Encyclopedia of Criminal Activities and the Deep Web

Editor/Author Khosrow-Pour, Mehdi
Publication Year: 2020
Publisher: IGI Global

Single-User Purchase Price: $2450.00
Unlimited-User Purchase Price: $3675.00
ISBN: 978-1-5225-9715-5
Category: Social Sciences - Criminology & Law
Image Count: 110
Book Status: Available
Table of Contents

This comprehensive encyclopedia provides the most diverse findings and new methodologies for monitoring and regulating the use of online tools as well as hidden areas of the internet, including the deep and dark web.

Share this

Table of Contents

    • Preface
    • Section 1: Cybercriminal Profiles, Understanding Cybercrime, and the Realities of the Dark Web
    • Chapter 1: Cybercrime
    • Chapter 2: A Survey on Emerging Cyber Crimes and Their Impact Worldwide
    • Chapter 3: Artificial Intelligence-Based Cybercrime
    • Chapter 4: Crime-Fake News Nexus
    • Chapter 5: Unveiling Cybercrime in a Developing Country
    • Chapter 6: Left-Wing Extremism From the Indian Perspective: An Econometric Interpretation
    • Chapter 7: Transnational Cybercrime: The Dark Web
    • Chapter 8: The Dark Web: Hidden Access to Internet Today
    • Chapter 9: Privacy, Ethics, and the Dark Web
    • Chapter 10: Dark Web: A Boon or a Bane
    • Chapter 11: File-Sharing and the Darknet
    • Chapter 12: Academic Integrity of Global Digital Masked Bandits Lurking the Deep and Dark Web
    • Chapter 13: Modus Operandi in Cybercrime
    • Chapter 14: Necessity of Paradigm Shift in Criminological Theorizing
    • Chapter 15: Development of Crime Sociology From Bureaucratic Iron Cage to Digital Determination
    • Section 2: Cyberwarfare, Cybersecurity, Spyware, and Regulatory Policies and Solutions
    • Chapter 16: The Globalization of Hybrid Warfare and the Need for Plausible Deniability
    • Chapter 17: The Spy Who Never Has to Go Out Into the Cold Cyber Espionage
    • Chapter 18: Grey Zone Conflicts in Cyber Domain: Nonlocality of Political Reality in the World of “Hyperobjects”
    • Chapter 19: Developing Cyber Buffer Zones
    • Chapter 20: The Management of Whistleblowing
    • Chapter 21: Whistleblowing to Expose Criminal Activity in the Health Sector
    • Chapter 22: Online Activism to Cybercrime
    • Chapter 23: Hacktivism and Alternative Journalism: The Case of the French YouTube Channel Thinkerview
    • Chapter 24: Drifting on the Web
    • Chapter 25: Cyber Crime Regulation, Challenges, and Response
    • Chapter 26: Regulating the Internet
    • Chapter 27: Cybersecurity Legislation
    • Chapter 28: International Context of Cybercrime and Cyber Law
    • Chapter 29: International Cooperation and Legal Response to Cybercrime in Pakistan
    • Chapter 30: Cybersecurity Laws in Malaysia
    • Chapter 31: Game Console Protection and Breaking It
    • Section 3: Drug Trafficking, Human Trafficking, and the Sexual Exploitation of Children
    • Chapter 32: Drug Trafficking
    • Chapter 33: Domain-Specific Search Engines for Investigating Human Trafficking and Other Illicit Activities
    • Chapter 34: Identifying Victims of Human Sex Trafficking in Online Ads
    • Chapter 35: Human Trafficking and Cyber Laws in Malaysia
    • Chapter 36: Web-Based Child Sexual Exploitation
    • Chapter 37: Using Luring Communication Theory to Analyze the Behavior of Online Sexual Offenders
    • Chapter 38: ICTs and Sexual Exploitation of Children in Europe
    • Chapter 39: Regulating Misandry: Expanding the Protection Against Online Hate Speech
    • Chapter 40: Online Hate Crimes Against Women (CYBER VAWG)
    • Chapter 41: Intimate Partner Cyber Abuse Viewed Through the Lens of Criminology
    • Chapter 42: The Dark Side of Engaging With Social Networking Sites (SNS)
    • Chapter 43: Cyberstalking: The New Threat on the Internet
    • Chapter 44: The Nature of Cyberbullying Among Youths
    • Chapter 45: Internet “Death Groups” in the Online Culture
    • Chapter 46: Tech That, Bully! Defeating Cyberbullying With Its Own Weapons
    • Chapter 47: Cyberbullying in the Workplace
    • Chapter 48: Cyber Crime Against Women and Girls on Social Sites in Bangladesh
    • Section 4: Financial Fraud, Identity Theft, and Social Manipulation Through Social Media
    • Chapter 49: Internet Privacy
    • Chapter 50: Societal Safety and Preservation in the Digital Era
    • Chapter 51: Privacy and Security Challenges in the Internet of Things
    • Chapter 52: Cybercrime and Private Health Data: Review, Current Developments, and Future Trends
    • Chapter 53: The Emerging Threats of Web Scrapping to Web Applications Security and Their Defense Mechanism
    • Chapter 54: Social Engineering Using Social Networking Sites
    • Chapter 55: Social Media and Identity Theft Implications on Nigerian Victims and International Economy
    • Chapter 56: Online Phishing and Solutions
    • Chapter 57: Crime Hidden in Email Spam
    • Chapter 58: Classification of Spamming Attacks to Blogging Websites and Their Security Techniques
    • Chapter 59: Cybercrime in Online Gaming
    • Chapter 60: E-Banking Security: Threats, Challenges, Solutions, and Trends
    • Chapter 61: E-Banking Frauds: The Current Scenario and Security Techniques
    • Chapter 62: Tackle the Smart Contract Vulnerabilities
    • Chapter 63: The Challenges and Future of E-Wallet
    • Chapter 64: Preliminary Insights Into the Adoption of Bitcoin in a Developing Economy: The Case of Ghana
    • Section 5: Security Tools and Solutions, Human-Based Cyber Defense, and the Social Understanding of Threats
    • Chapter 65: The Importance of the Human-Centric Approach in Combating Cyber Threats
    • Chapter 66: Understanding the Relationship Between Cybercrime and Human Behavior Through Criminological Theories and Social Networking Sites
    • Chapter 67: Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime
    • Chapter 68: Leveraging on Digital Footprints to Identify Potential Security Threats: Insights From the Behavioural Sciences Perspective
    • Chapter 69: Investigating Cybercrime in Nigeria
    • Chapter 70: Machine Learning and Cyber Security: Future Potential of the Research
    • Chapter 71: Perspective Tools to Improve Machine Learning Applications for Cyber Security
    • Chapter 72: An Overview (and Criticism) of Methods to Detect Fake Content Online
    • Chapter 73: Crookies: Tampering With Cookies to Defraud E-Marketing
    • Chapter 74: Crime Identification Using Traffic Analysis of HTTP Botnet
    • Chapter 75: Hybrid Artificially Intelligent Multi-Layer Blockchain and Bitcoin Cryptology (AI-MLBBC): Anti-Crime-Theft Smart Wall Defense
    • Chapter 76: An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves
    • Chapter 77: Efficiency Issues and Improving Implementation of Keystroke Biometric Systems
    • Chapter 78: Modern Blue Pills and Red Pills
    • Chapter 79: Arm Hypervisor and Trustzone Alternatives