首页 > 最新文献

The International Journal of Cybersecurity Intelligence and Cybercrime最新文献

英文 中文
Blockchain Security: Situational Crime Prevention Theory and Distributed Cyber Systems 区块链安全:情境犯罪预防理论与分布式网络系统
Pub Date : 2019-09-06 DOI: 10.52306/02020419tegr1675
Nicholas J. Blasco, Nicholas A. Fett
The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack the sidechain while mainchain assets can be withdrawn, along with the disconnect between the integrity of the sidechain and the value of the stolen assets are among the top disadvantages. The current study used a vulnerability analysis and theoretical mathematics based on situational crime prevention theory to highlight the attack vectors and prevention methods for these systems. Much of the analysis can be applied to any distributed system (e.g. blockchain network), particularly any supposedly trustless off-chain component. The equations developed in the current study will hold for any two chains that are bridged and pass value back and forth and provides evidence to suggest a public sidechain is likely not a viable option for scalability due to security concerns. Criminal strategies on blockchain networks in the digital realm are similar to criminal strategies in the physical realm; therefore, the application of criminology can lead to more efficient development and ultimately more effective security protocols.
作者为分析互联区块链网络的加密经济激励奠定了基础,并利用情境犯罪预防理论来解释如何开发更安全的系统。区块链网络利用较小的区块链(通常称为侧链)来提高大型网络的吞吐量。确定了使用侧链的几个缺点,这些缺点会对锁定在侧链上的资产造成重大风险。如果没有主链以验证出口的形式提供安全性,那么具有桥接或主链资产表示的侧链或状态通道将面临重大的攻击风险。在可以提取主链资产的情况下,无法以足够高的成本攻击侧链,以及侧链的完整性与被盗资产的价值之间的脱节是最大的缺点。本研究采用基于情境犯罪预防理论的脆弱性分析和理论数学,重点研究了这些系统的攻击载体和预防方法。大部分分析可以应用于任何分布式系统(例如区块链网络),特别是任何被认为不可信的链下组件。目前研究中开发的方程将适用于任何两条桥接并来回传递价值的链,并提供证据表明,出于安全考虑,公共侧链可能不是可扩展性的可行选择。数字领域区块链网络上的犯罪策略与物理领域的犯罪策略相似;因此,犯罪学的应用可以导致更有效的开发和最终更有效的安全协议。
{"title":"Blockchain Security: Situational Crime Prevention Theory and Distributed Cyber Systems","authors":"Nicholas J. Blasco, Nicholas A. Fett","doi":"10.52306/02020419tegr1675","DOIUrl":"https://doi.org/10.52306/02020419tegr1675","url":null,"abstract":"The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack the sidechain while mainchain assets can be withdrawn, along with the disconnect between the integrity of the sidechain and the value of the stolen assets are among the top disadvantages. The current study used a vulnerability analysis and theoretical mathematics based on situational crime prevention theory to highlight the attack vectors and prevention methods for these systems. Much of the analysis can be applied to any distributed system (e.g. blockchain network), particularly any supposedly trustless off-chain component. The equations developed in the current study will hold for any two chains that are bridged and pass value back and forth and provides evidence to suggest a public sidechain is likely not a viable option for scalability due to security concerns. Criminal strategies on blockchain networks in the digital realm are similar to criminal strategies in the physical realm; therefore, the application of criminology can lead to more efficient development and ultimately more effective security protocols.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123674948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Test of Structural Model for Fear of Crime in Social Networking Sites 社交网站犯罪恐惧的结构模型检验
Pub Date : 2019-09-01 DOI: 10.52306/02020219svzl9707
Seong-sik Lee, Kyung-shick Choi, Sinyong Choi, E. Englander
This study constructed a structural model which consists of social demographic factors, experience of victimization, opportunity factors, and social context factors to explain the public’s fear of crime on social networking sites (SNS). The model is based on the risk interpretation model, which predicts that these factors influence users’ fear of crime victimization. Using data from 486 university students in South Korea, an empirically-tested model suggests that sex and age have direct and significant effects on fear of victimization, supporting the vulnerability hypothesis. Among opportunity factors, the level of personal information and the number of offending peers have significant effects on fear of victimization through the medium of the perceived victimization risk, although the effect of SNS usage time is not significant. In addition, it was revealed that experience of victimization has a direct effect on fear of victimization. Furthermore, findings indicate that bridging social network has a direct and indirect positive effect on fear of victimization, and collective efficacy has an indirect effect on fear of victimization. Results show that incidents in SNS have the strongest effect on fear of victimization among various factors in this model without being mediated by the perceived victimization risk. Overall, this study supports a structural model for the fear of victimization.
