首页 > 最新文献

International Journal of Cyber Warfare and Terrorism最新文献

英文 中文
Meta-Analysis and the Integration of Terrorism Event Databases 恐怖事件数据库的元分析与整合
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2024-01-10 DOI: 10.4018/ijcwt.335944
Timothy Lee Jones
Why do terrorist attacks occur in certain places and times but not others? Despite advances in collection and empirical methods, the literature has produced divergent results and reached little consensus for common hypotheses about the economic, political, and social causes of terrorism. It is hard to know what to make disagreements as studies adopt disparate research designs using different datasets covering different locations and times. This article applies the xSub data protocol to conduct a meta-analysis of terrorism event datasets and isolate explanations for variations in findings. Although the datasets are constructed for different purposes by different research teams, with different inclusion standards, processing data onto a common event typology, and conducting analysis across common coverage reduces heterogeneity in findings. This protocol also facilitates comparisons with general conflict event datasets, providing researchers, policymakers, and practitioners with a broader context for understanding terrorism in relation to other forms of violence.
为什么恐怖袭击发生在某些地方和时间,而不是其他地方和时间?尽管在数据收集和实证方法方面取得了进步,但文献中的研究结果却不尽相同,对恐怖主义的经济、政治和社会原因的共同假设也几乎没有达成共识。由于各项研究采用了不同的研究设计,使用了涵盖不同地点和时间的不同数据集,因此很难知道该如何消除分歧。本文应用 xSub 数据协议对恐怖主义事件数据集进行元分析,并分离出研究结果差异的解释。虽然这些数据集是由不同的研究团队出于不同的目的而构建的,并采用不同的纳入标准,但根据共同的事件类型处理数据,并在共同的覆盖范围内进行分析,可减少研究结果的异质性。该协议还有助于与一般冲突事件数据集进行比较,为研究人员、政策制定者和从业人员提供更广泛的背景,以了解恐怖主义与其他暴力形式的关系。
{"title":"Meta-Analysis and the Integration of Terrorism Event Databases","authors":"Timothy Lee Jones","doi":"10.4018/ijcwt.335944","DOIUrl":"https://doi.org/10.4018/ijcwt.335944","url":null,"abstract":"Why do terrorist attacks occur in certain places and times but not others? Despite advances in collection and empirical methods, the literature has produced divergent results and reached little consensus for common hypotheses about the economic, political, and social causes of terrorism. It is hard to know what to make disagreements as studies adopt disparate research designs using different datasets covering different locations and times. This article applies the xSub data protocol to conduct a meta-analysis of terrorism event datasets and isolate explanations for variations in findings. Although the datasets are constructed for different purposes by different research teams, with different inclusion standards, processing data onto a common event typology, and conducting analysis across common coverage reduces heterogeneity in findings. This protocol also facilitates comparisons with general conflict event datasets, providing researchers, policymakers, and practitioners with a broader context for understanding terrorism in relation to other forms of violence.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"5 24","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139439766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Simulating Student Protests Through Agent-Based Framework 基于agent框架的学生抗议建模与仿真
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2023-03-09 DOI: 10.4018/ijcwt.319708
Tshepo Solomon Raphiri, J. V. Vuuren, Albertus A. K. Buitendag
This paper presents an agent-based model to study the effect of grievance, net risk, social, sympathy, and political influence on the likelihood of student protests emerging in South Africa universities. Studies of student protests in several fields have been conducted, but no ABM has been used to explore factors contributing to student protests. Student protests have proved to be disorderly, frequently leading to property damage, academic program cancellations, and injuries. Simulation experiments demonstrated that inequality level, number of activists, activist's influential size, number of friendship ties, suspend delay, and sympathy are elements that determine the model of social conflicts, since there are statistically significant in the logistic regression. For university administration to effectively handle disruptive student protest actions, risk management policies should focus on understanding network structures that integrate students' interactions to monitor the spread of opinions that initiate protest mobilization.
