Perception has been found to influence thought patterns and human behavior in other academic spheres. However, the impact of perception on technology adoption and use in the field of Information Systems is virtually nonexistent. This study sought to examine the internet security perception of internet users and consequential effect on their online behavior. The study used language (French vs English), as a differentiation tool for the respondents. 101 nationals from different African countries who reside in Ghana were sampled to participate in the study. The study found strong negative security perception, low level of knowledge regarding cyber awareness and a lax attitude in cyber hygiene practices to ensure personal safety when online. Impact of culture on online security perception was not identified, and also respondents were not collectivist in their cultural orientation, a marked shift from long held opinion of strong collectivism in Africa. Implications are also discussed.
{"title":"Multi-Contextual Analysis of Internet Security Perception and Behavior","authors":"Alfred Paa Gyaisey, A. Owusu","doi":"10.4018/ijcwt.305243","DOIUrl":"https://doi.org/10.4018/ijcwt.305243","url":null,"abstract":"Perception has been found to influence thought patterns and human behavior in other academic spheres. However, the impact of perception on technology adoption and use in the field of Information Systems is virtually nonexistent. This study sought to examine the internet security perception of internet users and consequential effect on their online behavior. The study used language (French vs English), as a differentiation tool for the respondents. 101 nationals from different African countries who reside in Ghana were sampled to participate in the study. The study found strong negative security perception, low level of knowledge regarding cyber awareness and a lax attitude in cyber hygiene practices to ensure personal safety when online. Impact of culture on online security perception was not identified, and also respondents were not collectivist in their cultural orientation, a marked shift from long held opinion of strong collectivism in Africa. Implications are also discussed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49519628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
International security cooperation is regarded as one of the key and successful mechanisms to fight terrorism and other cross-border criminal activities worldwide. This paper focuses on the benefits and challenges of the US and African countries' defence cooperation, using Ghana as a case study. This study used 21 people as participants. The subjects were selected based on their unique knowledge and expertise in the phenomenon under study. The researchers used interviews to solicit the views of the participants on the Defence Cooperation Agreement (DCA) between Ghana and the US focusing on the benefits and challenges. In conclusion, the study disclosed that no country has a monopoly on what it takes to fight terrorism and other transnational organised crime alone. The major challenges identified include the breach of domestic law, limited mutual trust, and discriminately ethnic and misguided religious practices. The challenges were stated as indispensable for the sustainability of the DCA and the successful mitigation of terrorism and transnational organised crime in West Africa.
{"title":"Assessing the Defence Cooperation Agreements Between the USA and African Countries","authors":"Paul Coonley Boateng, G. Gyamfi","doi":"10.4018/ijcwt.311420","DOIUrl":"https://doi.org/10.4018/ijcwt.311420","url":null,"abstract":"International security cooperation is regarded as one of the key and successful mechanisms to fight terrorism and other cross-border criminal activities worldwide. This paper focuses on the benefits and challenges of the US and African countries' defence cooperation, using Ghana as a case study. This study used 21 people as participants. The subjects were selected based on their unique knowledge and expertise in the phenomenon under study. The researchers used interviews to solicit the views of the participants on the Defence Cooperation Agreement (DCA) between Ghana and the US focusing on the benefits and challenges. In conclusion, the study disclosed that no country has a monopoly on what it takes to fight terrorism and other transnational organised crime alone. The major challenges identified include the breach of domestic law, limited mutual trust, and discriminately ethnic and misguided religious practices. The challenges were stated as indispensable for the sustainability of the DCA and the successful mitigation of terrorism and transnational organised crime in West Africa.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48353196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The global terrorism database (GTD) shows that 3.5% of the total terror attacks across the world between 1970 to 2019 were targeted at tourists. A terror attack can be perpetrated by either a lone wolf or an affiliated terrorist. The analysis of the GTD conducted in this study shows that a terror attack targeted at tourists is 4.3 times more likely to have been perpetrated by a lone wolf than by affiliated terrorists. Since lone wolves operate individually, this finding implies that access control measures at tourist centers must regard individuals such as hawkers, newspaper vendors, freelance journalists, etc. who come around to do various businesses around tourists as potential terrorists until proven otherwise. Since lone wolves do not work for a terror group, tourist attraction centers located in the regions, territories, and countries with no presence of terror groups must not relax their counterterrorism control measures under the impression that they are safe from terror attacks.
