首页 > 最新文献

International Journal of Cyber Warfare and Terrorism最新文献

英文 中文
A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches 大型数据泄露对货币影响的蒙特卡罗分析
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-07-01 DOI: 10.4018/IJCWT.2021070105
M. Canan, Omer Ilker Poyraz, Anthony Akil
The monetary impact of mega data breaches has been a significant concern for enterprises. The study of data breach risk assessment is a necessity for organizations to have effective cybersecurity risk management. Due to the lack of available data, it is not easy to obtain a comprehensive understanding of the interactions among factors that affect the cost of mega data breaches. The Monte Carlo analysis results were used to explicate the interactions among independent variables and emerging patterns in the variation of the total data breach cost. The findings of this study are as follows: The total data breach cost varies significantly with personally identifiable information (PII) and sensitive personally identifiable information (SPII) with unique patterns. Second, SPII must be a separate independent variable. Third, the multilevel factorial interactions between SPII and the other independent variables elucidate subtle patterns in the total data breach cost variation. Fourth, class action lawsuit (CAL) categorical variables regulate the variation in the total data breach cost.
大型数据泄露的经济影响一直是企业关注的一个重大问题。研究数据泄露风险评估是组织进行有效网络安全风险管理的必要条件。由于缺乏可用数据,要全面了解影响大型数据泄露成本的因素之间的相互作用并不容易。蒙特卡罗分析结果解释了数据泄露总成本变化中自变量之间的相互作用和新出现的模式。研究发现:个人身份信息(PII)和敏感个人身份信息(SPII)具有独特的模式,数据泄露总成本差异显著。其次,SPII必须是一个独立的自变量。第三,spi与其他自变量之间的多层次析因相互作用阐明了数据泄露总成本变化的微妙模式。第四,集体诉讼(CAL)分类变量调节了数据泄露总成本的变化。
{"title":"A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches","authors":"M. Canan, Omer Ilker Poyraz, Anthony Akil","doi":"10.4018/IJCWT.2021070105","DOIUrl":"https://doi.org/10.4018/IJCWT.2021070105","url":null,"abstract":"The monetary impact of mega data breaches has been a significant concern for enterprises. The study of data breach risk assessment is a necessity for organizations to have effective cybersecurity risk management. Due to the lack of available data, it is not easy to obtain a comprehensive understanding of the interactions among factors that affect the cost of mega data breaches. The Monte Carlo analysis results were used to explicate the interactions among independent variables and emerging patterns in the variation of the total data breach cost. The findings of this study are as follows: The total data breach cost varies significantly with personally identifiable information (PII) and sensitive personally identifiable information (SPII) with unique patterns. Second, SPII must be a separate independent variable. Third, the multilevel factorial interactions between SPII and the other independent variables elucidate subtle patterns in the total data breach cost variation. Fourth, class action lawsuit (CAL) categorical variables regulate the variation in the total data breach cost.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"18 1","pages":"58-81"},"PeriodicalIF":0.5,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74426265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complex System Governance as a Foundation for Enhancing the Cybersecurity of Cyber-Physical Systems 复杂系统治理是增强网络物理系统网络安全的基础
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-07-01 DOI: 10.4018/IJCWT.2021070101
Polinpapilinho F. Katina, Omer F. Keskin
This article investigates the possible benefits of complex system governance (CSG) as a foundation for enhancing cybersecurity in critical cyber-physical systems (CPS). CPS are intrinsically linked to cyberspace and vulnerable to a wide range of risks stemming from physical and cyber threats. There remains a lack of robust frameworks for addressing the issue of cybersecurity for CPS at the metasystem level. In response, the authors suggest CSG as an organizing construct capable of providing a greater degree of cohesion and as a means to provide for design, execution, and evolution of ‘metasystemic' functions necessary to provide for communication, control, and coordination, and integration is critical to the cybersecurity of CPS. In this article, CSG is introduced as a potential construct for enhancing cybersecurity in CPS. A hypothetical case study application is then provided to illustrate the potential for this research. Finally, the authors offer conclusions and suggest future research. Keywords Case Study, Complex System Governance, Cyber-Physical Systems, Management Cybernetics, Metasystem Function, Power Grid, Systems Thinking
