International Journal of Cyber Warfare and Terrorism最新文献

筛选
英文 中文
Toward Approaches to Big Data Analysis for Terroristic Behavior Identification 恐怖主义行为识别的大数据分析方法研究
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch060
Y. Kostyuchenko, M. Yuschenko
{"title":"Toward Approaches to Big Data Analysis for Terroristic Behavior Identification","authors":"Y. Kostyuchenko, M. Yuschenko","doi":"10.4018/978-1-7998-2466-4.ch060","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch060","url":null,"abstract":"Paper aimed to consider of approaches to big data (social network content) utilization for understanding of social behavior in the conflict zones, and analysis of dynamics of illegal armed groups. Analysis directed to identify of underage militants. The probabilistic and stochastic methods of analysis and classification of number, composition and dynamics of illegal armed groups in active conflict areas are proposed. Data of armed conflict – antiterrorist operation in Donbas (Eastern Ukraine in the period 2014-2015) is used for analysis. The numerical distribution of age, gender composition, origin, social status and nationality of child militants among illegal armed groups has been calculated. Conclusions on the applicability of described method in criminological practice, as well as about the possibilities of interpretation of obtaining results in the context of study of terrorism are proposed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"7 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83191474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCADA Systems Cyber Security for Critical Infrastructures 关键基础设施的SCADA系统网络安全
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch028
Suhaila Ismail, E. Sitnikova, J. Slay
{"title":"SCADA Systems Cyber Security for Critical Infrastructures","authors":"Suhaila Ismail, E. Sitnikova, J. Slay","doi":"10.4018/978-1-7998-2466-4.ch028","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch028","url":null,"abstract":"Past cyber-attacks on Supervisory Control and Data Acquisition (SCADA) Systems for Critical infrastructures have left these systems compromised and caused financial and economic problems. Deliberate attacks have resulted in denial of services and physical injury to the public in certain cases. This study explores the past attacks on SCADA Systems by examining nine case studies across multiple utility sectors including transport, energy and water and sewage sector. These case studies will be further analysed according to the cyber-terrorist decision-making theories including strategic, organisational and psychological theories based on McCormick (2000). Next, this study will look into cyber-terrorist capabilities in conducting attacks according to Nelson's (1999) approach that includes simple-unstructured, advance-structured and complex-coordinated capabilities. The results of this study will form the basis of a guideline that organisations can use so that they are better prepared in identifying potential future cybersecurity attacks on their SCADA systems.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"7 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88811875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing Organized Crime 管理有组织犯罪
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-1974-4.CH003
Roberto Musotto, Davide Di Fatta, W. Vesperi, G. Morabito, Vittorio D’Aleo, S. Bue
{"title":"Managing Organized Crime","authors":"Roberto Musotto, Davide Di Fatta, W. Vesperi, G. Morabito, Vittorio D’Aleo, S. Bue","doi":"10.4018/978-1-5225-1974-4.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-1974-4.CH003","url":null,"abstract":"This chapter describes the way in which organised crime networks are structured and operate. Every general manager, no matter which kind of business he/she deals with, has to transform the daily chaos of events and decisions into an orderly way of sizing up the firm's position in its environment. At first, this chapter focuses on organised crime networks: how they are shaped and how they differ from others business. Secondly, how such a structure protects itself from exterior threats and how it moves and operates in a market among other legal and illegal firms and networks.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"9 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75534294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Forensics in the Context of the Internet of Things 物联网背景下的数字取证
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-5742-5.CH011
Mariya Shafat Kirmani, M. T. Banday
