-->
Navigation
The Dark Web: Breakthroughs in research and practice

The Dark Web: Breakthroughs in research and practice

Now pay Easier and Secure using Paypal
Price:

Read more

Information Resources Management Association

Editor-in-Chief

Mehdi Khosrow-Pour, DBA
Information Resources Management Association, USA

Associate Editors

Steve Clarke, University of Hull, UK
Murray E. Jennex, San Diego State University, USA
Annie Becker, Florida Institute of Technology, USA
Ari-Veikko Anttiroiko, University of Tampere, Finland

Editorial Advisory Board

Sherif Kamel, American University in Cairo, Egypt
In Lee, Western Illinois University, USA
Jerzy Kisielnicki, Warsaw University, Poland
Amar Gupta, Arizona University, USA
Craig van Slyke, University of Central Florida, USA
John Wang, Montclair State University, USA
Vishanth Weerakkody, Brunel University, UK

e-books shop
e-books shop
Purchase Now !
Just with Paypal



Book Details
 Price
 3.00
 Pages
 388 p
 File Size 
 6,442 KB
 File Type
 PDF format
 ISBN
 9781522531647
 Copyright©   
 2018 by IGI Global  

Preface
The constantly changing landscape surrounding the Dark Web makes it challenging for experts and
practitioners to stay informed of the field’s most up-to-date research. That is why IGI Global is pleased
to offer this one-volume comprehensive reference collection that will empower students, researchers, and academicians with a strong understanding of these critical issues by providing both broad and detailed perspectives on cutting-edge theories and developments. This compilation is designed to act as a single reference source on conceptual, methodological, and technical aspects, as well as to provide insight into emerging trends and future opportunities within the discipline.

is organized into four sections that provide
comprehensive coverage of important topics. The sections are:
1. Cyber Crime and Security
2. Data Mining and Analysis
3. Online Identity
4. Web Crawling
The following paragraphs provide a summary of what to expect from this invaluable reference source:
Section 1, “Cyber Crime and Security,” opens this extensive reference source by highlighting the
latest developments in criminal activity in the cyber sphere. Through perspectives on online terrorism,
cyberbullying, and policy implementation, this section demonstrates emerging trends in cybercrime. 
The presented research facilitates a better understanding of criminal activity in digital settings.
Section 2, “Data Mining and Analysis,” includes chapters on strategies for extracting digital data and
information. Including discussions on the Hidden Web, information retrieval, and the Deep Web, this
section presents research on emerging trends in harvesting digital information. 
This inclusive information assists in advancing current practices in data mining and analysis techniques.
Section 3, “Online Identity,” presents coverage on the creation and protection of digital identities in
modern society. Through innovative discussions on electronic profiling, anonymity, and online communities, this section highlights the changing landscape of identity in digital environments. These inclusive perspectives contribute to the available knowledge on virtual settings and personal identification.
Section 4, “Web Crawling,” discusses coverage and research perspectives on Internet browsers.
Through analyses on search engines, information extraction, and Deep Web crawling, this section contains pivotal information on the latest developments in web crawlers. The presented research facilitates a comprehensive understanding of how emerging innovations are optimizing search engine architectures.


Table of Contents
Preface...........viii
Section 1
Cyber Crime and Security
Chapter 1
The Malevolent Side of Revenge Porn Proclivity: Dark Personality Traits and Sexist Ideology............ 1
Afroditi Pina, University of Kent, UK
James Holland, University of Kent, UK
Mark James, University of Kent, UK
Chapter 2
Contemporary Terror on the Net........... 18
Emily Stacey, Swansea University, UK
Chapter 3
Dysfunctional Digital Demeanors: Tales From (and Policy Implications of) eLearning’s 
Dark Side.......... 37
Alexander G. Flor, University of the Philippines (Open University), Philippines
Benjamina Gonzalez-Flor, University of the Philippines – Los Baños, Philippines
Chapter 4
How to Become a Cybercriminal? An Explanation of Cybercrime Diffusion..... 51
Jean-Loup Richet, University of Nantes, France
Section 2
Data Mining and Analysis
Chapter 5
Optimal Query Generation for Hidden Web Extraction Through Response Analysis.... 65
Sonali Gupta, YMCA University of Science & Technology, India
Komal Kumar Bhatia, YMCA University of Science & Technology, India
Chapter 6
The Evolution of the (Hidden) Web and Its Hidden Data....... 84
Manuel Álvarez Díaz, University of A Coruña, Spain
Víctor Manuel Prieto Álvarez, University of A Coruña, Spain
Fidel Cacheda Seijo, University of A Coruña, Spain
Chapter 7
Deep Web Information Retrieval Process: A Technical Survey..... 114
Dilip Kumar Sharma, G.L.A. Institute of Technology and Management, Mathura, India
A. K. Sharma, YMCA University of Science and Technology, Faridabad, India
Chapter 8
The Contribution of Information Science Through Intellectual Property to Innovation in the
Brazilian Health Sector....... 138
Adelaide Maria de Souza Antunes, National Institute of Industrial Property (INPI), Brazil &
Federal University of Rio de Janeiro (UFRJ), Brazil
Flavia Maria Lins Mendes, Federal University of Rio de Janeiro, Brazil
Suzanne de Oliveira Rodrigues Schumacher, Federal University of Rio de Janeiro, Brazil
Luc Quoniam, Aix-Marseille Université, France
Jorge Lima de Magalhães, Ministry of Health, Brazil & Aix-Marseille Université, France
Chapter 9
Harvesting Deep Web Data Through Produser Involvement...... 175
Tomasz Kaczmarek, Poznań University of Economics, Poland
Dawid Grzegorz Węckowski, Poznań University of Economics, Poland
Chapter 10
Web Harvesting: Web Data Extraction Techniques for Deep Web Pages.... 199
B. Umamageswari, New Prince Shri Bhavani College of Engineering and Technology, India
R. Kalpana, Pondicherry Engineering College, India
Chapter 11
Effectiveness of Web Usage Mining Techniques in Business Application.... 227
Ahmed El Azab, Institute of Statistical Studies and Research, Egypt
Mahmood A. Mahmood, Institute of Statistical Studies and Research, Egypt
Abd El-Aziz, Institute of Statistical Studies and Research, Egypt
Section 3
Online Identity
Chapter 12
In Plaintext: Electronic Profiling in Public Online Spaces..... 255
Shalin Hai-Jew, Kansas State University, USA
Chapter 13
Becoming Anonymous: A Politics of Masking....... 290
Maria-Carolina Cambre, King’s University College at Western University Ontario, Canada
Section 4
Web Crawling
Chapter 14
Design of a Least Cost (LC) Vertical Search Engine Based on Domain Specific Hidden Web
Crawler...... 319
Sudhakar Ranjan, Apeejay Stya University, India
Komal Kumar Bhatia, YMCA University of Science & Technology, India
Chapter 15
A Novel Architecture for Deep Web Crawler........ 334
Dilip Kumar Sharma, Shobhit University, India
A. K. Sharma, YMCA University of Science and Technology, India
Chapter 16
Search Engine: A Backbone for Information Extraction in ICT Scenario..... 359
Dilip Kumar Sharma, Shobhit University, India
A. K. Sharma, YMCA University of Science and Technology, India
Index........... 375


Bookscreen
e-books shop

0