本文研究了复杂系统治理(CSG)作为增强关键网络物理系统(CPS)网络安全的基础可能带来的好处。CPS与网络空间有着内在联系,容易受到来自物理和网络威胁的各种风险的影响。在元系统级别,仍然缺乏解决CPS网络安全问题的强大框架。作为回应,作者建议CSG作为一种组织结构,能够提供更大程度的内聚,并作为提供通信、控制和协调所需的“元系统”功能的设计、执行和演变的手段,而集成对于CPS的网络安全至关重要。本文介绍了CSG作为增强CPS网络安全的潜在结构。然后提供了一个假设的案例研究应用来说明这项研究的潜力。最后,作者给出了结论,并对未来的研究提出了建议。关键词:案例研究,复杂系统治理,信息物理系统,管理控制论,元系统功能,电网,系统思维
{"title":"Complex System Governance as a Foundation for Enhancing the Cybersecurity of Cyber-Physical Systems","authors":"Polinpapilinho F. Katina, Omer F. Keskin","doi":"10.4018/IJCWT.2021070101","DOIUrl":"https://doi.org/10.4018/IJCWT.2021070101","url":null,"abstract":"This article investigates the possible benefits of complex system governance (CSG) as a foundation for enhancing cybersecurity in critical cyber-physical systems (CPS). CPS are intrinsically linked to cyberspace and vulnerable to a wide range of risks stemming from physical and cyber threats. There remains a lack of robust frameworks for addressing the issue of cybersecurity for CPS at the metasystem level. In response, the authors suggest CSG as an organizing construct capable of providing a greater degree of cohesion and as a means to provide for design, execution, and evolution of ‘metasystemic' functions necessary to provide for communication, control, and coordination, and integration is critical to the cybersecurity of CPS. In this article, CSG is introduced as a potential construct for enhancing cybersecurity in CPS. A hypothetical case study application is then provided to illustrate the potential for this research. Finally, the authors offer conclusions and suggest future research. Keywords Case Study, Complex System Governance, Cyber-Physical Systems, Management Cybernetics, Metasystem Function, Power Grid, Systems Thinking","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"27 1","pages":"1-14"},"PeriodicalIF":0.5,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72989939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Commissioning Development to Externals: Addressing Infosec Risks Upfront 委托外部开发:提前解决信息安全风险
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-07-01 DOI: 10.4018/IJCWT.2021070103
Yasir Gokce
Bringing externals in the critical business processes and having them assume some or all of the responsibilities associated with the critical business functions comes with information security risks whose impact, if materialized, could be disastrous for business and therefore warrants a meticulous and holistic approach for managing those risks. Compounded with the engagement of externals in the development process, risks facing a development project require robust risk management by the outsourcing organization. The organization should be able influence the security behavior of those externals and induce them to comply with certain secure development principles and practices. Delving deep into those risks brought about by suppliers, this study aims at offering a methodology in addressing the risks associated with commissioning some or all components of a would-be-developed product to externals and shows how those risks can be mitigated by controlling the security behavior of suppliers through well-tailored contractual provisions.
将外部人员引入关键业务流程并让他们承担与关键业务功能相关的部分或全部责任会带来信息安全风险,如果这些风险成为现实,可能会对业务造成灾难性的影响,因此需要一种细致而全面的方法来管理这些风险。与开发过程中外部人员的参与相结合,开发项目面临的风险需要由外包组织进行稳健的风险管理。组织应该能够影响这些外部人员的安全行为,并诱导他们遵守某些安全开发原则和实践。深入研究供应商带来的这些风险,本研究旨在提供一种方法来解决与将即将开发的产品的部分或全部组件委托给外部相关的风险,并展示如何通过精心定制的合同条款控制供应商的安全行为来减轻这些风险。
{"title":"Commissioning Development to Externals: Addressing Infosec Risks Upfront","authors":"Yasir Gokce","doi":"10.4018/IJCWT.2021070103","DOIUrl":"https://doi.org/10.4018/IJCWT.2021070103","url":null,"abstract":"Bringing externals in the critical business processes and having them assume some or all of the responsibilities associated with the critical business functions comes with information security risks whose impact, if materialized, could be disastrous for business and therefore warrants a meticulous and holistic approach for managing those risks. Compounded with the engagement of externals in the development process, risks facing a development project require robust risk management by the outsourcing organization. The organization should be able influence the security behavior of those externals and induce them to comply with certain secure development principles and practices. Delving deep into those risks brought about by suppliers, this study aims at offering a methodology in addressing the risks associated with commissioning some or all components of a would-be-developed product to externals and shows how those risks can be mitigated by controlling the security behavior of suppliers through well-tailored contractual provisions.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"12 1","pages":"30-40"},"PeriodicalIF":0.5,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75561334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COVID-19 and Biocybersecurity's Increasing Role on Defending Forward COVID-19和生物网络安全在防御前沿中的作用日益增强
