dc.contributor.author | Johnsen, Jan William | |
dc.contributor.author | Franke, Katrin | |
dc.date.accessioned | 2019-04-04T10:23:24Z | |
dc.date.available | 2019-04-04T10:23:24Z | |
dc.date.created | 2018-11-14T12:52:08Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | Lecture Notes in Computer Science. 2018, 10862 LNCS 379-386. | nb_NO |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/11250/2593268 | |
dc.description.abstract | Traditional organised criminal groups are becoming more active in the cyber domain. They form online communities and use these as marketplaces for illegal materials, products and services, which drives the Crime as a Service business model. The challenge for law enforcement of investigating and disrupting the underground marketplaces is to know which individuals to focus effort on. Because taking down a few high impact individuals can have more effect on disrupting the criminal services provided. This paper present our study on social network centrality measures’ performance for identifying important individuals in two networks. We focus our analysis on two distinctly different network structures: Enron and Nulled.IO. The first resembles an organised criminal group, while the latter is a more loosely structured hacker forum. Our result show that centrality measures favour individuals with more communication rather than individuals usually considered more important: organised crime leaders and cyber criminals who sell illegal materials, products and services. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer Verlag | nb_NO |
dc.title | Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 379-386 | nb_NO |
dc.source.volume | 10862 LNCS | nb_NO |
dc.source.journal | Lecture Notes in Computer Science | nb_NO |
dc.identifier.doi | 10.1007/978-3-319-93713-7_31 | |
dc.identifier.cristin | 1630453 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article published in [Lecture Notes in Computer Science] Locked until 12.6.2019 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-319-93713-7_31 | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |