{"id":"https://openalex.org/W4379528860","doi":"https://doi.org/10.1109/ecrime57793.2022.10142120","title":"Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains","display_name":"Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains","publication_year":2022,"publication_date":"2022-11-30","ids":{"openalex":"https://openalex.org/W4379528860","doi":"https://doi.org/10.1109/ecrime57793.2022.10142120"},"language":"en","primary_location":{"id":"doi:10.1109/ecrime57793.2022.10142120","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ecrime57793.2022.10142120","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 APWG Symposium on Electronic Crime Research (eCrime)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079872236","display_name":"Dalyapraz Manatova","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dalyapraz Manatova","raw_affiliation_strings":["Luddy School of Informatics, Computing, and Engineering"],"affiliations":[{"raw_affiliation_string":"Luddy School of Informatics, Computing, and Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112930774","display_name":"D. Sharma","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dewesha Sharma","raw_affiliation_strings":["Luddy School of Informatics, Computing, and Engineering"],"affiliations":[{"raw_affiliation_string":"Luddy School of Informatics, Computing, and Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038811607","display_name":"Sagar Samtani","orcid":"https://orcid.org/0000-0002-4513-805X"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sagar Samtani","raw_affiliation_strings":["Indiana University,Kelley School of Business,Bloomington,Indiana,USA","Kelley School of Business, Indiana University, Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University,Kelley School of Business,Bloomington,Indiana,USA","institution_ids":["https://openalex.org/I4210119109"]},{"raw_affiliation_string":"Kelley School of Business, Indiana University, Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057479145","display_name":"L. Jean Camp","orcid":"https://orcid.org/0000-0001-8731-7884"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"L. Jean Camp","raw_affiliation_strings":["Luddy School of Informatics, Computing, and Engineering"],"affiliations":[{"raw_affiliation_string":"Luddy School of Informatics, Computing, and Engineering","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079872236"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.515,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.87330848,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intermediary","display_name":"Intermediary","score":0.6609222888946533},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.5806140303611755},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.4961419999599457},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.492033451795578},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.48316067457199097},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.48167121410369873},{"id":"https://openalex.org/keywords/empirical-evidence","display_name":"Empirical evidence","score":0.47358614206314087},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.4271255433559418},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.42030075192451477},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4186270534992218},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.4184715449810028},{"id":"https://openalex.org/keywords/social-network-analysis","display_name":"Social network analysis","score":0.41294440627098083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35762298107147217},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.296609491109848},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.2850167751312256},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.25529107451438904},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2261970341205597},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19896697998046875},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.14568626880645752},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.12939035892486572},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.11547014117240906}],"concepts":[{"id":"https://openalex.org/C139569457","wikidata":"https://www.wikidata.org/wiki/Q1666223","display_name":"Intermediary","level":2,"score":0.6609222888946533},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.5806140303611755},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.4961419999599457},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.492033451795578},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.48316067457199097},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.48167121410369873},{"id":"https://openalex.org/C166052673","wikidata":"https://www.wikidata.org/wiki/Q83021","display_name":"Empirical evidence","level":2,"score":0.47358614206314087},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.4271255433559418},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.42030075192451477},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4186270534992218},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4184715449810028},{"id":"https://openalex.org/C114713312","wikidata":"https://www.wikidata.org/wiki/Q7551269","display_name":"Social network