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-07-01 DOI: 10.4018/IJCWT.2021070102
X. Palmer, Lucas Potter, Saltuk Karahan
The evolving nature of warfare has been changing with cybersecurity and the use of advanced biotechnology in each aspect of the society is expanding and overlapping with the cyberworld. This intersection, which has been described as “biocybersecurity” (BCS), can become a major front of the 21st-century conflicts. There are three lines of BCS which make it a critical component of overall cybersecurity: (1) cyber operations within the area of BCS have life threatening consequences to a greater extent than other cyber operations, (2) the breach in health-related personal data is a significant tool for fatal attacks, and (3) health-related misinformation campaigns as a component of BCS can cause significant damage compared to other misinformation campaigns. Based on the observation that rather than initiating the necessary cooperation COVID-19 helped exacerbate the existing conflicts, the authors suggest that BCS needs to be considered as an essential component of the cyber doctrine, within the Defending Forward framework. The findings are expected to help future cyber policy developments.
随着网络安全的发展,战争的性质也在不断变化,先进生物技术在社会各个方面的应用也在扩大,并与网络世界重叠。这个被称为“生物网络安全”(BCS)的交叉点可能成为21世纪冲突的主要前线。BCS有三条线,使其成为整体网络安全的关键组成部分:(1)与其他网络操作相比,BCS区域内的网络操作在更大程度上具有威胁生命的后果;(2)与健康相关的个人数据泄露是致命攻击的重要工具;(3)与健康相关的错误信息活动作为BCS的一个组成部分,与其他错误信息活动相比,可能造成重大损害。鉴于新冠肺炎疫情非但没有启动必要的合作,反而加剧了现有的冲突,作者建议,在“前沿防御”框架下,BCS需要被视为网络理论的一个重要组成部分。预计这些发现将有助于未来网络政策的发展。
{"title":"COVID-19 and Biocybersecurity's Increasing Role on Defending Forward","authors":"X. Palmer, Lucas Potter, Saltuk Karahan","doi":"10.4018/IJCWT.2021070102","DOIUrl":"https://doi.org/10.4018/IJCWT.2021070102","url":null,"abstract":"The evolving nature of warfare has been changing with cybersecurity and the use of advanced biotechnology in each aspect of the society is expanding and overlapping with the cyberworld. This intersection, which has been described as “biocybersecurity” (BCS), can become a major front of the 21st-century conflicts. There are three lines of BCS which make it a critical component of overall cybersecurity: (1) cyber operations within the area of BCS have life threatening consequences to a greater extent than other cyber operations, (2) the breach in health-related personal data is a significant tool for fatal attacks, and (3) health-related misinformation campaigns as a component of BCS can cause significant damage compared to other misinformation campaigns. Based on the observation that rather than initiating the necessary cooperation COVID-19 helped exacerbate the existing conflicts, the authors suggest that BCS needs to be considered as an essential component of the cyber doctrine, within the Defending Forward framework. The findings are expected to help future cyber policy developments.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"24 1","pages":"15-29"},"PeriodicalIF":0.5,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73901889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing Cyberweapon Effectiveness Methodology With SE Modeling Techniques: Both for Offense and Defense 利用SE建模技术增强网络武器效能方法论:进攻与防御
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-07-01 DOI: 10.4018/IJCWT.2021070104
C. Pinto, Matthew Zurasky, Fatine Elakramine, Safae El Amrani, Ra'ed M. Jaradat, Chad S. Kerr, Vidanelage L. Dayarathna
A recent cyberweapons effectiveness methodology clearly provides a parallel but distinct process from that of kinetic weapons – both for defense and offense purposes. This methodology promotes consistency and improves cyberweapon system evaluation accuracy – for both offensive and defensive postures. However, integrating this cyberweapons effectiveness methodology into the design phase and operations phase of weapons systems development is still a challenge. The paper explores several systems engineering modeling techniques (e.g., SysML) and how they can be leveraged towards an enhanced effectiveness methodology. It highlights how failure mode analyses (e.g., FMEA) can facilitate cyber damage determination and target assessment, how block and parametric diagraming techniques can facilitate characterizing cyberweapons and eventually assess the effectiveness of such weapons and conversely assess vulnerabilities of systems to certain types of cyberweapons.
