The Drug Trafficking Inserted in Cyber Space – How Social Networks, Virtual Currencies, Big Data and Software Applications Influence It – An Analysis of the United Nations Organization Members
DOI:
https://doi.org/10.19135/revista.consinter.00001.27Palabras clave:
Cybercrime, Narcotráfico, Big DataResumen
Com o avanço da tecnologia, as gerações y e z estão cada vez mais cedo envolvidas no mundo virtual, onde há ótimas informações a serem extraídas quando sabe-se os caminhos certos para buscá-las, no entanto, a criminalidade está dissipando-se na mesma velocidade do avanço tecnológico.
A UNODC[3] age em cooperação com o Grupo Pompidou – Grupo de Cooperação para Combater o Abuso e o Tráfico Ilícito de Drogas do Conselho da Europa. O programa de trabalho 2015/2018 inclui a identificação de oportunidades e desafios para as políticas de drogas provenientes da internet.
A legislação penal de diversos países vem alterando-se a fim de tipificar especificamente os cybercrimes, ou tais atos são penalizados por analogia.
Descargas
Citas
ADORJAN, Michael: Drugs on the dark net: how cryptomarkets are transforming the global trade in illicit drugs, by James Martin, Palgrave MacMillan, 2014, 96 pp., $55.90 (hard cover), $38.00 Kindle edition. British Journal of Criminology, v. 55, n. 4, p. 835-836, 2015. DOI: https://doi.org/10.1093/bjc/azv013
ALHOGBANI, A. Going Dark: Scratching the Surface of Government Surveillance. CommLaw Conspectus: Journal of Communications Law and Technology Policy, v. 23, n. 2, p. 469-501, 2015.
ALI, S. T.; CLARKE, D.; MCCORRY, P. Bitcoin: Perils of an Unregulated Global P2P Currency, 2015. DOI: https://doi.org/10.1007/978-3-319-26096-9_29
BARRATT, M. J. Silk Road: eBay for drugs. Addiction, v. 107, n. 3, p. 683-683, 2012. DOI: https://doi.org/10.1111/j.1360-0443.2011.03709.x
BARRATT, M. J.; FERRIS, J. A.; WINSTOCK, A. R. Use of Silk Road, the online drug marketplace, in the United Kingdom, Australia and the United States. Addiction, v. 109, n. 5, p. 774-783, 2014. DOI: https://doi.org/10.1111/add.12470
BAUER, M. W.; GASKELL, G. Pesquisa qualitativa com texto, imagem e som: um manual prático. Petrópolis: Vozes, 2002.
BERGMAN, M. K. White paper: the deep web: surfacing hidden value. Journal of electronic publishing, v. 7, n. 1, 2001. DOI: https://doi.org/10.3998/3336451.0007.104
BLOOM, C. Silk Road-Anonymous Deep Web Marketplace, 2013.
BRADBURY, D. The problem with Bitcoin. Computer Fraud & Security, n. 11, p. 5-8, 2013. DOI: https://doi.org/10.1016/S1361-3723(13)70101-5
BUXTON, J.; BINGHAM, T. The Rise and Challenge of Dark Net Drug Markets, 2015.
CHEUNG, K. H.; PRUD’HOMMEAUX, E.; WANG, Y.; STEPHENS, S. Semantic Web for Health Care and Life Sciences: a review of the state of the art. Briefings in bioinformatics, v. 10, n. 2, p. 111-113, 2009. DOI: https://doi.org/10.1093/bib/bbp015
CHRISTIN, N. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. Proceedings of the 22nd international conference on World Wide Web. International World Wide Web Conferences Steering Committee, May 2013. p. 213-224. DOI: https://doi.org/10.1145/2488388.2488408
CRUZ, José. Jurisdições de Sigilo: A Verdadeira Identidade dos Paraísos Fiscais, o que Mudou? Revista Portuguesa de Contabilidade, v. II, n. 8, p. 473-500, 2012.
CRUZ, José N.; CARDOSO, Carla S.; LEITE, André L.; FARIA, Rita. Infrações Económicas e Financeiras: Estudos de Criminologia e Direito. Coimbra: Coimbra, 2013.
DAVID O. Friedrichs. – Trusted Criminals: White Collar Crime in Contemporary Society, 4th edition, Wadsworth, USA, 2010.
Drug related cybercrime and associated use of the Internet. Overview, analysis and possible actions by the Pompidou Group. Disponível em <http://www.coe.int>. Acesso em: 20 jun. 2015.
GERHART, S. Do Web search engines suppress controversy? First Monday, v. 9, n. 1, 2004. DOI: https://doi.org/10.5210/fm.v9i1.1111
GUEDES, Inês; CRUZ, José N. Personalidade e Crimes de Colarinho Branco. Revista de Reinserção Social e Prova: Ousar Integrar, v. 10, p. 47-60, 2011.
HE, B.; PATEL, M.; ZHANG, Z.; CHANG, K. C. C. Accessing the deep web. Communications of the ACM, v. 50, n. 5, p. 94-101, 2007. DOI: https://doi.org/10.1145/1230819.1241670
HE, H.; MENG, W.; YU, C.; WU, Z. Wise-integrator: A system for extracting and integrating complex web search interfaces of the deep web. In: Proceedings of the 31st international conference on Very large data bases. VLDB Endowment, August 2005, p. 1.314-1.317.
HOUT, Marie Claire Van. Drugs on the dark net: how cryptomarkets are transforming the global trade in illicit drugs, by James Martin, New York, Palgrave, 2015.
MACMILLAN, £45.00 (hardback), Global Crime, 2014, 102 p.
KANE, A. M. A revocable anonymity in Tor, 2015.
