International Journal of Cyber Research and Education最新文献

筛选
英文 中文
Science 4.0 as a Model of Scientific Activity in an Innovative Environment of Industry 4.0 科学 4.0 作为工业 4.0 创新环境中的科学活动模式
International Journal of Cyber Research and Education Pub Date : 2024-02-21 DOI: 10.4018/ijcre.339191
Shakir A. Mehdiyev, Tahmasib Fataliyev
{"title":"Science 4.0 as a Model of Scientific Activity in an Innovative Environment of Industry 4.0","authors":"Shakir A. Mehdiyev, Tahmasib Fataliyev","doi":"10.4018/ijcre.339191","DOIUrl":"https://doi.org/10.4018/ijcre.339191","url":null,"abstract":"Technological innovations in the generation, storage, transmission, and processing of data have transformed traditional scientific activities and contributed to the accelerated development of the concept of “data-driven science.” The article analyzes the image of Science 4.0 in a new format since organizing and managing scientific activities with the widespread use of the Industry 4.0 technological platform has become relevant here. A four-level classification of stages in the development of science and the use of e-Science as a technological platform for Science 4.0 is proposed. The essence of Science 4.0 is revealed in the analysis of works devoted to scientific research with broad involvement of the internet of things, cyber-physical systems, artificial intelligence, cloud computing, big data analytics, and other intelligent solutions. Implementation of the proposed concept contributes to an increase in the efficiency of scientific research and supports solutions for the operational management of science.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"106 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140444258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determinants of Consumer Online Purchasing Intention 消费者在线购买意愿的决定因素
International Journal of Cyber Research and Education Pub Date : 2022-01-01 DOI: 10.4018/ijcre.309689
Wadie Nasri
{"title":"Determinants of Consumer Online Purchasing Intention","authors":"Wadie Nasri","doi":"10.4018/ijcre.309689","DOIUrl":"https://doi.org/10.4018/ijcre.309689","url":null,"abstract":"The purpose of this paper is to understand consumers' online purchasing intentions. This study extends the technology acceptance model (TAM) by adding subjective norm, perceived enjoyment, perceived risk, and prior internet experience in the development of a theoretical model to study customers' intentions within the context of online purchasing. An empirical approach was based on an online survey of 252 people in Tunisia, undertaken during August/September 2020. The data were analyzed using structural equation modeling. The results of the study indicated that perceived usefulness, perceived enjoyment, and prior internet experience are significant positive predictors of consumers' online purchasing intentions. Nevertheless, perceived risk appeared to exert significant negative influences respectfully on consumers' online purchasing intentions. These results help the practitioners to consider the important factors in their strategies when they make strategic decisions as key factors affecting online purchasing intentions.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115066120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Address Cybersecurity Risks Due to COVID-19 in Small Business Environments 应对新冠肺炎疫情下小企业网络安全风险
International Journal of Cyber Research and Education Pub Date : 2022-01-01 DOI: 10.4018/ijcre.309687
Justino Lourenço, Fernando L. Almeida
{"title":"Address Cybersecurity Risks Due to COVID-19 in Small Business Environments","authors":"Justino Lourenço, Fernando L. Almeida","doi":"10.4018/ijcre.309687","DOIUrl":"https://doi.org/10.4018/ijcre.309687","url":null,"abstract":"COVID-19 affects people and companies. They are experiencing dramatic changes in work processes, communication processes, and customer management. This whole new paradigm has brought new challenges to organizations, particularly to small and medium enterprises, which have limited budgets and resources to ensure their technological infrastructure. This study aims to explore how these companies have adapted to the challenges posed by COVID-19 in their compliance practices with general data protection regulation (GDPR), auditing, and forensic security analysis. Furthermore, this study analyzes the risks that have been amplified in this period and identifies new vulnerabilities that have arisen from increased dependence on information technology in a period when most organizations have their employees in teleworking.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134277510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traditional Public-Key Cryptosystems and Elliptic Curve Cryptography 传统公钥密码体制与椭圆曲线密码体制
International Journal of Cyber Research and Education Pub Date : 2022-01-01 DOI: 10.4018/ijcre.309688
Maria Isaura Lopez, Ayad F. Barsoum
