Information & Security: An International Journal最新文献

筛选
英文 中文
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour 知识和态度对采取网络安全行为意愿的影响
Information & Security: An International Journal Pub Date : 2020-01-01 DOI: 10.11610/isij.4618
Lisa C. de Kok, D. Oosting, M. Spruit
{"title":"The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour","authors":"Lisa C. de Kok, D. Oosting, M. Spruit","doi":"10.11610/isij.4618","DOIUrl":"https://doi.org/10.11610/isij.4618","url":null,"abstract":"In general, people are poorly protected against cyberthreats, with the main reason being user behaviour. For the study described in this paper, a questionnaire was developed in order to understand how people’s knowledge of and attitude towards both cyberthreats and cyber security controls affect intention to adopt cybersecure behaviour. The study divides attitude into a cognitive and an affective component. Although only the cognitive component of attitude is usually studied, the results from a questionnaire of 300 respondents show that both the affective and cognitive components of attitude have a clearly positive, albeit varying, influence on behavioural intention, with the affective component having an even greater effect on attitude than the cognitive aspect. No correlation was found between knowledge and behavioural intention. The results indicate that attitude is an important factor to include when developing behavioural interventions, but also that different kinds of attitude should be addressed differently in interventions. A R T I C L E I N F O : RECEIVED: 10 MAY 2020 REVISED: 31 JUL 2020 ONLINE: 03 SEP 2020 K E Y W O R D S : information security, cybersecurity awareness, cybersecurity behaviour, cybersecurity questionnaire, cybersecurity knowledge, cybersecurity attitude Creative Commons BY-NC 4.0","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131868293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Method for the Development of Cyber Security Strategies 网络安全战略的发展方法
Information & Security: An International Journal Pub Date : 2016-04-03 DOI: 10.11610/ISIJ.3403
A. Klaic
{"title":"A Method for the Development of Cyber Security Strategies","authors":"A. Klaic","doi":"10.11610/ISIJ.3403","DOIUrl":"https://doi.org/10.11610/ISIJ.3403","url":null,"abstract":"The cyberspace today has become the unavoidable part of today’s society, its virtual dimension. The nations and international community put many efforts to assure certain terms and responsibilities in this virtual dimension of the society. Many national cyber security strategies, including EU and NATO strategies, in a very short time have become high priority activities. The questions about the responsible institutions to address in the strategy, guiding principles to follow, and the way of implementing the strategy, still remains very differently approached within different nations. The goal of this paper is to propose a method that offers a more consistent approach to the development of cyber security strategies. The key research question is whether the proposed approach results in a more consistent national cyber security strategy that covers all the necessary national requirements and expectations, and that is easier to harmonise with different international requirements. In order to verify the proposed method, the paper shows the brief overview of the results achieved in the case of the development process of Croatian National Cyber Security Strategy.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128402846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
C4ISR Architectural Frameworks in Coalition Environments 联盟环境下的C4ISR体系结构框架
Information & Security: An International Journal Pub Date : 2000-10-01 DOI: 10.11610/ISIJ.0504
Charles R. Myer
{"title":"C4ISR Architectural Frameworks in Coalition Environments","authors":"Charles R. Myer","doi":"10.11610/ISIJ.0504","DOIUrl":"https://doi.org/10.11610/ISIJ.0504","url":null,"abstract":"Abstract : The break-up of the Soviet Union unleashed a flood of nationalism throughout Southeastern Europe (SEE). Freed from the yoke of suppression, the nations of the region sought economic stability and security in a dramatically changing global environment. These nations are anxious to display Western leanings and to ensure national security through multinational regional coalitions. These coalitions, in turn, are being supported by a variety of national, NATO, and U.S. sponsored initiatives with the common goal of regional stability. Within the regions of the Pacific Rim, similar coalitions may emerge with similar goals to which the principles set forth in this paper will equally apply. The common thread through these SEE initiatives is the use of Information Technology (IT) to improve Command, Control, and Communications (C3) in a combined military/peace support domain. This paper proposes an IT-driven Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) Architectural Framework approach to the integration of combat and peace support forces in regional coalition initiatives. Although the framework is applicable across the total C4ISR domain, only Command, Control, and Communications are relevant to the subject addressed in this paper and will be the term used throughout. Computers are assumed as a logical part of C3. This paper also proposes that this type of architectural approach is applicable to regional coalitions on a global basis.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130623577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interacting Multiple Model Algorithms for Manoeuvring Ship Tracking Based On New Ship Models 基于新船舶模型的多模型交互操纵船舶跟踪算法
Information & Security: An International Journal Pub Date : 2000-03-01 DOI: 10.11610/ISIJ.0211
E. Semerdjiev, L. Mihaylova, T. Semerdjiev, V. Bogdanova
{"title":"Interacting Multiple Model Algorithms for Manoeuvring Ship Tracking Based On New Ship Models","authors":"E. Semerdjiev, L. Mihaylova, T. Semerdjiev, V. Bogdanova","doi":"10.11610/ISIJ.0211","DOIUrl":"https://doi.org/10.11610/ISIJ.0211","url":null,"abstract":"Tracking of manoeuvring targets is a problem of a great practical and theoretical interest. The real-world tracking applications meet a number of difficulties caused by the presence of different kinds of uncertainty due to the unknown or not precisely known system model and random processes’ statistics or because of their abrupt changes. 2-5, 9 These problems are especially complicated in the marine navigation practice, 7, 14, 15, 19 where the commonly used simple models of rectilinear or curvilinear target motions do not match the highly non-linear dynamics of the manoeuvring ship. A solution of these problems is to derive more adequate descriptions of the real ship dynamics and to design adaptive estimation algorithms.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129175370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Bulgaria and NATO: 7 Lost Years 保加利亚和北约:失去的7年
