This research proposal report aims to compare and contrast the concepts of Dark Web and Deep Web. The report includes research questions, theoretical framework, methodology, ethical issues, project plan, and risk analysis. The study is based on secondary research methods and VPN configuration for Deep Web.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Research Proposal Report Name of the Student: Student ID: Name of the University: Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1. Title:Dark Web Vs Deep Web 2. Rationale 2.1 Problem Domain Thedarkwebanddeepwebarerelativelydeployedforsupportingthe restriction/management of the information access over the internet cloud (Ehney & Shorter, 2016). The project would involve the comparison of the dark web and deep web concept. Many people get confused with the terms and consider them as same thing. However, the dark web and deep web have different aspects. The problem domain of the study lieson the fact of understanding and developing sort of consideration using the various literature available on the topic. 2.2 Purpose and Justification The main purpose of project is to develop an understanding of the effective formation processing for limiting the internet access for the users. The analysis would provide the readers with the understanding of the operations defining the implementation of the factors aligning the comparison of the dark web and deep web (Gehl, 2016). The deep web and dark web forms the limitation of the functions forming the alignment of the operations defining the implication of the factors taking care of the successful integration management. The websites and their information would be limited for the formation of the activities. The dark web is the term aligned to the limitation of the activities forming the influential development of the activities. The dark web would be performed for easing the utilization of the factors forming the implication of the improved development process (Lacey & Salmon, 2015).
The dark web limits a small portion of deep web for making it limited and inaccessible for the users using standard browsers. The deep web is a term that can be given to anything that cannot be accessed using the search engine. The hotwire searches are the most common example for deep web. 3. Research Questions The following are the research questions that the study would address, Are dark web and deep web same thing? What is the difference between dark web and deep web? 4. Theoretical Framework The study would be based on the process of developing the utilization of the factors defining the development of the improved functional and effective formation of the operations. The various study materials from the various articles and books would be scrutinized for developingtheunderstandingofthefinalprojectdeliverable.Theframeworkwouldbe effectively formed for easing the development of the understanding the fact that dark web is a small portion of deep web and should not be mixed with the main concept. The qualitative research has been carried on for ensuring that the general analysis would be effectively formed on the topic of dark web vs. deep web. The framework analysis would be effectively helpful for evaluating the concept of the dark web and deep web functions and properties. The framework would be effectively evaluated for developing the alignment of the improved and developed functional alignment.
5. Methodology 5.1 Research and System Development Methods The system framework analysis would be effectively helpful for evaluating the concept of the dark web and deep web functions and properties. The various study materials from the various articles and books would be scrutinized for developing the understanding of the final project deliverable. The framework would be effectively formed for easing the development of the understanding the fact that dark web is a small portion of deep web and should not be mixed with the main concept. Secondary research methods would be useful for the supplementary management of the factors aligning the useful evaluation of the factors defining the smart information gathering. The qualitative research has been carried on for ensuring that the general analysis would be effectively formed on the topic of dark web vs. deep web. 5.2 System Design Methods Figure 1: VPN configuration for Deep Web (Source: Catakoglu, Balduzzi & Balzarotti, 2017, pp-1740)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The study of the above system design would allow the understanding of the dark and deep web functionality. The deployment of the VPN based analysis would be helpful for ensuring that the effective and smart alignment would allow the utilization of the operations. The darkwebisthetermalignedtothelimitationoftheactivitiesformingtheinfluential development of the activities. The dark web would be performed for easing the utilization of the factors forming the implication of the improved development process. The dark web limits a small portion of deep web for making it limited and inaccessible for the users using standard browsers. The deep web is a term that can be given to anything that cannot be accessed using the search engine. The hotwire searches are the most common example for deep web. 5.3 Ethical Issues The ethical issues related to the dark web and deep web are, 1.Hiding information from the user so that the website cannot be accessed from standard browser 2.Limiting the accessibility as per the standards of the search engine 3.Supporting the probable misuse of the data by the person who would be able to access dark web data 6. Project Plan 6.1 Deliverables The deliverables for the Research Project on Dark Web vs. Deep Web would include,
Accumulated resources that would be required for the execution of the project activities Properdatarequiredforcollectionandexecutionofthefinalsummary development Final report aligning with the development of the effective and smart processing 6.2 Work Breakdown Structure The complete project plan would be divided into three work packages of research and development, data collection, and final report. Each of the work packages would involve some specific work activities such as Research and Development:It is the first phase of the research project involving the initiation of the project activities and accumulating the resources required for the completion of the project activities. It would involve the activities of resource accumulation, literature review, research questionnaire, preparation of proposal, and further research studies. Data Collection:It is the second phase of the research project involving the collection of the required data through various surveys and questionnaire filling required for the completion of the project activities. It would involve the activities of required information is sorted, surveys are executed, analysis of data is done, and summary is made. Final Report:It is the last phase of the research project involving the completion of the project activities and developing the final report aligning for the completion of the project activities. It would involve the activities of all information is accumulated, final report structure is made, documentation of report, submission of the report, and sign off.
