Applied Cybersecurity & Internet Governance最新文献

筛选
英文 中文
Commentary: The Czech Approach to Supply Chain Security in ICT 评论:捷克在ICT供应链安全方面的做法
Applied Cybersecurity & Internet Governance Pub Date : 2022-12-02 DOI: 10.5604/01.3001.0016.0867
Veronika Netolická
{"title":"Commentary: The Czech Approach to Supply Chain Security in ICT","authors":"Veronika Netolická","doi":"10.5604/01.3001.0016.0867","DOIUrl":"https://doi.org/10.5604/01.3001.0016.0867","url":null,"abstract":"Supply chain security is one of the challenges many countries are currently addressing. As this topic is a national security prerogative, the systems for screening also vary. The Czech Republic is preparing a legislative framework to protect strategically important infrastructure from high-risk suppliers. This commentary focuses on the Czech Republic’s progress in this area, particularly in the European context.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"16 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123656146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The (Il)legitimacy ofCybersecurity. An Applicationof Just Securitization Theoryto Cybersecurity based onthe Principle of Subsidiarity 网络安全的合法性。基于辅助原则的公正证券化理论在网络安全中的应用
Applied Cybersecurity & Internet Governance Pub Date : 2022-11-17 DOI: 10.5604/01.3001.0016.1093
Johannes Thumfart
{"title":"The (Il)legitimacy of\u0000Cybersecurity. An Application\u0000of Just Securitization Theory\u0000to Cybersecurity based on\u0000the Principle of Subsidiarity","authors":"Johannes Thumfart","doi":"10.5604/01.3001.0016.1093","DOIUrl":"https://doi.org/10.5604/01.3001.0016.1093","url":null,"abstract":"The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just war theory. Unlike traditional securitization theory, it also addresses the normative question of when securitization is legitimate. In this contribution, I critically apply Floyd’s JST to cybersecurity and develop my own version of JST based on subsidiarity. Floyd’s JST follows a minimalistic and subsidiary approach by emphasizing that securitization is only legitimate if it has a reasonable chance of success in averting threats to the satisfaction of basic human needs. From this restrictive perspective, cyber-securitization is only legitimate if it serves to protect critical infrastructure. Whilst Floyd’s JST focuses exclusively on permissibility and needs instead of rights, I argue that there are cases in which states’ compliance with human rights obligations requires the guarantee of cybersecurity, most importantly regarding the human right to privacy. My version of JST is also based on the principle of subsidiarity, in the sense that securitization should always include stakeholders directly affected by a threat. To strengthen this kind of subsidiarity, focused on the private sector, I argue for the legitimacy of private active self-defence in cyberspace and emphasize the importance of a ‘whole-of-society approach’ involving digital literacy and everyday security practices. Moreover, I argue that far-reaching securitization on the nation-state-level should be avoided, particularly the hyper-securitization of the digital public sphere, following unclear notions of ‘digital sovereignty’.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126090574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy on the Internet:An Empirical Study of Poles’Attitudes 互联网隐私:波兰人态度的实证研究
Applied Cybersecurity & Internet Governance Pub Date : 2022-11-17 DOI: 10.5604/01.3001.0016.1459
Daniel Mider
{"title":"Privacy on the Internet:\u0000An Empirical Study of Poles’\u0000Attitudes","authors":"Daniel Mider","doi":"10.5604/01.3001.0016.1459","DOIUrl":"https://doi.org/10.5604/01.3001.0016.1459","url":null,"abstract":"The value system of Poles in terms of the phenomenon of privacy on the Internet was analysed. The following aspects were taken into account: privacy on the Internet as a moral value, privacy on the Internet as a subject of legal regulations (current or future) and actual actions taken by users to protect privacy. The differentiation of Polish society in terms of the three above-mentioned areas was also examined. Results were obtained on the basis of a quantitative empirical study conducted on a representative sample (N=1001) of adult Poles. The method of computer assisted telephone interviews (CATI) was used. Descriptive statistics and selected inductive statistics were used in the analyses. Intra-group differentiation was investigated using a method called two-step cluster analysis. Poles have low technical competences in the field of Internet privacy protection. This value is