Search results
1 – 10 of over 4000
The 'Dark Web'.
Details
DOI: 10.1108/OXAN-DB200500
ISSN: 2633-304X
Keywords
Geographic
Topical
Tomoko Kajiyama and Isao Echizen
The purpose of this paper is to propose an effective educational system to help students assess Web site risk by providing an environment in which students can better…
Abstract
Purpose
The purpose of this paper is to propose an effective educational system to help students assess Web site risk by providing an environment in which students can better understand a Web site’s features and determine the risks of accessing the Web site for themselves.
Design/methodology/approach
The authors have enhanced a prototype visualization system for helping students assess Web site features and use them to identify risky Web sites. The system was implemented with our graphical search interface for multi-attribute metadata called “Concentric Ring View” and was tested using 13,386 actual and dummy Web sites and 11 Web site attributes.
Findings
The testing revealed several distinguishing attributes of risky Web sites, including being related to “play”, having monotone colors, having many images, having many links and having many pages with much text in smaller font size. A usability test with 12 teenaged female students demonstrated that they could learn to identify some features of risky Web sites.
Originality/value
As students cannot live in a safe cyberspace environment forever, they should be taught how to identify risky Web sites. We proposed an educational system to help students assess Web site features and identify high-risk Web site and verified the effectiveness of this system.
Details
Keywords
The existence and continued growth of the invisible web creates a major challenge for search engines that are attempting to organize all of the material on the web into a…
Abstract
Purpose
The existence and continued growth of the invisible web creates a major challenge for search engines that are attempting to organize all of the material on the web into a form that is easily retrieved by all users. The purpose of this paper is to identify the challenges and problems underlying existing work in this area.
Design/methodology/approach
A discussion based on a short survey of prior work, including automated discovery of invisible web site search interfaces, automated classification of invisible web sites, label assignment and form filling, information extraction from the resulting pages, learning the query language of the search interface, building content summary for an invisible web site, selecting proper databases, integrating invisible web‐search interfaces, and accessing the performance of an invisible web site.
Findings
Existing technologies and tools for indexing the invisible web follow one of two strategies: indexing the web site interface or examining a portion of the contents of an invisible web site and indexing the results.
Originality/value
The paper is of value to those involved with information management.
Details
Keywords
This article examines the growth of the invisible Web, and efforts underway to make its contents more accessible. Dynamic Web publishing is described. The Open Archives…
Abstract
This article examines the growth of the invisible Web, and efforts underway to make its contents more accessible. Dynamic Web publishing is described. The Open Archives Metadata Harvesting Protocol is reviewed, as are projects related to OCLC’s implementation of the Open Archives Initiative. Recent Dublin Core activities are reported.
Details
Keywords
Dennis B. Desmond, David Lacey and Paul Salmon
The purpose of this paper is to present the findings from a literature review, which aimed to identify previous studies evaluating cryptolaundering from a systems thinking…
Abstract
Purpose
The purpose of this paper is to present the findings from a literature review, which aimed to identify previous studies evaluating cryptolaundering from a systems thinking perspective. The aim of this paper is to first confirm that cryptolaundering systems can indeed be defined as complex socio-technical systems and second to present the findings from a systematic review of the literature to determine the extent to which previous research has adopted a systems thinking perspective.
Design/methodology/approach
The study involved a SLR of studies published in the peer-reviewed literature between 2009 and 2018. Rasmussen’s risk management framework (Rasmussen, 1997) was used to evaluate the extent to which a systems thinking perspective had been adopted.
Findings
The cryptolaundering process is considered to be a complex socio-technical system. The review demonstrates that no previous studies have defined cryptolaundering as a complex socio-technical system or used systems thinking framework approach to evaluate how criminals, regulatory bodies or law enforcement entities understand processes and assess risk within cryptolaundering systems. It is argued that using such an approach to the cryptolaundering process would likely improve assessing criminal risk analyses of cryptolaundering and assist law enforcement and regulatory bodies with understanding risk management during the laundering of cryptocurrencies.
Originality/value
Future assessments of cryptolaundering using socio-technical system analytical processes may afford law enforcement and regulatory bodies the opportunity to improve intervention techniques and identify gaps in regulations and enforcement.
Details
Keywords
Mohd Yazid bin Zul Kepli and Sonny Zulhuda
This chapter attempts to clarify and describe the legal and regulatory framework for cryptocurrency with special focus on Malaysia and the threats that it poses from the…
Abstract
This chapter attempts to clarify and describe the legal and regulatory framework for cryptocurrency with special focus on Malaysia and the threats that it poses from the anti-money laundering perspective. Currently, very few countries have legislations that regulate cryptocurrency. Nonetheless, the crazy surge in prices (to more than 20-folds at some point) has sent both legitimate investors and criminals flocking to cryptocurrencies. This chapter analyses and compares the official reports from various governments, writings of government officials, experts and scholars in journals and newspapers, interviews and draws conclusions on the legal framework of cryptocurrency, and money laundering challenges. The study notes that the decision of the US regulators in allowing Bitcoin futures to trade on major exchanges to be one of the reasons behind the sudden surge. The study also finds that the South Korean regulators’ approach in banning its financial institutions from dealing with virtual currency is a positive one. The chapter stresses that it is not adequate for regulators to warn the public to act with extreme caution and increase their understanding on the risks they take on if they choose to invest in cryptocurrencies. Instead, it is necessary to have comprehensive international and national laws and regulations for the control and management of cryptocurrencies. In addition, the anti-money laundering legal framework must be improved to cater to the new threats posed by cryptocurrency.
Details