{"title":"Digital Forensics in the Context of the Internet of Things","authors":"Mariya Shafat Kirmani, M. T. Banday","doi":"10.4018/978-1-5225-5742-5.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-5742-5.CH011","url":null,"abstract":"The pervasive nature of IoT, envisioned with the characteristics of diversity, heterogeneity, and complexity, is diluting the boundaries between the physical and digital worlds. IoT being widely distributed qualifies it as the breeding ground for cyber-attacks. Although remarkable work is being done to ensure security in IoT infrastructure, security vulnerabilities persist. The IoT infrastructure can either be used as a direct target in a cyber-attack or exploited as a tool to carry a cyber-attack. In either case, the security measures in IoT infrastructure is compromised. The enormous IoT data is sensitive that can act as a gold mine to both the criminals for illicit exploitation or investigators to act as digital witness. IoT forensics help the investigators to acquire intelligence from this smart infrastructure to reconstruct the historical events occurred. However, due to sophisticated IoT architecture, the digital investigators face myriad challenges in IoT-related investigations using existing investigation methodologies and, hence, demand a separate dedicated forensic framework.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"4 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86735540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
English Speaking Countries and the Culture of Fear 英语国家和恐惧文化
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch003
M. Korstanje
{"title":"English Speaking Countries and the Culture of Fear","authors":"M. Korstanje","doi":"10.4018/978-1-7998-2466-4.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch003","url":null,"abstract":"The direct intervention or full-scare led wars are ideologically legitimized by the needs of bringing the ideals of American democracy, liberty, freedom and mobility. However, at the bottom, this globalized culture of fear hidden dark interests associated to exploitation. Paradoxically, these types of interventions suggest that terrorism needs the use of force, but in so doing, impotence and deprivation surface. Undoubtedly, Anglo and Latin worlds have created, according to their cultural matrices, diverse tactics to adapt to environment, as the form of understanding the future. While Anglo-countries developed a fascinating attraction to risk and future, the sense of predestination alludes to what today has not occurred yet. Technology only helps to mitigate the temporal effects of uncertainty triggered by the orientation to future.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"66 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89576108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybercrime as a Threat to Zimbabwe's Peace and Security 网络犯罪对津巴布韦和平与安全构成威胁
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-5927-6.CH014
Jeffrey Kurebwa, Jacqueline Rumbidzai Tanhara
{"title":"Cybercrime as a Threat to Zimbabwe's Peace and Security","authors":"Jeffrey Kurebwa, Jacqueline Rumbidzai Tanhara","doi":"10.4018/978-1-5225-5927-6.CH014","DOIUrl":"https://doi.org/10.4018/978-1-5225-5927-6.CH014","url":null,"abstract":"The purpose of this study was to understand the effects of cybercrime to Zimbabwe's peace and security. In the 21st century, cybercrime has become an international threat. This has necessitated many states to enact legislation and other measures to curb cybercrime. Primary data was gathered through key informant interviews, while documentary search was used to review scholarly literature on the subject. Key informants for the study were drawn from institutions that deal in combating cybercrime. Zimbabwe does not have adequate and effective legislative instruments to combat cybercrime. Cybercrime is a threat to peace and security as it can be used to bring down critical infrastructure and disrupt communication networks of the country. Some of the measures identified to curbing cybercrime include prevention and awareness, training and development, development of new technology and introduction of new laws, and updating of current and introduction of new legislations.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"09 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90100073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ethos Construction, Identification, and Authenticity in the Discourses of AWSA AWSA话语中的精神建构、认同与真实性
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch096
Samaa Gamie
{"title":"Ethos Construction, Identification, and Authenticity in the Discourses of AWSA","authors":"Samaa Gamie","doi":"10.4018/978-1-7998-2466-4.ch096","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch096","url":null,"abstract":"The chapter explores the complex emergent feminist ethos in two virtual spaces created by the San Francisco chapter of AWSA—the Arab Women's Solidarity Association International, an Arab women's activist group. First, the chapter discusses ethos and identity construction in cyberspace. Second, the chapter analyzes AWSA's cyber discourses to uncover the characteristics of its feminist ethos and the opportunities allowed or lost for authenticity and the role of anonymity in constructing its feminist ethos. Third, the chapter questions whether anonymity allows for the critical examination of the discourses and ideologies of the powerful in addition to the creation of a sustainable counter-hegemonic discourse or whether it heightens the threat of homogeneity and streamlining in cyberspace. The chapter, in its conclusion, calls for a critical investigation of the potential of the digital domain to challenge the concentration of power in virtual spaces and uncover frameworks through which revolutionary discourses can be sustained and disseminated.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"25 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73039585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling Cyber-Crime Protection Behaviour among Computer Users in the Context of Bangladesh 以孟加拉为背景,模拟电脑使用者的网络犯罪保护行为
