SlideShare uma empresa Scribd logo
1 de 8
Presentation by: Daniel Perez
ECOMMER
What is the Invisible Web?
 Basically, the “visible” web is what a person can find

using general web search engines (e.g. Internet
Explorer, Mozilla Firefox, Google Chrome, Opera, etc.)
 The “invisible” web is what a person cannot find using

these types of search engines.

Tutorial: UC Berkeley Library. (n.d.). Retrieved from UC Berkeley Library: http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/InvisibleWeb.html
What is the Invisible Web?
 It mainly refers to the vast repository of information

that search engines and directories do not have direct
access to (e.g. databases).

Boswell, W. (n.d.). Web Search: About.com. Retrieved from About.com: http://websearch.about.com/od/invisibleweb/a/invisible_web.htm
What is the Invisible Web?
 The invisible web is enormous. Bright Planet has

estimated that the Invisible Web, a.k.a Deep Web, to
being around 500 times bigger than the “visible” part
of the web. The visible part of the web can be seen as
the tip of an iceberg, while the Invisible Web would be
the remaining part.

Boswell, W. (n.d.). Web Search: About.com. Retrieved from About.com: http://websearch.about.com/od/invisibleweb/a/invisible_web.htm
Business Implications on E-Commerce
It is not always easy to search what you are looking for if
you stick to only Google or Yahoo!, especially when you
are looking for something a bit complicated or obscure.
The invisible web helps users “dig” for information that
ordinary search engines will not help them with. This
could prove to be advantageous for businesses if they
know how to use the invisible web.

Boswell, W. (n.d.). Web Search: About.com. Retrieved from About.com: http://websearch.about.com/od/invisibleweb/a/invisible_web.htm
Business Implications on E-Commerce
On the other hand, there is a dark side to the Invisible
Web, also known as the Darknet. Others have used the
Darknet for some illegal businesses that include and
are not limited to the following: Selling Drugs and
other illegal substances, Firearms, Hiring Hitmen,
Child Pornography, Human Trafficking, etc.

Andrews, S. (2010, March 9). Features: PC Pro. Retrieved from PC Pro: http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web
The future of Invisible Web!

The Invisible Web is only
continuing to grow!

Horton, C. (2013, January 8). Blog: SYNECORE. Retrieved from SYNECORE: http://engage.synecoretech.com/marketing-technology-for-growth/bid/168919/
SoLoMo-Time-to-Get-Social-Think-Local-and-Spend-Mobile
The future of Invisible Web!
 Tools that can search through the Invisible Web may

become much more prevalent in the future. Such tools
that can allow you access to the Invisible Web would
be TOR (The Onion Rating)
 Common search engines may also expand their queries
to some non-encrypted sites that may possess valuable
and relevant information

Horton, C. (2013, January 8). Blog: SYNECORE. Retrieved from SYNECORE: http://engage.synecoretech.com/marketing-technology-for-growth/bid/168919/
SoLoMo-Time-to-Get-Social-Think-Local-and-Spend-Mobile

Mais conteúdo relacionado

Mais procurados

Web 2.0 and Information Literacy
Web 2.0 and Information LiteracyWeb 2.0 and Information Literacy
Web 2.0 and Information Literacy
Jane Secker
 
Functions of information retrival system(1)
Functions of information retrival system(1)Functions of information retrival system(1)
Functions of information retrival system(1)
silambu111
 

Mais procurados (20)

Ontology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical StudyOntology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical Study
 
Internet Technology Basics
Internet Technology BasicsInternet Technology Basics
Internet Technology Basics
 
WEB HOSTING
WEB HOSTINGWEB HOSTING
WEB HOSTING
 
Web mining
Web miningWeb mining
Web mining
 
Resource sharing
Resource sharingResource sharing
Resource sharing
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Web 2.0 and Information Literacy
Web 2.0 and Information LiteracyWeb 2.0 and Information Literacy
Web 2.0 and Information Literacy
 
Webometrics
WebometricsWebometrics
Webometrics
 
Comparative study of web 1, Web 2 and Web 3
Comparative study of web 1, Web 2 and Web 3Comparative study of web 1, Web 2 and Web 3
Comparative study of web 1, Web 2 and Web 3
 
LIBRARY CONSORTIA
LIBRARY CONSORTIALIBRARY CONSORTIA
LIBRARY CONSORTIA
 
Open source software
Open source softwareOpen source software
Open source software
 
Content Management System
Content Management SystemContent Management System
Content Management System
 
Internet ppt
Internet  ppt Internet  ppt
Internet ppt
 
Functions of information retrival system(1)
Functions of information retrival system(1)Functions of information retrival system(1)
Functions of information retrival system(1)
 
Introduction to DSpace
Introduction to DSpaceIntroduction to DSpace
Introduction to DSpace
 
The future internet web 3.0
The future internet  web 3.0The future internet  web 3.0
The future internet web 3.0
 
Dspace software
Dspace softwareDspace software
Dspace software
 
Semantic web
Semantic webSemantic web
Semantic web
 
Meta search engine
Meta search engineMeta search engine
Meta search engine
 
Web development tool
Web development toolWeb development tool
Web development tool
 

