Encyclopedia of Criminal Activities and the Deep Web (3 Volumes)

Encyclopedia of Criminal Activities and the Deep Web (3 Volumes)

Release Date: February, 2020|Copyright: © 2020 |Pages: 1162
DOI: 10.4018/978-1-5225-9715-5
ISBN13: 9781522597155|ISBN10: 1522597158|EISBN13: 9781522597162
Hardcover:
Available
$2,695.00
TOTAL SAVINGS: $2,695.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$2,695.00
TOTAL SAVINGS: $2,695.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$2,695.00
TOTAL SAVINGS: $2,695.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$2,695.00
TOTAL SAVINGS: $2,695.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$3,265.00
TOTAL SAVINGS: $3,265.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$3,265.00
TOTAL SAVINGS: $3,265.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$1,500.00
TOTAL SAVINGS: $1,500.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

As society continues to rely heavily on technological tools for facilitating business, e-commerce, banking, and communication, among other applications, there has been a significant rise in criminals seeking to exploit these tools for their nefarious gain. Countries all over the world are seeing substantial increases in identity theft and cyberattacks, as well as illicit transactions, including drug trafficking and human trafficking, being made through the dark web internet. Sex offenders and murderers explore unconventional methods of finding and contacting their victims through Facebook, Instagram, popular dating sites, etc., while pedophiles rely on these channels to obtain information and photographs of children, which are shared on hidden community sites. As criminals continue to harness technological advancements that are outpacing legal and ethical standards, law enforcement and government officials are faced with the challenge of devising new and alternative strategies to identify and apprehend criminals to preserve the safety of society.

The Encyclopedia of Criminal Activities and the Deep Web is a three-volume set that includes comprehensive articles covering multidisciplinary research and expert insights provided by hundreds of leading researchers from 30 countries including the United States, the United Kingdom, Australia, New Zealand, Germany, Finland, South Korea, Malaysia, and more. This comprehensive encyclopedia provides the most diverse findings and new methodologies for monitoring and regulating the use of online tools as well as hidden areas of the internet, including the deep and dark web. Highlighting a wide range of topics such as cyberbullying, online hate speech, and hacktivism, this book will offer strategies for the prediction and prevention of online criminal activity and examine methods for safeguarding internet users and their data from being tracked or stalked. Due to the techniques and extensive knowledge discussed in this publication it is an invaluable addition for academic and corporate libraries as well as a critical resource for policy makers, law enforcement officials, forensic scientists, criminologists, sociologists, victim advocates, cybersecurity analysts, lawmakers, government officials, industry professionals, academicians, researchers, and students within this field of study.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Artificial Intelligence
  • Biometric System
  • Bitcoin
  • Blockchain
  • Botnet
  • Child Exploitation
  • Criminology
  • Cyber Abuse
  • Cyber Aggression
  • Cyber Buffer Zones
  • Cyber Espionage
  • Cyber Laws
  • Cyberbullying
  • Cybercrime
  • Cybersecurity
  • Cybersecurity Legislation
  • Cyberwarfare
  • Dark Web
  • Darknet
  • Data Privacy
  • Data Protection
  • Drug Trafficking
  • E-Banking Security
  • Email Spam
  • E-Marketing
  • Ethics
  • Fake News
  • File Sharing
  • Fraud
  • Gaming
  • Hacktivism
  • Hate Crimes
  • Human Behavior
  • Human Trafficking
  • Human-Based Cyber Defense
  • Identity Theft
  • Internet of Things
  • Internet Privacy
  • Internet Regulations
  • Machine Learning
  • Online Activism
  • Sex Trafficking
  • Smart Contracts
  • Social Engineering
  • Whistleblowers
Reviews & Statements

The articles in this book have successfully illustrated the deficiencies of technologies and how cybercriminals exploit the vulnerabilities. The book is presented in an encyclopedia-like structure so that readers can review the cybercrimes systematically conducted on the invisible webs and the human responsibility in using the Internet. I strongly recommend this book to cyberusers, policymakers, lawmakers, and technology developers.

– Prof. Arthur So, School of Electrical Engineering and Computer Science (EECS), University of Ottawa, Canada

I highly recommend this book to researchers who plans to have a broader overview about cybercrime and the various subtopics, such as technology, regulations and human interactions. This book can be a good starting point to see different perspectives and to have a bigger picture about the dynamics of cybercrime issues.

