Search results
1 – 10 of over 1000Mohd Faizan, Raees Ahmad Khan and Alka Agrawal
Cryptomarkets on the dark web have emerged as a hub for the sale of illicit drugs. They have made it easier for the customers to get access to illicit drugs online while ensuring…
Abstract
Cryptomarkets on the dark web have emerged as a hub for the sale of illicit drugs. They have made it easier for the customers to get access to illicit drugs online while ensuring their anonymity. The easy availability of potentially harmful drugs has resulted in a significant impact on public health. Consequently, law enforcement agencies put a lot of effort and resources into shutting down online markets on the dark web. A lot of research work has also been conducted to understand the working of customers and vendors involved in the cryptomarkets that may help the law enforcement agencies. In this research, we present a ranking methodology to identify and rank top markets dealing in harmful illicit drugs. Using named entity recognition, a harm score of a drug market is calculated to indicate the degree of threat followed by the ranking of drug markets. The top-ranked markets are the ones selling the most harmful drugs. The rankings thus obtained can be helpful to law enforcement agencies by locating specific markets selling harmful illicit drugs and their further monitoring.
Details
Keywords
David A. Makin and Leanna Ireland
The purpose of this paper is to explore to what extent the legal environment influences a user’s choice to employ privacy-enhancing technologies (PETs). Drawing upon existing…
Abstract
Purpose
The purpose of this paper is to explore to what extent the legal environment influences a user’s choice to employ privacy-enhancing technologies (PETs). Drawing upon existing theoretical frames specific to arbitrariness and uncertainty, this research examines whether interest in PETs is influenced by the legal environment of a country.
Design/methodology/approach
Using data from Google Trends, the International Property Rights Index, Freedom House and the Organization for Economic Cooperation and Development, the research analyzes interest in Tor, VPN technology and pretty good privacy (PGP) in 153 countries between 2012 and 2016.
Findings
Findings suggest both countries with both higher and lower arbitrariness and uncertainty of law are associated with an increased interest in Tor and PGP. However, interest in VPN technology does not appear influenced by the legal environment and, instead, is influenced by freedom within the press.
Research limitations/implications
The dual use nature of Tor and PGP is influenced by law enforcement and judiciary effectiveness and transparency and arbitrariness contributing to the public’s interest in decentralized technological protections.
Practical implications
Law enforcement should continue to police via the technologies rather than shutting them down to protect the identities of those needing to use these technologies for legitimate purposes. Only by embracing the technologies, as opposed to seeing them as hurdles to be banned, may law enforcement agencies remain vigilant to the threats posted by nefarious actors.
Originality/value
In this study, the authors introduce a more robust measure of interest in PETs, and do so with a larger, more substantive sample. By situating this interest within the context of policing, the authors can document the dual use nature of the technology, which can be useful in guiding future research, specifically in the area of policy development and officer training.
Details
Keywords
Perri Reynolds and Angela S.M. Irwin
The purpose of this paper is to critically analyse research surrounding the anonymity of online transactions using Bitcoin and report on the feasibility of law enforcement bodies…
Abstract
Purpose
The purpose of this paper is to critically analyse research surrounding the anonymity of online transactions using Bitcoin and report on the feasibility of law enforcement bodies tracing illicit transactions back to a user’s real-life identity.
Design/methodology/approach
The design of this paper follows on from the approach taken by Reid and Harrigan (2013) in determining whether identifying information may be collated with external sources of data to identify individual users. In addition to conducting a detailed literature review surrounding the anonymity of users, and the potential ability to track transactions through the blockchain, four Bitcoin exchange services are examined to ascertain whether information provided at the sign-up stage is sufficiently verified and reliable. By doing so, this research tests the ability for law enforcement to reasonably rely upon this information when attempting to prosecute individuals. Additionally, by submitting fake information for verification, the plausibility of these services accepting fraudulent or illegitimate information is also tested.
