ул. М. Горького, 88, к. 211
г.Ростов-на-Дону, Россия
+7 (863) 250-59-54

Критика теории цифровой теневой экономики: обзор литературы и новые основы

TERRA ECONOMICUS, , Том 14 (номер 4),

Цель статьи – дополнение теории традиционной теневой экономики определением, представлениями об особенностях и каналах цифровой теневой экономики. Цифровая теневая экономика – действительно новое проблемное поле, рассматриваемое как очень молодое ответвление традиционной теневой экономики. Согласно результатам национального научного проекта «Цифровая теневая экономика», разработано определение цифровой теневой экономики, а также обозначены отличительные особенности и основные каналы цифровой теневой экономики. Кроме того, выявлено отношение потребителей к феномену цифровой теневой экономики и потребительские мотивы покупать товары и услуги на цифровых теневых рынках.

Ключевые слова: цифровая теневая экономика; понятие и особенности цифровой теневой экономики; теории цифровой теневой экономики

Список литературы:
  • Allabouche K., Diouri O., Gaga A. and El Amrani El Idrissi N. (2016). Mobile phones‘ social impacts on sustainable human development: case studies, Morocco and Italy // Entrepreneurship and Sustainability Issues, no. 4(1), pp. 64–73.
  • Amasiatu C.V. and Shah M.H. (2014). First party fraud: A review of the forms and motives of fraudulent consumer behaviours in e-tailing // International Journal of Retail & Distribution Management, no. 42(9), pp. 805–17.
  • Arli D., Tjiptono F. and Porto R. (2015). The impact of moral equity, relativism and attitude on individuals’ digital piracy behaviour in a developing country // Marketing Intelligence & Planning, no. 33(3), pp. 348–365.
  • Astrauskaitė I. and Paškevičius A. (2016). Assessing the optimal taxation of the capital income: a case of corporate bond market // Journal of Security and Sustainability Issues, no. 5(4), pp. 519–532.
  • Belás J., Korauš M., Kombo F. and Korauš A. (2016). Electronic banking security and customer satisfaction and in commercial banks //Journal of Security and Sustainability Issues, no. 5(3), pp. 411–422.
  • Bossler A.M. and Holt T.J. (2012). Patrol officers‘ perceived role in responding to cybercrime, Policing An International Journal of Police Strategies & Management, no. 35(1), pp. 165–181.
  • Business Software Alliance (2009). Software piracy on the internet: A threat to your security (A report) (http://global.bsa.org/internetreport2009/2009internetpiracyreport.pdf).
  • Camarero C., Anton C. and Rodriguez J. (2014). Technological and ethical antecedents of e-book piracy and price acceptance: Evidence from the Spanish case // The Electronic Library, no. 32(4), pp. 542–566.
  • Castro D., Bennett R. and Andes S. (2009). Steal these policies: Strategies for reducing digital piracy. The Information Technology & Innovation Foundation, 12 (www.itif.org/files/2009-12-15.DigitalPiracy.pdf).
  • CIFAS (2012). Fraudscape: depicting the UK’s fraud landscape (Research and Reports) (https://www.cifas.org.uk/secure/contentPORT/uploads/documents/Cifas%20Reports/External-Fraudscape_2013_Cifas.pdf).
  • Cronan T.P. and Al-Rafee S. (2008). Factors that influence the intention to pirate software and media // Journal of Business Ethics, no. 78(4), pp. 527–545.
  • Cybersource Corporation (2012). 13th annual online fraud report (www.jpmorgan.com/cm/BlobServer/13th_Annual_2012_Online_Fraud_Report.pdf?blobkey¼id&blobwhere¼1320571432216&blobheader¼application/pdf&blobheadername1¼Cache-Control&blobheadervalue1¼private&blobcol¼urldata&blobtable¼MungoBlobs).
  • Delina R. and Tkač M. (2015). Role of e-business in the perception of ICT impact on revenue growth // Journal of Business Economics and Management, no. 16(6), pp. 1140–1153.
  • Dittrich D. (2009). Malware to crimeware: how far have they gone, and how do we catch up? // Login, no. 34(4), pp. 35–44.
  • Dion M. (2011). Corruption, fraud and cybercrime as dehumanizing phenomena // International Journal of Social Economics, no. 38(5), pp. 466–476.
