Abbink, K., & Sadrieh, A. (2009). The pleasure of being nasty.
Economics Letters, 105
(3), 306–308.
Abel, G. M., & Fitzgerald, L. J. (2012). ‘The street’s got its advantages’: Movement between sectors of the sex industry in a decriminalised environment.
Health, Risk & Society, 14
(1), 7–23.
https://doi.org/10.1080/13698575.2011.640664
.
Crossref
Afilipoaie, A., & Shortis, P. (2015).
The growing industry of darknet marketing
. Swansea: Global Drug Policy Observatory.
Afilipoaie, A., & Shortis, P. (2018).
Crypto-market enforcement—New strategy and tactics
. Swansea: Global Drug Policy Observatory.
Agar, M. H. (1971). Folklore of the heroin addict: Two examples.
The Journal of American Folklore, 84
(332), 175–185.
https://doi.org/10.2307/538988
.
Crossref
Akerlof, G. A. (1978). The market for “lemons”: Quality uncertainty and the market mechanism. In
Uncertainty in economics
(pp. 235–251). New York: Elsevier.
Alazab, M., Venkatraman, S., Watters, P., Alazab, M., & Alazab, A. (2011). Cybercrime: The case of obfuscated malware. In
Global security, safety and sustainability & e-Democracy
(pp. 204–211). Berlin: Springer.
Aldridge, J., & Askew, R. (2017). Delivery dilemmas: How drug cryptomarket users identify and seek to reduce their risk of detection by law enforcement.
International Journal of Drug Policy, 41
(Suppl. C), 101–109.
https://doi.org/10.1016/j.drugpo.2016.10.010
.
Aldridge, J., & Décary-Hétu, D. (2014).
Not an ‘e-Bay for drugs’: The cryptomarket ‘Silk Road’ as a paradigm shifting criminal innovation
. Rochester, NY: Social Science Research Network.
Aldridge, J., & Décary-Hétu, D. (2016a). Hidden wholesale: The drug diffusing capacity of online drug cryptomarkets.
International Journal of Drug Policy, 35,
7–15.
https://doi.org/10.1016/j.drugpo.2016.04.020
.
Aldridge, J., & Décary-Hétu, D. (2016b). Cryptomarkets and the future of illicit drug markets. In
Internet and drug markets, EMCDDA insights
(pp. 23–30). Luxembourg: Publications Office of the European Union.
Amoore, L., & Hall, A. (2010). Border theatre: On the arts of security and resistance.
Cultural Geographies, 17
(3), 299–319.
Ananthaswamy, A. (2011). Age of the splinternet.
New Scientist, 211
(2821), 42–45.
Ancrum, C., & Treadwell, J. (2017). Beyond ghosts, gangs and good sorts: Commercial cannabis cultivation and illicit enterprise in England’s disadvantaged inner cities.
Crime, Media, Culture, 13
(1), 69–84.
https://doi.org/10.1177/1741659016646414
.
Crossref
Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., et al. (2013). Measuring the cost of cybercrime. In
The economics of information security and privacy
(pp. 265–300). Berlin: Springer.
Anderson, T. L., & Levy, J. A. (2003). Marginality among older injectors in today’s illicit drug culture: Assessing the impact of ageing.
Addiction, 98
(6), 761–770.
https://doi.org/10.1046/j.1360-0443.2003.00388.x
.
Crossref
Andersson, J. (2011). The origins and impacts of the Swedish file-sharing movement: A case study.
Critical Studies in Peer Production (CSPP), 1
(1), 1–18.
Antonopoulos, G. A., & Hall, A. (2016). The financial management of the illicit tobacco trade in the United Kingdom.
British Journal of Criminology, 56
(4), 709–728.
https://doi.org/10.1093/bjc/azv062
.
Crossref
Arias, E. D. (2009).
Drugs and democracy in Rio de Janeiro: Trafficking, social networks, and public security
. Chapel Hill: University of North Carolina Press.
Askew, R. (2016). Functional fun: Legitimising adult recreational drug use.
International Journal of Drug Policy, 36,
112–119.
https://doi.org/10.1016/j.drugpo.2016.04.018
.
Crossref
Badawy, A., Ferrara, E., & Lerman, K. (2018). Analyzing the digital traces of political manipulation: The 2016 Russian interference Twitter campaign. In
2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
(pp. 258–265). IEEE.
Bajc, V. (2007). Surveillance in public rituals.
American Behavioral Scientist, 50
(12), 1648–1673.
Bancroft, A., & Scott Reid, P. (2017). Challenging the techno-politics of anonymity: The case of cryptomarket users.
Information, Communication & Society, 20
(4), 497–512.
https://doi.org/10.1080/1369118X.2016.1187643
.
Crossref
Barlow, J. P. (1996).
A declaration of the independence of cyberspace
. Retrieved from
http://homes.eff.org/~barlow/Declaration-Final.html
.
Barratt, M. J. (2011). Discussing illicit drugs in public internet forums: Visibility, stigma, and pseudonymity. In
Proceedings of the 5th International Conference on Communities and Technologies
(pp. 159–168).
https://doi.org/10.1145/2103354.2103376
.
Barratt, M. J. (2012). The efficacy of interviewing young drug users through online chat.
Drug and Alcohol Review, 31
(4), 566–572.
Barratt, M. J., & Aldridge, J. (2016). Everything you always wanted to know about drug cryptomarkets* (*but were afraid to ask).
International Journal of Drug Policy, 35,
1–6.
https://doi.org/10.1016/j.drugpo.2016.07.005
.
Crossref
Barratt, M. J., Allen, M., & Lenton, S. (2014a). “PMA sounds fun”: Negotiating drug discourses online.
Substance Use and Misuse, 49
(8), 987–998.
https://doi.org/10.3109/10826084.2013.852584
.
Barratt, M. J., Ferris, J. A., & Winstock, A. R. (2014b). Use of Silk Road, the online drug marketplace, in the United Kingdom, Australia and the United States.
Addiction, 109
(5), 774–783.
https://doi.org/10.1111/add.12470
.
Barratt, M. J., Ferris, J. A., & Winstock, A. R. (2016a). Safer scoring? Cryptomarkets, social supply and drug market violence.
International Journal of Drug Policy, 35
, 24–31.
https://doi.org/10.1016/j.drugpo.2016.04.019
.
Barratt, M. J., Ferris, J. A., Zahnow, R., Palamar, J. J., Maier, L. J., & Winstock, A. R. (2017). Moving on from representativeness: Testing the utility of the global drug survey.
Substance Abuse: Research and Treatment, 11
.
https://doi.org/10.1177/1178221817716391
.
Barratt, M. J., & Lenton, S. (2010). Beyond recruitment? Participatory online research with people who use drugs.
International Journal of Internet Research Ethics, 3
(1), 69–86.
Barratt, M. J., Lenton, S., & Allen, M. (2013). Internet content regulation, public drug websites and the growth in hidden internet services.
Drugs: Education, Prevention and Policy
,
20
(3), 195–202.
https://doi.org/10.3109/09687637.2012.745828
.
Barratt, M. J., Lenton, S., Maddox, A., & Allen, M. (2016b). ‘What if you live on top of a bakery and you like cakes?’—Drug use and harm trajectories before, during and after the emergence of Silk Road.
International Journal of Drug Policy, 35
, 50–57.
https://doi.org/10.1016/j.drugpo.2016.04.006
.
Barratt, M. J., Potter, G. R., Wouters, M., Wilkins, C., Werse, B., Perälä, J., et al. (2015). Lessons from conducting trans-national internet-mediated participatory research with hidden populations of cannabis cultivators.
International Journal of Drug Policy
,
26
(3), 238–249.
https://doi.org/10.1016/j.drugpo.2014.12.004
.
Becher, T., & Trowler, P. R. (2001).
Academic tribes and territories
. New York: McGraw-Hill.
Becker, G. S. (1968). Crime and punishment: An economic approach. In
The economic dimensions of crime
(pp. 13–68).
https://doi.org/10.1007/978-1-349-62853-7_2
.
Becker, H. S. (1953). Becoming a marihuana user.
American Journal of Sociology, 59
(3), 235–242.
Beckert, J. (2009). The social order of markets.
Theory and Society, 38
(3), 245–269.
https://doi.org/10.1007/s11186-008-9082-0
.
