{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:37:28Z","timestamp":1774895848273,"version":"3.50.1"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030885823","type":"print"},{"value":"9783030885830","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T00:00:00Z","timestamp":1634860800000},"content-version":"vor","delay-in-days":294,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A hidden part of the World Wide Web is known as the Dark Web, featuring websites that cannot be indexed by traditional search engines. Many open source software products are used to access and navigate through the Dark Web. Together they form the Dark Web open source software ecosystem. Research on this ecosystem is scarce and research on the ecosystem health is non-existent, even though ecosystem health is an useful indicator of the livelihood of an ecosystem. The goal of this research is to evaluate the health of the ecosystem through an assessment of Tor, I2P and GitHub. The Open Source Ecosystem Health Operationalization framework is used to help perform this assessment. Eight metrics from the framework are selected, which are measured using the data collected. Analysis of Tor and I2P metrics suggest that there has been an increase in Tor and I2P user activity in the recent past. Added knowledge, spin offs and forks and usage indicate active participation and interest in Tor and I2P. There has also been an increase in the number of active GitHub Dark Web projects. However, these GitHub projects are not well-connected and only a small number of projects have a large number of contributors. There is some variety among the GitHub software projects. The framework proves to be adequately capable of determining the health of the Dark Web open source ecosystem with the available data.<\/jats:p>","DOI":"10.1007\/978-3-030-88583-0_12","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T15:46:34Z","timestamp":1634917594000},"page":"125-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Assessing the Health of the Dark Web:"],"prefix":"10.1007","author":[{"given":"Samuel","family":"Onyango","sequence":"first","affiliation":[]},{"given":"Emilie","family":"Steenvoorden","sequence":"additional","affiliation":[]},{"given":"Joram","family":"Scholten","sequence":"additional","affiliation":[]},{"given":"Slinger","family":"Jansen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,22]]},"reference":[{"key":"12_CR1","unstructured":"Astolfi, F., Kroese, J. Van Oorschot, J.: I2P-the invisible internet project. Leiden University Web Technology report (2015)"},{"key":"12_CR2","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-030-04840-2_3","volume-title":"Software Business","author":"M Berkhout","year":"2018","unstructured":"Berkhout, M., van den Brink, F., van Zwienen, M., van Vulpen, P., Jansen, S.: Software ecosystem health of cryptocurrencies. In: Wnuk, K., Brinkkemper, S. (eds.) ICSOB 2018. LNBIP, vol. 336, pp. 27\u201342. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-04840-2_3"},{"issue":"4","key":"12_CR3","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1353-4858(14)70042-X","volume":"2014","author":"D Bradbury","year":"2014","unstructured":"Bradbury, D.: Unveiling the dark web. Netw. Secur. 2014(4), 14\u201317 (2014)","journal-title":"Netw. Secur."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Cilleruelo, C., De-Marcos, L., Junquera-S\u00e1nchez, J. Martinez-Herraiz, J.J.: Interconnection between darknets. IEEE Internet Comput. (2020)","DOI":"10.1109\/MIC.2020.3037723"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.infsof.2017.07.007","volume":"91","author":"O Franco-Bedoya","year":"2017","unstructured":"Franco-Bedoya, O., Ameller, D., Costal, D., Franch, X.: Open source software ecosystems: a systematic mapping. Inf. Softw. Technol. 91, 160\u2013185 (2017)","journal-title":"Inf. Softw. Technol."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Hoang, N.P., Kintis, P., Antonakakis, M., Polychronakis, M.: An empirical study of the I2P anonymity network and its censorship resistance. In: Proceedings of the Internet Measurement Conference 2018, pp. 379\u2013392, October 2018","DOI":"10.1145\/3278532.3278565"},{"issue":"11","key":"12_CR7","doi-asserted-by":"publisher","first-page":"1508","DOI":"10.1016\/j.infsof.2014.04.006","volume":"56","author":"S Jansen","year":"2014","unstructured":"Jansen, S.: Measuring the health of open source software ecosystems: beyond the scope of project health. Inf. Softw. Technol. 56(11), 1508\u20131519 (2014)","journal-title":"Inf. Softw. Technol."},{"issue":"50","key":"12_CR8","doi-asserted-by":"publisher","first-page":"31716","DOI":"10.1073\/pnas.2011893117","volume":"117","author":"E Jardine","year":"2020","unstructured":"Jardine, E., Lindner, A.M., Owenson, G.: The potential harms of the Tor anonymity network cluster disproportionately in free countries. Proc. Natl. Acad. Sci. 117(50), 31716\u201331721 (2020)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"12_CR9","series-title":"Security Informatics and Law Enforcement","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-030-55343-2_2","volume-title":"Dark Web Investigation","author":"D Kavallieros","year":"2021","unstructured":"Kavallieros, D., Myttas, D., Kermitsis, E., Lissaris, E., Giataganas, G., Darra, E.: Using the dark web. In: Akhgar, B., Gercke, M., Vrochidis, S., Gibson, H. (eds.) Dark Web Investigation. Security Informatics and Law Enforcement, pp. 27\u201348. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-55343-2_2"},{"issue":"07","key":"12_CR10","first-page":"2542","volume":"4","author":"N Negi","year":"2017","unstructured":"Negi, N.: Comparison of anonymous communication networks-tor, I2P, Freenet. Int. Res. J. Eng. Technol. 4(07), 2542\u20132544 (2017)","journal-title":"Int. Res. J. Eng. Technol."},{"issue":"2","key":"12_CR11","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1007\/s10664-015-9406-4","volume":"21","author":"I Scholtes","year":"2015","unstructured":"Scholtes, I., Mavrodiev, P., Schweitzer, F.: From Aristotle to Ringelmann: a large-scale analysis of team productivity and coordination in Open Source Software projects. Empir. Softw. Eng. 21(2), 642\u2013683 (2015). https:\/\/doi.org\/10.1007\/s10664-015-9406-4","journal-title":"Empir. Softw. Eng."}],"container-title":["Lecture Notes in Business Information Processing","Agile Processes in Software Engineering and Extreme Programming \u2013 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88583-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T15:54:45Z","timestamp":1634918085000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88583-0_12"}},"subtitle":["An Analysis of Dark Web Open Source Software Projects"],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030885823","9783030885830"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88583-0_12","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"22 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"XP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Agile Software Development","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"xpu2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.agilealliance.org\/xp2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops, 18 papers were accepted for publication from 37 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}