首页 > 最新文献

Encyclopedia of Criminal Activities and the Deep Web最新文献

英文 中文
Internet Privacy 网络隐私
Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31943-3
N. J. Rodriguez
{"title":"Internet Privacy","authors":"N. J. Rodriguez","doi":"10.1007/978-3-642-31943-3","DOIUrl":"https://doi.org/10.1007/978-3-642-31943-3","url":null,"abstract":"","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121425424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Media and Identity Theft Implications on Nigerian Victims and International Economy 社交媒体和身份盗窃对尼日利亚受害者和国际经济的影响
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch055
Tolulope Kayode-Adedeji, Obianuju Okeke, L. Amodu, Opeyemi Fasanya, N. Okorie
This research was conducted with the sole aim of examining the implications of social media identity theft and level of awareness of security measures on social networking platforms. The survey and interview method of data gathering was employed and result revealed that the implication of social media identity theft on victims are rather negative than positive especially as a result of their lack of knowledge on the security measures necessary to employ in avoiding the implications that comes with the use of social media networking sites. The research recommend that the government make policies that will punish perpetrators and social media networking site owners begin to seek our ways to protect their users on those platforms and provide avenues to educate people to stay safe online for the future generation of online social media users.
这项研究的唯一目的是调查社交媒体身份盗窃的影响以及社交网络平台上安全措施的意识水平。采用数据收集的调查和访谈方法,结果显示社交媒体身份盗窃对受害者的影响是消极的而不是积极的,特别是因为他们缺乏必要的安全措施的知识,以避免使用社交媒体网站带来的影响。该研究建议政府制定政策,惩罚肇事者,社交媒体网站所有者开始寻求我们的方法来保护他们在这些平台上的用户,并为下一代在线社交媒体用户提供教育人们保持在线安全的途径。
{"title":"Social Media and Identity Theft Implications on Nigerian Victims and International Economy","authors":"Tolulope Kayode-Adedeji, Obianuju Okeke, L. Amodu, Opeyemi Fasanya, N. Okorie","doi":"10.4018/978-1-5225-9715-5.ch055","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch055","url":null,"abstract":"This research was conducted with the sole aim of examining the implications of social media identity theft and level of awareness of security measures on social networking platforms. The survey and interview method of data gathering was employed and result revealed that the implication of social media identity theft on victims are rather negative than positive especially as a result of their lack of knowledge on the security measures necessary to employ in avoiding the implications that comes with the use of social media networking sites. The research recommend that the government make policies that will punish perpetrators and social media networking site owners begin to seek our ways to protect their users on those platforms and provide avenues to educate people to stay safe online for the future generation of online social media users.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125424008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberstalking 网络跟踪
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch043
E. Huber, R. Brandtweiner
The phenomenon of stalking itself is as old as humankind itself. The past years and the expansion of digitalization have put the crime of stalking in a new light. A representative study from the USA shows that one in four Americans has already been “harassed” online. If stalking in the traditional sense (also known as offline stalking or classic stalking) is described as obsessive harassment/threat over a longer period, it takes on a new criminal dimension as soon as connected communication takes place. New forms of crime such as cyberstalking, cyberbullying, and romance scams have now reached our everyday lives. This article explores cyberstalking.
跟踪的现象和人类本身一样古老。过去的几年里,随着数字化的发展,跟踪犯罪有了新的认识。来自美国的一项代表性研究表明,四分之一的美国人已经在网上受到“骚扰”。如果传统意义上的跟踪(也被称为离线跟踪或经典跟踪)被描述为长期的强迫性骚扰/威胁,那么一旦有联系的通信发生,它就会呈现出新的犯罪维度。新的犯罪形式,如网络跟踪、网络欺凌和爱情诈骗,现在已经进入了我们的日常生活。本文探讨了网络跟踪。
{"title":"Cyberstalking","authors":"E. Huber, R. Brandtweiner","doi":"10.4018/978-1-5225-9715-5.ch043","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch043","url":null,"abstract":"The phenomenon of stalking itself is as old as humankind itself. The past years and the expansion of digitalization have put the crime of stalking in a new light. A representative study from the USA shows that one in four Americans has already been “harassed” online. If stalking in the traditional sense (also known as offline stalking or classic stalking) is described as obsessive harassment/threat over a longer period, it takes on a new criminal dimension as soon as connected communication takes place. New forms of crime such as cyberstalking, cyberbullying, and romance scams have now reached our everyday lives. This article explores cyberstalking.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"47 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Machine Learning and Cyber Security 机器学习和网络安全
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch070
V. Mkrttchian, Sergey Kanarev, L. Gamidullaeva
Cybersecurity has become an important subject of national, international, economic, and social importance that affects multiple nations. The literature review of known sources is forming theoretical bases of calculations on Sleptsov networks. The universal network of Sleptsov is a prototype of the Sleptsov network processor. The authors in the article research the emerging trends and theoretical perspectives of cyber security development using machine-learning technique with avatar-based management at the platform of Sleptsov net-processor and propose further prospects for development of hyper-computation.