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-1944-7.CH014
Imran Mahmud, Thurasamy Ramayah, Md. Mahedi Hasan Nayeem, S. Islam, P. L. Gan
{"title":"Modelling Cyber-Crime Protection Behaviour among Computer Users in the Context of Bangladesh","authors":"Imran Mahmud, Thurasamy Ramayah, Md. Mahedi Hasan Nayeem, S. Islam, P. L. Gan","doi":"10.4018/978-1-5225-1944-7.CH014","DOIUrl":"https://doi.org/10.4018/978-1-5225-1944-7.CH014","url":null,"abstract":"This study examined the impact of security champion and security training on protection behaviour in the context of IT service oriented SMEs in Bangladesh. Drawing upon protection motivation theory, this study examined the influence of security training on threat appraisal and influence of security training on coping appraisal which leads to protection behaviour via protection motivation. Data was collected from six different IT service oriented organizations with a sample size of 147 by survey questionnaire. Data was analysed using partial least squares (PLS) technique and result shows that perceived value of data, security training and threat appraisal are strong predictors of threat appraisal, protection motivation and protection behaviour. Theoretical contribution and practical implications of this research are also discussed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"27 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88722172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Why Is ISIS so Psychologically Attractive? 为什么ISIS在心理上如此有吸引力?
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch067
Loo Seng Neo, Priscilla Shi, Leevia Dillon, Jethro Tan, Yingmin Wang, Danielle Gomes
{"title":"Why Is ISIS so Psychologically Attractive?","authors":"Loo Seng Neo, Priscilla Shi, Leevia Dillon, Jethro Tan, Yingmin Wang, Danielle Gomes","doi":"10.4018/978-1-7998-2466-4.ch067","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch067","url":null,"abstract":"Since the Islamic State in Iraq and Syria (ISIS) became prominent after the release of beheading videos of its prisoners, many have been confused over how to describe this development in relation to the way the Internet is exploited by violent extremists. While the element of surprise and horror lingered on the minds of many observers, a more pressing question facing the law enforcement is: how does ISIS attract foreign fighters using such videos and online propaganda? As countries around the globe grapple with the security threat posed by their nationals travelling to join ISIS, the need to be au fait with the appeal of ISIS and its ability to use the Internet to recruit new members and sympathisers becomes even more apparent. This chapter uses a behavioural sciences lens to explicate how individual and organisational motivational factors may contribute to the overall appeal of joining ISIS.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"62 8 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88837820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Experience of Social Networks Exploration for Comparative Analysis of Narratives of Foreign Members of Armed Groups 武装团体外籍成员叙事比较分析的社会网络探索经验
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch097
Y. Kostyuchenko, M. Yuschenko, I. Artemenko
{"title":"On Experience of Social Networks Exploration for Comparative Analysis of Narratives of Foreign Members of Armed Groups","authors":"Y. Kostyuchenko, M. Yuschenko, I. Artemenko","doi":"10.4018/978-1-7998-2466-4.ch097","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch097","url":null,"abstract":"This article contains a comparison of narratives of foreign members of armed groups of The Islamic State of Iraq; the Levant; the Lugansk and Donetsk People's Republics in Syria and Ukraine. This data was collected in 2015-2016 using social networks and telecommunications which are presented in the article. The probabilistic and stochastic methods of analysis and classification of data from social networks were used for the identification of active members of illegal armed groups, and for analysis its number, composition and dynamics in active conflict areas. Some structural, figurative and lexical features of 83 stories are discussed. Key similarities, anomalies and differences are determined. Ways of information dissemination using social networks and traditional media are described. Role of narratives is shown. Conclusions are proposed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"97 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80532107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信