International Journal of Cyber Warfare and Terrorism最新文献

筛选
英文 中文
The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights P2P网络侵犯知识产权的国内外适用法律
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.311419
Ziad Kh. Al-Enizi, Mu'awya Naser
{"title":"The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights","authors":"Ziad Kh. Al-Enizi, Mu'awya Naser","doi":"10.4018/ijcwt.311419","DOIUrl":"https://doi.org/10.4018/ijcwt.311419","url":null,"abstract":"To provide a path to the copyright holders for filing a lawsuit against the infringers and violators through a legitimate process and applying the law that applies to that particular situation that keeps a balance between the peer-to-peer network technology and copyright holders this research has presented four different law strategies that can reduce the violation of the rights of the intellectual properties on national and international bases and advance the P2P network file-sharing procedure. The authors include the incorporation of the proper law for any illegal activity regarding copyrights via peer-to-peer networks on national and international bases with modification in the security system of file-sharing. It caters to the filing of the case for the violation of any copywritten works regardless of where the cases have happened, and the law should be standard for all the intellectual properties and is acceptable by other countries as well.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46834159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Trends in Child Sexual Abuse Material (CSAM) distribution in Indian Cyberspace 印度网络空间中儿童性虐待材料(CSAM)分发的最新趋势
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.297857
{"title":"Recent Trends in Child Sexual Abuse Material (CSAM) distribution in Indian Cyberspace","authors":"","doi":"10.4018/ijcwt.297857","DOIUrl":"https://doi.org/10.4018/ijcwt.297857","url":null,"abstract":"The emergence and evolution of social media and technology poses challenges in the prevention of child sexual exploitation and abuse. This issue is not successfully addressed by the existing techno-legal apparatus and is posing risks to the children. In India, CSAM files are illegal and constitute an offense under Section 67(B), IT Act 2000. The technology has also made available various tools and techniques, to the predators who are always ready to groom and exploit teenagers & circulate their indecent images / videos. This research work has been carried out to assess a qualitative estimate of the quantum of Child Sexual Abuse Material (CSAM) circulated in Indian Cyberspace using peer-to-peer technology. Although CSAM is legally banned, many unique IP addresses were found to be distributing a total of 27,00,08,502 disturbing material depicting the sexual abuse of children distributed over 7 torrents spreading over 29 States and 5 Union Territories.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41842885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Ontology Towards Predicting Terrorism Events 恐怖主义事件预测本体论
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.311421
Zubeida Dawood, Carien Van 't Wout
{"title":"An Ontology Towards Predicting Terrorism Events","authors":"Zubeida Dawood, Carien Van 't Wout","doi":"10.4018/ijcwt.311421","DOIUrl":"https://doi.org/10.4018/ijcwt.311421","url":null,"abstract":"Although there is an increasing amount of information for counter-terrorism operations freely available online, it is a complex process to extract relevant information and to detect useful patterns in the data in order for intelligence functionaries to identify threats and to predict possible terror attacks. Automation is required for intelligent decision-making. To assist with this, in this paper, the researchers propose an ontology-based data access system for counter-terrorism. The system will enable intelligence analysts to perform specialised semantic searches about terrorist events or groups for analysis using an ontology. In this paper, the researchers present the ontology that was created by following an existing methodology for ontology development, and an ontology-based data access system together with all the components used in development (i.e., databases, web-scraper tools, ontology-based data access software, and data sources). Lastly, the ontology is demonstrated by means of use cases with example queries for generating actionable intelligence for operations.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42453493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks 隐藏网络中形成结构化非法组织的恶意信息爬行机制
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.311422
Romil Rawat, Sonali Gupta, S. Sivaranjani, Om Kumar C.U., Megha Kuliha, K. Sankaran
{"title":"Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks","authors":"Romil Rawat, Sonali Gupta, S. Sivaranjani, Om Kumar C.U., Megha Kuliha, K. Sankaran","doi":"10.4018/ijcwt.311422","DOIUrl":"https://doi.org/10.4018/ijcwt.311422","url":null,"abstract":"Terrorist groups like ISIS have made considerable use of the dark web (DW) to carry out their malicious objectives such as spreading propaganda, recruiting and radicalizing new recruits, and secretly raising finances. Al-Hayat Media Center, an ISIS media agency, released a link on their forum describing how to access their DW website. It also sent out the identical message over Telegram, which included links to a Tor service with a “.onion” address. This study develops an analytical framework for scraping and analyzing the DW on the internet. The authors successfully tested a web crawler to collect account information for thousands of merchants and their related marketplace listings using a case study marketplace. The paper explains how to scrape DW marketplaces in the most viable and effective way possible. The findings of the case study support the validity of the proposed analytical framework, which is useful for academics researching this emerging phenomena as well as investigators looking into illegal behavior on the DW.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46494882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Understanding the Community's Perceptions Towards Online Radicalisation: An Exploratory Analysis 理解社区对网络激进化的看法:一项探索性分析
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.297860
Loo Seng Neo