Semelhante a Invisible Web

Part 1 Information networking as technology tools, uses, and soci.docx
Part 1  Information networking as technology tools, uses, and soci.docxPart 1  Information networking as technology tools, uses, and soci.docx
Part 1 Information networking as technology tools, uses, and soci.docx
herbertwilson5999
 
Internet awareness by bhalani mansi
Internet awareness by bhalani mansiInternet awareness by bhalani mansi
Internet awareness by bhalani mansi
bhalanimahi
 
Internet awareness by komalvekariya
Internet awareness by komalvekariyaInternet awareness by komalvekariya
Internet awareness by komalvekariya
komalatel
 
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxAshford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
davezstarr61655
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
Ray Brannon
 

Semelhante a Invisible Web (20)

Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
 
The Information Revolution
The Information RevolutionThe Information Revolution
The Information Revolution
 
Deep web
Deep webDeep web
Deep web
 
PRSENTATIION ON INTERNET
PRSENTATIION ON INTERNETPRSENTATIION ON INTERNET
PRSENTATIION ON INTERNET
 
Deep web
Deep webDeep web
Deep web
 
Part 1 Information networking as technology tools, uses, and soci.docx
Part 1  Information networking as technology tools, uses, and soci.docxPart 1  Information networking as technology tools, uses, and soci.docx
Part 1 Information networking as technology tools, uses, and soci.docx
 
Internet awareness by bhalani mansi
Internet awareness by bhalani mansiInternet awareness by bhalani mansi
Internet awareness by bhalani mansi
 
Internet awareness
Internet awarenessInternet awareness
Internet awareness
 
Internet awareness by komalvekariya
Internet awareness by komalvekariyaInternet awareness by komalvekariya
Internet awareness by komalvekariya
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...
 
darkweb
darkwebdarkweb
darkweb
 
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxAshford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
 
My lectures
My lecturesMy lectures
My lectures
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
InvisibleWeb-DeeperWeb
InvisibleWeb-DeeperWebInvisibleWeb-DeeperWeb
InvisibleWeb-DeeperWeb
 
HMID6303 Assignment 1 - Yeap
HMID6303 Assignment 1 - YeapHMID6303 Assignment 1 - Yeap
HMID6303 Assignment 1 - Yeap
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Invisible Web

  • 1. Presentation by: Daniel Perez ECOMMER
  • 2. What is the Invisible Web?  Basically, the “visible” web is what a person can find using general web search engines (e.g. Internet Explorer, Mozilla Firefox, Google Chrome, Opera, etc.)  The “invisible” web is what a person cannot find using these types of search engines. Tutorial: UC Berkeley Library. (n.d.). Retrieved from UC Berkeley Library: http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/InvisibleWeb.html
  • 3. What is the Invisible Web?  It mainly refers to the vast repository of information that search engines and directories do not have direct access to (e.g. databases). Boswell, W. (n.d.). Web Search: About.com. Retrieved from About.com: http://websearch.about.com/od/invisibleweb/a/invisible_web.htm
  • 4. What is the Invisible Web?  The invisible web is enormous. Bright Planet has estimated that the Invisible Web, a.k.a Deep Web, to being around 500 times bigger than the “visible” part of the web. The visible part of the web can be seen as the tip of an iceberg, while the Invisible Web would be the remaining part. Boswell, W. (n.d.). Web Search: About.com. Retrieved from About.com: http://websearch.about.com/od/invisibleweb/a/invisible_web.htm
  • 5. Business Implications on E-Commerce It is not always easy to search what you are looking for if you stick to only Google or Yahoo!, especially when you are looking for something a bit complicated or obscure. The invisible web helps users “dig” for information that ordinary search engines will not help them with. This could prove to be advantageous for businesses if they know how to use the invisible web. Boswell, W. (n.d.). Web Search: About.com. Retrieved from About.com: http://websearch.about.com/od/invisibleweb/a/invisible_web.htm
  • 6. Business Implications on E-Commerce On the other hand, there is a dark side to the Invisible Web, also known as the Darknet. Others have used the Darknet for some illegal businesses that include and are not limited to the following: Selling Drugs and other illegal substances, Firearms, Hiring Hitmen, Child Pornography, Human Trafficking, etc. Andrews, S. (2010, March 9). Features: PC Pro. Retrieved from PC Pro: http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web
  • 7. The future of Invisible Web! The Invisible Web is only continuing to grow! Horton, C. (2013, January 8). Blog: SYNECORE. Retrieved from SYNECORE: http://engage.synecoretech.com/marketing-technology-for-growth/bid/168919/ SoLoMo-Time-to-Get-Social-Think-Local-and-Spend-Mobile
  • 8. The future of Invisible Web!  Tools that can search through the Invisible Web may become much more prevalent in the future. Such tools that can allow you access to the Invisible Web would be TOR (The Onion Rating)  Common search engines may also expand their queries to some non-encrypted sites that may possess valuable and relevant information Horton, C. (2013, January 8). Blog: SYNECORE. Retrieved from SYNECORE: http://engage.synecoretech.com/marketing-technology-for-growth/bid/168919/ SoLoMo-Time-to-Get-Social-Think-Local-and-Spend-Mobile