{"title":"A Lone Wolf vs. an Affiliated Terrorist","authors":"D. Atsa’am, R. Wario","doi":"10.4018/ijcwt.304045","DOIUrl":"https://doi.org/10.4018/ijcwt.304045","url":null,"abstract":"The global terrorism database (GTD) shows that 3.5% of the total terror attacks across the world between 1970 to 2019 were targeted at tourists. A terror attack can be perpetrated by either a lone wolf or an affiliated terrorist. The analysis of the GTD conducted in this study shows that a terror attack targeted at tourists is 4.3 times more likely to have been perpetrated by a lone wolf than by affiliated terrorists. Since lone wolves operate individually, this finding implies that access control measures at tourist centers must regard individuals such as hawkers, newspaper vendors, freelance journalists, etc. who come around to do various businesses around tourists as potential terrorists until proven otherwise. Since lone wolves do not work for a terror group, tourist attraction centers located in the regions, territories, and countries with no presence of terror groups must not relax their counterterrorism control measures under the impression that they are safe from terror attacks.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47343106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Parwaiz Ahmad Najar, Hafizullah Dar, Priya Singh, A. Najar
This study is based on extensive scanning of literature about the anti-social factors and their influence on TDM in the Kashmir Valley. Content analysis has applied to the scanned literature. It is clarified from the literature that different anti-social factors exist in societies, but terrorism and biased media are highly influential anti-social factors that influence tourist decision making (TDM) negatively. Generally, way old terrorism incidents of Kashmir are exaggerated by many media houses, and fake news is designed for viewers, mainly for their TRP and other interests. According to results, anti-social factors such as terrorism and biased media have changed the tourists' decision making and their perception drastically regarding the brand of Kashmir as a secure destination.
{"title":"Anti-Social Factors Influence the Decision Making of Tourists","authors":"Parwaiz Ahmad Najar, Hafizullah Dar, Priya Singh, A. Najar","doi":"10.4018/ijcwt.315590","DOIUrl":"https://doi.org/10.4018/ijcwt.315590","url":null,"abstract":"This study is based on extensive scanning of literature about the anti-social factors and their influence on TDM in the Kashmir Valley. Content analysis has applied to the scanned literature. It is clarified from the literature that different anti-social factors exist in societies, but terrorism and biased media are highly influential anti-social factors that influence tourist decision making (TDM) negatively. Generally, way old terrorism incidents of Kashmir are exaggerated by many media houses, and fake news is designed for viewers, mainly for their TRP and other interests. According to results, anti-social factors such as terrorism and biased media have changed the tourists' decision making and their perception drastically regarding the brand of Kashmir as a secure destination.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45652318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed denial of service (DDoS) attacks are one of the main threats to information security. The purpose of DDoS attacks at the network (IP) and transport (TCP) layers is to consume the network bandwidth and deny service to legitimate users of the target system. Application layer DDoS attacks (AL-DDoS) can be organized against many different applications. Many of these attacks target HTTP, in which case their goal is to deplete the resources of web services. Various schemes have been proposed to detect DDoS attacks on network and transport layers. There are very few works being done to detect AL-DDoS attacks. The development of an intelligent system automatically detecting AL-DDoS attacks in advance is very necessary. In this paper to detect AL-DDoS attacks a deep learning model based on the Convolutional Neural Network is proposed. To simulate the AL-DDoS attack detection process, while in testing of the model on CSE-CIC-IDS2018 DDoS and CSIC 2010 datasets, 0.9974 and 0.9059 accuracy values were obtained, respectively.