最近的一项网络武器有效性方法论清楚地提供了一个与动力武器相似但截然不同的过程——既用于防御,也用于进攻。这种方法促进了一致性,提高了网络武器系统评估的准确性-无论是进攻还是防御姿态。然而,将这种网络武器效能方法整合到武器系统开发的设计阶段和作战阶段仍然是一个挑战。本文探讨了几种系统工程建模技术(例如,SysML)以及如何将它们用于增强有效性的方法。它强调了失效模式分析(例如,FMEA)如何促进网络损害确定和目标评估,块和参数化图表技术如何促进表征网络武器并最终评估此类武器的有效性,反过来评估系统对某些类型网络武器的脆弱性。
{"title":"Enhancing Cyberweapon Effectiveness Methodology With SE Modeling Techniques: Both for Offense and Defense","authors":"C. Pinto, Matthew Zurasky, Fatine Elakramine, Safae El Amrani, Ra'ed M. Jaradat, Chad S. Kerr, Vidanelage L. Dayarathna","doi":"10.4018/IJCWT.2021070104","DOIUrl":"https://doi.org/10.4018/IJCWT.2021070104","url":null,"abstract":"A recent cyberweapons effectiveness methodology clearly provides a parallel but distinct process from that of kinetic weapons – both for defense and offense purposes. This methodology promotes consistency and improves cyberweapon system evaluation accuracy – for both offensive and defensive postures. However, integrating this cyberweapons effectiveness methodology into the design phase and operations phase of weapons systems development is still a challenge. The paper explores several systems engineering modeling techniques (e.g., SysML) and how they can be leveraged towards an enhanced effectiveness methodology. It highlights how failure mode analyses (e.g., FMEA) can facilitate cyber damage determination and target assessment, how block and parametric diagraming techniques can facilitate characterizing cyberweapons and eventually assess the effectiveness of such weapons and conversely assess vulnerabilities of systems to certain types of cyberweapons.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"11 1","pages":"41-57"},"PeriodicalIF":0.5,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85202977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Terrorism Mold Itself to Outer Space?: An International Legal Perspective 恐怖主义能否适应外太空?:国际法律视角
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-04-01 DOI: 10.4018/IJCWT.2021040105
Shadi A. Alshdaifat, Sanford R. Silverburg
Benefiting from the progress of technology, terrorism poses a major threat to international peace and security. Terrorist acts might move to other forms and are the culmination of processes that often begin with radicalization, the formation of extremist views, and acceptance of violence as a means through which to attempt change. As with other types of offenses, there is no internationally agreed upon definition of terrorism, but several conducts are universally accepted as expressions thereof. Terrorist-related offenses include the use of violence for political purposes, such as the hijacking of aircraft, targeting of marine vessels, the use of chemical or nuclear weapons against civilians, kidnapping, and other forms of targeting civilians. Terrorism itself is not a new phenomenon, yet the early 21st century is being shaped by a more intense focus on the issue and an increased awareness of terrorist acts and groups. If terrorism in outer space became a reality, then the cause is not different from other forms of terrorism in that violent extremism is often driven by feelings of isolation and exclusion, as well as fear and ignorance. To strengthen a sustainable solution, responses to violent extremism must be implemented in a framework respectful of human rights and the rule of law; otherwise, the exclusion is exacerbated, and the international community will witness another form of chaos.
