Affiliation:
1. Mount Royal University, Canada
Abstract
There is a pressing need for understanding blockchain, cybercrime, and dark web-based fraud. As the world continues to turn digital, uses of cryptocurrencies are becoming mainstream. With this technological adoption becoming a reality, crime is adapting to the times. “Click here for free Bitcoin,” “set up an account and earn 100BTC instantly” are merely anecdotal examples of the ways the act of fraud is innovating. Deeper into this proliferation of technology lies the dark web, where your social security and identity may be offered for a small sum as we speak. Blockchain technology fueled dark web marketplaces' enormous growth, which facilitated identity fraud and many other cybercrimes taking place as we speak. This chapter and its authors aim to provide a thorough yet simplified explanation of these technologies while expressing current trends and theories surrounding dark web fraud trading of fraud guides and the use of social engineering. This chapter aims to explain all aspects of this area of cybercrime for all to understand.
Reference62 articles.
1. Consumer-facing technology fraud: Economics, attack methods and potential solutions
2. Apple. (2020). Families. Retrieved from https://www.apple.com/ca/families/
3. Asif, S. (2020, April 18). Fraud & hacking guides are the most sold item on the dark web. Hack Read. Retrieved from https://www.hackread.com/fraud-hacking-guides-most-sold-item-dark-web/
4. Asokan, A. (2020, April 18). What’s Hot on Dark Net Forums? ‘Fraud Guides’. Data Breach Today. Retrieved from https://www.databreachtoday.com/whats-hot-on-dark-net-forums-fraud-guides-a-14142
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Dark Web: A Review on the deeper side of the Web;2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON);2023-02-08
2. Content Labelling of Hidden Services With Keyword Extraction Using the Graph Decomposition Method;Advances in Digital Crime, Forensics, and Cyber Terrorism;2022-05-06