Findings
It may be possible to identify and prosecute bad actors through the analysis of transaction histories by tracing them back to an interaction with a Bitcoin exchange. However, the compliance and implementation of anti-money laundering legislation and customer identification security standards are insufficiently used within some exchange services, resulting in more technologically adept, or well-funded, criminals being able to circumvent identification controls and continue to transact without revealing their identities. The introduction of and compliance with know-your customer and customer due diligence legislation is required before law enforcement bodies may be able to accurately rely on information provided to a Bitcoin exchange. This paper highlights the need for research to be undertaken to examine the ways in which criminals are circumventing identity controls and, consequently, financing their illicit activities.
Originality/value
By ascertaining the types of information submitted by users when exchanging real currency for virtual currency, and seeing whether this information may be accepted despite being fraudulent in nature, this paper elucidates the reliability of information that law enforcement bodies may be able to access when tracing transactions back to an individual actor.
Details
Keywords
Mohsin Dhali, Shafiqul Hassan, Saghir Munir Mehar, Khuram Shahzad and Fazluz Zaman
The purpose of the study is to show that divergent perceptions among regulators, the regulated and the associated regulatory bodies across multiple jurisdictions regarding the…
Abstract
Purpose
The purpose of the study is to show that divergent perceptions among regulators, the regulated and the associated regulatory bodies across multiple jurisdictions regarding the nature and functionality of cryptocurrencies hamper the development of a more comprehensive and coherent regulatory framework in curbing crimes and other related risks associated with cryptocurrencies.
Design/methodology/approach
The study has used a descriptive doctrinal legal research method to investigate and understand the insights of existing laws and regulations in four selected jurisdictions concerning cryptocurrencies and how these laws could be further improved and developed to reduce crypto-related crimes. Furthermore, the study has also used a comparative research method to conceptualize the contours of the new legal discourse emerging from cryptocurrencies to adopt and implement a sound regulatory framework.
Findings
The study illustrated that divergent regulatory treatment among different jurisdictions might suffocate novel digital innovations such as cryptocurrency. These fragmented regulatory approaches by various jurisdictions question the sustainability of the present national legislation adopted to regulate cryptocurrencies. Looking into other jurisdictional developments in regulating cryptocurrencies, it is apparent that a concerted regulatory approach is needed to minimize the abuse of this innovation.
Research limitations/implications
The study has implications for regulators and policymakers to review the current regulatory framework for regulating cryptocurrencies to prevent regulatory arbitrage. The divergent legislative measures concerning cryptocurrency among different jurisdictions question the sustainability of these legislative initiatives, considering the evolving and borderless nature of cryptocurrency. Therefore, this paper will help regulators to consider the present legislative gaps in establishing a common global regulatory approach in the crypto sphere.
Originality/value
The study contributes to the existing body of literature by examining the regulatory frameworks of four jurisdictions, namely, the USA, Canada, China and the EU, related to cryptocurrencies, with a discussion on the development of cryptocurrencies-related laws among these four jurisdictions and their sustainability in curbing crimes in the Darknet.
Details
Keywords
Robin Mueller, Sebastian Schrittwieser, Peter Fruehwirt, Peter Kieseberg and Edgar Weippl
This paper aims to give an overview on a number of selected applications in comparison to a previous evaluation conducted two years ago, as well as performing an analysis on…
Abstract
Purpose
This paper aims to give an overview on a number of selected applications in comparison to a previous evaluation conducted two years ago, as well as performing an analysis on several new applications. Mobile messaging and VoIP applications for smartphones have seen a massive surge in popularity, which has also sparked the interest in research related to their security and privacy protection, leading to in-depth analyses of specific applications or vulnerabilities.
Design/methodology/approach
The evaluation methods mostly focus on known vulnerabilities in connection with authentication and validation mechanisms but also describe some newly identified attack vectors.
Findings
The results show a positive trend for new applications, which are mostly being developed with security and privacy features, whereas some of the older applications have shown little progress or have even introduced new vulnerabilities. In addition, this paper shows privacy implications of smartphone messaging that are not even solved by today’s most sophisticated “secure” smartphone messaging applications, as well as discusses methods for protecting user privacy during the creation of the user network.