恐怖主义受益于科技进步,对国际和平与安全构成重大威胁。恐怖主义行为可能会转向其他形式,并且往往是激进化、形成极端主义观点和接受暴力作为企图改变的手段的过程的高潮。与其他类型的罪行一样,国际上没有商定恐怖主义的定义,但有几种行为被普遍接受为恐怖主义的表现形式。与恐怖主义有关的罪行包括出于政治目的而使用暴力,例如劫持飞机、以海上船只为目标、对平民使用化学武器或核武器、绑架和其他形式的针对平民的行为。恐怖主义本身并不是一个新现象,但21世纪初,人们对这一问题的关注更加强烈,对恐怖主义行为和恐怖主义团体的认识也有所提高。如果外层空间的恐怖主义成为现实,那么其原因与其他形式的恐怖主义没有什么不同,因为暴力极端主义往往是由孤立和排斥的感觉以及恐惧和无知所驱动的。为了加强可持续解决方案,必须在尊重人权和法治的框架内实施应对暴力极端主义的措施;否则,这种排斥将加剧,国际社会将看到另一种形式的混乱。
{"title":"Can Terrorism Mold Itself to Outer Space?: An International Legal Perspective","authors":"Shadi A. Alshdaifat, Sanford R. Silverburg","doi":"10.4018/IJCWT.2021040105","DOIUrl":"https://doi.org/10.4018/IJCWT.2021040105","url":null,"abstract":"Benefiting from the progress of technology, terrorism poses a major threat to international peace and security. Terrorist acts might move to other forms and are the culmination of processes that often begin with radicalization, the formation of extremist views, and acceptance of violence as a means through which to attempt change. As with other types of offenses, there is no internationally agreed upon definition of terrorism, but several conducts are universally accepted as expressions thereof. Terrorist-related offenses include the use of violence for political purposes, such as the hijacking of aircraft, targeting of marine vessels, the use of chemical or nuclear weapons against civilians, kidnapping, and other forms of targeting civilians. Terrorism itself is not a new phenomenon, yet the early 21st century is being shaped by a more intense focus on the issue and an increased awareness of terrorist acts and groups. If terrorism in outer space became a reality, then the cause is not different from other forms of terrorism in that violent extremism is often driven by feelings of isolation and exclusion, as well as fear and ignorance. To strengthen a sustainable solution, responses to violent extremism must be implemented in a framework respectful of human rights and the rule of law; otherwise, the exclusion is exacerbated, and the international community will witness another form of chaos.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"1 1","pages":"56-75"},"PeriodicalIF":0.5,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89738233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Markers of Radicalisation in Social Media Posts: Insights From Modified Delphi Technique and Literature Review 社交媒体帖子中激进化的检测标记:来自改进德尔菲技术和文献综述的见解
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-04-01 DOI: 10.4018/IJCWT.2021040102
Loo Seng Neo
This study involved the creation of factors and indicators that can detect radicalization in social media posts. A concurrent approach of an expert knowledge acquisition process (modified Delphi technique) and literature review was utilized. Seven Singapore subject-matter experts in the field of terrorism evaluated factors that were collated from six terrorism risk assessment tools (ERG 22+, IVP, TRAP-18, MLG, VERA-2, and Cyber-VERA). They identify those that are of most considerable relevance for detecting radicalization in social media posts. A parallel literature review on online radicalization was conducted to complement the findings from the expert panel. In doing so, 12 factors and their 42 observable indicators were derived. These factors and indicators have the potential to guide the development of cyber-focused screening tools to detect radicalization in social media posts.
这项研究涉及创建可以检测社交媒体帖子中激进化的因素和指标。采用了专家知识获取过程(改进的德尔菲法)和文献回顾的并行方法。7位新加坡恐怖主义领域的主题专家评估了从6个恐怖主义风险评估工具(ERG 22+、IVP、TRAP-18、MLG、VERA-2和Cyber-VERA)中整理出来的因素。他们识别出那些与检测社交媒体帖子中的激进主义最相关的内容。对在线激进化进行了平行的文献综述,以补充专家小组的研究结果。在此过程中,推导出了12个因素及其42个可观察指标。这些因素和指标有可能指导以网络为重点的筛选工具的发展,以发现社交媒体帖子中的激进主义。
{"title":"Detecting Markers of Radicalisation in Social Media Posts: Insights From Modified Delphi Technique and Literature Review","authors":"Loo Seng Neo","doi":"10.4018/IJCWT.2021040102","DOIUrl":"https://doi.org/10.4018/IJCWT.2021040102","url":null,"abstract":"This study involved the creation of factors and indicators that can detect radicalization in social media posts. A concurrent approach of an expert knowledge acquisition process (modified Delphi technique) and literature review was utilized. Seven Singapore subject-matter experts in the field of terrorism evaluated factors that were collated from six terrorism risk assessment tools (ERG 22+, IVP, TRAP-18, MLG, VERA-2, and Cyber-VERA). They identify those that are of most considerable relevance for detecting radicalization in social media posts. A parallel literature review on online radicalization was conducted to complement the findings from the expert panel. In doing so, 12 factors and their 42 observable indicators were derived. These factors and indicators have the potential to guide the development of cyber-focused screening tools to detect radicalization in social media posts.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"89 1","pages":"12-28"},"PeriodicalIF":0.5,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82197529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coronavirus as a Rhizome: The Pandemic of Disinformation 冠状病毒是根茎:虚假信息的大流行
