首页 > 最新文献

International Journal of Cyber Warfare and Terrorism最新文献

英文 中文
The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights P2P网络侵犯知识产权的国内外适用法律
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.311419
Ziad Kh. Al-Enizi, Mu'awya Naser
To provide a path to the copyright holders for filing a lawsuit against the infringers and violators through a legitimate process and applying the law that applies to that particular situation that keeps a balance between the peer-to-peer network technology and copyright holders this research has presented four different law strategies that can reduce the violation of the rights of the intellectual properties on national and international bases and advance the P2P network file-sharing procedure. The authors include the incorporation of the proper law for any illegal activity regarding copyrights via peer-to-peer networks on national and international bases with modification in the security system of file-sharing. It caters to the filing of the case for the violation of any copywritten works regardless of where the cases have happened, and the law should be standard for all the intellectual properties and is acceptable by other countries as well.
为了为版权持有人提供一条途径,通过合法程序对侵权人和违法者提起诉讼,并适用适用于特定情况的法律,在对等网络技术和版权持有人之间保持平衡,本研究提出了四种不同的法律策略,可以减少对基于国家和国际的知识产权,并推进P2P网络文件共享程序。作者包括在国家和国际基础上通过对等网络对任何有关版权的非法活动纳入适当的法律,并修改文件共享的安全系统。无论案件发生在哪里,它都能为侵犯任何文案作品的行为立案,法律应该是所有知识产权的标准,其他国家也可以接受。
{"title":"The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights","authors":"Ziad Kh. Al-Enizi, Mu'awya Naser","doi":"10.4018/ijcwt.311419","DOIUrl":"https://doi.org/10.4018/ijcwt.311419","url":null,"abstract":"To provide a path to the copyright holders for filing a lawsuit against the infringers and violators through a legitimate process and applying the law that applies to that particular situation that keeps a balance between the peer-to-peer network technology and copyright holders this research has presented four different law strategies that can reduce the violation of the rights of the intellectual properties on national and international bases and advance the P2P network file-sharing procedure. The authors include the incorporation of the proper law for any illegal activity regarding copyrights via peer-to-peer networks on national and international bases with modification in the security system of file-sharing. It caters to the filing of the case for the violation of any copywritten works regardless of where the cases have happened, and the law should be standard for all the intellectual properties and is acceptable by other countries as well.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46834159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Trends in Child Sexual Abuse Material (CSAM) distribution in Indian Cyberspace 印度网络空间中儿童性虐待材料(CSAM)分发的最新趋势
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.297857
The emergence and evolution of social media and technology poses challenges in the prevention of child sexual exploitation and abuse. This issue is not successfully addressed by the existing techno-legal apparatus and is posing risks to the children. In India, CSAM files are illegal and constitute an offense under Section 67(B), IT Act 2000. The technology has also made available various tools and techniques, to the predators who are always ready to groom and exploit teenagers & circulate their indecent images / videos. This research work has been carried out to assess a qualitative estimate of the quantum of Child Sexual Abuse Material (CSAM) circulated in Indian Cyberspace using peer-to-peer technology. Although CSAM is legally banned, many unique IP addresses were found to be distributing a total of 27,00,08,502 disturbing material depicting the sexual abuse of children distributed over 7 torrents spreading over 29 States and 5 Union Territories.
