Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12258/3391
Title: New frontiers of cybercrime
Authors: Uzdenov, R. M.
Узденов, Р. М.
Keywords: Anonymous;Computer crimes;Criminology;Deep;Hidden;Internet;Profound;TOR network
Issue Date: 2016
Publisher: Baikal National University of Economics and Law
Citation: Uzdenov, R.M. New frontiers of cybercrime // Russian journal of criminology. - 2016. - Volume 10. - Issue 4. - Pages 649-655
Series/Report no.: Russian journal of criminology
Abstract: Although cybercrime is a relatively recent phenomenon, criminologists have accumulated a considerable amount of information regarding its condition, determining factors, victimological aspects, personal characteristics of offenders; they continue their constant (and, often, more than successful) search for new ways to counteract it. However, the overwhelming majority of research examining the Internet in one way or another describes but a small part of it — the «visible» net, known to most of the users. The paper discusses the necessity of conducting a criminological analysis of cybercrime that would take into consideration the deep segment of the world wide web — the dark web, a significant part of which is the TOR network (TOR standing for The Onion Router) whose contents are not indexed by standard search engines like Google or Yandex. The author did a monitoring of the «invisible» web in 2012–2015, which allowed him to single out key components of the TOR network crime structure, which have their own prominent characteristics. TOR is a free and open software for secondgeneration «onion routing» that makes it possible to establish an anonymous network of virtual relays for transferring encrypted data, or, to be more exact, a system of proxy servers for anonymous network connection protected against surveillance; the author suggests viewing TOR network crime as a relatively new, independent type of cybercrime, distinguished from other types by the criminological characteristics of its offences. The author also points out that it is necessary to reconsider the existing results of criminological research of regular cybercrimes
URI: https://www.scopus.com/record/display.uri?eid=2-s2.0-85042641667&origin=resultslist&sort=plf-f&src=s&nlo=1&nlr=20&nls=afprfnm-t&affilName=North+caucasus+federal+university&sid=5d5bf0cb8abe6ac26d36fa9eb3ab093f&sot=afnl&sdt=sisr&cluster=scopubyr%2c%222016%22%2ct&sl=53&s=%28AF-ID%28%22North+Caucasus+Federal+University%22+60070541%29%29&ref=%28New+frontiers+of+cybercrime%29&relpos=0&citeCnt=0&searchTerm=
http://hdl.handle.net/20.500.12258/3391
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File Description SizeFormat 
scopusresults 557 .pdf61.98 kBAdobe PDFThumbnail
View/Open
WoS 330 .pdf105.36 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.