首页 > 最新文献

International Journal of Cyber Warfare and Terrorism最新文献

英文 中文
Multi-Contextual Analysis of Internet Security Perception and Behavior 网络安全感知与行为的多语境分析
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.305243
Alfred Paa Gyaisey, A. Owusu
Perception has been found to influence thought patterns and human behavior in other academic spheres. However, the impact of perception on technology adoption and use in the field of Information Systems is virtually nonexistent. This study sought to examine the internet security perception of internet users and consequential effect on their online behavior. The study used language (French vs English), as a differentiation tool for the respondents. 101 nationals from different African countries who reside in Ghana were sampled to participate in the study. The study found strong negative security perception, low level of knowledge regarding cyber awareness and a lax attitude in cyber hygiene practices to ensure personal safety when online. Impact of culture on online security perception was not identified, and also respondents were not collectivist in their cultural orientation, a marked shift from long held opinion of strong collectivism in Africa. Implications are also discussed.
在其他学术领域,感知已经被发现会影响思维模式和人类行为。然而,在信息系统领域,感知对技术采用和使用的影响实际上是不存在的。本研究旨在检验互联网用户的网络安全感知及其对其网络行为的影响。该研究使用了语言(法语与英语)作为受访者的区分工具。对居住在加纳的101名来自不同非洲国家的国民进行了抽样调查。该研究发现,人们对安全有强烈的负面看法,对网络意识的知识水平较低,在网络卫生实践中态度松懈,以确保上网时的人身安全。文化对网络安全感知的影响尚未确定,受访者的文化取向也不是集体主义者,这与非洲长期以来强烈的集体主义观点发生了显著转变。还讨论了影响。
{"title":"Multi-Contextual Analysis of Internet Security Perception and Behavior","authors":"Alfred Paa Gyaisey, A. Owusu","doi":"10.4018/ijcwt.305243","DOIUrl":"https://doi.org/10.4018/ijcwt.305243","url":null,"abstract":"Perception has been found to influence thought patterns and human behavior in other academic spheres. However, the impact of perception on technology adoption and use in the field of Information Systems is virtually nonexistent. This study sought to examine the internet security perception of internet users and consequential effect on their online behavior. The study used language (French vs English), as a differentiation tool for the respondents. 101 nationals from different African countries who reside in Ghana were sampled to participate in the study. The study found strong negative security perception, low level of knowledge regarding cyber awareness and a lax attitude in cyber hygiene practices to ensure personal safety when online. Impact of culture on online security perception was not identified, and also respondents were not collectivist in their cultural orientation, a marked shift from long held opinion of strong collectivism in Africa. Implications are also discussed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49519628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the Defence Cooperation Agreements Between the USA and African Countries 美国与非洲国家防务合作协定评估
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.311420
Paul Coonley Boateng, G. Gyamfi
International security cooperation is regarded as one of the key and successful mechanisms to fight terrorism and other cross-border criminal activities worldwide. This paper focuses on the benefits and challenges of the US and African countries' defence cooperation, using Ghana as a case study. This study used 21 people as participants. The subjects were selected based on their unique knowledge and expertise in the phenomenon under study. The researchers used interviews to solicit the views of the participants on the Defence Cooperation Agreement (DCA) between Ghana and the US focusing on the benefits and challenges. In conclusion, the study disclosed that no country has a monopoly on what it takes to fight terrorism and other transnational organised crime alone. The major challenges identified include the breach of domestic law, limited mutual trust, and discriminately ethnic and misguided religious practices. The challenges were stated as indispensable for the sustainability of the DCA and the successful mitigation of terrorism and transnational organised crime in West Africa.