{"title":"Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection","authors":"F. Abdullayeva","doi":"10.4018/ijcwt.305242","DOIUrl":"https://doi.org/10.4018/ijcwt.305242","url":null,"abstract":"Distributed denial of service (DDoS) attacks are one of the main threats to information security. The purpose of DDoS attacks at the network (IP) and transport (TCP) layers is to consume the network bandwidth and deny service to legitimate users of the target system. Application layer DDoS attacks (AL-DDoS) can be organized against many different applications. Many of these attacks target HTTP, in which case their goal is to deplete the resources of web services. Various schemes have been proposed to detect DDoS attacks on network and transport layers. There are very few works being done to detect AL-DDoS attacks. The development of an intelligent system automatically detecting AL-DDoS attacks in advance is very necessary. In this paper to detect AL-DDoS attacks a deep learning model based on the Convolutional Neural Network is proposed. To simulate the AL-DDoS attack detection process, while in testing of the model on CSE-CIC-IDS2018 DDoS and CSIC 2010 datasets, 0.9974 and 0.9059 accuracy values were obtained, respectively.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70454213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/ijcwt.2021100102
Sahareesh Agha, O. Rehman, Ibrahim M. H. Rahman
Internet security has become a big issue with the passage of time. Among many threats, the distributed denial-of-service (DDoS) attack is the most frequent threat in the networks. The purpose of the DDoS attacks is to interrupt service availability provided by different web servers. This results in legitimate users not being able to access the servers and hence facing denial of services. On the other hand, flash events are a high amount of legitimate users visiting a website due to a specific event. Consequences of these attacks are more powerful when launched during flash events, which are legitimate traffic and cause a denial of service. The purpose of this study is to build an intelligent network traffic classification model to improve the discrimination accuracy rate of DDoS attacks from flash events traffic. Weka is adopted as the platform for evaluating the performance of a random forest algorithm.
{"title":"Improving Discriminating Accuracy Rate of DDoS Attacks and Flash Events","authors":"Sahareesh Agha, O. Rehman, Ibrahim M. H. Rahman","doi":"10.4018/ijcwt.2021100102","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100102","url":null,"abstract":"Internet security has become a big issue with the passage of time. Among many threats, the distributed denial-of-service (DDoS) attack is the most frequent threat in the networks. The purpose of the DDoS attacks is to interrupt service availability provided by different web servers. This results in legitimate users not being able to access the servers and hence facing denial of services. On the other hand, flash events are a high amount of legitimate users visiting a website due to a specific event. Consequences of these attacks are more powerful when launched during flash events, which are legitimate traffic and cause a denial of service. The purpose of this study is to build an intelligent network traffic classification model to improve the discrimination accuracy rate of DDoS attacks from flash events traffic. Weka is adopted as the platform for evaluating the performance of a random forest algorithm.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"25 1","pages":"21-42"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84665425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/ijcwt.2021100103
Jitendra Singh
Involvement of multiple cloud providers enhances the security complexity in cloud computing. Despite engaging best in class human and hardware resources, cyber-attacks in cloud paradigm continue to rise. This work aims to explore the cloud vulnerabilities that arise due to the multiple entry points. Underlying security threats are categorized into resources at providers' end, hardware security, transmission security, process security, and endpoint security. To mitigate the cyber-attacks in cloud, this work proposed a comprehensive multi-point-based framework that leverages the underlying hardware to strengthen the security at the user's end, internet service provider's end, and at the cloud data center. Security is further fortified by including the process level interaction at terminals. Framework is advanced enough to accommodate the vulnerable points of a system and a network. With the implementation of the proposed system, potential attacks can be detected during early state of penetration.
{"title":"Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework","authors":"Jitendra Singh","doi":"10.4018/ijcwt.2021100103","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100103","url":null,"abstract":"Involvement of multiple cloud providers enhances the security complexity in cloud computing. Despite engaging best in class human and hardware resources, cyber-attacks in cloud paradigm continue to rise. This work aims to explore the cloud vulnerabilities that arise due to the multiple entry points. Underlying security threats are categorized into resources at providers' end, hardware security, transmission security, process security, and endpoint security. To mitigate the cyber-attacks in cloud, this work proposed a comprehensive multi-point-based framework that leverages the underlying hardware to strengthen the security at the user's end, internet service provider's end, and at the cloud data center. Security is further fortified by including the process level interaction at terminals. Framework is advanced enough to accommodate the vulnerable points of a system and a network. With the implementation of the proposed system, potential attacks can be detected during early state of penetration.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"11 1","pages":"43-57"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81187412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/ijcwt.2021100101
Martina Šmuclerová
Foreign cyberattacks and interferences are becoming more frequent and sophisticated. In the continued absence of a general consensus regarding the applicability of concrete international legal rules in the domain of cybersecurity, individual States are beginning to determine unilaterally their national positions. The article introduces and critically assesses the national strategy of France published in late 2019 in light of current international law and further developments in 2020. France confirms the validity of current international legal norms and raises challenging and innovative legal points for an efficient update such as the right to respond to any unlawful cyberoperation that targets France, right to preemptive self-defence, and violation of the due diligence principle. The mission of the article is to evaluate the document as an important source of impetus and the potential of its impact in international law of cybersecurity.
