{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:26:21Z","timestamp":1750137981959,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/isi.2018.8587322","type":"proceedings-article","created":{"date-parts":[[2018,12,27]],"date-time":"2018-12-27T23:00:33Z","timestamp":1545951633000},"page":"136-141","source":"Crossref","is-referenced-by-count":7,"title":["Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums"],"prefix":"10.1109","author":[{"given":"Richard","family":"Frank","sequence":"first","affiliation":[]},{"given":"Myfanwy","family":"Thomson","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Mikhaylov","sequence":"additional","affiliation":[]},{"given":"Andrew J.","family":"Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/0894439304271529"},{"key":"ref11","first-page":"926","article-title":"Identifying digital threats in a hacker web forum","author":"macdonald","year":"2015","journal-title":"Advances in Social Networks Analysis and Mining (ASONAM) 2015 IEEE\/ACM International Conference on"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2013.780227"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2016.1227707"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945053"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2016.1235821"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2013.801015"},{"key":"ref17","first-page":"189","article-title":"A study of a social behaviour inside the online black markets","author":"radianti","year":"2010","journal-title":"2010 IEEE Conference on"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2011.54"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2015.1013211"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/14786011003634415"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2015.7165944"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068824"},{"key":"ref7","first-page":"1752","article-title":"Leadership in Action: How top hackers behave","author":"biswas","year":"2018","journal-title":"A big-data approach with text-mining and sentiment analysis 2018 Hawaii International Conference on System Sciences on"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(10)70022-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394049"},{"key":"ref1","article-title":"Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties Within Phishing and Malware Networks","volume":"57","author":"leukfeldt","year":"2017","journal-title":"British Journal of Criminology"},{"key":"ref20","first-page":"1","article-title":"Profiling cybercriminals: Topic model clustering of carding forum member comment histories","author":"kigerl","year":"2017","journal-title":"Social Science Computer Review"},{"key":"ref22","first-page":"1","article-title":"Thanks for Sharing&#x201D;: Using hacker forum data for prediction of knowledge sharing and withholding behaviours","author":"ogbanufe","year":"2017","journal-title":"38th International Conference on Information Systems on"},{"article-title":"The Division of Labour in Society","year":"1893","author":"durkheim","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745452"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0191-3085(00)22009-1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1177\/0894439312452998"}],"event":{"name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2018,11,9]]},"location":"Miami, FL","end":{"date-parts":[[2018,11,11]]}},"container-title":["2018 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8575039\/8587309\/08587322.pdf?arnumber=8587322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:44:43Z","timestamp":1643251483000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8587322\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isi.2018.8587322","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}