International Journal of Cyber Research and Education最新文献

筛选
英文 中文
Identity Theft 身份盗窃
International Journal of Cyber Research and Education Pub Date : 2021-01-01 DOI: 10.4018/ijcre.2021010107
S. Helser, M. Hwang
{"title":"Identity Theft","authors":"S. Helser, M. Hwang","doi":"10.4018/ijcre.2021010107","DOIUrl":"https://doi.org/10.4018/ijcre.2021010107","url":null,"abstract":"Identity theft is a serious crime growing rapidly due to the ever-tighter integration of technology into people's lives. The psychological and financial loss to individual victims is devastating, and its costs to society at large staggering. In order to better understand the problem and to combat the crime more effectively, a comprehensive review of issues related to identity theft is performed in this paper. The human element of the crime is examined, along with the exploits used by perpetrators and countermeasures that have been developed. The findings highlight areas in need of continued research and guidelines that should benefit individuals and organizations in their pursuit of potential solutions.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123098611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effectiveness of Increasing Realism Into Cybersecurity Training 提高网络安全培训真实性的有效性
International Journal of Cyber Research and Education Pub Date : 2020-01-01 DOI: 10.4018/ijcre.2020010104
R. Beveridge
{"title":"Effectiveness of Increasing Realism Into Cybersecurity Training","authors":"R. Beveridge","doi":"10.4018/ijcre.2020010104","DOIUrl":"https://doi.org/10.4018/ijcre.2020010104","url":null,"abstract":"This article describes how cybersecurity is a field that is growing at an exponential rate. In light of many highly publicized incidences of cyber-attacks against organizations, the need to hire experienced cybersecurity professionals is increasing. The lack of available workforce to fill open positions is alarming and organizations are finding that potential candidates with academic degrees and certifications alone are not as valuable as those with experience. Gaining rapid experience requires immersion into realistic virtual environments that mimic real-world environments. Currently, cybersecurity competitions leverage many technologies that immerse participants into virtual environments that mimic real-world systems to improve experiential learning. These systems are expensive to build and maintain, and to continuously improve realism is difficult. However, the training value of cyber competitions in which the participants cannot distinguish from real-world systems will ultimately develop highly experience cybersecurity professionals.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How to Educate to Build an Effective Cyber Resilient Society 如何通过教育建立一个有效的网络弹性社会
International Journal of Cyber Research and Education Pub Date : 2020-01-01 DOI: 10.4018/ijcre.2020010105
Jorge Barbosa
{"title":"How to Educate to Build an Effective Cyber Resilient Society","authors":"Jorge Barbosa","doi":"10.4018/ijcre.2020010105","DOIUrl":"https://doi.org/10.4018/ijcre.2020010105","url":null,"abstract":"The possibility that computers, in particular, personal computers, can be used for harmful actions affecting global computer systems as a whole, due to two main reasons: (1) hardware and / or software failures, which are caused by problems related to their manufacture which must be solved by their respective manufacturers and (2) failures due to actions or inactions of their users, in particular people with low computer skills, people of very low age groups, e.g. children, or very old age groups, e.g. ageing people, or others without a minimum of computer skills. This problem is aggravated by the continuous proliferation of equipment, namely mobile devices, IOT devices and others that have Internet connectivity, namely through a browser. There are the possible ways in the area of cyber education that can contribute to cyber resilience of society and these are developed in this work.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114275762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning for Web Proxy Analytics Web代理分析的机器学习
International Journal of Cyber Research and Education Pub Date : 2019-07-01 DOI: 10.4018/IJCRE.2019070103
M. Maldonado, Ayad F. Barsoum
{"title":"Machine Learning for Web Proxy Analytics","authors":"M. Maldonado, Ayad F. Barsoum","doi":"10.4018/IJCRE.2019070103","DOIUrl":"https://doi.org/10.4018/IJCRE.2019070103","url":null,"abstract":"Proxy servers used around the globe are typically graded and built for small businesses to large enterprises. This does not dismiss any of the current efforts to keep the general consumer of an electronic device safe from malicious websites or denying youth of obscene content. With the emergence of machine learning, we can utilize the power to have smart security instantiated around the population's everyday life. In this work, we present a simple solution of providing a web proxy to each user of mobile devices or any networked computer powered by a neural network. The idea is to have a proxy server to handle the functionality to allow safe websites to be rendered per request. When a website request is made and not identified in the pre-determined website database, the proxy server will utilize a trained neural network to determine whether or not to render that website. The neural network will be trained on a vast collection of sampled websites by category. The neural network needs to be trained constantly to improve decision making as new websites are visited.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Common Description and Measures for Attitude in Information Security for Organizations 组织信息安全态度的共同描述和措施
International Journal of Cyber Research and Education Pub Date : 2019-07-01 DOI: 10.4018/IJCRE.2019070101
Nooredin Etezady
{"title":"A Common Description and Measures for Attitude in Information Security for Organizations","authors":"Nooredin Etezady","doi":"10.4018/IJCRE.2019070101","DOIUrl":"https://doi.org/10.4018/IJCRE.2019070101","url":null,"abstract":"Understanding employee's security behavior is required before effective security policies and training materials can be developed. The Anti-virus software, secure systems design methods, information management standards, and information systems security policies; which have been developed and implemented by many organizations; have not been successfully adopted. Information systems research is encompassing social aspects of systems research more and more in order to explain user behavior and improve technology acceptance. Theory of planned behavior (TPB) based on attitude, subjective norm, and perceived behavioral control constructs, considers intentions as cognitive antecedents of actions or behavior. This study reviews various research on attitude and finds the most common measures for attitude, which can be used in organizations to develop a method to influence employees' attitude positively with the goal of inducing positive security behavior. Further, a conceptual model for operationalizing the obtained measures for enhancing information security in organizations is presented.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"5 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134574008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electronic Health Records 电子健康记录
International Journal of Cyber Research and Education Pub Date : 2019-07-01 DOI: 10.4018/IJCRE.2019070104
Donna S. McDermott, Jessica L. Kamerer, Andrew T. Birk
{"title":"Electronic Health Records","authors":"Donna S. McDermott, Jessica L. Kamerer, Andrew T. Birk","doi":"10.4018/IJCRE.2019070104","DOIUrl":"https://doi.org/10.4018/IJCRE.2019070104","url":null,"abstract":"Electronic health records (EHRs) pose unique concerns for administrators and information technology professionals with regard to cybersecurity. Due to the sensitive nature and increasing value of personal health information, cyber risks and information protection should be a high priority. A literature review was conducted to identify potential threat categories and best practices in protecting EHR information. Potential threats were identified and categorized into five areas; physical, portable devices, insider use, technical, and administrative. Government policies have created administrative, physical, and technical safeguards to keep EHR information safe. Despite these efforts, EHRs are being targeted by cyber-criminals due to flaws in personal and organizational management of protected healthcare information. This paper aims to educate, inform, and advocate for the proper handling of EHRs to alleviate the burden caused by compromised electronic documents.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134614976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Trial by Social Media 社交媒体的审判
International Journal of Cyber Research and Education Pub Date : 2019-07-01 DOI: 10.4018/IJCRE.2019070105
Jacqui Taylor, Gemma Tarrant
{"title":"Trial by Social Media","authors":"Jacqui Taylor, Gemma Tarrant","doi":"10.4018/IJCRE.2019070105","DOIUrl":"https://doi.org/10.4018/IJCRE.2019070105","url":null,"abstract":"Social media makes it easier than ever to access information and opinions associated with criminal proceedings and viewing or discussing these pre-trial could reduce juror impartiality. This study explored whether viewing social media comments influenced mock juror verdicts. Seventy-two participants formed 12 six-person ‘mock juries'. All participants received information regarding a murder trial. Nine groups were exposed to social media comments, manipulated to be negative, positive or neutral towards the defendant. The remaining three groups only received trial information (control condition). Results showed that prior to group discussion, exposure to negatively-biased comments significantly increased the number of guilty verdicts, however these effects disappeared after group discussion. Therefore, although jurors may be unable to remain impartial before a trial, jury discussion can remove these prejudices, supporting previous group research. Further research is suggested where participants interact actively with social media, rather than passively viewing comments.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129561578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review on Cyberattacks and Their Preventive Measures 网络攻击及其预防措施综述
International Journal of Cyber Research and Education Pub Date : 2019-07-01 DOI: 10.4018/IJCRE.2019070102
Farhana Haque Sumi, Lokesh Dutta, F. Sarker