{"title":"Traditional Public-Key Cryptosystems and Elliptic Curve Cryptography","authors":"Maria Isaura Lopez, Ayad F. Barsoum","doi":"10.4018/ijcre.309688","DOIUrl":"https://doi.org/10.4018/ijcre.309688","url":null,"abstract":"The need to establish safer communication channels in a world where technological development is progressing in leaps and bounds is indispensable. Thus, implementing cryptographic algorithms, which are more complex to compromise, improves the possibilities of securing our sensitive data. In this paper, the authors analyze the algorithmic foundations and perform a comparative analysis of the traditional public-key cryptographic algorithms (e.g., RSA, ElGamal, Schnorr, DSA) and elliptic curve cryptography with NIST recommended curves. In the study, they focus on six different security strengths: 80-, 96-, 112-, 128-, 192-, and 256-bit key sizes. Moreover, this study provides a benchmark among different curves (NIST, SEC2, and IEFT Brainpool) that can be used with various security levels. The authors study and compare the characteristics and performance of the traditional asymmetric algorithms and the elliptic curve algorithms for information security. The results obtained in this study will be graphically visualized through statistical graphs and tables with quantification response times.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114984925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Access Control for Government 政府网络访问控制
International Journal of Cyber Research and Education Pub Date : 2022-01-01 DOI: 10.4018/ijcre.309686
Nathalie Ayala Santana, Ayad F. Barsoum
{"title":"Network Access Control for Government","authors":"Nathalie Ayala Santana, Ayad F. Barsoum","doi":"10.4018/ijcre.309686","DOIUrl":"https://doi.org/10.4018/ijcre.309686","url":null,"abstract":"In the digital era, governments are considered high-value targets, chased not only by financially motivated criminals, but also to commit acts of espionage, terrorism, and warfare. One of the most important technologies developed is network access control (NAC), which implements policy-based access control to handle entry to the network. This research focuses on the application of network access control in government institutions and the numerous benefits of its adoption. Exploring the challenges of the government to adopt a budget that places cybersecurity as a priority will allow analyzing if the solutions offered in the market are achievable for big cities as well as for small cities. This paper explores the budgets of six cities, and three NAC solutions are offered to help the government increase its cybersecurity and comply with regulations.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124362990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Security Risks and Challenges of 5G Communications 5G通信的安全风险与挑战
International Journal of Cyber Research and Education Pub Date : 2021-07-01 DOI: 10.4018/IJCRE.2021070104
Young B. Choi, Matthew E. Bunn
{"title":"The Security Risks and Challenges of 5G Communications","authors":"Young B. Choi, Matthew E. Bunn","doi":"10.4018/IJCRE.2021070104","DOIUrl":"https://doi.org/10.4018/IJCRE.2021070104","url":null,"abstract":"With the introduction of the 5th generation of wireless systems and communications (5G) comes new risks and challenges. This paper explores the potential security challenges of 5G communication compared with legacy cellular networks and prior generations of communication standards. This paper defines what 5G is and how it affects our lives on a daily basis. It further discusses the new security features involving different technologies applied to 5G, such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software-defined networks, and the internet of things, including autonomous cars, healthcare, automated manufacturing, and more.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124799608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introducing the Common Attack Process Framework for Incident Mapping 介绍了事件映射的通用攻击过程框架
International Journal of Cyber Research and Education Pub Date : 2021-07-01 DOI: 10.4018/IJCRE.2021070102
Stephen Mancini, Laurie Iacono, Frank Hartle, Megan Garfinkel, Dana Horn, Alison Sullivan
{"title":"Introducing the Common Attack Process Framework for Incident Mapping","authors":"Stephen Mancini, Laurie Iacono, Frank Hartle, Megan Garfinkel, Dana Horn, Alison Sullivan","doi":"10.4018/IJCRE.2021070102","DOIUrl":"https://doi.org/10.4018/IJCRE.2021070102","url":null,"abstract":"The paper presents a new framework that allows both educators and operational personnel to better overlay incidents into a simplified framework. While other attack frameworks exist, they either lack simplicity or are too focused on specific types of attacks. Therefore, the authors have attempted to define a framework that can be used broadly across both physical and cyber incidents. Furthermore, the paper provides several high-profile examples wherein it is shown how this new framework more accurately represents the adversary's actions. Lastly, the framework allows room for expansion in that, within each stage, a plethora of questions can be addressed, giving greater specificity into how that stage was carried out.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129464582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach HIPAA安全和隐私遵从性审计和风险评估缓解方法
