International Journal of Cyber Warfare and Terrorism最新文献

筛选
英文 中文
Cyber Hygiene in Health Care Data Breaches 医疗保健数据泄露中的网络卫生
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/IJPHIM.2018010103
Jomin George, A. Emmanuel
{"title":"Cyber Hygiene in Health Care Data Breaches","authors":"Jomin George, A. Emmanuel","doi":"10.4018/IJPHIM.2018010103","DOIUrl":"https://doi.org/10.4018/IJPHIM.2018010103","url":null,"abstract":"This article describes how data breaches have become the norm, as highlighted by the significant number of breaches experienced by healthcare providers. These breaches have led to the scrutiny of cybersecurity technologies, protocols and strategies applied in the health care sector. As such, this article will explore the cyber security available in health care that is used and can be used to deter data breaches. Health care sectors are currently looking on different technologies and strategies to prevent and secure the patient information from data hackers. But some of these techniques have been effective, and some have not.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"28 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75274424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Cyberattacks 网络攻击研究综述
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-7189-6.CH008
Gaganjot Kaur Saini, M. Halgamuge, Pallavi Sharma, James Stephen Purkis
{"title":"A Review on Cyberattacks","authors":"Gaganjot Kaur Saini, M. Halgamuge, Pallavi Sharma, James Stephen Purkis","doi":"10.4018/978-1-5225-7189-6.CH008","DOIUrl":"https://doi.org/10.4018/978-1-5225-7189-6.CH008","url":null,"abstract":"Research questions remain to be answered in terms of discovering how security could be provided for different resources, such as data, devices, and networks. Most organizations compromise their security measures due to high budgets despite its primary importance in today's highly dependent cyber world and as such there are always some loopholes in security systems, which cybercriminals take advantage of. In this chapter, the authors have completed an analysis of data obtained from 31 peer-reviewed scientific research studies (2009-2017) describing cybersecurity issues and solutions. The results demonstrated that the majority of applications in this area are from the government and the public sector (17%) whereas transportation and other areas have a minor percentage (6%). This study determined that the government sector is the main application area in cybersecurity and is more susceptible to cyber-attacks whereas the wireless sensor network and healthcare areas are less exposed to attack.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"28 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73477807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
What We Know and What Else We Need to Do to Address the Problem of Violent Extremism Online 我们知道什么,我们还需要做些什么来解决网络暴力极端主义的问题
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch095
Majeed Khader
{"title":"What We Know and What Else We Need to Do to Address the Problem of Violent Extremism Online","authors":"Majeed Khader","doi":"10.4018/978-1-7998-2466-4.ch095","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch095","url":null,"abstract":"This concluding chapter is an attempt made to summarise and analyse the chapters provided by the various authors in this book. The analysis used in this chapter is based on a public health prevention model created by Quick, Quick, Nelson, and Hurrell (1997). The value of this approach is the systemic prevention angle that it undertakes to examine problems and solutions.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"77 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77523073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed System Implementation Based on “Ants Feeding Birds” Algorithm 基于“蚂蚁喂鸟”算法的分布式系统实现
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch047
Preeti Mulay, Krishna Patel, Hector Gómez Gauchía
{"title":"Distributed System Implementation Based on “Ants Feeding Birds” Algorithm","authors":"Preeti Mulay, Krishna Patel, Hector Gómez Gauchía","doi":"10.4018/978-1-7998-2466-4.ch047","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch047","url":null,"abstract":"Evolving technologies are intricately woven into the fabric of social and institutional systems. With the invent of “Internet of Everything (IoE)” concept it is realistic now to employ animals and or humans to transmit details electronically. IoE concepts with sensor technology can prove wonders in any domain for that matter starting from eFarming, eHealth, eCare and what not. Humans can transform electronics by using various eConnected gadgets also motivated due to or based on “Nature Inspired Algorithms”. The confluence of IT, psychology with non-IT systems will be part of new generation's life. Such collaborative concept can be implemented practically with the help of “Cloud-to-Dew-Computing” based technologies. To include so many concepts together, it is essential to concentrate also on Cyber Security and Risk associated with such conceptual implementation. Dew-Computing at root levels will take care of Cyber Security effectually. Dew-Computing being backend support of Distributed System, can process multiple entities resourcefully. “Animal Data Interchange Standards” are very well considered innovative business opportunity these days and for years to come. These standards have started their work focusing on the Dairy related animal standard. Every dairy animal should enjoy life to remain healthy and more productive. Incremental Learning about Animal Life Data and Animal Identification, behavior, seasonal-changes, health etc. can be easily achieved with IoE.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"27 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83672253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Communicating and Marketing of Radicalism 激进主义的传播与营销
