{"title":"Internet Privacy","authors":"N. J. Rodriguez","doi":"10.1007/978-3-642-31943-3","DOIUrl":"https://doi.org/10.1007/978-3-642-31943-3","url":null,"abstract":"","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121425424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tolulope Kayode-Adedeji, Obianuju Okeke, L. Amodu, Opeyemi Fasanya, N. Okorie
{"title":"Social Media and Identity Theft Implications on Nigerian Victims and International Economy","authors":"Tolulope Kayode-Adedeji, Obianuju Okeke, L. Amodu, Opeyemi Fasanya, N. Okorie","doi":"10.4018/978-1-5225-9715-5.ch055","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch055","url":null,"abstract":"This research was conducted with the sole aim of examining the implications of social media identity theft and level of awareness of security measures on social networking platforms. The survey and interview method of data gathering was employed and result revealed that the implication of social media identity theft on victims are rather negative than positive especially as a result of their lack of knowledge on the security measures necessary to employ in avoiding the implications that comes with the use of social media networking sites. The research recommend that the government make policies that will punish perpetrators and social media networking site owners begin to seek our ways to protect their users on those platforms and provide avenues to educate people to stay safe online for the future generation of online social media users.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125424008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberstalking","authors":"E. Huber, R. Brandtweiner","doi":"10.4018/978-1-5225-9715-5.ch043","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch043","url":null,"abstract":"The phenomenon of stalking itself is as old as humankind itself. The past years and the expansion of digitalization have put the crime of stalking in a new light. A representative study from the USA shows that one in four Americans has already been “harassed” online. If stalking in the traditional sense (also known as offline stalking or classic stalking) is described as obsessive harassment/threat over a longer period, it takes on a new criminal dimension as soon as connected communication takes place. New forms of crime such as cyberstalking, cyberbullying, and romance scams have now reached our everyday lives. This article explores cyberstalking.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"47 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning and Cyber Security","authors":"V. Mkrttchian, Sergey Kanarev, L. Gamidullaeva","doi":"10.4018/978-1-5225-9715-5.ch070","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch070","url":null,"abstract":"Cybersecurity has become an important subject of national, international, economic, and social importance that affects multiple nations. The literature review of known sources is forming theoretical bases of calculations on Sleptsov networks. The universal network of Sleptsov is a prototype of the Sleptsov network processor. The authors in the article research the emerging trends and theoretical perspectives of cyber security development using machine-learning technique with avatar-based management at the platform of Sleptsov net-processor and propose further prospects for development of hyper-computation.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115892169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Dark Side of Engaging With Social Networking Sites (SNS)","authors":"Eileen O'Donnell, Liam O'Donnell","doi":"10.4018/978-1-5225-9715-5.ch042","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch042","url":null,"abstract":"Although social networking sites (SNS) may have some positive aspects, for example, connecting family members and friends who no longer live close enough to each other to meet in person, or for connecting people with similar health conditions who may need the support of others who understand and can manage the condition, or for groups of people with similar interests to engage and plan events and activities, there are also some possible negative aspects of engaging with SNS, for example, addiction or addictive behaviour, child pornography, cyberbullying, fake news, fear of missing out (FOMO), social comparisons, stalking, amongst many others, which can all lead to neglect of other duties, sleep deprivation, loneliness, isolation, depression, and so forth. The possible negative effects of engaging with SNS on the surface web will perhaps be also relevant to users of the deep and dark web. This article explores the dark side of social networking sites.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117167458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dark Web","authors":"Punam Bedi, Neha Gupta, Dr Vinita Jindal","doi":"10.4018/978-1-5225-9715-5.ch010","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch010","url":null,"abstract":"The World Wide Web is a part of the Internet that provides data dissemination facility to people. The contents of the Web are crawled and indexed by search engines so that they can be retrieved, ranked, and displayed as a result of users' search queries. These contents that can be easily retrieved using Web browsers and search engines comprise the Surface Web. All information that cannot be crawled by search engines' crawlers falls under Deep Web. Deep Web content never appears in the results displayed by search engines. Though this part of the Web remains hidden, it can be reached using targeted search over normal Web browsers. Unlike Deep Web, there exists a portion of the World Wide Web that cannot be accessed without special software. This is known as the Dark Web. This chapter describes how the Dark Web differs from the Deep Web and elaborates on the commonly used software to enter the Dark Web. It highlights the illegitimate and legitimate sides of the Dark Web and specifies the role played by cryptocurrencies in the expansion of Dark Web's user base.