The Dark Web's Influence on International Relations: Unravelling the Hidden Threads
DOI:
https://doi.org/10.61963/jkt.v2i1.62Keywords:
International Relations, State Actors, CybersecurityAbstract
Using a blended-techniques approach, this looks at explores the diffused effect of the dark net on worldwide family members. According to a quantitative network study, kingdom actors are not unusual on the dark web, which is regular with new scholarly debate. Key topics that represent present day scholarly worries, including "Covert Operations and Espionage," "Eroding Trust in Intelligence Sharing," "Extremism and Terrorism," and "Challenges in Law Enforcement," are found out via thematic evaluation of qualitative statistics. This research sticks out for its thorough evaluation of the dark web's complex results, which connects quantitative and qualitative findings. The effects highlight the vital want for worldwide cybersecurity regulations and tips in light of the converting digital environment. This examine adds a super deal to the frame of knowledge via illuminating the outcomes of the darkish net for global relations and global security. Research ethics are a essential factor of the examine and are meticulously tested at each stage. This observer’s breadth perfectly fits the dreams of the magazine and provides insightful information on how cybersecurity, geopolitics, and diplomatic relations engage.
References
Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F., & Abdulkadir, S. J. (2022). Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics, 11(2), 198.
Alassad, M., Spann, B., & Agarwal, N. (2021). Combining advanced computational social science and graph theoretic techniques to reveal adversarial information operations. Information Processing & Management, 58(1), 102385. https://doi.org/10.1016/j.ipm.2020.102385
Alfonso, O. (2019). The view of law enforcement supervisors on officers leadership training development (Doctoral dissertation, St. Thomas University). https://hdl.handle.net/1721.1/141724
Anantharaman, K., Brown, C. T., Hug, L. A., Sharon, I., Castelle, C. J., Probst, A. J., ... & Banfield, J. F. (2016). Thousands of microbial genomes shed light on interconnected biogeochemical processes in an aquifer system. Nature communications, 7(1), 13219. https://doi.org/10.1038/ncomms13219
Bancroft, A. (2019). The darknet and smarter crime: methods for investigating criminal entrepreneurs and the illicit drug economy. Springer Nature.
Belotto, M. J. (2018). Data analysis methods for qualitative research: Managing the challenges of coding, interrater reliability, and thematic analysis. The Qualitative Report, 23(11), 2622-2633.
Bjola, C., & Papadakis, K. (2021). Digital propaganda, counterpublics, and the disruption of the public sphere: The Finnish approach to building digital resilience. In The World Information War (pp. 186-213). Routledge.
Boeke, S., & Broeders, D. (2023). The demilitarisation of cyber conflict. In Survival 60.6 (pp. 73-89). Routledge.
Braun, V., & Clarke, V. (2021). Can I use TA? Should I use TA? Should I not use TA? Comparing reflexive thematic analysis and other pattern?based qualitative analytic approaches. Counselling and psychotherapy research, 21(1), 37-47. https://doi.org/10.1002/capr.12360
Bronk, C. (2016). Getting creative on what will do: cyber espionage, conflict and covert action. Conflict and Covert Action (June 15, 2016).
Buchanan, B. (2020). The hacker and the state: Cyber attacks and the new normal of geopolitics. Harvard University Press.
Carr, J. (2012). Inside cyber warfare: Mapping the cyber underworld. " O'Reilly Media, Inc.".
Cascio, M. A., Lee, E., Vaudrin, N., & Freedman, D. A. (2019). A team-based approach to open coding: Considerations for creating intercoder consensus. Field Methods, 31(2), 116-130. https://doi.org/10.1177/1525822X19838237
Chertoff, M., & Simon, T. (2015). The impact of the dark web on internet governance and cyber security.
Coco, A., & de Souza Dias, T. (2021). ‘Cyber Due Diligence’: A Patchwork of Protective Obligations in International Law. European Journal of International Law, 32(3), 771-806. https://doi.org/10.1093/ejil/chab056
Cohen, J. E. (2019). Between truth and power. Oxford University Press.
Conway, M. (2017). Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict & Terrorism, 40(1), 77-98. https://doi.org/10.1080/1057610X.2016.1157408
Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (Eds.). (2011). Access contested: security, identity, and resistance in Asian cyberspace. mit Press.
