Ceci et al., 2025 - Google Patents
Gatekeeping in Online Markets: An Empirical Investigation of IT-based Self-regulation in Online Black MarketsCeci et al., 2025
- Document ID
- 17525628788920625965
- Author
- Ceci F
- Spagnoletti P
- Prencipe A
- Publication year
- Publication venue
- International Journal of Electronic Commerce
External Links
Snippet
This study examines how IT-based gatekeeping mechanisms influence platform survival in Online Black Markets (OBMs), anonymous, self-regulated marketplaces where buyers and vendors exchange illegal goods in absence of formal rules and regulatory bodies. In these …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Garriga et al. | Blockchain and cryptocurrencies: A classification and comparison of architecture drivers | |
| Yousafzai et al. | A proposed model of e-trust for electronic banking | |
| US20140344015A1 (en) | Systems and methods enabling consumers to control and monetize their personal data | |
| CA3003084A1 (en) | Intelligent personal information management system | |
| Schou et al. | Information Assurance Handbook | |
| Ducrée et al. | Blockchain for organizing effective grass-roots actions on a global commons: saving the planet | |
| Cook | Effective cyber security strategies for small businesses | |
| Vagadia | Data integrity, control and tokenization | |
| Coss et al. | Cloud privacy objectives a value based approach | |
| Murimi et al. | Blockchains: A review and research agenda for international business | |
| Pathan et al. | Building customer trust in cloud computing with an ICT-enabled global regulatory body | |
| Kuan et al. | Governance strategy for digital platforms: Differentiation through information privacy | |
| Schreiber et al. | AI for cyber-security risk: harnessing AI for automatic generation of company-specific cybersecurity risk profiles | |
| Pham et al. | Information security risks and sharing behavior on OSN: the impact of data collection awareness | |
| Lipford et al. | Someone to watch over me | |
| Opala | An analysis of security, cost-effectiveness, and it compliance factors influencing cloud adoption by it managers | |
| Hydros et al. | Digital transformation, leadership, and markets | |
| Sagay et al. | Consumer awareness on security and privacy threat of medical devices | |
| Williams | Privacy management, the law & business strategies: A case for privacy driven design | |
| Ceci et al. | Gatekeeping in Online Markets: An Empirical Investigation of IT-based Self-regulation in Online Black Markets | |
| Rübsamen et al. | Evidence for accountable cloud computing services | |
| Bhatta | A case study on hybrid cloud approach to automate the cloud services based on decision support system | |
| Peake | Accepting the Cloud: A Quantitative Predictive Analysis of Cloud Trust and Acceptance Among IT Security Professionals | |
| Lopez | The Road to the Rules: The Sec Mandates Cybersecurity Disclosures | |
| Hanson et al. | Distributed Ledgers |