Countering distrust in illicit online networks : the dispute resolution strategies of cybercriminals
dc.contributor.author | Dupont, Benoît | |
dc.contributor.author | Lusthaus, Jonathan | |
dc.date.accessioned | 2021-03-18T12:27:15Z | |
dc.date.available | NO_RESTRICTION | fr |
dc.date.available | 2021-03-18T12:27:15Z | |
dc.date.issued | 2021-03-05 | |
dc.identifier.uri | http://hdl.handle.net/1866/24922 | |
dc.publisher | SAGE | fr |
dc.subject | Cybercrime | fr |
dc.subject | Dispute resolution | fr |
dc.subject | Governance | fr |
dc.subject | Closed forums & marketplaces | fr |
dc.subject | Content analysis | fr |
dc.title | Countering distrust in illicit online networks : the dispute resolution strategies of cybercriminals | fr |
dc.type | Article | fr |
dc.contributor.affiliation | Université de Montréal. Faculté des arts et des sciences. École de criminologie | fr |
dc.identifier.doi | 10.1177/0894439321994623 | |
dcterms.abstract | The core of this paper is a detailed investigation of the dispute resolution system contained within Darkode, an elite cybercriminal forum. Extracting the dedicated disputes section from within the marketplace, where users can report bad behaviour and register complaints, we carry out content analysis on these threads. This involves both descriptive statistics across the dataset and qualitative analysis of particular posts of interest, leading to a number of new insights. First, the overall level of disputes is quite high, even though members are vetted for entry in the first instance. Second, the lower ranked members of the marketplace are the most highly represented category for both the plaintiffs and defendants. Third, vendors are accused of malfeasance far more often than buyers, and that their “crimes” are most commonly either not providing the product/service or providing a poor one. Fourth, the monetary size of the disputes is surprisingly small. Finally, only 23.1% of disputes reach a clear outcome. | fr |
dcterms.isPartOf | urn:ISSN:0894-4393 | fr |
dcterms.isPartOf | urn:ISSN:1552-8286 | fr |
dcterms.language | eng | fr |
UdeM.ReferenceFournieParDeposant | https://doi.org/10.1177/0894439321994623 | fr |
UdeM.VersionRioxx | Version acceptée / Accepted Manuscript | fr |
oaire.citationTitle | Social science computer review | fr |
Fichier·s constituant ce document
Ce document figure dans la ou les collections suivantes
Ce document diffusé sur Papyrus est la propriété exclusive des titulaires des droits d'auteur et est protégé par la Loi sur le droit d'auteur (L.R.C. (1985), ch. C-42). Il peut être utilisé dans le cadre d'une utilisation équitable et non commerciale, à des fins d'étude privée ou de recherche, de critique ou de compte-rendu comme le prévoit la Loi. Pour toute autre utilisation, une autorisation écrite des titulaires des droits d'auteur sera nécessaire.