Reader small image

You're reading from  Combating Crime on the Dark Web

Product typeBook
Published inFeb 2023
PublisherPackt
ISBN-139781803234984
Edition1st Edition
Right arrow
Author (1)
Nearchos Nearchou
Nearchos Nearchou
author image
Nearchos Nearchou

Nearchos Nearchou is a determined person and 1st Class BSc (Hons) Computer Science and MSc Cyber Security graduate. He is a big tech-lover and spent several years exploring new innovations in the IT field. Driven by his passion for learning, he is pursuing a career in the Cyber Security world. Passionate about learning new skills and information that can be used for further personal and career development. As well as working individually, he enjoys working as part of a team, in order to deliver projects on time and to the highest possible standard.
Read more about Nearchos Nearchou

Right arrow

Discussion and Evaluation

The Dark Web is a part of the internet that contains content that can only be accessed by using specialized browsers. Users must use specific software and configurations to browse this hidden part of the internet. By using the Dark Web, people worldwide can exchange messages and conduct business securely and anonymously without revealing recognizable information, such as IP addresses and locations. The Dark Web constitutes a small part of the Deep Web, the portion of the internet that is not indexed by traditional search engines. The Dark Web can be used for legitimate purposes as well as to conduct criminal activities related to weapons, fraud, drugs, child pornography, contract killings, terrorism, human trafficking, zoophilia, cannibalism, and many other offenses.

This chapter will cover the following topics:

  • Structure of the research
  • Overview of the research
  • Final tips on how to use the Dark Web

Structure of the research

The research methodology is one of the most important aspects of any research process, including this book. It provides the basis upon which the research is procedurally undertaken, and it allows readers to evaluate the reliability and validity of the study. This chapter’s main aim is to explain the methodology employed for the research. The adopted methodology is justified, along with the techniques, tools, and approaches that were used. Additionally, this chapter discusses the ethical dilemmas and concerns related to the book.

Research process

The research process is not a linear process in which researchers must complete step one before moving on to steps two or three. Depending on the familiarity with the topic and the challenges encountered along the way, it may be needed to rearrange or revisit these steps. The following diagram outlines a simple way in which research could be conducted (Khoo, 2012):

Figure 9.1 – A simple way of conducting the research

Figure 9.1...

Overview of the research

This chapter summarizes the results regarding each research objective and provides a concise and justifiable answer to the research question. Each research objective carried its own importance for the book and addressed a significant part of the research question. Also, this chapter discusses future work directions and how this project can contribute to the cybersecurity field. This book consisted of nine chapters, which are respectively divided into subsections. Each chapter served as a stepping stone toward answering the research objectives and research question.

The research approach chosen for this project was a combination of quantitative and qualitative methods. These methods have helped to get in-depth insights into Dark Web’s ecosystem and produce reliable data clusters. These data clusters were formed by interviewing relevant people as well as by extensively reviewing, analyzing, and critically evaluating books, scholarly articles, journals...

Final tips on how to use the Dark Web

It’s critical to maintain perspective. There are a lot of good reasons to use TOR, and doing so does not imply that a person is doing something risky or against the law. To encourage young people to adopt safer online behaviors, it is essential to have open and honest dialogues with them. Tell them you don’t want them exposed to any of the illicit content that is prevalent on the Dark Web. Examine their reasons for wanting to use TOR and talk through all of your alternatives with them. For instance, if their goal is to increase their online anonymity, there could be other approaches you can come to an understanding on.

The freedom of the press is one political issue that many young people are worried about. To bring this topic to light and give students a safe space to ask questions and express their ideas, schools may choose to use discussions of high-profile examples such as Wikileaks. Additionally, there are certain doable actions...

Summary

In this chapter, all the objectives we covered were answered through an extensive and detailed analysis of the literature. Responses to crimes on the Dark Web are most efficient, coordinated, and practical when they are collaborative in their problem-solving. Even though the proposed system has flaws to some extent, the IDH can aid law enforcement efforts in combating Dark Web crimes. It would be useful to develop the proposed system and the overall concept by creating the necessary software. Probing deeper, the results in this research also provide a strong foundation for future research related to awareness of crimes on the Dark Web. In regard to future work, a chance to actually develop this system would be a great opportunity, although it may take a lot of time, effort, and expense. This can be done by collaborating with various international law enforcement agencies.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Combating Crime on the Dark Web
Published in: Feb 2023Publisher: PacktISBN-13: 9781803234984
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Nearchos Nearchou

Nearchos Nearchou is a determined person and 1st Class BSc (Hons) Computer Science and MSc Cyber Security graduate. He is a big tech-lover and spent several years exploring new innovations in the IT field. Driven by his passion for learning, he is pursuing a career in the Cyber Security world. Passionate about learning new skills and information that can be used for further personal and career development. As well as working individually, he enjoys working as part of a team, in order to deliver projects on time and to the highest possible standard.
Read more about Nearchos Nearchou