The Dark Web's Influence on International Relations: Unravelling the Hidden Threads

Authors

  • Sara Bardhant School of Public Policy and Governance, Tata Institute of Social Sciences, Hyderabad, Mumbai
  • Pallabhi Chakraborty School of Public Policy and Governance, Tata Institute of Social Sciences, Hyderabad, Mumbai

DOI:

https://doi.org/10.61963/jkt.v2i1.62

Keywords:

International Relations, State Actors, Cybersecurity

Abstract

Using a blended-techniques approach, this looks at explores the diffused effect of the dark net on worldwide family members. According to a quantitative network study, kingdom actors are not unusual on the dark web, which is regular with new scholarly debate. Key topics that represent present day scholarly worries, including "Covert Operations and Espionage," "Eroding Trust in Intelligence Sharing," "Extremism and Terrorism," and "Challenges in Law Enforcement," are found out via thematic evaluation of qualitative statistics. This research sticks out for its thorough evaluation of the dark web's complex results, which connects quantitative and qualitative findings. The effects highlight the vital want for worldwide cybersecurity regulations and tips in light of the converting digital environment. This examine adds a super deal to the frame of knowledge via illuminating the outcomes of the darkish net for global relations and global security. Research ethics are a essential factor of the examine and are meticulously tested at each stage. This observer’s breadth perfectly fits the dreams of the magazine and provides insightful information on how cybersecurity, geopolitics, and diplomatic relations engage.

 

References

Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F., & Abdulkadir, S. J. (2022). Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics, 11(2), 198.

Alassad, M., Spann, B., & Agarwal, N. (2021). Combining advanced computational social science and graph theoretic techniques to reveal adversarial information operations. Information Processing & Management, 58(1), 102385. https://doi.org/10.1016/j.ipm.2020.102385

Alfonso, O. (2019). The view of law enforcement supervisors on officers leadership training development (Doctoral dissertation, St. Thomas University). https://hdl.handle.net/1721.1/141724

Anantharaman, K., Brown, C. T., Hug, L. A., Sharon, I., Castelle, C. J., Probst, A. J., ... & Banfield, J. F. (2016). Thousands of microbial genomes shed light on interconnected biogeochemical processes in an aquifer system. Nature communications, 7(1), 13219. https://doi.org/10.1038/ncomms13219

Bancroft, A. (2019). The darknet and smarter crime: methods for investigating criminal entrepreneurs and the illicit drug economy. Springer Nature.

Belotto, M. J. (2018). Data analysis methods for qualitative research: Managing the challenges of coding, interrater reliability, and thematic analysis. The Qualitative Report, 23(11), 2622-2633.

Bjola, C., & Papadakis, K. (2021). Digital propaganda, counterpublics, and the disruption of the public sphere: The Finnish approach to building digital resilience. In The World Information War (pp. 186-213). Routledge.

Boeke, S., & Broeders, D. (2023). The demilitarisation of cyber conflict. In Survival 60.6 (pp. 73-89). Routledge.

Braun, V., & Clarke, V. (2021). Can I use TA? Should I use TA? Should I not use TA? Comparing reflexive thematic analysis and other pattern?based qualitative analytic approaches. Counselling and psychotherapy research, 21(1), 37-47. https://doi.org/10.1002/capr.12360

Bronk, C. (2016). Getting creative on what will do: cyber espionage, conflict and covert action. Conflict and Covert Action (June 15, 2016).

Buchanan, B. (2020). The hacker and the state: Cyber attacks and the new normal of geopolitics. Harvard University Press.

Carr, J. (2012). Inside cyber warfare: Mapping the cyber underworld. " O'Reilly Media, Inc.".

Cascio, M. A., Lee, E., Vaudrin, N., & Freedman, D. A. (2019). A team-based approach to open coding: Considerations for creating intercoder consensus. Field Methods, 31(2), 116-130. https://doi.org/10.1177/1525822X19838237

Chertoff, M., & Simon, T. (2015). The impact of the dark web on internet governance and cyber security.