本文提出了一个基于主体的模型来研究申诉、净风险、社会、同情和政治影响对南非大学学生抗议出现的可能性的影响。对几个领域的学生抗议进行了研究,但没有使用ABM来探索导致学生抗议的因素。学生抗议被证明是无序的,经常导致财产损失,学术课程取消和受伤。模拟实验表明,不平等程度、积极分子数量、积极分子的影响力大小、友谊关系数量、暂停延迟和同情是决定社会冲突模型的因素,因为在逻辑回归中有统计学意义。为了使大学管理有效地处理破坏性的学生抗议行动,风险管理政策应侧重于理解整合学生互动的网络结构,以监测引发抗议动员的意见的传播。
{"title":"Modeling and Simulating Student Protests Through Agent-Based Framework","authors":"Tshepo Solomon Raphiri, J. V. Vuuren, Albertus A. K. Buitendag","doi":"10.4018/ijcwt.319708","DOIUrl":"https://doi.org/10.4018/ijcwt.319708","url":null,"abstract":"This paper presents an agent-based model to study the effect of grievance, net risk, social, sympathy, and political influence on the likelihood of student protests emerging in South Africa universities. Studies of student protests in several fields have been conducted, but no ABM has been used to explore factors contributing to student protests. Student protests have proved to be disorderly, frequently leading to property damage, academic program cancellations, and injuries. Simulation experiments demonstrated that inequality level, number of activists, activist's influential size, number of friendship ties, suspend delay, and sympathy are elements that determine the model of social conflicts, since there are statistically significant in the logistic regression. For university administration to effectively handle disruptive student protest actions, risk management policies should focus on understanding network structures that integrate students' interactions to monitor the spread of opinions that initiate protest mobilization.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":"1-20"},"PeriodicalIF":0.5,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84359158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated Information Model of an Enterprise and Cybersecurity Management System: From Data to Activity 企业与网络安全管理系统的集成信息模型:从数据到活动
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-04-01 DOI: 10.4018/ijcwt.305860
S. Dotsenko, O. Illiashenko, V. Kharchenko, O. Morozova
The paper analyzes the concepts of "data", "information", "knowledge", "intelligence", "activity", establishes their relationship in the context of integrating information about the enterprise with the contours of security management through the connection of information technologies, operation technologies, ecology technologies (IT, OT, ET). The authors propose an integrated model of information representation of the organization based on a chain of data, information, knowledge and activity / intelligence. The main feature of this model is that it explicitly includes activities that are implemented considering the laws of natural intelligence and forms a corresponding control loop. The security management system is based on identifying and tolerating threats on the stages of processing the data, information, knowledge and intelligence/activities and IT, OT and ET levels. Two industrial cases related to dialog enterprise management system and post-accident monitoring system are discussed.
本文分析了“数据”、“信息”、“知识”、“智能”、“活动”等概念,通过信息技术、运营技术、生态技术(IT、OT、ET)的连接,在整合企业信息和安全管理轮廓的背景下,建立了它们之间的关系。作者提出了一个基于数据、信息、知识和活动/智能链的组织信息表示集成模型。该模型的主要特点是,它显式地包含了考虑自然智能规律而实现的活动,并形成了相应的控制回路。安全管理系统的基础是在处理数据、信息、知识和情报/活动的各个阶段以及IT、OT和ET层面识别和容忍威胁。讨论了对话企业管理系统和事故后监测系统的两个工业案例。
{"title":"Integrated Information Model of an Enterprise and Cybersecurity Management System: From Data to Activity","authors":"S. Dotsenko, O. Illiashenko, V. Kharchenko, O. Morozova","doi":"10.4018/ijcwt.305860","DOIUrl":"https://doi.org/10.4018/ijcwt.305860","url":null,"abstract":"The paper analyzes the concepts of \"data\", \"information\", \"knowledge\", \"intelligence\", \"activity\", establishes their relationship in the context of integrating information about the enterprise with the contours of security management through the connection of information technologies, operation technologies, ecology technologies (IT, OT, ET). The authors propose an integrated model of information representation of the organization based on a chain of data, information, knowledge and activity / intelligence. The main feature of this model is that it explicitly includes activities that are implemented considering the laws of natural intelligence and forms a corresponding control loop. The security management system is based on identifying and tolerating threats on the stages of processing the data, information, knowledge and intelligence/activities and IT, OT and ET levels. Two industrial cases related to dialog enterprise management system and post-accident monitoring system are discussed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"23 1","pages":"1-21"},"PeriodicalIF":0.5,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78397308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Agent-Based Simulation of Heterogeneous Crowd Flows in Critical Infrastructures During Emergencies 基于agent的突发事件关键基础设施异构人群流仿真