appreciated; however, it rarely translates into active protection of one’s own identity and information. A strong polarization of Poles’ attitudes towards the requirement to disclose their identity on the Internet was identified, as well as ensuring access to any user information by law enforcement agencies. Poles are willing to accept legal regulations preventing their profiling. We note a moderately strong negative attitude towards state institutions as a factor limiting privacy on the Internet and a significantly lower (but still negative) attitude towards Internet service providers. Poles differ in terms of attitudes towards privacy on the Internet (IT competences, age, education, gender, socioeconomic status and size of the place of residence).\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing Object Capabilities to Improve Web Application Security 利用对象功能提高Web应用程序安全性
Applied Cybersecurity & Internet Governance Pub Date : 2022-11-16 DOI: 10.5604/01.3001.0016.0823
Michael Koppmann, Christian Kudera, Michael Pucher, Georg Merzdovnik
{"title":"Utilizing Object Capabilities to Improve Web Application Security","authors":"Michael Koppmann, Christian Kudera, Michael Pucher, Georg Merzdovnik","doi":"10.5604/01.3001.0016.0823","DOIUrl":"https://doi.org/10.5604/01.3001.0016.0823","url":null,"abstract":"Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform. With this change, authorization models change and no longer depend on operating system accounts and underlying access controls and file permissions. Instead, these accounts are now implemented in the applications themselves, including all of the protective measures and security controls that are required for this. Because of the inherent complexity, flaws in the authorization logic are among the most common security vulnerabilities in web applications. Most applications are built on the concept of the Access-Control List (ACL), a security model that decides who can access a given object. Object Capabilities, transferable rights to perform operations on specific objects, have been proposed as an alternative to ACLs, since they are not susceptible to certain attacks prevalent for ACLs. While their use has been investigated for various domains, such as smart contracts, they have not been widely applied for web applications. In this paper, we therefore present a general overview of the capability-based authorization model and adapt those approaches for use in web applications. Based on a prototype implementation, we show the ways in which Object Capabilities may enhance security, while also offering insights into existing pitfalls and problems in porting such models to the web domain.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Russian Aggression against Ukraine as the Accelerator in the Systemic Struggle against Disinformation in Czechia 俄罗斯对乌克兰的侵略是捷克系统性打击虚假信息斗争的加速器
Applied Cybersecurity & Internet Governance Pub Date : 2022-11-16 DOI: 10.5604/01.3001.0016.0916
Ladislav Cabada
{"title":"Russian Aggression against Ukraine as the Accelerator in the Systemic Struggle against Disinformation in Czechia","authors":"Ladislav Cabada","doi":"10.5604/01.3001.0016.0916","DOIUrl":"https://doi.org/10.5604/01.3001.0016.0916","url":null,"abstract":"In the last decade Czechia’s foreign and security policies were destabilised by the activities of external actors, with Russia in the leading role, and also by internal ac- tors who followed the Russian and pro-Kremlin propaganda and disinformation campaigns and/or actively participated in such subversive activities. After 2015, within the set of crises and their securitisation, a disinformation network was developed in Czechia using social media and so-called ‘alternative online media’ for the dissemination of disinformation, mis- information, fake news and chain mails to spread these campaigns. As leading persons in the executive belonged to the disinformers, the government was not able to develop work- ing strategies against the disinformation campaigns as the new hybrid threat until 2021. At the end of 2021, the new Czech government of Prime Minister Petr Fiala launched a new strategy regarding hybrid threats which contained disinformation. The one-year plan to establish a systemic platform for the struggle against such threats was challenged by Russian aggression against Ukraine. In this article, we analyse the development of the security eco-system in Czechia against these hybrid threats, specifically the acceleration and intensification of this activity after 24 February 2022.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125105644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions 网络安全中的人工智能:进攻战术、缓解技术和未来方向
