SFeDu
  • Home
  • Issues
  • 2016
  • No 4
  • Critical attitude towards the theory of digital shadow economy: literature review and new foundations

Critical attitude towards the theory of digital shadow economy: literature review and new foundations

TERRA ECONOMICUS, , Vol. 14 (no. 4),

This article is aimed at the complement of the theory of traditional shadow economy with the definition, features and channels of digital shadow economy. The issue of digital shadow economy is indeed new and, considering it as a branch of traditional shadow economy, very young. According to the results of the national scientific project “Digital Shadow Economy” the definition of digital shadow economy has been developed; the distinctive features and the main channels of digital shadow economy have been identified. The position of consumers’ towards the phenomenon of digital shadow economy and consumers’ motives to buy products/services in digital shadow markets has been found out as well.


Keywords: digital shadow economy, concept and features of digital shadow economy, theory of digital shadow economy

References:
  • Allabouche K., Diouri O., Gaga A. and El Amrani El Idrissi N. (2016). Mobile phones‘ social impacts on sustainable human development: case studies, Morocco and Italy // Entrepreneurship and Sustainability Issues, no. 4(1), pp. 64–73.
  • Amasiatu C.V. and Shah M.H. (2014). First party fraud: A review of the forms and motives of fraudulent consumer behaviours in e-tailing // International Journal of Retail & Distribution Management, no. 42(9), pp. 805–17.
  • Arli D., Tjiptono F. and Porto R. (2015). The impact of moral equity, relativism and attitude on individuals’ digital piracy behaviour in a developing country // Marketing Intelligence & Planning, no. 33(3), pp. 348–365.
  • Astrauskaitė I. and Paškevičius A. (2016). Assessing the optimal taxation of the capital income: a case of corporate bond market // Journal of Security and Sustainability Issues, no. 5(4), pp. 519–532.
  • Belás J., Korauš M., Kombo F. and Korauš A. (2016). Electronic banking security and customer satisfaction and in commercial banks //Journal of Security and Sustainability Issues, no. 5(3), pp. 411–422.
  • Bossler A.M. and Holt T.J. (2012). Patrol officers‘ perceived role in responding to cybercrime, Policing An International Journal of Police Strategies & Management, no. 35(1), pp. 165–181.
  • Business Software Alliance (2009). Software piracy on the internet: A threat to your security (A report) (http://global.bsa.org/internetreport2009/2009internetpiracyreport.pdf).
  • Camarero C., Anton C. and Rodriguez J. (2014). Technological and ethical antecedents of e-book piracy and price acceptance: Evidence from the Spanish case // The Electronic Library, no. 32(4), pp. 542–566.
  • Castro D., Bennett R. and Andes S. (2009). Steal these policies: Strategies for reducing digital piracy. The Information Technology & Innovation Foundation, 12 (www.itif.org/files/2009-12-15.DigitalPiracy.pdf).
  • CIFAS (2012). Fraudscape: depicting the UK’s fraud landscape (Research and Reports) (https://www.cifas.org.uk/secure/contentPORT/uploads/documents/Cifas%20Reports/External-Fraudscape_2013_Cifas.pdf).
  • Cronan T.P. and Al-Rafee S. (2008). Factors that influence the intention to pirate software and media // Journal of Business Ethics, no. 78(4), pp. 527–545.
  • Cybersource Corporation (2012). 13th annual online fraud report (www.jpmorgan.com/cm/BlobServer/13th_Annual_2012_Online_Fraud_Report.pdf?blobkey¼id&blobwhere¼1320571432216&blobheader¼application/pdf&blobheadername1¼Cache-Control&blobheadervalue1¼private&blobcol¼urldata&blobtable¼MungoBlobs).
  • Delina R. and Tkač M. (2015). Role of e-business in the perception of ICT impact on revenue growth // Journal of Business Economics and Management, no. 16(6), pp. 1140–1153.
  • Dittrich D. (2009). Malware to crimeware: how far have they gone, and how do we catch up? // Login, no. 34(4), pp. 35–44.
  • Dion M. (2011). Corruption, fraud and cybercrime as dehumanizing phenomena // International Journal of Social Economics, no. 38(5), pp. 466–476.