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-04-01 DOI: 10.4018/ijcwt.305861
Umberto Battista, Pietro Vito, Davide Ottonello, Deborah Hugon
Scope of this work was the development of a model able to simulate the flows and behaviours of heterogeneous crowds in a large transport hub, both in normal conditions and during an emergency, like a terrorist attack. These places are indeed also so-called “soft targets”, public spaces which are preferred targets of terrorists because they provide them with the opportunity to maximize casualties and publicity. Different modelling approaches were investigated and finally agent-based modelling and the BDI (belief-desire-intention) architecture were selected. Several scenarios were also identified to simulate the crowd behaviour. Flowcharts were developed to model users’ actions and interactions; while statecharts to model emergency conditions and behavioural changes. Simulations were then used to identify weak points in the infrastructure and to analyse the evacuation times for each user category investigated. Finally, various solutions were proposed and simulated, to improve crowd flows and reduce evacuation times.
这项工作的范围是开发一个模型,能够模拟大型交通枢纽中不同人群在正常条件下和紧急情况下(如恐怖袭击)的流动和行为。这些地方实际上也是所谓的“软目标”,公共场所是恐怖分子的首选目标,因为它们为他们提供了最大限度地造成伤亡和宣传的机会。研究了不同的建模方法,最终选择了基于智能体的建模方法和信念-愿望-意图(BDI)体系结构。还确定了几个场景来模拟人群的行为。开发流程图来模拟用户的操作和交互;而状态图则用来模拟紧急情况和行为变化。然后使用模拟来识别基础设施中的薄弱环节,并分析所调查的每个用户类别的疏散时间。最后,提出并模拟了各种解决方案,以改善人群流动,减少疏散时间。
{"title":"Agent-Based Simulation of Heterogeneous Crowd Flows in Critical Infrastructures During Emergencies","authors":"Umberto Battista, Pietro Vito, Davide Ottonello, Deborah Hugon","doi":"10.4018/ijcwt.305861","DOIUrl":"https://doi.org/10.4018/ijcwt.305861","url":null,"abstract":"Scope of this work was the development of a model able to simulate the flows and behaviours of heterogeneous crowds in a large transport hub, both in normal conditions and during an emergency, like a terrorist attack. These places are indeed also so-called “soft targets”, public spaces which are preferred targets of terrorists because they provide them with the opportunity to maximize casualties and publicity. Different modelling approaches were investigated and finally agent-based modelling and the BDI (belief-desire-intention) architecture were selected. Several scenarios were also identified to simulate the crowd behaviour. Flowcharts were developed to model users’ actions and interactions; while statecharts to model emergency conditions and behavioural changes. Simulations were then used to identify weak points in the infrastructure and to analyse the evacuation times for each user category investigated. Finally, various solutions were proposed and simulated, to improve crowd flows and reduce evacuation times.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"43 1","pages":"1-18"},"PeriodicalIF":0.5,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87340114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT and Edge Computing as Enabling Technologies of Human Factors Monitoring in CBRN Environment 物联网和边缘计算作为CBRN环境中人为因素监测的使能技术
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-04-01 DOI: 10.4018/ijcwt.305859
Pietro Rossetti, F. Garzia, Nicola Silverio Genco, A. Sacchetti
Human Factor (HF) monitoring under the critical CBRN environment reduces the likelihood of errors or injuries by first responders who carry out operations within an unknown workspace. Indeed, thanks to the monitoring, analysis and assessment of physical and mental workload and manual handling of equipements by first responders, it is possible to increase safety, efficiency and effectiveness. The IoT and Edge computing, contextualizing the collected data, promises to enhance the CBRN situational awareness by working on the HFs aspects with a view to context-aware reasoning. IoT and edge computing enabling technologies envisage operators needs and behaviours by gathering information about biophysiological conditions, emotional state and operational data by first responders.This study aims to introduce the edge computer for data fusion in tactical networks and computational services, fully integrated in IoT solutions of remote monitoring of HFs. These latter, related to Human Performance and health of responders, may prove useful as innovative tools in CBRN incident management.
