{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:44:07Z","timestamp":1746297847213,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/cybersa.2018.8551424","type":"proceedings-article","created":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T00:11:06Z","timestamp":1543536666000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["A Netnographic Study on the Dark Net Ecosystem for Ransomware"],"prefix":"10.1109","author":[{"given":"Yara Fareed","family":"Fahmy Bayoumy","sequence":"first","affiliation":[]},{"given":"Per","family":"Hakon Meland","sequence":"additional","affiliation":[]},{"given":"Guttorm","family":"Sindre","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2016.05.006"},{"journal-title":"Netnography","year":"2015","author":"kozinets","key":"ref32"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1515\/zfsoz-1990-0602","article-title":"Grounded theory research: Procedures, canons and evaluative criteria","volume":"19","author":"corbin","year":"1990","journal-title":"Zeitschrift f&#x00FC;r Soziologie"},{"key":"ref30","first-page":"114","article-title":"Deep web information retrieval process","author":"sharma","year":"2017","journal-title":"In The Dark Web Breakthroughs in Research and Practice"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.4324\/9781315777870"},{"key":"ref34","article-title":"Silk road 2.0-a study of cryptomarkets in a deleuze-guattarian perspective","author":"bakken","year":"2015","journal-title":"Master&#x2019;s thesis"},{"key":"ref10","article-title":"The plight of the targeted attacker in a world of scale","author":"herley","year":"2010","journal-title":"WEIS"},{"key":"ref11","article-title":"The underground economy: priceless","volume":"31","author":"cymru","year":"2006","journal-title":"login"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.61"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2012.07.002"},{"key":"ref14","article-title":"An investigation into chinese cybercrime and the underground economy in comparison with the west","author":"yip","year":"2010","journal-title":"Ph D Dissertation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.12.001"},{"journal-title":"Securing national e-ID infrastructures Tor networks as a source of threats","year":"2018","author":"spagnoletti","key":"ref16"},{"article-title":"The Ransomware Economy","year":"2017","author":"black","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2016.1142085"},{"year":"2017","key":"ref28","article-title":"Quarterly Threat Report Q1 2017"},{"year":"2014","key":"ref4","article-title":"Threat intelligence: What is it, and how can it protect you from todays advanced cyber-attacks?"},{"volume":"22","article-title":"Internet Security Threat Report","year":"2017","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-319-11599-3_12","article-title":"Attacker profiling in quantitative security assessment based on attack trees","author":"lenin","year":"2014","journal-title":"Proc of Springer Nordic Conference on Secure IT Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420971"},{"key":"ref29","article-title":"Satan ransomware: old name, new business model","author":"ducklin","year":"2017","journal-title":"Naked Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25073-6_3"},{"key":"ref8","first-page":"35","article-title":"Sex, lies and cyber-crime surveys","author":"flor\u00eancio","year":"2013","journal-title":"Economics of Information Security and Privacy III"},{"article-title":"An economic map of cybercrime","year":"2009","author":"c\u00e1rdenas","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref9","first-page":"51","article-title":"Russian underground 101","author":"goncharov","year":"2012","journal-title":"Trend Micro Incorporated Research Paper"},{"journal-title":"Threat Modeling Designing for Security","year":"2014","author":"shostack","key":"ref1"},{"journal-title":"The new face of organized crime","year":"2015","author":"dishman","key":"ref20"},{"year":"2017","key":"ref22","article-title":"Internet Organised Crime Threat Assessment (IOCTA)"},{"year":"2017","key":"ref21","article-title":"Internet Organised Crime Threat Assessment (IOCTA)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0092-2"},{"key":"ref23","article-title":"Evolution, resilience and organizational morphing in anonymous online marketplaces","author":"ceci","year":"2018","journal-title":"To appear in AOM Specialized Conference Big Data and Managing in a Digital Economy"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(17)30081-7"},{"year":"2018","key":"ref25","article-title":"Ransomware &#x2014; Wikipedia, the free encyclopedia"}],"event":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2018,6,11]]},"location":"Glasgow","end":{"date-parts":[[2018,6,12]]}},"container-title":["2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536739\/8551360\/08551424.pdf?arnumber=8551424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:51:22Z","timestamp":1643251882000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8551424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2018.8551424","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}