Spelling suggestions: "subject:"ehe park eeb"" "subject:"ehe park beb""
1 |
New Perspectives About The Tor Ecosystem: Integrating Structure With InformationZabihimayvan, Mahdieh 03 June 2020 (has links)
No description available.
|
2 |
”När jag använder TOR blir jag en helt annan person” : En kvalitativ intervjustudie om motiven bakom användningen av Tor Browser och The Dark Web / ”When I go on TOR, I am a completely different person” : A qualitative interview study about the motives behind the usage of Tor Browser and The Dark WebDahlberg, Nadia, Bryskhe, Jonathan January 2017 (has links)
Denna studie har som mål att ge en inblick i varför och hur Internetanvändare nyttjar Tor Browser och The Dark Web. Nätverket och webbläsaren förknippas ofta med illegal verksamhet, men även med yttrandefrihet och anonymitet. Vi vill undersöka hur användandet av dessa ser ut och skapa en förståelse kring varför individer väljer att vända sig dit. Detta görs med hjälp av kvalitativa intervjuer med sammanlagt nio personer som använder sig av nätverket och webbläsaren. Intervjuerna har genomförts på forumen Flashback Forum, Quora och Reddit genom sajternas privata chattfunktioner. Materialet har sedan analyserats med hjälp av det teoretiska perspektivet Uses and Gratification för att synliggöra vilka sociala och psykologiska behov som tillgodoses genom användandet. Studiens resultat visade att merparten av de intervjuade vände sig till Tor Browser och The Dark Web eftersom att de, i förstahand, var intresserade av illegal verksamhet och använde nätverket samt webbläsaren för att få tillgång till materialet, men även för att göra det svårare för myndigheter att spåra deras aktivitet online. Användandet grundade sig, i andrahand, i ett intresse för yttrandefrihet och anonymitet och det var även dessa ämnen som gjorde att användarna fortsatte att återvända till Tor Browser och The Dark Web.
|
3 |
Podnikatelské modely na deep webu / Business models on deep webSoukup, Jan January 2015 (has links)
This diploma thesis analyzes the deep web environment with the use of business models from the surface web. In the indroduction part of the thesis summarize terms web, deep web and dark web, these terms are intermingle the entire thesis, also brings the concept on Onion routing with use of Tor software. An inseparable part is the comparsion of tools which can be used for access to the dark web. The main part of the thesis analyzes most used business models on the surface web including their methods of monetization and after that author tries to apply these models in the dark web environment. An importat part of this work is the analysis a type of services occuring on the dark web and mutual comparison of several sub-criteria of each service. In the final part the thesis presents project Turris on which is applied to create a relay node for the Tor network.
|
4 |
UNVEILING THE SHADOWS: A COGNITIVE APPROACH TO UNDERSTANDING SOCIAL INFLUENCE STRATEGIES FOR ESTABLISHING SOCIAL ORDER IN DARKNET MARKETSAndrei, Filippo 15 March 2024 (has links)
Darknet markets have emerged due to technological advancements, decreasing the likelihood of violence by facilitating remote purchasing interactions. However, the absence of traditional legal frameworks makes maintaining order in these illegal online markets challenging. Without a legitimate state to enforce property rights or quality standards, sustaining order becomes increasingly complex. Despite its illicit nature and the absence of a legitimate state to protect market transactions, the darknet market has proven to be a resilient environment where user satisfaction rivals that of traditional e-commerce platforms such as eBay. How is this possible? Howcan social order emerge in such a context? Existing studies have primarily approached the issue from neo-institutionalist and social network perspectives, examining the emergence of social order through informal institutions and repeated interactions. A notable gap remains in understanding the cognitive aspects shaping decision-making processes in these illicit markets. This dissertation aims to fill this gap by examining the role of social influence in establishing the social order of the market in the absence of legal safeguards from a socio-cognitive lean.
