{"title":"The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights","authors":"Ziad Kh. Al-Enizi, Mu'awya Naser","doi":"10.4018/ijcwt.311419","DOIUrl":"https://doi.org/10.4018/ijcwt.311419","url":null,"abstract":"To provide a path to the copyright holders for filing a lawsuit against the infringers and violators through a legitimate process and applying the law that applies to that particular situation that keeps a balance between the peer-to-peer network technology and copyright holders this research has presented four different law strategies that can reduce the violation of the rights of the intellectual properties on national and international bases and advance the P2P network file-sharing procedure. The authors include the incorporation of the proper law for any illegal activity regarding copyrights via peer-to-peer networks on national and international bases with modification in the security system of file-sharing. It caters to the filing of the case for the violation of any copywritten works regardless of where the cases have happened, and the law should be standard for all the intellectual properties and is acceptable by other countries as well.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46834159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent Trends in Child Sexual Abuse Material (CSAM) distribution in Indian Cyberspace","authors":"","doi":"10.4018/ijcwt.297857","DOIUrl":"https://doi.org/10.4018/ijcwt.297857","url":null,"abstract":"The emergence and evolution of social media and technology poses challenges in the prevention of child sexual exploitation and abuse. This issue is not successfully addressed by the existing techno-legal apparatus and is posing risks to the children. In India, CSAM files are illegal and constitute an offense under Section 67(B), IT Act 2000. The technology has also made available various tools and techniques, to the predators who are always ready to groom and exploit teenagers & circulate their indecent images / videos. This research work has been carried out to assess a qualitative estimate of the quantum of Child Sexual Abuse Material (CSAM) circulated in Indian Cyberspace using peer-to-peer technology. Although CSAM is legally banned, many unique IP addresses were found to be distributing a total of 27,00,08,502 disturbing material depicting the sexual abuse of children distributed over 7 torrents spreading over 29 States and 5 Union Territories.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41842885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ontology Towards Predicting Terrorism Events","authors":"Zubeida Dawood, Carien Van 't Wout","doi":"10.4018/ijcwt.311421","DOIUrl":"https://doi.org/10.4018/ijcwt.311421","url":null,"abstract":"Although there is an increasing amount of information for counter-terrorism operations freely available online, it is a complex process to extract relevant information and to detect useful patterns in the data in order for intelligence functionaries to identify threats and to predict possible terror attacks. Automation is required for intelligent decision-making. To assist with this, in this paper, the researchers propose an ontology-based data access system for counter-terrorism. The system will enable intelligence analysts to perform specialised semantic searches about terrorist events or groups for analysis using an ontology. In this paper, the researchers present the ontology that was created by following an existing methodology for ontology development, and an ontology-based data access system together with all the components used in development (i.e., databases, web-scraper tools, ontology-based data access software, and data sources). Lastly, the ontology is demonstrated by means of use cases with example queries for generating actionable intelligence for operations.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42453493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Romil Rawat, Sonali Gupta, S. Sivaranjani, Om Kumar C.U., Megha Kuliha, K. Sankaran
{"title":"Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks","authors":"Romil Rawat, Sonali Gupta, S. Sivaranjani, Om Kumar C.U., Megha Kuliha, K. Sankaran","doi":"10.4018/ijcwt.311422","DOIUrl":"https://doi.org/10.4018/ijcwt.311422","url":null,"abstract":"Terrorist groups like ISIS have made considerable use of the dark web (DW) to carry out their malicious objectives such as spreading propaganda, recruiting and radicalizing new recruits, and secretly raising finances. Al-Hayat Media Center, an ISIS media agency, released a link on their forum describing how to access their DW website. It also sent out the identical message over Telegram, which included links to a Tor service with a “.onion” address. This study develops an analytical framework for scraping and analyzing the DW on the internet. The authors successfully tested a web crawler to collect account information for thousands of merchants and their related marketplace listings using a case study marketplace. The paper explains how to scrape DW marketplaces in the most viable and effective way possible. The findings of the case study support the validity of the proposed analytical framework, which is useful for academics researching this emerging phenomena as well as investigators looking into illegal behavior on the DW.