• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 1
  • 1
  • 1
  • Tagged with
  • 8
  • 8
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

New Perspectives About The Tor Ecosystem: Integrating Structure With Information

Zabihimayvan, Mahdieh 03 June 2020 (has links)
No description available.
2

”När jag använder TOR blir jag en helt annan person” : En kvalitativ intervjustudie om motiven bakom användningen av Tor Browser och The Dark Web / ”When I go on TOR, I am a completely different person” : A qualitative interview study about the motives behind the usage of Tor Browser and The Dark Web

Dahlberg, Nadia, Bryskhe, Jonathan January 2017 (has links)
Denna studie har som mål att ge en inblick i varför och hur Internetanvändare nyttjar Tor Browser och The Dark Web. Nätverket och webbläsaren förknippas ofta med illegal verksamhet, men även med yttrandefrihet och anonymitet. Vi vill undersöka hur användandet av dessa ser ut och skapa en förståelse kring varför individer väljer att vända sig dit. Detta görs med hjälp av kvalitativa intervjuer med sammanlagt nio personer som använder sig av nätverket och webbläsaren. Intervjuerna har genomförts på forumen Flashback Forum, Quora och Reddit genom sajternas privata chattfunktioner. Materialet har sedan analyserats med hjälp av det teoretiska perspektivet Uses and Gratification för att synliggöra vilka sociala och psykologiska behov som tillgodoses genom användandet. Studiens resultat visade att merparten av de intervjuade vände sig till Tor Browser och The Dark Web eftersom att de, i förstahand, var intresserade av illegal verksamhet och använde nätverket samt webbläsaren för att få tillgång till materialet, men även för att göra det svårare för myndigheter att spåra deras aktivitet online. Användandet grundade sig, i andrahand, i ett intresse för yttrandefrihet och anonymitet och det var även dessa ämnen som gjorde att användarna fortsatte att återvända till Tor Browser och The Dark Web.
3

Podnikatelské modely na deep webu / Business models on deep web

Soukup, Jan January 2015 (has links)
This diploma thesis analyzes the deep web environment with the use of business models from the surface web. In the indroduction part of the thesis summarize terms web, deep web and dark web, these terms are intermingle the entire thesis, also brings the concept on Onion routing with use of Tor software. An inseparable part is the comparsion of tools which can be used for access to the dark web. The main part of the thesis analyzes most used business models on the surface web including their methods of monetization and after that author tries to apply these models in the dark web environment. An importat part of this work is the analysis a type of services occuring on the dark web and mutual comparison of several sub-criteria of each service. In the final part the thesis presents project Turris on which is applied to create a relay node for the Tor network.
4

UNVEILING THE SHADOWS: A COGNITIVE APPROACH TO UNDERSTANDING SOCIAL INFLUENCE STRATEGIES FOR ESTABLISHING SOCIAL ORDER IN DARKNET MARKETS

Andrei, Filippo 15 March 2024 (has links)
Darknet markets have emerged due to technological advancements, decreasing the likelihood of violence by facilitating remote purchasing interactions. However, the absence of traditional legal frameworks makes maintaining order in these illegal online markets challenging. Without a legitimate state to enforce property rights or quality standards, sustaining order becomes increasingly complex. Despite its illicit nature and the absence of a legitimate state to protect market transactions, the darknet market has proven to be a resilient environment where user satisfaction rivals that of traditional e-commerce platforms such as eBay. How is this possible? Howcan social order emerge in such a context? Existing studies have primarily approached the issue from neo-institutionalist and social network perspectives, examining the emergence of social order through informal institutions and repeated interactions. A notable gap remains in understanding the cognitive aspects shaping decision-making processes in these illicit markets. This dissertation aims to fill this gap by examining the role of social influence in establishing the social order of the market in the absence of legal safeguards from a socio-cognitive lean.
5

Reference Model to Identify the Maturity Level of Cyber Threat Intelligence on the Dark Web