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch039
D. McElreath, D. Doss, Leisa S. McElreath, A. Lindsley, Glenna Lusk, J. Skinner, Ashley Wellman
{"title":"The Communicating and Marketing of Radicalism","authors":"D. McElreath, D. Doss, Leisa S. McElreath, A. Lindsley, Glenna Lusk, J. Skinner, Ashley Wellman","doi":"10.4018/978-1-7998-2466-4.ch039","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch039","url":null,"abstract":"This article considers social media as a radicalization venue within the context of terrorism. The 2016 extremist/terrorist attack in Orlando, Florida showed the potential of an ISIS type extremist organization to leverage social media toward a lethal outcome within American society. While the ISIS organization originated overseas in a culture of which mainstream American society is unfamiliar, it is in many ways remarkable the level of success they quickly achieved connecting globally. Their efforts reflect the potential of social media to market a message of radicalism worldwide toward generating murderous converts who are willing to travel to join the fight or attack at home. Given these notions, this article considers the use of social media as an extremist cyber-recruitment tool.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"73 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80578024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Terrorism Effects on Businesses Post 9/11 9/11后恐怖主义对企业的影响
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/ijcwt.2020010102
Mariah Talia Solis, Jessica Pearson, Deirdre P. Dixon, Abigail Blanco, Raymond Papp
{"title":"Terrorism Effects on Businesses Post 9/11","authors":"Mariah Talia Solis, Jessica Pearson, Deirdre P. Dixon, Abigail Blanco, Raymond Papp","doi":"10.4018/ijcwt.2020010102","DOIUrl":"https://doi.org/10.4018/ijcwt.2020010102","url":null,"abstract":"Discussions regarding terrorism are more relevant today than ever before. Terror threats can take on many forms from physical violence against military forces, individual companies, and ordinary citizens, to actions against infrastructure, to cyber terrorism. These forms of terror and others, in a number of ways, threaten the physical and financial safety of people around the world. The purpose of this qualitative research study is to evaluate the effects of terrorism—particularly the attacks on September 11, 2001—on U.S. enterprises in the period since the attacks. Utilizing interviews with representatives from various industries, the authors found that employees with long company histories believe their companies have implemented changes regarding their security measures as a safeguard against possible future terrorist attacks. The research findings revealed that while businesses have made changes in their use of technology to change their (1) cybersecurity, (2) training methods, and (3) hiring processes, there remains a gap in understanding the efficacy and efficiency of these changes. Though the September 11 attacks raised the concerns regarding terrorism overall and formed the genesis for thinking about the effects of terrorism, the authors found that interviewees had limited knowledge of how terrorist activities truly affected their business, and identified a strong need to empirically study the technology changes implemented in the past two decades as a response to terrorism, and a need for a thorough sharing of knowledge within the cybersecurity industry to other businesses.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"120 1","pages":"15-33"},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87725227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advances in Digital Forensics Frameworks and Tools 数字取证框架和工具的进展
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch010
M. Abulaish, Nur Al Hasan Haldar
{"title":"Advances in Digital Forensics Frameworks and Tools","authors":"M. Abulaish, Nur Al Hasan Haldar","doi":"10.4018/978-1-7998-2466-4.ch010","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch010","url":null,"abstract":"Digital forensics science is a well-known initiative to unearth computer-assisted crimes. The thriving criminal activities using digital media have changed the typical definition of a traditional crime. Meanwhile, the means and targets of criminal activities have been transformed in a broader context due to the diverse nature of offenses associated with the multiple crime categories, affecting the way of investigations as well. In order to withstand the difficulties caused due to the crime complexity, forensics investigation frameworks are being tuned to adjust with the nature and earnestness of the felonies being committed. This article presents an in-depth comparative survey of fourteen popular and most cited digital forensics process models and various forensics tools associated with different phases of these models. The relationships among these forensics process models and their evolutions are analyzed and a graph-theoretic approach is presented to rank the existing process models to facilitate investigators in selecting an appropriate model for their investigation tasks.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"39 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88492024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Next Generation of Scientific-Based Risk Metrics 新一代基于科学的风险度量
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch099
Lanier A Watkins, J. Hurley
