taipale KA (2007) How technology, security, and privacy can coexist in the digital age. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York"},{"key":"55_CR437","volume-title":"Hackers: crime in the digital sublime","author":"P Taylor","year":"1999","unstructured":"Taylor P (1999) Hackers: crime in the digital sublime. Routledge, New York"},{"key":"55_CR438","volume-title":"Hacker culture","author":"D Thomas","year":"2003","unstructured":"Thomas D (2003) Hacker culture. University of Minnesota Press, Minneapolis"},{"key":"55_CR439","unstructured":"Traynor I (2007) Russia accused of unleashing cyberwar to disable Estonia. The guardian. http:\/\/www.guardian.co.uk\/world\/2007\/may\/17\/topstories3.russia. . Accessed 17 June 2013"},{"key":"55_CR440","volume-title":"Crime and the internet","author":"D Wall","year":"2001","unstructured":"Wall D (2001a) Cybercrimes and the internet. In: Wall D (ed) Crime and the internet. Routledge, New York"},{"key":"55_CR441","volume-title":"Crime and the internet","author":"DS Wall","year":"2001","unstructured":"Wall DS (2001b) Maintaining order and law on the internet. In: Wall D (ed) Crime and the internet. Routledge, New York"},{"key":"55_CR442","volume-title":"Cybercrime: the transformation of crime in the information age","author":"D Wall","year":"2007","unstructured":"Wall D (2007) Cybercrime: the transformation of crime in the information age. Polity, Cambridge\/Malden"},{"key":"55_CR443","doi-asserted-by":"crossref","DOI":"10.4135\/9781446212196","volume-title":"Cybercrime and society","author":"M Yar","year":"2006","unstructured":"Yar M (2006) Cybercrime and society. Sage, London"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-6170-8_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T01:19:45Z","timestamp":1689556785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-6170-8_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9781461461692","9781461461708"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-6170-8_55","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"5 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}