{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:16:40Z","timestamp":1768418200606,"version":"3.49.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,30]]},"DOI":"10.1109\/ecrime57793.2022.10142120","type":"proceedings-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T02:33:43Z","timestamp":1686105223000},"page":"1-12","source":"Crossref","is-referenced-by-count":4,"title":["Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains"],"prefix":"10.1109","author":[{"given":"Dalyapraz","family":"Manatova","sequence":"first","affiliation":[{"name":"Luddy School of Informatics, Computing, and Engineering"}]},{"given":"Dewesha","family":"Sharma","sequence":"additional","affiliation":[{"name":"Luddy School of Informatics, Computing, and Engineering"}]},{"given":"Sagar","family":"Samtani","sequence":"additional","affiliation":[{"name":"Indiana University,Kelley School of Business,Bloomington,Indiana,USA"}]},{"given":"L. Jean","family":"Camp","sequence":"additional","affiliation":[{"name":"Luddy School of Informatics, Computing, and Engineering"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756845"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102489"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068824"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.21"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.03.048"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-411519-4.00006-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.334"},{"key":"ref36","article-title":"How Human Traffickers Force Victims Into Cyberscamming","author":"podkul","year":"2022","journal-title":"ProPublica"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(94)90015-9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39498-0_12"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.67.026126"},{"key":"ref10","article-title":"A &#x201C;sophisticated attack&#x201D;? innovation, technical sophistication, and creativity in the cybercrime ecosystem","author":"collier","year":"2022","journal-title":"21st Workshop on the Economics of Information"},{"key":"ref32","article-title":"Pagerank centrality and algorithms for weighted, directed networks","author":"zhang","year":"2021","journal-title":"Physica A Statistical Mechanics and its Applications"},{"key":"ref2","first-page":"1407","article-title":"Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies","author":"collier","year":"2020","journal-title":"British Journal of Criminology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-019-0603-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_10"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.aaq1360"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/15501477211015145"},{"key":"ref18","first-page":"97","article-title":"Extracting social structure from darkweb forums","author":"phillips","year":"2015","journal-title":"IARIA fifth international conference on social media technologies communication and informatics (SOTICS)"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-019-56704-4","article-title":"Assessing police topological efficiency in a major sting operation on the dark web","volume":"10","author":"da cunha","year":"2020","journal-title":"Scientific Reports"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00071"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745452"},{"key":"ref25","author":"lawson","year":"2015","journal-title":"Web Scraping with Python"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2018.00018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime54498.2021.9738782"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745500"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945053"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186178"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0059613"},{"key":"ref8","article-title":"Framing dependencies introduced by underground commoditization","author":"thomas","year":"2015","journal-title":"Workshop on the Economics of Information"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC51575.2020.9345271"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20373-7_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587327"},{"key":"ref3","first-page":"4","article-title":"The underground economy of spam: A botmaster&#x2019;s perspective of coordinating large-scale spam campaigns","author":"stone-gross","year":"2011","journal-title":"Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/eCRS.2013.6805778"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime54498.2021.9738751"}],"event":{"name":"2022 APWG Symposium on Electronic Crime Research (eCrime)","location":"Boston, MA, USA","start":{"date-parts":[[2022,11,30]]},"end":{"date-parts":[[2022,12,2]]}},"container-title":["2022 APWG Symposium on Electronic Crime Research (eCrime)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10141986\/10142077\/10142120.pdf?arnumber=10142120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T17:57:25Z","timestamp":1687802245000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10142120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,30]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ecrime57793.2022.10142120","relation":{},"subject":[],"published":{"date-parts":[[2022,11,30]]}}}