  • Dobrovič J., Korauš A. and Dančišinová L. (2016). Sustainable economic development of Slovakia: factors determining optimal tax collection // Journal of Security and Sustainability Issues, no. 5(4), pp. 533–544.
  • Dobson S., Sukumar A. and Tipi L. (2015). Dark Matters: The Institutional Entrepreneurship of Illicit and Illegal Cyberspace / In: Mcelwee G. and Smith R. (eds.) // Exploring Criminal and Illegal Enterprise: New Perspectives on Research, Policy & Practice (Contemporary Issues in Entrepreneurship Research), no. 5, pp. 179–201.
  • Europol (2011). Cybercrime as a business: The digital underground economy (Press Releases) (https://www.europol.europa.eu/content/press/cybercrime-business-digitalunderground-economy-517).
  • Fair Isaak Corporation (2008). Reducing bad debt levels by addressing first party fraud and credit abuse (white paper) (http://brblog.typepad.com/files/first_party_fraud_2486wp_en.pdf).
  • Ferreira N.C.M.Q., Ferreira F.A.F., Marques C.S.E., Perez-Bustamante Ilander G.O. and Cipi A. (2015). Challenges in the implementation of public electronic services: Leassons from a regional-based study, Journal of Business Economics and Management, no. 16(5), pp. 962–979 (http://dx.doi.org/10.3846/16111699.2014.920718).
  • Fuschi D. and Tvaronavičienė M. (2014). Sustainable development, Big Data and supervisory control: service quality in banking sector // Journal of Security and Sustainability, issue 3(3), pp. 5–14.
  • Gaspareniene L. and Remeikiene R. (2015). Digital Shadow Economy: a Critical Review of the Literature // Mediterranean Journal of Social Sciences, vol. 6, no. 6, S5: 402–409.
  • Gasparėnienė L. and Remeikienė R. (2016). Shadow economy estimation methods: Digital shadow economy assessment aspect // 9th International Scientific Conference “Business and Management 2016” Vilnius, Lithuania (http://dx.doi.org/10.3846/bm.2016.34).
  • Government Accounting Office (2007). Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats [online] [cited 10 October 2015]. United States Government Accountability Office Report to Congressional Requesters (www.gao.gov/new.items/d07705.pdf).
  • Greek D. (2010). Who is responsible when goods go missing in transit? (www.computeractive.co.uk/ca/consumerrights/1931458/missing-transit).
  • Hafezieh N., Akhavan P. and Eshraghian F. (2011). Exploration of process and competitive factors of entrepreneurship in digital space: a multiple case study in Iran, Education, Business and Society // Contemporary Middle Eastern Issues, no. 4(4), pp. 267–279.
  • Haines J. and Johnstone P. (1999). Global cybercrime: new toys for the money launderers // Journal of Money Laundering Control, no. 2(4), pp. 317–325.
  • Herley C. and Florencio D. (2010). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy // Economics of Information Security and Privacy, 10 (http://link.springer.com/chapter/10.1007%2F978-1-4419-6967-5_3#page-1).
  • Hjort K. and Lantz B. (2012). (R)e-tail borrowing of party dresses: An experimental study // International Journal of Retail & Distribution Management, no. 40(12), pp. 997–1012.
  • Ho J. and Weinberg C.B. (2011). Segmenting consumers of pirated movies // Journal of Consumer Marketing, no. 28(4), pp. 252–260.
  • Holt T.J. and Lampke E. (2010). Exploring stolen data markets online: Products and market forces // Criminal Justice Studies, no. 23(1), pp. 33–50.
  • Holz T., Engelberth M. and Freiling F. (2012). Learning more about the underground economy: A case-study of keyloggers and dropzones // ESORICS Proceedings, no. 9, pp. 1–18.
  • Jacobs L., Samli A.C. and Jedlik T. (2001). The nightmare of international product piracy // Industrial Marketing Management, no. 30(6), pp. 499–509.
  • International Federation of the Phonographic Industry (2009). New business models for a changing environment (Digital music report) (www.ifpi.org/content/ section_ resources/dmr2009.html).
