The International Journal of Cybersecurity Intelligence and Cybercrime最新文献

筛选
英文 中文
North Korean Cyber Attacks and Policy Responses: An Interdisciplinary Theoretical Framework 朝鲜网络攻击与政策应对:一个跨学科的理论框架
The International Journal of Cybersecurity Intelligence and Cybercrime Pub Date : 2021-08-01 DOI: 10.52306/04020221nhpz9033
Jeeseon Hwang, Kyung-shick Choi
{"title":"North Korean Cyber Attacks and Policy Responses: An Interdisciplinary Theoretical Framework","authors":"Jeeseon Hwang, Kyung-shick Choi","doi":"10.52306/04020221nhpz9033","DOIUrl":"https://doi.org/10.52306/04020221nhpz9033","url":null,"abstract":"Study conducts a qualitative analysis of the objectives, forms, current trends, and characteristics of North Korean cyber terror attacks and suggests a way to ensure further progress towards a successful international policy response. Despite the capricious changes that have recently occurred within the international political atmosphere, North Korea continues to constitute a threat to international stability through its ongoing advancement of nuclear weapons and long-range ballistic missiles. The difficulty of attribution and the relatively low costs associated with launching cyber offensives make cyber terrorism an attractive option for North Korea. In an effort to direct attention to these circumstances, this study aims to share explicit experts’ perspectives in the field of cyberterrorism in South Korea. Consequently, the study purports to contribute to existing academic discussion and practices on cyber terror and cybercrime. Furthermore, this study adopts perspectives from criminological theoretical frameworks and the network theory of world politics to substantiate a more comprehensive view of North Korea’s cyberterrorism which considers the multifaceted and asymmetrical nature of cyberterrorism within the context of postmodern international politicsfections.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Malware Infections in the U.S. during the COVID-19 Pandemic: An Empirical Study COVID-19大流行期间美国恶意软件感染:一项实证研究
The International Journal of Cybersecurity Intelligence and Cybercrime Pub Date : 2021-08-01 DOI: 10.52306/04020321crbh5596
Sydney Gero, S. back, J. LaPrade, Joonggon Kim
{"title":"Malware Infections in the U.S. during the COVID-19 Pandemic: An Empirical Study","authors":"Sydney Gero, S. back, J. LaPrade, Joonggon Kim","doi":"10.52306/04020321crbh5596","DOIUrl":"https://doi.org/10.52306/04020321crbh5596","url":null,"abstract":"The COVID-19 pandemic has changed the world in many ways, especially in the landscape of cyber threats. The pandemic has pro-vided cybercriminals with more opportunities to commit crimes due to more people engaging in online activities, along with the increased use of computers for school, work, and social events. The current study seeks to explore cybercrime trends, in particular malware infections, during the COVID-19 pandemic. Thus, this study examines the relationship between the number of malware in-fections, COVID-19 positive cases, closed non-essential businesses, and closed K-12 public schools in the United States. Data utilized in this study derives from (1) Kaspersky Cyberthreat Real-Time Map, (2) Centers for Disease Control and Prevention (CDC), and (3) COVID-19 US State Policy Database over the course of six months from January of 2020 to June of 2020. The findings of this study reveal that there are associations between the number of malware infections, COVID-19 positive cases, and closed non-essential busi-nesses. However, interestingly, there is no link between the number of malware infections and closed K-12 public schools. Policy impli-cations and the limitations of this study are also discussed.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116271553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Editorial introduction to the special issue: Supporting future scholarship on cybercrime 特刊编辑导言:支持未来网络犯罪学术研究
The International Journal of Cybersecurity Intelligence and Cybercrime Pub Date : 2021-08-01 DOI: 10.52306/04020121yrsy7883
Jaeyong Choi, Brandon C. Dulisse, Richard Wentling, Nathan E. Kruis
{"title":"Editorial introduction to the special issue: Supporting future scholarship on cybercrime","authors":"Jaeyong Choi, Brandon C. Dulisse, Richard Wentling, Nathan E. Kruis","doi":"10.52306/04020121yrsy7883","DOIUrl":"https://doi.org/10.52306/04020121yrsy7883","url":null,"abstract":"This editorial introduction will present an overview of the three papers published in this special issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The winners of the student paper competition during the 2021 Whitehat Conference have prepared their papers for this special issue. Their research directs our attention to key issues regarding cybercrime that have often been overlooked in the literature ranging from North Korean cyberterrorism to the relationship between COVID-19 and cybercrime and to fear of online victimization.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Level of Engagement with Social Networking Services and Fear of Online Victimization: The Role of Online Victimization Experiences 社交网络服务参与水平与网络受害恐惧:网络受害经历的作用