社交媒体和技术的出现和发展对防止儿童性剥削和性虐待提出了挑战。现有的技术-法律机构没有成功地解决这一问题,并对儿童构成危险。在印度,CSAM文件是非法的,根据2000年IT法案第67(B)条构成犯罪。这项技术也为那些随时准备培养和利用青少年并传播他们不雅图片/视频的捕食者提供了各种工具和技术。这项研究工作是为了评估使用点对点技术在印度网络空间传播的儿童性虐待材料(CSAM)数量的定性估计。尽管CSAM在法律上是被禁止的,但许多独特的IP地址被发现分发了总共27,08,502份令人不安的材料,这些材料描绘了对儿童的性虐待,分布在7个种子中,分布在29个州和5个联邦领土。
{"title":"Recent Trends in Child Sexual Abuse Material (CSAM) distribution in Indian Cyberspace","authors":"","doi":"10.4018/ijcwt.297857","DOIUrl":"https://doi.org/10.4018/ijcwt.297857","url":null,"abstract":"The emergence and evolution of social media and technology poses challenges in the prevention of child sexual exploitation and abuse. This issue is not successfully addressed by the existing techno-legal apparatus and is posing risks to the children. In India, CSAM files are illegal and constitute an offense under Section 67(B), IT Act 2000. The technology has also made available various tools and techniques, to the predators who are always ready to groom and exploit teenagers & circulate their indecent images / videos. This research work has been carried out to assess a qualitative estimate of the quantum of Child Sexual Abuse Material (CSAM) circulated in Indian Cyberspace using peer-to-peer technology. Although CSAM is legally banned, many unique IP addresses were found to be distributing a total of 27,00,08,502 disturbing material depicting the sexual abuse of children distributed over 7 torrents spreading over 29 States and 5 Union Territories.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41842885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Ontology Towards Predicting Terrorism Events 恐怖主义事件预测本体论
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.311421
Zubeida Dawood, Carien Van 't Wout
Although there is an increasing amount of information for counter-terrorism operations freely available online, it is a complex process to extract relevant information and to detect useful patterns in the data in order for intelligence functionaries to identify threats and to predict possible terror attacks. Automation is required for intelligent decision-making. To assist with this, in this paper, the researchers propose an ontology-based data access system for counter-terrorism. The system will enable intelligence analysts to perform specialised semantic searches about terrorist events or groups for analysis using an ontology. In this paper, the researchers present the ontology that was created by following an existing methodology for ontology development, and an ontology-based data access system together with all the components used in development (i.e., databases, web-scraper tools, ontology-based data access software, and data sources). Lastly, the ontology is demonstrated by means of use cases with example queries for generating actionable intelligence for operations.
尽管网上免费提供的反恐行动信息越来越多,但提取相关信息和检测数据中的有用模式是一个复杂的过程,以便情报人员识别威胁并预测可能的恐怖袭击。智能决策需要自动化。为此,研究人员提出了一种基于本体的反恐数据访问系统。该系统将使情报分析员能够对恐怖事件或团体进行专门的语义搜索,以便使用本体进行分析。在本文中,研究人员介绍了通过遵循现有的本体开发方法创建的本体,以及一个基于本体的数据访问系统,以及开发中使用的所有组件(即数据库、web scraper工具、基于本体的数据访问软件和数据源)。最后,通过用例和示例查询来展示本体,以生成可操作的操作智能。
{"title":"An Ontology Towards Predicting Terrorism Events","authors":"Zubeida Dawood, Carien Van 't Wout","doi":"10.4018/ijcwt.311421","DOIUrl":"https://doi.org/10.4018/ijcwt.311421","url":null,"abstract":"Although there is an increasing amount of information for counter-terrorism operations freely available online, it is a complex process to extract relevant information and to detect useful patterns in the data in order for intelligence functionaries to identify threats and to predict possible terror attacks. Automation is required for intelligent decision-making. To assist with this, in this paper, the researchers propose an ontology-based data access system for counter-terrorism. The system will enable intelligence analysts to perform specialised semantic searches about terrorist events or groups for analysis using an ontology. In this paper, the researchers present the ontology that was created by following an existing methodology for ontology development, and an ontology-based data access system together with all the components used in development (i.e., databases, web-scraper tools, ontology-based data access software, and data sources). Lastly, the ontology is demonstrated by means of use cases with example queries for generating actionable intelligence for operations.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42453493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks 隐藏网络中形成结构化非法组织的恶意信息爬行机制
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.311422
Romil Rawat, Sonali Gupta, S. Sivaranjani, Om Kumar C.U., Megha Kuliha, K. Sankaran
Terrorist groups like ISIS have made considerable use of the dark web (DW) to carry out their malicious objectives such as spreading propaganda, recruiting and radicalizing new recruits, and secretly raising finances. Al-Hayat Media Center, an ISIS media agency, released a link on their forum describing how to access their DW website. It also sent out the identical message over Telegram, which included links to a Tor service with a “.onion” address. This study develops an analytical framework for scraping and analyzing the DW on the internet. The authors successfully tested a web crawler to collect account information for thousands of merchants and their related marketplace listings using a case study marketplace. The paper explains how to scrape DW marketplaces in the most viable and effective way possible. The findings of the case study support the validity of the proposed analytical framework, which is useful for academics researching this emerging phenomena as well as investigators looking into illegal behavior on the DW.
