Abstract
This chapter draws on interviews, participant observation, and archival research to provide a field guide for other digital humanists who want to study the Dark Web. In order to study the Dark Web, the digital humanist must engage with the technical infrastructures of Freenet, Tor, and I2P. The chapter will also aid researchers who study Dark Web end users, aesthetics, or cultures. To these ends, I offer a catalog of archives and resources researchers could draw on, and a discussion of why researchers should build their own archives. I conclude with some remarks about the ethics of Dark Web research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The connotation of “dark” on which I draw to define the Dark Web is quite similar to that of former FBI Director James Comey. See James Comey, “Encryption, Public Safety, and ‘Going Dark,’” Blog, Lawfare, July 6, 2015, http://www.lawfareblog.com/encryption-public-safety-and-going-dark.
- 2.
For examples, see Ian Clarke et al., “Freenet : A Distributed Anonymous Information Storage and Retrieval System,” in Designing Privacy Enhancing Technologies, ed. Hannes Federrath (Springer, 2001), 46–66, http://link.springer.com/chapter/10.1007/3-540-44702-4_4; Ian Clarke et al., “Protecting Free Expression Online with Freenet,” Internet Computing, IEEE 6, no. 1 (2002): 40–49; Jens Mache et al., “Request Algorithms in Freenet-Style Peer–Peer Systems,” in Peer-to-Peer Computing, 2002 (P2P 2002). Proceedings. Second International Conference on IEEE (2002), 90–95, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1046317; Hui Zhang, Ashish Goel, and Ramesh Govindan, “Using the Small-World Model to Improve Freenet Performance,” in INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3 (IEEE, 2002), 1228–1237, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1019373; Karl Aberer, Manfred Hauswirth, and Magdalena Punceva, “Self-Organized Construction of Distributed Access Structures: A Comparative Evaluation of P-Grid and FreeNet,” in The 5th Workshop on Distributed Data and Structures (WDAS 2003), 2003, http://infoscience.epfl.ch/record/54381; Jem E. Berkes, “Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet,” University of Manitoba, Winnipeg, Manitoba, Canada, 2003, http://www.berkes.ca/archive/berkes_gnutella_freenet.pdf; Ian Clarke et al., “Private Communication Through a Network of Trusted Connections: The Dark Freenet,” Network, 2010, http://www.researchgate.net/profile/Vilhelm_Verendel/publication/228552753_Private_Communication_Through_a_Network_of_Trusted_Connections_The_Dark_Freenet/links/02e7e525f9eb66ba13000000.pdf; Mathias Ehlert, “I2P Usability vs. Tor Usability a Bandwidth and Latency Comparison,” in Seminar, Humboldt University of Berlin, Berlin, Germany, 2011, http://userpage.fu-berlin.de/semu/docs/2011_seminar_ehlert_i2p.pdf; Peipeng Liu et al., “Empirical Measurement and Analysis of I2P Routers,” Journal of Networks 9, no. 9 (2014): 2269–2278; Gildas Nya Tchabe and Yinhua Xu, “Anonymous Communications: A Survey on I2P,” CDC Publication Theoretische Informatik–Kryptographie und Computeralgebra, https://www.cdc.informatik.tu-darmstadt.de, 2014, https://www.cdc.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Lehre/SS13/Seminar/CPS/cps2014_submission_4.pdf; and Matthew Thomas and Aziz Mohaisen, “Measuring the Leakage of Onion at the Root,” 2014, 11.
- 3.
Symon Aked, “An Investigation into Darknets and the Content Available Via Anonymous Peer-to-Peer File Sharing,” 2011, http://ro.ecu.edu.au/ism/106/; Hsinchun Chen, Dark Web —Exploring and Data Mining the Dark Side of the Web (New York: Springer, 2012), http://www.springer.com/computer/database+management+%26+information+retrieval/book/978-1-4614-1556-5; Gabriel Weimann, “Going Dark: Terrorism on the Dark Web,” Studies in Conflict & Terrorism, 2015, http://www.tandfonline.com/doi/abs/10.1080/1057610X.2015.1119546; Clement Guitton, “A Review of the Available Content on Tor Hidden Services: The Case Against Further Development,” Computers in Human Behavior 29, no. 6 (November 2013): 2805–2815, https://doi.org/10.1016/j.chb.2013.07.031; and Jialun Qin et al., “The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web,” in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics (Springer-Verlag, 2005), 623–624, http://dl.acm.org/citation.cfm?id=2154737.
