The dark side of the Internet: Attacks, costs and responses

2011 ◽  
Vol 36 (3) ◽  
pp. 675-705 ◽  
Author(s):  
Won Kim ◽  
Ok-Ran Jeong ◽  
Chulyun Kim ◽  
Jungmin So
Keyword(s):  
Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


2021 ◽  
Vol 29 (6) ◽  
pp. 0-0

The purpose of this study is to reveal the dark side the Internet and establish a hierarchical framework to provide its governance path based on users' negative psychology. However, this hierarchical framework must consider unnecessary attributes and the interrelationships between the aspects and the criteria. Hence, fuzzy set theory is used for screening out the unnecessary attributes, a decision-making and trial evaluation laboratory (DEMATEL) is proposed to manage the complex interrelationships among the aspects and attributes, and interpretive structural modeling (ISM) is used to divide the hierarchy and construct a hierarchical theoretical framework. The results show that: (1) the institutional system is the driver of Internet governance improvement (2) personal values are the last link in the governance process (3) the governance transition from institutional system to values must cross the barriers of ethics and technology. This paper proposes a more systematic and integrated hierarchical framework which provides theoretical guidance to govern the dark side of the Internet.


2016 ◽  
Vol 2016 (4) ◽  
pp. 237-254 ◽  
Author(s):  
Christoph Bösch ◽  
Benjamin Erb ◽  
Frank Kargl ◽  
Henning Kopp ◽  
Stefan Pfattheicher

Abstract Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue that understanding the “dark side”, namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from the Internet to the benefit of its users.


2021 ◽  
Vol 1 (71) ◽  
pp. 14-20
Author(s):  
O. Dvoryankin

The main purpose of this article is to study the main aspects concerning such segment of the modern Internet as the black side of the Internet-the DarkNet. The author analyzes the types, forms, features, positive and negative aspects of the Darknet, and also compares it with the open Internet. The characteristics of anonymity are investigated. In addition, the article clarifies the main points concerning the illegality of the use and negative features of the DarkNet and suggests ways of information security. 


Author(s):  
Tim Unwin

Technology is all too often seen as being inherently good, and there are powerful interests limiting the amount of attention paid to the darker side of ICTs and Internet access in particular. However, these darker aspects are crucial to understanding ICT4D, especially since they can more seriously impact the poor, both countries and people, than the rich. The following main challenges are covered in the chapter: privacy and security; the Surface Web and the Dark Web; cyber-security and resilience; negative aspects of the exploitation of Big Data and the abuse of people through social media; and the increasing dehumanization of people through the use of ICTs and the Internet of Things.


2018 ◽  
Vol 64 (004) ◽  
pp. 85-87
Author(s):  
Armen Oganesyan
Keyword(s):  

Author(s):  
Kaifeng Yang ◽  
Chengfu Zhang ◽  
Jun Tang

As Internet use increases rapidly in China, its governance implications have been debated among researchers. This chapter provides a brief discussion of the complex relationship between Chinese Internet use and Chinese governance regarding the development of the Internet infrastructure, the level and form of Internet use, the “dark” side of the Internet and its control, and the provision of electronic government services. We argue that Internet use in China has been shaped by China’s governance structure, but at the same time it is changing, albeit slowly, that structure.


2020 ◽  
Vol 22 (1) ◽  
pp. 151
Author(s):  
Jakub Jakubowski

The book takes a natural and necessary direction on the path to the modernization of the critical tradition, choosing Facebook, which has provided numerous reasons to be criticized by the author of this book, and by others. After a relatively long stage of cognitive optimism which prevailed in the discourse on the internet and democracy, this relationship has begun to be looked at with increasing caution and doubt (Loader & Mercea, 2011). With Brexit, Trump and several other ‘phenomena’ around the world, we have become disillusioned about the ability of the internet in its modern incarnation to help us rebuild a badly bruised democracy (Tucker et al., 2017). The book systematically identifies these illusions, accusing Facebook of exerting an adverse impact on social discussion, redistribution of goods, social relations and values, access to reliable information and so on. Using the concept of myth (cf. Barthes), the author argues that Facebook covertly constructs our vision of reality the same way television did in the past.


Sign in / Sign up

Export Citation Format

Share Document