International Journal of Cyber Warfare and Terrorism最新文献

筛选
英文 中文
Meta-Analysis and the Integration of Terrorism Event Databases 恐怖事件数据库的元分析与整合
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2024-01-10 DOI: 10.4018/ijcwt.335944
Timothy Lee Jones
{"title":"Meta-Analysis and the Integration of Terrorism Event Databases","authors":"Timothy Lee Jones","doi":"10.4018/ijcwt.335944","DOIUrl":"https://doi.org/10.4018/ijcwt.335944","url":null,"abstract":"Why do terrorist attacks occur in certain places and times but not others? Despite advances in collection and empirical methods, the literature has produced divergent results and reached little consensus for common hypotheses about the economic, political, and social causes of terrorism. It is hard to know what to make disagreements as studies adopt disparate research designs using different datasets covering different locations and times. This article applies the xSub data protocol to conduct a meta-analysis of terrorism event datasets and isolate explanations for variations in findings. Although the datasets are constructed for different purposes by different research teams, with different inclusion standards, processing data onto a common event typology, and conducting analysis across common coverage reduces heterogeneity in findings. This protocol also facilitates comparisons with general conflict event datasets, providing researchers, policymakers, and practitioners with a broader context for understanding terrorism in relation to other forms of violence.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"5 24","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139439766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Simulating Student Protests Through Agent-Based Framework 基于agent框架的学生抗议建模与仿真
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2023-03-09 DOI: 10.4018/ijcwt.319708
Tshepo Solomon Raphiri, J. V. Vuuren, Albertus A. K. Buitendag
{"title":"Modeling and Simulating Student Protests Through Agent-Based Framework","authors":"Tshepo Solomon Raphiri, J. V. Vuuren, Albertus A. K. Buitendag","doi":"10.4018/ijcwt.319708","DOIUrl":"https://doi.org/10.4018/ijcwt.319708","url":null,"abstract":"This paper presents an agent-based model to study the effect of grievance, net risk, social, sympathy, and political influence on the likelihood of student protests emerging in South Africa universities. Studies of student protests in several fields have been conducted, but no ABM has been used to explore factors contributing to student protests. Student protests have proved to be disorderly, frequently leading to property damage, academic program cancellations, and injuries. Simulation experiments demonstrated that inequality level, number of activists, activist's influential size, number of friendship ties, suspend delay, and sympathy are elements that determine the model of social conflicts, since there are statistically significant in the logistic regression. For university administration to effectively handle disruptive student protest actions, risk management policies should focus on understanding network structures that integrate students' interactions to monitor the spread of opinions that initiate protest mobilization.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":"1-20"},"PeriodicalIF":0.5,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84359158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated Information Model of an Enterprise and Cybersecurity Management System: From Data to Activity 企业与网络安全管理系统的集成信息模型:从数据到活动
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-04-01 DOI: 10.4018/ijcwt.305860
S. Dotsenko, O. Illiashenko, V. Kharchenko, O. Morozova
{"title":"Integrated Information Model of an Enterprise and Cybersecurity Management System: From Data to Activity","authors":"S. Dotsenko, O. Illiashenko, V. Kharchenko, O. Morozova","doi":"10.4018/ijcwt.305860","DOIUrl":"https://doi.org/10.4018/ijcwt.305860","url":null,"abstract":"The paper analyzes the concepts of \"data\", \"information\", \"knowledge\", \"intelligence\", \"activity\", establishes their relationship in the context of integrating information about the enterprise with the contours of security management through the connection of information technologies, operation technologies, ecology technologies (IT, OT, ET). The authors propose an integrated model of information representation of the organization based on a chain of data, information, knowledge and activity / intelligence. The main feature of this model is that it explicitly includes activities that are implemented considering the laws of natural intelligence and forms a corresponding control loop. The security management system is based on identifying and tolerating threats on the stages of processing the data, information, knowledge and intelligence/activities and IT, OT and ET levels. Two industrial cases related to dialog enterprise management system and post-accident monitoring system are discussed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"23 1","pages":"1-21"},"PeriodicalIF":0.5,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78397308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Agent-Based Simulation of Heterogeneous Crowd Flows in Critical Infrastructures During Emergencies 基于agent的突发事件关键基础设施异构人群流仿真
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-04-01 DOI: 10.4018/ijcwt.305861
Umberto Battista, Pietro Vito, Davide Ottonello, Deborah Hugon
{"title":"Agent-Based Simulation of Heterogeneous Crowd Flows in Critical Infrastructures During Emergencies","authors":"Umberto Battista, Pietro Vito, Davide Ottonello, Deborah Hugon","doi":"10.4018/ijcwt.305861","DOIUrl":"https://doi.org/10.4018/ijcwt.305861","url":null,"abstract":"Scope of this work was the development of a model able to simulate the flows and behaviours of heterogeneous crowds in a large transport hub, both in normal conditions and during an emergency, like a terrorist attack. These places are indeed also so-called “soft targets”, public spaces which are preferred targets of terrorists because they provide them with the opportunity to maximize casualties and publicity. Different modelling approaches were investigated and finally agent-based modelling and the BDI (belief-desire-intention) architecture were selected. Several scenarios were also identified to simulate the crowd behaviour. Flowcharts were developed to model users’ actions and interactions; while statecharts to model emergency conditions and behavioural changes. Simulations were then used to identify weak points in the infrastructure and to analyse the evacuation times for each user category investigated. Finally, various solutions were proposed and simulated, to improve crowd flows and reduce evacuation times.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"43 1","pages":"1-18"},"PeriodicalIF":0.5,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87340114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT and Edge Computing as Enabling Technologies of Human Factors Monitoring in CBRN Environment 物联网和边缘计算作为CBRN环境中人为因素监测的使能技术
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-04-01 DOI: 10.4018/ijcwt.305859
Pietro Rossetti, F. Garzia, Nicola Silverio Genco, A. Sacchetti
{"title":"IoT and Edge Computing as Enabling Technologies of Human Factors Monitoring in CBRN Environment","authors":"Pietro Rossetti, F. Garzia, Nicola Silverio Genco, A. Sacchetti","doi":"10.4018/ijcwt.305859","DOIUrl":"https://doi.org/10.4018/ijcwt.305859","url":null,"abstract":"Human Factor (HF) monitoring under the critical CBRN environment reduces the likelihood of errors or injuries by first responders who carry out operations within an unknown workspace. Indeed, thanks to the monitoring, analysis and assessment of physical and mental workload and manual handling of equipements by first responders, it is possible to increase safety, efficiency and effectiveness. The IoT and Edge computing, contextualizing the collected data, promises to enhance the CBRN situational awareness by working on the HFs aspects with a view to context-aware reasoning. IoT and edge computing enabling technologies envisage operators needs and behaviours by gathering information about biophysiological conditions, emotional state and operational data by first responders.This study aims to introduce the edge computer for data fusion in tactical networks and computational services, fully integrated in IoT solutions of remote monitoring of HFs. These latter, related to Human Performance and health of responders, may prove useful as innovative tools in CBRN incident management.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"33 1","pages":"1-20"},"PeriodicalIF":0.5,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72943245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence and Facial Recognition in an IoT Ecosystem 物联网生态系统中的人工智能和面部识别
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-04-01 DOI: 10.4018/ijcwt.305862
Nicola Fabiano
{"title":"Artificial Intelligence and Facial Recognition in an IoT Ecosystem","authors":"Nicola Fabiano","doi":"10.4018/ijcwt.305862","DOIUrl":"https://doi.org/10.4018/ijcwt.305862","url":null,"abstract":"This article does not deepen the insight on technical aspects related to artificial intelligence and facial recognition, but it highlights how relevant privacy aspects are also inside an IoT ecosystem. Furthermore, the author points out the risks of some resources found online, exposing face images, in the compliance with GDPR and privacy rules process. Indeed, adopting artificial intelligence to realize human face images of people who do not exist but realized starting from real persons can have consequences on data protection rules and the possible misuse by everyone who can retrieve them. Artificial intelligence might foster synthetic identity, or, better, artificial intelligence synthetic identity cases, building human profiles using particulars belonging to different persons. The author proposes an approach based on the innovative data protection and privacy relationships model (DAPPREMO) to address any activity or process related to data protection and privacy due to having a broader view of any investigation's subject.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47502864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Strategic Consequences of Cyber Targeting Strategies on Road Transport Networks 道路运输网络网络目标定位策略的战略后果评估
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.314942
Skanda Vivek, Charles Harry