Applied Cybersecurity & Internet Governance Pub Date : 2022-11-04 DOI: 10.5604/01.3001.0016.0800
Erwin Adi, Z. Baig, S. Zeadally
{"title":"Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions","authors":"Erwin Adi, Z. Baig, S. Zeadally","doi":"10.5604/01.3001.0016.0800","DOIUrl":"https://doi.org/10.5604/01.3001.0016.0800","url":null,"abstract":"Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution of AI techniques, and we show how recent AI approaches are effective in helping an adversary attain his/her objectives appertaining to cyberattacks. We also discuss how the current architecture of computer communications enables the development of AI-based adversarial threats against heterogeneous computing platforms and infrastructures.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UK Border Digitalisation – a Commentary on the Current State of Affairs 英国边境数字化——对当前事态的评论
Applied Cybersecurity & Internet Governance Pub Date : 2022-11-04 DOI: 10.5604/01.3001.0016.1052
Marika Kosiel-Pająk
{"title":"UK Border Digitalisation – a Commentary on the Current State of Affairs","authors":"Marika Kosiel-Pająk","doi":"10.5604/01.3001.0016.1052","DOIUrl":"https://doi.org/10.5604/01.3001.0016.1052","url":null,"abstract":"The commentary focuses on the current process of converting the British immigration procedures into an entirely digital format, as part of a reform brought about by Brexit and in the framework of broader digital strategies in the United Kingdom of Great Britain and Northern Ireland. The British government’s ambitious aim is to digitalise the immigration procedures by 2025, further support eGates and eventually enforce a contactless mode of arrival. The policy plan, its execution to date and its reception are analysed briefly. Taking into account that the government is revealing only selected aspects of the complex system rather than all the mechanisms and safeguards, neither British digital sovereignty in this matter nor the scope of protection of personal and meta-data could be fully examined. The challenges already encountered are set out, with the conclusion being that a human-centred approach is still lacking in the practical employment of the policy. Subsequently, the isolationist or populist concept of protecting the state against any migrant, as a potential threat rather than a potential to be developed for the benefit of the state, is the prevailing mindset. Finally, the current political and economic instability may play a pivotal role in policy implementation and contribute to its ultimate failure.\u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129084053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Substantive Criminal Aspects of the Offence of Simulated Child Pornography under Polish Law 波兰法律下模拟儿童色情犯罪的实体刑事方面
Applied Cybersecurity & Internet Governance Pub Date : 2022-10-30 DOI: 10.5604/01.3001.0016.0690
Remigiusz Rosicki
{"title":"The Substantive Criminal Aspects of the Offence of Simulated Child Pornography under Polish Law","authors":"Remigiusz Rosicki","doi":"10.5604/01.3001.0016.0690","DOIUrl":"https://doi.org/10.5604/01.3001.0016.0690","url":null,"abstract":"The objective scope of the research problem concerns the content and sense of the elements characterising one of the types of child pornography, criminalised under Art. 202 §4b of the Criminal Code, i.e. simulated child pornography. This offence is understood as producing, disseminating, presenting, storage and possession of pornographic material presenting a generated or processed image of a minor participating in sexual activity. The main goal of the text is to perform a substantive criminal analysis of the act criminalised under Art. 202 §4b of the Polish Criminal Code. The scope of the analysis has been elaborated with the following research question concerning the degree of effectiveness: To what degree is the legal solution concerned with criminalisation and penalisation of the activities of »production, dissemination, presentation, storage or possession of pornographic material presenting a generated or processed image of a minor participating in sexual activities« effective and realises the ratio legis intended by the legislator? The analysis of the problem has been performed with the aid of chiefly institutional and legal approach in the form of textual, functional and doctrinal interpretations, which have been supplemented with the author’s own conclusions and opinions. \u0000\u0000","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125463285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信