- 4.
See especially Guitton, “A Review of the Available Content on Tor Hidden Services”; Weimann, “Going Dark.”
- 5.
Nicolas Christin, “Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace,” in Proceedings of the 22nd International Conference on World Wide Web, WWW’13 (New York, NY: ACM, 2013), 213–224, https://doi.org/10.1145/2488388.2488408; Marie Claire Van Hout and Tim Bingham, “‘Silk Road’, the Virtual Drug Marketplace: A Single Case Study of User Experiences,” International Journal of Drug Policy 24, no. 5 (September 2013): 385–391, https://doi.org/10.1016/j.drugpo.2013.01.005; Marie Claire Van Hout and Tim Bingham, “‘Surfing the Silk Road’: A Study of Users’ Experiences,” International Journal of Drug Policy 24, no. 6 (November 2013): 524–529, https://doi.org/10.1016/j.drugpo.2013.08.011; James Martin, Drugs on the Dark Net: How Cryptomarkets Are Transforming the Global Trade in Illicit Drugs, 2014; James Martin, “Lost on the Silk Road: Online Drug Distribution and the ‘Cryptomarket,’” Criminology & Criminal Justice 14, no. 3 (2014): 351–367, https://doi.org/10.1177/1748895813505234; Amy Phelps and Allan Watt, “I Shop Online—Recreationally! Internet Anonymity and Silk Road Enabling Drug Use in Australia,” Digital Investigation 11, no. 4 (2014): 261–272, https://doi.org/10.1016/j.diin.2014.08.001; Alois Afilipoaie and Patrick Shortis, From Dealer to Doorstep—How Drugs Are Sold on the Dark Net, GDPO Situation Analysis (Swansea University: Global Drugs Policy Observatory, 2015), http://www.swansea.ac.uk/media/Dealer%20to%20Doorstep%20FINAL%20SA.pdf; Jakob Johan Demant and Esben Houborg, “Personal Use, Social Supply or Redistribution? Cryptomarket Demand on Silk Road 2 and Agora,” Trends in Organized Crime, 2016, http://www.forskningsdatabasen.dk/en/catalog/2304479461; Rasmus Munksgaard and Jakob Demant, “Mixing Politics and Crime—The Prevalence and Decline of Political Discourse on the Cryptomarket,” International Journal of Drug Policy 35 (September 2016): 77–83, https://doi.org/10.1016/j.drugpo.2016.04.021; and Alice Hutchings and Thomas J. Holt, “The Online Stolen Data Market: Disruption and Intervention Approaches,” Global Crime 18, no. 1 (January 2, 2017): 11–30, https://doi.org/10.1080/17440572.2016.1197123.
- 6.
Monica J. Barratt, Jason A. Ferris, and Adam R. Winstock, “Safer Scoring? Cryptomarkets, Social Supply and Drug Market Violence,” International Journal of Drug Policy 35 (September 2016): 24–31, https://doi.org/10.1016/j.drugpo.2016.04.019; Monica J. Barratt et al., “‘What If You Live on Top of a Bakery and You Like Cakes?’—Drug Use and Harm Trajectories Before, During and After the Emergence of Silk Road,” International Journal of Drug Policy 35 (September 2016): 50–57, https://doi.org/10.1016/j.drugpo.2016.04.006; and Alexia Maddox et al., “Constructive Activism in the Dark Web : Cryptomarkets and Illicit Drugs in the Digital ‘Demimonde,’” Information, Communication & Society (October 15, 2015): 1–16, https://doi.org/10.1080/1369118x.2015.1093531.
- 7.