Research Project on Dark Web vs. Deep Web Research and Development Resource Accumulation Literature Review Research Questionnaire Preparation of Proposal Further Research Studies Data Collection Required Information is sorted Surveys are executed Analysis of data is done Summary is made Final Report All information is accumulated Final report structure is made Documentation of report Submission of the report Sign off Figure 2: Work Breakdown Structure of Research Project (Source: Created by the author) 6.3 Risk Analysis The risk analysis is the method of identifying the probable risk factors of the project and developing some mitigation strategy for them. The risk assessment for the project of Research Project on Dark Web vs. Deep Web is given below, Risk FactorProbabilitySeverityMitigation Delay: it is the most primary risk factor causing the impact on the execution of the project and its activityHighLowAccept Over budget: it is another major risk factor impacting the completion of the project due to the shortage of resourcesMediumMediumAvoid
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Quality Issues: The lack of proper information might result in causing the problems in data collection for the study summary LowHighMitigate Table 1: Risk Analysis Table for Research Project 6.4 Duration The project would run for 37 days and would be divided into three phases of research and development, data collection, and final report. The following table would show the project duration, WBSTask NameDurationStartFinish 0Research Project on Dark Web vs. Deep Web37 daysMon 9/3/18Tue 10/23/18 1Research and Development16 daysMon 9/3/18Mon 9/24/18 1.1Resource Accumulation5 daysMon 9/3/18Fri 9/7/18 1.2Literature Review4 daysMon 9/10/18Thu 9/13/18 1.3Research Questionnaire2 daysFri 9/14/18Mon 9/17/18 1.4Preparation of Proposal2 daysTue 9/18/18Wed 9/19/18 1.5Further Research Studies3 daysThu 9/20/18Mon 9/24/18 2Data Collection14 daysTue 9/25/18Fri 10/12/18 2.1Required Information is sorted4 daysTue 9/25/18Fri 9/28/18 2.2Surveys are executed7 daysMon 10/1/18Tue 10/9/18 2.3Analysis of data is done2 daysWed 10/10/18Thu 10/11/18 2.4Summary is made1 dayFri 10/12/18Fri 10/12/18 3Final Report7 daysMon 10/15/18Tue 10/23/18 3.1All information is accumulated1 dayMon 10/15/18Mon 10/15/18 3.2Final report structure is made1 dayTue 10/16/18Tue 10/16/18
3.3Documentation of report4 daysWed 10/17/18Mon 10/22/18 3.4Submission of the report1 dayTue 10/23/18Tue 10/23/18 3.5Sign off0 daysTue 10/23/18Tue 10/23/18 Table 2: Project Schedule for the Research Project on Dark Web vs. Deep Web 6.5 Gantt Chart The following is the proposed Gantt chart for the research project of comparing dark web and deep web, IDTask Mode WBSTask NameDurationStartFinish 00Research Project on Dark Web vs. Deep Web37 daysMon 9/3/18Tue 10/23/18 11Research and Development16 daysMon 9/3/18Mon 9/24/18 21.1Resource Accumulation5 daysMon 9/3/18Fri 9/7/18 31.2Literature Review4 daysMon 9/10/18Thu 9/13/18 41.3Research Questionnaire2 daysFri 9/14/18Mon 9/17/18 51.4Preparation of Proposal2 daysTue 9/18/18Wed 9/19/18 61.5Further Research Studies3 daysThu 9/20/18Mon 9/24/18 72Data Collection14 daysTue 9/25/18Fri 10/12/18 82.1Required Information is sorted4 daysTue 9/25/18Fri 9/28/18 92.2Surveys are executed7 daysMon 10/1/18Tue 10/9/18 102.3Analysis of data is done2 daysWed 10/10/18Thu 10/11/18 112.4Summary is made1 dayFri 10/12/18Fri 10/12/18 123Final Report7 daysMon 10/15/18Tue 10/23/18 133.1All information is accumulated1 dayMon 10/15/18Mon 10/15/18 143.2Final report structure is made1 dayTue 10/16/18Tue 10/16/18 153.3Documentation of report4 daysWed 10/17/18Mon 10/22/18 163.4Submission of the report1 dayTue 10/23/18Tue 10/23/18 173.5Sign off0 daysTue 10/23/18Tue 10/23/1810/23 SSSSSSSSSS Aug 26, '18Sep 9, '18Sep 23, '18Oct 7, '18Oct 21, '18Nov 4, '18 Figure 3: Gantt chart of theResearch Project on Dark Web vs. Deep Web (Source: Created by the author)
Bibliography Bell, J. (2014).Doing Your Research Project: A guide for first-time researchers. McGraw-Hill Education (UK). Catakoglu, O., Balduzzi, M., & Balzarotti, D. (2017, April). Attacks landscape in the dark side of the web. InProceedings of the Symposium on Applied Computing(pp. 1739-1746). ACM. Chertoff, M., & Simon, T. (2015). The impact of the Dark Web on Internet governance and cyber security. Ehney, R., & Shorter, J. D. (2016). DEEP WEB, DARK WEB, INVISIBLE WEB AND THE POST ISIS WORLD.Issues in Information Systems,17(4). Gehl, R. W. (2016). Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network.new media & society,18(7), 1219-1235. Lacey, D., & Salmon, P. M. (2015, August). It’s dark in there: Using systems analysis to investigate trust and engagement in dark web forums. InInternational Conference on Engineering Psychology and Cognitive Ergonomics(pp. 117-128). Springer, Cham. Maddox, A., Barratt, M. J., Allen, M., & Lenton, S. (2016). Constructive activism in the dark web:cryptomarketsandillicitdrugsinthedigital‘demimonde’.Information, Communication & Society,19(1), 111-126. O'Leary, Z. (2017).The essential guide to doing your research project. Sage. Thomas, G. (2017).How to Do Your Research Project: A Guide for Students. Sage.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Weimann,G.(2016).Goingdark:TerrorismonthedarkWeb.StudiesinConflict& Terrorism,39(3), 195-206. Weimann, G. (2016). Terrorist migration to the dark web.Perspectives on Terrorism,10(3), 40- 44. Zulkarnine, A. T., Frank, R., Monk, B., Mitchell, J., & Davies, G. (2016, September). Surfacing collaborated networks in dark web to find illicit and criminal content. InIntelligence and Security Informatics (ISI), 2016 IEEE Conference on(pp. 109-114). IEEE.