scholarly journals The Digital and Physical Footprint of Dark Net Markets

2020 ◽  
Vol 28 (1) ◽  
pp. 66-80
Author(s):  
Felipe Thomaz

Over the past decade, the world has been contending with a growing set of challenges related to illicit traffic as advancements in technology, communications, and global integration facilitate the operation of black markets and greater organization of criminal activity. In this study, the dark web and associated dark net markets are introduced as an important context for scholars interested in international marketing. Furthermore, the scale, scope, and structure of the real-world drug trade is empirically analyzed as an example of the work possible within this dark world. The study concludes by highlighting key themes from the literature in international marketing scholarship and focuses on how they might be co-opted to contribute toward the understanding and countermarketing of illicit systems of exchange.

Author(s):  
Devin Pierce ◽  
Shulan Lu ◽  
Derek Harter

The past decade has witnessed incredible advances in building highly realistic and richly detailed simulated worlds. We readily endorse the common-sense assumption that people will be better equipped for solving real-world problems if they are trained in near-life, even if virtual, scenarios. The past decade has also witnessed a significant increase in our knowledge of how the human body as both sensor and as effector relates to cognition. Evidence shows that our mental representations of the world are constrained by the bodily states present in our moment-to-moment interactions with the world. The current study investigated whether there are differences in how people enact actions in the simulated as opposed to the real world. The current study developed simple parallel task environments and asked participants to perform actions embedded in a stream of continuous events (e.g., cutting a cucumber). The results showed that participants performed actions at a faster speed and came closer to incurring injury to the fingers in the avatar enacting action environment than in the human enacting action environment.


Information ◽  
2018 ◽  
Vol 9 (8) ◽  
pp. 186 ◽  
Author(s):  
Darren Hayes ◽  
Francesco Cappa ◽  
James Cardon

The success of the Silk Road has prompted the growth of many Dark Web marketplaces. This exponential growth has provided criminal enterprises with new outlets to sell illicit items. Thus, the Dark Web has generated great interest from academics and governments who have sought to unveil the identities of participants in these highly lucrative, yet illegal, marketplaces. Traditional Web scraping methodologies and investigative techniques have proven to be inept at unmasking these marketplace participants. This research provides an analytical framework for automating Dark Web scraping and analysis with free tools found on the World Wide Web. Using a case study marketplace, we successfully tested a Web crawler, developed using AppleScript, to retrieve the account information for thousands of vendors and their respective marketplace listings. This paper clearly details why AppleScript was the most viable and efficient method for scraping Dark Web marketplaces. The results from our case study validate the efficacy of our proposed analytical framework, which has relevance for academics studying this growing phenomenon and for investigators examining criminal activity on the Dark Web.


2019 ◽  
Vol 13 (1) ◽  
pp. 42-51
Author(s):  
Nicholas Jacobs

The proliferation of technology has changed the ways we are able to interact with the world, and, in turn, how we are able to interact with others.  In recent years, online dating applications have become commonplace for connecting with others in search of romantic relationships.  This paper reflects on the phenomenology of the first date after connecting online and explores several aspects of this unique experience of introduction, expectation, and relation.  What occurs between two people online that leads them to suggest meeting for the first time in the real world?  How does communicating online differ from face to face encounters?  Exploring the phenomenology of the first date after connecting online invites us to wonder about the nature of dating today and in the past.


2021 ◽  
Vol 117 (3/4) ◽  
Author(s):  
Helen Prinsloo ◽  
Brian Reilly ◽  
Willem Myburgh

South Africa is considered to be one of the most biologically diverse countries in the world. The conversion, degradation, and fragmentation of natural habitats have caused a loss of biodiversity in many areas. Grasslands have been widely recognised as important for both biodiversity and economic development. Many conservation efforts have in the past been theory driven, without actionable, feasible results. We hypothesised that correct implementation of the available data will indicate where conservation efforts should be focused to move closer to achieving targets for biodiversity conservation in the Grassland Biome in South Africa. We identified an area (near Heilbron and Petrus Steyn in the Free State) that is representative of the biodiversity in the region and is suitable for modern conservation efforts in the ‘real world’. This approach provides a practical look at conservation in the modern era and a feasible result for conservation efforts.