国际安全合作被视为在世界范围内打击恐怖主义和其他跨境犯罪活动的关键和成功机制之一。本文以加纳为例,重点探讨了美国和非洲国家防务合作的好处和挑战。这项研究使用了21人作为参与者。受试者是根据他们对所研究现象的独特知识和专业知识选择的。研究人员通过采访征求了参与者对加纳和美国之间的国防合作协议(DCA)的意见,重点是利益和挑战。总之,该研究表明,没有一个国家能够单独垄断打击恐怖主义和其他跨国有组织犯罪的行动。所确定的主要挑战包括违反国内法、相互信任有限、种族歧视和被误导的宗教做法。这些挑战被认为是DCA的可持续性以及成功缓解西非恐怖主义和跨国有组织犯罪所不可或缺的。
{"title":"Assessing the Defence Cooperation Agreements Between the USA and African Countries","authors":"Paul Coonley Boateng, G. Gyamfi","doi":"10.4018/ijcwt.311420","DOIUrl":"https://doi.org/10.4018/ijcwt.311420","url":null,"abstract":"International security cooperation is regarded as one of the key and successful mechanisms to fight terrorism and other cross-border criminal activities worldwide. This paper focuses on the benefits and challenges of the US and African countries' defence cooperation, using Ghana as a case study. This study used 21 people as participants. The subjects were selected based on their unique knowledge and expertise in the phenomenon under study. The researchers used interviews to solicit the views of the participants on the Defence Cooperation Agreement (DCA) between Ghana and the US focusing on the benefits and challenges. In conclusion, the study disclosed that no country has a monopoly on what it takes to fight terrorism and other transnational organised crime alone. The major challenges identified include the breach of domestic law, limited mutual trust, and discriminately ethnic and misguided religious practices. The challenges were stated as indispensable for the sustainability of the DCA and the successful mitigation of terrorism and transnational organised crime in West Africa.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48353196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lone Wolf vs. an Affiliated Terrorist 独狼vs附属恐怖分子
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.304045
D. Atsa’am, R. Wario
The global terrorism database (GTD) shows that 3.5% of the total terror attacks across the world between 1970 to 2019 were targeted at tourists. A terror attack can be perpetrated by either a lone wolf or an affiliated terrorist. The analysis of the GTD conducted in this study shows that a terror attack targeted at tourists is 4.3 times more likely to have been perpetrated by a lone wolf than by affiliated terrorists. Since lone wolves operate individually, this finding implies that access control measures at tourist centers must regard individuals such as hawkers, newspaper vendors, freelance journalists, etc. who come around to do various businesses around tourists as potential terrorists until proven otherwise. Since lone wolves do not work for a terror group, tourist attraction centers located in the regions, territories, and countries with no presence of terror groups must not relax their counterterrorism control measures under the impression that they are safe from terror attacks.
全球恐怖主义数据库(GTD)显示,1970年至2019年期间,全球恐怖袭击总数的3.5%是针对游客的。恐怖袭击既可能是独狼所为,也可能是有关联的恐怖分子所为。本研究对GTD进行的分析表明,针对游客的恐怖袭击由独狼实施的可能性是附属恐怖分子的4.3倍。由于孤狼是单独行动的,这一发现意味着,在证明事实并非如此之前,旅游中心的门禁措施必须将小贩、报贩、自由记者等在游客周围做各种生意的个人视为潜在的恐怖分子。“孤狼”不会为恐怖组织效力,因此,在没有恐怖组织的地区、领土、国家的旅游中心,不能给人以“不受恐怖袭击”的印象,放松反恐控制措施。
{"title":"A Lone Wolf vs. an Affiliated Terrorist","authors":"D. Atsa’am, R. Wario","doi":"10.4018/ijcwt.304045","DOIUrl":"https://doi.org/10.4018/ijcwt.304045","url":null,"abstract":"The global terrorism database (GTD) shows that 3.5% of the total terror attacks across the world between 1970 to 2019 were targeted at tourists. A terror attack can be perpetrated by either a lone wolf or an affiliated terrorist. The analysis of the GTD conducted in this study shows that a terror attack targeted at tourists is 4.3 times more likely to have been perpetrated by a lone wolf than by affiliated terrorists. Since lone wolves operate individually, this finding implies that access control measures at tourist centers must regard individuals such as hawkers, newspaper vendors, freelance journalists, etc. who come around to do various businesses around tourists as potential terrorists until proven otherwise. Since lone wolves do not work for a terror group, tourist attraction centers located in the regions, territories, and countries with no presence of terror groups must not relax their counterterrorism control measures under the impression that they are safe from terror attacks.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47343106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-Social Factors Influence the Decision Making of Tourists 反社会因素对旅游者决策的影响
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.315590
Parwaiz Ahmad Najar, Hafizullah Dar, Priya Singh, A. Najar
This study is based on extensive scanning of literature about the anti-social factors and their influence on TDM in the Kashmir Valley. Content analysis has applied to the scanned literature. It is clarified from the literature that different anti-social factors exist in societies, but terrorism and biased media are highly influential anti-social factors that influence tourist decision making (TDM) negatively. Generally, way old terrorism incidents of Kashmir are exaggerated by many media houses, and fake news is designed for viewers, mainly for their TRP and other interests. According to results, anti-social factors such as terrorism and biased media have changed the tourists' decision making and their perception drastically regarding the brand of Kashmir as a secure destination.
