Search results

1 – 10 of over 5000
Article
Publication date: 6 January 2022

Hanan Alghamdi and Ali Selamat

With the proliferation of terrorist/extremist websites on the World Wide Web, it has become progressively more crucial to detect and analyze the content on these websites…

Abstract

Purpose

With the proliferation of terrorist/extremist websites on the World Wide Web, it has become progressively more crucial to detect and analyze the content on these websites. Accordingly, the volume of previous research focused on identifying the techniques and activities of terrorist/extremist groups, as revealed by their sites on the so-called dark web, has also grown.

Design/methodology/approach

This study presents a review of the techniques used to detect and process the content of terrorist/extremist sites on the dark web. Forty of the most relevant data sources were examined, and various techniques were identified among them.

Findings

Based on this review, it was found that methods of feature selection and feature extraction can be used as topic modeling with content analysis and text clustering.

Originality/value

At the end of the review, present the current state-of-the- art and certain open issues associated with Arabic dark Web content analysis.

Details

Data Technologies and Applications, vol. 56 no. 4
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 20 April 2023

Mohsin Dhali, Shafiqul Hassan, Saghir Munir Mehar, Khuram Shahzad and Fazluz Zaman

The purpose of the study is to show that divergent perceptions among regulators, the regulated and the associated regulatory bodies across multiple jurisdictions regarding the…

Abstract

Purpose

The purpose of the study is to show that divergent perceptions among regulators, the regulated and the associated regulatory bodies across multiple jurisdictions regarding the nature and functionality of cryptocurrencies hamper the development of a more comprehensive and coherent regulatory framework in curbing crimes and other related risks associated with cryptocurrencies.

Design/methodology/approach

The study has used a descriptive doctrinal legal research method to investigate and understand the insights of existing laws and regulations in four selected jurisdictions concerning cryptocurrencies and how these laws could be further improved and developed to reduce crypto-related crimes. Furthermore, the study has also used a comparative research method to conceptualize the contours of the new legal discourse emerging from cryptocurrencies to adopt and implement a sound regulatory framework.

Findings

The study illustrated that divergent regulatory treatment among different jurisdictions might suffocate novel digital innovations such as cryptocurrency. These fragmented regulatory approaches by various jurisdictions question the sustainability of the present national legislation adopted to regulate cryptocurrencies. Looking into other jurisdictional developments in regulating cryptocurrencies, it is apparent that a concerted regulatory approach is needed to minimize the abuse of this innovation.

Research limitations/implications

The study has implications for regulators and policymakers to review the current regulatory framework for regulating cryptocurrencies to prevent regulatory arbitrage. The divergent legislative measures concerning cryptocurrency among different jurisdictions question the sustainability of these legislative initiatives, considering the evolving and borderless nature of cryptocurrency. Therefore, this paper will help regulators to consider the present legislative gaps in establishing a common global regulatory approach in the crypto sphere.

Originality/value

The study contributes to the existing body of literature by examining the regulatory frameworks of four jurisdictions, namely, the USA, Canada, China and the EU, related to cryptocurrencies, with a discussion on the development of cryptocurrencies-related laws among these four jurisdictions and their sustainability in curbing crimes in the Darknet.

Details

International Journal of Law and Management, vol. 65 no. 3
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 20 April 2015

Tomoko Kajiyama and Isao Echizen

The purpose of this paper is to propose an effective educational system to help students assess Web site risk by providing an environment in which students can better understand a…

Abstract

Purpose

The purpose of this paper is to propose an effective educational system to help students assess Web site risk by providing an environment in which students can better understand a Web site’s features and determine the risks of accessing the Web site for themselves.

Design/methodology/approach

The authors have enhanced a prototype visualization system for helping students assess Web site features and use them to identify risky Web sites. The system was implemented with our graphical search interface for multi-attribute metadata called “Concentric Ring View” and was tested using 13,386 actual and dummy Web sites and 11 Web site attributes.

Findings

The testing revealed several distinguishing attributes of risky Web sites, including being related to “play”, having monotone colors, having many images, having many links and having many pages with much text in smaller font size. A usability test with 12 teenaged female students demonstrated that they could learn to identify some features of risky Web sites.