本研究构建了一个包含社会人口因素、受害经历因素、机会因素和社会情境因素的结构模型来解释公众在社交网站上的犯罪恐惧。该模型基于风险解释模型,该模型预测这些因素会影响用户对犯罪受害的恐惧。利用来自韩国486名大学生的数据,一个经过实证检验的模型表明,性别和年龄对受害恐惧有直接而显著的影响,支持了脆弱性假说。在机会因素中,个人信息水平和犯罪同伴数量通过感知受害风险对受害恐惧有显著影响,而SNS使用时间的影响不显著。此外,研究还揭示了受害经历对受害恐惧有直接影响。此外,桥接性社会网络对受害恐惧有直接和间接的正向影响,集体效能对受害恐惧有间接的正向影响。结果表明,在该模型的各因素中,社交网络事件对受害恐惧的影响最大,而不受感知受害风险的调节。总体而言,本研究支持受害恐惧的结构模型。
{"title":"A Test of Structural Model for Fear of Crime in Social Networking Sites","authors":"Seong-sik Lee, Kyung-shick Choi, Sinyong Choi, E. Englander","doi":"10.52306/02020219svzl9707","DOIUrl":"https://doi.org/10.52306/02020219svzl9707","url":null,"abstract":"This study constructed a structural model which consists of social demographic factors, experience of victimization, opportunity factors, and social context factors to explain the public’s fear of crime on social networking sites (SNS). The model is based on the risk interpretation model, which predicts that these factors influence users’ fear of crime victimization. Using data from 486 university students in South Korea, an empirically-tested model suggests that sex and age have direct and significant effects on fear of victimization, supporting the vulnerability hypothesis. Among opportunity factors, the level of personal information and the number of offending peers have significant effects on fear of victimization through the medium of the perceived victimization risk, although the effect of SNS usage time is not significant. In addition, it was revealed that experience of victimization has a direct effect on fear of victimization. Furthermore, findings indicate that bridging social network has a direct and indirect positive effect on fear of victimization, and collective efficacy has an indirect effect on fear of victimization. Results show that incidents in SNS have the strongest effect on fear of victimization among various factors in this model without being mediated by the perceived victimization risk. Overall, this study supports a structural model for the fear of victimization.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123321336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Examining Perceptions of Online Harassment among Constables in England and Wales 调查英格兰和威尔士警察对网络骚扰的看法
Pub Date : 2019-02-01 DOI: 10.52306/02010319lfqz1592
Thomas J. Holt, J. R. Lee, Roberta Liggett, Karen Holt, A. Bossler
The ubiquity of the Internet and computer technology has enabled individuals to engage in bullying, threats, and harassing communications online. Limited research has found that local line officers may not view these offenses as serious compared to real world crimes despite their negative physical and emotional impact on victims. The perceptions of officers can produce poor interactions with victims during calls for service, particularly victim blaming, which can reduce citizens’ confidence in police agencies generally. However, local law enforcement agencies are increasingly mandated to respond to these cases, calling to question how their views may impact the community. This study examined the attitudinal and demographic factors associated with the negative views of online harassment and bullying within a sample of 1,348 constables from 34 local agencies across England and Wales. The study found that constables with negative views toward cybercrimes and worked in agencies with inconsistent messaging related to online crimes were more likely to view online harassment as less serious and believe that these offenses could be avoided by victims. The implications of this study for local police staff and command are discussed in detail.
