Cryptomarkets

Cryptomarkets
Author: James Martin
Publisher: Emerald Group Publishing
Total Pages: 143
Release: 2019-10-25
Genre: Social Science
ISBN: 1838670327

Download Cryptomarkets Book in PDF, Epub and Kindle

Since the launch of the infamous Silk Road the use of cryptomarkets - illicit markets for drugs on the dark web - has expanded rapidly around the world. Cryptomarkets: A Research Companion is a detailed guidebook which offers the tools necessary to begin researching cryptomarket phenomena and the dark web trade in illicit drugs.


Cryptomarkets
Language: en
Pages: 143
Authors: James Martin
Categories: Social Science
Type: BOOK - Published: 2019-10-25 - Publisher: Emerald Group Publishing

GET EBOOK

Since the launch of the infamous Silk Road the use of cryptomarkets - illicit markets for drugs on the dark web - has expanded rapidly around the world. Cryptom
Law Enforcement Strategies for Disrupting Cryptomarkets
Language: en
Pages: 188
Authors: Vincent Harinam
Categories:
Type: BOOK - Published: - Publisher: Springer Nature

GET EBOOK

Drugs on the Dark Net
Language: en
Pages: 151
Authors: J. Martin
Categories: Social Science
Type: BOOK - Published: 2014-08-07 - Publisher: Springer

GET EBOOK

This study explores the rapidly expanding world of online illicit drug trading. Since the fall of the infamous Silk Road, a new generation of cryptomarkets can
Digital Transformations of Illicit Drug Markets
Language: en
Pages: 198
Authors: Meropi Tzanetakis
Categories: Social Science
Type: BOOK - Published: 2023-08-16 - Publisher: Emerald Group Publishing

GET EBOOK

The ebook edition of this title is Open Access and freely available to read online. The digital revolution has transformed the selling and buying of illicit sub
The Human Factor of Cybercrime
Language: en
Pages: 394
Authors: Rutger Leukfeldt
Categories: Computers
Type: BOOK - Published: 2019-10-11 - Publisher: Routledge

GET EBOOK

Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However,