关键CBRN环境下的人为因素(HF)监测减少了在未知工作空间内执行操作的急救人员出错或受伤的可能性。事实上,由于监测、分析和评估身体和精神工作量以及由第一反应人员手动处理设备,有可能提高安全性、效率和有效性。物联网和边缘计算,将收集到的数据进行上下文化,有望通过在HFs方面进行上下文感知推理来增强CBRN的态势感知。物联网和边缘计算支持技术通过收集有关第一响应者的生物生理状况、情绪状态和操作数据的信息,设想操作员的需求和行为。本研究旨在引入边缘计算机用于战术网络和计算服务中的数据融合,并将其完全集成到hf远程监控的物联网解决方案中。后者与人员绩效和响应者的健康有关,可作为CBRN事件管理的创新工具。
{"title":"IoT and Edge Computing as Enabling Technologies of Human Factors Monitoring in CBRN Environment","authors":"Pietro Rossetti, F. Garzia, Nicola Silverio Genco, A. Sacchetti","doi":"10.4018/ijcwt.305859","DOIUrl":"https://doi.org/10.4018/ijcwt.305859","url":null,"abstract":"Human Factor (HF) monitoring under the critical CBRN environment reduces the likelihood of errors or injuries by first responders who carry out operations within an unknown workspace. Indeed, thanks to the monitoring, analysis and assessment of physical and mental workload and manual handling of equipements by first responders, it is possible to increase safety, efficiency and effectiveness. The IoT and Edge computing, contextualizing the collected data, promises to enhance the CBRN situational awareness by working on the HFs aspects with a view to context-aware reasoning. IoT and edge computing enabling technologies envisage operators needs and behaviours by gathering information about biophysiological conditions, emotional state and operational data by first responders.This study aims to introduce the edge computer for data fusion in tactical networks and computational services, fully integrated in IoT solutions of remote monitoring of HFs. These latter, related to Human Performance and health of responders, may prove useful as innovative tools in CBRN incident management.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"33 1","pages":"1-20"},"PeriodicalIF":0.5,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72943245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence and Facial Recognition in an IoT Ecosystem 物联网生态系统中的人工智能和面部识别
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-04-01 DOI: 10.4018/ijcwt.305862
Nicola Fabiano
This article does not deepen the insight on technical aspects related to artificial intelligence and facial recognition, but it highlights how relevant privacy aspects are also inside an IoT ecosystem. Furthermore, the author points out the risks of some resources found online, exposing face images, in the compliance with GDPR and privacy rules process. Indeed, adopting artificial intelligence to realize human face images of people who do not exist but realized starting from real persons can have consequences on data protection rules and the possible misuse by everyone who can retrieve them. Artificial intelligence might foster synthetic identity, or, better, artificial intelligence synthetic identity cases, building human profiles using particulars belonging to different persons. The author proposes an approach based on the innovative data protection and privacy relationships model (DAPPREMO) to address any activity or process related to data protection and privacy due to having a broader view of any investigation's subject.
