[PDF][PDF] Sifting through the net: Monitoring of online offenders by researchers

D Décary-Hétu, J Aldridge - European Review of …, 2015 - standinggroups.ecpr.eu
Criminologists have traditionally used official records, interviews, surveys, and observation
to gather data on offenders. Over the past two decades, more and more illegal activities …

The ecology of trust among hackers

B Dupont, AM Côté, C Savine, D Décary-Hétu - Global Crime, 2016 - Taylor & Francis
Malicious hackers profit from the division of labour among highly skilled associates.
However, duplicity and betrayal form an intrinsic part of their daily operations. This article …

Identifying digital threats in a hacker web forum

M Macdonald, R Frank, J Mei, B Monk - Proceedings of the 2015 IEEE …, 2015 - dl.acm.org
Information threatening the security of critical infrastructures are exchanged over the Internet
through communication platforms, such as online discussion forums. This information can be …

Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies

B Collier, R Clayton, A Hutchings, D Thomas - 2020 - repository.cam.ac.uk
It is generally accepted that the widespread availability of specialist services has helped
drive the growth of cybercrime in the past fifteen to twenty years. Individuals and groups …

The ethics of web crawling and web scraping in cybercrime research: Navigating issues of consent, privacy, and other potential harms associated with automated data …

R Brewer, B Westlake, T Hart, O Arauza - … : methodologies, ethics, and …, 2021 - Springer
The abundance of data easily accessible on the internet has made it an appealing domain
for conducting social science research. Because of the volume of data available, automated …

Challenges in gaining ethical approval for sensitive digital social science studies

C Winter, RV Gundur - International Journal of Social Research …, 2024 - Taylor & Francis
The swift evolution of digital spaces challenges the established norms of ethical research
policy. Ineffective ethical review diminishes researchers' ability to conduct cutting-edge and …

[HTML][HTML] From data to disruption

PAC Duijn, PMA Sloot - Digital Investigation, 2015 - Elsevier
Organized crime groups and law enforcement agencies are caught in complex system
similar to a continuous game of cat-and-mouse, in which the latter frequently remains two or …

Internet traces and the analysis of online illicit markets

Q Rossy, D Décary-Hétu - The Routledge international handbook …, 2017 - taylorfrancis.com
This chapter discusses how forensic science and criminology can combine to apprehend
online illicit markets. In line with Felson's ecological theory and the work of Soudijn and …

[PDF][PDF] Cryptomarkets: The darknet as an online drug market innovation

J Aldridge, D Décary-Hétu - … . openum. ca/files/sites/39/2017 …, 2015 - daviddhetu.openum.ca
This project sought to use data scraped from the hidden or 'dark net'to enhance our
understanding of a new business innovation, the 'cryptomarket'. Cryptomarkets are the most …

Online crime monitoring

D Décary-Hétu - The Routledge international handbook of forensic …, 2017 - taylorfrancis.com
The aim of this chapter is to explore the research opportunities afforded by the Internet. To
do so, this chapter will describe both the indirect and direct monitoring techniques used to …