{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:13:04Z","timestamp":1773965584651,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/isi.2012.6283296","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T16:57:57Z","timestamp":1346345877000},"page":"24-29","source":"Crossref","is-referenced-by-count":48,"title":["Securing cyberspace: Identifying key actors in hacker communities"],"prefix":"10.1109","author":[{"given":"Victor","family":"Benjamin","sequence":"first","affiliation":[]},{"family":"Hsinchun Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Modeling and assessing student activities in on-line discussions","author":"kim","year":"0","journal-title":"Proceedings of the Workshop on Educational Data Mining 2006"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1038\/nature10011"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1064830.1064834"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1137\/0301010"},{"key":"16","author":"luenberger","year":"1979","journal-title":"Introduction to Dynamic Systems Theory Models & Applications"},{"key":"13","first-page":"101","article-title":"Leader traits and attributes","author":"zaccaro","year":"2004","journal-title":"The Nature of Leadership"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/s10997-006-9007-0","article-title":"Reputation, trust and the dynamics of leadership in communities of practice","volume":"10","author":"muller","year":"2006","journal-title":"Journal of Management and Governance"},{"key":"11","article-title":"Organized crime and trust: On the conceptualization and empirical relevance of trust in the context of criminal networks","volume":"6","author":"lampe","year":"2004","journal-title":"Global Crime"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.leaqua.2004.05.005"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367587"},{"key":"20","article-title":"Expertise networks in online communities: Structure and algorithms","author":"zhang","year":"0","journal-title":"World Wide Web Conference May 2007"},{"key":"22","article-title":"Motivational, structural and tenure factors that impact online community photo sharing","author":"nov","year":"0","journal-title":"Proceedings of the International AAAI Conference on Weblogs and Social Media 2009"},{"key":"23","first-page":"51","article-title":"Automatically measuring the quality of user generated content in forums","author":"chai","year":"2011","journal-title":"Proceedings of the Australasian Joint Conference on Artificial Intelligence"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1080\/14786011003634415"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1050.0158"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1504\/IJAMC.2008.022222"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526717"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09762-6_11"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-007-9059-3"},{"key":"2","author":"radianti","year":"2007","journal-title":"A Preliminary Model of the Vulnerability Black Market"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1080\/14697010500143555"},{"key":"1","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/978-3-642-03549-4_16","article-title":"Evil searching: Compromise and recompromise of Internet hosts for phishing","author":"moore","year":"2009","journal-title":"Financial Cryptography and Data Security"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2008.4565058"},{"key":"6","article-title":"Cybercrime: The transformation of crime in the information age","author":"wall","year":"2007","journal-title":"Polity"},{"key":"5","article-title":"Learning more about the underground economy: A case study of keyloggers and dropzones","author":"holz","year":"0","journal-title":"European Symposium on Research in Computer Security (ESORICS) 2009"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.27"},{"key":"9","article-title":"Reputation is valuable within and outside one's own social group","volume":"57","author":"semmans","year":"2005","journal-title":"Behavioral Ecology and Sociobiology"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13547-7"}],"event":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics. Cyberspace, Border, and Immigration Securities (ISI 2012)","location":"Arlington, VA","start":{"date-parts":[[2012,6,11]]},"end":{"date-parts":[[2012,6,14]]}},"container-title":["2012 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6269208\/6281845\/06283296.pdf?arnumber=6283296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T19:28:28Z","timestamp":1497986908000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6283296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/isi.2012.6283296","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}