Monica J. Barratt and Alexia Maddox, “Active Engagement with Stigmatised Communities Through Digital Ethnography,” Qualitative Research (May 22, 2016), https://doi.org/10.1177/1468794116648766.
- 8.
Robert W. Gehl, “Power/Freedom on the Dark Web : A Digital Ethnography of the Dark Web Social Network,” New Media and Society (October 16, 2014): 1–17.
- 9.
Barratt and Maddox, “Active Engagement with Stigmatised Communities Through Digital Ethnography,” 6.
- 10.
Hugh Gusterson, “Ethnographic Research,” in Qualitative Methods in International Relations, ed. Audie Klotz and Deepa Prakash, Research Methods Series (Palgrave Macmillan, 2008), 96, https://doi.org/10.1007/978-0-230-58412-9_7.
- 11.
This is definitely not to say that such markers don’t emerge, or that racialized/gendered/classed discourses do not appear on the Dark Web . As I show in my book, such discourses do emerge, highlighting the overall arguments put forward by Lisa Nakamura that the Internet is not a perfectly “disembodied” medium. See Lisa Nakamura, Cybertypes: Race, Ethnicity, and Identity on the Internet (New York: Routledge, 2002).
- 12.
Gusterson, “Ethnographic Research,” 97.
- 13.
Robert W. Gehl, “(Critical) Reverse Engineering and Genealogy,” Foucaultblog, August 16, 2016, https://doi.org/10.13095/uzh.fsw.fb.153.
- 14.
Ahmed Hassan, “Mining Software Repositories to Assist Developers and Support Managers,” 2004, 2, https://uwspace.uwaterloo.ca/handle/10012/1017.
- 15.
Glenn McGrath, “[Freenet -Chat] Deep Philosophical Question,” January 2, 2002, https://emu.freenetproject.org/pipermail/chat/2002-January/000604.html.
- 16.
Colbyd, “[Freenet -Chat] Terrorism and Freenet,” January 9, 2002, https://emu.freenetproject.org/pipermail/chat/2002-January/001353.html.
- 17.
Roger Dingledine, “[Freehaven-Dev] Re: [Freenet -Chat] MojoNation,” August 9, 2000, http://archives.seul.org//freehaven/dev/Aug-2000/msg00006.html.
- 18.
See https://lists.torproject.org/cgi-bin/mailman/listinfo for a list of them.
- 19.
See https://geti2p.net/en/meetings/ for the archived chat logs.
- 20.
All URLs marked with an asterisk (*) require special routing software to access them. URLs ending in.i2p require I2P software; .onions require Tor , and Freesites require Freenet . For instructions on how to download, install, and run these routers, see each project’s home page: https://geti2p.net/, https://torproject.org and https://freenetproject.org, respectively.
- 21.
Achilleas Pipinellis, GitHub Essentials (Birmingham: Packt Publishing, 2015).
- 22.
Barratt and Maddox, “Active Engagement with Stigmatised Communities Through Digital Ethnography.”
- 23.
Gehl, “Power/Freedom on the Dark Web : A Digital Ethnography of the Dark Web Social Network.”
- 24.
For an archive of screenshots of many of them, see https://socialmediaalternatives.org/archive/items/browse?tags=dark+web.
- 25.
Annette Markham and Elizabeth Buchanan, Ethical Decision-Making and Internet Research: Recommendations from the Aoir Ethics Working Committee (Version 2.0) (Association of Internet Researchers, 2012), https://pure.au.dk/ws/files/55543125/aoirethics2.pdf.
- 26.
“Ethical Tor Research: Guidelines,” Blog, The Tor Blog, November 11, 2015, https://blog.torproject.org/blog/ethical-tor-research-guidelines.
- 27.
James Martin and Nicolas Christin, “Ethics in Cryptomarket Research,” International Journal of Drug Policy 35 (September 2016): 84–91, https://doi.org/10.1016/j.drugpo.2016.05.006.
- 28.
Barratt and Maddox, “Active Engagement with Stigmatised Communities Through Digital Ethnography.”
- 29.
