IDEAS home Printed from https://ideas.repec.org/a/inm/orisre/v35y2024i1p145-164.html
   My bibliography  Save this article

Shedding Light on the Dark: The Impact of Legal Enforcement on Darknet Transactions

Author

Listed:
  • Jason Chan

    (Information and Decision Sciences, Carlson School of Management, University of Minnesota, Minneapolis, Minnesota 55455)

  • Shu He

    (Information Systems and Operations Management, Warrington College of Business, University of Florida, Gainesville, Florida 32611)

  • Dandan Qiao

    (Information Systems and Analytics, National University of Singapore, Singapore 117418)

  • Andrew Whinston

    (Information, Risk and Operations Management, University of Texas at Austin, Austin, Texas 78713)

Abstract

Darknet markets have been used increasingly for the transaction of drugs in the last decade. The growth of illicit drug transactions on darknet markets has led enforcement agencies to invest a greater proportion of time and effort to monitor and crack down on criminal activities on darknet websites. Whereas large-scale site-shutdown efforts involving policing agencies across various countries can help in slowing down the growth of these markets, such enforcement strategies may not be sustainable in the long run given the cost and time they require to coordinate. Thus, there is a need for alternative, cost-efficient strategies to police darknet markets on a regular basis. In response, this study attempts to empirically evaluate and quantify the effectiveness of selectively targeting large drug vendors on darknet sites. Using data from the three largest darknet markets, we employ a difference-in-differences procedure to assess the impact of the arrest of a major drug dealer on subsequent darknet activities. Specifically, we contrast various outcomes from the policed site (Silk Road 2) with those from nonpoliced sites (Agora and Evolution) and find that enforcement efforts on the policed site reduced subsequent transaction levels and the number of remaining vendors. The enforcement was not only effective in deterring users in the same country as the arrestees, but also had a spillover effect on darknet participants who were beyond the prosecutorial jurisdictions of the arrestees. Test results on heterogeneous effects further suggest that small darknet drug vendors were most deterred by the arrest event and drug vendors selling dangerous drugs were more deterred relative to those selling less dangerous drugs. Our findings have policy and theoretical implications for law makers, enforcement agencies, and academics.

Suggested Citation

  • Jason Chan & Shu He & Dandan Qiao & Andrew Whinston, 2024. "Shedding Light on the Dark: The Impact of Legal Enforcement on Darknet Transactions," Information Systems Research, INFORMS, vol. 35(1), pages 145-164, March.
  • Handle: RePEc:inm:orisre:v:35:y:2024:i:1:p:145-164
    DOI: 10.1287/isre.2023.1222
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/isre.2023.1222
    Download Restriction: no