Crossref
Beckert, J., & Dewey, M. (2017). Introduction: The social organization of illegal markets. In J. Beckert & M. Dewey (Eds.),
The architecture of illegal markets: Towards an economic sociology of illegality in the economy
(pp. 1–34). Oxford: Oxford University Press. Retrieved from
http://www.oxfordscholarship.com.ezproxy.is.ed.ac.uk/view/10.1093/oso/9780198794974.001.0001/oso-9780198794974.
Beckert, J., & Wehinger, F. (2012). In the shadow: Illegal markets and economic sociology.
Socio-Economic Review, 11
(1), 5–30.
Beer, D. (2016).
Metric power
. London: Palgrave Macmillan.
Beer, D., & Burrows, R. (2010). Consumption, prosumption and participatory web cultures.
Journal of Consumer Culture, 10
(1), 3–12.
Bilgrei, O. R. (2018). Broscience: Creating trust in online drug communities.
New Media & Society, 20
(8), 2712–2727.
https://doi.org/10.1177/1461444817730331
.
Crossref
Bilgrei, O. R. (2019). Community‐consumerism: Negotiating risk in online drug communities.
Sociology of Health & Illness, 41
(5), 852–866.
Birchall, C. (2011). Introduction to ‘secrecy and transparency’ the politics of opacity and openness.
Theory, Culture & Society, 28
(7–8), 7–25.
Blake, D. (2018). How lotto scammers defraud elderly Americans and fuel gang wars in Jamaica.
The Conversation
. Retrieved from
http://theconversation.com/how-lotto-scammers-defraud-elderly-americans-and-fuel-gang-wars-in-jamaica-90676
.
Botoeva, G. (2014). Hashish as cash in a post-Soviet Kyrgyz village.
International Journal of Drug Policy, 25
(6), 1227–1234.
https://doi.org/10.1016/j.drugpo.2014.01.016
.
Crossref
Boucher, L. M., Marshall, Z., Martin, A., Larose-Hébert, K., Flynn, J. V., Lalonde, C., et al. (2017). Expanding conceptualizations of harm reduction: Results from a qualitative community-based participatory research study with people who inject drugs.
Harm Reduction Journal
,
14
, 18.
https://doi.org/10.1186/s12954-017-0145-2
.
Bourgois, P. (1998). The moral economies of homeless heroin addicts: Confronting ethnography, HIV risk, and everyday violence in San Francisco shooting encampments.
Substance Use and Misuse, 33
(11), 2323–2351.
https://doi.org/10.3109/10826089809056260
.
Crossref
Bourgois, P. (2003). Crack and the political economy of social suffering.
Addiction Research & Theory, 11
(1), 31–37.
https://doi.org/10.1080/1606635021000021322
.
Crossref
Bourgois, P., & Schonberg, J. (2009).
Righteous dopefiend
. University of California Press.
Boyd, D., & Crawford, K. (2011). Six provocations for big data. In
A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society
(Vol. 21). Oxford, UK: Oxford Internet Institute.
Boyer, E. W., Lapen, P. T., Macalino, G., & Hibberd, P. L. (2007). Dissemination of psychoactive substance information by innovative drug users.
CyberPsychology & Behavior, 10
(1), 1–6.
https://doi.org/10.1089/cpb.2006.9999
.
Crossref
Branwen, G. (2015).
Silk Road: Theory & practice
. Retrieved from
http://www.gwern.net/Silk%20Road
.
Branwen, G. (2016).
Darknet market mortality risks
.
https://www.gwern.net/DNM-survival
.
Broséus, J., Rhumorbarbe, D., Mireault, C., Ouellette, V., Crispino, F., & Décary-Hétu, D. (2016). Studying illicit drug trafficking on darknet markets: Structure and organisation from a Canadian perspective.
Forensic Science International, 264,
7–14.
https://doi.org/10.1016/j.forsciint.2016.02.045
.
Crossref
Bruneel, C.-A., Lakhdar, C. B., & Vaillant, N. G. (2014). Are “legal highs” users satisfied? Evidence from online customer comments.
Substance Use and Misuse, 49
(4), 364–373.
https://doi.org/10.3109/10826084.2013.841243
.
Crossref
Bucher, T. (2012). Want to be on the top? Algorithmic power and the threat of invisibility on Facebook.
New Media & Society, 14
(7), 1164–1180.
https://doi.org/10.1177/1461444812440159
.
Crossref
Caleb. (2019, May 7).
What do we know about the DeepDotWeb seizure?
Retrieved 8 May 2019, from Caleb website:
https://medium.com/@c5/what-do-we-know-about-the-deepdotweb-seizure-98ca45de9987
.
Çalışkan, E., Minárik, T., & Osula, A.-M. (2015).
Technical and legal overview of the tor anonymity network
. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.
Calo, R., & Rosenblat, A. (2017). The taking economy: Uber, information, and power.
Columbia Law Review, 117,
1623.
Cameron, D., Smith, G. A., Daniulaityte, R., Sheth, A. P., Dave, D., Chen, L., et al. (2013). PREDOSE: A semantic web platform for drug abuse epidemiology using social media.
Journal of Biomedical Informatics
,
46
(6), 985–997.
https://doi.org/10.1016/j.jbi.2013.07.007
.
Campbell, H. (2000). The glass phallus: Pub(lic) masculinity and drinking in rural New Zealand.
Rural Sociology, 65
(4), 562–581.
https://doi.org/10.1111/j.1549-0831.2000.tb00044.x
.
Crossref
Campbell, N. D., & Shaw, S. J. (2008). Incitements to discourse: Illicit drugs, harm reduction, and the production of ethnographic subjects.
Cultural Anthropology, 23
(4), 688–717.
Cárdenas, A., Radosavac, S., Grossklags, J., Chuang, J., & Hoofnagle, C. J. (2009).
An economic map of cybercrime
(SSRN Scholarly Paper No. ID 1997795). Retrieved from Social Science Research Network website:
https://papers.ssrn.com/abstract=1997795
.
Carnwath, T., & Smith, I. (2002).
Heroin century
. London: Routledge.
Carrier, N., & Klantschnig, G. (2017). Quasilegality: Khat, cannabis and Africa’s drug laws.
Third World Quarterly, 39
(2), 1–16.
https://doi.org/10.1080/01436597.2017.1368383
.
Crossref
Caudevilla, F., Ventura, M., Fornís, I., Barratt, M. J., Vidal, C., lladanosa, C. G., et al. (2016). Results of an international drug testing service for cryptomarket users.
International Journal of Drug Policy
.
http://dx.doi.org/10.1016/j.drugpo.2016.04.017
.
Chiauzzi, E., & Wicks, P. (2019). Digital trespass: Ethical and terms-of-use violations by researchers accessing data from an online patient community.
Journal of Medical Internet Research, 21
(2), e11985.
https://doi.org/10.2196/11985
.
Crossref
Choo, K.-K. R. (2008). Organised crime groups in cyberspace: A typology.
Trends in Organized Crime, 11
(3), 270–295.
https://doi.org/10.1007/s12117-008-9038-9
.
Crossref
Christin, N. (2013). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In
Proceedings of the 22nd International Conference on the World Wide Web
(pp. 213–224). Rio de Janeiro, Brazil: WWW 2013.
Clarke, R. V. G. (1980). Situational crime prevention: Theory and practice.
British Journal of Criminology, 20,
136–147.
Cobb, N. (2007). Governance through publicity: Anti-social behaviour orders, young people, and the problematization of the right to anonymity.
Journal of Law and Society, 34
(3), 342–373.
Coleman, E. G., & Golub, A. (2008). Hacker practice.
Anthropological Theory, 8
(3), 255–277.
Coles, N. (2001). It’s not what you know—It’s who you know that counts: Analysing serious crime groups as social networks.
British Journal of Criminology
,
41
(4), 580–594.
https://doi.org/10.1093/bjc/41.4.580
.
Collins, R. (2004).
Interaction ritual chains/Randall Collins
. Princeton, NJ and Oxford: Princeton University Press [2004], ©2004. (Main Library (STANDARD LOAN)—2nd floor HM1111 Col.).
Coomber, R. (1997a). Dangerous drug adulteration—An international survey of drug dealers using the internet and the World Wide Web (WWW).
International Journal on Drug Policy, 8,
71–81.
Coomber, R. (1997b). The adulteration of drugs: What dealers do to illicit drugs, and what they think is done to them.
