{"title":"Dark Web","authors":"Jason Diodati, J. Winterdyk","doi":"10.4018/978-1-7998-5567-5.CH024","DOIUrl":"https://doi.org/10.4018/978-1-7998-5567-5.CH024","url":null,"abstract":"There is a pressing need for understanding blockchain, cybercrime, and dark web-based fraud. As the world continues to turn digital, uses of cryptocurrencies are becoming mainstream. With this technological adoption becoming a reality, crime is adapting to the times. “Click here for free Bitcoin,” “set up an account and earn 100BTC instantly” are merely anecdotal examples of the ways the act of fraud is innovating. Deeper into this proliferation of technology lies the dark web, where your social security and identity may be offered for a small sum as we speak. Blockchain technology fueled dark web marketplaces' enormous growth, which facilitated identity fraud and many other cybercrimes taking place as we speak. This chapter and its authors aim to provide a thorough yet simplified explanation of these technologies while expressing current trends and theories surrounding dark web fraud trading of fraud guides and the use of social engineering. This chapter aims to explain all aspects of this area of cybercrime for all to understand.","PeriodicalId":377362,"journal":{"name":"Handbook of Research on Theory and Practice of Financial Crimes","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127012665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Financial Scams Through Ponzi Schemes","authors":"Alam I. Asadov","doi":"10.4018/978-1-7998-5567-5.CH015","DOIUrl":"https://doi.org/10.4018/978-1-7998-5567-5.CH015","url":null,"abstract":"This chapter investigates the relationship between financial literacy, financial sector development, and Ponzi schemes in the commonwealth of independent states (CIS) countries. It begins with an overview of the early cases of Ponzi schemes in the CIS countries by examining circumstances which formed fertile ground for the schemes to develop during initial years of independence. The study then scrutinised the situation in the member states during the later years which revealed no improvements. A closer examination of the problem discovered that the main triggers are low level of financial literacy and scarce investment alternatives. The chapter suggests that unless the level of financial literacy is raised and the financial sector is developed, Ponzi schemes will continue to thrive in the region. It concludes by providing some policy recommendations to enhance financial literacy and financial sector development, as well as necessary steps to improve financial regulations.","PeriodicalId":377362,"journal":{"name":"Handbook of Research on Theory and Practice of Financial Crimes","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dark Web","authors":"A. Szakonyi, Brian M. Leonard, M. Dawson","doi":"10.4018/978-1-7998-5567-5.CH025","DOIUrl":"https://doi.org/10.4018/978-1-7998-5567-5.CH025","url":null,"abstract":"The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.","PeriodicalId":377362,"journal":{"name":"Handbook of Research on Theory and Practice of Financial Crimes","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128203794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}