The International Journal of Cybersecurity Intelligence and Cybercrime Pub Date : 2021-08-01 DOI: 10.52306/04020421terz5728
Yeon-ok Park, Lynne M. Vieraitis
{"title":"Level of Engagement with Social Networking Services and Fear of Online Victimization: The Role of Online Victimization Experiences","authors":"Yeon-ok Park, Lynne M. Vieraitis","doi":"10.52306/04020421terz5728","DOIUrl":"https://doi.org/10.52306/04020421terz5728","url":null,"abstract":"Prior research indicates that fear of crime may lessen a person’s quality of life by leading them to avoid participating in social activities. The current study explores the relationship between fear of online victimization and participants’ levels of engagement with social networking services (SNS). Using data from a survey of 1,000 adolescents and adults aged 14 to 59 years, the direct relationship between the level of engagement on SNS and fear of online victimization and the indirect relationship through prior victimization were assessed. Findings show that the direct effect of the level of engagement on SNS on victimization experience was significant. In addition, the relationship between the level of engagement and the fear of victimization on SNS was significantly mediated through prior victimization experiences on SNS. These findings support the hypothesis that greater exposure on SNS increases online victimization, leading to a greater fear of victimization on SNS. Considering the large role SNS play in social activities and relationships, the findings are important for understanding how victimization impacts fear and may help inform policymakers how to help people stay engaged freely in socializing in a safer online environment.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132656367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Challenges of Identifying Dangers Online and Predictors of Victimization 识别网络危险的挑战和受害的预测因素
The International Journal of Cybersecurity Intelligence and Cybercrime Pub Date : 2021-04-01 DOI: 10.52306/04010121QNFW5915
Catherine D. Marcum
{"title":"The Challenges of Identifying Dangers Online and Predictors of Victimization","authors":"Catherine D. Marcum","doi":"10.52306/04010121QNFW5915","DOIUrl":"https://doi.org/10.52306/04010121QNFW5915","url":null,"abstract":"This short paper will provide an overview of the impressive pieces included in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. This issue includes articles on the following pertinent topic, utilizing a range of approaches and methodologies: 1) online credibility; 2) cyberbullying; and 3) unauthorized access of information. An emphasis on the importance of policy development and better protection of potential victims is a common thread throughout the issue.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129402946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effects of Self-control on the Cyber Victim-Offender Overlap 自我控制对网络加害人重叠的影响
The International Journal of Cybersecurity Intelligence and Cybercrime Pub Date : 2020-11-03 DOI: 10.52306/03020220ONXT9834
Brooke Nodeland
{"title":"The Effects of Self-control on the Cyber Victim-Offender Overlap","authors":"Brooke Nodeland","doi":"10.52306/03020220ONXT9834","DOIUrl":"https://doi.org/10.52306/03020220ONXT9834","url":null,"abstract":"Increasingly, the overlap between victims and offenders has received empirical attention with regard to traditional forms of deviance. More recently, the growth of cyber offending has led to a need to examine whether traditional criminological theories can be used to explain these crimes in the same manner as traditional offenses. However, limited attention has been given to victim-offender overlap in cyber-offending. The current study uses a sample of American college students to examine the influence of self-control on cyber offending, cyber victimization, and the cyber victim-offender overlap. The results indicate that low self-control significantly predicts participation in cyber offending as well as cyber victim-offending, but has a weak relationship with cyber victimization. Interestingly, associating with deviant cyber peers was a significant predictor across all models. Results are discussed in the context of the existing literature.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Toward Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks 减轻、减少和预防网络犯罪和网络安全风险
The International Journal of Cybersecurity Intelligence and Cybercrime Pub Date : 2020-11-03 DOI: 10.52306/03020120JOFX1754
C. S. Lee
{"title":"Toward Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks","authors":"C. S. Lee","doi":"10.52306/03020120JOFX1754","DOIUrl":"https://doi.org/10.52306/03020120JOFX1754","url":null,"abstract":"Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately address such challenges using college student samples and nationally representative samples, as well as a framework through which cybersecurity can be better managed. Theoretically speaking, these studies use traditional criminological theories to explore different types of cybercrimes and cybersecurity while enhancing our understandings of both. The issue is concluded with a book review of a work about computer crime that was published before the Internet age and offers useful insights for current and future cybercrime studies.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121352908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-victimization Trends in Trinidad & Tobago: The Results of An Empirical Research 特立尼达和多巴哥的网络受害趋势:一项实证研究结果