网络安全已成为影响多个国家的国家、国际、经济和社会重要性的重要课题。对已知来源的文献综述形成了对Sleptsov网络进行计算的理论基础。Sleptsov通用网络是Sleptsov网络处理器的原型。本文在Sleptsov net-processor平台上,研究了基于虚拟管理的机器学习技术在网络安全发展中的新趋势和理论前景,并提出了超计算的进一步发展前景。
{"title":"Machine Learning and Cyber Security","authors":"V. Mkrttchian, Sergey Kanarev, L. Gamidullaeva","doi":"10.4018/978-1-5225-9715-5.ch070","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch070","url":null,"abstract":"Cybersecurity has become an important subject of national, international, economic, and social importance that affects multiple nations. The literature review of known sources is forming theoretical bases of calculations on Sleptsov networks. The universal network of Sleptsov is a prototype of the Sleptsov network processor. The authors in the article research the emerging trends and theoretical perspectives of cyber security development using machine-learning technique with avatar-based management at the platform of Sleptsov net-processor and propose further prospects for development of hyper-computation.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115892169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Dark Side of Engaging With Social Networking Sites (SNS) 社交网站的黑暗面
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch042
Eileen O'Donnell, Liam O'Donnell
Although social networking sites (SNS) may have some positive aspects, for example, connecting family members and friends who no longer live close enough to each other to meet in person, or for connecting people with similar health conditions who may need the support of others who understand and can manage the condition, or for groups of people with similar interests to engage and plan events and activities, there are also some possible negative aspects of engaging with SNS, for example, addiction or addictive behaviour, child pornography, cyberbullying, fake news, fear of missing out (FOMO), social comparisons, stalking, amongst many others, which can all lead to neglect of other duties, sleep deprivation, loneliness, isolation, depression, and so forth. The possible negative effects of engaging with SNS on the surface web will perhaps be also relevant to users of the deep and dark web. This article explores the dark side of social networking sites.
虽然社交网站(SNS)可能有一些积极的方面,例如,连接不再住得很近的家庭成员和朋友,以便亲自见面,或者连接具有类似健康状况的人,他们可能需要了解并能够控制病情的其他人的支持,或者为具有相似兴趣的人群提供参与和计划事件和活动,但使用社交网站也可能有一些消极的方面,例如,成瘾或成瘾行为、儿童色情、网络欺凌、假新闻、害怕错过(FOMO)、社会攀比、跟踪,等等,这些都可能导致忽视其他职责、睡眠剥夺、孤独、孤立、抑郁等等。在表层网络上使用社交网络可能产生的负面影响或许也与深层网络和暗网的用户有关。本文探讨了社交网站的阴暗面。
{"title":"The Dark Side of Engaging With Social Networking Sites (SNS)","authors":"Eileen O'Donnell, Liam O'Donnell","doi":"10.4018/978-1-5225-9715-5.ch042","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch042","url":null,"abstract":"Although social networking sites (SNS) may have some positive aspects, for example, connecting family members and friends who no longer live close enough to each other to meet in person, or for connecting people with similar health conditions who may need the support of others who understand and can manage the condition, or for groups of people with similar interests to engage and plan events and activities, there are also some possible negative aspects of engaging with SNS, for example, addiction or addictive behaviour, child pornography, cyberbullying, fake news, fear of missing out (FOMO), social comparisons, stalking, amongst many others, which can all lead to neglect of other duties, sleep deprivation, loneliness, isolation, depression, and so forth. The possible negative effects of engaging with SNS on the surface web will perhaps be also relevant to users of the deep and dark web. This article explores the dark side of social networking sites.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117167458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dark Web 黑暗的网络
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch010
Punam Bedi, Neha Gupta, Dr Vinita Jindal
The World Wide Web is a part of the Internet that provides data dissemination facility to people. The contents of the Web are crawled and indexed by search engines so that they can be retrieved, ranked, and displayed as a result of users' search queries. These contents that can be easily retrieved using Web browsers and search engines comprise the Surface Web. All information that cannot be crawled by search engines' crawlers falls under Deep Web. Deep Web content never appears in the results displayed by search engines. Though this part of the Web remains hidden, it can be reached using targeted search over normal Web browsers. Unlike Deep Web, there exists a portion of the World Wide Web that cannot be accessed without special software. This is known as the Dark Web. This chapter describes how the Dark Web differs from the Deep Web and elaborates on the commonly used software to enter the Dark Web. It highlights the illegitimate and legitimate sides of the Dark Web and specifies the role played by cryptocurrencies in the expansion of Dark Web's user base.