analysis","level":3,"score":0.41294440627098083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35762298107147217},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.296609491109848},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.2850167751312256},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.25529107451438904},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2261970341205597},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19896697998046875},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.14568626880645752},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.12939035892486572},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11547014117240906},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ecrime57793.2022.10142120","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ecrime57793.2022.10142120","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 APWG Symposium on Electronic Crime Research (eCrime)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1412796528","https://openalex.org/W1459543726","https://openalex.org/W1545050218","https://openalex.org/W2024982571","https://openalex.org/W2026195300","https://openalex.org/W2029103396","https://openalex.org/W2033193852","https://openalex.org/W2122551442","https://openalex.org/W2130522879","https://openalex.org/W2213376635","https://openalex.org/W2344840125","https://openalex.org/W2551868243","https://openalex.org/W2552418703","https://openalex.org/W2742276251","https://openalex.org/W2798110387","https://openalex.org/W2805108821","https://openalex.org/W2891270452","https://openalex.org/W2907477258","https://openalex.org/W2924852198","https://openalex.org/W2957698615","https://openalex.org/W2963923811","https://openalex.org/W2978837948","https://openalex.org/W2999076549","https://openalex.org/W3004688000","https://openalex.org/W3046145382","https://openalex.org/W3093511169","https://openalex.org/W3129251238","https://openalex.org/W3152332785","https://openalex.org/W3162913697","https://openalex.org/W3200474001","https://openalex.org/W3202952191","https://openalex.org/W4238452917","https://openalex.org/W4293113890","https://openalex.org/W4300783125","https://openalex.org/W6704398640","https://openalex.org/W6780835584","https://openalex.org/W6801192361","https://openalex.org/W7028364173"],"related_works":["https://openalex.org/W2952662149","https://openalex.org/W2793616590","https://openalex.org/W2183090405","https://openalex.org/W2075666982","https://openalex.org/W2065835655","https://openalex.org/W3160699245","https://openalex.org/W2782955270","https://openalex.org/W2349928170","https://openalex.org/W2142177036","https://openalex.org/W1594712698"],"abstract_inverted_index":{"Underground":[0,47],"markets":[1],"support":[2,162],"e-crime":[3],"by":[4],"providing":[5],"a":[6,15,153,240],"place":[7],"where":[8,51],"merchants":[9],"and":[10,23,30,56,63,71,83,95,102,126,155,181,184,191,200,220],"buyers":[11],"trade":[12],"assets":[13],"for":[14,35,80,92],"price":[16],"utilizing":[17],"various":[18],"digital":[19],"currencies,":[20],"payment":[21],"providers,":[22],"wallets.":[24],"The":[25,208],"anonymity":[26],"of":[27,114,140,158,166,196,232,243],"these":[28,45,197,233],"marketplaces":[29,94],"incentives":[31],"to":[32,99,107,110,131,261,265],"avoid":[33],"penalties":[34],"criminal":[36],"activity":[37],"create":[38],"significant":[39,241],"challenges":[40],"in":[41,44,104,116,148],"studying":[42],"trust":[43,101],"ecosystems.":[46],"forums":[48,67,118],"are":[49],"clearinghouses":[50],"deals":[52],"can":[53,58],"be":[54,59,69],"arranged,":[55],"services":[57],"identified":[60],"as":[61,89,152],"vendors":[62],"customers":[64],"engage.":[65],"Such":[66],"may":[68],"open":[70],"do":[72],"not":[73,229],"clear":[74],"transactions,":[75],"nonetheless":[76],"still":[77],"offer":[78,136],"opportunities":[79],"entry,":[81],"entrepreneurship,":[82],"customer":[84],"or":[85,225,236],"product":[86],"discovery,":[87],"serving":[88],"critical":[90],"intermediaries":[91],"the":[93,149,159,193,202,215,237,244,251,266,272],"enabling":[96],"new":[97,187],"entrants":[98],"establish":[100],"actors":[103,259],"one":[105],"market":[106],"reach":[108],"out":[109],"another.The":[111],"empirical":[112,138],"evaluation":[113],"interactions":[115,147,203],"such":[117],"illuminates":[119],"how":[120],"collaborative":[121],"networks":[122],"form,":[123],"interact,":[124],"socialize,":[125],"exchange":[127],"knowledge.":[128],"To":[129],"contribute":[130],"understanding":[132],"online":[133,182,186],"crime,":[134],"we":[135,145,254],"an":[137,141],"analysis":[139],"underground":[142],"forum.":[143],"Specifically,":[144],"examine":[146],"social":[150,206],"network":[151,160,194,245],"whole":[154],"those":[156],"components":[157],"that":[161,170,177,211,256],"three":[163,198,234],"major":[164],"types":[165,199],"crime:":[167],"traditional":[168],"crimes":[169,176,269],"occur":[171],"away":[172],"from":[173],"keyboards,":[174],"transitional":[175,257],"have":[178],"both":[179],"offline":[180],"instantiations,":[183],"entirely":[185],"crimes.":[188],"We":[189],"compare":[190],"contrast":[192],"structure":[195],"document":[201],"between":[204],"their":[205],"networks.":[207],"results":[209],"suggest":[210],"although":[212],"communities":[213,235],"follow":[214],"small":[216],"world":[217],"effect,":[218],"identifying":[219],"removing":[221],"highly":[222],"connected":[223],"moderators":[224],"prolific":[226],"contributors":[227],"will":[228],"harm":[230],"any":[231],"network,":[238],"unless":[239],"portion":[242],"is":[246],"removed.":[247],"By":[248],"further":[249],"observing":[250],"structural":[252],"patterns,":[253],"find":[255],"crime":[258],"tend":[260],"cluster":[262],"more":[263],"compared":[264],"other":[267],"two":[268],"while":[270],"having":[271],"highest":[273],"density.":[274]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
