{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T05:17:57Z","timestamp":1778563077326,"version":"3.51.4"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1109\/ecrime51433.2020.9493263","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T21:07:41Z","timestamp":1627420061000},"page":"1-14","source":"Crossref","is-referenced-by-count":1,"title":["Beneath the radar: Exploring the economics of business fraud via underground markets"],"prefix":"10.1109","author":[{"given":"Carlos H.","family":"Ganan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ugur","family":"Akyazi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elena","family":"Tsvetkova","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/wics.101"},{"key":"ref38","year":"0","journal-title":"Business fraud"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2013.780227"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2016.02.045"},{"key":"ref30","first-page":"137","article-title":"Examining signals of trust in criminal markets online","volume":"2","author":"holt","year":"2016","journal-title":"Cybersecurity"},{"key":"ref37","article-title":"Impact - Cyber Trust","year":"2020","journal-title":"Information marketplace for policy and analysis of cyber-risk & trust"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(18)30096-5"},{"key":"ref35","first-page":"1","article-title":"The rise and challenge of dark net drug markets","volume":"7","author":"buxton","year":"2015","journal-title":"Policy Brief"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1111\/j.1360-0443.2011.03709.x"},{"key":"ref10","first-page":"1009","article-title":"Plug and prey? Measuring the commoditization of cybercrime via online anonymous markets","author":"van wegberg","year":"2018","journal-title":"Proceedings of 27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186178"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380162"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-018-9777-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/147737080556056"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1108\/09685229810209414"},{"key":"ref15","first-page":"1341","article-title":"Platforms in everything: analyzing ground-truth data on the anatomy and economics of bullet-proof hosting","author":"noroozian","year":"2019","journal-title":"Proceedings of the 28th USENIX Conference on Security Symposium"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2019NRP0001"},{"key":"ref17","article-title":"The cost of malicious cyber activity to the U.S. economy","year":"2018","journal-title":"Tech Rep"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6967-5_3"},{"key":"ref19","first-page":"265","article-title":"Measuring the cost of cybercrime","author":"anderson","year":"2012","journal-title":"Proceedings of The 11th Workshop on the Economics of Information Security (WEIS &#x2018;12)"},{"key":"ref28","article-title":"The underground economy: priceless","volume":"31","author":"thomas","year":"2006","journal-title":"LOGIN The USENIX Magazine"},{"key":"ref4","first-page":"35","article-title":"Beyond the pretty penny: The economic impact of cybercrime","author":"ga\u00f1\u00e1n","year":"2017","journal-title":"Proc Workshop New Security Paradigms (NSPW)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-411630-6.00004-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.7249\/RR2299"},{"key":"ref6","first-page":"1061","article-title":"The aftermath of a crypto-ransomware attack at a large academic institution","author":"zhang-kennedy","year":"2018","journal-title":"Proceedings of 27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068824"},{"key":"ref5","article-title":"Measuring the changing cost of cybercrime","author":"anderson","year":"2019","journal-title":"Proceedings of Workshop on Economics of Information Security (WEIS &#x2018;19)"},{"key":"ref8","article-title":"NotPetya ransomware attack cost shipping giant Maersk over $200 million","author":"mathews","year":"2017","journal-title":"Forbes"},{"key":"ref7","author":"palmer","year":"2018","journal-title":"This is how much the WannaCry ransomware attack cost the NHS"},{"key":"ref2","article-title":"Net losses: Estimating the global cost of cybercrime","year":"2014","journal-title":"Tech Rep"},{"key":"ref9","first-page":"33","article-title":"Measuring the longitudinal evolution of the online anonymous marketplace ecosystem","author":"soska","year":"2015","journal-title":"Proceedings of 24th USENIX Security Symposium (USENIX Security &#x2018;15)"},{"key":"ref1","article-title":"The cost of cybercrime","author":"bissell","year":"2019","journal-title":"Tech Rep"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.006"},{"key":"ref22","article-title":"Estimating the costs of consumer-facing cybercrime: A tailored instrument and representative data for six eu countries","author":"riek","year":"2016","journal-title":"Workshop on the Economics of Information Security (WEIS04)"},{"key":"ref21","article-title":"2015 data breach investigation report","year":"2015","journal-title":"Tech Rep"},{"key":"ref24","article-title":"The economic impact of cybercrime-no slowing down","author":"lewis","year":"2018","journal-title":"Tech Rep"},{"key":"ref23","article-title":"The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates","volume":"4","author":"riek","year":"2018","journal-title":"Cybersecurity"},{"key":"ref26","article-title":"Framing dependencies introduced by underground commoditization","author":"thomas","year":"2015","journal-title":"Workshop on the Economics of Information Security (WEIS04)"},{"key":"ref25","article-title":"The cost of cyber crime","year":"2011","journal-title":"Tech Rep"}],"event":{"name":"2020 APWG Symposium on Electronic Crime Research (eCrime)","location":"Boston, MA, USA","start":{"date-parts":[[2020,11,16]]},"end":{"date-parts":[[2020,11,19]]}},"container-title":["2020 APWG Symposium on Electronic Crime Research (eCrime)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9493214\/9493247\/09493263.pdf?arnumber=9493263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:55:45Z","timestamp":1656345345000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9493263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/ecrime51433.2020.9493263","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]}}}