Martin and Christin, “Ethics in Cryptomarket Research,” 86.
- 30.
Barratt and Maddox, “Active Engagement with Stigmatised Communities Through Digital Ethnography,” 10.
- 31.
Ibid., 11.
- 32.
Martin and Christin, “Ethics in Cryptomarket Research,” 88.
- 33.
However, I should note that I was interviewing the builders of Dark Web search engines and the administrators and users of Dark Web social networking sites. These formats have different legal stakes than drug markets, the object Maddox and Barratt were studying. Thus, there may have been less anxiety among my participants that I was an undercover law enforcement agent. Again, this points to the difficulty of establishing hard-and-fast ethical rules for this line of research. I should also note that the Dark Web is a highly masculinized space. In the few cases where participants asked for my identity, they learned I identify as a cisgender male. In contrast, Maddox and Barratt discuss the specific harassment they received due to their female gender identities.
- 34.
I. Bogost and N. Montfort, “Platform Studies: Frequently Questioned Answers,” in Digital Arts and Culture 2009 (Irvine, CA: After Media, Embodiment and Context, UC Irvine, 2009), 3.
References
Aberer, Karl, Manfred Hauswirth, and Magdalena Punceva. “Self-Organized Construction of Distributed Access Structures: A Comparative Evaluation of P-Grid and FreeNet.” In The 5th Workshop on Distributed Data and Structures (WDAS 2003). 2003. http://infoscience.epfl.ch/record/54381.
Afilipoaie, Alois, and Patrick Shortis. From Dealer to Doorstep—How Drugs Are Sold on the Dark Net. GDPO Situation Analysis. Swansea City: Global Drugs Policy Observatory, Swansea University, 2015. http://www.swansea.ac.uk/media/Dealer%20to%20Doorstep%20FINAL%20SA.pdf.
Aked, Symon. “An Investigation into Darknets and the Content Available Via Anonymous Peer-to-Peer File Sharing.” 2011. http://ro.ecu.edu.au/ism/106/.
Barratt, Monica J., and Alexia Maddox. “Active Engagement with Stigmatised Communities Through Digital Ethnography.” Qualitative Research (May 22, 2016). https://doi.org/10.1177/1468794116648766.
Barratt, Monica J., Jason A. Ferris, and Adam R. Winstock. “Safer Scoring? Cryptomarkets, Social Supply and Drug Market Violence.” International Journal of Drug Policy 35 (September 2016): 24–31. https://doi.org/10.1016/j.drugpo.2016.04.019.
Barratt, Monica J., Simon Lenton, Alexia Maddox, and Matthew Allen. “‘What If You Live on Top of a Bakery and You like Cakes?’—Drug Use and Harm Trajectories Before, During and After the Emergence of Silk Road.” International Journal of Drug Policy 35 (September 2016): 50–57. https://doi.org/10.1016/j.drugpo.2016.04.006.
Berkes, Jem E. “Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet.” University of Manitoba Winnipeg, Manitoba, Canada, 2003. http://www.berkes.ca/archive/berkes_gnutella_freenet.pdf.
Bogost, I., and N. Montfort. “Platform Studies: Frequently Questioned Answers.” In Digital Arts and Culture 2009, 8. Irvine, CA: After Media, Embodiment and Context, UC Irvine, 2009.
Chen, Hsinchun. Dark Web—Exploring and Data Mining the Dark Side of the Web. New York: Springer, 2012. http://www.springer.com/computer/database+management+%26+information+retrieval/book/978-1-4614-1556-5.
Christin, Nicolas. “Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.” In Proceedings of the 22nd International Conference on World Wide Web, WWW’13, 213–224. New York, NY: ACM, 2013. https://doi.org/10.1145/2488388.2488408.
Clarke, Ian, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. “Freenet: A Distributed Anonymous Information Storage and Retrieval System.” In Designing Privacy Enhancing Technologies, edited by Hannes Federrath, 46–66. Springer, 2001. http://link.springer.com/chapter/10.1007/3-540-44702-4_4.