Originality/value

As students cannot live in a safe cyberspace environment forever, they should be taught how to identify risky Web sites. We proposed an educational system to help students assess Web site features and identify high-risk Web site and verified the effectiveness of this system.

Details

Interactive Technology and Smart Education, vol. 12 no. 1
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 1 June 2005

Yanbo Ru and Ellis Horowitz

The existence and continued growth of the invisible web creates a major challenge for search engines that are attempting to organize all of the material on the web into a form…

2368

Abstract

Purpose

The existence and continued growth of the invisible web creates a major challenge for search engines that are attempting to organize all of the material on the web into a form that is easily retrieved by all users. The purpose of this paper is to identify the challenges and problems underlying existing work in this area.

Design/methodology/approach

A discussion based on a short survey of prior work, including automated discovery of invisible web site search interfaces, automated classification of invisible web sites, label assignment and form filling, information extraction from the resulting pages, learning the query language of the search interface, building content summary for an invisible web site, selecting proper databases, integrating invisible web‐search interfaces, and accessing the performance of an invisible web site.

Findings

Existing technologies and tools for indexing the invisible web follow one of two strategies: indexing the web site interface or examining a portion of the contents of an invisible web site and indexing the results.

Originality/value

The paper is of value to those involved with information management.

Details

Online Information Review, vol. 29 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 March 2002

Norm Medeiros

This article examines the growth of the invisible Web, and efforts underway to make its contents more accessible. Dynamic Web publishing is described. The Open Archives Metadata…

837

Abstract

This article examines the growth of the invisible Web, and efforts underway to make its contents more accessible. Dynamic Web publishing is described. The Open Archives Metadata Harvesting Protocol is reviewed, as are projects related to OCLC’s implementation of the Open Archives Initiative. Recent Dublin Core activities are reported.

Details

OCLC Systems & Services: International digital library perspectives, vol. 18 no. 1
Type: Research Article
ISSN: 1065-075X

Keywords

Article
Publication date: 2 July 2019

Dennis B. Desmond, David Lacey and Paul Salmon

The purpose of this paper is to present the findings from a literature review, which aimed to identify previous studies evaluating cryptolaundering from a systems thinking…

1477

Abstract

Purpose

The purpose of this paper is to present the findings from a literature review, which aimed to identify previous studies evaluating cryptolaundering from a systems thinking perspective. The aim of this paper is to first confirm that cryptolaundering systems can indeed be defined as complex socio-technical systems and second to present the findings from a systematic review of the literature to determine the extent to which previous research has adopted a systems thinking perspective.

Design/methodology/approach

The study involved a SLR of studies published in the peer-reviewed literature between 2009 and 2018. Rasmussen’s risk management framework (Rasmussen, 1997) was used to evaluate the extent to which a systems thinking perspective had been adopted.

Findings

The cryptolaundering process is considered to be a complex socio-technical system. The review demonstrates that no previous studies have defined cryptolaundering as a complex socio-technical system or used systems thinking framework approach to evaluate how criminals, regulatory bodies or law enforcement entities understand processes and assess risk within cryptolaundering systems. It is argued that using such an approach to the cryptolaundering process would likely improve assessing criminal risk analyses of cryptolaundering and assist law enforcement and regulatory bodies with understanding risk management during the laundering of cryptocurrencies.

Originality/value

Future assessments of cryptolaundering using socio-technical system analytical processes may afford law enforcement and regulatory bodies the opportunity to improve intervention techniques and identify gaps in regulations and enforcement.

Details

Journal of Money Laundering Control, vol. 22 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 25 June 2021

Christoph Wronka

This study aims to illustrate and determine how illegally obtained funds are laundered through online platforms and companies in different economic sectors in the digital age.

2794

Abstract

Purpose

This study aims to illustrate and determine how illegally obtained funds are laundered through online platforms and companies in different economic sectors in the digital age.

Design/methodology/approach

A qualitative analysis approach using purpose sampling methods, including 21 semi-structured interviews with prevention experts, compliance officers and convicted cybercriminals, resulted in the determination of concrete money-laundering methods involving the employment of online platforms provided by companies and institutions in different economic sectors.