    File URL: https://libkey.io/10.1287/isre.2023.1222?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Bhaskar, V. & Linacre, Robin & Machin, Stephen, 2019. "The economic functioning of online drugs markets," Journal of Economic Behavior & Organization, Elsevier, vol. 159(C), pages 426-441.
    2. McKenzie, Jordi, 2017. "Graduated response policies to digital piracy: Do they increase box office revenues of movies?," Information Economics and Policy, Elsevier, vol. 38(C), pages 1-11.
    3. Luis Aguiar & Jörg Claussen & Christian Peukert, 2018. "Catch Me If You Can: Effectiveness and Consequences of Online Copyright Enforcement," Information Systems Research, INFORMS, vol. 29(3), pages 656-678, September.
    4. Detmar W. Straub, 1990. "Effective IS Security: An Empirical Study," Information Systems Research, INFORMS, vol. 1(3), pages 255-276, September.
    5. David H. Autor, 2003. "Outsourcing at Will: The Contribution of Unjust Dismissal Doctrine to the Growth of Employment Outsourcing," Journal of Labor Economics, University of Chicago Press, vol. 21(1), pages 1-42, January.
    6. Anthony A. Braga & David L. Weisburd, 2012. "The Effects of “Pulling Levers” Focused Deterrence Strategies on Crime," Campbell Systematic Reviews, John Wiley & Sons, vol. 8(1), pages 1-90.
    7. Alberto Abadie, 2005. "Semiparametric Difference-in-Differences Estimators," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 72(1), pages 1-19.
    8. John D'Arcy & Tejaswini Herath, 2011. "A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings," European Journal of Information Systems, Taylor & Francis Journals, vol. 20(6), pages 643-658, November.
    9. Shu He & Jing Peng & Jianbin Li & Liping Xu, 2020. "Impact of Platform Owner’s Entry on Third-Party Stores," Information Systems Research, INFORMS, vol. 31(4), pages 1467-1484, December.
    10. Brett Danaher & Michael D. Smith & Rahul Telang & Siwen Chen, 2014. "The Effect of Graduated Response Anti-Piracy Laws on Music Sales: Evidence from an Event Study in France," Journal of Industrial Economics, Wiley Blackwell, vol. 62(3), pages 541-553, September.
    11. Hardy, Robert Augustus & Norgaard, Julia R., 2016. "Reputation in the Internet black market: an empirical and theoretical analysis of the Deep Web," Journal of Institutional Economics, Cambridge University Press, vol. 12(3), pages 515-539, September.
    12. Danaher, Brett & Smith, Michael D., 2014. "Gone in 60 Seconds: The Impact of the Megaupload Shutdown on Movie Sales," International Journal of Industrial Organization, Elsevier, vol. 33(C), pages 1-8.
    13. John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Christophe Bellégo & Romain De Nijs, 2020. "The Unintended Consequences of Antipiracy Laws on Markets with Asymmetric Piracy: The Case of the French Movie Industry," Information Systems Research, INFORMS, vol. 31(4), pages 1064-1086, December.
    2. Batikas, Michail & Claussen, Jörg & Peukert, Christian, 2019. "Follow the money: Online piracy and self-regulation in the advertising industry," International Journal of Industrial Organization, Elsevier, vol. 65(C), pages 121-151.
    3. Batikas, Michail & Claussen, Jörg & Peukert, Christian, 2017. "Follow The Money: Piracy and Online Advertising," 28th European Regional ITS Conference, Passau 2017 169448, International Telecommunications Society (ITS).
    4. Christophe BELLEGO & Romain DE NIJS, 2020. "The Unintended Consequences of Anti-Piracy Laws on Markets with Asymmetric Piracy: The Case of the French Movie Industry," Working Papers 2020-03, Center for Research in Economics and Statistics.
    5. Luis Aguiar & Jörg Claussen & Christian Peukert, 2018. "Catch Me If You Can: Effectiveness and Consequences of Online Copyright Enforcement," Information Systems Research, INFORMS, vol. 29(3), pages 656-678, September.
    6. A. J. Burns & Tom L. Roberts & Clay Posey & Paul Benjamin Lowry & Bryan Fuller, 2023. "Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse," Information Systems Research, INFORMS, vol. 34(1), pages 342-362, March.
    7. Eun Hee Park & Jongwoo Kim & Lynn Wiles, 2023. "The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information," Information Technology and Management, Springer, vol. 24(2), pages 177-193, June.
    8. Wojciech Hardy, 2022. "Brace yourselves, pirates are coming! the effects of Game of Thrones leak on TV viewership," Journal of Cultural Economics, Springer;The Association for Cultural Economics International, vol. 46(1), pages 27-55, March.
    9. Jason Chan & Shu He & Dandan Qiao & Andrew B. Whinston, 2019. "Shedding Light on the Dark: The Impact of Legal Enforcement on Darknet Transactions," Working Papers 19-08, NET Institute.
    10. Christian Peukert & Margaritha Windisch, 2023. "The Economics of Copyright in the Digital Age," CESifo Working Paper Series 10687, CESifo.
    11. Jaehyeon Ju & Daegon Cho & Jae Kyu Lee & Jae‐Hyeon Ahn, 2021. "Can It Clean Up Your Inbox? Evidence from South Korean Anti‐spam Legislation," Production and Operations Management, Production and Operations Management Society, vol. 30(8), pages 2636-2652, August.
    12. Marc Bourreau & Marianne Lumeau & Francois Moreau & Jordana Viotto da Cruz, 2019. "Recent or Free? An Experimental Study of the Motivations for Pirating Movies," CESifo Working Paper Series 8036, CESifo.
    13. McKenzie, Jordi & Crosby, Paul & Cox, Joe & Collins, Alan, 2019. "Experimental evidence on demand for “on-demand” entertainment," Journal of Economic Behavior & Organization, Elsevier, vol. 161(C), pages 98-113.
    14. Picarelli, Nathalie, 2016. "Who really benefits from export processing zones? Evidence from Nicaraguan municipalities," Labour Economics, Elsevier, vol. 41(C), pages 318-332.
    15. Brett Danaher & Michael D. Smith & Rahul Telang, 2014. "Piracy and Copyright Enforcement Mechanisms," Innovation Policy and the Economy, University of Chicago Press, vol. 14(1), pages 25-61.
    16. Myriã Tatiany Neves Bast & Sergio Naruhiko Sakurai, 2016. "Uma Avaliação Empírica Dos Efeitos Dos Empréstimos Do Bndes Aos Governos Municipais Brasileiros," Anais do XLIII Encontro Nacional de Economia [Proceedings of the 43rd Brazilian Economics Meeting] 064, ANPEC - Associação Nacional dos Centros de Pós-Graduação em Economia [Brazilian Association of Graduate Programs in Economics].
    17. V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
    18. A. J. Burns & Clay Posey & James F. Courtney & Tom L. Roberts & Prabhashi Nanayakkara, 2017. "Organizational information security as a complex adaptive system: insights from three agent-based models," Information Systems Frontiers, Springer, vol. 19(3), pages 509-524, June.
    19. Silva, Leiser & Hsu, Carol & Backhouse, James & McDonnell, Aidan, 2016. "Resistance and power in a security certification scheme: the case of c:cure," LSE Research Online Documents on Economics 68348, London School of Economics and Political Science, LSE Library.
    20. Sumantra Sarkar & Anthony Vance & Balasubramaniam Ramesh & Menelaos Demestihas & Daniel Thomas Wu, 2020. "The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context," Information Systems Research, INFORMS, vol. 31(4), pages 1240-1259, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orisre:v:35:y:2024:i:1:p:145-164. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.