International Journal of Cyber Warfare and Terrorism最新文献

筛选
英文 中文
Multi-Contextual Analysis of Internet Security Perception and Behavior 网络安全感知与行为的多语境分析
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.305243
Alfred Paa Gyaisey, A. Owusu
{"title":"Multi-Contextual Analysis of Internet Security Perception and Behavior","authors":"Alfred Paa Gyaisey, A. Owusu","doi":"10.4018/ijcwt.305243","DOIUrl":"https://doi.org/10.4018/ijcwt.305243","url":null,"abstract":"Perception has been found to influence thought patterns and human behavior in other academic spheres. However, the impact of perception on technology adoption and use in the field of Information Systems is virtually nonexistent. This study sought to examine the internet security perception of internet users and consequential effect on their online behavior. The study used language (French vs English), as a differentiation tool for the respondents. 101 nationals from different African countries who reside in Ghana were sampled to participate in the study. The study found strong negative security perception, low level of knowledge regarding cyber awareness and a lax attitude in cyber hygiene practices to ensure personal safety when online. Impact of culture on online security perception was not identified, and also respondents were not collectivist in their cultural orientation, a marked shift from long held opinion of strong collectivism in Africa. Implications are also discussed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49519628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the Defence Cooperation Agreements Between the USA and African Countries 美国与非洲国家防务合作协定评估
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.311420
Paul Coonley Boateng, G. Gyamfi
{"title":"Assessing the Defence Cooperation Agreements Between the USA and African Countries","authors":"Paul Coonley Boateng, G. Gyamfi","doi":"10.4018/ijcwt.311420","DOIUrl":"https://doi.org/10.4018/ijcwt.311420","url":null,"abstract":"International security cooperation is regarded as one of the key and successful mechanisms to fight terrorism and other cross-border criminal activities worldwide. This paper focuses on the benefits and challenges of the US and African countries' defence cooperation, using Ghana as a case study. This study used 21 people as participants. The subjects were selected based on their unique knowledge and expertise in the phenomenon under study. The researchers used interviews to solicit the views of the participants on the Defence Cooperation Agreement (DCA) between Ghana and the US focusing on the benefits and challenges. In conclusion, the study disclosed that no country has a monopoly on what it takes to fight terrorism and other transnational organised crime alone. The major challenges identified include the breach of domestic law, limited mutual trust, and discriminately ethnic and misguided religious practices. The challenges were stated as indispensable for the sustainability of the DCA and the successful mitigation of terrorism and transnational organised crime in West Africa.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48353196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lone Wolf vs. an Affiliated Terrorist 独狼vs附属恐怖分子
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.304045
D. Atsa’am, R. Wario
{"title":"A Lone Wolf vs. an Affiliated Terrorist","authors":"D. Atsa’am, R. Wario","doi":"10.4018/ijcwt.304045","DOIUrl":"https://doi.org/10.4018/ijcwt.304045","url":null,"abstract":"The global terrorism database (GTD) shows that 3.5% of the total terror attacks across the world between 1970 to 2019 were targeted at tourists. A terror attack can be perpetrated by either a lone wolf or an affiliated terrorist. The analysis of the GTD conducted in this study shows that a terror attack targeted at tourists is 4.3 times more likely to have been perpetrated by a lone wolf than by affiliated terrorists. Since lone wolves operate individually, this finding implies that access control measures at tourist centers must regard individuals such as hawkers, newspaper vendors, freelance journalists, etc. who come around to do various businesses around tourists as potential terrorists until proven otherwise. Since lone wolves do not work for a terror group, tourist attraction centers located in the regions, territories, and countries with no presence of terror groups must not relax their counterterrorism control measures under the impression that they are safe from terror attacks.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47343106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-Social Factors Influence the Decision Making of Tourists 反社会因素对旅游者决策的影响
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.315590
Parwaiz Ahmad Najar, Hafizullah Dar, Priya Singh, A. Najar
