Encyclopedia of Social Network Analysis and Mining

2018 Edition
| Editors: Reda Alhajj, Jon Rokne

Deviant and Criminal Uses of Social Networks

  • Brian C. KeeganEmail author
  • Muhammad Aurangzeb Ahmad
Reference work entry
DOI: https://doi.org/10.1007/978-1-4939-7131-2_55




Persistent harassment in an online setting


Domain name server


Unauthorized access to a computer system


Structured Query Language is a special purpose programming language for database management systems


Cybercrime is the transformation of criminal, harmful, or illicit behavior by networked information and communication technologies (Wall 2007; Yar 2006).


As our social and professional lives increasingly revolve around information and communication technologies (ICTs), these systems create new vulnerabilities for exploitation. These networked technologies enable a wide range of illicit and criminal activities that both emulate off-line crimes and embody wholly new types of activity. Technologies like the web, e-mail, and social media have transformed the division of criminal labor and provided new opportunities involving the acquisition and manipulation of...

This is a preview of subscription content, log in to check access.


  1. Balkin JM, Kozlovski N (2007) Introduction. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New YorkGoogle Scholar
  2. Benkler Y (2011) A free irresponsible press: Wikileaks and the battle over the soul of the networked fourth estate. Harv Civ Rights-Civ Liberties Law Rev 46:311Google Scholar
  3. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1. http://www.cs.umn.edu/tech_reports_upload/tr2007/07-017.pdf. Accessed 17 June 2013CrossRefGoogle Scholar
  4. Chen H (2012) Extremist Youtube videos. In: Chen H (ed) Dark web. Springer, New York, pp 295–318CrossRefGoogle Scholar
  5. Chen H, Thoms S, Fu T (2008) Cyber extremism in web 2.0: an exploratory study of international jihadist groups. In: IEEE international conference on intelligence and security informatics, ISI 2008, Taipei. IEEE, pp 98–103Google Scholar
  6. Denning DE (2009) Terror’s web: how the internet is transforming terrorism. In: Yar M, Jewkes Y (eds) Handbook of internet crime. Willan Publishing, New YorkGoogle Scholar
  7. Dibbell J (2006) Play money: or, how i quit my day job and made millions trading virtual loot. Basic Books, New YorkGoogle Scholar
  8. Everton SF (2012) Disrupting dark networks. Structural analysis in the social sciences, vol 34. Cambridge University Press, New YorkCrossRefGoogle Scholar
  9. Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40CrossRefGoogle Scholar
  10. Goolsbee A (2001) The implications of electronic commerce for fiscal policy (and vice versa). J Econ Perspect 15:13–23CrossRefGoogle Scholar
  11. Grabosky P, Smith R (2001) Telecommunication fraud in the digital age. In: Wall DS (ed) Crime and the internet. Routledge, LondonGoogle Scholar
  12. Jackson C, Barth A, Bortz A, Shao W, Boneh D (2009) Protecting browsers from DNS rebinding attacks. ACM Trans Web 3(1):1–26CrossRefGoogle Scholar
  13. Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100CrossRefGoogle Scholar
  14. Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the international conference on web search and web data mining, Palo Alto, p 219–230Google Scholar
  15. Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644CrossRefGoogle Scholar
  16. Keegan B, Ahmad MA, Williams D, Srivastava J, Contractor N (2011) Sic transit gloria mundi virtuali? Promise and peril in the computational social science of clandestine organizing. In: Proceedings of the ACM WebSci’11, Koblenz, p 1–8Google Scholar
  17. Kozlovski N (2007) Designing accountable online policing. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New YorkGoogle Scholar
  18. Landler M, Sanger D (2013) US demands China block cyberattacks and agree to rules. The New York Times. http://www.nytimes.com/2013/03/12/world/asia/us-demands-that-china-end-hacking-and-set-cyber-rules.html. Accessed 12 May 2013
  19. Lastowka FG, Hunter D (2006) Virtual crime. In: Balkin J, Noveck B (eds) The state of play: law, games, and virtual worlds. New York University Press, New YorkGoogle Scholar
