Cyber Manhunt: Evaluation of Technologies and Practices for Effective Community Development and Maintenance

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet and its related technologies have become one of the most exciting innovations in the history of social development in recent times. However, along with many positive aspects of this virtual world, it has many side effects as well, which poses many risks and threats to its users and society. When it comes to the privacy of people, the damage the Internet can make should never be underestimated. Various governments and private organizations all over the world are spending a lot of time and money on cybersecurity options to make sure that their netizens are safe, and their data is protected in the cyberspace. However, despite all these efforts, some significant cyber issues are still not getting enough attention. “Cyber Manhunt” is one of these issues. Therefore, we plan to do our research to find the cause of cyber manhunt from various technology perspectives such as dark web, IP location, information filter, and some hacker’s technique. We will also investigate the positive aspects of cyber manhunt, along with the damages caused by cyber violence and information leakage during the process. We will study the current technologies that are misused to do cyber manhunt and suggest some solutions and improvements so that it can be used efficiently to minimize the damage caused to the victims. We hope that the results of our research can help individuals deepen the understanding of cyber manhunt. The results of this research can be used in studying the ethical issues of cyber manhunt and improve the technology behind information search and filtering in the future.

Cite

CITATION STYLE

APA

Chandel, S., Chen, Y., Dai, J., & Huang, J. (2020). Cyber Manhunt: Evaluation of Technologies and Practices for Effective Community Development and Maintenance. In Advances in Intelligent Systems and Computing (Vol. 1129 AISC, pp. 883–902). Springer. https://doi.org/10.1007/978-3-030-39445-5_64

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free