Encyclopedia of Criminal Activities and the Deep Web (3 Volumes)
Core Reference Title

Encyclopedia of Criminal Activities and the Deep Web (3 Volumes)

Mehdi Khosrow-Pour D.B.A. (Information Resources Management Association, USA)
Release Date: February, 2020|Copyright: © 2020 |Pages: 1162
ISBN13: 9781522597155|ISBN10: 1522597158|EISBN13: 9781522597162|DOI: 10.4018/978-1-5225-9715-5


As society continues to rely heavily on technological tools for facilitating business, e-commerce, banking, and communication, among other applications, there has been a significant rise in criminals seeking to exploit these tools for their nefarious gain. Countries all over the world are seeing substantial increases in identity theft and cyberattacks, as well as illicit transactions, including drug trafficking and human trafficking, being made through the dark web internet. Sex offenders and murderers explore unconventional methods of finding and contacting their victims through Facebook, Instagram, popular dating sites, etc., while pedophiles rely on these channels to obtain information and photographs of children, which are shared on hidden community sites. As criminals continue to harness technological advancements that are outpacing legal and ethical standards, law enforcement and government officials are faced with the challenge of devising new and alternative strategies to identify and apprehend criminals to preserve the safety of society.

The Encyclopedia of Criminal Activities and the Deep Web is a three-volume set that includes comprehensive articles covering multidisciplinary research and expert insights provided by hundreds of leading researchers from 30 countries including the United States, the United Kingdom, Australia, New Zealand, Germany, Finland, South Korea, Malaysia, and more. This comprehensive encyclopedia provides the most diverse findings and new methodologies for monitoring and regulating the use of online tools as well as hidden areas of the internet, including the deep and dark web. Highlighting a wide range of topics such as cyberbullying, online hate speech, and hacktivism, this book will offer strategies for the prediction and prevention of online criminal activity and examine methods for safeguarding internet users and their data from being tracked or stalked. Due to the techniques and extensive knowledge discussed in this publication it is an invaluable addition for academic and corporate libraries as well as a critical resource for policy makers, law enforcement officials, forensic scientists, criminologists, sociologists, victim advocates, cybersecurity analysts, lawmakers, government officials, industry professionals, academicians, researchers, and students within this field of study.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Artificial Intelligence
  • Biometric System
  • Bitcoin
  • Blockchain
  • Botnet
  • Child Exploitation
  • Criminology
  • Cyber Abuse
  • Cyber Aggression
  • Cyber Buffer Zones
  • Cyber Espionage
  • Cyber Laws
  • Cyberbullying
  • Cybercrime
  • Cybersecurity
  • Cybersecurity Legislation
  • Cyberwarfare
  • Dark Web
  • Darknet
  • Data Privacy
  • Data Protection
  • Drug Trafficking
  • E-Banking Security
  • E-Marketing
  • Email Spam
  • Ethics
  • Fake News
  • File Sharing
  • Fraud
  • Gaming
  • Hacktivism
  • Hate Crimes
  • Human Behavior
  • Human Trafficking
  • Human-Based Cyber Defense
  • Identity Theft
  • Internet of Things
  • Internet Privacy
  • Internet Regulations
  • Machine Learning
  • Online Activism
  • Sex Trafficking
  • Smart Contracts
  • Social Engineering
  • Whistleblowers

Reviews and Testimonials

The articles in this book have successfully illustrated the deficiencies of technologies and how cybercriminals exploit the vulnerabilities. The book is presented in an encyclopedia-like structure so that readers can review the cybercrimes systematically conducted on the invisible webs and the human responsibility in using the Internet. I strongly recommend this book to cyberusers, policymakers, lawmakers, and technology developers.

– Prof. Arthur So, School of Electrical Engineering and Computer Science (EECS), University of Ottawa, Canada

Table of Contents and List of Contributors

Search this Book:

Author(s)/Editor(s) Biography

Mehdi Khosrow-Pour, D.B.A., received his Doctorate in Business Administration from the Nova Southeastern University (Florida, USA). Dr. Khosrow-Pour taught undergraduate and graduate information system courses at the Pennsylvania State University – Harrisburg for almost 20 years. He is currently Executive Editor at IGI Global (www.igi-global.com). He also serves as Executive Director of the Information Resources Management Association (IRMA) (www.irma-international.org) and Executive Director of the World Forgotten Children Foundation (www.worldforgottenchildren.org). He is the author/editor of more than 100 books in information technology management. He is also currently the Editor-in-Chief of the International Journal of E-Politics (IJEP) and the International Journal of Semiotics and Visual Rhetoric (IJSVR), and is also the founding Editor-in-Chief of the Information Resources Management Journal (IRMJ), Journal of Electronic Commerce in Organizations (JECO), Journal of Cases on Information Technology (JCIT), and the Journal of Information Technology Research (JITR), and has authored more than 50 articles published in various conference proceedings and scholarly journals.