{"title":"Evaluating the Strategic Consequences of Cyber Targeting Strategies on Road Transport Networks","authors":"Skanda Vivek, Charles Harry","doi":"10.4018/ijcwt.314942","DOIUrl":"https://doi.org/10.4018/ijcwt.314942","url":null,"abstract":"The explosive growth in connected vehicle infrastructures and IoT-enabled traffic systems opens the potential for novel societal impacts stemming from cyber-attacks on transportation systems. Researchers and threat actors have demonstrated that they can gain control of safety-critical vehicle functions, compromise poorly authenticated third-party apps, as well as modify supervisory control and data acquisition (SCADA) systems. This raises the question of where policy makers should invest to reduce the most significant consequences of a cyberattack on road infrastructure. In this paper, the authors develop a network-based approach in conjunction with historical trip information to quantify the network impacts of cyberattacks on road networks in Washington DC. They find that a highly targeted attack on only 10 SCADA-controlled signaling devices at specific locations disrupts a third of the most efficient paths in Washington DC. The results open the possibility of layered deterrence strategies that minimize the disruptive consequences of cyberattacks, thereby reducing benefits to attackers.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47826797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber Kill Chain Analysis of Five Major US Data Breaches 美国五大数据泄露事件的网络杀伤链分析
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.315651
Glorin Sebastian
{"title":"Cyber Kill Chain Analysis of Five Major US Data Breaches","authors":"Glorin Sebastian","doi":"10.4018/ijcwt.315651","DOIUrl":"https://doi.org/10.4018/ijcwt.315651","url":null,"abstract":"Data breaches are a major concern for both US and global corporations. With more companies allowing their employees to be working remote, providing them a secure work environment has been a priority for employers. The Interpol 2020 report on cyber breaches mentions that the number of cyber-attacks has multiplied in the last year. The IBM Data Breach Report of 2021 notes that data breach costs rose from USD 3.86 million to USD 4.24 million, while the average cost was USD 1.07 Mil higher in breaches where remote work was a factor in causing the breach. Given this environment of increased cyber breaches, it is important to learn from previous major data breaches to understand the root cause which led to the compromise of information security and the steps which could have effectively prevented the same. This paper evaluates five major data breaches in US history using Lockheed's Cyber Kill Chain Analysis, since the details of these breaches have never been documented for research and also proposes an eight-step cyber-attack prevention plan.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46757715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Client-Side Cross Platform Compatible Solution for Phishing Prevention 高效的客户端跨平台兼容的网络钓鱼预防解决方案
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.297855
{"title":"Efficient Client-Side Cross Platform Compatible Solution for Phishing Prevention","authors":"","doi":"10.4018/ijcwt.297855","DOIUrl":"https://doi.org/10.4018/ijcwt.297855","url":null,"abstract":"Phishing is a crime where the victim is contacted by an attacker posing as a trustworthy source and lure them into providing sensitive information. This work makes sure that time delay is averted and the attack can be thwarted with fewer computational resources. To solve the above mentioned problem, a web browser add-on that works as a background script on the client side is implemented. All the background scripts made cross platform compatible to make the development easier and more efficient. The contribution in this paper is the new add-on, Off-the-hook-plus. The main objective of this Off-the-hook-plus is to find if the web page that the user visits is a phish or not. The page redirect logs along with the page details are used to find if the site is a phish or not. And then if the site happens to be a phish, the similar looking site which this web page tries to impersonate is given. To make the repeated accesses faster, a whitelist is maintained, where all the safe sites are logged. The add-on is experimentally evaluated and the results are discussed and is found to be effective.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42763547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Techno-radicalism; an Account of Radicalism in the Technology Era Techno-radicalism;论科技时代的激进主义
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.297858
{"title":"Techno-radicalism; an Account of Radicalism in the Technology Era","authors":"","doi":"10.4018/ijcwt.297858","DOIUrl":"https://doi.org/10.4018/ijcwt.297858","url":null,"abstract":"Today there is fairly rich literature to study how radical groups take advantage of technology to realize their goals. Something, however, is missing in such discussions as to how technology might affect the subjectivity of extremists. Technology, in the most of such inquiries, is taken to be merely a passive tool without any inherent bias. This instrumentalist approach to technology, however, turns out to be problematic. The contemporary studies of technology may provide us, as it will be argued, with insights to understand how technology might incline civilians towards radicalization. Two frameworks of postphenomenology and Actor-Network-Theory (ANT) will be the primary focus here to outline a schema of the impacts of technology on radicalization of minds. Although technology, with all its variety, is the general concern of the article, it will narrow the discussion down to social media platforms to make the point. It will be then suggested to ascribe an active role to technology in radicalism scholarship, thereby drawing attentions to the process of designing technologies.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45030222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信