Countering distrust in illicit online networks : the dispute resolution strategies of cybercriminals
dc.contributor.author | Dupont, Benoît | |
dc.contributor.author | Lusthaus, Jonathan | |
dc.date.accessioned | 2021-03-18T12:27:15Z | |
dc.date.available | NO_RESTRICTION | fr |
dc.date.available | 2021-03-18T12:27:15Z | |
dc.date.issued | 2021-03-05 | |
dc.identifier.uri | http://hdl.handle.net/1866/24922 | |
dc.publisher | SAGE | fr |
dc.subject | Cybercrime | fr |
dc.subject | Dispute resolution | fr |
dc.subject | Governance | fr |
dc.subject | Closed forums & marketplaces | fr |
dc.subject | Content analysis | fr |
dc.title | Countering distrust in illicit online networks : the dispute resolution strategies of cybercriminals | fr |
dc.type | Article | fr |
dc.contributor.affiliation | Université de Montréal. Faculté des arts et des sciences. École de criminologie | fr |
dc.identifier.doi | 10.1177/0894439321994623 | |
dcterms.abstract | The core of this paper is a detailed investigation of the dispute resolution system contained within Darkode, an elite cybercriminal forum. Extracting the dedicated disputes section from within the marketplace, where users can report bad behaviour and register complaints, we carry out content analysis on these threads. This involves both descriptive statistics across the dataset and qualitative analysis of particular posts of interest, leading to a number of new insights. First, the overall level of disputes is quite high, even though members are vetted for entry in the first instance. Second, the lower ranked members of the marketplace are the most highly represented category for both the plaintiffs and defendants. Third, vendors are accused of malfeasance far more often than buyers, and that their “crimes” are most commonly either not providing the product/service or providing a poor one. Fourth, the monetary size of the disputes is surprisingly small. Finally, only 23.1% of disputes reach a clear outcome. | fr |
dcterms.isPartOf | urn:ISSN:0894-4393 | fr |
dcterms.isPartOf | urn:ISSN:1552-8286 | fr |
dcterms.language | eng | fr |
UdeM.ReferenceFournieParDeposant | https://doi.org/10.1177/0894439321994623 | fr |
UdeM.VersionRioxx | Version acceptée / Accepted Manuscript | fr |
oaire.citationTitle | Social science computer review | fr |
Files in this item
This item appears in the following Collection(s)
This document disseminated on Papyrus is the exclusive property of the copyright holders and is protected by the Copyright Act (R.S.C. 1985, c. C-42). It may be used for fair dealing and non-commercial purposes, for private study or research, criticism and review as provided by law. For any other use, written authorization from the copyright holders is required.