本研究是基于对克什米尔山谷反社会因素及其对TDM影响的文献的广泛扫描。内容分析已应用于扫描文献。文献表明,社会中存在不同的反社会因素,但恐怖主义和有偏见的媒体是极具影响力的反社会因素,对旅游决策产生负面影响。一般来说,克什米尔的恐怖主义事件被许多媒体夸大了,假新闻是为观众设计的,主要是为了他们的TRP和其他利益。根据结果,反社会因素,如恐怖主义和有偏见的媒体已经改变了游客的决策和他们对克什米尔作为一个安全目的地的品牌的看法。
{"title":"Anti-Social Factors Influence the Decision Making of Tourists","authors":"Parwaiz Ahmad Najar, Hafizullah Dar, Priya Singh, A. Najar","doi":"10.4018/ijcwt.315590","DOIUrl":"https://doi.org/10.4018/ijcwt.315590","url":null,"abstract":"This study is based on extensive scanning of literature about the anti-social factors and their influence on TDM in the Kashmir Valley. Content analysis has applied to the scanned literature. It is clarified from the literature that different anti-social factors exist in societies, but terrorism and biased media are highly influential anti-social factors that influence tourist decision making (TDM) negatively. Generally, way old terrorism incidents of Kashmir are exaggerated by many media houses, and fake news is designed for viewers, mainly for their TRP and other interests. According to results, anti-social factors such as terrorism and biased media have changed the tourists' decision making and their perception drastically regarding the brand of Kashmir as a secure destination.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45652318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection 基于卷积神经网络的AL-DDoS攻击自动诊断系统
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2022-01-01 DOI: 10.4018/ijcwt.305242
F. Abdullayeva
Distributed denial of service (DDoS) attacks are one of the main threats to information security. The purpose of DDoS attacks at the network (IP) and transport (TCP) layers is to consume the network bandwidth and deny service to legitimate users of the target system. Application layer DDoS attacks (AL-DDoS) can be organized against many different applications. Many of these attacks target HTTP, in which case their goal is to deplete the resources of web services. Various schemes have been proposed to detect DDoS attacks on network and transport layers. There are very few works being done to detect AL-DDoS attacks. The development of an intelligent system automatically detecting AL-DDoS attacks in advance is very necessary. In this paper to detect AL-DDoS attacks a deep learning model based on the Convolutional Neural Network is proposed. To simulate the AL-DDoS attack detection process, while in testing of the model on CSE-CIC-IDS2018 DDoS and CSIC 2010 datasets, 0.9974 and 0.9059 accuracy values were obtained, respectively.
分布式拒绝服务(DDoS)攻击是信息安全的主要威胁之一。DDoS攻击的目的是在网络层(IP层)和传输层(TCP层)消耗网络带宽,拒绝对目标系统的合法用户提供服务。应用层DDoS攻击(AL-DDoS)可以针对许多不同的应用进行组织。许多此类攻击都以HTTP为目标,在这种情况下,它们的目标是耗尽web服务的资源。针对网络层和传输层的DDoS攻击,已经提出了多种检测方案。检测AL-DDoS攻击的工作很少。开发一种能够提前自动检测到AL-DDoS攻击的智能系统是非常必要的。为了检测AL-DDoS攻击,本文提出了一种基于卷积神经网络的深度学习模型。为了模拟AL-DDoS攻击检测过程,在CSE-CIC-IDS2018 DDoS和CSIC 2010数据集上对模型进行测试,准确率分别为0.9974和0.9059。
{"title":"Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection","authors":"F. Abdullayeva","doi":"10.4018/ijcwt.305242","DOIUrl":"https://doi.org/10.4018/ijcwt.305242","url":null,"abstract":"Distributed denial of service (DDoS) attacks are one of the main threats to information security. The purpose of DDoS attacks at the network (IP) and transport (TCP) layers is to consume the network bandwidth and deny service to legitimate users of the target system. Application layer DDoS attacks (AL-DDoS) can be organized against many different applications. Many of these attacks target HTTP, in which case their goal is to deplete the resources of web services. Various schemes have been proposed to detect DDoS attacks on network and transport layers. There are very few works being done to detect AL-DDoS attacks. The development of an intelligent system automatically detecting AL-DDoS attacks in advance is very necessary. In this paper to detect AL-DDoS attacks a deep learning model based on the Convolutional Neural Network is proposed. To simulate the AL-DDoS attack detection process, while in testing of the model on CSE-CIC-IDS2018 DDoS and CSIC 2010 datasets, 0.9974 and 0.9059 accuracy values were obtained, respectively.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70454213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Discriminating Accuracy Rate of DDoS Attacks and Flash Events 提高DDoS攻击和Flash事件的识别准确率