像ISIS这样的恐怖组织大量利用暗网(DW)来实现他们的恶意目标,如传播宣传,招募和激进新成员,以及秘密筹集资金。伊斯兰国媒体机构Al-Hayat媒体中心在他们的论坛上发布了一个链接,描述了如何访问他们的DW网站。它还通过电报发送了相同的信息,其中包括一个带有“。”的Tor服务链接。洋葱”地址。本研究开发了一个用于抓取和分析互联网数据仓库的分析框架。作者成功地测试了一个网络爬虫来收集数千个商家及其相关市场列表的账户信息,并使用了一个案例研究市场。本文解释了如何以最可行和最有效的方式抓取数据仓库市场。案例研究的结果支持了所提出的分析框架的有效性,这对于研究这一新兴现象的学者以及调查DW上非法行为的调查人员都是有用的。
{"title":"Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks","authors":"Romil Rawat, Sonali Gupta, S. Sivaranjani, Om Kumar C.U., Megha Kuliha, K. Sankaran","doi":"10.4018/ijcwt.311422","DOIUrl":"https://doi.org/10.4018/ijcwt.311422","url":null,"abstract":"Terrorist groups like ISIS have made considerable use of the dark web (DW) to carry out their malicious objectives such as spreading propaganda, recruiting and radicalizing new recruits, and secretly raising finances. Al-Hayat Media Center, an ISIS media agency, released a link on their forum describing how to access their DW website. It also sent out the identical message over Telegram, which included links to a Tor service with a “.onion” address. This study develops an analytical framework for scraping and analyzing the DW on the internet. The authors successfully tested a web crawler to collect account information for thousands of merchants and their related marketplace listings using a case study marketplace. The paper explains how to scrape DW marketplaces in the most viable and effective way possible. The findings of the case study support the validity of the proposed analytical framework, which is useful for academics researching this emerging phenomena as well as investigators looking into illegal behavior on the DW.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46494882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Understanding the Community's Perceptions Towards Online Radicalisation: An Exploratory Analysis 理解社区对网络激进化的看法:一项探索性分析
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.297860
Loo Seng Neo
This study seeks to understand the community’s perceptions towards detecting signs of online radicalisation and examine whether different community members would exhibit different levels of understanding. A 57-item survey was administered to 160 undergraduates from Nanyang Technological University (NTU) and 160 Amazon Mechanical Turk (MTurk) workers. Based on the ratings of the 42 online radicalisation indicators identified by Neo (2020), two-factor analyses were separately conducted using oblique rotation to undercover a four-factor structure for the NTU sample and a three-factor solution for the MTurk sample. The results revealed valuable insights into how community members would identify terrorist threats. Furthermore, the survey revealed differences in the participants’ views on the role of the internet in radicalisation pathways and their perceptions regarding various counter-terrorism strategies. Together, the findings would contribute to the discussion of how law enforcement could better engage and work together with the community members to detect terrorist threats.