Addiction Research and Theory, 5
(4), 297–306.
Coomber, R. (2003). There’s no such thing as a free lunch: How ‘freebies’ and ‘credit’ operate as part of rational drug market activity.
Journal of Drug Issues, 33
(4), 939–962.
Coomber, R., Moyle, L., & South, N. (2015). The normalisation of drug supply: The social supply of drugs as the “other side” of the history of normalisation.
Drugs: Education, Prevention and Policy, 23
(3), 255–263.
https://doi.org/10.3109/09687637.2015.1110565
.
Coward, M. (2017). Against network thinking: A critique of pathological sovereignty.
European Journal of International Relations
.
https://doi.org/10.1177/1354066117705704
.
Critchlow, B. (1985). The blame in the bottle: Attributions about drunken behavior.
Personality and Social Psychology Bulletin, 11
(3), 258–274.
https://doi.org/10.1177/0146167285113003
.
Crossref
Cubrilovic, N. (2014).
Large number of tor hidden sites seized by the FBI in operation onymous were clone or scam sites
. Retrieved from
https://www.nikcub.com/posts/onymous-part1/
.
Cunliffe, J., Martin, J., Décary-Hétu, D., & Aldridge, J. (2017). An island apart? Risks and prices in the Australian cryptomarket drug trade.
International Journal of Drug Policy, 50
(Suppl. C), 64–73.
https://doi.org/10.1016/j.drugpo.2017.09.005
.
Curtis, B. (2002).
The politics of population: State formation, statistics, and the census of Canada, 1840–1875
. Toronto: University of Toronto Press.
Cusack, B., & Ward, G. (2018).
Points of failure in the ransomware electronic business model
. Twenty-fourth Americas Conference on Information Systems. New Orleans.
Czajka, J. L., & Beyler, A. (2016).
Declining response rates in federal surveys: Trends and implications (background paper)
(Mathematica Policy Research).
Davey, Z., Schifano, F., Corazza, O., Deluca, P., & Psychonaut Web Mapping Group. (2012). e-Psychonauts: Conducting research in online drug forum communities.
Journal of Mental Health, 21
(4), 386–394.
https://doi.org/10.3109/09638237.2012.682265
.
Davis, D. E. (2011). Irregular armed forces, shifting patterns of commitment, and fragmented sovereignty in the developing world. In M. Hanagan & C. Tilly (Eds.),
Contention and trust in cities and states
(pp. 249–265).
https://doi.org/10.1007/978-94-007-0756-6_17
.
De Filippi, P., & Hassan, S. (2016). Blockchain technology as a regulatory technology: From code is law to law is code.
First Monday, 21
(12).
https://doi.org/10.5210/fm.v21i12.7113
.
Décary-Hétu, D., & Dupont, B. (2013). Reputation in a dark network of online criminals.
Global Crime, 14,
175–196.
https://doi.org/10.1080/17440572.2013.801015
.
Crossref
Décary-Hétu, D., & Leppänen, A. (2016). Criminals and signals: An assessment of criminal performance in the carding underworld.
Security Journal, 29
(3), 442–460.
https://doi.org/10.1057/sj.2013.39
.
Crossref
Décary-Hétu, D., Paquet-Clouston, M., & Aldridge, J. (2016). Going international? Risk taking by cryptomarket drug vendors.
International Journal of Drug Policy, 35,
69–76.
https://doi.org/10.1016/j.drugpo.2016.06.003
.
Crossref
Decorte, T. (2001). Quality control by cocaine users: Underdeveloped harm reduction strategies.
European Addiction Research, 7
(4), 161–175.
Decorte, T. (2011). Blinding ourselves with science: The chronic infections of our thinking on psychoactive substances. In G. Hunt, M. Milhet, & Henri Bergeron (Eds.),
Drugs and culture: Knowledge, consumption and policy
(pp. 33–51). Farnham: Ashgate.
Decorte, T., Malm, A., Sznitman, S. R., Hakkarainen, P., Barratt, M. J., Potter, G. R., et al. (2019). The challenges and benefits of analyzing feedback comments in surveys: Lessons from a cross-national online survey of small-scale cannabis growers.
Methodological Innovations, 12
(1).
https://doi.org/10.1177/2059799119825606
.
Dennis, F. (2016). Encountering “triggers”.
Contemporary Drug Problems, 43
(2), 126–141.
Dennis, F. (2017). Conceiving of addicted pleasures: A ‘modern’ paradox.
International Journal of Drug Policy, 49,
150–159.
https://doi.org/10.1016/j.drugpo.2017.07.007
.
Crossref
Dennis, F., & Farrugia, A. (2017). Materialising drugged pleasures: Practice, politics, care.
International Journal of Drug Policy, 49,
86–91.
https://doi.org/10.1016/j.drugpo.2017.10.001
.
Crossref
Department of Electronics and Information Technology. (2015).
Draft national encryption policy
. New Delhi: The Indian Ministry of Communications and Information Technology.
Dickinson, T., & Wright, R. (2015). Gossip, decision-making and deterrence in drug markets.
British Journal of Criminology, 55
(6), 1263–1281.
https://doi.org/10.1093/bjc/azv010
.
Crossref
Dingledine, R., Mathewson, N., & Syverson, P. (2004).
Tor: The second-generation onion router
. Retrieved from DTIC Document website:
http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA465464
.
Dittus, M., Wright, J., & Graham, M. (2017).
Platform criminalism: The ‘last-mile’ geography of the darknet market supply chain
. ArXiv: 1712.10068 [Cs]. Retrieved from
http://arxiv.org/abs/1712.10068
.
DoctorX. (2019).
Use and abuse of drug checking by cryptomarkets vendors
. International Energy Control. Retrieved 17 April 2019, from
https://energycontrol-international.org/use-and-abuse-of-drug-checking-by-cryptomarkets-vendors/
.
Dodd, N. (2018). The social life of bitcoin.
Theory, Culture & Society, 35
(3), 35–56.
https://doi.org/10.1177/0263276417746464
.
Crossref
Dodge, A. (2016). Digitizing rape culture: Online sexual violence and the power of the digital photograph.
Crime, Media, Culture, 12
(1), 65–82.
https://doi.org/10.1177/1741659015601173
.
Crossref
Dourish, P. (2016). Algorithms and their others: Algorithmic culture in context.
Big Data & Society, 3
(2).
https://doi.org/10.1177/2053951716665128
.
Drumm, R. D., McBride, D., Metsch, L., Neufield, M., & Sawatsky, A. (2005). “I’m a health nut!” street drug users’ accounts of self-care strategies.
Journal of Drug Issues, 35
(3), 607–629.
Du Toit, B. (1977).
Drugs, rituals and altered states of consciousness
. Rotterdam: AA Balkema.
Duff, C. (2011). Networks, resources and agencies: On the character and production of enabling places.
Health & Place, 17
(1), 149–156.
https://doi.org/10.1016/j.healthplace.2010.09.012
.
Crossref
Duff, C. (2014). The place and time of drugs.
International Journal of Drug Policy, 25
(3), 633–639.
https://doi.org/10.1016/j.drugpo.2013.10.014
.
Crossref
Dupont, B., Côté, A.-M., Savine, C., & Décary-Hétu, D. (2016). The ecology of trust among hackers.
Global Crime, 17
(2), 129–151.
https://doi.org/10.1080/17440572.2016.1157480
.
Crossref
Durkheim, E. (2013).
Durkheim: The division of labour in society
. Macmillan International Higher Education, 1893.
Duxbury, S. W., & Haynie, D. L. (2017). The network structure of opioid distribution on a darknet cryptomarket.
Journal of Quantitative Criminology
, 1–21.
https://doi.org/10.1007/s10940-017-9359-4
.
Duxbury, S. W., & Haynie, D. L. (2018). The network structure of opioid distribution on a darknet cryptomarket.
Journal of Quantitative Criminology, 34
(4), 921–941.
Edgley, C., & Kiser, K. (1982). Polaroid sex: Deviant possibilities in a technological age.
The Journal of American Culture, 5
(1), 59–64.
Epstein, S. (1996).
Impure science: AIDS, activism, and the politics of knowledge
. Berkeley: University of California Press.
Faulkner-Gurstein, R. (2017). The social logic of naloxone: Peer administration, harm reduction, and the transformation of social policy.