{"title":"The Next Generation of Scientific-Based Risk Metrics","authors":"Lanier A Watkins, J. Hurley","doi":"10.4018/978-1-7998-2466-4.ch099","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch099","url":null,"abstract":"One of the major challenges to an organization achieving a certain level of preparedness to “effectively” combat existing and future cyber threats and vulnerabilities is its ability to ensure the security and reliability of its networks. Most of the existing efforts are quantitative, by nature, and limited solely to the networks and systems of the organization. It would be unfair to not acknowledge that for sure some progress has been achieved in the way that organizations, as a whole, are now positioning themselves to address the threats (GAO 2012). Unfortunately, so have the skill sets and resource levels improved for attackers--they are increasingly getting better at achieving the unwanted access to organizations' information assets. In large part the authors believe that some of this is due to the failure by methods to assess the overall vulnerability of the networks. In addition, significant levels of threats and vulnerabilities beyond organizations' networks and systems are not being given the level of attention that is warranted. In this paper, the authors propose a more comprehensive approach that enables an organization to more realistically assess its “cyber maturity” level in hope of better positioning itself to address existing and new cyber threats. The authors also propose the need to better understand another missing critical piece to the puzzle--the reliability and security of networks in terms of scientific risk-based metrics (e.g., the severity of individual vulnerabilities and overall vulnerability of the network). Their risk-based metrics focus on the probability of compromise due to a given vulnerability; employee non-adherence to company cyber-based policies; insider threats. They are: (1) built on the CVSS Base Score which is modified by developing weights derived from the Analytic Hierarchy Process (AHP) to make the overall score more representative of the impact the vulnerability has on the global infrastructure, and (2) rooted in repeatable quantitative characteristics (i.e., vulnerabilities) such as the sum of the probabilities that devices will be compromised via client-side or server-side attacks stemming from software or hardware vulnerabilities. The authors will demonstrate the feasibility of their method by applying their approach to a case study and highlighting the benefits and impediments which result.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"58 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83944522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slacktivism, Supervision, and #Selfies 懒汉行动主义、监督和#自拍
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch043
Elisabeth H. Buck
{"title":"Slacktivism, Supervision, and #Selfies","authors":"Elisabeth H. Buck","doi":"10.4018/978-1-7998-2466-4.ch043","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch043","url":null,"abstract":"Since its original development for use in literary studies by German scholar Hans Robert Jauss in the late 1960s, reception theory has been successfully applied to fields as diverse as media studies, communications, and art history; its efficacy within rhetoric and composition pedagogy, however, has been less fully explored. I argue in this essay that reception theory can provide a meaningful way to understand and discuss social media composing practices, especially as a lens for thinking about why and how we participate in social media as both readers and writers in the 21st century. This essay thus examines the three “aesthetic experiences” of Jauss's reception theory—catharsis, aisthesis, and poiesis— which describe the ways that audiences derive satisfaction from engaging with texts. I apply each aesthetic concept to a corresponding mode of social media composition: practices of social media-based activism, regulation of content on social media, as well as the act of creating “selfies.” These applications stand as potential entry points for classroom discussion about how social media draws its users into producing a response. The “aesthetic experiences” represent ways to look at composing practices on social media cohesively, but they also give language to how individual social media users gain enjoyment from participating with these sites. I offer specific strategies for incorporating reception theory in a classroom context, and conclude that this approach helps students think more specifically about the intricacies and limitations of audience(s)—important recognitions for anyone who produces content in social media environments.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"50 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89634663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jihadist Propaganda on Social Media 圣战分子在社交媒体上的宣传
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch085
Ahmed Al-Rawi, J. Groshek
{"title":"Jihadist Propaganda on Social Media","authors":"Ahmed Al-Rawi, J. Groshek","doi":"10.4018/978-1-7998-2466-4.ch085","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch085","url":null,"abstract":"This article focuses on ISIS followers on Twitter in an effort to understand the nature of their social media propaganda. The research study provides unique insight into one of the largest data sets that investigates ISIS propaganda efforts on Twitter by examining over 50 million tweets posted by more than 8 million unique users that referenced the keywords “ISIS” or “ISIL.” The authors then searched this corpus for eight keywords in Arabic that included terms of support for ISIS and the names of different Al-Qaeda leaders. A mixed research method was used, and the findings indicate that ISIS activity on Twitter witnessed a gradual decline, but the group was still able to post different types of tweets to maintain its online presence. Also, the feud between ISIS and Al-Qaeda was intense, ongoing, and prevalent in online interactions among ISIS followers. The study provides an understanding of using big data to better grasp the propaganda activities of terrorist groups.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"54 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75424756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信