Research limitations/implications
Currently, there is no perfect solution available; thus, further research on this topic needs to be conducted.
Originality/value
In addition to conducting a security evaluation of existing applications together with newly designed messengers that were designed with a security background in mind, several methods for protecting user privacy were discussed. Furthermore, some new attack vectors were discussed.
Details
Keywords
Pavlos S. Efraimidis, Georgios Drosatos, Fotis Nalbadis and Aimilia Tasidou
In order to enhance privacy protection during electronic transactions, the purpose of this paper is to propose, develop, and evaluate a personal data management framework called…
Abstract
Purpose
In order to enhance privacy protection during electronic transactions, the purpose of this paper is to propose, develop, and evaluate a personal data management framework called Polis that abides by the following principle: every individual has absolute control over his/her personal data that reside only at his/her own side.
Design/methodology/approach
This paper identifies representative electronic transactions that involve personal data and proposes Polis‐based protocols for them. The approach is evaluated on a Polis prototype both as a stand‐alone application and as part of a commercial database management system.
Findings
The results of this paper indicate that electronic transactions can remain both feasible and straightforward, while personal data remain only at the owner's side.
Research limitations/implications
This paper describes a Polis‐approach implementing prototype, which is easy to deploy and friendly to current information management technologies. However, the usability of the prototype has to be enhanced with supporting tools for editing personal data and policies and a more intuitive user interface. Finally, the Polis‐platform enables a new class of user‐centered distributed applications, which it intends to investigate.
Practical implications
Even though the conditions for a personal data management approach like Polis are mature, and Polis can be progressively adopted, it still entails a major change in current business practices.
Originality/value
This paper proposes a new paradigm for the management of personal data, which admits individuals to have their personal data stored only at their own side. The new approach can be of mutual benefit to both individuals and companies.
Details
Keywords
The purpose of this paper is twofold: first, to further develop Paul Edwards’ concept of “data friction” by examining the socio-material forces that are shaping data movements in…
Abstract
Purpose
The purpose of this paper is twofold: first, to further develop Paul Edwards’ concept of “data friction” by examining the socio-material forces that are shaping data movements in the cases of research data and online communications data, second, to articulate a politics of data friction, identifying the interrelated infrastructural, socio-cultural and regulatory dynamics of data friction, and how these are contributing to the constitution of social relations.
Design/methodology/approach
The paper develops a hermeneutic review of the literature on socio-material factors influencing the movement of digital data between social actors in the cases of research data sharing and online communications data. Parallels between the two cases are identified and used to further develop understanding of the politics of “data friction” beyond the concept’s current usage within the Science Studies literature.
Findings
A number of overarching parallels are identified relating to the ways in which new data flows and the frictions that shape them bring social actors into new forms of relation with one another, the platformisation of infrastructures for data circulation, and state action to influence the dynamics of data movement. Moments and sites of “data friction” are identified as deeply political – resulting from the collective decisions of human actors who experience significantly different levels of empowerment with regard to shaping the overall outcome.
Research limitations/implications
The paper further develops Paul Edwards’ concept of “data friction” beyond its current application in Science Studies. Analysis of the broader dynamics of data friction across different cases identifies a number of parallels that require further empirical examination and theorisation.
Practical implications
The observation that sites of data friction are deeply political has significant implications for all engaged in the practice and management of digital data production, circulation and use.
Social implications
It is argued that the concept of “data friction” can help social actors identify, examine and act upon some of the complex socio-material dynamics shaping emergent data movements across a variety of domains, and inform deliberation at all levels – from everyday practice to international regulation – about how such frictions can be collectively shaped towards the creation of more equitable and just societies.
Originality/value
The paper makes an original contribution to the literature on friction in the dynamics of digital data movement, arguing that in many cases data friction may be something to enable and foster, rather than overcome. It also brings together literature from diverse disciplinary fields to examine these frictional dynamics within two cases that have not previously been examined in relation to one another.
Details