Dunn Cavelty, M., & Wenger, A. (2020). Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy, 41(1), 5-32. https://doi.org/10.1080/13523260.2019.1678855
Farrell, H., & Newman, A. (2016). The new interdependence approach: theoretical development and empirical demonstration. Review of International Political Economy, 23(5), 713-736. https://doi.org/10.1080/09692290.2016.1247009
Goddard, S. E., MacDonald, P. K., & Nexon, D. H. (2019). Repertoires of statecraft: Instruments and logics of power politics. International Relations, 33(2), 304-321. https://doi.org/10.1177/0047117819834625
Grado?, K. (2020). Crime in the time of the plague: Fake news pandemic and the challenges to law-enforcement and intelligence community. Society Register, 4(2), 133-148. http://dx.doi.org/10.14746/sr.2020.4.2.10
Haasio, A., Harviainen, J. T., & Savolainen, R. (2020). Information needs of drug users on a local dark Web marketplace. Information Processing & Management, 57(2), 102080. https://doi.org/10.1016/j.ipm.2019.102080
Hafner-Burton, E. M., Kahler, M., & Montgomery, A. H. (2009). Network analysis for international relations. International organization, 63(3), 559-592.
Hileman, J., Kallstenius, I., Häyhä, T., Palm, C., & Cornell, S. (2020). Keystone actors do not act alone: A business ecosystem perspective on sustainability in the global clothing industry. Plos one, 15(10), e0241453. https://doi.org/10.1371/journal.pone.0241453
Keohane, R. O., & Nye, J. S. (1987). Power and interdependence revisited. International organization, 41(4), 725-753. https://doi.org/10.1017/S0020818300027661
Kethineni, S., & Cao, Y. (2020). The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review, 30(3), 325-344. https://doi.org/10.1177/1057567719827051
Kharanagh, S. G., Banihabib, M. E., & Javadi, S. (2020). An MCDM-based social network analysis of water governance to determine actors’ power in water-food-energy nexus. Journal of Hydrology, 581, 124382. https://doi.org/10.1016/j.jhydrol.2019.124382
Maharana, K., Mondal, S., & Nemade, B. (2022). A review: Data pre-processing and data augmentation techniques. Global Transitions Proceedings, 3(1), 91-99. https://doi.org/10.1016/j.gltp.2022.04.020
Marwick, A., Clancy, B., & Furl, K. (2022). Far-Right online radicalization: A review of the literature. The Bulletin of Technology & Public Life.
Meland, P. H., Bayoumy, Y. F. F., & Sindre, G. (2020). The Ransomware-as-a-Service economy within the darknet. Computers & Security, 92, 101762. https://doi.org/10.1016/j.cose.2020.101762
Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 2053951716679679. https://doi.org/10.1177/2053951716679679
Morrison-Smith, S., & Ruiz, J. (2020). Challenges and barriers in virtual teams: a literature review. SN Applied Sciences, 2, 1-33. https://doi.org/10.1007/s42452-020-2801-5
Nazah, S., Huda, S., Abawajy, J., & Hassan, M. M. (2020). Evolution of dark web threat analysis and detection: A systematic approach. Ieee Access, 8, 171796-171819. https://doi.org/10.1109/ACCESS.2020.3024198
Nowell, L. S., Norris, J. M., White, D. E., & Moules, N. J. (2017). Thematic analysis: Striving to meet the trustworthiness criteria. International journal of qualitative methods, 16(1), 1609406917733847. https://doi.org/10.1177/1609406917733847
Omolara, A. E., Alabdulatif, A., Abiodun, O. I., Alawida, M., Alabdulatif, A., & Arshad, H. (2022). The internet of things security: A survey encompassing unexplored areas and new insights. Computers & Security, 112, 102494. https://doi.org/10.1016/j.cose.2021.102494
Pertwee, E., Simas, C., & Larson, H. J. (2022). An epidemic of uncertainty: rumors, conspiracy theories and vaccine hesitancy. Nature medicine, 28(3), 456-459. https://doi.org/10.1038/s41591-022-01728-z
Prantl, J., & Goh, E. (2022). Rethinking strategy and statecraft for the twenty-first century of complexity: a case for strategic diplomacy. International Affairs, 98(2), 443-469.