International Journal of Cyber Research and Education Pub Date : 2021-07-01 DOI: 10.4018/IJCRE.2021070103
Young B. Choi, Christopher E. Williams
{"title":"A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach","authors":"Young B. Choi, Christopher E. Williams","doi":"10.4018/IJCRE.2021070103","DOIUrl":"https://doi.org/10.4018/IJCRE.2021070103","url":null,"abstract":"Data breaches have a profound effect on businesses associated with industries like the US healthcare system. This task extends more pressure on healthcare providers as they continue to gain unprecedented access to patient data, as the US healthcare system integrates further into the digital realm. Pressure has also led to the creation of the Health Insurance Portability and Accountability Act, Omnibus Rule, and Health Information Technology for Economic and Clinical Health laws. The Defense Information Systems Agency also develops and maintains security technical implementation guides that are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures. The objective is to design a network (physician's office) in order to meet the complexity standards and unpredictable measures posed by attackers. Additionally, the network must adhere to HIPAA security and privacy requirements required by law. Successful implantation of network design will articulate comprehension requirements of information assurance security and control.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126090182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Android Adware Detection Using Machine Learning 使用机器学习的Android广告软件检测
International Journal of Cyber Research and Education Pub Date : 2021-07-01 DOI: 10.4018/IJCRE.2021070101
S. Bagui, D. Benson
{"title":"Android Adware Detection Using Machine Learning","authors":"S. Bagui, D. Benson","doi":"10.4018/IJCRE.2021070101","DOIUrl":"https://doi.org/10.4018/IJCRE.2021070101","url":null,"abstract":"Adware, an advertising-supported software, becomes a type of malware when it automatically delivers unwanted advertisements to an infected device, steals user information, and opens other vulnerabilities that allow other malware and adware to be installed. With the rise of more and complex evasive malware, specifically adware, better methods of detecting adware are required. Though a lot of work has been done on malware detection in general, very little focus has been put on the adware family. The novelty of this paper lies in analyzing the individual adware families. To date, no work has been done on analyzing the individual adware families. In this paper, using the CICAndMal2017 dataset, feature selection is performed using information gain, and classification is performed using machine learning. The best attributes for classification of each of the individual adware families using network traffic samples are presented. The results present an average classification rate that is an improvement over previous works for classification of individual adware families.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"159 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125930666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Addressing the Gender Gap in the Cybersecurity Workforce 解决网络安全劳动力中的性别差距
International Journal of Cyber Research and Education Pub Date : 2021-07-01 DOI: 10.4018/IJCRE.2021070105
R. Beveridge
{"title":"Addressing the Gender Gap in the Cybersecurity Workforce","authors":"R. Beveridge","doi":"10.4018/IJCRE.2021070105","DOIUrl":"https://doi.org/10.4018/IJCRE.2021070105","url":null,"abstract":"Cybercrime has proliferated over the last decade and is increasing in velocity and intensity. The need for employers to find highly skilled technologists to fill the many critical roles is reaching unprecedented levels. Men dominate the information technology fields such as cybersecurity and computer science. However, the need to bring more women into the various fields is necessary and would bring tremendous benefit to any organization. Much work needs to be done to generate interest in secondary schools by training teachers in technology so they can develop effective STEM curricula. Post-secondary schools need to focus on teacher development as well as developing information technology curricula that appeals to women. And once in the workplace, organizations need to develop policies and inclusive environments that do not alienate women.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114311262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信