Social Science & Medicine, 180,
20–27.
https://doi.org/10.1016/j.socscimed.2017.03.013
.
Crossref
Fischer‐Hübner, S. (1998). Privacy and security at risk in the global information society.
Information, Communication & Society, 1
(4), 420–441.
Fleetwood, J. S. (2009).
Emotional work: Ethnographic fieldwork in prisons in Ecuador
. Glasgow: University of Glasgow.
Fleetwood, J. S. (2014).
Drug mules: Women in the international cocaine trade
. London: Springer.
Fligstein, N. (2002).
The architecture of markets: An economic sociology of twenty-first-century capitalist societies
. Princeton: Princeton University Press.
Flint, J., & Nixon, J. (2006). Governing neighbours: Anti-social behaviour orders and new forms of regulating conduct in the UK.
Urban Studies, 43
(5–6), 939–955.
Fox, N. J., & Alldred, P. (2015). Inside the research-assemblage: New materialism and the micropolitics of social inquiry.
Sociological Research Online, 20
(2), 1–19.
https://doi.org/10.5153/sro.3578
.
Crossref
French, M., & Smith, G. J. (2016). Surveillance and embodiment: Dispositifs of capture.
Body & Society, 22,
3–27.
https://doi.org/10.1177/1357034x16643169
.
Crossref
Friedman, S. R., de Jong, W., Rossi, D., Touzé, G., Rockwell, R., Des Jarlais, D. C., et al. (2007). Harm reduction theory: Users’ culture, micro-social indigenous harm reduction, and the self-organization and outside-organizing of users’ groups.
International Journal of Drug Policy, 18
(2), 107–117.
https://doi.org/10.1016/j.drugpo.2006.11.006
.
Crossref
Froomkin, A. M. (1999). Legal issues in anonymity and pseudonymity.
The Information Society, 15
(2), 113–127.
Froomkin, A. M. (2015). From anonymity to identification.
Journal of Self-Regulation and Regulation, 1
, 121–138.
Furst, R. T. (2000). The re-engineering of heroin: An emerging heroin “cutting” trend in New York City.
Addiction Research, 8
(4), 357–379.
Gambetta, D. (2011).
Codes of the underworld: How criminals communicate
. Princeton: Princeton University Press.
Gangadharan, S. P. (2017). The downside of digital inclusion: Expectations and experiences of privacy and surveillance among marginal internet users.
New Media & Society, 19
(4), 597–615.
https://doi.org/10.1177/1461444815614053
.
Crossref
Gans, H. (1962).
The urban villages
. New York: Free Press.
Garrett, R. K. (2006). Protest in an information society: A review of literature on social movements and new ICTs.
Information, Communication & Society, 9
(2), 202–224.
Geser, H. (2007).
Me, my self and my Avatar: Some microsociological reflections on “second life.”
Working Paper.
Gilbert, M., & Dasgupta, N. (2017). Silicon to syringe: Cryptomarkets and disruptive innovation in opioid supply chains.
International Journal of Drug Policy, 46,
160–167.
https://doi.org/10.1016/j.drugpo.2017.05.052
.
Crossref
Gillespie, A. A. (2012). Twitter, jokes and the law: Chambers v DPP [2012] EWHC 2157 (QB).
The Journal of Criminal Law, 76
(5), 364–369.
https://doi.org/10.1350/jcla.2012.76.5.790
.
Crossref
Gilman, N., Goldhammer, J., & Weber, S. (Eds.). (2011).
Deviant globalization: Black market economy in the 21st century
. A&C Black.
Giommoni, L., & Gundur, R. V. (2018). An analysis of the United Kingdom’s cannabis market using crowdsourced data.
Global Crime, 19
(2), 85–106.
https://doi.org/10.1080/17440572.2018.1460071
.
Crossref
Goldschlag, D. M., Reed, M. G., & Syverson, P. F. (1996, May 30). Hiding routing information. In
Information hiding
(pp. 137–150). Berlin, Heidelberg: Springer.
https://doi.org/10.1007/3-540-61996-8_37
.
Goldschlag, D., Reed, M., & Syverson, P. (1999). Onion routing.
Communications of the ACM, 42
(2), 39–41.
https://doi.org/10.1145/293411.293443
.
Crossref
Gomart, E. (2002). Methadone: Six effects in search of a substance.
Social Studies of Science, 32
(1), 93–135.
Goucher, W. (2010). Being a cybercrime victim.
Computer Fraud & Security, 2010
(10), 16–18.
https://doi.org/10.1016/S1361-3723(10)70134-2
.
Crossref
Gowan, T., Whetstone, S., & Andic, T. (2012). Addiction, agency, and the politics of self-control: Doing harm reduction in a heroin users’ group.
Social Science & Medicine, 74
(8), 1251–1260.
https://doi.org/10.1016/j.socscimed.2011.11.045
.
Crossref
Granovetter, M. (1973). The strength of weak ties.
American Journal of Sociology, 78
(6), 1360–1380.
Granovetter, M. (1983). The strength of weak ties: A network theory revisited.
Sociological Theory, 1
(1), 201–233.
Grund, J. P. C. (1993).
Drug use as a social ritual
. Rotterdam: Instituut voor Verslavingsonderzoek, Erasmus University Rotterdam.
Gusfield, J. R. (1987). Passage to play: Rituals of drinking time in American society. In M. Douglas (Ed.),
Constructive drinking: Perspectives on drink from anthropology
(pp. 73–90). Cambridge: Cambridge University Press.
Gusfield, J. (1997). The culture of public problems: Drinking-driving and the symbolic order. In
Morality and health
(pp. 201–229). New York: Routledge.
Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage.
The British Journal of Sociology, 51
(4), 605–622.
https://doi.org/10.1080/00071310020015280
.
Crossref
Haines, R. J., Johnson, J. L., Carter, C. I., & Arora, K. (2009). “I couldn’t say, I’m not a girl”—Adolescents talk about gender and marijuana use.
Social Science & Medicine, 68
(11), 2029–2036.
Hales, T. C. (2014). The NSA back door to NIST.
Notices of the AMS, 61
(2), 190–192.
Hall, S., Winlow, S., & Ancrum, C. (2013).
Criminal identities and consumer culture: Crime, exclusion and the new culture of narcissm
. London: Willan.
Haller, M. H. (1990). Illegal enterprise: A theoretical and historical interpretation.
Criminology, 28
(2), 207–236.
Hamilton, K. (2017, September 26).
Jamaican lottery scammers suspected in slaying of retired U.S. teacher
. Retrieved 26 May 2019, from Vice News website:
https://news.vice.com/en_us/article/mb9588/jamaican-lottery-scammers-suspected-in-slaying-of-retired-u-s-teacher
.
Hammersvik, E., Sandberg, S., & Pedersen, W. (2012). Why small-scale cannabis growers stay small: Five mechanisms that prevent small-scale growers from going large scale.
International Journal of Drug Policy, 23
(6), 458–464.
https://doi.org/10.1016/j.drugpo.2012.08.001
.
Crossref
Hammond, L. (2016).
Obliged to give: Remittances and the maintenance of transnational networks between Somalis at home and abroad, 10
, 27.
Haritavorn, N. (2014). Surviving in two worlds: Social and structural violence of Thai female injecting drug users.
International Journal of Drug Policy, 25
(1), 116–123.
https://doi.org/10.1016/j.drugpo.2013.09.008
.
Crossref
Harris, M., & Rhodes, T. (2012). Venous access and care: Harnessing pragmatics in harm reduction for people who inject drugs.
Addiction, 107
(6), 1090–1096.
Harris, M., & Rhodes, T. (2013). Methadone diversion as a protective strategy: The harm reduction potential of ‘generous constraints’.
International Journal of Drug Policy, 24
(6), e43–e50.
https://doi.org/10.1016/j.drugpo.2012.10.003
.
Crossref
Hearn, J. (2012).
Theorizing power
. Macmillan International Higher Education.
Hine, C. (2015).
Ethnography for the internet: Embedded, embodied and everyday
. London: Bloomsbury Academic.
Holt, T. J. (2013). Exploring the social organisation and structure of stolen data markets.
Global Crime, 14,
155–174.
https://doi.org/10.1080/17440572.2013.787925
.
Crossref
Holt, T. J., Smirnova, O., & Hutchings, A. (2016). Examining signals of trust in criminal markets online.