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131200898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drug Trafficking","authors":"P. Kaur, P. Kaushal","doi":"10.4018/978-1-5225-9715-5.ch032","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch032","url":null,"abstract":"In an increasingly intrusive era, the deep web is considered to be a bastion of privacy, while for others it is one of the most evil places to exist. The deep web is a part of the world wide web that cannot be readily accessed by conventional search engines, and a small part of it forms the dark web. The enshrouded nature and complex methodology required for access have made dark web a platform for carrying out numerous illicit activities, one of them being drug trafficking. This article explores how deep web and dark web operate, the trade of illegal drugs online in so-called cryptomarkets or dark net markets, the foundation and shut-down of Silk Road, the new cryptomarkets that popped up to take its place, the use of ‘the onion router' or TOR browser in this anonymous sale and purchase of illegal drugs, the role of encryption and cryptocurrencies, the existing and suggested tactics of the law enforcement to prevent internet-facilitated drug trafficking, and the future research areas.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberbullying in the Workplace","authors":"Shalini Ramdeo, Riann Singh","doi":"10.4018/978-1-5225-9715-5.ch047","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch047","url":null,"abstract":"The information and communication technology revolution has altered the way businesses operate. The internet has increased employees' interconnectedness beyond the traditional ‘brick and mortar' workplace through virtual work platforms. However, the blurring of boundaries between work and personal spaces have created a potential threat for the proliferation of workplace cyberbullying. Cyberbullying is not restrained by time, tools, or location, as ‘work' is no longer a well-defined activity. Cyberbullying discussions have been generating research interests among researchers and practitioners for over the past decade, with pioneering studies exploring its conceptualization, prevalence, and consequences, but it is still at an embryotic stage. This article considers the unique aspects of workplace bullying and cyberbullying for policy development and effective management as concise differentiations would allow targets to identify and determine the nature of the behaviours. Possible recommendations and solutions are also advanced, with areas for future research identified.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Dark Web","authors":"R. Elangovan","doi":"10.4018/978-1-5225-9715-5.ch008","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch008","url":null,"abstract":"The deep web (also called deepnet, the invisible web, dark web, or the hidden web) refers to world wide web content that is not part of the surface web, which is indexed by standard search engines. The more familiar “surface” web contains only a small fraction of the information available on the internet. The deep web contains much of the valuable data on the web, but is largely invisible to standard web crawling techniques. Besides it being the huge source of information, it also provides the rostrum for cybercrime like by providing download links for movies, music, games, etc. without having their copyrights. This article aims to provide context and policy recommendations pertaining to the dark web. The dark web's complete history, from its creation to the latest incidents and the way to access and their sub forums are briefly discussed with respective to the user perspective.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"65 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133466822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Legislation","authors":"C. Anglim","doi":"10.4018/978-1-5225-9715-5.ch027","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch027","url":null,"abstract":"This entry discusses the role of legislation governing cybersecurity and how this legislation seeks to control criminal activity on the dark web. As explained throughout this encyclopedia, the dark web consists of internet services that are accessible anonymously using “the onion router” (TOR). There has been a concentrated effort in recent years for federal legislation in the United States to be enacted to control the widespread criminal behavior that occurs on the dark web, which includes the sale of drugs, illegal weapons, and child pornography. Legislation, as the term is used in this work, refers to law enacted by a legislative body such as the US Congress. The article considers both existing relevant statutory law and proposed legislation on the local, state/provincial, and federal/national level. The focus will be on US federal legislation; however, the article will also consider US state and local legislation, the legislation from other nations, and international legislation.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125681137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}