Encyclopedia of Criminal Activities and the Deep Web最新文献

筛选
英文 中文
Internet Privacy 网络隐私
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31943-3
N. J. Rodriguez
{"title":"Internet Privacy","authors":"N. J. Rodriguez","doi":"10.1007/978-3-642-31943-3","DOIUrl":"https://doi.org/10.1007/978-3-642-31943-3","url":null,"abstract":"","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121425424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Media and Identity Theft Implications on Nigerian Victims and International Economy 社交媒体和身份盗窃对尼日利亚受害者和国际经济的影响
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch055
Tolulope Kayode-Adedeji, Obianuju Okeke, L. Amodu, Opeyemi Fasanya, N. Okorie
{"title":"Social Media and Identity Theft Implications on Nigerian Victims and International Economy","authors":"Tolulope Kayode-Adedeji, Obianuju Okeke, L. Amodu, Opeyemi Fasanya, N. Okorie","doi":"10.4018/978-1-5225-9715-5.ch055","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch055","url":null,"abstract":"This research was conducted with the sole aim of examining the implications of social media identity theft and level of awareness of security measures on social networking platforms. The survey and interview method of data gathering was employed and result revealed that the implication of social media identity theft on victims are rather negative than positive especially as a result of their lack of knowledge on the security measures necessary to employ in avoiding the implications that comes with the use of social media networking sites. The research recommend that the government make policies that will punish perpetrators and social media networking site owners begin to seek our ways to protect their users on those platforms and provide avenues to educate people to stay safe online for the future generation of online social media users.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125424008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberstalking 网络跟踪
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch043
E. Huber, R. Brandtweiner
{"title":"Cyberstalking","authors":"E. Huber, R. Brandtweiner","doi":"10.4018/978-1-5225-9715-5.ch043","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch043","url":null,"abstract":"The phenomenon of stalking itself is as old as humankind itself. The past years and the expansion of digitalization have put the crime of stalking in a new light. A representative study from the USA shows that one in four Americans has already been “harassed” online. If stalking in the traditional sense (also known as offline stalking or classic stalking) is described as obsessive harassment/threat over a longer period, it takes on a new criminal dimension as soon as connected communication takes place. New forms of crime such as cyberstalking, cyberbullying, and romance scams have now reached our everyday lives. This article explores cyberstalking.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"47 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Machine Learning and Cyber Security 机器学习和网络安全
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch070
V. Mkrttchian, Sergey Kanarev, L. Gamidullaeva
{"title":"Machine Learning and Cyber Security","authors":"V. Mkrttchian, Sergey Kanarev, L. Gamidullaeva","doi":"10.4018/978-1-5225-9715-5.ch070","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch070","url":null,"abstract":"Cybersecurity has become an important subject of national, international, economic, and social importance that affects multiple nations. The literature review of known sources is forming theoretical bases of calculations on Sleptsov networks. The universal network of Sleptsov is a prototype of the Sleptsov network processor. The authors in the article research the emerging trends and theoretical perspectives of cyber security development using machine-learning technique with avatar-based management at the platform of Sleptsov net-processor and propose further prospects for development of hyper-computation.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115892169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Dark Side of Engaging With Social Networking Sites (SNS) 社交网站的黑暗面
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch042
Eileen O'Donnell, Liam O'Donnell
{"title":"The Dark Side of Engaging With Social Networking Sites (SNS)","authors":"Eileen O'Donnell, Liam O'Donnell","doi":"10.4018/978-1-5225-9715-5.ch042","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch042","url":null,"abstract":"Although social networking sites (SNS) may have some positive aspects, for example, connecting family members and friends who no longer live close enough to each other to meet in person, or for connecting people with similar health conditions who may need the support of others who understand and can manage the condition, or for groups of people with similar interests to engage and plan events and activities, there are also some possible negative aspects of engaging with SNS, for example, addiction or addictive behaviour, child pornography, cyberbullying, fake news, fear of missing out (FOMO), social comparisons, stalking, amongst many others, which can all lead to neglect of other duties, sleep deprivation, loneliness, isolation, depression, and so forth. The possible negative effects of engaging with SNS on the surface web will perhaps be also relevant to users of the deep and dark web. This article explores the dark side of social networking sites.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117167458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dark Web 黑暗的网络
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch010
Punam Bedi, Neha Gupta, Dr Vinita Jindal