Journal of Cybersecurity, 2
(2), 137–145.
https://doi.org/10.1093/cybsec/tyw007
.
Holt, T. J., Smirnova, O., Chua, Y. T. C., & Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets.
Global Crime, 16
(2), 81–103.
Hornsby, R., & Hobbs, D. (2007). A zone of ambiguity.
British Journal of Criminology, 47
(4), 551–571.
https://doi.org/10.1093/bjc/azl089
.
Crossref
Horton-Eddison, M., & Cristofaro, M. D. (2017).
Hard interventions and innovation in crypto-drug markets: The escrow example
. Swansea: Global Drug Policy Observatory.
Hunt, G., & Frank, V. A. (2016). Reflecting on intoxication. In T. Kolind, B. Thom, & G. Hunt (Eds.),
The SAGE handbook of drug and alcohol studies
. London: Sage.
Hunt, G., Milhet, M., & Bergeron, H. (Eds.). (2011).
Drugs and culture: Knowledge, consumption and policy
. Avebury: Ashgate.
Hutchings, A., & Holt, T. J. (2016). The online stolen data market: Disruption and intervention approaches.
Global Crime
, 1–20.
https://doi.org/10.1080/17440572.2016.1197123
.
Iginio, G., Danit, G., Thiago, A., & Gabriela, M. (2015).
Countering online hate speech
. Paris: UNESCO.
Iglesias, R. M., Szklo, A. S., de Souza, M. C., & de Almeida, L. M. (2017). Estimating the size of illicit tobacco consumption in Brazil: Findings from the global adult tobacco survey.
Tobacco Control, 26
(1), 53–59.
https://doi.org/10.1136/tobaccocontrol-2015-052465
.
Crossref
Jaros, D. M. (2012). Perfecting criminal markets.
Columbia Law Review, 112
, 1947–1991.
Jauffret-Roustide, M. (2009). Self-support for drug users in the context of harm reduction policy: A lay expertise defined by drug users’ life skills and citizenship.
Health Sociology Review, 18
(2), 159–172.
https://doi.org/10.5172/hesr.18.2.159
.
Crossref
Jensen, C., Forlini, C., Partridge, B., & Hall, W. (2016). Australian university students’ coping strategies and use of pharmaceutical stimulants as cognitive enhancers.
Frontiers in Psychology, 7
.
https://doi.org/10.3389/fpsyg.2016.00277
.
Johansen, P., & von Lampe, K. (2002).
Is there honor among crooks? On the importance of trust in criminal relations
. Chicago: American Society of Criminology.
Joossens, L., & Raw, M. (2012). From cigarette smuggling to illicit tobacco trade.
Tobacco Control, 21
(2), 230–234.
Jordan, T., & Taylor, P. (1998). A sociology of hackers.
The Sociological Review, 46
(4), 757–780.
https://doi.org/10.1111/1467-954X.00139
.
Crossref
Julian. (2015).
Deanonymizing darknet data @atechdad
. Available at:
http://atechdad.com/deanonymizing-darknet-data/
.
Kamat, P., & Gautam, A. S. (2018). Recent trends in the era of cybercrime and the measures to control them. In
Handbook of e-business security
(pp. 243–258). New York: Auerbach Publications.
Karp, D. A. (1973). Hiding in pornographic bookstores: A reconsideration of the nature of urban anonymity.
Urban Life and Culture, 1
(4), 427–451.
Karstedt, S., & Farrall, S. (2006). The moral economy of everyday crime markets, consumers and citizens.
British Journal of Criminology, 46,
1011–1036.
https://doi.org/10.1093/bjc/azl082
.
Crossref
Keane, H. (2003). Critiques of harm reduction, morality and the promise of human rights.
International Journal of Drug Policy, 14
(3), 227–232.
Keegan, B., Ahmad, M. A., Williams, D., Srivastava, J., & Contractor, N. S. (2011). What can gold farmers teach us about criminal networks?
ACM Crossroads, 17
(3), 11–15.
Kennedy, H. (2006). Beyond anonymity, or future directions for internet identity research.
New Media & Society, 8
(6), 859–876.
Kenney, M. (2007). The architecture of drug trafficking: network forms of organisation in the Colombian cocaine trade.
Global Crime, 8
(3), 233–259.
https://doi.org/10.1080/17440570701507794
.
Crossref
Kleemans, E. R. (2012). Organized crime and the visible hand: A theoretical critique on the economic analysis of organized crime.
Criminology & Criminal Justice, 13
(5), 615–629.
https://doi.org/10.1177/1748895812465296
.
Crossref
Kraemer-Mbula, E., Tang, P., & Rush, H. (2013). The cybercrime ecosystem: Online innovation in the shadows?
Technological Forecasting and Social Change, 80
(3), 541–555.
https://doi.org/10.1016/j.techfore.2012.07.002
.
Crossref
Krebs, B. (2016a).
Source code for IoT botnet ‘Mirai’ released
. Retrieved 13 May 2019, from Krebs on Security website:
https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/
.
Krebs, B. (2016b).
The democratization of censorship—Krebs on security
. Retrieved 13 May 2019, from
https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/
.
Kroneberg, C., Heintze, I., & Mehlkop, G. (2010). The interplay of moral norms and instrumental incentives in crime causation.
Criminology, 48
(1), 259–294.
https://doi.org/10.1111/j.1745-9125.2010.00187.x
.
Crossref
Kruithof, K., Aldridge, J., Décary-Hétu, D., Sim, M., Dujso, E., & Hoorens, S. (2016).
Internet-facilitated drugs trade: An analysis of the size, scope and the role of the Netherlands
. Santa Monica, CA: RAND Corporation.
Kshetri, N. (2010).
The global cybercrime industry: Economic, institutional and strategic perspectives
. Berlin: Springer Science & Business Media.
Kücklich, J. (2005). Precarious playbour: Modders and the digital games industry.
Fibreculture, 5
(1).
Ladegaard, I. (2017). “I pray that we will find a way to carry on this dream”: How a law enforcement crackdown united an online community.
Critical Sociology
.
https://doi.org/10.1177/0896920517735670
.
Ladegaard, I. (2018). We know where you are, what you are doing and we will catch you: Testing deterrence theory in digital drug markets.
The British Journal of Criminology, 58
(2), 414–433.
https://doi.org/10.1093/bjc/azx021
.
Crossref
Larsson, S., & Svensson, M., (2010). Compliance or obscurity? Online anonymity as a consequence of fighting unauthorised file-sharing.
Policy & Internet, 2
(4), 75–103.
Larsson, S., Svensson, M., & Kaminski, M. D. (2013). Online piracy, anonymity and social change.
Convergence: The International Journal of Research into New Media Technologies, 19
(1), 95–114.
Law, J. (1990). Introduction: Monsters, machines and sociotechnical relations.
Sociological Review, 38,
1–23.
https://doi.org/10.1111/j.1467-954X.1990.tb03346.x
.
Crossref
Lee, A., & Cook, P. S. (2015). The conditions of exposure and immediacy: Internet surveillance and Generation Y.
Journal of Sociology, 51
(3), 674–688.
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2016). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks.
British Journal of Criminology, 57
(3), 704–722.
https://doi.org/10.1093/bjc/azw009
.
Crossref
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017). A typology of cybercriminal networks: From low-tech all-rounders to high-tech specialists.
Crime, Law and Social Change, 67
(1), 21–37.
Levi, M., & Osofsky, L. (1995).
Investigating, seizing and confiscating the proceeds of crime
. London: Home Office Police Research Group London.
Lévi-Strauss, C. (1969).
The raw and the cooked: Introduction to a science of mythology
(Vol. 1). New York: Harper & Row.
Lewis, S. J. (2016).
Untangling the dark web: Unmasking onion services
. Presented at the HackFest 2016, Quebec City.
Lewis, S. J. (Ed.). (2017).
Queer privacy: Essays from the margins of society
.
http://leanpub.com/queerprivacy
.
Lum, C. (2008). The geography of drug activity and violence: Analyzing spatial relationships of non-homogenous crime event types.
Substance Use and Misuse, 43
(2), 179–201.
Lupton, D. (2015).
Lively data, social fitness and biovalue: The intersections of health self-tracking and social media
. New York: Social Science Research Network.
Lupton, D. (2016).
The quantified self: A sociology of self-tracking cultures
. Cambridge: Polity.
Lusthaus, J. (2013). How organised is organised cybercrime?
Global Crime, 14
(1), 52–60.
https://doi.org/10.1080/17440572.2012.759508
.
Crossref
Lusthaus, J. (2015, August 5).
All’s fair in love and war?
Retrieved 11 July 2018, from Industry of Anonymity website:
https://industryofanonymity.com/2015/08/05/alls-fair-in-love-and-war/
.
Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: Consumer and ethical predispositions.
Journal of Consumer Marketing, 25
(3), 167–178.
MacKenzie, D., Beunza, D., Millo, Y., & Pardo-Guerra, J. P. (2012). Drilling through the Allegheny mountains.
Journal of Cultural Economy, 5
(3), 279–296.
https://doi.org/10.1080/17530350.2012.674963
.
Crossref
Mackenzie, S. (2014). Conditions for guilt-free consumption in a transnational criminal market.
European Journal on Criminal Policy and Research, 20
(4), 503–515.
https://doi.org/10.1007/s10610-013-9229-z
.
Crossref
MacNeill, K. (2017). Torrenting game of thrones: So wrong and yet so right.
Convergence, 23
(5), 545–562.
Maddox, A., Barratt, M. J., Allen, M., & Lenton, S. (2016). Constructive activism in the dark web: Cryptomarkets and illicit drugs in the digital ‘demimonde’.
Information, Communication & Society, 19
(1), 111–126.
https://doi.org/10.1080/1369118X.2015.1093531
.
Crossref
Manderson, D. (1995). Metamorphoses: Clashing symbols in the social construction of drugs.
Journal of Drug Issues, 25
(4), 799–816.
https://doi.org/10.1177/002204269502500410
.
Crossref
Mansfield, D. (2002).
The economic superiority of illicit drug production: Myth and reality—Opium poppy cultivation in Afghanistan
. In International conference on drug control and cooperation, Feldafing, January 7–12.
Mansfield, D. (2018). Turning deserts into flowers: Settlement and poppy cultivation in southwest Afghanistan.
Third World Quarterly, 39
(2), 331–349.
https://doi.org/10.1080/01436597.2017.1396535
.
Crossref
Marres, N., & Weltevrede, E. (2013). Scraping the social?
Journal of Cultural Economy, 6
(3), 313–335.
https://doi.org/10.1080/17530350.2013.772070
.
Crossref
Martin, E. (2006). The pharmaceutical person.
BioSocieties, 1
(3), 273–287.
Martin, J. (2014a).
Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs
. London: Palgrave Macmillan.
Martin, J. (2014b). Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’.
Criminology and Criminal Justice, 14
(3), 351–367.
Marx, G. T. (1999). What’s in a name? Some reflections on the sociology of anonymity.
The Information Society, 15
(2), 99–112.
Masson, K., & Bancroft, A. (2018). ‘Nice people doing shady things’: Drugs and the morality of exchange in the darknet cryptomarkets.
International Journal of Drug Policy, 58
, 78–84.
Mathews, P. W. (2017). Cam models, sex work, and job immobility in the Philippines.
Feminist Economics, 23
(3), 160–183.
https://doi.org/10.1080/13545701.2017.1293835
.
Crossref
Maurer, B., Nelms, T. C., & Swartz, L. (2013). “When perhaps the real problem is money itself!”: The practical materiality of bitcoin.
Social Semiotics, 23
(2), 261–277.
Mauss, M. (1954).
The gift: The form and reason for exchange in archaic societies
. London: Routledge.
Maxwell, D., Speed, C., & Pschetz, L. (2017). Story blocks: Reimagining narrative through the blockchain.
Convergence: The International Journal of Research into New Media Technologies
,
23
(1), 79–97.
https://doi.org/10.1177/1354856516675263
.
May, T., & Hough, M. (2004). Drug markets and distribution systems.
Addiction Research & Theory, 12
(6), 549–563.
https://doi.org/10.1080/16066350412331323119
.
Crossref
Mayhew, P., Clarke, R. V. G., Sturman, A., & Hough, J. M. (1976).
Crime as opportunity
(Vol. 34). London: HM Stationery Office.
Mba, G., Onaolapo, J., Stringhini, G., & Cavallaro, L. (2017). Flipping 419 cybercrime scams: Targeting the weak and the vulnerable. In
Proceedings of the 26th International Conference on World Wide Web Companion
(pp. 1301–1310). International World Wide Web Conferences Steering Committee.
Measham, F., & Brain, K. (2005). ‘Binge’ drinking, British alcohol policy and the new culture of intoxication.
Crime, Media, Culture, 1
(3), 262–283.
https://doi.org/10.1177/1741659005057641
.
Crossref
Measham, F., & Shiner, M. (2009). The legacy of ‘normalisation’: The role of classical and contemporary criminological theory in understanding young people’s drug use.
International Journal of Drug Policy, 20
(6), 502–508.
https://doi.org/10.1016/j.drugpo.2009.02.001
.
Crossref
Merton, R. K. (1938). Social structure and anomie.
American Sociological Review, 3
(5), 672.
Milgram, S. (1963). Behavioral study of obedience.
The Journal of Abnormal and Social Psychology, 67
(4), 371–378.
Moeller, K. (2012). Costs and revenues in street-level cannabis dealing.
Trends in Organized Crime, 15
(1), 31–46.
https://doi.org/10.1007/s12117-011-9146-9
.
Crossref
Moeller, K., Munksgaard, R., & Demant, J. (2017). Flow my FE the vendor said: Exploring violent and fraudulent resource exchanges on cryptomarkets for illicit drugs.
American Behavioral Scientist
,
Early Online
(v).
https://doi.org/10.1177/0002764217734269
.
Moeller, K., & Sveinung, S. (2016). Debts and threats: Managing inability to repay credits in illicit drug distribution.
Justice Quarterly, 34
(2), 272–296.
Moore, D. (2008). Erasing pleasure from public discourse on illicit drugs: On the creation and reproduction of an absence.
International Journal of Drug Policy, 19
(5), 353–358.
Morselli, C., Décary-Hétu, D., Paquet-Clouston, M., & Aldridge, J. (2017). Conflict management in illicit drug cryptomarkets.
International Criminal Justice Review
.
https://doi.org/10.1177/1057567717709498
.
Morselli, C., & Roy, J. (2008). Brokerage qualifications in ringing operations*.
Criminology, 46
(1), 71–98.
https://doi.org/10.1111/j.1745-9125.2008.00103.x
.
Crossref
Morstatter, F., Pfeffer, J., Liu, H., & Carley. K. M. (2013). Is the sample good enough? Comparing data from Twitter’s streaming API with Twitter’s firehose. In
Seventh International AAAI Conference on Weblogs and Social Media
.
Moyle, L., Childs, A., Coomber, R., & Barratt, M. J. (2019). #Drugsforsale: An exploration of the use of social media and encrypted messaging apps to supply and access drugs.
International Journal of Drug Policy, 63,
101–110.
https://doi.org/10.1016/j.drugpo.2018.08.005
.
Crossref
Munksgaard, R., & Demant, J. (2016). Mixing politics and crime—The prevalence and decline of political discourse on the cryptomarket.
International Journal of Drug Policy, 35,
77–83.
https://doi.org/10.1016/j.drugpo.2016.04.021
.
Crossref
Munksgaard, R., Bakken, S., & Demant, J. (2017). Risk perception in emerging markets for illicit substances in Scandinavia-The effect of available information through online communities.
The Scandinavian Research Council for Criminology
.
Natanson, M. (1990). Anonymity: A study in the philosophy of Alfred Schutz.
Human Studies, 13
(1), 97–101.
National Centre for Cyber Security. (2017).
The cyber-threat to UK business
. London: NCSC.
Netherland, J., & Hansen, H. B. (2016). The war on drugs that wasn’t: Wasted whiteness, “dirty doctors”, and race in media coverage of prescription opioid misuse.
Culture, Medicine, and Psychiatry, 40
(4), 664–686.
Newmeyer, K. P. (2014).
Cybersecurity strategy in developing nations: A Jamaica case study
(PhD thesis). Walden University.
Noble, S. U. (2018).
Algorithms of oppression: How search engines reinforce racism
. New York: New York University Press.
Nugent, P. (2014). Modernity, tradition, and intoxication: Comparative lessons from South Africa and West Africa.