Author(s):  
Annamaria Szakonyi ◽  
Brian Leonard ◽  
Maurice Dawson

The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.


Author(s):  
Abhishek Srivastava ◽  
Paul G. Sorenson

With service-oriented systems driving the economies around the world there has been an exponential rise in the number and choices of available services. As a result of this, for most tasks there are a large number of services that can adequately cater to the requirements of the customers. Choosing the service that best conforms to the requirements from the set of functionally equivalent services is non-trivial. Research in the past has utilized the non-functional attributes of such services to select the best service. These efforts however make the assumption that the services with the best non-functional attributes are the ones that most closely conform to the requirements of the customer. This is not always true since the customer may sometimes prefer to settle for a slightly “inferior” service owing to price constraints. In this chapter, we apply the Mid-level Splitting technique to better assess the requirements of the customer and make a more judicious service selection. Furthermore, we also address the issue of assignment of weights to the various non-functional attributes of the services. These weights are reflective of the emphasis that the concerned customer wants to put on the various non-functional attributes of the service. These weights are normally assigned based on the intuition of certain expert personnel and are prone to human error and incorrect judgment. We utilize the Hypothetical Equivalents and Inequivalents technique to more systematically assign weights to the services based on customer preferences. The techniques are demonstrated with a real world example.


2021 ◽  
Vol 8 (2) ◽  
pp. 117-122
Author(s):  
Jaroslava Kubáňová ◽  
Iveta Kubasáková

2020 has been a year like no other for most of us, dominated by a virus that has cost over 1.15 million lives globally and plunged the world into an economic recession which the Chief Economist of the World Bank says it could take five years to recover from. For business leaders in every sector, over the past six months it has been almost impossible to focus on anything but finding the most sustainable way through this sudden and unexpected crisis – and, for most, it will be hard to think about anything else for a long time to come as they battle to protect the futures of their organisations. Against such a dramatic and damaging backdrop, every business can be forgiven for letting Covid-19 dominate their thinking. They have shareholders to satisfy, customers to support and jobs to protect. Right now, the very survival of companies of every size remains in the balance with no end date in sight to the current crisis. The pandemic has not stopped the crime either, we can eve say that the number of criminal activities has increased. In this article, we want to point out the difference between criminal activity in transport at the beginning of 2019 compared to 2020. The statistics are taken from the international database of criminal activities processed by TAPA EMEA.


Author(s):  
John Mansfield

Advances in camera technology and digital instrument control have meant that in modern microscopy, the image that was, in the past, typically recorded on a piece of film is now recorded directly into a computer. The transfer of the analog image seen in the microscope to the digitized picture in the computer does not mean, however, that the problems associated with recording images, analyzing them, and preparing them for publication, have all miraculously been solved. The steps involved in the recording an image to film remain largely intact in the digital world. The image is recorded, prepared for measurement in some way, analyzed, and then prepared for presentation.Digital image acquisition schemes are largely the realm of the microscope manufacturers, however, there are also a multitude of “homemade” acquisition systems in microscope laboratories around the world. It is not the mission of this tutorial to deal with the various acquisition systems, but rather to introduce the novice user to rudimentary image processing and measurement.


2006 ◽  
Vol 36 (142) ◽  
pp. 113-126
Author(s):  
Enrique Dussel Peters

China's socioeconomic accumulation in the last 30 years has been probably one of the most outstanding global developments and has resulted in massive new challenges for core and periphery countries. The article examines how China's rapid and massive integration to the world market has posed new challenges for countries such as Mexico - and most of Latin America - as a result of China's successful exportoriented industrialization. China's accumulation and global integration process does, however, not only question and challenges the export-possibilities in the periphery, but also the global inability to provide energy in the medium term.


Sign in / Sign up

Export Citation Format

Share Document