The articles in this book have successfully illustrated the deficiencies of technologies and how cybercriminals exploit the vulnerabilities. The book is presented in an encyclopedia-like structure so that readers can review the cybercrimes systematically conducted on the invisible webs and the human responsibility in using the Internet. I strongly recommend this book to cyberusers, policymakers, lawmakers, and technology developers.
– Prof. Arthur So, School of Electrical Engineering and Computer Science (EECS), University of Ottawa, Canada
I highly recommend this book to researchers who plans to have a broader overview about cybercrime and the various subtopics, such as technology, regulations and human interactions. This book can be a good starting point to see different perspectives and to have a bigger picture about the dynamics of cybercrime issues.
– Tawei Wang, DePaul University
The Encyclopedia of Criminal Activities and the Deep Web is a fascinating glimpse into the darkest recesses of the internet and will certainly be of interest to anyone--educators, researchers, policymakers, and the public--who seeks a deeper understanding of the online technologies on which we all depend.
– Jennifer Bartlett, Online Searcher, University of Kentucky, USA
Presently, cybersecurity is being seen as an integral part of national security and countries are creating their own "cyber armies" to deal with such attacks. The increasing reliance of commercial businesses and other enterprises on cyber technologies, including interconnected networks and remote access, creates new and expanding vulnerabilities that technically-savvy extremists will exploit - India will not be an exception. Online propaganda that targets Indian interests has become more prevalent since the beginning of 2020. Like in Kashmir, Internet blockades and ‘downgrades’ from 4G to 2G i.e. slower internet access has not been able to stop the extremist propaganda posted by militant groups on Telegram, Twitter, Facebook, WhatsApp, etc.
In view of countering "cyberextremism" and the terror threats posed thereof, initiatives taken up by the Government of India in the last five years include Indian Cyber Crime Coordination Centre (I4C), National Cyber Crime Reporting Portal, Cyber Swachhta Kendra, pushing for Cyber Security Research and Development Centre of India along with National Intelligence Grid (NATGRID) in addition to the National Cyber Security Policy 2013.
The modern world cannot be free from cyberspace. Cyberspace is growing every day - India holds a prime position. With broadband traffic increasing day by day, I strongly feel a uniform cyber law at the national and international level is the need of the hour.
– Prof. Sovik Mukherjee, St. Xavier's University, India
The cybersecurity field is always under pressure of all the malicious users or entities that grow over the internet. After the big pressure during the pandemic, there was a strong motivation for attacking users and companies. The cyberattacks, particularly against individuals, show better results. Many users now have more security literacy after all the past incidents. The good news is that companies and individuals now have a focus on security. Cybersecurity is a growing research topic. With the pressure of cybercrime and the fast implementation of new technologies such as IoT – the security challenges are always a concern. Artificial intelligence will play an important role in auditing and as an active tool to block malicious activities. The user security awareness is of extreme relevance. To quickly identify the risk and implement, at least, elementary procedures is the key to avoid security menaces.
– Prof. Justino Lourenço, Polytechnic Institute of Gaya, Portugal
Cybersecurity is even more of a critical issue in the current environment, as ever before. Behavioural aspects relating to cybersecurity risks including vulnerability and lack of knowledge/understanding of cybersecurity risks are examples of human and social factors which need to be addressed, in addition to technological considerations. This volume provides a multiple array of approaches to Cybersecurity and thus serves as a valuable source of reference.
– Prof. Tehmina Khan, RMIT University, Australia