DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics
暂无分享,去创建一个
[1] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[2] R. Hyman. Quasi-Experimentation: Design and Analysis Issues for Field Settings (Book) , 1982 .
[3] Nicolas Christin,et al. Ethics in cryptomarket research. , 2016, The International journal on drug policy.
[4] Hsinchun Chen,et al. Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[5] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[6] Hsinchun Chen,et al. Developing understanding of hacker language through the use of lexical semantics , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).
[7] Bin Zhang,et al. Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities , 2016, J. Manag. Inf. Syst..
[8] Monica J. Barratt,et al. Active engagement with stigmatised communities through digital ethnography , 2016 .
[9] Hsinchun Chen,et al. AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[10] Dennis W. Leitner,et al. A Comparison of Ordinary Least Squares and Logistic Regression , 2003 .
[11] Victor A. Benjamin,et al. Securing cyberspace: Identifying key actors in hacker communities , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.
[12] Neal Leavitt,et al. Anonymization Technology Takes a High Profile , 2009, Computer.
[13] James Martin,et al. Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’ , 2014 .
[14] Christopher D. Manning,et al. Advances in natural language processing , 2015, Science.
[15] David Décary-Hétu,et al. Criminals and signals: An assessment of criminal performance in the carding underworld , 2016 .
[16] Chuan-Hoo Tan,et al. Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users , 2013, MIS Q..
[17] D. Décary-Hêtu,et al. Discrediting Vendors in Online Criminal Markets , 2016 .
[18] Hsinchun Chen,et al. Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).
[19] Antoinette H Cotton. Ensnaring Webs and Nets: Ethical issues in Internet-based research , 2003, Contemporary nurse.
[20] Hsinchun Chen,et al. AZDrugMiner: An Information Extraction System for Mining Patient-Reported Adverse Drug Events in Online Patient Forums , 2013, ICSH.
[21] Nigel Shadbolt,et al. Why forums?: an empirical analysis into the facilitating factors of carding forums , 2013, WebSci.
[22] Bettina Hoser,et al. Questions on ethics for research in the virtually connected world , 2010, Soc. Networks.
[23] Joshua D. Freilich,et al. Exploring the Subculture of Ideologically Motivated Cyber-Attackers , 2017 .
[24] John R. Carlson,et al. Channel Expansion Theory and the Experiential Nature of Media Richness Perceptions , 1999 .
[25] Siva Viswanathan,et al. Strategic Behavior in Online Reputation Systems: Evidence from Revoking on eBay , 2013, MIS Q..
[26] Jaziar Radianti. A Study of a Social Behavior inside the Online Black Markets , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[27] Christian Platzer,et al. Covertly Probing Underground Economy Marketplaces , 2010, DIMVA.
[28] Detmar W. Straub,et al. Moving toward black hat research in information systems security: an editorial introduction to the special issue , 2010 .
[29] Veda C. Storey,et al. Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..
[30] Elizabeth Buchanan,et al. Internet research ethics and the institutional review board: current practices and issues , 2009, CSOC.
[31] Hsinchun Chen,et al. Evaluating text visualization: An experiment in authorship analysis , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.
[32] Richard Frank,et al. Shuffle Up and Deal: Use of a Capture–Recapture Method to Estimate the Size of Stolen Data Markets , 2017 .
[33] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[34] Craig Webber,et al. Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis)Used by Carders on Cryptomarkets , 2017 .
[35] Bonnie Brinton Anderson,et al. More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable , 2016, Inf. Syst. Res..
[36] Richard Clayton,et al. Configuring Zeus: A case study of online crime target selection and knowledge transmission , 2017, 2017 APWG Symposium on Electronic Crime Research (eCrime).
[37] Mike Thelwall,et al. Web crawling ethics revisited: Cost, privacy, and denial of service , 2006, J. Assoc. Inf. Sci. Technol..