Search results

21 – 30 of over 6000
Article
Publication date: 3 July 2017

Nicholas Alan McTaggart

The purpose of this paper is to highlight the extent to which organised crime and the environment have altered in relation to money laundering and terrorist financing and to…

Abstract

Purpose

The purpose of this paper is to highlight the extent to which organised crime and the environment have altered in relation to money laundering and terrorist financing and to explore whether strategies to “follow the money” have been successful.

Design/methodology/approach

This paper is based on personal analysis and involvement as a practitioner in law enforcement and includes a broad literature review on the subject of terrorist financing and money laundering.

Findings

Money laundering, terrorist financing and economic crime activity are being disguised in the “noise” of business by specialists that have become very adept at their craft. Financial institutions and lawmakers have invested heavily in countering money laundering and terrorist financing. However, its real effectiveness is somewhat doubtful.

Originality/value

This paper serves to stimulate further discussion and research on how all actors can increase collaboration and co-operation to increase the effectiveness of disruption strategies associated with these classes of crime.

Details

Journal of Financial Crime, vol. 24 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 14 May 2018

Serkan Celik

The purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and…

Abstract

Purpose

The purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.

Design/methodology/approach

A sectional research design and survey method was adopted throughout the study to examine the opinions and perceptions of internet users regarding cyberhate by descriptively exploring the existing situation from various perspectives. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users who are considered as highly literate in technology use. The data were collected through a personal data form and a survey (Cyberhate Perception Scale) from 372 internet users living in Turkey and the USA.

Findings

The findings of the study revealed that the majority of participants do not perceive cyberhate as a part of freedom of speech and they believe that online hate behaviors, which they also consider to be a violation of human rights, should be deemed illegal and be punished accordingly. The findings, which were discussed in line with the existing research, indicated some significant predictors of internet users’ perceptions on cyberhate.

Originality/value

As cyberhate is an understudied area that raises concerns in terms of internet user exposure, the objective of this research is to understand tendencies about the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.

Details

Information Technology & People, vol. 31 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Content available
Article
Publication date: 23 November 2012

Linda Cloete

954

Abstract

Details

Online Information Review, vol. 36 no. 6
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 24 June 2020

Simon Burnett and Annemaree Lloyd

The purpose of this paper is to introduce the concept of Dark Knowledge, an epistemology that acknowledges both alternative knowledge and ways of knowing which are cognizant of…

Abstract

Purpose

The purpose of this paper is to introduce the concept of Dark Knowledge, an epistemology that acknowledges both alternative knowledge and ways of knowing which are cognizant of the moral and ethical positioning of each.

Design/methodology/approach

This is a conceptual paper that uses existing relevant literature to develop the work. The paper uses a four-stage literature search process and draws upon a range of disciplines, including philosophy, computer science and information management, to underpin the evolution of the concept.

Findings

As a conceptual paper, no empirical findings are presented. Instead, the paper presents an embryonic model of Dark Knowledge and identifies a number of characteristics, which may be used to explore the concept in more detail.

Research limitations/implications

There is a clear need to develop a body of empirical work, adding to the theoretical perspectives presented in this paper. It is anticipated that this paper will provide one of the cornerstones for future studies in this area.

Originality/value

The paper makes an original contribution to the study of information behaviours, practices and epistemology.

Details

Journal of Documentation, vol. 76 no. 6
Type: Research Article
ISSN: 0022-0418

Keywords

Executive summary
Publication date: 27 August 2015

INTERNATIONAL: Cyber security catches up on dark web

Details

DOI: 10.1108/OXAN-ES202979

ISSN: 2633-304X

Keywords

Geographic
Topical
Open Access
Article
Publication date: 8 May 2018

Rolf van Wegberg, Jan-Jaap Oerlemans and Oskar van Deventer

This paper aims to shed light into money laundering using bitcoin. Digital payment methods are increasingly used by criminals to launder money obtained through cybercrime. As many…

26949

Abstract

Purpose

This paper aims to shed light into money laundering using bitcoin. Digital payment methods are increasingly used by criminals to launder money obtained through cybercrime. As many forms of cybercrime are motivated by profit, a solid cash-out strategy is required to ensure that crime proceeds end up with the criminals themselves without an incriminating money trail. The authors examine how cybercrime proceeds can be laundered using services that are offered on the Dark Web.

Design/methodology/approach

Focusing on service-percentages and reputation-mechanisms in underground bitcoin laundering services, this paper presents the results of a cash-out experiment in which five mixing and five exchange services are included.

Findings

Some of the examined services provide an excellent, professional and well-reviewed service at competitive cost. Whereas others turned out to be scams, accepting bitcoin but returning nothing in return.

Practical implications

The authors discuss what these findings mean to law enforcement, and how bitcoin laundering chains could be disrupted.

Originality/value

These cash-out strategies are increasingly facilitated by cryptocurrencies, mainly bitcoin. Bitcoins are already relatively anonymous, but with the rise of specialised bitcoin money laundering services on the Dark Web, laundering money in the form of bitcoins becomes available to a wider audience.