{"title":"Anti-Social Factors Influence the Decision Making of Tourists","authors":"Parwaiz Ahmad Najar, Hafizullah Dar, Priya Singh, A. Najar","doi":"10.4018/ijcwt.315590","DOIUrl":"https://doi.org/10.4018/ijcwt.315590","url":null,"abstract":"This study is based on extensive scanning of literature about the anti-social factors and their influence on TDM in the Kashmir Valley. Content analysis has applied to the scanned literature. It is clarified from the literature that different anti-social factors exist in societies, but terrorism and biased media are highly influential anti-social factors that influence tourist decision making (TDM) negatively. Generally, way old terrorism incidents of Kashmir are exaggerated by many media houses, and fake news is designed for viewers, mainly for their TRP and other interests. According to results, anti-social factors such as terrorism and biased media have changed the tourists' decision making and their perception drastically regarding the brand of Kashmir as a secure destination.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45652318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection 基于卷积神经网络的AL-DDoS攻击自动诊断系统
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.305242
F. Abdullayeva
{"title":"Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection","authors":"F. Abdullayeva","doi":"10.4018/ijcwt.305242","DOIUrl":"https://doi.org/10.4018/ijcwt.305242","url":null,"abstract":"Distributed denial of service (DDoS) attacks are one of the main threats to information security. The purpose of DDoS attacks at the network (IP) and transport (TCP) layers is to consume the network bandwidth and deny service to legitimate users of the target system. Application layer DDoS attacks (AL-DDoS) can be organized against many different applications. Many of these attacks target HTTP, in which case their goal is to deplete the resources of web services. Various schemes have been proposed to detect DDoS attacks on network and transport layers. There are very few works being done to detect AL-DDoS attacks. The development of an intelligent system automatically detecting AL-DDoS attacks in advance is very necessary. In this paper to detect AL-DDoS attacks a deep learning model based on the Convolutional Neural Network is proposed. To simulate the AL-DDoS attack detection process, while in testing of the model on CSE-CIC-IDS2018 DDoS and CSIC 2010 datasets, 0.9974 and 0.9059 accuracy values were obtained, respectively.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70454213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Discriminating Accuracy Rate of DDoS Attacks and Flash Events 提高DDoS攻击和Flash事件的识别准确率
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2021-10-01 DOI: 10.4018/ijcwt.2021100102
Sahareesh Agha, O. Rehman, Ibrahim M. H. Rahman
{"title":"Improving Discriminating Accuracy Rate of DDoS Attacks and Flash Events","authors":"Sahareesh Agha, O. Rehman, Ibrahim M. H. Rahman","doi":"10.4018/ijcwt.2021100102","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100102","url":null,"abstract":"Internet security has become a big issue with the passage of time. Among many threats, the distributed denial-of-service (DDoS) attack is the most frequent threat in the networks. The purpose of the DDoS attacks is to interrupt service availability provided by different web servers. This results in legitimate users not being able to access the servers and hence facing denial of services. On the other hand, flash events are a high amount of legitimate users visiting a website due to a specific event. Consequences of these attacks are more powerful when launched during flash events, which are legitimate traffic and cause a denial of service. The purpose of this study is to build an intelligent network traffic classification model to improve the discrimination accuracy rate of DDoS attacks from flash events traffic. Weka is adopted as the platform for evaluating the performance of a random forest algorithm.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"25 1","pages":"21-42"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84665425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework 减轻云环境中的网络攻击:硬件支持的多点概念框架
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2021-10-01 DOI: 10.4018/ijcwt.2021100103
Jitendra Singh
{"title":"Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework","authors":"Jitendra Singh","doi":"10.4018/ijcwt.2021100103","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100103","url":null,"abstract":"Involvement of multiple cloud providers enhances the security complexity in cloud computing. Despite engaging best in class human and hardware resources, cyber-attacks in cloud paradigm continue to rise. This work aims to explore the cloud vulnerabilities that arise due to the multiple entry points. Underlying security threats are categorized into resources at providers' end, hardware security, transmission security, process security, and endpoint security. To mitigate the cyber-attacks in cloud, this work proposed a comprehensive multi-point-based framework that leverages the underlying hardware to strengthen the security at the user's end, internet service provider's end, and at the cloud data center. Security is further fortified by including the process level interaction at terminals. Framework is advanced enough to accommodate the vulnerable points of a system and a network. With the implementation of the proposed system, potential attacks can be detected during early state of penetration.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"11 1","pages":"43-57"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81187412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International Law and Cyberoperations: French View 国际法与网络行动:法国观点
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2021-10-01 DOI: 10.4018/ijcwt.2021100101
Martina Šmuclerová
{"title":"International Law and Cyberoperations: French View","authors":"Martina Šmuclerová","doi":"10.4018/ijcwt.2021100101","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100101","url":null,"abstract":"Foreign cyberattacks and interferences are becoming more frequent and sophisticated. In the continued absence of a general consensus regarding the applicability of concrete international legal rules in the domain of cybersecurity, individual States are beginning to determine unilaterally their national positions. The article introduces and critically assesses the national strategy of France published in late 2019 in light of current international law and further developments in 2020. France confirms the validity of current international legal norms and raises challenging and innovative legal points for an efficient update such as the right to respond to any unlawful cyberoperation that targets France, right to preemptive self-defence, and violation of the due diligence principle. The mission of the article is to evaluate the document as an important source of impetus and the potential of its impact in international law of cybersecurity.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"62 1","pages":"1-20"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80490772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Islamists vs. Far Right Extremists: Insights Derived From Data Mining 伊斯兰主义者与极右翼极端分子:来自数据挖掘的见解
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2021-10-01 DOI: 10.4018/ijcwt.2021100105
Yeslam Al‐Saggaf, Patrick F. Walsh
{"title":"Islamists vs. Far Right Extremists: Insights Derived From Data Mining","authors":"Yeslam Al‐Saggaf, Patrick F. Walsh","doi":"10.4018/ijcwt.2021100105","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100105","url":null,"abstract":"In this study, a data mining technique, specifically a decision tree, was applied to look at the similarities and differences between Islamists and Far Right extremists in the Profiles of Individual Radicalisation in the United States (PIRUS) dataset. The aim was to identify differences and similarities across various groups that may highlight overlaps and variations across both Islamists and Far Right extremists. The data mining technique analysed data in the PIRUS dataset according to the PIRUS codebook's grouping of variables. The decision tree technique generated a number of rules that provided insights about previously unknown similarities and differences between Islamists and Far Right extremists. This study demonstrates that data mining is a valuable approach for shedding light on factors and patterns related to different forms of violent extremism.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":"74-92"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82840049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global Terrorism as a Virus: Pathogenesis of Evildoing 作为病毒的全球恐怖主义:恶行的发病机制
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2021-10-01 DOI: 10.4018/ijcwt.2021100104
Primavera Fisogni
{"title":"Global Terrorism as a Virus: Pathogenesis of Evildoing","authors":"Primavera Fisogni","doi":"10.4018/ijcwt.2021100104","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100104","url":null,"abstract":"Two decades after the twin towers collapsed, the identification of global terrorism still remains an open question for everyone. However, since 9/11, the trope of the virus entered the scholarly discourses as well as the sociopolitical debate. This investigation is aimed at moving from the metaphor of terrorism as a virus to the virus-like pathogenic processes that affect terror threats. The proposal is to highlight the fluid identity of a main viral phenomenon of evildoing, according to a strict dialogue with the microbiological domain. New lenses are needed. As the author argues, systemic thinking better suits this subject matter than traditional linear thinking. The author will seek to highlight the development of global terrorism in terms of the biological mechanism of the virus's life (pathogenesis). Finally, it will be assumed that through the subject matter of global threat philosophy can improve the understanding of a dynamic principle of identity suitable to living entities/open systems.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"9 1","pages":"58-73"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79671276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信