  20. Lau F, Rubin SH, Smith MH, Trajkovic L (2000) Distributed denial of service attacks. In: 2000 I.E. international conference on systems, man, and cybernetics, Nashville, vol 3. IEEE, pp 2275–2280Google Scholar
  21. Lehdonvirta V, Ernkvist M (2011) Knowledge map of the virtual economy: converting the virtual economy into development potential. Technical report, The World Bank, Washington, DCGoogle Scholar
  22. Levy S (2001) Hackers: heroes of the computer revolution, vol 4. Penguin Books, New YorkGoogle Scholar
  23. Milward HB, Raab J (2006) Dark networks as organizational problems: elements of a theory 1. Int Public Manag J 9(3):333–360CrossRefGoogle Scholar
  24. Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2):39–53CrossRefGoogle Scholar
  25. Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, IndianapolisGoogle Scholar
  26. Newman G, McNally MM (2005) Identity theft literature review. National Institute of Justice, RockvilleGoogle Scholar
  27. Nissenbaum H (2007) Where computer security meets national security. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New YorkGoogle Scholar
  28. Ott M, Cardie C, Hancock J (2012) Estimating the prevalence of deception in online review communities. In: Proceedings of the 21st international conference on world wide web, Lyon. ACM, pp 201–210Google Scholar
  29. Owens WA, Dam KW, Lin HS (2009) Technology, policy, law, and ethics regarding US acquisition and use of cyberattack capabilities. The National Academy Press, Washington, DC. http://www.steptoe.com/assets/attachments/3785.pdf. Accessed 17 June 2013Google Scholar
  30. Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37–59CrossRefGoogle Scholar
  31. Primo Braga CA (2005) E-commerce regulation: new game, new rules? Q Rev Econ Finance 45(2):541–558CrossRefGoogle Scholar
  32. Quayle E (2003) Child pornography: an internet crime. Routledge, New YorkGoogle Scholar
  33. Spitzberg BH, Hoobler G (2002) Cyberstalking and the technologies of interpersonal terrorism. New Media Soc 4(1):71–92CrossRefGoogle Scholar
  34. Stohl C, Stohl M (2007) Networks of terror: theoretical assumptions and pragmatic consequences. Commun Theory 17(2):93–124CrossRefGoogle Scholar
  35. Taipale KA (2007) How technology, security, and privacy can coexist in the digital age. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New YorkGoogle Scholar
  36. Taylor P (1999) Hackers: crime in the digital sublime. Routledge, New YorkCrossRefGoogle Scholar
  37. Thomas D (2003) Hacker culture. University of Minnesota Press, MinneapolisGoogle Scholar
  38. Traynor I (2007) Russia accused of unleashing cyberwar to disable Estonia. The Guardian. http://www.guardian.co.uk/world/2007/may/17/topstories3.russia. Accessed 17 June 2013
  39. Wall DS (2001a) Maintaining order and law on the internet. In: Wall D (ed) Crime and the internet. Routledge, New YorkCrossRefGoogle Scholar
  40. Wall D (2001b) Cybercrimes and the internet. In: Wall D (ed) Crime and the internet. Routledge, New YorkCrossRefGoogle Scholar
  41. Wall D (2007) Cybercrime: the transformation of crime in the information age. Polity, CambridgeGoogle Scholar
  42. Yar M (2006) Cybercrime and society. Sage, LondonGoogle Scholar

Recommended Reading

  1. Balkin JM, Grimmelmann J, Katz E, Kozlovski N, Wagman S, Zarsky T (2007) Cybercrime: digital cops in a networked environment. New York University Press, New YorkGoogle Scholar
  2. Clough J (2010) Principles of cybercrime. Cambridge University Press, CambridgeGoogle Scholar
  3. Jewkes Y (2007) Crime online. Willan, PortlandGoogle Scholar
  4. Wall DS (2007) Cybercrime. Polity, New YorkGoogle Scholar
  5. Williams M (2006) Virtually criminal: crime, deviance and regulation online. Routledge, New YorkGoogle Scholar
  6. Yar M (2006) Cybercrime and society. Sage, New YorkGoogle Scholar

Copyright information

© Springer Science+Business Media LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.University of ColoradoBoulderUSA
  2. 2.Department of Computer Science and EngineeringUniversity of MinnesotaMinneapolisUSA

Section editors and affiliations

  • Talel Abdessalem
    • 1
  • Rokia Missaoui
    • 2
  1. 1.telecom-paristechParisFrance
  2. 2.Department of Computer Science and EngineeringUniversité du Québec en Outaouais (UQO)GatineauCanada