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-10-01 DOI: 10.4018/ijcwt.2021100102
Sahareesh Agha, O. Rehman, Ibrahim M. H. Rahman
Internet security has become a big issue with the passage of time. Among many threats, the distributed denial-of-service (DDoS) attack is the most frequent threat in the networks. The purpose of the DDoS attacks is to interrupt service availability provided by different web servers. This results in legitimate users not being able to access the servers and hence facing denial of services. On the other hand, flash events are a high amount of legitimate users visiting a website due to a specific event. Consequences of these attacks are more powerful when launched during flash events, which are legitimate traffic and cause a denial of service. The purpose of this study is to build an intelligent network traffic classification model to improve the discrimination accuracy rate of DDoS attacks from flash events traffic. Weka is adopted as the platform for evaluating the performance of a random forest algorithm.
随着时间的推移,网络安全已经成为一个大问题。在众多威胁中,分布式拒绝服务(DDoS)攻击是网络中最常见的威胁。DDoS攻击的目的是中断不同web服务器提供的服务可用性。这将导致合法用户无法访问服务器,从而面临拒绝服务。另一方面,flash事件是指由于特定事件导致大量合法用户访问网站。在flash事件期间发起这些攻击的后果更为严重,这些事件是合法的流量并导致拒绝服务。本研究的目的是建立一个智能网络流量分类模型,以提高对flash事件流量中DDoS攻击的判别准确率。采用Weka作为评估随机森林算法性能的平台。
{"title":"Improving Discriminating Accuracy Rate of DDoS Attacks and Flash Events","authors":"Sahareesh Agha, O. Rehman, Ibrahim M. H. Rahman","doi":"10.4018/ijcwt.2021100102","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100102","url":null,"abstract":"Internet security has become a big issue with the passage of time. Among many threats, the distributed denial-of-service (DDoS) attack is the most frequent threat in the networks. The purpose of the DDoS attacks is to interrupt service availability provided by different web servers. This results in legitimate users not being able to access the servers and hence facing denial of services. On the other hand, flash events are a high amount of legitimate users visiting a website due to a specific event. Consequences of these attacks are more powerful when launched during flash events, which are legitimate traffic and cause a denial of service. The purpose of this study is to build an intelligent network traffic classification model to improve the discrimination accuracy rate of DDoS attacks from flash events traffic. Weka is adopted as the platform for evaluating the performance of a random forest algorithm.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"25 1","pages":"21-42"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84665425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework 减轻云环境中的网络攻击:硬件支持的多点概念框架
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-10-01 DOI: 10.4018/ijcwt.2021100103
Jitendra Singh
Involvement of multiple cloud providers enhances the security complexity in cloud computing. Despite engaging best in class human and hardware resources, cyber-attacks in cloud paradigm continue to rise. This work aims to explore the cloud vulnerabilities that arise due to the multiple entry points. Underlying security threats are categorized into resources at providers' end, hardware security, transmission security, process security, and endpoint security. To mitigate the cyber-attacks in cloud, this work proposed a comprehensive multi-point-based framework that leverages the underlying hardware to strengthen the security at the user's end, internet service provider's end, and at the cloud data center. Security is further fortified by including the process level interaction at terminals. Framework is advanced enough to accommodate the vulnerable points of a system and a network. With the implementation of the proposed system, potential attacks can be detected during early state of penetration.