|
5 |
Reference Model to Identify the Maturity Level of Cyber Threat Intelligence on the Dark WebSantos, Ricardo Meléndez, Gallardo, Anthony Aguilar, Aguirre, Jimmy Armas 01 January 2021 (has links)
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado. / In this article, we propose a reference model to identify the maturity level of the cyber intelligence threat process. This proposal considers the dark web as an important source of cyber threats causing a latent risk that organizations do not consider in their cybersecurity strategies. The proposed model aims to increase the maturity level of the process through a set of proposed controls according to the information found on the dark web. The model consists of three phases: (1) Identification of information assets using cyber threat intelligence tools. (2) Diagnosis of the exposure of information assets. (3) Proposal of controls according to the proposed categories and criteria. The validation of the proposal was carried out in an insurance institution in Lima, Peru, with data obtained by the institution. The measurement was made with artifacts that allowed to obtain an initial value of the current panorama of the company. Preliminary results showed 196 emails and passwords exposed on the dark web of which one corresponded to the technology manager of the company under evaluation. With this identification, it was diagnosed that the institution was at a “Normal” maturity level, and from the implementation of the proposed controls, the “Advanced” level was reached. / Revisión por pares
|
6 |
Digitalised Combats and Their Impact on Social Sustainability in Kenya and Nigeria / Digitaliserade strider och deras inverkan på social hållbarhet i Kenya och NigeriaAszalós, Roland January 2023 (has links)
In our era, digital technology is one of the fastest-changing areas. It impacts our private life, well-being, economics, politics and warfare. This essay intends to answer how digital transformation affects combats and state and non-state actors and also how these digitalised combats compromise social sustainability. The findings include social media and online platforms, dark web and cyberterrorism, cryptocurrency, remote sensing and surveillance, machine learning and AI, and digitally enabled strategies. The analysis was done by the Centre of Gravity model, social sustainability and securitisation theory. The thesis follows a comparative case study approach about Kenya and Nigeria therefore the essay address al-Shabaab and Boko Haram as the two prominent terrorist groups and the empirical data are related specifically to these countries and these diasporas.
|
7 |
Dark Web Forensics : An Investigation of Tor and I2P Artifacts on Windows 11Abolghsemi, Seyedhesam, Chukwuneta, Chukwudalu January 2024 (has links)
With the rising use of the Internet by businesses and individuals for their regular activities and transactions, there has been increased attention to user privacy and data security on the web. While the adoption of dark web networks has ensured that users' privacy and anonymity concerns are being addressed, there has also been a consequential increase in illicit activities on the internet. The dark web remains a critical area for law enforcement investigations, providing a platform for criminal activities to thrive unchecked. This study evaluates the digital traces deposited by dark web browsers on the client side of user devices, providing a deep insight into the security features of Tor and I2P and outlining the potential areas where digital artifacts can be retrieved on a Windows 11 computer. By detailing the forensic acquisition process and subsequent artifact analysis, this research aims to enhance the capabilities of digital forensic examiners in tracking and prosecuting cybercriminals, thereby contributing to the broader field of digital forensics and cybersecurity.
|
8 |
Modelo de referencia para identificar el nivel de madurez de ciberinteligencia de amenazas en la dark webAguilar Gallardo, Anthony Josue, Meléndez Santos, Ricardo Alfonso 31 October 2020 (has links)
La web oscura es una zona propicia para actividades ilegales de todo tipo. En los últimos tiempos los cibercriminales están cambiando su enfoque hacia el tráfico de informacion (personal o corporativa) porque los riesgos son mucho más bajos en comparación con otros tipos de delito. Hay una gran cantidad de información alojada aquí, pero pocas compañías saben cómo acceder a estos datos, evaluarlos y minimizar el daño que puedan causar.
El presente trabajo propone un modelo de referencia para identificar el nivel de madurez del proceso de Ciber Inteligencia de Amenazas. Esta propuesta considera la información comprometida en la web oscura, originando un riesgo latente que las organizaciones no consideran en sus estrategias de ciberseguridad.
El modelo propuesto tiene como objetivo aumentar el nivel de madurez del proceso mediante un conjunto de controles propuestos de acuerdo a los hallazgos encontrados en la web oscura. El modelo consta de 3 fases:1. Identificación de los activos de información mediante herramientas de Ciber inteligencia de amenazas. 2. Diagnóstico de la exposición de los activos de información. 3. Propuesta de controles según las categorías y criterios propuestos.
La validación de la propuesta se realizó en una institución de seguros en Lima, Perú con datos obtenidos por la institución. Los resultados preliminares mostraron 196 correos electrónicos y contraseñas expuestos en la web oscura de los cuales 1 correspondía al Gerente de Tecnología. Con esta identificación, se diagnosticó que la institución se encontraba en un nivel de madurez “Normal”, y a partir de la implementación de los controles propuestos se llegó al nivel “Avanzado”. / The dark web is an area conducive to illegal activities of all kinds. In recent times, cybercriminals are changing their approach towards information trafficking (personal or corporate) because the risks are much lower compared to other types of crime. There is a wealth of information hosted here, but few companies know how to access this data, evaluate it, and minimize the damage it can cause.
In this work, we propose a reference model to identify the maturity level of the Cyber Intelligence Threat process. This proposal considers the dark web as an important source of cyber threats causing a latent risk that organizations do not consider in their cybersecurity strategies.