{"title":"Dark Web","authors":"Punam Bedi, Neha Gupta, Dr Vinita Jindal","doi":"10.4018/978-1-5225-9715-5.ch010","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch010","url":null,"abstract":"The World Wide Web is a part of the Internet that provides data dissemination facility to people. The contents of the Web are crawled and indexed by search engines so that they can be retrieved, ranked, and displayed as a result of users' search queries. These contents that can be easily retrieved using Web browsers and search engines comprise the Surface Web. All information that cannot be crawled by search engines' crawlers falls under Deep Web. Deep Web content never appears in the results displayed by search engines. Though this part of the Web remains hidden, it can be reached using targeted search over normal Web browsers. Unlike Deep Web, there exists a portion of the World Wide Web that cannot be accessed without special software. This is known as the Dark Web. This chapter describes how the Dark Web differs from the Deep Web and elaborates on the commonly used software to enter the Dark Web. It highlights the illegitimate and legitimate sides of the Dark Web and specifies the role played by cryptocurrencies in the expansion of Dark Web's user base.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131200898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Drug Trafficking 毒品走私
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch032
P. Kaur, P. Kaushal
{"title":"Drug Trafficking","authors":"P. Kaur, P. Kaushal","doi":"10.4018/978-1-5225-9715-5.ch032","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch032","url":null,"abstract":"In an increasingly intrusive era, the deep web is considered to be a bastion of privacy, while for others it is one of the most evil places to exist. The deep web is a part of the world wide web that cannot be readily accessed by conventional search engines, and a small part of it forms the dark web. The enshrouded nature and complex methodology required for access have made dark web a platform for carrying out numerous illicit activities, one of them being drug trafficking. This article explores how deep web and dark web operate, the trade of illegal drugs online in so-called cryptomarkets or dark net markets, the foundation and shut-down of Silk Road, the new cryptomarkets that popped up to take its place, the use of ‘the onion router' or TOR browser in this anonymous sale and purchase of illegal drugs, the role of encryption and cryptocurrencies, the existing and suggested tactics of the law enforcement to prevent internet-facilitated drug trafficking, and the future research areas.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberbullying in the Workplace 工作场所的网络欺凌
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch047
Shalini Ramdeo, Riann Singh
{"title":"Cyberbullying in the Workplace","authors":"Shalini Ramdeo, Riann Singh","doi":"10.4018/978-1-5225-9715-5.ch047","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch047","url":null,"abstract":"The information and communication technology revolution has altered the way businesses operate. The internet has increased employees' interconnectedness beyond the traditional ‘brick and mortar' workplace through virtual work platforms. However, the blurring of boundaries between work and personal spaces have created a potential threat for the proliferation of workplace cyberbullying. Cyberbullying is not restrained by time, tools, or location, as ‘work' is no longer a well-defined activity. Cyberbullying discussions have been generating research interests among researchers and practitioners for over the past decade, with pioneering studies exploring its conceptualization, prevalence, and consequences, but it is still at an embryotic stage. This article considers the unique aspects of workplace bullying and cyberbullying for policy development and effective management as concise differentiations would allow targets to identify and determine the nature of the behaviours. Possible recommendations and solutions are also advanced, with areas for future research identified.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Dark Web 暗网
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch008
R. Elangovan
{"title":"The Dark Web","authors":"R. Elangovan","doi":"10.4018/978-1-5225-9715-5.ch008","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch008","url":null,"abstract":"The deep web (also called deepnet, the invisible web, dark web, or the hidden web) refers to world wide web content that is not part of the surface web, which is indexed by standard search engines. The more familiar “surface” web contains only a small fraction of the information available on the internet. The deep web contains much of the valuable data on the web, but is largely invisible to standard web crawling techniques. Besides it being the huge source of information, it also provides the rostrum for cybercrime like by providing download links for movies, music, games, etc. without having their copyrights. This article aims to provide context and policy recommendations pertaining to the dark web. The dark web's complete history, from its creation to the latest incidents and the way to access and their sub forums are briefly discussed with respective to the user perspective.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"65 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133466822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Legislation 网络安全立法
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch027
C. Anglim
{"title":"Cybersecurity Legislation","authors":"C. Anglim","doi":"10.4018/978-1-5225-9715-5.ch027","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch027","url":null,"abstract":"This entry discusses the role of legislation governing cybersecurity and how this legislation seeks to control criminal activity on the dark web. As explained throughout this encyclopedia, the dark web consists of internet services that are accessible anonymously using “the onion router” (TOR). There has been a concentrated effort in recent years for federal legislation in the United States to be enacted to control the widespread criminal behavior that occurs on the dark web, which includes the sale of drugs, illegal weapons, and child pornography. Legislation, as the term is used in this work, refers to law enacted by a legislative body such as the US Congress. The article considers both existing relevant statutory law and proposed legislation on the local, state/provincial, and federal/national level. The focus will be on US federal legislation; however, the article will also consider US state and local legislation, the legislation from other nations, and international legislation.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125681137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信