KNUTTILA, L. User unknown: 4chan, anonymity and contingency. First Monday, v. 16, n. 10, 2011. DOI: https://doi.org/10.5210/fm.v16i10.3665
LIU, W.; MENG, X.; MENG, W. Vide: A vision-based approach for deep web data extraction. Knowledge and Data Engineering, IEEE Transactions on, v. 22, n. 3, p. 447-460, 2010. DOI: https://doi.org/10.1109/TKDE.2009.109
LOMBROSO, Cesare. (1897). Presentazione di Armando Torno. L’uomo delinquente. 5. ed. Milano: Bompiani, 1953.
LU, Y., HE, H., ZHAO, H., MENG, W., & YU, C. (2007, April). Annotating structured data of the deep Web. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on (pp. 376-385). IEEE. DOI: https://doi.org/10.1109/ICDE.2007.367883
MADHAVAN, J.; AFANASIEV, L.; ANTOVA, L.; HALEVY, A. Harnessing the deep web: Present and future. arXiv preprint arXiv:0909.1785, 2009.
MADHAVAN, J.; KO, D.; KOT, L.; GANAPATHY, V.; RASMUSSEN, A.; HALEVY, A. Google’s deep web crawl. Proceedings of the VLDB Endowment, v. 1, n. 2, p. 1.241-1.252, 2008. DOI: https://doi.org/10.14778/1454159.1454163
MARTIN, J. (). Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’. Criminology and Criminal Justice, v. 14, n. 3, p. 351-367, 2014. DOI: https://doi.org/10.1177/1748895813505234
MOORE, T. The promise and perils of digital currencies. International Journal of Critical Infrastructure Protection, v. 6, n. 3, p. 147-149, 2013. DOI: https://doi.org/10.1016/j.ijcip.2013.08.002
NUNES, Emily Canto. ‘Tudo sobre todos’: site vende dados pessoais e mostra até endereço no mapa, 2015. Disponível em: <http://tecnologia.ig.com.br>. Acesso em: 25 jul. 2015.
PHELPS, A.; WATT, A. I shop online-recreationally! Internet anonymity and Silk Road enabling drug use in Australia. Digital Investigation, v. 11, n. 4, p. 261-272, 2014. DOI: https://doi.org/10.1016/j.diin.2014.08.001
Pompidou Group Work Programme 2015-2018. Drug policy and human rights: new trends in a globalised context. Disponível em <http://www.coe.int>. Acesso em: 20 jun. 2015.
RAEESI, R. The Silk Road, Bitcoins and the Global Prohibition Regime on the International Trade in Illicit Drugs: Can this Storm Be Weathered?. Glendon Journal of International Studies/Revue d’études internationales de Glendon, v. 8, n. 2, 2015.
SANTI, Alexandre de. ().O lado negro do Facebook. Superinteressante. São Paulo: Abril. Edição 348, p. 30-34, 2015.
SINGH, Pramod Kr. Laws on Cyber Crimes. Book Enclave. Jaipur, Índia, 2007.
STEFANSKI, R. Social Order and Network Security. Exploratory Research on TOR Hidden Network.
STRAUSS, Anselm L. Qualitative Analysis. For Social Scientists. Austrália: Cambridge University Press, 1994.
VAN HOUT, M. C.; BINGHAM, T. ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24(5), 385-391. 2013 DOI: https://doi.org/10.1016/j.drugpo.2013.01.005
_____; _____. ‘Surfing the Silk Road’: A study of users’ experiences. International Journal of Drug Policy, v. 24, n. 6, p. 524-529, 2013. DOI: https://doi.org/10.1016/j.drugpo.2013.08.011
_____; _____. Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, v. 25, n. 2, p. 183-189, 2014. DOI: https://doi.org/10.1016/j.drugpo.2013.10.009
VANDERVALK, B. P.; MCCARTHY, E. L.; WILKINSON, M. D. Moby and Moby 2: creatures of the deep (web). Briefings in bioinformatics, v. 10, n. 2, p. 114-128, 2009. DOI: https://doi.org/10.1093/bib/bbn051
VEERASAMY, N. Motivation for cyberterrorism, 2010.
WU, W.; DOAN, A.; YU, C. Webiq: Learning from the web to match deep-web query interfaces. In: Data Engineering, 2006. ICDE’06. Proceedings of the 22nd International Conference on. IEEE, April 2006. p. 44-44.
WU, W.; YU, C.; DOAN, A.; MENG, W. An interactive clustering-based approach to integrating source query interfaces on the deep web. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, June 2004. p. 95-106. DOI: https://doi.org/10.1145/1007568.1007582
Descargas
Publicado
Cómo citar
Número
Sección
Licencia
Derechos de autor 2015 Guilherme Augusto Souza Godoy, Jardel de Freitas Soares
Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.
Para fines de universalización y compartimento libre de los saberes la Revista del CONSINTER está indexada bajo la Licencia Creativa Comámonos 4.0.
Atribución – Uso No Comercial – Compartimiento por la misma licencia 4.0 Brasil.
Se permite:
- Copiar, distribuir, exhibir y ejecutar la obra.
- Crear obras derivadas.
Bajo las siguientes condiciones:
ATRIBUCIÓN
Debe dar crédito al autor original, de la forma especificada por el autor o el licenciante.
USO NO COMERCIAL
Esta obra no podrá ser utilizada con fines comerciales.
COMPARTIR POR LA MISMA LICENCIA
Si altera, transforma o crea otra obra con base en esta, solamente podrá distribuir la obra resultante bajo una licencia idéntica a la original.
Para cada nuevo uso o distribución, debe dejarle claro al otro, los términos de la licencia de esta obra.
Licencia Jurídica (licencia integral): https://creativecommons.org/licenses/by-nc-sa/4.0/deed.pt_BR