本研究旨在了解社区对检测在线激进化迹象的看法,并检查不同的社区成员是否会表现出不同程度的理解。本研究对来自南洋理工大学的160名本科生和亚马逊土耳其机械公司的160名员工进行了57项问卷调查。根据Neo(2020)确定的42个在线激进化指标的评级,分别使用倾斜旋转进行双因素分析,以揭示NTU样本的四因素结构和MTurk样本的三因素解决方案。结果揭示了社区成员如何识别恐怖主义威胁的宝贵见解。此外,调查还揭示了参与者对互联网在激进化途径中所起作用的看法以及他们对各种反恐战略的看法的差异。总之,这些发现将有助于讨论执法部门如何更好地与社区成员接触和合作,以发现恐怖主义威胁。
{"title":"Understanding the Community's Perceptions Towards Online Radicalisation: An Exploratory Analysis","authors":"Loo Seng Neo","doi":"10.4018/ijcwt.297860","DOIUrl":"https://doi.org/10.4018/ijcwt.297860","url":null,"abstract":"This study seeks to understand the community’s perceptions towards detecting signs of online radicalisation and examine whether different community members would exhibit different levels of understanding. A 57-item survey was administered to 160 undergraduates from Nanyang Technological University (NTU) and 160 Amazon Mechanical Turk (MTurk) workers. Based on the ratings of the 42 online radicalisation indicators identified by Neo (2020), two-factor analyses were separately conducted using oblique rotation to undercover a four-factor structure for the NTU sample and a three-factor solution for the MTurk sample. The results revealed valuable insights into how community members would identify terrorist threats. Furthermore, the survey revealed differences in the participants’ views on the role of the internet in radicalisation pathways and their perceptions regarding various counter-terrorism strategies. Together, the findings would contribute to the discussion of how law enforcement could better engage and work together with the community members to detect terrorist threats.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"116 1","pages":"1-15"},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84074745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differences and Commonalities between Terrorism and COVID-19 恐怖主义与新冠肺炎的异同
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.297859
M. Korstanje
In the present essay review, we have placed the notion of the War on Terror on the critical lens of scrutiny. Far from being a foundational event, the global pandemic affirms a trend that originated after the War on Terror. In both the idea of living with the enemy persist. The modern nation-state, which is supported by the health system, deploys disciplinary instruments to detect, trace and isolate the undesired guest. In the days after 9/11, surveillance technologies were used to spy on different citizens who were suspected to be terrorists. In the post COVID19 context, all we are suspected to be terrorists (carriers) who place the social order in jeopardy. Of course, terrorism and the virus have certain differences which merit being mentioned. Terrorism is moved by political and psychological aims while COVID-19 is simply a virus (disposed of any reasoning and will). Nevertheless of this fact, the reaction of society that exacerbates the instrumentalist gaze seems to be the same.
在目前的论文评论中,我们已经将反恐战争的概念置于审查的批判镜头上。这场全球流行病远非一个根本性事件,而是证实了反恐战争之后产生的一种趋势。在这两种情况下,与敌人共处的想法依然存在。现代民族国家在卫生系统的支持下,部署纪律工具来检测、追踪和隔离不受欢迎的客人。在9/11之后的日子里,监视技术被用来监视被怀疑是恐怖分子的不同公民。在后冠状病毒时代,我们都被怀疑是危害社会秩序的恐怖分子(携带者)。当然,恐怖主义和病毒有一定的区别,值得提及。恐怖主义是出于政治和心理目的,而COVID-19只是一种病毒(抛弃了任何理性和意志)。尽管如此,加剧工具主义凝视的社会反应似乎是一样的。
{"title":"Differences and Commonalities between Terrorism and COVID-19","authors":"M. Korstanje","doi":"10.4018/ijcwt.297859","DOIUrl":"https://doi.org/10.4018/ijcwt.297859","url":null,"abstract":"In the present essay review, we have placed the notion of the War on Terror on the critical lens of scrutiny. Far from being a foundational event, the global pandemic affirms a trend that originated after the War on Terror. In both the idea of living with the enemy persist. The modern nation-state, which is supported by the health system, deploys disciplinary instruments to detect, trace and isolate the undesired guest. In the days after 9/11, surveillance technologies were used to spy on different citizens who were suspected to be terrorists. In the post COVID19 context, all we are suspected to be terrorists (carriers) who place the social order in jeopardy. Of course, terrorism and the virus have certain differences which merit being mentioned. Terrorism is moved by political and psychological aims while COVID-19 is simply a virus (disposed of any reasoning and will). Nevertheless of this fact, the reaction of society that exacerbates the instrumentalist gaze seems to be the same.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44993905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The impact of COVID-19 epidemic on the radical behavior and armed conflict escalation risks 新冠肺炎疫情对激进行为和武装冲突升级风险的影响
