Skip to main content

Deviant and Criminal Uses of Social Networks

  • Living reference work entry
  • First Online:
Encyclopedia of Social Network Analysis and Mining

Synonyms

Clandestine networks; Crime online; Virtual crime

Glossary

Cyberstalking:

Persistent harassment in an online setting

DNS:

Domain name server

Hacking:

Unauthorized access to a computer system

SQL:

Structured Query Language is a special purpose programming language for database management systems

Definition

Cybercrime is the transformation of criminal, harmful, or illicit behavior by networked information and communication technologies (Wall 2007; Yar 2006).

Introduction

As our social and professional lives increasingly revolve around information and communication technologies (ICTs), these systems create new vulnerabilities for exploitation. These networked technologies enable a wide range of illicit and criminal activities that both emulate off-line crimes and embody wholly new types of activity. Technologies like the web, e-mail, and social media have transformed the division of criminal labor and provided new opportunities involving the acquisition and manipulation of...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Balkin JM, Kozlovski N (2007) Introduction. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York

    Google Scholar 

  • Benkler Y (2011) A free irresponsible press: Wikileaks and the battle over the soul of the networked fourth estate. Harv Civ Rights-Civ Liberties Law Rev 46:311

    Google Scholar 

  • Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1. http://www.cs.umn.edu/tech_reports_upload/tr2007/07-017.pdf. Accessed 17 June 2013

  • Chen H (2012) Extremist Youtube videos. In: Chen H (ed) Dark web. Springer, New York, pp 295–318

    Chapter  Google Scholar 

  • Chen H, Thoms S, Fu T (2008) Cyber extremism in web 2.0: an exploratory study of international jihadist groups. In: IEEE international conference on intelligence and security informatics, ISI 2008, Taipei. IEEE, pp 98–103

    Google Scholar 

  • Denning DE (2009) Terror’s web: how the internet is transforming terrorism. In: Yar M, Jewkes Y (eds) Handbook of internet crime. Willan Publishing, New York

    Google Scholar 

  • Dibbell J (2006) Play money: or, how i quit my day job and made millions trading virtual loot. Basic Books, New York

    Google Scholar 

  • Everton SF (2012) Disrupting dark networks. Structural analysis in the social sciences, vol 34. Cambridge University Press, New York

    Book  Google Scholar 

  • Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40

    Article  Google Scholar 

  • Goolsbee A (2001) The implications of electronic commerce for fiscal policy (and vice versa). J Econ Perspect 15:13–23

    Article  Google Scholar 

  • Grabosky P, Smith R (2001) Telecommunication fraud in the digital age. In: Wall DS (ed) Crime and the internet. Routledge, London

    Google Scholar 

  • Jackson C, Barth A, Bortz A, Shao W, Boneh D (2009) Protecting browsers from DNS rebinding attacks. ACM Trans Web 3(1):1–26

    Article  Google Scholar 

  • Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100

    Article  Google Scholar 

  • Jindal N, Liu B (2008) Opinion spam and analysis. In: Proceedings of the international conference on web search and web data mining, Palo Alto, p 219–230

    Google Scholar 

  • Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644

    Article  Google Scholar 

  • Keegan B, Ahmad MA, Williams D, Srivastava J, Contractor N (2011) Sic transit gloria mundi virtuali? Promise and peril in the computational social science of clandestine organizing. In: Proceedings of the ACM WebSci’11, Koblenz, p 1–8

    Google Scholar 

  • Kozlovski N (2007) Designing accountable online policing. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York

    Google Scholar 

  • Landler M, Sanger D (2013) US demands China block cyberattacks and agree to rules. The New York Times. http://www.nytimes.com/2013/03/12/world/asia/us-demands-that-china-end-hacking-and-set-cyber-rules.html. Accessed 12 May 2013

  • Lastowka FG, Hunter D (2006) Virtual crime. In: Balkin J, Noveck B (eds) The state of play: law, games, and virtual worlds. New York University Press, New York

    Google Scholar 

  • Lau F, Rubin SH, Smith MH, Trajkovic L (2000) Distributed denial of service attacks. In: 2000 I.E. international conference on systems, man, and cybernetics, Nashville, vol 3. IEEE, pp 2275–2280