{"title":"A Review on Cyberattacks and Their Preventive Measures","authors":"Farhana Haque Sumi, Lokesh Dutta, F. Sarker","doi":"10.4018/IJCRE.2019070102","DOIUrl":"https://doi.org/10.4018/IJCRE.2019070102","url":null,"abstract":"Every year many individuals and organizations suffer from cyberattacks, which include data loss, information hacks, transaction problem, and unauthorized access of information or data. The frequency of these attacks is increasing day by day and it's creating a lot of problems or threats in our life. These attacks can be extremely damaging to businesses as well as people. Therefore, we must know about cyberattacks and their preventive measures as many of us are still unaware about it. The objective of this paper is to create awareness of the various types of cyber-attacks and lay the foundation for their cyber security planning. In this paper, we discuss different types of cyberattacks and the tools used to perform these cyberattacks. Moreover, this paper presents a clear picture of some attacks that helps people to understand how attacker accomplishes all these attacks. Finally, we discuss the preventive measures.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124100625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cyber Investigations, A Law Enforcement Needs Assessment 网络调查,执法需求评估
International Journal of Cyber Research and Education Pub Date : 2019-07-01 DOI: 10.4018/IJCRE.2019070106
Frank Hartle, C. Wydra
{"title":"Cyber Investigations, A Law Enforcement Needs Assessment","authors":"Frank Hartle, C. Wydra","doi":"10.4018/IJCRE.2019070106","DOIUrl":"https://doi.org/10.4018/IJCRE.2019070106","url":null,"abstract":"The purpose of this article is to assess the needs of local and state law enforcement agencies to investigate both cyber-enabled and cyber-dependent crimes. While large federal investigative agencies have the skills, tools and resources to investigate cyber-crimes, the increasing propagation of such crimes has overwhelmed their ability to investigate all but the most serious national security threats and large-scale cyber-crimes. To that end, this article assesses the current knowledge, skills, and abilities of local law enforcement to perform cyber-crime investigations and more importantly their desire to do so. As these crimes grow in ease and popularity it is posited that local law enforcement will be required to have the technical skills to investigate a myriad of cyber-crimes at the local level. As such, there will be a need for local training in cyber-crimes investigation and shared investigative resources. Additionally, this paper gauges local law enforcements' willingness to participate in such training.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129596756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Dark Web 暗网
International Journal of Cyber Research and Education Pub Date : 2019-01-01 DOI: 10.4018/IJCRE.2019010101
Stephen Mancini, Lawrence A. Tomei
{"title":"The Dark Web","authors":"Stephen Mancini, Lawrence A. Tomei","doi":"10.4018/IJCRE.2019010101","DOIUrl":"https://doi.org/10.4018/IJCRE.2019010101","url":null,"abstract":"The Dark Web is its own clandestine network of thousands of websites that most of us do not even know exist, much less how to access. The Dark Web uses its own tools to keep users anonymous and their activities hidden. The Dark Web is so well concealed that the full extent of its use remains largely the topic of hushed conversations. From black market drug sales to child pornography, the Dark Web operates at two extremes of the Internet, from venues for anonymous whistleblowing on one end to unguarded censorship on the other. This article provides a primer for those interested in learning more about the “known unknowns” of the Dark Web. Readers will find an excellent opening manuscript for the newly launched International Journal of Cyber Research and Education as it sets the stage for future research in cyber security and law enforcement. The paper will examine three foundational questions for the reader: What constitutes the ‘deep/dark/underground' web and keeps it obscure and remote from the community of legitimate users? How can websites that occupy the same virtual space range exist in two parallel dimensions from discoverable to undiscoverable? And finally, how do the actors on the Dark Web mature from novice to advanced? Is it the same process followed by users of the known web? In the corpus of this article, the authors will briefly examine how online markets exist simultaneously on the Internet, serving clients in both known online environments as well as the more secretive, anonymous online world. They will examine how nefarious actors migrate from the “good” web to become novice and then advanced users of the “evil” environments. To the neophyte user, the process introduced herein may appear relatively straightforward. In truth, the notion that any but the most staunchly dedicated practitioner can become a vetted participant in the ‘dark web' is inconceivable. Even so, with the sheer volume of actors operating in numerous underground forums and marketplaces, the impact remains significant and growing geometrically. Government and industry from all over the globe are hindered in their ability to track and identify the truly advanced actors operating in these more secretive environments. We shall soon see why this is the case.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"4999 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114186027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信