无处不在的互联网和计算机技术使个人能够在网上进行欺凌、威胁和骚扰交流。有限的研究发现,尽管这些犯罪对受害者的身体和情感造成了负面影响,但与现实世界的犯罪相比,当地的警察可能并不认为这些犯罪严重。对警察的看法可能会在要求服务的电话中与受害者产生不良互动,特别是受害者指责,这可能会降低公民对警察机构的信心。然而,越来越多的地方执法机构被授权对这些案件作出回应,要求质疑他们的观点如何影响社区。这项研究调查了来自英格兰和威尔士34个地方机构的1348名警察,调查了与对网络骚扰和欺凌的负面看法相关的态度和人口因素。研究发现,对网络犯罪持负面看法的警察,以及在与网络犯罪有关的信息不一致的机构工作的警察,更有可能认为网络骚扰不那么严重,并认为受害者可以避免这些罪行。详细讨论了本研究对地方警察工作人员和指挥的影响。
{"title":"Examining Perceptions of Online Harassment among Constables in England and Wales","authors":"Thomas J. Holt, J. R. Lee, Roberta Liggett, Karen Holt, A. Bossler","doi":"10.52306/02010319lfqz1592","DOIUrl":"https://doi.org/10.52306/02010319lfqz1592","url":null,"abstract":"The ubiquity of the Internet and computer technology has enabled individuals to engage in bullying, threats, and harassing communications online. Limited research has found that local line officers may not view these offenses as serious compared to real world crimes despite their negative physical and emotional impact on victims. The perceptions of officers can produce poor interactions with victims during calls for service, particularly victim blaming, which can reduce citizens’ confidence in police agencies generally. However, local law enforcement agencies are increasingly mandated to respond to these cases, calling to question how their views may impact the community. This study examined the attitudinal and demographic factors associated with the negative views of online harassment and bullying within a sample of 1,348 constables from 34 local agencies across England and Wales. The study found that constables with negative views toward cybercrimes and worked in agencies with inconsistent messaging related to online crimes were more likely to view online harassment as less serious and believe that these offenses could be avoided by victims. The implications of this study for local police staff and command are discussed in detail.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115071168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cybercrime and Digital Forensics: Bridging the gap in Legislation, Investigation and Prosecution of Cybercrime in Nigeria 网络犯罪和数字取证:弥合尼日利亚网络犯罪立法、调查和起诉方面的差距
Pub Date : 2019-02-01 DOI: 10.52306/02010519zjrk2912
Kabir Mohammed, Y. Mohammed, A. Solanke
The advancement of Information and Communication Technologies (ICT) opens new avenues and ways for cybercriminals to commit crime. The primary goal of this paper is to raise awareness regarding gaps that exist with regards to Nigeria’s capabilities to adequately legislate, investigate and prosecute cases of cybercrimes. The major source of cybercrime legislation in Nigeria is an act of the National Assembly which is majorly a symbolic legislation rather than a full and active legislation. In perusing these avenues of inquiry, the authors seek to identify systemic impediments which hinder law enforcement agencies, prosecutors, and investigators from properly carrying out their duties as expected.
