2019
DOI: 10.25300/misq/2019/13808
|View full text |Cite
|
Sign up to set email alerts
|

DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics

Abstract: Society's growing dependence on computers and information technologies has been matched by an escalation of the frequency and sophistication of cyber attacks committed by criminals operating from the Darknet. As a result, security researchers have taken an interest in scrutinizing the Darknet and other underground web communities to develop a better understanding of cybercriminals and emerging threats. However, many scholars lack the capability or expertise to operationalize Darknet research and are thus unabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
36
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(40 citation statements)
references
References 26 publications
3
36
1
Order By: Relevance
“…This research has predominantly focused on the effects of P2P file sharing (and other piracy behaviors) on price sensitivity (Jain 2008, Sinha & Mandel 2008, substitution effects (Danaher et al 2010), diffusion (Givon, Mahajan & Muller 1995), and control mechanisms/policy (Sinha, Machado, & Sellman 2010). Similarly, other fields have explored traditional marketing questions, like the profitability of vendors and residual value to consumers (Holt, Smirnova, & Chua 2016), while utilizing traditional marketing approaches to guide research in this environment (Li, Chen, & Nunamaker 2016;Benjamin, Valacich, & Chen 2019). (See Table 2 for a brief summary of these papers).…”
Section: Research Examining Darknets and The Dark Webmentioning
confidence: 99%
“…This research has predominantly focused on the effects of P2P file sharing (and other piracy behaviors) on price sensitivity (Jain 2008, Sinha & Mandel 2008, substitution effects (Danaher et al 2010), diffusion (Givon, Mahajan & Muller 1995), and control mechanisms/policy (Sinha, Machado, & Sellman 2010). Similarly, other fields have explored traditional marketing questions, like the profitability of vendors and residual value to consumers (Holt, Smirnova, & Chua 2016), while utilizing traditional marketing approaches to guide research in this environment (Li, Chen, & Nunamaker 2016;Benjamin, Valacich, & Chen 2019). (See Table 2 for a brief summary of these papers).…”
Section: Research Examining Darknets and The Dark Webmentioning
confidence: 99%
“…The research on OBMs related phenomena is limited, but relevant for our study. One reason for the scarcity of research is the challenge of accessing the empirical field (Victor Benjamin, Valacich, & Chen, 2019 ). Another is that the conceptualization of the domain has not yet stabilized, and current studies either focus on online illegal behaviors or on tools supporting fraudulent interactions rather than developing a holistic understanding of the OBM as a complex socio-technical phenomenon.…”
Section: Background Literaturementioning
confidence: 99%
“…There are critical considerations in terms of both computer system, researcher, and human participant safety when dealing with risky and illegal consumption or when entering and studying criminal environments. While there are idiosyncrasies to our research designs, there are valuable frameworks already in place when considering dark web research, such as the Darknet Identification, Collection, Evaluation, with Ethics framework (DICE-E; Benjamin, Valacich, and Chen 2019).…”
Section: Illicit Global Tradementioning
confidence: 99%