The International Journal of Cybersecurity Intelligence and Cybercrime Pub Date : 2019-12-27 DOI: 10.19107/IJISC.2019.02.05
N. Stamatakis, Troy A. Smith
{"title":"Cyber-victimization Trends in Trinidad & Tobago: The Results of An Empirical Research","authors":"N. Stamatakis, Troy A. Smith","doi":"10.19107/IJISC.2019.02.05","DOIUrl":"https://doi.org/10.19107/IJISC.2019.02.05","url":null,"abstract":"Cybertechnology has brought benefits to the Caribbean in the form of new regional economic and social growth. In the last years, Caribbean countries have also become attractive targets for cybercrime due to increased economic success and online presence with a low level of cyber resilience. This study examines the online-related activities that affect cybercrime victimization by using the Routine Activity Theory (RAT). The present study seeks to identify activities that contribute to different forms of cybercrime victimization and develop risk models for these crimes, particularly the understudied cyber-dependent crimes of Hacking and Malware. It also aims to explore if there are similarities or differences in factors leading to victimization, which correlate to the classification of crimes as either cyber-dependent or cyber-enabled. The data analysis suggests that there is significant applicability for RAT in explaining Online Harassment victimization, while the usability of the RAT for predicting Malware victimization proved to be minimal, with only two significant variables being identified, with both being associated with Capable Guardianship.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"61 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113987899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Exploratory Perception Analysis of Consensual and Nonconsensual Image Sharing 合意与非合意图像分享的探索性感知分析
The International Journal of Cybersecurity Intelligence and Cybercrime Pub Date : 2019-09-06 DOI: 10.52306/02020319cicb2462
J. R. Lee, S. Downing
{"title":"An Exploratory Perception Analysis of Consensual and Nonconsensual Image Sharing","authors":"J. R. Lee, S. Downing","doi":"10.52306/02020319cicb2462","DOIUrl":"https://doi.org/10.52306/02020319cicb2462","url":null,"abstract":"Limited research has considered individual perceptions of moral distinctions between consensual and nonconsensual intimate image sharing, as well as decision making parameters around why others might engage in such behavior. The current study conducted a perception analysis using mixed-methods online surveys administered to 63 participants, inquiring into their perceptions of why individuals engage in certain behaviors surrounding the sending of intimate images from friends and partners. The study found that respondents favored the concepts of (1) sharing images with romantic partners over peers; (2) sharing non-intimate images over intimate images; and (3) sharing images with consent rather than without it. Furthermore, participants were more willing to use their own devices to show both intimate and non-intimate images rather than posting on social media or directly sending others the image files. Drawing on descriptive quantitative and thematic qualitative analysis, the findings suggest that respondents perceive nonconsensual image sharing as being motivated by the desire to either bully, “show off,” or for revenge. In addition, sharing intimate digital images of peers and romantic partners without consent was perceived to be troubling because it is abusive and/or can lead to abuse (when involving peers) and a violation of trust (when involving romantic partners).","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129507012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence 网络犯罪预防策略的未来:人为因素和网络智能的整体方法
The International Journal of Cybersecurity Intelligence and Cybercrime Pub Date : 2019-09-06 DOI: 10.52306/02020119kdhz8339
S. back, J. LaPrade
{"title":"The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence","authors":"S. back, J. LaPrade","doi":"10.52306/02020119kdhz8339","DOIUrl":"https://doi.org/10.52306/02020119kdhz8339","url":null,"abstract":"New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior. Unfortunately, humans can be vulnerable and easily deceived making technological advances alone inadequate in the cybercrime fight. Instead, we must take a more holistic approach by using technology and better understanding the human factors that make cybercrime possible. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective comprehensive cybercrime prevention strategies can be developed.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信