Clarke, Ian, Oskar Sandberg, Matthew Toseland, and Vilhelm Verendel. “Private Communication Through a Network of Trusted Connections: The Dark Freenet.” Network. 2010. http://www.researchgate.net/profile/Vilhelm_Verendel/publication/228552753_Private_Communication_Through_a_Network_of_Trusted_Connections_The_Dark_Freenet/links/02e7e525f9eb66ba13000000.pdf.
Clarke, Ian, Scott G. Miller, Theodore W. Hong, Oskar Sandberg, and Brandon Wiley. “Protecting Free Expression Online with Freenet.” Internet Computing, IEEE 6, no. 1 (2002): 40–49.
Colbyd. “[Freenet-Chat] Terrorism and Freenet.” January 9, 2002. https://emu.freenetproject.org/pipermail/chat/2002-January/001353.html.
Comey, James. “Encryption, Public Safety, and ‘Going Dark.’” Blog. Lawfare. July 6, 2015. http://www.lawfareblog.com/encryption-public-safety-and-going-dark.
Demant, Jakob Johan, and Esben Houborg. “Personal Use, Social Supply or Redistribution? Cryptomarket Demand on Silk Road 2 and Agora.” Trends in Organized Crime. 2016. http://www.forskningsdatabasen.dk/en/catalog/2304479461.
Dingledine, Roger. “[Freehaven-Dev] Re: [Freenet-Chat] MojoNation.” August 9, 2000. http://archives.seul.org//freehaven/dev/Aug-2000/msg00006.html.
Ehlert, Mathias. “I2P Usability vs. Tor Usability a Bandwidth and Latency Comparison.” In Seminar. Humboldt University of Berlin, Berlin, Germany, 2011. http://userpage.fu-berlin.de/semu/docs/2011_seminar_ehlert_i2p.pdf.
“Ethical Tor Research: Guidelines.” Blog. The Tor Blog. November 11, 2015. https://blog.torproject.org/blog/ethical-tor-research-guidelines.
Gehl, Robert W. “(Critical) Reverse Engineering and Genealogy.” Foucaultblog. August 16, 2016. https://doi.org/10.13095/uzh.fsw.fb.153.
———. “Power/Freedom on the Dark Web: A Digital Ethnography of the Dark Web Social Network.” New Media and Society (October 16, 2014): 1–17.
Guitton, Clement. “A Review of the Available Content on Tor Hidden Services: The Case Against Further Development.” Computers in Human Behavior 29, no. 6 (November 2013): 2805–2815. https://doi.org/10.1016/j.chb.2013.07.031.
Gusterson, Hugh. “Ethnographic Research.” In Qualitative Methods in International Relations, edited by Audie Klotz and Deepa Prakash, 93–113. Research Methods Series. Palgrave Macmillan, 2008. https://doi.org/10.1007/978-0-230-58412-9_7.
Hassan, Ahmed. “Mining Software Repositories to Assist Developers and Support Managers.” 2004. https://uwspace.uwaterloo.ca/handle/10012/1017.
Hout, Marie Claire Van, and Tim Bingham. “‘Silk Road’, the Virtual Drug Marketplace: A Single Case Study of User Experiences.” International Journal of Drug Policy 24, no. 5 (September 2013): 385–391. https://doi.org/10.1016/j.drugpo.2013.01.005.
———. “‘Surfing the Silk Road’: A Study of Users’ Experiences.” International Journal of Drug Policy 24, no. 6 (November 2013): 524–529. https://doi.org/10.1016/j.drugpo.2013.08.011.
Hutchings, Alice, and Thomas J. Holt. “The Online Stolen Data Market: Disruption and Intervention Approaches.” Global Crime 18, no. 1 (January 2, 2017): 11–30. https://doi.org/10.1080/17440572.2016.1197123.
Liu, Peipeng, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, and Jinqiao Shi. “Empirical Measurement and Analysis of I2P Routers.” Journal of Networks 9, no. 9 (2014): 2269–2278.