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.298701
Y. Kostyuchenko, V. Pushkar, O. Malysheva, M. Yuschenko
The paper considers the impact of the COVID-19 epidemic to the behavior of militants of illegal armed groups and the population in the militant-controlled territories. The study was conducted on the example of the territories of self-proclaimed “L/DPR” within Donbass (Eastern Ukraine) in the period March-May 2020. Based on the analysis of social networks and media, the main narratives related to the perception of threats of epidemic were identified and analyzed. Its prevalence and dynamics among the militants and population in comparison with radical groups and population of Ukraine was analyzed. The main types of moods and emotions that were associated with the perception of epidemic were identified. The management decisions of the “L/DPR” leaders during the epidemic were analyzed. It was found that the measures of militant's “authorities” were not aimed to protecting population, but to social management - channeling aggression and propaganda discourse constructing.
本文考虑了新冠肺炎疫情对非法武装团体武装分子行为和武装分子控制地区民众的影响。该研究是以2020年3月至5月期间顿巴斯(乌克兰东部)境内自称“L/DPR”的领土为例进行的。基于对社交网络和媒体的分析,确定并分析了与流行病威胁感知相关的主要叙事。与乌克兰激进组织和人口相比,分析了其在武装分子和人口中的流行率和动态。确定了与流行病感知相关的主要情绪和情绪类型。分析了“L/DPR”领导在疫情期间的管理决策。研究发现,激进分子“当局”的措施并不是为了保护人口,而是为了社会管理——引导侵略和宣传话语建构。
{"title":"The impact of COVID-19 epidemic on the radical behavior and armed conflict escalation risks","authors":"Y. Kostyuchenko, V. Pushkar, O. Malysheva, M. Yuschenko","doi":"10.4018/ijcwt.298701","DOIUrl":"https://doi.org/10.4018/ijcwt.298701","url":null,"abstract":"The paper considers the impact of the COVID-19 epidemic to the behavior of militants of illegal armed groups and the population in the militant-controlled territories. The study was conducted on the example of the territories of self-proclaimed “L/DPR” within Donbass (Eastern Ukraine) in the period March-May 2020. Based on the analysis of social networks and media, the main narratives related to the perception of threats of epidemic were identified and analyzed. Its prevalence and dynamics among the militants and population in comparison with radical groups and population of Ukraine was analyzed. The main types of moods and emotions that were associated with the perception of epidemic were identified. The management decisions of the “L/DPR” leaders during the epidemic were analyzed. It was found that the measures of militant's “authorities” were not aimed to protecting population, but to social management - channeling aggression and propaganda discourse constructing.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46313759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boko Haram Insurgency and Violence Against Women and Girls in Nigeria 尼日利亚博科圣地叛乱和暴力侵害妇女和女孩行为
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.304046
Olalonpe Oluwakemi Ajise, B. Omotosho
Nigeria has continued to experience the menace of Boko Haram insurgency over the years. While some progress has been made over the years in curbing the activities of the insurgency in some quarters, the unabated violence against women and its implication on women and girls remain unresolved. As a pointer to the need for a deliberate and focused attention on violence against women and girls due to Boko Haram insurgency in Nigeria, this paper, through the review of relevant literature explores the activities of the insurgency and violence against women. This paper further investigates the implication of violence against women and the social structure as whole. The paper concludes by making recommendation on how the menace of Boko Haram insurgency can be addressed in order to address gender violence against women and crime against womanhood.
多年来,尼日利亚继续遭受博科圣地叛乱的威胁。尽管多年来在遏制某些地区叛乱活动方面取得了一些进展,但针对妇女的暴力行为及其对妇女和女孩的影响有增无减,仍未得到解决。为了表明有必要对尼日利亚博科圣地叛乱造成的暴力侵害妇女和女孩行为给予深思熟虑和集中关注,本文通过审查相关文献,探讨了叛乱和暴力侵害妇女的活动。本文进一步探讨了暴力侵害妇女行为的含义以及整个社会结构。该文件最后就如何应对博科圣地叛乱的威胁提出了建议,以解决针对妇女的性别暴力和针对妇女的犯罪问题。
{"title":"Boko Haram Insurgency and Violence Against Women and Girls in Nigeria","authors":"Olalonpe Oluwakemi Ajise, B. Omotosho","doi":"10.4018/ijcwt.304046","DOIUrl":"https://doi.org/10.4018/ijcwt.304046","url":null,"abstract":"Nigeria has continued to experience the menace of Boko Haram insurgency over the years. While some progress has been made over the years in curbing the activities of the insurgency in some quarters, the unabated violence against women and its implication on women and girls remain unresolved. As a pointer to the need for a deliberate and focused attention on violence against women and girls due to Boko Haram insurgency in Nigeria, this paper, through the review of relevant literature explores the activities of the insurgency and violence against women. This paper further investigates the implication of violence against women and the social structure as whole. The paper concludes by making recommendation on how the menace of Boko Haram insurgency can be addressed in order to address gender violence against women and crime against womanhood.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45587414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Analysis of Horror Stories in the Militants' Narratives as Markers of Violent Behavior and Conflict Identity: Case of "L/DPR" During the Warfare in Donbass, East Ukraine, 2014-2021 武装分子叙事中的恐怖故事作为暴力行为和冲突认同标记的分析——以2014-2021年东乌克兰顿巴斯战争中的“L/DPR”为例
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/IJCWT.297856
Y. Kostyuchenko, V. Pushkar
{"title":"On the Analysis of Horror Stories in the Militants' Narratives as Markers of Violent Behavior and Conflict Identity: Case of \"L/DPR\" During the Warfare in Donbass, East Ukraine, 2014-2021","authors":"Y. Kostyuchenko, V. Pushkar","doi":"10.4018/IJCWT.297856","DOIUrl":"https://doi.org/10.4018/IJCWT.297856","url":null,"abstract":"","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"12 1","pages":"1-19"},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70454205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake Identities in Social Cyberspace: From Escapism to Terrorism 社会网络空间中的假身份:从逃避主义到恐怖主义
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.295867
Lev Topor, Moran Pollack
Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious users like terrorists or criminals manipulate online users with phishing attempts and frauds, making social cyber space less secure.
拟人化——以他人的身份意图欺骗的行为,是一种古老的现象。在本文中,我们试图研究在线冒充并揭示这种现象的原因。我们通过分析和比较几个案例研究来做到这一点,同时参考更传统的社会身份概念。据发现,一方面,用户可以出于个人原因(如偷窥或逃避现实)创建假身份来增强自己的个性,甚至可以通过避免地方威权审查来促进人权。另一方面,恐怖分子或犯罪分子等恶意用户通过网络钓鱼和欺诈手段操纵在线用户,使社交网络空间变得不那么安全。
{"title":"Fake Identities in Social Cyberspace: From Escapism to Terrorism","authors":"Lev Topor, Moran Pollack","doi":"10.4018/ijcwt.295867","DOIUrl":"https://doi.org/10.4018/ijcwt.295867","url":null,"abstract":"Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious users like terrorists or criminals manipulate online users with phishing attempts and frauds, making social cyber space less secure.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"57 1 1","pages":"1-17"},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77311816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cyber Warfare and Terrorism
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1