– Tawei Wang, DePaul University

The Encyclopedia of Criminal Activities and the Deep Web is a fascinating glimpse into the darkest recesses of the internet and will certainly be of interest to anyone--educators, researchers, policymakers, and the public--who seeks a deeper understanding of the online technologies on which we all depend.

– Jennifer Bartlett, Online Searcher, University of Kentucky, USA

Presently, cybersecurity is being seen as an integral part of national security and countries are creating their own "cyber armies" to deal with such attacks. The increasing reliance of commercial businesses and other enterprises on cyber technologies, including interconnected networks and remote access, creates new and expanding vulnerabilities that technically-savvy extremists will exploit - India will not be an exception. Online propaganda that targets Indian interests has become more prevalent since the beginning of 2020. Like in Kashmir, Internet blockades and ‘downgrades’ from 4G to 2G i.e. slower internet access has not been able to stop the extremist propaganda posted by militant groups on Telegram, Twitter, Facebook, WhatsApp, etc.

In view of countering "cyberextremism" and the terror threats posed thereof, initiatives taken up by the Government of India in the last five years include Indian Cyber Crime Coordination Centre (I4C), National Cyber Crime Reporting Portal, Cyber Swachhta Kendra, pushing for Cyber Security Research and Development Centre of India along with National Intelligence Grid (NATGRID) in addition to the National Cyber Security Policy 2013.

The modern world cannot be free from cyberspace. Cyberspace is growing every day - India holds a prime position. With broadband traffic increasing day by day, I strongly feel a uniform cyber law at the national and international level is the need of the hour.

– Prof. Sovik Mukherjee, St. Xavier's University, India

The cybersecurity field is always under pressure of all the malicious users or entities that grow over the internet. After the big pressure during the pandemic, there was a strong motivation for attacking users and companies. The cyberattacks, particularly against individuals, show better results. Many users now have more security literacy after all the past incidents. The good news is that companies and individuals now have a focus on security. Cybersecurity is a growing research topic. With the pressure of cybercrime and the fast implementation of new technologies such as IoT – the security challenges are always a concern. Artificial intelligence will play an important role in auditing and as an active tool to block malicious activities. The user security awareness is of extreme relevance. To quickly identify the risk and implement, at least, elementary procedures is the key to avoid security menaces.

– Prof. Justino Lourenço, Polytechnic Institute of Gaya, Portugal

Cybersecurity is even more of a critical issue in the current environment, as ever before. Behavioural aspects relating to cybersecurity risks including vulnerability and lack of knowledge/understanding of cybersecurity risks are examples of human and social factors which need to be addressed, in addition to technological considerations. This volume provides a multiple array of approaches to Cybersecurity and thus serves as a valuable source of reference.

– Prof. Tehmina Khan, RMIT University, Australia
Table of Contents
Search this Book:
Reset
Media
Related Blog Posts:
Cyber Attacks Just Keep Coming!
High-Tech Societies Benefit from Internet-Connected Technologies, but are Susceptible to Infiltration. Read Full Article
What Lies Under the Surface? Real-Life Impacts of the Deep Web
What are the real-life impacts of the deep web, and what can be done to prevent cybercrime? Read Full Article
Editor/Author Biographies
Mehdi Khosrow-Pour, D.B.A., received his Doctorate in Business Administration from the Nova Southeastern University (Florida, USA). Dr. Khosrow-Pour taught undergraduate and graduate information system courses at the Pennsylvania State University – Harrisburg for almost 20 years. He is currently Executive Editor at IGI Global (www.igi-global.com). He also serves as Executive Director of the Information Resources Management Association (IRMA) (www.irma-international.org) and Executive Director of the World Forgotten Children Foundation (www.worldforgottenchildren.org). He is the author/editor of more than 100 books in information technology management. He is also currently the Editor-in-Chief of the International Journal of E-Politics (IJEP) and the International Journal of Semiotics and Visual Rhetoric (IJSVR), and is also the founding Editor-in-Chief of the Information Resources Management Journal (IRMJ), Journal of Electronic Commerce in Organizations (JECO), Journal of Cases on Information Technology (JCIT), and the Journal of Information Technology Research (JITR), and has authored more than 50 articles published in various conference proceedings and scholarly journals.
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.