• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 3
  • 1
  • 1
  • Tagged with
  • 12
  • 12
  • 6
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

New Perspectives About The Tor Ecosystem: Integrating Structure With Information

Zabihimayvan, Mahdieh 03 June 2020 (has links)
No description available.
2

”När jag använder TOR blir jag en helt annan person” : En kvalitativ intervjustudie om motiven bakom användningen av Tor Browser och The Dark Web / ”When I go on TOR, I am a completely different person” : A qualitative interview study about the motives behind the usage of Tor Browser and The Dark Web

Dahlberg, Nadia, Bryskhe, Jonathan January 2017 (has links)
Denna studie har som mål att ge en inblick i varför och hur Internetanvändare nyttjar Tor Browser och The Dark Web. Nätverket och webbläsaren förknippas ofta med illegal verksamhet, men även med yttrandefrihet och anonymitet. Vi vill undersöka hur användandet av dessa ser ut och skapa en förståelse kring varför individer väljer att vända sig dit. Detta görs med hjälp av kvalitativa intervjuer med sammanlagt nio personer som använder sig av nätverket och webbläsaren. Intervjuerna har genomförts på forumen Flashback Forum, Quora och Reddit genom sajternas privata chattfunktioner. Materialet har sedan analyserats med hjälp av det teoretiska perspektivet Uses and Gratification för att synliggöra vilka sociala och psykologiska behov som tillgodoses genom användandet. Studiens resultat visade att merparten av de intervjuade vände sig till Tor Browser och The Dark Web eftersom att de, i förstahand, var intresserade av illegal verksamhet och använde nätverket samt webbläsaren för att få tillgång till materialet, men även för att göra det svårare för myndigheter att spåra deras aktivitet online. Användandet grundade sig, i andrahand, i ett intresse för yttrandefrihet och anonymitet och det var även dessa ämnen som gjorde att användarna fortsatte att återvända till Tor Browser och The Dark Web.
3

Podnikatelské modely na deep webu / Business models on deep web

Soukup, Jan January 2015 (has links)
This diploma thesis analyzes the deep web environment with the use of business models from the surface web. In the indroduction part of the thesis summarize terms web, deep web and dark web, these terms are intermingle the entire thesis, also brings the concept on Onion routing with use of Tor software. An inseparable part is the comparsion of tools which can be used for access to the dark web. The main part of the thesis analyzes most used business models on the surface web including their methods of monetization and after that author tries to apply these models in the dark web environment. An importat part of this work is the analysis a type of services occuring on the dark web and mutual comparison of several sub-criteria of each service. In the final part the thesis presents project Turris on which is applied to create a relay node for the Tor network.
4

Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11

Kahlqvist, Johanna, Wilke, Frida January 2023 (has links)
The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. Anonymity also allows malicious actors to evade identification from law enforcement and share ill-intentioned resources. Therefore, digital forensics is an area that needs to stay up to date with these developments. We investigate what artefacts can be discovered by conducting acquisition and analysis of a Windows 11 computer that has used the Tor browser to browse the Dark Web. Our results identify a variety of artefacts acquired from Windows Registry, active memory, storage, and network traffic. Furthermore, we discuss how these can be used in a digital forensic investigation.
5

UNVEILING THE SHADOWS: A COGNITIVE APPROACH TO UNDERSTANDING SOCIAL INFLUENCE STRATEGIES FOR ESTABLISHING SOCIAL ORDER IN DARKNET MARKETS

Andrei, Filippo 15 March 2024 (has links)
Darknet markets have emerged due to technological advancements, decreasing the likelihood of violence by facilitating remote purchasing interactions. However, the absence of traditional legal frameworks makes maintaining order in these illegal online markets challenging. Without a legitimate state to enforce property rights or quality standards, sustaining order becomes increasingly complex. Despite its illicit nature and the absence of a legitimate state to protect market transactions, the darknet market has proven to be a resilient environment where user satisfaction rivals that of traditional e-commerce platforms such as eBay. How is this possible? Howcan social order emerge in such a context? Existing studies have primarily approached the issue from neo-institutionalist and social network perspectives, examining the emergence of social order through informal institutions and repeated interactions. A notable gap remains in understanding the cognitive aspects shaping decision-making processes in these illicit markets. This dissertation aims to fill this gap by examining the role of social influence in establishing the social order of the market in the absence of legal safeguards from a socio-cognitive lean.
6

Reference Model to Identify the Maturity Level of Cyber Threat Intelligence on the Dark Web

Santos, Ricardo Meléndez, Gallardo, Anthony Aguilar, Aguirre, Jimmy Armas 01 January 2021 (has links)
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado. / In this article, we propose a reference model to identify the maturity level of the cyber intelligence threat process. This proposal considers the dark web as an important source of cyber threats causing a latent risk that organizations do not consider in their cybersecurity strategies. The proposed model aims to increase the maturity level of the process through a set of proposed controls according to the information found on the dark web. The model consists of three phases: (1) Identification of information assets using cyber threat intelligence tools. (2) Diagnosis of the exposure of information assets. (3) Proposal of controls according to the proposed categories and criteria. The validation of the proposal was carried out in an insurance institution in Lima, Peru, with data obtained by the institution. The measurement was made with artifacts that allowed to obtain an initial value of the current panorama of the company. Preliminary results showed 196 emails and passwords exposed on the dark web of which one corresponded to the technology manager of the company under evaluation. With this identification, it was diagnosed that the institution was at a “Normal” maturity level, and from the implementation of the proposed controls, the “Advanced” level was reached. / Revisión por pares
7