Santos, Ricardo Meléndez, Gallardo, Anthony Aguilar, Aguirre, Jimmy Armas 01 January 2021 (has links)
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado. / In this article, we propose a reference model to identify the maturity level of the cyber intelligence threat process. This proposal considers the dark web as an important source of cyber threats causing a latent risk that organizations do not consider in their cybersecurity strategies. The proposed model aims to increase the maturity level of the process through a set of proposed controls according to the information found on the dark web. The model consists of three phases: (1) Identification of information assets using cyber threat intelligence tools. (2) Diagnosis of the exposure of information assets. (3) Proposal of controls according to the proposed categories and criteria. The validation of the proposal was carried out in an insurance institution in Lima, Peru, with data obtained by the institution. The measurement was made with artifacts that allowed to obtain an initial value of the current panorama of the company. Preliminary results showed 196 emails and passwords exposed on the dark web of which one corresponded to the technology manager of the company under evaluation. With this identification, it was diagnosed that the institution was at a “Normal” maturity level, and from the implementation of the proposed controls, the “Advanced” level was reached. / Revisión por pares
6

Digitalised Combats and Their Impact on Social Sustainability in Kenya and Nigeria / Digitaliserade strider och deras inverkan på social hållbarhet i Kenya och Nigeria

Aszalós, Roland January 2023 (has links)
In our era, digital technology is one of the fastest-changing areas. It impacts our private life, well-being, economics, politics and warfare. This essay intends to answer how digital transformation affects combats and state and non-state actors and also how these digitalised combats compromise social sustainability. The findings include social media and online platforms, dark web and cyberterrorism, cryptocurrency, remote sensing and surveillance, machine learning and AI, and digitally enabled strategies. The analysis was done by the Centre of Gravity model, social sustainability and securitisation theory. The thesis follows a comparative case study approach about Kenya and Nigeria therefore the essay address al-Shabaab and Boko Haram as the two prominent terrorist groups and the empirical data are related specifically to these countries and these diasporas.
7

Modelo de referencia para identificar el nivel de madurez de ciberinteligencia de amenazas en la dark web

Aguilar Gallardo, Anthony Josue, Meléndez Santos, Ricardo Alfonso 31 October 2020 (has links)
La web oscura es una zona propicia para actividades ilegales de todo tipo. En los últimos tiempos los cibercriminales están cambiando su enfoque hacia el tráfico de informacion (personal o corporativa) porque los riesgos son mucho más bajos en comparación con otros tipos de delito. Hay una gran cantidad de información alojada aquí, pero pocas compañías saben cómo acceder a estos datos, evaluarlos y minimizar el daño que puedan causar. El presente trabajo propone un modelo de referencia para identificar el nivel de madurez del proceso de Ciber Inteligencia de Amenazas. Esta propuesta considera la información comprometida en la web oscura, originando un riesgo latente que las organizaciones no consideran en sus estrategias de ciberseguridad. El modelo propuesto tiene como objetivo aumentar el nivel de madurez del proceso mediante un conjunto de controles propuestos de acuerdo a los hallazgos encontrados en la web oscura. El modelo consta de 3 fases:1. Identificación de los activos de información mediante herramientas de Ciber inteligencia de amenazas. 2. Diagnóstico de la exposición de los activos de información. 3. Propuesta de controles según las categorías y criterios propuestos. La validación de la propuesta se realizó en una institución de seguros en Lima, Perú con datos obtenidos por la institución. Los resultados preliminares mostraron 196 correos electrónicos y contraseñas expuestos en la web oscura de los cuales 1 correspondía al Gerente de Tecnología. Con esta identificación, se diagnosticó que la institución se encontraba en un nivel de madurez “Normal”, y a partir de la implementación de los controles propuestos se llegó al nivel “Avanzado”. / The dark web is an area conducive to illegal activities of all kinds. In recent times, cybercriminals are changing their approach towards information trafficking (personal or corporate) because the risks are much lower compared to other types of crime. There is a wealth of information hosted here, but few companies know how to access this data, evaluate it, and minimize the damage it can cause. In this work, we propose a reference model to identify the maturity level of the Cyber ​​Intelligence Threat process. This proposal considers the dark web as an important source of cyber threats causing a latent risk that organizations do not consider in their cybersecurity strategies. The proposed model aims to increase the maturity level of the process through a set of proposed controls according to the information found on the dark web. The model consists of 3 phases: 1. Identification of information assets using cyber threat intelligence tools. 2. Diagnosis of the exposure of information assets. 3. Proposal of controls according to the proposed categories and criteria. The validation of the proposal was carried out in an insurance institution in Lima, Peru with data obtained by the institution. Preliminary results showed 196 emails and passwords exposed on the dark web of which 1 corresponded to the Technology Manager of the company under evaluation. With this identification, it was diagnosed that the institution was at a “Normal” maturity level, and from the implementation of the proposed controls the “Advanced” level was reached. / Tesis
8