{"title":"Understanding the Community's Perceptions Towards Online Radicalisation: An Exploratory Analysis","authors":"Loo Seng Neo","doi":"10.4018/ijcwt.297860","DOIUrl":"https://doi.org/10.4018/ijcwt.297860","url":null,"abstract":"This study seeks to understand the community’s perceptions towards detecting signs of online radicalisation and examine whether different community members would exhibit different levels of understanding. A 57-item survey was administered to 160 undergraduates from Nanyang Technological University (NTU) and 160 Amazon Mechanical Turk (MTurk) workers. Based on the ratings of the 42 online radicalisation indicators identified by Neo (2020), two-factor analyses were separately conducted using oblique rotation to undercover a four-factor structure for the NTU sample and a three-factor solution for the MTurk sample. The results revealed valuable insights into how community members would identify terrorist threats. Furthermore, the survey revealed differences in the participants’ views on the role of the internet in radicalisation pathways and their perceptions regarding various counter-terrorism strategies. Together, the findings would contribute to the discussion of how law enforcement could better engage and work together with the community members to detect terrorist threats.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"116 1","pages":"1-15"},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84074745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differences and Commonalities between Terrorism and COVID-19 恐怖主义与新冠肺炎的异同
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.297859
M. Korstanje
{"title":"Differences and Commonalities between Terrorism and COVID-19","authors":"M. Korstanje","doi":"10.4018/ijcwt.297859","DOIUrl":"https://doi.org/10.4018/ijcwt.297859","url":null,"abstract":"In the present essay review, we have placed the notion of the War on Terror on the critical lens of scrutiny. Far from being a foundational event, the global pandemic affirms a trend that originated after the War on Terror. In both the idea of living with the enemy persist. The modern nation-state, which is supported by the health system, deploys disciplinary instruments to detect, trace and isolate the undesired guest. In the days after 9/11, surveillance technologies were used to spy on different citizens who were suspected to be terrorists. In the post COVID19 context, all we are suspected to be terrorists (carriers) who place the social order in jeopardy. Of course, terrorism and the virus have certain differences which merit being mentioned. Terrorism is moved by political and psychological aims while COVID-19 is simply a virus (disposed of any reasoning and will). Nevertheless of this fact, the reaction of society that exacerbates the instrumentalist gaze seems to be the same.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44993905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The impact of COVID-19 epidemic on the radical behavior and armed conflict escalation risks 新冠肺炎疫情对激进行为和武装冲突升级风险的影响
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.298701
Y. Kostyuchenko, V. Pushkar, O. Malysheva, M. Yuschenko
{"title":"The impact of COVID-19 epidemic on the radical behavior and armed conflict escalation risks","authors":"Y. Kostyuchenko, V. Pushkar, O. Malysheva, M. Yuschenko","doi":"10.4018/ijcwt.298701","DOIUrl":"https://doi.org/10.4018/ijcwt.298701","url":null,"abstract":"The paper considers the impact of the COVID-19 epidemic to the behavior of militants of illegal armed groups and the population in the militant-controlled territories. The study was conducted on the example of the territories of self-proclaimed “L/DPR” within Donbass (Eastern Ukraine) in the period March-May 2020. Based on the analysis of social networks and media, the main narratives related to the perception of threats of epidemic were identified and analyzed. Its prevalence and dynamics among the militants and population in comparison with radical groups and population of Ukraine was analyzed. The main types of moods and emotions that were associated with the perception of epidemic were identified. The management decisions of the “L/DPR” leaders during the epidemic were analyzed. It was found that the measures of militant's “authorities” were not aimed to protecting population, but to social management - channeling aggression and propaganda discourse constructing.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46313759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boko Haram Insurgency and Violence Against Women and Girls in Nigeria 尼日利亚博科圣地叛乱和暴力侵害妇女和女孩行为
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.304046
Olalonpe Oluwakemi Ajise, B. Omotosho
{"title":"Boko Haram Insurgency and Violence Against Women and Girls in Nigeria","authors":"Olalonpe Oluwakemi Ajise, B. Omotosho","doi":"10.4018/ijcwt.304046","DOIUrl":"https://doi.org/10.4018/ijcwt.304046","url":null,"abstract":"Nigeria has continued to experience the menace of Boko Haram insurgency over the years. While some progress has been made over the years in curbing the activities of the insurgency in some quarters, the unabated violence against women and its implication on women and girls remain unresolved. As a pointer to the need for a deliberate and focused attention on violence against women and girls due to Boko Haram insurgency in Nigeria, this paper, through the review of relevant literature explores the activities of the insurgency and violence against women. This paper further investigates the implication of violence against women and the social structure as whole. The paper concludes by making recommendation on how the menace of Boko Haram insurgency can be addressed in order to address gender violence against women and crime against womanhood.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45587414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Analysis of Horror Stories in the Militants' Narratives as Markers of Violent Behavior and Conflict Identity: Case of "L/DPR" During the Warfare in Donbass, East Ukraine, 2014-2021 武装分子叙事中的恐怖故事作为暴力行为和冲突认同标记的分析——以2014-2021年东乌克兰顿巴斯战争中的“L/DPR”为例
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/IJCWT.297856
Y. Kostyuchenko, V. Pushkar
{"title":"On the Analysis of Horror Stories in the Militants' Narratives as Markers of Violent Behavior and Conflict Identity: Case of \"L/DPR\" During the Warfare in Donbass, East Ukraine, 2014-2021","authors":"Y. Kostyuchenko, V. Pushkar","doi":"10.4018/IJCWT.297856","DOIUrl":"https://doi.org/10.4018/IJCWT.297856","url":null,"abstract":"","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"12 1","pages":"1-19"},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70454205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake Identities in Social Cyberspace: From Escapism to Terrorism 社会网络空间中的假身份:从逃避主义到恐怖主义
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.295867
Lev Topor, Moran Pollack
{"title":"Fake Identities in Social Cyberspace: From Escapism to Terrorism","authors":"Lev Topor, Moran Pollack","doi":"10.4018/ijcwt.295867","DOIUrl":"https://doi.org/10.4018/ijcwt.295867","url":null,"abstract":"Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious users like terrorists or criminals manipulate online users with phishing attempts and frauds, making social cyber space less secure.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"57 1 1","pages":"1-17"},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77311816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信