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46494882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding the Community's Perceptions Towards Online Radicalisation: An Exploratory Analysis","authors":"Loo Seng Neo","doi":"10.4018/ijcwt.297860","DOIUrl":"https://doi.org/10.4018/ijcwt.297860","url":null,"abstract":"This study seeks to understand the community’s perceptions towards detecting signs of online radicalisation and examine whether different community members would exhibit different levels of understanding. A 57-item survey was administered to 160 undergraduates from Nanyang Technological University (NTU) and 160 Amazon Mechanical Turk (MTurk) workers. Based on the ratings of the 42 online radicalisation indicators identified by Neo (2020), two-factor analyses were separately conducted using oblique rotation to undercover a four-factor structure for the NTU sample and a three-factor solution for the MTurk sample. The results revealed valuable insights into how community members would identify terrorist threats. Furthermore, the survey revealed differences in the participants’ views on the role of the internet in radicalisation pathways and their perceptions regarding various counter-terrorism strategies. Together, the findings would contribute to the discussion of how law enforcement could better engage and work together with the community members to detect terrorist threats.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"116 1","pages":"1-15"},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84074745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differences and Commonalities between Terrorism and COVID-19","authors":"M. Korstanje","doi":"10.4018/ijcwt.297859","DOIUrl":"https://doi.org/10.4018/ijcwt.297859","url":null,"abstract":"In the present essay review, we have placed the notion of the War on Terror on the critical lens of scrutiny. Far from being a foundational event, the global pandemic affirms a trend that originated after the War on Terror. In both the idea of living with the enemy persist. The modern nation-state, which is supported by the health system, deploys disciplinary instruments to detect, trace and isolate the undesired guest. In the days after 9/11, surveillance technologies were used to spy on different citizens who were suspected to be terrorists. In the post COVID19 context, all we are suspected to be terrorists (carriers) who place the social order in jeopardy. Of course, terrorism and the virus have certain differences which merit being mentioned. Terrorism is moved by political and psychological aims while COVID-19 is simply a virus (disposed of any reasoning and will). Nevertheless of this fact, the reaction of society that exacerbates the instrumentalist gaze seems to be the same.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44993905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Kostyuchenko, V. Pushkar, O. Malysheva, M. Yuschenko
{"title":"The impact of COVID-19 epidemic on the radical behavior and armed conflict escalation risks","authors":"Y. Kostyuchenko, V. Pushkar, O. Malysheva, M. Yuschenko","doi":"10.4018/ijcwt.298701","DOIUrl":"https://doi.org/10.4018/ijcwt.298701","url":null,"abstract":"The paper considers the impact of the COVID-19 epidemic to the behavior of militants of illegal armed groups and the population in the militant-controlled territories. The study was conducted on the example of the territories of self-proclaimed “L/DPR” within Donbass (Eastern Ukraine) in the period March-May 2020. Based on the analysis of social networks and media, the main narratives related to the perception of threats of epidemic were identified and analyzed. Its prevalence and dynamics among the militants and population in comparison with radical groups and population of Ukraine was analyzed. The main types of moods and emotions that were associated with the perception of epidemic were identified. The management decisions of the “L/DPR” leaders during the epidemic were analyzed. It was found that the measures of militant's “authorities” were not aimed to protecting population, but to social management - channeling aggression and propaganda discourse constructing.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46313759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Boko Haram Insurgency and Violence Against Women and Girls in Nigeria","authors":"Olalonpe Oluwakemi Ajise, B. Omotosho","doi":"10.4018/ijcwt.304046","DOIUrl":"https://doi.org/10.4018/ijcwt.304046","url":null,"abstract":"Nigeria has continued to experience the menace of Boko Haram insurgency over the years. While some progress has been made over the years in curbing the activities of the insurgency in some quarters, the unabated violence against women and its implication on women and girls remain unresolved. As a pointer to the need for a deliberate and focused attention on violence against women and girls due to Boko Haram insurgency in Nigeria, this paper, through the review of relevant literature explores the activities of the insurgency and violence against women. This paper further investigates the implication of violence against women and the social structure as whole. The paper concludes by making recommendation on how the menace of Boko Haram insurgency can be addressed in order to address gender violence against women and crime against womanhood.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45587414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Analysis of Horror Stories in the Militants' Narratives as Markers of Violent Behavior and Conflict Identity: Case of \"L/DPR\" During the Warfare in Donbass, East Ukraine, 2014-2021","authors":"Y. Kostyuchenko, V. Pushkar","doi":"10.4018/IJCWT.297856","DOIUrl":"https://doi.org/10.4018/IJCWT.297856","url":null,"abstract":"","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"12 1","pages":"1-19"},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70454205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake Identities in Social Cyberspace: From Escapism to Terrorism","authors":"Lev Topor, Moran Pollack","doi":"10.4018/ijcwt.295867","DOIUrl":"https://doi.org/10.4018/ijcwt.295867","url":null,"abstract":"Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious users like terrorists or criminals manipulate online users with phishing attempts and frauds, making social cyber space less secure.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"57 1 1","pages":"1-17"},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77311816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}