Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Criminology

Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner Jun 2019

Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner

Publications and Research

This is a book review of Robert W. Gehl's Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P (2018). The book explores these anonymity networks and the concept of legitimacy throughout. Using a multidisciplinary approach and interviews with network-builders and users, Gehl helps to demystify the dark web and critically examine these networks and technologies.


An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon Jan 2019

An Evidence Based Cybersecurity Approach To Risk Management: Risk Management And "Market For Lemons", David Maimon

EBCS Presentations

No abstract provided.


Ssl/Tls Certificates And Their Prevalence On The Dark Web (First Report), David Maimon, Yubao Wu, Michael Mcguire, Nicholas Stubler, Zijie Qui Jan 2019

Ssl/Tls Certificates And Their Prevalence On The Dark Web (First Report), David Maimon, Yubao Wu, Michael Mcguire, Nicholas Stubler, Zijie Qui

EBCS Reports

As organizations focus on the digital transformation of their businesses, the importance of encryption as the cornerstone of security and privacy is increasingly vital. In 2018, over 70 percent of internet traffic was encrypted. Experts believe that this figure is expected to rise to 80 percent in 2019 (Google, 2019). Secure Sockets Layer (SSL, an older standard) and Transport Layer Security (TLS, a newer standard) certificates are essential to encryption because they authorize all encrypted communication between machines. SSL/TLS certificates are instrumental in protecting privacy and improving security, providing each machine with a unique machine identity. They control the flow …