  • Dobrovič J., Korauš A. and Dančišinová L. (2016). Sustainable economic development of Slovakia: factors determining optimal tax collection // Journal of Security and Sustainability Issues, no. 5(4), pp. 533–544.
  • Dobson S., Sukumar A. and Tipi L. (2015). Dark Matters: The Institutional Entrepreneurship of Illicit and Illegal Cyberspace / In: Mcelwee G. and Smith R. (eds.) // Exploring Criminal and Illegal Enterprise: New Perspectives on Research, Policy & Practice (Contemporary Issues in Entrepreneurship Research), no. 5, pp. 179–201.
  • Europol (2011). Cybercrime as a business: The digital underground economy (Press Releases) (https://www.europol.europa.eu/content/press/cybercrime-business-digitalunderground-economy-517).
  • Fair Isaak Corporation (2008). Reducing bad debt levels by addressing first party fraud and credit abuse (white paper) (http://brblog.typepad.com/files/first_party_fraud_2486wp_en.pdf).
  • Ferreira N.C.M.Q., Ferreira F.A.F., Marques C.S.E., Perez-Bustamante Ilander G.O. and Cipi A. (2015). Challenges in the implementation of public electronic services: Leassons from a regional-based study, Journal of Business Economics and Management, no. 16(5), pp. 962–979 (http://dx.doi.org/10.3846/16111699.2014.920718).
  • Fuschi D. and Tvaronavičienė M. (2014). Sustainable development, Big Data and supervisory control: service quality in banking sector // Journal of Security and Sustainability, issue 3(3), pp. 5–14.
  • Gaspareniene L. and Remeikiene R. (2015). Digital Shadow Economy: a Critical Review of the Literature // Mediterranean Journal of Social Sciences, vol. 6, no. 6, S5: 402–409.
  • Gasparėnienė L. and Remeikienė R. (2016). Shadow economy estimation methods: Digital shadow economy assessment aspect // 9th International Scientific Conference “Business and Management 2016” Vilnius, Lithuania (http://dx.doi.org/10.3846/bm.2016.34).
  • Government Accounting Office (2007). Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats [online] [cited 10 October 2015]. United States Government Accountability Office Report to Congressional Requesters (www.gao.gov/new.items/d07705.pdf).
  • Greek D. (2010). Who is responsible when goods go missing in transit? (www.computeractive.co.uk/ca/consumerrights/1931458/missing-transit).
  • Hafezieh N., Akhavan P. and Eshraghian F. (2011). Exploration of process and competitive factors of entrepreneurship in digital space: a multiple case study in Iran, Education, Business and Society // Contemporary Middle Eastern Issues, no. 4(4), pp. 267–279.
  • Haines J. and Johnstone P. (1999). Global cybercrime: new toys for the money launderers // Journal of Money Laundering Control, no. 2(4), pp. 317–325.
  • Herley C. and Florencio D. (2010). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy // Economics of Information Security and Privacy, 10 (http://link.springer.com/chapter/10.1007%2F978-1-4419-6967-5_3#page-1).
  • Hjort K. and Lantz B. (2012). (R)e-tail borrowing of party dresses: An experimental study // International Journal of Retail & Distribution Management, no. 40(12), pp. 997–1012.
  • Ho J. and Weinberg C.B. (2011). Segmenting consumers of pirated movies // Journal of Consumer Marketing, no. 28(4), pp. 252–260.
  • Holt T.J. and Lampke E. (2010). Exploring stolen data markets online: Products and market forces // Criminal Justice Studies, no. 23(1), pp. 33–50.
  • Holz T., Engelberth M. and Freiling F. (2012). Learning more about the underground economy: A case-study of keyloggers and dropzones // ESORICS Proceedings, no. 9, pp. 1–18.
  • Jacobs L., Samli A.C. and Jedlik T. (2001). The nightmare of international product piracy // Industrial Marketing Management, no. 30(6), pp. 499–509.
  • International Federation of the Phonographic Industry (2009). New business models for a changing environment (Digital music report) (www.ifpi.org/content/ section_ resources/dmr2009.html).
  • Kalyugina S., Strielkowski W., Ushvitsky L. and Astachova E. (2015). Sustainable and secure development: facet of personal financial issues // Journal of Security and Sustainability Issues, no. 5(2), pp. 297–304 (http://dx.doi.org/10.9770/jssi.2015.5.2(14)).