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-04-01 DOI: 10.4018/IJCWT.2021040104
Teija Sederholm, Petri Jääskeläinen, A. Huhtinen
Disinformation and misinformation about COVID-19 have proliferated, particularly on social media The purpose of this paper is to show the rhizomic nature of COVID-19-related dis- and misinformation having aspect of conspiracy theories, which are used on social media platforms to counter the official narratives about the origins of the virus Consisting of 40 news-style articles, the data was used to find out how a conspiracy theory about the virus being a possible man-made bioweapon was presented to the audience The results indicate that the rhizomatic structure of COVID-19 conspiracy theories makes it possible to vary the narratives based on the platform where it is published and the target audience Information spreads in unexpected ways, and it is difficult to control or predict the spread of extremist content This makes it possible for different actors, governments, and organizations to use information for their own purposes as a weapon of information warfare © 2021, IGI Global
关于COVID-19的虚假信息和错误信息已经激增,特别是在社交媒体上。本文的目的是展示与COVID-19相关的具有阴谋论方面的虚假信息和错误信息的根茎性,这些信息在社交媒体平台上被用来反驳关于病毒起源的官方叙述,包括40篇新闻式文章。这些数据被用来找出关于病毒可能是人造生物武器的阴谋论是如何呈现给受众的。结果表明,COVID-19阴谋论的根状结构使得根据发布平台和目标受众改变叙述成为可能。信息以意想不到的方式传播,难以控制或预测极端主义内容的传播。这使得不同的行为者、政府、和组织使用信息为自己的目的作为信息战的武器©2021,IGI Global
{"title":"Coronavirus as a Rhizome: The Pandemic of Disinformation","authors":"Teija Sederholm, Petri Jääskeläinen, A. Huhtinen","doi":"10.4018/IJCWT.2021040104","DOIUrl":"https://doi.org/10.4018/IJCWT.2021040104","url":null,"abstract":"Disinformation and misinformation about COVID-19 have proliferated, particularly on social media The purpose of this paper is to show the rhizomic nature of COVID-19-related dis- and misinformation having aspect of conspiracy theories, which are used on social media platforms to counter the official narratives about the origins of the virus Consisting of 40 news-style articles, the data was used to find out how a conspiracy theory about the virus being a possible man-made bioweapon was presented to the audience The results indicate that the rhizomatic structure of COVID-19 conspiracy theories makes it possible to vary the narratives based on the platform where it is published and the target audience Information spreads in unexpected ways, and it is difficult to control or predict the spread of extremist content This makes it possible for different actors, governments, and organizations to use information for their own purposes as a weapon of information warfare © 2021, IGI Global","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"13 1","pages":"43-55"},"PeriodicalIF":0.5,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74789681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Iran-Saudi Cyber Conflict 伊朗和沙特的网络冲突
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-04-01 DOI: 10.4018/IJCWT.2021040103
Chuck Easttom, William Butler
Cyber conflict is a factor in modern politics. There is often a synergy between historical political issues and current cyber conflicts. Saudi Arabia and Iran have a long-standing mutual animosity that is now being expressed via cyber operations. This study provides a context for current cyber conflicts between the Kingdom of Saudi Arabia and Iran. The political history of both countries is briefly explored. Then specific cyber incidents are examined within that existing political conflict. The current state of affairs between Saudi Arabia and Iran can best be described as a cyber cold war. This study provides both current cyber incidents as well as the political and historical context in which these incidents occur. The history of the modern states of Iran and Saudi Arabia provide a context for the political strife between the two countries.