{"title":"International Law and Cyberoperations: French View","authors":"Martina Šmuclerová","doi":"10.4018/ijcwt.2021100101","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100101","url":null,"abstract":"Foreign cyberattacks and interferences are becoming more frequent and sophisticated. In the continued absence of a general consensus regarding the applicability of concrete international legal rules in the domain of cybersecurity, individual States are beginning to determine unilaterally their national positions. The article introduces and critically assesses the national strategy of France published in late 2019 in light of current international law and further developments in 2020. France confirms the validity of current international legal norms and raises challenging and innovative legal points for an efficient update such as the right to respond to any unlawful cyberoperation that targets France, right to preemptive self-defence, and violation of the due diligence principle. The mission of the article is to evaluate the document as an important source of impetus and the potential of its impact in international law of cybersecurity.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"62 1","pages":"1-20"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80490772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/ijcwt.2021100105
Yeslam Al‐Saggaf, Patrick F. Walsh
In this study, a data mining technique, specifically a decision tree, was applied to look at the similarities and differences between Islamists and Far Right extremists in the Profiles of Individual Radicalisation in the United States (PIRUS) dataset. The aim was to identify differences and similarities across various groups that may highlight overlaps and variations across both Islamists and Far Right extremists. The data mining technique analysed data in the PIRUS dataset according to the PIRUS codebook's grouping of variables. The decision tree technique generated a number of rules that provided insights about previously unknown similarities and differences between Islamists and Far Right extremists. This study demonstrates that data mining is a valuable approach for shedding light on factors and patterns related to different forms of violent extremism.
{"title":"Islamists vs. Far Right Extremists: Insights Derived From Data Mining","authors":"Yeslam Al‐Saggaf, Patrick F. Walsh","doi":"10.4018/ijcwt.2021100105","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100105","url":null,"abstract":"In this study, a data mining technique, specifically a decision tree, was applied to look at the similarities and differences between Islamists and Far Right extremists in the Profiles of Individual Radicalisation in the United States (PIRUS) dataset. The aim was to identify differences and similarities across various groups that may highlight overlaps and variations across both Islamists and Far Right extremists. The data mining technique analysed data in the PIRUS dataset according to the PIRUS codebook's grouping of variables. The decision tree technique generated a number of rules that provided insights about previously unknown similarities and differences between Islamists and Far Right extremists. This study demonstrates that data mining is a valuable approach for shedding light on factors and patterns related to different forms of violent extremism.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":"74-92"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82840049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/ijcwt.2021100104
Primavera Fisogni
Two decades after the twin towers collapsed, the identification of global terrorism still remains an open question for everyone. However, since 9/11, the trope of the virus entered the scholarly discourses as well as the sociopolitical debate. This investigation is aimed at moving from the metaphor of terrorism as a virus to the virus-like pathogenic processes that affect terror threats. The proposal is to highlight the fluid identity of a main viral phenomenon of evildoing, according to a strict dialogue with the microbiological domain. New lenses are needed. As the author argues, systemic thinking better suits this subject matter than traditional linear thinking. The author will seek to highlight the development of global terrorism in terms of the biological mechanism of the virus's life (pathogenesis). Finally, it will be assumed that through the subject matter of global threat philosophy can improve the understanding of a dynamic principle of identity suitable to living entities/open systems.
{"title":"Global Terrorism as a Virus: Pathogenesis of Evildoing","authors":"Primavera Fisogni","doi":"10.4018/ijcwt.2021100104","DOIUrl":"https://doi.org/10.4018/ijcwt.2021100104","url":null,"abstract":"Two decades after the twin towers collapsed, the identification of global terrorism still remains an open question for everyone. However, since 9/11, the trope of the virus entered the scholarly discourses as well as the sociopolitical debate. This investigation is aimed at moving from the metaphor of terrorism as a virus to the virus-like pathogenic processes that affect terror threats. The proposal is to highlight the fluid identity of a main viral phenomenon of evildoing, according to a strict dialogue with the microbiological domain. New lenses are needed. As the author argues, systemic thinking better suits this subject matter than traditional linear thinking. The author will seek to highlight the development of global terrorism in terms of the biological mechanism of the virus's life (pathogenesis). Finally, it will be assumed that through the subject matter of global threat philosophy can improve the understanding of a dynamic principle of identity suitable to living entities/open systems.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"9 1","pages":"58-73"},"PeriodicalIF":0.5,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79671276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}