资讯及通讯科技的发展,为网络罪犯的犯罪活动开辟了新的途径和途径。本文的主要目标是提高人们对尼日利亚在充分立法、调查和起诉网络犯罪案件方面存在的差距的认识。尼日利亚网络犯罪立法的主要来源是国民议会的一项法案,这主要是一项象征性立法,而不是一项全面和积极的立法。在仔细研究这些调查途径时,作者试图找出阻碍执法机构、检察官和调查人员按预期适当履行其职责的系统性障碍。
{"title":"Cybercrime and Digital Forensics: Bridging the gap in Legislation, Investigation and Prosecution of Cybercrime in Nigeria","authors":"Kabir Mohammed, Y. Mohammed, A. Solanke","doi":"10.52306/02010519zjrk2912","DOIUrl":"https://doi.org/10.52306/02010519zjrk2912","url":null,"abstract":"The advancement of Information and Communication Technologies (ICT) opens new avenues and ways for cybercriminals to commit crime. The primary goal of this paper is to raise awareness regarding gaps that exist with regards to Nigeria’s capabilities to adequately legislate, investigate and prosecute cases of cybercrimes. The major source of cybercrime legislation in Nigeria is an act of the National Assembly which is majorly a symbolic legislation rather than a full and active legislation. In perusing these avenues of inquiry, the authors seek to identify systemic impediments which hinder law enforcement agencies, prosecutors, and investigators from properly carrying out their duties as expected.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The profile of the international cyber offender in the U.S. 国际网络罪犯在美国的档案
Pub Date : 2019-02-01 DOI: 10.52306/0201041yngg5534
Lora Hadzhidimova, B. Payne
This study explores the characteristics of international cyber offenders prosecuted in the U.S. Our findings to a large extent correspond with general studies about cyber offenders with a few important exceptions. First, the average age of the offenders in our study is slightly higher than others that do not focus exclusively on international offenders. Second, while this research confirms that China is among the leading country in committing cybercrimes when it comes to committing particular types of cybercrimes, the offenders come from other countries as well such as Romania, Estonia, Ukraine, South Africa, and Nigeria. Third, our results show that in each of the cases from the sample, the international offenders received prison sentences alone, or complemented with a fine or restitution. In addition, the sentence length of citizens of African countries is significantly higher than the ones of citizens of other geographic regions. Prison sentences for cyber frauds and identity thefts were also found to be much lengthier than sentences for other types of cybercrimes. Implications are provided.
本研究探讨了在美国被起诉的国际网络罪犯的特征。我们的发现在很大程度上与关于网络罪犯的一般研究相一致,但有一些重要的例外。首先,在我们的研究中,罪犯的平均年龄略高于其他不专门关注国际罪犯的研究。其次,虽然这项研究证实,在实施特定类型的网络犯罪时,中国是实施网络犯罪的主要国家之一,但罪犯也来自其他国家,如罗马尼亚、爱沙尼亚、乌克兰、南非和尼日利亚。第三,我们的结果表明,在样本中的每一个案件中,国际罪犯都只被判处监禁,或被罚款或赔偿。此外,非洲国家公民的刑期明显高于其他地理区域的公民。网络诈骗和身份盗窃的刑期也比其他类型的网络犯罪要长得多。提供了一些启示。
{"title":"The profile of the international cyber offender in the U.S.","authors":"Lora Hadzhidimova, B. Payne","doi":"10.52306/0201041yngg5534","DOIUrl":"https://doi.org/10.52306/0201041yngg5534","url":null,"abstract":"This study explores the characteristics of international cyber offenders prosecuted in the U.S. Our findings to a large extent correspond with general studies about cyber offenders with a few important exceptions. First, the average age of the offenders in our study is slightly higher than others that do not focus exclusively on international offenders. Second, while this research confirms that China is among the leading country in committing cybercrimes when it comes to committing particular types of cybercrimes, the offenders come from other countries as well such as Romania, Estonia, Ukraine, South Africa, and Nigeria. Third, our results show that in each of the cases from the sample, the international offenders received prison sentences alone, or complemented with a fine or restitution. In addition, the sentence length of citizens of African countries is significantly higher than the ones of citizens of other geographic regions. Prison sentences for cyber frauds and identity thefts were also found to be much lengthier than sentences for other types of cybercrimes. Implications are provided.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114162448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Awareness and Perception of Cybercrimes and Cybercriminals 对网络犯罪和网络罪犯的认识和认知
Pub Date : 2019-02-01 DOI: 10.52306/02010119uyib64
Hannarae Lee, Hyeyoung Lim
Awareness is a starting point to recognize, understand, or know a situation or fact, and the perception makes a difference in how to deal with it. Although the term cybercrime may not be new to the most public and the police, not all of them are well aware of the nature and extent of cybercrimes, cybercriminals, and cyber-victims, which in turn affects their perceptions of matters. The four papers in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime empirically examine these important topics and discuss policy implications.
意识是认识、理解或知道一种情况或事实的起点,而感知对如何处理它起着重要作用。虽然网络犯罪这个词对大多数公众和警察来说并不新鲜,但并不是所有人都很清楚网络犯罪、网络罪犯和网络受害者的性质和程度,这反过来影响了他们对问题的看法。本期《国际网络安全情报与网络犯罪杂志》的四篇论文对这些重要主题进行了实证研究,并讨论了政策影响。
{"title":"Awareness and Perception of Cybercrimes and Cybercriminals","authors":"Hannarae Lee, Hyeyoung Lim","doi":"10.52306/02010119uyib64","DOIUrl":"https://doi.org/10.52306/02010119uyib64","url":null,"abstract":"Awareness is a starting point to recognize, understand, or know a situation or fact, and the perception makes a difference in how to deal with it. Although the term cybercrime may not be new to the most public and the police, not all of them are well aware of the nature and extent of cybercrimes, cybercriminals, and cyber-victims, which in turn affects their perceptions of matters. The four papers in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime empirically examine these important topics and discuss policy implications.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131661991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phishing and Cybercrime Risks in a University Student Community 大学生社区的网络钓鱼和网络犯罪风险
Pub Date : 2019-02-01 DOI: 10.52306/02010219rzex445
R. Broadhurst, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias, Yuguang F. Ipsen
In an exploratory quasi-experimental observational study, 138 participants recruited during a university orientation week were exposed to social engineering directives in the form of fake email or phishing attacks over several months in 2017. These email attacks attempted to elicit personal information from participants or entice them into clicking links which may have been compromised in a real-world setting. The study aimed to determine the risks of cybercrime for students by observing their responses to social engineering and exploring attitudes to cybercrime risks before and after the phishing phase. Three types of scam emails were distributed that varied in the degree of individualization: generic, tailored, and targeted or ‘spear.’ To differentiate participants on the basis of cybercrime awareness, participants in a ‘Hunter’ condition were primed throughout the study to remain vigilant to all scams, while participants in a ‘Passive’ condition received no such instruction. The study explored the influence of scam type, cybercrime awareness, gender, IT competence, and perceived Internet safety on susceptibility to email scams. Contrary to the hypotheses, none of these factors were associated with scam susceptibility. Although, tailored and individually crafted email scams were more likely to induce engagement than generic scams. Analysis of all the variables showed that international students and first year students were deceived by significantly more scams than domestic students and later year students. A Generalized Linear Model (GLM) analysis was undertaken to further explore the role of all the variables of interest and the results were consistent with the descriptive findings showing that student status (domestic compared to international) and year of study (first year student compared to students in second, third and later years of study) had a higher association to the risk of scam deception. Implications and future research directions are discussed.