万维网是因特网的一部分,为人们提供数据传播设施。Web的内容由搜索引擎抓取和索引,以便它们可以作为用户搜索查询的结果进行检索、排序和显示。这些可以通过Web浏览器和搜索引擎轻松检索的内容组成了Surface Web。所有不能被搜索引擎抓取的信息都属于深网。深层网络内容永远不会出现在搜索引擎显示的结果中。虽然Web的这一部分仍然是隐藏的,但可以通过普通Web浏览器使用目标搜索来访问它。与深网不同的是,万维网的一部分没有特殊的软件是无法访问的。这就是所谓的暗网。本章描述了暗网与深网的区别,并详细介绍了进入暗网的常用软件。它强调了暗网的非法和合法的方面,并详细说明了加密货币在暗网用户群扩张中所扮演的角色。
{"title":"Dark Web","authors":"Punam Bedi, Neha Gupta, Dr Vinita Jindal","doi":"10.4018/978-1-5225-9715-5.ch010","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch010","url":null,"abstract":"The World Wide Web is a part of the Internet that provides data dissemination facility to people. The contents of the Web are crawled and indexed by search engines so that they can be retrieved, ranked, and displayed as a result of users' search queries. These contents that can be easily retrieved using Web browsers and search engines comprise the Surface Web. All information that cannot be crawled by search engines' crawlers falls under Deep Web. Deep Web content never appears in the results displayed by search engines. Though this part of the Web remains hidden, it can be reached using targeted search over normal Web browsers. Unlike Deep Web, there exists a portion of the World Wide Web that cannot be accessed without special software. This is known as the Dark Web. This chapter describes how the Dark Web differs from the Deep Web and elaborates on the commonly used software to enter the Dark Web. It highlights the illegitimate and legitimate sides of the Dark Web and specifies the role played by cryptocurrencies in the expansion of Dark Web's user base.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131200898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Drug Trafficking 毒品走私
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch032
P. Kaur, P. Kaushal
In an increasingly intrusive era, the deep web is considered to be a bastion of privacy, while for others it is one of the most evil places to exist. The deep web is a part of the world wide web that cannot be readily accessed by conventional search engines, and a small part of it forms the dark web. The enshrouded nature and complex methodology required for access have made dark web a platform for carrying out numerous illicit activities, one of them being drug trafficking. This article explores how deep web and dark web operate, the trade of illegal drugs online in so-called cryptomarkets or dark net markets, the foundation and shut-down of Silk Road, the new cryptomarkets that popped up to take its place, the use of ‘the onion router' or TOR browser in this anonymous sale and purchase of illegal drugs, the role of encryption and cryptocurrencies, the existing and suggested tactics of the law enforcement to prevent internet-facilitated drug trafficking, and the future research areas.
