{"id":"https://openalex.org/W7123726006","doi":"https://doi.org/10.1109/ecrime66972.2025.11327769","title":"Uncovering the Trust Signals Supporting Telegram\u2019s Cybercrime Economy","display_name":"Uncovering the Trust Signals Supporting Telegram\u2019s Cybercrime Economy","publication_year":2025,"publication_date":"2025-11-04","ids":{"openalex":"https://openalex.org/W7123726006","doi":"https://doi.org/10.1109/ecrime66972.2025.11327769"},"language":"en","primary_location":{"id":"doi:10.1109/ecrime66972.2025.11327769","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ecrime66972.2025.11327769","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 APWG Symposium on Electronic Crime Research (eCrime)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.tue.nl/en/publications/21b33f95-e979-4790-a670-5d94d3049219","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114987767","display_name":"Roy Ricaldi","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Roy Ricaldi","raw_affiliation_strings":["Eindhoven University of Technology,Department of Mathematics and Computer Science"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,Department of Mathematics and Computer Science","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122966882","display_name":"Tina Marjanov","orcid":null},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tina Marjanov","raw_affiliation_strings":["University of Cambridge,Department of Computer Science and Technology"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Cambridge,Department of Computer Science and Technology","institution_ids":["https://openalex.org/I241749"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047635330","display_name":"Luca Allodi","orcid":"https://orcid.org/0000-0003-1600-0868"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Luca Allodi","raw_affiliation_strings":["Eindhoven University of Technology,Department of Mathematics and Computer Science"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,Department of Mathematics and Computer Science","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055346534","display_name":"Alice Hutchings","orcid":"https://orcid.org/0000-0003-3037-2684"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alice Hutchings","raw_affiliation_strings":["University of Cambridge,Department of Computer Science and Technology"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Cambridge,Department of Computer Science and Technology","institution_ids":["https://openalex.org/I241749"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5114987767"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.78040022,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.8531000018119812,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.8531000018119812,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.05790000036358833,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.01269999984651804,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8873000144958496},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.7231000065803528},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5691999793052673},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.40790000557899475},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3449000120162964},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.3447999954223633},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.27469998598098755}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8873000144958496},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.7231000065803528},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5691999793052673},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5257999897003174},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4885999858379364},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46129998564720154},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4138000011444092},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.40790000557899475},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3449000120162964},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.3447999954223633},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.27469998598098755},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.2685000002384186},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.2678999900817871},{"id":"https://openalex.org/C119693030","wikidata":"https://www.wikidata.org/wiki/Q2180497","display_name":"Economic model","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C2781218421","wikidata":"https://www.wikidata.org/wiki/Q2892532","display_name":"Reputation system","level":3,"score":0.25929999351501465},{"id":"https://openalex.org/C78597825","wikidata":"https://www.wikidata.org/wiki/Q484847","display_name":"E-commerce","level":2,"score":0.25519999861717224},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ecrime66972.2025.11327769","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ecrime66972.2025.11327769","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 APWG Symposium on Electronic Crime Research (eCrime)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/21b33f95-e979-4790-a670-5d94d3049219","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/21b33f95-e979-4790-a670-5d94d3049219","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ricaldi, R, Marjanov, T, Allodi, L & Hutchings, A 2026, Uncovering the Trust Signals Supporting Telegram\u2019s Cybercrime Economy. in 2025 APWG Symposium on Electronic Crime Research, eCrime 2025., 11327769, Institute of Electrical and Electronics Engineers, 2025 APWG Symposium on Electronic Crime Research, eCrime 2025, San Diego, United States, 4/11/25. https://doi.org/10.1109/eCrime66972.2025.11327769","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/21b33f95-e979-4790-a670-5d94d3049219","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/21b33f95-e979-4790-a670-5d94d3049219","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ricaldi, R, Marjanov, T, Allodi, L & Hutchings, A 2026, Uncovering the Trust Signals Supporting Telegram\u2019s Cybercrime Economy. in 2025 APWG Symposium on Electronic Crime Research, eCrime 2025., 11327769, Institute of Electrical and Electronics Engineers, 2025 APWG Symposium on Electronic Crime Research, eCrime 2025, San Diego, United States, 4/11/25. https://doi.org/10.1109/eCrime66972.2025.11327769","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.515701174736023,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4002167081","display_name":null,"funder_award_id":"NWA.1215.18.003","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G4333624210","display_name":"Interdisciplinary Cybercrime Project","funder_award_id":"949127","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5937870420","display_name":null,"funder_award_id":"NWA.1162.18.301","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320320285","display_name":"King's College London","ror":"https://ror.org/0220mzb33"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"},{"id":"https://openalex.org/F4320321848","display_name":"Cambridge Trust","ror":"https://ror.org/05sprqy15"},{"id":"https://openalex.org/F4320334678","display_name":"European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1788061570","https://openalex.org/W1966021833","https://openalex.org/W1973855063","https://openalex.org/W1974266312","https://openalex.org/W2007118926","https://openalex.org/W2061280906","https://openalex.org/W2153532176","https://openalex.org/W2519123369","https://openalex.org/W2758725245","https://openalex.org/W3094491574","https://openalex.org/W3145907058","https://openalex.org/W3211873429","https://openalex.org/W4210594519","https://openalex.org/W4249566202","https://openalex.org/W4394687858","https://openalex.org/W4396735691"],"related_works":[],"abstract_inverted_index":{"Telegram":[0,31,71,103,125,200],"has":[1],"become":[2],"a":[3,45,81,157,211],"central":[4],"hub":[5],"for":[6,10,217],"cybercriminal":[7,104,163,204,208],"activity,":[8],"favored":[9],"its":[11],"perceived":[12],"privacy,":[13],"user":[14],"anonymity,":[15],"ease":[16],"of":[17,36,83,185],"use,":[18],"and":[19,42,53,79,118,135,141,183,188],"the":[20,70],"many":[21,33],"features":[22],"it":[23],"offers.":[24],"Unlike":[25],"traditional":[26],"markets":[27],"on":[28,116,124],"underground":[29],"forums":[30,117,205],"lacks":[32],"structural":[34],"elements":[35],"trust,":[37],"such":[38],"as":[39],"stable":[40],"identities":[41],"reputation":[43],"within":[44,89],"community.":[46],"This":[47],"raises":[48],"important":[49],"questions":[50],"about":[51],"whether":[52],"how":[54,146],"trust":[55,111,129,186],"is":[56],"built":[57],"in":[58,175,206],"these":[59,148],"newer,":[60],"more":[61],"fluid":[62],"marketplace":[63],"environments.":[64],"In":[65],"our":[66,196],"work,":[67],"we":[68,155],"characterize":[69],"cybercrime":[72],"ecosystem":[73,216],"by":[74,153],"identifying":[75],"key":[76],"market":[77,168],"segments":[78,177],"developing":[80],"framework":[82,95],"trust-building":[84],"mechanisms":[85],"that":[86,109,161,173,189,199],"support":[87],"trade":[88],"those":[90],"segments.":[91,169],"We":[92],"apply":[93],"this":[94],"at":[96],"scale":[97],"across":[98,166],"1,116,071":[99],"messages":[100,137],"from":[101,133,203],"167":[102],"communities.":[105],"Our":[106,170],"analysis":[107],"shows":[108],"although":[110],"signals":[112,149],"are":[113,119,150,178],"fewer":[114],"than":[115],"often":[120],"sparsely":[121],"distributed,":[122],"cybercriminals":[123],"still":[126],"actively":[127],"signal":[128],"using":[130],"various":[131],"strategies,":[132],"proof-of-delivery":[134],"vouching":[136],"to":[138,180,220],"pinned":[139],"rules":[140],"automated":[142],"bots.":[143],"To":[144],"estimate":[145],"frequently":[147],"actually":[151],"encountered":[152],"users,":[154],"implement":[156],"Monte":[158],"Carlo":[159],"simulation":[160],"models":[162],"browsing":[164],"behavior":[165],"different":[167,176,181],"results":[171],"reveal":[172],"users":[174],"exposed":[179],"levels":[182],"type":[184],"signaling,":[187],"exposure":[190],"varies":[191],"significantly":[192],"with":[193],"time.":[194],"Together,":[195],"findings":[197],"suggest":[198],"differs":[201],"substantially":[202],"supporting":[207],"activities,":[209],"offering":[210],"fragmented":[212],"but":[213],"evolving":[214],"economic":[215],"threat":[218],"actors":[219],"operate":[221],"in.":[222]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-01-14T00:00:00"}