Coco, A., & de Souza Dias, T. (2021). ‘Cyber Due Diligence’: A Patchwork of Protective Obligations in International Law. European Journal of International Law, 32(3), 771-806. https://doi.org/10.1093/ejil/chab056

Cohen, J. E. (2019). Between truth and power. Oxford University Press.

Conway, M. (2017). Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict & Terrorism, 40(1), 77-98. https://doi.org/10.1080/1057610X.2016.1157408

Deibert, R., Palfrey, J., Rohozinski, R., & Zittrain, J. (Eds.). (2011). Access contested: security, identity, and resistance in Asian cyberspace. mit Press.

Dunn Cavelty, M., & Wenger, A. (2020). Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy, 41(1), 5-32. https://doi.org/10.1080/13523260.2019.1678855

Farrell, H., & Newman, A. (2016). The new interdependence approach: theoretical development and empirical demonstration. Review of International Political Economy, 23(5), 713-736. https://doi.org/10.1080/09692290.2016.1247009

Goddard, S. E., MacDonald, P. K., & Nexon, D. H. (2019). Repertoires of statecraft: Instruments and logics of power politics. International Relations, 33(2), 304-321. https://doi.org/10.1177/0047117819834625

Grado?, K. (2020). Crime in the time of the plague: Fake news pandemic and the challenges to law-enforcement and intelligence community. Society Register, 4(2), 133-148. http://dx.doi.org/10.14746/sr.2020.4.2.10

Haasio, A., Harviainen, J. T., & Savolainen, R. (2020). Information needs of drug users on a local dark Web marketplace. Information Processing & Management, 57(2), 102080. https://doi.org/10.1016/j.ipm.2019.102080

Hafner-Burton, E. M., Kahler, M., & Montgomery, A. H. (2009). Network analysis for international relations. International organization, 63(3), 559-592.

Hileman, J., Kallstenius, I., Häyhä, T., Palm, C., & Cornell, S. (2020). Keystone actors do not act alone: A business ecosystem perspective on sustainability in the global clothing industry. Plos one, 15(10), e0241453. https://doi.org/10.1371/journal.pone.0241453

Keohane, R. O., & Nye, J. S. (1987). Power and interdependence revisited. International organization, 41(4), 725-753. https://doi.org/10.1017/S0020818300027661

Kethineni, S., & Cao, Y. (2020). The rise in popularity of cryptocurrency and associated criminal activity. International Criminal Justice Review, 30(3), 325-344. https://doi.org/10.1177/1057567719827051

Kharanagh, S. G., Banihabib, M. E., & Javadi, S. (2020). An MCDM-based social network analysis of water governance to determine actors’ power in water-food-energy nexus. Journal of Hydrology, 581, 124382. https://doi.org/10.1016/j.jhydrol.2019.124382

Maharana, K., Mondal, S., & Nemade, B. (2022). A review: Data pre-processing and data augmentation techniques. Global Transitions Proceedings, 3(1), 91-99. https://doi.org/10.1016/j.gltp.2022.04.020

Marwick, A., Clancy, B., & Furl, K. (2022). Far-Right online radicalization: A review of the literature. The Bulletin of Technology & Public Life.

Meland, P. H., Bayoumy, Y. F. F., & Sindre, G. (2020). The Ransomware-as-a-Service economy within the darknet. Computers & Security, 92, 101762. https://doi.org/10.1016/j.cose.2020.101762

Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 2053951716679679. https://doi.org/10.1177/2053951716679679

Morrison-Smith, S., & Ruiz, J. (2020). Challenges and barriers in virtual teams: a literature review. SN Applied Sciences, 2, 1-33. https://doi.org/10.1007/s42452-020-2801-5

Nazah, S., Huda, S., Abawajy, J., & Hassan, M. M. (2020). Evolution of dark web threat analysis and detection: A systematic approach. Ieee Access, 8, 171796-171819. https://doi.org/10.1109/ACCESS.2020.3024198

Nowell, L. S., Norris, J. M., White, D. E., & Moules, N. J. (2017). Thematic analysis: Striving to meet the trustworthiness criteria. International journal of qualitative methods, 16(1), 1609406917733847. https://doi.org/10.1177/1609406917733847