在一项探索性准实验观察性研究中,在2017年的几个月里,138名在大学迎新周招募的参与者暴露在虚假电子邮件或网络钓鱼攻击形式的社会工程指令中。这些电子邮件攻击试图从参与者那里获取个人信息,或者诱使他们点击可能在现实环境中受到损害的链接。该研究旨在通过观察学生对社会工程的反应,以及在网络钓鱼阶段前后对网络犯罪风险的态度,来确定网络犯罪的风险。三种类型的诈骗电子邮件的分布在不同程度的个性化:通用,量身定制和针对性或“矛”。为了在网络犯罪意识的基础上区分参与者,“猎人”组的参与者在整个研究过程中都被告知要对所有骗局保持警惕,而“被动”组的参与者则没有收到这样的指示。该研究探讨了诈骗类型、网络犯罪意识、性别、IT能力和互联网安全感知对电子邮件诈骗易感性的影响。与假设相反,这些因素都与骗局易感性无关。不过,量身定制的、精心制作的电子邮件骗局比普通骗局更有可能吸引用户。对所有变量的分析表明,国际学生和一年级学生被欺骗的次数明显多于国内学生和高年级学生。采用广义线性模型(GLM)分析进一步探讨了所有感兴趣的变量的作用,结果与描述性发现一致,表明学生身份(国内学生与国际学生相比)和学习年份(一年级学生与第二年、第三年和以后学习的学生相比)与骗局欺骗的风险有更高的关联。讨论了研究的意义和未来的研究方向。
{"title":"Phishing and Cybercrime Risks in a University Student Community","authors":"R. Broadhurst, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias, Yuguang F. Ipsen","doi":"10.52306/02010219rzex445","DOIUrl":"https://doi.org/10.52306/02010219rzex445","url":null,"abstract":"In an exploratory quasi-experimental observational study, 138 participants recruited during a university orientation week were exposed to social engineering directives in the form of fake email or phishing attacks over several months in 2017. These email attacks attempted to elicit personal information from participants or entice them into clicking links which may have been compromised in a real-world setting. The study aimed to determine the risks of cybercrime for students by observing their responses to social engineering and exploring attitudes to cybercrime risks before and after the phishing phase. Three types of scam emails were distributed that varied in the degree of individualization: generic, tailored, and targeted or ‘spear.’ To differentiate participants on the basis of cybercrime awareness, participants in a ‘Hunter’ condition were primed throughout the study to remain vigilant to all scams, while participants in a ‘Passive’ condition received no such instruction. The study explored the influence of scam type, cybercrime awareness, gender, IT competence, and perceived Internet safety on susceptibility to email scams. Contrary to the hypotheses, none of these factors were associated with scam susceptibility. Although, tailored and individually crafted email scams were more likely to induce engagement than generic scams. Analysis of all the variables showed that international students and first year students were deceived by significantly more scams than domestic students and later year students. A Generalized Linear Model (GLM) analysis was undertaken to further explore the role of all the variables of interest and the results were consistent with the descriptive findings showing that student status (domestic compared to international) and year of study (first year student compared to students in second, third and later years of study) had a higher association to the risk of scam deception. Implications and future research directions are discussed.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114859559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Welcoming remarks from the IJCIC Honorary Editor IJCIC名誉编辑致欢迎辞
Pub Date : 2018-08-01 DOI: 10.52306/01010118bfiv5094
P. Grabosky
{"title":"Welcoming remarks from the IJCIC Honorary Editor","authors":"P. Grabosky","doi":"10.52306/01010118bfiv5094","DOIUrl":"https://doi.org/10.52306/01010118bfiv5094","url":null,"abstract":"","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124571585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity 网络犯罪、网络恐怖主义和网络安全的现在和未来
Pub Date : 2018-08-01 DOI: 10.52306/01010218yxgw4012
Kyung-shick Choi, C. S. Lee
Cybercriminology combines knowledge from criminology, psychology, sociology, computer science, and cybersecurity to provide an in-depth understanding of cybercrime. Cybercrime and cybersecurity are interconnected across many places, platforms, and actors. Cybercrime issues are continuously and expeditiously changing and developing, especially with the advent of new technologies. The International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) aims to contribute to the growing field of cybercriminology and cybersecurity. The IJCIC is eager to work with scholars, policy analysts, practitioners, and others to enhance theory, methods, and practice within cybercrime and cybersecurity at the regional, national, and international levels.