多个云提供商的参与增加了云计算的安全性复杂性。尽管拥有一流的人力和硬件资源,云模式下的网络攻击仍在继续增加。这项工作旨在探索由于多个入口点而产生的云漏洞。底层安全威胁可分为提供者端的资源、硬件安全、传输安全、流程安全和端点安全。为了减轻云中的网络攻击,本工作提出了一个综合的基于多点的框架,利用底层硬件来加强用户端、互联网服务提供商端和云数据中心的安全性。通过在终端上包含流程级交互,进一步加强了安全性。框架足够先进,可以容纳系统和网络的脆弱点。通过该系统的实现,可以在渗透的早期阶段检测到潜在的攻击。
{"title":"Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework","authors":"Jitendra Singh","doi":"10.4018/ijcwt.2021100103","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100103","url":null,"abstract":"Involvement of multiple cloud providers enhances the security complexity in cloud computing. Despite engaging best in class human and hardware resources, cyber-attacks in cloud paradigm continue to rise. This work aims to explore the cloud vulnerabilities that arise due to the multiple entry points. Underlying security threats are categorized into resources at providers' end, hardware security, transmission security, process security, and endpoint security. To mitigate the cyber-attacks in cloud, this work proposed a comprehensive multi-point-based framework that leverages the underlying hardware to strengthen the security at the user's end, internet service provider's end, and at the cloud data center. Security is further fortified by including the process level interaction at terminals. Framework is advanced enough to accommodate the vulnerable points of a system and a network. With the implementation of the proposed system, potential attacks can be detected during early state of penetration.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"11 1","pages":"43-57"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81187412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International Law and Cyberoperations: French View 国际法与网络行动:法国观点
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-10-01 DOI: 10.4018/ijcwt.2021100101
Martina Šmuclerová
Foreign cyberattacks and interferences are becoming more frequent and sophisticated. In the continued absence of a general consensus regarding the applicability of concrete international legal rules in the domain of cybersecurity, individual States are beginning to determine unilaterally their national positions. The article introduces and critically assesses the national strategy of France published in late 2019 in light of current international law and further developments in 2020. France confirms the validity of current international legal norms and raises challenging and innovative legal points for an efficient update such as the right to respond to any unlawful cyberoperation that targets France, right to preemptive self-defence, and violation of the due diligence principle. The mission of the article is to evaluate the document as an important source of impetus and the potential of its impact in international law of cybersecurity.
外国的网络攻击和干扰变得越来越频繁和复杂。由于对网络安全领域具体国际法律规则的适用性仍然缺乏普遍的协商一致意见,个别国家开始单方面决定其国家立场。本文根据现行国际法和2020年的进一步发展,介绍并批判性地评估了法国2019年底发布的国家战略。法国确认了现行国际法律规范的有效性,并提出了具有挑战性和创新性的法律要点,如应对任何针对法国的非法网络行动的权利、先发制人的自卫权利和违反尽职调查原则。本文的任务是评估该文件作为一个重要的动力来源及其对网络安全国际法的潜在影响。
{"title":"International Law and Cyberoperations: French View","authors":"Martina Šmuclerová","doi":"10.4018/ijcwt.2021100101","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100101","url":null,"abstract":"Foreign cyberattacks and interferences are becoming more frequent and sophisticated. In the continued absence of a general consensus regarding the applicability of concrete international legal rules in the domain of cybersecurity, individual States are beginning to determine unilaterally their national positions. The article introduces and critically assesses the national strategy of France published in late 2019 in light of current international law and further developments in 2020. France confirms the validity of current international legal norms and raises challenging and innovative legal points for an efficient update such as the right to respond to any unlawful cyberoperation that targets France, right to preemptive self-defence, and violation of the due diligence principle. The mission of the article is to evaluate the document as an important source of impetus and the potential of its impact in international law of cybersecurity.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"62 1","pages":"1-20"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80490772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Islamists vs. Far Right Extremists: Insights Derived From Data Mining 伊斯兰主义者与极右翼极端分子:来自数据挖掘的见解
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-10-01 DOI: 10.4018/ijcwt.2021100105
Yeslam Al‐Saggaf, Patrick F. Walsh
In this study, a data mining technique, specifically a decision tree, was applied to look at the similarities and differences between Islamists and Far Right extremists in the Profiles of Individual Radicalisation in the United States (PIRUS) dataset. The aim was to identify differences and similarities across various groups that may highlight overlaps and variations across both Islamists and Far Right extremists. The data mining technique analysed data in the PIRUS dataset according to the PIRUS codebook's grouping of variables. The decision tree technique generated a number of rules that provided insights about previously unknown similarities and differences between Islamists and Far Right extremists. This study demonstrates that data mining is a valuable approach for shedding light on factors and patterns related to different forms of violent extremism.
