Information & Security: An International Journal最新文献

筛选
英文 中文
OSINT on the Dark Web: Child Abuse Material Investigations 暗网上的OSINT:儿童虐待材料调查
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5302
J. Rajamäki
{"title":"OSINT on the Dark Web: Child Abuse Material Investigations","authors":"J. Rajamäki","doi":"10.11610/isij.5302","DOIUrl":"https://doi.org/10.11610/isij.5302","url":null,"abstract":"The Dark Web allows users to hide their identity while browsing or sending information, providing an ideal environment for transferring information, goods, and services with potentially illegal intentions. Therefore, Law Enforcement Agencies (LEAs) are interested in Open Source INTelligence (OSINT) on the Dark Web. LEAs need appropriate techniques to find darknet sites used by criminals. This article examines online child sexual exploitation and the various OSINT automation tools that can be exploited on the Dark Web. Additionally, we consider OSINT on the Dark Web, paying attention to the challenges LEAs face when investigating crimes related to child abuse material (CAM). The biggest challenges are related to data storage and the criminal investigation itself. CAM may not be recorded or examined except by an LEA officer specifically designated and trained for this purpose. The study examines how OSINT could be implemented without exposing researchers to the contents of CAM. The method could be to focus the inquiry on already known links and sites. This has challenges, but a bigger number of LEAs could carry out such an inquiry, and the storage of such data would not be illegal.","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133280669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain 治理咨询服务和工具:网络领域协作网络化组织的过渡规划和实施
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5309
I. Mladenova, Velizar Shalamanov, Antoniya Shalamanova-Filipova
{"title":"Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain","authors":"I. Mladenova, Velizar Shalamanov, Antoniya Shalamanova-Filipova","doi":"10.11610/isij.5309","DOIUrl":"https://doi.org/10.11610/isij.5309","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122783971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Unified European Cyber Incident and Crisis Management Ontology 面向统一的欧洲网络事件和危机管理本体
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5303
Vlad Posea, George Sharkov, Adrian Baumann, Georgios Chatzichristos
{"title":"Towards Unified European Cyber Incident and Crisis Management Ontology","authors":"Vlad Posea, George Sharkov, Adrian Baumann, Georgios Chatzichristos","doi":"10.11610/isij.5303","DOIUrl":"https://doi.org/10.11610/isij.5303","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125372708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector ECHO预警系统作为预防能源行业网络犯罪的工具
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5301
Casper Almén, Nicholas Hagström, J. Rajamäki
{"title":"ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector","authors":"Casper Almén, Nicholas Hagström, J. Rajamäki","doi":"10.11610/isij.5301","DOIUrl":"https://doi.org/10.11610/isij.5301","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126382961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Factor, Resilience, and Cyber/Hybrid Influence 人的因素,弹性和网络/混合影响
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5315
A. Ronchi
{"title":"Human Factor, Resilience, and Cyber/Hybrid Influence","authors":"A. Ronchi","doi":"10.11610/isij.5315","DOIUrl":"https://doi.org/10.11610/isij.5315","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130475939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preserving Privacy of Security Services in the SecaaS Model SecaaS模型中安全服务的隐私保护
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5304
Piotr Jurgała, T. Kurek, M. Niemiec
{"title":"Preserving Privacy of Security Services in the SecaaS Model","authors":"Piotr Jurgała, T. Kurek, M. Niemiec","doi":"10.11610/isij.5304","DOIUrl":"https://doi.org/10.11610/isij.5304","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132488040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Persistent Need to Reform Cyber Security Services: A Case Study on France 网络安全服务改革的持续需求:以法国为例
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.3705
Houssam Zenati
{"title":"The Persistent Need to Reform Cyber Security Services: A Case Study on France","authors":"Houssam Zenati","doi":"10.11610/isij.3705","DOIUrl":"https://doi.org/10.11610/isij.3705","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116330998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Piloting the ECHO e-Skills and Training Toolkit 试用ECHO的电子技能和培训工具包
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5311
Ilona Frisk, Ilkka Tikanmäki, Harri Ruoslahti
{"title":"Piloting the ECHO e-Skills and Training Toolkit","authors":"Ilona Frisk, Ilkka Tikanmäki, Harri Ruoslahti","doi":"10.11610/isij.5311","DOIUrl":"https://doi.org/10.11610/isij.5311","url":null,"abstract":"many","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guidelines on a Mobile Security Lab Course 移动安全实验室课程指南
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.3703
I. Androulidakis
{"title":"Guidelines on a Mobile Security Lab Course","authors":"I. Androulidakis","doi":"10.11610/isij.3703","DOIUrl":"https://doi.org/10.11610/isij.3703","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129016502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage 一种提高网络视频流安全防范个人数据泄露的方法
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5306
Iliyan R. Iliev, I. Blagoev
{"title":"An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage","authors":"Iliyan R. Iliev, I. Blagoev","doi":"10.11610/isij.5306","DOIUrl":"https://doi.org/10.11610/isij.5306","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129679613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信