{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T01:30:14Z","timestamp":1721266214464},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11036-019-01440-2","type":"journal-article","created":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T16:02:23Z","timestamp":1580572943000},"page":"259-270","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Market in Dream: the Rapid Development of Anonymous Cybercrime"],"prefix":"10.1007","volume":"25","author":[{"given":"Gengqian","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Jianwei","family":"Zhuge","sequence":"additional","affiliation":[]},{"given":"Yunqian","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Du","sequence":"additional","affiliation":[]},{"given":"Shuqiang","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,1]]},"reference":[{"key":"1440_CR1","unstructured":"Blokt Newpage. https:\/\/blokt.com\/news\/the-4-biggest-darknet-scandals-where-millions-in-crypto-were-seized\nhttps:\/\/blokt.com\/news\/the-4-biggest-darknet-scandals-where-millions-in-crypto-were-seized. Last accessed 15 Mar 2019"},{"key":"1440_CR2","unstructured":"CoinGecko homepage. https:\/\/www.coingecko.com. Last accessed 27 Mar 2019"},{"key":"1440_CR3","unstructured":"Dream Market Homepage. http:\/\/lchudifyeqm4ldjj.onion\/. Last accessed 27 Mar 2019"},{"key":"1440_CR4","unstructured":"Dream Market Page on DeepDotWeb. https:\/\/www.deepdotweb.com\/marketplace-directory\/listing\/dream-market\/. Last accessed 27 Mar 2019"},{"key":"1440_CR5","unstructured":"Retail and wholesale drug prices. https:\/\/dataunodc.un.org\/drugs\/prices. Last accessed 27 Mar 2019"},{"key":"1440_CR6","unstructured":"Word drug report 2018. https:\/\/www.unodc.org\/wdr2018\/. Last accessed 27 Mar 2019"},{"key":"1440_CR7","unstructured":"Aldridge J, D\u00e9cary-H\u00e9tu D (2014) Not an\u2019ebay for drugs\u2019: the cryptomarket\u2019silk road\u2019as a paradigm shifting criminal innovation. Available at SSRN 2436643"},{"key":"1440_CR8","doi-asserted-by":"crossref","unstructured":"Allodi L (2017) Economic factors of vulnerability trade and exploitation. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. ACM, pp 1483\u20131499","DOI":"10.1145\/3133956.3133960"},{"issue":"4","key":"1440_CR9","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.5465\/amr.2007.26585739","volume":"32","author":"N Argyres","year":"2007","unstructured":"Argyres N, Mayer KJ (2007) Contract design as a firm capability: an integration of learning and transaction cost perspectives. Acad Manag Rev 32(4):1060\u20131077","journal-title":"Acad Manag Rev"},{"key":"1440_CR10","doi-asserted-by":"crossref","unstructured":"Christin N (2013) Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd international conference on World Wide Web. ACM, pp 213\u2013224","DOI":"10.1145\/2488388.2488408"},{"key":"1440_CR11","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Tech. rep., Naval Research Lab Washington DC","DOI":"10.21236\/ADA465464"},{"key":"1440_CR12","unstructured":"Duxbury SW, Haynie DL (2017) The network structure of opioid distribution on a darknet cryptomarket. J Quant Criminol, 1\u201321"},{"issue":"2","key":"1440_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1080\/17440572.2015.1013211","volume":"16","author":"TJ Holt","year":"2015","unstructured":"Holt TJ, Smirnova O, Chua YT, Copes H (2015) Examining the risk reduction strategies of actors in online criminal markets. Global Crime 16(2):81\u2013103","journal-title":"Global Crime"},{"issue":"2","key":"1440_CR14","first-page":"137","volume":"2","author":"TJ Holt","year":"2016","unstructured":"Holt TJ, Smirnova O, Hutchings A (2016) Examining signals of trust in criminal markets online. Journal of Cybersecurity 2(2):137\u2013145","journal-title":"Journal of Cybersecurity"},{"issue":"282","key":"1440_CR15","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1080\/01621459.1958.10501452","volume":"53","author":"EL Kaplan","year":"1958","unstructured":"Kaplan EL, Meier P (1958) Nonparametric estimation from incomplete observations. J Am Stat Assoc 53 (282):457\u2013481","journal-title":"J Am Stat Assoc"},{"key":"1440_CR16","doi-asserted-by":"crossref","unstructured":"Lee S, Yoon C, Kang H, Kim Y, Kim Y, Han D, Son S, Shin S (2019) Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In: Network and distributed systems security (NDSS) symposium 2019. NDSS","DOI":"10.14722\/ndss.2019.23055"},{"key":"1440_CR17","unstructured":"Leontiadis N, Moore T, Christin N (2011) Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In: USENIX Security symposium, vol 11"},{"issue":"11","key":"1440_CR18","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.1177\/0002764217734267","volume":"61","author":"R Leukfeldt","year":"2017","unstructured":"Leukfeldt R, Kleemans E, Stol W (2017) The use of online crime markets by cybercriminal networks: a view from within. Am Behav Sci 61(11):1387\u20131402","journal-title":"Am Behav Sci"},{"key":"1440_CR19","doi-asserted-by":"crossref","unstructured":"McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D (2008) Shining light in dark places: Understanding the tor network. In: International symposium on privacy enhancing technologies symposium. Springer, pp 63\u201376","DOI":"10.1007\/978-3-540-70630-4_5"},{"issue":"4","key":"1440_CR20","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/0167-7187(85)90030-X","volume":"3","author":"MH Riordan","year":"1985","unstructured":"Riordan MH, Williamson OE (1985) Asset specificity and economic organization. Int J Ind Organ 3 (4):365\u2013378","journal-title":"Int J Ind Organ"},{"key":"1440_CR21","unstructured":"Soska K, Christin N (2015) Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In: 24th {USENIX} security symposium ({USENIX} security 15), pp 33\u201348"},{"key":"1440_CR22","unstructured":"Van Wegberg R, Tajalizadehkhoob S, Soska K, Akyazi U, Ganan CH, Klievink B, Christin N, Van Eeten M (2018) Plug and prey? measuring the commoditization of cybercrime via online anonymous markets. In: 27th {USENIX} security symposium ({USENIX} security 18), pp 1009\u20131026"},{"key":"1440_CR23","unstructured":"Van Wegberg R, Verburgh T (2018) Lost in the dream? measuring the effects of operation bayonet on vendors migrating to dream market. In: Proceedings of the evolution of the darknet workshop, pp 1\u20135"},{"key":"1440_CR24","volume-title":"The mechanisms of governance","author":"OE Williamson","year":"1996","unstructured":"Williamson OE (1996) The mechanisms of governance. Oxford University Press, Oxford"},{"key":"1440_CR25","doi-asserted-by":"crossref","unstructured":"Williamson OE (2007) Transaction cost economics: an introduction. Economics discussion paper (2007-3)","DOI":"10.2139\/ssrn.1691869"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01440-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01440-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01440-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,31]],"date-time":"2021-01-31T00:24:07Z","timestamp":1612052647000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01440-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1440"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01440-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2]]},"assertion":[{"value":"1 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}