scholarly journals Review on Dark Web and Its Impact on Internet Governance

2021 ◽  
Vol 8 (2) ◽  
pp. 13-23
Author(s):  
Diviya Shini Rajamanickam ◽  
Mohamad Fadli Zolkipli

Cyber attackers use the Dark Web, a collection of facilities that are not visible to search engines and normal users, to explore a variety of illegal products and services. In this paper, the Dark Web and its impact on internet governance were analyzed. The findings of a review of the literature provide in-depth knowledge on the increasing number of crimes committed on the Dark Web, considering the economic, social, along ethical consequences of cybercrime on the Dark Web, as well as analyzing the consequences and methods for locating the criminals, as well as their drawbacks. Fraudsters, militants, and government-sponsored secret agents used the Dark Web where is among the most popular difficult together with unidentifiable channels to achieve their illicit goals. Crimes that were committed on the Dark Web are similar to criminal offenses committed in the real world. Nevertheless, the sheer size of the Dark Web, the unpredictability of the ecosystem, as well as the privacy and confidentiality afforded by Dark Web services, were also critical challenges in tracing criminals. Measuring the yachting Dark Web crime risks is a critical step in discovering alternative approaches to cybercrime. The study reveals that Dark Web services are available to arrest criminals, as well as digital facts and evidence, should be analyzed and applied in a way that allows Internet Governance.

2014 ◽  
Vol 17 (6) ◽  
pp. 1301-1311 ◽  
Author(s):  
Hala S. Own ◽  
Hamdi Yahyaoui
Keyword(s):  

1996 ◽  
Vol 4 (2) ◽  
pp. 79-150 ◽  
Author(s):  
C. Hale

The literature on fear of crime has grown rapidly in the last three decades. This paper examines the reasons for this growth and attempts to put some structure on the work to date. The inadequacies of measures of fear of crime are discussed and alternative approaches suggested. Alternative explanatory theories are compared and strategies for reducing fear reviewed.


Author(s):  
Hüseyin Tolu

Racism is one of the oldest, most oppressive issues along with other extreme forms of social communications. Nevertheless, the internet has already led to the opportunity of cyber-racism that occurs more surreptitiously and aggressively than before. This study commences by unravelling the abstractions of conventional-racism and cyber-racism, and it introduces the global stakeholders' approaches and counter measures, in particular the EU and the USA and their regulated and non-regulated practices to combat cyber-racism. This paper shall then bring forward informative argumentations on how the stakeholders' perspectives on cyber-racism can be scrutinised by focusing on both values of being human (individualism) and a reconciled global-society (cosmopolitanism) towards contemporary debates in the sociology of education and technology. In this conceptual thinking, even though hate-mongers are using internet technology to spread their hatred what is the acceptable action for us to do in the subject of internet governance?


Author(s):  
Andrew Murray

This chapter examines whether the actions of individuals in the digital environment could be regulated. It first considers John Perry Barlow’s 1996 publication of his Declaration of Independence for Cyberspace, in which he asserts that cyberspace was a separate sovereign space where real-world laws and real-world governments were of little or no effect. Barlow’s forceful challenge to lawmakers and law enforcement bodies gave rise to a school of thought known as cyberlibertarianism. The chapter compares cyberlibertarianism with another school of thought called cyberpaternalism, which rejected the notion that cyberspace was immune from regulatory intervention by real-world regulators. It also explains Lawrence Lessig’s modalities of internet regulation, network communitarianism, private regulators of cyberspace, and states’ supranational regulation of cyberspace. The chapter goes on to examine contemporary theories of internet governance and regulation including libertarian paternalism, platform and intermediary regulation, and algorithmic regulation.


2008 ◽  
pp. 206-227
Author(s):  
Konstantin Beznosov

This chapter reports on our experience of designing and implementing an architecture for protecting enterprise-grade Web service applications hosted by ASP.NET. Security mechanisms of Microsoft ASP.NET container—a popular hosting environment for Web services—have limited scalability, flexibility, and extensibility. They are therefore inade-quate for hosting enterprise-scale applications that need to be protected according to diverse and/or complex application-specific security policies. To overcome the limitations of ASP.NET security, we developed a flexible and extensible protection architecture. Deployed in a real-world security solution at a financial organization, the architecture enables integra-tion of ASP.NET into the organizational security infrastructure with reduced effort on the part of Web Service developers. Throughout this report, we discuss our design decisions, suggest best practices for constructing flexible and extensible authentication and authoriza-tion logic for Web Services, and share lessons learned.


Author(s):  
Edward Mac Gillavry

The collection and dissemination of geographic information has long been the prerogative of national mapping agencies. Nowadays, location-aware mobile devices could potentially turn everyone into a mapmaker. Collaborative mapping is an initiative to collectively produce models of real-world locations online that people can then access and use to virtually annotate locations in space. This chapter describes the technical and social developments that underpin this revolution in mapmaking. It presents a framework for an alternative geographic information infrastructure that draws from collaborative mapping initiatives and builds on established Web technologies. Storing geographic information in machine-readable formats and exchanging geographic information through Web services, collaborative mapping may enable the “napsterisation” of geographic information, thus providing complementary and alternative geographic information from the products created by national mapping agencies.


Author(s):  
Dominique Guinard ◽  
Vlad Trifa ◽  
Patrik Spiess ◽  
Bettina Dober ◽  
Stamatis Karnouskos
Keyword(s):  

2019 ◽  
Vol 4 (3) ◽  
pp. p237
Author(s):  
Wesam B. Darawsheh ◽  
Sawsan Tabbaa

Implementation research (IR) is a non-traditional methodology of research that enables the examination of application of multiple interventions within the complexities of the real-world, and the generation of solutions for emergent needs, especially in countries of low-moderate income. Community-based rehabilitation (CBR) is an evolving field of practice that lacks research traditions. Evidence guiding the practice of healthcare professionals in CBR and supporting its implementation is fragmented. A review of the literature was conducted to identify research studies pertinent to the employment of IR in CBR. This paper demonstrates that the principles of IR resonate with the principles of inclusion, equality, empowerment and partnership of CBR. It also posits that IR can serve as a research tradition to underpin and guide the conduction of research studies in CBR, and to provide the necessary evidence to support its accountability.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Cornelia Brantner ◽  
Helena Stehle

In the digital age, calls for transparency and openness as well as for privacy and confidentiality prevail: Struggles for visibility occur simultaneously with conflicts regarding invisibility and hidden battles for power and privileges of interpretation. Concerns about a loss of digital self-determination exist, just like those regarding the “right to be forgotten” or the right to become invisible and unseen. While the idea of a “transparent user” – as the ultimate notion of (in)voluntary visibility – has caused a broad outcry in society and in scientific debates a few years ago (Palfrey & Gasser, 2008), the discussion has shifted toward considerations of Internet governance and regulation (Camenisch, Fischer-Hübner, & Hansen, 2015). Brighenti (2010, p. 109) has pointed out that visibility has long been one of the key aspects “associated with the public sphere” and that in today’s digitized publics, the “project of democracy can no longer be imagined without taking into account visibility and its outcomes” (Brighenti, 2010, p. 189). Visibility and invisibility, along with their societal outcomes, are increasingly being discussed and analyzed, as they are becoming important dimensions in the accurate description and explanation of digital communication.


Sign in / Sign up

Export Citation Format

Share Document