本文并没有深入了解与人工智能和面部识别相关的技术方面,但它强调了在物联网生态系统中相关的隐私方面是如何存在的。此外,作者还指出了在遵守GDPR和隐私规则的过程中,在网上找到的一些资源,暴露人脸图像的风险。的确,采用人工智能来实现不存在的人的人脸图像,但从真实的人开始实现,可能会对数据保护规则产生影响,并可能被每个可以检索到这些图像的人滥用。人工智能可能会培育合成身份,或者更好地说,人工智能合成身份案例,使用属于不同人的细节来构建人类档案。作者提出了一种基于创新数据保护和隐私关系模型(DAPPREMO)的方法,以解决与数据保护和隐私相关的任何活动或过程,因为对任何调查主题都有更广泛的看法。
{"title":"Artificial Intelligence and Facial Recognition in an IoT Ecosystem","authors":"Nicola Fabiano","doi":"10.4018/ijcwt.305862","DOIUrl":"https://doi.org/10.4018/ijcwt.305862","url":null,"abstract":"This article does not deepen the insight on technical aspects related to artificial intelligence and facial recognition, but it highlights how relevant privacy aspects are also inside an IoT ecosystem. Furthermore, the author points out the risks of some resources found online, exposing face images, in the compliance with GDPR and privacy rules process. Indeed, adopting artificial intelligence to realize human face images of people who do not exist but realized starting from real persons can have consequences on data protection rules and the possible misuse by everyone who can retrieve them. Artificial intelligence might foster synthetic identity, or, better, artificial intelligence synthetic identity cases, building human profiles using particulars belonging to different persons. The author proposes an approach based on the innovative data protection and privacy relationships model (DAPPREMO) to address any activity or process related to data protection and privacy due to having a broader view of any investigation's subject.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47502864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Strategic Consequences of Cyber Targeting Strategies on Road Transport Networks 道路运输网络网络目标定位策略的战略后果评估
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.314942
Skanda Vivek, Charles Harry
The explosive growth in connected vehicle infrastructures and IoT-enabled traffic systems opens the potential for novel societal impacts stemming from cyber-attacks on transportation systems. Researchers and threat actors have demonstrated that they can gain control of safety-critical vehicle functions, compromise poorly authenticated third-party apps, as well as modify supervisory control and data acquisition (SCADA) systems. This raises the question of where policy makers should invest to reduce the most significant consequences of a cyberattack on road infrastructure. In this paper, the authors develop a network-based approach in conjunction with historical trip information to quantify the network impacts of cyberattacks on road networks in Washington DC. They find that a highly targeted attack on only 10 SCADA-controlled signaling devices at specific locations disrupts a third of the most efficient paths in Washington DC. The results open the possibility of layered deterrence strategies that minimize the disruptive consequences of cyberattacks, thereby reducing benefits to attackers.
互联车辆基础设施和物联网交通系统的爆炸性增长为交通系统的网络攻击带来了新的社会影响。研究人员和威胁行为者已经证明,他们可以控制安全关键的车辆功能,破坏认证不力的第三方应用程序,以及修改监控和数据采集(SCADA)系统。这就提出了一个问题,即决策者应该在哪里投资,以减少网络攻击对道路基础设施造成的最严重后果。在本文中,作者开发了一种基于网络的方法,结合历史行程信息来量化网络攻击对华盛顿道路网络的网络影响。他们发现,对特定位置的10个SCADA控制的信号设备进行高度针对性的攻击,会破坏华盛顿特区三分之一最有效的路径。这一结果开启了分层威慑策略的可能性,将网络攻击的破坏性后果降至最低,从而减少攻击者的利益。
{"title":"Evaluating the Strategic Consequences of Cyber Targeting Strategies on Road Transport Networks","authors":"Skanda Vivek, Charles Harry","doi":"10.4018/ijcwt.314942","DOIUrl":"https://doi.org/10.4018/ijcwt.314942","url":null,"abstract":"The explosive growth in connected vehicle infrastructures and IoT-enabled traffic systems opens the potential for novel societal impacts stemming from cyber-attacks on transportation systems. Researchers and threat actors have demonstrated that they can gain control of safety-critical vehicle functions, compromise poorly authenticated third-party apps, as well as modify supervisory control and data acquisition (SCADA) systems. This raises the question of where policy makers should invest to reduce the most significant consequences of a cyberattack on road infrastructure. In this paper, the authors develop a network-based approach in conjunction with historical trip information to quantify the network impacts of cyberattacks on road networks in Washington DC. They find that a highly targeted attack on only 10 SCADA-controlled signaling devices at specific locations disrupts a third of the most efficient paths in Washington DC. The results open the possibility of layered deterrence strategies that minimize the disruptive consequences of cyberattacks, thereby reducing benefits to attackers.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47826797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber Kill Chain Analysis of Five Major US Data Breaches 美国五大数据泄露事件的网络杀伤链分析
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.315651
Glorin Sebastian
Data breaches are a major concern for both US and global corporations. With more companies allowing their employees to be working remote, providing them a secure work environment has been a priority for employers. The Interpol 2020 report on cyber breaches mentions that the number of cyber-attacks has multiplied in the last year. The IBM Data Breach Report of 2021 notes that data breach costs rose from USD 3.86 million to USD 4.24 million, while the average cost was USD 1.07 Mil higher in breaches where remote work was a factor in causing the breach. Given this environment of increased cyber breaches, it is important to learn from previous major data breaches to understand the root cause which led to the compromise of information security and the steps which could have effectively prevented the same. This paper evaluates five major data breaches in US history using Lockheed's Cyber Kill Chain Analysis, since the details of these breaches have never been documented for research and also proposes an eight-step cyber-attack prevention plan.
数据泄露是美国和全球企业的一大担忧。随着越来越多的公司允许员工远程工作,为他们提供一个安全的工作环境已经成为雇主的首要任务。国际刑警组织2020年关于网络入侵的报告提到,去年网络攻击的数量翻了一番。IBM《2021年数据泄露报告》指出,数据泄露成本从386万美元上升到424万美元,而远程工作是导致数据泄露的一个因素,数据泄露的平均成本高出107万美元。鉴于网络泄露事件不断增加的环境,从以往的重大数据泄露事件中吸取教训,了解导致信息安全受到损害的根本原因,以及可以有效防止同样事件发生的步骤,是很重要的。本文使用洛克希德公司的网络杀伤链分析评估了美国历史上的五次主要数据泄露事件,因为这些泄露事件的细节从未被记录下来进行研究,并提出了一个八步网络攻击预防计划。
{"title":"Cyber Kill Chain Analysis of Five Major US Data Breaches","authors":"Glorin Sebastian","doi":"10.4018/ijcwt.315651","DOIUrl":"https://doi.org/10.4018/ijcwt.315651","url":null,"abstract":"Data breaches are a major concern for both US and global corporations. With more companies allowing their employees to be working remote, providing them a secure work environment has been a priority for employers. The Interpol 2020 report on cyber breaches mentions that the number of cyber-attacks has multiplied in the last year. The IBM Data Breach Report of 2021 notes that data breach costs rose from USD 3.86 million to USD 4.24 million, while the average cost was USD 1.07 Mil higher in breaches where remote work was a factor in causing the breach. Given this environment of increased cyber breaches, it is important to learn from previous major data breaches to understand the root cause which led to the compromise of information security and the steps which could have effectively prevented the same. This paper evaluates five major data breaches in US history using Lockheed's Cyber Kill Chain Analysis, since the details of these breaches have never been documented for research and also proposes an eight-step cyber-attack prevention plan.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46757715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Client-Side Cross Platform Compatible Solution for Phishing Prevention 高效的客户端跨平台兼容的网络钓鱼预防解决方案
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.297855
Phishing is a crime where the victim is contacted by an attacker posing as a trustworthy source and lure them into providing sensitive information. This work makes sure that time delay is averted and the attack can be thwarted with fewer computational resources. To solve the above mentioned problem, a web browser add-on that works as a background script on the client side is implemented. All the background scripts made cross platform compatible to make the development easier and more efficient. The contribution in this paper is the new add-on, Off-the-hook-plus. The main objective of this Off-the-hook-plus is to find if the web page that the user visits is a phish or not. The page redirect logs along with the page details are used to find if the site is a phish or not. And then if the site happens to be a phish, the similar looking site which this web page tries to impersonate is given. To make the repeated accesses faster, a whitelist is maintained, where all the safe sites are logged. The add-on is experimentally evaluated and the results are discussed and is found to be effective.
网络钓鱼是一种犯罪,攻击者冒充可靠来源联系受害者,引诱他们提供敏感信息。这项工作确保避免了时间延迟,并且可以用更少的计算资源挫败攻击。为了解决上述问题,实现了一种在客户端充当后台脚本的web浏览器插件。所有的后台脚本都使跨平台兼容,使开发更容易、更高效。这篇论文的贡献是新的附加功能,摘掉钩加。这个摘机加的主要目的是找出用户访问的网页是否是钓鱼者。页面重定向日志以及页面详细信息用于查找网站是否为钓鱼者。然后,如果该网站恰好是一个钓鱼者,则会给出该网页试图模仿的外观相似的网站。为了更快地进行重复访问,我们维护了一个白名单,记录所有安全站点。对该附加组件进行了实验评估,并对结果进行了讨论,发现其是有效的。
{"title":"Efficient Client-Side Cross Platform Compatible Solution for Phishing Prevention","authors":"","doi":"10.4018/ijcwt.297855","DOIUrl":"https://doi.org/10.4018/ijcwt.297855","url":null,"abstract":"Phishing is a crime where the victim is contacted by an attacker posing as a trustworthy source and lure them into providing sensitive information. This work makes sure that time delay is averted and the attack can be thwarted with fewer computational resources. To solve the above mentioned problem, a web browser add-on that works as a background script on the client side is implemented. All the background scripts made cross platform compatible to make the development easier and more efficient. The contribution in this paper is the new add-on, Off-the-hook-plus. The main objective of this Off-the-hook-plus is to find if the web page that the user visits is a phish or not. The page redirect logs along with the page details are used to find if the site is a phish or not. And then if the site happens to be a phish, the similar looking site which this web page tries to impersonate is given. To make the repeated accesses faster, a whitelist is maintained, where all the safe sites are logged. The add-on is experimentally evaluated and the results are discussed and is found to be effective.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42763547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Techno-radicalism; an Account of Radicalism in the Technology Era Techno-radicalism;论科技时代的激进主义
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.297858
Today there is fairly rich literature to study how radical groups take advantage of technology to realize their goals. Something, however, is missing in such discussions as to how technology might affect the subjectivity of extremists. Technology, in the most of such inquiries, is taken to be merely a passive tool without any inherent bias. This instrumentalist approach to technology, however, turns out to be problematic. The contemporary studies of technology may provide us, as it will be argued, with insights to understand how technology might incline civilians towards radicalization. Two frameworks of postphenomenology and Actor-Network-Theory (ANT) will be the primary focus here to outline a schema of the impacts of technology on radicalization of minds. Although technology, with all its variety, is the general concern of the article, it will narrow the discussion down to social media platforms to make the point. It will be then suggested to ascribe an active role to technology in radicalism scholarship, thereby drawing attentions to the process of designing technologies.
今天有相当丰富的文献研究激进组织如何利用技术来实现他们的目标。然而,关于技术如何影响极端分子主体性的讨论中缺少了一些东西。在大多数这样的调查中,技术被认为仅仅是一种被动的工具,没有任何固有的偏见。然而,这种工具主义的技术方法是有问题的。当代技术研究可能会为我们提供一些见解,让我们理解技术是如何使平民倾向于激进化的。后现象学和行动者网络理论(ANT)这两个框架将是本文的主要重点,以概述技术对思想激进化的影响。尽管这篇文章关注的是各种各样的科技,但它将把讨论范围缩小到社交媒体平台上,以阐明这一点。然后建议在激进主义学术中赋予技术积极的作用,从而引起人们对设计技术过程的关注。
{"title":"Techno-radicalism; an Account of Radicalism in the Technology Era","authors":"","doi":"10.4018/ijcwt.297858","DOIUrl":"https://doi.org/10.4018/ijcwt.297858","url":null,"abstract":"Today there is fairly rich literature to study how radical groups take advantage of technology to realize their goals. Something, however, is missing in such discussions as to how technology might affect the subjectivity of extremists. Technology, in the most of such inquiries, is taken to be merely a passive tool without any inherent bias. This instrumentalist approach to technology, however, turns out to be problematic. The contemporary studies of technology may provide us, as it will be argued, with insights to understand how technology might incline civilians towards radicalization. Two frameworks of postphenomenology and Actor-Network-Theory (ANT) will be the primary focus here to outline a schema of the impacts of technology on radicalization of minds. Although technology, with all its variety, is the general concern of the article, it will narrow the discussion down to social media platforms to make the point. It will be then suggested to ascribe an active role to technology in radicalism scholarship, thereby drawing attentions to the process of designing technologies.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45030222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cyber Warfare and Terrorism
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1