The proposed model aims to increase the maturity level of the process through a set of proposed controls according to the information found on the dark web. The model consists of 3 phases: 1. Identification of information assets using cyber threat intelligence tools. 2. Diagnosis of the exposure of information assets. 3. Proposal of controls according to the proposed categories and criteria.
The validation of the proposal was carried out in an insurance institution in Lima, Peru with data obtained by the institution. Preliminary results showed 196 emails and passwords exposed on the dark web of which 1 corresponded to the Technology Manager of the company under evaluation. With this identification, it was diagnosed that the institution was at a “Normal” maturity level, and from the implementation of the proposed controls the “Advanced” level was reached. / Tesis
|
9 |
Screenlife films: graphical user interfaces as mise en scène, impacts on cinematic conventions, storytelling and mystery fiction techniquesMadoc-Jones, Gareth 12 1900 (has links)
Ce mémoire est une description et une analyse de la mise en scène dans trois films screenlife –
Unfriended (Leo Gabriadze, 2014), Unfriended: Dark Web (Stephen Susco, 2018) et Searching
(Aneesh Chaganty, 2018) – qui est principalement défini par les interfaces utilisateur graphiques
(IUG) affichées dans les représentations des enregistrements d'écran d'ordinateur par lesquels
ces films sont définis. Le but de cette étude était de découvrir – en utilisant la recherche sur les
IUG par Lev Manovich et Anne Friedberg – comment la nature modulaire des médias numériques
– vidéo, photo et texte – positionnés à l'intérieur de chaque IUG permet de transposer certaines
conventions cinématographiques, techniques de narration et de roman policier sur les IUG. La
recherche révèle qu'en raison des IUG (associées au système d'exploitation et à des applications),
certaines traditions narratives ont été présentées de manière multiple, simultanée et superposée
dans la mise en scène, par opposition à la manière singulière et séquentielle que les films ont
généralement représenté le temps et l'espace en montrant un plan à la fois.
Le premier chapitre raconte l'histoire du film screenlife et comment il a connu plusieurs itérations
en raison de ce qui avait pu être affiché dans les IUG à différentes périodes entre 2002 et 2018,
notamment les types d'appels vidéo, de sites Web et de médias sociaux. Le deuxième chapitre
propose une mise en scène screenlife qui divise l'espace de l'écran en trois niveaux pour articuler
comment les traditions cinématographiques et narratives ont été transposées dans Unfriended,
Unfriended: Dark Web et Searching. Le troisième chapitre est une continuation de ce processus,
mais avec un accent sur les techniques de roman policier, les indices et les fausses pistes, présents
dans chacun de ces trois films screenlife. La description et l'analyse confirment que ces traditions
de mystification sont également transposées dans les IUG de manière multiple, simultanée et
superposée à partir de la manière singulière et séquentielle dont elles ont été présentées dans
les romans policiers et les films policiers traditionnellement tournés. / This master’s thesis is a description and analysis of the mise en scène in three screenlife films –
Unfriended (Leo Gabriadze, 2014), Unfriended: Dark Web (Stephen Susco, 2018) and Searching
(Aneesh Chaganty, 2018) – that is primarily defined by the graphical user interfaces (GUIs)
displayed within the representations of computer screen recordings these films (and this format)
are defined by. The purpose of this study was to find out – using the research into GUIs by Lev
Manovich and Anne Friedberg as a framework to interpret the space within a computer screen –
how the modular nature of individual digital media – video, photo and text – positioned within
each GUI permit certain cinematic conventions, storytelling and mystery fiction techniques to be
transposed onto a computer screen’s interfaces (GUIs). The research reveals that due to the GUIs
(associated with the computer’s operating system and its various applications) certain narrative
traditions have been presented in a multiple, simultaneous and overlapping way within the mise
en scène as opposed to the singular and sequential manner that films have typically represented
time and space by showing one shot, one spatio-temporality, within the frame at a time.
The first chapter recounts the history of the screenlife film and how it has had several iterations
because of what had been possible to display within GUIs at various periods between 2002 and
2018, notably the types of video calls, websites and social media. The second chapter proposes a
screenlife mise en scène that divides the screen space into three levels to articulate how cinematic
and narrative traditions have been transposed into Unfriended, Unfriended: Dark Web and
Searching. The third chapter is a continuation of this process, but with a focus on mystery fiction
techniques, clues and red herrings, present in each of these three screenlife films. The description
and analysis confirms that these mystification traditions are also transposed into the GUIs in a
multiple, simultaneous and overlapping way from the singular and sequential manner that they
have been presented in detective novels and traditionally shot mystery genre films.
|
Page generated in 0.089 seconds