网络冲突是现代政治中的一个因素。历史上的政治问题和当前的网络冲突之间往往存在协同作用。沙特阿拉伯和伊朗长期存在相互仇恨,现在通过网络行动表现出来。本研究为当前沙特阿拉伯王国和伊朗之间的网络冲突提供了背景。本文简要探讨了两国的政治史。然后在现有的政治冲突中检查具体的网络事件。目前沙特阿拉伯和伊朗之间的局势可以用“网络冷战”来形容。本研究提供了当前的网络事件以及这些事件发生的政治和历史背景。伊朗和沙特阿拉伯这两个现代国家的历史为两国之间的政治冲突提供了一个背景。
{"title":"The Iran-Saudi Cyber Conflict","authors":"Chuck Easttom, William Butler","doi":"10.4018/IJCWT.2021040103","DOIUrl":"https://doi.org/10.4018/IJCWT.2021040103","url":null,"abstract":"Cyber conflict is a factor in modern politics. There is often a synergy between historical political issues and current cyber conflicts. Saudi Arabia and Iran have a long-standing mutual animosity that is now being expressed via cyber operations. This study provides a context for current cyber conflicts between the Kingdom of Saudi Arabia and Iran. The political history of both countries is briefly explored. Then specific cyber incidents are examined within that existing political conflict. The current state of affairs between Saudi Arabia and Iran can best be described as a cyber cold war. This study provides both current cyber incidents as well as the political and historical context in which these incidents occur. The history of the modern states of Iran and Saudi Arabia provide a context for the political strife between the two countries.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"12 1","pages":"29-42"},"PeriodicalIF":0.5,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85026566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber Warfare and the "Humanization" of International Humanitarian Law 网络战与国际人道法的“人性化”
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2021-04-01 DOI: 10.4018/IJCWT.2021040101
S. Kleemann
Cyber warfare is a timely and relevant issue and one of the most controversial in international humanitarian law (IHL). The aim of IHL is to set rules and limits in terms of means and methods of warfare. In this context, a key question arises: Has digital warfare rules or limits, and if so, how are these applicable? Traditional principles, developed over a long period, are facing a new dimension of challenges due to the rise of cyber warfare. This paper argues that to overcome this new issue, it is critical that new humanity-oriented approaches is developed with regard to cyber warfare. The challenge is to establish a legal regime for cyber-attacks, successfully addressing human rights norms and standards. While clarifying this from a legal perspective, the authors can redesign the sensitive equilibrium between humanity and military necessity, weighing the humanitarian aims of IHL and the protection of civilians—in combination with international human rights law and other relevant legal regimes—in a different manner than before.
网络战争是国际人道法中一个具有时代性和相关性的问题,也是争议最大的问题之一。国际人道法的目的是在作战手段和方法方面制定规则和限制。在这种情况下,一个关键问题出现了:数字战争是否有规则或限制,如果有,这些规则如何适用?由于网络战的兴起,经过长期发展的传统原则正面临着新的挑战。本文认为,为了克服这一新问题,在网络战方面开发新的以人为本的方法至关重要。挑战在于建立一个针对网络攻击的法律制度,成功地处理人权规范和标准。在从法律角度澄清这一点的同时,作者可以重新设计人道主义与军事必要性之间的敏感平衡,以一种不同于以往的方式,结合国际人权法和其他相关法律制度,权衡国际人道法的人道主义目标和保护平民。
{"title":"Cyber Warfare and the \"Humanization\" of International Humanitarian Law","authors":"S. Kleemann","doi":"10.4018/IJCWT.2021040101","DOIUrl":"https://doi.org/10.4018/IJCWT.2021040101","url":null,"abstract":"Cyber warfare is a timely and relevant issue and one of the most controversial in international humanitarian law (IHL). The aim of IHL is to set rules and limits in terms of means and methods of warfare. In this context, a key question arises: Has digital warfare rules or limits, and if so, how are these applicable? Traditional principles, developed over a long period, are facing a new dimension of challenges due to the rise of cyber warfare. This paper argues that to overcome this new issue, it is critical that new humanity-oriented approaches is developed with regard to cyber warfare. The challenge is to establish a legal regime for cyber-attacks, successfully addressing human rights norms and standards. While clarifying this from a legal perspective, the authors can redesign the sensitive equilibrium between humanity and military necessity, weighing the humanitarian aims of IHL and the protection of civilians—in combination with international human rights law and other relevant legal regimes—in a different manner than before.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"52 1","pages":"1-11"},"PeriodicalIF":0.5,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84669447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cyber Warfare and Terrorism
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1