Details

Journal of Financial Crime, vol. 25 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 20 July 2020

Mohd Faizan, Raees Ahmad Khan and Alka Agrawal

Cryptomarkets on the dark web have emerged as a hub for the sale of illicit drugs. They have made it easier for the customers to get access to illicit drugs online while ensuring…

1182

Abstract

Cryptomarkets on the dark web have emerged as a hub for the sale of illicit drugs. They have made it easier for the customers to get access to illicit drugs online while ensuring their anonymity. The easy availability of potentially harmful drugs has resulted in a significant impact on public health. Consequently, law enforcement agencies put a lot of effort and resources into shutting down online markets on the dark web. A lot of research work has also been conducted to understand the working of customers and vendors involved in the cryptomarkets that may help the law enforcement agencies. In this research, we present a ranking methodology to identify and rank top markets dealing in harmful illicit drugs. Using named entity recognition, a harm score of a drug market is calculated to indicate the degree of threat followed by the ranking of drug markets. The top-ranked markets are the ones selling the most harmful drugs. The rankings thus obtained can be helpful to law enforcement agencies by locating specific markets selling harmful illicit drugs and their further monitoring.

Details

Applied Computing and Informatics, vol. 18 no. 3/4
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Book part
Publication date: 16 August 2023

Ross Coomber, Andrew Childs, Leah Moyle and Monica Barratt

The online sourcing, supply, and purchase of illicit drugs is fast transforming drug markets worldwide. Although the long-term development of simple communications technology over…

Abstract

The online sourcing, supply, and purchase of illicit drugs is fast transforming drug markets worldwide. Although the long-term development of simple communications technology over time (from pagers to mobile phones) continues to impact and extend local drug supply dynamics, it is the recent developments of dark web cryptomarkets, social media applications (like Instagram), encrypted messaging applications (like WhatsApp), and surface web platforms, such as LeafedOut, that are changing the drug supply landscape online. The use of technology in drug supply has tended to go hand in hand with improving the efficiency of supply and opportunities to reduce exchange-related risks for both buyers and sellers. In relation to app-mediated supply, for example, the use of encrypted messaging provides enhanced security for arranging purchases beyond the lurking surveillance of law enforcement. Despite the perception of improved safety, however, the use of social media apps and other online platforms can expose both buyers and sellers to risk scenarios they may not fully appreciate. Drawing on two recent studies on the use of social media apps and the online platform LeafedOut as mediators of drugs supply, this chapter will consider how these mid-range (between cryptomarkets and traditional telecommunications such as basic texting/calling and material ‘street’ markets) virtual spaces are being utilised for drug supply and the extent to which this is ‘just more of the same’ or provides new structures and experiences for those engaging with it and in what ways. Consideration will also be given to contradictions in the mid-range market space where the broad perception of reduced risk from the use of encrypted messaging can in fact produce greater levels of risk for some buyers and sellers depending on how they engage with the process/es.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Book part
Publication date: 26 August 2019

Ryan Scrivens, Tiana Gaudette, Garth Davies and Richard Frank

Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online.Methods/approach …

Abstract

Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online.

Methods/approach – The authors describe a customized web-crawler that was developed for the purpose of collecting, classifying, and interpreting extremist content online and on a large scale, followed by an overview of a relatively novel machine learning tool, sentiment analysis, which has sparked the interest of some researchers in the field of terrorism and extremism studies. The authors conclude with a discussion of what they believe is the future applicability of sentiment analysis within the online political violence research domain.

Findings – In order to gain a broader understanding of online extremism, or to improve the means by which researchers and practitioners “search for a needle in a haystack,” the authors recommend that social scientists continue to collaborate with computer scientists, combining sentiment analysis software with other classification tools and research methods, as well as validate sentiment analysis programs and adapt sentiment analysis software to new and evolving radical online spaces.

Originality/value – This chapter provides researchers and practitioners who are faced with new challenges in detecting extremist content online with insights regarding the applicability of a specific set of machine learning techniques and research methods to conduct large-scale data analyses in the field of terrorism and extremism studies.

Details

Methods of Criminology and Criminal Justice Research
Type: Book
ISBN: 978-1-78769-865-9

Keywords

Book part
Publication date: 15 April 2019

Christian Linder

This chapter investigates how new technologies of encryption and cryptocurrencies enable entrepreneurial opportunities outside legality in the dark net. Since ventures on illicit…

Abstract

This chapter investigates how new technologies of encryption and cryptocurrencies enable entrepreneurial opportunities outside legality in the dark net. Since ventures on illicit dark net markets lack access to the legal system and to law enforcement agencies, they must rely on mechanisms for settling disputes with business partners without the involvement of mediating agencies. To this end, the presence of trust is decisive in coordinating cryptomarket activities. Hence, entrepreneurs on dark net markets utilize technology to gain trust, establishing new ways of drug dealing, with disruptive potential for classic illicit drug markets. Against this background, this chapter shows how technological change affects the identity of entrepreneurs on the dark net. Special emphasis is given to the entrepreneurs’ self-concept, their consumer service, knowledge and capabilities and how, in a holistic view, this development innovates the traditional way of dealing illicit drugs.

Details

Entrepreneurship and Development in the 21st Century
Type: Book
ISBN: 978-1-78973-233-7

Keywords

21 – 30 of over 6000