2015
DOI: 10.1016/j.drugpo.2015.01.008
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating drug trafficking on the Tor Network: Silk Road 2, the sequel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
77
0
4

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 119 publications
(81 citation statements)
references
References 10 publications
0
77
0
4
Order By: Relevance
“…Like many similar Dark Web marketplaces, drugs were the most popular commodities [39]. Other highly populated listing areas of the marketplace we analyzed were "Credit/Gift Card Fraud" and "Identity Theft" data dumps.…”
Section: Determining the Structure Of The Dark Web Marketplacementioning
confidence: 99%
See 1 more Smart Citation
“…Like many similar Dark Web marketplaces, drugs were the most popular commodities [39]. Other highly populated listing areas of the marketplace we analyzed were "Credit/Gift Card Fraud" and "Identity Theft" data dumps.…”
Section: Determining the Structure Of The Dark Web Marketplacementioning
confidence: 99%
“…has been an interesting case study [44], in addition to subsequent Dark Web marketplaces, like Silk Road 2.0 [20,39]. A number of studies have attempted to quantify the growth and membership of these popular and successful online communities [8,19,45,46], and also to analyze their business models [44,47].…”
Section: Introductionmentioning
confidence: 99%
“…The Federal Bureau of Investigation shut down the Silk Road in October 2013 and its successor, the Silk Road 2, in November 2014 (Dolliver, 2015). The Silk Road 3 was launched almost immediately after but was overrun by other sites, such as Agora and Evolution, which adopted some features of the original Silk Road Van Buskirk et al, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…Many of the studies have been based on the Silk Road (e.g., Alridge and Décary-Hétu, 2016; Barratt and Maddox, 2016) and their successors, such as the Silk Road 2.0, Agora, Alphabay and Valhalla (e.g., Van Buskirk et al, 2016;Décary-Hétu and Giommoni, 2017;Demant et al, 2016;Dolliver and Kuhns, 2016;Van Hout and Hearne, 2017). Studies have employed more traditional research methods such as surveys and interviews (Barratt et al, 2014;Van Hout & Bingham 2013a, b) and newer approaches employing web crawlers (Alridge and Décary-Hétu, 2016;Demant et al, 2016;Dolliver, 2015;Aldridge, 2016;Christin, 2013;Hardy and Norgaard, 2015;. Some studies have also investigated the quality of drugs sold in the cryptomarkets (Caudeville et al, 2016;.…”
Section: Introductionmentioning
confidence: 99%
“…One can use it to make anonymous hacker attacks to various targets online, or other criminal activity [2]. During years, Internet and its usage became everyday activity in offices all around the world.…”
Section: Introductionmentioning
confidence: 99%