    Google Scholar 

  • Lehdonvirta V, Ernkvist M (2011) Knowledge map of the virtual economy: converting the virtual economy into development potential. Technical report, The World Bank, Washington, DC

    Google Scholar 

  • Levy S (2001) Hackers: heroes of the computer revolution, vol 4. Penguin Books, New York

    Google Scholar 

  • Milward HB, Raab J (2006) Dark networks as organizational problems: elements of a theory 1. Int Public Manag J 9(3):333–360

    Article  Google Scholar 

  • Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2):39–53

    Article  Google Scholar 

  • Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, Indianapolis

    Google Scholar 

  • Newman G, McNally MM (2005) Identity theft literature review. National Institute of Justice, Rockville

    Google Scholar 

  • Nissenbaum H (2007) Where computer security meets national security. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York

    Google Scholar 

  • Ott M, Cardie C, Hancock J (2012) Estimating the prevalence of deception in online review communities. In: Proceedings of the 21st international conference on world wide web, Lyon. ACM, pp 201–210

    Google Scholar 

  • Owens WA, Dam KW, Lin HS (2009) Technology, policy, law, and ethics regarding US acquisition and use of cyberattack capabilities. The National Academy Press, Washington, DC. http://www.steptoe.com/assets/attachments/3785.pdf. Accessed 17 June 2013

    Google Scholar 

  • Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37–59

    Article  Google Scholar 

  • Primo Braga CA (2005) E-commerce regulation: new game, new rules? Q Rev Econ Finance 45(2):541–558

    Article  Google Scholar 

  • Quayle E (2003) Child pornography: an internet crime. Routledge, New York

    Google Scholar 

  • Spitzberg BH, Hoobler G (2002) Cyberstalking and the technologies of interpersonal terrorism. New Media Soc 4(1):71–92

    Article  Google Scholar 

  • Stohl C, Stohl M (2007) Networks of terror: theoretical assumptions and pragmatic consequences. Commun Theory 17(2):93–124

    Article  Google Scholar 

  • Taipale KA (2007) How technology, security, and privacy can coexist in the digital age. In: Balkin JM (ed) Cybercrime: digital cops in a networked environment. New York University Press, New York

    Google Scholar 

  • Taylor P (1999) Hackers: crime in the digital sublime. Routledge, New York

    Book  Google Scholar 

  • Thomas D (2003) Hacker culture. University of Minnesota Press, Minneapolis

    Google Scholar 

  • Traynor I (2007) Russia accused of unleashing cyberwar to disable Estonia. The Guardian. http://www.guardian.co.uk/world/2007/may/17/topstories3.russia. Accessed 17 June 2013

  • Wall DS (2001a) Maintaining order and law on the internet. In: Wall D (ed) Crime and the internet. Routledge, New York

    Chapter  Google Scholar 

  • Wall D (2001b) Cybercrimes and the internet. In: Wall D (ed) Crime and the internet. Routledge, New York

    Chapter  Google Scholar 

  • Wall D (2007) Cybercrime: the transformation of crime in the information age. Polity, Cambridge

    Google Scholar 

  • Yar M (2006) Cybercrime and society. Sage, London

    Google Scholar 

Recommended Reading

  • Balkin JM, Grimmelmann J, Katz E, Kozlovski N, Wagman S, Zarsky T (2007) Cybercrime: digital cops in a networked environment. New York University Press, New York

    Google Scholar 

  • Clough J (2010) Principles of cybercrime. Cambridge University Press, Cambridge

    Google Scholar 

  • Jewkes Y (2007) Crime online. Willan, Portland

    Google Scholar 

  • Wall DS (2007) Cybercrime. Polity, New York

    Google Scholar 

  • Williams M (2006) Virtually criminal: crime, deviance and regulation online. Routledge, New York

    Google Scholar 

  • Yar M (2006) Cybercrime and society. Sage, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Brian C. Keegan .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media LLC

About this entry

Cite this entry

Keegan, B.C., Ahmad, M.A. (2017). Deviant and Criminal Uses of Social Networks. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7163-9_55-1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7163-9_55-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7163-9

  • Online ISBN: 978-1-4614-7163-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics