Botnets

Actualités Publications

New publication: « Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime »

B. Dupont, (2016), Bots, cops and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime, Crime, Law and Social Change, doi:10.1007/s10611-016-9649-z. Abstract: Botnets currently pose the most serious threat to the digital ecosystem, providing an infrastructure that enables bank fraud, distributed denial of service attacks (DDoS), and click […] Lire la suite

Articles

Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime

Botnets currently pose the most serious threat to the digital ecosystem, providing an infrastructure that enables bank fraud, distributed denial of service attacks (DDoS), and click fraud. During the past few years, three main approaches have been used to fight botnets. First, police organizations have periodically arrested prominent hackers and scammers, hoping such high-profile operations […] Lire la suite

Articles

The ecology of trust among hackers

Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a community of hackers uses an automated reputation system to enhance trust among its members. We analyse 449,478 feedbacks collected over 27 months that rate the trustworthiness […] Lire la suite

Actualités Publications

Vient de paraître: « The ecology of trust among hackers »

B. Dupont, A.-M. Côté, C. Savine et D. Décary-Hétu (2016), « The ecology of trust among hackers« , Global Crime, DOI: 10.1080/17440572.2016.1157480. Résumé: Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a community of hackers uses an automated reputation system […] Lire la suite