Reyes, V., Bogumil, E., & Welch, L. E. (2021). The living codebook: Documenting the process of qualitative data analysis. Sociological Methods & Research, 0049124120986185. https://doi.org/10.1177/0049124120986185
Roberts, K., Dowell, A., & Nie, J. B. (2019). Attempting rigour and replicability in thematic analysis of qualitative research data; a case study of codebook development. BMC medical research methodology, 19, 1-8. https://doi.org/10.1186/s12874-019-0707-y
Sahoo, G. (2023). A Critical Analysis of the Dark Side of the Dark Web. In Advancements in Cybercrime Investigation and Digital Forensics (pp. 205-227). Apple Academic Press.
Shackelford, S. J., & Craig, A. N. (2014). Beyond the new digital divide: Analyzing the evolving role of national governments in internet governance and enhancing cybersecurity. Stan. J. Int'l L., 50, 119.
Sigholm, J. (2013). Non-state actors in cyberspace operations. Journal of Military Studies, 4(1), 1-37. https://doi.org/10.1515/jms-2016-0184
Silverman, E. K., Schmidt, H. H., Anastasiadou, E., Altucci, L., Angelini, M., Badimon, L., ... & Baumbach, J. (2020). Molecular networks in Network Medicine: Development and applications. Wiley Interdisciplinary Reviews: Systems Biology and Medicine, 12(6), e1489. https://doi.org/10.1002/wsbm.1489
Sima, V., Gheorghe, I. G., Subi?, J., & Nancu, D. (2020). Influences of the industry 4.0 revolution on the human capital development and consumer behavior: A systematic review. Sustainability, 12(10), 4035. https://doi.org/10.3390/su12104035
Sovacool, B. K., Upham, P., & Monyei, C. G. (2022). The “whole systems” energy sustainability of digitalization: Humanizing the community risks and benefits of Nordic datacenter development. Energy Research & Social Science, 88, 102493. https://doi.org/10.1016/j.erss.2022.102493
Tate, W. L., Ellram, L. M., & Kirchoff, J. F. (2010). Corporate social responsibility reports: a thematic analysis related to supply chain management. Journal of supply chain management, 46(1), 19-44. https://doi.org/10.1111/j.1745-493X.2009.03184.x
Usman, H., Tariq, I., & Nawaz, B. (2023). In The Realm Of The Machines: Ai's Influence Upon International Law And Policy. Journal of Social Research Development, 4(2), 383-399.
Van Schendel, W. (2005). Geographies of knowing, geographies of ignorance: jumping scale in Southeast Asia. In Locating Southeast Asia (pp. 275-307). Brill. https://doi.org/10.1163/9789004434882_013
Yang, F., & Gu, S. (2021). Industry 4.0, a revolution that requires technology and national strategies. Complex & Intelligent Systems, 7, 1311-1325. https://doi.org/10.1007/s40747-020-00267-9
Yang, L., Huo, B., Tian, M., & Han, Z. (2021). The impact of digitalization and inter-organizational technological activities on supplier opportunism: the moderating role of relational ties. International Journal of Operations & Production Management, 41(7), 1085-1118. https://doi.org/10.1108/IJOPM-09-2020-0664
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Judikaltura

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Please find the rights and licenses in Register: Journal of Judikaltura. By submitting the article/manuscript of the article, the author(s) agree with this policy. No specific document sign-off is required.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)' Warranties
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).
3. User/Public Rights
Register's spirit is to disseminate articles published are as free as possible. Under the Creative Commons license, Register permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and Register on distributing works in the journal and other media of publications. Unless otherwise stated, the authors are public entities as soon as their articles got published.
4. Rights of Authors
Authors retain all their rights to the published works, such as (but not limited to) the following rights;
Copyright and other proprietary rights relating to the article, such as patent rights,
The right to use the substance of the article in own future works, including lectures and books,
The right to reproduce the article for own purposes,
The right to self-archive the article (please read out deposit policy),
The right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Register: Jurnal Ilmiah Teknologi Sistem Informasi).
5. Co-Authorship
If the article was jointly prepared by more than one author, any authors submitting the manuscript warrants that he/she has been authorized by all co-authors to be agreed on this copyright and license notice (agreement) on their behalf, and agrees to inform his/her co-authors of the terms of this policy. Register will not be held liable for anything that may arise due to the author(s) internal dispute. Register will only communicate with the corresponding author.
6. Royalties
Being an open accessed journal and disseminating articles for free under the Creative Commons license term mentioned, author(s) aware that Register entitles the author(s) to no royalties or other fees.
7. Miscellaneous
Register will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed. Register's editors may modify the article to a style of punctuation, spelling, capitalization, referencing and usage that deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers as mentioned in point 3.