网络犯罪学结合了犯罪学、心理学、社会学、计算机科学和网络安全的知识,提供了对网络犯罪的深入了解。网络犯罪和网络安全在许多地方、平台和参与者之间相互关联。随着新技术的出现,网络犯罪问题不断迅速变化和发展。国际网络安全情报和网络犯罪杂志(IJCIC)旨在为网络犯罪学和网络安全领域的发展做出贡献。IJCIC渴望与学者、政策分析师、从业者和其他人合作,在区域、国家和国际层面上加强网络犯罪和网络安全的理论、方法和实践。
{"title":"The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity","authors":"Kyung-shick Choi, C. S. Lee","doi":"10.52306/01010218yxgw4012","DOIUrl":"https://doi.org/10.52306/01010218yxgw4012","url":null,"abstract":"Cybercriminology combines knowledge from criminology, psychology, sociology, computer science, and cybersecurity to provide an in-depth understanding of cybercrime. Cybercrime and cybersecurity are interconnected across many places, platforms, and actors. Cybercrime issues are continuously and expeditiously changing and developing, especially with the advent of new technologies. The International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) aims to contribute to the growing field of cybercriminology and cybersecurity. The IJCIC is eager to work with scholars, policy analysts, practitioners, and others to enhance theory, methods, and practice within cybercrime and cybersecurity at the regional, national, and international levels.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115035825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Spreading Propaganda in Cyberspace: Comparing Cyber-Resource Usage of Al Qaeda and ISIS 网络空间宣传:基地组织与ISIS网络资源使用比较
Pub Date : 2018-08-01 DOI: 10.52306/01010418zdcd5438
Kyung-shick Choi, C. S. Lee, R. Cadigan
Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recruit new members, and justify terrorist attacks and actions. This study explores the ways in which types of social media, message contents, and motives for spreading propaganda take shape in cyberspace. In order to empirically test these relations, we created a dataset with annual terrorism reports from 2011 to 2016. In our global cyberterrorism dataset, we used and connected cyber-resources (Facebook, online forum, Twitter mentions, websites, and YouTube videos) and legal documents of individual cases that were mentioned in the reports. The results show that YouTube videos were used primarily for propagating certain ideologies and for recruiting members for Al Qaeda and ISIS. Al Qaeda-affiliated cyberterrorists used YouTube videos as both individual sources and embedded sources for Facebook and Twitter, whereas ISIS-affiliated cyberterrorists predominantly used YouTube videos and Twitter posts.
网络恐怖分子越来越多地利用社交媒体宣传其意识形态,招募新成员,并为恐怖袭击和行动辩护。本研究探讨了社交媒体类型、信息内容和传播宣传的动机在网络空间中形成的方式。为了对这些关系进行实证检验,我们创建了一个包含2011年至2016年年度恐怖主义报告的数据集。在我们的全球网络恐怖主义数据集中,我们使用并连接了网络资源(Facebook、在线论坛、Twitter提及、网站和YouTube视频)和报告中提到的个别案件的法律文件。结果显示,YouTube视频主要用于宣传某些意识形态,以及为基地组织和ISIS招募成员。与基地组织有关联的网络恐怖分子将YouTube视频作为Facebook和Twitter的个人信息来源和嵌入信息来源,而与isis有关联的网络恐怖分子则主要使用YouTube视频和Twitter帖子。
{"title":"Spreading Propaganda in Cyberspace: Comparing Cyber-Resource Usage of Al Qaeda and ISIS","authors":"Kyung-shick Choi, C. S. Lee, R. Cadigan","doi":"10.52306/01010418zdcd5438","DOIUrl":"https://doi.org/10.52306/01010418zdcd5438","url":null,"abstract":"Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recruit new members, and justify terrorist attacks and actions. This study explores the ways in which types of social media, message contents, and motives for spreading propaganda take shape in cyberspace. In order to empirically test these relations, we created a dataset with annual terrorism reports from 2011 to 2016. In our global cyberterrorism dataset, we used and connected cyber-resources (Facebook, online forum, Twitter mentions, websites, and YouTube videos) and legal documents of individual cases that were mentioned in the reports. The results show that YouTube videos were used primarily for propagating certain ideologies and for recruiting members for Al Qaeda and ISIS. Al Qaeda-affiliated cyberterrorists used YouTube videos as both individual sources and embedded sources for Facebook and Twitter, whereas ISIS-affiliated cyberterrorists predominantly used YouTube videos and Twitter posts.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128688872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
The International Journal of Cybersecurity Intelligence and Cybercrime
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1