Skip to main content

Deviant and Criminal Uses of Social Networks

  • Reference work entry
  • First Online:
Book cover Encyclopedia of Social Network Analysis and Mining

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 2,500.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Balkin JM, Kozlovski N (2007) Introduction. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York

    Google Scholar 

  • Benkler Y (2011) A free irresponsible press: Wikileaks and the battle over the soul of the networked fourth estate. Harv Civ Rights-Civ Liberties Law Rev 46:311

    Google Scholar 

  • Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1. http://www.cs.umn.edu/tech_reports_upload/tr2007/07-017.pdf. Accessed 17 June 2013

    Article  Google Scholar 

  • Chen H (2012) Extremist Youtube videos. In: Chen H (ed) Dark web. Springer, New York, pp 295–318

    Chapter  Google Scholar 

  • Chen H, Thoms S, Fu T (2008) Cyber extremism in web 2.0: an exploratory study of international jihadist groups. In: IEEE international conference on intelligence and security informatics, ISI 2008, Taipei. IEEE, pp 98–103

    Google Scholar 

  • Denning DE (2009) Terror’s web: how the internet is transforming terrorism. In: Yar M, Jewkes Y (eds) Handbook of internet crime. Willan Publishing, New York

    Google Scholar 

  • Dibbell J (2006) Play money: or, how i quit my day job and made millions trading virtual loot. Basic Books, New York

    Google Scholar 

  • Everton SF (2012) Disrupting dark networks. Structural analysis in the social sciences, vol 34. Cambridge University Press, New York

    Book  Google Scholar 

  • Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40

    Article  Google Scholar 

  • Goolsbee A (2001) The implications of electronic commerce for fiscal policy (and vice versa). J Econ Perspect 15:13–23

    Article  Google Scholar 

  • Grabosky P, Smith R (2001) Telecommunication fraud in the digital age. In: Wall DS (ed) Crime and the internet. Routledge, London

    Google Scholar 

  • Jackson C, Barth A, Bortz A, Shao W, Boneh D (2009) Protecting browsers from DNS rebinding attacks. ACM Trans Web 3(1):1–26

    Article  Google Scholar 

  • Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100

    Article  Google Scholar 

  • Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the international conference on web search and web data mining, Palo Alto, p 219–230

    Google Scholar 

  • Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644

    Article  Google Scholar 

  • Keegan B, Ahmad MA, Williams D, Srivastava J, Contractor N (2011) Sic transit gloria mundi virtuali? Promise and peril in the computational social science of clandestine organizing. In: Proceedings of the ACM WebSci’11, Koblenz, p 1–8

    Google Scholar 

  • Kozlovski N (2007) Designing accountable online policing. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York

    Google Scholar 

  • Landler M, Sanger D (2013) US demands China block cyberattacks and agree to rules. The New York Times. http://www.nytimes.com/2013/03/12/world/asia/us-demands-that-china-end-hacking-and-set-cyber-rules.html. Accessed 12 May 2013

  • Lastowka FG, Hunter D (2006) Virtual crime. In: Balkin J, Noveck B (eds) The state of play: law, games, and virtual worlds. New York University Press, New York

    Google Scholar 

  • Lau F, Rubin SH, Smith MH, Trajkovic L (2000) Distributed denial of service attacks. In: 2000 I.E. international conference on systems, man, and cybernetics, Nashville, vol 3. IEEE, pp 2275–2280

    Google Scholar 

  • Lehdonvirta V, Ernkvist M (2011) Knowledge map of the virtual economy: converting the virtual economy into development potential. Technical report, The World Bank, Washington, DC

    Google Scholar 

  • Levy S (2001) Hackers: heroes of the computer revolution, vol 4. Penguin Books, New York

    Google Scholar 

  • Milward HB, Raab J (2006) Dark networks as organizational problems: elements of a theory 1. Int Public Manag J 9(3):333–360

    Article  Google Scholar 

  • Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2):39–53

    Article  Google Scholar 

  • Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, Indianapolis

    Google Scholar 

  • Newman G, McNally MM (2005) Identity theft literature review. National Institute of Justice, Rockville

    Google Scholar 

  • Nissenbaum H (2007) Where computer security meets national security. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York

    Google Scholar 

  • Ott M, Cardie C, Hancock J (2012) Estimating the prevalence of deception in online review communities. In: Proceedings of the 21st international conference on world wide web, Lyon. ACM, pp 201–210

    Google Scholar 

  • Owens WA, Dam KW, Lin HS (2009) Technology, policy, law, and ethics regarding US acquisition and use of cyberattack capabilities. The National Academy Press, Washington, DC. http://www.steptoe.com/assets/attachments/3785.pdf. Accessed 17 June 2013

    Google Scholar 

  • Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37–59

    Article  Google Scholar 

  • Primo Braga CA (2005) E-commerce regulation: new game, new rules? Q Rev Econ Finance 45(2):541–558

    Article  Google Scholar 

  • Quayle E (2003) Child pornography: an internet crime. Routledge, New York

    Google Scholar 

  • Spitzberg BH, Hoobler G (2002) Cyberstalking and the technologies of interpersonal terrorism. New Media Soc 4(1):71–92

    Article  Google Scholar 

  • Stohl C, Stohl M (2007) Networks of terror: theoretical assumptions and pragmatic consequences. Commun Theory 17(2):93–124

    Article  Google Scholar 

  • Taipale KA (2007) How technology, security, and privacy can coexist in the digital age. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York

    Google Scholar 

  • Taylor P (1999) Hackers: crime in the digital sublime. Routledge, New York

    Book  Google Scholar 

  • Thomas D (2003) Hacker culture. University of Minnesota Press, Minneapolis

    Google Scholar 

  • Traynor I (2007) Russia accused of unleashing cyberwar to disable Estonia. The Guardian. http://www.guardian.co.uk/world/2007/may/17/topstories3.russia. Accessed 17 June 2013

  • Wall DS (2001a) Maintaining order and law on the internet. In: Wall D (ed) Crime and the internet. Routledge, New York

    Chapter  Google Scholar 

  • Wall D (2001b) Cybercrimes and the internet. In: Wall D (ed) Crime and the internet. Routledge, New York

    Chapter  Google Scholar 

  • Wall D (2007) Cybercrime: the transformation of crime in the information age. Polity, Cambridge

    Google Scholar 

  • Yar M (2006) Cybercrime and society. Sage, London

    Google Scholar 

Recommended Reading

  • Balkin JM, Grimmelmann J, Katz E, Kozlovski N, Wagman S, Zarsky T (2007) Cybercrime: digital cops in a networked environment. New York University Press, New York

    Google Scholar 

  • Clough J (2010) Principles of cybercrime. Cambridge University Press, Cambridge

    Google Scholar 

  • Jewkes Y (2007) Crime online. Willan, Portland

    Google Scholar 

  • Wall DS (2007) Cybercrime. Polity, New York

    Google Scholar 

  • Williams M (2006) Virtually criminal: crime, deviance and regulation online. Routledge, New York

    Google Scholar 

  • Yar M (2006) Cybercrime and society. Sage, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Brian C. Keegan .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Keegan, B.C., Ahmad, M.A. (2018). Deviant and Criminal Uses of Social Networks. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_55

Download citation

Publish with us

Policies and ethics