在一个侵入性越来越强的时代,深网被认为是隐私的堡垒,而对其他人来说,它是最邪恶的地方之一。深网是万维网的一部分,传统的搜索引擎无法轻易访问,其中的一小部分形成了暗网。暗网的隐蔽性和访问所需的复杂方法使其成为进行许多非法活动的平台,其中之一就是贩毒。本文探究深层网络和黑暗的web操作,非法毒品贸易的所谓cryptomarkets或黑暗中在线网络市场,丝绸之路的基础和关闭弹出的新cryptomarkets取代了其位置,使用“洋葱路由器”或TOR浏览器在这个匿名买卖毒品,加密和cryptocurrencies的作用,现有的执法和建议策略防止internet-facilitated贩毒,以及未来的研究方向。
{"title":"Drug Trafficking","authors":"P. Kaur, P. Kaushal","doi":"10.4018/978-1-5225-9715-5.ch032","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch032","url":null,"abstract":"In an increasingly intrusive era, the deep web is considered to be a bastion of privacy, while for others it is one of the most evil places to exist. The deep web is a part of the world wide web that cannot be readily accessed by conventional search engines, and a small part of it forms the dark web. The enshrouded nature and complex methodology required for access have made dark web a platform for carrying out numerous illicit activities, one of them being drug trafficking. This article explores how deep web and dark web operate, the trade of illegal drugs online in so-called cryptomarkets or dark net markets, the foundation and shut-down of Silk Road, the new cryptomarkets that popped up to take its place, the use of ‘the onion router' or TOR browser in this anonymous sale and purchase of illegal drugs, the role of encryption and cryptocurrencies, the existing and suggested tactics of the law enforcement to prevent internet-facilitated drug trafficking, and the future research areas.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberbullying in the Workplace 工作场所的网络欺凌
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch047
Shalini Ramdeo, Riann Singh
The information and communication technology revolution has altered the way businesses operate. The internet has increased employees' interconnectedness beyond the traditional ‘brick and mortar' workplace through virtual work platforms. However, the blurring of boundaries between work and personal spaces have created a potential threat for the proliferation of workplace cyberbullying. Cyberbullying is not restrained by time, tools, or location, as ‘work' is no longer a well-defined activity. Cyberbullying discussions have been generating research interests among researchers and practitioners for over the past decade, with pioneering studies exploring its conceptualization, prevalence, and consequences, but it is still at an embryotic stage. This article considers the unique aspects of workplace bullying and cyberbullying for policy development and effective management as concise differentiations would allow targets to identify and determine the nature of the behaviours. Possible recommendations and solutions are also advanced, with areas for future research identified.
信息和通信技术革命改变了企业的运作方式。互联网通过虚拟工作平台增加了员工的相互联系,超越了传统的“实体”工作场所。然而,工作和个人空间之间界限的模糊为工作场所网络欺凌的扩散创造了潜在的威胁。网络欺凌不受时间、工具或地点的限制,因为“工作”不再是一种定义明确的活动。在过去的十年里,网络欺凌的讨论已经引起了研究人员和实践者的研究兴趣,开创性的研究探索了它的概念化、流行程度和后果,但它仍处于萌芽阶段。本文考虑了工作场所欺凌和网络欺凌的独特方面,以制定政策和有效管理,因为简明的区分将使目标能够识别和确定行为的性质。还提出了可能的建议和解决办法,并确定了未来研究的领域。
{"title":"Cyberbullying in the Workplace","authors":"Shalini Ramdeo, Riann Singh","doi":"10.4018/978-1-5225-9715-5.ch047","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch047","url":null,"abstract":"The information and communication technology revolution has altered the way businesses operate. The internet has increased employees' interconnectedness beyond the traditional ‘brick and mortar' workplace through virtual work platforms. However, the blurring of boundaries between work and personal spaces have created a potential threat for the proliferation of workplace cyberbullying. Cyberbullying is not restrained by time, tools, or location, as ‘work' is no longer a well-defined activity. Cyberbullying discussions have been generating research interests among researchers and practitioners for over the past decade, with pioneering studies exploring its conceptualization, prevalence, and consequences, but it is still at an embryotic stage. This article considers the unique aspects of workplace bullying and cyberbullying for policy development and effective management as concise differentiations would allow targets to identify and determine the nature of the behaviours. Possible recommendations and solutions are also advanced, with areas for future research identified.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Dark Web 暗网
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch008
R. Elangovan
The deep web (also called deepnet, the invisible web, dark web, or the hidden web) refers to world wide web content that is not part of the surface web, which is indexed by standard search engines. The more familiar “surface” web contains only a small fraction of the information available on the internet. The deep web contains much of the valuable data on the web, but is largely invisible to standard web crawling techniques. Besides it being the huge source of information, it also provides the rostrum for cybercrime like by providing download links for movies, music, games, etc. without having their copyrights. This article aims to provide context and policy recommendations pertaining to the dark web. The dark web's complete history, from its creation to the latest incidents and the way to access and their sub forums are briefly discussed with respective to the user perspective.