Findings

The current study focuses on various companies in different economic segments that mitigate cyber laundering and the anti-money laundering measures that can be adopted. Therefore, this paper provides a detailed discussion and analysis on how money launderers avoid being detected. Both preventive and criminal perspectives are taken into consideration.

Originality/value

By identifying the gaps in the current anti-money-laundering mechanisms, it will provide compliance officers, legislators and law enforcement agencies with an in-depth insight into how cyber laundering operates in various economic sectors.

Details

Journal of Money Laundering Control, vol. 25 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 5 December 2022

Lloyd Waller, Stephen Christopher Johnson, Nicola Satchell, Damion Gordon, Gavin Leon Kirkpatrick Daley, Howard Reid, Kimberly Fender, Paula Llewellyn, Leah Smyle and Patrick Linton

This paper aims to investigate the potential challenges that governments in the Commonwealth Caribbean are likely to face combating crimes facilitated by the dark Web.

Abstract

Purpose

This paper aims to investigate the potential challenges that governments in the Commonwealth Caribbean are likely to face combating crimes facilitated by the dark Web.

Design/methodology/approach

The “lived experience” methodology guided by a contextual systematic literature review was used to ground the investigation of the research phenomena in the researchers’ collective experiences working in, living in and engaging in research with governments in the Commonwealth Caribbean.

Findings

The two major findings emerging from the analysis are that jurisdictional and technical challenges are producing major hindrances to the creation of an efficient and authoritative legislative framework and the building of the capacity of governments in the Commonwealth Caribbean to confront the technicalities that affect systematic efforts to manage problems created by the dark Web.

Practical implications

The findings indicate the urgency that authorities in the Caribbean region must place on reevaluating their administrative, legislative and investment priorities to emphasize cyber-risk management strategies that will enable their seamless and wholesome integration into this digital world.

Originality/value

The research aids in developing and extending theory and praxis related to the problematization of the dark Web for governments by situating the experiences of Small Island Developing States into the ongoing discourse.

Details

Transforming Government: People, Process and Policy, vol. 17 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 3 July 2017

Nicholas Alan McTaggart

The purpose of this paper is to highlight the extent to which organised crime and the environment have altered in relation to money laundering and terrorist financing and to…

Abstract

Purpose

The purpose of this paper is to highlight the extent to which organised crime and the environment have altered in relation to money laundering and terrorist financing and to explore whether strategies to “follow the money” have been successful.

Design/methodology/approach

This paper is based on personal analysis and involvement as a practitioner in law enforcement and includes a broad literature review on the subject of terrorist financing and money laundering.

Findings

Money laundering, terrorist financing and economic crime activity are being disguised in the “noise” of business by specialists that have become very adept at their craft. Financial institutions and lawmakers have invested heavily in countering money laundering and terrorist financing. However, its real effectiveness is somewhat doubtful.

Originality/value

This paper serves to stimulate further discussion and research on how all actors can increase collaboration and co-operation to increase the effectiveness of disruption strategies associated with these classes of crime.

Details

Journal of Financial Crime, vol. 24 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 14 May 2018

Serkan Celik

The purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and…

Abstract

Purpose

The purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.

Design/methodology/approach

A sectional research design and survey method was adopted throughout the study to examine the opinions and perceptions of internet users regarding cyberhate by descriptively exploring the existing situation from various perspectives. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users who are considered as highly literate in technology use. The data were collected through a personal data form and a survey (Cyberhate Perception Scale) from 372 internet users living in Turkey and the USA.

Findings

The findings of the study revealed that the majority of participants do not perceive cyberhate as a part of freedom of speech and they believe that online hate behaviors, which they also consider to be a violation of human rights, should be deemed illegal and be punished accordingly. The findings, which were discussed in line with the existing research, indicated some significant predictors of internet users’ perceptions on cyberhate.

Originality/value

As cyberhate is an understudied area that raises concerns in terms of internet user exposure, the objective of this research is to understand tendencies about the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.

Details

Information Technology & People, vol. 31 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 5000