Screenlife films: graphical user interfaces as mise en scène, impacts on cinematic conventions, storytelling and mystery fiction techniques

Madoc-Jones, Gareth 12 1900 (has links)
Ce mémoire est une description et une analyse de la mise en scène dans trois films screenlife – Unfriended (Leo Gabriadze, 2014), Unfriended: Dark Web (Stephen Susco, 2018) et Searching (Aneesh Chaganty, 2018) – qui est principalement défini par les interfaces utilisateur graphiques (IUG) affichées dans les représentations des enregistrements d'écran d'ordinateur par lesquels ces films sont définis. Le but de cette étude était de découvrir – en utilisant la recherche sur les IUG par Lev Manovich et Anne Friedberg – comment la nature modulaire des médias numériques – vidéo, photo et texte – positionnés à l'intérieur de chaque IUG permet de transposer certaines conventions cinématographiques, techniques de narration et de roman policier sur les IUG. La recherche révèle qu'en raison des IUG (associées au système d'exploitation et à des applications), certaines traditions narratives ont été présentées de manière multiple, simultanée et superposée dans la mise en scène, par opposition à la manière singulière et séquentielle que les films ont généralement représenté le temps et l'espace en montrant un plan à la fois. Le premier chapitre raconte l'histoire du film screenlife et comment il a connu plusieurs itérations en raison de ce qui avait pu être affiché dans les IUG à différentes périodes entre 2002 et 2018, notamment les types d'appels vidéo, de sites Web et de médias sociaux. Le deuxième chapitre propose une mise en scène screenlife qui divise l'espace de l'écran en trois niveaux pour articuler comment les traditions cinématographiques et narratives ont été transposées dans Unfriended, Unfriended: Dark Web et Searching. Le troisième chapitre est une continuation de ce processus, mais avec un accent sur les techniques de roman policier, les indices et les fausses pistes, présents dans chacun de ces trois films screenlife. La description et l'analyse confirment que ces traditions de mystification sont également transposées dans les IUG de manière multiple, simultanée et superposée à partir de la manière singulière et séquentielle dont elles ont été présentées dans les romans policiers et les films policiers traditionnellement tournés. / This master’s thesis is a description and analysis of the mise en scène in three screenlife films – Unfriended (Leo Gabriadze, 2014), Unfriended: Dark Web (Stephen Susco, 2018) and Searching (Aneesh Chaganty, 2018) – that is primarily defined by the graphical user interfaces (GUIs) displayed within the representations of computer screen recordings these films (and this format) are defined by. The purpose of this study was to find out – using the research into GUIs by Lev Manovich and Anne Friedberg as a framework to interpret the space within a computer screen – how the modular nature of individual digital media – video, photo and text – positioned within each GUI permit certain cinematic conventions, storytelling and mystery fiction techniques to be transposed onto a computer screen’s interfaces (GUIs). The research reveals that due to the GUIs (associated with the computer’s operating system and its various applications) certain narrative traditions have been presented in a multiple, simultaneous and overlapping way within the mise en scène as opposed to the singular and sequential manner that films have typically represented time and space by showing one shot, one spatio-temporality, within the frame at a time. The first chapter recounts the history of the screenlife film and how it has had several iterations because of what had been possible to display within GUIs at various periods between 2002 and 2018, notably the types of video calls, websites and social media. The second chapter proposes a screenlife mise en scène that divides the screen space into three levels to articulate how cinematic and narrative traditions have been transposed into Unfriended, Unfriended: Dark Web and Searching. The third chapter is a continuation of this process, but with a focus on mystery fiction techniques, clues and red herrings, present in each of these three screenlife films. The description and analysis confirms that these mystification traditions are also transposed into the GUIs in a multiple, simultaneous and overlapping way from the singular and sequential manner that they have been presented in detective novels and traditionally shot mystery genre films.

Page generated in 0.082 seconds