Past & Present, 222
(Suppl. 9), 126–145.
O’Brien, J. (2001). Putting a face to a (screen) name: The first amendment implications of compelling ISPs to reveal the identities of anonymous internet speakers in online defamation cases.
Fordham Law Review, 70
, 2745.
Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization.
UCLA Law Review, 57
, 1701–1777.
Orsolini, L., Papanti, G., Francesconi, G., & Professor Schifano, F. (2015). ‘Navigating in the virtual mind of the web’: The E-psychonauts’ profiling.
European Psychiatry, 30,
1045.
https://doi.org/10.1016/S0924-9338(15)30822-1
.
Crossref
Paquet-Clouston, M., Décary-Hétu, D., & Morselli, C. (2018). Assessing market competition and vendors’ size and scope on AlphaBay.
International Journal of Drug Policy, 54,
87–98.
Parkin, S. G. (2013).
Habitus and drug using environments: Health, place and lived-experience
. Farnham, Surrey, England: Ashgate.
https://www.dawsonera.com/abstract/9781409464938
.
Passas, N. (2003). Cross-border crime and the interface between legal and illegal Actors.
Security Journal, 16
(1), 19–37.
Pauly, B. (2008). Harm reduction through a social justice lens.
International Journal of Drug Policy, 19
(1), 4–10.
https://doi.org/10.1016/j.drugpo.2007.11.005
.
Crossref
Pearson, G., & Hobbs, D. (2003). King pin? A case study of a middle market drug broker.
The Howard Journal of Criminal Justice, 42
(4), 335–347.
Pennay, A. (2012). Carnal pleasures and grotesque bodies: Regulating the body during a ‘big night out’ of alcohol and party drug use.
Contemporary Drug Problems; London
,
39
(3), 397–428, 346.
Pfitzmann, A., & Hansen, M. (2010).
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management
.
Pfitzmann, A., & Köhntopp, M. (2001). Anonymity, unobservability, and pseudonymity—A proposal for terminology. In H. Federrath (Ed.),
Designing privacy enhancing technologies
(pp. 1–9). Berlin: Springer.
https://doi.org/10.1007/3-540-44702-4_1
.
Powell, A., & Henry, N. (2017).
Sexual violence in a digital age
. London: Springer.
Powell, A., Stratton, G., & Cameron, R. (2018).
Digital criminology: Crime and justice in digital society
.
https://doi.org/10.4324/9781315205786
.
Pratt, L. H. (1988).
Lying and poetry from Homer to Pindar: Falsehood and deception in archaic Greek poetics
. University of Michigan Press.
Qiang, X. (2019). The road to digital unfreedom: President Xi’s surveillance state.
Journal of Democracy, 30
(1), 53–67.
https://doi.org/10.1353/jod.2019.0004
.
Crossref
Raab, J., & Milward, H. B. (2003). Dark networks as problems.
Journal of Public Administration Research and Theory, 13
(4), 413–439.
Reader, B. (2012). Free press vs. free speech? The rhetoric of “civility” in regard to anonymous online comments.
Journalism & Mass Communication Quarterly, 89
(3), 495–513.
Read, M. (2018). How much of the internet is fake?
Intelligencer
. Retrieved 7 January 2019, from
http://nymag.com/intelligencer/2018/12/how-much-of-the-internet-isfake.html
.
Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Y. Altshuler, Y. Elovici, & B. A. Cremers, et al. (Eds.),
Security and privacy in social networks
(pp. 197–223). New York, NY: Springer New York.
Reuter, P. (1983).
Disorganized crime: The economics of the visible hand
. Cambridge and London: MIT Press.
Reuter, P., & Caulkins, J. P. (2004). Illegal ‘lemons’: Price dispersion in cocaine and heroin markets.
Bulletin on Narcotics, 56
(1–2), 141–165.
Reuter, P., & Haaga, J. (1989).
The organization of high-level drug markets: An exploratory study
. U.S. Department of Justice.
Reuter, P., & Kleiman, M. A. (1986). Risks and prices: An economic analysis of drug enforcement.
Crime and Justice, 7
, 289–340.
Rhodes, T. (1997). Risk theory in epidemic times: Sex, drugs and the social organisation of ‘risk behaviour’.
Sociology of Health and Illness, 19
(2), 208–227.
Rhumorbarbe, D., Staehli, L., Broséus, J., Rossy, Q., & Esseiva, P. (2016). Buying drugs on a darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data.
Forensic Science International, 267,
173–182.
Robbins, T. (1969). Eastern mysticism and the resocialization of drug users: The Meher Baba cult.
Journal for the Scientific Study of Religion, 8
, 308–317.
Robins, S. (2004). ‘Long live Zackie, long live’: AIDS activism, science and citizenship after apartheid.
Journal of Southern African Studies, 30,
651–672.
https://doi.org/10.1080/0305707042000254146
.
Crossref
Rodriguez, S., Fernandez, M., Cepedabenito, A., & Vila, J. (2005). Subjective and physiological reactivity to chocolate images in high and low chocolate cravers.
Biological Psychology, 70
(1), 9–18.
Rogaway, P. (2015). The moral character of cryptographic work.
IACR Cryptology ePrint Archive,
2015, 1162.
Ronen, S. (2010). Grinding on the dance floor.
Gender & Society, 24
(3), 355–377.
Rosenberg, C. E. (2002). The tyranny of diagnosis: Specific entities and individual experience.
The Milbank Quarterly, 80
(2), 237–260.
https://doi.org/10.1111/1468-0009.t01-1-00003
.
Crossref
Rossow, C., Andriesse, D., Werner, T., Stone-Gross, B., Plohmann, D., Dietrich, C. J., & Bos, H. (2013). SoK: P2PWNED—Modeling and evaluating the resilience of peer-to-peer botnets. In
2013 IEEE Symposium on Security and Privacy
(pp. 97–111).
https://doi.org/10.1109/SP.2013.17
.
Ruggiero, V., & South, N. (1997). The late-modern city as a bazaar: Drug markets, illegal enterprise and the ‘barricades’.
The British Journal of Sociology, 48
(1), 54.
https://doi.org/10.2307/591910
.
Crossref
Ruppert, E., Law, J., & Savage, M. (2013). Reassembling social science methods: The challenge of digital devices.
Theory, Culture & Society, 30
(4), 22–46.
https://doi.org/10.1177/0263276413484941
.
Crossref
Sadowski, J., & Pasquale, F. A. (2015).
The Spectrum of control: A social theory of the smart city
(SSRN Scholarly Paper No. ID 2653860). Retrieved from Social Science Research Network website:
https://papers.ssrn.com/abstract=2653860
.
Sandberg, S. (2013). Cannabis culture: A stable subculture in a changing world.
Criminology and Criminal Justice, 13
(1), 63–79.
https://doi.org/10.1177/1748895812445620
.
Crossref
Sandberg, S., & Copes, H. (2013). Speaking with ethnographers: The challenges of researching drug dealers and offenders.
Journal of Drug Issues, 43
(2), 176–197.
Schreier, F., & Caparini, M. (2005).
Privatising security: Law, practice and governance of private military and security companies
. Geneva: Centre for the Democratic Control Armed Forces. Accessed 27 August 2015,
http://www.dcaf.ch/content/download/34919/525055/version/1/file/op06_privatising-security.pdf
.
Schüll, N. D. (2012).
Addiction by design: Machine gambling in Las Vegas
. Princeton: Princeton University Press.
Scott, S. (2010). Revisiting the total institution: Performative regulation in the reinventive institution.
Sociology, 44
(2), 213–231.
Seddon, T. (2016). Inventing drugs: A genealogy of a regulatory concept.
Journal of Law and Society, 43
(3), 393–415.
https://doi.org/10.1111/j.1467-6478.2016.00760.x
.
Crossref
Shilling, C., & Mellor, P. A. (2014). For a sociology of deceit: Doubled identities, interested actions and situational logics of opportunity.
Sociology, 49
(4), 607–623.
Simmel, G. (1906). The sociology of secrecy and of secret societies.
The American Journal of Sociology, 11
(4), 441–498.
Smith, G. J. D., Bennett Moses, L., & Chan, J. (2017). The challenges of doing criminology in the big data era: Towards a digital and data-driven approach.
The British Journal of Criminology, 57
(2), 259–274.
https://doi.org/10.1093/bjc/azw096
.