Dark web och integritet på Internet : En kvalitativ studie av mediala gestaltningar av det dolda nätverket Dark web samt anonymitetens paradox

Rivero Mildén, Linn January 2018 (has links)
Denna studie är av kvalitativ karaktär och har tagit sin epistemologiska utgångspunkt i gestaltningsteorin för att undersöka digitala representationer av ett tillsynes undangömt nätverk. Syftet med uppsatsen är att undersöka hur Dark web gestaltas i ett urval mediekanaler för att fastställa vanliga representationer av nätverket. Studien ämnar för att besvara i vilka sammanhang som nätverket gestaltas som en risk respektive möjlighet. Studien genomförs med hjälp av kvalitativ textanalys inspirerad av kritisk diskursanalys. Det empiriska materialet hämtades från de fyra mediekanalerna Expressen, Computer World, Sveriges Radio och Tor Blog. Vidare diskuteras termerna anonymitetsparadox och moralpanik i studien eftersom att de visade sig vara av särskild relevans vid forskning av ett sådant digitalt och till synes anonymt mediefenomen. Studiens resultat påvisar att tillgången till ett fritt och anonymiserat Internet tycks blivit en fråga vad avser demokratiska rättigheter. Ur denna aspekt fungerar Dark web som en potentiell lösning mot den kartläggning som förekommer på det traditionella Internet. Computer World hade en uteslutande teknisk gestaltning av Dark web där intresset låg i att presentera teknologin bakom nätverket. Kvällspressen fokuserade huvudsakligen på den kriminalitet som cirkulerar på det dolda nätverket och redogjorde främst för narkotikahandel och kortbedrägerier. Tog Blog belyste både tekniken och anonymitetsaspekten bakom Dark web medan Sveriges Radio visade sig vara det medium som hade mest omfattande och genomgripande porträtteringar vad avser Dark web. Slutligen visade studien att det är i samspelet mellan de risker och möjligheter kring Dark web som paradoxen med anonymitet uppstår.
8

Digitalised Combats and Their Impact on Social Sustainability in Kenya and Nigeria / Digitaliserade strider och deras inverkan på social hållbarhet i Kenya och Nigeria

Aszalós, Roland January 2023 (has links)
In our era, digital technology is one of the fastest-changing areas. It impacts our private life, well-being, economics, politics and warfare. This essay intends to answer how digital transformation affects combats and state and non-state actors and also how these digitalised combats compromise social sustainability. The findings include social media and online platforms, dark web and cyberterrorism, cryptocurrency, remote sensing and surveillance, machine learning and AI, and digitally enabled strategies. The analysis was done by the Centre of Gravity model, social sustainability and securitisation theory. The thesis follows a comparative case study approach about Kenya and Nigeria therefore the essay address al-Shabaab and Boko Haram as the two prominent terrorist groups and the empirical data are related specifically to these countries and these diasporas.
9

Dark Web Forensics : An Investigation of Tor and I2P Artifacts on Windows 11

Abolghsemi, Seyedhesam, Chukwuneta, Chukwudalu January 2024 (has links)
With the rising use of the Internet by businesses and individuals for their regular activities and transactions, there has been increased attention to user privacy and data security on the web. While the adoption of dark web networks has ensured that users' privacy and anonymity concerns are being addressed, there has also been a consequential increase in illicit activities on the internet. The dark web remains a critical area for law enforcement investigations, providing a platform for criminal activities to thrive unchecked. This study evaluates the digital traces deposited by dark web browsers on the client side of user devices, providing a deep insight into the security features of Tor and I2P and outlining the potential areas where digital artifacts can be retrieved on a Windows 11 computer. By detailing the forensic acquisition process and subsequent artifact analysis, this research aims to enhance the capabilities of digital forensic examiners in tracking and prosecuting cybercriminals, thereby contributing to the broader field of digital forensics and cybersecurity.
10

Happy Ending för nybörjare : En netnografisk studie om ett sexköpsforum

Lindberg, Johannes January 2017 (has links)
Internet har inneburit nya möjligheter för mänskligheten att kommunicera och organisera sig. I denna uppsats beger vi oss till utkanterna av nätet för att utforska ett sexköpsforum online med inriktning mot thaimassagesalonger. Med hjälp av netnografisk metod och utifrån sociologisk teori undersöks normer och organisering på forumet med fokus på förstagångsbesökaren. En lättare undersökning av förekomst av sexuell tjänst som beskriven av forumets medlemmar återfinns. Studiens resultat tyder på att det analyserade forumet har bidragit till att inspirera och lära förstagångsbesökare till att erhålla sexuella tjänster. Vidare identifieras ett, utanför det publika forumet, informationsubyte av komprometterande information där exakta anvisningar och platsdata utbyts medlemmar emellan. Detta sker i det så kallade privata meddelandet / Along with the rise of the Internet human interaction, communication and organisaiton have come to see new opportunities. In this study we will explore the fringes of the internet to explore a forum discussing thaimassage with sexual services also known as Happy Ending. Thanks to netnographic methods and sociological and criminological theory we will put the sex buyer in a social context. Extra focus is given to the first timer. The results of this study shows that criminal or deviant behavior can be learned from a forum online. In particular that the first time sexbuyer gets inspiration from and help to learn how to become a sexbuyer. Other results include the organisational setup surrounding the analyzed forum as well as a brief quantitative calculation on occurences of Happy Endings.

Page generated in 0.054 seconds