Sentiment and affect analysis of Dark Web forums: Measuring radicalization on the internet

Author(s):  
Hsinchun Chen
Keyword(s):  
IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Saiba Nazah ◽  
Shamsul Huda ◽  
Jemal H. Abawajy ◽  
Mohammad Mehedi Hassan
Keyword(s):  

Author(s):  
Shumin Su ◽  
Mark Xu

The Internet Civil Diplomacy is a major revolution and an emerging trend witnessed in the information age. It poses a significant impact on foreign affairs and official diplomacy due to its unique characteristics—freedom, equality, individuality, real-time, low-cost, and convenience. This chapter reviews the development of Internet-based civil diplomacy and the practice of China’s Internet-based civil diplomacy, which has been greatly developed in recent years in multiple forms—e.g. Web forums, website signatures, event-driven purpose-build foreign affairs sites. Two types of impact of the civil Internet diplomacy—expansion effect and resonance effect—have been examined in the Chinese context through cases, events, and examples. The chapter also identifies challenges and proposes solutions for future development of the civil Internet diplomacy in China.


as the internet and its applications grew more sophisticated and widespread, so too did the strategy of modern terrorist groups such as ISIS and Boko Haram. The existence of the dark web adds to the online arsenal of groups using digital networks and sites to promulgate ideology or recruit supporters. This chapter will focus on developments such as Twitter and Facebook and the adept use of these tools by savvy terrorist cells (who are becoming much younger, demographically speaking).


Author(s):  
Tim Unwin

Technology is all too often seen as being inherently good, and there are powerful interests limiting the amount of attention paid to the darker side of ICTs and Internet access in particular. However, these darker aspects are crucial to understanding ICT4D, especially since they can more seriously impact the poor, both countries and people, than the rich. The following main challenges are covered in the chapter: privacy and security; the Surface Web and the Dark Web; cyber-security and resilience; negative aspects of the exploitation of Big Data and the abuse of people through social media; and the increasing dehumanization of people through the use of ICTs and the Internet of Things.


Author(s):  
Yulei Zhang ◽  
Shuo Zeng ◽  
Li Fan ◽  
Yan Dang ◽  
Catherine A. Larson ◽  
...  
Keyword(s):  

2019 ◽  
Author(s):  
◽  
Gokhale Craig

This research was supported financially by the BankSeta, the Council on Scientific and Industrial Research and the National Research Foundation with the aim to log The Onion Router (TOR) traffic usage in South Africa. The recent public disclosure of mass surveillance of electronic communications, involving senior government authorities, has drawn the public attention to issues regarding Internet security privacy. For almost a decade, there has been several research efforts towards designing and deploying open source, trustworthy and reliable electronic systems that ensure anonymity and privacy of users. These systems operate by concealing the true network identity of the communicating parties against eavesdropping adversaries of which TOR is an example of such a system. Clients that use the TOR network construct circuits (paths) which are utilised to route multiple network streams. A circuit is considered secure if there is one non-malicious router in the circuit. Such systems have served as anti-censorship and anti-surveillance tools. The implementation of TOR allows an individual to access the Dark Web, an area of the Internet that is said to be of a much larger magnitude than the Surface Web. The Dark Web which has earned a reputation as a sort of immense black market, associated with terrorist groups, child pornography, human trafficking, sale of drugs, conspiracies and hacking research, has received significant national and international press coverage. However, to date little or no research has been conducted on the illicit usage of the Dark Web and no research has been conducted in the use or misuse of the Dark Web in South Africa. There has not been any study which characterises the usage of a real deployed anonymity service. Observations obtained are presented by participating in the TOR network and the primary goal of this study is to elicit Dark Web traffic by South Africans. Past researchers undertook Dark Web crawling focusing only on specific web content such as explicitly focusing on child exploitation and terrorist activity. The experiment design of this study further builds on experiments conducted in previous studies. The deanonymisation methodology utilised in this study will allow for the detection of exit routing traffic and the logging of all Dark Web traffics areas omitted from the previous studies. This study does not confine the declassification of onion addresses to specific content types and aims to log all exit routing traffics, undertake a comprehensive declassification of websites visited by clients and obtain the Internet Protocol Addresses (IP) of these clients. The analysis of the sample results reveals that in the South African context, Dark Web traffic is mainly directed to social media websites. There are however causes for concerns as there are illicit activities occurring that include the sale of drugs, visiting of child pornographic websites, and the sale of weapons. Finally, the study presents evidence that exit routing traffic by the TOR node is limited to a large number of different countries some of which have serious Internet censorship laws.


Sign in / Sign up

Export Citation Format

Share Document