Crossref
Soska, K., & Christin, N. (2015). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In
Proceedings of the 22nd USENIX Security Symposium
. Presented at the USENIX Security 2015, Washington, DC.
Sparrow, M. K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects.
Social Networks, 13
(3), 251–274.
Spitter, M., Klaver, F., & Koot. G., et al. (2015). Authorship Analysis on Dark Marketplace Forums. In
Proceedings of the IEEE European Intelligence & Security Informatics Conference (EISIC)
. Manchester.
Steinmetz, K. F. (2015). Craft(y)ness an ethnographic study of hacking.
The British Journal of Criminology, 55
(1), 125–145.
https://doi.org/10.1093/bjc/azu061
.
Crossref
Stevens, A. (2007). Survival of the ideas that fit: An evolutionary analogy for the use of evidence in policy.
Social Policy and Society, 6
(1), 25–35.
https://doi.org/10.1017/S1474746406003319
.
Crossref
Stevens, A. (2011).
Drugs, crime and public health: The political economy of drug policy
. Abingdon: Routledge.
Stokes, J. K. (2014). The indecent internet: Resisting unwarranted internet exceptionalism combating revenge porn cyberlaw.
Berkeley Technology Law Journal, 29,
929–954.
Strang, J., Griffiths, P., & Gossop, M. (1997). Heroin in the United Kingdom: Different forms, different origins, and the relationship to different routes of administration.
Drug and Alcohol Review, 16
(4), 329–337.
Stratton, G., Powell, A., & Cameron, R. (2017). Crime and justice in digital society: Towards a ‘digital criminology’?
International Journal for Crime, Justice and Social Democracy, 6
(2), 17–33.
https://doi.org/10.5204/ijcjsd.v6i2.355
.
Crossref
Szabo, N. (1997). Formalizing and securing relationships on public networks.
First Monday, 2
(9).
https://doi.org/10.5210/fm.v2i9.548
.
Taylor, A. (1993).
Women drug users: An ethnography of a female injecting community
. Oxford: Clarendon Press.
Thanki, D., & Frederick, B. J. (2016). Social media and drug markets. In
Internet and drug markets
(pp. 115–123). Luxembourg: Publications Office of the European Union.
The Economist
. (2014, November 1). The Amazons of the dark net: Business is thriving on the anonymous internet, despite the efforts of law enforcers.
The Economist
.
The Economist
. (2016, June 16). Shedding light on the dark web: The drug trade is moving from the street to online cryptomarkets. Forced to compete on price and quality, sellers are upping their game.
The Economist
.
Thomas, S. (2006). The end of cyberspace and other surprises.
Convergence, 12
(4), 383–391.
https://doi.org/10.1177/1354856506068316
.
Crossref
Thompson, E. P. (1975). The crime of anonymity. In D. Hay, P. Linebaugh, J. G. Rule, E. Thompson, & C. Winslow (Eds.),
Albion’s fatal tree: Crime and society in eighteenth-century England
(pp. 255–344). London: Allen Lane.
Tzanetakis, M., Kamphausen, G., Werse, B., & von Laufenberg, R. (2016). The transparency paradox: Building trust, resolving disputes and optimising logistics on conventional and online drugs markets.
International Journal of Drug Policy, 35,
58–68.
https://doi.org/10.1016/j.drugpo.2015.12.010
.
Crossref
U.N. Broadband Commission for Digital Development. (2015).
Cyber violence against women and girls: A world-wide wake-up call
. Geneva: Broadband Commission for Sustainable Development.
Valverde, M. (2014). Studying the governance of crime and security: Space, time and jurisdiction.
Criminology & Criminal Justice, 14
(4), 379–391.
https://doi.org/10.1177/1748895814541899
.
Crossref
Van Buskirk, J., Naicker, S., Bruno, R., Burns, L., Breen, C., & Roxburgh, A. (2016).
Drugs and the internet
. Sydney: National Drug and Alcohol Research Centre.
Van Buskirk, J., Bruno, R., Dobbins, T., Breen, C., Burns, L., Naicker, S., & Roxburgh, A. (2017). The recovery of online drug markets following law enforcement and other disruptions.
Drug and Alcohol Dependence, 173,
159–162.
Van Buskirk, J., Roxburgh, A., Farrell, M., & Burns, L. (2014). The closure of the Silk Road: What has this meant for online drug trading?
Addiction, 109
(4), 517–518.
van der Gouwe, D., Brunt, T. M., van Laar, M., & van der Pol, P. (2017). Purity, adulteration and price of drugs bought on-line versus off-line in the Netherlands.
Addiction, 112
(4), 640–648.
https://doi.org/10.1111/add.13720
.
Crossref
Van Hout, M. C., & Bingham, T. (2013a). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences.
International Journal of Drug Policy, 24
(5), 385–391.
Van Hout, M. C., & Bingham, T. (2013b). ‘Surfing the Silk Road’: A study of users’ experiences.
International Journal of Drug Policy, 24
(6), 524–529.
Van Hout, M. C., & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading.
International Journal of Drug Policy, 25
(2), 183–189.
https://doi.org/10.1016/j.drugpo.2013.10.009
.
Crossref
Van Hout, M. C., & Hearne, E. (2017). New psychoactive substances (NPS) on cryptomarket fora: An exploratory study of characteristics of forum activity between NPS buyers and vendors.
International Journal of Drug Policy, 40
, 102–110.
Wang, X., & Gu, B. (2016). The communication design of WeChat: Ideological as well as technical aspects of social media.
Communication Design Quarterly Review, 4
(1), 23–35.
https://doi.org/10.1145/2875501.2875503
.
Crossref
Watters, P. A., & Phair, N. (2012). Detecting illicit drugs on social media using automated social media intelligence analysis (ASMIA). In Y. Xiang, J. Lopez, & C.-C. J, Kuo, et al. (Eds.),
Cyberspace safety and security
(pp. 66–76). Accessed 27 July 2015,
http://link.springer.com/chapter/10.1007/978-3-642-35362-8_7
. Berlin, Heidelberg: Springer.
Wendel, T., & Curtis, R. (2000). The heraldry of heroin: “Dope stamps” and the dynamics of drug markets in New York City.
Journal of Drug Issues, 30
(2), 225–259.
https://doi.org/10.1177/002204260003000201
.
Crossref
Williams, M. L., Burnap, P., & Sloan, L. (2017). Towards an ethical framework for publishing Twitter data in social research: Taking into account users’ views.
Online Context and Algorithmic Estimation, Sociology, 51
(6), 1149–1168.
https://doi.org/10.1177/0038038517708140
.
Crossref
Winstock, A., Barratt, M. J., Maier, L. J., & Ferris, J. A. (2018).
Global drug survey 2018: Key findings report
. London: Global Drug Survey.
Winter, H. (2008).
The economics of crime: An introduction to rational crime analysis
. London: Routledge.
Wirth, L. (1938). Urbanism as a way of life.
American Journal of Sociology, 44
(1), 1–24.
Yang, X., & Luo, J. (2017). Tracking illicit drug dealing and abuse on Instagram using multimodal analysis.
ACM Transactions on Intelligent Systems and Technology, 8
(4), 1–58, 15.
https://doi.org/10.1145/3011871
.
Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory.
European Journal of Criminology, 2
(4), 407–427.
https://doi.org/10.1177/147737080556056
.
Crossref
Yip, M., Shadbolt, N., & Webber, C. (2012). Structural analysis of online criminal social networks. In
ISI 2012: IEEE International Conference on Intelligence and Security Informatics
(pp. 60–65). IEEE.
Yip, M., Webber, C., & Shadbolt, N. (2013). Trust among cybercriminals? Carding forums, uncertainty and implications for policing.
Policing and Society, 23,
516–539.
https://doi.org/10.1080/10439463.2013.780227
.
Crossref
Zabyelina, Y. G. (2016). Can criminals create opportunities for crime? Malvertising and illegal online medicine trade.
Global Crime
, 1–18.
https://doi.org/10.1080/17440572.2016.1197124
.
Zinberg, N. (1986).
Drug, set, and setting: The basis for controlled intoxicant use
. New Haven, CT: Yale University Press.
Zwick, A. (2018). Welcome to the Gig Economy: Neoliberal industrial relations and the case of Uber.
GeoJournal, 83
(4), 679–691.