Omolara, A. E., Alabdulatif, A., Abiodun, O. I., Alawida, M., Alabdulatif, A., & Arshad, H. (2022). The internet of things security: A survey encompassing unexplored areas and new insights. Computers & Security, 112, 102494. https://doi.org/10.1016/j.cose.2021.102494

Pertwee, E., Simas, C., & Larson, H. J. (2022). An epidemic of uncertainty: rumors, conspiracy theories and vaccine hesitancy. Nature medicine, 28(3), 456-459. https://doi.org/10.1038/s41591-022-01728-z

Prantl, J., & Goh, E. (2022). Rethinking strategy and statecraft for the twenty-first century of complexity: a case for strategic diplomacy. International Affairs, 98(2), 443-469.

Reyes, V., Bogumil, E., & Welch, L. E. (2021). The living codebook: Documenting the process of qualitative data analysis. Sociological Methods & Research, 0049124120986185. https://doi.org/10.1177/0049124120986185

Roberts, K., Dowell, A., & Nie, J. B. (2019). Attempting rigour and replicability in thematic analysis of qualitative research data; a case study of codebook development. BMC medical research methodology, 19, 1-8. https://doi.org/10.1186/s12874-019-0707-y

Sahoo, G. (2023). A Critical Analysis of the Dark Side of the Dark Web. In Advancements in Cybercrime Investigation and Digital Forensics (pp. 205-227). Apple Academic Press.

Shackelford, S. J., & Craig, A. N. (2014). Beyond the new digital divide: Analyzing the evolving role of national governments in internet governance and enhancing cybersecurity. Stan. J. Int'l L., 50, 119.

Sigholm, J. (2013). Non-state actors in cyberspace operations. Journal of Military Studies, 4(1), 1-37. https://doi.org/10.1515/jms-2016-0184

Silverman, E. K., Schmidt, H. H., Anastasiadou, E., Altucci, L., Angelini, M., Badimon, L., ... & Baumbach, J. (2020). Molecular networks in Network Medicine: Development and applications. Wiley Interdisciplinary Reviews: Systems Biology and Medicine, 12(6), e1489. https://doi.org/10.1002/wsbm.1489

Sima, V., Gheorghe, I. G., Subi?, J., & Nancu, D. (2020). Influences of the industry 4.0 revolution on the human capital development and consumer behavior: A systematic review. Sustainability, 12(10), 4035. https://doi.org/10.3390/su12104035

Sovacool, B. K., Upham, P., & Monyei, C. G. (2022). The “whole systems” energy sustainability of digitalization: Humanizing the community risks and benefits of Nordic datacenter development. Energy Research & Social Science, 88, 102493. https://doi.org/10.1016/j.erss.2022.102493

Tate, W. L., Ellram, L. M., & Kirchoff, J. F. (2010). Corporate social responsibility reports: a thematic analysis related to supply chain management. Journal of supply chain management, 46(1), 19-44. https://doi.org/10.1111/j.1745-493X.2009.03184.x

Usman, H., Tariq, I., & Nawaz, B. (2023). In The Realm Of The Machines: Ai's Influence Upon International Law And Policy. Journal of Social Research Development, 4(2), 383-399.

Van Schendel, W. (2005). Geographies of knowing, geographies of ignorance: jumping scale in Southeast Asia. In Locating Southeast Asia (pp. 275-307). Brill. https://doi.org/10.1163/9789004434882_013

Yang, F., & Gu, S. (2021). Industry 4.0, a revolution that requires technology and national strategies. Complex & Intelligent Systems, 7, 1311-1325. https://doi.org/10.1007/s40747-020-00267-9

Yang, L., Huo, B., Tian, M., & Han, Z. (2021). The impact of digitalization and inter-organizational technological activities on supplier opportunism: the moderating role of relational ties. International Journal of Operations & Production Management, 41(7), 1085-1118. https://doi.org/10.1108/IJOPM-09-2020-0664

Downloads

Published

2023-12-30

How to Cite

Bardhant, S., & Chakraborty , P. . (2023). The Dark Web’s Influence on International Relations: Unravelling the Hidden Threads. Journal of Judikaltura, 2(1), 1–11. https://doi.org/10.61963/jkt.v2i1.62