Information & Security: An International Journal Pub Date : 1998-05-01 DOI: 10.11610/ISIJ.0119
J. Simon
{"title":"Bulgaria and NATO: 7 Lost Years","authors":"J. Simon","doi":"10.11610/ISIJ.0119","DOIUrl":"https://doi.org/10.11610/ISIJ.0119","url":null,"abstract":"Abstract : Bulgaria's actions and policies on military reform between 1990 and March 1997 left the country's institutions and military largely unprepared for integration with the Alliance. Bulgarian government and military officials have emerged from the state's self-imposed isolation lacking an understanding of how far behind they are, as well as what they need to do, to seek integration. Bulgaria's armed forces are only now starting to reform and downsize. The resultant social and economic pain has yet to be felt, and the state is likely to suffer significant political consequences. Some social and political figures may elect to portray the United States and NATO as the cause of Bulgaria's social, economic, and political pain. Bulgaria's citizens, politicians and military need NATO to better define its standards for interoperability.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132087517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Small Step toward Interoperability 迈向互操作性的一小步
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1210
R. J. Roland
{"title":"A Small Step toward Interoperability","authors":"R. J. Roland","doi":"10.11610/ISIJ.1210","DOIUrl":"https://doi.org/10.11610/ISIJ.1210","url":null,"abstract":"Content Focus Never forget, the lowest bidder made your weapons Applying simulations to enhance jointness and to promote national and multi-national cooperation and interoperability. The theory is that this will help lead toward developing a Modeling and Simulation (MS and its' relationship with the National Military Command Center (NMCC) initiative. Caution is extended for the user to exercise due diligence and caveat emptor when selecting systems and system integrators.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN EFFICIENT AND PRACTICAL REMOTE USER AUTHENTICATION SCHEME 一个高效实用的远程用户认证方案
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1505
Ya-Fen Chang, Chinchen Chang
{"title":"AN EFFICIENT AND PRACTICAL REMOTE USER AUTHENTICATION SCHEME","authors":"Ya-Fen Chang, Chinchen Chang","doi":"10.11610/ISIJ.1505","DOIUrl":"https://doi.org/10.11610/ISIJ.1505","url":null,"abstract":"In 2000, Peyravian and Zunic proposed a simple and efficient password authentication scheme based on the collision-resistant hash function. Later, Hwang and Yeh indicated that Peyravian and Zunic's scheme is insecure and proposed an improvement by using the server's public key. Nevertheless, in practice, services that do not use public keys are quite often superior to PKIs. At the same time, Lee, Li and Hwang indicated that Peyravian and Zunic's scheme suffers from off-line password guessing attacks and presented an improved version. However, Lee-Li- Hwang's proposed scheme is still vulnerable to the same attacks and denial-of-ser- vice attacks. Therefore, this article presents a secure and efficient improvement.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces 计算机辅助演习——军队常规演习的一种替代方案
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0308
Nikolay Vraikov, A. Naidenov
{"title":"The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces","authors":"Nikolay Vraikov, A. Naidenov","doi":"10.11610/ISIJ.0308","DOIUrl":"https://doi.org/10.11610/ISIJ.0308","url":null,"abstract":"esigning and building simulation systems is a dynamically developing area, in which, for relatively short time and under definite conditions, good results can be achieved. Our army has gained significant experience in the development and use of various simulation systems. The participation in a great number of seminars, presentations and computer aided exercises gives us the opportunity to analyze the achievements in the area of development and use of simulation systems in the education and training process of the staffs at various levels.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121806891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chemical and Biological Weapons Terrorism: Forging a Response 化学和生物武器恐怖主义:锻造回应
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1012
I. Monitor
{"title":"Chemical and Biological Weapons Terrorism: Forging a Response","authors":"I. Monitor","doi":"10.11610/ISIJ.1012","DOIUrl":"https://doi.org/10.11610/ISIJ.1012","url":null,"abstract":"he 11 September 2001 terrorist attacks in the United States changed fundamentally threat perceptions regarding the use of weapons of mass destruction by terrorists. The ability to use such weapons is all the more credible because sophisticated delivery systems are not required to conduct a terrorist attack. As a consequence, governments have reviewed longstanding plans to respond to terrorist incidents and have sought to identify weaknesses and address these where possible.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116922370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electromagnetic Radiation and the Computer Systems Data Security Problem 电磁辐射与计算机系统数据安全问题
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0407
A. Nachev
{"title":"Electromagnetic Radiation and the Computer Systems Data Security Problem","authors":"A. Nachev","doi":"10.11610/ISIJ.0407","DOIUrl":"https://doi.org/10.11610/ISIJ.0407","url":null,"abstract":"This problem stems from two basic facts. The first is connected with the physics of the processes taking place in digital electronic equipment. The second is due to the way of representing, processing, and transferring the information. The presence of current pulses in power buses due to the impulse character of the functioning of the digital integrated circuits, the existence of inductive and capacity parasite connections, which cause the emergence of high frequency current, and the impulse character of the currents in connecting cables and interface chains all cause the emergence of parasite electromagnetic emissions, which are transmitted as electromagnetic waves. At the same time, in the cables of the power supply alternating currents are induced in such a way that the power supply circuitry becomes a source of secondary wide band emission.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信