{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:32:06Z","timestamp":1753273926324,"version":"3.28.0"},"reference-count":67,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1109\/ecrime51433.2020.9493259","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T21:07:41Z","timestamp":1627420061000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of Darknet Market Activity as a Country-Specific, Socio-Economic and Technological Phenomenon"],"prefix":"10.1109","author":[{"given":"Anela","family":"Sutanrikulu","sequence":"first","affiliation":[{"name":"Technical University of Munich,Munich,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sandra","family":"Czajkowska","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Munich,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jens","family":"Grossklags","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Munich,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2211842"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-12-2017-0074"},{"key":"ref33","article-title":"A contribution to the understanding of illegal copying of software: Empirical and analytical evidence against conventional wisdom","author":"osorio","year":"2002","journal-title":"Tech Rep"},{"journal-title":"Monitoring the impact of economic crisis on crime","year":"2011","key":"ref32"},{"key":"ref31","first-page":"98","article-title":"Crime in urban areas: An empirical investigation","volume":"4","author":"gumus","year":"2004","journal-title":"Akdeniz I I B F Dergisi"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1086\/225993"},{"journal-title":"Money Laundering","year":"0","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0307"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1257\/000282804322970751"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1111\/joes.12056"},{"journal-title":"R A Language and Environment for Statistical Computing","year":"2017","key":"ref60"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2011.60263120"},{"journal-title":"User&#x2019;s Guide to Fuzzy-Set \/ Qualitative Comparative Analysis","year":"0","author":"ragin","key":"ref61"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1108\/S1479-838720190000011010"},{"journal-title":"Global security map","year":"2019","key":"ref28"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.4135\/9781452226569.n2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.12959\/issn.1855-0541.IIASS-2016-no3-art1"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1177\/2059799119862110"},{"article-title":"Cyber security 101: Protect your privacy from hackers, spies, and the government","year":"2019","author":"osborne","key":"ref66"},{"journal-title":"Juvenile Delinquency and Urban Areas","year":"1942","author":"shaw","key":"ref29"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-018-0170-8"},{"key":"ref2","article-title":"Are cryptocurrencies criminals best friends? Examining the co-evolution of Bitcoin and darknet markets","author":"janze","year":"2017","journal-title":"Twenty-third Americas Conference on Information Systems (AMCIS)"},{"key":"ref1","article-title":"Determining what characteristics constitute a darknet","author":"aked","year":"2013","journal-title":"Australian Information Security Management Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/21582041.2016.1259495"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/j.1536-7150.2010.00714.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/21582041.2016.1249937"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/00346768500000008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0166-0462(83)90029-7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2809957.2809962"},{"journal-title":"Internet Organised Crime Threat Assessment 2018","year":"0","key":"ref25"},{"journal-title":"The World Factbook","year":"0","key":"ref50"},{"journal-title":"Urbanization","year":"0","key":"ref51"},{"journal-title":"Global Bitcoin Nodes Distribution&#x2014;Bitnodes","year":"0","key":"ref59"},{"journal-title":"Bitcoin download statistics","year":"0","key":"ref58"},{"journal-title":"Userstats bridge country","year":"0","key":"ref57"},{"journal-title":"Userstats relay country","year":"0","key":"ref56"},{"journal-title":"Patent","year":"0","key":"ref55"},{"journal-title":"Unemployment","year":"0","key":"ref54"},{"journal-title":"GDP per capita current prices","year":"0","key":"ref53"},{"journal-title":"Human development reports education index","year":"0","key":"ref52"},{"key":"ref10","article-title":"Measuring the cost of cybercrime","author":"anderson","year":"2012","journal-title":"Workshop on the Economics of Information Security (WEIS)"},{"key":"ref11","first-page":"240","article-title":"Cyber crime in the society: Problems and preventions","volume":"3","author":"dashora","year":"2011","journal-title":"Journal of Alternative Perspectives in the Social Sciences"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.21061\/jots.v32i1.a.5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/add.12470"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2017.07.022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"ref15","article-title":"Bitcoin - Asset or currency? Revealing users&#x2019; hidden intentions","author":"glaser","year":"2014","journal-title":"22nd European Conference on Information Systems (ECIS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s12103-017-9394-6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186094"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/police\/pax042"},{"journal-title":"The economic financial & social impacts of organised crime in the EU","year":"2013","author":"levi","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2016.1142085"},{"article-title":"Make your site visible on the dark web: A guide to Tor hidden services","year":"2018","author":"anon","key":"ref3"},{"journal-title":"Some statistics about onions","year":"2015","key":"ref6"},{"journal-title":"Users","year":"0","key":"ref5"},{"journal-title":"Convention on Cybercrime European Treaty series no 185","year":"2001","key":"ref8"},{"year":"2017","key":"ref7","article-title":"Drugs and the darknet: Perspectives for enforcement, research and policy"},{"journal-title":"Gini index","year":"0","key":"ref49"},{"journal-title":"Cybercrime","year":"0","key":"ref9"},{"journal-title":"World Population Prospects 2019","year":"0","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330763"},{"key":"ref48","article-title":"Compliance with the AML\/CFT international standard: Lessons from a cross-country analysis","author":"yepes","year":"2011","journal-title":"Tech Rep"},{"journal-title":"Corruption perceptions index 2018","year":"0","key":"ref47"},{"key":"ref42","first-page":"357","article-title":"Patenting as an indicator of technological innovation: A review","volume":"19","author":"archibugi","year":"1992","journal-title":"Science and Public Policy"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhz015"},{"journal-title":"Dark net market archives 2011&#x2013;2015","year":"0","author":"branwen","key":"ref44"},{"journal-title":"Files for dnmarchives","year":"0","author":"branwen","key":"ref43"}],"event":{"name":"2020 APWG Symposium on Electronic Crime Research (eCrime)","start":{"date-parts":[[2020,11,16]]},"location":"Boston, MA, USA","end":{"date-parts":[[2020,11,19]]}},"container-title":["2020 APWG Symposium on Electronic Crime Research (eCrime)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9493214\/9493247\/09493259.pdf?arnumber=9493259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:57:44Z","timestamp":1659484664000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9493259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/ecrime51433.2020.9493259","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]}}}