在这项研究中,一种数据挖掘技术,特别是决策树,被应用于研究美国个人激进化概况(PIRUS)数据集中伊斯兰主义者和极右翼极端分子之间的异同。其目的是找出不同群体之间的差异和相似之处,这些差异可能会突出伊斯兰主义者和极右翼极端分子之间的重叠和差异。数据挖掘技术根据PIRUS码本的变量分组对PIRUS数据集中的数据进行分析。决策树技术产生了许多规则,这些规则提供了关于伊斯兰主义者和极右翼极端分子之间以前未知的异同的见解。这项研究表明,数据挖掘是揭示与不同形式的暴力极端主义有关的因素和模式的一种有价值的方法。
{"title":"Islamists vs. Far Right Extremists: Insights Derived From Data Mining","authors":"Yeslam Al‐Saggaf, Patrick F. Walsh","doi":"10.4018/ijcwt.2021100105","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100105","url":null,"abstract":"In this study, a data mining technique, specifically a decision tree, was applied to look at the similarities and differences between Islamists and Far Right extremists in the Profiles of Individual Radicalisation in the United States (PIRUS) dataset. The aim was to identify differences and similarities across various groups that may highlight overlaps and variations across both Islamists and Far Right extremists. The data mining technique analysed data in the PIRUS dataset according to the PIRUS codebook's grouping of variables. The decision tree technique generated a number of rules that provided insights about previously unknown similarities and differences between Islamists and Far Right extremists. This study demonstrates that data mining is a valuable approach for shedding light on factors and patterns related to different forms of violent extremism.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":"74-92"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82840049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global Terrorism as a Virus: Pathogenesis of Evildoing 作为病毒的全球恐怖主义:恶行的发病机制
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-10-01 DOI: 10.4018/ijcwt.2021100104
Primavera Fisogni
Two decades after the twin towers collapsed, the identification of global terrorism still remains an open question for everyone. However, since 9/11, the trope of the virus entered the scholarly discourses as well as the sociopolitical debate. This investigation is aimed at moving from the metaphor of terrorism as a virus to the virus-like pathogenic processes that affect terror threats. The proposal is to highlight the fluid identity of a main viral phenomenon of evildoing, according to a strict dialogue with the microbiological domain. New lenses are needed. As the author argues, systemic thinking better suits this subject matter than traditional linear thinking. The author will seek to highlight the development of global terrorism in terms of the biological mechanism of the virus's life (pathogenesis). Finally, it will be assumed that through the subject matter of global threat philosophy can improve the understanding of a dynamic principle of identity suitable to living entities/open systems.
在双子塔倒塌20年后,对每个人来说,全球恐怖主义的识别仍然是一个悬而未决的问题。然而,自9/11以来,病毒的比喻进入了学术话语和社会政治辩论。这项调查的目的是将恐怖主义比喻为病毒,转向影响恐怖威胁的病毒样致病过程。该提案是根据与微生物领域的严格对话,突出主要病毒邪恶现象的流体特性。需要新的镜片。正如作者所说,系统思维比传统的线性思维更适合这个主题。作者将试图从病毒生命(发病机制)的生物学机制方面强调全球恐怖主义的发展。最后,假设通过全球威胁哲学的主题可以提高对适用于生物实体/开放系统的动态同一性原则的理解。
{"title":"Global Terrorism as a Virus: Pathogenesis of Evildoing","authors":"Primavera Fisogni","doi":"10.4018/ijcwt.2021100104","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100104","url":null,"abstract":"Two decades after the twin towers collapsed, the identification of global terrorism still remains an open question for everyone. However, since 9/11, the trope of the virus entered the scholarly discourses as well as the sociopolitical debate. This investigation is aimed at moving from the metaphor of terrorism as a virus to the virus-like pathogenic processes that affect terror threats. The proposal is to highlight the fluid identity of a main viral phenomenon of evildoing, according to a strict dialogue with the microbiological domain. New lenses are needed. As the author argues, systemic thinking better suits this subject matter than traditional linear thinking. The author will seek to highlight the development of global terrorism in terms of the biological mechanism of the virus's life (pathogenesis). Finally, it will be assumed that through the subject matter of global threat philosophy can improve the understanding of a dynamic principle of identity suitable to living entities/open systems.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"9 1","pages":"58-73"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79671276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cyber Warfare and Terrorism
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1