  • Lavrinenko O., Ohotina A., Tumalavičius V. and Pidlisna O.V. (2016). Assessment of partnership development in cross-border regions’ innovation systems (Latvia-LithuaniaBelarus) // Journal of Security and Sustainability Issues, no. 6(1), pp. 155–166 (http://dx.doi.org/10.9770/jssi.2016.6.1(12)).
  • Levi M. and Williams M.L. (2013). Multi-agency partnerships in cybercrime reduction // Information Management & Computer Security, no. 21(5), pp. 420-443
  • Mello J.P. (2013). Cybercrime fueled by mature digital underground (Identity & Access) (http://www.csoonline.com/article/2133649/identity-access/cybercrime-fueled-bymature-digital-underground.html).
  • Moore T., Clayton R. and Anderson R. (2009). The economics of online crime // Journal of Economic Perspectives, no. 23(3), pp. 3–20.
  • Pauceanu A.M. (2016). Innovation and entrepreneurship in Sultanate of 0man – an empirical study // Entrepreneurship and Sustainability Issues, no. 4(1), pp. 83–99 (http://dx.doi.org/10.9770/jesi.2016.4.1(8)).
  • Poulsen K. (2011). Kingpin: How one hacker took over the billion-dollar cybercrime underground. New York: Crown Publishing.
  • Provos N., Rajab M.A. and Mavrommatis P. (2009). Cybercrime 2.0: when the cloud turns dark // Commun ACM, no. 52(4), pp. 42–7.
  • Rezk M.A., Ibrahim H.H., Radwan A., Sakr M.M., Tvaronavičienė M. and Piccinetti L. (2016). Innovation magnitude of manufacturing industry in Egypt with particular focus on SMEs // Entrepreneurship and Sustainability Issues, no. 3(4), pp. 306–318 (http://dx.doi.org/10.9770/jesi.2016.3.4(1)).
  • Samašonok K., Išoraitė M. and Leškienė-Hussey B. (2016). The internet entrepreneurship: opportunities and problems // Entrepreneurship and Sustainability Issues, no. 3(4), pp. 329–349.
  • Sirkeci I. and Magnusdottir L.B. (2011). Understanding illegal music downloading in the UK: A multi attribute model // Journal of Research in Interactive Marketing, no. 5(1), pp. 90–110.
  • Smith G.S. (2015). Management models for international cybercrime // Journal of Financial Crime, no. 22(1), pp. 104–125.
  • Taylor S.A. (2012). Evaluating digital piracy intentions on behaviors // Journal of Services Marketing, no. 26(7), pp. 472–483.
  • Thomas R. and Martin J. (2006). The underground economy: Priceless // The USENIX Magazine, no. 31(6), pp. 7–16.
  • Teivāns-Treinovskis J. and Amosova J. (2016). Some aspects of criminal environment impact on sustainable entrepreneurship activities // Entrepreneurship and Sustainability Issues, no. 4(1), pp. 17–27.
  • Tvaronavičienė M. (2016). Start-ups across the EU: if particular tendencies could be trace // Entrepreneurship and Sustainability Issues, no. 3(3), pp. 290–298.
  • Vida I., Koklic M.K., Kukar-Kinney M. and Penz E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences // Journal of Research in Interactive Marketing, no. 6(4), pp. 298–313.
  • Vlachos V., Minou M., Assimakopouos V. and Toska A. (2011). The landscape of cybercrime in Greece // Information Management & Computer Security, no. 19(2), pp. 113–123.
  • Williams P., Nicholas D. and Rowlands I. (2010). The attitudes and behaviours of illegal downloaders // Aslib Proceedings, no. 62(3), pp. 283–301.
  • Yip M., Shadbolt N., Tiropanis N. and Webber C. (2012). The digital underground economy: A social network approach to understanding cybercrime. In Digital Futures 2012: The Third Annual Digital Economy All Hands Conference (2012) (http://eprints.soton.ac.uk/343351/1/yip_de2012_submission.pdf).
  • Yu C.P., Young M.L. and Ju B.C. (2015). Consumer software piracy in virtual communities: An integrative model of heroism and social exchange // Internet Research, no. 25(2), pp. 317–334.
  • Zorz M. (2015). Global black markets and the underground economy (Featured News) (http://www.netsecurity.org/article.php?id=2288).
Издатель: Южный Федеральный Университет
Учредитель: Южный федеральный университет
ISSN: 2073-6606