Mache, Jens, Melanie Gilbert, Jason Guchereau, Jeff Lesh, Felix Ramli, and Matthew Wilkinson. “Request Algorithms in Freenet-Style Peer-to-Peer Systems.” In Peer-to-Peer Computing, 2002. (P2P 2002). Proceedings. Second International Conference on IEEE (2002), 90–95, 2002. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1046317.
Maddox, Alexia, Monica J. Barratt, Matthew Allen, and Simon Lenton. “Constructive Activism in the Dark Web: Cryptomarkets and Illicit Drugs in the Digital ‘Demimonde.’” Information, Communication & Society (October 15, 2015): 1–16. https://doi.org/10.1080/1369118x.2015.1093531.
Markham, Annette, and Elizabeth Buchanan. Ethical Decision-Making and Internet Research: Recommendations from the Aoir Ethics Working Committee (Version 2.0). Association of Internet Researchers, 2012. https://pure.au.dk/ws/files/55543125/aoirethics2.pdf.
Martin, James. Drugs on the Dark Net: How Cryptomarkets Are Transforming the Global Trade in Illicit Drugs. 2014.
———. “Lost on the Silk Road: Online Drug Distribution and the ‘Cryptomarket.’” Criminology & Criminal Justice 14, no. 3 (2014): 351–367. https://doi.org/10.1177/1748895813505234.
Martin, James, and Nicolas Christin. “Ethics in Cryptomarket Research.” International Journal of Drug Policy 35 (September 2016): 84–91. https://doi.org/10.1016/j.drugpo.2016.05.006.
McGrath, Glenn. “[Freenet-Chat] Deep Philosophical Question.” January 2, 2002. https://emu.freenetproject.org/pipermail/chat/2002-January/000604.html.
Munksgaard, Rasmus, and Jakob Demant. “Mixing Politics and Crime—The Prevalence and Decline of Political Discourse on the Cryptomarket.” International Journal of Drug Policy 35 (September 2016): 77–83. https://doi.org/10.1016/j.drugpo.2016.04.021.
Nakamura, Lisa. Cybertypes: Race, Ethnicity, and Identity on the Internet. New York: Routledge, 2002.
Phelps, Amy, and Allan Watt. “I Shop Online—Recreationally! Internet Anonymity and Silk Road Enabling Drug Use in Australia.” Digital Investigation 11, no. 4 (2014): 261–272. https://doi.org/10.1016/j.diin.2014.08.001.
Pipinellis, Achilleas. GitHub Essentials. Birmingham: Packt Publishing, 2015.
Qin, Jialun, Yilu Zhou, Guanpi Lai, Edna Reid, Marc Sageman, and Hsinchun Chen. “The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web.” In Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, 623–624. Springer-Verlag, 2005. http://dl.acm.org/citation.cfm?id=2154737.
Tchabe, Gildas Nya, and Yinhua Xu. “Anonymous Communications: A Survey on I2P.” CDC Publication Theoretische Informatik–Kryptographie und Computeralgebra. 2014. https://www.informatik.tu-darmstadt.de/cdc. https://www.cdc.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Lehre/SS13/Seminar/CPS/cps2014_submission_4.pdf.
Thomas, Matthew, and Aziz Mohaisen. “Measuring the Leakage of Onion at the Root.” 2014, 11.
Weimann, Gabriel. “Going Dark: Terrorism on the Dark Web.” Studies in Conflict & Terrorism, 2015. http://www.tandfonline.com/doi/abs/10.1080/1057610X.2015.1119546.
Zhang, Hui, Ashish Goel, and Ramesh Govindan. “Using the Small-World Model to Improve Freenet Performance.” In INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 3: 1228–1237. 2002. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1019373.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Gehl, R.W. (2018). Archives for the Dark Web: A Field Guide for Study. In: levenberg, l., Neilson, T., Rheams, D. (eds) Research Methods for the Digital Humanities. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-96713-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-96713-4_3
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-96712-7
Online ISBN: 978-3-319-96713-4
eBook Packages: Literature, Cultural and Media StudiesLiterature, Cultural and Media Studies (R0)