深网(也称为deepnet、隐形网、暗网或隐藏网)是指不属于表层网的万维网内容,由标准搜索引擎索引。更熟悉的“表面”网络只包含互联网上可用信息的一小部分。深网包含了网络上大量有价值的数据,但标准的网络爬行技术在很大程度上是不可见的。除了它是巨大的信息来源,它也为网络犯罪提供了讲坛,比如通过提供电影、音乐、游戏等的下载链接而没有版权。本文旨在提供有关暗网的背景和政策建议。暗网的完整历史,从它的创建到最新的事件和方式访问和他们的子论坛简要地讨论了各自的用户角度。
{"title":"The Dark Web","authors":"R. Elangovan","doi":"10.4018/978-1-5225-9715-5.ch008","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch008","url":null,"abstract":"The deep web (also called deepnet, the invisible web, dark web, or the hidden web) refers to world wide web content that is not part of the surface web, which is indexed by standard search engines. The more familiar “surface” web contains only a small fraction of the information available on the internet. The deep web contains much of the valuable data on the web, but is largely invisible to standard web crawling techniques. Besides it being the huge source of information, it also provides the rostrum for cybercrime like by providing download links for movies, music, games, etc. without having their copyrights. This article aims to provide context and policy recommendations pertaining to the dark web. The dark web's complete history, from its creation to the latest incidents and the way to access and their sub forums are briefly discussed with respective to the user perspective.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"65 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133466822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Legislation 网络安全立法
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch027
C. Anglim
This entry discusses the role of legislation governing cybersecurity and how this legislation seeks to control criminal activity on the dark web. As explained throughout this encyclopedia, the dark web consists of internet services that are accessible anonymously using “the onion router” (TOR). There has been a concentrated effort in recent years for federal legislation in the United States to be enacted to control the widespread criminal behavior that occurs on the dark web, which includes the sale of drugs, illegal weapons, and child pornography. Legislation, as the term is used in this work, refers to law enacted by a legislative body such as the US Congress. The article considers both existing relevant statutory law and proposed legislation on the local, state/provincial, and federal/national level. The focus will be on US federal legislation; however, the article will also consider US state and local legislation, the legislation from other nations, and international legislation.
本条目讨论了管理网络安全的立法的作用,以及该立法如何寻求控制暗网上的犯罪活动。正如这本百科全书所解释的那样,暗网由互联网服务组成,这些服务可以通过“洋葱路由器”(TOR)匿名访问。近年来,美国一直在努力通过联邦立法来控制暗网上广泛发生的犯罪行为,其中包括销售毒品、非法武器和儿童色情制品。立法,正如本书中使用的术语,是指由立法机构(如美国国会)制定的法律。本文考虑了现有的相关成文法和地方、州/省、联邦/国家层面的拟议立法。重点将放在美国联邦立法上;然而,文章也将考虑美国的州和地方立法,其他国家的立法,以及国际立法。
{"title":"Cybersecurity Legislation","authors":"C. Anglim","doi":"10.4018/978-1-5225-9715-5.ch027","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch027","url":null,"abstract":"This entry discusses the role of legislation governing cybersecurity and how this legislation seeks to control criminal activity on the dark web. As explained throughout this encyclopedia, the dark web consists of internet services that are accessible anonymously using “the onion router” (TOR). There has been a concentrated effort in recent years for federal legislation in the United States to be enacted to control the widespread criminal behavior that occurs on the dark web, which includes the sale of drugs, illegal weapons, and child pornography. Legislation, as the term is used in this work, refers to law enacted by a legislative body such as the US Congress. The article considers both existing relevant statutory law and proposed legislation on the local, state/provincial, and federal/national level. The focus will be on US federal legislation; however, the article will also consider US state and local legislation, the legislation from other nations, and international legislation.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125681137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Encyclopedia of Criminal Activities and the Deep Web
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1