To request access this dataset you will need to login with an IMPACT account. Accounts are free. If you don't have one please register.

Summary

DS-1499
Pending
Hansa marketplace: Non-anonymized dataset
Dataset
Carnegie Mellon University
Carnegie Mellon University
10/08/2015
07/14/2017
52 (lowest rank is 52)

Category & Restrictions

Cybercrime Infrastructure
cyber crime
Restricted
Unknown

Data is only for use by academic researchers, as evidenced by a .edu (or a known non-US academic domain) email address, and a .edu (or a known non-US academic domain) webpage describing your research and publications. You need to send a brief description of the project you want to use this data for. A faculty advisor must be making or endorsing the request.

Commercial uses are prohibited.

Description


Non-anonymized data for the Hansa online anonymous marketplace (2015-2017)

"Non-anonymized database pertaining to the Hansa marketplace. This data was used in the paper "Measurement by Proxy:
On the Accuracy of Online Marketplace Measurements" (Cuevas et al., 2018). In this dataset, textual information (item name, description, or feedback text) and handles have *not* been anonymized and are thus available. We don't expect any private identifiers or other PII to be present in the data, which was collected from a publicly available website (Hansa marketplace) over slightly less than two years (2015-2017).

For less restricted usage terms, please consider the anonymized version, which is also available without any restrictions. This non-anonymized dataset should only be requested if your project MUST rely on full textual descriptions of items and/or feedback.

Additional Details

51.8MB
false
false
carnegie, mellon, anonymized, marketplace, hansa, dataset, hansa marketplace: non-anonymized dataset, 1499, 2015, carnegie mellon university, online, 2017, anonymous, textual, feedback, items, expect, identifiers, website, measurements, cybercrime infrastructure, paper, database, measurement, 2018, description, restricted, infrastructure, private, pertaining, cuevas, usage, accuracy, project, collected, descriptions, pii, terms, text, item, don, restrictions, al, publicly, version, proxy, requested, rely, handles, cybercrime