  • Kalyugina S., Strielkowski W., Ushvitsky L. and Astachova E. (2015). Sustainable and secure development: facet of personal financial issues // Journal of Security and Sustainability Issues, no. 5(2), pp. 297–304 (http://dx.doi.org/10.9770/jssi.2015.5.2(14)).
  • Lavrinenko O., Ohotina A., Tumalavičius V. and Pidlisna O.V. (2016). Assessment of partnership development in cross-border regions’ innovation systems (Latvia-LithuaniaBelarus) // Journal of Security and Sustainability Issues, no. 6(1), pp. 155–166 (http://dx.doi.org/10.9770/jssi.2016.6.1(12)).
  • Levi M. and Williams M.L. (2013). Multi-agency partnerships in cybercrime reduction // Information Management & Computer Security, no. 21(5), pp. 420-443
  • Mello J.P. (2013). Cybercrime fueled by mature digital underground (Identity & Access) (http://www.csoonline.com/article/2133649/identity-access/cybercrime-fueled-bymature-digital-underground.html).
  • Moore T., Clayton R. and Anderson R. (2009). The economics of online crime // Journal of Economic Perspectives, no. 23(3), pp. 3–20.
  • Pauceanu A.M. (2016). Innovation and entrepreneurship in Sultanate of 0man – an empirical study // Entrepreneurship and Sustainability Issues, no. 4(1), pp. 83–99 (http://dx.doi.org/10.9770/jesi.2016.4.1(8)).
  • Poulsen K. (2011). Kingpin: How one hacker took over the billion-dollar cybercrime underground. New York: Crown Publishing.
  • Provos N., Rajab M.A. and Mavrommatis P. (2009). Cybercrime 2.0: when the cloud turns dark // Commun ACM, no. 52(4), pp. 42–7.
  • Rezk M.A., Ibrahim H.H., Radwan A., Sakr M.M., Tvaronavičienė M. and Piccinetti L. (2016). Innovation magnitude of manufacturing industry in Egypt with particular focus on SMEs // Entrepreneurship and Sustainability Issues, no. 3(4), pp. 306–318 (http://dx.doi.org/10.9770/jesi.2016.3.4(1)).
  • Samašonok K., Išoraitė M. and Leškienė-Hussey B. (2016). The internet entrepreneurship: opportunities and problems // Entrepreneurship and Sustainability Issues, no. 3(4), pp. 329–349.
  • Sirkeci I. and Magnusdottir L.B. (2011). Understanding illegal music downloading in the UK: A multi attribute model // Journal of Research in Interactive Marketing, no. 5(1), pp. 90–110.
  • Smith G.S. (2015). Management models for international cybercrime // Journal of Financial Crime, no. 22(1), pp. 104–125.
  • Taylor S.A. (2012). Evaluating digital piracy intentions on behaviors // Journal of Services Marketing, no. 26(7), pp. 472–483.
  • Thomas R. and Martin J. (2006). The underground economy: Priceless // The USENIX Magazine, no. 31(6), pp. 7–16.
  • Teivāns-Treinovskis J. and Amosova J. (2016). Some aspects of criminal environment impact on sustainable entrepreneurship activities // Entrepreneurship and Sustainability Issues, no. 4(1), pp. 17–27.
  • Tvaronavičienė M. (2016). Start-ups across the EU: if particular tendencies could be trace // Entrepreneurship and Sustainability Issues, no. 3(3), pp. 290–298.
  • Vida I., Koklic M.K., Kukar-Kinney M. and Penz E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences // Journal of Research in Interactive Marketing, no. 6(4), pp. 298–313.
  • Vlachos V., Minou M., Assimakopouos V. and Toska A. (2011). The landscape of cybercrime in Greece // Information Management & Computer Security, no. 19(2), pp. 113–123.
  • Williams P., Nicholas D. and Rowlands I. (2010). The attitudes and behaviours of illegal downloaders // Aslib Proceedings, no. 62(3), pp. 283–301.
  • Yip M., Shadbolt N., Tiropanis N. and Webber C. (2012). The digital underground economy: A social network approach to understanding cybercrime. In Digital Futures 2012: The Third Annual Digital Economy All Hands Conference (2012) (http://eprints.soton.ac.uk/343351/1/yip_de2012_submission.pdf).
  • Yu C.P., Young M.L. and Ju B.C. (2015). Consumer software piracy in virtual communities: An integrative model of heroism and social exchange // Internet Research, no. 25(2), pp. 317–334.
  • Zorz M. (2015). Global black markets and the underground economy (Featured News) (http://www.netsecurity.org/article.php?id=2288).
Publisher: Southern Federal University
Founder: Southern Federal University
ISSN: 2073-6606