Jump to ContentJump to Main Navigation
Advances in Cyber SecurityTechnology, Operations, and Experiences$
Users without a subscription are not able to see the full content.

D. Frank Hsu and Dorothy Marinucci

Print publication date: 2013

Print ISBN-13: 9780823244560

Published to Fordham Scholarship Online: September 2015

DOI: 10.5422/fordham/9780823244560.001.0001

Show Summary Details
Page of

PRINTED FROM FORDHAM SCHOLARSHIP ONLINE (www.fordham.universitypressscholarship.com). (c) Copyright Fordham University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in FSO for personal use.date: 22 September 2021

Partners in Cybercrime

Partners in Cybercrime

(p.146) Partners in Cybercrime
Advances in Cyber Security

Eileen Monsma

Vincent Buskens

Melvin Soudijn

Paul Nieuwbeerta

Fordham University Press

This chapter looks at cyber crime by analyzing social networks used by cybercriminals. Because a social network is defined as a set of actors (usually individuals) connected by ties (usually the personal relationships between them), a cyber crime network is defined as a set of cybercriminals and their collaborative relationships. Centrality measures have been widely used to quantify the importance of individual actors in networks. The chapter shows that there is considerable variation in individual centrality in the cyber crime network. Carders, for instance, are more likely to actively contact many members, probably because they need to be involved in many ties to pursue their interests. In addition, carders are more often on the shortest path between two individuals than others, probably between data thieves and people who offer cash services. Forum members who offer services on the forum's marketplace are also popular relations, especially those who offer web and security services such as spam and so called bulletproof hosting. Moreover, the results show that a better reputation and a higher status make members more popular partners. It seems that reputation and status indeed can assist members in selecting partners.

Keywords:   cyber security, cyber crime, social networks, cybercriminals, individual centrality, carders, forum members

Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .